@inco/js 0.6.8 → 0.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -8
- package/dist/cjs/advancedacl/session-key.d.ts +39 -19
- package/dist/cjs/advancedacl/session-key.js +59 -108
- package/dist/cjs/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/cjs/attestedcompute/attested-compute.js +5 -28
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +68 -16
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +108 -66
- package/dist/cjs/attesteddecrypt/types.d.ts +8 -3
- package/dist/cjs/attesteddecrypt/types.js +1 -1
- package/dist/cjs/encryption/encryption.d.ts +8 -10
- package/dist/cjs/encryption/encryption.js +6 -6
- package/dist/cjs/generated/abis/add-two.d.ts +1 -1
- package/dist/cjs/generated/abis/add-two.js +1 -1
- package/dist/cjs/generated/abis/lightning-preview.d.ts +40 -0
- package/dist/cjs/generated/abis/lightning-preview.js +29 -1
- package/dist/cjs/generated/abis/lightning.d.ts +1 -1
- package/dist/cjs/generated/abis/lightning.js +1 -1
- package/dist/cjs/generated/abis/verifier.d.ts +126 -67
- package/dist/cjs/generated/abis/verifier.js +108 -54
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +87 -132
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +21 -27
- package/dist/cjs/generated/lightning.d.ts +40 -32
- package/dist/cjs/generated/lightning.js +43 -33
- package/dist/cjs/generated/local-node.d.ts +11 -11
- package/dist/cjs/generated/local-node.js +28 -12
- package/dist/cjs/kms/client.d.ts +8 -4
- package/dist/cjs/kms/client.js +9 -4
- package/dist/cjs/kms/quorumClient.d.ts +58 -0
- package/dist/cjs/kms/quorumClient.js +378 -0
- package/dist/cjs/kms/thresholdPromises.d.ts +7 -0
- package/dist/cjs/kms/thresholdPromises.js +52 -0
- package/dist/cjs/lite/deployments.d.ts +20 -2
- package/dist/cjs/lite/deployments.js +1 -1
- package/dist/cjs/lite/index.d.ts +1 -2
- package/dist/cjs/lite/index.js +1 -2
- package/dist/cjs/lite/lightning.d.ts +109 -77
- package/dist/cjs/lite/lightning.js +279 -112
- package/dist/cjs/local/local-node.d.ts +1 -2
- package/dist/cjs/local/local-node.js +2 -3
- package/dist/cjs/test/mocks.d.ts +15 -0
- package/dist/cjs/test/mocks.js +45 -0
- package/dist/cjs/viem.d.ts +1 -1
- package/dist/esm/advancedacl/session-key.d.ts +39 -19
- package/dist/esm/advancedacl/session-key.js +52 -100
- package/dist/esm/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/esm/attestedcompute/attested-compute.js +6 -29
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +68 -16
- package/dist/esm/attesteddecrypt/attested-decrypt.js +109 -68
- package/dist/esm/attesteddecrypt/types.d.ts +8 -3
- package/dist/esm/attesteddecrypt/types.js +1 -1
- package/dist/esm/encryption/encryption.d.ts +8 -10
- package/dist/esm/encryption/encryption.js +6 -6
- package/dist/esm/generated/abis/add-two.d.ts +1 -1
- package/dist/esm/generated/abis/add-two.js +1 -1
- package/dist/esm/generated/abis/lightning-preview.d.ts +40 -0
- package/dist/esm/generated/abis/lightning-preview.js +29 -1
- package/dist/esm/generated/abis/lightning.d.ts +1 -1
- package/dist/esm/generated/abis/lightning.js +1 -1
- package/dist/esm/generated/abis/verifier.d.ts +126 -67
- package/dist/esm/generated/abis/verifier.js +108 -54
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +87 -132
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +19 -25
- package/dist/esm/generated/lightning.d.ts +40 -32
- package/dist/esm/generated/lightning.js +43 -33
- package/dist/esm/generated/local-node.d.ts +11 -11
- package/dist/esm/generated/local-node.js +28 -12
- package/dist/esm/kms/client.d.ts +8 -4
- package/dist/esm/kms/client.js +8 -4
- package/dist/esm/kms/quorumClient.d.ts +58 -0
- package/dist/esm/kms/quorumClient.js +374 -0
- package/dist/esm/kms/thresholdPromises.d.ts +7 -0
- package/dist/esm/kms/thresholdPromises.js +49 -0
- package/dist/esm/lite/deployments.d.ts +20 -2
- package/dist/esm/lite/deployments.js +1 -1
- package/dist/esm/lite/index.d.ts +1 -2
- package/dist/esm/lite/index.js +1 -2
- package/dist/esm/lite/lightning.d.ts +109 -77
- package/dist/esm/lite/lightning.js +278 -111
- package/dist/esm/local/local-node.d.ts +1 -2
- package/dist/esm/local/local-node.js +2 -3
- package/dist/esm/test/mocks.d.ts +15 -0
- package/dist/esm/test/mocks.js +39 -0
- package/dist/esm/viem.d.ts +1 -1
- package/dist/types/advancedacl/session-key.d.ts +39 -19
- package/dist/types/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +68 -16
- package/dist/types/attesteddecrypt/types.d.ts +8 -3
- package/dist/types/encryption/encryption.d.ts +8 -10
- package/dist/types/generated/abis/add-two.d.ts +1 -1
- package/dist/types/generated/abis/lightning-preview.d.ts +40 -0
- package/dist/types/generated/abis/lightning.d.ts +1 -1
- package/dist/types/generated/abis/verifier.d.ts +126 -67
- package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +87 -132
- package/dist/types/generated/lightning.d.ts +40 -32
- package/dist/types/generated/local-node.d.ts +11 -11
- package/dist/types/kms/client.d.ts +8 -4
- package/dist/types/kms/quorumClient.d.ts +58 -0
- package/dist/types/kms/thresholdPromises.d.ts +7 -0
- package/dist/types/lite/deployments.d.ts +20 -2
- package/dist/types/lite/index.d.ts +1 -2
- package/dist/types/lite/lightning.d.ts +109 -77
- package/dist/types/local/local-node.d.ts +1 -2
- package/dist/types/test/mocks.d.ts +15 -0
- package/dist/types/viem.d.ts +1 -1
- package/package.json +3 -3
- package/dist/cjs/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/cjs/attestedreveal/attested-reveal.js +0 -67
- package/dist/cjs/attestedreveal/index.d.ts +0 -1
- package/dist/cjs/attestedreveal/index.js +0 -18
- package/dist/cjs/attestedreveal/types.d.ts +0 -7
- package/dist/cjs/attestedreveal/types.js +0 -16
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.js +0 -118
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.js +0 -136
- package/dist/cjs/lite/reencrypt.d.ts +0 -23
- package/dist/cjs/lite/reencrypt.js +0 -131
- package/dist/esm/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/esm/attestedreveal/attested-reveal.js +0 -64
- package/dist/esm/attestedreveal/index.d.ts +0 -1
- package/dist/esm/attestedreveal/index.js +0 -2
- package/dist/esm/attestedreveal/types.d.ts +0 -7
- package/dist/esm/attestedreveal/types.js +0 -12
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.js +0 -115
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.js +0 -133
- package/dist/esm/lite/reencrypt.d.ts +0 -23
- package/dist/esm/lite/reencrypt.js +0 -122
- package/dist/types/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/types/attestedreveal/index.d.ts +0 -1
- package/dist/types/attestedreveal/types.d.ts +0 -7
- package/dist/types/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/types/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/types/lite/reencrypt.d.ts +0 -23
|
@@ -1,5 +1,4 @@
|
|
|
1
1
|
import type { GenEnum, GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv2";
|
|
2
|
-
import type { TypedCiphertext } from "../../../fhe/v1/types_pb";
|
|
3
2
|
import type { ACLProof, ECIESKeyset, HandleWithProof } from "./types_pb";
|
|
4
3
|
import type { Message } from "@bufbuild/protobuf";
|
|
5
4
|
/**
|
|
@@ -43,113 +42,6 @@ export type KeyResponse = Message<"inco.kms.lite.v1.KeyResponse"> & {
|
|
|
43
42
|
* Use `create(KeyResponseSchema)` to create a new message.
|
|
44
43
|
*/
|
|
45
44
|
export declare const KeyResponseSchema: GenMessage<KeyResponse>;
|
|
46
|
-
/**
|
|
47
|
-
* ReencryptRequest is the request type for the KmsService/Reencrypt RPC method.
|
|
48
|
-
*
|
|
49
|
-
* @generated from message inco.kms.lite.v1.ReencryptRequest
|
|
50
|
-
*/
|
|
51
|
-
export type ReencryptRequest = Message<"inco.kms.lite.v1.ReencryptRequest"> & {
|
|
52
|
-
/**
|
|
53
|
-
* user_address is the Ethereum address of the user who requested the
|
|
54
|
-
* reencryption, prefixed with 0x.
|
|
55
|
-
*
|
|
56
|
-
* @generated from field: string user_address = 1;
|
|
57
|
-
*/
|
|
58
|
-
userAddress: string;
|
|
59
|
-
/**
|
|
60
|
-
* ephemeral_pub_key is the encoding of the user's public ephemeral
|
|
61
|
-
* encryption key (secp256k1), generated by the user for this reencryption
|
|
62
|
-
* request. It is encoded in its 33-byte compressed format.
|
|
63
|
-
*
|
|
64
|
-
* @generated from field: bytes ephemeral_pub_key = 2;
|
|
65
|
-
*/
|
|
66
|
-
ephemeralPubKey: Uint8Array;
|
|
67
|
-
/**
|
|
68
|
-
* eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
|
|
69
|
-
* `user_address` (note that we only give a JSON representation for the sake of
|
|
70
|
-
* readability, but the actual signed data is defined in the EIP-712 spec):
|
|
71
|
-
*
|
|
72
|
-
* ```json
|
|
73
|
-
* {
|
|
74
|
-
* "types": {
|
|
75
|
-
* "EIP712Domain": [
|
|
76
|
-
* { "name": "name", "type": "string" },
|
|
77
|
-
* { "name": "version", "type": "string" },
|
|
78
|
-
* { "name": "chainId", "type": "uint256" }
|
|
79
|
-
* ],
|
|
80
|
-
* "ReencryptionRequest": [
|
|
81
|
-
* { "name": "publicKey", "type": "bytes" }
|
|
82
|
-
* ]
|
|
83
|
-
* },
|
|
84
|
-
* "primaryType": "ReencryptionRequest",
|
|
85
|
-
* "domain": {
|
|
86
|
-
* "name": "IncoReencryption",
|
|
87
|
-
* "version": "0.1.0",
|
|
88
|
-
* "chainId": "<host_chain_id>",
|
|
89
|
-
* "verifyingContract": "<acl_address>",
|
|
90
|
-
* "salt": "0x0000000000000000000000000000000000000000000000000000000000000000"
|
|
91
|
-
* },
|
|
92
|
-
* "message": {
|
|
93
|
-
* "publicKey": "<ephemeral_pub_key>"
|
|
94
|
-
* }
|
|
95
|
-
* }
|
|
96
|
-
* ```
|
|
97
|
-
*
|
|
98
|
-
* @generated from field: bytes eip712_signature = 3;
|
|
99
|
-
*/
|
|
100
|
-
eip712Signature: Uint8Array;
|
|
101
|
-
/**
|
|
102
|
-
* handles_with_proofs is the list of handles of the ciphertexts to reencrypt,
|
|
103
|
-
* along with the ACL proof that the user has access to the ciphertext.
|
|
104
|
-
*
|
|
105
|
-
* @generated from field: repeated inco.kms.lite.v1.HandleWithProof handles_with_proofs = 4;
|
|
106
|
-
*/
|
|
107
|
-
handlesWithProofs: HandleWithProof[];
|
|
108
|
-
};
|
|
109
|
-
/**
|
|
110
|
-
* Describes the message inco.kms.lite.v1.ReencryptRequest.
|
|
111
|
-
* Use `create(ReencryptRequestSchema)` to create a new message.
|
|
112
|
-
*/
|
|
113
|
-
export declare const ReencryptRequestSchema: GenMessage<ReencryptRequest>;
|
|
114
|
-
/**
|
|
115
|
-
* ReencryptResponse is the response type for the KmsService/Reencrypt RPC method.
|
|
116
|
-
*
|
|
117
|
-
* @generated from message inco.kms.lite.v1.ReencryptResponse
|
|
118
|
-
*/
|
|
119
|
-
export type ReencryptResponse = Message<"inco.kms.lite.v1.ReencryptResponse"> & {
|
|
120
|
-
/**
|
|
121
|
-
* payload is the reencryption response payload.
|
|
122
|
-
*
|
|
123
|
-
* @generated from field: inco.kms.lite.v1.ReencryptionResponsePayload payload = 1;
|
|
124
|
-
*/
|
|
125
|
-
payload?: ReencryptionResponsePayload;
|
|
126
|
-
};
|
|
127
|
-
/**
|
|
128
|
-
* Describes the message inco.kms.lite.v1.ReencryptResponse.
|
|
129
|
-
* Use `create(ReencryptResponseSchema)` to create a new message.
|
|
130
|
-
*/
|
|
131
|
-
export declare const ReencryptResponseSchema: GenMessage<ReencryptResponse>;
|
|
132
|
-
/**
|
|
133
|
-
* ReencryptionResponsePayload is the payload of the ReencryptResponse,
|
|
134
|
-
* separated out because it is signed by the KMS using its signing key.
|
|
135
|
-
*
|
|
136
|
-
* @generated from message inco.kms.lite.v1.ReencryptionResponsePayload
|
|
137
|
-
*/
|
|
138
|
-
export type ReencryptionResponsePayload = Message<"inco.kms.lite.v1.ReencryptionResponsePayload"> & {
|
|
139
|
-
/**
|
|
140
|
-
* user_ciphertexts is the list of ciphertexts that were reencrypted to the
|
|
141
|
-
* user's public key. Each ciphertext at index `i` corresponds to the ciphertext
|
|
142
|
-
* at index `i` in the `ReencryptRequest`.
|
|
143
|
-
*
|
|
144
|
-
* @generated from field: repeated inco.fhe.v1.TypedCiphertext user_ciphertexts = 1;
|
|
145
|
-
*/
|
|
146
|
-
userCiphertexts: TypedCiphertext[];
|
|
147
|
-
};
|
|
148
|
-
/**
|
|
149
|
-
* Describes the message inco.kms.lite.v1.ReencryptionResponsePayload.
|
|
150
|
-
* Use `create(ReencryptionResponsePayloadSchema)` to create a new message.
|
|
151
|
-
*/
|
|
152
|
-
export declare const ReencryptionResponsePayloadSchema: GenMessage<ReencryptionResponsePayload>;
|
|
153
45
|
/**
|
|
154
46
|
* AttestedDecryptRequest is the request type for the KmsService/AttestedDecrypt RPC method.
|
|
155
47
|
*
|
|
@@ -163,10 +55,21 @@ export type AttestedDecryptRequest = Message<"inco.kms.lite.v1.AttestedDecryptRe
|
|
|
163
55
|
* @generated from field: string user_address = 1;
|
|
164
56
|
*/
|
|
165
57
|
userAddress: string;
|
|
58
|
+
/**
|
|
59
|
+
* reencrypt_pub_key is the encoding of the user's public
|
|
60
|
+
* encryption key (secp256k1) used to reencrypt the result for.
|
|
61
|
+
* It is encoded in its 33-byte compressed format.
|
|
62
|
+
* If empty, the KMS will return plaintext decryption instead of reencryption.
|
|
63
|
+
*
|
|
64
|
+
* @generated from field: bytes reencrypt_pub_key = 2;
|
|
65
|
+
*/
|
|
66
|
+
reencryptPubKey: Uint8Array;
|
|
166
67
|
/**
|
|
167
68
|
* eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
|
|
168
69
|
* `user_address` (note that we only give a JSON representation for the sake of
|
|
169
|
-
* readability, but the actual signed data is defined in the EIP-712 spec):
|
|
70
|
+
* readability, but the actual signed data is defined in the EIP-712 spec) where:
|
|
71
|
+
* handles - list of 0x prefixed handles to decrypt
|
|
72
|
+
* publicKey - 0x prefixed reencrypt_pub_key (if any). "0x" otherwise if empty.
|
|
170
73
|
*
|
|
171
74
|
* ```json
|
|
172
75
|
* {
|
|
@@ -177,22 +80,24 @@ export type AttestedDecryptRequest = Message<"inco.kms.lite.v1.AttestedDecryptRe
|
|
|
177
80
|
* { "name": "chainId", "type": "uint256" }
|
|
178
81
|
* ],
|
|
179
82
|
* "AttestedDecryptRequest": [
|
|
180
|
-
* { "name": "handles", "type": "bytes32[]" }
|
|
83
|
+
* { "name": "handles", "type": "bytes32[]" },
|
|
84
|
+
* { "name": "publicKey", "type": "bytes" },
|
|
181
85
|
* ]
|
|
182
86
|
* },
|
|
183
87
|
* "primaryType": "AttestedDecryptRequest",
|
|
184
88
|
* "domain": {
|
|
185
89
|
* "name": "IncoAttestedDecrypt",
|
|
186
|
-
* "version": "
|
|
90
|
+
* "version": "1",
|
|
187
91
|
* "chainId": "<host_chain_id>",
|
|
188
92
|
* },
|
|
189
93
|
* "message": {
|
|
190
|
-
* "handles": ["<handle1>", "<handle2>", ...]
|
|
94
|
+
* "handles": ["<handle1>", "<handle2>", ...],
|
|
95
|
+
* "publicKey": "0x<reencrypt_pub_key>"
|
|
191
96
|
* }
|
|
192
97
|
* }
|
|
193
98
|
* ```
|
|
194
99
|
*
|
|
195
|
-
* @generated from field: bytes eip712_signature =
|
|
100
|
+
* @generated from field: bytes eip712_signature = 3;
|
|
196
101
|
*/
|
|
197
102
|
eip712Signature: Uint8Array;
|
|
198
103
|
/**
|
|
@@ -200,7 +105,7 @@ export type AttestedDecryptRequest = Message<"inco.kms.lite.v1.AttestedDecryptRe
|
|
|
200
105
|
* Either the user_address or sharer must have ACL access to the handles for the attested
|
|
201
106
|
* decryption to succeed.
|
|
202
107
|
*
|
|
203
|
-
* @generated from field: repeated inco.kms.lite.v1.HandleWithProof handles_with_proofs =
|
|
108
|
+
* @generated from field: repeated inco.kms.lite.v1.HandleWithProof handles_with_proofs = 4;
|
|
204
109
|
*/
|
|
205
110
|
handlesWithProofs: HandleWithProof[];
|
|
206
111
|
};
|
|
@@ -263,7 +168,7 @@ export type AttestedComputeRequest = Message<"inco.kms.lite.v1.AttestedComputeRe
|
|
|
263
168
|
* "primaryType": "AttestedComputeRequest",
|
|
264
169
|
* "domain": {
|
|
265
170
|
* "name": "IncoAttestedCompute",
|
|
266
|
-
* "version": "
|
|
171
|
+
* "version": "1",
|
|
267
172
|
* "chainId": "<host_chain_id>",
|
|
268
173
|
* },
|
|
269
174
|
* "message": {
|
|
@@ -367,6 +272,49 @@ export type AttestedComputeResponse = Message<"inco.kms.lite.v1.AttestedComputeR
|
|
|
367
272
|
* Use `create(AttestedComputeResponseSchema)` to create a new message.
|
|
368
273
|
*/
|
|
369
274
|
export declare const AttestedComputeResponseSchema: GenMessage<AttestedComputeResponse>;
|
|
275
|
+
/**
|
|
276
|
+
* Plaintext contains the decrypted plaintext value.
|
|
277
|
+
*
|
|
278
|
+
* @generated from message inco.kms.lite.v1.Plaintext
|
|
279
|
+
*/
|
|
280
|
+
export type Plaintext = Message<"inco.kms.lite.v1.Plaintext"> & {
|
|
281
|
+
/**
|
|
282
|
+
* value is the decrypted plaintext value as a 32-byte word.
|
|
283
|
+
*
|
|
284
|
+
* @generated from field: bytes value = 1;
|
|
285
|
+
*/
|
|
286
|
+
value: Uint8Array;
|
|
287
|
+
};
|
|
288
|
+
/**
|
|
289
|
+
* Describes the message inco.kms.lite.v1.Plaintext.
|
|
290
|
+
* Use `create(PlaintextSchema)` to create a new message.
|
|
291
|
+
*/
|
|
292
|
+
export declare const PlaintextSchema: GenMessage<Plaintext>;
|
|
293
|
+
/**
|
|
294
|
+
* Reencryption contains the reencrypted ciphertext value.
|
|
295
|
+
*
|
|
296
|
+
* @generated from message inco.kms.lite.v1.Reencryption
|
|
297
|
+
*/
|
|
298
|
+
export type Reencryption = Message<"inco.kms.lite.v1.Reencryption"> & {
|
|
299
|
+
/**
|
|
300
|
+
* The ciphertext that was reencrypted to the user's public key.
|
|
301
|
+
*
|
|
302
|
+
* @generated from field: bytes user_ciphertext = 1;
|
|
303
|
+
*/
|
|
304
|
+
userCiphertext: Uint8Array;
|
|
305
|
+
/**
|
|
306
|
+
* The handle of the ciphertext, encoded as a 0x-prefixed hex string, any case.
|
|
307
|
+
* TODO scalar declaration.
|
|
308
|
+
*
|
|
309
|
+
* @generated from field: string handle = 2;
|
|
310
|
+
*/
|
|
311
|
+
handle: string;
|
|
312
|
+
};
|
|
313
|
+
/**
|
|
314
|
+
* Describes the message inco.kms.lite.v1.Reencryption.
|
|
315
|
+
* Use `create(ReencryptionSchema)` to create a new message.
|
|
316
|
+
*/
|
|
317
|
+
export declare const ReencryptionSchema: GenMessage<Reencryption>;
|
|
370
318
|
/**
|
|
371
319
|
* DecryptionAttestation contains the attestation for the decryption of a single handle.
|
|
372
320
|
*
|
|
@@ -380,11 +328,28 @@ export type DecryptionAttestation = Message<"inco.kms.lite.v1.DecryptionAttestat
|
|
|
380
328
|
*/
|
|
381
329
|
handle: string;
|
|
382
330
|
/**
|
|
383
|
-
*
|
|
384
|
-
|
|
385
|
-
|
|
386
|
-
|
|
387
|
-
|
|
331
|
+
* @generated from oneof inco.kms.lite.v1.DecryptionAttestation.value
|
|
332
|
+
*/
|
|
333
|
+
value: {
|
|
334
|
+
/**
|
|
335
|
+
* Returns plaintext if reencrypt_pub_key was empty in the request
|
|
336
|
+
*
|
|
337
|
+
* @generated from field: inco.kms.lite.v1.Plaintext plaintext = 2;
|
|
338
|
+
*/
|
|
339
|
+
value: Plaintext;
|
|
340
|
+
case: "plaintext";
|
|
341
|
+
} | {
|
|
342
|
+
/**
|
|
343
|
+
* Returns encrypted ciphertext if reencrypt_pub_key was set in the request
|
|
344
|
+
*
|
|
345
|
+
* @generated from field: inco.kms.lite.v1.Reencryption reencryption = 3;
|
|
346
|
+
*/
|
|
347
|
+
value: Reencryption;
|
|
348
|
+
case: "reencryption";
|
|
349
|
+
} | {
|
|
350
|
+
case: undefined;
|
|
351
|
+
value?: undefined;
|
|
352
|
+
};
|
|
388
353
|
/**
|
|
389
354
|
* signature is the attestation from the covalidator for the (handle,plaintext) pair.
|
|
390
355
|
* This signature will be verified on the host chain.
|
|
@@ -421,7 +386,7 @@ export type DecryptionAttestation = Message<"inco.kms.lite.v1.DecryptionAttestat
|
|
|
421
386
|
* }
|
|
422
387
|
* ```
|
|
423
388
|
*
|
|
424
|
-
* @generated from field: bytes signature =
|
|
389
|
+
* @generated from field: bytes signature = 4;
|
|
425
390
|
*/
|
|
426
391
|
signature: Uint8Array;
|
|
427
392
|
};
|
|
@@ -536,20 +501,10 @@ export declare const KmsService: GenService<{
|
|
|
536
501
|
input: typeof KeyRequestSchema;
|
|
537
502
|
output: typeof KeyResponseSchema;
|
|
538
503
|
};
|
|
539
|
-
/**
|
|
540
|
-
* Reencrypt reencrypts a ciphertext using the ephemeral public key of the
|
|
541
|
-
* user.
|
|
542
|
-
*
|
|
543
|
-
* @generated from rpc inco.kms.lite.v1.KmsService.Reencrypt
|
|
544
|
-
*/
|
|
545
|
-
reencrypt: {
|
|
546
|
-
methodKind: "unary";
|
|
547
|
-
input: typeof ReencryptRequestSchema;
|
|
548
|
-
output: typeof ReencryptResponseSchema;
|
|
549
|
-
};
|
|
550
504
|
/**
|
|
551
505
|
* AttestedDecrypt decrypts multiple ciphertexts and provides an attestation
|
|
552
506
|
* that the decryption was performed correctly.
|
|
507
|
+
* Can optionally reencrypt the result of the decryption to a desired public key.
|
|
553
508
|
*
|
|
554
509
|
* @generated from rpc inco.kms.lite.v1.KmsService.AttestedDecrypt
|
|
555
510
|
*/
|
|
@@ -2,12 +2,11 @@
|
|
|
2
2
|
// @generated from file inco/kms/lite/v1/kms_service.proto (package inco.kms.lite.v1, syntax proto3)
|
|
3
3
|
/* eslint-disable */
|
|
4
4
|
import { enumDesc, fileDesc, messageDesc, serviceDesc } from "@bufbuild/protobuf/codegenv2";
|
|
5
|
-
import { file_inco_fhe_v1_types } from "../../../fhe/v1/types_pb";
|
|
6
5
|
import { file_inco_kms_lite_v1_types } from "./types_pb";
|
|
7
6
|
/**
|
|
8
7
|
* Describes the file inco/kms/lite/v1/kms_service.proto.
|
|
9
8
|
*/
|
|
10
|
-
export const file_inco_kms_lite_v1_kms_service = /*@__PURE__*/ fileDesc("
|
|
9
|
+
export const file_inco_kms_lite_v1_kms_service = /*@__PURE__*/ fileDesc("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", [file_inco_kms_lite_v1_types]);
|
|
11
10
|
/**
|
|
12
11
|
* Describes the message inco.kms.lite.v1.KeyRequest.
|
|
13
12
|
* Use `create(KeyRequestSchema)` to create a new message.
|
|
@@ -18,56 +17,51 @@ export const KeyRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_
|
|
|
18
17
|
* Use `create(KeyResponseSchema)` to create a new message.
|
|
19
18
|
*/
|
|
20
19
|
export const KeyResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 1);
|
|
21
|
-
/**
|
|
22
|
-
* Describes the message inco.kms.lite.v1.ReencryptRequest.
|
|
23
|
-
* Use `create(ReencryptRequestSchema)` to create a new message.
|
|
24
|
-
*/
|
|
25
|
-
export const ReencryptRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 2);
|
|
26
|
-
/**
|
|
27
|
-
* Describes the message inco.kms.lite.v1.ReencryptResponse.
|
|
28
|
-
* Use `create(ReencryptResponseSchema)` to create a new message.
|
|
29
|
-
*/
|
|
30
|
-
export const ReencryptResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 3);
|
|
31
|
-
/**
|
|
32
|
-
* Describes the message inco.kms.lite.v1.ReencryptionResponsePayload.
|
|
33
|
-
* Use `create(ReencryptionResponsePayloadSchema)` to create a new message.
|
|
34
|
-
*/
|
|
35
|
-
export const ReencryptionResponsePayloadSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 4);
|
|
36
20
|
/**
|
|
37
21
|
* Describes the message inco.kms.lite.v1.AttestedDecryptRequest.
|
|
38
22
|
* Use `create(AttestedDecryptRequestSchema)` to create a new message.
|
|
39
23
|
*/
|
|
40
|
-
export const AttestedDecryptRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service,
|
|
24
|
+
export const AttestedDecryptRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 2);
|
|
41
25
|
/**
|
|
42
26
|
* Describes the message inco.kms.lite.v1.AttestedRevealRequest.
|
|
43
27
|
* Use `create(AttestedRevealRequestSchema)` to create a new message.
|
|
44
28
|
*/
|
|
45
|
-
export const AttestedRevealRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service,
|
|
29
|
+
export const AttestedRevealRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 3);
|
|
46
30
|
/**
|
|
47
31
|
* Describes the message inco.kms.lite.v1.AttestedComputeRequest.
|
|
48
32
|
* Use `create(AttestedComputeRequestSchema)` to create a new message.
|
|
49
33
|
*/
|
|
50
|
-
export const AttestedComputeRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service,
|
|
34
|
+
export const AttestedComputeRequestSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 4);
|
|
51
35
|
/**
|
|
52
36
|
* Describes the message inco.kms.lite.v1.AttestedDecryptResponse.
|
|
53
37
|
* Use `create(AttestedDecryptResponseSchema)` to create a new message.
|
|
54
38
|
*/
|
|
55
|
-
export const AttestedDecryptResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service,
|
|
39
|
+
export const AttestedDecryptResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 5);
|
|
56
40
|
/**
|
|
57
41
|
* Describes the message inco.kms.lite.v1.AttestedRevealResponse.
|
|
58
42
|
* Use `create(AttestedRevealResponseSchema)` to create a new message.
|
|
59
43
|
*/
|
|
60
|
-
export const AttestedRevealResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service,
|
|
44
|
+
export const AttestedRevealResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 6);
|
|
61
45
|
/**
|
|
62
46
|
* Describes the message inco.kms.lite.v1.AttestedComputeResponse.
|
|
63
47
|
* Use `create(AttestedComputeResponseSchema)` to create a new message.
|
|
64
48
|
*/
|
|
65
|
-
export const AttestedComputeResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service,
|
|
49
|
+
export const AttestedComputeResponseSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 7);
|
|
50
|
+
/**
|
|
51
|
+
* Describes the message inco.kms.lite.v1.Plaintext.
|
|
52
|
+
* Use `create(PlaintextSchema)` to create a new message.
|
|
53
|
+
*/
|
|
54
|
+
export const PlaintextSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 8);
|
|
55
|
+
/**
|
|
56
|
+
* Describes the message inco.kms.lite.v1.Reencryption.
|
|
57
|
+
* Use `create(ReencryptionSchema)` to create a new message.
|
|
58
|
+
*/
|
|
59
|
+
export const ReencryptionSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 9);
|
|
66
60
|
/**
|
|
67
61
|
* Describes the message inco.kms.lite.v1.DecryptionAttestation.
|
|
68
62
|
* Use `create(DecryptionAttestationSchema)` to create a new message.
|
|
69
63
|
*/
|
|
70
|
-
export const DecryptionAttestationSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service,
|
|
64
|
+
export const DecryptionAttestationSchema = /*@__PURE__*/ messageDesc(file_inco_kms_lite_v1_kms_service, 10);
|
|
71
65
|
/**
|
|
72
66
|
* @generated from enum inco.kms.lite.v1.SupportedScalarBinaryOp
|
|
73
67
|
*/
|
|
@@ -165,4 +159,4 @@ export const SupportedScalarBinaryOpSchema = /*@__PURE__*/ enumDesc(file_inco_km
|
|
|
165
159
|
* @generated from service inco.kms.lite.v1.KmsService
|
|
166
160
|
*/
|
|
167
161
|
export const KmsService = /*@__PURE__*/ serviceDesc(file_inco_kms_lite_v1_kms_service, 0);
|
|
168
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
162
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,4 +1,44 @@
|
|
|
1
1
|
export declare const lightningDeployments: readonly [{
|
|
2
|
+
readonly name: "incoLightningPreview_2_0_0__976644394";
|
|
3
|
+
readonly majorVersion: 2;
|
|
4
|
+
readonly deployer: "0x8202D2D747784Cb7D48868E44C42C4bf162a70BC";
|
|
5
|
+
readonly pepper: "alphanet";
|
|
6
|
+
readonly executorAddress: "0xc0d693DeEF0A91CE39208676b6da09B822abd199";
|
|
7
|
+
readonly salt: "0x8202d2d747784cb7d48868e44c42c4bf162a70bc000822f11f6e30f933e76d2a";
|
|
8
|
+
readonly chainId: 84532;
|
|
9
|
+
readonly chainName: "Base Sepolia";
|
|
10
|
+
readonly version: {
|
|
11
|
+
readonly major: 2;
|
|
12
|
+
readonly minor: 0;
|
|
13
|
+
readonly patch: 0;
|
|
14
|
+
readonly shortSalt: "976644394";
|
|
15
|
+
};
|
|
16
|
+
readonly blockNumber: 34459258;
|
|
17
|
+
readonly deployDate: "2025-12-02T14:46:46.026Z";
|
|
18
|
+
readonly commit: "v0.6.9-17-g217794f3-dirty";
|
|
19
|
+
readonly active: true;
|
|
20
|
+
readonly includesPreviewFeatures: true;
|
|
21
|
+
}, {
|
|
22
|
+
readonly name: "incoLightningPreview_1_1_0__725458969";
|
|
23
|
+
readonly majorVersion: 1;
|
|
24
|
+
readonly deployer: "0x8202D2D747784Cb7D48868E44C42C4bf162a70BC";
|
|
25
|
+
readonly pepper: "alphanet";
|
|
26
|
+
readonly executorAddress: "0x28676Cd3b10b03b2FDF105Ba280425b45a674F2A";
|
|
27
|
+
readonly salt: "0x8202d2d747784cb7d48868e44c42c4bf162a70bc004dfbe338c6966a22bcca19";
|
|
28
|
+
readonly chainId: 84532;
|
|
29
|
+
readonly chainName: "Base Sepolia";
|
|
30
|
+
readonly version: {
|
|
31
|
+
readonly major: 1;
|
|
32
|
+
readonly minor: 1;
|
|
33
|
+
readonly patch: 0;
|
|
34
|
+
readonly shortSalt: "725458969";
|
|
35
|
+
};
|
|
36
|
+
readonly blockNumber: 34456535;
|
|
37
|
+
readonly deployDate: "2025-12-02T13:16:00.594Z";
|
|
38
|
+
readonly commit: "v0.6.9-16-g428d1837-dirty";
|
|
39
|
+
readonly active: true;
|
|
40
|
+
readonly includesPreviewFeatures: true;
|
|
41
|
+
}, {
|
|
2
42
|
readonly name: "incoLightningPreview_1_0_2__725458969";
|
|
3
43
|
readonly majorVersion: 1;
|
|
4
44
|
readonly deployer: "0x8202D2D747784Cb7D48868E44C42C4bf162a70BC";
|
|
@@ -13,8 +53,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
13
53
|
readonly patch: 2;
|
|
14
54
|
readonly shortSalt: "725458969";
|
|
15
55
|
};
|
|
16
|
-
readonly decryptSigner: "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95";
|
|
17
|
-
readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
|
|
18
56
|
readonly blockNumber: 32124925;
|
|
19
57
|
readonly deployDate: "2025-10-09T13:55:42.997Z";
|
|
20
58
|
readonly commit: "v0.5.3-10-ga4f2312d";
|
|
@@ -34,8 +72,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
34
72
|
readonly patch: 2;
|
|
35
73
|
readonly shortSalt: "904635675";
|
|
36
74
|
};
|
|
37
|
-
readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
|
|
38
|
-
readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
|
|
39
75
|
readonly blockNumber: 3696905;
|
|
40
76
|
readonly deployDate: "2025-10-03T13:24:44.682Z";
|
|
41
77
|
readonly commit: "v0.5.3-6-g8db0f27f-dirty";
|
|
@@ -55,8 +91,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
55
91
|
readonly patch: 0;
|
|
56
92
|
readonly shortSalt: "904635675";
|
|
57
93
|
};
|
|
58
|
-
readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
|
|
59
|
-
readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
|
|
60
94
|
readonly blockNumber: 3344310;
|
|
61
95
|
readonly deployDate: "2025-09-29T11:14:02.599Z";
|
|
62
96
|
readonly commit: "v0.5.1-5-g4135c790-dirty";
|
|
@@ -76,8 +110,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
76
110
|
readonly patch: 0;
|
|
77
111
|
readonly shortSalt: "183408998";
|
|
78
112
|
};
|
|
79
|
-
readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
|
|
80
|
-
readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
|
|
81
113
|
readonly blockNumber: 26296576;
|
|
82
114
|
readonly deployDate: "2025-05-27T15:57:24.175Z";
|
|
83
115
|
readonly commit: "v5-3-gec8b6aae-dirty";
|
|
@@ -97,8 +129,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
97
129
|
readonly patch: 29;
|
|
98
130
|
readonly shortSalt: "183408998";
|
|
99
131
|
};
|
|
100
|
-
readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
|
|
101
|
-
readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
|
|
102
132
|
readonly blockNumber: 13464615;
|
|
103
133
|
readonly deployDate: "2025-04-22T16:01:14.380Z";
|
|
104
134
|
readonly commit: "v3-28-g93c05a49-dirty";
|
|
@@ -118,8 +148,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
118
148
|
readonly patch: 29;
|
|
119
149
|
readonly shortSalt: "183408998";
|
|
120
150
|
};
|
|
121
|
-
readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
|
|
122
|
-
readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
|
|
123
151
|
readonly blockNumber: 24784654;
|
|
124
152
|
readonly deployDate: "2025-04-22T16:00:02.028Z";
|
|
125
153
|
readonly commit: "v3-28-g93c05a49-dirty";
|
|
@@ -139,8 +167,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
139
167
|
readonly patch: 0;
|
|
140
168
|
readonly shortSalt: "863421733";
|
|
141
169
|
};
|
|
142
|
-
readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
|
|
143
|
-
readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
|
|
144
170
|
readonly blockNumber: 25737175;
|
|
145
171
|
readonly deployDate: "2025-05-14T17:10:44.285Z";
|
|
146
172
|
readonly commit: "v4-11-g4a1f413a-dirty";
|
|
@@ -160,8 +186,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
160
186
|
readonly patch: 29;
|
|
161
187
|
readonly shortSalt: "863421733";
|
|
162
188
|
};
|
|
163
|
-
readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
|
|
164
|
-
readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
|
|
165
189
|
readonly blockNumber: 25719113;
|
|
166
190
|
readonly deployDate: "2025-05-14T07:08:39.059Z";
|
|
167
191
|
readonly commit: "v4";
|
|
@@ -181,8 +205,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
181
205
|
readonly patch: 1;
|
|
182
206
|
readonly shortSalt: "297966649";
|
|
183
207
|
};
|
|
184
|
-
readonly decryptSigner: "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95";
|
|
185
|
-
readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
|
|
186
208
|
readonly blockNumber: 27543410;
|
|
187
209
|
readonly deployDate: "2025-06-25T12:38:32.856Z";
|
|
188
210
|
readonly commit: "v5-17-ga03e4b32-dirty";
|
|
@@ -202,8 +224,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
202
224
|
readonly patch: 0;
|
|
203
225
|
readonly shortSalt: "297966649";
|
|
204
226
|
};
|
|
205
|
-
readonly decryptSigner: "0x4736F8CE685760017eEc130AC3FFc6187f5A1F95";
|
|
206
|
-
readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
|
|
207
227
|
readonly blockNumber: 26894782;
|
|
208
228
|
readonly deployDate: "2025-06-10T12:17:35.790Z";
|
|
209
229
|
readonly commit: "v5-13-gd6b19c10-dirty";
|
|
@@ -223,8 +243,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
223
243
|
readonly patch: 1;
|
|
224
244
|
readonly shortSalt: "340846814";
|
|
225
245
|
};
|
|
226
|
-
readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
|
|
227
|
-
readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
|
|
228
246
|
readonly blockNumber: 1718868;
|
|
229
247
|
readonly deployDate: "2025-09-10T15:20:25.654Z";
|
|
230
248
|
readonly commit: "v6-7-gf96f358e-dirty";
|
|
@@ -244,8 +262,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
244
262
|
readonly patch: 1;
|
|
245
263
|
readonly shortSalt: "340846814";
|
|
246
264
|
};
|
|
247
|
-
readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
|
|
248
|
-
readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
|
|
249
265
|
readonly blockNumber: 1717229;
|
|
250
266
|
readonly deployDate: "2025-09-10T14:53:07.218Z";
|
|
251
267
|
readonly commit: "v6-7-gf96f358e-dirty";
|
|
@@ -265,8 +281,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
265
281
|
readonly patch: 1;
|
|
266
282
|
readonly shortSalt: "340846814";
|
|
267
283
|
};
|
|
268
|
-
readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
|
|
269
|
-
readonly eciesPublicKey: "0x038a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1";
|
|
270
284
|
readonly blockNumber: 17365942;
|
|
271
285
|
readonly deployDate: "2025-08-15T17:35:15.208Z";
|
|
272
286
|
readonly commit: "v0.2.17-35-g8cca6b4e-dirty";
|
|
@@ -286,8 +300,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
286
300
|
readonly patch: 0;
|
|
287
301
|
readonly shortSalt: "340846814";
|
|
288
302
|
};
|
|
289
|
-
readonly decryptSigner: "0x138AcbDC1FA02b955949d8Da09E546Ea7748710f";
|
|
290
|
-
readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
|
|
291
303
|
readonly blockNumber: 26122863;
|
|
292
304
|
readonly deployDate: "2025-05-23T15:26:57.031Z";
|
|
293
305
|
readonly commit: "v5-2-g8957c16b-dirty";
|
|
@@ -307,8 +319,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
307
319
|
readonly patch: 29;
|
|
308
320
|
readonly shortSalt: "340846814";
|
|
309
321
|
};
|
|
310
|
-
readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
|
|
311
|
-
readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
|
|
312
322
|
readonly blockNumber: 13464197;
|
|
313
323
|
readonly deployDate: "2025-04-22T15:57:26.862Z";
|
|
314
324
|
readonly commit: "v3-28-g93c05a49-dirty";
|
|
@@ -328,8 +338,6 @@ export declare const lightningDeployments: readonly [{
|
|
|
328
338
|
readonly patch: 29;
|
|
329
339
|
readonly shortSalt: "340846814";
|
|
330
340
|
};
|
|
331
|
-
readonly decryptSigner: "0xA8822DE8910f66D3d03F1eAfe2C0141dBc327Ee0";
|
|
332
|
-
readonly eciesPublicKey: "0x048a582d29083c2f3fefe024bf4dd9ab913ab8973716977da5f01106e0b84095b1e647a9e377175fcb66bda05087c93b05e1fd53a704d0914bb23a0b2a69e9f235";
|
|
333
341
|
readonly blockNumber: 24784527;
|
|
334
342
|
readonly deployDate: "2025-04-22T15:55:47.828Z";
|
|
335
343
|
readonly commit: "v3-28-g93c05a49-dirty";
|