@inco/js 0.6.1 → 0.6.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/advancedacl/session-key.d.ts +8 -1
- package/dist/cjs/advancedacl/session-key.js +55 -21
- package/dist/cjs/attestedcompute/attested-compute.js +11 -4
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +38 -1
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +49 -6
- package/dist/cjs/attesteddecrypt/types.d.ts +6 -1
- package/dist/cjs/attesteddecrypt/types.js +1 -1
- package/dist/cjs/attestedreveal/attested-reveal.js +9 -7
- package/dist/cjs/binary.d.ts +1 -0
- package/dist/cjs/binary.js +6 -2
- package/dist/cjs/encryption/encryption.d.ts +17 -22
- package/dist/cjs/encryption/encryption.js +34 -16
- package/dist/cjs/generated/abis/add-two.d.ts +1 -1
- package/dist/cjs/generated/abis/add-two.js +1 -1
- package/dist/cjs/generated/abis/lightning-preview.d.ts +48 -106
- package/dist/cjs/generated/abis/lightning-preview.js +33 -55
- package/dist/cjs/generated/abis/lightning.d.ts +55 -116
- package/dist/cjs/generated/abis/lightning.js +33 -66
- package/dist/cjs/generated/abis/verifier.d.ts +193 -84
- package/dist/cjs/generated/abis/verifier.js +151 -61
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.js +2 -2
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +775 -0
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.js +261 -0
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +186 -0
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +47 -0
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.js +2 -2
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +21 -26
- package/dist/cjs/generated/es/inco/kms/lite/v1/types_pb.js +2 -2
- package/dist/cjs/generated/lightning.d.ts +0 -32
- package/dist/cjs/generated/lightning.js +1 -33
- package/dist/cjs/generated/local-node.d.ts +1 -5
- package/dist/cjs/generated/local-node.js +2 -6
- package/dist/cjs/handle.d.ts +16 -0
- package/dist/cjs/handle.js +28 -3
- package/dist/cjs/lite/deployments.d.ts +20 -2
- package/dist/cjs/lite/deployments.js +1 -1
- package/dist/cjs/lite/ecies.d.ts +0 -2
- package/dist/cjs/lite/ecies.js +24 -13
- package/dist/cjs/lite/hadu.d.ts +3 -23
- package/dist/cjs/lite/hadu.js +26 -29
- package/dist/cjs/lite/index.d.ts +1 -1
- package/dist/cjs/lite/index.js +1 -1
- package/dist/cjs/lite/lightning.d.ts +24 -12
- package/dist/cjs/lite/lightning.js +62 -27
- package/dist/cjs/lite/reencrypt.d.ts +5 -7
- package/dist/cjs/lite/reencrypt.js +68 -58
- package/dist/cjs/test/mocks.d.ts +12 -0
- package/dist/cjs/test/mocks.js +27 -0
- package/dist/cjs/viem.d.ts +45 -48
- package/dist/esm/advancedacl/session-key.d.ts +8 -1
- package/dist/esm/advancedacl/session-key.js +58 -24
- package/dist/esm/attestedcompute/attested-compute.js +11 -4
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +38 -1
- package/dist/esm/attesteddecrypt/attested-decrypt.js +51 -8
- package/dist/esm/attesteddecrypt/types.d.ts +6 -1
- package/dist/esm/attesteddecrypt/types.js +1 -1
- package/dist/esm/attestedreveal/attested-reveal.js +9 -7
- package/dist/esm/binary.d.ts +1 -0
- package/dist/esm/binary.js +5 -2
- package/dist/esm/encryption/encryption.d.ts +17 -22
- package/dist/esm/encryption/encryption.js +30 -16
- package/dist/esm/generated/abis/add-two.d.ts +1 -1
- package/dist/esm/generated/abis/add-two.js +1 -1
- package/dist/esm/generated/abis/lightning-preview.d.ts +48 -106
- package/dist/esm/generated/abis/lightning-preview.js +33 -55
- package/dist/esm/generated/abis/lightning.d.ts +55 -116
- package/dist/esm/generated/abis/lightning.js +33 -66
- package/dist/esm/generated/abis/verifier.d.ts +193 -84
- package/dist/esm/generated/abis/verifier.js +151 -61
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.js +2 -2
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +775 -0
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.js +258 -0
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +186 -0
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +44 -0
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.js +2 -2
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +20 -25
- package/dist/esm/generated/es/inco/kms/lite/v1/types_pb.js +2 -2
- package/dist/esm/generated/lightning.d.ts +0 -32
- package/dist/esm/generated/lightning.js +1 -33
- package/dist/esm/generated/local-node.d.ts +1 -5
- package/dist/esm/generated/local-node.js +2 -6
- package/dist/esm/handle.d.ts +16 -0
- package/dist/esm/handle.js +27 -3
- package/dist/esm/lite/deployments.d.ts +20 -2
- package/dist/esm/lite/deployments.js +1 -1
- package/dist/esm/lite/ecies.d.ts +0 -2
- package/dist/esm/lite/ecies.js +26 -15
- package/dist/esm/lite/hadu.d.ts +3 -23
- package/dist/esm/lite/hadu.js +28 -30
- package/dist/esm/lite/index.d.ts +1 -1
- package/dist/esm/lite/index.js +1 -1
- package/dist/esm/lite/lightning.d.ts +24 -12
- package/dist/esm/lite/lightning.js +59 -24
- package/dist/esm/lite/reencrypt.d.ts +5 -7
- package/dist/esm/lite/reencrypt.js +67 -58
- package/dist/esm/test/mocks.d.ts +12 -0
- package/dist/esm/test/mocks.js +23 -0
- package/dist/esm/viem.d.ts +45 -48
- package/dist/types/advancedacl/session-key.d.ts +8 -1
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +38 -1
- package/dist/types/attesteddecrypt/types.d.ts +6 -1
- package/dist/types/binary.d.ts +1 -0
- package/dist/types/encryption/encryption.d.ts +17 -22
- package/dist/types/generated/abis/add-two.d.ts +1 -1
- package/dist/types/generated/abis/lightning-preview.d.ts +48 -106
- package/dist/types/generated/abis/lightning.d.ts +55 -116
- package/dist/types/generated/abis/verifier.d.ts +193 -84
- package/dist/types/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +775 -0
- package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +186 -0
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
- package/dist/types/generated/lightning.d.ts +0 -32
- package/dist/types/generated/local-node.d.ts +1 -5
- package/dist/types/handle.d.ts +16 -0
- package/dist/types/lite/deployments.d.ts +20 -2
- package/dist/types/lite/ecies.d.ts +0 -2
- package/dist/types/lite/hadu.d.ts +3 -23
- package/dist/types/lite/index.d.ts +1 -1
- package/dist/types/lite/lightning.d.ts +24 -12
- package/dist/types/lite/reencrypt.d.ts +5 -7
- package/dist/types/test/mocks.d.ts +12 -0
- package/dist/types/viem.d.ts +45 -48
- package/package.json +3 -1
|
@@ -14,8 +14,6 @@ export const lightningDeployments = [
|
|
|
14
14
|
"patch": 2,
|
|
15
15
|
"shortSalt": "725458969"
|
|
16
16
|
},
|
|
17
|
-
"decryptSigner": "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95",
|
|
18
|
-
"eciesPublicKey": "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1",
|
|
19
17
|
"blockNumber": 32124925,
|
|
20
18
|
"deployDate": "2025-10-09T13:55:42.997Z",
|
|
21
19
|
"commit": "v0.5.3-10-ga4f2312d",
|
|
@@ -36,8 +34,6 @@ export const lightningDeployments = [
|
|
|
36
34
|
"patch": 2,
|
|
37
35
|
"shortSalt": "904635675"
|
|
38
36
|
},
|
|
39
|
-
"decryptSigner": "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f",
|
|
40
|
-
"eciesPublicKey": "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1",
|
|
41
37
|
"blockNumber": 3696905,
|
|
42
38
|
"deployDate": "2025-10-03T13:24:44.682Z",
|
|
43
39
|
"commit": "v0.5.3-6-g8db0f27f-dirty",
|
|
@@ -58,8 +54,6 @@ export const lightningDeployments = [
|
|
|
58
54
|
"patch": 0,
|
|
59
55
|
"shortSalt": "904635675"
|
|
60
56
|
},
|
|
61
|
-
"decryptSigner": "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f",
|
|
62
|
-
"eciesPublicKey": "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1",
|
|
63
57
|
"blockNumber": 3344310,
|
|
64
58
|
"deployDate": "2025-09-29T11:14:02.599Z",
|
|
65
59
|
"commit": "v0.5.1-5-g4135c790-dirty",
|
|
@@ -80,8 +74,6 @@ export const lightningDeployments = [
|
|
|
80
74
|
"patch": 0,
|
|
81
75
|
"shortSalt": "183408998"
|
|
82
76
|
},
|
|
83
|
-
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
|
84
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
85
77
|
"blockNumber": 26296576,
|
|
86
78
|
"deployDate": "2025-05-27T15:57:24.175Z",
|
|
87
79
|
"commit": "v5-3-gec8b6aae-dirty",
|
|
@@ -102,8 +94,6 @@ export const lightningDeployments = [
|
|
|
102
94
|
"patch": 29,
|
|
103
95
|
"shortSalt": "183408998"
|
|
104
96
|
},
|
|
105
|
-
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
|
106
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
107
97
|
"blockNumber": 13464615,
|
|
108
98
|
"deployDate": "2025-04-22T16:01:14.380Z",
|
|
109
99
|
"commit": "v3-28-g93c05a49-dirty",
|
|
@@ -124,8 +114,6 @@ export const lightningDeployments = [
|
|
|
124
114
|
"patch": 29,
|
|
125
115
|
"shortSalt": "183408998"
|
|
126
116
|
},
|
|
127
|
-
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
|
128
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
129
117
|
"blockNumber": 24784654,
|
|
130
118
|
"deployDate": "2025-04-22T16:00:02.028Z",
|
|
131
119
|
"commit": "v3-28-g93c05a49-dirty",
|
|
@@ -146,8 +134,6 @@ export const lightningDeployments = [
|
|
|
146
134
|
"patch": 0,
|
|
147
135
|
"shortSalt": "863421733"
|
|
148
136
|
},
|
|
149
|
-
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
|
150
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
151
137
|
"blockNumber": 25737175,
|
|
152
138
|
"deployDate": "2025-05-14T17:10:44.285Z",
|
|
153
139
|
"commit": "v4-11-g4a1f413a-dirty",
|
|
@@ -168,8 +154,6 @@ export const lightningDeployments = [
|
|
|
168
154
|
"patch": 29,
|
|
169
155
|
"shortSalt": "863421733"
|
|
170
156
|
},
|
|
171
|
-
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
|
172
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
173
157
|
"blockNumber": 25719113,
|
|
174
158
|
"deployDate": "2025-05-14T07:08:39.059Z",
|
|
175
159
|
"commit": "v4",
|
|
@@ -190,8 +174,6 @@ export const lightningDeployments = [
|
|
|
190
174
|
"patch": 1,
|
|
191
175
|
"shortSalt": "297966649"
|
|
192
176
|
},
|
|
193
|
-
"decryptSigner": "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95",
|
|
194
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
195
177
|
"blockNumber": 27543410,
|
|
196
178
|
"deployDate": "2025-06-25T12:38:32.856Z",
|
|
197
179
|
"commit": "v5-17-ga03e4b32-dirty",
|
|
@@ -212,8 +194,6 @@ export const lightningDeployments = [
|
|
|
212
194
|
"patch": 0,
|
|
213
195
|
"shortSalt": "297966649"
|
|
214
196
|
},
|
|
215
|
-
"decryptSigner": "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95",
|
|
216
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
217
197
|
"blockNumber": 26894782,
|
|
218
198
|
"deployDate": "2025-06-10T12:17:35.790Z",
|
|
219
199
|
"commit": "v5-13-gd6b19c10-dirty",
|
|
@@ -234,8 +214,6 @@ export const lightningDeployments = [
|
|
|
234
214
|
"patch": 1,
|
|
235
215
|
"shortSalt": "340846814"
|
|
236
216
|
},
|
|
237
|
-
"decryptSigner": "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f",
|
|
238
|
-
"eciesPublicKey": "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1",
|
|
239
217
|
"blockNumber": 1718868,
|
|
240
218
|
"deployDate": "2025-09-10T15:20:25.654Z",
|
|
241
219
|
"commit": "v6-7-gf96f358e-dirty",
|
|
@@ -256,8 +234,6 @@ export const lightningDeployments = [
|
|
|
256
234
|
"patch": 1,
|
|
257
235
|
"shortSalt": "340846814"
|
|
258
236
|
},
|
|
259
|
-
"decryptSigner": "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f",
|
|
260
|
-
"eciesPublicKey": "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1",
|
|
261
237
|
"blockNumber": 1717229,
|
|
262
238
|
"deployDate": "2025-09-10T14:53:07.218Z",
|
|
263
239
|
"commit": "v6-7-gf96f358e-dirty",
|
|
@@ -278,8 +254,6 @@ export const lightningDeployments = [
|
|
|
278
254
|
"patch": 1,
|
|
279
255
|
"shortSalt": "340846814"
|
|
280
256
|
},
|
|
281
|
-
"decryptSigner": "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f",
|
|
282
|
-
"eciesPublicKey": "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1",
|
|
283
257
|
"blockNumber": 17365942,
|
|
284
258
|
"deployDate": "2025-08-15T17:35:15.208Z",
|
|
285
259
|
"commit": "v0.2.17-35-g8cca6b4e-dirty",
|
|
@@ -300,8 +274,6 @@ export const lightningDeployments = [
|
|
|
300
274
|
"patch": 0,
|
|
301
275
|
"shortSalt": "340846814"
|
|
302
276
|
},
|
|
303
|
-
"decryptSigner": "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f",
|
|
304
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
305
277
|
"blockNumber": 26122863,
|
|
306
278
|
"deployDate": "2025-05-23T15:26:57.031Z",
|
|
307
279
|
"commit": "v5-2-g8957c16b-dirty",
|
|
@@ -322,8 +294,6 @@ export const lightningDeployments = [
|
|
|
322
294
|
"patch": 29,
|
|
323
295
|
"shortSalt": "340846814"
|
|
324
296
|
},
|
|
325
|
-
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
|
326
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
327
297
|
"blockNumber": 13464197,
|
|
328
298
|
"deployDate": "2025-04-22T15:57:26.862Z",
|
|
329
299
|
"commit": "v3-28-g93c05a49-dirty",
|
|
@@ -344,12 +314,10 @@ export const lightningDeployments = [
|
|
|
344
314
|
"patch": 29,
|
|
345
315
|
"shortSalt": "340846814"
|
|
346
316
|
},
|
|
347
|
-
"decryptSigner": "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0",
|
|
348
|
-
"eciesPublicKey": "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235",
|
|
349
317
|
"blockNumber": 24784527,
|
|
350
318
|
"deployDate": "2025-04-22T15:55:47.828Z",
|
|
351
319
|
"commit": "v3-28-g93c05a49-dirty",
|
|
352
320
|
"active": true
|
|
353
321
|
}
|
|
354
322
|
];
|
|
355
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
323
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/generated/lightning.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,oBAAoB,GAAG;IAClC;QACE,MAAM,EAAE,uCAAuC;QAC/C,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,UAAU;QACpB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,qBAAqB;QAC/B,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,uCAAuC;QAC/C,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,IAAI;QACf,WAAW,EAAE,gBAAgB;QAC7B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,OAAO;QACtB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,0BAA0B;QACpC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,uCAAuC;QAC/C,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,IAAI;QACf,WAAW,EAAE,gBAAgB;QAC7B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,OAAO;QACtB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,0BAA0B;QACpC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,gCAAgC;QACxC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,SAAS;QACnB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,sBAAsB;QAChC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,iCAAiC;QACzC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,SAAS;QACnB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,eAAe;QAC5B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,EAAE;YACX,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,uBAAuB;QACjC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,iCAAiC;QACzC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,SAAS;QACnB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,EAAE;YACX,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,uBAAuB;QACjC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,gCAAgC;QACxC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,SAAS;QACnB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,uBAAuB;QACjC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,iCAAiC;QACzC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,SAAS;QACnB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,EAAE;YACX,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,IAAI;QACd,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,uCAAuC;QAC/C,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,UAAU;QACpB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,uBAAuB;QACjC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,uCAAuC;QAC/C,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,UAAU;QACpB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,uBAAuB;QACjC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,uCAAuC;QAC/C,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,IAAI;QACf,WAAW,EAAE,gBAAgB;QAC7B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,OAAO;QACtB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,sBAAsB;QAChC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,gCAAgC;QACxC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,IAAI;QACf,WAAW,EAAE,gBAAgB;QAC7B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,OAAO;QACtB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,sBAAsB;QAChC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,uCAAuC;QAC/C,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,IAAI;QACf,WAAW,EAAE,qBAAqB;QAClC,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,4BAA4B;QACtC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,gCAAgC;QACxC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,sBAAsB;QAChC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,iCAAiC;QACzC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,eAAe;QAC5B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,EAAE;YACX,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,uBAAuB;QACjC,QAAQ,EAAE,IAAI;KACf;IACD;QACE,MAAM,EAAE,iCAAiC;QACzC,cAAc,EAAE,CAAC;QACjB,UAAU,EAAE,4CAA4C;QACxD,QAAQ,EAAE,QAAQ;QAClB,iBAAiB,EAAE,4CAA4C;QAC/D,MAAM,EAAE,oEAAoE;QAC5E,SAAS,EAAE,KAAK;QAChB,WAAW,EAAE,cAAc;QAC3B,SAAS,EAAE;YACT,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,CAAC;YACV,OAAO,EAAE,EAAE;YACX,WAAW,EAAE,WAAW;SACzB;QACD,aAAa,EAAE,QAAQ;QACvB,YAAY,EAAE,0BAA0B;QACxC,QAAQ,EAAE,uBAAuB;QACjC,QAAQ,EAAE,IAAI;KACf;CACO,CAAC"}
|
|
@@ -1,7 +1,6 @@
|
|
|
1
1
|
export declare const localNodeLightningConfig: {
|
|
2
2
|
readonly testnet: {
|
|
3
3
|
readonly executorAddress: "0x63D8135aF4D393B1dB43B649010c8D3EE19FC9fd";
|
|
4
|
-
readonly eciesPublicKey: "0x0235692e009a07315b5505fbfb44144553b2b163e0d9eddc705a1c49ba4d0dcb91";
|
|
5
4
|
readonly chainId: 31337;
|
|
6
5
|
readonly covalidatorUrl: "http://localhost:50055";
|
|
7
6
|
readonly hostChainRpcUrl: "http://localhost:8545";
|
|
@@ -9,7 +8,6 @@ export declare const localNodeLightningConfig: {
|
|
|
9
8
|
};
|
|
10
9
|
readonly devnet: {
|
|
11
10
|
readonly executorAddress: "0x3473820DcAa71Af8157b93C7f2bf1c676A2A39A6";
|
|
12
|
-
readonly eciesPublicKey: "0x0232aae7e5deffacd4e682821a95f4200d4327b7ac1e288d147cfa343f751e3f61";
|
|
13
11
|
readonly chainId: 31337;
|
|
14
12
|
readonly covalidatorUrl: "http://localhost:50055";
|
|
15
13
|
readonly hostChainRpcUrl: "http://localhost:8545";
|
|
@@ -17,15 +15,13 @@ export declare const localNodeLightningConfig: {
|
|
|
17
15
|
};
|
|
18
16
|
readonly alphanet: {
|
|
19
17
|
readonly executorAddress: "0x28676Cd3b10b03b2FDF105Ba280425b45a674F2A";
|
|
20
|
-
readonly eciesPublicKey: "0x034bc20c48ff1b8e86563dff8dd2ec3936bdea0ab570986780971cdc4c3871fe09";
|
|
21
18
|
readonly chainId: 31337;
|
|
22
19
|
readonly covalidatorUrl: "http://localhost:50055";
|
|
23
20
|
readonly hostChainRpcUrl: "http://localhost:8545";
|
|
24
|
-
readonly senderPrivateKey: "
|
|
21
|
+
readonly senderPrivateKey: "0x59c6995e998f97a5a0044966f0945389dc9e86dae88c7a8412f4603b6b78690d";
|
|
25
22
|
};
|
|
26
23
|
readonly scratch: {
|
|
27
24
|
readonly executorAddress: "0x195ec7fDf68fD835b9F78d6eb13E280cC2e25fdD";
|
|
28
|
-
readonly eciesPublicKey: "0x02516bda9e68a1c3dce74dc1b6ed7d91a91d51c1e1933947f06331cef59631e9eb";
|
|
29
25
|
readonly chainId: 31337;
|
|
30
26
|
readonly covalidatorUrl: "http://localhost:50055";
|
|
31
27
|
readonly hostChainRpcUrl: "http://127.0.0.1:8567";
|
|
@@ -1,7 +1,6 @@
|
|
|
1
1
|
export const localNodeLightningConfig = {
|
|
2
2
|
"testnet": {
|
|
3
3
|
"executorAddress": "0x63D8135aF4D393B1dB43B649010c8D3EE19FC9fd",
|
|
4
|
-
"eciesPublicKey": "0x0235692e009a07315b5505fbfb44144553b2b163e0d9eddc705a1c49ba4d0dcb91",
|
|
5
4
|
"chainId": 31337,
|
|
6
5
|
"covalidatorUrl": "http://localhost:50055",
|
|
7
6
|
"hostChainRpcUrl": "http://localhost:8545",
|
|
@@ -9,7 +8,6 @@ export const localNodeLightningConfig = {
|
|
|
9
8
|
},
|
|
10
9
|
"devnet": {
|
|
11
10
|
"executorAddress": "0x3473820DcAa71Af8157b93C7f2bf1c676A2A39A6",
|
|
12
|
-
"eciesPublicKey": "0x0232aae7e5deffacd4e682821a95f4200d4327b7ac1e288d147cfa343f751e3f61",
|
|
13
11
|
"chainId": 31337,
|
|
14
12
|
"covalidatorUrl": "http://localhost:50055",
|
|
15
13
|
"hostChainRpcUrl": "http://localhost:8545",
|
|
@@ -17,19 +15,17 @@ export const localNodeLightningConfig = {
|
|
|
17
15
|
},
|
|
18
16
|
"alphanet": {
|
|
19
17
|
"executorAddress": "0x28676Cd3b10b03b2FDF105Ba280425b45a674F2A",
|
|
20
|
-
"eciesPublicKey": "0x034bc20c48ff1b8e86563dff8dd2ec3936bdea0ab570986780971cdc4c3871fe09",
|
|
21
18
|
"chainId": 31337,
|
|
22
19
|
"covalidatorUrl": "http://localhost:50055",
|
|
23
20
|
"hostChainRpcUrl": "http://localhost:8545",
|
|
24
|
-
"senderPrivateKey": "
|
|
21
|
+
"senderPrivateKey": "0x59c6995e998f97a5a0044966f0945389dc9e86dae88c7a8412f4603b6b78690d"
|
|
25
22
|
},
|
|
26
23
|
"scratch": {
|
|
27
24
|
"executorAddress": "0x195ec7fDf68fD835b9F78d6eb13E280cC2e25fdD",
|
|
28
|
-
"eciesPublicKey": "0x02516bda9e68a1c3dce74dc1b6ed7d91a91d51c1e1933947f06331cef59631e9eb",
|
|
29
25
|
"chainId": 31337,
|
|
30
26
|
"covalidatorUrl": "http://localhost:50055",
|
|
31
27
|
"hostChainRpcUrl": "http://127.0.0.1:8567",
|
|
32
28
|
"senderPrivateKey": "0xac0974bec39a17e36ba4a6b4d238ff944bacb478cbed5efcae784d7bf4f2ff80"
|
|
33
29
|
}
|
|
34
30
|
};
|
|
35
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
31
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dist/esm/handle.d.ts
CHANGED
|
@@ -29,13 +29,29 @@ export declare const InputContext: Schema.Struct<{
|
|
|
29
29
|
export type InputContext = typeof InputContext.Type;
|
|
30
30
|
export type Handle = HexString;
|
|
31
31
|
export declare function getHandleType(handle: HexString): FheType;
|
|
32
|
+
/**
|
|
33
|
+
* Computes the prehandle hash for an input based on the ciphertext
|
|
34
|
+
*
|
|
35
|
+
* @param ciphertextPayload Note this is the different from the input which has the external handle prepended
|
|
36
|
+
* @param indexHandle
|
|
37
|
+
* @param handleType
|
|
38
|
+
* @param handleVersion
|
|
39
|
+
*/
|
|
32
40
|
export declare function computePrehandle({ ciphertext, indexHandle, handleType, handleVersion, }: {
|
|
33
41
|
ciphertext: Uint8Array;
|
|
34
42
|
indexHandle: number;
|
|
35
43
|
handleType: FheType;
|
|
36
44
|
handleVersion: number;
|
|
37
45
|
}): Buffer;
|
|
46
|
+
/**
|
|
47
|
+
* Computes the final handle for an input based on the prehandle and the input context, matches the handle generation
|
|
48
|
+
* in Go and Solidity
|
|
49
|
+
*
|
|
50
|
+
* @param prehandle
|
|
51
|
+
* @param context
|
|
52
|
+
*/
|
|
38
53
|
export declare function computeHandle({ prehandle, context, }: {
|
|
39
54
|
prehandle: Uint8Array;
|
|
40
55
|
context: InputContext;
|
|
41
56
|
}): Buffer;
|
|
57
|
+
export declare function hashInputContext(context: InputContext): Buffer;
|
package/dist/esm/handle.js
CHANGED
|
@@ -46,6 +46,14 @@ export function getHandleType(handle) {
|
|
|
46
46
|
/// @dev handle format for user inputs is: keccak256(keccak256(CiphertextFHEList)||index_handle)[0:29] || index_handle || handle_type || handle_version
|
|
47
47
|
/// @dev other handles format (fhe ops results) is: keccak256(keccak256(rawCiphertextFHEList)||index_handle)[0:30] || handle_type || handle_versioreenctestn
|
|
48
48
|
/// @dev the CiphertextFHEList actually contains: 1 byte (= N) for size of handles_list, N bytes for the handles_types : 1 per handle, then the original fhe160list raw ciphertext
|
|
49
|
+
/**
|
|
50
|
+
* Computes the prehandle hash for an input based on the ciphertext
|
|
51
|
+
*
|
|
52
|
+
* @param ciphertextPayload Note this is the different from the input which has the external handle prepended
|
|
53
|
+
* @param indexHandle
|
|
54
|
+
* @param handleType
|
|
55
|
+
* @param handleVersion
|
|
56
|
+
*/
|
|
49
57
|
export function computePrehandle({ ciphertext, indexHandle, handleType, handleVersion, }) {
|
|
50
58
|
assertUint8(indexHandle);
|
|
51
59
|
assertUint8(handleType);
|
|
@@ -64,8 +72,13 @@ export function computePrehandle({ ciphertext, indexHandle, handleType, handleVe
|
|
|
64
72
|
handle.writeUInt8(handleVersion, 31);
|
|
65
73
|
return handle;
|
|
66
74
|
}
|
|
67
|
-
|
|
68
|
-
|
|
75
|
+
/**
|
|
76
|
+
* Computes the final handle for an input based on the prehandle and the input context, matches the handle generation
|
|
77
|
+
* in Go and Solidity
|
|
78
|
+
*
|
|
79
|
+
* @param prehandle
|
|
80
|
+
* @param context
|
|
81
|
+
*/
|
|
69
82
|
export function computeHandle({ prehandle, context, }) {
|
|
70
83
|
if (prehandle.length !== 32) {
|
|
71
84
|
throw new Error(`prehandle should be 32 bytes but is: ${prehandle.length}`);
|
|
@@ -88,9 +101,20 @@ export function computeHandle({ prehandle, context, }) {
|
|
|
88
101
|
prehandle.slice(29, 32),
|
|
89
102
|
]);
|
|
90
103
|
}
|
|
104
|
+
export function hashInputContext(context) {
|
|
105
|
+
const packed = encodePacked(['string', 'uint256', 'address', 'address', 'address'], [
|
|
106
|
+
// Note: The x/hostchain spec requires the chain ID to be prefixed with 'evm/' for EVM chains
|
|
107
|
+
'evm/',
|
|
108
|
+
context.hostChainId,
|
|
109
|
+
context.aclAddress,
|
|
110
|
+
context.userAddress,
|
|
111
|
+
context.contractAddress,
|
|
112
|
+
]);
|
|
113
|
+
return new Keccak(256).update(Buffer.from(hexToBytes(packed))).digest();
|
|
114
|
+
}
|
|
91
115
|
function assertUint8(value) {
|
|
92
116
|
if (!Number.isInteger(value) || value < 0 || value > 255) {
|
|
93
117
|
throw new Error(`Invalid uint8 value: ${value}`);
|
|
94
118
|
}
|
|
95
119
|
}
|
|
96
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
120
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,6 +1,24 @@
|
|
|
1
1
|
import { Chainish } from '../chain.js';
|
|
2
|
-
import { lightningDeployments } from '../generated/lightning.js';
|
|
3
2
|
export type Address = `0x${string}`;
|
|
4
|
-
export type IncoLiteDeployment =
|
|
3
|
+
export type IncoLiteDeployment = {
|
|
4
|
+
active: boolean;
|
|
5
|
+
blockNumber: number;
|
|
6
|
+
chainId: number;
|
|
7
|
+
chainName: string;
|
|
8
|
+
commit: string;
|
|
9
|
+
deployDate: string;
|
|
10
|
+
deployer: string;
|
|
11
|
+
executorAddress: string;
|
|
12
|
+
majorVersion: number;
|
|
13
|
+
name: string;
|
|
14
|
+
pepper: string;
|
|
15
|
+
salt: string;
|
|
16
|
+
version: {
|
|
17
|
+
major: number;
|
|
18
|
+
minor: number;
|
|
19
|
+
patch: number;
|
|
20
|
+
shortSalt: string;
|
|
21
|
+
};
|
|
22
|
+
};
|
|
5
23
|
export declare function getActiveLightningDeployment(chain: Chainish): IncoLiteDeployment;
|
|
6
24
|
export declare function getLightningDeployments(chainId: Chainish): readonly IncoLiteDeployment[];
|
|
@@ -14,4 +14,4 @@ export function getLightningDeployments(chainId) {
|
|
|
14
14
|
const deployments = lightningDeployments.filter((d) => d.chainId === supportedChain.id);
|
|
15
15
|
return deployments ?? [];
|
|
16
16
|
}
|
|
17
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
17
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZGVwbG95bWVudHMuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvbGl0ZS9kZXBsb3ltZW50cy50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSwyR0FBMkc7QUFDM0csT0FBTyxFQUFZLGlCQUFpQixFQUFFLE1BQU0sYUFBYSxDQUFDO0FBQzFELE9BQU8sRUFBRSxvQkFBb0IsRUFBRSxNQUFNLDJCQUEyQixDQUFDO0FBMEJqRSxNQUFNLFVBQVUsNEJBQTRCLENBQzFDLEtBQWU7SUFFZixNQUFNLGNBQWMsR0FBRyxpQkFBaUIsQ0FBQyxLQUFLLENBQUMsQ0FBQztJQUNoRCxNQUFNLFdBQVcsR0FBRyxvQkFBb0IsQ0FBQyxNQUFNLENBQzdDLENBQUMsQ0FBQyxFQUFFLEVBQUUsQ0FBQyxDQUFDLENBQUMsT0FBTyxLQUFLLGNBQWMsQ0FBQyxFQUFFLENBQ3ZDLENBQUM7SUFDRixJQUFJLENBQUMsV0FBVyxFQUFFLE1BQU0sRUFBRSxDQUFDO1FBQ3pCLE1BQU0sSUFBSSxLQUFLLENBQUMsa0NBQWtDLEtBQUssRUFBRSxDQUFDLENBQUM7SUFDN0QsQ0FBQztJQUNELE9BQU8sV0FBVyxDQUFDLENBQUMsQ0FBQyxDQUFDO0FBQ3hCLENBQUM7QUFFRCxNQUFNLFVBQVUsdUJBQXVCLENBQ3JDLE9BQWlCO0lBRWpCLE1BQU0sY0FBYyxHQUFHLGlCQUFpQixDQUFDLE9BQU8sQ0FBQyxDQUFDO0lBQ2xELE1BQU0sV0FBVyxHQUFHLG9CQUFvQixDQUFDLE1BQU0sQ0FDN0MsQ0FBQyxDQUFDLEVBQUUsRUFBRSxDQUFDLENBQUMsQ0FBQyxPQUFPLEtBQUssY0FBYyxDQUFDLEVBQUUsQ0FDdkMsQ0FBQztJQUNGLE9BQU8sV0FBVyxJQUFJLEVBQUUsQ0FBQztBQUMzQixDQUFDIn0=
|
package/dist/esm/lite/ecies.d.ts
CHANGED
|
@@ -13,14 +13,12 @@ export declare function decodeSecp256k1PublicKey(pubKeyCompressed: Uint8Array):
|
|
|
13
13
|
export declare function decodeSecp256k1PrivateKey(privKey: Uint8Array): Secp256k1Keypair;
|
|
14
14
|
export declare function encrypt(pubKeyA: Secp256k1PubKey, plaintext: Uint8Array, privKeyB: Secp256k1Keypair): Promise<Uint8Array>;
|
|
15
15
|
export type EciesEncryptorArgs = {
|
|
16
|
-
scheme: EciesScheme;
|
|
17
16
|
pubKeyA: Secp256k1PubKey;
|
|
18
17
|
privKeyB: Secp256k1Keypair;
|
|
19
18
|
};
|
|
20
19
|
export declare function getEciesEncryptor({ pubKeyA, privKeyB, }: EciesEncryptorArgs): Encryptor<EciesScheme>;
|
|
21
20
|
export declare function decrypt(privKeyA: Secp256k1Keypair, ciphertext: Uint8Array): Promise<Uint8Array>;
|
|
22
21
|
export type EciesDecryptorArgs = {
|
|
23
|
-
scheme: EciesScheme;
|
|
24
22
|
privKeyA: Secp256k1Keypair;
|
|
25
23
|
};
|
|
26
24
|
export declare function getEciesDecryptor({ privKeyA, }: EciesDecryptorArgs): Decryptor<EciesScheme>;
|
package/dist/esm/lite/ecies.js
CHANGED
|
@@ -1,8 +1,9 @@
|
|
|
1
1
|
import { decrypt as eciesDecrypt, encrypt as eciesEncrypt } from 'ecies-geth';
|
|
2
2
|
import * as ellipticPkg from 'elliptic';
|
|
3
|
-
import { asBytes32,
|
|
4
|
-
import {
|
|
3
|
+
import { asBytes32, bytesFromHexString, bytesToHex } from '../binary.js';
|
|
4
|
+
import { bytesToPlaintext, decodeCiphertextInput, encodeCiphertextInput, encryptionSchemes, getEncryptionSchemeName, SupportedFheType, } from '../encryption/encryption.js';
|
|
5
5
|
import { computeHandle, computePrehandle } from '../handle.js';
|
|
6
|
+
import { parse } from '../schema.js';
|
|
6
7
|
import { decodeInput, encodeInput } from './hadu.js';
|
|
7
8
|
const secp256k1 = new ellipticPkg.ec('secp256k1');
|
|
8
9
|
// Convert an ec.KeyPair from the 'elliptic' package (assumed to have geen generated
|
|
@@ -70,8 +71,8 @@ export function getEciesEncryptor({ pubKeyA, privKeyB, }) {
|
|
|
70
71
|
if (plaintext.scheme !== encryptionSchemes.ecies) {
|
|
71
72
|
throw new Error(`Plaintext with scheme ${getEncryptionSchemeName(plaintext.scheme)} cannot be encrypted with ECIES`);
|
|
72
73
|
}
|
|
73
|
-
const
|
|
74
|
-
const ct = await eciesEncrypt(pubKeyABuffer,
|
|
74
|
+
const inputCiphertextPayloadBytes = Buffer.from(encodeInput({ plaintext, context }));
|
|
75
|
+
const ct = await eciesEncrypt(pubKeyABuffer, inputCiphertextPayloadBytes, {
|
|
75
76
|
ephemPrivateKey: privKeyBBuffer,
|
|
76
77
|
});
|
|
77
78
|
const prehandle = computePrehandle({
|
|
@@ -84,6 +85,7 @@ export function getEciesEncryptor({ pubKeyA, privKeyB, }) {
|
|
|
84
85
|
prehandle,
|
|
85
86
|
context: context,
|
|
86
87
|
});
|
|
88
|
+
// const inputBytes = Buffer.concat([handle, ct]);
|
|
87
89
|
return {
|
|
88
90
|
prehandle: asBytes32(prehandle),
|
|
89
91
|
handle: asBytes32(handle),
|
|
@@ -91,7 +93,8 @@ export function getEciesEncryptor({ pubKeyA, privKeyB, }) {
|
|
|
91
93
|
ciphertext: {
|
|
92
94
|
scheme: encryptionSchemes.ecies,
|
|
93
95
|
type: plaintext.type,
|
|
94
|
-
|
|
96
|
+
// The prepended handle serves as a checksum on the encrypted payload, so we can fail early on an accidental mismatch
|
|
97
|
+
value: encodeCiphertextInput(bytesToHex(handle), bytesToHex(ct)),
|
|
95
98
|
},
|
|
96
99
|
};
|
|
97
100
|
};
|
|
@@ -106,19 +109,27 @@ export async function decrypt(privKeyA, ciphertext) {
|
|
|
106
109
|
}
|
|
107
110
|
export function getEciesDecryptor({ privKeyA, }) {
|
|
108
111
|
const privKeyABuffer = privKeyA.kp.getPrivate().toArrayLike(Buffer, 'be', 32);
|
|
109
|
-
return async ({ scheme, type, value,
|
|
112
|
+
return async ({ scheme, type, value, }) => {
|
|
110
113
|
if (scheme !== encryptionSchemes.ecies) {
|
|
111
114
|
throw new Error(`Ciphertext with scheme ${getEncryptionSchemeName(scheme)} cannot be decrypted with ECIES`);
|
|
112
115
|
}
|
|
113
|
-
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
|
|
116
|
+
// remove the prepended handle
|
|
117
|
+
const { ciphertext } = decodeCiphertextInput(value);
|
|
118
|
+
const ptBuf = await eciesDecrypt(privKeyABuffer, bytesFromHexString(ciphertext));
|
|
119
|
+
const payload = decodeInput(ptBuf);
|
|
120
|
+
if (payload.values.length === 0) {
|
|
121
|
+
throw new Error('no plaintexts in decrypted input');
|
|
119
122
|
}
|
|
120
|
-
|
|
121
|
-
|
|
123
|
+
if (payload.values.length > 1) {
|
|
124
|
+
throw new Error('multiple plaintexts in decrypted input, only one currently supported');
|
|
125
|
+
}
|
|
126
|
+
const pt = payload.values[0];
|
|
127
|
+
const computable = pt.value;
|
|
128
|
+
if (computable.case !== 'scalar') {
|
|
129
|
+
throw new Error(`decrypted plaintext is not a scalar, cannot currently be decrypted, this feature may be implemented on request`);
|
|
130
|
+
}
|
|
131
|
+
const typ = parse(SupportedFheType, computable.value.type);
|
|
132
|
+
return bytesToPlaintext(computable.value.value, encryptionSchemes.ecies, typ);
|
|
122
133
|
};
|
|
123
134
|
}
|
|
124
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
135
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dist/esm/lite/hadu.d.ts
CHANGED
|
@@ -1,24 +1,4 @@
|
|
|
1
|
-
import { Schema } from 'effect';
|
|
2
1
|
import { PlaintextWithContext } from '../encryption/index.js';
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
};
|
|
7
|
-
export type NoneEnvelope = (typeof encryptionEnvelopes)['none'];
|
|
8
|
-
export type HaduEnvelope = (typeof encryptionEnvelopes)['hadu'];
|
|
9
|
-
export declare const EncryptionEnvelope: Schema.SchemaClass<0 | 1, 0 | 1, never>;
|
|
10
|
-
export declare const HaduInput: Schema.transform<Schema.SchemaClass<unknown, string, never>, Schema.Struct<{
|
|
11
|
-
envelope: Schema.Literal<[1]>;
|
|
12
|
-
scheme: Schema.Literal<[0, 1, 2]>;
|
|
13
|
-
context: Schema.Struct<{
|
|
14
|
-
hostChainId: typeof Schema.BigInt;
|
|
15
|
-
aclAddress: Schema.TemplateLiteral<`0x${string}`>;
|
|
16
|
-
userAddress: Schema.TemplateLiteral<`0x${string}`>;
|
|
17
|
-
contractAddress: Schema.TemplateLiteral<`0x${string}`>;
|
|
18
|
-
}>;
|
|
19
|
-
plaintext: Schema.brand<Schema.filter<Schema.transformOrFail<Schema.Union<[typeof Schema.String, Schema.refine<object & Uint8Array<ArrayBufferLike>, Schema.Schema<object, object, never>>]>, Schema.TemplateLiteral<`0x${string}`>, never>>, "Bytes32">;
|
|
20
|
-
type: Schema.SchemaClass<0 | 5 | 7 | 8, 0 | 5 | 7 | 8, never>;
|
|
21
|
-
}>>;
|
|
22
|
-
export type HaduInput = typeof HaduInput.Type;
|
|
23
|
-
export declare function encodeInput({ plaintext, context, }: PlaintextWithContext): string;
|
|
24
|
-
export declare function decodeInput(json: string): PlaintextWithContext;
|
|
2
|
+
import { InputPayload } from '../generated/es/inco/covalidator/compute/v1/types_pb.js';
|
|
3
|
+
export declare function encodeInput({ plaintext, context, }: PlaintextWithContext): Uint8Array;
|
|
4
|
+
export declare function decodeInput(input: Uint8Array): InputPayload;
|
package/dist/esm/lite/hadu.js
CHANGED
|
@@ -1,36 +1,34 @@
|
|
|
1
|
-
import {
|
|
2
|
-
import {
|
|
3
|
-
import {
|
|
4
|
-
import {
|
|
5
|
-
import { InputContext } from '../handle.js';
|
|
1
|
+
import { create, fromBinary, toBinary } from '@bufbuild/protobuf';
|
|
2
|
+
import { plaintextToBytes } from '../encryption/index.js';
|
|
3
|
+
import { InputPayloadSchema, ScalarSchema, } from '../generated/es/inco/covalidator/compute/v1/types_pb.js';
|
|
4
|
+
import { hashInputContext } from '../handle.js';
|
|
6
5
|
// HADU stands for "Host Chain, ACL, DApp, and User" it maps to the InputContext type where the aclAddress
|
|
7
6
|
// may actually be the singular IncoLite contract which embeds its own ACL
|
|
8
|
-
export const encryptionEnvelopes = {
|
|
9
|
-
none: 0,
|
|
10
|
-
hadu: 1,
|
|
11
|
-
};
|
|
12
|
-
export const EncryptionEnvelope = Schema.Literal(...Object.values(encryptionEnvelopes));
|
|
13
|
-
export const HaduInput = parseJson(Schema.Struct({
|
|
14
|
-
envelope: Schema.Literal(encryptionEnvelopes.hadu),
|
|
15
|
-
scheme: EncryptionScheme,
|
|
16
|
-
context: InputContext,
|
|
17
|
-
plaintext: Bytes32,
|
|
18
|
-
type: SupportedFheType,
|
|
19
|
-
}));
|
|
20
7
|
export function encodeInput({ plaintext, context, }) {
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
8
|
+
const payload = create(InputPayloadSchema, {
|
|
9
|
+
contextHash: hashInputContext(context),
|
|
10
|
+
values: [
|
|
11
|
+
{
|
|
12
|
+
value: {
|
|
13
|
+
case: 'scalar',
|
|
14
|
+
value: create(ScalarSchema, {
|
|
15
|
+
type: plaintext.type,
|
|
16
|
+
value: plaintextToBytes(plaintext),
|
|
17
|
+
}),
|
|
18
|
+
},
|
|
19
|
+
},
|
|
20
|
+
],
|
|
27
21
|
});
|
|
22
|
+
return toBinary(InputPayloadSchema, payload);
|
|
28
23
|
}
|
|
29
|
-
export function decodeInput(
|
|
30
|
-
const
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
24
|
+
export function decodeInput(input) {
|
|
25
|
+
const payload = fromBinary(InputPayloadSchema, input);
|
|
26
|
+
if (payload.values.length === 0) {
|
|
27
|
+
throw new Error('no plaintexts in input');
|
|
28
|
+
}
|
|
29
|
+
if (payload.values.length > 1) {
|
|
30
|
+
throw new Error('multiple plaintexts in input, only one currently supported');
|
|
31
|
+
}
|
|
32
|
+
return payload;
|
|
35
33
|
}
|
|
36
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
34
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dist/esm/lite/index.d.ts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
export * from '../generated/abis/lightning.js';
|
|
2
|
-
export type { AttestedComputeRequest, AttestedDecryptRequest, KmsService,
|
|
2
|
+
export type { AttestedComputeRequest, AttestedDecryptRequest, KmsService, } from '../generated/es/inco/kms/lite/v1/kms_service_pb.js';
|
|
3
3
|
export type { HandleWithProof } from '../generated/es/inco/kms/lite/v1/types_pb.js';
|
|
4
4
|
export * from './attested-compute.js';
|
|
5
5
|
export * from './attested-decrypt.js';
|