@inco/js 0.6.8 → 0.6.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/advancedacl/session-key.d.ts +8 -1
- package/dist/cjs/advancedacl/session-key.js +55 -21
- package/dist/cjs/attestedcompute/attested-compute.js +11 -4
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +38 -1
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +49 -6
- package/dist/cjs/attesteddecrypt/types.d.ts +6 -1
- package/dist/cjs/attesteddecrypt/types.js +1 -1
- package/dist/cjs/attestedreveal/attested-reveal.js +9 -7
- package/dist/cjs/encryption/encryption.d.ts +8 -10
- package/dist/cjs/encryption/encryption.js +6 -6
- package/dist/cjs/generated/abis/add-two.d.ts +1 -1
- package/dist/cjs/generated/abis/add-two.js +1 -1
- package/dist/cjs/generated/abis/lightning-preview.d.ts +40 -0
- package/dist/cjs/generated/abis/lightning-preview.js +29 -1
- package/dist/cjs/generated/abis/lightning.d.ts +1 -1
- package/dist/cjs/generated/abis/lightning.js +1 -1
- package/dist/cjs/generated/abis/verifier.d.ts +126 -67
- package/dist/cjs/generated/abis/verifier.js +108 -54
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +20 -25
- package/dist/cjs/generated/lightning.d.ts +0 -32
- package/dist/cjs/generated/lightning.js +1 -33
- package/dist/cjs/generated/local-node.d.ts +1 -5
- package/dist/cjs/generated/local-node.js +2 -6
- package/dist/cjs/lite/deployments.d.ts +20 -2
- package/dist/cjs/lite/deployments.js +1 -1
- package/dist/cjs/lite/index.d.ts +1 -1
- package/dist/cjs/lite/index.js +1 -1
- package/dist/cjs/lite/lightning.d.ts +24 -12
- package/dist/cjs/lite/lightning.js +62 -26
- package/dist/cjs/lite/reencrypt.d.ts +5 -7
- package/dist/cjs/lite/reencrypt.js +68 -58
- package/dist/cjs/test/mocks.d.ts +12 -0
- package/dist/cjs/test/mocks.js +27 -0
- package/dist/cjs/viem.d.ts +1 -1
- package/dist/esm/advancedacl/session-key.d.ts +8 -1
- package/dist/esm/advancedacl/session-key.js +58 -24
- package/dist/esm/attestedcompute/attested-compute.js +11 -4
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +38 -1
- package/dist/esm/attesteddecrypt/attested-decrypt.js +51 -8
- package/dist/esm/attesteddecrypt/types.d.ts +6 -1
- package/dist/esm/attesteddecrypt/types.js +1 -1
- package/dist/esm/attestedreveal/attested-reveal.js +9 -7
- package/dist/esm/encryption/encryption.d.ts +8 -10
- package/dist/esm/encryption/encryption.js +6 -6
- package/dist/esm/generated/abis/add-two.d.ts +1 -1
- package/dist/esm/generated/abis/add-two.js +1 -1
- package/dist/esm/generated/abis/lightning-preview.d.ts +40 -0
- package/dist/esm/generated/abis/lightning-preview.js +29 -1
- package/dist/esm/generated/abis/lightning.d.ts +1 -1
- package/dist/esm/generated/abis/lightning.js +1 -1
- package/dist/esm/generated/abis/verifier.d.ts +126 -67
- package/dist/esm/generated/abis/verifier.js +108 -54
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +19 -24
- package/dist/esm/generated/lightning.d.ts +0 -32
- package/dist/esm/generated/lightning.js +1 -33
- package/dist/esm/generated/local-node.d.ts +1 -5
- package/dist/esm/generated/local-node.js +2 -6
- package/dist/esm/lite/deployments.d.ts +20 -2
- package/dist/esm/lite/deployments.js +1 -1
- package/dist/esm/lite/index.d.ts +1 -1
- package/dist/esm/lite/index.js +1 -1
- package/dist/esm/lite/lightning.d.ts +24 -12
- package/dist/esm/lite/lightning.js +59 -23
- package/dist/esm/lite/reencrypt.d.ts +5 -7
- package/dist/esm/lite/reencrypt.js +67 -58
- package/dist/esm/test/mocks.d.ts +12 -0
- package/dist/esm/test/mocks.js +23 -0
- package/dist/esm/viem.d.ts +1 -1
- package/dist/types/advancedacl/session-key.d.ts +8 -1
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +38 -1
- package/dist/types/attesteddecrypt/types.d.ts +6 -1
- package/dist/types/encryption/encryption.d.ts +8 -10
- package/dist/types/generated/abis/add-two.d.ts +1 -1
- package/dist/types/generated/abis/lightning-preview.d.ts +40 -0
- package/dist/types/generated/abis/lightning.d.ts +1 -1
- package/dist/types/generated/abis/verifier.d.ts +126 -67
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
- package/dist/types/generated/lightning.d.ts +0 -32
- package/dist/types/generated/local-node.d.ts +1 -5
- package/dist/types/lite/deployments.d.ts +20 -2
- package/dist/types/lite/index.d.ts +1 -1
- package/dist/types/lite/lightning.d.ts +24 -12
- package/dist/types/lite/reencrypt.d.ts +5 -7
- package/dist/types/test/mocks.d.ts +12 -0
- package/dist/types/viem.d.ts +1 -1
- package/package.json +2 -2
|
@@ -29,6 +29,11 @@ export interface SessionKeyReencryptorArgs {
|
|
|
29
29
|
kmsConnectRpcEndpointOrClient: string | Client<typeof KmsService>;
|
|
30
30
|
allowanceVoucherWithSig: AllowanceVoucherWithSig;
|
|
31
31
|
}
|
|
32
|
+
/**
|
|
33
|
+
* The sessionKeyReencryptor function is a reencryptor that uses a session key
|
|
34
|
+
* to reencrypt data.
|
|
35
|
+
*
|
|
36
|
+
*/
|
|
32
37
|
export declare function sessionKeyReencryptor({ chainId, kmsConnectRpcEndpointOrClient, ephemeralKeypair, allowanceVoucherWithSig, }: SessionKeyReencryptorArgs): Promise<(<T extends SupportedFheType>({ handle, }: ReencryptFnArgs<EciesScheme, T>) => Promise<import("../encryption/encryption.js").PlaintextOf<1, 0 | 5 | 7 | 8>>)>;
|
|
33
38
|
export declare function updateActiveVouchersSessionNonce(incoLiteAddress: Address, sharerWalletClient: WalletClient<Transport, Chain, Account>): Promise<`0x${string}`>;
|
|
34
39
|
export interface SessionKeyAttestedComputeArgs {
|
|
@@ -53,5 +58,7 @@ export interface SessionKeyAttestedDecryptArgs {
|
|
|
53
58
|
allowanceVoucherWithSig: AllowanceVoucherWithSig;
|
|
54
59
|
handles: HexString[];
|
|
55
60
|
backoffConfig?: Partial<BackoffConfig> | undefined;
|
|
61
|
+
reencryptPubKey?: Uint8Array;
|
|
62
|
+
reencryptKeypair?: Secp256k1Keypair;
|
|
56
63
|
}
|
|
57
|
-
export declare function sessionKeyAttestedDecrypt({ chainId, kmsConnectRpcEndpointOrClient, handles, ephemeralKeypair, allowanceVoucherWithSig, backoffConfig, }: SessionKeyAttestedDecryptArgs): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
|
|
64
|
+
export declare function sessionKeyAttestedDecrypt({ chainId, kmsConnectRpcEndpointOrClient, handles, ephemeralKeypair, allowanceVoucherWithSig, backoffConfig, reencryptPubKey, reencryptKeypair, }: SessionKeyAttestedDecryptArgs): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
|
|
@@ -21,6 +21,7 @@ const index_js_4 = require("../reencryption/index.js");
|
|
|
21
21
|
const retry_js_1 = require("../retry.js");
|
|
22
22
|
const kms_service_pb_js_1 = require("../generated/es/inco/kms/lite/v1/kms_service_pb.js");
|
|
23
23
|
const types_pb_js_1 = require("../generated/es/inco/kms/lite/v1/types_pb.js");
|
|
24
|
+
const reencrypt_js_1 = require("../lite/reencrypt.js");
|
|
24
25
|
// Given a sharer's wallet client, an incoLite contract address, and a
|
|
25
26
|
// (verifyingContract, callFunction, sharerArgData) tuple, this function
|
|
26
27
|
// creates an AllowanceVoucher.
|
|
@@ -84,23 +85,40 @@ async function grantSessionKey({ chainId, incoLiteAddress, sessionVerifierContra
|
|
|
84
85
|
voucherSignature,
|
|
85
86
|
};
|
|
86
87
|
}
|
|
87
|
-
|
|
88
|
-
|
|
88
|
+
/**
|
|
89
|
+
* The sessionKeyReencryptor function is a reencryptor that uses a session key
|
|
90
|
+
* to reencrypt data.
|
|
91
|
+
*
|
|
92
|
+
*/
|
|
89
93
|
async function sessionKeyReencryptor({ chainId, kmsConnectRpcEndpointOrClient, ephemeralKeypair, allowanceVoucherWithSig, }) {
|
|
90
94
|
const kmsClient = (0, index_js_3.getKmsClient)(kmsConnectRpcEndpointOrClient ||
|
|
91
95
|
(0, index_js_3.defaultCovalidatorGrpc)((0, chain_js_1.getSupportedChain)(chainId)));
|
|
92
96
|
const requesterAccount = (0, accounts_1.privateKeyToAccount)(`0x${ephemeralKeypair.kp.getPrivate('hex')}`);
|
|
93
97
|
const ephemeralPubKey = ephemeralKeypair.encodePublicKey();
|
|
94
|
-
// Sign the EIP712 attesting that the requester has access to the private key
|
|
95
|
-
// corresponding to the ephemeral public key.
|
|
96
|
-
const eip712Payload = (0, index_js_3.reencryptEIP712)(chainId, ephemeralPubKey);
|
|
97
|
-
// Since the account is an ephemeral keypair stored in memory (not in Metamask),
|
|
98
|
-
// this step will NOT prompt the user with a pop-up.
|
|
99
|
-
const eip712Signature = await requesterAccount.signTypedData(eip712Payload);
|
|
100
98
|
return async function reencrypt({ handle, }) {
|
|
101
|
-
const
|
|
99
|
+
const handles = [handle];
|
|
100
|
+
// Sign the EIP712 attesting that the requester has access to the private key
|
|
101
|
+
// corresponding to the ephemeral public key.
|
|
102
|
+
const eip712Payload = (0, index_js_4.createEIP712Payload)({
|
|
103
|
+
chainId,
|
|
104
|
+
primaryType: 'AttestedDecryptRequest',
|
|
105
|
+
primaryTypeFields: [
|
|
106
|
+
{ name: 'handles', type: 'bytes32[]' },
|
|
107
|
+
{ name: 'publicKey', type: 'bytes' },
|
|
108
|
+
],
|
|
109
|
+
message: {
|
|
110
|
+
handles: handles,
|
|
111
|
+
publicKey: (0, viem_1.bytesToHex)(ephemeralPubKey),
|
|
112
|
+
},
|
|
113
|
+
domainName: index_js_3.ATTESTED_DECRYPT_DOMAIN_NAME,
|
|
114
|
+
domainVersion: index_js_3.ATTESTED_DECRYPT_DOMAIN_VERSION,
|
|
115
|
+
});
|
|
116
|
+
// Since the account is an ephemeral keypair stored in memory (not in Metamask),
|
|
117
|
+
// this step will NOT prompt the user with a pop-up.
|
|
118
|
+
const eip712Signature = await requesterAccount.signTypedData(eip712Payload);
|
|
119
|
+
const reencryptRequest = (0, protobuf_1.create)(kms_service_pb_js_1.AttestedDecryptRequestSchema, {
|
|
102
120
|
userAddress: requesterAccount.address,
|
|
103
|
-
ephemeralPubKey,
|
|
121
|
+
reencryptPubKey: ephemeralPubKey,
|
|
104
122
|
eip712Signature: (0, viem_1.hexToBytes)(eip712Signature),
|
|
105
123
|
handlesWithProofs: [
|
|
106
124
|
(0, protobuf_1.create)(types_pb_js_1.HandleWithProofSchema, {
|
|
@@ -126,7 +144,7 @@ async function sessionKeyReencryptor({ chainId, kmsConnectRpcEndpointOrClient, e
|
|
|
126
144
|
}),
|
|
127
145
|
],
|
|
128
146
|
});
|
|
129
|
-
const response = await kmsClient.
|
|
147
|
+
const response = await kmsClient.attestedDecrypt(reencryptRequest);
|
|
130
148
|
return (0, index_js_3.decryptGrpcResponse)(response, ephemeralKeypair, handle);
|
|
131
149
|
};
|
|
132
150
|
}
|
|
@@ -197,10 +215,14 @@ async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, backoffC
|
|
|
197
215
|
throw new Error('Failed to get decryption attestation from attested compute');
|
|
198
216
|
}
|
|
199
217
|
const decryptionAttestation = response.decryptionAttestation;
|
|
200
|
-
if (decryptionAttestation.
|
|
201
|
-
throw new Error('No
|
|
218
|
+
if (decryptionAttestation.value === undefined) {
|
|
219
|
+
throw new Error('No value in compute response');
|
|
220
|
+
}
|
|
221
|
+
if (decryptionAttestation.value.case !== 'plaintext') {
|
|
222
|
+
throw new Error(`Unexpected attestation type: ${decryptionAttestation.value.case}, expected 'plaintext'`);
|
|
202
223
|
}
|
|
203
|
-
const
|
|
224
|
+
const plaintext = decryptionAttestation.value.value;
|
|
225
|
+
const bigIntValue = (0, index_js_2.bytesToBigInt)(plaintext.value);
|
|
204
226
|
return {
|
|
205
227
|
handle: decryptionAttestation.handle,
|
|
206
228
|
plaintext: (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, (0, index_js_2.getHandleType)(lhsHandle), bigIntValue),
|
|
@@ -209,7 +231,7 @@ async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, backoffC
|
|
|
209
231
|
}
|
|
210
232
|
// The sessionKeyAttestedDecrypt function is a decryptor that uses a session key
|
|
211
233
|
// to decrypt data.
|
|
212
|
-
async function sessionKeyAttestedDecrypt({ chainId, kmsConnectRpcEndpointOrClient, handles, ephemeralKeypair, allowanceVoucherWithSig, backoffConfig, }) {
|
|
234
|
+
async function sessionKeyAttestedDecrypt({ chainId, kmsConnectRpcEndpointOrClient, handles, ephemeralKeypair, allowanceVoucherWithSig, backoffConfig, reencryptPubKey, reencryptKeypair, }) {
|
|
213
235
|
const kmsClient = (0, index_js_3.getKmsClient)(kmsConnectRpcEndpointOrClient ||
|
|
214
236
|
(0, index_js_3.defaultCovalidatorGrpc)((0, chain_js_1.getSupportedChain)(chainId)));
|
|
215
237
|
const requesterAccount = (0, accounts_1.privateKeyToAccount)(`0x${ephemeralKeypair.kp.getPrivate('hex')}`);
|
|
@@ -218,9 +240,13 @@ async function sessionKeyAttestedDecrypt({ chainId, kmsConnectRpcEndpointOrClien
|
|
|
218
240
|
const eip712Payload = (0, index_js_4.createEIP712Payload)({
|
|
219
241
|
chainId: BigInt(chainId),
|
|
220
242
|
primaryType: 'AttestedDecryptRequest',
|
|
221
|
-
primaryTypeFields: [
|
|
243
|
+
primaryTypeFields: [
|
|
244
|
+
{ name: 'handles', type: 'bytes32[]' },
|
|
245
|
+
{ name: 'publicKey', type: 'bytes' },
|
|
246
|
+
],
|
|
222
247
|
message: {
|
|
223
248
|
handles: handles,
|
|
249
|
+
publicKey: (0, viem_1.bytesToHex)(reencryptPubKey ? reencryptPubKey : Uint8Array.from([])),
|
|
224
250
|
},
|
|
225
251
|
domainName: index_js_3.ATTESTED_DECRYPT_DOMAIN_NAME,
|
|
226
252
|
domainVersion: index_js_3.ATTESTED_DECRYPT_DOMAIN_VERSION,
|
|
@@ -255,21 +281,29 @@ async function sessionKeyAttestedDecrypt({ chainId, kmsConnectRpcEndpointOrClien
|
|
|
255
281
|
userAddress: requesterAccount.address,
|
|
256
282
|
handlesWithProofs: handlesWithProofs,
|
|
257
283
|
eip712Signature: (0, viem_1.hexToBytes)(eip712Signature),
|
|
284
|
+
reencryptPubKey: reencryptPubKey ? reencryptPubKey : Uint8Array.from([]),
|
|
258
285
|
});
|
|
259
|
-
|
|
286
|
+
var response = await (0, retry_js_1.retryWithBackoff)(async () => {
|
|
260
287
|
return await kmsClient.attestedDecrypt(attestedDecryptRequest);
|
|
261
288
|
}, backoffConfig);
|
|
262
289
|
if (!response.decryptionAttestations ||
|
|
263
290
|
response.decryptionAttestations.length === 0) {
|
|
264
291
|
throw new index_js_1.AttestedDecryptError('No decryption attestations in response');
|
|
265
292
|
}
|
|
293
|
+
if (reencryptKeypair) {
|
|
294
|
+
response = await (0, reencrypt_js_1.decryptGrpcDecryptResponse)(response, reencryptKeypair);
|
|
295
|
+
}
|
|
266
296
|
const results = response.decryptionAttestations.map((att) => {
|
|
267
|
-
if (att.
|
|
268
|
-
throw new index_js_1.AttestedDecryptError('No
|
|
297
|
+
if (att.value === undefined) {
|
|
298
|
+
throw new index_js_1.AttestedDecryptError('No value in attestation');
|
|
299
|
+
}
|
|
300
|
+
if (att.value.case !== 'plaintext') {
|
|
301
|
+
throw new Error(`Unexpected attestation type: ${att.value.case}, expected 'plaintext'`);
|
|
269
302
|
}
|
|
303
|
+
const plaintext = att.value.value;
|
|
270
304
|
const h = att.handle;
|
|
271
305
|
const handleType = (0, index_js_2.getHandleType)(h);
|
|
272
|
-
const bigIntValue = (0, index_js_2.bytesToBigInt)(
|
|
306
|
+
const bigIntValue = (0, index_js_2.bytesToBigInt)(plaintext.value);
|
|
273
307
|
return {
|
|
274
308
|
handle: h,
|
|
275
309
|
plaintext: (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, handleType, bigIntValue),
|
|
@@ -341,4 +375,4 @@ async function getIncoVerifier(incoLiteAddress, walletClient) {
|
|
|
341
375
|
client: walletClient,
|
|
342
376
|
});
|
|
343
377
|
}
|
|
344
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"session-key.js","sourceRoot":"","sources":["../../../src/advancedacl/session-key.ts"],"names":[],"mappings":";;AAgGA,wDAqBC;AAwBD,0CAiEC;AAsBD,sDAkEC;AAED,4EAOC;AA6BD,8DA8GC;AA0BD,8DA0GC;AA9jBD,iDAA4C;AAE5C,+BAWc;AACd,4CAAoD;AACpD,0DAGqC;AACrC,0CAAkE;AAClE,+DAKqC;AACrC,iFAGgD;AAChD,iEAGwC;AACxC,+DAAgE;AAChE,0CAKqB;AASrB,+CAS0B;AAC1B,uDAGkC;AAClC,0CAA8D;AAI9D,0FAI4D;AAC5D,8EAKsD;AAgBtD,sEAAsE;AACtE,wEAAwE;AACxE,+BAA+B;AACxB,KAAK,UAAU,sBAAsB,CAC1C,eAAwB,EACxB,kBAA2D,EAC3D,iBAA0B,EAC1B,YAAiB,EACjB,aAAkB;IAElB,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAE5E,0EAA0E;IAC1E,wCAAwC;IACxC,MAAM,YAAY,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,6BAA6B,CAAC;QACrE,kBAAkB,CAAC,OAAO,CAAC,OAAO;KACnC,CAAC,CAAC;IAEH,OAAO;QACL,YAAY;QACZ,iBAAiB;QACjB,YAAY;QACZ,aAAa;KACd,CAAC;AACJ,CAAC;AAuBD,mDAAmD;AAC5C,KAAK,UAAU,eAAe,CAAC,EACpC,OAAO,EACP,eAAe,EACf,8BAA8B,EAC9B,cAAc,EACd,kBAAkB,EAClB,SAAS,GACW;IACpB,MAAM,OAAO,GAAG;QACd,SAAS,EAAE,cAAc;QACzB,SAAS,EAAE,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,CAAC;KAC/C,CAAC;IACb,MAAM,aAAa,GAAG,IAAA,0BAAmB,EAAC,aAAa,EAAE,EAAE;QACzD,OAAO,CAAC,SAAS;QACjB,OAAO,CAAC,SAAS;KAClB,CAAC,CAAC;IAEH,MAAM,YAAY,GAAG,MAAM,eAAe,CACxC,eAAe,EACf,kBAAkB,CACnB,CAAC;IAEF,mCAAmC;IACnC,iBAAiB;IACjB,sBAAsB;IACtB,yBAAyB;IACzB,mBAAmB;IACnB,6BAA6B;IAC7B,gBAAgB;IAChB,8BAA8B;IAC9B,MAAM,cAAc,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC9D,MAAM,gBAAgB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IAEtD,MAAM,OAAO,GAAG,MAAM,sBAAsB,CAC1C,eAAe,EACf,kBAAkB;IAClB,4EAA4E;IAC5E,6BAA6B;IAC7B,8BAA8B,EAC9B,IAAA,yBAAkB,EAAC,mBAAmB,EAAE,CAAC,EACzC,aAAa,CACd,CAAC;IACF,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO;QACP,WAAW,EAAE,kBAAkB;QAC/B,iBAAiB,EAAE,sBAAsB,EAAE;QAC3C,OAAO,EAAE,OAAO;QAChB,wEAAwE;QACxE,gEAAgE;QAChE,iBAAiB,EAAE,YAAY,CAAC,OAAO;QACvC,UAAU,EAAE,gBAAgB;QAC5B,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IAEH,uEAAuE;IACvE,WAAW;IACX,MAAM,gBAAgB,GACpB,MAAM,kBAAkB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAExD,OAAO;QACL,MAAM,EAAE,kBAAkB,CAAC,OAAO,CAAC,OAAO;QAC1C,OAAO;QACP,gBAAgB;KACjB,CAAC;AACJ,CAAC;AAoBD,8EAA8E;AAC9E,qBAAqB;AACd,KAAK,UAAU,qBAAqB,CAAC,EAC1C,OAAO,EACP,6BAA6B,EAC7B,gBAAgB,EAChB,uBAAuB,GACG;IAC1B,MAAM,SAAS,GAAG,IAAA,uBAAY,EAC5B,6BAA6B;QAC3B,IAAA,iCAAsB,EAAC,IAAA,4BAAiB,EAAC,OAAO,CAAC,CAAC,CACrD,CAAC;IACF,MAAM,gBAAgB,GAAG,IAAA,8BAAmB,EAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IACF,MAAM,eAAe,GAAG,gBAAgB,CAAC,eAAe,EAAE,CAAC;IAE3D,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,IAAA,0BAAe,EAAC,OAAO,EAAE,eAAe,CAAC,CAAC;IAChE,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAE5E,OAAO,KAAK,UAAU,SAAS,CAA6B,EAC1D,MAAM,GAC0B;QAChC,MAAM,gBAAgB,GAAqB,IAAA,iBAAM,EAAC,0CAAsB,EAAE;YACxE,WAAW,EAAE,gBAAgB,CAAC,OAAO;YACrC,eAAe;YACf,eAAe,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;YAC5C,iBAAiB,EAAE;gBACjB,IAAA,iBAAM,EAAC,mCAAqB,EAAE;oBAC5B,MAAM;oBACN,QAAQ,EAAE;wBACR,KAAK,EAAE;4BACL,IAAI,EAAE,0BAA0B;4BAChC,KAAK,EAAE,IAAA,iBAAM,EAAC,4CAA8B,EAAE;gCAC5C,cAAc,EAAE,IAAA,iBAAM,EAAC,kCAAoB,EAAE;oCAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;oCACtC,OAAO,EAAE,IAAA,iBAAM,EAAC,oCAAsB,EAAE;wCACtC,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;wCACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;wCACnD,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;wCACD,aAAa,EAAE,IAAA,iBAAU,EACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;qCACF,CAAC;oCACF,gBAAgB,EAAE,IAAA,iBAAU,EAC1B,uBAAuB,CAAC,gBAAgB,CACzC;oCACD,gBAAgB,EAAE,IAAI,UAAU,EAAE;iCACnC,CAAC;6BACH,CAAC;yBACH;qBACF;iBACF,CAAC;aACH;SACF,CAAC,CAAC;QAEH,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,SAAS,CAAC,gBAAgB,CAAC,CAAC;QAC7D,OAAO,IAAA,8BAAmB,EAAC,QAAQ,EAAE,gBAAgB,EAAE,MAAM,CAAC,CAAC;IACjE,CAAC,CAAC;AACJ,CAAC;AAEM,KAAK,UAAU,gCAAgC,CACpD,eAAwB,EACxB,kBAA2D;IAE3D,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAC5E,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,KAAK,CAAC,gCAAgC,EAAE,CAAC;IACvE,OAAO,MAAM,CAAC;AAChB,CAAC;AA2BD,gFAAgF;AAChF,0BAA0B;AACnB,KAAK,UAAU,yBAAyB,CAA6B,EAC1E,SAAS,EACT,EAAE,EACF,YAAY,EACZ,aAAa,EACb,OAAO,EACP,6BAA6B,EAC7B,gBAAgB,EAChB,uBAAuB,GACO;IAC9B,MAAM,SAAS,GAAG,IAAA,uBAAY,EAC5B,6BAA6B;QAC3B,IAAA,iCAAsB,EAAC,IAAA,4BAAiB,EAAC,OAAO,CAAC,CAAC,CACrD,CAAC;IACF,MAAM,gBAAgB,GAAG,IAAA,8BAAmB,EAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IACF,MAAM,eAAe,GAAG,MAAM,CAAC,YAAY,CAAC,CAAC;IAC7C,MAAM,aAAa,GAAG,IAAA,iCAAiB,EACrC,iCAAiB,CAAC,KAAK,EACvB,IAAA,wBAAa,EAAC,SAAS,CAAM,EAC7B,eAAe,CAChB,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,OAAO,EAAE;YAC7B,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,SAAS,EAAE;YACtC,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,SAAS,EAAE;SAC1C;QACD,OAAO,EAAE;YACP,EAAE,EAAE,EAAE;YACN,SAAS,EAAE,SAAS;YACpB,YAAY,EAAE,IAAA,0BAAe,EAAC,eAAe,CAAC;SAC/C;QACD,UAAU,EAAE,uCAA4B;QACxC,aAAa,EAAE,0CAA+B;KAC/C,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAE5E,MAAM,sBAAsB,GAA2B,IAAA,iBAAM,EAC3D,gDAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,EAAE,EAAE,EAAE;QACN,SAAS,EAAE,SAAS;QACpB,YAAY,EAAE,aAAa,CAAC,KAAK,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC9C,eAAe,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;QAC5C,QAAQ,EAAE;YACR,KAAK,EAAE;gBACL,IAAI,EAAE,0BAA0B;gBAChC,KAAK,EAAE,IAAA,iBAAM,EAAC,4CAA8B,EAAE;oBAC5C,cAAc,EAAE,IAAA,iBAAM,EAAC,kCAAoB,EAAE;wBAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;wBACtC,OAAO,EAAE,IAAA,iBAAM,EAAC,oCAAsB,EAAE;4BACtC,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;4BACnD,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,aAAa,EAAE,IAAA,iBAAU,EACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;yBACF,CAAC;wBACF,gBAAgB,EAAE,IAAA,iBAAU,EAC1B,uBAAuB,CAAC,gBAAgB,CACzC;wBACD,sDAAsD;wBACtD,gBAAgB,EAAE,IAAI,UAAU,EAAE;qBACnC,CAAC;iBACH,CAAC;aACH;SACF;KACF,CACF,CAAC;IAEF,MAAM,QAAQ,GAAG,MAAM,IAAA,2BAAgB,EAAC,KAAK,IAAI,EAAE;QACjD,OAAO,MAAM,SAAS,CAAC,eAAe,CAAC,sBAAsB,CAAC,CAAC;IACjE,CAAC,EAAE,aAAa,CAAC,CAAC;IAElB,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;QACpC,MAAM,IAAI,KAAK,CACb,4DAA4D,CAC7D,CAAC;IACJ,CAAC;IAED,MAAM,qBAAqB,GAAG,QAAQ,CAAC,qBAAqB,CAAC;IAC7D,IAAI,qBAAqB,CAAC,SAAS,KAAK,SAAS,EAAE,CAAC;QAClD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;IACtD,CAAC;IAED,MAAM,WAAW,GAAG,IAAA,wBAAa,EAAC,qBAAqB,CAAC,SAAS,CAAC,CAAC;IACnE,OAAO;QACL,MAAM,EAAE,qBAAqB,CAAC,MAAmB;QACjD,SAAS,EAAE,IAAA,iCAAiB,EAC1B,iCAAiB,CAAC,KAAK,EACvB,IAAA,wBAAa,EAAC,SAAS,CAAM,EAC7B,WAAW,CACZ;QACD,oBAAoB,EAAE,qBAAqB,CAAC,SAAS;KACtD,CAAC;AACJ,CAAC;AAwBD,gFAAgF;AAChF,mBAAmB;AACZ,KAAK,UAAU,yBAAyB,CAAC,EAC9C,OAAO,EACP,6BAA6B,EAC7B,OAAO,EACP,gBAAgB,EAChB,uBAAuB,EACvB,aAAa,GACiB;IAG9B,MAAM,SAAS,GAAG,IAAA,uBAAY,EAC5B,6BAA6B;QAC3B,IAAA,iCAAsB,EAAC,IAAA,4BAAiB,EAAC,OAAO,CAAC,CAAC,CACrD,CAAC;IACF,MAAM,gBAAgB,GAAG,IAAA,8BAAmB,EAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE,CAAC,EAAE,IAAI,EAAE,SAAS,EAAE,IAAI,EAAE,WAAW,EAAE,CAAC;QAC3D,OAAO,EAAE;YACP,OAAO,EAAE,OAAO;SACjB;QACD,UAAU,EAAE,uCAA4B;QACxC,aAAa,EAAE,0CAA+B;KAC/C,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAC5E,MAAM,iBAAiB,GAA2B,OAAO,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE;QACvE,OAAO,IAAA,iBAAM,EAAC,mCAAqB,EAAE;YACnC,MAAM,EAAE,MAAM;YACd,QAAQ,EAAE;gBACR,KAAK,EAAE;oBACL,IAAI,EAAE,0BAA0B;oBAChC,KAAK,EAAE,IAAA,iBAAM,EAAC,4CAA8B,EAAE;wBAC5C,cAAc,EAAE,IAAA,iBAAM,EAAC,kCAAoB,EAAE;4BAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;4BACtC,OAAO,EAAE,IAAA,iBAAM,EAAC,oCAAsB,EAAE;gCACtC,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;gCACnD,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,aAAa,EAAE,IAAA,iBAAU,EACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;6BACF,CAAC;4BACF,gBAAgB,EAAE,IAAA,iBAAU,EAC1B,uBAAuB,CAAC,gBAAgB,CACzC;4BACD,gBAAgB,EAAE,IAAI,UAAU,EAAE;yBACnC,CAAC;qBACH,CAAC;iBACH;aACF;SACF,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,MAAM,sBAAsB,GAA2B,IAAA,iBAAM,EAC3D,gDAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,iBAAiB,EAAE,iBAAiB;QACpC,eAAe,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;KAC7C,CACF,CAAC;IAEF,MAAM,QAAQ,GAAG,MAAM,IAAA,2BAAgB,EAAC,KAAK,IAAI,EAAE;QACjD,OAAO,MAAM,SAAS,CAAC,eAAe,CAAC,sBAAsB,CAAC,CAAC;IACjE,CAAC,EAAE,aAAa,CAAC,CAAC;IAElB,IACE,CAAC,QAAQ,CAAC,sBAAsB;QAChC,QAAQ,CAAC,sBAAsB,CAAC,MAAM,KAAK,CAAC,EAC5C,CAAC;QACD,MAAM,IAAI,+BAAoB,CAAC,wCAAwC,CAAC,CAAC;IAC3E,CAAC;IAED,MAAM,OAAO,GACX,QAAQ,CAAC,sBAAsB,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE;QAC1C,IAAI,GAAG,CAAC,SAAS,KAAK,SAAS,EAAE,CAAC;YAChC,MAAM,IAAI,+BAAoB,CAAC,6BAA6B,CAAC,CAAC;QAChE,CAAC;QACD,MAAM,CAAC,GAAG,GAAG,CAAC,MAAmB,CAAC;QAClC,MAAM,UAAU,GAAG,IAAA,wBAAa,EAAC,CAAC,CAAC,CAAC;QACpC,MAAM,WAAW,GAAG,IAAA,wBAAa,EAAC,GAAG,CAAC,SAAS,CAAC,CAAC;QACjD,OAAO;YACL,MAAM,EAAE,CAAC;YACT,SAAS,EAAE,IAAA,iCAAiB,EAC1B,iCAAiB,CAAC,KAAK,EACvB,UAA8B,EAC9B,WAAW,CACZ;YACD,oBAAoB,EAAE,GAAG,CAAC,SAAS;SACpC,CAAC;IACJ,CAAC,CAAC,CAAC;IAEL,OAAO,OAAO,CAAC;AACjB,CAAC;AAED,8EAA8E;AAC9E,YAAY;AAEZ,gDAAgD;AAChD,SAAS,sBAAsB;IAC7B,2EAA2E;IAC3E,oBAAoB;IACpB,MAAM,sBAAsB,GAAG,+CAAwB,CAAC,IAAI,CAC1D,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,KAAK,wBAAwB,CACjD,CAAC;IACF,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAC5B,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;IACtD,CAAC;IAED,gEAAgE;IAChE,MAAM,qBAAqB,GAAG,sBAAsB,CAAC,MAAM,CAAC,IAAI,CAC9D,CAAC,KAAK,EAAE,EAAE,CAAC,KAAK,CAAC,YAAY,KAAK,yBAAyB,CAC5D,CAAC;IACF,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAC3B,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACrD,CAAC;IAED,OAAO,qBAAqB,CAAC,UAAU,CAAC;AAC1C,CAAC;AAED,uCAAuC;AACvC,EAAE;AACF,0EAA0E;AAC1E,4CAA4C;AAC5C,SAAS,aAAa;IACpB,MAAM,UAAU,GAAG,mCAAY,CAAC,IAAI,CAClC,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,YAAY,CACvD,CAAC;IACF,IAAI,CAAC,UAAU,EAAE,CAAC;QAChB,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;IAC1C,CAAC;IAED,MAAM,OAAO,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IACtC,IAAI,CAAC,OAAO,EAAE,CAAC;QACb,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;IACvC,CAAC;IAED,OAAO,OAAO,CAAC,UAAU,CAAC;AAC5B,CAAC;AAED,+CAA+C;AAC/C,SAAS,mBAAmB;IAC1B,MAAM,aAAa,GAAG,iCAAkB,CAAC,IAAI,CAC3C,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,eAAe,CAC1D,CAAC;IACF,IAAI,CAAC,aAAa,EAAE,CAAC;QACnB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;IAC7C,CAAC;IAED,OAAO,aAAa,CAAC;AACvB,CAAC;AAED,SAAS,cAAc,CACrB,mBAA4B,EAC5B,kBAA2D;IAE3D,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,+CAAwB;QAC7B,MAAM,EAAE,kBAAkB;KAC3B,CAAC,CAAC;AACL,CAAC;AAED,SAAS,gBAAgB,CACvB,eAAwB,EACxB,YAAqD;IAErD,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,eAAe;QACxB,GAAG,EAAE,+BAAgB;QACrB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC;AAED,KAAK,UAAU,eAAe,CAC5B,eAAwB,EACxB,YAAqD;IAErD,MAAM,QAAQ,GAAG,gBAAgB,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IACjE,MAAM,mBAAmB,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC/D,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,6BAAe;QACpB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC"}
|
|
378
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"session-key.js","sourceRoot":"","sources":["../../../src/advancedacl/session-key.ts"],"names":[],"mappings":";;AAiGA,wDAqBC;AAwBD,0CAiEC;AAyBD,sDAmFC;AAED,4EAOC;AA6BD,8DAqHC;AA8BD,8DAgIC;AApnBD,iDAA4C;AAE5C,+BAYc;AACd,4CAAoD;AACpD,0DAGqC;AACrC,0CAAkE;AAClE,+DAKqC;AACrC,iFAGgD;AAChD,iEAGwC;AACxC,+DAAgE;AAChE,0CAKqB;AAQrB,+CAQ0B;AAC1B,uDAGkC;AAClC,0CAA8D;AAI9D,0FAI4D;AAC5D,8EAKsD;AACtD,uDAAkE;AAiBlE,sEAAsE;AACtE,wEAAwE;AACxE,+BAA+B;AACxB,KAAK,UAAU,sBAAsB,CAC1C,eAAwB,EACxB,kBAA2D,EAC3D,iBAA0B,EAC1B,YAAiB,EACjB,aAAkB;IAElB,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAE5E,0EAA0E;IAC1E,wCAAwC;IACxC,MAAM,YAAY,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,6BAA6B,CAAC;QACrE,kBAAkB,CAAC,OAAO,CAAC,OAAO;KACnC,CAAC,CAAC;IAEH,OAAO;QACL,YAAY;QACZ,iBAAiB;QACjB,YAAY;QACZ,aAAa;KACd,CAAC;AACJ,CAAC;AAuBD,mDAAmD;AAC5C,KAAK,UAAU,eAAe,CAAC,EACpC,OAAO,EACP,eAAe,EACf,8BAA8B,EAC9B,cAAc,EACd,kBAAkB,EAClB,SAAS,GACW;IACpB,MAAM,OAAO,GAAG;QACd,SAAS,EAAE,cAAc;QACzB,SAAS,EAAE,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,CAAC;KAC/C,CAAC;IACb,MAAM,aAAa,GAAG,IAAA,0BAAmB,EAAC,aAAa,EAAE,EAAE;QACzD,OAAO,CAAC,SAAS;QACjB,OAAO,CAAC,SAAS;KAClB,CAAC,CAAC;IAEH,MAAM,YAAY,GAAG,MAAM,eAAe,CACxC,eAAe,EACf,kBAAkB,CACnB,CAAC;IAEF,mCAAmC;IACnC,iBAAiB;IACjB,sBAAsB;IACtB,yBAAyB;IACzB,mBAAmB;IACnB,6BAA6B;IAC7B,gBAAgB;IAChB,8BAA8B;IAC9B,MAAM,cAAc,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC9D,MAAM,gBAAgB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IAEtD,MAAM,OAAO,GAAG,MAAM,sBAAsB,CAC1C,eAAe,EACf,kBAAkB;IAClB,4EAA4E;IAC5E,6BAA6B;IAC7B,8BAA8B,EAC9B,IAAA,yBAAkB,EAAC,mBAAmB,EAAE,CAAC,EACzC,aAAa,CACd,CAAC;IACF,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO;QACP,WAAW,EAAE,kBAAkB;QAC/B,iBAAiB,EAAE,sBAAsB,EAAE;QAC3C,OAAO,EAAE,OAAO;QAChB,wEAAwE;QACxE,gEAAgE;QAChE,iBAAiB,EAAE,YAAY,CAAC,OAAO;QACvC,UAAU,EAAE,gBAAgB;QAC5B,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IAEH,uEAAuE;IACvE,WAAW;IACX,MAAM,gBAAgB,GACpB,MAAM,kBAAkB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAExD,OAAO;QACL,MAAM,EAAE,kBAAkB,CAAC,OAAO,CAAC,OAAO;QAC1C,OAAO;QACP,gBAAgB;KACjB,CAAC;AACJ,CAAC;AAoBD;;;;GAIG;AACI,KAAK,UAAU,qBAAqB,CAAC,EAC1C,OAAO,EACP,6BAA6B,EAC7B,gBAAgB,EAChB,uBAAuB,GACG;IAC1B,MAAM,SAAS,GAAG,IAAA,uBAAY,EAC5B,6BAA6B;QAC3B,IAAA,iCAAsB,EAAC,IAAA,4BAAiB,EAAC,OAAO,CAAC,CAAC,CACrD,CAAC;IACF,MAAM,gBAAgB,GAAG,IAAA,8BAAmB,EAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IACF,MAAM,eAAe,GAAG,gBAAgB,CAAC,eAAe,EAAE,CAAC;IAE3D,OAAO,KAAK,UAAU,SAAS,CAA6B,EAC1D,MAAM,GAC0B;QAChC,MAAM,OAAO,GAAG,CAAC,MAAmB,CAAC,CAAC;QACtC,6EAA6E;QAC7E,6CAA6C;QAC7C,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;YACxC,OAAO;YACP,WAAW,EAAE,wBAAwB;YACrC,iBAAiB,EAAE;gBACjB,EAAE,IAAI,EAAE,SAAS,EAAE,IAAI,EAAE,WAAW,EAAE;gBACtC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,OAAO,EAAE;aACrC;YACD,OAAO,EAAE;gBACP,OAAO,EAAE,OAAO;gBAChB,SAAS,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;aACvC;YACD,UAAU,EAAE,uCAA4B;YACxC,aAAa,EAAE,0CAA+B;SAC/C,CAAC,CAAC;QACH,gFAAgF;QAChF,oDAAoD;QACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;QAE5E,MAAM,gBAAgB,GAA2B,IAAA,iBAAM,EACrD,gDAA4B,EAC5B;YACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;YACrC,eAAe,EAAE,eAAe;YAChC,eAAe,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;YAC5C,iBAAiB,EAAE;gBACjB,IAAA,iBAAM,EAAC,mCAAqB,EAAE;oBAC5B,MAAM;oBACN,QAAQ,EAAE;wBACR,KAAK,EAAE;4BACL,IAAI,EAAE,0BAA0B;4BAChC,KAAK,EAAE,IAAA,iBAAM,EAAC,4CAA8B,EAAE;gCAC5C,cAAc,EAAE,IAAA,iBAAM,EAAC,kCAAoB,EAAE;oCAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;oCACtC,OAAO,EAAE,IAAA,iBAAM,EAAC,oCAAsB,EAAE;wCACtC,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;wCACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;wCACnD,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;wCACD,aAAa,EAAE,IAAA,iBAAU,EACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;qCACF,CAAC;oCACF,gBAAgB,EAAE,IAAA,iBAAU,EAC1B,uBAAuB,CAAC,gBAAgB,CACzC;oCACD,gBAAgB,EAAE,IAAI,UAAU,EAAE;iCACnC,CAAC;6BACH,CAAC;yBACH;qBACF;iBACF,CAAC;aACH;SACF,CACF,CAAC;QAEF,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,eAAe,CAAC,gBAAgB,CAAC,CAAC;QACnE,OAAO,IAAA,8BAAmB,EAAC,QAAQ,EAAE,gBAAgB,EAAE,MAAM,CAAC,CAAC;IACjE,CAAC,CAAC;AACJ,CAAC;AAEM,KAAK,UAAU,gCAAgC,CACpD,eAAwB,EACxB,kBAA2D;IAE3D,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAC5E,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,KAAK,CAAC,gCAAgC,EAAE,CAAC;IACvE,OAAO,MAAM,CAAC;AAChB,CAAC;AA2BD,gFAAgF;AAChF,0BAA0B;AACnB,KAAK,UAAU,yBAAyB,CAA6B,EAC1E,SAAS,EACT,EAAE,EACF,YAAY,EACZ,aAAa,EACb,OAAO,EACP,6BAA6B,EAC7B,gBAAgB,EAChB,uBAAuB,GACO;IAC9B,MAAM,SAAS,GAAG,IAAA,uBAAY,EAC5B,6BAA6B;QAC3B,IAAA,iCAAsB,EAAC,IAAA,4BAAiB,EAAC,OAAO,CAAC,CAAC,CACrD,CAAC;IACF,MAAM,gBAAgB,GAAG,IAAA,8BAAmB,EAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IACF,MAAM,eAAe,GAAG,MAAM,CAAC,YAAY,CAAC,CAAC;IAC7C,MAAM,aAAa,GAAG,IAAA,iCAAiB,EACrC,iCAAiB,CAAC,KAAK,EACvB,IAAA,wBAAa,EAAC,SAAS,CAAM,EAC7B,eAAe,CAChB,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,OAAO,EAAE;YAC7B,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,SAAS,EAAE;YACtC,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,SAAS,EAAE;SAC1C;QACD,OAAO,EAAE;YACP,EAAE,EAAE,EAAE;YACN,SAAS,EAAE,SAAS;YACpB,YAAY,EAAE,IAAA,0BAAe,EAAC,eAAe,CAAC;SAC/C;QACD,UAAU,EAAE,uCAA4B;QACxC,aAAa,EAAE,0CAA+B;KAC/C,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAE5E,MAAM,sBAAsB,GAA2B,IAAA,iBAAM,EAC3D,gDAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,EAAE,EAAE,EAAE;QACN,SAAS,EAAE,SAAS;QACpB,YAAY,EAAE,aAAa,CAAC,KAAK,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC9C,eAAe,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;QAC5C,QAAQ,EAAE;YACR,KAAK,EAAE;gBACL,IAAI,EAAE,0BAA0B;gBAChC,KAAK,EAAE,IAAA,iBAAM,EAAC,4CAA8B,EAAE;oBAC5C,cAAc,EAAE,IAAA,iBAAM,EAAC,kCAAoB,EAAE;wBAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;wBACtC,OAAO,EAAE,IAAA,iBAAM,EAAC,oCAAsB,EAAE;4BACtC,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;4BACnD,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,aAAa,EAAE,IAAA,iBAAU,EACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;yBACF,CAAC;wBACF,gBAAgB,EAAE,IAAA,iBAAU,EAC1B,uBAAuB,CAAC,gBAAgB,CACzC;wBACD,sDAAsD;wBACtD,gBAAgB,EAAE,IAAI,UAAU,EAAE;qBACnC,CAAC;iBACH,CAAC;aACH;SACF;KACF,CACF,CAAC;IAEF,MAAM,QAAQ,GAAG,MAAM,IAAA,2BAAgB,EAAC,KAAK,IAAI,EAAE;QACjD,OAAO,MAAM,SAAS,CAAC,eAAe,CAAC,sBAAsB,CAAC,CAAC;IACjE,CAAC,EAAE,aAAa,CAAC,CAAC;IAElB,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;QACpC,MAAM,IAAI,KAAK,CACb,4DAA4D,CAC7D,CAAC;IACJ,CAAC;IAED,MAAM,qBAAqB,GAAG,QAAQ,CAAC,qBAAqB,CAAC;IAC7D,IAAI,qBAAqB,CAAC,KAAK,KAAK,SAAS,EAAE,CAAC;QAC9C,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;IAClD,CAAC;IAED,IAAI,qBAAqB,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;QACrD,MAAM,IAAI,KAAK,CACb,gCAAgC,qBAAqB,CAAC,KAAK,CAAC,IAAI,wBAAwB,CACzF,CAAC;IACJ,CAAC;IAED,MAAM,SAAS,GAAG,qBAAqB,CAAC,KAAK,CAAC,KAAkB,CAAC;IACjE,MAAM,WAAW,GAAG,IAAA,wBAAa,EAAC,SAAS,CAAC,KAAK,CAAC,CAAC;IACnD,OAAO;QACL,MAAM,EAAE,qBAAqB,CAAC,MAAmB;QACjD,SAAS,EAAE,IAAA,iCAAiB,EAC1B,iCAAiB,CAAC,KAAK,EACvB,IAAA,wBAAa,EAAC,SAAS,CAAM,EAC7B,WAAW,CACZ;QACD,oBAAoB,EAAE,qBAAqB,CAAC,SAAS;KACtD,CAAC;AACJ,CAAC;AA4BD,gFAAgF;AAChF,mBAAmB;AACZ,KAAK,UAAU,yBAAyB,CAAC,EAC9C,OAAO,EACP,6BAA6B,EAC7B,OAAO,EACP,gBAAgB,EAChB,uBAAuB,EACvB,aAAa,EACb,eAAe,EACf,gBAAgB,GACc;IAG9B,MAAM,SAAS,GAAG,IAAA,uBAAY,EAC5B,6BAA6B;QAC3B,IAAA,iCAAsB,EAAC,IAAA,4BAAiB,EAAC,OAAO,CAAC,CAAC,CACrD,CAAC;IACF,MAAM,gBAAgB,GAAG,IAAA,8BAAmB,EAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,SAAS,EAAE,IAAI,EAAE,WAAW,EAAE;YACtC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,OAAO,EAAE;SACrC;QACD,OAAO,EAAE;YACP,OAAO,EAAE,OAAO;YAChB,SAAS,EAAE,IAAA,iBAAU,EACnB,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC,CACxD;SACF;QACD,UAAU,EAAE,uCAA4B;QACxC,aAAa,EAAE,0CAA+B;KAC/C,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAC5E,MAAM,iBAAiB,GAA2B,OAAO,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE;QACvE,OAAO,IAAA,iBAAM,EAAC,mCAAqB,EAAE;YACnC,MAAM,EAAE,MAAM;YACd,QAAQ,EAAE;gBACR,KAAK,EAAE;oBACL,IAAI,EAAE,0BAA0B;oBAChC,KAAK,EAAE,IAAA,iBAAM,EAAC,4CAA8B,EAAE;wBAC5C,cAAc,EAAE,IAAA,iBAAM,EAAC,kCAAoB,EAAE;4BAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;4BACtC,OAAO,EAAE,IAAA,iBAAM,EAAC,oCAAsB,EAAE;gCACtC,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;gCACnD,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,aAAa,EAAE,IAAA,iBAAU,EACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;6BACF,CAAC;4BACF,gBAAgB,EAAE,IAAA,iBAAU,EAC1B,uBAAuB,CAAC,gBAAgB,CACzC;4BACD,gBAAgB,EAAE,IAAI,UAAU,EAAE;yBACnC,CAAC;qBACH,CAAC;iBACH;aACF;SACF,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,MAAM,sBAAsB,GAA2B,IAAA,iBAAM,EAC3D,gDAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,iBAAiB,EAAE,iBAAiB;QACpC,eAAe,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;QAC5C,eAAe,EAAE,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;KACzE,CACF,CAAC;IAEF,IAAI,QAAQ,GAAG,MAAM,IAAA,2BAAgB,EAAC,KAAK,IAAI,EAAE;QAC/C,OAAO,MAAM,SAAS,CAAC,eAAe,CAAC,sBAAsB,CAAC,CAAC;IACjE,CAAC,EAAE,aAAa,CAAC,CAAC;IAElB,IACE,CAAC,QAAQ,CAAC,sBAAsB;QAChC,QAAQ,CAAC,sBAAsB,CAAC,MAAM,KAAK,CAAC,EAC5C,CAAC;QACD,MAAM,IAAI,+BAAoB,CAAC,wCAAwC,CAAC,CAAC;IAC3E,CAAC;IAED,IAAI,gBAAgB,EAAE,CAAC;QACrB,QAAQ,GAAG,MAAM,IAAA,yCAA0B,EAAC,QAAQ,EAAE,gBAAgB,CAAC,CAAC;IAC1E,CAAC;IAED,MAAM,OAAO,GACX,QAAQ,CAAC,sBAAsB,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE;QAC1C,IAAI,GAAG,CAAC,KAAK,KAAK,SAAS,EAAE,CAAC;YAC5B,MAAM,IAAI,+BAAoB,CAAC,yBAAyB,CAAC,CAAC;QAC5D,CAAC;QAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;YACnC,MAAM,IAAI,KAAK,CACb,gCAAgC,GAAG,CAAC,KAAK,CAAC,IAAI,wBAAwB,CACvE,CAAC;QACJ,CAAC;QAED,MAAM,SAAS,GAAG,GAAG,CAAC,KAAK,CAAC,KAAkB,CAAC;QAE/C,MAAM,CAAC,GAAG,GAAG,CAAC,MAAmB,CAAC;QAClC,MAAM,UAAU,GAAG,IAAA,wBAAa,EAAC,CAAC,CAAC,CAAC;QACpC,MAAM,WAAW,GAAG,IAAA,wBAAa,EAAC,SAAS,CAAC,KAAK,CAAC,CAAC;QACnD,OAAO;YACL,MAAM,EAAE,CAAC;YACT,SAAS,EAAE,IAAA,iCAAiB,EAC1B,iCAAiB,CAAC,KAAK,EACvB,UAA8B,EAC9B,WAAW,CACZ;YACD,oBAAoB,EAAE,GAAG,CAAC,SAAS;SACpC,CAAC;IACJ,CAAC,CAAC,CAAC;IAEL,OAAO,OAAO,CAAC;AACjB,CAAC;AAED,8EAA8E;AAC9E,YAAY;AAEZ,gDAAgD;AAChD,SAAS,sBAAsB;IAC7B,2EAA2E;IAC3E,oBAAoB;IACpB,MAAM,sBAAsB,GAAG,+CAAwB,CAAC,IAAI,CAC1D,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,KAAK,wBAAwB,CACjD,CAAC;IACF,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAC5B,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;IACtD,CAAC;IAED,gEAAgE;IAChE,MAAM,qBAAqB,GAAG,sBAAsB,CAAC,MAAM,CAAC,IAAI,CAC9D,CAAC,KAAK,EAAE,EAAE,CAAC,KAAK,CAAC,YAAY,KAAK,yBAAyB,CAC5D,CAAC;IACF,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAC3B,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACrD,CAAC;IAED,OAAO,qBAAqB,CAAC,UAAU,CAAC;AAC1C,CAAC;AAED,uCAAuC;AACvC,EAAE;AACF,0EAA0E;AAC1E,4CAA4C;AAC5C,SAAS,aAAa;IACpB,MAAM,UAAU,GAAG,mCAAY,CAAC,IAAI,CAClC,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,YAAY,CACvD,CAAC;IACF,IAAI,CAAC,UAAU,EAAE,CAAC;QAChB,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;IAC1C,CAAC;IAED,MAAM,OAAO,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IACtC,IAAI,CAAC,OAAO,EAAE,CAAC;QACb,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;IACvC,CAAC;IAED,OAAO,OAAO,CAAC,UAAU,CAAC;AAC5B,CAAC;AAED,+CAA+C;AAC/C,SAAS,mBAAmB;IAC1B,MAAM,aAAa,GAAG,iCAAkB,CAAC,IAAI,CAC3C,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,eAAe,CAC1D,CAAC;IACF,IAAI,CAAC,aAAa,EAAE,CAAC;QACnB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;IAC7C,CAAC;IAED,OAAO,aAAa,CAAC;AACvB,CAAC;AAED,SAAS,cAAc,CACrB,mBAA4B,EAC5B,kBAA2D;IAE3D,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,+CAAwB;QAC7B,MAAM,EAAE,kBAAkB;KAC3B,CAAC,CAAC;AACL,CAAC;AAED,SAAS,gBAAgB,CACvB,eAAwB,EACxB,YAAqD;IAErD,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,eAAe;QACxB,GAAG,EAAE,+BAAgB;QACrB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC;AAED,KAAK,UAAU,eAAe,CAC5B,eAAwB,EACxB,YAAqD;IAErD,MAAM,QAAQ,GAAG,gBAAgB,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IACjE,MAAM,mBAAmB,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC/D,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,6BAAe;QACpB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC"}
|
|
@@ -70,15 +70,22 @@ async function attestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, wal
|
|
|
70
70
|
return await kmsClient.attestedCompute(attestedComputeRequest);
|
|
71
71
|
}, backoffConfig);
|
|
72
72
|
const decryptionAttestation = response.decryptionAttestation;
|
|
73
|
-
if (decryptionAttestation
|
|
74
|
-
throw new types_js_1.AttestedComputeError('No
|
|
73
|
+
if (decryptionAttestation === undefined) {
|
|
74
|
+
throw new types_js_1.AttestedComputeError('No decryption attestation in response');
|
|
75
75
|
}
|
|
76
|
+
if (decryptionAttestation.value === undefined) {
|
|
77
|
+
throw new types_js_1.AttestedComputeError('No value in compute response');
|
|
78
|
+
}
|
|
79
|
+
if (decryptionAttestation.value.case !== 'plaintext') {
|
|
80
|
+
throw new types_js_1.AttestedComputeError(`Unexpected attestation type: ${decryptionAttestation.value.case}, expected 'plaintext'`);
|
|
81
|
+
}
|
|
82
|
+
const plaintext = decryptionAttestation.value.value;
|
|
76
83
|
const computeResultHandle = response.decryptionAttestation?.handle;
|
|
77
84
|
if (!computeResultHandle) {
|
|
78
85
|
throw new types_js_1.AttestedComputeError('No compute result handle in response');
|
|
79
86
|
}
|
|
80
87
|
const handleType = (0, handle_js_1.getHandleType)(computeResultHandle);
|
|
81
|
-
const bigIntValue = (0, binary_js_1.bytesToBigInt)(
|
|
88
|
+
const bigIntValue = (0, binary_js_1.bytesToBigInt)(plaintext.value);
|
|
82
89
|
return {
|
|
83
90
|
handle: computeResultHandle,
|
|
84
91
|
plaintext: (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, handleType, bigIntValue),
|
|
@@ -92,4 +99,4 @@ async function attestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, wal
|
|
|
92
99
|
throw new types_js_1.AttestedComputeError('Failed to perform attested compute', error);
|
|
93
100
|
}
|
|
94
101
|
}
|
|
95
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
102
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -3,8 +3,9 @@ import { HexString } from '../binary.js';
|
|
|
3
3
|
import { SupportedChainId } from '../chain.js';
|
|
4
4
|
import { EciesScheme, SupportedFheType } from '../encryption/encryption.js';
|
|
5
5
|
import type { KmsClient } from '../kms/client.js';
|
|
6
|
+
import { Secp256k1Keypair } from '../lite/ecies.js';
|
|
6
7
|
import type { BackoffConfig } from '../retry.js';
|
|
7
|
-
import { DecryptionAttestation } from './types.js';
|
|
8
|
+
import { DecryptionAttestation, EncryptedDecryptionAttestation } from './types.js';
|
|
8
9
|
export declare const ATTESTED_DECRYPT_DOMAIN_NAME = "IncoAttestedDecrypt";
|
|
9
10
|
export declare const ATTESTED_DECRYPT_DOMAIN_VERSION = "0.1.0";
|
|
10
11
|
/**
|
|
@@ -24,6 +25,40 @@ export interface IncoLiteAttestedDecryptorArgs {
|
|
|
24
25
|
/** The chain ID to use */
|
|
25
26
|
chainId: SupportedChainId;
|
|
26
27
|
}
|
|
28
|
+
/**
|
|
29
|
+
* Decrypt multiple handles in a single attested request.
|
|
30
|
+
* Returns an array of attestations aligned with the response ordering.
|
|
31
|
+
*
|
|
32
|
+
* @param args - The arguments for creating the attested decrypt function
|
|
33
|
+
* @returns A function that can decrypt handles and return an attestation
|
|
34
|
+
* @throws {AttestedDecryptError} If the creation fails
|
|
35
|
+
*/
|
|
36
|
+
export declare function attestedDecrypt({ handles, backoffConfig, walletClient, chainId, reencryptPubKey, reencryptKeypair, kmsConnectRpcEndpointOrClient, }: {
|
|
37
|
+
handles: HexString[];
|
|
38
|
+
backoffConfig?: Partial<BackoffConfig> | undefined;
|
|
39
|
+
walletClient: WalletClient<Transport, Chain, Account>;
|
|
40
|
+
chainId: SupportedChainId;
|
|
41
|
+
reencryptPubKey: Uint8Array;
|
|
42
|
+
reencryptKeypair: Secp256k1Keypair;
|
|
43
|
+
kmsConnectRpcEndpointOrClient?: string | KmsClient;
|
|
44
|
+
}): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
|
|
45
|
+
/**
|
|
46
|
+
* Decrypt multiple handles in a single attested request.
|
|
47
|
+
* Returns an array of attestations aligned with the response ordering.
|
|
48
|
+
*
|
|
49
|
+
* @param args - The arguments for creating the attested decrypt function
|
|
50
|
+
* @returns A function that can decrypt handles and return an attestation
|
|
51
|
+
* @throws {AttestedDecryptError} If the creation fails
|
|
52
|
+
*/
|
|
53
|
+
export declare function attestedDecrypt({ handles, backoffConfig, walletClient, chainId, reencryptPubKey, kmsConnectRpcEndpointOrClient, }: {
|
|
54
|
+
handles: HexString[];
|
|
55
|
+
backoffConfig?: Partial<BackoffConfig> | undefined;
|
|
56
|
+
walletClient: WalletClient<Transport, Chain, Account>;
|
|
57
|
+
chainId: SupportedChainId;
|
|
58
|
+
reencryptPubKey: Uint8Array;
|
|
59
|
+
reencryptKeypair?: never;
|
|
60
|
+
kmsConnectRpcEndpointOrClient?: string | KmsClient;
|
|
61
|
+
}): Promise<Array<EncryptedDecryptionAttestation<EciesScheme, SupportedFheType>>>;
|
|
27
62
|
/**
|
|
28
63
|
* Decrypt multiple handles in a single attested request.
|
|
29
64
|
* Returns an array of attestations aligned with the response ordering.
|
|
@@ -37,5 +72,7 @@ export declare function attestedDecrypt({ handles, backoffConfig, walletClient,
|
|
|
37
72
|
backoffConfig?: Partial<BackoffConfig> | undefined;
|
|
38
73
|
walletClient: WalletClient<Transport, Chain, Account>;
|
|
39
74
|
chainId: SupportedChainId;
|
|
75
|
+
reencryptPubKey?: never;
|
|
76
|
+
reencryptKeypair?: never;
|
|
40
77
|
kmsConnectRpcEndpointOrClient?: string | KmsClient;
|
|
41
78
|
}): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
|
|
@@ -12,6 +12,7 @@ const kms_service_pb_js_1 = require("../generated/es/inco/kms/lite/v1/kms_servic
|
|
|
12
12
|
const types_pb_js_1 = require("../generated/es/inco/kms/lite/v1/types_pb.js");
|
|
13
13
|
const handle_js_1 = require("../handle.js");
|
|
14
14
|
const client_js_1 = require("../kms/client.js");
|
|
15
|
+
const reencrypt_js_1 = require("../lite/reencrypt.js");
|
|
15
16
|
const eip712_js_1 = require("../reencryption/eip712.js");
|
|
16
17
|
const retry_js_1 = require("../retry.js");
|
|
17
18
|
const types_js_1 = require("./types.js");
|
|
@@ -35,7 +36,7 @@ function validateHandle(handle) {
|
|
|
35
36
|
* @returns A function that can decrypt handles and return an attestation
|
|
36
37
|
* @throws {AttestedDecryptError} If the creation fails
|
|
37
38
|
*/
|
|
38
|
-
async function attestedDecrypt({ handles, backoffConfig, walletClient, chainId, kmsConnectRpcEndpointOrClient, }) {
|
|
39
|
+
async function attestedDecrypt({ handles, backoffConfig, walletClient, chainId, reencryptPubKey, reencryptKeypair, kmsConnectRpcEndpointOrClient, }) {
|
|
39
40
|
try {
|
|
40
41
|
handles.forEach(validateHandle);
|
|
41
42
|
const kmsClient = (0, client_js_1.getKmsClient)(kmsConnectRpcEndpointOrClient ||
|
|
@@ -44,9 +45,13 @@ async function attestedDecrypt({ handles, backoffConfig, walletClient, chainId,
|
|
|
44
45
|
const eip712Payload = (0, eip712_js_1.createEIP712Payload)({
|
|
45
46
|
chainId: BigInt(chainId),
|
|
46
47
|
primaryType: 'AttestedDecryptRequest',
|
|
47
|
-
primaryTypeFields: [
|
|
48
|
+
primaryTypeFields: [
|
|
49
|
+
{ name: 'handles', type: 'bytes32[]' },
|
|
50
|
+
{ name: 'publicKey', type: 'bytes' },
|
|
51
|
+
],
|
|
48
52
|
message: {
|
|
49
53
|
handles: handles,
|
|
54
|
+
publicKey: (0, viem_1.bytesToHex)(reencryptPubKey ? reencryptPubKey : new Uint8Array()),
|
|
50
55
|
},
|
|
51
56
|
domainName: exports.ATTESTED_DECRYPT_DOMAIN_NAME,
|
|
52
57
|
domainVersion: exports.ATTESTED_DECRYPT_DOMAIN_VERSION,
|
|
@@ -68,21 +73,59 @@ async function attestedDecrypt({ handles, backoffConfig, walletClient, chainId,
|
|
|
68
73
|
userAddress: walletClient.account.address,
|
|
69
74
|
handlesWithProofs: handlesWithProofs,
|
|
70
75
|
eip712Signature: (0, viem_1.hexToBytes)(eip712Signature),
|
|
76
|
+
reencryptPubKey: reencryptPubKey ? reencryptPubKey : new Uint8Array(),
|
|
71
77
|
});
|
|
72
|
-
|
|
78
|
+
var response = await (0, retry_js_1.retryWithBackoff)(async () => {
|
|
73
79
|
return await kmsClient.attestedDecrypt(attestedDecryptRequest);
|
|
74
80
|
}, backoffConfig);
|
|
75
81
|
if (!response.decryptionAttestations ||
|
|
76
82
|
response.decryptionAttestations.length === 0) {
|
|
77
83
|
throw new types_js_1.AttestedDecryptError('No decryption attestations in response');
|
|
78
84
|
}
|
|
85
|
+
// If reencryptPubKey is provided without a keypair, we return EncryptedDecryptionAttestation
|
|
86
|
+
if (reencryptPubKey !== undefined) {
|
|
87
|
+
if (reencryptKeypair) {
|
|
88
|
+
response = await (0, reencrypt_js_1.decryptGrpcDecryptResponse)(response, reencryptKeypair);
|
|
89
|
+
}
|
|
90
|
+
else {
|
|
91
|
+
return response.decryptionAttestations.map((att) => {
|
|
92
|
+
if (att.value === undefined) {
|
|
93
|
+
throw new types_js_1.AttestedDecryptError('No reencryption in attestation');
|
|
94
|
+
}
|
|
95
|
+
if (att.value.case !== 'reencryption') {
|
|
96
|
+
throw new Error(`Unexpected attestation type: ${att.value.case}, expected 'reencryption'`);
|
|
97
|
+
}
|
|
98
|
+
const reencryption = att.value.value;
|
|
99
|
+
const fheType = reencryption.userCiphertext?.fheType;
|
|
100
|
+
const ct = reencryption.userCiphertext?.ciphertext;
|
|
101
|
+
if (ct == undefined) {
|
|
102
|
+
throw new Error('No ciphertext in reencryption');
|
|
103
|
+
}
|
|
104
|
+
return {
|
|
105
|
+
handle: att.handle,
|
|
106
|
+
encryptedPlaintext: {
|
|
107
|
+
ciphertext: {
|
|
108
|
+
value: (0, viem_1.bytesToHex)(ct),
|
|
109
|
+
scheme: 1, //EciesScheme
|
|
110
|
+
type: fheType,
|
|
111
|
+
},
|
|
112
|
+
},
|
|
113
|
+
covalidatorSignature: att.signature,
|
|
114
|
+
};
|
|
115
|
+
});
|
|
116
|
+
}
|
|
117
|
+
}
|
|
79
118
|
const results = response.decryptionAttestations.map((att) => {
|
|
80
|
-
if (att.
|
|
119
|
+
if (att.value === undefined) {
|
|
81
120
|
throw new types_js_1.AttestedDecryptError('No plaintext in attestation');
|
|
82
121
|
}
|
|
122
|
+
if (att.value.case !== 'plaintext') {
|
|
123
|
+
throw new Error(`Unexpected attestation type: ${att.value.case}, expected 'plaintext'`);
|
|
124
|
+
}
|
|
125
|
+
const plaintext = att.value.value;
|
|
83
126
|
const h = att.handle;
|
|
84
127
|
const handleType = (0, handle_js_1.getHandleType)(h);
|
|
85
|
-
const bigIntValue = (0, binary_js_1.bytesToBigInt)(
|
|
128
|
+
const bigIntValue = (0, binary_js_1.bytesToBigInt)(plaintext.value);
|
|
86
129
|
return {
|
|
87
130
|
handle: h,
|
|
88
131
|
plaintext: (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, handleType, bigIntValue),
|
|
@@ -98,4 +141,4 @@ async function attestedDecrypt({ handles, backoffConfig, walletClient, chainId,
|
|
|
98
141
|
throw new types_js_1.AttestedDecryptError('Failed to decrypt handles', error);
|
|
99
142
|
}
|
|
100
143
|
}
|
|
101
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
144
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { HexString } from '../binary.js';
|
|
2
|
-
import { EncryptionScheme, PlaintextOf, SupportedFheType } from '../encryption/encryption.js';
|
|
2
|
+
import { EncryptionScheme, EncryptResultOf, PlaintextOf, SupportedFheType } from '../encryption/encryption.js';
|
|
3
3
|
import type { BackoffConfig } from '../retry.js';
|
|
4
4
|
/**
|
|
5
5
|
* Custom error class for attested decrypt operations.
|
|
@@ -13,6 +13,11 @@ export type DecryptionAttestation<S extends EncryptionScheme, T extends Supporte
|
|
|
13
13
|
plaintext: PlaintextOf<S, T>;
|
|
14
14
|
covalidatorSignature: Uint8Array;
|
|
15
15
|
};
|
|
16
|
+
export type EncryptedDecryptionAttestation<S extends EncryptionScheme, T extends SupportedFheType> = {
|
|
17
|
+
handle: HexString;
|
|
18
|
+
encryptedPlaintext: EncryptResultOf<S, T>;
|
|
19
|
+
covalidatorSignature: Uint8Array;
|
|
20
|
+
};
|
|
16
21
|
export type AttestedDecryptor<S extends EncryptionScheme> = <T extends SupportedFheType>(args: AttestedDecryptFnArgs<S, T>) => Promise<DecryptionAttestation<S, T>>;
|
|
17
22
|
export type AttestedDecryptFnArgs<S extends EncryptionScheme, T extends SupportedFheType> = {
|
|
18
23
|
/** The handle to decrypt */
|
|
@@ -13,4 +13,4 @@ class AttestedDecryptError extends Error {
|
|
|
13
13
|
}
|
|
14
14
|
}
|
|
15
15
|
exports.AttestedDecryptError = AttestedDecryptError;
|
|
16
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
16
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidHlwZXMuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvYXR0ZXN0ZWRkZWNyeXB0L3R5cGVzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7OztBQVNBOztHQUVHO0FBQ0gsTUFBYSxvQkFBcUIsU0FBUSxLQUFLO0lBRzNCO0lBRmxCLFlBQ0UsT0FBZSxFQUNDLEtBQWU7UUFFL0IsS0FBSyxDQUFDLE9BQU8sQ0FBQyxDQUFDO1FBRkMsVUFBSyxHQUFMLEtBQUssQ0FBVTtRQUcvQixJQUFJLENBQUMsSUFBSSxHQUFHLHNCQUFzQixDQUFDO0lBQ3JDLENBQUM7Q0FDRjtBQVJELG9EQVFDIn0=
|
|
@@ -1,9 +1,11 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.attestedReveal = attestedReveal;
|
|
4
|
+
const protobuf_1 = require("@bufbuild/protobuf");
|
|
4
5
|
const binary_js_1 = require("../binary.js");
|
|
5
6
|
const chain_js_1 = require("../chain.js");
|
|
6
7
|
const encryption_js_1 = require("../encryption/encryption.js");
|
|
8
|
+
const kms_service_pb_js_1 = require("../generated/es/inco/kms/lite/v1/kms_service_pb.js");
|
|
7
9
|
const handle_js_1 = require("../handle.js");
|
|
8
10
|
const client_js_1 = require("../kms/client.js");
|
|
9
11
|
const retry_js_1 = require("../retry.js");
|
|
@@ -32,10 +34,9 @@ async function attestedReveal({ handles, backoffConfig, chainId, kmsConnectRpcEn
|
|
|
32
34
|
handles.forEach(validateHandle);
|
|
33
35
|
const kmsClient = (0, client_js_1.getKmsClient)(kmsConnectRpcEndpointOrClient ||
|
|
34
36
|
(0, client_js_1.defaultCovalidatorGrpc)((0, chain_js_1.getSupportedChain)(chainId)));
|
|
35
|
-
const attestedRevealRequest = {
|
|
36
|
-
$typeName: 'inco.kms.lite.v1.AttestedRevealRequest',
|
|
37
|
+
const attestedRevealRequest = (0, protobuf_1.create)(kms_service_pb_js_1.AttestedRevealRequestSchema, {
|
|
37
38
|
handles: handles,
|
|
38
|
-
};
|
|
39
|
+
});
|
|
39
40
|
const response = await (0, retry_js_1.retryWithBackoff)(async () => {
|
|
40
41
|
return await kmsClient.attestedReveal(attestedRevealRequest);
|
|
41
42
|
}, backoffConfig);
|
|
@@ -43,12 +44,13 @@ async function attestedReveal({ handles, backoffConfig, chainId, kmsConnectRpcEn
|
|
|
43
44
|
throw new types_js_1.AttestedRevealError(`Expected ${handles.length} decryption attestations in response, got ${response.decryptionAttestations.length}`);
|
|
44
45
|
}
|
|
45
46
|
const results = response.decryptionAttestations.map((att) => {
|
|
46
|
-
if (att.
|
|
47
|
-
throw new types_js_1.AttestedRevealError('No
|
|
47
|
+
if (att.value === undefined) {
|
|
48
|
+
throw new types_js_1.AttestedRevealError('No value in attestation');
|
|
48
49
|
}
|
|
50
|
+
const plaintext = att.value.value;
|
|
49
51
|
const h = att.handle;
|
|
50
52
|
const handleType = (0, handle_js_1.getHandleType)(h);
|
|
51
|
-
const bigIntValue = (0, binary_js_1.bytesToBigInt)(
|
|
53
|
+
const bigIntValue = (0, binary_js_1.bytesToBigInt)(plaintext.value);
|
|
52
54
|
return {
|
|
53
55
|
handle: h,
|
|
54
56
|
plaintext: (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, handleType, bigIntValue),
|
|
@@ -64,4 +66,4 @@ async function attestedReveal({ handles, backoffConfig, chainId, kmsConnectRpcEn
|
|
|
64
66
|
throw new types_js_1.AttestedRevealError('Failed to reveal handles', error);
|
|
65
67
|
}
|
|
66
68
|
}
|
|
67
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
69
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -14,21 +14,19 @@ export type SupportedFheTypeName = typeof SupportedFheTypeName.Type;
|
|
|
14
14
|
export declare const SupportedFheType: Schema.SchemaClass<0 | 5 | 7 | 8, 0 | 5 | 7 | 8, never>;
|
|
15
15
|
export type SupportedFheType = typeof SupportedFheType.Type;
|
|
16
16
|
export declare const encryptionSchemes: {
|
|
17
|
-
readonly tfhe: 0;
|
|
18
17
|
readonly ecies: 1;
|
|
19
18
|
};
|
|
20
19
|
export declare function getEncryptionSchemeName(scheme: number): string;
|
|
21
20
|
export type EncryptionSchemes = typeof encryptionSchemes;
|
|
22
21
|
export type EciesScheme = EncryptionSchemes['ecies'];
|
|
23
|
-
export
|
|
24
|
-
export declare const EncryptionScheme: Schema.Literal<[0, 1]>;
|
|
22
|
+
export declare const EncryptionScheme: Schema.Literal<[1]>;
|
|
25
23
|
export type EncryptionScheme = typeof EncryptionScheme.Type;
|
|
26
24
|
type DistType<P, S extends EncryptionScheme, T extends SupportedFheType> = P extends any ? P & {
|
|
27
25
|
scheme: S;
|
|
28
26
|
type: T;
|
|
29
27
|
} : never;
|
|
30
28
|
export declare const Ciphertext: Schema.Struct<{
|
|
31
|
-
scheme: Schema.Literal<[
|
|
29
|
+
scheme: Schema.Literal<[1]>;
|
|
32
30
|
type: Schema.SchemaClass<0 | 5 | 7 | 8, 0 | 5 | 7 | 8, never>;
|
|
33
31
|
value: Schema.TemplateLiteral<`0x${string}`>;
|
|
34
32
|
}>;
|
|
@@ -36,7 +34,7 @@ export type Ciphertext = typeof Ciphertext.Type;
|
|
|
36
34
|
export type CiphertextOf<S extends EncryptionScheme, T extends SupportedFheType> = DistType<Ciphertext, S, T>;
|
|
37
35
|
export declare const CiphertextWithContext: Schema.Struct<{
|
|
38
36
|
ciphertext: Schema.Struct<{
|
|
39
|
-
scheme: Schema.Literal<[
|
|
37
|
+
scheme: Schema.Literal<[1]>;
|
|
40
38
|
type: Schema.SchemaClass<0 | 5 | 7 | 8, 0 | 5 | 7 | 8, never>;
|
|
41
39
|
value: Schema.TemplateLiteral<`0x${string}`>;
|
|
42
40
|
}>;
|
|
@@ -53,7 +51,7 @@ export type CiphertextWithContextOf<S extends EncryptionScheme, T extends Suppor
|
|
|
53
51
|
};
|
|
54
52
|
export declare const EncryptResult: Schema.Struct<{
|
|
55
53
|
ciphertext: Schema.Struct<{
|
|
56
|
-
scheme: Schema.Literal<[
|
|
54
|
+
scheme: Schema.Literal<[1]>;
|
|
57
55
|
type: Schema.SchemaClass<0 | 5 | 7 | 8, 0 | 5 | 7 | 8, never>;
|
|
58
56
|
value: Schema.TemplateLiteral<`0x${string}`>;
|
|
59
57
|
}>;
|
|
@@ -71,11 +69,11 @@ export type EncryptResultOf<S extends EncryptionScheme, T extends SupportedFheTy
|
|
|
71
69
|
ciphertext: CiphertextOf<S, T>;
|
|
72
70
|
};
|
|
73
71
|
export declare const Plaintext: Schema.Union<[Schema.Struct<{
|
|
74
|
-
scheme: Schema.Literal<[
|
|
72
|
+
scheme: Schema.Literal<[1]>;
|
|
75
73
|
type: Schema.Literal<[5, 7, 8]>;
|
|
76
74
|
value: typeof Schema.BigInt;
|
|
77
75
|
}>, Schema.Struct<{
|
|
78
|
-
scheme: Schema.Literal<[
|
|
76
|
+
scheme: Schema.Literal<[1]>;
|
|
79
77
|
type: Schema.Literal<[0]>;
|
|
80
78
|
value: typeof Schema.Boolean;
|
|
81
79
|
}>]>;
|
|
@@ -83,11 +81,11 @@ export type Plaintext = typeof Plaintext.Type;
|
|
|
83
81
|
export type PlaintextOf<S extends EncryptionScheme, T extends SupportedFheType> = DistType<Plaintext, S, T>;
|
|
84
82
|
export declare const PlaintextWithContext: Schema.Struct<{
|
|
85
83
|
plaintext: Schema.Union<[Schema.Struct<{
|
|
86
|
-
scheme: Schema.Literal<[
|
|
84
|
+
scheme: Schema.Literal<[1]>;
|
|
87
85
|
type: Schema.Literal<[5, 7, 8]>;
|
|
88
86
|
value: typeof Schema.BigInt;
|
|
89
87
|
}>, Schema.Struct<{
|
|
90
|
-
scheme: Schema.Literal<[
|
|
88
|
+
scheme: Schema.Literal<[1]>;
|
|
91
89
|
type: Schema.Literal<[0]>;
|
|
92
90
|
value: typeof Schema.Boolean;
|
|
93
91
|
}>]>;
|