@inco/js 0.6.9 → 0.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -8
- package/dist/cjs/advancedacl/session-key.d.ts +39 -26
- package/dist/cjs/advancedacl/session-key.js +53 -136
- package/dist/cjs/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/cjs/attestedcompute/attested-compute.js +5 -35
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +36 -21
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +107 -108
- package/dist/cjs/attesteddecrypt/types.d.ts +4 -4
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +3 -4
- package/dist/cjs/generated/lightning.d.ts +40 -0
- package/dist/cjs/generated/lightning.js +43 -1
- package/dist/cjs/generated/local-node.d.ts +11 -7
- package/dist/cjs/generated/local-node.js +28 -8
- package/dist/cjs/kms/client.d.ts +8 -4
- package/dist/cjs/kms/client.js +9 -4
- package/dist/cjs/kms/quorumClient.d.ts +58 -0
- package/dist/cjs/kms/quorumClient.js +378 -0
- package/dist/cjs/kms/thresholdPromises.d.ts +7 -0
- package/dist/cjs/kms/thresholdPromises.js +52 -0
- package/dist/cjs/lite/index.d.ts +0 -1
- package/dist/cjs/lite/index.js +1 -2
- package/dist/cjs/lite/lightning.d.ts +87 -67
- package/dist/cjs/lite/lightning.js +231 -100
- package/dist/cjs/local/local-node.d.ts +1 -2
- package/dist/cjs/local/local-node.js +2 -3
- package/dist/cjs/test/mocks.d.ts +3 -0
- package/dist/cjs/test/mocks.js +19 -1
- package/dist/esm/advancedacl/session-key.d.ts +39 -26
- package/dist/esm/advancedacl/session-key.js +44 -126
- package/dist/esm/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/esm/attestedcompute/attested-compute.js +6 -36
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +36 -21
- package/dist/esm/attesteddecrypt/attested-decrypt.js +106 -108
- package/dist/esm/attesteddecrypt/types.d.ts +4 -4
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +2 -3
- package/dist/esm/generated/lightning.d.ts +40 -0
- package/dist/esm/generated/lightning.js +43 -1
- package/dist/esm/generated/local-node.d.ts +11 -7
- package/dist/esm/generated/local-node.js +28 -8
- package/dist/esm/kms/client.d.ts +8 -4
- package/dist/esm/kms/client.js +8 -4
- package/dist/esm/kms/quorumClient.d.ts +58 -0
- package/dist/esm/kms/quorumClient.js +374 -0
- package/dist/esm/kms/thresholdPromises.d.ts +7 -0
- package/dist/esm/kms/thresholdPromises.js +49 -0
- package/dist/esm/lite/index.d.ts +0 -1
- package/dist/esm/lite/index.js +1 -2
- package/dist/esm/lite/lightning.d.ts +87 -67
- package/dist/esm/lite/lightning.js +234 -103
- package/dist/esm/local/local-node.d.ts +1 -2
- package/dist/esm/local/local-node.js +2 -3
- package/dist/esm/test/mocks.d.ts +3 -0
- package/dist/esm/test/mocks.js +17 -1
- package/dist/types/advancedacl/session-key.d.ts +39 -26
- package/dist/types/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +36 -21
- package/dist/types/attesteddecrypt/types.d.ts +4 -4
- package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
- package/dist/types/generated/lightning.d.ts +40 -0
- package/dist/types/generated/local-node.d.ts +11 -7
- package/dist/types/kms/client.d.ts +8 -4
- package/dist/types/kms/quorumClient.d.ts +58 -0
- package/dist/types/kms/thresholdPromises.d.ts +7 -0
- package/dist/types/lite/index.d.ts +0 -1
- package/dist/types/lite/lightning.d.ts +87 -67
- package/dist/types/local/local-node.d.ts +1 -2
- package/dist/types/test/mocks.d.ts +3 -0
- package/package.json +2 -2
- package/dist/cjs/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/cjs/attestedreveal/attested-reveal.js +0 -69
- package/dist/cjs/attestedreveal/index.d.ts +0 -1
- package/dist/cjs/attestedreveal/index.js +0 -18
- package/dist/cjs/attestedreveal/types.d.ts +0 -7
- package/dist/cjs/attestedreveal/types.js +0 -16
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.js +0 -118
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.js +0 -136
- package/dist/cjs/lite/reencrypt.d.ts +0 -21
- package/dist/cjs/lite/reencrypt.js +0 -141
- package/dist/esm/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/esm/attestedreveal/attested-reveal.js +0 -66
- package/dist/esm/attestedreveal/index.d.ts +0 -1
- package/dist/esm/attestedreveal/index.js +0 -2
- package/dist/esm/attestedreveal/types.d.ts +0 -7
- package/dist/esm/attestedreveal/types.js +0 -12
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.js +0 -115
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.js +0 -133
- package/dist/esm/lite/reencrypt.d.ts +0 -21
- package/dist/esm/lite/reencrypt.js +0 -131
- package/dist/types/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/types/attestedreveal/index.d.ts +0 -1
- package/dist/types/attestedreveal/types.d.ts +0 -7
- package/dist/types/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/types/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/types/lite/reencrypt.d.ts +0 -21
package/README.md
CHANGED
|
@@ -24,7 +24,7 @@ A typical usage of `@inco/js` includes 3 steps:
|
|
|
24
24
|
|
|
25
25
|
1. Encrypting a value.
|
|
26
26
|
2. Posting the ciphertext to the contract, which will perform confidential computes on it.
|
|
27
|
-
3. Requesting
|
|
27
|
+
3. Requesting an attested decryption of the result of the computation.
|
|
28
28
|
|
|
29
29
|
### 1. Encrypt a value
|
|
30
30
|
|
|
@@ -66,13 +66,13 @@ import { Hex } from "viem";
|
|
|
66
66
|
|
|
67
67
|
// Request a re-encryption of the result ciphertext
|
|
68
68
|
const resultHandle = "0x..." as Hex; // Retrieve the handle from the contract, e.g. using viem
|
|
69
|
-
|
|
70
|
-
const resultPlaintext = await
|
|
69
|
+
// Use same walletClient as previous step
|
|
70
|
+
const resultPlaintext = await zap.attestedDecrypt(walletClient, [resultHandle]);
|
|
71
71
|
|
|
72
|
-
console.log(resultPlaintext.value); // The decrypted value
|
|
72
|
+
console.log(resultPlaintext[0].plaintext.value); // The decrypted value
|
|
73
73
|
```
|
|
74
74
|
|
|
75
|
-
Handles are processed asynchronously so you may need to wait for our covalidators to catch and compute the value. If you request
|
|
75
|
+
Handles are processed asynchronously so you may need to wait for our covalidators to catch and compute the value. If you request an attested decryption before it has been processed you will get an error. To help ameliorate this the `attestedDecrypt` has built-in retries, you can further customise by passing a `BackoffConfig` as an extra argument:
|
|
76
76
|
|
|
77
77
|
```ts
|
|
78
78
|
type BackoffConfig = {
|
|
@@ -82,15 +82,15 @@ type BackoffConfig = {
|
|
|
82
82
|
};
|
|
83
83
|
|
|
84
84
|
const resultHandle = "0x..." as Hex;
|
|
85
|
-
const reencryptor = await zap.getReencryptor(walletClient);
|
|
86
85
|
// Default backoff config shown for reference
|
|
87
86
|
const backoffConfig: BackoffConfig = {
|
|
88
87
|
maxRetries: 10,
|
|
89
88
|
baseDelayInMs: 1000,
|
|
90
89
|
backoffFactor: 1.5,
|
|
91
90
|
};
|
|
92
|
-
const resultPlaintext = await
|
|
93
|
-
|
|
91
|
+
const resultPlaintext = await zap.attestedDecrypt(
|
|
92
|
+
walletClient,
|
|
93
|
+
[resultHandle],
|
|
94
94
|
backoffConfig,
|
|
95
95
|
);
|
|
96
96
|
```
|
|
@@ -1,14 +1,13 @@
|
|
|
1
|
-
import type { Client } from '@connectrpc/connect';
|
|
2
1
|
import { type Account, type Address, type Chain, type Hex, type Transport, type WalletClient } from 'viem';
|
|
3
|
-
import { DecryptionAttestation } from '../attesteddecrypt/index.js';
|
|
2
|
+
import { DecryptionAttestation, EncryptedDecryptionAttestation } from '../attesteddecrypt/index.js';
|
|
4
3
|
import { SupportedChainId } from '../chain.js';
|
|
5
4
|
import { type EciesScheme, SupportedFheType } from '../encryption/encryption.js';
|
|
6
5
|
import { HexString } from '../index.js';
|
|
7
|
-
import type {
|
|
8
|
-
import { type ReencryptFnArgs } from '../reencryption/index.js';
|
|
6
|
+
import type { Secp256k1Keypair } from '../lite/index.js';
|
|
9
7
|
import { BackoffConfig } from '../retry.js';
|
|
10
8
|
import type { AllowanceVoucher, AllowanceVoucherWithSig } from './types.js';
|
|
11
9
|
import { AttestedComputeOP } from '../attestedcompute/types.js';
|
|
10
|
+
import { KmsQuorumClient } from '../kms/quorumClient.js';
|
|
12
11
|
export interface Session {
|
|
13
12
|
decrypter: Address;
|
|
14
13
|
expiresAt: bigint;
|
|
@@ -23,42 +22,56 @@ export interface GrantSessionKeyArgs {
|
|
|
23
22
|
expiresAt: Date;
|
|
24
23
|
}
|
|
25
24
|
export declare function grantSessionKey({ chainId, incoLiteAddress, sessionVerifierContractAddress, granteeAddress, sharerWalletClient, expiresAt, }: GrantSessionKeyArgs): Promise<AllowanceVoucherWithSig>;
|
|
26
|
-
export interface SessionKeyReencryptorArgs {
|
|
27
|
-
chainId: bigint;
|
|
28
|
-
ephemeralKeypair: Secp256k1Keypair;
|
|
29
|
-
kmsConnectRpcEndpointOrClient: string | Client<typeof KmsService>;
|
|
30
|
-
allowanceVoucherWithSig: AllowanceVoucherWithSig;
|
|
31
|
-
}
|
|
32
|
-
/**
|
|
33
|
-
* The sessionKeyReencryptor function is a reencryptor that uses a session key
|
|
34
|
-
* to reencrypt data.
|
|
35
|
-
*
|
|
36
|
-
*/
|
|
37
|
-
export declare function sessionKeyReencryptor({ chainId, kmsConnectRpcEndpointOrClient, ephemeralKeypair, allowanceVoucherWithSig, }: SessionKeyReencryptorArgs): Promise<(<T extends SupportedFheType>({ handle, }: ReencryptFnArgs<EciesScheme, T>) => Promise<import("../encryption/encryption.js").PlaintextOf<1, 0 | 5 | 7 | 8>>)>;
|
|
38
25
|
export declare function updateActiveVouchersSessionNonce(incoLiteAddress: Address, sharerWalletClient: WalletClient<Transport, Chain, Account>): Promise<`0x${string}`>;
|
|
39
26
|
export interface SessionKeyAttestedComputeArgs {
|
|
40
27
|
chainId: SupportedChainId;
|
|
41
28
|
ephemeralKeypair: Secp256k1Keypair;
|
|
42
|
-
|
|
29
|
+
kmsQuorumClient: KmsQuorumClient;
|
|
43
30
|
allowanceVoucherWithSig: AllowanceVoucherWithSig;
|
|
44
31
|
lhsHandle: HexString;
|
|
45
32
|
op: AttestedComputeOP;
|
|
46
33
|
rhsPlaintext: bigint | boolean;
|
|
47
34
|
backoffConfig?: Partial<BackoffConfig> | undefined;
|
|
48
35
|
}
|
|
49
|
-
export declare function sessionKeyAttestedCompute<T extends SupportedFheType>({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId,
|
|
50
|
-
handle: HexString;
|
|
51
|
-
plaintext: import("../encryption/encryption.js").PlaintextOf<1, T>;
|
|
52
|
-
covalidatorSignature: Uint8Array<ArrayBufferLike>;
|
|
53
|
-
}>;
|
|
36
|
+
export declare function sessionKeyAttestedCompute<T extends SupportedFheType>({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsQuorumClient, ephemeralKeypair, allowanceVoucherWithSig, }: SessionKeyAttestedComputeArgs): Promise<DecryptionAttestation<EciesScheme, SupportedFheType>>;
|
|
54
37
|
export interface SessionKeyAttestedDecryptArgs {
|
|
55
38
|
chainId: SupportedChainId;
|
|
56
39
|
ephemeralKeypair: Secp256k1Keypair;
|
|
57
|
-
|
|
40
|
+
kmsQuorumClient: KmsQuorumClient;
|
|
58
41
|
allowanceVoucherWithSig: AllowanceVoucherWithSig;
|
|
59
42
|
handles: HexString[];
|
|
60
43
|
backoffConfig?: Partial<BackoffConfig> | undefined;
|
|
61
|
-
reencryptPubKey?: Uint8Array;
|
|
62
|
-
reencryptKeypair?: Secp256k1Keypair;
|
|
44
|
+
reencryptPubKey?: Uint8Array | undefined;
|
|
45
|
+
reencryptKeypair?: Secp256k1Keypair | undefined;
|
|
63
46
|
}
|
|
64
|
-
|
|
47
|
+
/**
|
|
48
|
+
* Performs attested decrypts using a voucher-backed session key.
|
|
49
|
+
*
|
|
50
|
+
* @example Plaintext results
|
|
51
|
+
* ```ts
|
|
52
|
+
* const attestations = await sessionKeyAttestedDecrypt({
|
|
53
|
+
* chainId,
|
|
54
|
+
* kmsConnectRpcEndpointOrClient: covalidatorUrl,
|
|
55
|
+
* allowanceVoucherWithSig: voucher,
|
|
56
|
+
* ephemeralKeypair,
|
|
57
|
+
* handles,
|
|
58
|
+
* });
|
|
59
|
+
* console.log(attestations[0].plaintext.value);
|
|
60
|
+
* ```
|
|
61
|
+
*
|
|
62
|
+
* @example Encrypted results
|
|
63
|
+
* ```ts
|
|
64
|
+
* const encryptedResults = await sessionKeyAttestedDecrypt({
|
|
65
|
+
* chainId,
|
|
66
|
+
* kmsConnectRpcEndpointOrClient: covalidatorUrl,
|
|
67
|
+
* allowanceVoucherWithSig: voucher,
|
|
68
|
+
* ephemeralKeypair,
|
|
69
|
+
* handles,
|
|
70
|
+
* reencryptPubKey: recipientPubKey,
|
|
71
|
+
* });
|
|
72
|
+
* console.log(
|
|
73
|
+
* encryptedResults[0].encryptedPlaintext.ciphertext.value,
|
|
74
|
+
* );
|
|
75
|
+
* ```
|
|
76
|
+
*/
|
|
77
|
+
export declare function sessionKeyAttestedDecrypt({ chainId, kmsQuorumClient, handles, ephemeralKeypair, allowanceVoucherWithSig, backoffConfig, reencryptPubKey, reencryptKeypair, }: SessionKeyAttestedDecryptArgs): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType> | EncryptedDecryptionAttestation<EciesScheme, SupportedFheType>>>;
|
|
@@ -2,26 +2,22 @@
|
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.createAllowanceVoucher = createAllowanceVoucher;
|
|
4
4
|
exports.grantSessionKey = grantSessionKey;
|
|
5
|
-
exports.sessionKeyReencryptor = sessionKeyReencryptor;
|
|
6
5
|
exports.updateActiveVouchersSessionNonce = updateActiveVouchersSessionNonce;
|
|
7
6
|
exports.sessionKeyAttestedCompute = sessionKeyAttestedCompute;
|
|
8
7
|
exports.sessionKeyAttestedDecrypt = sessionKeyAttestedDecrypt;
|
|
9
8
|
const protobuf_1 = require("@bufbuild/protobuf");
|
|
10
9
|
const viem_1 = require("viem");
|
|
11
10
|
const accounts_1 = require("viem/accounts");
|
|
12
|
-
const index_js_1 = require("../attesteddecrypt/index.js");
|
|
13
|
-
const chain_js_1 = require("../chain.js");
|
|
14
11
|
const encryption_js_1 = require("../encryption/encryption.js");
|
|
15
12
|
const lightning_preview_js_1 = require("../generated/abis/lightning-preview.js");
|
|
16
13
|
const lightning_js_1 = require("../generated/abis/lightning.js");
|
|
17
14
|
const verifier_js_1 = require("../generated/abis/verifier.js");
|
|
18
|
-
const
|
|
19
|
-
const
|
|
20
|
-
const
|
|
21
|
-
const
|
|
15
|
+
const index_js_1 = require("../index.js");
|
|
16
|
+
const index_js_2 = require("../lite/index.js");
|
|
17
|
+
const index_js_3 = require("../reencryption/index.js");
|
|
18
|
+
const attested_decrypt_js_1 = require("../attesteddecrypt/attested-decrypt.js");
|
|
22
19
|
const kms_service_pb_js_1 = require("../generated/es/inco/kms/lite/v1/kms_service_pb.js");
|
|
23
20
|
const types_pb_js_1 = require("../generated/es/inco/kms/lite/v1/types_pb.js");
|
|
24
|
-
const reencrypt_js_1 = require("../lite/reencrypt.js");
|
|
25
21
|
// Given a sharer's wallet client, an incoLite contract address, and a
|
|
26
22
|
// (verifyingContract, callFunction, sharerArgData) tuple, this function
|
|
27
23
|
// creates an AllowanceVoucher.
|
|
@@ -65,7 +61,7 @@ async function grantSessionKey({ chainId, incoLiteAddress, sessionVerifierContra
|
|
|
65
61
|
// Careful that the verifying contract here is the SessionVerifier contract,
|
|
66
62
|
// not the incoLite contract.
|
|
67
63
|
sessionVerifierContractAddress, (0, viem_1.toFunctionSelector)(getCanUseSessionAbi()), sharerArgData);
|
|
68
|
-
const eip712Payload = (0,
|
|
64
|
+
const eip712Payload = (0, index_js_3.createEIP712Payload)({
|
|
69
65
|
chainId,
|
|
70
66
|
primaryType: 'AllowanceVoucher',
|
|
71
67
|
primaryTypeFields: getAllowanceVoucherAbi(),
|
|
@@ -85,69 +81,6 @@ async function grantSessionKey({ chainId, incoLiteAddress, sessionVerifierContra
|
|
|
85
81
|
voucherSignature,
|
|
86
82
|
};
|
|
87
83
|
}
|
|
88
|
-
/**
|
|
89
|
-
* The sessionKeyReencryptor function is a reencryptor that uses a session key
|
|
90
|
-
* to reencrypt data.
|
|
91
|
-
*
|
|
92
|
-
*/
|
|
93
|
-
async function sessionKeyReencryptor({ chainId, kmsConnectRpcEndpointOrClient, ephemeralKeypair, allowanceVoucherWithSig, }) {
|
|
94
|
-
const kmsClient = (0, index_js_3.getKmsClient)(kmsConnectRpcEndpointOrClient ||
|
|
95
|
-
(0, index_js_3.defaultCovalidatorGrpc)((0, chain_js_1.getSupportedChain)(chainId)));
|
|
96
|
-
const requesterAccount = (0, accounts_1.privateKeyToAccount)(`0x${ephemeralKeypair.kp.getPrivate('hex')}`);
|
|
97
|
-
const ephemeralPubKey = ephemeralKeypair.encodePublicKey();
|
|
98
|
-
return async function reencrypt({ handle, }) {
|
|
99
|
-
const handles = [handle];
|
|
100
|
-
// Sign the EIP712 attesting that the requester has access to the private key
|
|
101
|
-
// corresponding to the ephemeral public key.
|
|
102
|
-
const eip712Payload = (0, index_js_4.createEIP712Payload)({
|
|
103
|
-
chainId,
|
|
104
|
-
primaryType: 'AttestedDecryptRequest',
|
|
105
|
-
primaryTypeFields: [
|
|
106
|
-
{ name: 'handles', type: 'bytes32[]' },
|
|
107
|
-
{ name: 'publicKey', type: 'bytes' },
|
|
108
|
-
],
|
|
109
|
-
message: {
|
|
110
|
-
handles: handles,
|
|
111
|
-
publicKey: (0, viem_1.bytesToHex)(ephemeralPubKey),
|
|
112
|
-
},
|
|
113
|
-
domainName: index_js_3.ATTESTED_DECRYPT_DOMAIN_NAME,
|
|
114
|
-
domainVersion: index_js_3.ATTESTED_DECRYPT_DOMAIN_VERSION,
|
|
115
|
-
});
|
|
116
|
-
// Since the account is an ephemeral keypair stored in memory (not in Metamask),
|
|
117
|
-
// this step will NOT prompt the user with a pop-up.
|
|
118
|
-
const eip712Signature = await requesterAccount.signTypedData(eip712Payload);
|
|
119
|
-
const reencryptRequest = (0, protobuf_1.create)(kms_service_pb_js_1.AttestedDecryptRequestSchema, {
|
|
120
|
-
userAddress: requesterAccount.address,
|
|
121
|
-
reencryptPubKey: ephemeralPubKey,
|
|
122
|
-
eip712Signature: (0, viem_1.hexToBytes)(eip712Signature),
|
|
123
|
-
handlesWithProofs: [
|
|
124
|
-
(0, protobuf_1.create)(types_pb_js_1.HandleWithProofSchema, {
|
|
125
|
-
handle,
|
|
126
|
-
aclProof: {
|
|
127
|
-
proof: {
|
|
128
|
-
case: 'incoLiteAdvancedAclProof',
|
|
129
|
-
value: (0, protobuf_1.create)(types_pb_js_1.IncoLiteAdvancedACLProofSchema, {
|
|
130
|
-
allowanceProof: (0, protobuf_1.create)(types_pb_js_1.AllowanceProofSchema, {
|
|
131
|
-
sharer: allowanceVoucherWithSig.sharer,
|
|
132
|
-
voucher: (0, protobuf_1.create)(types_pb_js_1.AllowanceVoucherSchema, {
|
|
133
|
-
sessionNonce: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucher.sessionNonce),
|
|
134
|
-
verifyingContract: allowanceVoucherWithSig.voucher.verifyingContract,
|
|
135
|
-
callFunction: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucher.callFunction),
|
|
136
|
-
sharerArgData: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucher.sharerArgData),
|
|
137
|
-
}),
|
|
138
|
-
voucherSignature: (0, viem_1.hexToBytes)(allowanceVoucherWithSig.voucherSignature),
|
|
139
|
-
requesterArgData: new Uint8Array(),
|
|
140
|
-
}),
|
|
141
|
-
}),
|
|
142
|
-
},
|
|
143
|
-
},
|
|
144
|
-
}),
|
|
145
|
-
],
|
|
146
|
-
});
|
|
147
|
-
const response = await kmsClient.attestedDecrypt(reencryptRequest);
|
|
148
|
-
return (0, index_js_3.decryptGrpcResponse)(response, ephemeralKeypair, handle);
|
|
149
|
-
};
|
|
150
|
-
}
|
|
151
84
|
async function updateActiveVouchersSessionNonce(incoLiteAddress, sharerWalletClient) {
|
|
152
85
|
const verifier = await getIncoVerifier(incoLiteAddress, sharerWalletClient);
|
|
153
86
|
const txHash = await verifier.write.updateActiveVouchersSessionNonce();
|
|
@@ -155,15 +88,13 @@ async function updateActiveVouchersSessionNonce(incoLiteAddress, sharerWalletCli
|
|
|
155
88
|
}
|
|
156
89
|
// The sessionKeyAttestedCompute function is a decryptor that uses a session key
|
|
157
90
|
// to compute on a handle.
|
|
158
|
-
async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId,
|
|
159
|
-
const kmsClient = (0, index_js_3.getKmsClient)(kmsConnectRpcEndpointOrClient ||
|
|
160
|
-
(0, index_js_3.defaultCovalidatorGrpc)((0, chain_js_1.getSupportedChain)(chainId)));
|
|
91
|
+
async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsQuorumClient, ephemeralKeypair, allowanceVoucherWithSig, }) {
|
|
161
92
|
const requesterAccount = (0, accounts_1.privateKeyToAccount)(`0x${ephemeralKeypair.kp.getPrivate('hex')}`);
|
|
162
93
|
const rhsPlaintextBig = BigInt(rhsPlaintext);
|
|
163
|
-
const rhsValueBytes = (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, (0,
|
|
94
|
+
const rhsValueBytes = (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, (0, index_js_1.getHandleType)(lhsHandle), rhsPlaintextBig);
|
|
164
95
|
// Sign the EIP712 attesting that the requester has access to the private key
|
|
165
96
|
// corresponding to the ephemeral public key.
|
|
166
|
-
const eip712Payload = (0,
|
|
97
|
+
const eip712Payload = (0, index_js_3.createEIP712Payload)({
|
|
167
98
|
chainId: BigInt(chainId),
|
|
168
99
|
primaryType: 'AttestedComputeRequest',
|
|
169
100
|
primaryTypeFields: [
|
|
@@ -174,10 +105,10 @@ async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, backoffC
|
|
|
174
105
|
message: {
|
|
175
106
|
op: op,
|
|
176
107
|
lhsHandle: lhsHandle,
|
|
177
|
-
rhsPlaintext: (0,
|
|
108
|
+
rhsPlaintext: (0, index_js_1.bigintToBytes32)(rhsPlaintextBig),
|
|
178
109
|
},
|
|
179
|
-
domainName:
|
|
180
|
-
domainVersion:
|
|
110
|
+
domainName: index_js_2.ATTESTED_COMPUTE_DOMAIN_NAME,
|
|
111
|
+
domainVersion: index_js_2.ATTESTED_COMPUTE_DOMAIN_VERSION,
|
|
181
112
|
});
|
|
182
113
|
// Since the account is an ephemeral keypair stored in memory (not in Metamask),
|
|
183
114
|
// this step will NOT prompt the user with a pop-up.
|
|
@@ -208,36 +139,44 @@ async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, backoffC
|
|
|
208
139
|
},
|
|
209
140
|
},
|
|
210
141
|
});
|
|
211
|
-
|
|
212
|
-
|
|
213
|
-
}, backoffConfig);
|
|
214
|
-
if (!response.decryptionAttestation) {
|
|
215
|
-
throw new Error('Failed to get decryption attestation from attested compute');
|
|
216
|
-
}
|
|
217
|
-
const decryptionAttestation = response.decryptionAttestation;
|
|
218
|
-
if (decryptionAttestation.value === undefined) {
|
|
219
|
-
throw new Error('No value in compute response');
|
|
220
|
-
}
|
|
221
|
-
if (decryptionAttestation.value.case !== 'plaintext') {
|
|
222
|
-
throw new Error(`Unexpected attestation type: ${decryptionAttestation.value.case}, expected 'plaintext'`);
|
|
223
|
-
}
|
|
224
|
-
const plaintext = decryptionAttestation.value.value;
|
|
225
|
-
const bigIntValue = (0, index_js_2.bytesToBigInt)(plaintext.value);
|
|
226
|
-
return {
|
|
227
|
-
handle: decryptionAttestation.handle,
|
|
228
|
-
plaintext: (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, (0, index_js_2.getHandleType)(lhsHandle), bigIntValue),
|
|
229
|
-
covalidatorSignature: decryptionAttestation.signature,
|
|
230
|
-
};
|
|
142
|
+
let response = await kmsQuorumClient.attestedCompute(attestedComputeRequest, backoffConfig);
|
|
143
|
+
return response;
|
|
231
144
|
}
|
|
232
|
-
|
|
233
|
-
|
|
234
|
-
|
|
235
|
-
|
|
236
|
-
|
|
145
|
+
/**
|
|
146
|
+
* Performs attested decrypts using a voucher-backed session key.
|
|
147
|
+
*
|
|
148
|
+
* @example Plaintext results
|
|
149
|
+
* ```ts
|
|
150
|
+
* const attestations = await sessionKeyAttestedDecrypt({
|
|
151
|
+
* chainId,
|
|
152
|
+
* kmsConnectRpcEndpointOrClient: covalidatorUrl,
|
|
153
|
+
* allowanceVoucherWithSig: voucher,
|
|
154
|
+
* ephemeralKeypair,
|
|
155
|
+
* handles,
|
|
156
|
+
* });
|
|
157
|
+
* console.log(attestations[0].plaintext.value);
|
|
158
|
+
* ```
|
|
159
|
+
*
|
|
160
|
+
* @example Encrypted results
|
|
161
|
+
* ```ts
|
|
162
|
+
* const encryptedResults = await sessionKeyAttestedDecrypt({
|
|
163
|
+
* chainId,
|
|
164
|
+
* kmsConnectRpcEndpointOrClient: covalidatorUrl,
|
|
165
|
+
* allowanceVoucherWithSig: voucher,
|
|
166
|
+
* ephemeralKeypair,
|
|
167
|
+
* handles,
|
|
168
|
+
* reencryptPubKey: recipientPubKey,
|
|
169
|
+
* });
|
|
170
|
+
* console.log(
|
|
171
|
+
* encryptedResults[0].encryptedPlaintext.ciphertext.value,
|
|
172
|
+
* );
|
|
173
|
+
* ```
|
|
174
|
+
*/
|
|
175
|
+
async function sessionKeyAttestedDecrypt({ chainId, kmsQuorumClient, handles, ephemeralKeypair, allowanceVoucherWithSig, backoffConfig, reencryptPubKey, reencryptKeypair, }) {
|
|
237
176
|
const requesterAccount = (0, accounts_1.privateKeyToAccount)(`0x${ephemeralKeypair.kp.getPrivate('hex')}`);
|
|
238
177
|
// Sign the EIP712 attesting that the requester has access to the private key
|
|
239
178
|
// corresponding to the ephemeral public key.
|
|
240
|
-
const eip712Payload = (0,
|
|
179
|
+
const eip712Payload = (0, index_js_3.createEIP712Payload)({
|
|
241
180
|
chainId: BigInt(chainId),
|
|
242
181
|
primaryType: 'AttestedDecryptRequest',
|
|
243
182
|
primaryTypeFields: [
|
|
@@ -248,8 +187,8 @@ async function sessionKeyAttestedDecrypt({ chainId, kmsConnectRpcEndpointOrClien
|
|
|
248
187
|
handles: handles,
|
|
249
188
|
publicKey: (0, viem_1.bytesToHex)(reencryptPubKey ? reencryptPubKey : Uint8Array.from([])),
|
|
250
189
|
},
|
|
251
|
-
domainName:
|
|
252
|
-
domainVersion:
|
|
190
|
+
domainName: index_js_2.ATTESTED_DECRYPT_DOMAIN_NAME,
|
|
191
|
+
domainVersion: index_js_2.ATTESTED_DECRYPT_DOMAIN_VERSION,
|
|
253
192
|
});
|
|
254
193
|
// Since the account is an ephemeral keypair stored in memory (not in Metamask),
|
|
255
194
|
// this step will NOT prompt the user with a pop-up.
|
|
@@ -283,34 +222,12 @@ async function sessionKeyAttestedDecrypt({ chainId, kmsConnectRpcEndpointOrClien
|
|
|
283
222
|
eip712Signature: (0, viem_1.hexToBytes)(eip712Signature),
|
|
284
223
|
reencryptPubKey: reencryptPubKey ? reencryptPubKey : Uint8Array.from([]),
|
|
285
224
|
});
|
|
286
|
-
|
|
287
|
-
|
|
288
|
-
|
|
289
|
-
|
|
290
|
-
response.decryptionAttestations.length === 0) {
|
|
291
|
-
throw new index_js_1.AttestedDecryptError('No decryption attestations in response');
|
|
225
|
+
let response = await kmsQuorumClient.attestedDecrypt(attestedDecryptRequest, backoffConfig);
|
|
226
|
+
// If reencryptPubKey is provided with a keypair, decrypt the encrypted attestations
|
|
227
|
+
if (reencryptPubKey !== undefined && reencryptKeypair) {
|
|
228
|
+
response = await (0, attested_decrypt_js_1.decryptEncryptedAttestations)(response, reencryptKeypair);
|
|
292
229
|
}
|
|
293
|
-
|
|
294
|
-
response = await (0, reencrypt_js_1.decryptGrpcDecryptResponse)(response, reencryptKeypair);
|
|
295
|
-
}
|
|
296
|
-
const results = response.decryptionAttestations.map((att) => {
|
|
297
|
-
if (att.value === undefined) {
|
|
298
|
-
throw new index_js_1.AttestedDecryptError('No value in attestation');
|
|
299
|
-
}
|
|
300
|
-
if (att.value.case !== 'plaintext') {
|
|
301
|
-
throw new Error(`Unexpected attestation type: ${att.value.case}, expected 'plaintext'`);
|
|
302
|
-
}
|
|
303
|
-
const plaintext = att.value.value;
|
|
304
|
-
const h = att.handle;
|
|
305
|
-
const handleType = (0, index_js_2.getHandleType)(h);
|
|
306
|
-
const bigIntValue = (0, index_js_2.bytesToBigInt)(plaintext.value);
|
|
307
|
-
return {
|
|
308
|
-
handle: h,
|
|
309
|
-
plaintext: (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, handleType, bigIntValue),
|
|
310
|
-
covalidatorSignature: att.signature,
|
|
311
|
-
};
|
|
312
|
-
});
|
|
313
|
-
return results;
|
|
230
|
+
return response;
|
|
314
231
|
}
|
|
315
232
|
// Below are helpers to get ABIs of functions/structs from the SessionVerifier
|
|
316
233
|
// contract.
|
|
@@ -375,4 +292,4 @@ async function getIncoVerifier(incoLiteAddress, walletClient) {
|
|
|
375
292
|
client: walletClient,
|
|
376
293
|
});
|
|
377
294
|
}
|
|
378
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"session-key.js","sourceRoot":"","sources":["../../../src/advancedacl/session-key.ts"],"names":[],"mappings":";;AAiGA,wDAqBC;AAwBD,0CAiEC;AAyBD,sDAmFC;AAED,4EAOC;AA6BD,8DAqHC;AA8BD,8DAgIC;AApnBD,iDAA4C;AAE5C,+BAYc;AACd,4CAAoD;AACpD,0DAGqC;AACrC,0CAAkE;AAClE,+DAKqC;AACrC,iFAGgD;AAChD,iEAGwC;AACxC,+DAAgE;AAChE,0CAKqB;AAQrB,+CAQ0B;AAC1B,uDAGkC;AAClC,0CAA8D;AAI9D,0FAI4D;AAC5D,8EAKsD;AACtD,uDAAkE;AAiBlE,sEAAsE;AACtE,wEAAwE;AACxE,+BAA+B;AACxB,KAAK,UAAU,sBAAsB,CAC1C,eAAwB,EACxB,kBAA2D,EAC3D,iBAA0B,EAC1B,YAAiB,EACjB,aAAkB;IAElB,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAE5E,0EAA0E;IAC1E,wCAAwC;IACxC,MAAM,YAAY,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,6BAA6B,CAAC;QACrE,kBAAkB,CAAC,OAAO,CAAC,OAAO;KACnC,CAAC,CAAC;IAEH,OAAO;QACL,YAAY;QACZ,iBAAiB;QACjB,YAAY;QACZ,aAAa;KACd,CAAC;AACJ,CAAC;AAuBD,mDAAmD;AAC5C,KAAK,UAAU,eAAe,CAAC,EACpC,OAAO,EACP,eAAe,EACf,8BAA8B,EAC9B,cAAc,EACd,kBAAkB,EAClB,SAAS,GACW;IACpB,MAAM,OAAO,GAAG;QACd,SAAS,EAAE,cAAc;QACzB,SAAS,EAAE,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,CAAC;KAC/C,CAAC;IACb,MAAM,aAAa,GAAG,IAAA,0BAAmB,EAAC,aAAa,EAAE,EAAE;QACzD,OAAO,CAAC,SAAS;QACjB,OAAO,CAAC,SAAS;KAClB,CAAC,CAAC;IAEH,MAAM,YAAY,GAAG,MAAM,eAAe,CACxC,eAAe,EACf,kBAAkB,CACnB,CAAC;IAEF,mCAAmC;IACnC,iBAAiB;IACjB,sBAAsB;IACtB,yBAAyB;IACzB,mBAAmB;IACnB,6BAA6B;IAC7B,gBAAgB;IAChB,8BAA8B;IAC9B,MAAM,cAAc,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC9D,MAAM,gBAAgB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IAEtD,MAAM,OAAO,GAAG,MAAM,sBAAsB,CAC1C,eAAe,EACf,kBAAkB;IAClB,4EAA4E;IAC5E,6BAA6B;IAC7B,8BAA8B,EAC9B,IAAA,yBAAkB,EAAC,mBAAmB,EAAE,CAAC,EACzC,aAAa,CACd,CAAC;IACF,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO;QACP,WAAW,EAAE,kBAAkB;QAC/B,iBAAiB,EAAE,sBAAsB,EAAE;QAC3C,OAAO,EAAE,OAAO;QAChB,wEAAwE;QACxE,gEAAgE;QAChE,iBAAiB,EAAE,YAAY,CAAC,OAAO;QACvC,UAAU,EAAE,gBAAgB;QAC5B,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IAEH,uEAAuE;IACvE,WAAW;IACX,MAAM,gBAAgB,GACpB,MAAM,kBAAkB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAExD,OAAO;QACL,MAAM,EAAE,kBAAkB,CAAC,OAAO,CAAC,OAAO;QAC1C,OAAO;QACP,gBAAgB;KACjB,CAAC;AACJ,CAAC;AAoBD;;;;GAIG;AACI,KAAK,UAAU,qBAAqB,CAAC,EAC1C,OAAO,EACP,6BAA6B,EAC7B,gBAAgB,EAChB,uBAAuB,GACG;IAC1B,MAAM,SAAS,GAAG,IAAA,uBAAY,EAC5B,6BAA6B;QAC3B,IAAA,iCAAsB,EAAC,IAAA,4BAAiB,EAAC,OAAO,CAAC,CAAC,CACrD,CAAC;IACF,MAAM,gBAAgB,GAAG,IAAA,8BAAmB,EAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IACF,MAAM,eAAe,GAAG,gBAAgB,CAAC,eAAe,EAAE,CAAC;IAE3D,OAAO,KAAK,UAAU,SAAS,CAA6B,EAC1D,MAAM,GAC0B;QAChC,MAAM,OAAO,GAAG,CAAC,MAAmB,CAAC,CAAC;QACtC,6EAA6E;QAC7E,6CAA6C;QAC7C,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;YACxC,OAAO;YACP,WAAW,EAAE,wBAAwB;YACrC,iBAAiB,EAAE;gBACjB,EAAE,IAAI,EAAE,SAAS,EAAE,IAAI,EAAE,WAAW,EAAE;gBACtC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,OAAO,EAAE;aACrC;YACD,OAAO,EAAE;gBACP,OAAO,EAAE,OAAO;gBAChB,SAAS,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;aACvC;YACD,UAAU,EAAE,uCAA4B;YACxC,aAAa,EAAE,0CAA+B;SAC/C,CAAC,CAAC;QACH,gFAAgF;QAChF,oDAAoD;QACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;QAE5E,MAAM,gBAAgB,GAA2B,IAAA,iBAAM,EACrD,gDAA4B,EAC5B;YACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;YACrC,eAAe,EAAE,eAAe;YAChC,eAAe,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;YAC5C,iBAAiB,EAAE;gBACjB,IAAA,iBAAM,EAAC,mCAAqB,EAAE;oBAC5B,MAAM;oBACN,QAAQ,EAAE;wBACR,KAAK,EAAE;4BACL,IAAI,EAAE,0BAA0B;4BAChC,KAAK,EAAE,IAAA,iBAAM,EAAC,4CAA8B,EAAE;gCAC5C,cAAc,EAAE,IAAA,iBAAM,EAAC,kCAAoB,EAAE;oCAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;oCACtC,OAAO,EAAE,IAAA,iBAAM,EAAC,oCAAsB,EAAE;wCACtC,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;wCACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;wCACnD,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;wCACD,aAAa,EAAE,IAAA,iBAAU,EACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;qCACF,CAAC;oCACF,gBAAgB,EAAE,IAAA,iBAAU,EAC1B,uBAAuB,CAAC,gBAAgB,CACzC;oCACD,gBAAgB,EAAE,IAAI,UAAU,EAAE;iCACnC,CAAC;6BACH,CAAC;yBACH;qBACF;iBACF,CAAC;aACH;SACF,CACF,CAAC;QAEF,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,eAAe,CAAC,gBAAgB,CAAC,CAAC;QACnE,OAAO,IAAA,8BAAmB,EAAC,QAAQ,EAAE,gBAAgB,EAAE,MAAM,CAAC,CAAC;IACjE,CAAC,CAAC;AACJ,CAAC;AAEM,KAAK,UAAU,gCAAgC,CACpD,eAAwB,EACxB,kBAA2D;IAE3D,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAC5E,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,KAAK,CAAC,gCAAgC,EAAE,CAAC;IACvE,OAAO,MAAM,CAAC;AAChB,CAAC;AA2BD,gFAAgF;AAChF,0BAA0B;AACnB,KAAK,UAAU,yBAAyB,CAA6B,EAC1E,SAAS,EACT,EAAE,EACF,YAAY,EACZ,aAAa,EACb,OAAO,EACP,6BAA6B,EAC7B,gBAAgB,EAChB,uBAAuB,GACO;IAC9B,MAAM,SAAS,GAAG,IAAA,uBAAY,EAC5B,6BAA6B;QAC3B,IAAA,iCAAsB,EAAC,IAAA,4BAAiB,EAAC,OAAO,CAAC,CAAC,CACrD,CAAC;IACF,MAAM,gBAAgB,GAAG,IAAA,8BAAmB,EAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IACF,MAAM,eAAe,GAAG,MAAM,CAAC,YAAY,CAAC,CAAC;IAC7C,MAAM,aAAa,GAAG,IAAA,iCAAiB,EACrC,iCAAiB,CAAC,KAAK,EACvB,IAAA,wBAAa,EAAC,SAAS,CAAM,EAC7B,eAAe,CAChB,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,OAAO,EAAE;YAC7B,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,SAAS,EAAE;YACtC,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,SAAS,EAAE;SAC1C;QACD,OAAO,EAAE;YACP,EAAE,EAAE,EAAE;YACN,SAAS,EAAE,SAAS;YACpB,YAAY,EAAE,IAAA,0BAAe,EAAC,eAAe,CAAC;SAC/C;QACD,UAAU,EAAE,uCAA4B;QACxC,aAAa,EAAE,0CAA+B;KAC/C,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAE5E,MAAM,sBAAsB,GAA2B,IAAA,iBAAM,EAC3D,gDAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,EAAE,EAAE,EAAE;QACN,SAAS,EAAE,SAAS;QACpB,YAAY,EAAE,aAAa,CAAC,KAAK,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC9C,eAAe,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;QAC5C,QAAQ,EAAE;YACR,KAAK,EAAE;gBACL,IAAI,EAAE,0BAA0B;gBAChC,KAAK,EAAE,IAAA,iBAAM,EAAC,4CAA8B,EAAE;oBAC5C,cAAc,EAAE,IAAA,iBAAM,EAAC,kCAAoB,EAAE;wBAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;wBACtC,OAAO,EAAE,IAAA,iBAAM,EAAC,oCAAsB,EAAE;4BACtC,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;4BACnD,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,aAAa,EAAE,IAAA,iBAAU,EACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;yBACF,CAAC;wBACF,gBAAgB,EAAE,IAAA,iBAAU,EAC1B,uBAAuB,CAAC,gBAAgB,CACzC;wBACD,sDAAsD;wBACtD,gBAAgB,EAAE,IAAI,UAAU,EAAE;qBACnC,CAAC;iBACH,CAAC;aACH;SACF;KACF,CACF,CAAC;IAEF,MAAM,QAAQ,GAAG,MAAM,IAAA,2BAAgB,EAAC,KAAK,IAAI,EAAE;QACjD,OAAO,MAAM,SAAS,CAAC,eAAe,CAAC,sBAAsB,CAAC,CAAC;IACjE,CAAC,EAAE,aAAa,CAAC,CAAC;IAElB,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE,CAAC;QACpC,MAAM,IAAI,KAAK,CACb,4DAA4D,CAC7D,CAAC;IACJ,CAAC;IAED,MAAM,qBAAqB,GAAG,QAAQ,CAAC,qBAAqB,CAAC;IAC7D,IAAI,qBAAqB,CAAC,KAAK,KAAK,SAAS,EAAE,CAAC;QAC9C,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;IAClD,CAAC;IAED,IAAI,qBAAqB,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;QACrD,MAAM,IAAI,KAAK,CACb,gCAAgC,qBAAqB,CAAC,KAAK,CAAC,IAAI,wBAAwB,CACzF,CAAC;IACJ,CAAC;IAED,MAAM,SAAS,GAAG,qBAAqB,CAAC,KAAK,CAAC,KAAkB,CAAC;IACjE,MAAM,WAAW,GAAG,IAAA,wBAAa,EAAC,SAAS,CAAC,KAAK,CAAC,CAAC;IACnD,OAAO;QACL,MAAM,EAAE,qBAAqB,CAAC,MAAmB;QACjD,SAAS,EAAE,IAAA,iCAAiB,EAC1B,iCAAiB,CAAC,KAAK,EACvB,IAAA,wBAAa,EAAC,SAAS,CAAM,EAC7B,WAAW,CACZ;QACD,oBAAoB,EAAE,qBAAqB,CAAC,SAAS;KACtD,CAAC;AACJ,CAAC;AA4BD,gFAAgF;AAChF,mBAAmB;AACZ,KAAK,UAAU,yBAAyB,CAAC,EAC9C,OAAO,EACP,6BAA6B,EAC7B,OAAO,EACP,gBAAgB,EAChB,uBAAuB,EACvB,aAAa,EACb,eAAe,EACf,gBAAgB,GACc;IAG9B,MAAM,SAAS,GAAG,IAAA,uBAAY,EAC5B,6BAA6B;QAC3B,IAAA,iCAAsB,EAAC,IAAA,4BAAiB,EAAC,OAAO,CAAC,CAAC,CACrD,CAAC;IACF,MAAM,gBAAgB,GAAG,IAAA,8BAAmB,EAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,SAAS,EAAE,IAAI,EAAE,WAAW,EAAE;YACtC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,OAAO,EAAE;SACrC;QACD,OAAO,EAAE;YACP,OAAO,EAAE,OAAO;YAChB,SAAS,EAAE,IAAA,iBAAU,EACnB,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC,CACxD;SACF;QACD,UAAU,EAAE,uCAA4B;QACxC,aAAa,EAAE,0CAA+B;KAC/C,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAC5E,MAAM,iBAAiB,GAA2B,OAAO,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE;QACvE,OAAO,IAAA,iBAAM,EAAC,mCAAqB,EAAE;YACnC,MAAM,EAAE,MAAM;YACd,QAAQ,EAAE;gBACR,KAAK,EAAE;oBACL,IAAI,EAAE,0BAA0B;oBAChC,KAAK,EAAE,IAAA,iBAAM,EAAC,4CAA8B,EAAE;wBAC5C,cAAc,EAAE,IAAA,iBAAM,EAAC,kCAAoB,EAAE;4BAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;4BACtC,OAAO,EAAE,IAAA,iBAAM,EAAC,oCAAsB,EAAE;gCACtC,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;gCACnD,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,aAAa,EAAE,IAAA,iBAAU,EACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;6BACF,CAAC;4BACF,gBAAgB,EAAE,IAAA,iBAAU,EAC1B,uBAAuB,CAAC,gBAAgB,CACzC;4BACD,gBAAgB,EAAE,IAAI,UAAU,EAAE;yBACnC,CAAC;qBACH,CAAC;iBACH;aACF;SACF,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,MAAM,sBAAsB,GAA2B,IAAA,iBAAM,EAC3D,gDAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,iBAAiB,EAAE,iBAAiB;QACpC,eAAe,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;QAC5C,eAAe,EAAE,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;KACzE,CACF,CAAC;IAEF,IAAI,QAAQ,GAAG,MAAM,IAAA,2BAAgB,EAAC,KAAK,IAAI,EAAE;QAC/C,OAAO,MAAM,SAAS,CAAC,eAAe,CAAC,sBAAsB,CAAC,CAAC;IACjE,CAAC,EAAE,aAAa,CAAC,CAAC;IAElB,IACE,CAAC,QAAQ,CAAC,sBAAsB;QAChC,QAAQ,CAAC,sBAAsB,CAAC,MAAM,KAAK,CAAC,EAC5C,CAAC;QACD,MAAM,IAAI,+BAAoB,CAAC,wCAAwC,CAAC,CAAC;IAC3E,CAAC;IAED,IAAI,gBAAgB,EAAE,CAAC;QACrB,QAAQ,GAAG,MAAM,IAAA,yCAA0B,EAAC,QAAQ,EAAE,gBAAgB,CAAC,CAAC;IAC1E,CAAC;IAED,MAAM,OAAO,GACX,QAAQ,CAAC,sBAAsB,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE;QAC1C,IAAI,GAAG,CAAC,KAAK,KAAK,SAAS,EAAE,CAAC;YAC5B,MAAM,IAAI,+BAAoB,CAAC,yBAAyB,CAAC,CAAC;QAC5D,CAAC;QAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;YACnC,MAAM,IAAI,KAAK,CACb,gCAAgC,GAAG,CAAC,KAAK,CAAC,IAAI,wBAAwB,CACvE,CAAC;QACJ,CAAC;QAED,MAAM,SAAS,GAAG,GAAG,CAAC,KAAK,CAAC,KAAkB,CAAC;QAE/C,MAAM,CAAC,GAAG,GAAG,CAAC,MAAmB,CAAC;QAClC,MAAM,UAAU,GAAG,IAAA,wBAAa,EAAC,CAAC,CAAC,CAAC;QACpC,MAAM,WAAW,GAAG,IAAA,wBAAa,EAAC,SAAS,CAAC,KAAK,CAAC,CAAC;QACnD,OAAO;YACL,MAAM,EAAE,CAAC;YACT,SAAS,EAAE,IAAA,iCAAiB,EAC1B,iCAAiB,CAAC,KAAK,EACvB,UAA8B,EAC9B,WAAW,CACZ;YACD,oBAAoB,EAAE,GAAG,CAAC,SAAS;SACpC,CAAC;IACJ,CAAC,CAAC,CAAC;IAEL,OAAO,OAAO,CAAC;AACjB,CAAC;AAED,8EAA8E;AAC9E,YAAY;AAEZ,gDAAgD;AAChD,SAAS,sBAAsB;IAC7B,2EAA2E;IAC3E,oBAAoB;IACpB,MAAM,sBAAsB,GAAG,+CAAwB,CAAC,IAAI,CAC1D,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,KAAK,wBAAwB,CACjD,CAAC;IACF,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAC5B,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;IACtD,CAAC;IAED,gEAAgE;IAChE,MAAM,qBAAqB,GAAG,sBAAsB,CAAC,MAAM,CAAC,IAAI,CAC9D,CAAC,KAAK,EAAE,EAAE,CAAC,KAAK,CAAC,YAAY,KAAK,yBAAyB,CAC5D,CAAC;IACF,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAC3B,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACrD,CAAC;IAED,OAAO,qBAAqB,CAAC,UAAU,CAAC;AAC1C,CAAC;AAED,uCAAuC;AACvC,EAAE;AACF,0EAA0E;AAC1E,4CAA4C;AAC5C,SAAS,aAAa;IACpB,MAAM,UAAU,GAAG,mCAAY,CAAC,IAAI,CAClC,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,YAAY,CACvD,CAAC;IACF,IAAI,CAAC,UAAU,EAAE,CAAC;QAChB,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;IAC1C,CAAC;IAED,MAAM,OAAO,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IACtC,IAAI,CAAC,OAAO,EAAE,CAAC;QACb,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;IACvC,CAAC;IAED,OAAO,OAAO,CAAC,UAAU,CAAC;AAC5B,CAAC;AAED,+CAA+C;AAC/C,SAAS,mBAAmB;IAC1B,MAAM,aAAa,GAAG,iCAAkB,CAAC,IAAI,CAC3C,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,eAAe,CAC1D,CAAC;IACF,IAAI,CAAC,aAAa,EAAE,CAAC;QACnB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;IAC7C,CAAC;IAED,OAAO,aAAa,CAAC;AACvB,CAAC;AAED,SAAS,cAAc,CACrB,mBAA4B,EAC5B,kBAA2D;IAE3D,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,+CAAwB;QAC7B,MAAM,EAAE,kBAAkB;KAC3B,CAAC,CAAC;AACL,CAAC;AAED,SAAS,gBAAgB,CACvB,eAAwB,EACxB,YAAqD;IAErD,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,eAAe;QACxB,GAAG,EAAE,+BAAgB;QACrB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC;AAED,KAAK,UAAU,eAAe,CAC5B,eAAwB,EACxB,YAAqD;IAErD,MAAM,QAAQ,GAAG,gBAAgB,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IACjE,MAAM,mBAAmB,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC/D,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,6BAAe;QACpB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC"}
|
|
295
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"session-key.js","sourceRoot":"","sources":["../../../src/advancedacl/session-key.ts"],"names":[],"mappings":";;AAoFA,wDAqBC;AAwBD,0CAiEC;AAED,4EAOC;AA0BD,8DAyFC;AAuDD,8DA8FC;AAndD,iDAA4C;AAC5C,+BAYc;AACd,4CAAoD;AAMpD,+DAKqC;AACrC,iFAGgD;AAChD,iEAGwC;AACxC,+DAAgE;AAChE,0CAAwE;AAOxE,+CAK0B;AAC1B,uDAA+D;AAK/D,gFAAsF;AACtF,0FAG4D;AAC5D,8EAKsD;AAkBtD,sEAAsE;AACtE,wEAAwE;AACxE,+BAA+B;AACxB,KAAK,UAAU,sBAAsB,CAC1C,eAAwB,EACxB,kBAA2D,EAC3D,iBAA0B,EAC1B,YAAiB,EACjB,aAAkB;IAElB,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAE5E,0EAA0E;IAC1E,wCAAwC;IACxC,MAAM,YAAY,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,6BAA6B,CAAC;QACrE,kBAAkB,CAAC,OAAO,CAAC,OAAO;KACnC,CAAC,CAAC;IAEH,OAAO;QACL,YAAY;QACZ,iBAAiB;QACjB,YAAY;QACZ,aAAa;KACd,CAAC;AACJ,CAAC;AAuBD,mDAAmD;AAC5C,KAAK,UAAU,eAAe,CAAC,EACpC,OAAO,EACP,eAAe,EACf,8BAA8B,EAC9B,cAAc,EACd,kBAAkB,EAClB,SAAS,GACW;IACpB,MAAM,OAAO,GAAG;QACd,SAAS,EAAE,cAAc;QACzB,SAAS,EAAE,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,CAAC;KAC/C,CAAC;IACb,MAAM,aAAa,GAAG,IAAA,0BAAmB,EAAC,aAAa,EAAE,EAAE;QACzD,OAAO,CAAC,SAAS;QACjB,OAAO,CAAC,SAAS;KAClB,CAAC,CAAC;IAEH,MAAM,YAAY,GAAG,MAAM,eAAe,CACxC,eAAe,EACf,kBAAkB,CACnB,CAAC;IAEF,mCAAmC;IACnC,iBAAiB;IACjB,sBAAsB;IACtB,yBAAyB;IACzB,mBAAmB;IACnB,6BAA6B;IAC7B,gBAAgB;IAChB,8BAA8B;IAC9B,MAAM,cAAc,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC9D,MAAM,gBAAgB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IAEtD,MAAM,OAAO,GAAG,MAAM,sBAAsB,CAC1C,eAAe,EACf,kBAAkB;IAClB,4EAA4E;IAC5E,6BAA6B;IAC7B,8BAA8B,EAC9B,IAAA,yBAAkB,EAAC,mBAAmB,EAAE,CAAC,EACzC,aAAa,CACd,CAAC;IACF,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO;QACP,WAAW,EAAE,kBAAkB;QAC/B,iBAAiB,EAAE,sBAAsB,EAAE;QAC3C,OAAO,EAAE,OAAO;QAChB,wEAAwE;QACxE,gEAAgE;QAChE,iBAAiB,EAAE,YAAY,CAAC,OAAO;QACvC,UAAU,EAAE,gBAAgB;QAC5B,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IAEH,uEAAuE;IACvE,WAAW;IACX,MAAM,gBAAgB,GACpB,MAAM,kBAAkB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAExD,OAAO;QACL,MAAM,EAAE,kBAAkB,CAAC,OAAO,CAAC,OAAO;QAC1C,OAAO;QACP,gBAAgB;KACjB,CAAC;AACJ,CAAC;AAEM,KAAK,UAAU,gCAAgC,CACpD,eAAwB,EACxB,kBAA2D;IAE3D,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAC5E,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,KAAK,CAAC,gCAAgC,EAAE,CAAC;IACvE,OAAO,MAAM,CAAC;AAChB,CAAC;AAwBD,gFAAgF;AAChF,0BAA0B;AACnB,KAAK,UAAU,yBAAyB,CAA6B,EAC1E,SAAS,EACT,EAAE,EACF,YAAY,EACZ,aAAa,EACb,OAAO,EACP,eAAe,EACf,gBAAgB,EAChB,uBAAuB,GACO;IAG9B,MAAM,gBAAgB,GAAG,IAAA,8BAAmB,EAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IACF,MAAM,eAAe,GAAG,MAAM,CAAC,YAAY,CAAC,CAAC;IAC7C,MAAM,aAAa,GAAG,IAAA,iCAAiB,EACrC,iCAAiB,CAAC,KAAK,EACvB,IAAA,wBAAa,EAAC,SAAS,CAAM,EAC7B,eAAe,CAChB,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,OAAO,EAAE;YAC7B,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,SAAS,EAAE;YACtC,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,SAAS,EAAE;SAC1C;QACD,OAAO,EAAE;YACP,EAAE,EAAE,EAAE;YACN,SAAS,EAAE,SAAS;YACpB,YAAY,EAAE,IAAA,0BAAe,EAAC,eAAe,CAAC;SAC/C;QACD,UAAU,EAAE,uCAA4B;QACxC,aAAa,EAAE,0CAA+B;KAC/C,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAE5E,MAAM,sBAAsB,GAA2B,IAAA,iBAAM,EAC3D,gDAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,EAAE,EAAE,EAAE;QACN,SAAS,EAAE,SAAS;QACpB,YAAY,EAAE,aAAa,CAAC,KAAK,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC9C,eAAe,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;QAC5C,QAAQ,EAAE;YACR,KAAK,EAAE;gBACL,IAAI,EAAE,0BAA0B;gBAChC,KAAK,EAAE,IAAA,iBAAM,EAAC,4CAA8B,EAAE;oBAC5C,cAAc,EAAE,IAAA,iBAAM,EAAC,kCAAoB,EAAE;wBAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;wBACtC,OAAO,EAAE,IAAA,iBAAM,EAAC,oCAAsB,EAAE;4BACtC,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;4BACnD,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,aAAa,EAAE,IAAA,iBAAU,EACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;yBACF,CAAC;wBACF,gBAAgB,EAAE,IAAA,iBAAU,EAC1B,uBAAuB,CAAC,gBAAgB,CACzC;wBACD,sDAAsD;wBACtD,gBAAgB,EAAE,IAAI,UAAU,EAAE;qBACnC,CAAC;iBACH,CAAC;aACH;SACF;KACF,CACF,CAAC;IAEF,IAAI,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,CAClD,sBAAsB,EACtB,aAAa,CACd,CAAC;IAEF,OAAO,QAAQ,CAAC;AAClB,CAAC;AAyBD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACI,KAAK,UAAU,yBAAyB,CAAC,EAC9C,OAAO,EACP,eAAe,EACf,OAAO,EACP,gBAAgB,EAChB,uBAAuB,EACvB,aAAa,EACb,eAAe,EACf,gBAAgB,GACc;IAM9B,MAAM,gBAAgB,GAAG,IAAA,8BAAmB,EAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,IAAA,8BAAmB,EAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,SAAS,EAAE,IAAI,EAAE,WAAW,EAAE;YACtC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,OAAO,EAAE;SACrC;QACD,OAAO,EAAE;YACP,OAAO,EAAE,OAAO;YAChB,SAAS,EAAE,IAAA,iBAAU,EACnB,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC,CACxD;SACF;QACD,UAAU,EAAE,uCAA4B;QACxC,aAAa,EAAE,0CAA+B;KAC/C,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAC5E,MAAM,iBAAiB,GAA2B,OAAO,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE;QACvE,OAAO,IAAA,iBAAM,EAAC,mCAAqB,EAAE;YACnC,MAAM,EAAE,MAAM;YACd,QAAQ,EAAE;gBACR,KAAK,EAAE;oBACL,IAAI,EAAE,0BAA0B;oBAChC,KAAK,EAAE,IAAA,iBAAM,EAAC,4CAA8B,EAAE;wBAC5C,cAAc,EAAE,IAAA,iBAAM,EAAC,kCAAoB,EAAE;4BAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;4BACtC,OAAO,EAAE,IAAA,iBAAM,EAAC,oCAAsB,EAAE;gCACtC,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;gCACnD,YAAY,EAAE,IAAA,iBAAU,EACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,aAAa,EAAE,IAAA,iBAAU,EACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;6BACF,CAAC;4BACF,gBAAgB,EAAE,IAAA,iBAAU,EAC1B,uBAAuB,CAAC,gBAAgB,CACzC;4BACD,gBAAgB,EAAE,IAAI,UAAU,EAAE;yBACnC,CAAC;qBACH,CAAC;iBACH;aACF;SACF,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,MAAM,sBAAsB,GAA2B,IAAA,iBAAM,EAC3D,gDAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,iBAAiB,EAAE,iBAAiB;QACpC,eAAe,EAAE,IAAA,iBAAU,EAAC,eAAe,CAAC;QAC5C,eAAe,EAAE,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;KACzE,CACF,CAAC;IAEF,IAAI,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,CAClD,sBAAsB,EACtB,aAAa,CACd,CAAC;IAEF,oFAAoF;IACpF,IAAI,eAAe,KAAK,SAAS,IAAI,gBAAgB,EAAE,CAAC;QACtD,QAAQ,GAAG,MAAM,IAAA,kDAA4B,EAAC,QAAQ,EAAE,gBAAgB,CAAC,CAAC;IAC5E,CAAC;IAED,OAAO,QAAQ,CAAC;AAClB,CAAC;AAED,8EAA8E;AAC9E,YAAY;AAEZ,gDAAgD;AAChD,SAAS,sBAAsB;IAC7B,2EAA2E;IAC3E,oBAAoB;IACpB,MAAM,sBAAsB,GAAG,+CAAwB,CAAC,IAAI,CAC1D,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,KAAK,wBAAwB,CACjD,CAAC;IACF,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAC5B,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;IACtD,CAAC;IAED,gEAAgE;IAChE,MAAM,qBAAqB,GAAG,sBAAsB,CAAC,MAAM,CAAC,IAAI,CAC9D,CAAC,KAAK,EAAE,EAAE,CAAC,KAAK,CAAC,YAAY,KAAK,yBAAyB,CAC5D,CAAC;IACF,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAC3B,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACrD,CAAC;IAED,OAAO,qBAAqB,CAAC,UAAU,CAAC;AAC1C,CAAC;AAED,uCAAuC;AACvC,EAAE;AACF,0EAA0E;AAC1E,4CAA4C;AAC5C,SAAS,aAAa;IACpB,MAAM,UAAU,GAAG,mCAAY,CAAC,IAAI,CAClC,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,YAAY,CACvD,CAAC;IACF,IAAI,CAAC,UAAU,EAAE,CAAC;QAChB,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;IAC1C,CAAC;IAED,MAAM,OAAO,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IACtC,IAAI,CAAC,OAAO,EAAE,CAAC;QACb,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;IACvC,CAAC;IAED,OAAO,OAAO,CAAC,UAAU,CAAC;AAC5B,CAAC;AAED,+CAA+C;AAC/C,SAAS,mBAAmB;IAC1B,MAAM,aAAa,GAAG,iCAAkB,CAAC,IAAI,CAC3C,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,eAAe,CAC1D,CAAC;IACF,IAAI,CAAC,aAAa,EAAE,CAAC;QACnB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;IAC7C,CAAC;IAED,OAAO,aAAa,CAAC;AACvB,CAAC;AAED,SAAS,cAAc,CACrB,mBAA4B,EAC5B,kBAA2D;IAE3D,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,+CAAwB;QAC7B,MAAM,EAAE,kBAAkB;KAC3B,CAAC,CAAC;AACL,CAAC;AAED,SAAS,gBAAgB,CACvB,eAAwB,EACxB,YAAqD;IAErD,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,eAAe;QACxB,GAAG,EAAE,+BAAgB;QACrB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC;AAED,KAAK,UAAU,eAAe,CAC5B,eAAwB,EACxB,YAAqD;IAErD,MAAM,QAAQ,GAAG,gBAAgB,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IACjE,MAAM,mBAAmB,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC/D,OAAO,IAAA,kBAAW,EAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,6BAAe;QACpB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC"}
|
|
@@ -3,19 +3,19 @@ import { DecryptionAttestation } from '../attesteddecrypt/types.js';
|
|
|
3
3
|
import { HexString } from '../binary.js';
|
|
4
4
|
import { SupportedChainId } from '../chain.js';
|
|
5
5
|
import { EciesScheme, SupportedFheType } from '../encryption/encryption.js';
|
|
6
|
-
import
|
|
6
|
+
import { KmsQuorumClient } from '../kms/quorumClient.js';
|
|
7
7
|
import type { BackoffConfig } from '../retry.js';
|
|
8
8
|
import { AttestedComputeOP } from './types.js';
|
|
9
9
|
export declare const ATTESTED_COMPUTE_DOMAIN_NAME = "IncoAttestedCompute";
|
|
10
|
-
export declare const ATTESTED_COMPUTE_DOMAIN_VERSION = "
|
|
10
|
+
export declare const ATTESTED_COMPUTE_DOMAIN_VERSION = "1";
|
|
11
11
|
/**
|
|
12
12
|
* Arguments for creating an attested compute.
|
|
13
13
|
*/
|
|
14
14
|
export interface IncoLiteAttestedComputeArgs {
|
|
15
15
|
/** The wallet used to interact with the blockchain and sign the compute request */
|
|
16
16
|
walletClient: WalletClient<Transport, Chain, Account>;
|
|
17
|
-
/** The KMS
|
|
18
|
-
|
|
17
|
+
/** The KMS quorum client instance */
|
|
18
|
+
kmsQuorumClient: KmsQuorumClient;
|
|
19
19
|
/** The chain ID to use */
|
|
20
20
|
chainId: SupportedChainId;
|
|
21
21
|
}
|
|
@@ -27,12 +27,12 @@ export interface IncoLiteAttestedComputeArgs {
|
|
|
27
27
|
*
|
|
28
28
|
* @todo Support multiple operations in a single request.
|
|
29
29
|
*/
|
|
30
|
-
export declare function attestedCompute<T extends SupportedFheType>({ lhsHandle, op, rhsPlaintext, backoffConfig, walletClient,
|
|
30
|
+
export declare function attestedCompute<T extends SupportedFheType>({ lhsHandle, op, rhsPlaintext, backoffConfig, walletClient, kmsQuorumClient, chainId, }: {
|
|
31
31
|
lhsHandle: HexString;
|
|
32
32
|
op: AttestedComputeOP;
|
|
33
33
|
rhsPlaintext: bigint | boolean;
|
|
34
34
|
backoffConfig?: Partial<BackoffConfig> | undefined;
|
|
35
35
|
walletClient: WalletClient<Transport, Chain, Account>;
|
|
36
|
-
|
|
36
|
+
kmsQuorumClient: KmsQuorumClient;
|
|
37
37
|
chainId: SupportedChainId;
|
|
38
38
|
}): Promise<DecryptionAttestation<EciesScheme, T>>;
|
|
@@ -6,16 +6,11 @@ const protobuf_1 = require("@bufbuild/protobuf");
|
|
|
6
6
|
const viem_1 = require("viem");
|
|
7
7
|
const attested_decrypt_js_1 = require("../attesteddecrypt/attested-decrypt.js");
|
|
8
8
|
const binary_js_1 = require("../binary.js");
|
|
9
|
-
const chain_js_1 = require("../chain.js");
|
|
10
|
-
const encryption_js_1 = require("../encryption/encryption.js");
|
|
11
9
|
const kms_service_pb_js_1 = require("../generated/es/inco/kms/lite/v1/kms_service_pb.js");
|
|
12
|
-
const handle_js_1 = require("../handle.js");
|
|
13
|
-
const client_js_1 = require("../kms/client.js");
|
|
14
10
|
const eip712_js_1 = require("../reencryption/eip712.js");
|
|
15
|
-
const retry_js_1 = require("../retry.js");
|
|
16
11
|
const types_js_1 = require("./types.js");
|
|
17
12
|
exports.ATTESTED_COMPUTE_DOMAIN_NAME = 'IncoAttestedCompute';
|
|
18
|
-
exports.ATTESTED_COMPUTE_DOMAIN_VERSION = '
|
|
13
|
+
exports.ATTESTED_COMPUTE_DOMAIN_VERSION = '1';
|
|
19
14
|
/**
|
|
20
15
|
* Creates an attested compute function that can decrypt handles with an attached attestation from the covalidator.
|
|
21
16
|
* @param args - The arguments for creating the attested compute function
|
|
@@ -24,10 +19,8 @@ exports.ATTESTED_COMPUTE_DOMAIN_VERSION = '0.1.0';
|
|
|
24
19
|
*
|
|
25
20
|
* @todo Support multiple operations in a single request.
|
|
26
21
|
*/
|
|
27
|
-
async function attestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, walletClient,
|
|
22
|
+
async function attestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, walletClient, kmsQuorumClient, chainId, }) {
|
|
28
23
|
try {
|
|
29
|
-
const kmsClient = (0, client_js_1.getKmsClient)(kmsConnectRpcEndpointOrClient ||
|
|
30
|
-
(0, client_js_1.defaultCovalidatorGrpc)((0, chain_js_1.getSupportedChain)(chainId)));
|
|
31
24
|
(0, attested_decrypt_js_1.validateHandle)(lhsHandle);
|
|
32
25
|
const rhsPlaintextBig = typeof rhsPlaintext === 'boolean'
|
|
33
26
|
? rhsPlaintext
|
|
@@ -66,31 +59,8 @@ async function attestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, wal
|
|
|
66
59
|
},
|
|
67
60
|
},
|
|
68
61
|
});
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
}, backoffConfig);
|
|
72
|
-
const decryptionAttestation = response.decryptionAttestation;
|
|
73
|
-
if (decryptionAttestation === undefined) {
|
|
74
|
-
throw new types_js_1.AttestedComputeError('No decryption attestation in response');
|
|
75
|
-
}
|
|
76
|
-
if (decryptionAttestation.value === undefined) {
|
|
77
|
-
throw new types_js_1.AttestedComputeError('No value in compute response');
|
|
78
|
-
}
|
|
79
|
-
if (decryptionAttestation.value.case !== 'plaintext') {
|
|
80
|
-
throw new types_js_1.AttestedComputeError(`Unexpected attestation type: ${decryptionAttestation.value.case}, expected 'plaintext'`);
|
|
81
|
-
}
|
|
82
|
-
const plaintext = decryptionAttestation.value.value;
|
|
83
|
-
const computeResultHandle = response.decryptionAttestation?.handle;
|
|
84
|
-
if (!computeResultHandle) {
|
|
85
|
-
throw new types_js_1.AttestedComputeError('No compute result handle in response');
|
|
86
|
-
}
|
|
87
|
-
const handleType = (0, handle_js_1.getHandleType)(computeResultHandle);
|
|
88
|
-
const bigIntValue = (0, binary_js_1.bytesToBigInt)(plaintext.value);
|
|
89
|
-
return {
|
|
90
|
-
handle: computeResultHandle,
|
|
91
|
-
plaintext: (0, encryption_js_1.bigintToPlaintext)(encryption_js_1.encryptionSchemes.ecies, handleType, bigIntValue),
|
|
92
|
-
covalidatorSignature: decryptionAttestation.signature,
|
|
93
|
-
};
|
|
62
|
+
let decryptionAttestation = await kmsQuorumClient.attestedCompute(attestedComputeRequest, backoffConfig);
|
|
63
|
+
return decryptionAttestation;
|
|
94
64
|
}
|
|
95
65
|
catch (error) {
|
|
96
66
|
if (error instanceof types_js_1.AttestedComputeError) {
|
|
@@ -99,4 +69,4 @@ async function attestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, wal
|
|
|
99
69
|
throw new types_js_1.AttestedComputeError('Failed to perform attested compute', error);
|
|
100
70
|
}
|
|
101
71
|
}
|
|
102
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
72
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYXR0ZXN0ZWQtY29tcHV0ZS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9hdHRlc3RlZGNvbXB1dGUvYXR0ZXN0ZWQtY29tcHV0ZS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOzs7QUF3Q0EsMENBNkVDO0FBckhELGlEQUE0QztBQUU1QywrQkFBa0M7QUFDbEMsZ0ZBQXdFO0FBRXhFLDRDQUEwRDtBQUcxRCwwRkFHNEQ7QUFFNUQseURBQWdFO0FBRWhFLHlDQUFxRTtBQUV4RCxRQUFBLDRCQUE0QixHQUFHLHFCQUFxQixDQUFDO0FBQ3JELFFBQUEsK0JBQStCLEdBQUcsR0FBRyxDQUFDO0FBY25EOzs7Ozs7O0dBT0c7QUFDSSxLQUFLLFVBQVUsZUFBZSxDQUE2QixFQUNoRSxTQUFTLEVBQ1QsRUFBRSxFQUNGLFlBQVksRUFDWixhQUFhLEVBQ2IsWUFBWSxFQUNaLGVBQWUsRUFDZixPQUFPLEdBU1I7SUFDQyxJQUFJLENBQUM7UUFDSCxJQUFBLG9DQUFjLEVBQUMsU0FBUyxDQUFDLENBQUM7UUFFMUIsTUFBTSxlQUFlLEdBQ25CLE9BQU8sWUFBWSxLQUFLLFNBQVM7WUFDL0IsQ0FBQyxDQUFDLFlBQVk7Z0JBQ1osQ0FBQyxDQUFDLEVBQUU7Z0JBQ0osQ0FBQyxDQUFDLEVBQUU7WUFDTixDQUFDLENBQUMsTUFBTSxDQUFDLFlBQVksQ0FBQyxDQUFDO1FBRTNCLHVEQUF1RDtRQUN2RCxNQUFNLGFBQWEsR0FBRyxJQUFBLCtCQUFtQixFQUFDO1lBQ3hDLE9BQU8sRUFBRSxNQUFNLENBQUMsT0FBTyxDQUFDO1lBQ3hCLFdBQVcsRUFBRSx3QkFBd0I7WUFDckMsaUJBQWlCLEVBQUU7Z0JBQ2pCLEVBQUUsSUFBSSxFQUFFLElBQUksRUFBRSxJQUFJLEVBQUUsT0FBTyxFQUFFO2dCQUM3QixFQUFFLElBQUksRUFBRSxXQUFXLEVBQUUsSUFBSSxFQUFFLFNBQVMsRUFBRTtnQkFDdEMsRUFBRSxJQUFJLEVBQUUsY0FBYyxFQUFFLElBQUksRUFBRSxTQUFTLEVBQUU7YUFDMUM7WUFDRCxPQUFPLEVBQUU7Z0JBQ1AsRUFBRSxFQUFFLEVBQUU7Z0JBQ04sU0FBUyxFQUFFLFNBQVM7Z0JBQ3BCLFlBQVksRUFBRSxJQUFBLDJCQUFlLEVBQUMsZUFBZSxDQUFDO2FBQy9DO1lBQ0QsVUFBVSxFQUFFLG9DQUE0QjtZQUN4QyxhQUFhLEVBQUUsdUNBQStCO1NBQy9DLENBQUMsQ0FBQztRQUVILDBCQUEwQjtRQUMxQixNQUFNLGVBQWUsR0FBRyxNQUFNLFlBQVksQ0FBQyxhQUFhLENBQUMsYUFBYSxDQUFDLENBQUM7UUFFeEUsTUFBTSxzQkFBc0IsR0FBMkIsSUFBQSxpQkFBTSxFQUMzRCxnREFBNEIsRUFDNUI7WUFDRSxXQUFXLEVBQUUsWUFBWSxDQUFDLE9BQU8sQ0FBQyxPQUFPO1lBQ3pDLEVBQUUsRUFBRSxFQUFFO1lBQ04sU0FBUyxFQUFFLFNBQVM7WUFDcEIsWUFBWSxFQUFFLGVBQWUsQ0FBQyxRQUFRLENBQUMsRUFBRSxDQUFDO1lBQzFDLGVBQWUsRUFBRSxJQUFBLGlCQUFVLEVBQUMsZUFBZSxDQUFDO1lBQzVDLFFBQVEsRUFBRTtnQkFDUixLQUFLLEVBQUU7b0JBQ0wsSUFBSSxFQUFFLHVCQUF1QjtvQkFDN0IsS0FBSyxFQUFFLEVBQUU7aUJBQ1Y7YUFDRjtTQUNGLENBQ0YsQ0FBQztRQUVGLElBQUkscUJBQXFCLEdBQUcsTUFBTSxlQUFlLENBQUMsZUFBZSxDQUMvRCxzQkFBc0IsRUFDdEIsYUFBYSxDQUNkLENBQUM7UUFFRixPQUFPLHFCQUE4RCxDQUFDO0lBQ3hFLENBQUM7SUFBQyxPQUFPLEtBQUssRUFBRSxDQUFDO1FBQ2YsSUFBSSxLQUFLLFlBQVksK0JBQW9CLEVBQUUsQ0FBQztZQUMxQyxNQUFNLEtBQUssQ0FBQztRQUNkLENBQUM7UUFDRCxNQUFNLElBQUksK0JBQW9CLENBQUMsb0NBQW9DLEVBQUUsS0FBSyxDQUFDLENBQUM7SUFDOUUsQ0FBQztBQUNILENBQUMifQ==
|