@debros/network-ts-sdk 0.6.1 → 0.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,271 @@
1
+ /**
2
+ * AES-256-GCM Encryption
3
+ *
4
+ * Implements authenticated encryption using AES-256 in Galois/Counter Mode.
5
+ * Uses @noble/ciphers for platform-agnostic, audited cryptographic operations.
6
+ *
7
+ * Features:
8
+ * - Authenticated encryption (confidentiality + integrity)
9
+ * - 256-bit keys for strong security
10
+ * - 96-bit nonces (randomly generated)
11
+ * - 128-bit authentication tags
12
+ *
13
+ * Security considerations:
14
+ * - Never reuse a nonce with the same key
15
+ * - Nonces are randomly generated and prepended to ciphertext
16
+ * - Authentication tags are verified before decryption
17
+ */
18
+
19
+ import { gcm } from '@noble/ciphers/aes';
20
+ import { randomBytes } from '@noble/ciphers/webcrypto';
21
+ import { bytesToHex, hexToBytes, concatBytes } from '@noble/hashes/utils';
22
+
23
+ /**
24
+ * Size constants
25
+ */
26
+ export const KEY_SIZE = 32; // 256 bits
27
+ export const NONCE_SIZE = 12; // 96 bits (recommended for GCM)
28
+ export const TAG_SIZE = 16; // 128 bits
29
+
30
+ /**
31
+ * Encrypted data structure
32
+ */
33
+ export interface EncryptedData {
34
+ /** Ciphertext including authentication tag */
35
+ ciphertext: Uint8Array;
36
+ /** Nonce used for encryption */
37
+ nonce: Uint8Array;
38
+ /** Additional authenticated data (optional) */
39
+ aad?: Uint8Array;
40
+ }
41
+
42
+ /**
43
+ * Serialized encrypted data (nonce prepended to ciphertext)
44
+ */
45
+ export interface SerializedEncryptedData {
46
+ /** Combined nonce + ciphertext + tag */
47
+ data: Uint8Array;
48
+ /** Additional authenticated data (optional) */
49
+ aad?: Uint8Array;
50
+ }
51
+
52
+ /**
53
+ * Encrypts data using AES-256-GCM
54
+ */
55
+ export function encrypt(
56
+ plaintext: Uint8Array,
57
+ key: Uint8Array,
58
+ aad?: Uint8Array
59
+ ): EncryptedData {
60
+ validateKey(key);
61
+
62
+ const nonce = randomBytes(NONCE_SIZE);
63
+ const cipher = gcm(key, nonce, aad);
64
+ const ciphertext = cipher.encrypt(plaintext);
65
+
66
+ return {
67
+ ciphertext,
68
+ nonce,
69
+ aad,
70
+ };
71
+ }
72
+
73
+ /**
74
+ * Decrypts data using AES-256-GCM
75
+ */
76
+ export function decrypt(encryptedData: EncryptedData, key: Uint8Array): Uint8Array {
77
+ validateKey(key);
78
+ validateNonce(encryptedData.nonce);
79
+
80
+ const cipher = gcm(key, encryptedData.nonce, encryptedData.aad);
81
+
82
+ try {
83
+ return cipher.decrypt(encryptedData.ciphertext);
84
+ } catch (error) {
85
+ throw new Error('Decryption failed: invalid ciphertext or authentication tag');
86
+ }
87
+ }
88
+
89
+ /**
90
+ * Encrypts a string message
91
+ */
92
+ export function encryptString(
93
+ message: string,
94
+ key: Uint8Array,
95
+ aad?: Uint8Array
96
+ ): EncryptedData {
97
+ const plaintext = new TextEncoder().encode(message);
98
+ try {
99
+ return encrypt(plaintext, key, aad);
100
+ } finally {
101
+ plaintext.fill(0);
102
+ }
103
+ }
104
+
105
+ /**
106
+ * Decrypts to a string message
107
+ */
108
+ export function decryptString(encryptedData: EncryptedData, key: Uint8Array): string {
109
+ const plaintext = decrypt(encryptedData, key);
110
+ try {
111
+ return new TextDecoder().decode(plaintext);
112
+ } finally {
113
+ plaintext.fill(0);
114
+ }
115
+ }
116
+
117
+ /**
118
+ * Serializes encrypted data (prepends nonce to ciphertext)
119
+ */
120
+ export function serialize(encryptedData: EncryptedData): SerializedEncryptedData {
121
+ const data = concatBytes(encryptedData.nonce, encryptedData.ciphertext);
122
+
123
+ return {
124
+ data,
125
+ aad: encryptedData.aad,
126
+ };
127
+ }
128
+
129
+ /**
130
+ * Deserializes encrypted data
131
+ */
132
+ export function deserialize(serialized: SerializedEncryptedData): EncryptedData {
133
+ if (serialized.data.length < NONCE_SIZE + TAG_SIZE) {
134
+ throw new Error('Invalid serialized data: too short');
135
+ }
136
+
137
+ const nonce = serialized.data.slice(0, NONCE_SIZE);
138
+ const ciphertext = serialized.data.slice(NONCE_SIZE);
139
+
140
+ return {
141
+ ciphertext,
142
+ nonce,
143
+ aad: serialized.aad,
144
+ };
145
+ }
146
+
147
+ /**
148
+ * Encrypts and serializes data in one step
149
+ */
150
+ export function encryptAndSerialize(
151
+ plaintext: Uint8Array,
152
+ key: Uint8Array,
153
+ aad?: Uint8Array
154
+ ): SerializedEncryptedData {
155
+ const encrypted = encrypt(plaintext, key, aad);
156
+ return serialize(encrypted);
157
+ }
158
+
159
+ /**
160
+ * Deserializes and decrypts data in one step
161
+ */
162
+ export function deserializeAndDecrypt(
163
+ serialized: SerializedEncryptedData,
164
+ key: Uint8Array
165
+ ): Uint8Array {
166
+ const encrypted = deserialize(serialized);
167
+ return decrypt(encrypted, key);
168
+ }
169
+
170
+ /**
171
+ * Converts encrypted data to hex string
172
+ */
173
+ export function toHex(encryptedData: EncryptedData): string {
174
+ const serialized = serialize(encryptedData);
175
+ return bytesToHex(serialized.data);
176
+ }
177
+
178
+ /**
179
+ * Parses encrypted data from hex string
180
+ */
181
+ export function fromHex(hex: string, aad?: Uint8Array): EncryptedData {
182
+ const normalized = hex.startsWith('0x') ? hex.slice(2) : hex;
183
+ const data = hexToBytes(normalized);
184
+
185
+ return deserialize({ data, aad });
186
+ }
187
+
188
+ /**
189
+ * Converts encrypted data to base64 string
190
+ */
191
+ export function toBase64(encryptedData: EncryptedData): string {
192
+ const serialized = serialize(encryptedData);
193
+
194
+ if (typeof btoa === 'function') {
195
+ return btoa(String.fromCharCode(...serialized.data));
196
+ } else {
197
+ return Buffer.from(serialized.data).toString('base64');
198
+ }
199
+ }
200
+
201
+ /**
202
+ * Parses encrypted data from base64 string
203
+ */
204
+ export function fromBase64(base64: string, aad?: Uint8Array): EncryptedData {
205
+ let data: Uint8Array;
206
+
207
+ if (typeof atob === 'function') {
208
+ const binary = atob(base64);
209
+ data = new Uint8Array(binary.length);
210
+ for (let i = 0; i < binary.length; i++) {
211
+ data[i] = binary.charCodeAt(i);
212
+ }
213
+ } else {
214
+ data = new Uint8Array(Buffer.from(base64, 'base64'));
215
+ }
216
+
217
+ return deserialize({ data, aad });
218
+ }
219
+
220
+ function validateKey(key: Uint8Array): void {
221
+ if (!(key instanceof Uint8Array)) {
222
+ throw new Error('Key must be a Uint8Array');
223
+ }
224
+
225
+ if (key.length !== KEY_SIZE) {
226
+ throw new Error(`Invalid key length: expected ${KEY_SIZE}, got ${key.length}`);
227
+ }
228
+ }
229
+
230
+ function validateNonce(nonce: Uint8Array): void {
231
+ if (!(nonce instanceof Uint8Array)) {
232
+ throw new Error('Nonce must be a Uint8Array');
233
+ }
234
+
235
+ if (nonce.length !== NONCE_SIZE) {
236
+ throw new Error(`Invalid nonce length: expected ${NONCE_SIZE}, got ${nonce.length}`);
237
+ }
238
+ }
239
+
240
+ /**
241
+ * Generates a random encryption key
242
+ */
243
+ export function generateKey(): Uint8Array {
244
+ return randomBytes(KEY_SIZE);
245
+ }
246
+
247
+ /**
248
+ * Generates a random nonce
249
+ */
250
+ export function generateNonce(): Uint8Array {
251
+ return randomBytes(NONCE_SIZE);
252
+ }
253
+
254
+ /**
255
+ * Securely clears a key from memory
256
+ */
257
+ export function clearKey(key: Uint8Array): void {
258
+ key.fill(0);
259
+ }
260
+
261
+ /**
262
+ * Checks if encrypted data appears valid (basic structure check)
263
+ */
264
+ export function isValidEncryptedData(data: EncryptedData): boolean {
265
+ return (
266
+ data.nonce instanceof Uint8Array &&
267
+ data.nonce.length === NONCE_SIZE &&
268
+ data.ciphertext instanceof Uint8Array &&
269
+ data.ciphertext.length >= TAG_SIZE
270
+ );
271
+ }
@@ -0,0 +1,42 @@
1
+ /**
2
+ * HKDF Key Derivation
3
+ *
4
+ * Derives deterministic sub-keys from a master secret using HKDF-SHA256 (RFC 5869).
5
+ */
6
+
7
+ import { hkdf } from '@noble/hashes/hkdf';
8
+ import { sha256 } from '@noble/hashes/sha256';
9
+
10
+ /** Default output length in bytes (256 bits) */
11
+ const DEFAULT_KEY_LENGTH = 32;
12
+
13
+ /** Maximum allowed output length (255 * SHA-256 output = 8160 bytes) */
14
+ const MAX_KEY_LENGTH = 255 * 32;
15
+
16
+ /**
17
+ * Derives a sub-key from input key material using HKDF-SHA256.
18
+ *
19
+ * @param ikm - Input key material (e.g., wallet private key). MUST be high-entropy.
20
+ * @param salt - Domain separation salt. Can be a string or bytes.
21
+ * @param info - Context-specific info. Can be a string or bytes.
22
+ * @param length - Output key length in bytes (default: 32).
23
+ * @returns Derived key as Uint8Array. Caller MUST zero this after use.
24
+ */
25
+ export function deriveKeyHKDF(
26
+ ikm: Uint8Array,
27
+ salt: string | Uint8Array,
28
+ info: string | Uint8Array,
29
+ length: number = DEFAULT_KEY_LENGTH,
30
+ ): Uint8Array {
31
+ if (!ikm || ikm.length === 0) {
32
+ throw new Error('HKDF: input key material must not be empty');
33
+ }
34
+ if (length <= 0 || length > MAX_KEY_LENGTH) {
35
+ throw new Error(`HKDF: output length must be between 1 and ${MAX_KEY_LENGTH}`);
36
+ }
37
+
38
+ const saltBytes = typeof salt === 'string' ? new TextEncoder().encode(salt) : salt;
39
+ const infoBytes = typeof info === 'string' ? new TextEncoder().encode(info) : info;
40
+
41
+ return hkdf(sha256, ikm, saltBytes, infoBytes, length);
42
+ }
@@ -0,0 +1,27 @@
1
+ export {
2
+ encrypt,
3
+ decrypt,
4
+ encryptString,
5
+ decryptString,
6
+ serialize,
7
+ deserialize,
8
+ encryptAndSerialize,
9
+ deserializeAndDecrypt,
10
+ toHex,
11
+ fromHex,
12
+ toBase64,
13
+ fromBase64,
14
+ generateKey,
15
+ generateNonce,
16
+ clearKey,
17
+ isValidEncryptedData,
18
+ KEY_SIZE,
19
+ NONCE_SIZE,
20
+ TAG_SIZE,
21
+ } from './aes';
22
+ export type { EncryptedData, SerializedEncryptedData } from './aes';
23
+
24
+ export { deriveKeyHKDF } from './hkdf';
25
+
26
+ export { split as shamirSplit, combine as shamirCombine } from './shamir';
27
+ export type { Share as ShamirShare } from './shamir';
@@ -0,0 +1,173 @@
1
+ /**
2
+ * Shamir's Secret Sharing over GF(2^8)
3
+ *
4
+ * Information-theoretic secret splitting: any K shares reconstruct the secret,
5
+ * K-1 shares reveal zero information.
6
+ *
7
+ * Uses GF(2^8) with irreducible polynomial x^8 + x^4 + x^3 + x + 1 (0x11B),
8
+ * same as AES. This is the standard choice for byte-level SSS.
9
+ */
10
+
11
+ import { randomBytes } from '@noble/ciphers/webcrypto';
12
+
13
+ // ── GF(2^8) Arithmetic ─────────────────────────────────────────────────────
14
+
15
+ const IRREDUCIBLE = 0x11b;
16
+
17
+ /** Exponential table: exp[log[a] + log[b]] = a * b */
18
+ const EXP_TABLE = new Uint8Array(512);
19
+
20
+ /** Logarithm table: log[a] for a in 1..255 (log[0] is undefined) */
21
+ const LOG_TABLE = new Uint8Array(256);
22
+
23
+ // Build log/exp tables using generator 3
24
+ (function buildTables() {
25
+ let x = 1;
26
+ for (let i = 0; i < 255; i++) {
27
+ EXP_TABLE[i] = x;
28
+ LOG_TABLE[x] = i;
29
+ x = x ^ (x << 1); // multiply by generator (3 is primitive in this field)
30
+ if (x >= 256) x ^= IRREDUCIBLE;
31
+ }
32
+ // Extend exp table for easy modular arithmetic (avoid mod 255)
33
+ for (let i = 255; i < 512; i++) {
34
+ EXP_TABLE[i] = EXP_TABLE[i - 255]!;
35
+ }
36
+ })();
37
+
38
+ /** GF(2^8) addition: XOR */
39
+ function gfAdd(a: number, b: number): number {
40
+ return a ^ b;
41
+ }
42
+
43
+ /** GF(2^8) multiplication via log/exp tables */
44
+ function gfMul(a: number, b: number): number {
45
+ if (a === 0 || b === 0) return 0;
46
+ return EXP_TABLE[LOG_TABLE[a]! + LOG_TABLE[b]!]!;
47
+ }
48
+
49
+ /** GF(2^8) multiplicative inverse */
50
+ function gfInv(a: number): number {
51
+ if (a === 0) throw new Error('GF(2^8): division by zero');
52
+ return EXP_TABLE[255 - LOG_TABLE[a]!]!;
53
+ }
54
+
55
+ /** GF(2^8) division: a / b */
56
+ function gfDiv(a: number, b: number): number {
57
+ if (b === 0) throw new Error('GF(2^8): division by zero');
58
+ if (a === 0) return 0;
59
+ return EXP_TABLE[(LOG_TABLE[a]! - LOG_TABLE[b]! + 255) % 255]!;
60
+ }
61
+
62
+ // ── Share Type ──────────────────────────────────────────────────────────────
63
+
64
+ /** A single Shamir share */
65
+ export interface Share {
66
+ /** Share index (1..N, never 0) */
67
+ x: number;
68
+ /** Share data (same length as secret) */
69
+ y: Uint8Array;
70
+ }
71
+
72
+ // ── Split ───────────────────────────────────────────────────────────────────
73
+
74
+ /**
75
+ * Splits a secret into N shares with threshold K.
76
+ *
77
+ * @param secret - Secret bytes to split (any length)
78
+ * @param n - Total number of shares to create (2..255)
79
+ * @param k - Minimum shares needed for reconstruction (2..n)
80
+ * @returns Array of N shares
81
+ */
82
+ export function split(secret: Uint8Array, n: number, k: number): Share[] {
83
+ if (k < 2) throw new Error('Threshold K must be at least 2');
84
+ if (n < k) throw new Error('Share count N must be >= threshold K');
85
+ if (n > 255) throw new Error('Maximum 255 shares (GF(2^8) limit)');
86
+ if (secret.length === 0) throw new Error('Secret must not be empty');
87
+
88
+ const coefficients = new Array<Uint8Array>(secret.length);
89
+ for (let i = 0; i < secret.length; i++) {
90
+ const poly = new Uint8Array(k);
91
+ poly[0] = secret[i]!;
92
+ const rand = randomBytes(k - 1);
93
+ poly.set(rand, 1);
94
+ coefficients[i] = poly;
95
+ }
96
+
97
+ const shares: Share[] = [];
98
+ for (let xi = 1; xi <= n; xi++) {
99
+ const y = new Uint8Array(secret.length);
100
+ for (let byteIdx = 0; byteIdx < secret.length; byteIdx++) {
101
+ y[byteIdx] = evaluatePolynomial(coefficients[byteIdx]!, xi);
102
+ }
103
+ shares.push({ x: xi, y });
104
+ }
105
+
106
+ for (const poly of coefficients) {
107
+ poly.fill(0);
108
+ }
109
+
110
+ return shares;
111
+ }
112
+
113
+ function evaluatePolynomial(coeffs: Uint8Array, x: number): number {
114
+ let result = 0;
115
+ for (let i = coeffs.length - 1; i >= 0; i--) {
116
+ result = gfAdd(gfMul(result, x), coeffs[i]!);
117
+ }
118
+ return result;
119
+ }
120
+
121
+ // ── Combine ─────────────────────────────────────────────────────────────────
122
+
123
+ /**
124
+ * Reconstructs a secret from K or more shares using Lagrange interpolation.
125
+ *
126
+ * @param shares - Array of K or more shares (must all have same y.length)
127
+ * @returns Reconstructed secret
128
+ */
129
+ export function combine(shares: Share[]): Uint8Array {
130
+ if (shares.length < 2) throw new Error('Need at least 2 shares');
131
+
132
+ const secretLength = shares[0]!.y.length;
133
+ for (const share of shares) {
134
+ if (share.y.length !== secretLength) {
135
+ throw new Error('All shares must have the same data length');
136
+ }
137
+ if (share.x === 0) {
138
+ throw new Error('Share index must not be 0');
139
+ }
140
+ }
141
+
142
+ const xValues = new Set(shares.map(s => s.x));
143
+ if (xValues.size !== shares.length) {
144
+ throw new Error('Duplicate share indices');
145
+ }
146
+
147
+ const secret = new Uint8Array(secretLength);
148
+
149
+ for (let byteIdx = 0; byteIdx < secretLength; byteIdx++) {
150
+ let value = 0;
151
+
152
+ for (let i = 0; i < shares.length; i++) {
153
+ const xi = shares[i]!.x;
154
+ const yi = shares[i]!.y[byteIdx]!;
155
+
156
+ let basis = 1;
157
+ for (let j = 0; j < shares.length; j++) {
158
+ if (i === j) continue;
159
+ const xj = shares[j]!.x;
160
+ basis = gfMul(basis, gfDiv(xj, gfAdd(xi, xj)));
161
+ }
162
+
163
+ value = gfAdd(value, gfMul(yi, basis));
164
+ }
165
+
166
+ secret[byteIdx] = value;
167
+ }
168
+
169
+ return secret;
170
+ }
171
+
172
+ /** @internal Exported for cross-platform test vector validation */
173
+ export const _gf = { add: gfAdd, mul: gfMul, inv: gfInv, div: gfDiv, EXP_TABLE, LOG_TABLE } as const;
@@ -0,0 +1,65 @@
1
+ // High-level vault client
2
+ export { VaultClient } from './client';
3
+ export { adaptiveThreshold, writeQuorum } from './quorum';
4
+ export type {
5
+ VaultConfig,
6
+ SecretMeta,
7
+ StoreResult,
8
+ RetrieveResult,
9
+ ListResult,
10
+ DeleteResult,
11
+ GuardianResult,
12
+ } from './types';
13
+
14
+ // Vault auth (renamed to avoid collision with top-level AuthClient)
15
+ export { AuthClient as VaultAuthClient } from './auth';
16
+
17
+ // Transport (guardian communication)
18
+ export { GuardianClient, GuardianError } from './transport';
19
+ export { fanOut, fanOutIndexed, withTimeout, withRetry } from './transport';
20
+ export type {
21
+ GuardianEndpoint,
22
+ GuardianErrorCode,
23
+ GuardianInfo,
24
+ HealthResponse as GuardianHealthResponse,
25
+ StatusResponse as GuardianStatusResponse,
26
+ PushResponse,
27
+ PullResponse,
28
+ StoreSecretResponse,
29
+ GetSecretResponse,
30
+ DeleteSecretResponse,
31
+ ListSecretsResponse,
32
+ SecretEntry,
33
+ ChallengeResponse as GuardianChallengeResponse,
34
+ SessionResponse as GuardianSessionResponse,
35
+ FanOutResult,
36
+ } from './transport';
37
+
38
+ // Crypto primitives
39
+ export {
40
+ encrypt,
41
+ decrypt,
42
+ encryptString,
43
+ decryptString,
44
+ serialize as serializeEncrypted,
45
+ deserialize as deserializeEncrypted,
46
+ encryptAndSerialize,
47
+ deserializeAndDecrypt,
48
+ toHex as encryptedToHex,
49
+ fromHex as encryptedFromHex,
50
+ toBase64 as encryptedToBase64,
51
+ fromBase64 as encryptedFromBase64,
52
+ generateKey,
53
+ generateNonce,
54
+ clearKey,
55
+ isValidEncryptedData,
56
+ KEY_SIZE,
57
+ NONCE_SIZE,
58
+ TAG_SIZE,
59
+ } from './crypto';
60
+ export type { EncryptedData, SerializedEncryptedData } from './crypto';
61
+
62
+ export { deriveKeyHKDF } from './crypto';
63
+
64
+ export { shamirSplit, shamirCombine } from './crypto';
65
+ export type { ShamirShare } from './crypto';
@@ -0,0 +1,16 @@
1
+ /**
2
+ * Quorum calculations for distributed vault operations.
3
+ * Must match orama-vault (Zig side).
4
+ */
5
+
6
+ /** Adaptive Shamir threshold: max(3, floor(N/3)). */
7
+ export function adaptiveThreshold(n: number): number {
8
+ return Math.max(3, Math.floor(n / 3));
9
+ }
10
+
11
+ /** Write quorum: ceil(2N/3). Requires majority for consistency. */
12
+ export function writeQuorum(n: number): number {
13
+ if (n === 0) return 0;
14
+ if (n <= 2) return n;
15
+ return Math.ceil((2 * n) / 3);
16
+ }
@@ -0,0 +1,94 @@
1
+ import { GuardianClient, GuardianError } from './guardian';
2
+ import type { GuardianEndpoint, GuardianErrorCode, FanOutResult } from './types';
3
+
4
+ /**
5
+ * Fan out an operation to multiple guardians in parallel.
6
+ * Returns results from all guardians (both successes and failures).
7
+ */
8
+ export async function fanOut<T>(
9
+ guardians: GuardianEndpoint[],
10
+ operation: (client: GuardianClient) => Promise<T>,
11
+ ): Promise<FanOutResult<T>[]> {
12
+ const results = await Promise.allSettled(
13
+ guardians.map(async (endpoint) => {
14
+ const client = new GuardianClient(endpoint);
15
+ const result = await operation(client);
16
+ return { endpoint, result, error: null } as FanOutResult<T>;
17
+ }),
18
+ );
19
+
20
+ return results.map((r, i) => {
21
+ if (r.status === 'fulfilled') return r.value;
22
+ const reason = r.reason as Error;
23
+ const errorCode: GuardianErrorCode | undefined = reason instanceof GuardianError ? reason.code : undefined;
24
+ return {
25
+ endpoint: guardians[i]!,
26
+ result: null,
27
+ error: reason.message,
28
+ errorCode,
29
+ };
30
+ });
31
+ }
32
+
33
+ /**
34
+ * Fan out an indexed operation to multiple guardians in parallel.
35
+ * The operation receives the index so each guardian can get a different share.
36
+ */
37
+ export async function fanOutIndexed<T>(
38
+ guardians: GuardianEndpoint[],
39
+ operation: (client: GuardianClient, index: number) => Promise<T>,
40
+ ): Promise<FanOutResult<T>[]> {
41
+ const results = await Promise.allSettled(
42
+ guardians.map(async (endpoint, i) => {
43
+ const client = new GuardianClient(endpoint);
44
+ const result = await operation(client, i);
45
+ return { endpoint, result, error: null } as FanOutResult<T>;
46
+ }),
47
+ );
48
+
49
+ return results.map((r, i) => {
50
+ if (r.status === 'fulfilled') return r.value;
51
+ const reason = r.reason as Error;
52
+ const errorCode: GuardianErrorCode | undefined = reason instanceof GuardianError ? reason.code : undefined;
53
+ return {
54
+ endpoint: guardians[i]!,
55
+ result: null,
56
+ error: reason.message,
57
+ errorCode,
58
+ };
59
+ });
60
+ }
61
+
62
+ /**
63
+ * Race a promise against a timeout.
64
+ */
65
+ export function withTimeout<T>(promise: Promise<T>, ms: number): Promise<T> {
66
+ return Promise.race([
67
+ promise,
68
+ new Promise<never>((_, reject) =>
69
+ setTimeout(() => reject(new Error(`timeout after ${ms}ms`)), ms),
70
+ ),
71
+ ]);
72
+ }
73
+
74
+ /**
75
+ * Retry a function with exponential backoff.
76
+ * Does not retry auth or not-found errors.
77
+ */
78
+ export async function withRetry<T>(fn: () => Promise<T>, attempts = 3): Promise<T> {
79
+ let lastError: Error | undefined;
80
+ for (let i = 0; i < attempts; i++) {
81
+ try {
82
+ return await fn();
83
+ } catch (err) {
84
+ lastError = err as Error;
85
+ if (err instanceof GuardianError && (err.code === 'AUTH' || err.code === 'NOT_FOUND')) {
86
+ throw err;
87
+ }
88
+ if (i < attempts - 1) {
89
+ await new Promise((r) => setTimeout(r, 200 * Math.pow(2, i)));
90
+ }
91
+ }
92
+ }
93
+ throw lastError!;
94
+ }