@inco/js 0.6.8 → 0.6.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (88) hide show
  1. package/dist/cjs/advancedacl/session-key.d.ts +8 -1
  2. package/dist/cjs/advancedacl/session-key.js +55 -21
  3. package/dist/cjs/attestedcompute/attested-compute.js +11 -4
  4. package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +38 -1
  5. package/dist/cjs/attesteddecrypt/attested-decrypt.js +49 -6
  6. package/dist/cjs/attesteddecrypt/types.d.ts +6 -1
  7. package/dist/cjs/attesteddecrypt/types.js +1 -1
  8. package/dist/cjs/attestedreveal/attested-reveal.js +9 -7
  9. package/dist/cjs/encryption/encryption.d.ts +8 -10
  10. package/dist/cjs/encryption/encryption.js +6 -6
  11. package/dist/cjs/generated/abis/add-two.d.ts +1 -1
  12. package/dist/cjs/generated/abis/add-two.js +1 -1
  13. package/dist/cjs/generated/abis/lightning-preview.d.ts +40 -0
  14. package/dist/cjs/generated/abis/lightning-preview.js +29 -1
  15. package/dist/cjs/generated/abis/lightning.d.ts +1 -1
  16. package/dist/cjs/generated/abis/lightning.js +1 -1
  17. package/dist/cjs/generated/abis/verifier.d.ts +126 -67
  18. package/dist/cjs/generated/abis/verifier.js +108 -54
  19. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
  20. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +20 -25
  21. package/dist/cjs/generated/lightning.d.ts +0 -32
  22. package/dist/cjs/generated/lightning.js +1 -33
  23. package/dist/cjs/generated/local-node.d.ts +1 -5
  24. package/dist/cjs/generated/local-node.js +2 -6
  25. package/dist/cjs/lite/deployments.d.ts +20 -2
  26. package/dist/cjs/lite/deployments.js +1 -1
  27. package/dist/cjs/lite/index.d.ts +1 -1
  28. package/dist/cjs/lite/index.js +1 -1
  29. package/dist/cjs/lite/lightning.d.ts +24 -12
  30. package/dist/cjs/lite/lightning.js +62 -26
  31. package/dist/cjs/lite/reencrypt.d.ts +5 -7
  32. package/dist/cjs/lite/reencrypt.js +68 -58
  33. package/dist/cjs/test/mocks.d.ts +12 -0
  34. package/dist/cjs/test/mocks.js +27 -0
  35. package/dist/cjs/viem.d.ts +1 -1
  36. package/dist/esm/advancedacl/session-key.d.ts +8 -1
  37. package/dist/esm/advancedacl/session-key.js +58 -24
  38. package/dist/esm/attestedcompute/attested-compute.js +11 -4
  39. package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +38 -1
  40. package/dist/esm/attesteddecrypt/attested-decrypt.js +51 -8
  41. package/dist/esm/attesteddecrypt/types.d.ts +6 -1
  42. package/dist/esm/attesteddecrypt/types.js +1 -1
  43. package/dist/esm/attestedreveal/attested-reveal.js +9 -7
  44. package/dist/esm/encryption/encryption.d.ts +8 -10
  45. package/dist/esm/encryption/encryption.js +6 -6
  46. package/dist/esm/generated/abis/add-two.d.ts +1 -1
  47. package/dist/esm/generated/abis/add-two.js +1 -1
  48. package/dist/esm/generated/abis/lightning-preview.d.ts +40 -0
  49. package/dist/esm/generated/abis/lightning-preview.js +29 -1
  50. package/dist/esm/generated/abis/lightning.d.ts +1 -1
  51. package/dist/esm/generated/abis/lightning.js +1 -1
  52. package/dist/esm/generated/abis/verifier.d.ts +126 -67
  53. package/dist/esm/generated/abis/verifier.js +108 -54
  54. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
  55. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +19 -24
  56. package/dist/esm/generated/lightning.d.ts +0 -32
  57. package/dist/esm/generated/lightning.js +1 -33
  58. package/dist/esm/generated/local-node.d.ts +1 -5
  59. package/dist/esm/generated/local-node.js +2 -6
  60. package/dist/esm/lite/deployments.d.ts +20 -2
  61. package/dist/esm/lite/deployments.js +1 -1
  62. package/dist/esm/lite/index.d.ts +1 -1
  63. package/dist/esm/lite/index.js +1 -1
  64. package/dist/esm/lite/lightning.d.ts +24 -12
  65. package/dist/esm/lite/lightning.js +59 -23
  66. package/dist/esm/lite/reencrypt.d.ts +5 -7
  67. package/dist/esm/lite/reencrypt.js +67 -58
  68. package/dist/esm/test/mocks.d.ts +12 -0
  69. package/dist/esm/test/mocks.js +23 -0
  70. package/dist/esm/viem.d.ts +1 -1
  71. package/dist/types/advancedacl/session-key.d.ts +8 -1
  72. package/dist/types/attesteddecrypt/attested-decrypt.d.ts +38 -1
  73. package/dist/types/attesteddecrypt/types.d.ts +6 -1
  74. package/dist/types/encryption/encryption.d.ts +8 -10
  75. package/dist/types/generated/abis/add-two.d.ts +1 -1
  76. package/dist/types/generated/abis/lightning-preview.d.ts +40 -0
  77. package/dist/types/generated/abis/lightning.d.ts +1 -1
  78. package/dist/types/generated/abis/verifier.d.ts +126 -67
  79. package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +76 -129
  80. package/dist/types/generated/lightning.d.ts +0 -32
  81. package/dist/types/generated/local-node.d.ts +1 -5
  82. package/dist/types/lite/deployments.d.ts +20 -2
  83. package/dist/types/lite/index.d.ts +1 -1
  84. package/dist/types/lite/lightning.d.ts +24 -12
  85. package/dist/types/lite/reencrypt.d.ts +5 -7
  86. package/dist/types/test/mocks.d.ts +12 -0
  87. package/dist/types/viem.d.ts +1 -1
  88. package/package.json +2 -2
@@ -43,113 +43,6 @@ export type KeyResponse = Message<"inco.kms.lite.v1.KeyResponse"> & {
43
43
  * Use `create(KeyResponseSchema)` to create a new message.
44
44
  */
45
45
  export declare const KeyResponseSchema: GenMessage<KeyResponse>;
46
- /**
47
- * ReencryptRequest is the request type for the KmsService/Reencrypt RPC method.
48
- *
49
- * @generated from message inco.kms.lite.v1.ReencryptRequest
50
- */
51
- export type ReencryptRequest = Message<"inco.kms.lite.v1.ReencryptRequest"> & {
52
- /**
53
- * user_address is the Ethereum address of the user who requested the
54
- * reencryption, prefixed with 0x.
55
- *
56
- * @generated from field: string user_address = 1;
57
- */
58
- userAddress: string;
59
- /**
60
- * ephemeral_pub_key is the encoding of the user's public ephemeral
61
- * encryption key (secp256k1), generated by the user for this reencryption
62
- * request. It is encoded in its 33-byte compressed format.
63
- *
64
- * @generated from field: bytes ephemeral_pub_key = 2;
65
- */
66
- ephemeralPubKey: Uint8Array;
67
- /**
68
- * eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
69
- * `user_address` (note that we only give a JSON representation for the sake of
70
- * readability, but the actual signed data is defined in the EIP-712 spec):
71
- *
72
- * ```json
73
- * {
74
- * "types": {
75
- * "EIP712Domain": [
76
- * { "name": "name", "type": "string" },
77
- * { "name": "version", "type": "string" },
78
- * { "name": "chainId", "type": "uint256" }
79
- * ],
80
- * "ReencryptionRequest": [
81
- * { "name": "publicKey", "type": "bytes" }
82
- * ]
83
- * },
84
- * "primaryType": "ReencryptionRequest",
85
- * "domain": {
86
- * "name": "IncoReencryption",
87
- * "version": "0.1.0",
88
- * "chainId": "<host_chain_id>",
89
- * "verifyingContract": "<acl_address>",
90
- * "salt": "0x0000000000000000000000000000000000000000000000000000000000000000"
91
- * },
92
- * "message": {
93
- * "publicKey": "<ephemeral_pub_key>"
94
- * }
95
- * }
96
- * ```
97
- *
98
- * @generated from field: bytes eip712_signature = 3;
99
- */
100
- eip712Signature: Uint8Array;
101
- /**
102
- * handles_with_proofs is the list of handles of the ciphertexts to reencrypt,
103
- * along with the ACL proof that the user has access to the ciphertext.
104
- *
105
- * @generated from field: repeated inco.kms.lite.v1.HandleWithProof handles_with_proofs = 4;
106
- */
107
- handlesWithProofs: HandleWithProof[];
108
- };
109
- /**
110
- * Describes the message inco.kms.lite.v1.ReencryptRequest.
111
- * Use `create(ReencryptRequestSchema)` to create a new message.
112
- */
113
- export declare const ReencryptRequestSchema: GenMessage<ReencryptRequest>;
114
- /**
115
- * ReencryptResponse is the response type for the KmsService/Reencrypt RPC method.
116
- *
117
- * @generated from message inco.kms.lite.v1.ReencryptResponse
118
- */
119
- export type ReencryptResponse = Message<"inco.kms.lite.v1.ReencryptResponse"> & {
120
- /**
121
- * payload is the reencryption response payload.
122
- *
123
- * @generated from field: inco.kms.lite.v1.ReencryptionResponsePayload payload = 1;
124
- */
125
- payload?: ReencryptionResponsePayload;
126
- };
127
- /**
128
- * Describes the message inco.kms.lite.v1.ReencryptResponse.
129
- * Use `create(ReencryptResponseSchema)` to create a new message.
130
- */
131
- export declare const ReencryptResponseSchema: GenMessage<ReencryptResponse>;
132
- /**
133
- * ReencryptionResponsePayload is the payload of the ReencryptResponse,
134
- * separated out because it is signed by the KMS using its signing key.
135
- *
136
- * @generated from message inco.kms.lite.v1.ReencryptionResponsePayload
137
- */
138
- export type ReencryptionResponsePayload = Message<"inco.kms.lite.v1.ReencryptionResponsePayload"> & {
139
- /**
140
- * user_ciphertexts is the list of ciphertexts that were reencrypted to the
141
- * user's public key. Each ciphertext at index `i` corresponds to the ciphertext
142
- * at index `i` in the `ReencryptRequest`.
143
- *
144
- * @generated from field: repeated inco.fhe.v1.TypedCiphertext user_ciphertexts = 1;
145
- */
146
- userCiphertexts: TypedCiphertext[];
147
- };
148
- /**
149
- * Describes the message inco.kms.lite.v1.ReencryptionResponsePayload.
150
- * Use `create(ReencryptionResponsePayloadSchema)` to create a new message.
151
- */
152
- export declare const ReencryptionResponsePayloadSchema: GenMessage<ReencryptionResponsePayload>;
153
46
  /**
154
47
  * AttestedDecryptRequest is the request type for the KmsService/AttestedDecrypt RPC method.
155
48
  *
@@ -163,10 +56,21 @@ export type AttestedDecryptRequest = Message<"inco.kms.lite.v1.AttestedDecryptRe
163
56
  * @generated from field: string user_address = 1;
164
57
  */
165
58
  userAddress: string;
59
+ /**
60
+ * reencrypt_pub_key is the encoding of the user's public
61
+ * encryption key (secp256k1) used to reencrypt the result for.
62
+ * It is encoded in its 33-byte compressed format.
63
+ * If empty, the KMS will return plaintext decryption instead of reencryption.
64
+ *
65
+ * @generated from field: bytes reencrypt_pub_key = 2;
66
+ */
67
+ reencryptPubKey: Uint8Array;
166
68
  /**
167
69
  * eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
168
70
  * `user_address` (note that we only give a JSON representation for the sake of
169
- * readability, but the actual signed data is defined in the EIP-712 spec):
71
+ * readability, but the actual signed data is defined in the EIP-712 spec) where:
72
+ * handles - list of 0x prefixed handles to decrypt
73
+ * publicKey - 0x prefixed reencrypt_pub_key (if any). "0x" otherwise if empty.
170
74
  *
171
75
  * ```json
172
76
  * {
@@ -177,7 +81,8 @@ export type AttestedDecryptRequest = Message<"inco.kms.lite.v1.AttestedDecryptRe
177
81
  * { "name": "chainId", "type": "uint256" }
178
82
  * ],
179
83
  * "AttestedDecryptRequest": [
180
- * { "name": "handles", "type": "bytes32[]" }
84
+ * { "name": "handles", "type": "bytes32[]" },
85
+ * { "name": "publicKey", "type": "bytes" },
181
86
  * ]
182
87
  * },
183
88
  * "primaryType": "AttestedDecryptRequest",
@@ -187,12 +92,13 @@ export type AttestedDecryptRequest = Message<"inco.kms.lite.v1.AttestedDecryptRe
187
92
  * "chainId": "<host_chain_id>",
188
93
  * },
189
94
  * "message": {
190
- * "handles": ["<handle1>", "<handle2>", ...]
95
+ * "handles": ["<handle1>", "<handle2>", ...],
96
+ * "publicKey": "0x<reencrypt_pub_key>"
191
97
  * }
192
98
  * }
193
99
  * ```
194
100
  *
195
- * @generated from field: bytes eip712_signature = 2;
101
+ * @generated from field: bytes eip712_signature = 3;
196
102
  */
197
103
  eip712Signature: Uint8Array;
198
104
  /**
@@ -200,7 +106,7 @@ export type AttestedDecryptRequest = Message<"inco.kms.lite.v1.AttestedDecryptRe
200
106
  * Either the user_address or sharer must have ACL access to the handles for the attested
201
107
  * decryption to succeed.
202
108
  *
203
- * @generated from field: repeated inco.kms.lite.v1.HandleWithProof handles_with_proofs = 3;
109
+ * @generated from field: repeated inco.kms.lite.v1.HandleWithProof handles_with_proofs = 4;
204
110
  */
205
111
  handlesWithProofs: HandleWithProof[];
206
112
  };
@@ -367,6 +273,40 @@ export type AttestedComputeResponse = Message<"inco.kms.lite.v1.AttestedComputeR
367
273
  * Use `create(AttestedComputeResponseSchema)` to create a new message.
368
274
  */
369
275
  export declare const AttestedComputeResponseSchema: GenMessage<AttestedComputeResponse>;
276
+ /**
277
+ * Plaintext contains the decrypted plaintext value.
278
+ *
279
+ * @generated from message inco.kms.lite.v1.Plaintext
280
+ */
281
+ export type Plaintext = Message<"inco.kms.lite.v1.Plaintext"> & {
282
+ /**
283
+ * value is the decrypted plaintext value as a 32-byte word.
284
+ *
285
+ * @generated from field: bytes value = 1;
286
+ */
287
+ value: Uint8Array;
288
+ };
289
+ /**
290
+ * Describes the message inco.kms.lite.v1.Plaintext.
291
+ * Use `create(PlaintextSchema)` to create a new message.
292
+ */
293
+ export declare const PlaintextSchema: GenMessage<Plaintext>;
294
+ /**
295
+ * Reencryption contains the reencrypted ciphertext value.
296
+ *
297
+ * @generated from message inco.kms.lite.v1.Reencryption
298
+ */
299
+ export type Reencryption = Message<"inco.kms.lite.v1.Reencryption"> & {
300
+ /**
301
+ * @generated from field: inco.fhe.v1.TypedCiphertext user_ciphertext = 1;
302
+ */
303
+ userCiphertext?: TypedCiphertext;
304
+ };
305
+ /**
306
+ * Describes the message inco.kms.lite.v1.Reencryption.
307
+ * Use `create(ReencryptionSchema)` to create a new message.
308
+ */
309
+ export declare const ReencryptionSchema: GenMessage<Reencryption>;
370
310
  /**
371
311
  * DecryptionAttestation contains the attestation for the decryption of a single handle.
372
312
  *
@@ -380,11 +320,28 @@ export type DecryptionAttestation = Message<"inco.kms.lite.v1.DecryptionAttestat
380
320
  */
381
321
  handle: string;
382
322
  /**
383
- * plaintext is the decrypted plaintext value as a 32-byte word.
384
- *
385
- * @generated from field: bytes plaintext = 2;
386
- */
387
- plaintext: Uint8Array;
323
+ * @generated from oneof inco.kms.lite.v1.DecryptionAttestation.value
324
+ */
325
+ value: {
326
+ /**
327
+ * Returns plaintext if reencrypt_pub_key was empty in the request
328
+ *
329
+ * @generated from field: inco.kms.lite.v1.Plaintext plaintext = 2;
330
+ */
331
+ value: Plaintext;
332
+ case: "plaintext";
333
+ } | {
334
+ /**
335
+ * Returns encrypted ciphertext if reencrypt_pub_key was set in the request
336
+ *
337
+ * @generated from field: inco.kms.lite.v1.Reencryption reencryption = 3;
338
+ */
339
+ value: Reencryption;
340
+ case: "reencryption";
341
+ } | {
342
+ case: undefined;
343
+ value?: undefined;
344
+ };
388
345
  /**
389
346
  * signature is the attestation from the covalidator for the (handle,plaintext) pair.
390
347
  * This signature will be verified on the host chain.
@@ -421,7 +378,7 @@ export type DecryptionAttestation = Message<"inco.kms.lite.v1.DecryptionAttestat
421
378
  * }
422
379
  * ```
423
380
  *
424
- * @generated from field: bytes signature = 3;
381
+ * @generated from field: bytes signature = 4;
425
382
  */
426
383
  signature: Uint8Array;
427
384
  };
@@ -536,20 +493,10 @@ export declare const KmsService: GenService<{
536
493
  input: typeof KeyRequestSchema;
537
494
  output: typeof KeyResponseSchema;
538
495
  };
539
- /**
540
- * Reencrypt reencrypts a ciphertext using the ephemeral public key of the
541
- * user.
542
- *
543
- * @generated from rpc inco.kms.lite.v1.KmsService.Reencrypt
544
- */
545
- reencrypt: {
546
- methodKind: "unary";
547
- input: typeof ReencryptRequestSchema;
548
- output: typeof ReencryptResponseSchema;
549
- };
550
496
  /**
551
497
  * AttestedDecrypt decrypts multiple ciphertexts and provides an attestation
552
498
  * that the decryption was performed correctly.
499
+ * Can optionally reencrypt the result of the decryption to a desired public key.
553
500
  *
554
501
  * @generated from rpc inco.kms.lite.v1.KmsService.AttestedDecrypt
555
502
  */
@@ -7,7 +7,7 @@ import { file_inco_kms_lite_v1_types } from "./types_pb";
7
7
  /**
8
8
  * Describes the file inco/kms/lite/v1/kms_service.proto.
9
9
  */
10
- export const file_inco_kms_lite_v1_kms_service = /*@__PURE__*/ fileDesc("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", [file_inco_fhe_v1_types, file_inco_kms_lite_v1_types]);
10
+ export const file_inco_kms_lite_v1_kms_service = /*@__PURE__*/ fileDesc("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", [file_inco_fhe_v1_types, file_inco_kms_lite_v1_types]);
11
11
  /**
12
12
  * Describes the message inco.kms.lite.v1.KeyRequest.
13
13
  * Use `create(KeyRequestSchema)` to create a new message.
@@ -18,56 +18,51 @@ export const KeyRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_
18
18
  * Use `create(KeyResponseSchema)` to create a new message.
19
19
  */
20
20
  export const KeyResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 1);
21
- /**
22
- * Describes the message inco.kms.lite.v1.ReencryptRequest.
23
- * Use `create(ReencryptRequestSchema)` to create a new message.
24
- */
25
- export const ReencryptRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 2);
26
- /**
27
- * Describes the message inco.kms.lite.v1.ReencryptResponse.
28
- * Use `create(ReencryptResponseSchema)` to create a new message.
29
- */
30
- export const ReencryptResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 3);
31
- /**
32
- * Describes the message inco.kms.lite.v1.ReencryptionResponsePayload.
33
- * Use `create(ReencryptionResponsePayloadSchema)` to create a new message.
34
- */
35
- export const ReencryptionResponsePayloadSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 4);
36
21
  /**
37
22
  * Describes the message inco.kms.lite.v1.AttestedDecryptRequest.
38
23
  * Use `create(AttestedDecryptRequestSchema)` to create a new message.
39
24
  */
40
- export const AttestedDecryptRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 5);
25
+ export const AttestedDecryptRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 2);
41
26
  /**
42
27
  * Describes the message inco.kms.lite.v1.AttestedRevealRequest.
43
28
  * Use `create(AttestedRevealRequestSchema)` to create a new message.
44
29
  */
45
- export const AttestedRevealRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 6);
30
+ export const AttestedRevealRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 3);
46
31
  /**
47
32
  * Describes the message inco.kms.lite.v1.AttestedComputeRequest.
48
33
  * Use `create(AttestedComputeRequestSchema)` to create a new message.
49
34
  */
50
- export const AttestedComputeRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 7);
35
+ export const AttestedComputeRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 4);
51
36
  /**
52
37
  * Describes the message inco.kms.lite.v1.AttestedDecryptResponse.
53
38
  * Use `create(AttestedDecryptResponseSchema)` to create a new message.
54
39
  */
55
- export const AttestedDecryptResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 8);
40
+ export const AttestedDecryptResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 5);
56
41
  /**
57
42
  * Describes the message inco.kms.lite.v1.AttestedRevealResponse.
58
43
  * Use `create(AttestedRevealResponseSchema)` to create a new message.
59
44
  */
60
- export const AttestedRevealResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 9);
45
+ export const AttestedRevealResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 6);
61
46
  /**
62
47
  * Describes the message inco.kms.lite.v1.AttestedComputeResponse.
63
48
  * Use `create(AttestedComputeResponseSchema)` to create a new message.
64
49
  */
65
- export const AttestedComputeResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 10);
50
+ export const AttestedComputeResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 7);
51
+ /**
52
+ * Describes the message inco.kms.lite.v1.Plaintext.
53
+ * Use `create(PlaintextSchema)` to create a new message.
54
+ */
55
+ export const PlaintextSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 8);
56
+ /**
57
+ * Describes the message inco.kms.lite.v1.Reencryption.
58
+ * Use `create(ReencryptionSchema)` to create a new message.
59
+ */
60
+ export const ReencryptionSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 9);
66
61
  /**
67
62
  * Describes the message inco.kms.lite.v1.DecryptionAttestation.
68
63
  * Use `create(DecryptionAttestationSchema)` to create a new message.
69
64
  */
70
- export const DecryptionAttestationSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 11);
65
+ export const DecryptionAttestationSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 10);
71
66
  /**
72
67
  * @generated from enum inco.kms.lite.v1.SupportedScalarBinaryOp
73
68
  */
@@ -165,4 +160,4 @@ export const SupportedScalarBinaryOpSchema = /*@__PURE__*/ enumDesc(file_inco_km
165
160
  * @generated from service inco.kms.lite.v1.KmsService
166
161
  */
167
162
  export const KmsService = /*@__PURE__*/ serviceDesc(file_inco_kms_lite_v1_kms_service, 0);
168
- //# sourceMappingURL=data:application/json;base64,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
163
+ //# sourceMappingURL=data:application/json;base64,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
@@ -13,8 +13,6 @@ export declare const lightningDeployments: readonly [{
13
13
  readonly patch: 2;
14
14
  readonly shortSalt: "725458969";
15
15
  };
16
- readonly decryptSigner: "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95";
17
- readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
18
16
  readonly blockNumber: 32124925;
19
17
  readonly deployDate: "2025-10-09T13:55:42.997Z";
20
18
  readonly commit: "v0.5.3-10-ga4f2312d";
@@ -34,8 +32,6 @@ export declare const lightningDeployments: readonly [{
34
32
  readonly patch: 2;
35
33
  readonly shortSalt: "904635675";
36
34
  };
37
- readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
38
- readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
39
35
  readonly blockNumber: 3696905;
40
36
  readonly deployDate: "2025-10-03T13:24:44.682Z";
41
37
  readonly commit: "v0.5.3-6-g8db0f27f-dirty";
@@ -55,8 +51,6 @@ export declare const lightningDeployments: readonly [{
55
51
  readonly patch: 0;
56
52
  readonly shortSalt: "904635675";
57
53
  };
58
- readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
59
- readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
60
54
  readonly blockNumber: 3344310;
61
55
  readonly deployDate: "2025-09-29T11:14:02.599Z";
62
56
  readonly commit: "v0.5.1-5-g4135c790-dirty";
@@ -76,8 +70,6 @@ export declare const lightningDeployments: readonly [{
76
70
  readonly patch: 0;
77
71
  readonly shortSalt: "183408998";
78
72
  };
79
- readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
80
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
81
73
  readonly blockNumber: 26296576;
82
74
  readonly deployDate: "2025-05-27T15:57:24.175Z";
83
75
  readonly commit: "v5-3-gec8b6aae-dirty";
@@ -97,8 +89,6 @@ export declare const lightningDeployments: readonly [{
97
89
  readonly patch: 29;
98
90
  readonly shortSalt: "183408998";
99
91
  };
100
- readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
101
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
102
92
  readonly blockNumber: 13464615;
103
93
  readonly deployDate: "2025-04-22T16:01:14.380Z";
104
94
  readonly commit: "v3-28-g93c05a49-dirty";
@@ -118,8 +108,6 @@ export declare const lightningDeployments: readonly [{
118
108
  readonly patch: 29;
119
109
  readonly shortSalt: "183408998";
120
110
  };
121
- readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
122
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
123
111
  readonly blockNumber: 24784654;
124
112
  readonly deployDate: "2025-04-22T16:00:02.028Z";
125
113
  readonly commit: "v3-28-g93c05a49-dirty";
@@ -139,8 +127,6 @@ export declare const lightningDeployments: readonly [{
139
127
  readonly patch: 0;
140
128
  readonly shortSalt: "863421733";
141
129
  };
142
- readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
143
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
144
130
  readonly blockNumber: 25737175;
145
131
  readonly deployDate: "2025-05-14T17:10:44.285Z";
146
132
  readonly commit: "v4-11-g4a1f413a-dirty";
@@ -160,8 +146,6 @@ export declare const lightningDeployments: readonly [{
160
146
  readonly patch: 29;
161
147
  readonly shortSalt: "863421733";
162
148
  };
163
- readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
164
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
165
149
  readonly blockNumber: 25719113;
166
150
  readonly deployDate: "2025-05-14T07:08:39.059Z";
167
151
  readonly commit: "v4";
@@ -181,8 +165,6 @@ export declare const lightningDeployments: readonly [{
181
165
  readonly patch: 1;
182
166
  readonly shortSalt: "297966649";
183
167
  };
184
- readonly decryptSigner: "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95";
185
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
186
168
  readonly blockNumber: 27543410;
187
169
  readonly deployDate: "2025-06-25T12:38:32.856Z";
188
170
  readonly commit: "v5-17-ga03e4b32-dirty";
@@ -202,8 +184,6 @@ export declare const lightningDeployments: readonly [{
202
184
  readonly patch: 0;
203
185
  readonly shortSalt: "297966649";
204
186
  };
205
- readonly decryptSigner: "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95";
206
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
207
187
  readonly blockNumber: 26894782;
208
188
  readonly deployDate: "2025-06-10T12:17:35.790Z";
209
189
  readonly commit: "v5-13-gd6b19c10-dirty";
@@ -223,8 +203,6 @@ export declare const lightningDeployments: readonly [{
223
203
  readonly patch: 1;
224
204
  readonly shortSalt: "340846814";
225
205
  };
226
- readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
227
- readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
228
206
  readonly blockNumber: 1718868;
229
207
  readonly deployDate: "2025-09-10T15:20:25.654Z";
230
208
  readonly commit: "v6-7-gf96f358e-dirty";
@@ -244,8 +222,6 @@ export declare const lightningDeployments: readonly [{
244
222
  readonly patch: 1;
245
223
  readonly shortSalt: "340846814";
246
224
  };
247
- readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
248
- readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
249
225
  readonly blockNumber: 1717229;
250
226
  readonly deployDate: "2025-09-10T14:53:07.218Z";
251
227
  readonly commit: "v6-7-gf96f358e-dirty";
@@ -265,8 +241,6 @@ export declare const lightningDeployments: readonly [{
265
241
  readonly patch: 1;
266
242
  readonly shortSalt: "340846814";
267
243
  };
268
- readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
269
- readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
270
244
  readonly blockNumber: 17365942;
271
245
  readonly deployDate: "2025-08-15T17:35:15.208Z";
272
246
  readonly commit: "v0.2.17-35-g8cca6b4e-dirty";
@@ -286,8 +260,6 @@ export declare const lightningDeployments: readonly [{
286
260
  readonly patch: 0;
287
261
  readonly shortSalt: "340846814";
288
262
  };
289
- readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
290
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
291
263
  readonly blockNumber: 26122863;
292
264
  readonly deployDate: "2025-05-23T15:26:57.031Z";
293
265
  readonly commit: "v5-2-g8957c16b-dirty";
@@ -307,8 +279,6 @@ export declare const lightningDeployments: readonly [{
307
279
  readonly patch: 29;
308
280
  readonly shortSalt: "340846814";
309
281
  };
310
- readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
311
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
312
282
  readonly blockNumber: 13464197;
313
283
  readonly deployDate: "2025-04-22T15:57:26.862Z";
314
284
  readonly commit: "v3-28-g93c05a49-dirty";
@@ -328,8 +298,6 @@ export declare const lightningDeployments: readonly [{
328
298
  readonly patch: 29;
329
299
  readonly shortSalt: "340846814";
330
300
  };
331
- readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
332
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
333
301
  readonly blockNumber: 24784527;
334
302
  readonly deployDate: "2025-04-22T15:55:47.828Z";
335
303
  readonly commit: "v3-28-g93c05a49-dirty";