@inco/js 0.6.1 → 0.6.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/advancedacl/session-key.d.ts +8 -1
- package/dist/cjs/advancedacl/session-key.js +55 -21
- package/dist/cjs/attestedcompute/attested-compute.js +11 -4
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +38 -1
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +49 -6
- package/dist/cjs/attesteddecrypt/types.d.ts +6 -1
- package/dist/cjs/attesteddecrypt/types.js +1 -1
- package/dist/cjs/attestedreveal/attested-reveal.js +9 -7
- package/dist/cjs/binary.d.ts +1 -0
- package/dist/cjs/binary.js +6 -2
- package/dist/cjs/encryption/encryption.d.ts +17 -22
- package/dist/cjs/encryption/encryption.js +34 -16
- package/dist/cjs/generated/abis/add-two.d.ts +1 -1
- package/dist/cjs/generated/abis/add-two.js +1 -1
- package/dist/cjs/generated/abis/lightning-preview.d.ts +48 -106
- package/dist/cjs/generated/abis/lightning-preview.js +33 -55
- package/dist/cjs/generated/abis/lightning.d.ts +55 -116
- package/dist/cjs/generated/abis/lightning.js +33 -66
- package/dist/cjs/generated/abis/verifier.d.ts +193 -84
- package/dist/cjs/generated/abis/verifier.js +151 -61
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.js +2 -2
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +775 -0
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.js +261 -0
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +186 -0
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +47 -0
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.js +2 -2
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +21 -26
- package/dist/cjs/generated/es/inco/kms/lite/v1/types_pb.js +2 -2
- package/dist/cjs/generated/lightning.d.ts +0 -32
- package/dist/cjs/generated/lightning.js +1 -33
- package/dist/cjs/generated/local-node.d.ts +1 -5
- package/dist/cjs/generated/local-node.js +2 -6
- package/dist/cjs/handle.d.ts +16 -0
- package/dist/cjs/handle.js +28 -3
- package/dist/cjs/lite/deployments.d.ts +20 -2
- package/dist/cjs/lite/deployments.js +1 -1
- package/dist/cjs/lite/ecies.d.ts +0 -2
- package/dist/cjs/lite/ecies.js +24 -13
- package/dist/cjs/lite/hadu.d.ts +3 -23
- package/dist/cjs/lite/hadu.js +26 -29
- package/dist/cjs/lite/index.d.ts +1 -1
- package/dist/cjs/lite/index.js +1 -1
- package/dist/cjs/lite/lightning.d.ts +24 -12
- package/dist/cjs/lite/lightning.js +62 -27
- package/dist/cjs/lite/reencrypt.d.ts +5 -7
- package/dist/cjs/lite/reencrypt.js +68 -58
- package/dist/cjs/test/mocks.d.ts +12 -0
- package/dist/cjs/test/mocks.js +27 -0
- package/dist/cjs/viem.d.ts +45 -48
- package/dist/esm/advancedacl/session-key.d.ts +8 -1
- package/dist/esm/advancedacl/session-key.js +58 -24
- package/dist/esm/attestedcompute/attested-compute.js +11 -4
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +38 -1
- package/dist/esm/attesteddecrypt/attested-decrypt.js +51 -8
- package/dist/esm/attesteddecrypt/types.d.ts +6 -1
- package/dist/esm/attesteddecrypt/types.js +1 -1
- package/dist/esm/attestedreveal/attested-reveal.js +9 -7
- package/dist/esm/binary.d.ts +1 -0
- package/dist/esm/binary.js +5 -2
- package/dist/esm/encryption/encryption.d.ts +17 -22
- package/dist/esm/encryption/encryption.js +30 -16
- package/dist/esm/generated/abis/add-two.d.ts +1 -1
- package/dist/esm/generated/abis/add-two.js +1 -1
- package/dist/esm/generated/abis/lightning-preview.d.ts +48 -106
- package/dist/esm/generated/abis/lightning-preview.js +33 -55
- package/dist/esm/generated/abis/lightning.d.ts +55 -116
- package/dist/esm/generated/abis/lightning.js +33 -66
- package/dist/esm/generated/abis/verifier.d.ts +193 -84
- package/dist/esm/generated/abis/verifier.js +151 -61
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.js +2 -2
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +775 -0
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.js +258 -0
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +186 -0
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +44 -0
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.js +2 -2
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +20 -25
- package/dist/esm/generated/es/inco/kms/lite/v1/types_pb.js +2 -2
- package/dist/esm/generated/lightning.d.ts +0 -32
- package/dist/esm/generated/lightning.js +1 -33
- package/dist/esm/generated/local-node.d.ts +1 -5
- package/dist/esm/generated/local-node.js +2 -6
- package/dist/esm/handle.d.ts +16 -0
- package/dist/esm/handle.js +27 -3
- package/dist/esm/lite/deployments.d.ts +20 -2
- package/dist/esm/lite/deployments.js +1 -1
- package/dist/esm/lite/ecies.d.ts +0 -2
- package/dist/esm/lite/ecies.js +26 -15
- package/dist/esm/lite/hadu.d.ts +3 -23
- package/dist/esm/lite/hadu.js +28 -30
- package/dist/esm/lite/index.d.ts +1 -1
- package/dist/esm/lite/index.js +1 -1
- package/dist/esm/lite/lightning.d.ts +24 -12
- package/dist/esm/lite/lightning.js +59 -24
- package/dist/esm/lite/reencrypt.d.ts +5 -7
- package/dist/esm/lite/reencrypt.js +67 -58
- package/dist/esm/test/mocks.d.ts +12 -0
- package/dist/esm/test/mocks.js +23 -0
- package/dist/esm/viem.d.ts +45 -48
- package/dist/types/advancedacl/session-key.d.ts +8 -1
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +38 -1
- package/dist/types/attesteddecrypt/types.d.ts +6 -1
- package/dist/types/binary.d.ts +1 -0
- package/dist/types/encryption/encryption.d.ts +17 -22
- package/dist/types/generated/abis/add-two.d.ts +1 -1
- package/dist/types/generated/abis/lightning-preview.d.ts +48 -106
- package/dist/types/generated/abis/lightning.d.ts +55 -116
- package/dist/types/generated/abis/verifier.d.ts +193 -84
- package/dist/types/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +775 -0
- package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +186 -0
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
- package/dist/types/generated/lightning.d.ts +0 -32
- package/dist/types/generated/local-node.d.ts +1 -5
- package/dist/types/handle.d.ts +16 -0
- package/dist/types/lite/deployments.d.ts +20 -2
- package/dist/types/lite/ecies.d.ts +0 -2
- package/dist/types/lite/hadu.d.ts +3 -23
- package/dist/types/lite/index.d.ts +1 -1
- package/dist/types/lite/lightning.d.ts +24 -12
- package/dist/types/lite/reencrypt.d.ts +5 -7
- package/dist/types/test/mocks.d.ts +12 -0
- package/dist/types/viem.d.ts +45 -48
- package/package.json +3 -1
|
@@ -17,8 +17,6 @@ exports.lightningDeployments = [
|
|
|
17
17
|
"patch": 2,
|
|
18
18
|
"shortSalt": "725458969"
|
|
19
19
|
},
|
|
20
|
-
"decryptSigner": "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95",
|
|
21
|
-
"eciesPublicKey": "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1",
|
|
22
20
|
"blockNumber": 32124925,
|
|
23
21
|
"deployDate": "2025-10-09T13:55:42.997Z",
|
|
24
22
|
"commit": "v0.5.3-10-ga4f2312d",
|
|
@@ -39,8 +37,6 @@ exports.lightningDeployments = [
|
|
|
39
37
|
"patch": 2,
|
|
40
38
|
"shortSalt": "904635675"
|
|
41
39
|
},
|
|
42
|
-
"decryptSigner": "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f",
|
|
43
|
-
"eciesPublicKey": "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1",
|
|
44
40
|
"blockNumber": 3696905,
|
|
45
41
|
"deployDate": "2025-10-03T13:24:44.682Z",
|
|
46
42
|
"commit": "v0.5.3-6-g8db0f27f-dirty",
|
|
@@ -61,8 +57,6 @@ exports.lightningDeployments = [
|
|
|
61
57
|
"patch": 0,
|
|
62
58
|
"shortSalt": "904635675"
|
|
63
59
|
},
|
|
64
|
-
"decryptSigner": "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f",
|
|
65
|
-
"eciesPublicKey": "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1",
|
|
66
60
|
"blockNumber": 3344310,
|
|
67
61
|
"deployDate": "2025-09-29T11:14:02.599Z",
|
|
68
62
|
"commit": "v0.5.1-5-g4135c790-dirty",
|
|
@@ -83,8 +77,6 @@ exports.lightningDeployments = [
|
|
|
83
77
|
"patch": 0,
|
|
84
78
|
"shortSalt": "183408998"
|
|
85
79
|
},
|
|
86
|
-
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
|
87
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
88
80
|
"blockNumber": 26296576,
|
|
89
81
|
"deployDate": "2025-05-27T15:57:24.175Z",
|
|
90
82
|
"commit": "v5-3-gec8b6aae-dirty",
|
|
@@ -105,8 +97,6 @@ exports.lightningDeployments = [
|
|
|
105
97
|
"patch": 29,
|
|
106
98
|
"shortSalt": "183408998"
|
|
107
99
|
},
|
|
108
|
-
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
|
109
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
110
100
|
"blockNumber": 13464615,
|
|
111
101
|
"deployDate": "2025-04-22T16:01:14.380Z",
|
|
112
102
|
"commit": "v3-28-g93c05a49-dirty",
|
|
@@ -127,8 +117,6 @@ exports.lightningDeployments = [
|
|
|
127
117
|
"patch": 29,
|
|
128
118
|
"shortSalt": "183408998"
|
|
129
119
|
},
|
|
130
|
-
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
|
131
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
132
120
|
"blockNumber": 24784654,
|
|
133
121
|
"deployDate": "2025-04-22T16:00:02.028Z",
|
|
134
122
|
"commit": "v3-28-g93c05a49-dirty",
|
|
@@ -149,8 +137,6 @@ exports.lightningDeployments = [
|
|
|
149
137
|
"patch": 0,
|
|
150
138
|
"shortSalt": "863421733"
|
|
151
139
|
},
|
|
152
|
-
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
|
153
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
154
140
|
"blockNumber": 25737175,
|
|
155
141
|
"deployDate": "2025-05-14T17:10:44.285Z",
|
|
156
142
|
"commit": "v4-11-g4a1f413a-dirty",
|
|
@@ -171,8 +157,6 @@ exports.lightningDeployments = [
|
|
|
171
157
|
"patch": 29,
|
|
172
158
|
"shortSalt": "863421733"
|
|
173
159
|
},
|
|
174
|
-
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
|
175
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
176
160
|
"blockNumber": 25719113,
|
|
177
161
|
"deployDate": "2025-05-14T07:08:39.059Z",
|
|
178
162
|
"commit": "v4",
|
|
@@ -193,8 +177,6 @@ exports.lightningDeployments = [
|
|
|
193
177
|
"patch": 1,
|
|
194
178
|
"shortSalt": "297966649"
|
|
195
179
|
},
|
|
196
|
-
"decryptSigner": "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95",
|
|
197
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
198
180
|
"blockNumber": 27543410,
|
|
199
181
|
"deployDate": "2025-06-25T12:38:32.856Z",
|
|
200
182
|
"commit": "v5-17-ga03e4b32-dirty",
|
|
@@ -215,8 +197,6 @@ exports.lightningDeployments = [
|
|
|
215
197
|
"patch": 0,
|
|
216
198
|
"shortSalt": "297966649"
|
|
217
199
|
},
|
|
218
|
-
"decryptSigner": "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95",
|
|
219
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
220
200
|
"blockNumber": 26894782,
|
|
221
201
|
"deployDate": "2025-06-10T12:17:35.790Z",
|
|
222
202
|
"commit": "v5-13-gd6b19c10-dirty",
|
|
@@ -237,8 +217,6 @@ exports.lightningDeployments = [
|
|
|
237
217
|
"patch": 1,
|
|
238
218
|
"shortSalt": "340846814"
|
|
239
219
|
},
|
|
240
|
-
"decryptSigner": "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f",
|
|
241
|
-
"eciesPublicKey": "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1",
|
|
242
220
|
"blockNumber": 1718868,
|
|
243
221
|
"deployDate": "2025-09-10T15:20:25.654Z",
|
|
244
222
|
"commit": "v6-7-gf96f358e-dirty",
|
|
@@ -259,8 +237,6 @@ exports.lightningDeployments = [
|
|
|
259
237
|
"patch": 1,
|
|
260
238
|
"shortSalt": "340846814"
|
|
261
239
|
},
|
|
262
|
-
"decryptSigner": "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f",
|
|
263
|
-
"eciesPublicKey": "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1",
|
|
264
240
|
"blockNumber": 1717229,
|
|
265
241
|
"deployDate": "2025-09-10T14:53:07.218Z",
|
|
266
242
|
"commit": "v6-7-gf96f358e-dirty",
|
|
@@ -281,8 +257,6 @@ exports.lightningDeployments = [
|
|
|
281
257
|
"patch": 1,
|
|
282
258
|
"shortSalt": "340846814"
|
|
283
259
|
},
|
|
284
|
-
"decryptSigner": "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f",
|
|
285
|
-
"eciesPublicKey": "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1",
|
|
286
260
|
"blockNumber": 17365942,
|
|
287
261
|
"deployDate": "2025-08-15T17:35:15.208Z",
|
|
288
262
|
"commit": "v0.2.17-35-g8cca6b4e-dirty",
|
|
@@ -303,8 +277,6 @@ exports.lightningDeployments = [
|
|
|
303
277
|
"patch": 0,
|
|
304
278
|
"shortSalt": "340846814"
|
|
305
279
|
},
|
|
306
|
-
"decryptSigner": "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f",
|
|
307
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
308
280
|
"blockNumber": 26122863,
|
|
309
281
|
"deployDate": "2025-05-23T15:26:57.031Z",
|
|
310
282
|
"commit": "v5-2-g8957c16b-dirty",
|
|
@@ -325,8 +297,6 @@ exports.lightningDeployments = [
|
|
|
325
297
|
"patch": 29,
|
|
326
298
|
"shortSalt": "340846814"
|
|
327
299
|
},
|
|
328
|
-
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
|
329
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
330
300
|
"blockNumber": 13464197,
|
|
331
301
|
"deployDate": "2025-04-22T15:57:26.862Z",
|
|
332
302
|
"commit": "v3-28-g93c05a49-dirty",
|
|
@@ -347,12 +317,10 @@ exports.lightningDeployments = [
|
|
|
347
317
|
"patch": 29,
|
|
348
318
|
"shortSalt": "340846814"
|
|
349
319
|
},
|
|
350
|
-
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
|
351
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
352
320
|
"blockNumber": 24784527,
|
|
353
321
|
"deployDate": "2025-04-22T15:55:47.828Z",
|
|
354
322
|
"commit": "v3-28-g93c05a49-dirty",
|
|
355
323
|
"active": true
|
|
356
324
|
}
|
|
357
325
|
];
|
|
358
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
326
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/generated/lightning.ts"],"names":[],"mappings":";;;AAAa,QAAA,oBAAoB,GAAG;IAClC;QACE,MAAM,EAAE,uCAAuC;QAC/C,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,UAAU;QACpB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,qBAAqB;QAC/B,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,uCAAuC;QAC/C,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,IAAI;QACf,WAAW,EAAE,gBAAgB;QAC7B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,OAAO;QACtB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,0BAA0B;QACpC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,uCAAuC;QAC/C,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,IAAI;QACf,WAAW,EAAE,gBAAgB;QAC7B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,OAAO;QACtB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,0BAA0B;QACpC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,gCAAgC;QACxC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,SAAS;QACnB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,sBAAsB;QAChC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,iCAAiC;QACzC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,SAAS;QACnB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,eAAe;QAC5B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,EAAE;YACX,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,uBAAuB;QACjC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,iCAAiC;QACzC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,SAAS;QACnB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,EAAE;YACX,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,uBAAuB;QACjC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,gCAAgC;QACxC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,SAAS;QACnB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,uBAAuB;QACjC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,iCAAiC;QACzC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,SAAS;QACnB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,EAAE;YACX,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,IAAI;QACd,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,uCAAuC;QAC/C,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,UAAU;QACpB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,uBAAuB;QACjC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,uCAAuC;QAC/C,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,UAAU;QACpB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,uBAAuB;QACjC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,uCAAuC;QAC/C,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,IAAI;QACf,WAAW,EAAE,gBAAgB;QAC7B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,OAAO;QACtB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,sBAAsB;QAChC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,gCAAgC;QACxC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,IAAI;QACf,WAAW,EAAE,gBAAgB;QAC7B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,OAAO;QACtB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,sBAAsB;QAChC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,uCAAuC;QAC/C,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,IAAI;QACf,WAAW,EAAE,qBAAqB;QAClC,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,4BAA4B;QACtC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,gCAAgC;QACxC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,sBAAsB;QAChC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,iCAAiC;QACzC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,eAAe;QAC5B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,EAAE;YACX,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,uBAAuB;QACjC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,iCAAiC;QACzC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,EAAE;YACX,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,uBAAuB;QACjC,QAAQ,EAAE,IAAI;KACf;CACO,CAAC"}
|
|
@@ -1,7 +1,6 @@
|
|
|
1
1
|
export declare const localNodeLightningConfig: {
|
|
2
2
|
readonly testnet: {
|
|
3
3
|
readonly executorAddress: "0x63D8135aF4D393B1dB43B649010c8D3EE19FC9fd";
|
|
4
|
-
readonly eciesPublicKey: "0x0235692e009a07315b5505fbfb44144553b2b163e0d9eddc705a1c49ba4d0dcb91";
|
|
5
4
|
readonly chainId: 31337;
|
|
6
5
|
readonly covalidatorUrl: "http://localhost:50055";
|
|
7
6
|
readonly hostChainRpcUrl: "http://localhost:8545";
|
|
@@ -9,7 +8,6 @@ export declare const localNodeLightningConfig: {
|
|
|
9
8
|
};
|
|
10
9
|
readonly devnet: {
|
|
11
10
|
readonly executorAddress: "0x3473820DcAa71Af8157b93C7f2bf1c676A2A39A6";
|
|
12
|
-
readonly eciesPublicKey: "0x0232aae7e5deffacd4e682821a95f4200d4327b7ac1e288d147cfa343f751e3f61";
|
|
13
11
|
readonly chainId: 31337;
|
|
14
12
|
readonly covalidatorUrl: "http://localhost:50055";
|
|
15
13
|
readonly hostChainRpcUrl: "http://localhost:8545";
|
|
@@ -17,15 +15,13 @@ export declare const localNodeLightningConfig: {
|
|
|
17
15
|
};
|
|
18
16
|
readonly alphanet: {
|
|
19
17
|
readonly executorAddress: "0x28676Cd3b10b03b2FDF105Ba280425b45a674F2A";
|
|
20
|
-
readonly eciesPublicKey: "0x034bc20c48ff1b8e86563dff8dd2ec3936bdea0ab570986780971cdc4c3871fe09";
|
|
21
18
|
readonly chainId: 31337;
|
|
22
19
|
readonly covalidatorUrl: "http://localhost:50055";
|
|
23
20
|
readonly hostChainRpcUrl: "http://localhost:8545";
|
|
24
|
-
readonly senderPrivateKey: "
|
|
21
|
+
readonly senderPrivateKey: "0x59c6995e998f97a5a0044966f0945389dc9e86dae88c7a8412f4603b6b78690d";
|
|
25
22
|
};
|
|
26
23
|
readonly scratch: {
|
|
27
24
|
readonly executorAddress: "0x195ec7fDf68fD835b9F78d6eb13E280cC2e25fdD";
|
|
28
|
-
readonly eciesPublicKey: "0x02516bda9e68a1c3dce74dc1b6ed7d91a91d51c1e1933947f06331cef59631e9eb";
|
|
29
25
|
readonly chainId: 31337;
|
|
30
26
|
readonly covalidatorUrl: "http://localhost:50055";
|
|
31
27
|
readonly hostChainRpcUrl: "http://127.0.0.1:8567";
|
|
@@ -4,7 +4,6 @@ exports.localNodeLightningConfig = void 0;
|
|
|
4
4
|
exports.localNodeLightningConfig = {
|
|
5
5
|
"testnet": {
|
|
6
6
|
"executorAddress": "0x63D8135aF4D393B1dB43B649010c8D3EE19FC9fd",
|
|
7
|
-
"eciesPublicKey": "0x0235692e009a07315b5505fbfb44144553b2b163e0d9eddc705a1c49ba4d0dcb91",
|
|
8
7
|
"chainId": 31337,
|
|
9
8
|
"covalidatorUrl": "http://localhost:50055",
|
|
10
9
|
"hostChainRpcUrl": "http://localhost:8545",
|
|
@@ -12,7 +11,6 @@ exports.localNodeLightningConfig = {
|
|
|
12
11
|
},
|
|
13
12
|
"devnet": {
|
|
14
13
|
"executorAddress": "0x3473820DcAa71Af8157b93C7f2bf1c676A2A39A6",
|
|
15
|
-
"eciesPublicKey": "0x0232aae7e5deffacd4e682821a95f4200d4327b7ac1e288d147cfa343f751e3f61",
|
|
16
14
|
"chainId": 31337,
|
|
17
15
|
"covalidatorUrl": "http://localhost:50055",
|
|
18
16
|
"hostChainRpcUrl": "http://localhost:8545",
|
|
@@ -20,19 +18,17 @@ exports.localNodeLightningConfig = {
|
|
|
20
18
|
},
|
|
21
19
|
"alphanet": {
|
|
22
20
|
"executorAddress": "0x28676Cd3b10b03b2FDF105Ba280425b45a674F2A",
|
|
23
|
-
"eciesPublicKey": "0x034bc20c48ff1b8e86563dff8dd2ec3936bdea0ab570986780971cdc4c3871fe09",
|
|
24
21
|
"chainId": 31337,
|
|
25
22
|
"covalidatorUrl": "http://localhost:50055",
|
|
26
23
|
"hostChainRpcUrl": "http://localhost:8545",
|
|
27
|
-
"senderPrivateKey": "
|
|
24
|
+
"senderPrivateKey": "0x59c6995e998f97a5a0044966f0945389dc9e86dae88c7a8412f4603b6b78690d"
|
|
28
25
|
},
|
|
29
26
|
"scratch": {
|
|
30
27
|
"executorAddress": "0x195ec7fDf68fD835b9F78d6eb13E280cC2e25fdD",
|
|
31
|
-
"eciesPublicKey": "0x02516bda9e68a1c3dce74dc1b6ed7d91a91d51c1e1933947f06331cef59631e9eb",
|
|
32
28
|
"chainId": 31337,
|
|
33
29
|
"covalidatorUrl": "http://localhost:50055",
|
|
34
30
|
"hostChainRpcUrl": "http://127.0.0.1:8567",
|
|
35
31
|
"senderPrivateKey": "0xac0974bec39a17e36ba4a6b4d238ff944bacb478cbed5efcae784d7bf4f2ff80"
|
|
36
32
|
}
|
|
37
33
|
};
|
|
38
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
34
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dist/cjs/handle.d.ts
CHANGED
|
@@ -29,13 +29,29 @@ export declare const InputContext: Schema.Struct<{
|
|
|
29
29
|
export type InputContext = typeof InputContext.Type;
|
|
30
30
|
export type Handle = HexString;
|
|
31
31
|
export declare function getHandleType(handle: HexString): FheType;
|
|
32
|
+
/**
|
|
33
|
+
* Computes the prehandle hash for an input based on the ciphertext
|
|
34
|
+
*
|
|
35
|
+
* @param ciphertextPayload Note this is the different from the input which has the external handle prepended
|
|
36
|
+
* @param indexHandle
|
|
37
|
+
* @param handleType
|
|
38
|
+
* @param handleVersion
|
|
39
|
+
*/
|
|
32
40
|
export declare function computePrehandle({ ciphertext, indexHandle, handleType, handleVersion, }: {
|
|
33
41
|
ciphertext: Uint8Array;
|
|
34
42
|
indexHandle: number;
|
|
35
43
|
handleType: FheType;
|
|
36
44
|
handleVersion: number;
|
|
37
45
|
}): Buffer;
|
|
46
|
+
/**
|
|
47
|
+
* Computes the final handle for an input based on the prehandle and the input context, matches the handle generation
|
|
48
|
+
* in Go and Solidity
|
|
49
|
+
*
|
|
50
|
+
* @param prehandle
|
|
51
|
+
* @param context
|
|
52
|
+
*/
|
|
38
53
|
export declare function computeHandle({ prehandle, context, }: {
|
|
39
54
|
prehandle: Uint8Array;
|
|
40
55
|
context: InputContext;
|
|
41
56
|
}): Buffer;
|
|
57
|
+
export declare function hashInputContext(context: InputContext): Buffer;
|
package/dist/cjs/handle.js
CHANGED
|
@@ -5,6 +5,7 @@ exports.isFheType = isFheType;
|
|
|
5
5
|
exports.getHandleType = getHandleType;
|
|
6
6
|
exports.computePrehandle = computePrehandle;
|
|
7
7
|
exports.computeHandle = computeHandle;
|
|
8
|
+
exports.hashInputContext = hashInputContext;
|
|
8
9
|
// See solidity https://github.com/zama-ai/fhevm/blob/429d127709b56c5b8ec564a2f2cc329aa7f6722f/lib/TFHEExecutor.sol#L15
|
|
9
10
|
const effect_1 = require("effect");
|
|
10
11
|
const sha3_1 = require("sha3");
|
|
@@ -53,6 +54,14 @@ function getHandleType(handle) {
|
|
|
53
54
|
/// @dev handle format for user inputs is: keccak256(keccak256(CiphertextFHEList)||index_handle)[0:29] || index_handle || handle_type || handle_version
|
|
54
55
|
/// @dev other handles format (fhe ops results) is: keccak256(keccak256(rawCiphertextFHEList)||index_handle)[0:30] || handle_type || handle_versioreenctestn
|
|
55
56
|
/// @dev the CiphertextFHEList actually contains: 1 byte (= N) for size of handles_list, N bytes for the handles_types : 1 per handle, then the original fhe160list raw ciphertext
|
|
57
|
+
/**
|
|
58
|
+
* Computes the prehandle hash for an input based on the ciphertext
|
|
59
|
+
*
|
|
60
|
+
* @param ciphertextPayload Note this is the different from the input which has the external handle prepended
|
|
61
|
+
* @param indexHandle
|
|
62
|
+
* @param handleType
|
|
63
|
+
* @param handleVersion
|
|
64
|
+
*/
|
|
56
65
|
function computePrehandle({ ciphertext, indexHandle, handleType, handleVersion, }) {
|
|
57
66
|
assertUint8(indexHandle);
|
|
58
67
|
assertUint8(handleType);
|
|
@@ -71,8 +80,13 @@ function computePrehandle({ ciphertext, indexHandle, handleType, handleVersion,
|
|
|
71
80
|
handle.writeUInt8(handleVersion, 31);
|
|
72
81
|
return handle;
|
|
73
82
|
}
|
|
74
|
-
|
|
75
|
-
|
|
83
|
+
/**
|
|
84
|
+
* Computes the final handle for an input based on the prehandle and the input context, matches the handle generation
|
|
85
|
+
* in Go and Solidity
|
|
86
|
+
*
|
|
87
|
+
* @param prehandle
|
|
88
|
+
* @param context
|
|
89
|
+
*/
|
|
76
90
|
function computeHandle({ prehandle, context, }) {
|
|
77
91
|
if (prehandle.length !== 32) {
|
|
78
92
|
throw new Error(`prehandle should be 32 bytes but is: ${prehandle.length}`);
|
|
@@ -95,9 +109,20 @@ function computeHandle({ prehandle, context, }) {
|
|
|
95
109
|
prehandle.slice(29, 32),
|
|
96
110
|
]);
|
|
97
111
|
}
|
|
112
|
+
function hashInputContext(context) {
|
|
113
|
+
const packed = (0, viem_1.encodePacked)(['string', 'uint256', 'address', 'address', 'address'], [
|
|
114
|
+
// Note: The x/hostchain spec requires the chain ID to be prefixed with 'evm/' for EVM chains
|
|
115
|
+
'evm/',
|
|
116
|
+
context.hostChainId,
|
|
117
|
+
context.aclAddress,
|
|
118
|
+
context.userAddress,
|
|
119
|
+
context.contractAddress,
|
|
120
|
+
]);
|
|
121
|
+
return new sha3_1.Keccak(256).update(Buffer.from((0, viem_1.hexToBytes)(packed))).digest();
|
|
122
|
+
}
|
|
98
123
|
function assertUint8(value) {
|
|
99
124
|
if (!Number.isInteger(value) || value < 0 || value > 255) {
|
|
100
125
|
throw new Error(`Invalid uint8 value: ${value}`);
|
|
101
126
|
}
|
|
102
127
|
}
|
|
103
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
128
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,6 +1,24 @@
|
|
|
1
1
|
import { Chainish } from '../chain.js';
|
|
2
|
-
import { lightningDeployments } from '../generated/lightning.js';
|
|
3
2
|
export type Address = `0x${string}`;
|
|
4
|
-
export type IncoLiteDeployment =
|
|
3
|
+
export type IncoLiteDeployment = {
|
|
4
|
+
active: boolean;
|
|
5
|
+
blockNumber: number;
|
|
6
|
+
chainId: number;
|
|
7
|
+
chainName: string;
|
|
8
|
+
commit: string;
|
|
9
|
+
deployDate: string;
|
|
10
|
+
deployer: string;
|
|
11
|
+
executorAddress: string;
|
|
12
|
+
majorVersion: number;
|
|
13
|
+
name: string;
|
|
14
|
+
pepper: string;
|
|
15
|
+
salt: string;
|
|
16
|
+
version: {
|
|
17
|
+
major: number;
|
|
18
|
+
minor: number;
|
|
19
|
+
patch: number;
|
|
20
|
+
shortSalt: string;
|
|
21
|
+
};
|
|
22
|
+
};
|
|
5
23
|
export declare function getActiveLightningDeployment(chain: Chainish): IncoLiteDeployment;
|
|
6
24
|
export declare function getLightningDeployments(chainId: Chainish): readonly IncoLiteDeployment[];
|
|
@@ -18,4 +18,4 @@ function getLightningDeployments(chainId) {
|
|
|
18
18
|
const deployments = lightning_js_1.lightningDeployments.filter((d) => d.chainId === supportedChain.id);
|
|
19
19
|
return deployments ?? [];
|
|
20
20
|
}
|
|
21
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
21
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dist/cjs/lite/ecies.d.ts
CHANGED
|
@@ -13,14 +13,12 @@ export declare function decodeSecp256k1PublicKey(pubKeyCompressed: Uint8Array):
|
|
|
13
13
|
export declare function decodeSecp256k1PrivateKey(privKey: Uint8Array): Secp256k1Keypair;
|
|
14
14
|
export declare function encrypt(pubKeyA: Secp256k1PubKey, plaintext: Uint8Array, privKeyB: Secp256k1Keypair): Promise<Uint8Array>;
|
|
15
15
|
export type EciesEncryptorArgs = {
|
|
16
|
-
scheme: EciesScheme;
|
|
17
16
|
pubKeyA: Secp256k1PubKey;
|
|
18
17
|
privKeyB: Secp256k1Keypair;
|
|
19
18
|
};
|
|
20
19
|
export declare function getEciesEncryptor({ pubKeyA, privKeyB, }: EciesEncryptorArgs): Encryptor<EciesScheme>;
|
|
21
20
|
export declare function decrypt(privKeyA: Secp256k1Keypair, ciphertext: Uint8Array): Promise<Uint8Array>;
|
|
22
21
|
export type EciesDecryptorArgs = {
|
|
23
|
-
scheme: EciesScheme;
|
|
24
22
|
privKeyA: Secp256k1Keypair;
|
|
25
23
|
};
|
|
26
24
|
export declare function getEciesDecryptor({ privKeyA, }: EciesDecryptorArgs): Decryptor<EciesScheme>;
|
package/dist/cjs/lite/ecies.js
CHANGED
|
@@ -14,6 +14,7 @@ const ellipticPkg = require("elliptic");
|
|
|
14
14
|
const binary_js_1 = require("../binary.js");
|
|
15
15
|
const encryption_js_1 = require("../encryption/encryption.js");
|
|
16
16
|
const handle_js_1 = require("../handle.js");
|
|
17
|
+
const schema_js_1 = require("../schema.js");
|
|
17
18
|
const hadu_js_1 = require("./hadu.js");
|
|
18
19
|
const secp256k1 = new ellipticPkg.ec('secp256k1');
|
|
19
20
|
// Convert an ec.KeyPair from the 'elliptic' package (assumed to have geen generated
|
|
@@ -81,8 +82,8 @@ function getEciesEncryptor({ pubKeyA, privKeyB, }) {
|
|
|
81
82
|
if (plaintext.scheme !== encryption_js_1.encryptionSchemes.ecies) {
|
|
82
83
|
throw new Error(`Plaintext with scheme ${(0, encryption_js_1.getEncryptionSchemeName)(plaintext.scheme)} cannot be encrypted with ECIES`);
|
|
83
84
|
}
|
|
84
|
-
const
|
|
85
|
-
const ct = await (0, ecies_geth_1.encrypt)(pubKeyABuffer,
|
|
85
|
+
const inputCiphertextPayloadBytes = Buffer.from((0, hadu_js_1.encodeInput)({ plaintext, context }));
|
|
86
|
+
const ct = await (0, ecies_geth_1.encrypt)(pubKeyABuffer, inputCiphertextPayloadBytes, {
|
|
86
87
|
ephemPrivateKey: privKeyBBuffer,
|
|
87
88
|
});
|
|
88
89
|
const prehandle = (0, handle_js_1.computePrehandle)({
|
|
@@ -95,6 +96,7 @@ function getEciesEncryptor({ pubKeyA, privKeyB, }) {
|
|
|
95
96
|
prehandle,
|
|
96
97
|
context: context,
|
|
97
98
|
});
|
|
99
|
+
// const inputBytes = Buffer.concat([handle, ct]);
|
|
98
100
|
return {
|
|
99
101
|
prehandle: (0, binary_js_1.asBytes32)(prehandle),
|
|
100
102
|
handle: (0, binary_js_1.asBytes32)(handle),
|
|
@@ -102,7 +104,8 @@ function getEciesEncryptor({ pubKeyA, privKeyB, }) {
|
|
|
102
104
|
ciphertext: {
|
|
103
105
|
scheme: encryption_js_1.encryptionSchemes.ecies,
|
|
104
106
|
type: plaintext.type,
|
|
105
|
-
|
|
107
|
+
// The prepended handle serves as a checksum on the encrypted payload, so we can fail early on an accidental mismatch
|
|
108
|
+
value: (0, encryption_js_1.encodeCiphertextInput)((0, binary_js_1.bytesToHex)(handle), (0, binary_js_1.bytesToHex)(ct)),
|
|
106
109
|
},
|
|
107
110
|
};
|
|
108
111
|
};
|
|
@@ -117,19 +120,27 @@ async function decrypt(privKeyA, ciphertext) {
|
|
|
117
120
|
}
|
|
118
121
|
function getEciesDecryptor({ privKeyA, }) {
|
|
119
122
|
const privKeyABuffer = privKeyA.kp.getPrivate().toArrayLike(Buffer, 'be', 32);
|
|
120
|
-
return async ({ scheme, type, value,
|
|
123
|
+
return async ({ scheme, type, value, }) => {
|
|
121
124
|
if (scheme !== encryption_js_1.encryptionSchemes.ecies) {
|
|
122
125
|
throw new Error(`Ciphertext with scheme ${(0, encryption_js_1.getEncryptionSchemeName)(scheme)} cannot be decrypted with ECIES`);
|
|
123
126
|
}
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
|
|
127
|
+
// remove the prepended handle
|
|
128
|
+
const { ciphertext } = (0, encryption_js_1.decodeCiphertextInput)(value);
|
|
129
|
+
const ptBuf = await (0, ecies_geth_1.decrypt)(privKeyABuffer, (0, binary_js_1.bytesFromHexString)(ciphertext));
|
|
130
|
+
const payload = (0, hadu_js_1.decodeInput)(ptBuf);
|
|
131
|
+
if (payload.values.length === 0) {
|
|
132
|
+
throw new Error('no plaintexts in decrypted input');
|
|
130
133
|
}
|
|
131
|
-
|
|
132
|
-
|
|
134
|
+
if (payload.values.length > 1) {
|
|
135
|
+
throw new Error('multiple plaintexts in decrypted input, only one currently supported');
|
|
136
|
+
}
|
|
137
|
+
const pt = payload.values[0];
|
|
138
|
+
const computable = pt.value;
|
|
139
|
+
if (computable.case !== 'scalar') {
|
|
140
|
+
throw new Error(`decrypted plaintext is not a scalar, cannot currently be decrypted, this feature may be implemented on request`);
|
|
141
|
+
}
|
|
142
|
+
const typ = (0, schema_js_1.parse)(encryption_js_1.SupportedFheType, computable.value.type);
|
|
143
|
+
return (0, encryption_js_1.bytesToPlaintext)(computable.value.value, encryption_js_1.encryptionSchemes.ecies, typ);
|
|
133
144
|
};
|
|
134
145
|
}
|
|
135
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
146
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dist/cjs/lite/hadu.d.ts
CHANGED
|
@@ -1,24 +1,4 @@
|
|
|
1
|
-
import { Schema } from 'effect';
|
|
2
1
|
import { PlaintextWithContext } from '../encryption/index.js';
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
};
|
|
7
|
-
export type NoneEnvelope = (typeof encryptionEnvelopes)['none'];
|
|
8
|
-
export type HaduEnvelope = (typeof encryptionEnvelopes)['hadu'];
|
|
9
|
-
export declare const EncryptionEnvelope: Schema.SchemaClass<0 | 1, 0 | 1, never>;
|
|
10
|
-
export declare const HaduInput: Schema.transform<Schema.SchemaClass<unknown, string, never>, Schema.Struct<{
|
|
11
|
-
envelope: Schema.Literal<[1]>;
|
|
12
|
-
scheme: Schema.Literal<[0, 1, 2]>;
|
|
13
|
-
context: Schema.Struct<{
|
|
14
|
-
hostChainId: typeof Schema.BigInt;
|
|
15
|
-
aclAddress: Schema.TemplateLiteral<`0x${string}`>;
|
|
16
|
-
userAddress: Schema.TemplateLiteral<`0x${string}`>;
|
|
17
|
-
contractAddress: Schema.TemplateLiteral<`0x${string}`>;
|
|
18
|
-
}>;
|
|
19
|
-
plaintext: Schema.brand<Schema.filter<Schema.transformOrFail<Schema.Union<[typeof Schema.String, Schema.refine<object & Uint8Array<ArrayBufferLike>, Schema.Schema<object, object, never>>]>, Schema.TemplateLiteral<`0x${string}`>, never>>, "Bytes32">;
|
|
20
|
-
type: Schema.SchemaClass<0 | 5 | 7 | 8, 0 | 5 | 7 | 8, never>;
|
|
21
|
-
}>>;
|
|
22
|
-
export type HaduInput = typeof HaduInput.Type;
|
|
23
|
-
export declare function encodeInput({ plaintext, context, }: PlaintextWithContext): string;
|
|
24
|
-
export declare function decodeInput(json: string): PlaintextWithContext;
|
|
2
|
+
import { InputPayload } from '../generated/es/inco/covalidator/compute/v1/types_pb.js';
|
|
3
|
+
export declare function encodeInput({ plaintext, context, }: PlaintextWithContext): Uint8Array;
|
|
4
|
+
export declare function decodeInput(input: Uint8Array): InputPayload;
|
package/dist/cjs/lite/hadu.js
CHANGED
|
@@ -1,41 +1,38 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.HaduInput = exports.EncryptionEnvelope = exports.encryptionEnvelopes = void 0;
|
|
4
3
|
exports.encodeInput = encodeInput;
|
|
5
4
|
exports.decodeInput = decodeInput;
|
|
6
|
-
const
|
|
7
|
-
const Schema_1 = require("effect/Schema");
|
|
8
|
-
const binary_js_1 = require("../binary.js");
|
|
5
|
+
const protobuf_1 = require("@bufbuild/protobuf");
|
|
9
6
|
const index_js_1 = require("../encryption/index.js");
|
|
7
|
+
const types_pb_js_1 = require("../generated/es/inco/covalidator/compute/v1/types_pb.js");
|
|
10
8
|
const handle_js_1 = require("../handle.js");
|
|
11
9
|
// HADU stands for "Host Chain, ACL, DApp, and User" it maps to the InputContext type where the aclAddress
|
|
12
10
|
// may actually be the singular IncoLite contract which embeds its own ACL
|
|
13
|
-
exports.encryptionEnvelopes = {
|
|
14
|
-
none: 0,
|
|
15
|
-
hadu: 1,
|
|
16
|
-
};
|
|
17
|
-
exports.EncryptionEnvelope = effect_1.Schema.Literal(...Object.values(exports.encryptionEnvelopes));
|
|
18
|
-
exports.HaduInput = (0, Schema_1.parseJson)(effect_1.Schema.Struct({
|
|
19
|
-
envelope: effect_1.Schema.Literal(exports.encryptionEnvelopes.hadu),
|
|
20
|
-
scheme: index_js_1.EncryptionScheme,
|
|
21
|
-
context: handle_js_1.InputContext,
|
|
22
|
-
plaintext: binary_js_1.Bytes32,
|
|
23
|
-
type: index_js_1.SupportedFheType,
|
|
24
|
-
}));
|
|
25
11
|
function encodeInput({ plaintext, context, }) {
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
12
|
+
const payload = (0, protobuf_1.create)(types_pb_js_1.InputPayloadSchema, {
|
|
13
|
+
contextHash: (0, handle_js_1.hashInputContext)(context),
|
|
14
|
+
values: [
|
|
15
|
+
{
|
|
16
|
+
value: {
|
|
17
|
+
case: 'scalar',
|
|
18
|
+
value: (0, protobuf_1.create)(types_pb_js_1.ScalarSchema, {
|
|
19
|
+
type: plaintext.type,
|
|
20
|
+
value: (0, index_js_1.plaintextToBytes)(plaintext),
|
|
21
|
+
}),
|
|
22
|
+
},
|
|
23
|
+
},
|
|
24
|
+
],
|
|
32
25
|
});
|
|
26
|
+
return (0, protobuf_1.toBinary)(types_pb_js_1.InputPayloadSchema, payload);
|
|
33
27
|
}
|
|
34
|
-
function decodeInput(
|
|
35
|
-
const
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
28
|
+
function decodeInput(input) {
|
|
29
|
+
const payload = (0, protobuf_1.fromBinary)(types_pb_js_1.InputPayloadSchema, input);
|
|
30
|
+
if (payload.values.length === 0) {
|
|
31
|
+
throw new Error('no plaintexts in input');
|
|
32
|
+
}
|
|
33
|
+
if (payload.values.length > 1) {
|
|
34
|
+
throw new Error('multiple plaintexts in input, only one currently supported');
|
|
35
|
+
}
|
|
36
|
+
return payload;
|
|
40
37
|
}
|
|
41
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
38
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dist/cjs/lite/index.d.ts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
export * from '../generated/abis/lightning.js';
|
|
2
|
-
export type { AttestedComputeRequest, AttestedDecryptRequest, KmsService,
|
|
2
|
+
export type { AttestedComputeRequest, AttestedDecryptRequest, KmsService, } from '../generated/es/inco/kms/lite/v1/kms_service_pb.js';
|
|
3
3
|
export type { HandleWithProof } from '../generated/es/inco/kms/lite/v1/types_pb.js';
|
|
4
4
|
export * from './attested-compute.js';
|
|
5
5
|
export * from './attested-decrypt.js';
|