@inco/js 0.6.8 → 0.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (140) hide show
  1. package/README.md +8 -8
  2. package/dist/cjs/advancedacl/session-key.d.ts +39 -19
  3. package/dist/cjs/advancedacl/session-key.js +59 -108
  4. package/dist/cjs/attestedcompute/attested-compute.d.ts +6 -6
  5. package/dist/cjs/attestedcompute/attested-compute.js +5 -28
  6. package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +68 -16
  7. package/dist/cjs/attesteddecrypt/attested-decrypt.js +108 -66
  8. package/dist/cjs/attesteddecrypt/types.d.ts +8 -3
  9. package/dist/cjs/attesteddecrypt/types.js +1 -1
  10. package/dist/cjs/encryption/encryption.d.ts +8 -10
  11. package/dist/cjs/encryption/encryption.js +6 -6
  12. package/dist/cjs/generated/abis/add-two.d.ts +1 -1
  13. package/dist/cjs/generated/abis/add-two.js +1 -1
  14. package/dist/cjs/generated/abis/lightning-preview.d.ts +40 -0
  15. package/dist/cjs/generated/abis/lightning-preview.js +29 -1
  16. package/dist/cjs/generated/abis/lightning.d.ts +1 -1
  17. package/dist/cjs/generated/abis/lightning.js +1 -1
  18. package/dist/cjs/generated/abis/verifier.d.ts +126 -67
  19. package/dist/cjs/generated/abis/verifier.js +108 -54
  20. package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
  21. package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
  22. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +87 -132
  23. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +21 -27
  24. package/dist/cjs/generated/lightning.d.ts +40 -32
  25. package/dist/cjs/generated/lightning.js +43 -33
  26. package/dist/cjs/generated/local-node.d.ts +11 -11
  27. package/dist/cjs/generated/local-node.js +28 -12
  28. package/dist/cjs/kms/client.d.ts +8 -4
  29. package/dist/cjs/kms/client.js +9 -4
  30. package/dist/cjs/kms/quorumClient.d.ts +58 -0
  31. package/dist/cjs/kms/quorumClient.js +378 -0
  32. package/dist/cjs/kms/thresholdPromises.d.ts +7 -0
  33. package/dist/cjs/kms/thresholdPromises.js +52 -0
  34. package/dist/cjs/lite/deployments.d.ts +20 -2
  35. package/dist/cjs/lite/deployments.js +1 -1
  36. package/dist/cjs/lite/index.d.ts +1 -2
  37. package/dist/cjs/lite/index.js +1 -2
  38. package/dist/cjs/lite/lightning.d.ts +109 -77
  39. package/dist/cjs/lite/lightning.js +279 -112
  40. package/dist/cjs/local/local-node.d.ts +1 -2
  41. package/dist/cjs/local/local-node.js +2 -3
  42. package/dist/cjs/test/mocks.d.ts +15 -0
  43. package/dist/cjs/test/mocks.js +45 -0
  44. package/dist/cjs/viem.d.ts +1 -1
  45. package/dist/esm/advancedacl/session-key.d.ts +39 -19
  46. package/dist/esm/advancedacl/session-key.js +52 -100
  47. package/dist/esm/attestedcompute/attested-compute.d.ts +6 -6
  48. package/dist/esm/attestedcompute/attested-compute.js +6 -29
  49. package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +68 -16
  50. package/dist/esm/attesteddecrypt/attested-decrypt.js +109 -68
  51. package/dist/esm/attesteddecrypt/types.d.ts +8 -3
  52. package/dist/esm/attesteddecrypt/types.js +1 -1
  53. package/dist/esm/encryption/encryption.d.ts +8 -10
  54. package/dist/esm/encryption/encryption.js +6 -6
  55. package/dist/esm/generated/abis/add-two.d.ts +1 -1
  56. package/dist/esm/generated/abis/add-two.js +1 -1
  57. package/dist/esm/generated/abis/lightning-preview.d.ts +40 -0
  58. package/dist/esm/generated/abis/lightning-preview.js +29 -1
  59. package/dist/esm/generated/abis/lightning.d.ts +1 -1
  60. package/dist/esm/generated/abis/lightning.js +1 -1
  61. package/dist/esm/generated/abis/verifier.d.ts +126 -67
  62. package/dist/esm/generated/abis/verifier.js +108 -54
  63. package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
  64. package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
  65. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +87 -132
  66. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +19 -25
  67. package/dist/esm/generated/lightning.d.ts +40 -32
  68. package/dist/esm/generated/lightning.js +43 -33
  69. package/dist/esm/generated/local-node.d.ts +11 -11
  70. package/dist/esm/generated/local-node.js +28 -12
  71. package/dist/esm/kms/client.d.ts +8 -4
  72. package/dist/esm/kms/client.js +8 -4
  73. package/dist/esm/kms/quorumClient.d.ts +58 -0
  74. package/dist/esm/kms/quorumClient.js +374 -0
  75. package/dist/esm/kms/thresholdPromises.d.ts +7 -0
  76. package/dist/esm/kms/thresholdPromises.js +49 -0
  77. package/dist/esm/lite/deployments.d.ts +20 -2
  78. package/dist/esm/lite/deployments.js +1 -1
  79. package/dist/esm/lite/index.d.ts +1 -2
  80. package/dist/esm/lite/index.js +1 -2
  81. package/dist/esm/lite/lightning.d.ts +109 -77
  82. package/dist/esm/lite/lightning.js +278 -111
  83. package/dist/esm/local/local-node.d.ts +1 -2
  84. package/dist/esm/local/local-node.js +2 -3
  85. package/dist/esm/test/mocks.d.ts +15 -0
  86. package/dist/esm/test/mocks.js +39 -0
  87. package/dist/esm/viem.d.ts +1 -1
  88. package/dist/types/advancedacl/session-key.d.ts +39 -19
  89. package/dist/types/attestedcompute/attested-compute.d.ts +6 -6
  90. package/dist/types/attesteddecrypt/attested-decrypt.d.ts +68 -16
  91. package/dist/types/attesteddecrypt/types.d.ts +8 -3
  92. package/dist/types/encryption/encryption.d.ts +8 -10
  93. package/dist/types/generated/abis/add-two.d.ts +1 -1
  94. package/dist/types/generated/abis/lightning-preview.d.ts +40 -0
  95. package/dist/types/generated/abis/lightning.d.ts +1 -1
  96. package/dist/types/generated/abis/verifier.d.ts +126 -67
  97. package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
  98. package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +87 -132
  99. package/dist/types/generated/lightning.d.ts +40 -32
  100. package/dist/types/generated/local-node.d.ts +11 -11
  101. package/dist/types/kms/client.d.ts +8 -4
  102. package/dist/types/kms/quorumClient.d.ts +58 -0
  103. package/dist/types/kms/thresholdPromises.d.ts +7 -0
  104. package/dist/types/lite/deployments.d.ts +20 -2
  105. package/dist/types/lite/index.d.ts +1 -2
  106. package/dist/types/lite/lightning.d.ts +109 -77
  107. package/dist/types/local/local-node.d.ts +1 -2
  108. package/dist/types/test/mocks.d.ts +15 -0
  109. package/dist/types/viem.d.ts +1 -1
  110. package/package.json +3 -3
  111. package/dist/cjs/attestedreveal/attested-reveal.d.ts +0 -21
  112. package/dist/cjs/attestedreveal/attested-reveal.js +0 -67
  113. package/dist/cjs/attestedreveal/index.d.ts +0 -1
  114. package/dist/cjs/attestedreveal/index.js +0 -18
  115. package/dist/cjs/attestedreveal/types.d.ts +0 -7
  116. package/dist/cjs/attestedreveal/types.js +0 -16
  117. package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
  118. package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.js +0 -118
  119. package/dist/cjs/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
  120. package/dist/cjs/generated/es/inco/fhe/v1/types_pb.js +0 -136
  121. package/dist/cjs/lite/reencrypt.d.ts +0 -23
  122. package/dist/cjs/lite/reencrypt.js +0 -131
  123. package/dist/esm/attestedreveal/attested-reveal.d.ts +0 -21
  124. package/dist/esm/attestedreveal/attested-reveal.js +0 -64
  125. package/dist/esm/attestedreveal/index.d.ts +0 -1
  126. package/dist/esm/attestedreveal/index.js +0 -2
  127. package/dist/esm/attestedreveal/types.d.ts +0 -7
  128. package/dist/esm/attestedreveal/types.js +0 -12
  129. package/dist/esm/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
  130. package/dist/esm/generated/es/cosmos_proto/cosmos_pb.js +0 -115
  131. package/dist/esm/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
  132. package/dist/esm/generated/es/inco/fhe/v1/types_pb.js +0 -133
  133. package/dist/esm/lite/reencrypt.d.ts +0 -23
  134. package/dist/esm/lite/reencrypt.js +0 -122
  135. package/dist/types/attestedreveal/attested-reveal.d.ts +0 -21
  136. package/dist/types/attestedreveal/index.d.ts +0 -1
  137. package/dist/types/attestedreveal/types.d.ts +0 -7
  138. package/dist/types/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
  139. package/dist/types/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
  140. package/dist/types/lite/reencrypt.d.ts +0 -23
@@ -1,5 +1,4 @@
1
1
  import type { GenEnum, GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv2";
2
- import type { TypedCiphertext } from "../../../fhe/v1/types_pb";
3
2
  import type { ACLProof, ECIESKeyset, HandleWithProof } from "./types_pb";
4
3
  import type { Message } from "@bufbuild/protobuf";
5
4
  /**
@@ -43,113 +42,6 @@ export type KeyResponse = Message<"inco.kms.lite.v1.KeyResponse"> & {
43
42
  * Use `create(KeyResponseSchema)` to create a new message.
44
43
  */
45
44
  export declare const KeyResponseSchema: GenMessage<KeyResponse>;
46
- /**
47
- * ReencryptRequest is the request type for the KmsService/Reencrypt RPC method.
48
- *
49
- * @generated from message inco.kms.lite.v1.ReencryptRequest
50
- */
51
- export type ReencryptRequest = Message<"inco.kms.lite.v1.ReencryptRequest"> & {
52
- /**
53
- * user_address is the Ethereum address of the user who requested the
54
- * reencryption, prefixed with 0x.
55
- *
56
- * @generated from field: string user_address = 1;
57
- */
58
- userAddress: string;
59
- /**
60
- * ephemeral_pub_key is the encoding of the user's public ephemeral
61
- * encryption key (secp256k1), generated by the user for this reencryption
62
- * request. It is encoded in its 33-byte compressed format.
63
- *
64
- * @generated from field: bytes ephemeral_pub_key = 2;
65
- */
66
- ephemeralPubKey: Uint8Array;
67
- /**
68
- * eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
69
- * `user_address` (note that we only give a JSON representation for the sake of
70
- * readability, but the actual signed data is defined in the EIP-712 spec):
71
- *
72
- * ```json
73
- * {
74
- * "types": {
75
- * "EIP712Domain": [
76
- * { "name": "name", "type": "string" },
77
- * { "name": "version", "type": "string" },
78
- * { "name": "chainId", "type": "uint256" }
79
- * ],
80
- * "ReencryptionRequest": [
81
- * { "name": "publicKey", "type": "bytes" }
82
- * ]
83
- * },
84
- * "primaryType": "ReencryptionRequest",
85
- * "domain": {
86
- * "name": "IncoReencryption",
87
- * "version": "0.1.0",
88
- * "chainId": "<host_chain_id>",
89
- * "verifyingContract": "<acl_address>",
90
- * "salt": "0x0000000000000000000000000000000000000000000000000000000000000000"
91
- * },
92
- * "message": {
93
- * "publicKey": "<ephemeral_pub_key>"
94
- * }
95
- * }
96
- * ```
97
- *
98
- * @generated from field: bytes eip712_signature = 3;
99
- */
100
- eip712Signature: Uint8Array;
101
- /**
102
- * handles_with_proofs is the list of handles of the ciphertexts to reencrypt,
103
- * along with the ACL proof that the user has access to the ciphertext.
104
- *
105
- * @generated from field: repeated inco.kms.lite.v1.HandleWithProof handles_with_proofs = 4;
106
- */
107
- handlesWithProofs: HandleWithProof[];
108
- };
109
- /**
110
- * Describes the message inco.kms.lite.v1.ReencryptRequest.
111
- * Use `create(ReencryptRequestSchema)` to create a new message.
112
- */
113
- export declare const ReencryptRequestSchema: GenMessage<ReencryptRequest>;
114
- /**
115
- * ReencryptResponse is the response type for the KmsService/Reencrypt RPC method.
116
- *
117
- * @generated from message inco.kms.lite.v1.ReencryptResponse
118
- */
119
- export type ReencryptResponse = Message<"inco.kms.lite.v1.ReencryptResponse"> & {
120
- /**
121
- * payload is the reencryption response payload.
122
- *
123
- * @generated from field: inco.kms.lite.v1.ReencryptionResponsePayload payload = 1;
124
- */
125
- payload?: ReencryptionResponsePayload;
126
- };
127
- /**
128
- * Describes the message inco.kms.lite.v1.ReencryptResponse.
129
- * Use `create(ReencryptResponseSchema)` to create a new message.
130
- */
131
- export declare const ReencryptResponseSchema: GenMessage<ReencryptResponse>;
132
- /**
133
- * ReencryptionResponsePayload is the payload of the ReencryptResponse,
134
- * separated out because it is signed by the KMS using its signing key.
135
- *
136
- * @generated from message inco.kms.lite.v1.ReencryptionResponsePayload
137
- */
138
- export type ReencryptionResponsePayload = Message<"inco.kms.lite.v1.ReencryptionResponsePayload"> & {
139
- /**
140
- * user_ciphertexts is the list of ciphertexts that were reencrypted to the
141
- * user's public key. Each ciphertext at index `i` corresponds to the ciphertext
142
- * at index `i` in the `ReencryptRequest`.
143
- *
144
- * @generated from field: repeated inco.fhe.v1.TypedCiphertext user_ciphertexts = 1;
145
- */
146
- userCiphertexts: TypedCiphertext[];
147
- };
148
- /**
149
- * Describes the message inco.kms.lite.v1.ReencryptionResponsePayload.
150
- * Use `create(ReencryptionResponsePayloadSchema)` to create a new message.
151
- */
152
- export declare const ReencryptionResponsePayloadSchema: GenMessage<ReencryptionResponsePayload>;
153
45
  /**
154
46
  * AttestedDecryptRequest is the request type for the KmsService/AttestedDecrypt RPC method.
155
47
  *
@@ -163,10 +55,21 @@ export type AttestedDecryptRequest = Message<"inco.kms.lite.v1.AttestedDecryptRe
163
55
  * @generated from field: string user_address = 1;
164
56
  */
165
57
  userAddress: string;
58
+ /**
59
+ * reencrypt_pub_key is the encoding of the user's public
60
+ * encryption key (secp256k1) used to reencrypt the result for.
61
+ * It is encoded in its 33-byte compressed format.
62
+ * If empty, the KMS will return plaintext decryption instead of reencryption.
63
+ *
64
+ * @generated from field: bytes reencrypt_pub_key = 2;
65
+ */
66
+ reencryptPubKey: Uint8Array;
166
67
  /**
167
68
  * eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
168
69
  * `user_address` (note that we only give a JSON representation for the sake of
169
- * readability, but the actual signed data is defined in the EIP-712 spec):
70
+ * readability, but the actual signed data is defined in the EIP-712 spec) where:
71
+ * handles - list of 0x prefixed handles to decrypt
72
+ * publicKey - 0x prefixed reencrypt_pub_key (if any). "0x" otherwise if empty.
170
73
  *
171
74
  * ```json
172
75
  * {
@@ -177,22 +80,24 @@ export type AttestedDecryptRequest = Message<"inco.kms.lite.v1.AttestedDecryptRe
177
80
  * { "name": "chainId", "type": "uint256" }
178
81
  * ],
179
82
  * "AttestedDecryptRequest": [
180
- * { "name": "handles", "type": "bytes32[]" }
83
+ * { "name": "handles", "type": "bytes32[]" },
84
+ * { "name": "publicKey", "type": "bytes" },
181
85
  * ]
182
86
  * },
183
87
  * "primaryType": "AttestedDecryptRequest",
184
88
  * "domain": {
185
89
  * "name": "IncoAttestedDecrypt",
186
- * "version": "0.1.0",
90
+ * "version": "1",
187
91
  * "chainId": "<host_chain_id>",
188
92
  * },
189
93
  * "message": {
190
- * "handles": ["<handle1>", "<handle2>", ...]
94
+ * "handles": ["<handle1>", "<handle2>", ...],
95
+ * "publicKey": "0x<reencrypt_pub_key>"
191
96
  * }
192
97
  * }
193
98
  * ```
194
99
  *
195
- * @generated from field: bytes eip712_signature = 2;
100
+ * @generated from field: bytes eip712_signature = 3;
196
101
  */
197
102
  eip712Signature: Uint8Array;
198
103
  /**
@@ -200,7 +105,7 @@ export type AttestedDecryptRequest = Message<"inco.kms.lite.v1.AttestedDecryptRe
200
105
  * Either the user_address or sharer must have ACL access to the handles for the attested
201
106
  * decryption to succeed.
202
107
  *
203
- * @generated from field: repeated inco.kms.lite.v1.HandleWithProof handles_with_proofs = 3;
108
+ * @generated from field: repeated inco.kms.lite.v1.HandleWithProof handles_with_proofs = 4;
204
109
  */
205
110
  handlesWithProofs: HandleWithProof[];
206
111
  };
@@ -263,7 +168,7 @@ export type AttestedComputeRequest = Message<"inco.kms.lite.v1.AttestedComputeRe
263
168
  * "primaryType": "AttestedComputeRequest",
264
169
  * "domain": {
265
170
  * "name": "IncoAttestedCompute",
266
- * "version": "0.1.0",
171
+ * "version": "1",
267
172
  * "chainId": "<host_chain_id>",
268
173
  * },
269
174
  * "message": {
@@ -367,6 +272,49 @@ export type AttestedComputeResponse = Message<"inco.kms.lite.v1.AttestedComputeR
367
272
  * Use `create(AttestedComputeResponseSchema)` to create a new message.
368
273
  */
369
274
  export declare const AttestedComputeResponseSchema: GenMessage<AttestedComputeResponse>;
275
+ /**
276
+ * Plaintext contains the decrypted plaintext value.
277
+ *
278
+ * @generated from message inco.kms.lite.v1.Plaintext
279
+ */
280
+ export type Plaintext = Message<"inco.kms.lite.v1.Plaintext"> & {
281
+ /**
282
+ * value is the decrypted plaintext value as a 32-byte word.
283
+ *
284
+ * @generated from field: bytes value = 1;
285
+ */
286
+ value: Uint8Array;
287
+ };
288
+ /**
289
+ * Describes the message inco.kms.lite.v1.Plaintext.
290
+ * Use `create(PlaintextSchema)` to create a new message.
291
+ */
292
+ export declare const PlaintextSchema: GenMessage<Plaintext>;
293
+ /**
294
+ * Reencryption contains the reencrypted ciphertext value.
295
+ *
296
+ * @generated from message inco.kms.lite.v1.Reencryption
297
+ */
298
+ export type Reencryption = Message<"inco.kms.lite.v1.Reencryption"> & {
299
+ /**
300
+ * The ciphertext that was reencrypted to the user's public key.
301
+ *
302
+ * @generated from field: bytes user_ciphertext = 1;
303
+ */
304
+ userCiphertext: Uint8Array;
305
+ /**
306
+ * The handle of the ciphertext, encoded as a 0x-prefixed hex string, any case.
307
+ * TODO scalar declaration.
308
+ *
309
+ * @generated from field: string handle = 2;
310
+ */
311
+ handle: string;
312
+ };
313
+ /**
314
+ * Describes the message inco.kms.lite.v1.Reencryption.
315
+ * Use `create(ReencryptionSchema)` to create a new message.
316
+ */
317
+ export declare const ReencryptionSchema: GenMessage<Reencryption>;
370
318
  /**
371
319
  * DecryptionAttestation contains the attestation for the decryption of a single handle.
372
320
  *
@@ -380,11 +328,28 @@ export type DecryptionAttestation = Message<"inco.kms.lite.v1.DecryptionAttestat
380
328
  */
381
329
  handle: string;
382
330
  /**
383
- * plaintext is the decrypted plaintext value as a 32-byte word.
384
- *
385
- * @generated from field: bytes plaintext = 2;
386
- */
387
- plaintext: Uint8Array;
331
+ * @generated from oneof inco.kms.lite.v1.DecryptionAttestation.value
332
+ */
333
+ value: {
334
+ /**
335
+ * Returns plaintext if reencrypt_pub_key was empty in the request
336
+ *
337
+ * @generated from field: inco.kms.lite.v1.Plaintext plaintext = 2;
338
+ */
339
+ value: Plaintext;
340
+ case: "plaintext";
341
+ } | {
342
+ /**
343
+ * Returns encrypted ciphertext if reencrypt_pub_key was set in the request
344
+ *
345
+ * @generated from field: inco.kms.lite.v1.Reencryption reencryption = 3;
346
+ */
347
+ value: Reencryption;
348
+ case: "reencryption";
349
+ } | {
350
+ case: undefined;
351
+ value?: undefined;
352
+ };
388
353
  /**
389
354
  * signature is the attestation from the covalidator for the (handle,plaintext) pair.
390
355
  * This signature will be verified on the host chain.
@@ -421,7 +386,7 @@ export type DecryptionAttestation = Message<"inco.kms.lite.v1.DecryptionAttestat
421
386
  * }
422
387
  * ```
423
388
  *
424
- * @generated from field: bytes signature = 3;
389
+ * @generated from field: bytes signature = 4;
425
390
  */
426
391
  signature: Uint8Array;
427
392
  };
@@ -536,20 +501,10 @@ export declare const KmsService: GenService<{
536
501
  input: typeof KeyRequestSchema;
537
502
  output: typeof KeyResponseSchema;
538
503
  };
539
- /**
540
- * Reencrypt reencrypts a ciphertext using the ephemeral public key of the
541
- * user.
542
- *
543
- * @generated from rpc inco.kms.lite.v1.KmsService.Reencrypt
544
- */
545
- reencrypt: {
546
- methodKind: "unary";
547
- input: typeof ReencryptRequestSchema;
548
- output: typeof ReencryptResponseSchema;
549
- };
550
504
  /**
551
505
  * AttestedDecrypt decrypts multiple ciphertexts and provides an attestation
552
506
  * that the decryption was performed correctly.
507
+ * Can optionally reencrypt the result of the decryption to a desired public key.
553
508
  *
554
509
  * @generated from rpc inco.kms.lite.v1.KmsService.AttestedDecrypt
555
510
  */
@@ -2,12 +2,11 @@
2
2
  // @generated from file inco/kms/lite/v1/kms_service.proto (package inco.kms.lite.v1, syntax proto3)
3
3
  /* eslint-disable */
4
4
  import { enumDesc, fileDesc, messageDesc, serviceDesc } from "@bufbuild/protobuf/codegenv2";
5
- import { file_inco_fhe_v1_types } from "../../../fhe/v1/types_pb";
6
5
  import { file_inco_kms_lite_v1_types } from "./types_pb";
7
6
  /**
8
7
  * Describes the file inco/kms/lite/v1/kms_service.proto.
9
8
  */
10
- export const file_inco_kms_lite_v1_kms_service = /*@__PURE__*/ fileDesc("CiJpbmNvL2ttcy9saXRlL3YxL2ttc19zZXJ2aWNlLnByb3RvEhBpbmNvLmttcy5saXRlLnYxIgwKCktleVJlcXVlc3QiVQoLS2V5UmVzcG9uc2USLQoGa2V5c2V0GAEgASgLMh0uaW5jby5rbXMubGl0ZS52MS5FQ0lFU0tleXNldBIXCg9zaWduaW5nX2FkZHJlc3MYAiABKAkinQEKEFJlZW5jcnlwdFJlcXVlc3QSFAoMdXNlcl9hZGRyZXNzGAEgASgJEhkKEWVwaGVtZXJhbF9wdWJfa2V5GAIgASgMEhgKEGVpcDcxMl9zaWduYXR1cmUYAyABKAwSPgoTaGFuZGxlc193aXRoX3Byb29mcxgEIAMoCzIhLmluY28ua21zLmxpdGUudjEuSGFuZGxlV2l0aFByb29mIlMKEVJlZW5jcnlwdFJlc3BvbnNlEj4KB3BheWxvYWQYASABKAsyLS5pbmNvLmttcy5saXRlLnYxLlJlZW5jcnlwdGlvblJlc3BvbnNlUGF5bG9hZCJVChtSZWVuY3J5cHRpb25SZXNwb25zZVBheWxvYWQSNgoQdXNlcl9jaXBoZXJ0ZXh0cxgBIAMoCzIcLmluY28uZmhlLnYxLlR5cGVkQ2lwaGVydGV4dCKIAQoWQXR0ZXN0ZWREZWNyeXB0UmVxdWVzdBIUCgx1c2VyX2FkZHJlc3MYASABKAkSGAoQZWlwNzEyX3NpZ25hdHVyZRgCIAEoDBI+ChNoYW5kbGVzX3dpdGhfcHJvb2ZzGAMgAygLMiEuaW5jby5rbXMubGl0ZS52MS5IYW5kbGVXaXRoUHJvb2YiKAoVQXR0ZXN0ZWRSZXZlYWxSZXF1ZXN0Eg8KB2hhbmRsZXMYAyADKAki2QEKFkF0dGVzdGVkQ29tcHV0ZVJlcXVlc3QSFAoMdXNlcl9hZGRyZXNzGAEgASgJEhgKEGVpcDcxMl9zaWduYXR1cmUYAiABKAwSNQoCb3AYAyABKA4yKS5pbmNvLmttcy5saXRlLnYxLlN1cHBvcnRlZFNjYWxhckJpbmFyeU9wEhIKCmxoc19oYW5kbGUYBCABKAkSFQoNcmhzX3BsYWludGV4dBgFIAEoCRItCglhY2xfcHJvb2YYBiABKAsyGi5pbmNvLmttcy5saXRlLnYxLkFDTFByb29mImMKF0F0dGVzdGVkRGVjcnlwdFJlc3BvbnNlEkgKF2RlY3J5cHRpb25fYXR0ZXN0YXRpb25zGAEgAygLMicuaW5jby5rbXMubGl0ZS52MS5EZWNyeXB0aW9uQXR0ZXN0YXRpb24iYgoWQXR0ZXN0ZWRSZXZlYWxSZXNwb25zZRJIChdkZWNyeXB0aW9uX2F0dGVzdGF0aW9ucxgBIAMoCzInLmluY28ua21zLmxpdGUudjEuRGVjcnlwdGlvbkF0dGVzdGF0aW9uImIKF0F0dGVzdGVkQ29tcHV0ZVJlc3BvbnNlEkcKFmRlY3J5cHRpb25fYXR0ZXN0YXRpb24YASABKAsyJy5pbmNvLmttcy5saXRlLnYxLkRlY3J5cHRpb25BdHRlc3RhdGlvbiJNChVEZWNyeXB0aW9uQXR0ZXN0YXRpb24SDgoGaGFuZGxlGAEgASgJEhEKCXBsYWludGV4dBgCIAEoDBIRCglzaWduYXR1cmUYAyABKAwqpAIKF1N1cHBvcnRlZFNjYWxhckJpbmFyeU9wEgsKB0ZIRV9BREQQABILCgdGSEVfU1VCEAESCwoHRkhFX01VTBACEgsKB0ZIRV9ESVYQAxILCgdGSEVfUkVNEAQSDwoLRkhFX0JJVF9BTkQQBRIOCgpGSEVfQklUX09SEAYSDwoLRkhFX0JJVF9YT1IQBxILCgdGSEVfU0hMEAgSCwoHRkhFX1NIUhAJEgwKCEZIRV9ST1RMEAoSDAoIRkhFX1JPVFIQCxIKCgZGSEVfRVEQDBIKCgZGSEVfTkUQDRIKCgZGSEVfR0UQDhIKCgZGSEVfR1QQDxIKCgZGSEVfTEUQEBIKCgZGSEVfTFQQERILCgdGSEVfTUlOEBISCwoHRkhFX01BWBATMtsDCgpLbXNTZXJ2aWNlEkIKA0tleRIcLmluY28ua21zLmxpdGUudjEuS2V5UmVxdWVzdBodLmluY28ua21zLmxpdGUudjEuS2V5UmVzcG9uc2USVAoJUmVlbmNyeXB0EiIuaW5jby5rbXMubGl0ZS52MS5SZWVuY3J5cHRSZXF1ZXN0GiMuaW5jby5rbXMubGl0ZS52MS5SZWVuY3J5cHRSZXNwb25zZRJmCg9BdHRlc3RlZERlY3J5cHQSKC5pbmNvLmttcy5saXRlLnYxLkF0dGVzdGVkRGVjcnlwdFJlcXVlc3QaKS5pbmNvLmttcy5saXRlLnYxLkF0dGVzdGVkRGVjcnlwdFJlc3BvbnNlEmYKD0F0dGVzdGVkQ29tcHV0ZRIoLmluY28ua21zLmxpdGUudjEuQXR0ZXN0ZWRDb21wdXRlUmVxdWVzdBopLmluY28ua21zLmxpdGUudjEuQXR0ZXN0ZWRDb21wdXRlUmVzcG9uc2USYwoOQXR0ZXN0ZWRSZXZlYWwSJy5pbmNvLmttcy5saXRlLnYxLkF0dGVzdGVkUmV2ZWFsUmVxdWVzdBooLmluY28ua21zLmxpdGUudjEuQXR0ZXN0ZWRSZXZlYWxSZXNwb25zZUI7WjlnaXRodWIuY29tL2luY28tZmhldm0vaW5jby1tb25vcmVwby9jb3ZhbGlkYXRvci9rbXMvdHlwZXNiBnByb3RvMw", [file_inco_fhe_v1_types, file_inco_kms_lite_v1_types]);
9
+ export const file_inco_kms_lite_v1_kms_service = /*@__PURE__*/ fileDesc("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", [file_inco_kms_lite_v1_types]);
11
10
  /**
12
11
  * Describes the message inco.kms.lite.v1.KeyRequest.
13
12
  * Use `create(KeyRequestSchema)` to create a new message.
@@ -18,56 +17,51 @@ export const KeyRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_
18
17
  * Use `create(KeyResponseSchema)` to create a new message.
19
18
  */
20
19
  export const KeyResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 1);
21
- /**
22
- * Describes the message inco.kms.lite.v1.ReencryptRequest.
23
- * Use `create(ReencryptRequestSchema)` to create a new message.
24
- */
25
- export const ReencryptRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 2);
26
- /**
27
- * Describes the message inco.kms.lite.v1.ReencryptResponse.
28
- * Use `create(ReencryptResponseSchema)` to create a new message.
29
- */
30
- export const ReencryptResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 3);
31
- /**
32
- * Describes the message inco.kms.lite.v1.ReencryptionResponsePayload.
33
- * Use `create(ReencryptionResponsePayloadSchema)` to create a new message.
34
- */
35
- export const ReencryptionResponsePayloadSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 4);
36
20
  /**
37
21
  * Describes the message inco.kms.lite.v1.AttestedDecryptRequest.
38
22
  * Use `create(AttestedDecryptRequestSchema)` to create a new message.
39
23
  */
40
- export const AttestedDecryptRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 5);
24
+ export const AttestedDecryptRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 2);
41
25
  /**
42
26
  * Describes the message inco.kms.lite.v1.AttestedRevealRequest.
43
27
  * Use `create(AttestedRevealRequestSchema)` to create a new message.
44
28
  */
45
- export const AttestedRevealRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 6);
29
+ export const AttestedRevealRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 3);
46
30
  /**
47
31
  * Describes the message inco.kms.lite.v1.AttestedComputeRequest.
48
32
  * Use `create(AttestedComputeRequestSchema)` to create a new message.
49
33
  */
50
- export const AttestedComputeRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 7);
34
+ export const AttestedComputeRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 4);
51
35
  /**
52
36
  * Describes the message inco.kms.lite.v1.AttestedDecryptResponse.
53
37
  * Use `create(AttestedDecryptResponseSchema)` to create a new message.
54
38
  */
55
- export const AttestedDecryptResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 8);
39
+ export const AttestedDecryptResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 5);
56
40
  /**
57
41
  * Describes the message inco.kms.lite.v1.AttestedRevealResponse.
58
42
  * Use `create(AttestedRevealResponseSchema)` to create a new message.
59
43
  */
60
- export const AttestedRevealResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 9);
44
+ export const AttestedRevealResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 6);
61
45
  /**
62
46
  * Describes the message inco.kms.lite.v1.AttestedComputeResponse.
63
47
  * Use `create(AttestedComputeResponseSchema)` to create a new message.
64
48
  */
65
- export const AttestedComputeResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 10);
49
+ export const AttestedComputeResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 7);
50
+ /**
51
+ * Describes the message inco.kms.lite.v1.Plaintext.
52
+ * Use `create(PlaintextSchema)` to create a new message.
53
+ */
54
+ export const PlaintextSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 8);
55
+ /**
56
+ * Describes the message inco.kms.lite.v1.Reencryption.
57
+ * Use `create(ReencryptionSchema)` to create a new message.
58
+ */
59
+ export const ReencryptionSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 9);
66
60
  /**
67
61
  * Describes the message inco.kms.lite.v1.DecryptionAttestation.
68
62
  * Use `create(DecryptionAttestationSchema)` to create a new message.
69
63
  */
70
- export const DecryptionAttestationSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 11);
64
+ export const DecryptionAttestationSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 10);
71
65
  /**
72
66
  * @generated from enum inco.kms.lite.v1.SupportedScalarBinaryOp
73
67
  */
@@ -165,4 +159,4 @@ export const SupportedScalarBinaryOpSchema = /*@__PURE__*/ enumDesc(file_inco_km
165
159
  * @generated from service inco.kms.lite.v1.KmsService
166
160
  */
167
161
  export const KmsService = /*@__PURE__*/ serviceDesc(file_inco_kms_lite_v1_kms_service, 0);
168
- //# sourceMappingURL=data:application/json;base64,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
162
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1,4 +1,44 @@
1
1
  export declare const lightningDeployments: readonly [{
2
+ readonly name: "incoLightningPreview_2_0_0__976644394";
3
+ readonly majorVersion: 2;
4
+ readonly deployer: "0x8202D2D747784Cb7D48868E44C42C4bf162a70BC";
5
+ readonly pepper: "alphanet";
6
+ readonly executorAddress: "0xc0d693DeEF0A91CE39208676b6da09B822abd199";
7
+ readonly salt: "0x8202d2d747784cb7d48868e44c42c4bf162a70bc000822f11f6e30f933e76d2a";
8
+ readonly chainId: 84532;
9
+ readonly chainName: "Base Sepolia";
10
+ readonly version: {
11
+ readonly major: 2;
12
+ readonly minor: 0;
13
+ readonly patch: 0;
14
+ readonly shortSalt: "976644394";
15
+ };
16
+ readonly blockNumber: 34459258;
17
+ readonly deployDate: "2025-12-02T14:46:46.026Z";
18
+ readonly commit: "v0.6.9-17-g217794f3-dirty";
19
+ readonly active: true;
20
+ readonly includesPreviewFeatures: true;
21
+ }, {
22
+ readonly name: "incoLightningPreview_1_1_0__725458969";
23
+ readonly majorVersion: 1;
24
+ readonly deployer: "0x8202D2D747784Cb7D48868E44C42C4bf162a70BC";
25
+ readonly pepper: "alphanet";
26
+ readonly executorAddress: "0x28676Cd3b10b03b2FDF105Ba280425b45a674F2A";
27
+ readonly salt: "0x8202d2d747784cb7d48868e44c42c4bf162a70bc004dfbe338c6966a22bcca19";
28
+ readonly chainId: 84532;
29
+ readonly chainName: "Base Sepolia";
30
+ readonly version: {
31
+ readonly major: 1;
32
+ readonly minor: 1;
33
+ readonly patch: 0;
34
+ readonly shortSalt: "725458969";
35
+ };
36
+ readonly blockNumber: 34456535;
37
+ readonly deployDate: "2025-12-02T13:16:00.594Z";
38
+ readonly commit: "v0.6.9-16-g428d1837-dirty";
39
+ readonly active: true;
40
+ readonly includesPreviewFeatures: true;
41
+ }, {
2
42
  readonly name: "incoLightningPreview_1_0_2__725458969";
3
43
  readonly majorVersion: 1;
4
44
  readonly deployer: "0x8202D2D747784Cb7D48868E44C42C4bf162a70BC";
@@ -13,8 +53,6 @@ export declare const lightningDeployments: readonly [{
13
53
  readonly patch: 2;
14
54
  readonly shortSalt: "725458969";
15
55
  };
16
- readonly decryptSigner: "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95";
17
- readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
18
56
  readonly blockNumber: 32124925;
19
57
  readonly deployDate: "2025-10-09T13:55:42.997Z";
20
58
  readonly commit: "v0.5.3-10-ga4f2312d";
@@ -34,8 +72,6 @@ export declare const lightningDeployments: readonly [{
34
72
  readonly patch: 2;
35
73
  readonly shortSalt: "904635675";
36
74
  };
37
- readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
38
- readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
39
75
  readonly blockNumber: 3696905;
40
76
  readonly deployDate: "2025-10-03T13:24:44.682Z";
41
77
  readonly commit: "v0.5.3-6-g8db0f27f-dirty";
@@ -55,8 +91,6 @@ export declare const lightningDeployments: readonly [{
55
91
  readonly patch: 0;
56
92
  readonly shortSalt: "904635675";
57
93
  };
58
- readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
59
- readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
60
94
  readonly blockNumber: 3344310;
61
95
  readonly deployDate: "2025-09-29T11:14:02.599Z";
62
96
  readonly commit: "v0.5.1-5-g4135c790-dirty";
@@ -76,8 +110,6 @@ export declare const lightningDeployments: readonly [{
76
110
  readonly patch: 0;
77
111
  readonly shortSalt: "183408998";
78
112
  };
79
- readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
80
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
81
113
  readonly blockNumber: 26296576;
82
114
  readonly deployDate: "2025-05-27T15:57:24.175Z";
83
115
  readonly commit: "v5-3-gec8b6aae-dirty";
@@ -97,8 +129,6 @@ export declare const lightningDeployments: readonly [{
97
129
  readonly patch: 29;
98
130
  readonly shortSalt: "183408998";
99
131
  };
100
- readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
101
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
102
132
  readonly blockNumber: 13464615;
103
133
  readonly deployDate: "2025-04-22T16:01:14.380Z";
104
134
  readonly commit: "v3-28-g93c05a49-dirty";
@@ -118,8 +148,6 @@ export declare const lightningDeployments: readonly [{
118
148
  readonly patch: 29;
119
149
  readonly shortSalt: "183408998";
120
150
  };
121
- readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
122
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
123
151
  readonly blockNumber: 24784654;
124
152
  readonly deployDate: "2025-04-22T16:00:02.028Z";
125
153
  readonly commit: "v3-28-g93c05a49-dirty";
@@ -139,8 +167,6 @@ export declare const lightningDeployments: readonly [{
139
167
  readonly patch: 0;
140
168
  readonly shortSalt: "863421733";
141
169
  };
142
- readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
143
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
144
170
  readonly blockNumber: 25737175;
145
171
  readonly deployDate: "2025-05-14T17:10:44.285Z";
146
172
  readonly commit: "v4-11-g4a1f413a-dirty";
@@ -160,8 +186,6 @@ export declare const lightningDeployments: readonly [{
160
186
  readonly patch: 29;
161
187
  readonly shortSalt: "863421733";
162
188
  };
163
- readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
164
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
165
189
  readonly blockNumber: 25719113;
166
190
  readonly deployDate: "2025-05-14T07:08:39.059Z";
167
191
  readonly commit: "v4";
@@ -181,8 +205,6 @@ export declare const lightningDeployments: readonly [{
181
205
  readonly patch: 1;
182
206
  readonly shortSalt: "297966649";
183
207
  };
184
- readonly decryptSigner: "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95";
185
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
186
208
  readonly blockNumber: 27543410;
187
209
  readonly deployDate: "2025-06-25T12:38:32.856Z";
188
210
  readonly commit: "v5-17-ga03e4b32-dirty";
@@ -202,8 +224,6 @@ export declare const lightningDeployments: readonly [{
202
224
  readonly patch: 0;
203
225
  readonly shortSalt: "297966649";
204
226
  };
205
- readonly decryptSigner: "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95";
206
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
207
227
  readonly blockNumber: 26894782;
208
228
  readonly deployDate: "2025-06-10T12:17:35.790Z";
209
229
  readonly commit: "v5-13-gd6b19c10-dirty";
@@ -223,8 +243,6 @@ export declare const lightningDeployments: readonly [{
223
243
  readonly patch: 1;
224
244
  readonly shortSalt: "340846814";
225
245
  };
226
- readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
227
- readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
228
246
  readonly blockNumber: 1718868;
229
247
  readonly deployDate: "2025-09-10T15:20:25.654Z";
230
248
  readonly commit: "v6-7-gf96f358e-dirty";
@@ -244,8 +262,6 @@ export declare const lightningDeployments: readonly [{
244
262
  readonly patch: 1;
245
263
  readonly shortSalt: "340846814";
246
264
  };
247
- readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
248
- readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
249
265
  readonly blockNumber: 1717229;
250
266
  readonly deployDate: "2025-09-10T14:53:07.218Z";
251
267
  readonly commit: "v6-7-gf96f358e-dirty";
@@ -265,8 +281,6 @@ export declare const lightningDeployments: readonly [{
265
281
  readonly patch: 1;
266
282
  readonly shortSalt: "340846814";
267
283
  };
268
- readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
269
- readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
270
284
  readonly blockNumber: 17365942;
271
285
  readonly deployDate: "2025-08-15T17:35:15.208Z";
272
286
  readonly commit: "v0.2.17-35-g8cca6b4e-dirty";
@@ -286,8 +300,6 @@ export declare const lightningDeployments: readonly [{
286
300
  readonly patch: 0;
287
301
  readonly shortSalt: "340846814";
288
302
  };
289
- readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
290
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
291
303
  readonly blockNumber: 26122863;
292
304
  readonly deployDate: "2025-05-23T15:26:57.031Z";
293
305
  readonly commit: "v5-2-g8957c16b-dirty";
@@ -307,8 +319,6 @@ export declare const lightningDeployments: readonly [{
307
319
  readonly patch: 29;
308
320
  readonly shortSalt: "340846814";
309
321
  };
310
- readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
311
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
312
322
  readonly blockNumber: 13464197;
313
323
  readonly deployDate: "2025-04-22T15:57:26.862Z";
314
324
  readonly commit: "v3-28-g93c05a49-dirty";
@@ -328,8 +338,6 @@ export declare const lightningDeployments: readonly [{
328
338
  readonly patch: 29;
329
339
  readonly shortSalt: "340846814";
330
340
  };
331
- readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
332
- readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
333
341
  readonly blockNumber: 24784527;
334
342
  readonly deployDate: "2025-04-22T15:55:47.828Z";
335
343
  readonly commit: "v3-28-g93c05a49-dirty";