@inco/js 0.1.41 → 0.2.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/generated/abis/inco-fhevm.d.ts +410 -8234
- package/dist/generated/abis/inco-fhevm.js +321 -5885
- package/dist/generated/abis/lightning.d.ts +1398 -16296
- package/dist/generated/abis/lightning.js +972 -12800
- package/dist/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +139 -0
- package/dist/generated/es/inco/kms/lite/v1/kms_service_pb.js +23 -3
- package/dist/generated/lightning.d.ts +42 -0
- package/dist/generated/lightning.js +45 -1
- package/dist/generated/local-node.d.ts +2 -2
- package/dist/generated/local-node.js +2 -2
- package/dist/index.d.ts +1 -1
- package/dist/index.js +2 -2
- package/package.json +6 -3
@@ -150,6 +150,134 @@ export type ReencryptionResponsePayload = Message<"inco.kms.lite.v1.Reencryption
|
|
150
150
|
* Use `create(ReencryptionResponsePayloadSchema)` to create a new message.
|
151
151
|
*/
|
152
152
|
export declare const ReencryptionResponsePayloadSchema: GenMessage<ReencryptionResponsePayload>;
|
153
|
+
/**
|
154
|
+
* AttestedDecryptRequest is the request type for the KmsService/AttestedDecrypt RPC method.
|
155
|
+
*
|
156
|
+
* @generated from message inco.kms.lite.v1.AttestedDecryptRequest
|
157
|
+
*/
|
158
|
+
export type AttestedDecryptRequest = Message<"inco.kms.lite.v1.AttestedDecryptRequest"> & {
|
159
|
+
/**
|
160
|
+
* user_address is the Ethereum address of the user who requested the
|
161
|
+
* decryption, prefixed with 0x.
|
162
|
+
*
|
163
|
+
* @generated from field: string user_address = 1;
|
164
|
+
*/
|
165
|
+
userAddress: string;
|
166
|
+
/**
|
167
|
+
* eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
|
168
|
+
* `user_address` (note that we only give a JSON representation for the sake of
|
169
|
+
* readability, but the actual signed data is defined in the EIP-712 spec):
|
170
|
+
*
|
171
|
+
* ```json
|
172
|
+
* {
|
173
|
+
* "types": {
|
174
|
+
* "EIP712Domain": [
|
175
|
+
* { "name": "name", "type": "string" },
|
176
|
+
* { "name": "version", "type": "string" },
|
177
|
+
* { "name": "chainId", "type": "uint256" }
|
178
|
+
* ],
|
179
|
+
* "AttestedDecryptRequest": [
|
180
|
+
* { "name": "handles", "type": "bytes32[]" }
|
181
|
+
* ]
|
182
|
+
* },
|
183
|
+
* "primaryType": "AttestedDecryptRequest",
|
184
|
+
* "domain": {
|
185
|
+
* "name": "IncoAttestedDecrypt",
|
186
|
+
* "version": "0.1.0",
|
187
|
+
* "chainId": "<host_chain_id>",
|
188
|
+
* "verifyingContract": "<acl_address>",
|
189
|
+
* "salt": "0x0000000000000000000000000000000000000000000000000000000000000000"
|
190
|
+
* },
|
191
|
+
* "message": {
|
192
|
+
* "handles": "<handles>"
|
193
|
+
* }
|
194
|
+
* }
|
195
|
+
* ```
|
196
|
+
*
|
197
|
+
* @generated from field: bytes eip712_signature = 2;
|
198
|
+
*/
|
199
|
+
eip712Signature: Uint8Array;
|
200
|
+
/**
|
201
|
+
* handles is the list of handles of the ciphertexts to decrypt.
|
202
|
+
*
|
203
|
+
* @generated from field: repeated string handles = 3;
|
204
|
+
*/
|
205
|
+
handles: string[];
|
206
|
+
};
|
207
|
+
/**
|
208
|
+
* Describes the message inco.kms.lite.v1.AttestedDecryptRequest.
|
209
|
+
* Use `create(AttestedDecryptRequestSchema)` to create a new message.
|
210
|
+
*/
|
211
|
+
export declare const AttestedDecryptRequestSchema: GenMessage<AttestedDecryptRequest>;
|
212
|
+
/**
|
213
|
+
* AttestedDecryptResponse is the response type for the KmsService/AttestedDecrypt RPC method.
|
214
|
+
*
|
215
|
+
* @generated from message inco.kms.lite.v1.AttestedDecryptResponse
|
216
|
+
*/
|
217
|
+
export type AttestedDecryptResponse = Message<"inco.kms.lite.v1.AttestedDecryptResponse"> & {
|
218
|
+
/**
|
219
|
+
* payload is the decryption response payload.
|
220
|
+
*
|
221
|
+
* @generated from field: inco.kms.lite.v1.AttestedDecryptResponsePayload payload = 1;
|
222
|
+
*/
|
223
|
+
payload?: AttestedDecryptResponsePayload;
|
224
|
+
/**
|
225
|
+
* signature is the signature of the ABI-pack-encoded
|
226
|
+
* AttestedDecryptResponsePayload from the KMS node.
|
227
|
+
*
|
228
|
+
* @generated from field: bytes signature = 2;
|
229
|
+
*/
|
230
|
+
signature: Uint8Array;
|
231
|
+
};
|
232
|
+
/**
|
233
|
+
* Describes the message inco.kms.lite.v1.AttestedDecryptResponse.
|
234
|
+
* Use `create(AttestedDecryptResponseSchema)` to create a new message.
|
235
|
+
*/
|
236
|
+
export declare const AttestedDecryptResponseSchema: GenMessage<AttestedDecryptResponse>;
|
237
|
+
/**
|
238
|
+
* AttestedDecryptResponsePayload is the payload of the AttestedDecryptResponse,
|
239
|
+
* separated out because it is signed by the KMS using its signing key.
|
240
|
+
*
|
241
|
+
* @generated from message inco.kms.lite.v1.AttestedDecryptResponsePayload
|
242
|
+
*/
|
243
|
+
export type AttestedDecryptResponsePayload = Message<"inco.kms.lite.v1.AttestedDecryptResponsePayload"> & {
|
244
|
+
/**
|
245
|
+
* results is the list of decryption results. Each result at index `i` corresponds to the handle
|
246
|
+
* at index `i` in the `AttestedDecryptRequest`.
|
247
|
+
*
|
248
|
+
* @generated from field: repeated inco.kms.lite.v1.DecryptionResult results = 1;
|
249
|
+
*/
|
250
|
+
results: DecryptionResult[];
|
251
|
+
};
|
252
|
+
/**
|
253
|
+
* Describes the message inco.kms.lite.v1.AttestedDecryptResponsePayload.
|
254
|
+
* Use `create(AttestedDecryptResponsePayloadSchema)` to create a new message.
|
255
|
+
*/
|
256
|
+
export declare const AttestedDecryptResponsePayloadSchema: GenMessage<AttestedDecryptResponsePayload>;
|
257
|
+
/**
|
258
|
+
* DecryptionResult contains the result of decrypting a single handle.
|
259
|
+
*
|
260
|
+
* @generated from message inco.kms.lite.v1.DecryptionResult
|
261
|
+
*/
|
262
|
+
export type DecryptionResult = Message<"inco.kms.lite.v1.DecryptionResult"> & {
|
263
|
+
/**
|
264
|
+
* handle is the handle that was decrypted, encoded as a non-prefixed hex string.
|
265
|
+
*
|
266
|
+
* @generated from field: string handle = 1;
|
267
|
+
*/
|
268
|
+
handle: string;
|
269
|
+
/**
|
270
|
+
* plaintext is the decrypted plaintext.
|
271
|
+
*
|
272
|
+
* @generated from field: bytes plaintext = 2;
|
273
|
+
*/
|
274
|
+
plaintext: Uint8Array;
|
275
|
+
};
|
276
|
+
/**
|
277
|
+
* Describes the message inco.kms.lite.v1.DecryptionResult.
|
278
|
+
* Use `create(DecryptionResultSchema)` to create a new message.
|
279
|
+
*/
|
280
|
+
export declare const DecryptionResultSchema: GenMessage<DecryptionResult>;
|
153
281
|
/**
|
154
282
|
* KmsService is the service for the IncoLite KMS, which will run
|
155
283
|
* inside the TEE.
|
@@ -178,4 +306,15 @@ export declare const KmsService: GenService<{
|
|
178
306
|
input: typeof ReencryptRequestSchema;
|
179
307
|
output: typeof ReencryptResponseSchema;
|
180
308
|
};
|
309
|
+
/**
|
310
|
+
* AttestedDecrypt decrypts multiple ciphertexts and provides an attestation
|
311
|
+
* that the decryption was performed correctly.
|
312
|
+
*
|
313
|
+
* @generated from rpc inco.kms.lite.v1.KmsService.AttestedDecrypt
|
314
|
+
*/
|
315
|
+
attestedDecrypt: {
|
316
|
+
methodKind: "unary";
|
317
|
+
input: typeof AttestedDecryptRequestSchema;
|
318
|
+
output: typeof AttestedDecryptResponseSchema;
|
319
|
+
};
|
181
320
|
}>;
|
@@ -3,14 +3,14 @@
|
|
3
3
|
// @generated from file inco/kms/lite/v1/kms_service.proto (package inco.kms.lite.v1, syntax proto3)
|
4
4
|
/* eslint-disable */
|
5
5
|
Object.defineProperty(exports, "__esModule", { value: true });
|
6
|
-
exports.KmsService = exports.ReencryptionResponsePayloadSchema = exports.ReencryptResponseSchema = exports.ReencryptRequestSchema = exports.KeyResponseSchema = exports.KeyRequestSchema = exports.file_inco_kms_lite_v1_kms_service = void 0;
|
6
|
+
exports.KmsService = exports.DecryptionResultSchema = exports.AttestedDecryptResponsePayloadSchema = exports.AttestedDecryptResponseSchema = exports.AttestedDecryptRequestSchema = exports.ReencryptionResponsePayloadSchema = exports.ReencryptResponseSchema = exports.ReencryptRequestSchema = exports.KeyResponseSchema = exports.KeyRequestSchema = exports.file_inco_kms_lite_v1_kms_service = void 0;
|
7
7
|
const codegenv1_1 = require("@bufbuild/protobuf/codegenv1");
|
8
8
|
const types_pb_1 = require("../../../fhe/v1/types_pb");
|
9
9
|
const types_pb_2 = require("./types_pb");
|
10
10
|
/**
|
11
11
|
* Describes the file inco/kms/lite/v1/kms_service.proto.
|
12
12
|
*/
|
13
|
-
exports.file_inco_kms_lite_v1_kms_service = (0, codegenv1_1.fileDesc)("
|
13
|
+
exports.file_inco_kms_lite_v1_kms_service = (0, codegenv1_1.fileDesc)("CiJpbmNvL2ttcy9saXRlL3YxL2ttc19zZXJ2aWNlLnByb3RvEhBpbmNvLmttcy5saXRlLnYxIgwKCktleVJlcXVlc3QiVQoLS2V5UmVzcG9uc2USLQoGa2V5c2V0GAEgASgLMh0uaW5jby5rbXMubGl0ZS52MS5FQ0lFU0tleXNldBIXCg9zaWduaW5nX2FkZHJlc3MYAiABKAkinQEKEFJlZW5jcnlwdFJlcXVlc3QSFAoMdXNlcl9hZGRyZXNzGAEgASgJEhkKEWVwaGVtZXJhbF9wdWJfa2V5GAIgASgMEhgKEGVpcDcxMl9zaWduYXR1cmUYAyABKAwSPgoTaGFuZGxlc193aXRoX3Byb29mcxgEIAMoCzIhLmluY28ua21zLmxpdGUudjEuSGFuZGxlV2l0aFByb29mIlMKEVJlZW5jcnlwdFJlc3BvbnNlEj4KB3BheWxvYWQYASABKAsyLS5pbmNvLmttcy5saXRlLnYxLlJlZW5jcnlwdGlvblJlc3BvbnNlUGF5bG9hZCJVChtSZWVuY3J5cHRpb25SZXNwb25zZVBheWxvYWQSNgoQdXNlcl9jaXBoZXJ0ZXh0cxgBIAMoCzIcLmluY28uZmhlLnYxLlR5cGVkQ2lwaGVydGV4dCJZChZBdHRlc3RlZERlY3J5cHRSZXF1ZXN0EhQKDHVzZXJfYWRkcmVzcxgBIAEoCRIYChBlaXA3MTJfc2lnbmF0dXJlGAIgASgMEg8KB2hhbmRsZXMYAyADKAkibwoXQXR0ZXN0ZWREZWNyeXB0UmVzcG9uc2USQQoHcGF5bG9hZBgBIAEoCzIwLmluY28ua21zLmxpdGUudjEuQXR0ZXN0ZWREZWNyeXB0UmVzcG9uc2VQYXlsb2FkEhEKCXNpZ25hdHVyZRgCIAEoDCJVCh5BdHRlc3RlZERlY3J5cHRSZXNwb25zZVBheWxvYWQSMwoHcmVzdWx0cxgBIAMoCzIiLmluY28ua21zLmxpdGUudjEuRGVjcnlwdGlvblJlc3VsdCI1ChBEZWNyeXB0aW9uUmVzdWx0Eg4KBmhhbmRsZRgBIAEoCRIRCglwbGFpbnRleHQYAiABKAwyjgIKCkttc1NlcnZpY2USQgoDS2V5EhwuaW5jby5rbXMubGl0ZS52MS5LZXlSZXF1ZXN0Gh0uaW5jby5rbXMubGl0ZS52MS5LZXlSZXNwb25zZRJUCglSZWVuY3J5cHQSIi5pbmNvLmttcy5saXRlLnYxLlJlZW5jcnlwdFJlcXVlc3QaIy5pbmNvLmttcy5saXRlLnYxLlJlZW5jcnlwdFJlc3BvbnNlEmYKD0F0dGVzdGVkRGVjcnlwdBIoLmluY28ua21zLmxpdGUudjEuQXR0ZXN0ZWREZWNyeXB0UmVxdWVzdBopLmluY28ua21zLmxpdGUudjEuQXR0ZXN0ZWREZWNyeXB0UmVzcG9uc2VCO1o5Z2l0aHViLmNvbS9pbmNvLWZoZXZtL2luY28tbW9ub3JlcG8vY292YWxpZGF0b3Iva21zL3R5cGVzYgZwcm90bzM", [types_pb_1.file_inco_fhe_v1_types, types_pb_2.file_inco_kms_lite_v1_types]);
|
14
14
|
/**
|
15
15
|
* Describes the message inco.kms.lite.v1.KeyRequest.
|
16
16
|
* Use `create(KeyRequestSchema)` to create a new message.
|
@@ -36,6 +36,26 @@ exports.ReencryptResponseSchema = (0, codegenv1_1.messageDesc)(exports.file_inco
|
|
36
36
|
* Use `create(ReencryptionResponsePayloadSchema)` to create a new message.
|
37
37
|
*/
|
38
38
|
exports.ReencryptionResponsePayloadSchema = (0, codegenv1_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 4);
|
39
|
+
/**
|
40
|
+
* Describes the message inco.kms.lite.v1.AttestedDecryptRequest.
|
41
|
+
* Use `create(AttestedDecryptRequestSchema)` to create a new message.
|
42
|
+
*/
|
43
|
+
exports.AttestedDecryptRequestSchema = (0, codegenv1_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 5);
|
44
|
+
/**
|
45
|
+
* Describes the message inco.kms.lite.v1.AttestedDecryptResponse.
|
46
|
+
* Use `create(AttestedDecryptResponseSchema)` to create a new message.
|
47
|
+
*/
|
48
|
+
exports.AttestedDecryptResponseSchema = (0, codegenv1_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 6);
|
49
|
+
/**
|
50
|
+
* Describes the message inco.kms.lite.v1.AttestedDecryptResponsePayload.
|
51
|
+
* Use `create(AttestedDecryptResponsePayloadSchema)` to create a new message.
|
52
|
+
*/
|
53
|
+
exports.AttestedDecryptResponsePayloadSchema = (0, codegenv1_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 7);
|
54
|
+
/**
|
55
|
+
* Describes the message inco.kms.lite.v1.DecryptionResult.
|
56
|
+
* Use `create(DecryptionResultSchema)` to create a new message.
|
57
|
+
*/
|
58
|
+
exports.DecryptionResultSchema = (0, codegenv1_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 8);
|
39
59
|
/**
|
40
60
|
* KmsService is the service for the IncoLite KMS, which will run
|
41
61
|
* inside the TEE.
|
@@ -43,4 +63,4 @@ exports.ReencryptionResponsePayloadSchema = (0, codegenv1_1.messageDesc)(exports
|
|
43
63
|
* @generated from service inco.kms.lite.v1.KmsService
|
44
64
|
*/
|
45
65
|
exports.KmsService = (0, codegenv1_1.serviceDesc)(exports.file_inco_kms_lite_v1_kms_service, 0);
|
46
|
-
//# sourceMappingURL=data:application/json;base64,
|
66
|
+
//# sourceMappingURL=data:application/json;base64,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
|
@@ -1,4 +1,25 @@
|
|
1
1
|
export declare const lightningDeployments: readonly [{
|
2
|
+
readonly name: "incoLightning_0_2_0__183408998";
|
3
|
+
readonly majorVersion: 0;
|
4
|
+
readonly deployer: "0x8202D2D747784Cb7D48868E44C42C4bf162a70BC";
|
5
|
+
readonly pepper: "testnet";
|
6
|
+
readonly executorAddress: "0x63D8135aF4D393B1dB43B649010c8D3EE19FC9fd";
|
7
|
+
readonly salt: "0x8202d2d747784cb7d48868e44c42c4bf162a70bc00d75ffa0caf0797c3f12d66";
|
8
|
+
readonly chainId: 84532;
|
9
|
+
readonly chainName: "Base Sepolia";
|
10
|
+
readonly version: {
|
11
|
+
readonly major: 0;
|
12
|
+
readonly minor: 2;
|
13
|
+
readonly patch: 0;
|
14
|
+
readonly shortSalt: "183408998";
|
15
|
+
};
|
16
|
+
readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
|
17
|
+
readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
|
18
|
+
readonly blockNumber: 26296576;
|
19
|
+
readonly deployDate: "2025-05-27T15:57:24.175Z";
|
20
|
+
readonly commit: "v5-3-gec8b6aae-dirty";
|
21
|
+
readonly active: true;
|
22
|
+
}, {
|
2
23
|
readonly name: "incoLightning_0_1_29__183408998";
|
3
24
|
readonly majorVersion: 0;
|
4
25
|
readonly deployer: "0x8202D2D747784Cb7D48868E44C42C4bf162a70BC";
|
@@ -82,6 +103,27 @@ export declare const lightningDeployments: readonly [{
|
|
82
103
|
readonly deployDate: "2025-05-14T07:08:39.059Z";
|
83
104
|
readonly commit: "v4";
|
84
105
|
readonly active: true;
|
106
|
+
}, {
|
107
|
+
readonly name: "incoLightningPreview_0_2_0__297966649";
|
108
|
+
readonly majorVersion: 0;
|
109
|
+
readonly deployer: "0x8202D2D747784Cb7D48868E44C42C4bf162a70BC";
|
110
|
+
readonly pepper: "alphanet";
|
111
|
+
readonly executorAddress: "0x4651DfD7729aE5568092E7351fAaD872266d4CBd";
|
112
|
+
readonly salt: "0x8202d2d747784cb7d48868e44c42c4bf162a70bc0023f7798f470fdf5e9da639";
|
113
|
+
readonly chainId: 84532;
|
114
|
+
readonly chainName: "Base Sepolia";
|
115
|
+
readonly version: {
|
116
|
+
readonly major: 0;
|
117
|
+
readonly minor: 2;
|
118
|
+
readonly patch: 0;
|
119
|
+
readonly shortSalt: "297966649";
|
120
|
+
};
|
121
|
+
readonly decryptSigner: "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95";
|
122
|
+
readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
|
123
|
+
readonly blockNumber: 26894782;
|
124
|
+
readonly deployDate: "2025-06-10T12:17:35.790Z";
|
125
|
+
readonly commit: "v5-13-gd6b19c10-dirty";
|
126
|
+
readonly active: true;
|
85
127
|
}, {
|
86
128
|
readonly name: "incoLightning_0_2_0__340846814";
|
87
129
|
readonly majorVersion: 0;
|
@@ -2,6 +2,28 @@
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
3
3
|
exports.lightningDeployments = void 0;
|
4
4
|
exports.lightningDeployments = [
|
5
|
+
{
|
6
|
+
"name": "incoLightning_0_2_0__183408998",
|
7
|
+
"majorVersion": 0,
|
8
|
+
"deployer": "0x8202D2D747784Cb7D48868E44C42C4bf162a70BC",
|
9
|
+
"pepper": "testnet",
|
10
|
+
"executorAddress": "0x63D8135aF4D393B1dB43B649010c8D3EE19FC9fd",
|
11
|
+
"salt": "0x8202d2d747784cb7d48868e44c42c4bf162a70bc00d75ffa0caf0797c3f12d66",
|
12
|
+
"chainId": 84532,
|
13
|
+
"chainName": "Base Sepolia",
|
14
|
+
"version": {
|
15
|
+
"major": 0,
|
16
|
+
"minor": 2,
|
17
|
+
"patch": 0,
|
18
|
+
"shortSalt": "183408998"
|
19
|
+
},
|
20
|
+
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
21
|
+
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
22
|
+
"blockNumber": 26296576,
|
23
|
+
"deployDate": "2025-05-27T15:57:24.175Z",
|
24
|
+
"commit": "v5-3-gec8b6aae-dirty",
|
25
|
+
"active": true
|
26
|
+
},
|
5
27
|
{
|
6
28
|
"name": "incoLightning_0_1_29__183408998",
|
7
29
|
"majorVersion": 0,
|
@@ -90,6 +112,28 @@ exports.lightningDeployments = [
|
|
90
112
|
"commit": "v4",
|
91
113
|
"active": true
|
92
114
|
},
|
115
|
+
{
|
116
|
+
"name": "incoLightningPreview_0_2_0__297966649",
|
117
|
+
"majorVersion": 0,
|
118
|
+
"deployer": "0x8202D2D747784Cb7D48868E44C42C4bf162a70BC",
|
119
|
+
"pepper": "alphanet",
|
120
|
+
"executorAddress": "0x4651DfD7729aE5568092E7351fAaD872266d4CBd",
|
121
|
+
"salt": "0x8202d2d747784cb7d48868e44c42c4bf162a70bc0023f7798f470fdf5e9da639",
|
122
|
+
"chainId": 84532,
|
123
|
+
"chainName": "Base Sepolia",
|
124
|
+
"version": {
|
125
|
+
"major": 0,
|
126
|
+
"minor": 2,
|
127
|
+
"patch": 0,
|
128
|
+
"shortSalt": "297966649"
|
129
|
+
},
|
130
|
+
"decryptSigner": "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95",
|
131
|
+
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
132
|
+
"blockNumber": 26894782,
|
133
|
+
"deployDate": "2025-06-10T12:17:35.790Z",
|
134
|
+
"commit": "v5-13-gd6b19c10-dirty",
|
135
|
+
"active": true
|
136
|
+
},
|
93
137
|
{
|
94
138
|
"name": "incoLightning_0_2_0__340846814",
|
95
139
|
"majorVersion": 0,
|
@@ -157,4 +201,4 @@ exports.lightningDeployments = [
|
|
157
201
|
"active": true
|
158
202
|
}
|
159
203
|
];
|
160
|
-
//# sourceMappingURL=data:application/json;base64,
|
204
|
+
//# sourceMappingURL=data:application/json;base64,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
|
@@ -1,7 +1,7 @@
|
|
1
1
|
export declare const localNodeLightningConfig: {
|
2
2
|
readonly executorAddress: "0x63D8135aF4D393B1dB43B649010c8D3EE19FC9fd";
|
3
|
-
readonly eciesPublicKey: "
|
3
|
+
readonly eciesPublicKey: "0x02193a85dc0b5293ec128d61ac3dff49f2f8d527ff21801ea0ccc574749ee4b9a2";
|
4
4
|
readonly chainId: 31337;
|
5
5
|
readonly covalidatorUrl: "http://localhost:50055";
|
6
|
-
readonly senderPrivateKey: "
|
6
|
+
readonly senderPrivateKey: "0x0e766adcfb8171390d4eb049c9bd32f669ebbfcc82f182d3c0f2d1d25f52caa2";
|
7
7
|
};
|
@@ -3,9 +3,9 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.localNodeLightningConfig = void 0;
|
4
4
|
exports.localNodeLightningConfig = {
|
5
5
|
"executorAddress": "0x63D8135aF4D393B1dB43B649010c8D3EE19FC9fd",
|
6
|
-
"eciesPublicKey": "
|
6
|
+
"eciesPublicKey": "0x02193a85dc0b5293ec128d61ac3dff49f2f8d527ff21801ea0ccc574749ee4b9a2",
|
7
7
|
"chainId": 31337,
|
8
8
|
"covalidatorUrl": "http://localhost:50055",
|
9
|
-
"senderPrivateKey": "
|
9
|
+
"senderPrivateKey": "0x0e766adcfb8171390d4eb049c9bd32f669ebbfcc82f182d3c0f2d1d25f52caa2"
|
10
10
|
};
|
11
11
|
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoibG9jYWwtbm9kZS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uL3NyYy9nZW5lcmF0ZWQvbG9jYWwtbm9kZS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7QUFBYSxRQUFBLHdCQUF3QixHQUFHO0lBQ3RDLGlCQUFpQixFQUFFLDRDQUE0QztJQUMvRCxnQkFBZ0IsRUFBRSxzRUFBc0U7SUFDeEYsU0FBUyxFQUFFLEtBQUs7SUFDaEIsZ0JBQWdCLEVBQUUsd0JBQXdCO0lBQzFDLGtCQUFrQixFQUFFLG9FQUFvRTtDQUNoRixDQUFDIn0=
|
package/dist/index.d.ts
CHANGED
package/dist/index.js
CHANGED
@@ -18,5 +18,5 @@ __exportStar(require("./binary"), exports);
|
|
18
18
|
__exportStar(require("./chain"), exports);
|
19
19
|
__exportStar(require("./handle"), exports);
|
20
20
|
__exportStar(require("./schema"), exports);
|
21
|
-
__exportStar(require("./viem"), exports);
|
22
|
-
//# sourceMappingURL=data:application/json;base64,
|
21
|
+
__exportStar(require("./viem.js"), exports);
|
22
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7Ozs7Ozs7Ozs7OztBQUFBLDJDQUF5QjtBQUN6QiwwQ0FBd0I7QUFDeEIsMkNBQXlCO0FBQ3pCLDJDQUF5QjtBQUN6Qiw0Q0FBMEIifQ==
|
package/package.json
CHANGED
@@ -1,11 +1,12 @@
|
|
1
1
|
{
|
2
2
|
"name": "@inco/js",
|
3
|
-
"version": "0.
|
3
|
+
"version": "0.2.4",
|
4
4
|
"repository": "https://github.com/Inco-fhevm/inco-monorepo",
|
5
5
|
"scripts": {
|
6
6
|
"test": "bun run lint && bun run test:tsc && bun run test:unit",
|
7
7
|
"test:tsc": "tsc --noEmit",
|
8
8
|
"test:unit": "bun vitest run --project unit",
|
9
|
+
"test:update-snapshots": "bun vitest run --project unit --update",
|
9
10
|
"test:e2e": "bun vitest run --project e2e",
|
10
11
|
"lint": "bun prettier --check .",
|
11
12
|
"lint:fix": "bun prettier --write .",
|
@@ -59,11 +60,13 @@
|
|
59
60
|
"viem": "^2.23.6"
|
60
61
|
},
|
61
62
|
"devDependencies": {
|
62
|
-
"node-tfhe": "^0.10.0",
|
63
|
-
"node-tkms": "^0.9.0",
|
64
63
|
"@bufbuild/protoc-gen-es": "^2.2.2",
|
65
64
|
"@pulumi/command": "^0.0.1-testwindows.signing",
|
65
|
+
"@types/dedent": "^0.7.2",
|
66
66
|
"bun-plugin-dts": "^0.3.0",
|
67
|
+
"dedent": "^1.6.0",
|
68
|
+
"node-tfhe": "^0.10.0",
|
69
|
+
"node-tkms": "^0.9.0",
|
67
70
|
"prettier": "^3.4.2",
|
68
71
|
"prettier-plugin-organize-imports": "^4.1.0",
|
69
72
|
"ts-proto": "^2.6.1",
|