@inco/js 0.3.2 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +4 -1
- package/dist/cjs/advancedacl/session-key.d.ts +30 -1
- package/dist/cjs/advancedacl/session-key.js +222 -54
- package/dist/cjs/attestedcompute/attested-compute.d.ts +2 -0
- package/dist/cjs/attestedcompute/attested-compute.js +19 -10
- package/dist/cjs/attestedcompute/types.d.ts +3 -2
- package/dist/cjs/attestedcompute/types.js +1 -1
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +2 -0
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +31 -13
- package/dist/cjs/attesteddecrypt/types.d.ts +3 -2
- package/dist/cjs/attesteddecrypt/types.js +1 -1
- package/dist/cjs/attestedreveal/attested-reveal.d.ts +21 -0
- package/dist/cjs/attestedreveal/attested-reveal.js +67 -0
- package/dist/cjs/attestedreveal/index.d.ts +1 -0
- package/dist/cjs/{fhevm → attestedreveal}/index.js +2 -2
- package/dist/cjs/attestedreveal/types.d.ts +7 -0
- package/dist/cjs/attestedreveal/types.js +16 -0
- package/dist/cjs/binary.js +6 -3
- package/dist/cjs/chain.js +5 -2
- package/dist/cjs/encryption/encryption.js +1 -1
- package/dist/cjs/generated/abis/TestElist.d.ts +247 -0
- package/dist/cjs/generated/abis/TestElist.js +152 -0
- package/dist/cjs/generated/abis/addTwo.d.ts +12 -30
- package/dist/cjs/generated/abis/addTwo.js +7 -18
- package/dist/cjs/generated/abis/lightning-preview.d.ts +98 -979
- package/dist/cjs/generated/abis/lightning-preview.js +100 -635
- package/dist/cjs/generated/abis/lightning.d.ts +80 -425
- package/dist/cjs/generated/abis/lightning.js +64 -317
- package/dist/{esm/generated/abis/inco-fhevm.d.ts → cjs/generated/abis/verifier.d.ts} +610 -468
- package/dist/cjs/generated/abis/verifier.js +704 -0
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.js +1 -1
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.js +1 -1
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +63 -5
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +18 -8
- package/dist/cjs/generated/es/inco/kms/lite/v1/types_pb.js +1 -1
- package/dist/cjs/generated/lightning.d.ts +31 -10
- package/dist/cjs/generated/lightning.js +33 -11
- package/dist/cjs/handle.d.ts +1 -1
- package/dist/cjs/handle.js +5 -3
- package/dist/cjs/kms/client.js +1 -1
- package/dist/cjs/lite/attested-compute.d.ts +6 -3
- package/dist/cjs/lite/attested-compute.js +7 -1
- package/dist/cjs/lite/attested-decrypt.d.ts +2 -0
- package/dist/cjs/lite/attested-decrypt.js +5 -1
- package/dist/cjs/lite/deployments.js +1 -1
- package/dist/cjs/lite/ecies.d.ts +2 -2
- package/dist/cjs/lite/ecies.js +3 -3
- package/dist/cjs/lite/hadu.d.ts +1 -1
- package/dist/cjs/lite/hadu.js +2 -2
- package/dist/cjs/lite/index.d.ts +4 -1
- package/dist/cjs/lite/index.js +3 -1
- package/dist/cjs/lite/lightning.d.ts +33 -1
- package/dist/cjs/lite/lightning.js +60 -47
- package/dist/cjs/lite/reencrypt.d.ts +0 -1
- package/dist/cjs/lite/reencrypt.js +10 -21
- package/dist/cjs/local/local-node.js +38 -3
- package/dist/cjs/reencryption/eip712.d.ts +2 -2
- package/dist/cjs/reencryption/eip712.js +2 -11
- package/dist/cjs/reencryption/types.d.ts +1 -2
- package/dist/cjs/retry.d.ts +1 -1
- package/dist/cjs/retry.js +2 -2
- package/dist/cjs/schema.js +1 -1
- package/dist/cjs/viem.d.ts +12 -15
- package/dist/cjs/viem.js +9 -2
- package/dist/esm/advancedacl/session-key.d.ts +30 -1
- package/dist/esm/advancedacl/session-key.js +218 -52
- package/dist/esm/attestedcompute/attested-compute.d.ts +2 -0
- package/dist/esm/attestedcompute/attested-compute.js +17 -9
- package/dist/esm/attestedcompute/types.d.ts +3 -2
- package/dist/esm/attestedcompute/types.js +1 -1
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +2 -0
- package/dist/esm/attesteddecrypt/attested-decrypt.js +29 -12
- package/dist/esm/attesteddecrypt/types.d.ts +3 -2
- package/dist/esm/attesteddecrypt/types.js +1 -1
- package/dist/esm/attestedreveal/attested-reveal.d.ts +21 -0
- package/dist/esm/attestedreveal/attested-reveal.js +64 -0
- package/dist/esm/attestedreveal/index.d.ts +1 -0
- package/dist/esm/attestedreveal/index.js +2 -0
- package/dist/esm/attestedreveal/types.d.ts +7 -0
- package/dist/esm/attestedreveal/types.js +12 -0
- package/dist/esm/binary.js +6 -3
- package/dist/esm/chain.js +5 -2
- package/dist/esm/encryption/encryption.js +1 -1
- package/dist/esm/generated/abis/TestElist.d.ts +247 -0
- package/dist/esm/generated/abis/TestElist.js +149 -0
- package/dist/esm/generated/abis/addTwo.d.ts +12 -30
- package/dist/esm/generated/abis/addTwo.js +7 -18
- package/dist/esm/generated/abis/lightning-preview.d.ts +98 -979
- package/dist/esm/generated/abis/lightning-preview.js +100 -635
- package/dist/esm/generated/abis/lightning.d.ts +80 -425
- package/dist/esm/generated/abis/lightning.js +64 -317
- package/dist/{cjs/generated/abis/inco-fhevm.d.ts → esm/generated/abis/verifier.d.ts} +610 -468
- package/dist/esm/generated/abis/verifier.js +701 -0
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.js +1 -1
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.js +1 -1
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +63 -5
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +17 -7
- package/dist/esm/generated/es/inco/kms/lite/v1/types_pb.js +1 -1
- package/dist/esm/generated/lightning.d.ts +31 -10
- package/dist/esm/generated/lightning.js +33 -11
- package/dist/esm/handle.d.ts +1 -1
- package/dist/esm/handle.js +5 -3
- package/dist/esm/kms/client.js +1 -1
- package/dist/esm/lite/attested-compute.d.ts +6 -3
- package/dist/esm/lite/attested-compute.js +4 -2
- package/dist/esm/lite/attested-decrypt.d.ts +2 -0
- package/dist/esm/lite/attested-decrypt.js +3 -2
- package/dist/esm/lite/deployments.js +1 -1
- package/dist/esm/lite/ecies.d.ts +2 -2
- package/dist/esm/lite/ecies.js +4 -4
- package/dist/esm/lite/hadu.d.ts +1 -1
- package/dist/esm/lite/hadu.js +2 -2
- package/dist/esm/lite/index.d.ts +4 -1
- package/dist/esm/lite/index.js +3 -1
- package/dist/esm/lite/lightning.d.ts +33 -1
- package/dist/esm/lite/lightning.js +63 -50
- package/dist/esm/lite/reencrypt.d.ts +0 -1
- package/dist/esm/lite/reencrypt.js +13 -23
- package/dist/esm/local/local-node.js +38 -3
- package/dist/esm/reencryption/eip712.d.ts +2 -2
- package/dist/esm/reencryption/eip712.js +2 -11
- package/dist/esm/reencryption/types.d.ts +1 -2
- package/dist/esm/retry.d.ts +1 -1
- package/dist/esm/retry.js +2 -2
- package/dist/esm/schema.js +1 -1
- package/dist/esm/viem.d.ts +12 -15
- package/dist/esm/viem.js +10 -3
- package/dist/types/advancedacl/session-key.d.ts +30 -1
- package/dist/types/attestedcompute/attested-compute.d.ts +2 -0
- package/dist/types/attestedcompute/types.d.ts +3 -2
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +2 -0
- package/dist/types/attesteddecrypt/types.d.ts +3 -2
- package/dist/types/attestedreveal/attested-reveal.d.ts +21 -0
- package/dist/types/attestedreveal/index.d.ts +1 -0
- package/dist/types/attestedreveal/types.d.ts +7 -0
- package/dist/types/generated/abis/TestElist.d.ts +247 -0
- package/dist/types/generated/abis/addTwo.d.ts +12 -30
- package/dist/types/generated/abis/lightning-preview.d.ts +98 -979
- package/dist/types/generated/abis/lightning.d.ts +80 -425
- package/dist/types/generated/abis/{inco-fhevm.d.ts → verifier.d.ts} +610 -468
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +63 -5
- package/dist/types/generated/lightning.d.ts +31 -10
- package/dist/types/handle.d.ts +1 -1
- package/dist/types/lite/attested-compute.d.ts +6 -3
- package/dist/types/lite/attested-decrypt.d.ts +2 -0
- package/dist/types/lite/ecies.d.ts +2 -2
- package/dist/types/lite/hadu.d.ts +1 -1
- package/dist/types/lite/index.d.ts +4 -1
- package/dist/types/lite/lightning.d.ts +33 -1
- package/dist/types/lite/reencrypt.d.ts +0 -1
- package/dist/types/reencryption/eip712.d.ts +2 -2
- package/dist/types/reencryption/types.d.ts +1 -2
- package/dist/types/retry.d.ts +1 -1
- package/dist/types/viem.d.ts +12 -15
- package/package.json +40 -53
- package/dist/cjs/fhevm/fhe-environment.d.ts +0 -9
- package/dist/cjs/fhevm/fhe-environment.js +0 -11
- package/dist/cjs/fhevm/fhevm.d.ts +0 -41
- package/dist/cjs/fhevm/fhevm.js +0 -145
- package/dist/cjs/fhevm/index.d.ts +0 -1
- package/dist/cjs/fhevm/reencrypt.d.ts +0 -20
- package/dist/cjs/fhevm/reencrypt.js +0 -127
- package/dist/cjs/fhevm/tfhe.d.ts +0 -74
- package/dist/cjs/fhevm/tfhe.js +0 -336
- package/dist/cjs/fhevm/types.d.ts +0 -3
- package/dist/cjs/fhevm/types.js +0 -29
- package/dist/cjs/generated/abis/inco-fhevm.js +0 -681
- package/dist/cjs/generated/es/cosmos/msg/v1/msg_pb.d.ts +0 -29
- package/dist/cjs/generated/es/cosmos/msg/v1/msg_pb.js +0 -36
- package/dist/cjs/generated/es/google/api/annotations_pb.d.ts +0 -13
- package/dist/cjs/generated/es/google/api/annotations_pb.js +0 -30
- package/dist/cjs/generated/es/google/api/http_pb.d.ts +0 -440
- package/dist/cjs/generated/es/google/api/http_pb.js +0 -37
- package/dist/cjs/generated/es/inco/fhe/v1/events_pb.d.ts +0 -79
- package/dist/cjs/generated/es/inco/fhe/v1/events_pb.js +0 -24
- package/dist/cjs/generated/es/inco/fhe/v1/genesis_pb.d.ts +0 -252
- package/dist/cjs/generated/es/inco/fhe/v1/genesis_pb.js +0 -49
- package/dist/cjs/generated/es/inco/fhe/v1/query_pb.d.ts +0 -569
- package/dist/cjs/generated/es/inco/fhe/v1/query_pb.js +0 -111
- package/dist/cjs/generated/es/inco/fhe/v1/tx_pb.d.ts +0 -494
- package/dist/cjs/generated/es/inco/fhe/v1/tx_pb.js +0 -111
- package/dist/cjs/generated/es/inco/preflight/v1/genesis_pb.d.ts +0 -56
- package/dist/cjs/generated/es/inco/preflight/v1/genesis_pb.js +0 -23
- package/dist/cjs/generated/es/inco/preflight/v1/query_pb.d.ts +0 -100
- package/dist/cjs/generated/es/inco/preflight/v1/query_pb.js +0 -41
- package/dist/cjs/generated/es/inco/preflight/v1/tx_pb.d.ts +0 -193
- package/dist/cjs/generated/es/inco/preflight/v1/tx_pb.js +0 -51
- package/dist/cjs/generated/es/inco/preflight/v1/types_pb.d.ts +0 -144
- package/dist/cjs/generated/es/inco/preflight/v1/types_pb.js +0 -37
- package/dist/cjs/generated/fhe-environments.d.ts +0 -14
- package/dist/cjs/generated/fhe-environments.js +0 -18
- package/dist/cjs/generated/ts/amino/amino.d.ts +0 -1
- package/dist/cjs/generated/ts/amino/amino.js +0 -11
- package/dist/cjs/generated/ts/cometbft/abci/v1/types.d.ts +0 -597
- package/dist/cjs/generated/ts/cometbft/abci/v1/types.js +0 -5079
- package/dist/cjs/generated/ts/cometbft/crypto/v1/keys.d.ts +0 -27
- package/dist/cjs/generated/ts/cometbft/crypto/v1/keys.js +0 -108
- package/dist/cjs/generated/ts/cometbft/crypto/v1/proof.d.ts +0 -60
- package/dist/cjs/generated/ts/cometbft/crypto/v1/proof.js +0 -433
- package/dist/cjs/generated/ts/cometbft/types/v1/params.d.ts +0 -179
- package/dist/cjs/generated/ts/cometbft/types/v1/params.js +0 -716
- package/dist/cjs/generated/ts/cometbft/types/v1/validator.d.ts +0 -61
- package/dist/cjs/generated/ts/cometbft/types/v1/validator.js +0 -358
- package/dist/cjs/generated/ts/cosmos/app/v1alpha1/module.d.ts +0 -104
- package/dist/cjs/generated/ts/cosmos/app/v1alpha1/module.js +0 -221
- package/dist/cjs/generated/ts/cosmos/msg/v1/msg.d.ts +0 -1
- package/dist/cjs/generated/ts/cosmos/msg/v1/msg.js +0 -11
- package/dist/cjs/generated/ts/cosmos_proto/cosmos.d.ts +0 -80
- package/dist/cjs/generated/ts/cosmos_proto/cosmos.js +0 -216
- package/dist/cjs/generated/ts/gogoproto/gogo.d.ts +0 -1
- package/dist/cjs/generated/ts/gogoproto/gogo.js +0 -11
- package/dist/cjs/generated/ts/google/api/annotations.d.ts +0 -1
- package/dist/cjs/generated/ts/google/api/annotations.js +0 -11
- package/dist/cjs/generated/ts/google/api/http.d.ts +0 -371
- package/dist/cjs/generated/ts/google/api/http.js +0 -356
- package/dist/cjs/generated/ts/google/protobuf/descriptor.d.ts +0 -1228
- package/dist/cjs/generated/ts/google/protobuf/descriptor.js +0 -5108
- package/dist/cjs/generated/ts/google/protobuf/duration.d.ts +0 -99
- package/dist/cjs/generated/ts/google/protobuf/duration.js +0 -93
- package/dist/cjs/generated/ts/google/protobuf/timestamp.d.ts +0 -128
- package/dist/cjs/generated/ts/google/protobuf/timestamp.js +0 -93
- package/dist/cjs/generated/ts/google/protobuf/wrappers.d.ts +0 -111
- package/dist/cjs/generated/ts/google/protobuf/wrappers.js +0 -509
- package/dist/cjs/generated/ts/inco/abci/v1/types.d.ts +0 -35
- package/dist/cjs/generated/ts/inco/abci/v1/types.js +0 -73
- package/dist/cjs/generated/ts/inco/fhe/module/v1/module.d.ts +0 -31
- package/dist/cjs/generated/ts/inco/fhe/module/v1/module.js +0 -66
- package/dist/cjs/generated/ts/inco/fhe/v1/events.d.ts +0 -66
- package/dist/cjs/generated/ts/inco/fhe/v1/events.js +0 -190
- package/dist/cjs/generated/ts/inco/fhe/v1/genesis.d.ts +0 -117
- package/dist/cjs/generated/ts/inco/fhe/v1/genesis.js +0 -714
- package/dist/cjs/generated/ts/inco/fhe/v1/query.d.ts +0 -366
- package/dist/cjs/generated/ts/inco/fhe/v1/query.js +0 -1394
- package/dist/cjs/generated/ts/inco/fhe/v1/tx.d.ts +0 -409
- package/dist/cjs/generated/ts/inco/fhe/v1/tx.js +0 -1236
- package/dist/cjs/generated/ts/inco/fhe/v1/types.d.ts +0 -225
- package/dist/cjs/generated/ts/inco/fhe/v1/types.js +0 -990
- package/dist/cjs/generated/ts/inco/originchain/module/v1/module.d.ts +0 -30
- package/dist/cjs/generated/ts/inco/originchain/module/v1/module.js +0 -66
- package/dist/cjs/generated/ts/inco/originchain/v1/abci.d.ts +0 -80
- package/dist/cjs/generated/ts/inco/originchain/v1/abci.js +0 -331
- package/dist/cjs/generated/ts/inco/originchain/v1/events.d.ts +0 -60
- package/dist/cjs/generated/ts/inco/originchain/v1/events.js +0 -216
- package/dist/cjs/generated/ts/inco/originchain/v1/genesis.d.ts +0 -28
- package/dist/cjs/generated/ts/inco/originchain/v1/genesis.js +0 -69
- package/dist/cjs/generated/ts/inco/originchain/v1/query.d.ts +0 -116
- package/dist/cjs/generated/ts/inco/originchain/v1/query.js +0 -280
- package/dist/cjs/generated/ts/inco/originchain/v1/tx.d.ts +0 -89
- package/dist/cjs/generated/ts/inco/originchain/v1/tx.js +0 -140
- package/dist/cjs/generated/ts/inco/originchain/v1/types.d.ts +0 -58
- package/dist/cjs/generated/ts/inco/originchain/v1/types.js +0 -203
- package/dist/cjs/generated/ts/inco/preflight/module/v1/module.d.ts +0 -31
- package/dist/cjs/generated/ts/inco/preflight/module/v1/module.js +0 -66
- package/dist/cjs/generated/ts/inco/preflight/v1/genesis.d.ts +0 -41
- package/dist/cjs/generated/ts/inco/preflight/v1/genesis.js +0 -185
- package/dist/cjs/generated/ts/inco/preflight/v1/query.d.ts +0 -93
- package/dist/cjs/generated/ts/inco/preflight/v1/query.js +0 -259
- package/dist/cjs/generated/ts/inco/preflight/v1/tx.d.ts +0 -187
- package/dist/cjs/generated/ts/inco/preflight/v1/tx.js +0 -448
- package/dist/cjs/generated/ts/inco/preflight/v1/types.d.ts +0 -84
- package/dist/cjs/generated/ts/inco/preflight/v1/types.js +0 -398
- package/dist/cjs/l1/client.d.ts +0 -35
- package/dist/cjs/l1/client.js +0 -97
- package/dist/cjs/l1/index.d.ts +0 -2
- package/dist/cjs/l1/index.js +0 -19
- package/dist/cjs/l1/preflight.d.ts +0 -20
- package/dist/cjs/l1/preflight.js +0 -42
- package/dist/esm/fhevm/fhe-environment.d.ts +0 -9
- package/dist/esm/fhevm/fhe-environment.js +0 -8
- package/dist/esm/fhevm/fhevm.d.ts +0 -41
- package/dist/esm/fhevm/fhevm.js +0 -139
- package/dist/esm/fhevm/index.d.ts +0 -1
- package/dist/esm/fhevm/index.js +0 -2
- package/dist/esm/fhevm/reencrypt.d.ts +0 -20
- package/dist/esm/fhevm/reencrypt.js +0 -123
- package/dist/esm/fhevm/tfhe.d.ts +0 -74
- package/dist/esm/fhevm/tfhe.js +0 -328
- package/dist/esm/fhevm/types.d.ts +0 -3
- package/dist/esm/fhevm/types.js +0 -26
- package/dist/esm/generated/abis/inco-fhevm.js +0 -678
- package/dist/esm/generated/es/cosmos/msg/v1/msg_pb.d.ts +0 -29
- package/dist/esm/generated/es/cosmos/msg/v1/msg_pb.js +0 -33
- package/dist/esm/generated/es/google/api/annotations_pb.d.ts +0 -13
- package/dist/esm/generated/es/google/api/annotations_pb.js +0 -27
- package/dist/esm/generated/es/google/api/http_pb.d.ts +0 -440
- package/dist/esm/generated/es/google/api/http_pb.js +0 -34
- package/dist/esm/generated/es/inco/fhe/v1/events_pb.d.ts +0 -79
- package/dist/esm/generated/es/inco/fhe/v1/events_pb.js +0 -21
- package/dist/esm/generated/es/inco/fhe/v1/genesis_pb.d.ts +0 -252
- package/dist/esm/generated/es/inco/fhe/v1/genesis_pb.js +0 -46
- package/dist/esm/generated/es/inco/fhe/v1/query_pb.d.ts +0 -569
- package/dist/esm/generated/es/inco/fhe/v1/query_pb.js +0 -108
- package/dist/esm/generated/es/inco/fhe/v1/tx_pb.d.ts +0 -494
- package/dist/esm/generated/es/inco/fhe/v1/tx_pb.js +0 -108
- package/dist/esm/generated/es/inco/preflight/v1/genesis_pb.d.ts +0 -56
- package/dist/esm/generated/es/inco/preflight/v1/genesis_pb.js +0 -20
- package/dist/esm/generated/es/inco/preflight/v1/query_pb.d.ts +0 -100
- package/dist/esm/generated/es/inco/preflight/v1/query_pb.js +0 -38
- package/dist/esm/generated/es/inco/preflight/v1/tx_pb.d.ts +0 -193
- package/dist/esm/generated/es/inco/preflight/v1/tx_pb.js +0 -48
- package/dist/esm/generated/es/inco/preflight/v1/types_pb.d.ts +0 -144
- package/dist/esm/generated/es/inco/preflight/v1/types_pb.js +0 -34
- package/dist/esm/generated/fhe-environments.d.ts +0 -14
- package/dist/esm/generated/fhe-environments.js +0 -15
- package/dist/esm/generated/ts/amino/amino.d.ts +0 -1
- package/dist/esm/generated/ts/amino/amino.js +0 -8
- package/dist/esm/generated/ts/cometbft/abci/v1/types.d.ts +0 -597
- package/dist/esm/generated/ts/cometbft/abci/v1/types.js +0 -5063
- package/dist/esm/generated/ts/cometbft/crypto/v1/keys.d.ts +0 -27
- package/dist/esm/generated/ts/cometbft/crypto/v1/keys.js +0 -105
- package/dist/esm/generated/ts/cometbft/crypto/v1/proof.d.ts +0 -60
- package/dist/esm/generated/ts/cometbft/crypto/v1/proof.js +0 -430
- package/dist/esm/generated/ts/cometbft/types/v1/params.d.ts +0 -179
- package/dist/esm/generated/ts/cometbft/types/v1/params.js +0 -713
- package/dist/esm/generated/ts/cometbft/types/v1/validator.d.ts +0 -61
- package/dist/esm/generated/ts/cometbft/types/v1/validator.js +0 -353
- package/dist/esm/generated/ts/cosmos/app/v1alpha1/module.d.ts +0 -104
- package/dist/esm/generated/ts/cosmos/app/v1alpha1/module.js +0 -218
- package/dist/esm/generated/ts/cosmos/msg/v1/msg.d.ts +0 -1
- package/dist/esm/generated/ts/cosmos/msg/v1/msg.js +0 -8
- package/dist/esm/generated/ts/cosmos_proto/cosmos.d.ts +0 -80
- package/dist/esm/generated/ts/cosmos_proto/cosmos.js +0 -211
- package/dist/esm/generated/ts/gogoproto/gogo.d.ts +0 -1
- package/dist/esm/generated/ts/gogoproto/gogo.js +0 -8
- package/dist/esm/generated/ts/google/api/annotations.d.ts +0 -1
- package/dist/esm/generated/ts/google/api/annotations.js +0 -8
- package/dist/esm/generated/ts/google/api/http.d.ts +0 -371
- package/dist/esm/generated/ts/google/api/http.js +0 -353
- package/dist/esm/generated/ts/google/protobuf/descriptor.d.ts +0 -1228
- package/dist/esm/generated/ts/google/protobuf/descriptor.js +0 -5070
- package/dist/esm/generated/ts/google/protobuf/duration.d.ts +0 -99
- package/dist/esm/generated/ts/google/protobuf/duration.js +0 -90
- package/dist/esm/generated/ts/google/protobuf/timestamp.d.ts +0 -128
- package/dist/esm/generated/ts/google/protobuf/timestamp.js +0 -90
- package/dist/esm/generated/ts/google/protobuf/wrappers.d.ts +0 -111
- package/dist/esm/generated/ts/google/protobuf/wrappers.js +0 -506
- package/dist/esm/generated/ts/inco/abci/v1/types.d.ts +0 -35
- package/dist/esm/generated/ts/inco/abci/v1/types.js +0 -70
- package/dist/esm/generated/ts/inco/fhe/module/v1/module.d.ts +0 -31
- package/dist/esm/generated/ts/inco/fhe/module/v1/module.js +0 -63
- package/dist/esm/generated/ts/inco/fhe/v1/events.d.ts +0 -66
- package/dist/esm/generated/ts/inco/fhe/v1/events.js +0 -187
- package/dist/esm/generated/ts/inco/fhe/v1/genesis.d.ts +0 -117
- package/dist/esm/generated/ts/inco/fhe/v1/genesis.js +0 -711
- package/dist/esm/generated/ts/inco/fhe/v1/query.d.ts +0 -366
- package/dist/esm/generated/ts/inco/fhe/v1/query.js +0 -1391
- package/dist/esm/generated/ts/inco/fhe/v1/tx.d.ts +0 -409
- package/dist/esm/generated/ts/inco/fhe/v1/tx.js +0 -1233
- package/dist/esm/generated/ts/inco/fhe/v1/types.d.ts +0 -225
- package/dist/esm/generated/ts/inco/fhe/v1/types.js +0 -985
- package/dist/esm/generated/ts/inco/originchain/module/v1/module.d.ts +0 -30
- package/dist/esm/generated/ts/inco/originchain/module/v1/module.js +0 -63
- package/dist/esm/generated/ts/inco/originchain/v1/abci.d.ts +0 -80
- package/dist/esm/generated/ts/inco/originchain/v1/abci.js +0 -328
- package/dist/esm/generated/ts/inco/originchain/v1/events.d.ts +0 -60
- package/dist/esm/generated/ts/inco/originchain/v1/events.js +0 -213
- package/dist/esm/generated/ts/inco/originchain/v1/genesis.d.ts +0 -28
- package/dist/esm/generated/ts/inco/originchain/v1/genesis.js +0 -66
- package/dist/esm/generated/ts/inco/originchain/v1/query.d.ts +0 -116
- package/dist/esm/generated/ts/inco/originchain/v1/query.js +0 -277
- package/dist/esm/generated/ts/inco/originchain/v1/tx.d.ts +0 -89
- package/dist/esm/generated/ts/inco/originchain/v1/tx.js +0 -137
- package/dist/esm/generated/ts/inco/originchain/v1/types.d.ts +0 -58
- package/dist/esm/generated/ts/inco/originchain/v1/types.js +0 -200
- package/dist/esm/generated/ts/inco/preflight/module/v1/module.d.ts +0 -31
- package/dist/esm/generated/ts/inco/preflight/module/v1/module.js +0 -63
- package/dist/esm/generated/ts/inco/preflight/v1/genesis.d.ts +0 -41
- package/dist/esm/generated/ts/inco/preflight/v1/genesis.js +0 -182
- package/dist/esm/generated/ts/inco/preflight/v1/query.d.ts +0 -93
- package/dist/esm/generated/ts/inco/preflight/v1/query.js +0 -256
- package/dist/esm/generated/ts/inco/preflight/v1/tx.d.ts +0 -187
- package/dist/esm/generated/ts/inco/preflight/v1/tx.js +0 -445
- package/dist/esm/generated/ts/inco/preflight/v1/types.d.ts +0 -84
- package/dist/esm/generated/ts/inco/preflight/v1/types.js +0 -395
- package/dist/esm/l1/client.d.ts +0 -35
- package/dist/esm/l1/client.js +0 -93
- package/dist/esm/l1/index.d.ts +0 -2
- package/dist/esm/l1/index.js +0 -3
- package/dist/esm/l1/preflight.d.ts +0 -20
- package/dist/esm/l1/preflight.js +0 -39
- package/dist/types/fhevm/fhe-environment.d.ts +0 -9
- package/dist/types/fhevm/fhevm.d.ts +0 -41
- package/dist/types/fhevm/index.d.ts +0 -1
- package/dist/types/fhevm/reencrypt.d.ts +0 -20
- package/dist/types/fhevm/tfhe.d.ts +0 -74
- package/dist/types/fhevm/types.d.ts +0 -3
- package/dist/types/generated/es/cosmos/msg/v1/msg_pb.d.ts +0 -29
- package/dist/types/generated/es/google/api/annotations_pb.d.ts +0 -13
- package/dist/types/generated/es/google/api/http_pb.d.ts +0 -440
- package/dist/types/generated/es/inco/fhe/v1/events_pb.d.ts +0 -79
- package/dist/types/generated/es/inco/fhe/v1/genesis_pb.d.ts +0 -252
- package/dist/types/generated/es/inco/fhe/v1/query_pb.d.ts +0 -569
- package/dist/types/generated/es/inco/fhe/v1/tx_pb.d.ts +0 -494
- package/dist/types/generated/es/inco/preflight/v1/genesis_pb.d.ts +0 -56
- package/dist/types/generated/es/inco/preflight/v1/query_pb.d.ts +0 -100
- package/dist/types/generated/es/inco/preflight/v1/tx_pb.d.ts +0 -193
- package/dist/types/generated/es/inco/preflight/v1/types_pb.d.ts +0 -144
- package/dist/types/generated/fhe-environments.d.ts +0 -14
- package/dist/types/generated/ts/amino/amino.d.ts +0 -1
- package/dist/types/generated/ts/cometbft/abci/v1/types.d.ts +0 -597
- package/dist/types/generated/ts/cometbft/crypto/v1/keys.d.ts +0 -27
- package/dist/types/generated/ts/cometbft/crypto/v1/proof.d.ts +0 -60
- package/dist/types/generated/ts/cometbft/types/v1/params.d.ts +0 -179
- package/dist/types/generated/ts/cometbft/types/v1/validator.d.ts +0 -61
- package/dist/types/generated/ts/cosmos/app/v1alpha1/module.d.ts +0 -104
- package/dist/types/generated/ts/cosmos/msg/v1/msg.d.ts +0 -1
- package/dist/types/generated/ts/cosmos_proto/cosmos.d.ts +0 -80
- package/dist/types/generated/ts/gogoproto/gogo.d.ts +0 -1
- package/dist/types/generated/ts/google/api/annotations.d.ts +0 -1
- package/dist/types/generated/ts/google/api/http.d.ts +0 -371
- package/dist/types/generated/ts/google/protobuf/descriptor.d.ts +0 -1228
- package/dist/types/generated/ts/google/protobuf/duration.d.ts +0 -99
- package/dist/types/generated/ts/google/protobuf/timestamp.d.ts +0 -128
- package/dist/types/generated/ts/google/protobuf/wrappers.d.ts +0 -111
- package/dist/types/generated/ts/inco/abci/v1/types.d.ts +0 -35
- package/dist/types/generated/ts/inco/fhe/module/v1/module.d.ts +0 -31
- package/dist/types/generated/ts/inco/fhe/v1/events.d.ts +0 -66
- package/dist/types/generated/ts/inco/fhe/v1/genesis.d.ts +0 -117
- package/dist/types/generated/ts/inco/fhe/v1/query.d.ts +0 -366
- package/dist/types/generated/ts/inco/fhe/v1/tx.d.ts +0 -409
- package/dist/types/generated/ts/inco/fhe/v1/types.d.ts +0 -225
- package/dist/types/generated/ts/inco/originchain/module/v1/module.d.ts +0 -30
- package/dist/types/generated/ts/inco/originchain/v1/abci.d.ts +0 -80
- package/dist/types/generated/ts/inco/originchain/v1/events.d.ts +0 -60
- package/dist/types/generated/ts/inco/originchain/v1/genesis.d.ts +0 -28
- package/dist/types/generated/ts/inco/originchain/v1/query.d.ts +0 -116
- package/dist/types/generated/ts/inco/originchain/v1/tx.d.ts +0 -89
- package/dist/types/generated/ts/inco/originchain/v1/types.d.ts +0 -58
- package/dist/types/generated/ts/inco/preflight/module/v1/module.d.ts +0 -31
- package/dist/types/generated/ts/inco/preflight/v1/genesis.d.ts +0 -41
- package/dist/types/generated/ts/inco/preflight/v1/query.d.ts +0 -93
- package/dist/types/generated/ts/inco/preflight/v1/tx.d.ts +0 -187
- package/dist/types/generated/ts/inco/preflight/v1/types.d.ts +0 -84
- package/dist/types/l1/client.d.ts +0 -35
- package/dist/types/l1/index.d.ts +0 -2
- package/dist/types/l1/preflight.d.ts +0 -20
package/README.md
CHANGED
@@ -89,7 +89,10 @@ const backoffConfig: BackoffConfig = {
|
|
89
89
|
baseDelayInMs: 1000,
|
90
90
|
backoffFactor: 1.5,
|
91
91
|
};
|
92
|
-
const resultPlaintext = await reencryptor(
|
92
|
+
const resultPlaintext = await reencryptor(
|
93
|
+
{ handle: resultHandle },
|
94
|
+
backoffConfig,
|
95
|
+
);
|
93
96
|
```
|
94
97
|
|
95
98
|
## License
|
@@ -1,9 +1,14 @@
|
|
1
1
|
import type { Client } from '@connectrpc/connect';
|
2
2
|
import { type Account, type Address, type Chain, type Hex, type Transport, type WalletClient } from 'viem';
|
3
|
+
import { DecryptionAttestation } from '../attesteddecrypt/index.js';
|
4
|
+
import { SupportedChainId } from '../chain.js';
|
3
5
|
import { type EciesScheme, SupportedFheType } from '../encryption/encryption.js';
|
6
|
+
import { HexString } from '../index.js';
|
4
7
|
import type { KmsService, Secp256k1Keypair } from '../lite/index.js';
|
5
8
|
import { type ReencryptFnArgs } from '../reencryption/index.js';
|
9
|
+
import { BackoffConfig } from '../retry.js';
|
6
10
|
import type { AllowanceVoucher, AllowanceVoucherWithSig } from './types.js';
|
11
|
+
import { AttestedComputeOP } from '../attestedcompute/types.js';
|
7
12
|
export interface Session {
|
8
13
|
decrypter: Address;
|
9
14
|
expiresAt: bigint;
|
@@ -24,5 +29,29 @@ export interface SessionKeyReencryptorArgs {
|
|
24
29
|
kmsConnectRpcEndpointOrClient: string | Client<typeof KmsService>;
|
25
30
|
allowanceVoucherWithSig: AllowanceVoucherWithSig;
|
26
31
|
}
|
27
|
-
export declare function sessionKeyReencryptor({ chainId, kmsConnectRpcEndpointOrClient, ephemeralKeypair, allowanceVoucherWithSig, }: SessionKeyReencryptorArgs): Promise<(<T extends SupportedFheType>({ handle }: ReencryptFnArgs<EciesScheme, T>) => Promise<import("../encryption/encryption.js").PlaintextOf<1, 0 | 5 | 7 | 8>>)>;
|
32
|
+
export declare function sessionKeyReencryptor({ chainId, kmsConnectRpcEndpointOrClient, ephemeralKeypair, allowanceVoucherWithSig, }: SessionKeyReencryptorArgs): Promise<(<T extends SupportedFheType>({ handle, }: ReencryptFnArgs<EciesScheme, T>) => Promise<import("../encryption/encryption.js").PlaintextOf<1, 0 | 5 | 7 | 8>>)>;
|
28
33
|
export declare function updateActiveVouchersSessionNonce(incoLiteAddress: Address, sharerWalletClient: WalletClient<Transport, Chain, Account>): Promise<`0x${string}`>;
|
34
|
+
export interface SessionKeyAttestedComputeArgs {
|
35
|
+
chainId: SupportedChainId;
|
36
|
+
ephemeralKeypair: Secp256k1Keypair;
|
37
|
+
kmsConnectRpcEndpointOrClient: string | Client<typeof KmsService>;
|
38
|
+
allowanceVoucherWithSig: AllowanceVoucherWithSig;
|
39
|
+
lhsHandle: HexString;
|
40
|
+
op: AttestedComputeOP;
|
41
|
+
rhsPlaintext: bigint | boolean;
|
42
|
+
backoffConfig?: Partial<BackoffConfig> | undefined;
|
43
|
+
}
|
44
|
+
export declare function sessionKeyAttestedCompute<T extends SupportedFheType>({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsConnectRpcEndpointOrClient, ephemeralKeypair, allowanceVoucherWithSig, }: SessionKeyAttestedComputeArgs): Promise<{
|
45
|
+
handle: HexString;
|
46
|
+
plaintext: import("../encryption/encryption.js").PlaintextOf<1, T>;
|
47
|
+
covalidatorSignature: Uint8Array<ArrayBufferLike>;
|
48
|
+
}>;
|
49
|
+
export interface SessionKeyAttestedDecryptArgs {
|
50
|
+
chainId: SupportedChainId;
|
51
|
+
ephemeralKeypair: Secp256k1Keypair;
|
52
|
+
kmsConnectRpcEndpointOrClient: string | Client<typeof KmsService>;
|
53
|
+
allowanceVoucherWithSig: AllowanceVoucherWithSig;
|
54
|
+
handles: HexString[];
|
55
|
+
backoffConfig?: Partial<BackoffConfig> | undefined;
|
56
|
+
}
|
57
|
+
export declare function sessionKeyAttestedDecrypt({ chainId, kmsConnectRpcEndpointOrClient, handles, ephemeralKeypair, allowanceVoucherWithSig, backoffConfig, }: SessionKeyAttestedDecryptArgs): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
|
@@ -4,26 +4,33 @@ exports.createAllowanceVoucher = createAllowanceVoucher;
|
|
4
4
|
exports.grantSessionKey = grantSessionKey;
|
5
5
|
exports.sessionKeyReencryptor = sessionKeyReencryptor;
|
6
6
|
exports.updateActiveVouchersSessionNonce = updateActiveVouchersSessionNonce;
|
7
|
+
exports.sessionKeyAttestedCompute = sessionKeyAttestedCompute;
|
8
|
+
exports.sessionKeyAttestedDecrypt = sessionKeyAttestedDecrypt;
|
9
|
+
const protobuf_1 = require("@bufbuild/protobuf");
|
7
10
|
const viem_1 = require("viem");
|
8
11
|
const accounts_1 = require("viem/accounts");
|
12
|
+
const index_js_1 = require("../attesteddecrypt/index.js");
|
9
13
|
const chain_js_1 = require("../chain.js");
|
14
|
+
const encryption_js_1 = require("../encryption/encryption.js");
|
10
15
|
const lightning_preview_js_1 = require("../generated/abis/lightning-preview.js");
|
11
16
|
const lightning_js_1 = require("../generated/abis/lightning.js");
|
12
|
-
const
|
13
|
-
const index_js_2 = require("../
|
17
|
+
const verifier_js_1 = require("../generated/abis/verifier.js");
|
18
|
+
const index_js_2 = require("../index.js");
|
19
|
+
const index_js_3 = require("../lite/index.js");
|
20
|
+
const index_js_4 = require("../reencryption/index.js");
|
21
|
+
const retry_js_1 = require("../retry.js");
|
22
|
+
const kms_service_pb_js_1 = require("../generated/es/inco/kms/lite/v1/kms_service_pb.js");
|
23
|
+
const types_pb_js_1 = require("../generated/es/inco/kms/lite/v1/types_pb.js");
|
14
24
|
// Given a sharer's wallet client, an incoLite contract address, and a
|
15
25
|
// (verifyingContract, callFunction, sharerArgData) tuple, this function
|
16
26
|
// creates an AllowanceVoucher.
|
17
27
|
async function createAllowanceVoucher(incoLiteAddress, sharerWalletClient, verifyingContract, callFunction, sharerArgData) {
|
18
|
-
const
|
19
|
-
address: incoLiteAddress,
|
20
|
-
// Could have used the incoLightningAbi, but this is more efficient.
|
21
|
-
abi: lightning_preview_js_1.advancedAccessControlAbi,
|
22
|
-
client: sharerWalletClient,
|
23
|
-
});
|
28
|
+
const verifier = await getIncoVerifier(incoLiteAddress, sharerWalletClient);
|
24
29
|
// The session nonce in the AllowanceVoucher must match the current active
|
25
30
|
// session nonce of the sharer on-chain.
|
26
|
-
const sessionNonce = await
|
31
|
+
const sessionNonce = await verifier.read.getActiveVouchersSessionNonce([
|
32
|
+
sharerWalletClient.account.address,
|
33
|
+
]);
|
27
34
|
return {
|
28
35
|
sessionNonce,
|
29
36
|
verifyingContract,
|
@@ -37,29 +44,36 @@ async function grantSessionKey({ chainId, incoLiteAddress, sessionVerifierContra
|
|
37
44
|
decrypter: granteeAddress,
|
38
45
|
expiresAt: BigInt(Math.floor(expiresAt.getTime() / 1000)),
|
39
46
|
};
|
40
|
-
const sharerArgData = (0, viem_1.encodeAbiParameters)(getSessionAbi(), [
|
41
|
-
|
42
|
-
|
43
|
-
|
44
|
-
|
45
|
-
|
46
|
-
|
47
|
-
|
48
|
-
|
47
|
+
const sharerArgData = (0, viem_1.encodeAbiParameters)(getSessionAbi(), [
|
48
|
+
session.decrypter,
|
49
|
+
session.expiresAt,
|
50
|
+
]);
|
51
|
+
const incoVerifier = await getIncoVerifier(incoLiteAddress, sharerWalletClient);
|
52
|
+
// returned by read.eip712Domain():
|
53
|
+
// bytes1 fields,
|
54
|
+
// string memory name,
|
55
|
+
// string memory version,
|
56
|
+
// uint256 chainId,
|
57
|
+
// address verifyingContract,
|
58
|
+
// bytes32 salt,
|
59
|
+
// uint256[] memory extensions
|
60
|
+
const verifierDomain = await incoVerifier.read.eip712Domain();
|
61
|
+
const eip712DomainName = verifierDomain[1];
|
62
|
+
const eip712DomainVersion = verifierDomain[2];
|
49
63
|
const voucher = await createAllowanceVoucher(incoLiteAddress, sharerWalletClient,
|
50
64
|
// Careful that the verifying contract here is the SessionVerifier contract,
|
51
65
|
// not the incoLite contract.
|
52
66
|
sessionVerifierContractAddress, (0, viem_1.toFunctionSelector)(getCanUseSessionAbi()), sharerArgData);
|
53
|
-
const eip712Payload = (0,
|
67
|
+
const eip712Payload = (0, index_js_4.createEIP712Payload)({
|
54
68
|
chainId,
|
55
69
|
primaryType: 'AllowanceVoucher',
|
56
70
|
primaryTypeFields: getAllowanceVoucherAbi(),
|
57
71
|
message: voucher,
|
58
72
|
// Related to comment above: careful that the verifying contract here is
|
59
|
-
// the
|
60
|
-
verifyingContract:
|
61
|
-
|
62
|
-
|
73
|
+
// the incoVerifier contract (not the SessionVerifier contract).
|
74
|
+
verifyingContract: incoVerifier.address,
|
75
|
+
domainName: eip712DomainName,
|
76
|
+
domainVersion: eip712DomainVersion,
|
63
77
|
});
|
64
78
|
// Using browser extensions, this step will prompt the user to sign the
|
65
79
|
// payload.
|
@@ -73,66 +87,197 @@ async function grantSessionKey({ chainId, incoLiteAddress, sessionVerifierContra
|
|
73
87
|
// The sessionKeyReencryptor function is a reencryptor that uses a session key
|
74
88
|
// to reencrypt data.
|
75
89
|
async function sessionKeyReencryptor({ chainId, kmsConnectRpcEndpointOrClient, ephemeralKeypair, allowanceVoucherWithSig, }) {
|
76
|
-
const kmsClient = (0,
|
90
|
+
const kmsClient = (0, index_js_3.getKmsClient)(kmsConnectRpcEndpointOrClient ||
|
91
|
+
(0, index_js_3.defaultCovalidatorGrpc)((0, chain_js_1.getSupportedChain)(chainId)));
|
77
92
|
const requesterAccount = (0, accounts_1.privateKeyToAccount)(`0x${ephemeralKeypair.kp.getPrivate('hex')}`);
|
78
93
|
const ephemeralPubKey = ephemeralKeypair.encodePublicKey();
|
79
94
|
// Sign the EIP712 attesting that the requester has access to the private key
|
80
95
|
// corresponding to the ephemeral public key.
|
81
|
-
const eip712Payload = (0,
|
96
|
+
const eip712Payload = (0, index_js_3.reencryptEIP712)(chainId, ephemeralPubKey);
|
82
97
|
// Since the account is an ephemeral keypair stored in memory (not in Metamask),
|
83
98
|
// this step will NOT prompt the user with a pop-up.
|
84
99
|
const eip712Signature = await requesterAccount.signTypedData(eip712Payload);
|
85
|
-
return async function reencrypt({ handle }) {
|
86
|
-
const reencryptRequest = {
|
87
|
-
$typeName: 'inco.kms.lite.v1.ReencryptRequest',
|
100
|
+
return async function reencrypt({ handle, }) {
|
101
|
+
const reencryptRequest = (0, protobuf_1.create)(kms_service_pb_js_1.ReencryptRequestSchema, {
|
88
102
|
userAddress: requesterAccount.address,
|
89
103
|
ephemeralPubKey,
|
90
104
|
eip712Signature: (0, viem_1.hexToBytes)(eip712Signature),
|
91
105
|
handlesWithProofs: [
|
92
|
-
{
|
93
|
-
$typeName: 'inco.kms.lite.v1.HandleWithProof',
|
106
|
+
(0, protobuf_1.create)(types_pb_js_1.HandleWithProofSchema, {
|
94
107
|
handle,
|
95
108
|
aclProof: {
|
96
|
-
$typeName: 'inco.kms.lite.v1.ACLProof',
|
97
109
|
proof: {
|
98
|
-
|
99
|
-
|
100
|
-
allowanceProof: {
|
101
|
-
$typeName: 'inco.kms.lite.v1.AllowanceProof',
|
110
|
+
case: 'incoLiteAdvancedAclProof',
|
111
|
+
value: (0, protobuf_1.create)(types_pb_js_1.IncoLiteAdvancedACLProofSchema, {
|
112
|
+
allowanceProof: (0, protobuf_1.create)(types_pb_js_1.AllowanceProofSchema, {
|
102
113
|
sharer: allowanceVoucherWithSig.sharer,
|
103
|
-
voucher: {
|
104
|
-
// Converting from the AllowanceVoucher domain type to the
|
105
|
-
// AllowanceVoucher proto type.
|
106
|
-
$typeName: 'inco.kms.lite.v1.AllowanceVoucher',
|
114
|
+
voucher: (0, protobuf_1.create)(types_pb_js_1.AllowanceVoucherSchema, {
|
107
115
|
sessionNonce: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucher.sessionNonce),
|
108
116
|
verifyingContract: allowanceVoucherWithSig.voucher.verifyingContract,
|
109
117
|
callFunction: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucher.callFunction),
|
110
118
|
sharerArgData: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucher.sharerArgData),
|
111
|
-
},
|
119
|
+
}),
|
112
120
|
voucherSignature: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucherSignature),
|
113
|
-
// For SessionVerifier, the requesterArgData is empty.
|
114
121
|
requesterArgData: new Uint8Array(),
|
115
|
-
},
|
116
|
-
},
|
117
|
-
case: 'incoLiteAdvancedAclProof',
|
122
|
+
}),
|
123
|
+
}),
|
118
124
|
},
|
119
125
|
},
|
120
|
-
},
|
126
|
+
}),
|
121
127
|
],
|
122
|
-
};
|
128
|
+
});
|
123
129
|
const response = await kmsClient.reencrypt(reencryptRequest);
|
124
|
-
return (0,
|
130
|
+
return (0, index_js_3.decryptGrpcResponse)(response, ephemeralKeypair, handle);
|
125
131
|
};
|
126
132
|
}
|
127
133
|
async function updateActiveVouchersSessionNonce(incoLiteAddress, sharerWalletClient) {
|
128
|
-
const
|
129
|
-
|
130
|
-
abi: lightning_preview_js_1.advancedAccessControlAbi,
|
131
|
-
client: sharerWalletClient,
|
132
|
-
});
|
133
|
-
const txHash = await advancedACL.write.updateActiveVouchersSessionNonce();
|
134
|
+
const verifier = await getIncoVerifier(incoLiteAddress, sharerWalletClient);
|
135
|
+
const txHash = await verifier.write.updateActiveVouchersSessionNonce();
|
134
136
|
return txHash;
|
135
137
|
}
|
138
|
+
// The sessionKeyAttestedCompute function is a decryptor that uses a session key
|
139
|
+
// to compute on a handle.
|
140
|
+
async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsConnectRpcEndpointOrClient, ephemeralKeypair, allowanceVoucherWithSig, }) {
|
141
|
+
const kmsClient = (0, index_js_3.getKmsClient)(kmsConnectRpcEndpointOrClient ||
|
142
|
+
(0, index_js_3.defaultCovalidatorGrpc)((0, chain_js_1.getSupportedChain)(chainId)));
|
143
|
+
const requesterAccount = (0, accounts_1.privateKeyToAccount)(`0x${ephemeralKeypair.kp.getPrivate('hex')}`);
|
144
|
+
const rhsPlaintextBig = BigInt(rhsPlaintext);
|
145
|
+
const rhsValueBytes = (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, (0, index_js_2.getHandleType)(lhsHandle), rhsPlaintextBig);
|
146
|
+
// Sign the EIP712 attesting that the requester has access to the private key
|
147
|
+
// corresponding to the ephemeral public key.
|
148
|
+
const eip712Payload = (0, index_js_4.createEIP712Payload)({
|
149
|
+
chainId: BigInt(chainId),
|
150
|
+
primaryType: 'AttestedComputeRequest',
|
151
|
+
primaryTypeFields: [
|
152
|
+
{ name: 'op', type: 'uint8' },
|
153
|
+
{ name: 'lhsHandle', type: 'bytes32' },
|
154
|
+
{ name: 'rhsPlaintext', type: 'bytes32' },
|
155
|
+
],
|
156
|
+
message: {
|
157
|
+
op: op,
|
158
|
+
lhsHandle: lhsHandle,
|
159
|
+
rhsPlaintext: (0, index_js_2.bigintToBytes32)(rhsPlaintextBig),
|
160
|
+
},
|
161
|
+
domainName: index_js_3.ATTESTED_COMPUTE_DOMAIN_NAME,
|
162
|
+
domainVersion: index_js_3.ATTESTED_COMPUTE_DOMAIN_VERSION,
|
163
|
+
});
|
164
|
+
// Since the account is an ephemeral keypair stored in memory (not in Metamask),
|
165
|
+
// this step will NOT prompt the user with a pop-up.
|
166
|
+
const eip712Signature = await requesterAccount.signTypedData(eip712Payload);
|
167
|
+
const attestedComputeRequest = (0, protobuf_1.create)(kms_service_pb_js_1.AttestedComputeRequestSchema, {
|
168
|
+
userAddress: requesterAccount.address,
|
169
|
+
op: op,
|
170
|
+
lhsHandle: lhsHandle,
|
171
|
+
rhsPlaintext: rhsValueBytes.value.toString(16),
|
172
|
+
eip712Signature: (0, viem_1.hexToBytes)(eip712Signature),
|
173
|
+
aclProof: {
|
174
|
+
proof: {
|
175
|
+
case: 'incoLiteAdvancedAclProof',
|
176
|
+
value: (0, protobuf_1.create)(types_pb_js_1.IncoLiteAdvancedACLProofSchema, {
|
177
|
+
allowanceProof: (0, protobuf_1.create)(types_pb_js_1.AllowanceProofSchema, {
|
178
|
+
sharer: allowanceVoucherWithSig.sharer,
|
179
|
+
voucher: (0, protobuf_1.create)(types_pb_js_1.AllowanceVoucherSchema, {
|
180
|
+
sessionNonce: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucher.sessionNonce),
|
181
|
+
verifyingContract: allowanceVoucherWithSig.voucher.verifyingContract,
|
182
|
+
callFunction: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucher.callFunction),
|
183
|
+
sharerArgData: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucher.sharerArgData),
|
184
|
+
}),
|
185
|
+
voucherSignature: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucherSignature),
|
186
|
+
// For SessionVerifier, the requesterArgData is empty.
|
187
|
+
requesterArgData: new Uint8Array(),
|
188
|
+
}),
|
189
|
+
}),
|
190
|
+
},
|
191
|
+
},
|
192
|
+
});
|
193
|
+
const response = await (0, retry_js_1.retryWithBackoff)(async () => {
|
194
|
+
return await kmsClient.attestedCompute(attestedComputeRequest);
|
195
|
+
}, backoffConfig);
|
196
|
+
if (!response.decryptionAttestation) {
|
197
|
+
throw new Error('Failed to get decryption attestation from attested compute');
|
198
|
+
}
|
199
|
+
const decryptionAttestation = response.decryptionAttestation;
|
200
|
+
if (decryptionAttestation.plaintext === undefined) {
|
201
|
+
throw new Error('No plaintext in compute response');
|
202
|
+
}
|
203
|
+
const bigIntValue = (0, index_js_2.bytesToBigInt)(decryptionAttestation.plaintext);
|
204
|
+
return {
|
205
|
+
handle: decryptionAttestation.handle,
|
206
|
+
plaintext: (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, (0, index_js_2.getHandleType)(lhsHandle), bigIntValue),
|
207
|
+
covalidatorSignature: decryptionAttestation.signature,
|
208
|
+
};
|
209
|
+
}
|
210
|
+
// The sessionKeyAttestedDecrypt function is a decryptor that uses a session key
|
211
|
+
// to decrypt data.
|
212
|
+
async function sessionKeyAttestedDecrypt({ chainId, kmsConnectRpcEndpointOrClient, handles, ephemeralKeypair, allowanceVoucherWithSig, backoffConfig, }) {
|
213
|
+
const kmsClient = (0, index_js_3.getKmsClient)(kmsConnectRpcEndpointOrClient ||
|
214
|
+
(0, index_js_3.defaultCovalidatorGrpc)((0, chain_js_1.getSupportedChain)(chainId)));
|
215
|
+
const requesterAccount = (0, accounts_1.privateKeyToAccount)(`0x${ephemeralKeypair.kp.getPrivate('hex')}`);
|
216
|
+
// Sign the EIP712 attesting that the requester has access to the private key
|
217
|
+
// corresponding to the ephemeral public key.
|
218
|
+
const eip712Payload = (0, index_js_4.createEIP712Payload)({
|
219
|
+
chainId: BigInt(chainId),
|
220
|
+
primaryType: 'AttestedDecryptRequest',
|
221
|
+
primaryTypeFields: [{ name: 'handles', type: 'bytes32[]' }],
|
222
|
+
message: {
|
223
|
+
handles: handles,
|
224
|
+
},
|
225
|
+
domainName: index_js_3.ATTESTED_DECRYPT_DOMAIN_NAME,
|
226
|
+
domainVersion: index_js_3.ATTESTED_DECRYPT_DOMAIN_VERSION,
|
227
|
+
});
|
228
|
+
// Since the account is an ephemeral keypair stored in memory (not in Metamask),
|
229
|
+
// this step will NOT prompt the user with a pop-up.
|
230
|
+
const eip712Signature = await requesterAccount.signTypedData(eip712Payload);
|
231
|
+
const handlesWithProofs = handles.map((handle) => {
|
232
|
+
return (0, protobuf_1.create)(types_pb_js_1.HandleWithProofSchema, {
|
233
|
+
handle: handle,
|
234
|
+
aclProof: {
|
235
|
+
proof: {
|
236
|
+
case: 'incoLiteAdvancedAclProof',
|
237
|
+
value: (0, protobuf_1.create)(types_pb_js_1.IncoLiteAdvancedACLProofSchema, {
|
238
|
+
allowanceProof: (0, protobuf_1.create)(types_pb_js_1.AllowanceProofSchema, {
|
239
|
+
sharer: allowanceVoucherWithSig.sharer,
|
240
|
+
voucher: (0, protobuf_1.create)(types_pb_js_1.AllowanceVoucherSchema, {
|
241
|
+
sessionNonce: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucher.sessionNonce),
|
242
|
+
verifyingContract: allowanceVoucherWithSig.voucher.verifyingContract,
|
243
|
+
callFunction: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucher.callFunction),
|
244
|
+
sharerArgData: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucher.sharerArgData),
|
245
|
+
}),
|
246
|
+
voucherSignature: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucherSignature),
|
247
|
+
requesterArgData: new Uint8Array(),
|
248
|
+
}),
|
249
|
+
}),
|
250
|
+
},
|
251
|
+
},
|
252
|
+
});
|
253
|
+
});
|
254
|
+
const attestedDecryptRequest = (0, protobuf_1.create)(kms_service_pb_js_1.AttestedDecryptRequestSchema, {
|
255
|
+
userAddress: requesterAccount.address,
|
256
|
+
handlesWithProofs: handlesWithProofs,
|
257
|
+
eip712Signature: (0, viem_1.hexToBytes)(eip712Signature),
|
258
|
+
});
|
259
|
+
const response = await (0, retry_js_1.retryWithBackoff)(async () => {
|
260
|
+
return await kmsClient.attestedDecrypt(attestedDecryptRequest);
|
261
|
+
}, backoffConfig);
|
262
|
+
if (!response.decryptionAttestations ||
|
263
|
+
response.decryptionAttestations.length === 0) {
|
264
|
+
throw new index_js_1.AttestedDecryptError('No decryption attestations in response');
|
265
|
+
}
|
266
|
+
const results = response.decryptionAttestations.map((att) => {
|
267
|
+
if (att.plaintext === undefined) {
|
268
|
+
throw new index_js_1.AttestedDecryptError('No plaintext in attestation');
|
269
|
+
}
|
270
|
+
const h = att.handle;
|
271
|
+
const handleType = (0, index_js_2.getHandleType)(h);
|
272
|
+
const bigIntValue = (0, index_js_2.bytesToBigInt)(att.plaintext);
|
273
|
+
return {
|
274
|
+
handle: h,
|
275
|
+
plaintext: (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, handleType, bigIntValue),
|
276
|
+
covalidatorSignature: att.signature,
|
277
|
+
};
|
278
|
+
});
|
279
|
+
return results;
|
280
|
+
}
|
136
281
|
// Below are helpers to get ABIs of functions/structs from the SessionVerifier
|
137
282
|
// contract.
|
138
283
|
// Get the ABI of the `AllowanceVoucher` struct.
|
@@ -173,4 +318,27 @@ function getCanUseSessionAbi() {
|
|
173
318
|
}
|
174
319
|
return canUseSession;
|
175
320
|
}
|
176
|
-
|
321
|
+
function getAdvancedAcl(incoVerifierAddress, sharerWalletClient) {
|
322
|
+
return (0, viem_1.getContract)({
|
323
|
+
address: incoVerifierAddress,
|
324
|
+
abi: lightning_preview_js_1.advancedAccessControlAbi,
|
325
|
+
client: sharerWalletClient,
|
326
|
+
});
|
327
|
+
}
|
328
|
+
function getIncoLightning(incoLiteAddress, walletClient) {
|
329
|
+
return (0, viem_1.getContract)({
|
330
|
+
address: incoLiteAddress,
|
331
|
+
abi: lightning_js_1.incoLightningAbi,
|
332
|
+
client: walletClient,
|
333
|
+
});
|
334
|
+
}
|
335
|
+
async function getIncoVerifier(incoLiteAddress, walletClient) {
|
336
|
+
const incoLite = getIncoLightning(incoLiteAddress, walletClient);
|
337
|
+
const incoVerifierAddress = await incoLite.read.incoVerifier();
|
338
|
+
return (0, viem_1.getContract)({
|
339
|
+
address: incoVerifierAddress,
|
340
|
+
abi: verifier_js_1.incoVerifierAbi,
|
341
|
+
client: walletClient,
|
342
|
+
});
|
343
|
+
}
|
344
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"session-key.js","sourceRoot":"","sources":["../../../src/advancedacl/session-key.ts"],"names":[],"mappings":";;AA8FA,wDAqBC;AAwBD,0CAiEC;AAsBD,sDAkEC;AAED,4EAOC;AA6BD,8DA8GC;AA0BD,8DA0GC;AA5jBD,iDAA4C;AAE5C,+BAWc;AACd,4CAAoD;AACpD,0DAGqC;AACrC,0CAAkE;AAClE,+DAKqC;AACrC,iFAIgD;AAChD,iEAAkE;AAClE,+DAAgE;AAChE,0CAKqB;AASrB,+CAS0B;AAC1B,uDAGkC;AAClC,0CAA8D;AAI9D,0FAI4D;AAC5D,8EAKsD;AAgBtD,sEAAsE;AACtE,wEAAwE;AACxE,+BAA+B;AACxB,KAAK,UAAU,sBAAsB,CAC1C,eAAwB,EACxB,kBAA2D,EAC3D,iBAA0B,EAC1B,YAAiB,EACjB,aAAkB;IAElB,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAE5E,0EAA0E;IAC1E,wCAAwC;IACxC,MAAM,YAAY,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,6BAA6B,CAAC;QACrE,kBAAkB,CAAC,OAAO,CAAC,OAAO;KACnC,CAAC,CAAC;IAEH,OAAO;QACL,YAAY;QACZ,iBAAiB;QACjB,YAAY;QACZ,aAAa;KACd,CAAC;AACJ,CAAC;AAuBD,mDAAmD;AAC5C,KAAK,UAAU,eAAe,CAAC,EACpC,OAAO,EACP,eAAe,EACf,8BAA8B,EAC9B,cAAc,EACd,kBAAkB,EAClB,SAAS,GACW;IACpB,MAAM,OAAO,GAAG;QACd,SAAS,EAAE,cAAc;QACzB,SAAS,EAAE,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,CAAC;KAC/C,CAAC;IACb,MAAM,aAAa,GAAG,IAAA,0BAAmB,EAAC,aAAa,EAAE,EAAE;QACzD,OAAO,CAAC,SAAS;QACjB,OAAO,CAAC,SAAS;KAClB,CAAC,CAAC;IAEH,MAAM,YAAY,GAAG,MAAM,eAAe,CACxC,eAAe,EACf,kBAAkB,CACnB,CAAC;IAEF,mCAAmC;IACnC,iBAAiB;IACjB,sBAAsB;IACtB,yBAAyB;IACzB,mBAAmB;IACnB,6BAA6B;IAC7B,gBAAgB;IAChB,8BAA8B;IAC9B,MAAM,cAAc,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC9D,MAAM,gBAAgB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IAEtD,MAAM,OAAO,GAAG,MAAM,sBAAsB,CAC1C,eAAe,EACf,kBAAkB;IAClB,4EAA4E;IAC5E,6BAA6B;IAC7B,8BAA8B,EAC9B,IAAA,yBAAkB,EAAC,mBAAmB,EAAE,CAAC,EACzC,aAAa,CACd,CAAC;IACF,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO;QACP,WAAW,EAAE,kBAAkB;QAC/B,iBAAiB,EAAE,sBAAsB,EAAE;QAC3C,OAAO,EAAE,OAAO;QAChB,wEAAwE;QACxE,gEAAgE;QAChE,iBAAiB,EAAE,YAAY,CAAC,OAAO;QACvC,UAAU,EAAE,gBAAgB;QAC5B,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IAEH,uEAAuE;IACvE,WAAW;IACX,MAAM,gBAAgB,GACpB,MAAM,kBAAkB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAExD,OAAO;QACL,MAAM,EAAE,kBAAkB,CAAC,OAAO,CAAC,OAAO;QAC1C,OAAO;QACP,gBAAgB;KACjB,CAAC;AACJ,CAAC;AAoBD,8EAA8E;AAC9E,qBAAqB;AACd,KAAK,UAAU,qBAAqB,CAAC,EAC1C,OAAO,EACP,6BAA6B,EAC7B,gBAAgB,EAChB,uBAAuB,GACG;IAC1B,MAAM,SAAS,GAAG,IAAA,uBAAY,EAC5B,6BAA6B;QAC3B,IAAA,iCAAsB,EAAC,IAAA,4BAAiB,EAAC,OAAO,CAAC,CAAC,CACrD,CAAC;IACF,MAAM,gBAAgB,GAAG,IAAA,8BAAmB,EAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IACF,MAAM,eAAe,GAAG,gBAAgB,CAAC,eAAe,EAAE,CAAC;IAE3D,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,IAAA,0BAAe,EAAC,OAAO,EAAE,eAAe,CAAC,CAAC;IAChE,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAE5E,OAAO,KAAK,UAAU,SAAS,CAA6B,EAC1D,MAAM,GAC0B;QAChC,MAAM,gBAAgB,GAAqB,IAAA,iBAAM,EAAC,0CAAsB,EAAE;YACxE,WAAW,EAAE,gBAAgB,CAAC,OAAO;YACrC,eAAe;YACf,eAAe,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;YAC5C,iBAAiB,EAAE;gBACjB,IAAA,iBAAM,EAAC,mCAAqB,EAAE;oBAC5B,MAAM;oBACN,QAAQ,EAAE;wBACR,KAAK,EAAE;4BACL,IAAI,EAAE,0BAA0B;4BAChC,KAAK,EAAE,IAAA,iBAAM,EAAC,4CAA8B,EAAE;gCAC5C,cAAc,EAAE,IAAA,iBAAM,EAAC,kCAAoB,EAAE;oCAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;oCACtC,OAAO,EAAE,IAAA,iBAAM,EAAC,oCAAsB,EAAE;wCACtC,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;wCACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;wCACnD,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;wCACD,aAAa,EAAE,IAAA,iBAAU,EACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;qCACF,CAAC;oCACF,gBAAgB,EAAE,IAAA,iBAAU,EAC1B,uBAAuB,CAAC,gBAAgB,CACzC;oCACD,gBAAgB,EAAE,IAAI,UAAU,EAAE;iCACnC,CAAC;6BACH,CAAC;yBACH;qBACF;iBACF,CAAC;aACH;SACF,CAAC,CAAC;QAEH,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAC;QAC7D,OAAO,IAAA,8BAAmB,EAAC,QAAQ,EAAE,gBAAgB,EAAE,MAAM,CAAC,CAAC;IACjE,CAAC,CAAC;AACJ,CAAC;AAEM,KAAK,UAAU,gCAAgC,CACpD,eAAwB,EACxB,kBAA2D;IAE3D,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAC5E,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,KAAK,CAAC,gCAAgC,EAAE,CAAC;IACvE,OAAO,MAAM,CAAC;AAChB,CAAC;AA2BD,gFAAgF;AAChF,0BAA0B;AACnB,KAAK,UAAU,yBAAyB,CAA6B,EAC1E,SAAS,EACT,EAAE,EACF,YAAY,EACZ,aAAa,EACb,OAAO,EACP,6BAA6B,EAC7B,gBAAgB,EAChB,uBAAuB,GACO;IAC9B,MAAM,SAAS,GAAG,IAAA,uBAAY,EAC5B,6BAA6B;QAC3B,IAAA,iCAAsB,EAAC,IAAA,4BAAiB,EAAC,OAAO,CAAC,CAAC,CACrD,CAAC;IACF,MAAM,gBAAgB,GAAG,IAAA,8BAAmB,EAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IACF,MAAM,eAAe,GAAG,MAAM,CAAC,YAAY,CAAC,CAAC;IAC7C,MAAM,aAAa,GAAG,IAAA,iCAAiB,EACrC,iCAAiB,CAAC,KAAK,EACvB,IAAA,wBAAa,EAAC,SAAS,CAAM,EAC7B,eAAe,CAChB,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,OAAO,EAAE;YAC7B,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,SAAS,EAAE;YACtC,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,SAAS,EAAE;SAC1C;QACD,OAAO,EAAE;YACP,EAAE,EAAE,EAAE;YACN,SAAS,EAAE,SAAS;YACpB,YAAY,EAAE,IAAA,0BAAe,EAAC,eAAe,CAAC;SAC/C;QACD,UAAU,EAAE,uCAA4B;QACxC,aAAa,EAAE,0CAA+B;KAC/C,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAE5E,MAAM,sBAAsB,GAA2B,IAAA,iBAAM,EAC3D,gDAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,EAAE,EAAE,EAAE;QACN,SAAS,EAAE,SAAS;QACpB,YAAY,EAAE,aAAa,CAAC,KAAK,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC9C,eAAe,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;QAC5C,QAAQ,EAAE;YACR,KAAK,EAAE;gBACL,IAAI,EAAE,0BAA0B;gBAChC,KAAK,EAAE,IAAA,iBAAM,EAAC,4CAA8B,EAAE;oBAC5C,cAAc,EAAE,IAAA,iBAAM,EAAC,kCAAoB,EAAE;wBAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;wBACtC,OAAO,EAAE,IAAA,iBAAM,EAAC,oCAAsB,EAAE;4BACtC,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;4BACnD,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,aAAa,EAAE,IAAA,iBAAU,EACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;yBACF,CAAC;wBACF,gBAAgB,EAAE,IAAA,iBAAU,EAC1B,uBAAuB,CAAC,gBAAgB,CACzC;wBACD,sDAAsD;wBACtD,gBAAgB,EAAE,IAAI,UAAU,EAAE;qBACnC,CAAC;iBACH,CAAC;aACH;SACF;KACF,CACF,CAAC;IAEF,MAAM,QAAQ,GAAG,MAAM,IAAA,2BAAgB,EAAC,KAAK,IAAI,EAAE;QACjD,OAAO,MAAM,SAAS,CAAC,eAAe,CAAC,sBAAsB,CAAC,CAAC;IACjE,CAAC,EAAE,aAAa,CAAC,CAAC;IAElB,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;QACpC,MAAM,IAAI,KAAK,CACb,4DAA4D,CAC7D,CAAC;IACJ,CAAC;IAED,MAAM,qBAAqB,GAAG,QAAQ,CAAC,qBAAqB,CAAC;IAC7D,IAAI,qBAAqB,CAAC,SAAS,KAAK,SAAS,EAAE,CAAC;QAClD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;IACtD,CAAC;IAED,MAAM,WAAW,GAAG,IAAA,wBAAa,EAAC,qBAAqB,CAAC,SAAS,CAAC,CAAC;IACnE,OAAO;QACL,MAAM,EAAE,qBAAqB,CAAC,MAAmB;QACjD,SAAS,EAAE,IAAA,iCAAiB,EAC1B,iCAAiB,CAAC,KAAK,EACvB,IAAA,wBAAa,EAAC,SAAS,CAAM,EAC7B,WAAW,CACZ;QACD,oBAAoB,EAAE,qBAAqB,CAAC,SAAS;KACtD,CAAC;AACJ,CAAC;AAwBD,gFAAgF;AAChF,mBAAmB;AACZ,KAAK,UAAU,yBAAyB,CAAC,EAC9C,OAAO,EACP,6BAA6B,EAC7B,OAAO,EACP,gBAAgB,EAChB,uBAAuB,EACvB,aAAa,GACiB;IAG9B,MAAM,SAAS,GAAG,IAAA,uBAAY,EAC5B,6BAA6B;QAC3B,IAAA,iCAAsB,EAAC,IAAA,4BAAiB,EAAC,OAAO,CAAC,CAAC,CACrD,CAAC;IACF,MAAM,gBAAgB,GAAG,IAAA,8BAAmB,EAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE,CAAC,EAAE,IAAI,EAAE,SAAS,EAAE,IAAI,EAAE,WAAW,EAAE,CAAC;QAC3D,OAAO,EAAE;YACP,OAAO,EAAE,OAAO;SACjB;QACD,UAAU,EAAE,uCAA4B;QACxC,aAAa,EAAE,0CAA+B;KAC/C,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAC5E,MAAM,iBAAiB,GAA2B,OAAO,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE;QACvE,OAAO,IAAA,iBAAM,EAAC,mCAAqB,EAAE;YACnC,MAAM,EAAE,MAAM;YACd,QAAQ,EAAE;gBACR,KAAK,EAAE;oBACL,IAAI,EAAE,0BAA0B;oBAChC,KAAK,EAAE,IAAA,iBAAM,EAAC,4CAA8B,EAAE;wBAC5C,cAAc,EAAE,IAAA,iBAAM,EAAC,kCAAoB,EAAE;4BAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;4BACtC,OAAO,EAAE,IAAA,iBAAM,EAAC,oCAAsB,EAAE;gCACtC,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;gCACnD,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,aAAa,EAAE,IAAA,iBAAU,EACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;6BACF,CAAC;4BACF,gBAAgB,EAAE,IAAA,iBAAU,EAC1B,uBAAuB,CAAC,gBAAgB,CACzC;4BACD,gBAAgB,EAAE,IAAI,UAAU,EAAE;yBACnC,CAAC;qBACH,CAAC;iBACH;aACF;SACF,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,MAAM,sBAAsB,GAA2B,IAAA,iBAAM,EAC3D,gDAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,iBAAiB,EAAE,iBAAiB;QACpC,eAAe,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;KAC7C,CACF,CAAC;IAEF,MAAM,QAAQ,GAAG,MAAM,IAAA,2BAAgB,EAAC,KAAK,IAAI,EAAE;QACjD,OAAO,MAAM,SAAS,CAAC,eAAe,CAAC,sBAAsB,CAAC,CAAC;IACjE,CAAC,EAAE,aAAa,CAAC,CAAC;IAElB,IACE,CAAC,QAAQ,CAAC,sBAAsB;QAChC,QAAQ,CAAC,sBAAsB,CAAC,MAAM,KAAK,CAAC,EAC5C,CAAC;QACD,MAAM,IAAI,+BAAoB,CAAC,wCAAwC,CAAC,CAAC;IAC3E,CAAC;IAED,MAAM,OAAO,GACX,QAAQ,CAAC,sBAAsB,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE;QAC1C,IAAI,GAAG,CAAC,SAAS,KAAK,SAAS,EAAE,CAAC;YAChC,MAAM,IAAI,+BAAoB,CAAC,6BAA6B,CAAC,CAAC;QAChE,CAAC;QACD,MAAM,CAAC,GAAG,GAAG,CAAC,MAAmB,CAAC;QAClC,MAAM,UAAU,GAAG,IAAA,wBAAa,EAAC,CAAC,CAAC,CAAC;QACpC,MAAM,WAAW,GAAG,IAAA,wBAAa,EAAC,GAAG,CAAC,SAAS,CAAC,CAAC;QACjD,OAAO;YACL,MAAM,EAAE,CAAC;YACT,SAAS,EAAE,IAAA,iCAAiB,EAC1B,iCAAiB,CAAC,KAAK,EACvB,UAA8B,EAC9B,WAAW,CACZ;YACD,oBAAoB,EAAE,GAAG,CAAC,SAAS;SACpC,CAAC;IACJ,CAAC,CAAC,CAAC;IAEL,OAAO,OAAO,CAAC;AACjB,CAAC;AAED,8EAA8E;AAC9E,YAAY;AAEZ,gDAAgD;AAChD,SAAS,sBAAsB;IAC7B,2EAA2E;IAC3E,oBAAoB;IACpB,MAAM,sBAAsB,GAAG,+CAAwB,CAAC,IAAI,CAC1D,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,KAAK,wBAAwB,CACjD,CAAC;IACF,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAC5B,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;IACtD,CAAC;IAED,gEAAgE;IAChE,MAAM,qBAAqB,GAAG,sBAAsB,CAAC,MAAM,CAAC,IAAI,CAC9D,CAAC,KAAK,EAAE,EAAE,CAAC,KAAK,CAAC,YAAY,KAAK,yBAAyB,CAC5D,CAAC;IACF,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAC3B,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACrD,CAAC;IAED,OAAO,qBAAqB,CAAC,UAAU,CAAC;AAC1C,CAAC;AAED,uCAAuC;AACvC,EAAE;AACF,0EAA0E;AAC1E,4CAA4C;AAC5C,SAAS,aAAa;IACpB,MAAM,UAAU,GAAG,mCAAY,CAAC,IAAI,CAClC,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,YAAY,CACvD,CAAC;IACF,IAAI,CAAC,UAAU,EAAE,CAAC;QAChB,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;IAC1C,CAAC;IAED,MAAM,OAAO,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IACtC,IAAI,CAAC,OAAO,EAAE,CAAC;QACb,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;IACvC,CAAC;IAED,OAAO,OAAO,CAAC,UAAU,CAAC;AAC5B,CAAC;AAED,+CAA+C;AAC/C,SAAS,mBAAmB;IAC1B,MAAM,aAAa,GAAG,yCAAkB,CAAC,IAAI,CAC3C,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,eAAe,CAC1D,CAAC;IACF,IAAI,CAAC,aAAa,EAAE,CAAC;QACnB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;IAC7C,CAAC;IAED,OAAO,aAAa,CAAC;AACvB,CAAC;AAED,SAAS,cAAc,CACrB,mBAA4B,EAC5B,kBAA2D;IAE3D,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,+CAAwB;QAC7B,MAAM,EAAE,kBAAkB;KAC3B,CAAC,CAAC;AACL,CAAC;AAED,SAAS,gBAAgB,CACvB,eAAwB,EACxB,YAAqD;IAErD,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,eAAe;QACxB,GAAG,EAAE,+BAAgB;QACrB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC;AAED,KAAK,UAAU,eAAe,CAC5B,eAAwB,EACxB,YAAqD;IAErD,MAAM,QAAQ,GAAG,gBAAgB,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IACjE,MAAM,mBAAmB,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC/D,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,6BAAe;QACpB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC"}
|
@@ -6,6 +6,8 @@ import { EciesScheme, SupportedFheType } from '../encryption/encryption.js';
|
|
6
6
|
import type { KmsClient } from '../kms/client.js';
|
7
7
|
import type { BackoffConfig } from '../retry.js';
|
8
8
|
import { AttestedComputeOP } from './types.js';
|
9
|
+
export declare const ATTESTED_COMPUTE_DOMAIN_NAME = "IncoAttestedCompute";
|
10
|
+
export declare const ATTESTED_COMPUTE_DOMAIN_VERSION = "0.1.0";
|
9
11
|
/**
|
10
12
|
* Arguments for creating an attested compute.
|
11
13
|
*/
|
@@ -1,18 +1,21 @@
|
|
1
1
|
"use strict";
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
3
|
+
exports.ATTESTED_COMPUTE_DOMAIN_VERSION = exports.ATTESTED_COMPUTE_DOMAIN_NAME = void 0;
|
3
4
|
exports.attestedCompute = attestedCompute;
|
5
|
+
const protobuf_1 = require("@bufbuild/protobuf");
|
4
6
|
const viem_1 = require("viem");
|
5
7
|
const attested_decrypt_js_1 = require("../attesteddecrypt/attested-decrypt.js");
|
6
8
|
const binary_js_1 = require("../binary.js");
|
7
9
|
const chain_js_1 = require("../chain.js");
|
8
10
|
const encryption_js_1 = require("../encryption/encryption.js");
|
11
|
+
const kms_service_pb_js_1 = require("../generated/es/inco/kms/lite/v1/kms_service_pb.js");
|
9
12
|
const handle_js_1 = require("../handle.js");
|
10
13
|
const client_js_1 = require("../kms/client.js");
|
11
14
|
const eip712_js_1 = require("../reencryption/eip712.js");
|
12
15
|
const retry_js_1 = require("../retry.js");
|
13
16
|
const types_js_1 = require("./types.js");
|
14
|
-
|
15
|
-
|
17
|
+
exports.ATTESTED_COMPUTE_DOMAIN_NAME = 'IncoAttestedCompute';
|
18
|
+
exports.ATTESTED_COMPUTE_DOMAIN_VERSION = '0.1.0';
|
16
19
|
/**
|
17
20
|
* Creates an attested compute function that can decrypt handles with an attached attestation from the covalidator.
|
18
21
|
* @param args - The arguments for creating the attested compute function
|
@@ -23,7 +26,8 @@ const ATTESTED_COMPUTE_DOMAIN_VERSION = '0.1.0';
|
|
23
26
|
*/
|
24
27
|
async function attestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, walletClient, kmsConnectRpcEndpointOrClient, chainId, }) {
|
25
28
|
try {
|
26
|
-
const kmsClient = (0, client_js_1.getKmsClient)(kmsConnectRpcEndpointOrClient ||
|
29
|
+
const kmsClient = (0, client_js_1.getKmsClient)(kmsConnectRpcEndpointOrClient ||
|
30
|
+
(0, client_js_1.defaultCovalidatorGrpc)((0, chain_js_1.getSupportedChain)(chainId)));
|
27
31
|
(0, attested_decrypt_js_1.validateHandle)(lhsHandle);
|
28
32
|
const rhsPlaintextBig = BigInt(rhsPlaintext);
|
29
33
|
// Create the EIP712 payload for the handles to decrypt
|
@@ -40,26 +44,31 @@ async function attestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, wal
|
|
40
44
|
lhsHandle: lhsHandle,
|
41
45
|
rhsPlaintext: (0, binary_js_1.bigintToBytes32)(rhsPlaintextBig),
|
42
46
|
},
|
43
|
-
domainName: ATTESTED_COMPUTE_DOMAIN_NAME,
|
44
|
-
domainVersion: ATTESTED_COMPUTE_DOMAIN_VERSION,
|
47
|
+
domainName: exports.ATTESTED_COMPUTE_DOMAIN_NAME,
|
48
|
+
domainVersion: exports.ATTESTED_COMPUTE_DOMAIN_VERSION,
|
45
49
|
});
|
46
50
|
// Sign the EIP712 message
|
47
51
|
const eip712Signature = await walletClient.signTypedData(eip712Payload);
|
48
52
|
const rhsValueBytes = (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, (0, handle_js_1.getHandleType)(lhsHandle), rhsPlaintextBig);
|
49
|
-
const attestedComputeRequest = {
|
50
|
-
$typeName: 'inco.kms.lite.v1.AttestedComputeRequest',
|
53
|
+
const attestedComputeRequest = (0, protobuf_1.create)(kms_service_pb_js_1.AttestedComputeRequestSchema, {
|
51
54
|
userAddress: walletClient.account.address,
|
52
55
|
op: op,
|
53
56
|
lhsHandle: lhsHandle,
|
54
57
|
rhsPlaintext: rhsValueBytes.value.toString(16),
|
55
58
|
eip712Signature: (0, viem_1.hexToBytes)(eip712Signature),
|
56
|
-
|
59
|
+
aclProof: {
|
60
|
+
proof: {
|
61
|
+
case: 'incoLiteBasicAclProof',
|
62
|
+
value: {},
|
63
|
+
},
|
64
|
+
},
|
65
|
+
});
|
57
66
|
const response = await (0, retry_js_1.retryWithBackoff)(async () => {
|
58
67
|
return await kmsClient.attestedCompute(attestedComputeRequest);
|
59
68
|
}, backoffConfig);
|
60
69
|
const decryptionAttestation = response.decryptionAttestation;
|
61
70
|
if (decryptionAttestation?.plaintext === undefined) {
|
62
|
-
throw new types_js_1.AttestedComputeError('No plaintext in response');
|
71
|
+
throw new types_js_1.AttestedComputeError('No plaintext in compute response');
|
63
72
|
}
|
64
73
|
const computeResultHandle = response.decryptionAttestation?.handle;
|
65
74
|
if (!computeResultHandle) {
|
@@ -80,4 +89,4 @@ async function attestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, wal
|
|
80
89
|
throw new types_js_1.AttestedComputeError('Failed to perform attested compute', error);
|
81
90
|
}
|
82
91
|
}
|
83
|
-
//# sourceMappingURL=data:application/json;base64,
|
92
|
+
//# sourceMappingURL=data:application/json;base64,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
|
@@ -25,10 +25,11 @@ export declare class AttestedComputeError extends Error {
|
|
25
25
|
readonly cause?: unknown | undefined;
|
26
26
|
constructor(message: string, cause?: unknown | undefined);
|
27
27
|
}
|
28
|
-
export type AttestedCompute<S extends EncryptionScheme> = <T extends SupportedFheType>(args:
|
28
|
+
export type AttestedCompute<S extends EncryptionScheme> = <T extends SupportedFheType>(args: AttestedComputeFnArgs<S, T>) => Promise<DecryptionAttestation<S, T>>;
|
29
|
+
export type AttestedComputeFnArgs<S extends EncryptionScheme, T extends SupportedFheType> = {
|
29
30
|
/** The handle to compute on */
|
30
31
|
lhsHandle: HexString;
|
31
32
|
op: AttestedComputeOP;
|
32
33
|
rhsPlaintext: bigint | boolean;
|
33
34
|
backoffConfig?: Partial<BackoffConfig>;
|
34
|
-
}
|
35
|
+
};
|
@@ -43,4 +43,4 @@ class AttestedComputeError extends Error {
|
|
43
43
|
}
|
44
44
|
}
|
45
45
|
exports.AttestedComputeError = AttestedComputeError;
|
46
|
-
//# sourceMappingURL=data:application/json;base64,
|
46
|
+
//# sourceMappingURL=data:application/json;base64,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
|
@@ -5,6 +5,8 @@ import { EciesScheme, SupportedFheType } from '../encryption/encryption.js';
|
|
5
5
|
import type { KmsClient } from '../kms/client.js';
|
6
6
|
import type { BackoffConfig } from '../retry.js';
|
7
7
|
import { DecryptionAttestation } from './types.js';
|
8
|
+
export declare const ATTESTED_DECRYPT_DOMAIN_NAME = "IncoAttestedDecrypt";
|
9
|
+
export declare const ATTESTED_DECRYPT_DOMAIN_VERSION = "0.1.0";
|
8
10
|
/**
|
9
11
|
* Validates a handle format.
|
10
12
|
* @param handle - The handle to validate
|