@inco/js 0.3.0 → 0.3.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/advancedacl/index.d.ts +2 -0
- package/dist/cjs/advancedacl/index.js +19 -0
- package/dist/cjs/advancedacl/session-key.d.ts +28 -0
- package/dist/cjs/advancedacl/session-key.js +176 -0
- package/dist/cjs/advancedacl/types.d.ts +15 -0
- package/dist/cjs/advancedacl/types.js +3 -0
- package/dist/cjs/attestedcompute/attested-compute.d.ts +14 -16
- package/dist/cjs/attestedcompute/attested-compute.js +56 -71
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +18 -19
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +50 -60
- package/dist/cjs/attesteddecrypt/index.d.ts +0 -1
- package/dist/cjs/attesteddecrypt/index.js +1 -2
- package/dist/cjs/generated/abis/lightning-preview.d.ts +2265 -0
- package/dist/cjs/generated/abis/lightning-preview.js +1429 -0
- package/dist/cjs/lite/attested-compute.d.ts +1 -2
- package/dist/cjs/lite/attested-compute.js +1 -4
- package/dist/cjs/lite/attested-decrypt.d.ts +1 -2
- package/dist/cjs/lite/attested-decrypt.js +1 -4
- package/dist/cjs/lite/lightning.d.ts +94 -1
- package/dist/cjs/lite/lightning.js +129 -2
- package/dist/cjs/local/local-node.d.ts +1 -1
- package/dist/cjs/local/local-node.js +15 -15
- package/dist/esm/advancedacl/index.d.ts +2 -0
- package/dist/esm/advancedacl/index.js +3 -0
- package/dist/esm/advancedacl/session-key.d.ts +28 -0
- package/dist/esm/advancedacl/session-key.js +170 -0
- package/dist/esm/advancedacl/types.d.ts +15 -0
- package/dist/esm/advancedacl/types.js +2 -0
- package/dist/esm/attestedcompute/attested-compute.d.ts +14 -16
- package/dist/esm/attestedcompute/attested-compute.js +55 -70
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +18 -19
- package/dist/esm/attesteddecrypt/attested-decrypt.js +49 -59
- package/dist/esm/attesteddecrypt/index.d.ts +0 -1
- package/dist/esm/attesteddecrypt/index.js +1 -2
- package/dist/esm/generated/abis/lightning-preview.d.ts +2265 -0
- package/dist/esm/generated/abis/lightning-preview.js +1426 -0
- package/dist/esm/lite/attested-compute.d.ts +1 -2
- package/dist/esm/lite/attested-compute.js +2 -3
- package/dist/esm/lite/attested-decrypt.d.ts +1 -2
- package/dist/esm/lite/attested-decrypt.js +2 -3
- package/dist/esm/lite/lightning.d.ts +94 -1
- package/dist/esm/lite/lightning.js +129 -2
- package/dist/esm/local/local-node.d.ts +1 -1
- package/dist/esm/local/local-node.js +3 -3
- package/dist/types/advancedacl/index.d.ts +2 -0
- package/dist/types/advancedacl/session-key.d.ts +28 -0
- package/dist/types/advancedacl/types.d.ts +15 -0
- package/dist/types/attestedcompute/attested-compute.d.ts +14 -16
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +18 -19
- package/dist/types/attesteddecrypt/index.d.ts +0 -1
- package/dist/types/generated/abis/lightning-preview.d.ts +2265 -0
- package/dist/types/lite/attested-compute.d.ts +1 -2
- package/dist/types/lite/attested-decrypt.d.ts +1 -2
- package/dist/types/lite/lightning.d.ts +94 -1
- package/dist/types/local/local-node.d.ts +1 -1
- package/package.json +1 -1
@@ -1,4 +1,3 @@
|
|
1
|
-
import { type IncoLiteAttestedComputeArgs
|
1
|
+
import { type IncoLiteAttestedComputeArgs } from '../attestedcompute/attested-compute.js';
|
2
2
|
import { type AttestedComputeSupportedOps } from '../attestedcompute/types.js';
|
3
|
-
export { incoLiteAttestedCompute };
|
4
3
|
export type { AttestedComputeSupportedOps, IncoLiteAttestedComputeArgs };
|
@@ -1,6 +1,3 @@
|
|
1
1
|
"use strict";
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
3
|
-
|
4
|
-
const attested_compute_js_1 = require("../attestedcompute/attested-compute.js");
|
5
|
-
Object.defineProperty(exports, "incoLiteAttestedCompute", { enumerable: true, get: function () { return attested_compute_js_1.incoLiteAttestedCompute; } });
|
6
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYXR0ZXN0ZWQtY29tcHV0ZS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9saXRlL2F0dGVzdGVkLWNvbXB1dGUudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7O0FBQUEsZ0ZBQW1IO0FBRzFHLHdHQUhrQyw2Q0FBdUIsT0FHbEMifQ==
|
3
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYXR0ZXN0ZWQtY29tcHV0ZS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9saXRlL2F0dGVzdGVkLWNvbXB1dGUudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IiJ9
|
@@ -1,3 +1,2 @@
|
|
1
|
-
import { type IncoLiteAttestedDecryptorArgs
|
2
|
-
export { incoLiteAttestedDecryptor };
|
1
|
+
import { type IncoLiteAttestedDecryptorArgs } from '../attesteddecrypt/attested-decrypt.js';
|
3
2
|
export type { IncoLiteAttestedDecryptorArgs };
|
@@ -1,6 +1,3 @@
|
|
1
1
|
"use strict";
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
3
|
-
|
4
|
-
const attested_decrypt_js_1 = require("../attesteddecrypt/attested-decrypt.js");
|
5
|
-
Object.defineProperty(exports, "incoLiteAttestedDecryptor", { enumerable: true, get: function () { return attested_decrypt_js_1.incoLiteAttestedDecryptor; } });
|
6
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYXR0ZXN0ZWQtZGVjcnlwdC5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9saXRlL2F0dGVzdGVkLWRlY3J5cHQudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7O0FBQUEsZ0ZBQXVIO0FBRTlHLDBHQUZvQywrQ0FBeUIsT0FFcEMifQ==
|
3
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYXR0ZXN0ZWQtZGVjcnlwdC5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9saXRlL2F0dGVzdGVkLWRlY3J5cHQudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IiJ9
|
@@ -1,10 +1,15 @@
|
|
1
1
|
import { Account, Chain, Transport, WalletClient } from 'viem';
|
2
|
+
import { AllowanceVoucherWithSig } from '../advancedacl/types.js';
|
3
|
+
import { AttestedComputeOP } from '../attestedcompute/types.js';
|
4
|
+
import { DecryptionAttestation } from '../attesteddecrypt/index.js';
|
2
5
|
import { Address, HexString } from '../binary.js';
|
3
|
-
import { EciesScheme } from '../encryption/index.js';
|
6
|
+
import { EciesScheme, PlaintextOf, SupportedFheType } from '../encryption/index.js';
|
4
7
|
import { lightningDeployments } from '../generated/lightning.js';
|
5
8
|
import { localNodeLightningConfig } from '../generated/local-node.js';
|
6
9
|
import { LocalNodeEnv } from '../local/index.js';
|
7
10
|
import type { Reencryptor } from '../reencryption/index.js';
|
11
|
+
import { BackoffConfig } from '../retry.js';
|
12
|
+
import { Secp256k1Keypair } from './ecies.js';
|
8
13
|
type TupleToUnion<T> = T extends readonly unknown[] ? T[number] : never;
|
9
14
|
type Deployment = TupleToUnion<typeof lightningDeployments>;
|
10
15
|
type DistributedPick<T, K> = T extends any ? Pick<T, Extract<keyof T, K>> : never;
|
@@ -120,6 +125,94 @@ export declare class Lightning<T extends DeploymentSlice = DeploymentSlice> {
|
|
120
125
|
* @param walletClient the wallet client to use for signing the reencrypt request.
|
121
126
|
*/
|
122
127
|
getReencryptor(walletClient: WalletClient<Transport, Chain, Account>): Promise<Reencryptor<EciesScheme>>;
|
128
|
+
/**
|
129
|
+
* Grants a session key allowance voucher for secure reencryption operations.
|
130
|
+
*
|
131
|
+
* This method creates a signed allowance voucher that authorizes a specific requester address
|
132
|
+
* to perform reencryption operations using session keys. The voucher includes an expiration time
|
133
|
+
* and can optionally specify a custom session verifier contract address.
|
134
|
+
*
|
135
|
+
* @param walletClient - The wallet client used for signing the allowance voucher
|
136
|
+
* @param granteeAddress - The address of the entity requesting the session key allowance
|
137
|
+
* @param expiresAt - The timestamp when the allowance voucher expires (as a bigint)
|
138
|
+
* @param sessionVerifierAddress - Optional custom session verifier contract address. If not provided, uses the executor address
|
139
|
+
* @returns A promise that resolves to an AllowanceVoucherWithSig containing the signed allowance voucher
|
140
|
+
*
|
141
|
+
* @example
|
142
|
+
* ```typescript
|
143
|
+
* const voucher = await lightning.grantSessionKeyAllowanceVoucher(
|
144
|
+
* walletClient,
|
145
|
+
* "0x1234...",
|
146
|
+
* BigInt(Date.now() + 3600000), // 1 hour from now
|
147
|
+
* "0x5678..." // optional custom verifier
|
148
|
+
* );
|
149
|
+
* ```
|
150
|
+
*/
|
151
|
+
grantSessionKeyAllowanceVoucher(walletClient: WalletClient<Transport, Chain, Account>, granteeAddress: string, expiresAt: Date, sessionVerifierAddress: string): Promise<AllowanceVoucherWithSig>;
|
152
|
+
/**
|
153
|
+
* Creates a session key reencryptor for secure data reencryption operations.
|
154
|
+
*
|
155
|
+
* This method returns a reencryptor instance that can be used to perform reencryption
|
156
|
+
* operations using session keys. The reencryptor is configured with the provided
|
157
|
+
* allowance voucher and ephemeral keypair for secure communication.
|
158
|
+
*
|
159
|
+
* @param allowanceVoucherWithSig - The signed allowance voucher obtained from grantSessionKeyAllowanceVoucher
|
160
|
+
* @param ephemeralKeypair - The ephemeral keypair used for secure communication with the KMS make sure it has allowance to voucher
|
161
|
+
* @returns A reencryptor instance configured for session key operations
|
162
|
+
*
|
163
|
+
* @example
|
164
|
+
* ```typescript
|
165
|
+
* const reencryptor = await lightning.getSessionKeyRencryptor(voucher, ephemeralKeypair);
|
166
|
+
* const decryptedValue = await reencryptor({handle: resultHandle});
|
167
|
+
* ```
|
168
|
+
*/
|
169
|
+
getSessionKeyRencryptor(allowanceVoucherWithSig: AllowanceVoucherWithSig, ephemeralKeypair: Secp256k1Keypair): Promise<(<T_1 extends SupportedFheType>({ handle }: import("../reencryption/types.js").ReencryptFnArgs<EciesScheme, T_1>) => Promise<PlaintextOf<1, 0 | 5 | 7 | 8>>)>;
|
170
|
+
/**
|
171
|
+
* Updates the active session nonce for the given wallet client.
|
172
|
+
*
|
173
|
+
* This method updates the active session nonce for the given wallet client.
|
174
|
+
* It nullifies all the previous shared addresses accessing the voucher.
|
175
|
+
*
|
176
|
+
* @param walletClient - The wallet client used for updating the session nonce
|
177
|
+
* @returns The transaction hash of the updateActiveVouchersSessionNonce transaction
|
178
|
+
*/
|
179
|
+
updateActiveVouchersSessionNonce(walletClient: WalletClient<Transport, Chain, Account>): Promise<HexString>;
|
180
|
+
/**
|
181
|
+
* Get an attested decryptor for the given wallet client.
|
182
|
+
*
|
183
|
+
* @param walletClient - The wallet client used for signing the attested decrypt request
|
184
|
+
* @param handles - The handles to decrypt
|
185
|
+
* @param backoffConfig - The backoff configuration for the attested decrypt request
|
186
|
+
* @returns The decryption attestations
|
187
|
+
*
|
188
|
+
* @example
|
189
|
+
* ```typescript
|
190
|
+
* const response = await lightning.attestedDecrypt(walletClient, [handle1, handle2]);
|
191
|
+
* const { plaintext, covalidatorSignature } = response[0];
|
192
|
+
* ```
|
193
|
+
*/
|
194
|
+
attestedDecrypt(walletClient: WalletClient<Transport, Chain, Account>, handles: HexString[], backoffConfig?: Partial<BackoffConfig>): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
|
195
|
+
/**
|
196
|
+
* Get an attested compute for the given wallet client.
|
197
|
+
*
|
198
|
+
* @param walletClient - The wallet client used for signing the attested compute request
|
199
|
+
* @param lhsHandle - The handle to compute
|
200
|
+
* @param op - The operation to perform
|
201
|
+
* @param rhsPlaintext - The plaintext to compute with
|
202
|
+
* @param backoffConfig - The backoff configuration for the attested compute request
|
203
|
+
* @returns The decryption attestation
|
204
|
+
*
|
205
|
+
* @example
|
206
|
+
* ```typescript
|
207
|
+
* import { AttestedComputeSupportedOps } from '../lite/attested-compute.js';
|
208
|
+
* const lhsHandle = '0x...';
|
209
|
+
* const rhsPlaintext = 1337n;
|
210
|
+
* const op = AttestedComputeSupportedOps.Eq;
|
211
|
+
* const response = await lightning.attestedCompute(walletClient, lhsHandle, op, rhsPlaintext);
|
212
|
+
* const { plaintext, covalidatorSignature, handle } = response;
|
213
|
+
* ```
|
214
|
+
*/
|
215
|
+
attestedCompute(walletClient: WalletClient<Transport, Chain, Account>, lhsHandle: HexString, op: AttestedComputeOP, rhsPlaintext: bigint | boolean, backoffConfig?: Partial<BackoffConfig>): Promise<DecryptionAttestation<EciesScheme, SupportedFheType>>;
|
123
216
|
/**
|
124
217
|
* Get the GRPC endpoint for the covalidator that services this deployment.
|
125
218
|
*/
|
@@ -4,6 +4,9 @@ exports.Lightning = void 0;
|
|
4
4
|
const fs = require("fs/promises");
|
5
5
|
const viem_1 = require("viem");
|
6
6
|
const chains_1 = require("viem/chains");
|
7
|
+
const session_key_js_1 = require("../advancedacl/session-key.js");
|
8
|
+
const attested_compute_js_1 = require("../attestedcompute/attested-compute.js");
|
9
|
+
const attested_decrypt_js_1 = require("../attesteddecrypt/attested-decrypt.js");
|
7
10
|
const binary_js_1 = require("../binary.js");
|
8
11
|
const index_js_1 = require("../encryption/index.js");
|
9
12
|
const lightning_js_1 = require("../generated/lightning.js");
|
@@ -73,7 +76,7 @@ class Lightning {
|
|
73
76
|
return Lightning.custom({
|
74
77
|
// We assume that we always run a local node as the default anvil node
|
75
78
|
chainId: env.COVALIDATOR_HOST_CHAIN_ID ? Number(env.COVALIDATOR_HOST_CHAIN_ID) : conf.chainId,
|
76
|
-
covalidatorUrl: env.
|
79
|
+
covalidatorUrl: env.COVALIDATOR_URL ?? conf.covalidatorUrl,
|
77
80
|
hostChainRpcUrl: env.COVALIDATOR_HOST_CHAIN_RPC_URL ?? conf.hostChainRpcUrl ?? 'http://localhost:8545',
|
78
81
|
// These variables vary per environment
|
79
82
|
executorAddress: env.EXECUTOR_ADDRESS,
|
@@ -183,6 +186,130 @@ class Lightning {
|
|
183
186
|
ephemeralKeypair: this.ephemeralKeypair,
|
184
187
|
});
|
185
188
|
}
|
189
|
+
/**
|
190
|
+
* Grants a session key allowance voucher for secure reencryption operations.
|
191
|
+
*
|
192
|
+
* This method creates a signed allowance voucher that authorizes a specific requester address
|
193
|
+
* to perform reencryption operations using session keys. The voucher includes an expiration time
|
194
|
+
* and can optionally specify a custom session verifier contract address.
|
195
|
+
*
|
196
|
+
* @param walletClient - The wallet client used for signing the allowance voucher
|
197
|
+
* @param granteeAddress - The address of the entity requesting the session key allowance
|
198
|
+
* @param expiresAt - The timestamp when the allowance voucher expires (as a bigint)
|
199
|
+
* @param sessionVerifierAddress - Optional custom session verifier contract address. If not provided, uses the executor address
|
200
|
+
* @returns A promise that resolves to an AllowanceVoucherWithSig containing the signed allowance voucher
|
201
|
+
*
|
202
|
+
* @example
|
203
|
+
* ```typescript
|
204
|
+
* const voucher = await lightning.grantSessionKeyAllowanceVoucher(
|
205
|
+
* walletClient,
|
206
|
+
* "0x1234...",
|
207
|
+
* BigInt(Date.now() + 3600000), // 1 hour from now
|
208
|
+
* "0x5678..." // optional custom verifier
|
209
|
+
* );
|
210
|
+
* ```
|
211
|
+
*/
|
212
|
+
grantSessionKeyAllowanceVoucher(walletClient, granteeAddress, expiresAt, sessionVerifierAddress) {
|
213
|
+
return (0, session_key_js_1.grantSessionKey)({
|
214
|
+
chainId: this.chainId,
|
215
|
+
incoLiteAddress: this.executorAddress,
|
216
|
+
sessionVerifierContractAddress: (0, binary_js_1.parseAddress)(sessionVerifierAddress),
|
217
|
+
granteeAddress: (0, binary_js_1.parseAddress)(granteeAddress),
|
218
|
+
sharerWalletClient: walletClient,
|
219
|
+
expiresAt,
|
220
|
+
});
|
221
|
+
}
|
222
|
+
/**
|
223
|
+
* Creates a session key reencryptor for secure data reencryption operations.
|
224
|
+
*
|
225
|
+
* This method returns a reencryptor instance that can be used to perform reencryption
|
226
|
+
* operations using session keys. The reencryptor is configured with the provided
|
227
|
+
* allowance voucher and ephemeral keypair for secure communication.
|
228
|
+
*
|
229
|
+
* @param allowanceVoucherWithSig - The signed allowance voucher obtained from grantSessionKeyAllowanceVoucher
|
230
|
+
* @param ephemeralKeypair - The ephemeral keypair used for secure communication with the KMS make sure it has allowance to voucher
|
231
|
+
* @returns A reencryptor instance configured for session key operations
|
232
|
+
*
|
233
|
+
* @example
|
234
|
+
* ```typescript
|
235
|
+
* const reencryptor = await lightning.getSessionKeyRencryptor(voucher, ephemeralKeypair);
|
236
|
+
* const decryptedValue = await reencryptor({handle: resultHandle});
|
237
|
+
* ```
|
238
|
+
*/
|
239
|
+
getSessionKeyRencryptor(allowanceVoucherWithSig, ephemeralKeypair) {
|
240
|
+
return (0, session_key_js_1.sessionKeyReencryptor)({
|
241
|
+
chainId: this.chainId,
|
242
|
+
kmsConnectRpcEndpointOrClient: this.kmsClient,
|
243
|
+
ephemeralKeypair,
|
244
|
+
allowanceVoucherWithSig,
|
245
|
+
});
|
246
|
+
}
|
247
|
+
/**
|
248
|
+
* Updates the active session nonce for the given wallet client.
|
249
|
+
*
|
250
|
+
* This method updates the active session nonce for the given wallet client.
|
251
|
+
* It nullifies all the previous shared addresses accessing the voucher.
|
252
|
+
*
|
253
|
+
* @param walletClient - The wallet client used for updating the session nonce
|
254
|
+
* @returns The transaction hash of the updateActiveVouchersSessionNonce transaction
|
255
|
+
*/
|
256
|
+
updateActiveVouchersSessionNonce(walletClient) {
|
257
|
+
return (0, session_key_js_1.updateActiveVouchersSessionNonce)(this.executorAddress, walletClient);
|
258
|
+
}
|
259
|
+
/**
|
260
|
+
* Get an attested decryptor for the given wallet client.
|
261
|
+
*
|
262
|
+
* @param walletClient - The wallet client used for signing the attested decrypt request
|
263
|
+
* @param handles - The handles to decrypt
|
264
|
+
* @param backoffConfig - The backoff configuration for the attested decrypt request
|
265
|
+
* @returns The decryption attestations
|
266
|
+
*
|
267
|
+
* @example
|
268
|
+
* ```typescript
|
269
|
+
* const response = await lightning.attestedDecrypt(walletClient, [handle1, handle2]);
|
270
|
+
* const { plaintext, covalidatorSignature } = response[0];
|
271
|
+
* ```
|
272
|
+
*/
|
273
|
+
attestedDecrypt(walletClient, handles, backoffConfig) {
|
274
|
+
return (0, attested_decrypt_js_1.attestedDecrypt)({
|
275
|
+
handles,
|
276
|
+
backoffConfig,
|
277
|
+
chainId: Number(this.chainId),
|
278
|
+
walletClient,
|
279
|
+
kmsConnectRpcEndpointOrClient: this.kmsClient,
|
280
|
+
});
|
281
|
+
}
|
282
|
+
/**
|
283
|
+
* Get an attested compute for the given wallet client.
|
284
|
+
*
|
285
|
+
* @param walletClient - The wallet client used for signing the attested compute request
|
286
|
+
* @param lhsHandle - The handle to compute
|
287
|
+
* @param op - The operation to perform
|
288
|
+
* @param rhsPlaintext - The plaintext to compute with
|
289
|
+
* @param backoffConfig - The backoff configuration for the attested compute request
|
290
|
+
* @returns The decryption attestation
|
291
|
+
*
|
292
|
+
* @example
|
293
|
+
* ```typescript
|
294
|
+
* import { AttestedComputeSupportedOps } from '../lite/attested-compute.js';
|
295
|
+
* const lhsHandle = '0x...';
|
296
|
+
* const rhsPlaintext = 1337n;
|
297
|
+
* const op = AttestedComputeSupportedOps.Eq;
|
298
|
+
* const response = await lightning.attestedCompute(walletClient, lhsHandle, op, rhsPlaintext);
|
299
|
+
* const { plaintext, covalidatorSignature, handle } = response;
|
300
|
+
* ```
|
301
|
+
*/
|
302
|
+
attestedCompute(walletClient, lhsHandle, op, rhsPlaintext, backoffConfig) {
|
303
|
+
return (0, attested_compute_js_1.attestedCompute)({
|
304
|
+
walletClient,
|
305
|
+
kmsConnectRpcEndpointOrClient: this.kmsClient,
|
306
|
+
chainId: Number(this.chainId),
|
307
|
+
lhsHandle,
|
308
|
+
op,
|
309
|
+
rhsPlaintext,
|
310
|
+
backoffConfig,
|
311
|
+
});
|
312
|
+
}
|
186
313
|
/**
|
187
314
|
* Get the GRPC endpoint for the covalidator that services this deployment.
|
188
315
|
*/
|
@@ -214,4 +341,4 @@ class Lightning {
|
|
214
341
|
}
|
215
342
|
}
|
216
343
|
exports.Lightning = Lightning;
|
217
|
-
//# sourceMappingURL=data:application/json;base64,
|
344
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/lite/lightning.ts"],"names":[],"mappings":";;;AACA,kCAAkC;AAClC,+BAA2E;AAC3E,wCAA0C;AAC1C,kEAIuC;AAEvC,gFAAyE;AAEzE,gFAAyE;AAEzE,4CAAgE;AAEhE,qDAAkH;AAElH,4DAAiE;AACjE,8DAAsE;AACtE,4CAA2C;AAC3C,gDAAgE;AAGhE,4CAAqC;AACrC,yCAAqH;AACrH,iDAAmE;AAwBnE,MAAM,aAAa,GAAoB,SAAS,CAAC;AAuBjD;;;GAGG;AACH,MAAa,SAAS;IAUD;IACD;IAVF,eAAe,CAAU;IACzB,cAAc,CAAY;IAC1B,OAAO,CAAS;IAEf,SAAS,CAAyB;IAClC,gBAAgB,CAAmB;IACnC,SAAS,CAA4B;IAEtD,YACmB,WAAc,EACf,cAAsB;QADrB,gBAAW,GAAX,WAAW,CAAG;QACf,mBAAc,GAAd,cAAc,CAAQ;QAEtC,IAAI,CAAC,eAAe,GAAG,IAAA,wBAAY,EAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACjE,IAAI,CAAC,cAAc,GAAG,IAAA,iBAAK,EAAC,qBAAS,EAAE,WAAW,CAAC,cAAc,CAAC,CAAC;QACnE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE3C,IAAI,CAAC,gBAAgB,GAAG,IAAA,mCAAwB,GAAE,CAAC;QACnD,IAAI,CAAC,SAAS,GAAG,IAAA,2BAAY,EAAC,cAAc,CAAC,CAAC;QAC9C,IAAI,CAAC,SAAS,GAAG,IAAA,4BAAiB,EAAC;YACjC,MAAM,EAAE,4BAAiB,CAAC,KAAK;YAC/B,OAAO,EAAE,IAAA,mCAAwB,EAAC,IAAA,iBAAU,EAAC,IAAA,iBAAK,EAAC,qBAAS,EAAE,WAAW,CAAC,cAAc,CAAC,CAAC,CAAC;YAC3F,QAAQ,EAAE,IAAI,CAAC,gBAAgB;SAChC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,kBAAkB;QACvB,OAAO,SAAS,CAAC,MAAM,CAAC,SAAS,EAAE,oBAAW,CAAC,EAAE,CAAC,CAAC;IACrD,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,SAAS,CAAC,GAAoC;QACnD,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,OAAO,SAAS,CAAC,MAAM,CAAC,wCAAwB,CAAC,aAAa,CAAC,CAAC,CAAC;QACnE,CAAC;QACD,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,OAAO,SAAS,CAAC,MAAM,CAAC,wCAAwB,CAAC,GAAG,CAAC,CAAC,CAAC;QACzD,CAAC;QACD,MAAM,IAAI,GAAG,wCAAwB,CAAC,aAAa,CAAC,CAAC;QACrD,OAAO,SAAS,CAAC,MAAM,CAAC;YACtB,sEAAsE;YACtE,OAAO,EAAE,GAAG,CAAC,yBAAyB,CAAC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,yBAAyB,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO;YAC7F,cAAc,EAAE,GAAG,CAAC,eAAe,IAAI,IAAI,CAAC,cAAc;YAC1D,eAAe,EAAE,GAAG,CAAC,8BAA8B,IAAI,IAAI,CAAC,eAAe,IAAI,uBAAuB;YACtG,uCAAuC;YACvC,eAAe,EAAE,GAAG,CAAC,gBAAgB;YACrC,cAAc,EAAE,GAAG,CAAC,gBAAgB;YACpC,gBAAgB,EAAE,GAAG,CAAC,kBAAkB;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,QAAiB;QAC7C,MAAM,GAAG,GAAG,QAAQ,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAC/D,MAAM,GAAG,GAAG,IAAA,wBAAa,EAAC,GAAG,CAAC,CAAC;QAC/B,OAAO,SAAS,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;IAClC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,EAAE,CAAC,EAAgB;QACxB,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,CAAC,CAAC,mCAAoB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,EAAE,CAAC,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAAC;YAClF,CAAC,CAAC,mCAAoB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,eAAe,KAAK,EAAE,CAAC,eAAe,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAAC,CAAC;QAC3G,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,2BAA2B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;QACnE,CAAC;QACD,OAAO,IAAI,SAAS,CAAC,UAAU,EAAE,SAAS,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC,CAAC;IAC5E,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,MAAM,CAAyB,MAAS;QAC7C,OAAO,IAAI,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,cAAc,CAAC,CAAC;IACtD,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,gBAAgB,CAAmB,MAAS,EAAE,OAAgB;QACnE,sEAAsE;QACtE,MAAM,cAAc,GAAG,mCAAoB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,IAAI,CAAC,CAAC,OAAO,KAAK,OAAO,CAAC,CAAC;QACtG,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,4GAA4G;YAC5G,wBAAwB;YACxB,MAAM,IAAI,KAAK,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;QACD,OAAO,cAAc,CAAC;IACxB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,MAAM,CAAmB,MAAS,EAAE,OAAgB;QACzD,OAAO,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,EAAE,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CACX,KAAQ,EACR,EAAE,cAAc,EAAE,WAAW,EAAqB;QAElD,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC;YAC1C,SAAS,EAAE,SAAS,CAAC,kBAAkB,CAAC,KAAK,CAAC;YAC9C,OAAO,EAAE;gBACP,WAAW,EAAE,IAAI,CAAC,OAAO;gBACzB,UAAU,EAAE,IAAI,CAAC,eAAe;gBAChC,WAAW,EAAE,IAAA,wBAAY,EAAC,cAAc,CAAC;gBACzC,eAAe,EAAE,IAAA,wBAAY,EAAC,WAAW,CAAC;aAC3C;SACF,CAAC,CAAC;QACH,OAAO,UAAU,CAAC,KAAK,CAAC;IAC1B,CAAC;IAED;;;;;;OAMG;IACH,cAAc,CAAC,YAAqD;QAClE,OAAO,IAAA,kCAAmB,EAAC;YACzB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;SACxC,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACH,+BAA+B,CAC7B,YAAqD,EACrD,cAAsB,EACtB,SAAe,EACf,sBAA8B;QAE9B,OAAO,IAAA,gCAAe,EAAC;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,8BAA8B,EAAE,IAAA,wBAAY,EAAC,sBAAsB,CAAC;YACpE,cAAc,EAAE,IAAA,wBAAY,EAAC,cAAc,CAAC;YAC5C,kBAAkB,EAAE,YAAY;YAChC,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACH,uBAAuB,CAAC,uBAAgD,EAAE,gBAAkC;QAC1G,OAAO,IAAA,sCAAqB,EAAC;YAC3B,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,gBAAgB;YAChB,uBAAuB;SACxB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;OAQG;IACH,gCAAgC,CAAC,YAAqD;QACpF,OAAO,IAAA,iDAAgC,EAAC,IAAI,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IAC9E,CAAC;IAED;;;;;;;;;;;;;OAaG;IACH,eAAe,CACb,YAAqD,EACrD,OAAoB,EACpB,aAAsC;QAEtC,OAAO,IAAA,qCAAe,EAAC;YACrB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;SAC9C,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACH,eAAe,CACb,YAAqD,EACrD,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,aAAsC;QAEtC,OAAO,IAAA,qCAAe,EAAC;YACrB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,iBAAiB,CAAC,UAAgD;QAC9E,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,UAAU,CAAC;QACxD,OAAO,WAAW,eAAe,CAAC,WAAW,EAAE,IAAI,OAAO,IAAI,MAAM,WAAW,CAAC;IAClF,CAAC;IAEO,MAAM,CAAC,UAAU,CAAC,EAAgB;QACxC,OAAQ,EAAuB,CAAC,IAAI,KAAK,SAAS,CAAC;IACrD,CAAC;IAEO,MAAM,CAAC,kBAAkB,CAC/B,KAAQ;QAER,IAAI,OAAO,KAAK,KAAK,SAAS,EAAE,CAAC;YAC/B,OAAO;gBACL,MAAM,EAAE,4BAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,uBAAW,CAAC,KAAK;gBACvB,KAAK,EAAE,KAAK;aACsC,CAAC;QACvD,CAAC;aAAM,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAClE,OAAO;gBACL,MAAM,EAAE,4BAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,uBAAW,CAAC,QAAQ;gBAC1B,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC;aAC8B,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oBAAoB,OAAO,KAAK,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;CACF;AApWD,8BAoWC"}
|
@@ -15,7 +15,7 @@ export declare const LocalNodeEnv: Schema.Struct<{
|
|
15
15
|
COVALIDATOR_INCO_EXECUTOR_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
16
16
|
COVALIDATOR_DECRYPTION_HANDLER_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
17
17
|
COVALIDATOR_HOST_CHAIN_ID: Schema.optional<typeof Schema.String>;
|
18
|
-
|
18
|
+
COVALIDATOR_URL: Schema.optional<typeof Schema.String>;
|
19
19
|
COVALIDATOR_HOST_CHAIN_RPC_URL: Schema.optional<typeof Schema.String>;
|
20
20
|
}>;
|
21
21
|
export type LocalNodeEnv = typeof LocalNodeEnv.Type;
|
@@ -3,25 +3,25 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.LocalNodeEnv = void 0;
|
4
4
|
exports.parseLocalEnv = parseLocalEnv;
|
5
5
|
const dotenv = require("@dotenvx/dotenvx");
|
6
|
-
const hex_1 = require("@inco/pega/lib/hex");
|
7
6
|
const effect_1 = require("effect");
|
7
|
+
const binary_js_1 = require("../binary.js");
|
8
8
|
exports.LocalNodeEnv = effect_1.Schema.Struct({
|
9
|
-
DEPLOYER_ADDRESS:
|
9
|
+
DEPLOYER_ADDRESS: binary_js_1.Address,
|
10
10
|
STATE_DUMP: effect_1.Schema.String,
|
11
|
-
EXECUTOR_ADDRESS:
|
12
|
-
ECIES_PUBLIC_KEY:
|
13
|
-
CALLBACK_ADDRESS:
|
14
|
-
SENDER_ADDRESS:
|
15
|
-
SENDER_PRIVATE_KEY:
|
11
|
+
EXECUTOR_ADDRESS: binary_js_1.Address,
|
12
|
+
ECIES_PUBLIC_KEY: binary_js_1.HexString,
|
13
|
+
CALLBACK_ADDRESS: binary_js_1.HexString,
|
14
|
+
SENDER_ADDRESS: binary_js_1.Address,
|
15
|
+
SENDER_PRIVATE_KEY: binary_js_1.HexString,
|
16
16
|
PEPPER: effect_1.Schema.String,
|
17
|
-
COVALIDATOR_ECIES_PRIVATE_KEY:
|
18
|
-
COVALIDATOR_EIP712_PRIVATE_SIGNING_KEY:
|
19
|
-
COVALIDATOR_CALLBACK_PRIVATE_KEY:
|
20
|
-
COVALIDATOR_ACL_ADDR:
|
21
|
-
COVALIDATOR_INCO_EXECUTOR_ADDR:
|
22
|
-
COVALIDATOR_DECRYPTION_HANDLER_ADDR:
|
17
|
+
COVALIDATOR_ECIES_PRIVATE_KEY: binary_js_1.HexString,
|
18
|
+
COVALIDATOR_EIP712_PRIVATE_SIGNING_KEY: binary_js_1.HexString,
|
19
|
+
COVALIDATOR_CALLBACK_PRIVATE_KEY: binary_js_1.HexString,
|
20
|
+
COVALIDATOR_ACL_ADDR: binary_js_1.Address,
|
21
|
+
COVALIDATOR_INCO_EXECUTOR_ADDR: binary_js_1.Address,
|
22
|
+
COVALIDATOR_DECRYPTION_HANDLER_ADDR: binary_js_1.Address,
|
23
23
|
COVALIDATOR_HOST_CHAIN_ID: effect_1.Schema.optional(effect_1.Schema.String),
|
24
|
-
|
24
|
+
COVALIDATOR_URL: effect_1.Schema.optional(effect_1.Schema.String),
|
25
25
|
COVALIDATOR_HOST_CHAIN_RPC_URL: effect_1.Schema.optional(effect_1.Schema.String),
|
26
26
|
});
|
27
27
|
// Parses a local environment file or object into a LocalNodeEnv type.
|
@@ -30,4 +30,4 @@ function parseLocalEnv(envFileOrObj) {
|
|
30
30
|
const envObj = envFileOrObj ? dotenv.parse(envFileOrObj) : process.env;
|
31
31
|
return effect_1.Schema.decodeUnknownSync(exports.LocalNodeEnv)(envObj);
|
32
32
|
}
|
33
|
-
//# sourceMappingURL=data:application/json;base64,
|
33
|
+
//# sourceMappingURL=data:application/json;base64,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
|
@@ -0,0 +1,3 @@
|
|
1
|
+
export * from './session-key.js';
|
2
|
+
export * from './types.js';
|
3
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvYWR2YW5jZWRhY2wvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsY0FBYyxrQkFBa0IsQ0FBQztBQUNqQyxjQUFjLFlBQVksQ0FBQyJ9
|
@@ -0,0 +1,28 @@
|
|
1
|
+
import type { Client } from '@connectrpc/connect';
|
2
|
+
import { type Account, type Address, type Chain, type Hex, type Transport, type WalletClient } from 'viem';
|
3
|
+
import { type EciesScheme, SupportedFheType } from '../encryption/encryption.js';
|
4
|
+
import type { KmsService, Secp256k1Keypair } from '../lite/index.js';
|
5
|
+
import { type ReencryptFnArgs } from '../reencryption/index.js';
|
6
|
+
import type { AllowanceVoucher, AllowanceVoucherWithSig } from './types.js';
|
7
|
+
export interface Session {
|
8
|
+
decrypter: Address;
|
9
|
+
expiresAt: bigint;
|
10
|
+
}
|
11
|
+
export declare function createAllowanceVoucher(incoLiteAddress: Address, sharerWalletClient: WalletClient<Transport, Chain, Account>, verifyingContract: Address, callFunction: Hex, sharerArgData: Hex): Promise<AllowanceVoucher>;
|
12
|
+
export interface GrantSessionKeyArgs {
|
13
|
+
chainId: bigint;
|
14
|
+
incoLiteAddress: Address;
|
15
|
+
sessionVerifierContractAddress: Address;
|
16
|
+
granteeAddress: Address;
|
17
|
+
sharerWalletClient: WalletClient<Transport, Chain, Account>;
|
18
|
+
expiresAt: Date;
|
19
|
+
}
|
20
|
+
export declare function grantSessionKey({ chainId, incoLiteAddress, sessionVerifierContractAddress, granteeAddress, sharerWalletClient, expiresAt, }: GrantSessionKeyArgs): Promise<AllowanceVoucherWithSig>;
|
21
|
+
export interface SessionKeyReencryptorArgs {
|
22
|
+
chainId: bigint;
|
23
|
+
ephemeralKeypair: Secp256k1Keypair;
|
24
|
+
kmsConnectRpcEndpointOrClient: string | Client<typeof KmsService>;
|
25
|
+
allowanceVoucherWithSig: AllowanceVoucherWithSig;
|
26
|
+
}
|
27
|
+
export declare function sessionKeyReencryptor({ chainId, kmsConnectRpcEndpointOrClient, ephemeralKeypair, allowanceVoucherWithSig, }: SessionKeyReencryptorArgs): Promise<(<T extends SupportedFheType>({ handle }: ReencryptFnArgs<EciesScheme, T>) => Promise<import("../encryption/encryption.js").PlaintextOf<1, 0 | 5 | 7 | 8>>)>;
|
28
|
+
export declare function updateActiveVouchersSessionNonce(incoLiteAddress: Address, sharerWalletClient: WalletClient<Transport, Chain, Account>): Promise<`0x${string}`>;
|
@@ -0,0 +1,170 @@
|
|
1
|
+
import { encodeAbiParameters, getContract, hexToBytes, toFunctionSelector, } from 'viem';
|
2
|
+
import { privateKeyToAccount } from 'viem/accounts';
|
3
|
+
import { getSupportedChain } from '../chain.js';
|
4
|
+
import { abiHelperAbi, advancedAccessControlAbi, sessionVerifierAbi } from '../generated/abis/lightning-preview.js';
|
5
|
+
import { incoLightningAbi } from '../generated/abis/lightning.js';
|
6
|
+
import { decryptGrpcResponse, defaultCovalidatorGrpc, getKmsClient, reencryptEIP712 } from '../lite/index.js';
|
7
|
+
import { createEIP712Payload } from '../reencryption/index.js';
|
8
|
+
// Given a sharer's wallet client, an incoLite contract address, and a
|
9
|
+
// (verifyingContract, callFunction, sharerArgData) tuple, this function
|
10
|
+
// creates an AllowanceVoucher.
|
11
|
+
export async function createAllowanceVoucher(incoLiteAddress, sharerWalletClient, verifyingContract, callFunction, sharerArgData) {
|
12
|
+
const advancedACL = getContract({
|
13
|
+
address: incoLiteAddress,
|
14
|
+
// Could have used the incoLightningAbi, but this is more efficient.
|
15
|
+
abi: advancedAccessControlAbi,
|
16
|
+
client: sharerWalletClient,
|
17
|
+
});
|
18
|
+
// The session nonce in the AllowanceVoucher must match the current active
|
19
|
+
// session nonce of the sharer on-chain.
|
20
|
+
const sessionNonce = await advancedACL.read.getActiveVouchersSessionNonce([sharerWalletClient.account.address]);
|
21
|
+
return {
|
22
|
+
sessionNonce,
|
23
|
+
verifyingContract,
|
24
|
+
callFunction,
|
25
|
+
sharerArgData,
|
26
|
+
};
|
27
|
+
}
|
28
|
+
// Let the sharer grant a session to the requester.
|
29
|
+
export async function grantSessionKey({ chainId, incoLiteAddress, sessionVerifierContractAddress, granteeAddress, sharerWalletClient, expiresAt, }) {
|
30
|
+
const session = {
|
31
|
+
decrypter: granteeAddress,
|
32
|
+
expiresAt: BigInt(Math.floor(expiresAt.getTime() / 1000)),
|
33
|
+
};
|
34
|
+
const sharerArgData = encodeAbiParameters(getSessionAbi(), [session.decrypter, session.expiresAt]);
|
35
|
+
// Get the domain name and version from the incoLite contract.
|
36
|
+
const incoLitePreview = getContract({
|
37
|
+
abi: incoLightningAbi,
|
38
|
+
address: incoLiteAddress,
|
39
|
+
client: sharerWalletClient,
|
40
|
+
});
|
41
|
+
const eip712DomainName = await incoLitePreview.read.getName();
|
42
|
+
const eip712DomainVersion = await incoLitePreview.read.getVersion();
|
43
|
+
const voucher = await createAllowanceVoucher(incoLiteAddress, sharerWalletClient,
|
44
|
+
// Careful that the verifying contract here is the SessionVerifier contract,
|
45
|
+
// not the incoLite contract.
|
46
|
+
sessionVerifierContractAddress, toFunctionSelector(getCanUseSessionAbi()), sharerArgData);
|
47
|
+
const eip712Payload = createEIP712Payload({
|
48
|
+
chainId,
|
49
|
+
primaryType: 'AllowanceVoucher',
|
50
|
+
primaryTypeFields: getAllowanceVoucherAbi(),
|
51
|
+
message: voucher,
|
52
|
+
// Related to comment above: careful that the verifying contract here is
|
53
|
+
// the incoLite contract (not the SessionVerifier contract).
|
54
|
+
verifyingContract: incoLiteAddress,
|
55
|
+
...(eip712DomainName && { domainName: eip712DomainName }),
|
56
|
+
...(eip712DomainVersion && { domainVersion: eip712DomainVersion }),
|
57
|
+
});
|
58
|
+
// Using browser extensions, this step will prompt the user to sign the
|
59
|
+
// payload.
|
60
|
+
const voucherSignature = await sharerWalletClient.signTypedData(eip712Payload);
|
61
|
+
return {
|
62
|
+
sharer: sharerWalletClient.account.address,
|
63
|
+
voucher,
|
64
|
+
voucherSignature,
|
65
|
+
};
|
66
|
+
}
|
67
|
+
// The sessionKeyReencryptor function is a reencryptor that uses a session key
|
68
|
+
// to reencrypt data.
|
69
|
+
export async function sessionKeyReencryptor({ chainId, kmsConnectRpcEndpointOrClient, ephemeralKeypair, allowanceVoucherWithSig, }) {
|
70
|
+
const kmsClient = getKmsClient(kmsConnectRpcEndpointOrClient || defaultCovalidatorGrpc(getSupportedChain(chainId)));
|
71
|
+
const requesterAccount = privateKeyToAccount(`0x${ephemeralKeypair.kp.getPrivate('hex')}`);
|
72
|
+
const ephemeralPubKey = ephemeralKeypair.encodePublicKey();
|
73
|
+
// Sign the EIP712 attesting that the requester has access to the private key
|
74
|
+
// corresponding to the ephemeral public key.
|
75
|
+
const eip712Payload = reencryptEIP712(chainId, ephemeralPubKey);
|
76
|
+
// Since the account is an ephemeral keypair stored in memory (not in Metamask),
|
77
|
+
// this step will NOT prompt the user with a pop-up.
|
78
|
+
const eip712Signature = await requesterAccount.signTypedData(eip712Payload);
|
79
|
+
return async function reencrypt({ handle }) {
|
80
|
+
const reencryptRequest = {
|
81
|
+
$typeName: 'inco.kms.lite.v1.ReencryptRequest',
|
82
|
+
userAddress: requesterAccount.address,
|
83
|
+
ephemeralPubKey,
|
84
|
+
eip712Signature: hexToBytes(eip712Signature),
|
85
|
+
handlesWithProofs: [
|
86
|
+
{
|
87
|
+
$typeName: 'inco.kms.lite.v1.HandleWithProof',
|
88
|
+
handle,
|
89
|
+
aclProof: {
|
90
|
+
$typeName: 'inco.kms.lite.v1.ACLProof',
|
91
|
+
proof: {
|
92
|
+
value: {
|
93
|
+
$typeName: 'inco.kms.lite.v1.IncoLiteAdvancedACLProof',
|
94
|
+
allowanceProof: {
|
95
|
+
$typeName: 'inco.kms.lite.v1.AllowanceProof',
|
96
|
+
sharer: allowanceVoucherWithSig.sharer,
|
97
|
+
voucher: {
|
98
|
+
// Converting from the AllowanceVoucher domain type to the
|
99
|
+
// AllowanceVoucher proto type.
|
100
|
+
$typeName: 'inco.kms.lite.v1.AllowanceVoucher',
|
101
|
+
sessionNonce: hexToBytes(allowanceVoucherWithSig.voucher.sessionNonce),
|
102
|
+
verifyingContract: allowanceVoucherWithSig.voucher.verifyingContract,
|
103
|
+
callFunction: hexToBytes(allowanceVoucherWithSig.voucher.callFunction),
|
104
|
+
sharerArgData: hexToBytes(allowanceVoucherWithSig.voucher.sharerArgData),
|
105
|
+
},
|
106
|
+
voucherSignature: hexToBytes(allowanceVoucherWithSig.voucherSignature),
|
107
|
+
// For SessionVerifier, the requesterArgData is empty.
|
108
|
+
requesterArgData: new Uint8Array(),
|
109
|
+
},
|
110
|
+
},
|
111
|
+
case: 'incoLiteAdvancedAclProof',
|
112
|
+
},
|
113
|
+
},
|
114
|
+
},
|
115
|
+
],
|
116
|
+
};
|
117
|
+
const response = await kmsClient.reencrypt(reencryptRequest);
|
118
|
+
return decryptGrpcResponse(response, ephemeralKeypair, handle);
|
119
|
+
};
|
120
|
+
}
|
121
|
+
export async function updateActiveVouchersSessionNonce(incoLiteAddress, sharerWalletClient) {
|
122
|
+
const advancedACL = getContract({
|
123
|
+
address: incoLiteAddress,
|
124
|
+
abi: advancedAccessControlAbi,
|
125
|
+
client: sharerWalletClient,
|
126
|
+
});
|
127
|
+
const txHash = await advancedACL.write.updateActiveVouchersSessionNonce();
|
128
|
+
return txHash;
|
129
|
+
}
|
130
|
+
// Below are helpers to get ABIs of functions/structs from the SessionVerifier
|
131
|
+
// contract.
|
132
|
+
// Get the ABI of the `AllowanceVoucher` struct.
|
133
|
+
function getAllowanceVoucherAbi() {
|
134
|
+
// Find the `allowanceVoucherDigest` function, it takes an AllowanceVoucher
|
135
|
+
// as sole argument.
|
136
|
+
const allowanceVoucherDigest = advancedAccessControlAbi.find((item) => item.name === 'allowanceVoucherDigest');
|
137
|
+
if (!allowanceVoucherDigest) {
|
138
|
+
throw new Error('allowanceVoucherDigest not found');
|
139
|
+
}
|
140
|
+
// Get the input whose internalType is "struct AllowanceVoucher"
|
141
|
+
const allowanceVoucherInput = allowanceVoucherDigest.inputs.find((input) => input.internalType === 'struct AllowanceVoucher');
|
142
|
+
if (!allowanceVoucherInput) {
|
143
|
+
throw new Error('allowanceVoucherInput not found');
|
144
|
+
}
|
145
|
+
return allowanceVoucherInput.components;
|
146
|
+
}
|
147
|
+
// Get the ABI of the `Session` struct.
|
148
|
+
//
|
149
|
+
// We specifically created an ABIHelper.sol contract to export the Session
|
150
|
+
// struct from the SessionVerifier contract.
|
151
|
+
function getSessionAbi() {
|
152
|
+
const getSession = abiHelperAbi.find((item) => 'name' in item && item.name === 'getSession');
|
153
|
+
if (!getSession) {
|
154
|
+
throw new Error('getSession not found');
|
155
|
+
}
|
156
|
+
const session = getSession.outputs[0];
|
157
|
+
if (!session) {
|
158
|
+
throw new Error('session not found');
|
159
|
+
}
|
160
|
+
return session.components;
|
161
|
+
}
|
162
|
+
// Get the ABI of the `canUseSession` function.
|
163
|
+
function getCanUseSessionAbi() {
|
164
|
+
const canUseSession = sessionVerifierAbi.find((item) => 'name' in item && item.name === 'canUseSession');
|
165
|
+
if (!canUseSession) {
|
166
|
+
throw new Error('canUseSession not found');
|
167
|
+
}
|
168
|
+
return canUseSession;
|
169
|
+
}
|
170
|
+
//# sourceMappingURL=data:application/json;base64,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
|
@@ -0,0 +1,15 @@
|
|
1
|
+
import { Address, Hex } from 'viem';
|
2
|
+
export type AllowanceVoucher = {
|
3
|
+
sessionNonce: Hex;
|
4
|
+
verifyingContract: Address;
|
5
|
+
callFunction: Hex;
|
6
|
+
sharerArgData: Hex;
|
7
|
+
};
|
8
|
+
export interface AllowanceVoucherWithSig {
|
9
|
+
sharer: Address;
|
10
|
+
voucher: AllowanceVoucher;
|
11
|
+
voucherSignature: Hex;
|
12
|
+
}
|
13
|
+
export interface AllowanceProof extends AllowanceVoucherWithSig {
|
14
|
+
requesterArgData: Uint8Array;
|
15
|
+
}
|