@inco/js 0.6.8 → 0.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -8
- package/dist/cjs/advancedacl/session-key.d.ts +39 -19
- package/dist/cjs/advancedacl/session-key.js +59 -108
- package/dist/cjs/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/cjs/attestedcompute/attested-compute.js +5 -28
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +68 -16
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +108 -66
- package/dist/cjs/attesteddecrypt/types.d.ts +8 -3
- package/dist/cjs/attesteddecrypt/types.js +1 -1
- package/dist/cjs/encryption/encryption.d.ts +8 -10
- package/dist/cjs/encryption/encryption.js +6 -6
- package/dist/cjs/generated/abis/add-two.d.ts +1 -1
- package/dist/cjs/generated/abis/add-two.js +1 -1
- package/dist/cjs/generated/abis/lightning-preview.d.ts +40 -0
- package/dist/cjs/generated/abis/lightning-preview.js +29 -1
- package/dist/cjs/generated/abis/lightning.d.ts +1 -1
- package/dist/cjs/generated/abis/lightning.js +1 -1
- package/dist/cjs/generated/abis/verifier.d.ts +126 -67
- package/dist/cjs/generated/abis/verifier.js +108 -54
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +87 -132
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +21 -27
- package/dist/cjs/generated/lightning.d.ts +40 -32
- package/dist/cjs/generated/lightning.js +43 -33
- package/dist/cjs/generated/local-node.d.ts +11 -11
- package/dist/cjs/generated/local-node.js +28 -12
- package/dist/cjs/kms/client.d.ts +8 -4
- package/dist/cjs/kms/client.js +9 -4
- package/dist/cjs/kms/quorumClient.d.ts +58 -0
- package/dist/cjs/kms/quorumClient.js +378 -0
- package/dist/cjs/kms/thresholdPromises.d.ts +7 -0
- package/dist/cjs/kms/thresholdPromises.js +52 -0
- package/dist/cjs/lite/deployments.d.ts +20 -2
- package/dist/cjs/lite/deployments.js +1 -1
- package/dist/cjs/lite/index.d.ts +1 -2
- package/dist/cjs/lite/index.js +1 -2
- package/dist/cjs/lite/lightning.d.ts +109 -77
- package/dist/cjs/lite/lightning.js +279 -112
- package/dist/cjs/local/local-node.d.ts +1 -2
- package/dist/cjs/local/local-node.js +2 -3
- package/dist/cjs/test/mocks.d.ts +15 -0
- package/dist/cjs/test/mocks.js +45 -0
- package/dist/cjs/viem.d.ts +1 -1
- package/dist/esm/advancedacl/session-key.d.ts +39 -19
- package/dist/esm/advancedacl/session-key.js +52 -100
- package/dist/esm/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/esm/attestedcompute/attested-compute.js +6 -29
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +68 -16
- package/dist/esm/attesteddecrypt/attested-decrypt.js +109 -68
- package/dist/esm/attesteddecrypt/types.d.ts +8 -3
- package/dist/esm/attesteddecrypt/types.js +1 -1
- package/dist/esm/encryption/encryption.d.ts +8 -10
- package/dist/esm/encryption/encryption.js +6 -6
- package/dist/esm/generated/abis/add-two.d.ts +1 -1
- package/dist/esm/generated/abis/add-two.js +1 -1
- package/dist/esm/generated/abis/lightning-preview.d.ts +40 -0
- package/dist/esm/generated/abis/lightning-preview.js +29 -1
- package/dist/esm/generated/abis/lightning.d.ts +1 -1
- package/dist/esm/generated/abis/lightning.js +1 -1
- package/dist/esm/generated/abis/verifier.d.ts +126 -67
- package/dist/esm/generated/abis/verifier.js +108 -54
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +87 -132
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +19 -25
- package/dist/esm/generated/lightning.d.ts +40 -32
- package/dist/esm/generated/lightning.js +43 -33
- package/dist/esm/generated/local-node.d.ts +11 -11
- package/dist/esm/generated/local-node.js +28 -12
- package/dist/esm/kms/client.d.ts +8 -4
- package/dist/esm/kms/client.js +8 -4
- package/dist/esm/kms/quorumClient.d.ts +58 -0
- package/dist/esm/kms/quorumClient.js +374 -0
- package/dist/esm/kms/thresholdPromises.d.ts +7 -0
- package/dist/esm/kms/thresholdPromises.js +49 -0
- package/dist/esm/lite/deployments.d.ts +20 -2
- package/dist/esm/lite/deployments.js +1 -1
- package/dist/esm/lite/index.d.ts +1 -2
- package/dist/esm/lite/index.js +1 -2
- package/dist/esm/lite/lightning.d.ts +109 -77
- package/dist/esm/lite/lightning.js +278 -111
- package/dist/esm/local/local-node.d.ts +1 -2
- package/dist/esm/local/local-node.js +2 -3
- package/dist/esm/test/mocks.d.ts +15 -0
- package/dist/esm/test/mocks.js +39 -0
- package/dist/esm/viem.d.ts +1 -1
- package/dist/types/advancedacl/session-key.d.ts +39 -19
- package/dist/types/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +68 -16
- package/dist/types/attesteddecrypt/types.d.ts +8 -3
- package/dist/types/encryption/encryption.d.ts +8 -10
- package/dist/types/generated/abis/add-two.d.ts +1 -1
- package/dist/types/generated/abis/lightning-preview.d.ts +40 -0
- package/dist/types/generated/abis/lightning.d.ts +1 -1
- package/dist/types/generated/abis/verifier.d.ts +126 -67
- package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +87 -132
- package/dist/types/generated/lightning.d.ts +40 -32
- package/dist/types/generated/local-node.d.ts +11 -11
- package/dist/types/kms/client.d.ts +8 -4
- package/dist/types/kms/quorumClient.d.ts +58 -0
- package/dist/types/kms/thresholdPromises.d.ts +7 -0
- package/dist/types/lite/deployments.d.ts +20 -2
- package/dist/types/lite/index.d.ts +1 -2
- package/dist/types/lite/lightning.d.ts +109 -77
- package/dist/types/local/local-node.d.ts +1 -2
- package/dist/types/test/mocks.d.ts +15 -0
- package/dist/types/viem.d.ts +1 -1
- package/package.json +3 -3
- package/dist/cjs/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/cjs/attestedreveal/attested-reveal.js +0 -67
- package/dist/cjs/attestedreveal/index.d.ts +0 -1
- package/dist/cjs/attestedreveal/index.js +0 -18
- package/dist/cjs/attestedreveal/types.d.ts +0 -7
- package/dist/cjs/attestedreveal/types.js +0 -16
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.js +0 -118
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.js +0 -136
- package/dist/cjs/lite/reencrypt.d.ts +0 -23
- package/dist/cjs/lite/reencrypt.js +0 -131
- package/dist/esm/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/esm/attestedreveal/attested-reveal.js +0 -64
- package/dist/esm/attestedreveal/index.d.ts +0 -1
- package/dist/esm/attestedreveal/index.js +0 -2
- package/dist/esm/attestedreveal/types.d.ts +0 -7
- package/dist/esm/attestedreveal/types.js +0 -12
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.js +0 -115
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.js +0 -133
- package/dist/esm/lite/reencrypt.d.ts +0 -23
- package/dist/esm/lite/reencrypt.js +0 -122
- package/dist/types/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/types/attestedreveal/index.d.ts +0 -1
- package/dist/types/attestedreveal/types.d.ts +0 -7
- package/dist/types/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/types/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/types/lite/reencrypt.d.ts +0 -23
|
@@ -1,49 +1,57 @@
|
|
|
1
|
-
import
|
|
2
|
-
import { hexToBytes } from 'viem';
|
|
1
|
+
import { createPublicClient, getContract, hexToBytes, http, zeroAddress, } from 'viem';
|
|
3
2
|
import { baseSepolia } from 'viem/chains';
|
|
4
|
-
import { grantSessionKey, sessionKeyAttestedCompute, sessionKeyAttestedDecrypt,
|
|
5
|
-
import { attestedCompute } from '../attestedcompute/attested-compute.js';
|
|
3
|
+
import { grantSessionKey, sessionKeyAttestedCompute, sessionKeyAttestedDecrypt, updateActiveVouchersSessionNonce, } from '../advancedacl/session-key.js';
|
|
4
|
+
import { attestedCompute as performAttestedCompute } from '../attestedcompute/attested-compute.js';
|
|
6
5
|
import { attestedDecrypt } from '../attesteddecrypt/attested-decrypt.js';
|
|
7
6
|
import { HexString, parseAddress } from '../binary.js';
|
|
8
7
|
import { encryptionSchemes, } from '../encryption/index.js';
|
|
8
|
+
import { incoLightningAbi } from '../generated/abis/lightning.js';
|
|
9
|
+
import { incoVerifierAbi } from '../generated/abis/verifier.js';
|
|
9
10
|
import { lightningDeployments } from '../generated/lightning.js';
|
|
10
11
|
import { localNodeLightningConfig } from '../generated/local-node.js';
|
|
11
12
|
import { handleTypes } from '../handle.js';
|
|
13
|
+
import { getViemChain } from '../index.js';
|
|
14
|
+
import { KmsQuorumClient } from '../kms/quorumClient.js';
|
|
12
15
|
import { parseLocalEnv } from '../local/index.js';
|
|
13
16
|
import { parse } from '../schema.js';
|
|
14
17
|
import { decodeSecp256k1PublicKey, generateSecp256k1Keypair, getEciesEncryptor, } from './ecies.js';
|
|
15
|
-
import { getKmsClient, incoLiteReencryptor } from './reencrypt.js';
|
|
16
18
|
const DefaultPepper = 'testnet';
|
|
19
|
+
function isSecp256k1Keypair(value) {
|
|
20
|
+
return !!value && typeof value === 'object' && 'kp' in value;
|
|
21
|
+
}
|
|
22
|
+
function isLocalNodeEnvFileSource(value) {
|
|
23
|
+
return (!!value &&
|
|
24
|
+
typeof value === 'object' &&
|
|
25
|
+
'filePath' in value &&
|
|
26
|
+
typeof value.filePath === 'string');
|
|
27
|
+
}
|
|
17
28
|
/**
|
|
18
29
|
* The Lightning class provides a convenient way to interact with the Inco Lightning contract by binding to a specific
|
|
19
30
|
* deployment.
|
|
20
31
|
*/
|
|
21
32
|
export class Lightning {
|
|
22
33
|
_deployment;
|
|
23
|
-
|
|
34
|
+
covalidatorUrls;
|
|
35
|
+
signers;
|
|
36
|
+
threshold;
|
|
24
37
|
executorAddress;
|
|
25
|
-
eciesPublicKey;
|
|
26
38
|
chainId;
|
|
27
|
-
encryptor;
|
|
28
39
|
ephemeralKeypair;
|
|
29
|
-
|
|
30
|
-
constructor(_deployment,
|
|
40
|
+
kmsQuorumClient;
|
|
41
|
+
constructor(_deployment, covalidatorUrls, signers, threshold) {
|
|
31
42
|
this._deployment = _deployment;
|
|
32
|
-
this.
|
|
43
|
+
this.covalidatorUrls = covalidatorUrls;
|
|
44
|
+
this.signers = signers;
|
|
45
|
+
this.threshold = threshold;
|
|
33
46
|
this.executorAddress = parseAddress(_deployment.executorAddress);
|
|
34
|
-
this.eciesPublicKey = parse(HexString, _deployment.eciesPublicKey);
|
|
35
47
|
this.chainId = BigInt(_deployment.chainId);
|
|
36
48
|
this.ephemeralKeypair = generateSecp256k1Keypair();
|
|
37
|
-
this.
|
|
38
|
-
this.encryptor = getEciesEncryptor({
|
|
39
|
-
pubKeyA: decodeSecp256k1PublicKey(hexToBytes(parse(HexString, _deployment.eciesPublicKey))),
|
|
40
|
-
privKeyB: this.ephemeralKeypair,
|
|
41
|
-
});
|
|
49
|
+
this.kmsQuorumClient = KmsQuorumClient.fromUrls(covalidatorUrls, signers, threshold);
|
|
42
50
|
}
|
|
43
51
|
/**
|
|
44
52
|
* Get a Lightning instance bound to the latest Lightning deployment for the Base Sepolia testnet.
|
|
45
53
|
*/
|
|
46
|
-
static baseSepoliaTestnet() {
|
|
54
|
+
static async baseSepoliaTestnet() {
|
|
47
55
|
return Lightning.latest('testnet', baseSepolia.id);
|
|
48
56
|
}
|
|
49
57
|
/**
|
|
@@ -61,12 +69,22 @@ export class Lightning {
|
|
|
61
69
|
* corresponding Pepper.
|
|
62
70
|
*
|
|
63
71
|
*/
|
|
64
|
-
static localNode(env) {
|
|
72
|
+
static async localNode(env) {
|
|
65
73
|
if (!env) {
|
|
66
|
-
|
|
74
|
+
const config = localNodeLightningConfig[DefaultPepper];
|
|
75
|
+
return Lightning.custom({
|
|
76
|
+
...config,
|
|
77
|
+
covalidatorUrls: [...config.covalidatorUrls],
|
|
78
|
+
signers: config.signers.map((s) => parseAddress(s)),
|
|
79
|
+
});
|
|
67
80
|
}
|
|
68
81
|
if (typeof env === 'string') {
|
|
69
|
-
|
|
82
|
+
const config = localNodeLightningConfig[env];
|
|
83
|
+
return Lightning.custom({
|
|
84
|
+
...config,
|
|
85
|
+
covalidatorUrls: [...config.covalidatorUrls],
|
|
86
|
+
signers: config.signers.map((s) => parseAddress(s)),
|
|
87
|
+
});
|
|
70
88
|
}
|
|
71
89
|
const conf = localNodeLightningConfig[DefaultPepper];
|
|
72
90
|
return Lightning.custom({
|
|
@@ -74,13 +92,17 @@ export class Lightning {
|
|
|
74
92
|
chainId: env.COVALIDATOR_HOST_CHAIN_ID
|
|
75
93
|
? Number(env.COVALIDATOR_HOST_CHAIN_ID)
|
|
76
94
|
: conf.chainId,
|
|
77
|
-
|
|
95
|
+
covalidatorUrls: env.COVALIDATOR_URL
|
|
96
|
+
? env.COVALIDATOR_URL.split(',')
|
|
97
|
+
: [...conf.covalidatorUrls],
|
|
98
|
+
signers: env.EIP712_SIGNER_ADDRESS
|
|
99
|
+
? env.EIP712_SIGNER_ADDRESS.split(',').map((address) => parseAddress(address))
|
|
100
|
+
: conf.signers.map((s) => parseAddress(s)),
|
|
78
101
|
hostChainRpcUrl: env.COVALIDATOR_HOST_CHAIN_RPC_URL ??
|
|
79
102
|
conf.hostChainRpcUrl ??
|
|
80
103
|
'http://localhost:8545',
|
|
81
104
|
// These variables vary per environment
|
|
82
105
|
executorAddress: env.EXECUTOR_ADDRESS,
|
|
83
|
-
eciesPublicKey: env.ECIES_PUBLIC_KEY,
|
|
84
106
|
senderPrivateKey: env.SENDER_PRIVATE_KEY,
|
|
85
107
|
});
|
|
86
108
|
}
|
|
@@ -89,17 +111,27 @@ export class Lightning {
|
|
|
89
111
|
*
|
|
90
112
|
* @param filePath the path to the file containing the environment variables in dotenv format
|
|
91
113
|
*/
|
|
92
|
-
static async localNodeFromEnv(
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
114
|
+
static async localNodeFromEnv(source) {
|
|
115
|
+
let envContent;
|
|
116
|
+
if (isLocalNodeEnvFileSource(source)) {
|
|
117
|
+
if (typeof process === 'undefined' || !process.versions?.node) {
|
|
118
|
+
throw new Error('Lightning.localNodeFromEnv with a file path is only available in Node environments.');
|
|
119
|
+
}
|
|
120
|
+
const { readFile } = await import('fs/promises');
|
|
121
|
+
envContent = await readFile(source.filePath);
|
|
122
|
+
}
|
|
123
|
+
else {
|
|
124
|
+
envContent = source;
|
|
125
|
+
}
|
|
126
|
+
const env = parseLocalEnv(envContent);
|
|
127
|
+
return await Lightning.localNode(env);
|
|
96
128
|
}
|
|
97
129
|
/**
|
|
98
130
|
* Get a Lightning deployment by name or executor address on a particular chain.
|
|
99
131
|
*
|
|
100
132
|
* @param id this is an object containing either the pair of name and chainId or the executorAddress and chainId
|
|
101
133
|
*/
|
|
102
|
-
static at(id) {
|
|
134
|
+
static async at(id) {
|
|
103
135
|
const deployment = this.isIdByName(id)
|
|
104
136
|
? lightningDeployments.find((d) => d.name === id.name && d.chainId === id.chainId)
|
|
105
137
|
: lightningDeployments.find((d) => d.executorAddress === id.executorAddress &&
|
|
@@ -107,7 +139,8 @@ export class Lightning {
|
|
|
107
139
|
if (!deployment) {
|
|
108
140
|
throw new Error(`No deployment found for ${JSON.stringify(id)}`);
|
|
109
141
|
}
|
|
110
|
-
|
|
142
|
+
const { threshold, signers } = await Lightning.getThresholdAndSigners(deployment);
|
|
143
|
+
return new Lightning(deployment, Lightning.getCovalidatorUrls(deployment, threshold), signers, threshold);
|
|
111
144
|
}
|
|
112
145
|
/**
|
|
113
146
|
* Get a Lightning deployment for a local or custom node
|
|
@@ -115,8 +148,23 @@ export class Lightning {
|
|
|
115
148
|
* @param config this is an object containing the executorAddress, eciesPublicKey, chainId and covalidatorUrl.
|
|
116
149
|
* additional fields past will be made available as part of the `deployment` property.
|
|
117
150
|
*/
|
|
118
|
-
static custom(config) {
|
|
119
|
-
|
|
151
|
+
static async custom(config) {
|
|
152
|
+
const { threshold, signers } = await Lightning.getContractThresholdAndSigners(config.executorAddress, config.chainId, config.hostChainRpcUrl);
|
|
153
|
+
return new Lightning(config, config.covalidatorUrls, signers, threshold);
|
|
154
|
+
}
|
|
155
|
+
static async getEciesPublicKey(client, executorAddress) {
|
|
156
|
+
const incoLightningContract = getContract({
|
|
157
|
+
abi: incoLightningAbi,
|
|
158
|
+
address: executorAddress,
|
|
159
|
+
client,
|
|
160
|
+
});
|
|
161
|
+
const incoVerifierAddress = await incoLightningContract.read.incoVerifier();
|
|
162
|
+
const incoVerifier = getContract({
|
|
163
|
+
abi: incoVerifierAbi,
|
|
164
|
+
address: incoVerifierAddress,
|
|
165
|
+
client,
|
|
166
|
+
});
|
|
167
|
+
return await incoVerifier.read.eciesPubkey();
|
|
120
168
|
}
|
|
121
169
|
/**
|
|
122
170
|
* Get the latest deployment for a given pepper, which usually denotes a family of deployments distinct from their
|
|
@@ -141,9 +189,9 @@ export class Lightning {
|
|
|
141
189
|
* will not be compatible with the new version.
|
|
142
190
|
*
|
|
143
191
|
* @param pepper the pepper to use to filter the deployments
|
|
144
|
-
* @param
|
|
192
|
+
* @param chain the chain to use to filter the deployments
|
|
145
193
|
*/
|
|
146
|
-
static latest(pepper, chainId) {
|
|
194
|
+
static async latest(pepper, chainId) {
|
|
147
195
|
return Lightning.at(Lightning.latestDeployment(pepper, chainId));
|
|
148
196
|
}
|
|
149
197
|
/*
|
|
@@ -160,8 +208,8 @@ export class Lightning {
|
|
|
160
208
|
* @param accountAddress the address of the account interacting with the dapp contract, normally an Externally Owned Account (EOA)
|
|
161
209
|
* @param dappAddress the address of the dapp contract that interacts with the Inco Lightning contract or library
|
|
162
210
|
*/
|
|
163
|
-
async encrypt(value, { accountAddress, dappAddress }) {
|
|
164
|
-
const { ciphertext } = await
|
|
211
|
+
async encrypt(value, { accountAddress, dappAddress }, encryptor) {
|
|
212
|
+
const { ciphertext } = await encryptor({
|
|
165
213
|
plaintext: Lightning.plaintextFromValue(value),
|
|
166
214
|
context: {
|
|
167
215
|
hostChainId: this.chainId,
|
|
@@ -173,18 +221,15 @@ export class Lightning {
|
|
|
173
221
|
return ciphertext.value;
|
|
174
222
|
}
|
|
175
223
|
/**
|
|
176
|
-
*
|
|
177
|
-
* The account associated with the walletClient must have permissions to decrypt the handle or ciphertext passed
|
|
178
|
-
* to the reencryptor function.
|
|
224
|
+
* Get the encryptor for a specific ECIES public key.
|
|
179
225
|
*
|
|
180
|
-
* @param
|
|
226
|
+
* @param eciesPubkey the ECIES public key to use for encryption
|
|
227
|
+
* @returns an Encryptor instance configured for the specified ECIES public key
|
|
181
228
|
*/
|
|
182
|
-
|
|
183
|
-
return
|
|
184
|
-
|
|
185
|
-
|
|
186
|
-
chainId: this.chainId,
|
|
187
|
-
ephemeralKeypair: this.ephemeralKeypair,
|
|
229
|
+
getEncryptor(eciesPubkey) {
|
|
230
|
+
return getEciesEncryptor({
|
|
231
|
+
pubKeyA: decodeSecp256k1PublicKey(hexToBytes(parse(HexString, eciesPubkey))),
|
|
232
|
+
privKeyB: this.ephemeralKeypair,
|
|
188
233
|
});
|
|
189
234
|
}
|
|
190
235
|
/**
|
|
@@ -220,31 +265,6 @@ export class Lightning {
|
|
|
220
265
|
expiresAt,
|
|
221
266
|
});
|
|
222
267
|
}
|
|
223
|
-
/**
|
|
224
|
-
* Creates a session key reencryptor for secure data reencryption operations.
|
|
225
|
-
*
|
|
226
|
-
* This method returns a reencryptor instance that can be used to perform reencryption
|
|
227
|
-
* operations using session keys. The reencryptor is configured with the provided
|
|
228
|
-
* allowance voucher and ephemeral keypair for secure communication.
|
|
229
|
-
*
|
|
230
|
-
* @param allowanceVoucherWithSig - The signed allowance voucher obtained from grantSessionKeyAllowanceVoucher
|
|
231
|
-
* @param ephemeralKeypair - The ephemeral keypair used for secure communication with the KMS make sure it has allowance to voucher
|
|
232
|
-
* @returns A reencryptor instance configured for session key operations
|
|
233
|
-
*
|
|
234
|
-
* @example
|
|
235
|
-
* ```typescript
|
|
236
|
-
* const reencryptor = await lightning.getSessionKeyRencryptor(voucher, ephemeralKeypair);
|
|
237
|
-
* const decryptedValue = await reencryptor({handle: resultHandle});
|
|
238
|
-
* ```
|
|
239
|
-
*/
|
|
240
|
-
getSessionKeyRencryptor(allowanceVoucherWithSig, ephemeralKeypair) {
|
|
241
|
-
return sessionKeyReencryptor({
|
|
242
|
-
chainId: this.chainId,
|
|
243
|
-
kmsConnectRpcEndpointOrClient: this.kmsClient,
|
|
244
|
-
ephemeralKeypair,
|
|
245
|
-
allowanceVoucherWithSig,
|
|
246
|
-
});
|
|
247
|
-
}
|
|
248
268
|
/**
|
|
249
269
|
* Updates the active session nonce for the given wallet client.
|
|
250
270
|
*
|
|
@@ -257,74 +277,175 @@ export class Lightning {
|
|
|
257
277
|
updateActiveVouchersSessionNonce(walletClient) {
|
|
258
278
|
return updateActiveVouchersSessionNonce(this.executorAddress, walletClient);
|
|
259
279
|
}
|
|
260
|
-
attestedDecrypt(
|
|
261
|
-
if (
|
|
262
|
-
const
|
|
263
|
-
|
|
264
|
-
|
|
280
|
+
attestedDecrypt(walletClient, handles, arg3, arg4, arg5) {
|
|
281
|
+
if (arg3 instanceof Uint8Array) {
|
|
282
|
+
const reencryptPubKey = arg3;
|
|
283
|
+
let reencryptKeypair;
|
|
284
|
+
let backoffConfig;
|
|
285
|
+
if (arg4 && isSecp256k1Keypair(arg4)) {
|
|
286
|
+
reencryptKeypair = arg4;
|
|
287
|
+
backoffConfig = arg5;
|
|
288
|
+
}
|
|
289
|
+
else {
|
|
290
|
+
backoffConfig = arg4;
|
|
291
|
+
}
|
|
292
|
+
if (reencryptKeypair) {
|
|
293
|
+
return attestedDecrypt({
|
|
294
|
+
handles,
|
|
295
|
+
backoffConfig,
|
|
296
|
+
chainId: Number(this.chainId),
|
|
297
|
+
walletClient,
|
|
298
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
299
|
+
reencryptPubKey,
|
|
300
|
+
reencryptKeypair,
|
|
301
|
+
});
|
|
302
|
+
}
|
|
265
303
|
return attestedDecrypt({
|
|
266
304
|
handles,
|
|
267
305
|
backoffConfig,
|
|
268
306
|
chainId: Number(this.chainId),
|
|
269
307
|
walletClient,
|
|
270
|
-
|
|
308
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
309
|
+
reencryptPubKey,
|
|
271
310
|
});
|
|
272
311
|
}
|
|
273
|
-
|
|
274
|
-
|
|
275
|
-
|
|
276
|
-
|
|
277
|
-
|
|
312
|
+
const backoffConfig = arg3;
|
|
313
|
+
return attestedDecrypt({
|
|
314
|
+
handles,
|
|
315
|
+
backoffConfig,
|
|
316
|
+
chainId: Number(this.chainId),
|
|
317
|
+
walletClient,
|
|
318
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
319
|
+
});
|
|
320
|
+
}
|
|
321
|
+
attestedDecryptWithVoucher(ephemeralKeypair, allowanceVoucherWithSig, handles, arg4, arg5, arg6) {
|
|
322
|
+
if (arg4 instanceof Uint8Array) {
|
|
323
|
+
const reencryptPubKey = arg4;
|
|
324
|
+
let reencryptKeypair;
|
|
325
|
+
let backoffConfig;
|
|
326
|
+
if (arg5 && isSecp256k1Keypair(arg5)) {
|
|
327
|
+
reencryptKeypair = arg5;
|
|
328
|
+
backoffConfig = arg6;
|
|
329
|
+
}
|
|
330
|
+
else {
|
|
331
|
+
backoffConfig = arg5;
|
|
332
|
+
}
|
|
333
|
+
if (reencryptKeypair) {
|
|
334
|
+
return sessionKeyAttestedDecrypt({
|
|
335
|
+
backoffConfig,
|
|
336
|
+
chainId: Number(this.chainId),
|
|
337
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
338
|
+
ephemeralKeypair,
|
|
339
|
+
allowanceVoucherWithSig,
|
|
340
|
+
handles,
|
|
341
|
+
reencryptPubKey,
|
|
342
|
+
reencryptKeypair,
|
|
343
|
+
});
|
|
344
|
+
}
|
|
278
345
|
return sessionKeyAttestedDecrypt({
|
|
279
346
|
backoffConfig,
|
|
280
347
|
chainId: Number(this.chainId),
|
|
281
|
-
|
|
348
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
282
349
|
ephemeralKeypair,
|
|
283
350
|
allowanceVoucherWithSig,
|
|
284
351
|
handles,
|
|
352
|
+
reencryptPubKey,
|
|
285
353
|
});
|
|
286
354
|
}
|
|
355
|
+
const backoffConfig = arg4;
|
|
356
|
+
return sessionKeyAttestedDecrypt({
|
|
357
|
+
backoffConfig,
|
|
358
|
+
chainId: Number(this.chainId),
|
|
359
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
360
|
+
ephemeralKeypair,
|
|
361
|
+
allowanceVoucherWithSig,
|
|
362
|
+
handles,
|
|
363
|
+
});
|
|
287
364
|
}
|
|
288
|
-
|
|
289
|
-
|
|
290
|
-
|
|
291
|
-
|
|
292
|
-
|
|
293
|
-
|
|
294
|
-
|
|
295
|
-
|
|
296
|
-
|
|
297
|
-
|
|
298
|
-
|
|
299
|
-
|
|
300
|
-
|
|
301
|
-
|
|
302
|
-
|
|
303
|
-
|
|
304
|
-
|
|
305
|
-
|
|
306
|
-
|
|
307
|
-
|
|
308
|
-
|
|
309
|
-
|
|
310
|
-
const walletClient = arg1;
|
|
311
|
-
const backoffConfig = arg5;
|
|
312
|
-
return attestedCompute({
|
|
365
|
+
/**
|
|
366
|
+
* Get an attested compute for the given wallet client.
|
|
367
|
+
*
|
|
368
|
+
* @param walletClient - The wallet client used for signing the attested compute request
|
|
369
|
+
* @param lhsHandle - The handle to compute
|
|
370
|
+
* @param op - The operation to perform
|
|
371
|
+
* @param rhsPlaintext - The plaintext to compute with
|
|
372
|
+
* @param backoffConfig - The backoff configuration for the attested compute request
|
|
373
|
+
* @returns The decryption attestation
|
|
374
|
+
*
|
|
375
|
+
* @example
|
|
376
|
+
* ```typescript
|
|
377
|
+
* import { AttestedComputeSupportedOps } from '../lite/attested-compute.js';
|
|
378
|
+
* const lhsHandle = '0x...';
|
|
379
|
+
* const rhsPlaintext = 1337n;
|
|
380
|
+
* const op = AttestedComputeSupportedOps.Eq;
|
|
381
|
+
* const response = await lightning.attestedCompute(walletClient, lhsHandle, op, rhsPlaintext);
|
|
382
|
+
* const { plaintext, covalidatorSignature, handle } = response;
|
|
383
|
+
* ```
|
|
384
|
+
*/
|
|
385
|
+
attestedCompute(walletClient, lhsHandle, op, rhsPlaintext, backoffConfig) {
|
|
386
|
+
return performAttestedCompute({
|
|
313
387
|
walletClient,
|
|
314
|
-
|
|
388
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
389
|
+
chainId: Number(this.chainId),
|
|
390
|
+
lhsHandle,
|
|
391
|
+
op,
|
|
392
|
+
rhsPlaintext,
|
|
393
|
+
backoffConfig,
|
|
394
|
+
});
|
|
395
|
+
}
|
|
396
|
+
/**
|
|
397
|
+
* Performs attested compute via a voucher-backed session key.
|
|
398
|
+
*
|
|
399
|
+
* @example
|
|
400
|
+
* ```ts
|
|
401
|
+
* const attestation = await lightning.attestedComputeWithVoucher(
|
|
402
|
+
* ephemeralKeypair,
|
|
403
|
+
* voucher,
|
|
404
|
+
* lhsHandle,
|
|
405
|
+
* AttestedComputeSupportedOps.Eq,
|
|
406
|
+
* true,
|
|
407
|
+
* );
|
|
408
|
+
* ```
|
|
409
|
+
*/
|
|
410
|
+
attestedComputeWithVoucher(ephemeralKeypair, allowanceVoucherWithSig, lhsHandle, op, rhsPlaintext, backoffConfig) {
|
|
411
|
+
return sessionKeyAttestedCompute({
|
|
315
412
|
chainId: Number(this.chainId),
|
|
413
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
414
|
+
ephemeralKeypair,
|
|
415
|
+
allowanceVoucherWithSig,
|
|
316
416
|
lhsHandle,
|
|
317
417
|
op,
|
|
318
418
|
rhsPlaintext,
|
|
319
419
|
backoffConfig,
|
|
320
420
|
});
|
|
321
421
|
}
|
|
422
|
+
/**
|
|
423
|
+
* Get an decryption of publicly revealed handles.
|
|
424
|
+
*
|
|
425
|
+
* @param handles - The handles to decrypt
|
|
426
|
+
* @param backoffConfig - The backoff configuration for the attested decrypt request
|
|
427
|
+
* @returns The decryption attestations
|
|
428
|
+
*
|
|
429
|
+
* @example
|
|
430
|
+
* ```typescript
|
|
431
|
+
* const response = await lightning.attestedReveal([handle1, handle2]);
|
|
432
|
+
* const { plaintext, covalidatorSignature } = response[0];
|
|
433
|
+
* ```
|
|
434
|
+
*/
|
|
435
|
+
attestedReveal(handles, backoffConfig) {
|
|
436
|
+
return attestedDecrypt({
|
|
437
|
+
handles,
|
|
438
|
+
backoffConfig,
|
|
439
|
+
chainId: Number(this.chainId),
|
|
440
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
441
|
+
});
|
|
442
|
+
}
|
|
322
443
|
/**
|
|
323
444
|
* Get the GRPC endpoint for the covalidator that services this deployment.
|
|
324
445
|
*/
|
|
325
|
-
static
|
|
446
|
+
static getCovalidatorUrls(deployment, threshold) {
|
|
326
447
|
const { executorAddress, chainId, pepper } = deployment;
|
|
327
|
-
return `https://${executorAddress.toLowerCase()}.${chainId}.${pepper}.inco.org
|
|
448
|
+
return Array.from({ length: threshold }, (_, i) => `https://${executorAddress.toLowerCase()}.${chainId}.${pepper}-${i + 1}.inco.org`);
|
|
328
449
|
}
|
|
329
450
|
static isIdByName(id) {
|
|
330
451
|
return id.name !== undefined;
|
|
@@ -348,5 +469,51 @@ export class Lightning {
|
|
|
348
469
|
throw new Error(`Unsupported type ${typeof value}`);
|
|
349
470
|
}
|
|
350
471
|
}
|
|
472
|
+
// Add utility method to get threshold from contract
|
|
473
|
+
static async getContractThresholdAndSigners(executorAddress, chainId, hostChainRpcUrl) {
|
|
474
|
+
const chain = getViemChain({ id: chainId });
|
|
475
|
+
const client = createPublicClient({
|
|
476
|
+
chain,
|
|
477
|
+
transport: hostChainRpcUrl ? http(hostChainRpcUrl) : http(),
|
|
478
|
+
});
|
|
479
|
+
const incoLightningContract = getContract({
|
|
480
|
+
abi: incoLightningAbi,
|
|
481
|
+
address: executorAddress,
|
|
482
|
+
client,
|
|
483
|
+
});
|
|
484
|
+
const incoVerifierAddress = await incoLightningContract.read.incoVerifier();
|
|
485
|
+
const incoVerifier = getContract({
|
|
486
|
+
abi: incoVerifierAbi,
|
|
487
|
+
address: incoVerifierAddress,
|
|
488
|
+
client,
|
|
489
|
+
});
|
|
490
|
+
console.log('inco executor', incoLightningContract.address);
|
|
491
|
+
console.log('inco verifier', incoVerifier.address);
|
|
492
|
+
const threshold = await incoVerifier.read.getThreshold();
|
|
493
|
+
const signersCount = await incoVerifier.read.getSignersCount();
|
|
494
|
+
const signersPromises = [];
|
|
495
|
+
for (let i = BigInt(0); i < signersCount; i++) {
|
|
496
|
+
signersPromises.push(incoVerifier.read.getSignerAtIndex([i]));
|
|
497
|
+
}
|
|
498
|
+
const signers = await Promise.all(signersPromises);
|
|
499
|
+
return { threshold: Number(threshold), signers: signers.map(parseAddress) };
|
|
500
|
+
}
|
|
501
|
+
static async getThresholdAndSigners(deployment) {
|
|
502
|
+
if (this.supportsThresholdRetrieval(deployment)) {
|
|
503
|
+
return await this.getContractThresholdAndSigners(deployment.executorAddress, deployment.chainId);
|
|
504
|
+
}
|
|
505
|
+
return this.getDefaultThresholdAndSigners();
|
|
506
|
+
}
|
|
507
|
+
// Check if the deployment supports threshold retrieval based on its version
|
|
508
|
+
static supportsThresholdRetrieval(deployment) {
|
|
509
|
+
// Assumes that the threshold retrieval is supported if the smart contract / deployment version is greater than or equal to 1.1.0
|
|
510
|
+
return deployment.version?.major >= 1 && deployment.version?.minor >= 1;
|
|
511
|
+
}
|
|
512
|
+
static getDefaultThresholdAndSigners() {
|
|
513
|
+
return {
|
|
514
|
+
threshold: 1,
|
|
515
|
+
signers: [zeroAddress],
|
|
516
|
+
};
|
|
517
|
+
}
|
|
351
518
|
}
|
|
352
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/lite/lightning.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,MAAM,aAAa,CAAC;AAClC,OAAO,EAAkB,UAAU,EAA2B,MAAM,MAAM,CAAC;AAC3E,OAAO,EAAE,WAAW,EAAE,MAAM,aAAa,CAAC;AAC1C,OAAO,EACL,eAAe,EACf,yBAAyB,EACzB,yBAAyB,EACzB,qBAAqB,EACrB,gCAAgC,GACjC,MAAM,+BAA+B,CAAC;AAEvC,OAAO,EAAE,eAAe,EAAE,MAAM,wCAAwC,CAAC;AAEzE,OAAO,EAAE,eAAe,EAAE,MAAM,wCAAwC,CAAC;AAEzE,OAAO,EAAW,SAAS,EAAE,YAAY,EAAE,MAAM,cAAc,CAAC;AAEhE,OAAO,EAEL,iBAAiB,GAIlB,MAAM,wBAAwB,CAAC;AAEhC,OAAO,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAC;AACjE,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAE,WAAW,EAAE,MAAM,cAAc,CAAC;AAC3C,OAAO,EAAgB,aAAa,EAAE,MAAM,mBAAmB,CAAC;AAGhE,OAAO,EAAE,KAAK,EAAE,MAAM,cAAc,CAAC;AACrC,OAAO,EACL,wBAAwB,EACxB,wBAAwB,EACxB,iBAAiB,GAElB,MAAM,YAAY,CAAC;AACpB,OAAO,EAAE,YAAY,EAAE,mBAAmB,EAAE,MAAM,gBAAgB,CAAC;AA6BnE,MAAM,aAAa,GAAoB,SAAS,CAAC;AA2BjD;;;GAGG;AACH,MAAM,OAAO,SAAS;IAUD;IACD;IAVF,eAAe,CAAU;IACzB,cAAc,CAAY;IAC1B,OAAO,CAAS;IAEf,SAAS,CAAyB;IAClC,gBAAgB,CAAmB;IACnC,SAAS,CAA4B;IAEtD,YACmB,WAAc,EACf,cAAsB;QADrB,gBAAW,GAAX,WAAW,CAAG;QACf,mBAAc,GAAd,cAAc,CAAQ;QAEtC,IAAI,CAAC,eAAe,GAAG,YAAY,CAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACjE,IAAI,CAAC,cAAc,GAAG,KAAK,CAAC,SAAS,EAAE,WAAW,CAAC,cAAc,CAAC,CAAC;QACnE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE3C,IAAI,CAAC,gBAAgB,GAAG,wBAAwB,EAAE,CAAC;QACnD,IAAI,CAAC,SAAS,GAAG,YAAY,CAAC,cAAc,CAAC,CAAC;QAC9C,IAAI,CAAC,SAAS,GAAG,iBAAiB,CAAC;YACjC,OAAO,EAAE,wBAAwB,CAC/B,UAAU,CAAC,KAAK,CAAC,SAAS,EAAE,WAAW,CAAC,cAAc,CAAC,CAAC,CACzD;YACD,QAAQ,EAAE,IAAI,CAAC,gBAAgB;SAChC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,kBAAkB;QACvB,OAAO,SAAS,CAAC,MAAM,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE,CAAC,CAAC;IACrD,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,SAAS,CACd,GAAoC;QAEpC,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,OAAO,SAAS,CAAC,MAAM,CAAC,wBAAwB,CAAC,aAAa,CAAC,CAAC,CAAC;QACnE,CAAC;QACD,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,OAAO,SAAS,CAAC,MAAM,CAAC,wBAAwB,CAAC,GAAG,CAAC,CAAC,CAAC;QACzD,CAAC;QACD,MAAM,IAAI,GAAG,wBAAwB,CAAC,aAAa,CAAC,CAAC;QACrD,OAAO,SAAS,CAAC,MAAM,CAAC;YACtB,sEAAsE;YACtE,OAAO,EAAE,GAAG,CAAC,yBAAyB;gBACpC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,yBAAyB,CAAC;gBACvC,CAAC,CAAC,IAAI,CAAC,OAAO;YAChB,cAAc,EAAE,GAAG,CAAC,eAAe,IAAI,IAAI,CAAC,cAAc;YAC1D,eAAe,EACb,GAAG,CAAC,8BAA8B;gBAClC,IAAI,CAAC,eAAe;gBACpB,uBAAuB;YACzB,uCAAuC;YACvC,eAAe,EAAE,GAAG,CAAC,gBAAgB;YACrC,cAAc,EAAE,GAAG,CAAC,gBAAgB;YACpC,gBAAgB,EAAE,GAAG,CAAC,kBAAkB;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAC3B,QAAiB;QAEjB,MAAM,GAAG,GAAG,QAAQ,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAC/D,MAAM,GAAG,GAAG,aAAa,CAAC,GAAG,CAAC,CAAC;QAC/B,OAAO,SAAS,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;IAClC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,EAAE,CAAC,EAAgB;QACxB,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,CAAC,CAAC,oBAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,EAAE,CAAC,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CACtD;YACH,CAAC,CAAC,oBAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,eAAe,KAAK,EAAE,CAAC,eAAe;gBACxC,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAC3B,CAAC;QACN,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,2BAA2B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;QACnE,CAAC;QACD,OAAO,IAAI,SAAS,CAAC,UAAU,EAAE,SAAS,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC,CAAC;IAC5E,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,MAAM,CACX,MAAS;QAET,OAAO,IAAI,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,cAAc,CAAC,CAAC;IACtD,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,gBAAgB,CACrB,MAAS,EACT,OAAgB;QAEhB,sEAAsE;QACtE,MAAM,cAAc,GAAG,oBAAoB,CAAC,IAAI,CAC9C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,IAAI,CAAC,CAAC,OAAO,KAAK,OAAO,CACpD,CAAC;QACF,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,4GAA4G;YAC5G,wBAAwB;YACxB,MAAM,IAAI,KAAK,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;QACD,OAAO,cAAc,CAAC;IACxB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,MAAM,CACX,MAAS,EACT,OAAgB;QAEhB,OAAO,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,EAAE,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CACX,KAAQ,EACR,EAAE,cAAc,EAAE,WAAW,EAAqB;QAElD,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC;YAC1C,SAAS,EAAE,SAAS,CAAC,kBAAkB,CAAC,KAAK,CAAC;YAC9C,OAAO,EAAE;gBACP,WAAW,EAAE,IAAI,CAAC,OAAO;gBACzB,UAAU,EAAE,IAAI,CAAC,eAAe;gBAChC,WAAW,EAAE,YAAY,CAAC,cAAc,CAAC;gBACzC,eAAe,EAAE,YAAY,CAAC,WAAW,CAAC;aAC3C;SACF,CAAC,CAAC;QACH,OAAO,UAAU,CAAC,KAAK,CAAC;IAC1B,CAAC;IAED;;;;;;OAMG;IACH,cAAc,CACZ,YAAqD;QAErD,OAAO,mBAAmB,CAAC;YACzB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;SACxC,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACH,+BAA+B,CAC7B,YAAqD,EACrD,cAAsB,EACtB,SAAe,EACf,sBAA8B;QAE9B,OAAO,eAAe,CAAC;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,8BAA8B,EAAE,YAAY,CAAC,sBAAsB,CAAC;YACpE,cAAc,EAAE,YAAY,CAAC,cAAc,CAAC;YAC5C,kBAAkB,EAAE,YAAY;YAChC,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACH,uBAAuB,CACrB,uBAAgD,EAChD,gBAAkC;QAElC,OAAO,qBAAqB,CAAC;YAC3B,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,gBAAgB;YAChB,uBAAuB;SACxB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;OAQG;IACH,gCAAgC,CAC9B,YAAqD;QAErD,OAAO,gCAAgC,CAAC,IAAI,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IAC9E,CAAC;IA2CD,eAAe,CACb,IAAgE,EAChE,IAA2C,EAC3C,IAA2C,EAC3C,IAA6B;QAE7B,IAAI,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;YACxB,MAAM,YAAY,GAAG,IAA+C,CAAC;YACrE,MAAM,OAAO,GAAG,IAAmB,CAAC;YACpC,MAAM,aAAa,GAAG,IAA0C,CAAC;YACjE,OAAO,eAAe,CAAC;gBACrB,OAAO;gBACP,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,YAAY;gBACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;aAC9C,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,MAAM,gBAAgB,GAAG,IAAwB,CAAC;YAClD,MAAM,uBAAuB,GAAG,IAA+B,CAAC;YAChE,MAAM,OAAO,GAAG,IAAmB,CAAC;YACpC,MAAM,aAAa,GAAG,IAA0C,CAAC;YACjE,OAAO,yBAAyB,CAAC;gBAC/B,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;gBAC7C,gBAAgB;gBAChB,uBAAuB;gBACvB,OAAO;aACR,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAuDD,eAAe,CACb,IAAgE,EAChE,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,IAAuD,EACvD,IAA6B;QAE7B,IACE,OAAO,IAAI,KAAK,QAAQ;YACxB,IAAI,KAAK,IAAI;YACb,SAAS,IAAI,IAAI;YACjB,kBAAkB,IAAI,IAAI;YAC1B,QAAQ,IAAI,IAAI,EAChB,CAAC;YACD,mBAAmB;YACnB,MAAM,gBAAgB,GAAG,IAAwB,CAAC;YAClD,MAAM,uBAAuB,GAAG,IAA+B,CAAC;YAChE,MAAM,aAAa,GAAG,IAAI,CAAC;YAC3B,OAAO,yBAAyB,CAAC;gBAC/B,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;gBAC7C,gBAAgB;gBAChB,uBAAuB;gBACvB,SAAS;gBACT,EAAE;gBACF,YAAY;gBACZ,aAAa;aACd,CAAC,CAAC;QACL,CAAC;QAED,qBAAqB;QACrB,MAAM,YAAY,GAAG,IAA+C,CAAC;QACrE,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,eAAe,CAAC;YACrB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,iBAAiB,CAC7B,UAAgD;QAEhD,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,UAAU,CAAC;QACxD,OAAO,WAAW,eAAe,CAAC,WAAW,EAAE,IAAI,OAAO,IAAI,MAAM,WAAW,CAAC;IAClF,CAAC;IAEO,MAAM,CAAC,UAAU,CAAC,EAAgB;QACxC,OAAQ,EAAuB,CAAC,IAAI,KAAK,SAAS,CAAC;IACrD,CAAC;IAEO,MAAM,CAAC,kBAAkB,CAC/B,KAAQ;QAER,IAAI,OAAO,KAAK,KAAK,SAAS,EAAE,CAAC;YAC/B,OAAO;gBACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,WAAW,CAAC,KAAK;gBACvB,KAAK,EAAE,KAAK;aACsC,CAAC;QACvD,CAAC;aAAM,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAClE,OAAO;gBACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,WAAW,CAAC,QAAQ;gBAC1B,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC;aAC8B,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oBAAoB,OAAO,KAAK,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;CACF"}
|
|
519
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/lite/lightning.ts"],"names":[],"mappings":"AAAA,OAAO,EAGL,kBAAkB,EAClB,WAAW,EACX,UAAU,EACV,IAAI,EAIJ,WAAW,GACZ,MAAM,MAAM,CAAC;AACd,OAAO,EAAE,WAAW,EAAE,MAAM,aAAa,CAAC;AAC1C,OAAO,EACL,eAAe,EACf,yBAAyB,EACzB,yBAAyB,EACzB,gCAAgC,GACjC,MAAM,+BAA+B,CAAC;AAEvC,OAAO,EAAE,eAAe,IAAI,sBAAsB,EAAE,MAAM,wCAAwC,CAAC;AAEnG,OAAO,EAAE,eAAe,EAAE,MAAM,wCAAwC,CAAC;AAKzE,OAAO,EAAW,SAAS,EAAE,YAAY,EAAE,MAAM,cAAc,CAAC;AAEhE,OAAO,EAEL,iBAAiB,GAIlB,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,gBAAgB,EAAE,MAAM,gCAAgC,CAAC;AAClE,OAAO,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAC;AACjE,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAE,WAAW,EAAE,MAAM,cAAc,CAAC;AAC3C,OAAO,EAAE,YAAY,EAAE,MAAM,aAAa,CAAC;AAC3C,OAAO,EAAE,eAAe,EAAE,MAAM,wBAAwB,CAAC;AACzD,OAAO,EAAgB,aAAa,EAAE,MAAM,mBAAmB,CAAC;AAEhE,OAAO,EAAE,KAAK,EAAE,MAAM,cAAc,CAAC;AACrC,OAAO,EACL,wBAAwB,EACxB,wBAAwB,EACxB,iBAAiB,GAElB,MAAM,YAAY,CAAC;AA6BpB,MAAM,aAAa,GAAoB,SAAS,CAAC;AAEjD,SAAS,kBAAkB,CAAC,KAAc;IACxC,OAAO,CAAC,CAAC,KAAK,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,IAAI,IAAI,KAAK,CAAC;AAC/D,CAAC;AA8BD,SAAS,wBAAwB,CAC/B,KAA2D;IAE3D,OAAO,CACL,CAAC,CAAC,KAAK;QACP,OAAO,KAAK,KAAK,QAAQ;QACzB,UAAU,IAAI,KAAK;QACnB,OAAQ,KAAiC,CAAC,QAAQ,KAAK,QAAQ,CAChE,CAAC;AACJ,CAAC;AAED;;;GAGG;AACH,MAAM,OAAO,SAAS;IAQD;IACD;IACA;IACA;IAVF,eAAe,CAAU;IACzB,OAAO,CAAS;IAEf,gBAAgB,CAAmB;IACnC,eAAe,CAAkB;IAElD,YACmB,WAAc,EACf,eAAyB,EACzB,OAAkB,EAClB,SAAiB;QAHhB,gBAAW,GAAX,WAAW,CAAG;QACf,oBAAe,GAAf,eAAe,CAAU;QACzB,YAAO,GAAP,OAAO,CAAW;QAClB,cAAS,GAAT,SAAS,CAAQ;QAEjC,IAAI,CAAC,eAAe,GAAG,YAAY,CAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACjE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE3C,IAAI,CAAC,gBAAgB,GAAG,wBAAwB,EAAE,CAAC;QACnD,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC,QAAQ,CAC7C,eAAe,EACf,OAAO,EACP,SAAS,CACV,CAAC;IACJ,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,kBAAkB;QAC7B,OAAO,SAAS,CAAC,MAAM,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE,CAAC,CAAC;IACrD,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,KAAK,CAAC,SAAS,CACpB,GAAoC;QAEpC,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,MAAM,MAAM,GAAG,wBAAwB,CAAC,aAAa,CAAC,CAAC;YACvD,OAAO,SAAS,CAAC,MAAM,CAAC;gBACtB,GAAG,MAAM;gBACT,eAAe,EAAE,CAAC,GAAG,MAAM,CAAC,eAAe,CAAC;gBAC5C,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;aACpD,CAAC,CAAC;QACL,CAAC;QACD,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,MAAM,MAAM,GAAG,wBAAwB,CAAC,GAAG,CAAC,CAAC;YAC7C,OAAO,SAAS,CAAC,MAAM,CAAC;gBACtB,GAAG,MAAM;gBACT,eAAe,EAAE,CAAC,GAAG,MAAM,CAAC,eAAe,CAAC;gBAC5C,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;aACpD,CAAC,CAAC;QACL,CAAC;QACD,MAAM,IAAI,GAAG,wBAAwB,CAAC,aAAa,CAAC,CAAC;QAErD,OAAO,SAAS,CAAC,MAAM,CAAC;YACtB,sEAAsE;YACtE,OAAO,EAAE,GAAG,CAAC,yBAAyB;gBACpC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,yBAAyB,CAAC;gBACvC,CAAC,CAAC,IAAI,CAAC,OAAO;YAChB,eAAe,EAAE,GAAG,CAAC,eAAe;gBAClC,CAAC,CAAC,GAAG,CAAC,eAAe,CAAC,KAAK,CAAC,GAAG,CAAC;gBAChC,CAAC,CAAC,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC;YAC7B,OAAO,EAAE,GAAG,CAAC,qBAAqB;gBAChC,CAAC,CAAC,GAAG,CAAC,qBAAqB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CACnD,YAAY,CAAC,OAAO,CAAC,CACtB;gBACH,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;YAC5C,eAAe,EACb,GAAG,CAAC,8BAA8B;gBAClC,IAAI,CAAC,eAAe;gBACpB,uBAAuB;YACzB,uCAAuC;YACvC,eAAe,EAAE,GAAG,CAAC,gBAAgB;YACrC,gBAAgB,EAAE,GAAG,CAAC,kBAAkB;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAC3B,MAAiD;QAEjD,IAAI,UAAuC,CAAC;QAC5C,IAAI,wBAAwB,CAAC,MAAM,CAAC,EAAE,CAAC;YACrC,IAAI,OAAO,OAAO,KAAK,WAAW,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,IAAI,EAAE,CAAC;gBAC9D,MAAM,IAAI,KAAK,CACb,qFAAqF,CACtF,CAAC;YACJ,CAAC;YACD,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,MAAM,CAAC,aAAa,CAAC,CAAC;YACjD,UAAU,GAAG,MAAM,QAAQ,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;QAC/C,CAAC;aAAM,CAAC;YACN,UAAU,GAAG,MAAM,CAAC;QACtB,CAAC;QACD,MAAM,GAAG,GAAG,aAAa,CAAC,UAAU,CAAC,CAAC;QACtC,OAAO,MAAM,SAAS,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,EAAgB;QAC9B,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,CAAC,CAAC,oBAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,EAAE,CAAC,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CACtD;YACH,CAAC,CAAC,oBAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,eAAe,KAAK,EAAE,CAAC,eAAe;gBACxC,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAC3B,CAAC;QACN,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,2BAA2B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;QACnE,CAAC;QAED,MAAM,EAAE,SAAS,EAAE,OAAO,EAAE,GAC1B,MAAM,SAAS,CAAC,sBAAsB,CAAC,UAAU,CAAC,CAAC;QAErD,OAAO,IAAI,SAAS,CAClB,UAAU,EACV,SAAS,CAAC,kBAAkB,CAAC,UAAU,EAAE,SAAS,CAAC,EACnD,OAAO,EACP,SAAS,CACV,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS;QAET,MAAM,EAAE,SAAS,EAAE,OAAO,EAAE,GAC1B,MAAM,SAAS,CAAC,8BAA8B,CAC5C,MAAM,CAAC,eAAe,EACtB,MAAM,CAAC,OAAkB,EACzB,MAAM,CAAC,eAAe,CACvB,CAAC;QAEJ,OAAO,IAAI,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,eAAe,EAAE,OAAO,EAAE,SAAS,CAAC,CAAC;IAC3E,CAAC;IAED,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAC5B,MAAoB,EACpB,eAAwB;QAExB,MAAM,qBAAqB,GAAG,WAAW,CAAC;YACxC,GAAG,EAAE,gBAAgB;YACrB,OAAO,EAAE,eAA0B;YACnC,MAAM;SACP,CAAC,CAAC;QACH,MAAM,mBAAmB,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QAC5E,MAAM,YAAY,GAAG,WAAW,CAAC;YAC/B,GAAG,EAAE,eAAe;YACpB,OAAO,EAAE,mBAA8B;YACvC,MAAM;SACP,CAAC,CAAC;QACH,OAAO,MAAM,YAAY,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;IAC/C,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,gBAAgB,CACrB,MAAS,EACT,OAAgB;QAEhB,sEAAsE;QACtE,MAAM,cAAc,GAAG,oBAAoB,CAAC,IAAI,CAC9C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,IAAI,CAAC,CAAC,OAAO,KAAK,OAAO,CACpD,CAAC;QACF,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,4GAA4G;YAC5G,wBAAwB;YACxB,MAAM,IAAI,KAAK,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;QACD,OAAO,cAAc,CAAC;IACxB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS,EACT,OAAgB;QAEhB,OAAO,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,EAAE,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CACX,KAAQ,EACR,EAAE,cAAc,EAAE,WAAW,EAAqB,EAClD,SAAiC;QAEjC,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,SAAS,CAAC;YACrC,SAAS,EAAE,SAAS,CAAC,kBAAkB,CAAC,KAAK,CAAC;YAC9C,OAAO,EAAE;gBACP,WAAW,EAAE,IAAI,CAAC,OAAO;gBACzB,UAAU,EAAE,IAAI,CAAC,eAAe;gBAChC,WAAW,EAAE,YAAY,CAAC,cAAc,CAAC;gBACzC,eAAe,EAAE,YAAY,CAAC,WAAW,CAAC;aAC3C;SACF,CAAC,CAAC;QACH,OAAO,UAAU,CAAC,KAAK,CAAC;IAC1B,CAAC;IAED;;;;;OAKG;IACH,YAAY,CAAC,WAAsB;QACjC,OAAO,iBAAiB,CAAC;YACvB,OAAO,EAAE,wBAAwB,CAC/B,UAAU,CAAC,KAAK,CAAC,SAAS,EAAE,WAAW,CAAC,CAAC,CAC1C;YACD,QAAQ,EAAE,IAAI,CAAC,gBAAgB;SAChC,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACH,+BAA+B,CAC7B,YAAqD,EACrD,cAAsB,EACtB,SAAe,EACf,sBAA8B;QAE9B,OAAO,eAAe,CAAC;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,8BAA8B,EAAE,YAAY,CAAC,sBAAsB,CAAC;YACpE,cAAc,EAAE,YAAY,CAAC,cAAc,CAAC;YAC5C,kBAAkB,EAAE,YAAY;YAChC,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;OAQG;IACH,gCAAgC,CAC9B,YAAqD;QAErD,OAAO,gCAAgC,CAAC,IAAI,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IAC9E,CAAC;IAoDD,eAAe,CACb,YAAqD,EACrD,OAAoB,EACpB,IAA0C,EAC1C,IAAgD,EAChD,IAA6B;QAM7B,IAAI,IAAI,YAAY,UAAU,EAAE,CAAC;YAC/B,MAAM,eAAe,GAAG,IAAI,CAAC;YAC7B,IAAI,gBAA8C,CAAC;YACnD,IAAI,aAAiD,CAAC;YAEtD,IAAI,IAAI,IAAI,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrC,gBAAgB,GAAG,IAAI,CAAC;gBACxB,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;iBAAM,CAAC;gBACN,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;YAED,IAAI,gBAAgB,EAAE,CAAC;gBACrB,OAAO,eAAe,CAAC;oBACrB,OAAO;oBACP,aAAa;oBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;oBACjD,YAAY;oBACZ,eAAe,EAAE,IAAI,CAAC,eAAe;oBACrC,eAAe;oBACf,gBAAgB;iBACjB,CAEA,CAAC;YACJ,CAAC;YAED,OAAO,eAAe,CAAC;gBACrB,OAAO;gBACP,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,YAAY;gBACZ,eAAe,EAAE,IAAI,CAAC,eAAe;gBACrC,eAAe;aAChB,CAEA,CAAC;QACJ,CAAC;QAED,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,eAAe,CAAC;YACrB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,YAAY;YACZ,eAAe,EAAE,IAAI,CAAC,eAAe;SACtC,CAAyE,CAAC;IAC7E,CAAC;IAoDD,0BAA0B,CACxB,gBAAkC,EAClC,uBAAgD,EAChD,OAAoB,EACpB,IAA0C,EAC1C,IAAgD,EAChD,IAA6B;QAM7B,IAAI,IAAI,YAAY,UAAU,EAAE,CAAC;YAC/B,MAAM,eAAe,GAAG,IAAI,CAAC;YAC7B,IAAI,gBAA8C,CAAC;YACnD,IAAI,aAAiD,CAAC;YAEtD,IAAI,IAAI,IAAI,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrC,gBAAgB,GAAG,IAAI,CAAC;gBACxB,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;iBAAM,CAAC;gBACN,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;YAED,IAAI,gBAAgB,EAAE,CAAC;gBACrB,OAAO,yBAAyB,CAAC;oBAC/B,aAAa;oBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;oBACjD,eAAe,EAAE,IAAI,CAAC,eAAe;oBACrC,gBAAgB;oBAChB,uBAAuB;oBACvB,OAAO;oBACP,eAAe;oBACf,gBAAgB;iBACjB,CAEA,CAAC;YACJ,CAAC;YAED,OAAO,yBAAyB,CAAC;gBAC/B,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,eAAe,EAAE,IAAI,CAAC,eAAe;gBACrC,gBAAgB;gBAChB,uBAAuB;gBACvB,OAAO;gBACP,eAAe;aAChB,CAEA,CAAC;QACJ,CAAC;QAED,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,yBAAyB,CAAC;YAC/B,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,gBAAgB;YAChB,uBAAuB;YACvB,OAAO;SACR,CAAyE,CAAC;IAC7E,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACH,eAAe,CACb,YAAqD,EACrD,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,aAAsC;QAEtC,OAAO,sBAAsB,CAAC;YAC5B,YAAY;YACZ,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;OAaG;IACH,0BAA0B,CACxB,gBAAkC,EAClC,uBAAgD,EAChD,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,aAAsC;QAEtC,OAAO,yBAAyB,CAAC;YAC/B,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,gBAAgB;YAChB,uBAAuB;YACvB,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;OAYG;IACH,cAAc,CACZ,OAAoB,EACpB,aAAsC;QAEtC,OAAO,eAAe,CAAC;YACrB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;SACtC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,kBAAkB,CAC9B,UAAgD,EAChD,SAAiB;QAEjB,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,UAAU,CAAC;QACxD,OAAO,KAAK,CAAC,IAAI,CACf,EAAE,MAAM,EAAE,SAAS,EAAE,EACrB,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CACP,WAAW,eAAe,CAAC,WAAW,EAAE,IAAI,OAAO,IAAI,MAAM,IAAI,CAAC,GAAG,CAAC,WAAW,CACpF,CAAC;IACJ,CAAC;IAEO,MAAM,CAAC,UAAU,CAAC,EAAgB;QACxC,OAAQ,EAAuB,CAAC,IAAI,KAAK,SAAS,CAAC;IACrD,CAAC;IAEO,MAAM,CAAC,kBAAkB,CAC/B,KAAQ;QAER,IAAI,OAAO,KAAK,KAAK,SAAS,EAAE,CAAC;YAC/B,OAAO;gBACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,WAAW,CAAC,KAAK;gBACvB,KAAK,EAAE,KAAK;aACsC,CAAC;QACvD,CAAC;aAAM,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAClE,OAAO;gBACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,WAAW,CAAC,QAAQ;gBAC1B,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC;aAC8B,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oBAAoB,OAAO,KAAK,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;IAED,oDAAoD;IAC5C,MAAM,CAAC,KAAK,CAAC,8BAA8B,CACjD,eAAuB,EACvB,OAAgB,EAChB,eAAwB;QAExB,MAAM,KAAK,GAAG,YAAY,CAAC,EAAE,EAAE,EAAE,OAAO,EAAE,CAAC,CAAC;QAC5C,MAAM,MAAM,GAAG,kBAAkB,CAAC;YAChC,KAAK;YACL,SAAS,EAAE,eAAe,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE;SAC5D,CAAC,CAAC;QACH,MAAM,qBAAqB,GAAG,WAAW,CAAC;YACxC,GAAG,EAAE,gBAAgB;YACrB,OAAO,EAAE,eAA0B;YACnC,MAAM;SACP,CAAC,CAAC;QACH,MAAM,mBAAmB,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QAC5E,MAAM,YAAY,GAAG,WAAW,CAAC;YAC/B,GAAG,EAAE,eAAe;YACpB,OAAO,EAAE,mBAA8B;YACvC,MAAM;SACP,CAAC,CAAC;QACH,OAAO,CAAC,GAAG,CAAC,eAAe,EAAE,qBAAqB,CAAC,OAAO,CAAC,CAAC;QAC5D,OAAO,CAAC,GAAG,CAAC,eAAe,EAAE,YAAY,CAAC,OAAO,CAAC,CAAC;QAEnD,MAAM,SAAS,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QAEzD,MAAM,YAAY,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,eAAe,EAAE,CAAC;QAC/D,MAAM,eAAe,GAAG,EAAE,CAAC;QAC3B,KAAK,IAAI,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,YAAY,EAAE,CAAC,EAAE,EAAE,CAAC;YAC9C,eAAe,CAAC,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QAChE,CAAC;QACD,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC;QAEnD,OAAO,EAAE,SAAS,EAAE,MAAM,CAAC,SAAS,CAAC,EAAE,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,EAAE,CAAC;IAC9E,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,sBAAsB,CAAC,UAAsB;QAChE,IAAI,IAAI,CAAC,0BAA0B,CAAC,UAAU,CAAC,EAAE,CAAC;YAChD,OAAO,MAAM,IAAI,CAAC,8BAA8B,CAC9C,UAAU,CAAC,eAAe,EAC1B,UAAU,CAAC,OAAO,CACnB,CAAC;QACJ,CAAC;QACD,OAAO,IAAI,CAAC,6BAA6B,EAAE,CAAC;IAC9C,CAAC;IAED,4EAA4E;IACpE,MAAM,CAAC,0BAA0B,CAAC,UAAsB;QAC9D,iIAAiI;QACjI,OAAO,UAAU,CAAC,OAAO,EAAE,KAAK,IAAI,CAAC,IAAI,UAAU,CAAC,OAAO,EAAE,KAAK,IAAI,CAAC,CAAC;IAC1E,CAAC;IAEO,MAAM,CAAC,6BAA6B;QAC1C,OAAO;YACL,SAAS,EAAE,CAAC;YACZ,OAAO,EAAE,CAAC,WAAsB,CAAC;SAClC,CAAC;IACJ,CAAC;CACF"}
|
|
@@ -4,13 +4,12 @@ export declare const LocalNodeEnv: Schema.Struct<{
|
|
|
4
4
|
STATE_DUMP: typeof Schema.String;
|
|
5
5
|
EXECUTOR_ADDRESS: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
|
6
6
|
ECIES_PUBLIC_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
7
|
-
CALLBACK_ADDRESS: Schema.TemplateLiteral<`0x${string}`>;
|
|
8
7
|
SENDER_ADDRESS: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
|
9
8
|
SENDER_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
9
|
+
EIP712_SIGNER_ADDRESS: Schema.optional<Schema.TemplateLiteral<`0x${string}`>>;
|
|
10
10
|
PEPPER: typeof Schema.String;
|
|
11
11
|
COVALIDATOR_ECIES_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
12
12
|
COVALIDATOR_EIP712_PRIVATE_SIGNING_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
13
|
-
COVALIDATOR_CALLBACK_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
14
13
|
COVALIDATOR_ACL_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
|
15
14
|
COVALIDATOR_INCO_EXECUTOR_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
|
16
15
|
COVALIDATOR_DECRYPTION_HANDLER_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
|
@@ -5,13 +5,12 @@ export const LocalNodeEnv = Schema.Struct({
|
|
|
5
5
|
STATE_DUMP: Schema.String,
|
|
6
6
|
EXECUTOR_ADDRESS: Address,
|
|
7
7
|
ECIES_PUBLIC_KEY: HexString,
|
|
8
|
-
CALLBACK_ADDRESS: HexString,
|
|
9
8
|
SENDER_ADDRESS: Address,
|
|
10
9
|
SENDER_PRIVATE_KEY: HexString,
|
|
10
|
+
EIP712_SIGNER_ADDRESS: Schema.optional(HexString),
|
|
11
11
|
PEPPER: Schema.String,
|
|
12
12
|
COVALIDATOR_ECIES_PRIVATE_KEY: HexString,
|
|
13
13
|
COVALIDATOR_EIP712_PRIVATE_SIGNING_KEY: HexString,
|
|
14
|
-
COVALIDATOR_CALLBACK_PRIVATE_KEY: HexString,
|
|
15
14
|
COVALIDATOR_ACL_ADDR: Address,
|
|
16
15
|
COVALIDATOR_INCO_EXECUTOR_ADDR: Address,
|
|
17
16
|
COVALIDATOR_DECRYPTION_HANDLER_ADDR: Address,
|
|
@@ -57,4 +56,4 @@ function parseEnv(envContent) {
|
|
|
57
56
|
}
|
|
58
57
|
return env;
|
|
59
58
|
}
|
|
60
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
59
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoibG9jYWwtbm9kZS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9sb2NhbC9sb2NhbC1ub2RlLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLE9BQU8sRUFBRSxNQUFNLEVBQUUsTUFBTSxRQUFRLENBQUM7QUFDaEMsT0FBTyxFQUFFLE9BQU8sRUFBRSxTQUFTLEVBQUUsTUFBTSxjQUFjLENBQUM7QUFFbEQsTUFBTSxDQUFDLE1BQU0sWUFBWSxHQUFHLE1BQU0sQ0FBQyxNQUFNLENBQUM7SUFDeEMsZ0JBQWdCLEVBQUUsT0FBTztJQUN6QixVQUFVLEVBQUUsTUFBTSxDQUFDLE1BQU07SUFDekIsZ0JBQWdCLEVBQUUsT0FBTztJQUN6QixnQkFBZ0IsRUFBRSxTQUFTO0lBQzNCLGNBQWMsRUFBRSxPQUFPO0lBQ3ZCLGtCQUFrQixFQUFFLFNBQVM7SUFDN0IscUJBQXFCLEVBQUUsTUFBTSxDQUFDLFFBQVEsQ0FBQyxTQUFTLENBQUM7SUFDakQsTUFBTSxFQUFFLE1BQU0sQ0FBQyxNQUFNO0lBQ3JCLDZCQUE2QixFQUFFLFNBQVM7SUFDeEMsc0NBQXNDLEVBQUUsU0FBUztJQUNqRCxvQkFBb0IsRUFBRSxPQUFPO0lBQzdCLDhCQUE4QixFQUFFLE9BQU87SUFDdkMsbUNBQW1DLEVBQUUsT0FBTztJQUM1Qyx5QkFBeUIsRUFBRSxNQUFNLENBQUMsUUFBUSxDQUFDLE1BQU0sQ0FBQyxNQUFNLENBQUM7SUFDekQsZUFBZSxFQUFFLE1BQU0sQ0FBQyxRQUFRLENBQUMsTUFBTSxDQUFDLE1BQU0sQ0FBQztJQUMvQyw4QkFBOEIsRUFBRSxNQUFNLENBQUMsUUFBUSxDQUFDLE1BQU0sQ0FBQyxNQUFNLENBQUM7Q0FDL0QsQ0FBQyxDQUFDO0FBSUgsc0VBQXNFO0FBQ3RFLGdFQUFnRTtBQUNoRSxNQUFNLFVBQVUsYUFBYSxDQUFDLFlBQThCO0lBQzFELE1BQU0sTUFBTSxHQUFHLFlBQVksQ0FBQyxDQUFDLENBQUMsT0FBTyxDQUFDLFlBQVksQ0FBQyxDQUFDLENBQUMsQ0FBQyxPQUFPLENBQUMsR0FBRyxDQUFDO0lBQ2xFLE9BQU8sTUFBTSxDQUFDLGlCQUFpQixDQUFDLFlBQVksQ0FBQyxDQUFDLE1BQU0sQ0FBQyxDQUFDO0FBQ3hELENBQUM7QUFFRCxTQUFTLE9BQU8sQ0FBQyxVQUEyQjtJQUMxQyxPQUFPLFFBQVEsQ0FBQyxVQUFVLENBQUMsUUFBUSxFQUFFLENBQUMsQ0FBQztBQUN6QyxDQUFDO0FBRUQsbUZBQW1GO0FBQ25GLFNBQVMsUUFBUSxDQUFDLFVBQWtCO0lBQ2xDLElBQUksR0FBRyxHQUEyQixFQUFFLENBQUM7SUFDckMsTUFBTSxLQUFLLEdBQUcsVUFBVSxDQUFDLEtBQUssQ0FBQyxJQUFJLENBQUMsQ0FBQztJQUVyQyxpQ0FBaUM7SUFDakMsS0FBSyxNQUFNLElBQUksSUFBSSxLQUFLLEVBQUUsQ0FBQztRQUN6QixNQUFNLFdBQVcsR0FBRyxJQUFJLENBQUMsSUFBSSxFQUFFLENBQUM7UUFDaEMsSUFBSSxXQUFXLElBQUksQ0FBQyxXQUFXLENBQUMsVUFBVSxDQUFDLEdBQUcsQ0FBQyxFQUFFLENBQUM7WUFDaEQsTUFBTSxVQUFVLEdBQUcsV0FBVyxDQUFDLE9BQU8sQ0FBQyxHQUFHLENBQUMsQ0FBQztZQUM1QyxJQUFJLFVBQVUsS0FBSyxDQUFDLENBQUMsRUFBRSxDQUFDO2dCQUN0QixNQUFNLEdBQUcsR0FBRyxXQUFXLENBQUMsU0FBUyxDQUFDLENBQUMsRUFBRSxVQUFVLENBQUMsQ0FBQyxJQUFJLEVBQUUsQ0FBQztnQkFDeEQsSUFBSSxLQUFLLEdBQUcsV0FBVyxDQUFDLFNBQVMsQ0FBQyxVQUFVLEdBQUcsQ0FBQyxDQUFDLENBQUMsSUFBSSxFQUFFLENBQUM7Z0JBRXpELHVCQUF1QjtnQkFDdkIsSUFDRSxDQUFDLEtBQUssQ0FBQyxVQUFVLENBQUMsR0FBRyxDQUFDLElBQUksS0FBSyxDQUFDLFFBQVEsQ0FBQyxHQUFHLENBQUMsQ0FBQztvQkFDOUMsQ0FBQyxLQUFLLENBQUMsVUFBVSxDQUFDLEdBQUcsQ0FBQyxJQUFJLEtBQUssQ0FBQyxRQUFRLENBQUMsR0FBRyxDQUFDLENBQUMsRUFDOUMsQ0FBQztvQkFDRCxLQUFLLEdBQUcsS0FBSyxDQUFDLFNBQVMsQ0FBQyxDQUFDLEVBQUUsS0FBSyxDQUFDLE1BQU0sR0FBRyxDQUFDLENBQUMsQ0FBQztnQkFDL0MsQ0FBQztnQkFFRCxHQUFHLENBQUMsR0FBRyxDQUFDLEdBQUcsS0FBSyxDQUFDO1lBQ25CLENBQUM7UUFDSCxDQUFDO0lBQ0gsQ0FBQztJQUVELHlEQUF5RDtJQUN6RCxLQUFLLE1BQU0sQ0FBQyxHQUFHLEVBQUUsS0FBSyxDQUFDLElBQUksTUFBTSxDQUFDLE9BQU8sQ0FBQyxHQUFHLENBQUMsRUFBRSxDQUFDO1FBQy9DLEdBQUcsQ0FBQyxHQUFHLENBQUMsR0FBRyxLQUFLLENBQUMsT0FBTyxDQUFDLGNBQWMsRUFBRSxDQUFDLENBQUMsRUFBRSxPQUFlLEVBQUUsRUFBRTtZQUM5RCxPQUFPLEdBQUcsQ0FBQyxPQUFPLENBQUMsSUFBSSxFQUFFLENBQUM7UUFDNUIsQ0FBQyxDQUFDLENBQUM7SUFDTCxDQUFDO0lBRUQsT0FBTyxHQUFHLENBQUM7QUFDYixDQUFDIn0=
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
import { Account, Chain, Transport, WalletClient } from 'viem';
|
|
2
|
+
import { vi } from 'vitest';
|
|
3
|
+
import { KmsClient } from '../kms/client.js';
|
|
4
|
+
import { KmsQuorumClient } from '../kms/quorumClient.js';
|
|
5
|
+
interface MinimalKmsClient {
|
|
6
|
+
attestedCompute: ReturnType<typeof vi.fn>;
|
|
7
|
+
attestedDecrypt: ReturnType<typeof vi.fn>;
|
|
8
|
+
key: ReturnType<typeof vi.fn>;
|
|
9
|
+
reencrypt: ReturnType<typeof vi.fn>;
|
|
10
|
+
}
|
|
11
|
+
export declare function createMockKmsClient(): MinimalKmsClient & KmsClient;
|
|
12
|
+
export declare function createMockQuorumClient(): KmsQuorumClient;
|
|
13
|
+
export declare function setupMockInQuorumClient(quorumClient: KmsQuorumClient, mockKmsClient: MinimalKmsClient & KmsClient): void;
|
|
14
|
+
export declare function createTestWalletClient(): WalletClient<Transport, Chain, Account>;
|
|
15
|
+
export {};
|