@inco/js 0.6.8 → 0.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (140) hide show
  1. package/README.md +8 -8
  2. package/dist/cjs/advancedacl/session-key.d.ts +39 -19
  3. package/dist/cjs/advancedacl/session-key.js +59 -108
  4. package/dist/cjs/attestedcompute/attested-compute.d.ts +6 -6
  5. package/dist/cjs/attestedcompute/attested-compute.js +5 -28
  6. package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +68 -16
  7. package/dist/cjs/attesteddecrypt/attested-decrypt.js +108 -66
  8. package/dist/cjs/attesteddecrypt/types.d.ts +8 -3
  9. package/dist/cjs/attesteddecrypt/types.js +1 -1
  10. package/dist/cjs/encryption/encryption.d.ts +8 -10
  11. package/dist/cjs/encryption/encryption.js +6 -6
  12. package/dist/cjs/generated/abis/add-two.d.ts +1 -1
  13. package/dist/cjs/generated/abis/add-two.js +1 -1
  14. package/dist/cjs/generated/abis/lightning-preview.d.ts +40 -0
  15. package/dist/cjs/generated/abis/lightning-preview.js +29 -1
  16. package/dist/cjs/generated/abis/lightning.d.ts +1 -1
  17. package/dist/cjs/generated/abis/lightning.js +1 -1
  18. package/dist/cjs/generated/abis/verifier.d.ts +126 -67
  19. package/dist/cjs/generated/abis/verifier.js +108 -54
  20. package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
  21. package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
  22. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +87 -132
  23. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +21 -27
  24. package/dist/cjs/generated/lightning.d.ts +40 -32
  25. package/dist/cjs/generated/lightning.js +43 -33
  26. package/dist/cjs/generated/local-node.d.ts +11 -11
  27. package/dist/cjs/generated/local-node.js +28 -12
  28. package/dist/cjs/kms/client.d.ts +8 -4
  29. package/dist/cjs/kms/client.js +9 -4
  30. package/dist/cjs/kms/quorumClient.d.ts +58 -0
  31. package/dist/cjs/kms/quorumClient.js +378 -0
  32. package/dist/cjs/kms/thresholdPromises.d.ts +7 -0
  33. package/dist/cjs/kms/thresholdPromises.js +52 -0
  34. package/dist/cjs/lite/deployments.d.ts +20 -2
  35. package/dist/cjs/lite/deployments.js +1 -1
  36. package/dist/cjs/lite/index.d.ts +1 -2
  37. package/dist/cjs/lite/index.js +1 -2
  38. package/dist/cjs/lite/lightning.d.ts +109 -77
  39. package/dist/cjs/lite/lightning.js +279 -112
  40. package/dist/cjs/local/local-node.d.ts +1 -2
  41. package/dist/cjs/local/local-node.js +2 -3
  42. package/dist/cjs/test/mocks.d.ts +15 -0
  43. package/dist/cjs/test/mocks.js +45 -0
  44. package/dist/cjs/viem.d.ts +1 -1
  45. package/dist/esm/advancedacl/session-key.d.ts +39 -19
  46. package/dist/esm/advancedacl/session-key.js +52 -100
  47. package/dist/esm/attestedcompute/attested-compute.d.ts +6 -6
  48. package/dist/esm/attestedcompute/attested-compute.js +6 -29
  49. package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +68 -16
  50. package/dist/esm/attesteddecrypt/attested-decrypt.js +109 -68
  51. package/dist/esm/attesteddecrypt/types.d.ts +8 -3
  52. package/dist/esm/attesteddecrypt/types.js +1 -1
  53. package/dist/esm/encryption/encryption.d.ts +8 -10
  54. package/dist/esm/encryption/encryption.js +6 -6
  55. package/dist/esm/generated/abis/add-two.d.ts +1 -1
  56. package/dist/esm/generated/abis/add-two.js +1 -1
  57. package/dist/esm/generated/abis/lightning-preview.d.ts +40 -0
  58. package/dist/esm/generated/abis/lightning-preview.js +29 -1
  59. package/dist/esm/generated/abis/lightning.d.ts +1 -1
  60. package/dist/esm/generated/abis/lightning.js +1 -1
  61. package/dist/esm/generated/abis/verifier.d.ts +126 -67
  62. package/dist/esm/generated/abis/verifier.js +108 -54
  63. package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
  64. package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
  65. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +87 -132
  66. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +19 -25
  67. package/dist/esm/generated/lightning.d.ts +40 -32
  68. package/dist/esm/generated/lightning.js +43 -33
  69. package/dist/esm/generated/local-node.d.ts +11 -11
  70. package/dist/esm/generated/local-node.js +28 -12
  71. package/dist/esm/kms/client.d.ts +8 -4
  72. package/dist/esm/kms/client.js +8 -4
  73. package/dist/esm/kms/quorumClient.d.ts +58 -0
  74. package/dist/esm/kms/quorumClient.js +374 -0
  75. package/dist/esm/kms/thresholdPromises.d.ts +7 -0
  76. package/dist/esm/kms/thresholdPromises.js +49 -0
  77. package/dist/esm/lite/deployments.d.ts +20 -2
  78. package/dist/esm/lite/deployments.js +1 -1
  79. package/dist/esm/lite/index.d.ts +1 -2
  80. package/dist/esm/lite/index.js +1 -2
  81. package/dist/esm/lite/lightning.d.ts +109 -77
  82. package/dist/esm/lite/lightning.js +278 -111
  83. package/dist/esm/local/local-node.d.ts +1 -2
  84. package/dist/esm/local/local-node.js +2 -3
  85. package/dist/esm/test/mocks.d.ts +15 -0
  86. package/dist/esm/test/mocks.js +39 -0
  87. package/dist/esm/viem.d.ts +1 -1
  88. package/dist/types/advancedacl/session-key.d.ts +39 -19
  89. package/dist/types/attestedcompute/attested-compute.d.ts +6 -6
  90. package/dist/types/attesteddecrypt/attested-decrypt.d.ts +68 -16
  91. package/dist/types/attesteddecrypt/types.d.ts +8 -3
  92. package/dist/types/encryption/encryption.d.ts +8 -10
  93. package/dist/types/generated/abis/add-two.d.ts +1 -1
  94. package/dist/types/generated/abis/lightning-preview.d.ts +40 -0
  95. package/dist/types/generated/abis/lightning.d.ts +1 -1
  96. package/dist/types/generated/abis/verifier.d.ts +126 -67
  97. package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
  98. package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +87 -132
  99. package/dist/types/generated/lightning.d.ts +40 -32
  100. package/dist/types/generated/local-node.d.ts +11 -11
  101. package/dist/types/kms/client.d.ts +8 -4
  102. package/dist/types/kms/quorumClient.d.ts +58 -0
  103. package/dist/types/kms/thresholdPromises.d.ts +7 -0
  104. package/dist/types/lite/deployments.d.ts +20 -2
  105. package/dist/types/lite/index.d.ts +1 -2
  106. package/dist/types/lite/lightning.d.ts +109 -77
  107. package/dist/types/local/local-node.d.ts +1 -2
  108. package/dist/types/test/mocks.d.ts +15 -0
  109. package/dist/types/viem.d.ts +1 -1
  110. package/package.json +3 -3
  111. package/dist/cjs/attestedreveal/attested-reveal.d.ts +0 -21
  112. package/dist/cjs/attestedreveal/attested-reveal.js +0 -67
  113. package/dist/cjs/attestedreveal/index.d.ts +0 -1
  114. package/dist/cjs/attestedreveal/index.js +0 -18
  115. package/dist/cjs/attestedreveal/types.d.ts +0 -7
  116. package/dist/cjs/attestedreveal/types.js +0 -16
  117. package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
  118. package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.js +0 -118
  119. package/dist/cjs/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
  120. package/dist/cjs/generated/es/inco/fhe/v1/types_pb.js +0 -136
  121. package/dist/cjs/lite/reencrypt.d.ts +0 -23
  122. package/dist/cjs/lite/reencrypt.js +0 -131
  123. package/dist/esm/attestedreveal/attested-reveal.d.ts +0 -21
  124. package/dist/esm/attestedreveal/attested-reveal.js +0 -64
  125. package/dist/esm/attestedreveal/index.d.ts +0 -1
  126. package/dist/esm/attestedreveal/index.js +0 -2
  127. package/dist/esm/attestedreveal/types.d.ts +0 -7
  128. package/dist/esm/attestedreveal/types.js +0 -12
  129. package/dist/esm/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
  130. package/dist/esm/generated/es/cosmos_proto/cosmos_pb.js +0 -115
  131. package/dist/esm/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
  132. package/dist/esm/generated/es/inco/fhe/v1/types_pb.js +0 -133
  133. package/dist/esm/lite/reencrypt.d.ts +0 -23
  134. package/dist/esm/lite/reencrypt.js +0 -122
  135. package/dist/types/attestedreveal/attested-reveal.d.ts +0 -21
  136. package/dist/types/attestedreveal/index.d.ts +0 -1
  137. package/dist/types/attestedreveal/types.d.ts +0 -7
  138. package/dist/types/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
  139. package/dist/types/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
  140. package/dist/types/lite/reencrypt.d.ts +0 -23
@@ -1,7 +1,6 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.Lightning = void 0;
4
- const fs = require("fs/promises");
5
4
  const viem_1 = require("viem");
6
5
  const chains_1 = require("viem/chains");
7
6
  const session_key_js_1 = require("../advancedacl/session-key.js");
@@ -9,44 +8,53 @@ const attested_compute_js_1 = require("../attestedcompute/attested-compute.js");
9
8
  const attested_decrypt_js_1 = require("../attesteddecrypt/attested-decrypt.js");
10
9
  const binary_js_1 = require("../binary.js");
11
10
  const index_js_1 = require("../encryption/index.js");
12
- const lightning_js_1 = require("../generated/lightning.js");
11
+ const lightning_js_1 = require("../generated/abis/lightning.js");
12
+ const verifier_js_1 = require("../generated/abis/verifier.js");
13
+ const lightning_js_2 = require("../generated/lightning.js");
13
14
  const local_node_js_1 = require("../generated/local-node.js");
14
15
  const handle_js_1 = require("../handle.js");
15
- const index_js_2 = require("../local/index.js");
16
+ const index_js_2 = require("../index.js");
17
+ const quorumClient_js_1 = require("../kms/quorumClient.js");
18
+ const index_js_3 = require("../local/index.js");
16
19
  const schema_js_1 = require("../schema.js");
17
20
  const ecies_js_1 = require("./ecies.js");
18
- const reencrypt_js_1 = require("./reencrypt.js");
19
21
  const DefaultPepper = 'testnet';
22
+ function isSecp256k1Keypair(value) {
23
+ return !!value && typeof value === 'object' && 'kp' in value;
24
+ }
25
+ function isLocalNodeEnvFileSource(value) {
26
+ return (!!value &&
27
+ typeof value === 'object' &&
28
+ 'filePath' in value &&
29
+ typeof value.filePath === 'string');
30
+ }
20
31
  /**
21
32
  * The Lightning class provides a convenient way to interact with the Inco Lightning contract by binding to a specific
22
33
  * deployment.
23
34
  */
24
35
  class Lightning {
25
36
  _deployment;
26
- covalidatorUrl;
37
+ covalidatorUrls;
38
+ signers;
39
+ threshold;
27
40
  executorAddress;
28
- eciesPublicKey;
29
41
  chainId;
30
- encryptor;
31
42
  ephemeralKeypair;
32
- kmsClient;
33
- constructor(_deployment, covalidatorUrl) {
43
+ kmsQuorumClient;
44
+ constructor(_deployment, covalidatorUrls, signers, threshold) {
34
45
  this._deployment = _deployment;
35
- this.covalidatorUrl = covalidatorUrl;
46
+ this.covalidatorUrls = covalidatorUrls;
47
+ this.signers = signers;
48
+ this.threshold = threshold;
36
49
  this.executorAddress = (0, binary_js_1.parseAddress)(_deployment.executorAddress);
37
- this.eciesPublicKey = (0, schema_js_1.parse)(binary_js_1.HexString, _deployment.eciesPublicKey);
38
50
  this.chainId = BigInt(_deployment.chainId);
39
51
  this.ephemeralKeypair = (0, ecies_js_1.generateSecp256k1Keypair)();
40
- this.kmsClient = (0, reencrypt_js_1.getKmsClient)(covalidatorUrl);
41
- this.encryptor = (0, ecies_js_1.getEciesEncryptor)({
42
- pubKeyA: (0, ecies_js_1.decodeSecp256k1PublicKey)((0, viem_1.hexToBytes)((0, schema_js_1.parse)(binary_js_1.HexString, _deployment.eciesPublicKey))),
43
- privKeyB: this.ephemeralKeypair,
44
- });
52
+ this.kmsQuorumClient = quorumClient_js_1.KmsQuorumClient.fromUrls(covalidatorUrls, signers, threshold);
45
53
  }
46
54
  /**
47
55
  * Get a Lightning instance bound to the latest Lightning deployment for the Base Sepolia testnet.
48
56
  */
49
- static baseSepoliaTestnet() {
57
+ static async baseSepoliaTestnet() {
50
58
  return Lightning.latest('testnet', chains_1.baseSepolia.id);
51
59
  }
52
60
  /**
@@ -64,12 +72,22 @@ class Lightning {
64
72
  * corresponding Pepper.
65
73
  *
66
74
  */
67
- static localNode(env) {
75
+ static async localNode(env) {
68
76
  if (!env) {
69
- return Lightning.custom(local_node_js_1.localNodeLightningConfig[DefaultPepper]);
77
+ const config = local_node_js_1.localNodeLightningConfig[DefaultPepper];
78
+ return Lightning.custom({
79
+ ...config,
80
+ covalidatorUrls: [...config.covalidatorUrls],
81
+ signers: config.signers.map((s) => (0, binary_js_1.parseAddress)(s)),
82
+ });
70
83
  }
71
84
  if (typeof env === 'string') {
72
- return Lightning.custom(local_node_js_1.localNodeLightningConfig[env]);
85
+ const config = local_node_js_1.localNodeLightningConfig[env];
86
+ return Lightning.custom({
87
+ ...config,
88
+ covalidatorUrls: [...config.covalidatorUrls],
89
+ signers: config.signers.map((s) => (0, binary_js_1.parseAddress)(s)),
90
+ });
73
91
  }
74
92
  const conf = local_node_js_1.localNodeLightningConfig[DefaultPepper];
75
93
  return Lightning.custom({
@@ -77,13 +95,17 @@ class Lightning {
77
95
  chainId: env.COVALIDATOR_HOST_CHAIN_ID
78
96
  ? Number(env.COVALIDATOR_HOST_CHAIN_ID)
79
97
  : conf.chainId,
80
- covalidatorUrl: env.COVALIDATOR_URL ?? conf.covalidatorUrl,
98
+ covalidatorUrls: env.COVALIDATOR_URL
99
+ ? env.COVALIDATOR_URL.split(',')
100
+ : [...conf.covalidatorUrls],
101
+ signers: env.EIP712_SIGNER_ADDRESS
102
+ ? env.EIP712_SIGNER_ADDRESS.split(',').map((address) => (0, binary_js_1.parseAddress)(address))
103
+ : conf.signers.map((s) => (0, binary_js_1.parseAddress)(s)),
81
104
  hostChainRpcUrl: env.COVALIDATOR_HOST_CHAIN_RPC_URL ??
82
105
  conf.hostChainRpcUrl ??
83
106
  'http://localhost:8545',
84
107
  // These variables vary per environment
85
108
  executorAddress: env.EXECUTOR_ADDRESS,
86
- eciesPublicKey: env.ECIES_PUBLIC_KEY,
87
109
  senderPrivateKey: env.SENDER_PRIVATE_KEY,
88
110
  });
89
111
  }
@@ -92,25 +114,36 @@ class Lightning {
92
114
  *
93
115
  * @param filePath the path to the file containing the environment variables in dotenv format
94
116
  */
95
- static async localNodeFromEnv(filePath) {
96
- const buf = filePath ? await fs.readFile(filePath) : undefined;
97
- const env = (0, index_js_2.parseLocalEnv)(buf);
98
- return Lightning.localNode(env);
117
+ static async localNodeFromEnv(source) {
118
+ let envContent;
119
+ if (isLocalNodeEnvFileSource(source)) {
120
+ if (typeof process === 'undefined' || !process.versions?.node) {
121
+ throw new Error('Lightning.localNodeFromEnv with a file path is only available in Node environments.');
122
+ }
123
+ const { readFile } = await Promise.resolve().then(() => require('fs/promises'));
124
+ envContent = await readFile(source.filePath);
125
+ }
126
+ else {
127
+ envContent = source;
128
+ }
129
+ const env = (0, index_js_3.parseLocalEnv)(envContent);
130
+ return await Lightning.localNode(env);
99
131
  }
100
132
  /**
101
133
  * Get a Lightning deployment by name or executor address on a particular chain.
102
134
  *
103
135
  * @param id this is an object containing either the pair of name and chainId or the executorAddress and chainId
104
136
  */
105
- static at(id) {
137
+ static async at(id) {
106
138
  const deployment = this.isIdByName(id)
107
- ? lightning_js_1.lightningDeployments.find((d) => d.name === id.name && d.chainId === id.chainId)
108
- : lightning_js_1.lightningDeployments.find((d) => d.executorAddress === id.executorAddress &&
139
+ ? lightning_js_2.lightningDeployments.find((d) => d.name === id.name && d.chainId === id.chainId)
140
+ : lightning_js_2.lightningDeployments.find((d) => d.executorAddress === id.executorAddress &&
109
141
  d.chainId === id.chainId);
110
142
  if (!deployment) {
111
143
  throw new Error(`No deployment found for ${JSON.stringify(id)}`);
112
144
  }
113
- return new Lightning(deployment, Lightning.getCovalidatorUrl(deployment));
145
+ const { threshold, signers } = await Lightning.getThresholdAndSigners(deployment);
146
+ return new Lightning(deployment, Lightning.getCovalidatorUrls(deployment, threshold), signers, threshold);
114
147
  }
115
148
  /**
116
149
  * Get a Lightning deployment for a local or custom node
@@ -118,8 +151,23 @@ class Lightning {
118
151
  * @param config this is an object containing the executorAddress, eciesPublicKey, chainId and covalidatorUrl.
119
152
  * additional fields past will be made available as part of the `deployment` property.
120
153
  */
121
- static custom(config) {
122
- return new Lightning(config, config.covalidatorUrl);
154
+ static async custom(config) {
155
+ const { threshold, signers } = await Lightning.getContractThresholdAndSigners(config.executorAddress, config.chainId, config.hostChainRpcUrl);
156
+ return new Lightning(config, config.covalidatorUrls, signers, threshold);
157
+ }
158
+ static async getEciesPublicKey(client, executorAddress) {
159
+ const incoLightningContract = (0, viem_1.getContract)({
160
+ abi: lightning_js_1.incoLightningAbi,
161
+ address: executorAddress,
162
+ client,
163
+ });
164
+ const incoVerifierAddress = await incoLightningContract.read.incoVerifier();
165
+ const incoVerifier = (0, viem_1.getContract)({
166
+ abi: verifier_js_1.incoVerifierAbi,
167
+ address: incoVerifierAddress,
168
+ client,
169
+ });
170
+ return await incoVerifier.read.eciesPubkey();
123
171
  }
124
172
  /**
125
173
  * Get the latest deployment for a given pepper, which usually denotes a family of deployments distinct from their
@@ -130,7 +178,7 @@ class Lightning {
130
178
  */
131
179
  static latestDeployment(pepper, chainId) {
132
180
  // Deployments are sorted so we are guaranteed to get the latest first
133
- const latestByPepper = lightning_js_1.lightningDeployments.find((d) => d.pepper === pepper && d.chainId === chainId);
181
+ const latestByPepper = lightning_js_2.lightningDeployments.find((d) => d.pepper === pepper && d.chainId === chainId);
134
182
  if (!latestByPepper) {
135
183
  // This should not actually happen provided this file compiles since we are extracting the available peppers
136
184
  // from the const itself
@@ -144,9 +192,9 @@ class Lightning {
144
192
  * will not be compatible with the new version.
145
193
  *
146
194
  * @param pepper the pepper to use to filter the deployments
147
- * @param chainId the chainId to use to filter the deployments
195
+ * @param chain the chain to use to filter the deployments
148
196
  */
149
- static latest(pepper, chainId) {
197
+ static async latest(pepper, chainId) {
150
198
  return Lightning.at(Lightning.latestDeployment(pepper, chainId));
151
199
  }
152
200
  /*
@@ -163,8 +211,8 @@ class Lightning {
163
211
  * @param accountAddress the address of the account interacting with the dapp contract, normally an Externally Owned Account (EOA)
164
212
  * @param dappAddress the address of the dapp contract that interacts with the Inco Lightning contract or library
165
213
  */
166
- async encrypt(value, { accountAddress, dappAddress }) {
167
- const { ciphertext } = await this.encryptor({
214
+ async encrypt(value, { accountAddress, dappAddress }, encryptor) {
215
+ const { ciphertext } = await encryptor({
168
216
  plaintext: Lightning.plaintextFromValue(value),
169
217
  context: {
170
218
  hostChainId: this.chainId,
@@ -176,18 +224,15 @@ class Lightning {
176
224
  return ciphertext.value;
177
225
  }
178
226
  /**
179
- * Obtain a reencryptor for a particular Externally Owned Account (EOA) to request decrypted values.
180
- * The account associated with the walletClient must have permissions to decrypt the handle or ciphertext passed
181
- * to the reencryptor function.
227
+ * Get the encryptor for a specific ECIES public key.
182
228
  *
183
- * @param walletClient the wallet client to use for signing the reencrypt request.
229
+ * @param eciesPubkey the ECIES public key to use for encryption
230
+ * @returns an Encryptor instance configured for the specified ECIES public key
184
231
  */
185
- getReencryptor(walletClient) {
186
- return (0, reencrypt_js_1.incoLiteReencryptor)({
187
- walletClient,
188
- kmsConnectRpcEndpointOrClient: this.kmsClient,
189
- chainId: this.chainId,
190
- ephemeralKeypair: this.ephemeralKeypair,
232
+ getEncryptor(eciesPubkey) {
233
+ return (0, ecies_js_1.getEciesEncryptor)({
234
+ pubKeyA: (0, ecies_js_1.decodeSecp256k1PublicKey)((0, viem_1.hexToBytes)((0, schema_js_1.parse)(binary_js_1.HexString, eciesPubkey))),
235
+ privKeyB: this.ephemeralKeypair,
191
236
  });
192
237
  }
193
238
  /**
@@ -223,31 +268,6 @@ class Lightning {
223
268
  expiresAt,
224
269
  });
225
270
  }
226
- /**
227
- * Creates a session key reencryptor for secure data reencryption operations.
228
- *
229
- * This method returns a reencryptor instance that can be used to perform reencryption
230
- * operations using session keys. The reencryptor is configured with the provided
231
- * allowance voucher and ephemeral keypair for secure communication.
232
- *
233
- * @param allowanceVoucherWithSig - The signed allowance voucher obtained from grantSessionKeyAllowanceVoucher
234
- * @param ephemeralKeypair - The ephemeral keypair used for secure communication with the KMS make sure it has allowance to voucher
235
- * @returns A reencryptor instance configured for session key operations
236
- *
237
- * @example
238
- * ```typescript
239
- * const reencryptor = await lightning.getSessionKeyRencryptor(voucher, ephemeralKeypair);
240
- * const decryptedValue = await reencryptor({handle: resultHandle});
241
- * ```
242
- */
243
- getSessionKeyRencryptor(allowanceVoucherWithSig, ephemeralKeypair) {
244
- return (0, session_key_js_1.sessionKeyReencryptor)({
245
- chainId: this.chainId,
246
- kmsConnectRpcEndpointOrClient: this.kmsClient,
247
- ephemeralKeypair,
248
- allowanceVoucherWithSig,
249
- });
250
- }
251
271
  /**
252
272
  * Updates the active session nonce for the given wallet client.
253
273
  *
@@ -260,74 +280,175 @@ class Lightning {
260
280
  updateActiveVouchersSessionNonce(walletClient) {
261
281
  return (0, session_key_js_1.updateActiveVouchersSessionNonce)(this.executorAddress, walletClient);
262
282
  }
263
- attestedDecrypt(arg1, arg2, arg3, arg4) {
264
- if (Array.isArray(arg2)) {
265
- const walletClient = arg1;
266
- const handles = arg2;
267
- const backoffConfig = arg3;
283
+ attestedDecrypt(walletClient, handles, arg3, arg4, arg5) {
284
+ if (arg3 instanceof Uint8Array) {
285
+ const reencryptPubKey = arg3;
286
+ let reencryptKeypair;
287
+ let backoffConfig;
288
+ if (arg4 && isSecp256k1Keypair(arg4)) {
289
+ reencryptKeypair = arg4;
290
+ backoffConfig = arg5;
291
+ }
292
+ else {
293
+ backoffConfig = arg4;
294
+ }
295
+ if (reencryptKeypair) {
296
+ return (0, attested_decrypt_js_1.attestedDecrypt)({
297
+ handles,
298
+ backoffConfig,
299
+ chainId: Number(this.chainId),
300
+ walletClient,
301
+ kmsQuorumClient: this.kmsQuorumClient,
302
+ reencryptPubKey,
303
+ reencryptKeypair,
304
+ });
305
+ }
268
306
  return (0, attested_decrypt_js_1.attestedDecrypt)({
269
307
  handles,
270
308
  backoffConfig,
271
309
  chainId: Number(this.chainId),
272
310
  walletClient,
273
- kmsConnectRpcEndpointOrClient: this.kmsClient,
311
+ kmsQuorumClient: this.kmsQuorumClient,
312
+ reencryptPubKey,
274
313
  });
275
314
  }
276
- else {
277
- const ephemeralKeypair = arg1;
278
- const allowanceVoucherWithSig = arg2;
279
- const handles = arg3;
280
- const backoffConfig = arg4;
315
+ const backoffConfig = arg3;
316
+ return (0, attested_decrypt_js_1.attestedDecrypt)({
317
+ handles,
318
+ backoffConfig,
319
+ chainId: Number(this.chainId),
320
+ walletClient,
321
+ kmsQuorumClient: this.kmsQuorumClient,
322
+ });
323
+ }
324
+ attestedDecryptWithVoucher(ephemeralKeypair, allowanceVoucherWithSig, handles, arg4, arg5, arg6) {
325
+ if (arg4 instanceof Uint8Array) {
326
+ const reencryptPubKey = arg4;
327
+ let reencryptKeypair;
328
+ let backoffConfig;
329
+ if (arg5 && isSecp256k1Keypair(arg5)) {
330
+ reencryptKeypair = arg5;
331
+ backoffConfig = arg6;
332
+ }
333
+ else {
334
+ backoffConfig = arg5;
335
+ }
336
+ if (reencryptKeypair) {
337
+ return (0, session_key_js_1.sessionKeyAttestedDecrypt)({
338
+ backoffConfig,
339
+ chainId: Number(this.chainId),
340
+ kmsQuorumClient: this.kmsQuorumClient,
341
+ ephemeralKeypair,
342
+ allowanceVoucherWithSig,
343
+ handles,
344
+ reencryptPubKey,
345
+ reencryptKeypair,
346
+ });
347
+ }
281
348
  return (0, session_key_js_1.sessionKeyAttestedDecrypt)({
282
349
  backoffConfig,
283
350
  chainId: Number(this.chainId),
284
- kmsConnectRpcEndpointOrClient: this.kmsClient,
351
+ kmsQuorumClient: this.kmsQuorumClient,
285
352
  ephemeralKeypair,
286
353
  allowanceVoucherWithSig,
287
354
  handles,
355
+ reencryptPubKey,
288
356
  });
289
357
  }
358
+ const backoffConfig = arg4;
359
+ return (0, session_key_js_1.sessionKeyAttestedDecrypt)({
360
+ backoffConfig,
361
+ chainId: Number(this.chainId),
362
+ kmsQuorumClient: this.kmsQuorumClient,
363
+ ephemeralKeypair,
364
+ allowanceVoucherWithSig,
365
+ handles,
366
+ });
290
367
  }
291
- attestedCompute(arg1, lhsHandle, op, rhsPlaintext, arg5, arg6) {
292
- if (typeof arg5 === 'object' &&
293
- arg5 !== null &&
294
- 'voucher' in arg5 &&
295
- 'voucherSignature' in arg5 &&
296
- 'sharer' in arg5) {
297
- // Session-key path
298
- const ephemeralKeypair = arg1;
299
- const allowanceVoucherWithSig = arg5;
300
- const backoffConfig = arg6;
301
- return (0, session_key_js_1.sessionKeyAttestedCompute)({
302
- chainId: Number(this.chainId),
303
- kmsConnectRpcEndpointOrClient: this.kmsClient,
304
- ephemeralKeypair,
305
- allowanceVoucherWithSig,
306
- lhsHandle,
307
- op,
308
- rhsPlaintext,
309
- backoffConfig,
310
- });
311
- }
312
- // Wallet-client path
313
- const walletClient = arg1;
314
- const backoffConfig = arg5;
368
+ /**
369
+ * Get an attested compute for the given wallet client.
370
+ *
371
+ * @param walletClient - The wallet client used for signing the attested compute request
372
+ * @param lhsHandle - The handle to compute
373
+ * @param op - The operation to perform
374
+ * @param rhsPlaintext - The plaintext to compute with
375
+ * @param backoffConfig - The backoff configuration for the attested compute request
376
+ * @returns The decryption attestation
377
+ *
378
+ * @example
379
+ * ```typescript
380
+ * import { AttestedComputeSupportedOps } from '../lite/attested-compute.js';
381
+ * const lhsHandle = '0x...';
382
+ * const rhsPlaintext = 1337n;
383
+ * const op = AttestedComputeSupportedOps.Eq;
384
+ * const response = await lightning.attestedCompute(walletClient, lhsHandle, op, rhsPlaintext);
385
+ * const { plaintext, covalidatorSignature, handle } = response;
386
+ * ```
387
+ */
388
+ attestedCompute(walletClient, lhsHandle, op, rhsPlaintext, backoffConfig) {
315
389
  return (0, attested_compute_js_1.attestedCompute)({
316
390
  walletClient,
317
- kmsConnectRpcEndpointOrClient: this.kmsClient,
391
+ kmsQuorumClient: this.kmsQuorumClient,
392
+ chainId: Number(this.chainId),
393
+ lhsHandle,
394
+ op,
395
+ rhsPlaintext,
396
+ backoffConfig,
397
+ });
398
+ }
399
+ /**
400
+ * Performs attested compute via a voucher-backed session key.
401
+ *
402
+ * @example
403
+ * ```ts
404
+ * const attestation = await lightning.attestedComputeWithVoucher(
405
+ * ephemeralKeypair,
406
+ * voucher,
407
+ * lhsHandle,
408
+ * AttestedComputeSupportedOps.Eq,
409
+ * true,
410
+ * );
411
+ * ```
412
+ */
413
+ attestedComputeWithVoucher(ephemeralKeypair, allowanceVoucherWithSig, lhsHandle, op, rhsPlaintext, backoffConfig) {
414
+ return (0, session_key_js_1.sessionKeyAttestedCompute)({
318
415
  chainId: Number(this.chainId),
416
+ kmsQuorumClient: this.kmsQuorumClient,
417
+ ephemeralKeypair,
418
+ allowanceVoucherWithSig,
319
419
  lhsHandle,
320
420
  op,
321
421
  rhsPlaintext,
322
422
  backoffConfig,
323
423
  });
324
424
  }
425
+ /**
426
+ * Get an decryption of publicly revealed handles.
427
+ *
428
+ * @param handles - The handles to decrypt
429
+ * @param backoffConfig - The backoff configuration for the attested decrypt request
430
+ * @returns The decryption attestations
431
+ *
432
+ * @example
433
+ * ```typescript
434
+ * const response = await lightning.attestedReveal([handle1, handle2]);
435
+ * const { plaintext, covalidatorSignature } = response[0];
436
+ * ```
437
+ */
438
+ attestedReveal(handles, backoffConfig) {
439
+ return (0, attested_decrypt_js_1.attestedDecrypt)({
440
+ handles,
441
+ backoffConfig,
442
+ chainId: Number(this.chainId),
443
+ kmsQuorumClient: this.kmsQuorumClient,
444
+ });
445
+ }
325
446
  /**
326
447
  * Get the GRPC endpoint for the covalidator that services this deployment.
327
448
  */
328
- static getCovalidatorUrl(deployment) {
449
+ static getCovalidatorUrls(deployment, threshold) {
329
450
  const { executorAddress, chainId, pepper } = deployment;
330
- return `https://${executorAddress.toLowerCase()}.${chainId}.${pepper}.inco.org`;
451
+ return Array.from({ length: threshold }, (_, i) => `https://${executorAddress.toLowerCase()}.${chainId}.${pepper}-${i + 1}.inco.org`);
331
452
  }
332
453
  static isIdByName(id) {
333
454
  return id.name !== undefined;
@@ -351,6 +472,52 @@ class Lightning {
351
472
  throw new Error(`Unsupported type ${typeof value}`);
352
473
  }
353
474
  }
475
+ // Add utility method to get threshold from contract
476
+ static async getContractThresholdAndSigners(executorAddress, chainId, hostChainRpcUrl) {
477
+ const chain = (0, index_js_2.getViemChain)({ id: chainId });
478
+ const client = (0, viem_1.createPublicClient)({
479
+ chain,
480
+ transport: hostChainRpcUrl ? (0, viem_1.http)(hostChainRpcUrl) : (0, viem_1.http)(),
481
+ });
482
+ const incoLightningContract = (0, viem_1.getContract)({
483
+ abi: lightning_js_1.incoLightningAbi,
484
+ address: executorAddress,
485
+ client,
486
+ });
487
+ const incoVerifierAddress = await incoLightningContract.read.incoVerifier();
488
+ const incoVerifier = (0, viem_1.getContract)({
489
+ abi: verifier_js_1.incoVerifierAbi,
490
+ address: incoVerifierAddress,
491
+ client,
492
+ });
493
+ console.log('inco executor', incoLightningContract.address);
494
+ console.log('inco verifier', incoVerifier.address);
495
+ const threshold = await incoVerifier.read.getThreshold();
496
+ const signersCount = await incoVerifier.read.getSignersCount();
497
+ const signersPromises = [];
498
+ for (let i = BigInt(0); i < signersCount; i++) {
499
+ signersPromises.push(incoVerifier.read.getSignerAtIndex([i]));
500
+ }
501
+ const signers = await Promise.all(signersPromises);
502
+ return { threshold: Number(threshold), signers: signers.map(binary_js_1.parseAddress) };
503
+ }
504
+ static async getThresholdAndSigners(deployment) {
505
+ if (this.supportsThresholdRetrieval(deployment)) {
506
+ return await this.getContractThresholdAndSigners(deployment.executorAddress, deployment.chainId);
507
+ }
508
+ return this.getDefaultThresholdAndSigners();
509
+ }
510
+ // Check if the deployment supports threshold retrieval based on its version
511
+ static supportsThresholdRetrieval(deployment) {
512
+ // Assumes that the threshold retrieval is supported if the smart contract / deployment version is greater than or equal to 1.1.0
513
+ return deployment.version?.major >= 1 && deployment.version?.minor >= 1;
514
+ }
515
+ static getDefaultThresholdAndSigners() {
516
+ return {
517
+ threshold: 1,
518
+ signers: [viem_1.zeroAddress],
519
+ };
520
+ }
354
521
  }
355
522
  exports.Lightning = Lightning;
356
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/lite/lightning.ts"],"names":[],"mappings":";;;AACA,kCAAkC;AAClC,+BAA2E;AAC3E,wCAA0C;AAC1C,kEAMuC;AAEvC,gFAAyE;AAEzE,gFAAyE;AAEzE,4CAAgE;AAEhE,qDAMgC;AAEhC,4DAAiE;AACjE,8DAAsE;AACtE,4CAA2C;AAC3C,gDAAgE;AAGhE,4CAAqC;AACrC,yCAKoB;AACpB,iDAAmE;AA6BnE,MAAM,aAAa,GAAoB,SAAS,CAAC;AA2BjD;;;GAGG;AACH,MAAa,SAAS;IAUD;IACD;IAVF,eAAe,CAAU;IACzB,cAAc,CAAY;IAC1B,OAAO,CAAS;IAEf,SAAS,CAAyB;IAClC,gBAAgB,CAAmB;IACnC,SAAS,CAA4B;IAEtD,YACmB,WAAc,EACf,cAAsB;QADrB,gBAAW,GAAX,WAAW,CAAG;QACf,mBAAc,GAAd,cAAc,CAAQ;QAEtC,IAAI,CAAC,eAAe,GAAG,IAAA,wBAAY,EAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACjE,IAAI,CAAC,cAAc,GAAG,IAAA,iBAAK,EAAC,qBAAS,EAAE,WAAW,CAAC,cAAc,CAAC,CAAC;QACnE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE3C,IAAI,CAAC,gBAAgB,GAAG,IAAA,mCAAwB,GAAE,CAAC;QACnD,IAAI,CAAC,SAAS,GAAG,IAAA,2BAAY,EAAC,cAAc,CAAC,CAAC;QAC9C,IAAI,CAAC,SAAS,GAAG,IAAA,4BAAiB,EAAC;YACjC,OAAO,EAAE,IAAA,mCAAwB,EAC/B,IAAA,iBAAU,EAAC,IAAA,iBAAK,EAAC,qBAAS,EAAE,WAAW,CAAC,cAAc,CAAC,CAAC,CACzD;YACD,QAAQ,EAAE,IAAI,CAAC,gBAAgB;SAChC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,kBAAkB;QACvB,OAAO,SAAS,CAAC,MAAM,CAAC,SAAS,EAAE,oBAAW,CAAC,EAAE,CAAC,CAAC;IACrD,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,SAAS,CACd,GAAoC;QAEpC,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,OAAO,SAAS,CAAC,MAAM,CAAC,wCAAwB,CAAC,aAAa,CAAC,CAAC,CAAC;QACnE,CAAC;QACD,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,OAAO,SAAS,CAAC,MAAM,CAAC,wCAAwB,CAAC,GAAG,CAAC,CAAC,CAAC;QACzD,CAAC;QACD,MAAM,IAAI,GAAG,wCAAwB,CAAC,aAAa,CAAC,CAAC;QACrD,OAAO,SAAS,CAAC,MAAM,CAAC;YACtB,sEAAsE;YACtE,OAAO,EAAE,GAAG,CAAC,yBAAyB;gBACpC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,yBAAyB,CAAC;gBACvC,CAAC,CAAC,IAAI,CAAC,OAAO;YAChB,cAAc,EAAE,GAAG,CAAC,eAAe,IAAI,IAAI,CAAC,cAAc;YAC1D,eAAe,EACb,GAAG,CAAC,8BAA8B;gBAClC,IAAI,CAAC,eAAe;gBACpB,uBAAuB;YACzB,uCAAuC;YACvC,eAAe,EAAE,GAAG,CAAC,gBAAgB;YACrC,cAAc,EAAE,GAAG,CAAC,gBAAgB;YACpC,gBAAgB,EAAE,GAAG,CAAC,kBAAkB;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAC3B,QAAiB;QAEjB,MAAM,GAAG,GAAG,QAAQ,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAC/D,MAAM,GAAG,GAAG,IAAA,wBAAa,EAAC,GAAG,CAAC,CAAC;QAC/B,OAAO,SAAS,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;IAClC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,EAAE,CAAC,EAAgB;QACxB,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,CAAC,CAAC,mCAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,EAAE,CAAC,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CACtD;YACH,CAAC,CAAC,mCAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,eAAe,KAAK,EAAE,CAAC,eAAe;gBACxC,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAC3B,CAAC;QACN,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,2BAA2B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;QACnE,CAAC;QACD,OAAO,IAAI,SAAS,CAAC,UAAU,EAAE,SAAS,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC,CAAC;IAC5E,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,MAAM,CACX,MAAS;QAET,OAAO,IAAI,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,cAAc,CAAC,CAAC;IACtD,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,gBAAgB,CACrB,MAAS,EACT,OAAgB;QAEhB,sEAAsE;QACtE,MAAM,cAAc,GAAG,mCAAoB,CAAC,IAAI,CAC9C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,IAAI,CAAC,CAAC,OAAO,KAAK,OAAO,CACpD,CAAC;QACF,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,4GAA4G;YAC5G,wBAAwB;YACxB,MAAM,IAAI,KAAK,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;QACD,OAAO,cAAc,CAAC;IACxB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,MAAM,CACX,MAAS,EACT,OAAgB;QAEhB,OAAO,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,EAAE,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CACX,KAAQ,EACR,EAAE,cAAc,EAAE,WAAW,EAAqB;QAElD,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC;YAC1C,SAAS,EAAE,SAAS,CAAC,kBAAkB,CAAC,KAAK,CAAC;YAC9C,OAAO,EAAE;gBACP,WAAW,EAAE,IAAI,CAAC,OAAO;gBACzB,UAAU,EAAE,IAAI,CAAC,eAAe;gBAChC,WAAW,EAAE,IAAA,wBAAY,EAAC,cAAc,CAAC;gBACzC,eAAe,EAAE,IAAA,wBAAY,EAAC,WAAW,CAAC;aAC3C;SACF,CAAC,CAAC;QACH,OAAO,UAAU,CAAC,KAAK,CAAC;IAC1B,CAAC;IAED;;;;;;OAMG;IACH,cAAc,CACZ,YAAqD;QAErD,OAAO,IAAA,kCAAmB,EAAC;YACzB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;SACxC,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACH,+BAA+B,CAC7B,YAAqD,EACrD,cAAsB,EACtB,SAAe,EACf,sBAA8B;QAE9B,OAAO,IAAA,gCAAe,EAAC;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,8BAA8B,EAAE,IAAA,wBAAY,EAAC,sBAAsB,CAAC;YACpE,cAAc,EAAE,IAAA,wBAAY,EAAC,cAAc,CAAC;YAC5C,kBAAkB,EAAE,YAAY;YAChC,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACH,uBAAuB,CACrB,uBAAgD,EAChD,gBAAkC;QAElC,OAAO,IAAA,sCAAqB,EAAC;YAC3B,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,gBAAgB;YAChB,uBAAuB;SACxB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;OAQG;IACH,gCAAgC,CAC9B,YAAqD;QAErD,OAAO,IAAA,iDAAgC,EAAC,IAAI,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IAC9E,CAAC;IA2CD,eAAe,CACb,IAAgE,EAChE,IAA2C,EAC3C,IAA2C,EAC3C,IAA6B;QAE7B,IAAI,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;YACxB,MAAM,YAAY,GAAG,IAA+C,CAAC;YACrE,MAAM,OAAO,GAAG,IAAmB,CAAC;YACpC,MAAM,aAAa,GAAG,IAA0C,CAAC;YACjE,OAAO,IAAA,qCAAe,EAAC;gBACrB,OAAO;gBACP,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,YAAY;gBACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;aAC9C,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,MAAM,gBAAgB,GAAG,IAAwB,CAAC;YAClD,MAAM,uBAAuB,GAAG,IAA+B,CAAC;YAChE,MAAM,OAAO,GAAG,IAAmB,CAAC;YACpC,MAAM,aAAa,GAAG,IAA0C,CAAC;YACjE,OAAO,IAAA,0CAAyB,EAAC;gBAC/B,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;gBAC7C,gBAAgB;gBAChB,uBAAuB;gBACvB,OAAO;aACR,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAuDD,eAAe,CACb,IAAgE,EAChE,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,IAAuD,EACvD,IAA6B;QAE7B,IACE,OAAO,IAAI,KAAK,QAAQ;YACxB,IAAI,KAAK,IAAI;YACb,SAAS,IAAI,IAAI;YACjB,kBAAkB,IAAI,IAAI;YAC1B,QAAQ,IAAI,IAAI,EAChB,CAAC;YACD,mBAAmB;YACnB,MAAM,gBAAgB,GAAG,IAAwB,CAAC;YAClD,MAAM,uBAAuB,GAAG,IAA+B,CAAC;YAChE,MAAM,aAAa,GAAG,IAAI,CAAC;YAC3B,OAAO,IAAA,0CAAyB,EAAC;gBAC/B,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;gBAC7C,gBAAgB;gBAChB,uBAAuB;gBACvB,SAAS;gBACT,EAAE;gBACF,YAAY;gBACZ,aAAa;aACd,CAAC,CAAC;QACL,CAAC;QAED,qBAAqB;QACrB,MAAM,YAAY,GAAG,IAA+C,CAAC;QACrE,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,IAAA,qCAAe,EAAC;YACrB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,iBAAiB,CAC7B,UAAgD;QAEhD,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,UAAU,CAAC;QACxD,OAAO,WAAW,eAAe,CAAC,WAAW,EAAE,IAAI,OAAO,IAAI,MAAM,WAAW,CAAC;IAClF,CAAC;IAEO,MAAM,CAAC,UAAU,CAAC,EAAgB;QACxC,OAAQ,EAAuB,CAAC,IAAI,KAAK,SAAS,CAAC;IACrD,CAAC;IAEO,MAAM,CAAC,kBAAkB,CAC/B,KAAQ;QAER,IAAI,OAAO,KAAK,KAAK,SAAS,EAAE,CAAC;YAC/B,OAAO;gBACL,MAAM,EAAE,4BAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,uBAAW,CAAC,KAAK;gBACvB,KAAK,EAAE,KAAK;aACsC,CAAC;QACvD,CAAC;aAAM,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAClE,OAAO;gBACL,MAAM,EAAE,4BAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,uBAAW,CAAC,QAAQ;gBAC1B,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC;aAC8B,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oBAAoB,OAAO,KAAK,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;CACF;AAjfD,8BAifC"}
523
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/lite/lightning.ts"],"names":[],"mappings":";;;AAAA,+BAWc;AACd,wCAA0C;AAC1C,kEAKuC;AAEvC,gFAAmG;AAEnG,gFAAyE;AAKzE,4CAAgE;AAEhE,qDAMgC;AAChC,iEAAkE;AAClE,+DAAgE;AAChE,4DAAiE;AACjE,8DAAsE;AACtE,4CAA2C;AAC3C,0CAA2C;AAC3C,4DAAyD;AACzD,gDAAgE;AAEhE,4CAAqC;AACrC,yCAKoB;AA6BpB,MAAM,aAAa,GAAoB,SAAS,CAAC;AAEjD,SAAS,kBAAkB,CAAC,KAAc;IACxC,OAAO,CAAC,CAAC,KAAK,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,IAAI,IAAI,KAAK,CAAC;AAC/D,CAAC;AA8BD,SAAS,wBAAwB,CAC/B,KAA2D;IAE3D,OAAO,CACL,CAAC,CAAC,KAAK;QACP,OAAO,KAAK,KAAK,QAAQ;QACzB,UAAU,IAAI,KAAK;QACnB,OAAQ,KAAiC,CAAC,QAAQ,KAAK,QAAQ,CAChE,CAAC;AACJ,CAAC;AAED;;;GAGG;AACH,MAAa,SAAS;IAQD;IACD;IACA;IACA;IAVF,eAAe,CAAU;IACzB,OAAO,CAAS;IAEf,gBAAgB,CAAmB;IACnC,eAAe,CAAkB;IAElD,YACmB,WAAc,EACf,eAAyB,EACzB,OAAkB,EAClB,SAAiB;QAHhB,gBAAW,GAAX,WAAW,CAAG;QACf,oBAAe,GAAf,eAAe,CAAU;QACzB,YAAO,GAAP,OAAO,CAAW;QAClB,cAAS,GAAT,SAAS,CAAQ;QAEjC,IAAI,CAAC,eAAe,GAAG,IAAA,wBAAY,EAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACjE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE3C,IAAI,CAAC,gBAAgB,GAAG,IAAA,mCAAwB,GAAE,CAAC;QACnD,IAAI,CAAC,eAAe,GAAG,iCAAe,CAAC,QAAQ,CAC7C,eAAe,EACf,OAAO,EACP,SAAS,CACV,CAAC;IACJ,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,kBAAkB;QAC7B,OAAO,SAAS,CAAC,MAAM,CAAC,SAAS,EAAE,oBAAW,CAAC,EAAE,CAAC,CAAC;IACrD,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,KAAK,CAAC,SAAS,CACpB,GAAoC;QAEpC,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,MAAM,MAAM,GAAG,wCAAwB,CAAC,aAAa,CAAC,CAAC;YACvD,OAAO,SAAS,CAAC,MAAM,CAAC;gBACtB,GAAG,MAAM;gBACT,eAAe,EAAE,CAAC,GAAG,MAAM,CAAC,eAAe,CAAC;gBAC5C,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAA,wBAAY,EAAC,CAAC,CAAC,CAAC;aACpD,CAAC,CAAC;QACL,CAAC;QACD,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,MAAM,MAAM,GAAG,wCAAwB,CAAC,GAAG,CAAC,CAAC;YAC7C,OAAO,SAAS,CAAC,MAAM,CAAC;gBACtB,GAAG,MAAM;gBACT,eAAe,EAAE,CAAC,GAAG,MAAM,CAAC,eAAe,CAAC;gBAC5C,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAA,wBAAY,EAAC,CAAC,CAAC,CAAC;aACpD,CAAC,CAAC;QACL,CAAC;QACD,MAAM,IAAI,GAAG,wCAAwB,CAAC,aAAa,CAAC,CAAC;QAErD,OAAO,SAAS,CAAC,MAAM,CAAC;YACtB,sEAAsE;YACtE,OAAO,EAAE,GAAG,CAAC,yBAAyB;gBACpC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,yBAAyB,CAAC;gBACvC,CAAC,CAAC,IAAI,CAAC,OAAO;YAChB,eAAe,EAAE,GAAG,CAAC,eAAe;gBAClC,CAAC,CAAC,GAAG,CAAC,eAAe,CAAC,KAAK,CAAC,GAAG,CAAC;gBAChC,CAAC,CAAC,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC;YAC7B,OAAO,EAAE,GAAG,CAAC,qBAAqB;gBAChC,CAAC,CAAC,GAAG,CAAC,qBAAqB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CACnD,IAAA,wBAAY,EAAC,OAAO,CAAC,CACtB;gBACH,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAA,wBAAY,EAAC,CAAC,CAAC,CAAC;YAC5C,eAAe,EACb,GAAG,CAAC,8BAA8B;gBAClC,IAAI,CAAC,eAAe;gBACpB,uBAAuB;YACzB,uCAAuC;YACvC,eAAe,EAAE,GAAG,CAAC,gBAAgB;YACrC,gBAAgB,EAAE,GAAG,CAAC,kBAAkB;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAC3B,MAAiD;QAEjD,IAAI,UAAuC,CAAC;QAC5C,IAAI,wBAAwB,CAAC,MAAM,CAAC,EAAE,CAAC;YACrC,IAAI,OAAO,OAAO,KAAK,WAAW,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,IAAI,EAAE,CAAC;gBAC9D,MAAM,IAAI,KAAK,CACb,qFAAqF,CACtF,CAAC;YACJ,CAAC;YACD,MAAM,EAAE,QAAQ,EAAE,GAAG,2CAAa,aAAa,EAAC,CAAC;YACjD,UAAU,GAAG,MAAM,QAAQ,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;QAC/C,CAAC;aAAM,CAAC;YACN,UAAU,GAAG,MAAM,CAAC;QACtB,CAAC;QACD,MAAM,GAAG,GAAG,IAAA,wBAAa,EAAC,UAAU,CAAC,CAAC;QACtC,OAAO,MAAM,SAAS,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,EAAgB;QAC9B,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,CAAC,CAAC,mCAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,EAAE,CAAC,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CACtD;YACH,CAAC,CAAC,mCAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,eAAe,KAAK,EAAE,CAAC,eAAe;gBACxC,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAC3B,CAAC;QACN,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,2BAA2B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;QACnE,CAAC;QAED,MAAM,EAAE,SAAS,EAAE,OAAO,EAAE,GAC1B,MAAM,SAAS,CAAC,sBAAsB,CAAC,UAAU,CAAC,CAAC;QAErD,OAAO,IAAI,SAAS,CAClB,UAAU,EACV,SAAS,CAAC,kBAAkB,CAAC,UAAU,EAAE,SAAS,CAAC,EACnD,OAAO,EACP,SAAS,CACV,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS;QAET,MAAM,EAAE,SAAS,EAAE,OAAO,EAAE,GAC1B,MAAM,SAAS,CAAC,8BAA8B,CAC5C,MAAM,CAAC,eAAe,EACtB,MAAM,CAAC,OAAkB,EACzB,MAAM,CAAC,eAAe,CACvB,CAAC;QAEJ,OAAO,IAAI,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,eAAe,EAAE,OAAO,EAAE,SAAS,CAAC,CAAC;IAC3E,CAAC;IAED,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAC5B,MAAoB,EACpB,eAAwB;QAExB,MAAM,qBAAqB,GAAG,IAAA,kBAAW,EAAC;YACxC,GAAG,EAAE,+BAAgB;YACrB,OAAO,EAAE,eAA0B;YACnC,MAAM;SACP,CAAC,CAAC;QACH,MAAM,mBAAmB,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QAC5E,MAAM,YAAY,GAAG,IAAA,kBAAW,EAAC;YAC/B,GAAG,EAAE,6BAAe;YACpB,OAAO,EAAE,mBAA8B;YACvC,MAAM;SACP,CAAC,CAAC;QACH,OAAO,MAAM,YAAY,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;IAC/C,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,gBAAgB,CACrB,MAAS,EACT,OAAgB;QAEhB,sEAAsE;QACtE,MAAM,cAAc,GAAG,mCAAoB,CAAC,IAAI,CAC9C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,IAAI,CAAC,CAAC,OAAO,KAAK,OAAO,CACpD,CAAC;QACF,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,4GAA4G;YAC5G,wBAAwB;YACxB,MAAM,IAAI,KAAK,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;QACD,OAAO,cAAc,CAAC;IACxB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS,EACT,OAAgB;QAEhB,OAAO,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,EAAE,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CACX,KAAQ,EACR,EAAE,cAAc,EAAE,WAAW,EAAqB,EAClD,SAAiC;QAEjC,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,SAAS,CAAC;YACrC,SAAS,EAAE,SAAS,CAAC,kBAAkB,CAAC,KAAK,CAAC;YAC9C,OAAO,EAAE;gBACP,WAAW,EAAE,IAAI,CAAC,OAAO;gBACzB,UAAU,EAAE,IAAI,CAAC,eAAe;gBAChC,WAAW,EAAE,IAAA,wBAAY,EAAC,cAAc,CAAC;gBACzC,eAAe,EAAE,IAAA,wBAAY,EAAC,WAAW,CAAC;aAC3C;SACF,CAAC,CAAC;QACH,OAAO,UAAU,CAAC,KAAK,CAAC;IAC1B,CAAC;IAED;;;;;OAKG;IACH,YAAY,CAAC,WAAsB;QACjC,OAAO,IAAA,4BAAiB,EAAC;YACvB,OAAO,EAAE,IAAA,mCAAwB,EAC/B,IAAA,iBAAU,EAAC,IAAA,iBAAK,EAAC,qBAAS,EAAE,WAAW,CAAC,CAAC,CAC1C;YACD,QAAQ,EAAE,IAAI,CAAC,gBAAgB;SAChC,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACH,+BAA+B,CAC7B,YAAqD,EACrD,cAAsB,EACtB,SAAe,EACf,sBAA8B;QAE9B,OAAO,IAAA,gCAAe,EAAC;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,8BAA8B,EAAE,IAAA,wBAAY,EAAC,sBAAsB,CAAC;YACpE,cAAc,EAAE,IAAA,wBAAY,EAAC,cAAc,CAAC;YAC5C,kBAAkB,EAAE,YAAY;YAChC,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;OAQG;IACH,gCAAgC,CAC9B,YAAqD;QAErD,OAAO,IAAA,iDAAgC,EAAC,IAAI,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IAC9E,CAAC;IAoDD,eAAe,CACb,YAAqD,EACrD,OAAoB,EACpB,IAA0C,EAC1C,IAAgD,EAChD,IAA6B;QAM7B,IAAI,IAAI,YAAY,UAAU,EAAE,CAAC;YAC/B,MAAM,eAAe,GAAG,IAAI,CAAC;YAC7B,IAAI,gBAA8C,CAAC;YACnD,IAAI,aAAiD,CAAC;YAEtD,IAAI,IAAI,IAAI,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrC,gBAAgB,GAAG,IAAI,CAAC;gBACxB,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;iBAAM,CAAC;gBACN,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;YAED,IAAI,gBAAgB,EAAE,CAAC;gBACrB,OAAO,IAAA,qCAAe,EAAC;oBACrB,OAAO;oBACP,aAAa;oBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;oBACjD,YAAY;oBACZ,eAAe,EAAE,IAAI,CAAC,eAAe;oBACrC,eAAe;oBACf,gBAAgB;iBACjB,CAEA,CAAC;YACJ,CAAC;YAED,OAAO,IAAA,qCAAe,EAAC;gBACrB,OAAO;gBACP,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,YAAY;gBACZ,eAAe,EAAE,IAAI,CAAC,eAAe;gBACrC,eAAe;aAChB,CAEA,CAAC;QACJ,CAAC;QAED,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,IAAA,qCAAe,EAAC;YACrB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,YAAY;YACZ,eAAe,EAAE,IAAI,CAAC,eAAe;SACtC,CAAyE,CAAC;IAC7E,CAAC;IAoDD,0BAA0B,CACxB,gBAAkC,EAClC,uBAAgD,EAChD,OAAoB,EACpB,IAA0C,EAC1C,IAAgD,EAChD,IAA6B;QAM7B,IAAI,IAAI,YAAY,UAAU,EAAE,CAAC;YAC/B,MAAM,eAAe,GAAG,IAAI,CAAC;YAC7B,IAAI,gBAA8C,CAAC;YACnD,IAAI,aAAiD,CAAC;YAEtD,IAAI,IAAI,IAAI,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrC,gBAAgB,GAAG,IAAI,CAAC;gBACxB,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;iBAAM,CAAC;gBACN,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;YAED,IAAI,gBAAgB,EAAE,CAAC;gBACrB,OAAO,IAAA,0CAAyB,EAAC;oBAC/B,aAAa;oBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;oBACjD,eAAe,EAAE,IAAI,CAAC,eAAe;oBACrC,gBAAgB;oBAChB,uBAAuB;oBACvB,OAAO;oBACP,eAAe;oBACf,gBAAgB;iBACjB,CAEA,CAAC;YACJ,CAAC;YAED,OAAO,IAAA,0CAAyB,EAAC;gBAC/B,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,eAAe,EAAE,IAAI,CAAC,eAAe;gBACrC,gBAAgB;gBAChB,uBAAuB;gBACvB,OAAO;gBACP,eAAe;aAChB,CAEA,CAAC;QACJ,CAAC;QAED,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,IAAA,0CAAyB,EAAC;YAC/B,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,gBAAgB;YAChB,uBAAuB;YACvB,OAAO;SACR,CAAyE,CAAC;IAC7E,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACH,eAAe,CACb,YAAqD,EACrD,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,aAAsC;QAEtC,OAAO,IAAA,qCAAsB,EAAC;YAC5B,YAAY;YACZ,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;OAaG;IACH,0BAA0B,CACxB,gBAAkC,EAClC,uBAAgD,EAChD,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,aAAsC;QAEtC,OAAO,IAAA,0CAAyB,EAAC;YAC/B,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,gBAAgB;YAChB,uBAAuB;YACvB,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;OAYG;IACH,cAAc,CACZ,OAAoB,EACpB,aAAsC;QAEtC,OAAO,IAAA,qCAAe,EAAC;YACrB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;SACtC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,kBAAkB,CAC9B,UAAgD,EAChD,SAAiB;QAEjB,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,UAAU,CAAC;QACxD,OAAO,KAAK,CAAC,IAAI,CACf,EAAE,MAAM,EAAE,SAAS,EAAE,EACrB,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CACP,WAAW,eAAe,CAAC,WAAW,EAAE,IAAI,OAAO,IAAI,MAAM,IAAI,CAAC,GAAG,CAAC,WAAW,CACpF,CAAC;IACJ,CAAC;IAEO,MAAM,CAAC,UAAU,CAAC,EAAgB;QACxC,OAAQ,EAAuB,CAAC,IAAI,KAAK,SAAS,CAAC;IACrD,CAAC;IAEO,MAAM,CAAC,kBAAkB,CAC/B,KAAQ;QAER,IAAI,OAAO,KAAK,KAAK,SAAS,EAAE,CAAC;YAC/B,OAAO;gBACL,MAAM,EAAE,4BAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,uBAAW,CAAC,KAAK;gBACvB,KAAK,EAAE,KAAK;aACsC,CAAC;QACvD,CAAC;aAAM,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAClE,OAAO;gBACL,MAAM,EAAE,4BAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,uBAAW,CAAC,QAAQ;gBAC1B,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC;aAC8B,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oBAAoB,OAAO,KAAK,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;IAED,oDAAoD;IAC5C,MAAM,CAAC,KAAK,CAAC,8BAA8B,CACjD,eAAuB,EACvB,OAAgB,EAChB,eAAwB;QAExB,MAAM,KAAK,GAAG,IAAA,uBAAY,EAAC,EAAE,EAAE,EAAE,OAAO,EAAE,CAAC,CAAC;QAC5C,MAAM,MAAM,GAAG,IAAA,yBAAkB,EAAC;YAChC,KAAK;YACL,SAAS,EAAE,eAAe,CAAC,CAAC,CAAC,IAAA,WAAI,EAAC,eAAe,CAAC,CAAC,CAAC,CAAC,IAAA,WAAI,GAAE;SAC5D,CAAC,CAAC;QACH,MAAM,qBAAqB,GAAG,IAAA,kBAAW,EAAC;YACxC,GAAG,EAAE,+BAAgB;YACrB,OAAO,EAAE,eAA0B;YACnC,MAAM;SACP,CAAC,CAAC;QACH,MAAM,mBAAmB,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QAC5E,MAAM,YAAY,GAAG,IAAA,kBAAW,EAAC;YAC/B,GAAG,EAAE,6BAAe;YACpB,OAAO,EAAE,mBAA8B;YACvC,MAAM;SACP,CAAC,CAAC;QACH,OAAO,CAAC,GAAG,CAAC,eAAe,EAAE,qBAAqB,CAAC,OAAO,CAAC,CAAC;QAC5D,OAAO,CAAC,GAAG,CAAC,eAAe,EAAE,YAAY,CAAC,OAAO,CAAC,CAAC;QAEnD,MAAM,SAAS,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QAEzD,MAAM,YAAY,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,eAAe,EAAE,CAAC;QAC/D,MAAM,eAAe,GAAG,EAAE,CAAC;QAC3B,KAAK,IAAI,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,YAAY,EAAE,CAAC,EAAE,EAAE,CAAC;YAC9C,eAAe,CAAC,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QAChE,CAAC;QACD,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC;QAEnD,OAAO,EAAE,SAAS,EAAE,MAAM,CAAC,SAAS,CAAC,EAAE,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,wBAAY,CAAC,EAAE,CAAC;IAC9E,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,sBAAsB,CAAC,UAAsB;QAChE,IAAI,IAAI,CAAC,0BAA0B,CAAC,UAAU,CAAC,EAAE,CAAC;YAChD,OAAO,MAAM,IAAI,CAAC,8BAA8B,CAC9C,UAAU,CAAC,eAAe,EAC1B,UAAU,CAAC,OAAO,CACnB,CAAC;QACJ,CAAC;QACD,OAAO,IAAI,CAAC,6BAA6B,EAAE,CAAC;IAC9C,CAAC;IAED,4EAA4E;IACpE,MAAM,CAAC,0BAA0B,CAAC,UAAsB;QAC9D,iIAAiI;QACjI,OAAO,UAAU,CAAC,OAAO,EAAE,KAAK,IAAI,CAAC,IAAI,UAAU,CAAC,OAAO,EAAE,KAAK,IAAI,CAAC,CAAC;IAC1E,CAAC;IAEO,MAAM,CAAC,6BAA6B;QAC1C,OAAO;YACL,SAAS,EAAE,CAAC;YACZ,OAAO,EAAE,CAAC,kBAAsB,CAAC;SAClC,CAAC;IACJ,CAAC;CACF;AAjuBD,8BAiuBC"}
@@ -4,13 +4,12 @@ export declare const LocalNodeEnv: Schema.Struct<{
4
4
  STATE_DUMP: typeof Schema.String;
5
5
  EXECUTOR_ADDRESS: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
6
6
  ECIES_PUBLIC_KEY: Schema.TemplateLiteral<`0x${string}`>;
7
- CALLBACK_ADDRESS: Schema.TemplateLiteral<`0x${string}`>;
8
7
  SENDER_ADDRESS: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
9
8
  SENDER_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
9
+ EIP712_SIGNER_ADDRESS: Schema.optional<Schema.TemplateLiteral<`0x${string}`>>;
10
10
  PEPPER: typeof Schema.String;
11
11
  COVALIDATOR_ECIES_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
12
12
  COVALIDATOR_EIP712_PRIVATE_SIGNING_KEY: Schema.TemplateLiteral<`0x${string}`>;
13
- COVALIDATOR_CALLBACK_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
14
13
  COVALIDATOR_ACL_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
15
14
  COVALIDATOR_INCO_EXECUTOR_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
16
15
  COVALIDATOR_DECRYPTION_HANDLER_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
@@ -9,13 +9,12 @@ exports.LocalNodeEnv = effect_1.Schema.Struct({
9
9
  STATE_DUMP: effect_1.Schema.String,
10
10
  EXECUTOR_ADDRESS: binary_js_1.Address,
11
11
  ECIES_PUBLIC_KEY: binary_js_1.HexString,
12
- CALLBACK_ADDRESS: binary_js_1.HexString,
13
12
  SENDER_ADDRESS: binary_js_1.Address,
14
13
  SENDER_PRIVATE_KEY: binary_js_1.HexString,
14
+ EIP712_SIGNER_ADDRESS: effect_1.Schema.optional(binary_js_1.HexString),
15
15
  PEPPER: effect_1.Schema.String,
16
16
  COVALIDATOR_ECIES_PRIVATE_KEY: binary_js_1.HexString,
17
17
  COVALIDATOR_EIP712_PRIVATE_SIGNING_KEY: binary_js_1.HexString,
18
- COVALIDATOR_CALLBACK_PRIVATE_KEY: binary_js_1.HexString,
19
18
  COVALIDATOR_ACL_ADDR: binary_js_1.Address,
20
19
  COVALIDATOR_INCO_EXECUTOR_ADDR: binary_js_1.Address,
21
20
  COVALIDATOR_DECRYPTION_HANDLER_ADDR: binary_js_1.Address,
@@ -61,4 +60,4 @@ function parseEnv(envContent) {
61
60
  }
62
61
  return env;
63
62
  }
64
- //# sourceMappingURL=data:application/json;base64,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
63
+ //# sourceMappingURL=data:application/json;base64,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