@inco/js 0.3.1 → 0.3.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/attestedcompute/attested-compute.d.ts +14 -16
- package/dist/cjs/attestedcompute/attested-compute.js +56 -71
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +18 -19
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +50 -60
- package/dist/cjs/attesteddecrypt/index.d.ts +0 -1
- package/dist/cjs/attesteddecrypt/index.js +1 -2
- package/dist/cjs/lite/attested-compute.d.ts +1 -2
- package/dist/cjs/lite/attested-compute.js +1 -4
- package/dist/cjs/lite/attested-decrypt.d.ts +1 -2
- package/dist/cjs/lite/attested-decrypt.js +1 -4
- package/dist/cjs/lite/lightning.d.ts +41 -2
- package/dist/cjs/lite/lightning.js +57 -1
- package/dist/esm/attestedcompute/attested-compute.d.ts +14 -16
- package/dist/esm/attestedcompute/attested-compute.js +55 -70
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +18 -19
- package/dist/esm/attesteddecrypt/attested-decrypt.js +49 -59
- package/dist/esm/attesteddecrypt/index.d.ts +0 -1
- package/dist/esm/attesteddecrypt/index.js +1 -2
- package/dist/esm/lite/attested-compute.d.ts +1 -2
- package/dist/esm/lite/attested-compute.js +2 -3
- package/dist/esm/lite/attested-decrypt.d.ts +1 -2
- package/dist/esm/lite/attested-decrypt.js +2 -3
- package/dist/esm/lite/lightning.d.ts +41 -2
- package/dist/esm/lite/lightning.js +57 -1
- package/dist/types/attestedcompute/attested-compute.d.ts +14 -16
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +18 -19
- package/dist/types/attesteddecrypt/index.d.ts +0 -1
- package/dist/types/lite/attested-compute.d.ts +1 -2
- package/dist/types/lite/attested-decrypt.d.ts +1 -2
- package/dist/types/lite/lightning.d.ts +41 -2
- package/package.json +1 -1
@@ -1,8 +1,11 @@
|
|
1
1
|
import type { Account, Chain, Transport, WalletClient } from 'viem';
|
2
|
+
import { DecryptionAttestation } from '../attesteddecrypt/types.js';
|
3
|
+
import { HexString } from '../binary.js';
|
2
4
|
import { SupportedChainId } from '../chain.js';
|
3
|
-
import { EciesScheme } from '../encryption/encryption.js';
|
5
|
+
import { EciesScheme, SupportedFheType } from '../encryption/encryption.js';
|
4
6
|
import type { KmsClient } from '../kms/client.js';
|
5
|
-
import {
|
7
|
+
import type { BackoffConfig } from '../retry.js';
|
8
|
+
import { AttestedComputeOP } from './types.js';
|
6
9
|
/**
|
7
10
|
* Arguments for creating an attested compute.
|
8
11
|
*/
|
@@ -21,18 +24,13 @@ export interface IncoLiteAttestedComputeArgs {
|
|
21
24
|
* @throws {AttestedComputeError} If the creation fails
|
22
25
|
*
|
23
26
|
* @todo Support multiple operations in a single request.
|
24
|
-
*
|
25
|
-
* @example
|
26
|
-
* ```typescript
|
27
|
-
* const compute = await incoLiteAttestedCompute({
|
28
|
-
* walletClient,
|
29
|
-
* chainId: sepolia,
|
30
|
-
* });
|
31
|
-
* const decryptionAttestation = await compute({
|
32
|
-
* lhsHandle: '0x...',
|
33
|
-
* op: AttestedComputeSupportedOps.Eq,
|
34
|
-
* rhsPlaintext: 1337n,
|
35
|
-
* });
|
36
|
-
* ```
|
37
27
|
*/
|
38
|
-
export declare function
|
28
|
+
export declare function attestedCompute<T extends SupportedFheType>({ lhsHandle, op, rhsPlaintext, backoffConfig, walletClient, kmsConnectRpcEndpointOrClient, chainId, }: {
|
29
|
+
lhsHandle: HexString;
|
30
|
+
op: AttestedComputeOP;
|
31
|
+
rhsPlaintext: bigint | boolean;
|
32
|
+
backoffConfig?: Partial<BackoffConfig> | undefined;
|
33
|
+
walletClient: WalletClient<Transport, Chain, Account>;
|
34
|
+
kmsConnectRpcEndpointOrClient?: string | KmsClient;
|
35
|
+
chainId: SupportedChainId;
|
36
|
+
}): Promise<DecryptionAttestation<EciesScheme, T>>;
|
@@ -17,79 +17,64 @@ const ATTESTED_COMPUTE_DOMAIN_VERSION = '0.1.0';
|
|
17
17
|
* @throws {AttestedComputeError} If the creation fails
|
18
18
|
*
|
19
19
|
* @todo Support multiple operations in a single request.
|
20
|
-
*
|
21
|
-
* @example
|
22
|
-
* ```typescript
|
23
|
-
* const compute = await incoLiteAttestedCompute({
|
24
|
-
* walletClient,
|
25
|
-
* chainId: sepolia,
|
26
|
-
* });
|
27
|
-
* const decryptionAttestation = await compute({
|
28
|
-
* lhsHandle: '0x...',
|
29
|
-
* op: AttestedComputeSupportedOps.Eq,
|
30
|
-
* rhsPlaintext: 1337n,
|
31
|
-
* });
|
32
|
-
* ```
|
33
20
|
*/
|
34
|
-
export function
|
35
|
-
|
36
|
-
|
37
|
-
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
|
42
|
-
|
43
|
-
|
44
|
-
|
45
|
-
|
46
|
-
|
47
|
-
|
48
|
-
|
49
|
-
message: {
|
50
|
-
op: op,
|
51
|
-
lhsHandle: lhsHandle,
|
52
|
-
rhsPlaintext: bigintToBytes32(rhsPlaintextBig),
|
53
|
-
},
|
54
|
-
domainName: ATTESTED_COMPUTE_DOMAIN_NAME,
|
55
|
-
domainVersion: ATTESTED_COMPUTE_DOMAIN_VERSION,
|
56
|
-
});
|
57
|
-
// Sign the EIP712 message
|
58
|
-
const eip712Signature = await walletClient.signTypedData(eip712Payload);
|
59
|
-
const rhsValueBytes = bigintToPlaintext(encryptionSchemes.ecies, getHandleType(lhsHandle), rhsPlaintextBig);
|
60
|
-
const attestedComputeRequest = {
|
61
|
-
$typeName: 'inco.kms.lite.v1.AttestedComputeRequest',
|
62
|
-
userAddress: walletClient.account.address,
|
21
|
+
export async function attestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, walletClient, kmsConnectRpcEndpointOrClient, chainId, }) {
|
22
|
+
try {
|
23
|
+
const kmsClient = getKmsClient(kmsConnectRpcEndpointOrClient || defaultCovalidatorGrpc(getSupportedChain(chainId)));
|
24
|
+
validateHandle(lhsHandle);
|
25
|
+
const rhsPlaintextBig = BigInt(rhsPlaintext);
|
26
|
+
// Create the EIP712 payload for the handles to decrypt
|
27
|
+
const eip712Payload = createEIP712Payload({
|
28
|
+
chainId: BigInt(chainId),
|
29
|
+
primaryType: 'AttestedComputeRequest',
|
30
|
+
primaryTypeFields: [
|
31
|
+
{ name: 'op', type: 'uint8' },
|
32
|
+
{ name: 'lhsHandle', type: 'bytes32' },
|
33
|
+
{ name: 'rhsPlaintext', type: 'bytes32' },
|
34
|
+
],
|
35
|
+
message: {
|
63
36
|
op: op,
|
64
37
|
lhsHandle: lhsHandle,
|
65
|
-
rhsPlaintext:
|
66
|
-
|
67
|
-
|
68
|
-
|
69
|
-
|
70
|
-
|
71
|
-
|
72
|
-
|
73
|
-
|
74
|
-
|
75
|
-
|
76
|
-
|
77
|
-
|
78
|
-
|
79
|
-
|
80
|
-
|
81
|
-
|
82
|
-
|
83
|
-
|
84
|
-
|
85
|
-
|
38
|
+
rhsPlaintext: bigintToBytes32(rhsPlaintextBig),
|
39
|
+
},
|
40
|
+
domainName: ATTESTED_COMPUTE_DOMAIN_NAME,
|
41
|
+
domainVersion: ATTESTED_COMPUTE_DOMAIN_VERSION,
|
42
|
+
});
|
43
|
+
// Sign the EIP712 message
|
44
|
+
const eip712Signature = await walletClient.signTypedData(eip712Payload);
|
45
|
+
const rhsValueBytes = bigintToPlaintext(encryptionSchemes.ecies, getHandleType(lhsHandle), rhsPlaintextBig);
|
46
|
+
const attestedComputeRequest = {
|
47
|
+
$typeName: 'inco.kms.lite.v1.AttestedComputeRequest',
|
48
|
+
userAddress: walletClient.account.address,
|
49
|
+
op: op,
|
50
|
+
lhsHandle: lhsHandle,
|
51
|
+
rhsPlaintext: rhsValueBytes.value.toString(16),
|
52
|
+
eip712Signature: hexToBytes(eip712Signature),
|
53
|
+
};
|
54
|
+
const response = await retryWithBackoff(async () => {
|
55
|
+
return await kmsClient.attestedCompute(attestedComputeRequest);
|
56
|
+
}, backoffConfig);
|
57
|
+
const decryptionAttestation = response.decryptionAttestation;
|
58
|
+
if (decryptionAttestation?.plaintext === undefined) {
|
59
|
+
throw new AttestedComputeError('No plaintext in response');
|
60
|
+
}
|
61
|
+
const computeResultHandle = response.decryptionAttestation?.handle;
|
62
|
+
if (!computeResultHandle) {
|
63
|
+
throw new AttestedComputeError('No compute result handle in response');
|
86
64
|
}
|
87
|
-
|
88
|
-
|
89
|
-
|
90
|
-
|
91
|
-
|
65
|
+
const handleType = getHandleType(computeResultHandle);
|
66
|
+
const bigIntValue = bytesToBigInt(decryptionAttestation.plaintext);
|
67
|
+
return {
|
68
|
+
handle: computeResultHandle,
|
69
|
+
plaintext: bigintToPlaintext(encryptionSchemes.ecies, handleType, bigIntValue),
|
70
|
+
covalidatorSignature: decryptionAttestation.signature,
|
71
|
+
};
|
72
|
+
}
|
73
|
+
catch (error) {
|
74
|
+
if (error instanceof AttestedComputeError) {
|
75
|
+
throw error;
|
92
76
|
}
|
93
|
-
|
77
|
+
throw new AttestedComputeError('Failed to perform attested compute', error);
|
78
|
+
}
|
94
79
|
}
|
95
|
-
//# sourceMappingURL=data:application/json;base64,
|
80
|
+
//# sourceMappingURL=data:application/json;base64,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
|
@@ -1,16 +1,18 @@
|
|
1
1
|
import type { Account, Chain, Transport, WalletClient } from 'viem';
|
2
|
+
import { HexString } from '../binary.js';
|
2
3
|
import { SupportedChainId } from '../chain.js';
|
3
|
-
import { EciesScheme } from '../encryption/encryption.js';
|
4
|
+
import { EciesScheme, SupportedFheType } from '../encryption/encryption.js';
|
4
5
|
import type { KmsClient } from '../kms/client.js';
|
5
|
-
import {
|
6
|
+
import type { BackoffConfig } from '../retry.js';
|
7
|
+
import { DecryptionAttestation } from './types.js';
|
6
8
|
/**
|
7
9
|
* Validates a handle format.
|
8
10
|
* @param handle - The handle to validate
|
9
11
|
* @throws {AttestedDecryptError} If the handle format is invalid
|
10
12
|
*/
|
11
|
-
export declare function validateHandle(handle:
|
13
|
+
export declare function validateHandle(handle: HexString): void;
|
12
14
|
/**
|
13
|
-
* Arguments for creating an attested
|
15
|
+
* Arguments for creating an attested decrypt request.
|
14
16
|
*/
|
15
17
|
export interface IncoLiteAttestedDecryptorArgs {
|
16
18
|
/** The wallet used to interact with the blockchain and sign the decrypt request */
|
@@ -21,20 +23,17 @@ export interface IncoLiteAttestedDecryptorArgs {
|
|
21
23
|
chainId: SupportedChainId;
|
22
24
|
}
|
23
25
|
/**
|
24
|
-
*
|
25
|
-
*
|
26
|
-
* @returns A function that can decrypt handles using attestation
|
27
|
-
* @throws {AttestedDecryptError} If the decryptor creation fails
|
26
|
+
* Decrypt multiple handles in a single attested request.
|
27
|
+
* Returns an array of attestations aligned with the response ordering.
|
28
28
|
*
|
29
|
-
* @
|
30
|
-
*
|
31
|
-
* @
|
32
|
-
* ```typescript
|
33
|
-
* const decryptor = await incoLiteAttestedDecryptor({
|
34
|
-
* walletClient,
|
35
|
-
* chainId: sepolia,
|
36
|
-
* });
|
37
|
-
* const { plaintext, covalidatorSignature } = await decryptor({ handle: '0x...' });
|
38
|
-
* ```
|
29
|
+
* @param args - The arguments for creating the attested decrypt function
|
30
|
+
* @returns A function that can decrypt handles and return an attestation
|
31
|
+
* @throws {AttestedDecryptError} If the creation fails
|
39
32
|
*/
|
40
|
-
export declare function
|
33
|
+
export declare function attestedDecrypt({ handles, backoffConfig, walletClient, chainId, kmsConnectRpcEndpointOrClient, }: {
|
34
|
+
handles: HexString[];
|
35
|
+
backoffConfig?: Partial<BackoffConfig> | undefined;
|
36
|
+
walletClient: WalletClient<Transport, Chain, Account>;
|
37
|
+
chainId: SupportedChainId;
|
38
|
+
kmsConnectRpcEndpointOrClient?: string | KmsClient;
|
39
|
+
}): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
|
@@ -20,70 +20,60 @@ export function validateHandle(handle) {
|
|
20
20
|
}
|
21
21
|
}
|
22
22
|
/**
|
23
|
-
*
|
24
|
-
*
|
25
|
-
* @returns A function that can decrypt handles using attestation
|
26
|
-
* @throws {AttestedDecryptError} If the decryptor creation fails
|
23
|
+
* Decrypt multiple handles in a single attested request.
|
24
|
+
* Returns an array of attestations aligned with the response ordering.
|
27
25
|
*
|
28
|
-
* @
|
29
|
-
*
|
30
|
-
* @
|
31
|
-
* ```typescript
|
32
|
-
* const decryptor = await incoLiteAttestedDecryptor({
|
33
|
-
* walletClient,
|
34
|
-
* chainId: sepolia,
|
35
|
-
* });
|
36
|
-
* const { plaintext, covalidatorSignature } = await decryptor({ handle: '0x...' });
|
37
|
-
* ```
|
26
|
+
* @param args - The arguments for creating the attested decrypt function
|
27
|
+
* @returns A function that can decrypt handles and return an attestation
|
28
|
+
* @throws {AttestedDecryptError} If the creation fails
|
38
29
|
*/
|
39
|
-
export function
|
40
|
-
|
41
|
-
|
42
|
-
|
43
|
-
|
44
|
-
|
45
|
-
|
46
|
-
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
|
52
|
-
|
53
|
-
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
|
58
|
-
|
59
|
-
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
|
64
|
-
|
65
|
-
|
66
|
-
|
67
|
-
|
68
|
-
|
69
|
-
const decryptionAttestation = response.decryptionAttestations[0];
|
70
|
-
if (decryptionAttestation.plaintext === undefined) {
|
71
|
-
throw new AttestedDecryptError('No plaintext in response');
|
30
|
+
export async function attestedDecrypt({ handles, backoffConfig, walletClient, chainId, kmsConnectRpcEndpointOrClient, }) {
|
31
|
+
try {
|
32
|
+
handles.forEach(validateHandle);
|
33
|
+
const kmsClient = getKmsClient(kmsConnectRpcEndpointOrClient || defaultCovalidatorGrpc(getSupportedChain(chainId)));
|
34
|
+
const eip712Payload = createEIP712Payload({
|
35
|
+
chainId: BigInt(chainId),
|
36
|
+
primaryType: 'AttestedDecryptRequest',
|
37
|
+
primaryTypeFields: [{ name: 'handles', type: 'bytes32[]' }],
|
38
|
+
message: {
|
39
|
+
handles,
|
40
|
+
},
|
41
|
+
domainName: ATTESTED_DECRYPT_DOMAIN_NAME,
|
42
|
+
domainVersion: ATTESTED_DECRYPT_DOMAIN_VERSION,
|
43
|
+
});
|
44
|
+
const eip712Signature = await walletClient.signTypedData(eip712Payload);
|
45
|
+
const attestedDecryptRequest = {
|
46
|
+
$typeName: 'inco.kms.lite.v1.AttestedDecryptRequest',
|
47
|
+
userAddress: walletClient.account.address,
|
48
|
+
handles,
|
49
|
+
eip712Signature: hexToBytes(eip712Signature),
|
50
|
+
};
|
51
|
+
const response = await retryWithBackoff(async () => {
|
52
|
+
return await kmsClient.attestedDecrypt(attestedDecryptRequest);
|
53
|
+
}, backoffConfig);
|
54
|
+
if (!response.decryptionAttestations || response.decryptionAttestations.length === 0) {
|
55
|
+
throw new AttestedDecryptError('No decryption attestations in response');
|
56
|
+
}
|
57
|
+
const results = response.decryptionAttestations.map((att) => {
|
58
|
+
if (att.plaintext === undefined) {
|
59
|
+
throw new AttestedDecryptError('No plaintext in attestation');
|
72
60
|
}
|
73
|
-
const
|
74
|
-
const
|
61
|
+
const h = att.handle;
|
62
|
+
const handleType = getHandleType(h);
|
63
|
+
const bigIntValue = bytesToBigInt(att.plaintext);
|
75
64
|
return {
|
76
|
-
handle:
|
65
|
+
handle: h,
|
77
66
|
plaintext: bigintToPlaintext(encryptionSchemes.ecies, handleType, bigIntValue),
|
78
|
-
covalidatorSignature:
|
67
|
+
covalidatorSignature: att.signature,
|
79
68
|
};
|
69
|
+
});
|
70
|
+
return results;
|
71
|
+
}
|
72
|
+
catch (error) {
|
73
|
+
if (error instanceof AttestedDecryptError) {
|
74
|
+
throw error;
|
80
75
|
}
|
81
|
-
|
82
|
-
|
83
|
-
throw error;
|
84
|
-
}
|
85
|
-
throw new AttestedDecryptError('Failed to decrypt handle', error);
|
86
|
-
}
|
87
|
-
};
|
76
|
+
throw new AttestedDecryptError('Failed to decrypt handles', error);
|
77
|
+
}
|
88
78
|
}
|
89
|
-
//# sourceMappingURL=data:application/json;base64,
|
79
|
+
//# sourceMappingURL=data:application/json;base64,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
|
@@ -1,3 +1,2 @@
|
|
1
|
-
export * from './attested-decrypt.js';
|
2
1
|
export * from './types.js';
|
3
|
-
//# sourceMappingURL=data:application/json;base64,
|
2
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvYXR0ZXN0ZWRkZWNyeXB0L2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLGNBQWMsWUFBWSxDQUFDIn0=
|
@@ -1,4 +1,3 @@
|
|
1
|
-
import { type IncoLiteAttestedComputeArgs
|
1
|
+
import { type IncoLiteAttestedComputeArgs } from '../attestedcompute/attested-compute.js';
|
2
2
|
import { type AttestedComputeSupportedOps } from '../attestedcompute/types.js';
|
3
|
-
export { incoLiteAttestedCompute };
|
4
3
|
export type { AttestedComputeSupportedOps, IncoLiteAttestedComputeArgs };
|
@@ -1,3 +1,2 @@
|
|
1
|
-
|
2
|
-
|
3
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYXR0ZXN0ZWQtY29tcHV0ZS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9saXRlL2F0dGVzdGVkLWNvbXB1dGUudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsT0FBTyxFQUFvQyx1QkFBdUIsRUFBRSxNQUFNLHdDQUF3QyxDQUFDO0FBR25ILE9BQU8sRUFBRSx1QkFBdUIsRUFBRSxDQUFDIn0=
|
1
|
+
export {};
|
2
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYXR0ZXN0ZWQtY29tcHV0ZS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9saXRlL2F0dGVzdGVkLWNvbXB1dGUudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IiJ9
|
@@ -1,3 +1,2 @@
|
|
1
|
-
import { type IncoLiteAttestedDecryptorArgs
|
2
|
-
export { incoLiteAttestedDecryptor };
|
1
|
+
import { type IncoLiteAttestedDecryptorArgs } from '../attesteddecrypt/attested-decrypt.js';
|
3
2
|
export type { IncoLiteAttestedDecryptorArgs };
|
@@ -1,3 +1,2 @@
|
|
1
|
-
|
2
|
-
|
3
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYXR0ZXN0ZWQtZGVjcnlwdC5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9saXRlL2F0dGVzdGVkLWRlY3J5cHQudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsT0FBTyxFQUFzQyx5QkFBeUIsRUFBRSxNQUFNLHdDQUF3QyxDQUFDO0FBRXZILE9BQU8sRUFBRSx5QkFBeUIsRUFBRSxDQUFDIn0=
|
1
|
+
export {};
|
2
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYXR0ZXN0ZWQtZGVjcnlwdC5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9saXRlL2F0dGVzdGVkLWRlY3J5cHQudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IiJ9
|
@@ -1,11 +1,14 @@
|
|
1
1
|
import { Account, Chain, Transport, WalletClient } from 'viem';
|
2
2
|
import { AllowanceVoucherWithSig } from '../advancedacl/types.js';
|
3
|
+
import { AttestedComputeOP } from '../attestedcompute/types.js';
|
4
|
+
import { DecryptionAttestation } from '../attesteddecrypt/index.js';
|
3
5
|
import { Address, HexString } from '../binary.js';
|
4
|
-
import { EciesScheme, PlaintextOf } from '../encryption/index.js';
|
6
|
+
import { EciesScheme, PlaintextOf, SupportedFheType } from '../encryption/index.js';
|
5
7
|
import { lightningDeployments } from '../generated/lightning.js';
|
6
8
|
import { localNodeLightningConfig } from '../generated/local-node.js';
|
7
9
|
import { LocalNodeEnv } from '../local/index.js';
|
8
10
|
import type { Reencryptor } from '../reencryption/index.js';
|
11
|
+
import { BackoffConfig } from '../retry.js';
|
9
12
|
import { Secp256k1Keypair } from './ecies.js';
|
10
13
|
type TupleToUnion<T> = T extends readonly unknown[] ? T[number] : never;
|
11
14
|
type Deployment = TupleToUnion<typeof lightningDeployments>;
|
@@ -163,7 +166,7 @@ export declare class Lightning<T extends DeploymentSlice = DeploymentSlice> {
|
|
163
166
|
* const decryptedValue = await reencryptor({handle: resultHandle});
|
164
167
|
* ```
|
165
168
|
*/
|
166
|
-
getSessionKeyRencryptor(allowanceVoucherWithSig: AllowanceVoucherWithSig, ephemeralKeypair: Secp256k1Keypair): Promise<(<T_1 extends
|
169
|
+
getSessionKeyRencryptor(allowanceVoucherWithSig: AllowanceVoucherWithSig, ephemeralKeypair: Secp256k1Keypair): Promise<(<T_1 extends SupportedFheType>({ handle }: import("../reencryption/types.js").ReencryptFnArgs<EciesScheme, T_1>) => Promise<PlaintextOf<1, 0 | 5 | 7 | 8>>)>;
|
167
170
|
/**
|
168
171
|
* Updates the active session nonce for the given wallet client.
|
169
172
|
*
|
@@ -174,6 +177,42 @@ export declare class Lightning<T extends DeploymentSlice = DeploymentSlice> {
|
|
174
177
|
* @returns The transaction hash of the updateActiveVouchersSessionNonce transaction
|
175
178
|
*/
|
176
179
|
updateActiveVouchersSessionNonce(walletClient: WalletClient<Transport, Chain, Account>): Promise<HexString>;
|
180
|
+
/**
|
181
|
+
* Get an attested decryptor for the given wallet client.
|
182
|
+
*
|
183
|
+
* @param walletClient - The wallet client used for signing the attested decrypt request
|
184
|
+
* @param handles - The handles to decrypt
|
185
|
+
* @param backoffConfig - The backoff configuration for the attested decrypt request
|
186
|
+
* @returns The decryption attestations
|
187
|
+
*
|
188
|
+
* @example
|
189
|
+
* ```typescript
|
190
|
+
* const response = await lightning.attestedDecrypt(walletClient, [handle1, handle2]);
|
191
|
+
* const { plaintext, covalidatorSignature } = response[0];
|
192
|
+
* ```
|
193
|
+
*/
|
194
|
+
attestedDecrypt(walletClient: WalletClient<Transport, Chain, Account>, handles: HexString[], backoffConfig?: Partial<BackoffConfig>): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
|
195
|
+
/**
|
196
|
+
* Get an attested compute for the given wallet client.
|
197
|
+
*
|
198
|
+
* @param walletClient - The wallet client used for signing the attested compute request
|
199
|
+
* @param lhsHandle - The handle to compute
|
200
|
+
* @param op - The operation to perform
|
201
|
+
* @param rhsPlaintext - The plaintext to compute with
|
202
|
+
* @param backoffConfig - The backoff configuration for the attested compute request
|
203
|
+
* @returns The decryption attestation
|
204
|
+
*
|
205
|
+
* @example
|
206
|
+
* ```typescript
|
207
|
+
* import { AttestedComputeSupportedOps } from '../lite/attested-compute.js';
|
208
|
+
* const lhsHandle = '0x...';
|
209
|
+
* const rhsPlaintext = 1337n;
|
210
|
+
* const op = AttestedComputeSupportedOps.Eq;
|
211
|
+
* const response = await lightning.attestedCompute(walletClient, lhsHandle, op, rhsPlaintext);
|
212
|
+
* const { plaintext, covalidatorSignature, handle } = response;
|
213
|
+
* ```
|
214
|
+
*/
|
215
|
+
attestedCompute(walletClient: WalletClient<Transport, Chain, Account>, lhsHandle: HexString, op: AttestedComputeOP, rhsPlaintext: bigint | boolean, backoffConfig?: Partial<BackoffConfig>): Promise<DecryptionAttestation<EciesScheme, SupportedFheType>>;
|
177
216
|
/**
|
178
217
|
* Get the GRPC endpoint for the covalidator that services this deployment.
|
179
218
|
*/
|
@@ -2,6 +2,8 @@ import * as fs from 'fs/promises';
|
|
2
2
|
import { hexToBytes } from 'viem';
|
3
3
|
import { baseSepolia } from 'viem/chains';
|
4
4
|
import { grantSessionKey, sessionKeyReencryptor, updateActiveVouchersSessionNonce, } from '../advancedacl/session-key.js';
|
5
|
+
import { attestedCompute } from '../attestedcompute/attested-compute.js';
|
6
|
+
import { attestedDecrypt } from '../attesteddecrypt/attested-decrypt.js';
|
5
7
|
import { HexString, parseAddress } from '../binary.js';
|
6
8
|
import { encryptionSchemes } from '../encryption/index.js';
|
7
9
|
import { lightningDeployments } from '../generated/lightning.js';
|
@@ -251,6 +253,60 @@ export class Lightning {
|
|
251
253
|
updateActiveVouchersSessionNonce(walletClient) {
|
252
254
|
return updateActiveVouchersSessionNonce(this.executorAddress, walletClient);
|
253
255
|
}
|
256
|
+
/**
|
257
|
+
* Get an attested decryptor for the given wallet client.
|
258
|
+
*
|
259
|
+
* @param walletClient - The wallet client used for signing the attested decrypt request
|
260
|
+
* @param handles - The handles to decrypt
|
261
|
+
* @param backoffConfig - The backoff configuration for the attested decrypt request
|
262
|
+
* @returns The decryption attestations
|
263
|
+
*
|
264
|
+
* @example
|
265
|
+
* ```typescript
|
266
|
+
* const response = await lightning.attestedDecrypt(walletClient, [handle1, handle2]);
|
267
|
+
* const { plaintext, covalidatorSignature } = response[0];
|
268
|
+
* ```
|
269
|
+
*/
|
270
|
+
attestedDecrypt(walletClient, handles, backoffConfig) {
|
271
|
+
return attestedDecrypt({
|
272
|
+
handles,
|
273
|
+
backoffConfig,
|
274
|
+
chainId: Number(this.chainId),
|
275
|
+
walletClient,
|
276
|
+
kmsConnectRpcEndpointOrClient: this.kmsClient,
|
277
|
+
});
|
278
|
+
}
|
279
|
+
/**
|
280
|
+
* Get an attested compute for the given wallet client.
|
281
|
+
*
|
282
|
+
* @param walletClient - The wallet client used for signing the attested compute request
|
283
|
+
* @param lhsHandle - The handle to compute
|
284
|
+
* @param op - The operation to perform
|
285
|
+
* @param rhsPlaintext - The plaintext to compute with
|
286
|
+
* @param backoffConfig - The backoff configuration for the attested compute request
|
287
|
+
* @returns The decryption attestation
|
288
|
+
*
|
289
|
+
* @example
|
290
|
+
* ```typescript
|
291
|
+
* import { AttestedComputeSupportedOps } from '../lite/attested-compute.js';
|
292
|
+
* const lhsHandle = '0x...';
|
293
|
+
* const rhsPlaintext = 1337n;
|
294
|
+
* const op = AttestedComputeSupportedOps.Eq;
|
295
|
+
* const response = await lightning.attestedCompute(walletClient, lhsHandle, op, rhsPlaintext);
|
296
|
+
* const { plaintext, covalidatorSignature, handle } = response;
|
297
|
+
* ```
|
298
|
+
*/
|
299
|
+
attestedCompute(walletClient, lhsHandle, op, rhsPlaintext, backoffConfig) {
|
300
|
+
return attestedCompute({
|
301
|
+
walletClient,
|
302
|
+
kmsConnectRpcEndpointOrClient: this.kmsClient,
|
303
|
+
chainId: Number(this.chainId),
|
304
|
+
lhsHandle,
|
305
|
+
op,
|
306
|
+
rhsPlaintext,
|
307
|
+
backoffConfig,
|
308
|
+
});
|
309
|
+
}
|
254
310
|
/**
|
255
311
|
* Get the GRPC endpoint for the covalidator that services this deployment.
|
256
312
|
*/
|
@@ -281,4 +337,4 @@ export class Lightning {
|
|
281
337
|
}
|
282
338
|
}
|
283
339
|
}
|
284
|
-
//# sourceMappingURL=data:application/json;base64,
|
340
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/lite/lightning.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,MAAM,aAAa,CAAC;AAClC,OAAO,EAAkB,UAAU,EAA2B,MAAM,MAAM,CAAC;AAC3E,OAAO,EAAE,WAAW,EAAE,MAAM,aAAa,CAAC;AAC1C,OAAO,EACL,eAAe,EACf,qBAAqB,EACrB,gCAAgC,GACjC,MAAM,+BAA+B,CAAC;AAEvC,OAAO,EAAE,eAAe,EAAE,MAAM,wCAAwC,CAAC;AAEzE,OAAO,EAAE,eAAe,EAAE,MAAM,wCAAwC,CAAC;AAEzE,OAAO,EAAW,SAAS,EAAE,YAAY,EAAE,MAAM,cAAc,CAAC;AAEhE,OAAO,EAAe,iBAAiB,EAA4C,MAAM,wBAAwB,CAAC;AAElH,OAAO,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAC;AACjE,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAE,WAAW,EAAE,MAAM,cAAc,CAAC;AAC3C,OAAO,EAAgB,aAAa,EAAE,MAAM,mBAAmB,CAAC;AAGhE,OAAO,EAAE,KAAK,EAAE,MAAM,cAAc,CAAC;AACrC,OAAO,EAAE,wBAAwB,EAAE,wBAAwB,EAAE,iBAAiB,EAAoB,MAAM,YAAY,CAAC;AACrH,OAAO,EAAE,YAAY,EAAE,mBAAmB,EAAE,MAAM,gBAAgB,CAAC;AAwBnE,MAAM,aAAa,GAAoB,SAAS,CAAC;AAuBjD;;;GAGG;AACH,MAAM,OAAO,SAAS;IAUD;IACD;IAVF,eAAe,CAAU;IACzB,cAAc,CAAY;IAC1B,OAAO,CAAS;IAEf,SAAS,CAAyB;IAClC,gBAAgB,CAAmB;IACnC,SAAS,CAA4B;IAEtD,YACmB,WAAc,EACf,cAAsB;QADrB,gBAAW,GAAX,WAAW,CAAG;QACf,mBAAc,GAAd,cAAc,CAAQ;QAEtC,IAAI,CAAC,eAAe,GAAG,YAAY,CAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACjE,IAAI,CAAC,cAAc,GAAG,KAAK,CAAC,SAAS,EAAE,WAAW,CAAC,cAAc,CAAC,CAAC;QACnE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE3C,IAAI,CAAC,gBAAgB,GAAG,wBAAwB,EAAE,CAAC;QACnD,IAAI,CAAC,SAAS,GAAG,YAAY,CAAC,cAAc,CAAC,CAAC;QAC9C,IAAI,CAAC,SAAS,GAAG,iBAAiB,CAAC;YACjC,MAAM,EAAE,iBAAiB,CAAC,KAAK;YAC/B,OAAO,EAAE,wBAAwB,CAAC,UAAU,CAAC,KAAK,CAAC,SAAS,EAAE,WAAW,CAAC,cAAc,CAAC,CAAC,CAAC;YAC3F,QAAQ,EAAE,IAAI,CAAC,gBAAgB;SAChC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,kBAAkB;QACvB,OAAO,SAAS,CAAC,MAAM,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE,CAAC,CAAC;IACrD,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,SAAS,CAAC,GAAoC;QACnD,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,OAAO,SAAS,CAAC,MAAM,CAAC,wBAAwB,CAAC,aAAa,CAAC,CAAC,CAAC;QACnE,CAAC;QACD,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,OAAO,SAAS,CAAC,MAAM,CAAC,wBAAwB,CAAC,GAAG,CAAC,CAAC,CAAC;QACzD,CAAC;QACD,MAAM,IAAI,GAAG,wBAAwB,CAAC,aAAa,CAAC,CAAC;QACrD,OAAO,SAAS,CAAC,MAAM,CAAC;YACtB,sEAAsE;YACtE,OAAO,EAAE,GAAG,CAAC,yBAAyB,CAAC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,yBAAyB,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO;YAC7F,cAAc,EAAE,GAAG,CAAC,eAAe,IAAI,IAAI,CAAC,cAAc;YAC1D,eAAe,EAAE,GAAG,CAAC,8BAA8B,IAAI,IAAI,CAAC,eAAe,IAAI,uBAAuB;YACtG,uCAAuC;YACvC,eAAe,EAAE,GAAG,CAAC,gBAAgB;YACrC,cAAc,EAAE,GAAG,CAAC,gBAAgB;YACpC,gBAAgB,EAAE,GAAG,CAAC,kBAAkB;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,QAAiB;QAC7C,MAAM,GAAG,GAAG,QAAQ,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAC/D,MAAM,GAAG,GAAG,aAAa,CAAC,GAAG,CAAC,CAAC;QAC/B,OAAO,SAAS,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;IAClC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,EAAE,CAAC,EAAgB;QACxB,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,CAAC,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,EAAE,CAAC,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAAC;YAClF,CAAC,CAAC,oBAAoB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,eAAe,KAAK,EAAE,CAAC,eAAe,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAAC,CAAC;QAC3G,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,2BAA2B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;QACnE,CAAC;QACD,OAAO,IAAI,SAAS,CAAC,UAAU,EAAE,SAAS,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC,CAAC;IAC5E,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,MAAM,CAAyB,MAAS;QAC7C,OAAO,IAAI,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,cAAc,CAAC,CAAC;IACtD,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,gBAAgB,CAAmB,MAAS,EAAE,OAAgB;QACnE,sEAAsE;QACtE,MAAM,cAAc,GAAG,oBAAoB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,IAAI,CAAC,CAAC,OAAO,KAAK,OAAO,CAAC,CAAC;QACtG,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,4GAA4G;YAC5G,wBAAwB;YACxB,MAAM,IAAI,KAAK,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;QACD,OAAO,cAAc,CAAC;IACxB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,MAAM,CAAmB,MAAS,EAAE,OAAgB;QACzD,OAAO,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,EAAE,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CACX,KAAQ,EACR,EAAE,cAAc,EAAE,WAAW,EAAqB;QAElD,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC;YAC1C,SAAS,EAAE,SAAS,CAAC,kBAAkB,CAAC,KAAK,CAAC;YAC9C,OAAO,EAAE;gBACP,WAAW,EAAE,IAAI,CAAC,OAAO;gBACzB,UAAU,EAAE,IAAI,CAAC,eAAe;gBAChC,WAAW,EAAE,YAAY,CAAC,cAAc,CAAC;gBACzC,eAAe,EAAE,YAAY,CAAC,WAAW,CAAC;aAC3C;SACF,CAAC,CAAC;QACH,OAAO,UAAU,CAAC,KAAK,CAAC;IAC1B,CAAC;IAED;;;;;;OAMG;IACH,cAAc,CAAC,YAAqD;QAClE,OAAO,mBAAmB,CAAC;YACzB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;SACxC,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACH,+BAA+B,CAC7B,YAAqD,EACrD,cAAsB,EACtB,SAAe,EACf,sBAA8B;QAE9B,OAAO,eAAe,CAAC;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,8BAA8B,EAAE,YAAY,CAAC,sBAAsB,CAAC;YACpE,cAAc,EAAE,YAAY,CAAC,cAAc,CAAC;YAC5C,kBAAkB,EAAE,YAAY;YAChC,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACH,uBAAuB,CAAC,uBAAgD,EAAE,gBAAkC;QAC1G,OAAO,qBAAqB,CAAC;YAC3B,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,gBAAgB;YAChB,uBAAuB;SACxB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;OAQG;IACH,gCAAgC,CAAC,YAAqD;QACpF,OAAO,gCAAgC,CAAC,IAAI,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IAC9E,CAAC;IAED;;;;;;;;;;;;;OAaG;IACH,eAAe,CACb,YAAqD,EACrD,OAAoB,EACpB,aAAsC;QAEtC,OAAO,eAAe,CAAC;YACrB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;SAC9C,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACH,eAAe,CACb,YAAqD,EACrD,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,aAAsC;QAEtC,OAAO,eAAe,CAAC;YACrB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,iBAAiB,CAAC,UAAgD;QAC9E,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,UAAU,CAAC;QACxD,OAAO,WAAW,eAAe,CAAC,WAAW,EAAE,IAAI,OAAO,IAAI,MAAM,WAAW,CAAC;IAClF,CAAC;IAEO,MAAM,CAAC,UAAU,CAAC,EAAgB;QACxC,OAAQ,EAAuB,CAAC,IAAI,KAAK,SAAS,CAAC;IACrD,CAAC;IAEO,MAAM,CAAC,kBAAkB,CAC/B,KAAQ;QAER,IAAI,OAAO,KAAK,KAAK,SAAS,EAAE,CAAC;YAC/B,OAAO;gBACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,WAAW,CAAC,KAAK;gBACvB,KAAK,EAAE,KAAK;aACsC,CAAC;QACvD,CAAC;aAAM,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAClE,OAAO;gBACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,WAAW,CAAC,QAAQ;gBAC1B,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC;aAC8B,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oBAAoB,OAAO,KAAK,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;CACF"}
|