@inco/js 0.6.1 → 0.6.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (124) hide show
  1. package/dist/cjs/advancedacl/session-key.d.ts +8 -1
  2. package/dist/cjs/advancedacl/session-key.js +55 -21
  3. package/dist/cjs/attestedcompute/attested-compute.js +11 -4
  4. package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +38 -1
  5. package/dist/cjs/attesteddecrypt/attested-decrypt.js +49 -6
  6. package/dist/cjs/attesteddecrypt/types.d.ts +6 -1
  7. package/dist/cjs/attesteddecrypt/types.js +1 -1
  8. package/dist/cjs/attestedreveal/attested-reveal.js +9 -7
  9. package/dist/cjs/binary.d.ts +1 -0
  10. package/dist/cjs/binary.js +6 -2
  11. package/dist/cjs/encryption/encryption.d.ts +17 -22
  12. package/dist/cjs/encryption/encryption.js +34 -16
  13. package/dist/cjs/generated/abis/add-two.d.ts +1 -1
  14. package/dist/cjs/generated/abis/add-two.js +1 -1
  15. package/dist/cjs/generated/abis/lightning-preview.d.ts +48 -106
  16. package/dist/cjs/generated/abis/lightning-preview.js +33 -55
  17. package/dist/cjs/generated/abis/lightning.d.ts +55 -116
  18. package/dist/cjs/generated/abis/lightning.js +33 -66
  19. package/dist/cjs/generated/abis/verifier.d.ts +193 -84
  20. package/dist/cjs/generated/abis/verifier.js +151 -61
  21. package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.js +2 -2
  22. package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +775 -0
  23. package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.js +261 -0
  24. package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +186 -0
  25. package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +47 -0
  26. package/dist/cjs/generated/es/inco/fhe/v1/types_pb.js +2 -2
  27. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
  28. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +21 -26
  29. package/dist/cjs/generated/es/inco/kms/lite/v1/types_pb.js +2 -2
  30. package/dist/cjs/generated/lightning.d.ts +0 -32
  31. package/dist/cjs/generated/lightning.js +1 -33
  32. package/dist/cjs/generated/local-node.d.ts +1 -5
  33. package/dist/cjs/generated/local-node.js +2 -6
  34. package/dist/cjs/handle.d.ts +16 -0
  35. package/dist/cjs/handle.js +28 -3
  36. package/dist/cjs/lite/deployments.d.ts +20 -2
  37. package/dist/cjs/lite/deployments.js +1 -1
  38. package/dist/cjs/lite/ecies.d.ts +0 -2
  39. package/dist/cjs/lite/ecies.js +24 -13
  40. package/dist/cjs/lite/hadu.d.ts +3 -23
  41. package/dist/cjs/lite/hadu.js +26 -29
  42. package/dist/cjs/lite/index.d.ts +1 -1
  43. package/dist/cjs/lite/index.js +1 -1
  44. package/dist/cjs/lite/lightning.d.ts +24 -12
  45. package/dist/cjs/lite/lightning.js +62 -27
  46. package/dist/cjs/lite/reencrypt.d.ts +5 -7
  47. package/dist/cjs/lite/reencrypt.js +68 -58
  48. package/dist/cjs/test/mocks.d.ts +12 -0
  49. package/dist/cjs/test/mocks.js +27 -0
  50. package/dist/cjs/viem.d.ts +45 -48
  51. package/dist/esm/advancedacl/session-key.d.ts +8 -1
  52. package/dist/esm/advancedacl/session-key.js +58 -24
  53. package/dist/esm/attestedcompute/attested-compute.js +11 -4
  54. package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +38 -1
  55. package/dist/esm/attesteddecrypt/attested-decrypt.js +51 -8
  56. package/dist/esm/attesteddecrypt/types.d.ts +6 -1
  57. package/dist/esm/attesteddecrypt/types.js +1 -1
  58. package/dist/esm/attestedreveal/attested-reveal.js +9 -7
  59. package/dist/esm/binary.d.ts +1 -0
  60. package/dist/esm/binary.js +5 -2
  61. package/dist/esm/encryption/encryption.d.ts +17 -22
  62. package/dist/esm/encryption/encryption.js +30 -16
  63. package/dist/esm/generated/abis/add-two.d.ts +1 -1
  64. package/dist/esm/generated/abis/add-two.js +1 -1
  65. package/dist/esm/generated/abis/lightning-preview.d.ts +48 -106
  66. package/dist/esm/generated/abis/lightning-preview.js +33 -55
  67. package/dist/esm/generated/abis/lightning.d.ts +55 -116
  68. package/dist/esm/generated/abis/lightning.js +33 -66
  69. package/dist/esm/generated/abis/verifier.d.ts +193 -84
  70. package/dist/esm/generated/abis/verifier.js +151 -61
  71. package/dist/esm/generated/es/cosmos_proto/cosmos_pb.js +2 -2
  72. package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +775 -0
  73. package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.js +258 -0
  74. package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +186 -0
  75. package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +44 -0
  76. package/dist/esm/generated/es/inco/fhe/v1/types_pb.js +2 -2
  77. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
  78. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +20 -25
  79. package/dist/esm/generated/es/inco/kms/lite/v1/types_pb.js +2 -2
  80. package/dist/esm/generated/lightning.d.ts +0 -32
  81. package/dist/esm/generated/lightning.js +1 -33
  82. package/dist/esm/generated/local-node.d.ts +1 -5
  83. package/dist/esm/generated/local-node.js +2 -6
  84. package/dist/esm/handle.d.ts +16 -0
  85. package/dist/esm/handle.js +27 -3
  86. package/dist/esm/lite/deployments.d.ts +20 -2
  87. package/dist/esm/lite/deployments.js +1 -1
  88. package/dist/esm/lite/ecies.d.ts +0 -2
  89. package/dist/esm/lite/ecies.js +26 -15
  90. package/dist/esm/lite/hadu.d.ts +3 -23
  91. package/dist/esm/lite/hadu.js +28 -30
  92. package/dist/esm/lite/index.d.ts +1 -1
  93. package/dist/esm/lite/index.js +1 -1
  94. package/dist/esm/lite/lightning.d.ts +24 -12
  95. package/dist/esm/lite/lightning.js +59 -24
  96. package/dist/esm/lite/reencrypt.d.ts +5 -7
  97. package/dist/esm/lite/reencrypt.js +67 -58
  98. package/dist/esm/test/mocks.d.ts +12 -0
  99. package/dist/esm/test/mocks.js +23 -0
  100. package/dist/esm/viem.d.ts +45 -48
  101. package/dist/types/advancedacl/session-key.d.ts +8 -1
  102. package/dist/types/attesteddecrypt/attested-decrypt.d.ts +38 -1
  103. package/dist/types/attesteddecrypt/types.d.ts +6 -1
  104. package/dist/types/binary.d.ts +1 -0
  105. package/dist/types/encryption/encryption.d.ts +17 -22
  106. package/dist/types/generated/abis/add-two.d.ts +1 -1
  107. package/dist/types/generated/abis/lightning-preview.d.ts +48 -106
  108. package/dist/types/generated/abis/lightning.d.ts +55 -116
  109. package/dist/types/generated/abis/verifier.d.ts +193 -84
  110. package/dist/types/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +775 -0
  111. package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +186 -0
  112. package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
  113. package/dist/types/generated/lightning.d.ts +0 -32
  114. package/dist/types/generated/local-node.d.ts +1 -5
  115. package/dist/types/handle.d.ts +16 -0
  116. package/dist/types/lite/deployments.d.ts +20 -2
  117. package/dist/types/lite/ecies.d.ts +0 -2
  118. package/dist/types/lite/hadu.d.ts +3 -23
  119. package/dist/types/lite/index.d.ts +1 -1
  120. package/dist/types/lite/lightning.d.ts +24 -12
  121. package/dist/types/lite/reencrypt.d.ts +5 -7
  122. package/dist/types/test/mocks.d.ts +12 -0
  123. package/dist/types/viem.d.ts +45 -48
  124. package/package.json +3 -1
@@ -22,4 +22,4 @@ __exportStar(require("./ecies.js"), exports);
22
22
  __exportStar(require("./hadu.js"), exports);
23
23
  __exportStar(require("./lightning.js"), exports);
24
24
  __exportStar(require("./reencrypt.js"), exports);
25
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvbGl0ZS9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7Ozs7Ozs7Ozs7Ozs7O0FBQUEsaUVBQStDO0FBUS9DLHdEQUFzQztBQUN0Qyx3REFBc0M7QUFDdEMsbURBQWlDO0FBQ2pDLDZDQUEyQjtBQUMzQiw0Q0FBMEI7QUFDMUIsaURBQStCO0FBQy9CLGlEQUErQiJ9
25
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvbGl0ZS9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7Ozs7Ozs7Ozs7Ozs7O0FBQUEsaUVBQStDO0FBTy9DLHdEQUFzQztBQUN0Qyx3REFBc0M7QUFDdEMsbURBQWlDO0FBQ2pDLDZDQUEyQjtBQUMzQiw0Q0FBMEI7QUFDMUIsaURBQStCO0FBQy9CLGlEQUErQiJ9
@@ -1,9 +1,9 @@
1
- import { Account, Chain, Transport, WalletClient } from 'viem';
1
+ import { Account, Chain, PublicClient, Transport, WalletClient } from 'viem';
2
2
  import { AllowanceVoucherWithSig } from '../advancedacl/types.js';
3
3
  import { AttestedComputeOP } from '../attestedcompute/types.js';
4
4
  import { DecryptionAttestation } from '../attesteddecrypt/index.js';
5
5
  import { Address, HexString } from '../binary.js';
6
- import { EciesScheme, PlaintextOf, SupportedFheType } from '../encryption/index.js';
6
+ import { EciesScheme, Encryptor, PlaintextOf, SupportedFheType } from '../encryption/index.js';
7
7
  import { lightningDeployments } from '../generated/lightning.js';
8
8
  import { localNodeLightningConfig } from '../generated/local-node.js';
9
9
  import { LocalNodeEnv } from '../local/index.js';
@@ -26,12 +26,10 @@ export type EncryptionContext = {
26
26
  };
27
27
  export type DeploymentSlice = {
28
28
  executorAddress: string;
29
- eciesPublicKey: string;
30
29
  chainId: number;
31
30
  };
32
31
  export type CustomConfig = {
33
32
  executorAddress: string;
34
- eciesPublicKey: string;
35
33
  chainId: number;
36
34
  covalidatorUrl: string;
37
35
  hostChainRpcUrl?: string;
@@ -46,16 +44,14 @@ export declare class Lightning<T extends DeploymentSlice = DeploymentSlice> {
46
44
  private readonly _deployment;
47
45
  readonly covalidatorUrl: string;
48
46
  readonly executorAddress: Address;
49
- readonly eciesPublicKey: HexString;
50
47
  readonly chainId: bigint;
51
- private readonly encryptor;
52
48
  private readonly ephemeralKeypair;
53
49
  private readonly kmsClient;
54
50
  private constructor();
55
51
  /**
56
52
  * Get a Lightning instance bound to the latest Lightning deployment for the Base Sepolia testnet.
57
53
  */
58
- static baseSepoliaTestnet(): Lightning<Deployment>;
54
+ static baseSepoliaTestnet(): Promise<Lightning<Deployment>>;
59
55
  /**
60
56
  * Get a Lightning instance bound to our canonical Anvil-based test node and test Covalidator node
61
57
  *
@@ -71,7 +67,7 @@ export declare class Lightning<T extends DeploymentSlice = DeploymentSlice> {
71
67
  * corresponding Pepper.
72
68
  *
73
69
  */
74
- static localNode(env?: LocalNodeEnv | LocalNodePepper): Lightning<CustomDeployment>;
70
+ static localNode(env?: LocalNodeEnv | LocalNodePepper): Promise<Lightning<CustomDeployment>>;
75
71
  /**
76
72
  * Get a Lightning instance bound to a local node from a file containing a LocalNodeEnv environment .
77
73
  *
@@ -83,14 +79,15 @@ export declare class Lightning<T extends DeploymentSlice = DeploymentSlice> {
83
79
  *
84
80
  * @param id this is an object containing either the pair of name and chainId or the executorAddress and chainId
85
81
  */
86
- static at(id: DeploymentId): Lightning<Deployment>;
82
+ static at(id: DeploymentId): Promise<Lightning<Deployment>>;
87
83
  /**
88
84
  * Get a Lightning deployment for a local or custom node
89
85
  *
90
86
  * @param config this is an object containing the executorAddress, eciesPublicKey, chainId and covalidatorUrl.
91
87
  * additional fields past will be made available as part of the `deployment` property.
92
88
  */
93
- static custom<T extends CustomConfig>(config: T): Lightning<DeploymentSlice & T>;
89
+ static custom<T extends CustomConfig>(config: T): Promise<Lightning<DeploymentSlice & T>>;
90
+ static getEciesPublicKey(client: PublicClient, executorAddress: Address): Promise<HexString>;
94
91
  /**
95
92
  * Get the latest deployment for a given pepper, which usually denotes a family of deployments distinct from their
96
93
  * version such as 'devnet', 'testnet', 'mainnet', etc.
@@ -107,7 +104,7 @@ export declare class Lightning<T extends DeploymentSlice = DeploymentSlice> {
107
104
  * @param pepper the pepper to use to filter the deployments
108
105
  * @param chainId the chainId to use to filter the deployments
109
106
  */
110
- static latest<P extends Pepper>(pepper: P, chainId: ChainId): Lightning<Deployment>;
107
+ static latest<P extends Pepper>(pepper: P, chainId: ChainId): Promise<Lightning<Deployment>>;
111
108
  get deployment(): T;
112
109
  /**
113
110
  * Encrypt a value using the public ECIES key of the Lightning deployment.
@@ -116,7 +113,7 @@ export declare class Lightning<T extends DeploymentSlice = DeploymentSlice> {
116
113
  * @param accountAddress the address of the account interacting with the dapp contract, normally an Externally Owned Account (EOA)
117
114
  * @param dappAddress the address of the dapp contract that interacts with the Inco Lightning contract or library
118
115
  */
119
- encrypt<T extends SupportedNativeType>(value: T, { accountAddress, dappAddress }: EncryptionContext): Promise<HexString>;
116
+ encrypt<T extends SupportedNativeType>(value: T, { accountAddress, dappAddress }: EncryptionContext, encryptor: Encryptor<EciesScheme>): Promise<HexString>;
120
117
  /**
121
118
  * Obtain a reencryptor for a particular Externally Owned Account (EOA) to request decrypted values.
122
119
  * The account associated with the walletClient must have permissions to decrypt the handle or ciphertext passed
@@ -125,6 +122,7 @@ export declare class Lightning<T extends DeploymentSlice = DeploymentSlice> {
125
122
  * @param walletClient the wallet client to use for signing the reencrypt request.
126
123
  */
127
124
  getReencryptor(walletClient: WalletClient<Transport, Chain, Account>): Promise<Reencryptor<EciesScheme>>;
125
+ getEncryptor(eciesPubkey: HexString): Encryptor<EciesScheme>;
128
126
  /**
129
127
  * Grants a session key allowance voucher for secure reencryption operations.
130
128
  *
@@ -245,6 +243,20 @@ export declare class Lightning<T extends DeploymentSlice = DeploymentSlice> {
245
243
  * @returns A promise that resolves to a compute attestation.
246
244
  */
247
245
  attestedCompute(ephemeralKeypair: Secp256k1Keypair, lhsHandle: HexString, op: AttestedComputeOP, rhsPlaintext: bigint | boolean, allowanceVoucherWithSig: AllowanceVoucherWithSig, backoffConfig?: Partial<BackoffConfig>): Promise<DecryptionAttestation<EciesScheme, SupportedFheType>>;
246
+ /**
247
+ * Get an decryption of publicly revealed handles.
248
+ *
249
+ * @param handles - The handles to decrypt
250
+ * @param backoffConfig - The backoff configuration for the attested decrypt request
251
+ * @returns The decryption attestations
252
+ *
253
+ * @example
254
+ * ```typescript
255
+ * const response = await lightning.attestedReveal([handle1, handle2]);
256
+ * const { plaintext, covalidatorSignature } = response[0];
257
+ * ```
258
+ */
259
+ attestedReveal(handles: HexString[], backoffConfig?: Partial<BackoffConfig>): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
248
260
  /**
249
261
  * Get the GRPC endpoint for the covalidator that services this deployment.
250
262
  */
@@ -7,9 +7,12 @@ const chains_1 = require("viem/chains");
7
7
  const session_key_js_1 = require("../advancedacl/session-key.js");
8
8
  const attested_compute_js_1 = require("../attestedcompute/attested-compute.js");
9
9
  const attested_decrypt_js_1 = require("../attesteddecrypt/attested-decrypt.js");
10
+ const attested_reveal_js_1 = require("../attestedreveal/attested-reveal.js");
10
11
  const binary_js_1 = require("../binary.js");
11
12
  const index_js_1 = require("../encryption/index.js");
12
- const lightning_js_1 = require("../generated/lightning.js");
13
+ const lightning_js_1 = require("../generated/abis/lightning.js");
14
+ const verifier_js_1 = require("../generated/abis/verifier.js");
15
+ const lightning_js_2 = require("../generated/lightning.js");
13
16
  const local_node_js_1 = require("../generated/local-node.js");
14
17
  const handle_js_1 = require("../handle.js");
15
18
  const index_js_2 = require("../local/index.js");
@@ -25,30 +28,22 @@ class Lightning {
25
28
  _deployment;
26
29
  covalidatorUrl;
27
30
  executorAddress;
28
- eciesPublicKey;
29
31
  chainId;
30
- encryptor;
31
32
  ephemeralKeypair;
32
33
  kmsClient;
33
34
  constructor(_deployment, covalidatorUrl) {
34
35
  this._deployment = _deployment;
35
36
  this.covalidatorUrl = covalidatorUrl;
36
37
  this.executorAddress = (0, binary_js_1.parseAddress)(_deployment.executorAddress);
37
- this.eciesPublicKey = (0, schema_js_1.parse)(binary_js_1.HexString, _deployment.eciesPublicKey);
38
38
  this.chainId = BigInt(_deployment.chainId);
39
39
  this.ephemeralKeypair = (0, ecies_js_1.generateSecp256k1Keypair)();
40
40
  this.kmsClient = (0, reencrypt_js_1.getKmsClient)(covalidatorUrl);
41
- this.encryptor = (0, ecies_js_1.getEciesEncryptor)({
42
- scheme: index_js_1.encryptionSchemes.ecies,
43
- pubKeyA: (0, ecies_js_1.decodeSecp256k1PublicKey)((0, viem_1.hexToBytes)((0, schema_js_1.parse)(binary_js_1.HexString, _deployment.eciesPublicKey))),
44
- privKeyB: this.ephemeralKeypair,
45
- });
46
41
  }
47
42
  /**
48
43
  * Get a Lightning instance bound to the latest Lightning deployment for the Base Sepolia testnet.
49
44
  */
50
- static baseSepoliaTestnet() {
51
- return Lightning.latest('testnet', chains_1.baseSepolia.id);
45
+ static async baseSepoliaTestnet() {
46
+ return await Lightning.latest('testnet', chains_1.baseSepolia.id);
52
47
  }
53
48
  /**
54
49
  * Get a Lightning instance bound to our canonical Anvil-based test node and test Covalidator node
@@ -65,15 +60,15 @@ class Lightning {
65
60
  * corresponding Pepper.
66
61
  *
67
62
  */
68
- static localNode(env) {
63
+ static async localNode(env) {
69
64
  if (!env) {
70
- return Lightning.custom(local_node_js_1.localNodeLightningConfig[DefaultPepper]);
65
+ return await Lightning.custom(local_node_js_1.localNodeLightningConfig[DefaultPepper]);
71
66
  }
72
67
  if (typeof env === 'string') {
73
- return Lightning.custom(local_node_js_1.localNodeLightningConfig[env]);
68
+ return await Lightning.custom(local_node_js_1.localNodeLightningConfig[env]);
74
69
  }
75
70
  const conf = local_node_js_1.localNodeLightningConfig[DefaultPepper];
76
- return Lightning.custom({
71
+ return await Lightning.custom({
77
72
  // We assume that we always run a local node as the default anvil node
78
73
  chainId: env.COVALIDATOR_HOST_CHAIN_ID
79
74
  ? Number(env.COVALIDATOR_HOST_CHAIN_ID)
@@ -84,7 +79,6 @@ class Lightning {
84
79
  'http://localhost:8545',
85
80
  // These variables vary per environment
86
81
  executorAddress: env.EXECUTOR_ADDRESS,
87
- eciesPublicKey: env.ECIES_PUBLIC_KEY,
88
82
  senderPrivateKey: env.SENDER_PRIVATE_KEY,
89
83
  });
90
84
  }
@@ -96,17 +90,17 @@ class Lightning {
96
90
  static async localNodeFromEnv(filePath) {
97
91
  const buf = filePath ? await fs.readFile(filePath) : undefined;
98
92
  const env = (0, index_js_2.parseLocalEnv)(buf);
99
- return Lightning.localNode(env);
93
+ return await Lightning.localNode(env);
100
94
  }
101
95
  /**
102
96
  * Get a Lightning deployment by name or executor address on a particular chain.
103
97
  *
104
98
  * @param id this is an object containing either the pair of name and chainId or the executorAddress and chainId
105
99
  */
106
- static at(id) {
100
+ static async at(id) {
107
101
  const deployment = this.isIdByName(id)
108
- ? lightning_js_1.lightningDeployments.find((d) => d.name === id.name && d.chainId === id.chainId)
109
- : lightning_js_1.lightningDeployments.find((d) => d.executorAddress === id.executorAddress &&
102
+ ? lightning_js_2.lightningDeployments.find((d) => d.name === id.name && d.chainId === id.chainId)
103
+ : lightning_js_2.lightningDeployments.find((d) => d.executorAddress === id.executorAddress &&
110
104
  d.chainId === id.chainId);
111
105
  if (!deployment) {
112
106
  throw new Error(`No deployment found for ${JSON.stringify(id)}`);
@@ -119,9 +113,23 @@ class Lightning {
119
113
  * @param config this is an object containing the executorAddress, eciesPublicKey, chainId and covalidatorUrl.
120
114
  * additional fields past will be made available as part of the `deployment` property.
121
115
  */
122
- static custom(config) {
116
+ static async custom(config) {
123
117
  return new Lightning(config, config.covalidatorUrl);
124
118
  }
119
+ static async getEciesPublicKey(client, executorAddress) {
120
+ const incoLightningContract = (0, viem_1.getContract)({
121
+ abi: lightning_js_1.incoLightningAbi,
122
+ address: executorAddress,
123
+ client,
124
+ });
125
+ const incoVerifierAddress = await incoLightningContract.read.incoVerifier();
126
+ const incoVerifier = (0, viem_1.getContract)({
127
+ abi: verifier_js_1.incoVerifierAbi,
128
+ address: incoVerifierAddress,
129
+ client,
130
+ });
131
+ return await incoVerifier.read.eciesPubkey();
132
+ }
125
133
  /**
126
134
  * Get the latest deployment for a given pepper, which usually denotes a family of deployments distinct from their
127
135
  * version such as 'devnet', 'testnet', 'mainnet', etc.
@@ -131,7 +139,7 @@ class Lightning {
131
139
  */
132
140
  static latestDeployment(pepper, chainId) {
133
141
  // Deployments are sorted so we are guaranteed to get the latest first
134
- const latestByPepper = lightning_js_1.lightningDeployments.find((d) => d.pepper === pepper && d.chainId === chainId);
142
+ const latestByPepper = lightning_js_2.lightningDeployments.find((d) => d.pepper === pepper && d.chainId === chainId);
135
143
  if (!latestByPepper) {
136
144
  // This should not actually happen provided this file compiles since we are extracting the available peppers
137
145
  // from the const itself
@@ -147,8 +155,8 @@ class Lightning {
147
155
  * @param pepper the pepper to use to filter the deployments
148
156
  * @param chainId the chainId to use to filter the deployments
149
157
  */
150
- static latest(pepper, chainId) {
151
- return Lightning.at(Lightning.latestDeployment(pepper, chainId));
158
+ static async latest(pepper, chainId) {
159
+ return await Lightning.at(Lightning.latestDeployment(pepper, chainId));
152
160
  }
153
161
  /*
154
162
  * Get the latest deployment for a given pepper, which usually denotes a family of deployments distinct from their
@@ -164,8 +172,8 @@ class Lightning {
164
172
  * @param accountAddress the address of the account interacting with the dapp contract, normally an Externally Owned Account (EOA)
165
173
  * @param dappAddress the address of the dapp contract that interacts with the Inco Lightning contract or library
166
174
  */
167
- async encrypt(value, { accountAddress, dappAddress }) {
168
- const { ciphertext } = await this.encryptor({
175
+ async encrypt(value, { accountAddress, dappAddress }, encryptor) {
176
+ const { ciphertext } = await encryptor({
169
177
  plaintext: Lightning.plaintextFromValue(value),
170
178
  context: {
171
179
  hostChainId: this.chainId,
@@ -191,6 +199,12 @@ class Lightning {
191
199
  ephemeralKeypair: this.ephemeralKeypair,
192
200
  });
193
201
  }
202
+ getEncryptor(eciesPubkey) {
203
+ return (0, ecies_js_1.getEciesEncryptor)({
204
+ pubKeyA: (0, ecies_js_1.decodeSecp256k1PublicKey)((0, viem_1.hexToBytes)((0, schema_js_1.parse)(binary_js_1.HexString, eciesPubkey))),
205
+ privKeyB: this.ephemeralKeypair,
206
+ });
207
+ }
194
208
  /**
195
209
  * Grants a session key allowance voucher for secure reencryption operations.
196
210
  *
@@ -323,6 +337,27 @@ class Lightning {
323
337
  backoffConfig,
324
338
  });
325
339
  }
340
+ /**
341
+ * Get an decryption of publicly revealed handles.
342
+ *
343
+ * @param handles - The handles to decrypt
344
+ * @param backoffConfig - The backoff configuration for the attested decrypt request
345
+ * @returns The decryption attestations
346
+ *
347
+ * @example
348
+ * ```typescript
349
+ * const response = await lightning.attestedReveal([handle1, handle2]);
350
+ * const { plaintext, covalidatorSignature } = response[0];
351
+ * ```
352
+ */
353
+ attestedReveal(handles, backoffConfig) {
354
+ return (0, attested_reveal_js_1.attestedReveal)({
355
+ handles,
356
+ backoffConfig,
357
+ chainId: Number(this.chainId),
358
+ kmsConnectRpcEndpointOrClient: this.kmsClient,
359
+ });
360
+ }
326
361
  /**
327
362
  * Get the GRPC endpoint for the covalidator that services this deployment.
328
363
  */
@@ -354,4 +389,4 @@ class Lightning {
354
389
  }
355
390
  }
356
391
  exports.Lightning = Lightning;
357
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/lite/lightning.ts"],"names":[],"mappings":";;;AACA,kCAAkC;AAClC,+BAA2E;AAC3E,wCAA0C;AAC1C,kEAMuC;AAEvC,gFAAyE;AAEzE,gFAAyE;AAEzE,4CAAgE;AAEhE,qDAMgC;AAEhC,4DAAiE;AACjE,8DAAsE;AACtE,4CAA2C;AAC3C,gDAAgE;AAGhE,4CAAqC;AACrC,yCAKoB;AACpB,iDAAmE;AA6BnE,MAAM,aAAa,GAAoB,SAAS,CAAC;AA2BjD;;;GAGG;AACH,MAAa,SAAS;IAUD;IACD;IAVF,eAAe,CAAU;IACzB,cAAc,CAAY;IAC1B,OAAO,CAAS;IAEf,SAAS,CAAyB;IAClC,gBAAgB,CAAmB;IACnC,SAAS,CAA4B;IAEtD,YACmB,WAAc,EACf,cAAsB;QADrB,gBAAW,GAAX,WAAW,CAAG;QACf,mBAAc,GAAd,cAAc,CAAQ;QAEtC,IAAI,CAAC,eAAe,GAAG,IAAA,wBAAY,EAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACjE,IAAI,CAAC,cAAc,GAAG,IAAA,iBAAK,EAAC,qBAAS,EAAE,WAAW,CAAC,cAAc,CAAC,CAAC;QACnE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE3C,IAAI,CAAC,gBAAgB,GAAG,IAAA,mCAAwB,GAAE,CAAC;QACnD,IAAI,CAAC,SAAS,GAAG,IAAA,2BAAY,EAAC,cAAc,CAAC,CAAC;QAC9C,IAAI,CAAC,SAAS,GAAG,IAAA,4BAAiB,EAAC;YACjC,MAAM,EAAE,4BAAiB,CAAC,KAAK;YAC/B,OAAO,EAAE,IAAA,mCAAwB,EAC/B,IAAA,iBAAU,EAAC,IAAA,iBAAK,EAAC,qBAAS,EAAE,WAAW,CAAC,cAAc,CAAC,CAAC,CACzD;YACD,QAAQ,EAAE,IAAI,CAAC,gBAAgB;SAChC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,kBAAkB;QACvB,OAAO,SAAS,CAAC,MAAM,CAAC,SAAS,EAAE,oBAAW,CAAC,EAAE,CAAC,CAAC;IACrD,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,SAAS,CACd,GAAoC;QAEpC,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,OAAO,SAAS,CAAC,MAAM,CAAC,wCAAwB,CAAC,aAAa,CAAC,CAAC,CAAC;QACnE,CAAC;QACD,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,OAAO,SAAS,CAAC,MAAM,CAAC,wCAAwB,CAAC,GAAG,CAAC,CAAC,CAAC;QACzD,CAAC;QACD,MAAM,IAAI,GAAG,wCAAwB,CAAC,aAAa,CAAC,CAAC;QACrD,OAAO,SAAS,CAAC,MAAM,CAAC;YACtB,sEAAsE;YACtE,OAAO,EAAE,GAAG,CAAC,yBAAyB;gBACpC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,yBAAyB,CAAC;gBACvC,CAAC,CAAC,IAAI,CAAC,OAAO;YAChB,cAAc,EAAE,GAAG,CAAC,eAAe,IAAI,IAAI,CAAC,cAAc;YAC1D,eAAe,EACb,GAAG,CAAC,8BAA8B;gBAClC,IAAI,CAAC,eAAe;gBACpB,uBAAuB;YACzB,uCAAuC;YACvC,eAAe,EAAE,GAAG,CAAC,gBAAgB;YACrC,cAAc,EAAE,GAAG,CAAC,gBAAgB;YACpC,gBAAgB,EAAE,GAAG,CAAC,kBAAkB;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAC3B,QAAiB;QAEjB,MAAM,GAAG,GAAG,QAAQ,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAC/D,MAAM,GAAG,GAAG,IAAA,wBAAa,EAAC,GAAG,CAAC,CAAC;QAC/B,OAAO,SAAS,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;IAClC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,EAAE,CAAC,EAAgB;QACxB,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,CAAC,CAAC,mCAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,EAAE,CAAC,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CACtD;YACH,CAAC,CAAC,mCAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,eAAe,KAAK,EAAE,CAAC,eAAe;gBACxC,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAC3B,CAAC;QACN,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,2BAA2B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;QACnE,CAAC;QACD,OAAO,IAAI,SAAS,CAAC,UAAU,EAAE,SAAS,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC,CAAC;IAC5E,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,MAAM,CACX,MAAS;QAET,OAAO,IAAI,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,cAAc,CAAC,CAAC;IACtD,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,gBAAgB,CACrB,MAAS,EACT,OAAgB;QAEhB,sEAAsE;QACtE,MAAM,cAAc,GAAG,mCAAoB,CAAC,IAAI,CAC9C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,IAAI,CAAC,CAAC,OAAO,KAAK,OAAO,CACpD,CAAC;QACF,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,4GAA4G;YAC5G,wBAAwB;YACxB,MAAM,IAAI,KAAK,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;QACD,OAAO,cAAc,CAAC;IACxB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,MAAM,CACX,MAAS,EACT,OAAgB;QAEhB,OAAO,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,EAAE,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CACX,KAAQ,EACR,EAAE,cAAc,EAAE,WAAW,EAAqB;QAElD,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC;YAC1C,SAAS,EAAE,SAAS,CAAC,kBAAkB,CAAC,KAAK,CAAC;YAC9C,OAAO,EAAE;gBACP,WAAW,EAAE,IAAI,CAAC,OAAO;gBACzB,UAAU,EAAE,IAAI,CAAC,eAAe;gBAChC,WAAW,EAAE,IAAA,wBAAY,EAAC,cAAc,CAAC;gBACzC,eAAe,EAAE,IAAA,wBAAY,EAAC,WAAW,CAAC;aAC3C;SACF,CAAC,CAAC;QACH,OAAO,UAAU,CAAC,KAAK,CAAC;IAC1B,CAAC;IAED;;;;;;OAMG;IACH,cAAc,CACZ,YAAqD;QAErD,OAAO,IAAA,kCAAmB,EAAC;YACzB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;SACxC,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACH,+BAA+B,CAC7B,YAAqD,EACrD,cAAsB,EACtB,SAAe,EACf,sBAA8B;QAE9B,OAAO,IAAA,gCAAe,EAAC;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,8BAA8B,EAAE,IAAA,wBAAY,EAAC,sBAAsB,CAAC;YACpE,cAAc,EAAE,IAAA,wBAAY,EAAC,cAAc,CAAC;YAC5C,kBAAkB,EAAE,YAAY;YAChC,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACH,uBAAuB,CACrB,uBAAgD,EAChD,gBAAkC;QAElC,OAAO,IAAA,sCAAqB,EAAC;YAC3B,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,gBAAgB;YAChB,uBAAuB;SACxB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;OAQG;IACH,gCAAgC,CAC9B,YAAqD;QAErD,OAAO,IAAA,iDAAgC,EAAC,IAAI,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IAC9E,CAAC;IA2CD,eAAe,CACb,IAAgE,EAChE,IAA2C,EAC3C,IAA2C,EAC3C,IAA6B;QAE7B,IAAI,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;YACxB,MAAM,YAAY,GAAG,IAA+C,CAAC;YACrE,MAAM,OAAO,GAAG,IAAmB,CAAC;YACpC,MAAM,aAAa,GAAG,IAA0C,CAAC;YACjE,OAAO,IAAA,qCAAe,EAAC;gBACrB,OAAO;gBACP,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,YAAY;gBACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;aAC9C,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,MAAM,gBAAgB,GAAG,IAAwB,CAAC;YAClD,MAAM,uBAAuB,GAAG,IAA+B,CAAC;YAChE,MAAM,OAAO,GAAG,IAAmB,CAAC;YACpC,MAAM,aAAa,GAAG,IAA0C,CAAC;YACjE,OAAO,IAAA,0CAAyB,EAAC;gBAC/B,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;gBAC7C,gBAAgB;gBAChB,uBAAuB;gBACvB,OAAO;aACR,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAuDD,eAAe,CACb,IAAgE,EAChE,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,IAAuD,EACvD,IAA6B;QAE7B,IACE,OAAO,IAAI,KAAK,QAAQ;YACxB,IAAI,KAAK,IAAI;YACb,SAAS,IAAI,IAAI;YACjB,kBAAkB,IAAI,IAAI;YAC1B,QAAQ,IAAI,IAAI,EAChB,CAAC;YACD,mBAAmB;YACnB,MAAM,gBAAgB,GAAG,IAAwB,CAAC;YAClD,MAAM,uBAAuB,GAAG,IAA+B,CAAC;YAChE,MAAM,aAAa,GAAG,IAAI,CAAC;YAC3B,OAAO,IAAA,0CAAyB,EAAC;gBAC/B,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;gBAC7C,gBAAgB;gBAChB,uBAAuB;gBACvB,SAAS;gBACT,EAAE;gBACF,YAAY;gBACZ,aAAa;aACd,CAAC,CAAC;QACL,CAAC;QAED,qBAAqB;QACrB,MAAM,YAAY,GAAG,IAA+C,CAAC;QACrE,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,IAAA,qCAAe,EAAC;YACrB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,iBAAiB,CAC7B,UAAgD;QAEhD,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,UAAU,CAAC;QACxD,OAAO,WAAW,eAAe,CAAC,WAAW,EAAE,IAAI,OAAO,IAAI,MAAM,WAAW,CAAC;IAClF,CAAC;IAEO,MAAM,CAAC,UAAU,CAAC,EAAgB;QACxC,OAAQ,EAAuB,CAAC,IAAI,KAAK,SAAS,CAAC;IACrD,CAAC;IAEO,MAAM,CAAC,kBAAkB,CAC/B,KAAQ;QAER,IAAI,OAAO,KAAK,KAAK,SAAS,EAAE,CAAC;YAC/B,OAAO;gBACL,MAAM,EAAE,4BAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,uBAAW,CAAC,KAAK;gBACvB,KAAK,EAAE,KAAK;aACsC,CAAC;QACvD,CAAC;aAAM,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAClE,OAAO;gBACL,MAAM,EAAE,4BAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,uBAAW,CAAC,QAAQ;gBAC1B,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC;aAC8B,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oBAAoB,OAAO,KAAK,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;CACF;AAlfD,8BAkfC"}
392
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/lite/lightning.ts"],"names":[],"mappings":";;;AACA,kCAAkC;AAClC,+BAQc;AACd,wCAA0C;AAC1C,kEAMuC;AAEvC,gFAAyE;AAEzE,gFAAyE;AAEzE,6EAAsE;AACtE,4CAAgE;AAEhE,qDAMgC;AAChC,iEAAkE;AAClE,+DAAgE;AAEhE,4DAAiE;AACjE,8DAAsE;AACtE,4CAA2C;AAC3C,gDAAgE;AAGhE,4CAAqC;AACrC,yCAKoB;AACpB,iDAAmE;AA6BnE,MAAM,aAAa,GAAoB,SAAS,CAAC;AAyBjD;;;GAGG;AACH,MAAa,SAAS;IAQD;IACD;IARF,eAAe,CAAU;IACzB,OAAO,CAAS;IAEf,gBAAgB,CAAmB;IACnC,SAAS,CAA4B;IAEtD,YACmB,WAAc,EACf,cAAsB;QADrB,gBAAW,GAAX,WAAW,CAAG;QACf,mBAAc,GAAd,cAAc,CAAQ;QAEtC,IAAI,CAAC,eAAe,GAAG,IAAA,wBAAY,EAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACjE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE3C,IAAI,CAAC,gBAAgB,GAAG,IAAA,mCAAwB,GAAE,CAAC;QACnD,IAAI,CAAC,SAAS,GAAG,IAAA,2BAAY,EAAC,cAAc,CAAC,CAAC;IAChD,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,kBAAkB;QAC7B,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC,SAAS,EAAE,oBAAW,CAAC,EAAE,CAAC,CAAC;IAC3D,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,KAAK,CAAC,SAAS,CACpB,GAAoC;QAEpC,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC,wCAAwB,CAAC,aAAa,CAAC,CAAC,CAAC;QACzE,CAAC;QACD,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC,wCAAwB,CAAC,GAAG,CAAC,CAAC,CAAC;QAC/D,CAAC;QACD,MAAM,IAAI,GAAG,wCAAwB,CAAC,aAAa,CAAC,CAAC;QACrD,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC;YAC5B,sEAAsE;YACtE,OAAO,EAAE,GAAG,CAAC,yBAAyB;gBACpC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,yBAAyB,CAAC;gBACvC,CAAC,CAAC,IAAI,CAAC,OAAO;YAChB,cAAc,EAAE,GAAG,CAAC,eAAe,IAAI,IAAI,CAAC,cAAc;YAC1D,eAAe,EACb,GAAG,CAAC,8BAA8B;gBAClC,IAAI,CAAC,eAAe;gBACpB,uBAAuB;YACzB,uCAAuC;YACvC,eAAe,EAAE,GAAG,CAAC,gBAAgB;YACrC,gBAAgB,EAAE,GAAG,CAAC,kBAAkB;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAC3B,QAAiB;QAEjB,MAAM,GAAG,GAAG,QAAQ,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAC/D,MAAM,GAAG,GAAG,IAAA,wBAAa,EAAC,GAAG,CAAC,CAAC;QAC/B,OAAO,MAAM,SAAS,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,EAAgB;QAC9B,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,CAAC,CAAC,mCAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,EAAE,CAAC,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CACtD;YACH,CAAC,CAAC,mCAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,eAAe,KAAK,EAAE,CAAC,eAAe;gBACxC,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAC3B,CAAC;QACN,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,2BAA2B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;QACnE,CAAC;QAED,OAAO,IAAI,SAAS,CAAC,UAAU,EAAE,SAAS,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC,CAAC;IAC5E,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS;QAET,OAAO,IAAI,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,cAAc,CAAC,CAAC;IACtD,CAAC;IAED,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAC5B,MAAoB,EACpB,eAAwB;QAExB,MAAM,qBAAqB,GAAG,IAAA,kBAAW,EAAC;YACxC,GAAG,EAAE,+BAAgB;YACrB,OAAO,EAAE,eAA0B;YACnC,MAAM;SACP,CAAC,CAAC;QACH,MAAM,mBAAmB,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QAC5E,MAAM,YAAY,GAAG,IAAA,kBAAW,EAAC;YAC/B,GAAG,EAAE,6BAAe;YACpB,OAAO,EAAE,mBAA8B;YACvC,MAAM;SACP,CAAC,CAAC;QACH,OAAO,MAAM,YAAY,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;IAC/C,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,gBAAgB,CACrB,MAAS,EACT,OAAgB;QAEhB,sEAAsE;QACtE,MAAM,cAAc,GAAG,mCAAoB,CAAC,IAAI,CAC9C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,IAAI,CAAC,CAAC,OAAO,KAAK,OAAO,CACpD,CAAC;QACF,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,4GAA4G;YAC5G,wBAAwB;YACxB,MAAM,IAAI,KAAK,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;QACD,OAAO,cAAc,CAAC;IACxB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS,EACT,OAAgB;QAEhB,OAAO,MAAM,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IACzE,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,EAAE,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CACX,KAAQ,EACR,EAAE,cAAc,EAAE,WAAW,EAAqB,EAClD,SAAiC;QAEjC,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,SAAS,CAAC;YACrC,SAAS,EAAE,SAAS,CAAC,kBAAkB,CAAC,KAAK,CAAC;YAC9C,OAAO,EAAE;gBACP,WAAW,EAAE,IAAI,CAAC,OAAO;gBACzB,UAAU,EAAE,IAAI,CAAC,eAAe;gBAChC,WAAW,EAAE,IAAA,wBAAY,EAAC,cAAc,CAAC;gBACzC,eAAe,EAAE,IAAA,wBAAY,EAAC,WAAW,CAAC;aAC3C;SACF,CAAC,CAAC;QACH,OAAO,UAAU,CAAC,KAAK,CAAC;IAC1B,CAAC;IAED;;;;;;OAMG;IACH,cAAc,CACZ,YAAqD;QAErD,OAAO,IAAA,kCAAmB,EAAC;YACzB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;SACxC,CAAC,CAAC;IACL,CAAC;IAED,YAAY,CAAC,WAAsB;QACjC,OAAO,IAAA,4BAAiB,EAAC;YACvB,OAAO,EAAE,IAAA,mCAAwB,EAC/B,IAAA,iBAAU,EAAC,IAAA,iBAAK,EAAC,qBAAS,EAAE,WAAW,CAAC,CAAC,CAC1C;YACD,QAAQ,EAAE,IAAI,CAAC,gBAAgB;SAChC,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACH,+BAA+B,CAC7B,YAAqD,EACrD,cAAsB,EACtB,SAAe,EACf,sBAA8B;QAE9B,OAAO,IAAA,gCAAe,EAAC;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,8BAA8B,EAAE,IAAA,wBAAY,EAAC,sBAAsB,CAAC;YACpE,cAAc,EAAE,IAAA,wBAAY,EAAC,cAAc,CAAC;YAC5C,kBAAkB,EAAE,YAAY;YAChC,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACH,uBAAuB,CACrB,uBAAgD,EAChD,gBAAkC;QAElC,OAAO,IAAA,sCAAqB,EAAC;YAC3B,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,gBAAgB;YAChB,uBAAuB;SACxB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;OAQG;IACH,gCAAgC,CAC9B,YAAqD;QAErD,OAAO,IAAA,iDAAgC,EAAC,IAAI,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IAC9E,CAAC;IA2CD,eAAe,CACb,IAAgE,EAChE,IAA2C,EAC3C,IAA2C,EAC3C,IAA6B;QAE7B,IAAI,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;YACxB,MAAM,YAAY,GAAG,IAA+C,CAAC;YACrE,MAAM,OAAO,GAAG,IAAmB,CAAC;YACpC,MAAM,aAAa,GAAG,IAA0C,CAAC;YACjE,OAAO,IAAA,qCAAe,EAAC;gBACrB,OAAO;gBACP,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,YAAY;gBACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;aAC9C,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,MAAM,gBAAgB,GAAG,IAAwB,CAAC;YAClD,MAAM,uBAAuB,GAAG,IAA+B,CAAC;YAChE,MAAM,OAAO,GAAG,IAAmB,CAAC;YACpC,MAAM,aAAa,GAAG,IAA0C,CAAC;YACjE,OAAO,IAAA,0CAAyB,EAAC;gBAC/B,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;gBAC7C,gBAAgB;gBAChB,uBAAuB;gBACvB,OAAO;aACR,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAuDD,eAAe,CACb,IAAgE,EAChE,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,IAAuD,EACvD,IAA6B;QAE7B,IACE,OAAO,IAAI,KAAK,QAAQ;YACxB,IAAI,KAAK,IAAI;YACb,SAAS,IAAI,IAAI;YACjB,kBAAkB,IAAI,IAAI;YAC1B,QAAQ,IAAI,IAAI,EAChB,CAAC;YACD,mBAAmB;YACnB,MAAM,gBAAgB,GAAG,IAAwB,CAAC;YAClD,MAAM,uBAAuB,GAAG,IAA+B,CAAC;YAChE,MAAM,aAAa,GAAG,IAAI,CAAC;YAC3B,OAAO,IAAA,0CAAyB,EAAC;gBAC/B,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;gBAC7C,gBAAgB;gBAChB,uBAAuB;gBACvB,SAAS;gBACT,EAAE;gBACF,YAAY;gBACZ,aAAa;aACd,CAAC,CAAC;QACL,CAAC;QAED,qBAAqB;QACrB,MAAM,YAAY,GAAG,IAA+C,CAAC;QACrE,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,IAAA,qCAAe,EAAC;YACrB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;OAYG;IACH,cAAc,CACZ,OAAoB,EACpB,aAAsC;QAEtC,OAAO,IAAA,mCAAc,EAAC;YACpB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;SAC9C,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,iBAAiB,CAC7B,UAAgD;QAEhD,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,UAAU,CAAC;QACxD,OAAO,WAAW,eAAe,CAAC,WAAW,EAAE,IAAI,OAAO,IAAI,MAAM,WAAW,CAAC;IAClF,CAAC;IAEO,MAAM,CAAC,UAAU,CAAC,EAAgB;QACxC,OAAQ,EAAuB,CAAC,IAAI,KAAK,SAAS,CAAC;IACrD,CAAC;IAEO,MAAM,CAAC,kBAAkB,CAC/B,KAAQ;QAER,IAAI,OAAO,KAAK,KAAK,SAAS,EAAE,CAAC;YAC/B,OAAO;gBACL,MAAM,EAAE,4BAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,uBAAW,CAAC,KAAK;gBACvB,KAAK,EAAE,KAAK;aACsC,CAAC;QACvD,CAAC;aAAM,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAClE,OAAO;gBACL,MAAM,EAAE,4BAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,uBAAW,CAAC,QAAQ;gBAC1B,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC;aAC8B,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oBAAoB,OAAO,KAAK,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;CACF;AA7hBD,8BA6hBC"}
@@ -1,10 +1,9 @@
1
1
  import { Client } from '@connectrpc/connect';
2
- import { Account, Chain, Hex, Transport, WalletClient } from 'viem';
2
+ import { Account, Chain, Transport, WalletClient } from 'viem';
3
3
  import { SupportedChain } from '../chain.js';
4
4
  import { EciesScheme, PlaintextOf, SupportedFheType } from '../encryption/encryption.js';
5
- import { KmsService, ReencryptResponse } from '../generated/es/inco/kms/lite/v1/kms_service_pb.js';
5
+ import { AttestedDecryptResponse, DecryptionAttestation as DecryptionAttestationProto, KmsService } from '../generated/es/inco/kms/lite/v1/kms_service_pb.js';
6
6
  import { Handle } from '../handle.js';
7
- import type { EIP712 } from '../reencryption/eip712.js';
8
7
  import type { Reencryptor, ReencryptorArgs } from '../reencryption/types.js';
9
8
  import { Secp256k1Keypair } from './ecies.js';
10
9
  export interface IncoLiteReencryptorArgs extends ReencryptorArgs {
@@ -12,12 +11,11 @@ export interface IncoLiteReencryptorArgs extends ReencryptorArgs {
12
11
  kmsConnectRpcEndpointOrClient?: string | Client<typeof KmsService>;
13
12
  ephemeralKeypair?: Secp256k1Keypair;
14
13
  }
15
- export declare function reencryptEIP712(chainId: bigint, ephemeralPubKey: Uint8Array): EIP712<{
16
- publicKey: Hex;
17
- }>;
18
14
  export declare function incoLiteReencryptor({ kmsConnectRpcEndpointOrClient, chainId, walletClient, ephemeralKeypair, }: IncoLiteReencryptorArgs): Promise<Reencryptor<EciesScheme>>;
19
15
  export declare function getKmsClient(kmsConnectRpcEndpointOrClient: string | Client<typeof KmsService>): Client<typeof KmsService>;
20
- export declare function decryptGrpcResponse<T extends SupportedFheType>(response: ReencryptResponse, ephemeralKeypair: Secp256k1Keypair, handle: Handle): Promise<PlaintextOf<1, T>>;
16
+ export declare function decryptGrpcResponse<T extends SupportedFheType>(response: AttestedDecryptResponse, ephemeralKeypair: Secp256k1Keypair, handle: Handle): Promise<PlaintextOf<1, T>>;
17
+ export declare function decryptGrpcDecryptionAttestation(attestation: DecryptionAttestationProto, reencryptKeypair: Secp256k1Keypair): Promise<DecryptionAttestationProto>;
18
+ export declare function decryptGrpcDecryptResponse(response: AttestedDecryptResponse, reencryptKeypair: Secp256k1Keypair): Promise<AttestedDecryptResponse>;
21
19
  export declare function defaultCovalidatorGrpc(chain: SupportedChain): string;
22
20
  export declare function lightningDevnetCovalidatorGrpc(chain: SupportedChain): string;
23
21
  export declare function lightningTestnetCovalidatorGrpc(chain: SupportedChain): string;
@@ -1,46 +1,23 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.reencryptEIP712 = reencryptEIP712;
4
3
  exports.incoLiteReencryptor = incoLiteReencryptor;
5
4
  exports.getKmsClient = getKmsClient;
6
5
  exports.decryptGrpcResponse = decryptGrpcResponse;
6
+ exports.decryptGrpcDecryptionAttestation = decryptGrpcDecryptionAttestation;
7
+ exports.decryptGrpcDecryptResponse = decryptGrpcDecryptResponse;
7
8
  exports.defaultCovalidatorGrpc = defaultCovalidatorGrpc;
8
9
  exports.lightningDevnetCovalidatorGrpc = lightningDevnetCovalidatorGrpc;
9
10
  exports.lightningTestnetCovalidatorGrpc = lightningTestnetCovalidatorGrpc;
10
11
  const protobuf_1 = require("@bufbuild/protobuf");
11
12
  const connect_1 = require("@connectrpc/connect");
12
13
  const connect_web_1 = require("@connectrpc/connect-web");
13
- const viem_1 = require("viem");
14
+ const attested_decrypt_js_1 = require("../attesteddecrypt/attested-decrypt.js");
14
15
  const binary_js_1 = require("../binary.js");
15
16
  const chain_js_1 = require("../chain.js");
16
17
  const encryption_js_1 = require("../encryption/encryption.js");
17
18
  const kms_service_pb_js_1 = require("../generated/es/inco/kms/lite/v1/kms_service_pb.js");
18
- const types_pb_js_1 = require("../generated/es/inco/kms/lite/v1/types_pb.js");
19
19
  const handle_js_1 = require("../handle.js");
20
- const eip712_js_1 = require("../reencryption/eip712.js");
21
- const retry_js_1 = require("../retry.js");
22
20
  const ecies_js_1 = require("./ecies.js");
23
- // The domain constants used for basic reencrypts.
24
- // Note: for advanced ACL, since the signature is checked on-chain, the domain
25
- // and version must match the ones used in the contract. For basic ones, we use
26
- // a domain different than the one used on-chain
27
- const BASIC_REENCRYPT_DOMAIN = {
28
- name: 'IncoReencryption',
29
- version: '0.1.0',
30
- };
31
- // Create an EIP712 payload for the Inco Lite basic reencrypt.
32
- function reencryptEIP712(chainId, ephemeralPubKey) {
33
- return (0, eip712_js_1.createEIP712Payload)({
34
- chainId,
35
- primaryType: 'ReencryptionRequest',
36
- primaryTypeFields: [{ name: 'publicKey', type: 'bytes' }],
37
- message: {
38
- publicKey: (0, viem_1.bytesToHex)(ephemeralPubKey),
39
- },
40
- domainName: BASIC_REENCRYPT_DOMAIN.name,
41
- domainVersion: BASIC_REENCRYPT_DOMAIN.version,
42
- });
43
- }
44
21
  // Returns the Inco Lite Reencryptor, which can reencrypt a handle using the
45
22
  // Basic ACL.
46
23
  async function incoLiteReencryptor({ kmsConnectRpcEndpointOrClient, chainId, walletClient, ephemeralKeypair, }) {
@@ -49,40 +26,21 @@ async function incoLiteReencryptor({ kmsConnectRpcEndpointOrClient, chainId, wal
49
26
  if (!ephemeralKeypair) {
50
27
  ephemeralKeypair = await (0, ecies_js_1.generateSecp256k1Keypair)();
51
28
  }
52
- // Sign the EIP712 attesting that the user has access to the private key
53
- // corresponding to the ephemeral public key.
54
- const eip712Payload = reencryptEIP712(chainId, ephemeralKeypair.encodePublicKey());
55
- // Using browser extensions, this step will prompt the user to sign the
56
- // payload.
57
- const eip712Signature = await walletClient.signTypedData(eip712Payload);
58
29
  return async function reencrypt({ handle }, backoffConfig) {
59
30
  const ephemeralPubKey = ephemeralKeypair.encodePublicKey();
60
- const reencryptRequest = (0, protobuf_1.create)(kms_service_pb_js_1.ReencryptRequestSchema, {
61
- userAddress: walletClient.account.address,
62
- ephemeralPubKey,
63
- eip712Signature: (0, viem_1.hexToBytes)(eip712Signature),
64
- handlesWithProofs: [
65
- (0, protobuf_1.create)(types_pb_js_1.HandleWithProofSchema, {
66
- handle,
67
- aclProof: {
68
- proof: {
69
- case: 'incoLiteBasicAclProof',
70
- value: {},
71
- },
72
- },
73
- }),
74
- ],
31
+ const response = await (0, attested_decrypt_js_1.attestedDecrypt)({
32
+ chainId: (0, chain_js_1.getSupportedChain)(chainId).id,
33
+ walletClient,
34
+ kmsConnectRpcEndpointOrClient: kmsClient,
35
+ handles: [handle],
36
+ backoffConfig,
37
+ reencryptPubKey: ephemeralPubKey,
38
+ reencryptKeypair: ephemeralKeypair,
75
39
  });
76
- try {
77
- return await (0, retry_js_1.retryWithBackoff)(async () => {
78
- const response = await kmsClient.reencrypt(reencryptRequest);
79
- return decryptGrpcResponse(response, ephemeralKeypair, handle);
80
- }, backoffConfig);
81
- }
82
- catch (error) {
83
- console.log(error);
84
- throw error;
40
+ if (response.length !== 1) {
41
+ throw new Error(`Expected 1 result, got ${response.length}`);
85
42
  }
43
+ return response[0].plaintext;
86
44
  };
87
45
  }
88
46
  // Helper function to get a KMS client from a string or a Client instance.
@@ -99,7 +57,18 @@ function getKmsClient(kmsConnectRpcEndpointOrClient) {
99
57
  // Even though the proto specifies a list of ciphertexts, our JS SDK
100
58
  // currently only supports a single ciphertext.
101
59
  async function decryptGrpcResponse(response, ephemeralKeypair, handle) {
102
- const reencryptedCt = response.payload?.userCiphertexts[0];
60
+ if (response.decryptionAttestations.length === 0) {
61
+ throw new Error('No decryption attestations in the response');
62
+ }
63
+ const att = response.decryptionAttestations[0];
64
+ if (att.value === undefined) {
65
+ throw new Error('No value in attestation');
66
+ }
67
+ if (att.value.case !== 'reencryption') {
68
+ throw new Error(`Unexpected attestation type: ${att.value.case}, expected 'reencryption'`);
69
+ }
70
+ const reencryption = att.value.value;
71
+ const reencryptedCt = reencryption.userCiphertext;
103
72
  if (!reencryptedCt) {
104
73
  throw new Error('No reencrypted ciphertext in the response');
105
74
  }
@@ -107,6 +76,47 @@ async function decryptGrpcResponse(response, ephemeralKeypair, handle) {
107
76
  const plaintext = (0, binary_js_1.bytesToBigInt)(plaintextBytes);
108
77
  return (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, (0, handle_js_1.getHandleType)(handle), plaintext);
109
78
  }
79
+ // A helper function that takes in a DecryptionAttestation message containing reencryption,
80
+ // decrypts it using the provided reencryptKeypair, and returns a DecryptionAttestation message containing a plaintext.
81
+ async function decryptGrpcDecryptionAttestation(attestation, reencryptKeypair) {
82
+ if (attestation.value === undefined) {
83
+ throw new Error('No value in attestation');
84
+ }
85
+ if (attestation.value.case !== 'reencryption') {
86
+ return Promise.resolve(attestation);
87
+ }
88
+ const reencryption = attestation.value.value;
89
+ const reencryptedCt = reencryption.userCiphertext;
90
+ if (!reencryptedCt) {
91
+ throw new Error('No reencrypted ciphertext in the response');
92
+ }
93
+ const plaintextBytes = await (0, ecies_js_1.decrypt)(reencryptKeypair, reencryptedCt.ciphertext);
94
+ return (0, protobuf_1.create)(kms_service_pb_js_1.DecryptionAttestationSchema, {
95
+ handle: attestation.handle,
96
+ value: {
97
+ case: 'plaintext',
98
+ value: (0, protobuf_1.create)(kms_service_pb_js_1.PlaintextSchema, {
99
+ value: plaintextBytes,
100
+ }),
101
+ },
102
+ signature: attestation.signature,
103
+ });
104
+ }
105
+ // A helper function that takes in an AttestedDecryptResponse message containing reencryption attestations,
106
+ // decrypts them using the provided reencryptKeypair, and returns an AttestedDecryptResponse message containing plaintext attestations.
107
+ async function decryptGrpcDecryptResponse(response, reencryptKeypair) {
108
+ if (response.decryptionAttestations.length === 0) {
109
+ throw new Error('No decryption attestations in the response');
110
+ }
111
+ // For each attestation in the response, decrypt it
112
+ const decryptedAttestations = await Promise.all(response.decryptionAttestations.map(async (attestation) => {
113
+ return await decryptGrpcDecryptionAttestation(attestation, reencryptKeypair);
114
+ }));
115
+ // Return new response with decrypted attestations
116
+ return (0, protobuf_1.create)(kms_service_pb_js_1.AttestedDecryptResponseSchema, {
117
+ decryptionAttestations: decryptedAttestations,
118
+ });
119
+ }
110
120
  // Helper function to return the default gRPC endpoint for the covalidator.
111
121
  // Currently, this returns the covalidator for the Inco Lightning public testnet.
112
122
  function defaultCovalidatorGrpc(chain) {
@@ -128,4 +138,4 @@ function camelToDashCase(str) {
128
138
  function getCovalidatorGrpcHelper(chain, network, cluster) {
129
139
  return `https://grpc.${camelToDashCase(chain.name)}.${cluster}.${network}.inco.org`;
130
140
  }
131
- //# sourceMappingURL=data:application/json;base64,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
141
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,12 @@
1
+ import { Account, Chain, Transport, WalletClient } from 'viem';
2
+ import { vi } from 'vitest';
3
+ import { KmsClient } from '../kms/client.js';
4
+ interface MinimalKmsClient {
5
+ attestedCompute: ReturnType<typeof vi.fn>;
6
+ attestedDecrypt: ReturnType<typeof vi.fn>;
7
+ key: ReturnType<typeof vi.fn>;
8
+ reencrypt: ReturnType<typeof vi.fn>;
9
+ }
10
+ export declare function createMockKmsClient(): MinimalKmsClient & KmsClient;
11
+ export declare function createTestWalletClient(): WalletClient<Transport, Chain, Account>;
12
+ export {};
@@ -0,0 +1,27 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.createMockKmsClient = createMockKmsClient;
4
+ exports.createTestWalletClient = createTestWalletClient;
5
+ const viem_1 = require("viem");
6
+ const accounts_1 = require("viem/accounts");
7
+ const chains_1 = require("viem/chains");
8
+ const vitest_1 = require("vitest");
9
+ // Create a mock that satisfies our minimal interface
10
+ function createMockKmsClient() {
11
+ return {
12
+ attestedCompute: vitest_1.vi.fn(),
13
+ attestedDecrypt: vitest_1.vi.fn(),
14
+ key: vitest_1.vi.fn(),
15
+ reencrypt: vitest_1.vi.fn(),
16
+ };
17
+ }
18
+ // Create a real wallet client for testing
19
+ function createTestWalletClient() {
20
+ const account = (0, accounts_1.privateKeyToAccount)((0, accounts_1.generatePrivateKey)());
21
+ return (0, viem_1.createWalletClient)({
22
+ chain: chains_1.sepolia, // Arbitrary chain, not relevant to test
23
+ transport: (0, viem_1.http)('UNUSED IN TEST'),
24
+ account,
25
+ });
26
+ }
27
+ //# sourceMappingURL=data:application/json;base64,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