@inco/js 0.6.9 → 0.7.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -8
- package/dist/cjs/advancedacl/session-key.d.ts +39 -26
- package/dist/cjs/advancedacl/session-key.js +53 -136
- package/dist/cjs/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/cjs/attestedcompute/attested-compute.js +5 -35
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +36 -21
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +107 -108
- package/dist/cjs/attesteddecrypt/types.d.ts +4 -4
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +3 -4
- package/dist/cjs/generated/lightning.d.ts +40 -0
- package/dist/cjs/generated/lightning.js +43 -1
- package/dist/cjs/generated/local-node.d.ts +11 -7
- package/dist/cjs/generated/local-node.js +28 -8
- package/dist/cjs/kms/client.d.ts +8 -4
- package/dist/cjs/kms/client.js +9 -4
- package/dist/cjs/kms/quorumClient.d.ts +58 -0
- package/dist/cjs/kms/quorumClient.js +378 -0
- package/dist/cjs/kms/thresholdPromises.d.ts +7 -0
- package/dist/cjs/kms/thresholdPromises.js +52 -0
- package/dist/cjs/lite/ecies.d.ts +2 -0
- package/dist/cjs/lite/ecies.js +5 -2
- package/dist/cjs/lite/index.d.ts +0 -1
- package/dist/cjs/lite/index.js +1 -2
- package/dist/cjs/lite/lightning.d.ts +110 -74
- package/dist/cjs/lite/lightning.js +272 -127
- package/dist/cjs/local/local-node.d.ts +1 -2
- package/dist/cjs/local/local-node.js +2 -3
- package/dist/cjs/test/mocks.d.ts +3 -0
- package/dist/cjs/test/mocks.js +19 -1
- package/dist/cjs/viem.d.ts +2 -4
- package/dist/cjs/viem.js +6 -2
- package/dist/esm/advancedacl/session-key.d.ts +39 -26
- package/dist/esm/advancedacl/session-key.js +44 -126
- package/dist/esm/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/esm/attestedcompute/attested-compute.js +6 -36
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +36 -21
- package/dist/esm/attesteddecrypt/attested-decrypt.js +106 -108
- package/dist/esm/attesteddecrypt/types.d.ts +4 -4
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +2 -3
- package/dist/esm/generated/lightning.d.ts +40 -0
- package/dist/esm/generated/lightning.js +43 -1
- package/dist/esm/generated/local-node.d.ts +11 -7
- package/dist/esm/generated/local-node.js +28 -8
- package/dist/esm/kms/client.d.ts +8 -4
- package/dist/esm/kms/client.js +8 -4
- package/dist/esm/kms/quorumClient.d.ts +58 -0
- package/dist/esm/kms/quorumClient.js +374 -0
- package/dist/esm/kms/thresholdPromises.d.ts +7 -0
- package/dist/esm/kms/thresholdPromises.js +49 -0
- package/dist/esm/lite/ecies.d.ts +2 -0
- package/dist/esm/lite/ecies.js +4 -2
- package/dist/esm/lite/index.d.ts +0 -1
- package/dist/esm/lite/index.js +1 -2
- package/dist/esm/lite/lightning.d.ts +110 -74
- package/dist/esm/lite/lightning.js +276 -131
- package/dist/esm/local/local-node.d.ts +1 -2
- package/dist/esm/local/local-node.js +2 -3
- package/dist/esm/test/mocks.d.ts +3 -0
- package/dist/esm/test/mocks.js +17 -1
- package/dist/esm/viem.d.ts +2 -4
- package/dist/esm/viem.js +6 -2
- package/dist/types/advancedacl/session-key.d.ts +39 -26
- package/dist/types/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +36 -21
- package/dist/types/attesteddecrypt/types.d.ts +4 -4
- package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
- package/dist/types/generated/lightning.d.ts +40 -0
- package/dist/types/generated/local-node.d.ts +11 -7
- package/dist/types/kms/client.d.ts +8 -4
- package/dist/types/kms/quorumClient.d.ts +58 -0
- package/dist/types/kms/thresholdPromises.d.ts +7 -0
- package/dist/types/lite/ecies.d.ts +2 -0
- package/dist/types/lite/index.d.ts +0 -1
- package/dist/types/lite/lightning.d.ts +110 -74
- package/dist/types/local/local-node.d.ts +1 -2
- package/dist/types/test/mocks.d.ts +3 -0
- package/dist/types/viem.d.ts +2 -4
- package/package.json +6 -3
- package/dist/cjs/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/cjs/attestedreveal/attested-reveal.js +0 -69
- package/dist/cjs/attestedreveal/index.d.ts +0 -1
- package/dist/cjs/attestedreveal/index.js +0 -18
- package/dist/cjs/attestedreveal/types.d.ts +0 -7
- package/dist/cjs/attestedreveal/types.js +0 -16
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.js +0 -118
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.js +0 -136
- package/dist/cjs/lite/reencrypt.d.ts +0 -21
- package/dist/cjs/lite/reencrypt.js +0 -141
- package/dist/esm/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/esm/attestedreveal/attested-reveal.js +0 -66
- package/dist/esm/attestedreveal/index.d.ts +0 -1
- package/dist/esm/attestedreveal/index.js +0 -2
- package/dist/esm/attestedreveal/types.d.ts +0 -7
- package/dist/esm/attestedreveal/types.js +0 -12
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.js +0 -115
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.js +0 -133
- package/dist/esm/lite/reencrypt.d.ts +0 -21
- package/dist/esm/lite/reencrypt.js +0 -131
- package/dist/types/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/types/attestedreveal/index.d.ts +0 -1
- package/dist/types/attestedreveal/types.d.ts +0 -7
- package/dist/types/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/types/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/types/lite/reencrypt.d.ts +0 -21
|
@@ -1,10 +1,8 @@
|
|
|
1
|
-
import
|
|
2
|
-
import { getContract, hexToBytes, } from 'viem';
|
|
1
|
+
import { createPublicClient, getContract, hexToBytes, http, zeroAddress, } from 'viem';
|
|
3
2
|
import { baseSepolia } from 'viem/chains';
|
|
4
|
-
import { grantSessionKey, sessionKeyAttestedCompute, sessionKeyAttestedDecrypt,
|
|
5
|
-
import { attestedCompute } from '../attestedcompute/attested-compute.js';
|
|
3
|
+
import { grantSessionKey, sessionKeyAttestedCompute, sessionKeyAttestedDecrypt, updateActiveVouchersSessionNonce, } from '../advancedacl/session-key.js';
|
|
4
|
+
import { attestedCompute as performAttestedCompute } from '../attestedcompute/attested-compute.js';
|
|
6
5
|
import { attestedDecrypt } from '../attesteddecrypt/attested-decrypt.js';
|
|
7
|
-
import { attestedReveal } from '../attestedreveal/attested-reveal.js';
|
|
8
6
|
import { HexString, parseAddress } from '../binary.js';
|
|
9
7
|
import { encryptionSchemes, } from '../encryption/index.js';
|
|
10
8
|
import { incoLightningAbi } from '../generated/abis/lightning.js';
|
|
@@ -12,35 +10,56 @@ import { incoVerifierAbi } from '../generated/abis/verifier.js';
|
|
|
12
10
|
import { lightningDeployments } from '../generated/lightning.js';
|
|
13
11
|
import { localNodeLightningConfig } from '../generated/local-node.js';
|
|
14
12
|
import { handleTypes } from '../handle.js';
|
|
13
|
+
import { getViemChain } from '../index.js';
|
|
14
|
+
import { KmsQuorumClient } from '../kms/quorumClient.js';
|
|
15
15
|
import { parseLocalEnv } from '../local/index.js';
|
|
16
16
|
import { parse } from '../schema.js';
|
|
17
|
-
import { decodeSecp256k1PublicKey, generateSecp256k1Keypair, getEciesEncryptor, } from './ecies.js';
|
|
18
|
-
import { getKmsClient, incoLiteReencryptor } from './reencrypt.js';
|
|
17
|
+
import { decodeSecp256k1PublicKey, generateSecp256k1Keypair, getEciesEncryptor, TEST_ECIES_PUB_KEY, } from './ecies.js';
|
|
19
18
|
const DefaultPepper = 'testnet';
|
|
19
|
+
function isSecp256k1Keypair(value) {
|
|
20
|
+
return !!value && typeof value === 'object' && 'kp' in value;
|
|
21
|
+
}
|
|
22
|
+
function isLocalNodeEnvFileSource(value) {
|
|
23
|
+
return (!!value &&
|
|
24
|
+
typeof value === 'object' &&
|
|
25
|
+
'filePath' in value &&
|
|
26
|
+
typeof value.filePath === 'string');
|
|
27
|
+
}
|
|
20
28
|
/**
|
|
21
29
|
* The Lightning class provides a convenient way to interact with the Inco Lightning contract by binding to a specific
|
|
22
30
|
* deployment.
|
|
23
31
|
*/
|
|
24
32
|
export class Lightning {
|
|
25
33
|
_deployment;
|
|
26
|
-
|
|
34
|
+
covalidatorUrls;
|
|
35
|
+
signers;
|
|
36
|
+
threshold;
|
|
37
|
+
eciesPubKey;
|
|
27
38
|
executorAddress;
|
|
28
39
|
chainId;
|
|
29
40
|
ephemeralKeypair;
|
|
30
|
-
|
|
31
|
-
|
|
41
|
+
kmsQuorumClient;
|
|
42
|
+
encryptor;
|
|
43
|
+
constructor(_deployment, covalidatorUrls, signers, threshold, eciesPubKey) {
|
|
32
44
|
this._deployment = _deployment;
|
|
33
|
-
this.
|
|
45
|
+
this.covalidatorUrls = covalidatorUrls;
|
|
46
|
+
this.signers = signers;
|
|
47
|
+
this.threshold = threshold;
|
|
48
|
+
this.eciesPubKey = eciesPubKey;
|
|
34
49
|
this.executorAddress = parseAddress(_deployment.executorAddress);
|
|
35
50
|
this.chainId = BigInt(_deployment.chainId);
|
|
36
51
|
this.ephemeralKeypair = generateSecp256k1Keypair();
|
|
37
|
-
this.
|
|
52
|
+
this.encryptor = getEciesEncryptor({
|
|
53
|
+
pubKeyA: decodeSecp256k1PublicKey(hexToBytes(parse(HexString, this.eciesPubKey))),
|
|
54
|
+
privKeyB: this.ephemeralKeypair,
|
|
55
|
+
});
|
|
56
|
+
this.kmsQuorumClient = KmsQuorumClient.fromUrls(this.covalidatorUrls, this.signers, this.threshold);
|
|
38
57
|
}
|
|
39
58
|
/**
|
|
40
59
|
* Get a Lightning instance bound to the latest Lightning deployment for the Base Sepolia testnet.
|
|
41
60
|
*/
|
|
42
61
|
static async baseSepoliaTestnet() {
|
|
43
|
-
return
|
|
62
|
+
return Lightning.latest('testnet', baseSepolia.id);
|
|
44
63
|
}
|
|
45
64
|
/**
|
|
46
65
|
* Get a Lightning instance bound to our canonical Anvil-based test node and test Covalidator node
|
|
@@ -59,18 +78,33 @@ export class Lightning {
|
|
|
59
78
|
*/
|
|
60
79
|
static async localNode(env) {
|
|
61
80
|
if (!env) {
|
|
62
|
-
|
|
81
|
+
const config = localNodeLightningConfig[DefaultPepper];
|
|
82
|
+
return Lightning.custom({
|
|
83
|
+
...config,
|
|
84
|
+
covalidatorUrls: [...config.covalidatorUrls],
|
|
85
|
+
signers: config.signers.map((s) => parseAddress(s)),
|
|
86
|
+
});
|
|
63
87
|
}
|
|
64
88
|
if (typeof env === 'string') {
|
|
65
|
-
|
|
89
|
+
const config = localNodeLightningConfig[env];
|
|
90
|
+
return Lightning.custom({
|
|
91
|
+
...config,
|
|
92
|
+
covalidatorUrls: [...config.covalidatorUrls],
|
|
93
|
+
signers: config.signers.map((s) => parseAddress(s)),
|
|
94
|
+
});
|
|
66
95
|
}
|
|
67
96
|
const conf = localNodeLightningConfig[DefaultPepper];
|
|
68
|
-
return
|
|
97
|
+
return Lightning.custom({
|
|
69
98
|
// We assume that we always run a local node as the default anvil node
|
|
70
99
|
chainId: env.COVALIDATOR_HOST_CHAIN_ID
|
|
71
100
|
? Number(env.COVALIDATOR_HOST_CHAIN_ID)
|
|
72
101
|
: conf.chainId,
|
|
73
|
-
|
|
102
|
+
covalidatorUrls: env.COVALIDATOR_URL
|
|
103
|
+
? env.COVALIDATOR_URL.split(',')
|
|
104
|
+
: [...conf.covalidatorUrls],
|
|
105
|
+
signers: env.EIP712_SIGNER_ADDRESS
|
|
106
|
+
? env.EIP712_SIGNER_ADDRESS.split(',').map((address) => parseAddress(address))
|
|
107
|
+
: conf.signers.map((s) => parseAddress(s)),
|
|
74
108
|
hostChainRpcUrl: env.COVALIDATOR_HOST_CHAIN_RPC_URL ??
|
|
75
109
|
conf.hostChainRpcUrl ??
|
|
76
110
|
'http://localhost:8545',
|
|
@@ -84,9 +118,19 @@ export class Lightning {
|
|
|
84
118
|
*
|
|
85
119
|
* @param filePath the path to the file containing the environment variables in dotenv format
|
|
86
120
|
*/
|
|
87
|
-
static async localNodeFromEnv(
|
|
88
|
-
|
|
89
|
-
|
|
121
|
+
static async localNodeFromEnv(source) {
|
|
122
|
+
let envContent;
|
|
123
|
+
if (isLocalNodeEnvFileSource(source)) {
|
|
124
|
+
if (typeof process === 'undefined' || !process.versions?.node) {
|
|
125
|
+
throw new Error('Lightning.localNodeFromEnv with a file path is only available in Node environments.');
|
|
126
|
+
}
|
|
127
|
+
const { readFile } = await import('fs/promises');
|
|
128
|
+
envContent = await readFile(source.filePath);
|
|
129
|
+
}
|
|
130
|
+
else {
|
|
131
|
+
envContent = source;
|
|
132
|
+
}
|
|
133
|
+
const env = parseLocalEnv(envContent);
|
|
90
134
|
return await Lightning.localNode(env);
|
|
91
135
|
}
|
|
92
136
|
/**
|
|
@@ -102,7 +146,13 @@ export class Lightning {
|
|
|
102
146
|
if (!deployment) {
|
|
103
147
|
throw new Error(`No deployment found for ${JSON.stringify(id)}`);
|
|
104
148
|
}
|
|
105
|
-
|
|
149
|
+
const chain = getViemChain({ id: deployment.chainId });
|
|
150
|
+
const client = createPublicClient({
|
|
151
|
+
chain,
|
|
152
|
+
transport: http(),
|
|
153
|
+
});
|
|
154
|
+
const { threshold, signers, eciesPubKey } = await Lightning.getChainConfig(deployment, client);
|
|
155
|
+
return new Lightning(deployment, Lightning.getCovalidatorUrls(deployment, threshold), signers, threshold, eciesPubKey);
|
|
106
156
|
}
|
|
107
157
|
/**
|
|
108
158
|
* Get a Lightning deployment for a local or custom node
|
|
@@ -111,21 +161,13 @@ export class Lightning {
|
|
|
111
161
|
* additional fields past will be made available as part of the `deployment` property.
|
|
112
162
|
*/
|
|
113
163
|
static async custom(config) {
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
abi: incoLightningAbi,
|
|
119
|
-
address: executorAddress,
|
|
120
|
-
client,
|
|
121
|
-
});
|
|
122
|
-
const incoVerifierAddress = await incoLightningContract.read.incoVerifier();
|
|
123
|
-
const incoVerifier = getContract({
|
|
124
|
-
abi: incoVerifierAbi,
|
|
125
|
-
address: incoVerifierAddress,
|
|
126
|
-
client,
|
|
164
|
+
const chain = getViemChain({ id: config.chainId });
|
|
165
|
+
const client = createPublicClient({
|
|
166
|
+
chain,
|
|
167
|
+
transport: config.hostChainRpcUrl ? http(config.hostChainRpcUrl) : http(),
|
|
127
168
|
});
|
|
128
|
-
|
|
169
|
+
const { threshold, signers, eciesPubKey } = await Lightning.getVerifierContractDetails(config.executorAddress, client);
|
|
170
|
+
return new Lightning(config, config.covalidatorUrls, signers, threshold, eciesPubKey);
|
|
129
171
|
}
|
|
130
172
|
/**
|
|
131
173
|
* Get the latest deployment for a given pepper, which usually denotes a family of deployments distinct from their
|
|
@@ -150,10 +192,10 @@ export class Lightning {
|
|
|
150
192
|
* will not be compatible with the new version.
|
|
151
193
|
*
|
|
152
194
|
* @param pepper the pepper to use to filter the deployments
|
|
153
|
-
* @param
|
|
195
|
+
* @param chain the chain to use to filter the deployments
|
|
154
196
|
*/
|
|
155
197
|
static async latest(pepper, chainId) {
|
|
156
|
-
return
|
|
198
|
+
return Lightning.at(Lightning.latestDeployment(pepper, chainId));
|
|
157
199
|
}
|
|
158
200
|
/*
|
|
159
201
|
* Get the latest deployment for a given pepper, which usually denotes a family of deployments distinct from their
|
|
@@ -168,10 +210,15 @@ export class Lightning {
|
|
|
168
210
|
* @param value a boolean or numeric value to encrypt
|
|
169
211
|
* @param accountAddress the address of the account interacting with the dapp contract, normally an Externally Owned Account (EOA)
|
|
170
212
|
* @param dappAddress the address of the dapp contract that interacts with the Inco Lightning contract or library
|
|
213
|
+
* @param handleType (optional) the handle type to be used for encrypting the value - this is required in case of non-default handle types
|
|
214
|
+
* default handle types:
|
|
215
|
+
* - boolean -> handleTypes.ebool
|
|
216
|
+
* - number | bigint -> handleTypes.euint256
|
|
217
|
+
* @returns a promise that resolves to the encrypted value as a HexString
|
|
171
218
|
*/
|
|
172
|
-
async encrypt(value, { accountAddress, dappAddress }
|
|
173
|
-
const { ciphertext } = await encryptor({
|
|
174
|
-
plaintext: Lightning.plaintextFromValue(value),
|
|
219
|
+
async encrypt(value, { accountAddress, dappAddress, handleType }) {
|
|
220
|
+
const { ciphertext } = await this.encryptor({
|
|
221
|
+
plaintext: Lightning.plaintextFromValue(value, handleType),
|
|
175
222
|
context: {
|
|
176
223
|
hostChainId: this.chainId,
|
|
177
224
|
aclAddress: this.executorAddress,
|
|
@@ -181,27 +228,6 @@ export class Lightning {
|
|
|
181
228
|
});
|
|
182
229
|
return ciphertext.value;
|
|
183
230
|
}
|
|
184
|
-
/**
|
|
185
|
-
* Obtain a reencryptor for a particular Externally Owned Account (EOA) to request decrypted values.
|
|
186
|
-
* The account associated with the walletClient must have permissions to decrypt the handle or ciphertext passed
|
|
187
|
-
* to the reencryptor function.
|
|
188
|
-
*
|
|
189
|
-
* @param walletClient the wallet client to use for signing the reencrypt request.
|
|
190
|
-
*/
|
|
191
|
-
getReencryptor(walletClient) {
|
|
192
|
-
return incoLiteReencryptor({
|
|
193
|
-
walletClient,
|
|
194
|
-
kmsConnectRpcEndpointOrClient: this.kmsClient,
|
|
195
|
-
chainId: this.chainId,
|
|
196
|
-
ephemeralKeypair: this.ephemeralKeypair,
|
|
197
|
-
});
|
|
198
|
-
}
|
|
199
|
-
getEncryptor(eciesPubkey) {
|
|
200
|
-
return getEciesEncryptor({
|
|
201
|
-
pubKeyA: decodeSecp256k1PublicKey(hexToBytes(parse(HexString, eciesPubkey))),
|
|
202
|
-
privKeyB: this.ephemeralKeypair,
|
|
203
|
-
});
|
|
204
|
-
}
|
|
205
231
|
/**
|
|
206
232
|
* Grants a session key allowance voucher for secure reencryption operations.
|
|
207
233
|
*
|
|
@@ -235,31 +261,6 @@ export class Lightning {
|
|
|
235
261
|
expiresAt,
|
|
236
262
|
});
|
|
237
263
|
}
|
|
238
|
-
/**
|
|
239
|
-
* Creates a session key reencryptor for secure data reencryption operations.
|
|
240
|
-
*
|
|
241
|
-
* This method returns a reencryptor instance that can be used to perform reencryption
|
|
242
|
-
* operations using session keys. The reencryptor is configured with the provided
|
|
243
|
-
* allowance voucher and ephemeral keypair for secure communication.
|
|
244
|
-
*
|
|
245
|
-
* @param allowanceVoucherWithSig - The signed allowance voucher obtained from grantSessionKeyAllowanceVoucher
|
|
246
|
-
* @param ephemeralKeypair - The ephemeral keypair used for secure communication with the KMS make sure it has allowance to voucher
|
|
247
|
-
* @returns A reencryptor instance configured for session key operations
|
|
248
|
-
*
|
|
249
|
-
* @example
|
|
250
|
-
* ```typescript
|
|
251
|
-
* const reencryptor = await lightning.getSessionKeyRencryptor(voucher, ephemeralKeypair);
|
|
252
|
-
* const decryptedValue = await reencryptor({handle: resultHandle});
|
|
253
|
-
* ```
|
|
254
|
-
*/
|
|
255
|
-
getSessionKeyRencryptor(allowanceVoucherWithSig, ephemeralKeypair) {
|
|
256
|
-
return sessionKeyReencryptor({
|
|
257
|
-
chainId: this.chainId,
|
|
258
|
-
kmsConnectRpcEndpointOrClient: this.kmsClient,
|
|
259
|
-
ephemeralKeypair,
|
|
260
|
-
allowanceVoucherWithSig,
|
|
261
|
-
});
|
|
262
|
-
}
|
|
263
264
|
/**
|
|
264
265
|
* Updates the active session nonce for the given wallet client.
|
|
265
266
|
*
|
|
@@ -272,62 +273,142 @@ export class Lightning {
|
|
|
272
273
|
updateActiveVouchersSessionNonce(walletClient) {
|
|
273
274
|
return updateActiveVouchersSessionNonce(this.executorAddress, walletClient);
|
|
274
275
|
}
|
|
275
|
-
attestedDecrypt(
|
|
276
|
-
if (
|
|
277
|
-
const
|
|
278
|
-
|
|
279
|
-
|
|
276
|
+
attestedDecrypt(walletClient, handles, arg3, arg4, arg5) {
|
|
277
|
+
if (arg3 instanceof Uint8Array) {
|
|
278
|
+
const reencryptPubKey = arg3;
|
|
279
|
+
let reencryptKeypair;
|
|
280
|
+
let backoffConfig;
|
|
281
|
+
if (arg4 && isSecp256k1Keypair(arg4)) {
|
|
282
|
+
reencryptKeypair = arg4;
|
|
283
|
+
backoffConfig = arg5;
|
|
284
|
+
}
|
|
285
|
+
else {
|
|
286
|
+
backoffConfig = arg4;
|
|
287
|
+
}
|
|
288
|
+
if (reencryptKeypair) {
|
|
289
|
+
return attestedDecrypt({
|
|
290
|
+
handles,
|
|
291
|
+
backoffConfig,
|
|
292
|
+
chainId: Number(this.chainId),
|
|
293
|
+
walletClient,
|
|
294
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
295
|
+
reencryptPubKey,
|
|
296
|
+
reencryptKeypair,
|
|
297
|
+
});
|
|
298
|
+
}
|
|
280
299
|
return attestedDecrypt({
|
|
281
300
|
handles,
|
|
282
301
|
backoffConfig,
|
|
283
302
|
chainId: Number(this.chainId),
|
|
284
303
|
walletClient,
|
|
285
|
-
|
|
304
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
305
|
+
reencryptPubKey,
|
|
286
306
|
});
|
|
287
307
|
}
|
|
288
|
-
|
|
289
|
-
|
|
290
|
-
|
|
291
|
-
|
|
292
|
-
|
|
308
|
+
const backoffConfig = arg3;
|
|
309
|
+
return attestedDecrypt({
|
|
310
|
+
handles,
|
|
311
|
+
backoffConfig,
|
|
312
|
+
chainId: Number(this.chainId),
|
|
313
|
+
walletClient,
|
|
314
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
315
|
+
});
|
|
316
|
+
}
|
|
317
|
+
attestedDecryptWithVoucher(ephemeralKeypair, allowanceVoucherWithSig, handles, arg4, arg5, arg6) {
|
|
318
|
+
if (arg4 instanceof Uint8Array) {
|
|
319
|
+
const reencryptPubKey = arg4;
|
|
320
|
+
let reencryptKeypair;
|
|
321
|
+
let backoffConfig;
|
|
322
|
+
if (arg5 && isSecp256k1Keypair(arg5)) {
|
|
323
|
+
reencryptKeypair = arg5;
|
|
324
|
+
backoffConfig = arg6;
|
|
325
|
+
}
|
|
326
|
+
else {
|
|
327
|
+
backoffConfig = arg5;
|
|
328
|
+
}
|
|
329
|
+
if (reencryptKeypair) {
|
|
330
|
+
return sessionKeyAttestedDecrypt({
|
|
331
|
+
backoffConfig,
|
|
332
|
+
chainId: Number(this.chainId),
|
|
333
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
334
|
+
ephemeralKeypair,
|
|
335
|
+
allowanceVoucherWithSig,
|
|
336
|
+
handles,
|
|
337
|
+
reencryptPubKey,
|
|
338
|
+
reencryptKeypair,
|
|
339
|
+
});
|
|
340
|
+
}
|
|
293
341
|
return sessionKeyAttestedDecrypt({
|
|
294
342
|
backoffConfig,
|
|
295
343
|
chainId: Number(this.chainId),
|
|
296
|
-
|
|
344
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
297
345
|
ephemeralKeypair,
|
|
298
346
|
allowanceVoucherWithSig,
|
|
299
347
|
handles,
|
|
348
|
+
reencryptPubKey,
|
|
300
349
|
});
|
|
301
350
|
}
|
|
351
|
+
const backoffConfig = arg4;
|
|
352
|
+
return sessionKeyAttestedDecrypt({
|
|
353
|
+
backoffConfig,
|
|
354
|
+
chainId: Number(this.chainId),
|
|
355
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
356
|
+
ephemeralKeypair,
|
|
357
|
+
allowanceVoucherWithSig,
|
|
358
|
+
handles,
|
|
359
|
+
});
|
|
302
360
|
}
|
|
303
|
-
|
|
304
|
-
|
|
305
|
-
|
|
306
|
-
|
|
307
|
-
|
|
308
|
-
|
|
309
|
-
|
|
310
|
-
|
|
311
|
-
|
|
312
|
-
|
|
313
|
-
|
|
314
|
-
|
|
315
|
-
|
|
316
|
-
|
|
317
|
-
|
|
318
|
-
|
|
319
|
-
|
|
320
|
-
|
|
321
|
-
|
|
322
|
-
|
|
323
|
-
|
|
324
|
-
|
|
325
|
-
const walletClient = arg1;
|
|
326
|
-
const backoffConfig = arg5;
|
|
327
|
-
return attestedCompute({
|
|
361
|
+
/**
|
|
362
|
+
* Get an attested compute for the given wallet client.
|
|
363
|
+
*
|
|
364
|
+
* @param walletClient - The wallet client used for signing the attested compute request
|
|
365
|
+
* @param lhsHandle - The handle to compute
|
|
366
|
+
* @param op - The operation to perform
|
|
367
|
+
* @param rhsPlaintext - The plaintext to compute with
|
|
368
|
+
* @param backoffConfig - The backoff configuration for the attested compute request
|
|
369
|
+
* @returns The decryption attestation
|
|
370
|
+
*
|
|
371
|
+
* @example
|
|
372
|
+
* ```typescript
|
|
373
|
+
* import { AttestedComputeSupportedOps } from '../lite/attested-compute.js';
|
|
374
|
+
* const lhsHandle = '0x...';
|
|
375
|
+
* const rhsPlaintext = 1337n;
|
|
376
|
+
* const op = AttestedComputeSupportedOps.Eq;
|
|
377
|
+
* const response = await lightning.attestedCompute(walletClient, lhsHandle, op, rhsPlaintext);
|
|
378
|
+
* const { plaintext, covalidatorSignature, handle } = response;
|
|
379
|
+
* ```
|
|
380
|
+
*/
|
|
381
|
+
attestedCompute(walletClient, lhsHandle, op, rhsPlaintext, backoffConfig) {
|
|
382
|
+
return performAttestedCompute({
|
|
328
383
|
walletClient,
|
|
329
|
-
|
|
384
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
385
|
+
chainId: Number(this.chainId),
|
|
386
|
+
lhsHandle,
|
|
387
|
+
op,
|
|
388
|
+
rhsPlaintext,
|
|
389
|
+
backoffConfig,
|
|
390
|
+
});
|
|
391
|
+
}
|
|
392
|
+
/**
|
|
393
|
+
* Performs attested compute via a voucher-backed session key.
|
|
394
|
+
*
|
|
395
|
+
* @example
|
|
396
|
+
* ```ts
|
|
397
|
+
* const attestation = await lightning.attestedComputeWithVoucher(
|
|
398
|
+
* ephemeralKeypair,
|
|
399
|
+
* voucher,
|
|
400
|
+
* lhsHandle,
|
|
401
|
+
* AttestedComputeSupportedOps.Eq,
|
|
402
|
+
* true,
|
|
403
|
+
* );
|
|
404
|
+
* ```
|
|
405
|
+
*/
|
|
406
|
+
attestedComputeWithVoucher(ephemeralKeypair, allowanceVoucherWithSig, lhsHandle, op, rhsPlaintext, backoffConfig) {
|
|
407
|
+
return sessionKeyAttestedCompute({
|
|
330
408
|
chainId: Number(this.chainId),
|
|
409
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
410
|
+
ephemeralKeypair,
|
|
411
|
+
allowanceVoucherWithSig,
|
|
331
412
|
lhsHandle,
|
|
332
413
|
op,
|
|
333
414
|
rhsPlaintext,
|
|
@@ -348,24 +429,24 @@ export class Lightning {
|
|
|
348
429
|
* ```
|
|
349
430
|
*/
|
|
350
431
|
attestedReveal(handles, backoffConfig) {
|
|
351
|
-
return
|
|
432
|
+
return attestedDecrypt({
|
|
352
433
|
handles,
|
|
353
434
|
backoffConfig,
|
|
354
435
|
chainId: Number(this.chainId),
|
|
355
|
-
|
|
436
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
356
437
|
});
|
|
357
438
|
}
|
|
358
439
|
/**
|
|
359
440
|
* Get the GRPC endpoint for the covalidator that services this deployment.
|
|
360
441
|
*/
|
|
361
|
-
static
|
|
442
|
+
static getCovalidatorUrls(deployment, threshold) {
|
|
362
443
|
const { executorAddress, chainId, pepper } = deployment;
|
|
363
|
-
return `https://${executorAddress.toLowerCase()}.${chainId}.${pepper}.inco.org
|
|
444
|
+
return Array.from({ length: threshold }, (_, i) => `https://${executorAddress.toLowerCase()}.${chainId}.${pepper}.${i + 1}.inco.org`);
|
|
364
445
|
}
|
|
365
446
|
static isIdByName(id) {
|
|
366
447
|
return id.name !== undefined;
|
|
367
448
|
}
|
|
368
|
-
static plaintextFromValue(value) {
|
|
449
|
+
static plaintextFromValue(value, type) {
|
|
369
450
|
if (typeof value === 'boolean') {
|
|
370
451
|
return {
|
|
371
452
|
scheme: encryptionSchemes.ecies,
|
|
@@ -376,7 +457,7 @@ export class Lightning {
|
|
|
376
457
|
else if (typeof value === 'bigint' || typeof value === 'number') {
|
|
377
458
|
return {
|
|
378
459
|
scheme: encryptionSchemes.ecies,
|
|
379
|
-
type: handleTypes.euint256,
|
|
460
|
+
type: type ?? handleTypes.euint256,
|
|
380
461
|
value: BigInt(value),
|
|
381
462
|
};
|
|
382
463
|
}
|
|
@@ -384,5 +465,69 @@ export class Lightning {
|
|
|
384
465
|
throw new Error(`Unsupported type ${typeof value}`);
|
|
385
466
|
}
|
|
386
467
|
}
|
|
468
|
+
static async getEciesPublicKey(client, executorAddress) {
|
|
469
|
+
const incoVerifier = await Lightning.getIncoVerifierContract(client, executorAddress);
|
|
470
|
+
return await incoVerifier.read.eciesPubkey();
|
|
471
|
+
}
|
|
472
|
+
static async getIncoVerifierContract(client, executorAddress) {
|
|
473
|
+
const incoLightningContract = getContract({
|
|
474
|
+
abi: incoLightningAbi,
|
|
475
|
+
address: executorAddress,
|
|
476
|
+
client,
|
|
477
|
+
});
|
|
478
|
+
const incoVerifierAddress = await incoLightningContract.read.incoVerifier();
|
|
479
|
+
const incoVerifier = getContract({
|
|
480
|
+
abi: incoVerifierAbi,
|
|
481
|
+
address: incoVerifierAddress,
|
|
482
|
+
client,
|
|
483
|
+
});
|
|
484
|
+
console.log('inco executor', incoLightningContract.address);
|
|
485
|
+
console.log('inco verifier', incoVerifier.address);
|
|
486
|
+
return incoVerifier;
|
|
487
|
+
}
|
|
488
|
+
/**
|
|
489
|
+
* Retrieves the verifier contract details including threshold, signers, and ECIES public key from the Inco Verifier contract.
|
|
490
|
+
*
|
|
491
|
+
* @param executorAddress The address of the Inco Lightning executor contract.
|
|
492
|
+
* @param client The public client to interact with the blockchain.
|
|
493
|
+
* @returns An object containing the threshold, signers, and ECIES public key.
|
|
494
|
+
*/
|
|
495
|
+
static async getVerifierContractDetails(executorAddress, client) {
|
|
496
|
+
const incoVerifier = await Lightning.getIncoVerifierContract(client, executorAddress);
|
|
497
|
+
const threshold = await incoVerifier.read.getThreshold();
|
|
498
|
+
const eciesPubKey = await incoVerifier.read.eciesPubkey();
|
|
499
|
+
const signersCount = await incoVerifier.read.getSignersCount();
|
|
500
|
+
const signersPromises = [];
|
|
501
|
+
for (let i = BigInt(0); i < signersCount; i++) {
|
|
502
|
+
signersPromises.push(incoVerifier.read.getSignerAtIndex([i]));
|
|
503
|
+
}
|
|
504
|
+
const signers = await Promise.all(signersPromises);
|
|
505
|
+
return {
|
|
506
|
+
threshold: Number(threshold),
|
|
507
|
+
signers: signers.map(parseAddress),
|
|
508
|
+
eciesPubKey,
|
|
509
|
+
};
|
|
510
|
+
}
|
|
511
|
+
static async getChainConfig(deployment, client) {
|
|
512
|
+
if (this.supportsThresholdRetrieval(deployment)) {
|
|
513
|
+
return await this.getVerifierContractDetails(deployment.executorAddress, client);
|
|
514
|
+
}
|
|
515
|
+
return this.getDefaultThresholdAndSigners();
|
|
516
|
+
}
|
|
517
|
+
// Check if the deployment supports threshold retrieval based on its version
|
|
518
|
+
static supportsThresholdRetrieval(deployment) {
|
|
519
|
+
// Assumes that the threshold retrieval is supported if the smart contract / deployment version is greater than or equal to 1.1.0
|
|
520
|
+
return deployment.version?.major >= 1 && deployment.version?.minor >= 1;
|
|
521
|
+
}
|
|
522
|
+
// NOTE: we are proceeding with lot's of state braking changes and the defaults below can be removed
|
|
523
|
+
// once all deployments support threshold. signers and ecies pub key retrieval
|
|
524
|
+
// For now this is added to ensure that the tests that we have using previous deployments continue to work
|
|
525
|
+
static getDefaultThresholdAndSigners() {
|
|
526
|
+
return {
|
|
527
|
+
threshold: 1,
|
|
528
|
+
signers: [zeroAddress],
|
|
529
|
+
eciesPubKey: TEST_ECIES_PUB_KEY,
|
|
530
|
+
};
|
|
531
|
+
}
|
|
387
532
|
}
|
|
388
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/lite/lightning.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,MAAM,aAAa,CAAC;AAClC,OAAO,EAGL,WAAW,EACX,UAAU,GAIX,MAAM,MAAM,CAAC;AACd,OAAO,EAAE,WAAW,EAAE,MAAM,aAAa,CAAC;AAC1C,OAAO,EACL,eAAe,EACf,yBAAyB,EACzB,yBAAyB,EACzB,qBAAqB,EACrB,gCAAgC,GACjC,MAAM,+BAA+B,CAAC;AAEvC,OAAO,EAAE,eAAe,EAAE,MAAM,wCAAwC,CAAC;AAEzE,OAAO,EAAE,eAAe,EAAE,MAAM,wCAAwC,CAAC;AAEzE,OAAO,EAAE,cAAc,EAAE,MAAM,sCAAsC,CAAC;AACtE,OAAO,EAAW,SAAS,EAAE,YAAY,EAAE,MAAM,cAAc,CAAC;AAEhE,OAAO,EAEL,iBAAiB,GAIlB,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,gBAAgB,EAAE,MAAM,gCAAgC,CAAC;AAClE,OAAO,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AAEhE,OAAO,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAC;AACjE,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAE,WAAW,EAAE,MAAM,cAAc,CAAC;AAC3C,OAAO,EAAgB,aAAa,EAAE,MAAM,mBAAmB,CAAC;AAGhE,OAAO,EAAE,KAAK,EAAE,MAAM,cAAc,CAAC;AACrC,OAAO,EACL,wBAAwB,EACxB,wBAAwB,EACxB,iBAAiB,GAElB,MAAM,YAAY,CAAC;AACpB,OAAO,EAAE,YAAY,EAAE,mBAAmB,EAAE,MAAM,gBAAgB,CAAC;AA6BnE,MAAM,aAAa,GAAoB,SAAS,CAAC;AAyBjD;;;GAGG;AACH,MAAM,OAAO,SAAS;IAQD;IACD;IARF,eAAe,CAAU;IACzB,OAAO,CAAS;IAEf,gBAAgB,CAAmB;IACnC,SAAS,CAA4B;IAEtD,YACmB,WAAc,EACf,cAAsB;QADrB,gBAAW,GAAX,WAAW,CAAG;QACf,mBAAc,GAAd,cAAc,CAAQ;QAEtC,IAAI,CAAC,eAAe,GAAG,YAAY,CAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACjE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE3C,IAAI,CAAC,gBAAgB,GAAG,wBAAwB,EAAE,CAAC;QACnD,IAAI,CAAC,SAAS,GAAG,YAAY,CAAC,cAAc,CAAC,CAAC;IAChD,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,kBAAkB;QAC7B,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE,CAAC,CAAC;IAC3D,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,KAAK,CAAC,SAAS,CACpB,GAAoC;QAEpC,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC,wBAAwB,CAAC,aAAa,CAAC,CAAC,CAAC;QACzE,CAAC;QACD,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC,wBAAwB,CAAC,GAAG,CAAC,CAAC,CAAC;QAC/D,CAAC;QACD,MAAM,IAAI,GAAG,wBAAwB,CAAC,aAAa,CAAC,CAAC;QACrD,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC;YAC5B,sEAAsE;YACtE,OAAO,EAAE,GAAG,CAAC,yBAAyB;gBACpC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,yBAAyB,CAAC;gBACvC,CAAC,CAAC,IAAI,CAAC,OAAO;YAChB,cAAc,EAAE,GAAG,CAAC,eAAe,IAAI,IAAI,CAAC,cAAc;YAC1D,eAAe,EACb,GAAG,CAAC,8BAA8B;gBAClC,IAAI,CAAC,eAAe;gBACpB,uBAAuB;YACzB,uCAAuC;YACvC,eAAe,EAAE,GAAG,CAAC,gBAAgB;YACrC,gBAAgB,EAAE,GAAG,CAAC,kBAAkB;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAC3B,QAAiB;QAEjB,MAAM,GAAG,GAAG,QAAQ,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAC/D,MAAM,GAAG,GAAG,aAAa,CAAC,GAAG,CAAC,CAAC;QAC/B,OAAO,MAAM,SAAS,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,EAAgB;QAC9B,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,CAAC,CAAC,oBAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,EAAE,CAAC,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CACtD;YACH,CAAC,CAAC,oBAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,eAAe,KAAK,EAAE,CAAC,eAAe;gBACxC,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAC3B,CAAC;QACN,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,2BAA2B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;QACnE,CAAC;QAED,OAAO,IAAI,SAAS,CAAC,UAAU,EAAE,SAAS,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC,CAAC;IAC5E,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS;QAET,OAAO,IAAI,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,cAAc,CAAC,CAAC;IACtD,CAAC;IAED,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAC5B,MAAoB,EACpB,eAAwB;QAExB,MAAM,qBAAqB,GAAG,WAAW,CAAC;YACxC,GAAG,EAAE,gBAAgB;YACrB,OAAO,EAAE,eAA0B;YACnC,MAAM;SACP,CAAC,CAAC;QACH,MAAM,mBAAmB,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QAC5E,MAAM,YAAY,GAAG,WAAW,CAAC;YAC/B,GAAG,EAAE,eAAe;YACpB,OAAO,EAAE,mBAA8B;YACvC,MAAM;SACP,CAAC,CAAC;QACH,OAAO,MAAM,YAAY,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;IAC/C,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,gBAAgB,CACrB,MAAS,EACT,OAAgB;QAEhB,sEAAsE;QACtE,MAAM,cAAc,GAAG,oBAAoB,CAAC,IAAI,CAC9C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,IAAI,CAAC,CAAC,OAAO,KAAK,OAAO,CACpD,CAAC;QACF,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,4GAA4G;YAC5G,wBAAwB;YACxB,MAAM,IAAI,KAAK,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;QACD,OAAO,cAAc,CAAC;IACxB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS,EACT,OAAgB;QAEhB,OAAO,MAAM,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IACzE,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,EAAE,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CACX,KAAQ,EACR,EAAE,cAAc,EAAE,WAAW,EAAqB,EAClD,SAAiC;QAEjC,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,SAAS,CAAC;YACrC,SAAS,EAAE,SAAS,CAAC,kBAAkB,CAAC,KAAK,CAAC;YAC9C,OAAO,EAAE;gBACP,WAAW,EAAE,IAAI,CAAC,OAAO;gBACzB,UAAU,EAAE,IAAI,CAAC,eAAe;gBAChC,WAAW,EAAE,YAAY,CAAC,cAAc,CAAC;gBACzC,eAAe,EAAE,YAAY,CAAC,WAAW,CAAC;aAC3C;SACF,CAAC,CAAC;QACH,OAAO,UAAU,CAAC,KAAK,CAAC;IAC1B,CAAC;IAED;;;;;;OAMG;IACH,cAAc,CACZ,YAAqD;QAErD,OAAO,mBAAmB,CAAC;YACzB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;SACxC,CAAC,CAAC;IACL,CAAC;IAED,YAAY,CAAC,WAAsB;QACjC,OAAO,iBAAiB,CAAC;YACvB,OAAO,EAAE,wBAAwB,CAC/B,UAAU,CAAC,KAAK,CAAC,SAAS,EAAE,WAAW,CAAC,CAAC,CAC1C;YACD,QAAQ,EAAE,IAAI,CAAC,gBAAgB;SAChC,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACH,+BAA+B,CAC7B,YAAqD,EACrD,cAAsB,EACtB,SAAe,EACf,sBAA8B;QAE9B,OAAO,eAAe,CAAC;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,8BAA8B,EAAE,YAAY,CAAC,sBAAsB,CAAC;YACpE,cAAc,EAAE,YAAY,CAAC,cAAc,CAAC;YAC5C,kBAAkB,EAAE,YAAY;YAChC,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACH,uBAAuB,CACrB,uBAAgD,EAChD,gBAAkC;QAElC,OAAO,qBAAqB,CAAC;YAC3B,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,gBAAgB;YAChB,uBAAuB;SACxB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;OAQG;IACH,gCAAgC,CAC9B,YAAqD;QAErD,OAAO,gCAAgC,CAAC,IAAI,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IAC9E,CAAC;IA2CD,eAAe,CACb,IAAgE,EAChE,IAA2C,EAC3C,IAA2C,EAC3C,IAA6B;QAE7B,IAAI,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;YACxB,MAAM,YAAY,GAAG,IAA+C,CAAC;YACrE,MAAM,OAAO,GAAG,IAAmB,CAAC;YACpC,MAAM,aAAa,GAAG,IAA0C,CAAC;YACjE,OAAO,eAAe,CAAC;gBACrB,OAAO;gBACP,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,YAAY;gBACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;aAC9C,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,MAAM,gBAAgB,GAAG,IAAwB,CAAC;YAClD,MAAM,uBAAuB,GAAG,IAA+B,CAAC;YAChE,MAAM,OAAO,GAAG,IAAmB,CAAC;YACpC,MAAM,aAAa,GAAG,IAA0C,CAAC;YACjE,OAAO,yBAAyB,CAAC;gBAC/B,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;gBAC7C,gBAAgB;gBAChB,uBAAuB;gBACvB,OAAO;aACR,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAuDD,eAAe,CACb,IAAgE,EAChE,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,IAAuD,EACvD,IAA6B;QAE7B,IACE,OAAO,IAAI,KAAK,QAAQ;YACxB,IAAI,KAAK,IAAI;YACb,SAAS,IAAI,IAAI;YACjB,kBAAkB,IAAI,IAAI;YAC1B,QAAQ,IAAI,IAAI,EAChB,CAAC;YACD,mBAAmB;YACnB,MAAM,gBAAgB,GAAG,IAAwB,CAAC;YAClD,MAAM,uBAAuB,GAAG,IAA+B,CAAC;YAChE,MAAM,aAAa,GAAG,IAAI,CAAC;YAC3B,OAAO,yBAAyB,CAAC;gBAC/B,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;gBAC7C,gBAAgB;gBAChB,uBAAuB;gBACvB,SAAS;gBACT,EAAE;gBACF,YAAY;gBACZ,aAAa;aACd,CAAC,CAAC;QACL,CAAC;QAED,qBAAqB;QACrB,MAAM,YAAY,GAAG,IAA+C,CAAC;QACrE,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,eAAe,CAAC;YACrB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;OAYG;IACH,cAAc,CACZ,OAAoB,EACpB,aAAsC;QAEtC,OAAO,cAAc,CAAC;YACpB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;SAC9C,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,iBAAiB,CAC7B,UAAgD;QAEhD,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,UAAU,CAAC;QACxD,OAAO,WAAW,eAAe,CAAC,WAAW,EAAE,IAAI,OAAO,IAAI,MAAM,WAAW,CAAC;IAClF,CAAC;IAEO,MAAM,CAAC,UAAU,CAAC,EAAgB;QACxC,OAAQ,EAAuB,CAAC,IAAI,KAAK,SAAS,CAAC;IACrD,CAAC;IAEO,MAAM,CAAC,kBAAkB,CAC/B,KAAQ;QAER,IAAI,OAAO,KAAK,KAAK,SAAS,EAAE,CAAC;YAC/B,OAAO;gBACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,WAAW,CAAC,KAAK;gBACvB,KAAK,EAAE,KAAK;aACsC,CAAC;QACvD,CAAC;aAAM,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAClE,OAAO;gBACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,WAAW,CAAC,QAAQ;gBAC1B,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC;aAC8B,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oBAAoB,OAAO,KAAK,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;CACF"}
|
|
533
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/lite/lightning.ts"],"names":[],"mappings":"AAAA,OAAO,EAGL,kBAAkB,EAClB,WAAW,EAEX,UAAU,EACV,IAAI,EAIJ,WAAW,GACZ,MAAM,MAAM,CAAC;AACd,OAAO,EAAE,WAAW,EAAE,MAAM,aAAa,CAAC;AAC1C,OAAO,EACL,eAAe,EACf,yBAAyB,EACzB,yBAAyB,EACzB,gCAAgC,GACjC,MAAM,+BAA+B,CAAC;AAEvC,OAAO,EAAE,eAAe,IAAI,sBAAsB,EAAE,MAAM,wCAAwC,CAAC;AAEnG,OAAO,EAAE,eAAe,EAAE,MAAM,wCAAwC,CAAC;AAKzE,OAAO,EAAW,SAAS,EAAE,YAAY,EAAE,MAAM,cAAc,CAAC;AAEhE,OAAO,EAEL,iBAAiB,GAIlB,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,gBAAgB,EAAE,MAAM,gCAAgC,CAAC;AAClE,OAAO,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAC;AACjE,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAW,WAAW,EAAE,MAAM,cAAc,CAAC;AACpD,OAAO,EAAE,YAAY,EAAE,MAAM,aAAa,CAAC;AAC3C,OAAO,EAAE,eAAe,EAAE,MAAM,wBAAwB,CAAC;AACzD,OAAO,EAAgB,aAAa,EAAE,MAAM,mBAAmB,CAAC;AAEhE,OAAO,EAAE,KAAK,EAAE,MAAM,cAAc,CAAC;AACrC,OAAO,EACL,wBAAwB,EACxB,wBAAwB,EACxB,iBAAiB,EAEjB,kBAAkB,GACnB,MAAM,YAAY,CAAC;AA6BpB,MAAM,aAAa,GAAoB,SAAS,CAAC;AAEjD,SAAS,kBAAkB,CAAC,KAAc;IACxC,OAAO,CAAC,CAAC,KAAK,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,IAAI,IAAI,KAAK,CAAC;AAC/D,CAAC;AAwCD,SAAS,wBAAwB,CAC/B,KAA2D;IAE3D,OAAO,CACL,CAAC,CAAC,KAAK;QACP,OAAO,KAAK,KAAK,QAAQ;QACzB,UAAU,IAAI,KAAK;QACnB,OAAQ,KAAiC,CAAC,QAAQ,KAAK,QAAQ,CAChE,CAAC;AACJ,CAAC;AAED;;;GAGG;AACH,MAAM,OAAO,SAAS;IASD;IACA;IACA;IACA;IACA;IAZH,eAAe,CAAU;IACzB,OAAO,CAAS;IAEf,gBAAgB,CAAmB;IACnC,eAAe,CAAkB;IACjC,SAAS,CAAyB;IAEnD,YACmB,WAAc,EACd,eAAyB,EACzB,OAAkB,EAClB,SAAiB,EACjB,WAAsB;QAJtB,gBAAW,GAAX,WAAW,CAAG;QACd,oBAAe,GAAf,eAAe,CAAU;QACzB,YAAO,GAAP,OAAO,CAAW;QAClB,cAAS,GAAT,SAAS,CAAQ;QACjB,gBAAW,GAAX,WAAW,CAAW;QAEvC,IAAI,CAAC,eAAe,GAAG,YAAY,CAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACjE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE3C,IAAI,CAAC,gBAAgB,GAAG,wBAAwB,EAAE,CAAC;QACnD,IAAI,CAAC,SAAS,GAAG,iBAAiB,CAAC;YACjC,OAAO,EAAE,wBAAwB,CAC/B,UAAU,CAAC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAC/C;YACD,QAAQ,EAAE,IAAI,CAAC,gBAAgB;SAChC,CAAC,CAAC;QAEH,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC,QAAQ,CAC7C,IAAI,CAAC,eAAe,EACpB,IAAI,CAAC,OAAO,EACZ,IAAI,CAAC,SAAS,CACf,CAAC;IACJ,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,kBAAkB;QAC7B,OAAO,SAAS,CAAC,MAAM,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE,CAAC,CAAC;IACrD,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,KAAK,CAAC,SAAS,CACpB,GAAoC;QAEpC,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,MAAM,MAAM,GAAG,wBAAwB,CAAC,aAAa,CAAC,CAAC;YACvD,OAAO,SAAS,CAAC,MAAM,CAAC;gBACtB,GAAG,MAAM;gBACT,eAAe,EAAE,CAAC,GAAG,MAAM,CAAC,eAAe,CAAC;gBAC5C,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;aACpD,CAAC,CAAC;QACL,CAAC;QACD,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,MAAM,MAAM,GAAG,wBAAwB,CAAC,GAAG,CAAC,CAAC;YAC7C,OAAO,SAAS,CAAC,MAAM,CAAC;gBACtB,GAAG,MAAM;gBACT,eAAe,EAAE,CAAC,GAAG,MAAM,CAAC,eAAe,CAAC;gBAC5C,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;aACpD,CAAC,CAAC;QACL,CAAC;QACD,MAAM,IAAI,GAAG,wBAAwB,CAAC,aAAa,CAAC,CAAC;QAErD,OAAO,SAAS,CAAC,MAAM,CAAC;YACtB,sEAAsE;YACtE,OAAO,EAAE,GAAG,CAAC,yBAAyB;gBACpC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,yBAAyB,CAAC;gBACvC,CAAC,CAAC,IAAI,CAAC,OAAO;YAChB,eAAe,EAAE,GAAG,CAAC,eAAe;gBAClC,CAAC,CAAC,GAAG,CAAC,eAAe,CAAC,KAAK,CAAC,GAAG,CAAC;gBAChC,CAAC,CAAC,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC;YAC7B,OAAO,EAAE,GAAG,CAAC,qBAAqB;gBAChC,CAAC,CAAC,GAAG,CAAC,qBAAqB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CACnD,YAAY,CAAC,OAAO,CAAC,CACtB;gBACH,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;YAC5C,eAAe,EACb,GAAG,CAAC,8BAA8B;gBAClC,IAAI,CAAC,eAAe;gBACpB,uBAAuB;YACzB,uCAAuC;YACvC,eAAe,EAAE,GAAG,CAAC,gBAAgB;YACrC,gBAAgB,EAAE,GAAG,CAAC,kBAAkB;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAC3B,MAAiD;QAEjD,IAAI,UAAuC,CAAC;QAC5C,IAAI,wBAAwB,CAAC,MAAM,CAAC,EAAE,CAAC;YACrC,IAAI,OAAO,OAAO,KAAK,WAAW,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,IAAI,EAAE,CAAC;gBAC9D,MAAM,IAAI,KAAK,CACb,qFAAqF,CACtF,CAAC;YACJ,CAAC;YACD,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,MAAM,CAAC,aAAa,CAAC,CAAC;YACjD,UAAU,GAAG,MAAM,QAAQ,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;QAC/C,CAAC;aAAM,CAAC;YACN,UAAU,GAAG,MAAM,CAAC;QACtB,CAAC;QACD,MAAM,GAAG,GAAG,aAAa,CAAC,UAAU,CAAC,CAAC;QACtC,OAAO,MAAM,SAAS,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,EAAgB;QAC9B,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,CAAC,CAAC,oBAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,EAAE,CAAC,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CACtD;YACH,CAAC,CAAC,oBAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,eAAe,KAAK,EAAE,CAAC,eAAe;gBACxC,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAC3B,CAAC;QACN,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,2BAA2B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;QACnE,CAAC;QAED,MAAM,KAAK,GAAG,YAAY,CAAC,EAAE,EAAE,EAAE,UAAU,CAAC,OAAO,EAAE,CAAC,CAAC;QACvD,MAAM,MAAM,GAAG,kBAAkB,CAAC;YAChC,KAAK;YACL,SAAS,EAAE,IAAI,EAAE;SAClB,CAAC,CAAC;QAEH,MAAM,EAAE,SAAS,EAAE,OAAO,EAAE,WAAW,EAAE,GAAG,MAAM,SAAS,CAAC,cAAc,CACxE,UAAU,EACV,MAAM,CACP,CAAC;QAEF,OAAO,IAAI,SAAS,CAClB,UAAU,EACV,SAAS,CAAC,kBAAkB,CAAC,UAAU,EAAE,SAAS,CAAC,EACnD,OAAO,EACP,SAAS,EACT,WAAW,CACZ,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS;QAET,MAAM,KAAK,GAAG,YAAY,CAAC,EAAE,EAAE,EAAE,MAAM,CAAC,OAAO,EAAE,CAAC,CAAC;QACnD,MAAM,MAAM,GAAG,kBAAkB,CAAC;YAChC,KAAK;YACL,SAAS,EAAE,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE;SAC1E,CAAC,CAAC;QAEH,MAAM,EAAE,SAAS,EAAE,OAAO,EAAE,WAAW,EAAE,GACvC,MAAM,SAAS,CAAC,0BAA0B,CACxC,MAAM,CAAC,eAA0B,EACjC,MAAM,CACP,CAAC;QAEJ,OAAO,IAAI,SAAS,CAClB,MAAM,EACN,MAAM,CAAC,eAAe,EACtB,OAAO,EACP,SAAS,EACT,WAAW,CACZ,CAAC;IACJ,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,gBAAgB,CACrB,MAAS,EACT,OAAgB;QAEhB,sEAAsE;QACtE,MAAM,cAAc,GAAG,oBAAoB,CAAC,IAAI,CAC9C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,IAAI,CAAC,CAAC,OAAO,KAAK,OAAO,CACpD,CAAC;QACF,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,4GAA4G;YAC5G,wBAAwB;YACxB,MAAM,IAAI,KAAK,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;QACD,OAAO,cAAc,CAAC;IACxB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS,EACT,OAAgB;QAEhB,OAAO,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,EAAE,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC;IAED;;;;;;;;;;;OAWG;IACH,KAAK,CAAC,OAAO,CACX,KAAQ,EACR,EAAE,cAAc,EAAE,WAAW,EAAE,UAAU,EAAqB;QAE9D,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC;YAC1C,SAAS,EAAE,SAAS,CAAC,kBAAkB,CAAC,KAAK,EAAE,UAAU,CAAC;YAC1D,OAAO,EAAE;gBACP,WAAW,EAAE,IAAI,CAAC,OAAO;gBACzB,UAAU,EAAE,IAAI,CAAC,eAAe;gBAChC,WAAW,EAAE,YAAY,CAAC,cAAc,CAAC;gBACzC,eAAe,EAAE,YAAY,CAAC,WAAW,CAAC;aAC3C;SACF,CAAC,CAAC;QAEH,OAAO,UAAU,CAAC,KAAK,CAAC;IAC1B,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACH,+BAA+B,CAC7B,YAAqD,EACrD,cAAsB,EACtB,SAAe,EACf,sBAA8B;QAE9B,OAAO,eAAe,CAAC;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,8BAA8B,EAAE,YAAY,CAAC,sBAAsB,CAAC;YACpE,cAAc,EAAE,YAAY,CAAC,cAAc,CAAC;YAC5C,kBAAkB,EAAE,YAAY;YAChC,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;OAQG;IACH,gCAAgC,CAC9B,YAAqD;QAErD,OAAO,gCAAgC,CAAC,IAAI,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IAC9E,CAAC;IAoDD,eAAe,CACb,YAAqD,EACrD,OAAoB,EACpB,IAA0C,EAC1C,IAAgD,EAChD,IAA6B;QAM7B,IAAI,IAAI,YAAY,UAAU,EAAE,CAAC;YAC/B,MAAM,eAAe,GAAG,IAAI,CAAC;YAC7B,IAAI,gBAA8C,CAAC;YACnD,IAAI,aAAiD,CAAC;YAEtD,IAAI,IAAI,IAAI,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrC,gBAAgB,GAAG,IAAI,CAAC;gBACxB,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;iBAAM,CAAC;gBACN,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;YAED,IAAI,gBAAgB,EAAE,CAAC;gBACrB,OAAO,eAAe,CAAC;oBACrB,OAAO;oBACP,aAAa;oBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;oBACjD,YAAY;oBACZ,eAAe,EAAE,IAAI,CAAC,eAAe;oBACrC,eAAe;oBACf,gBAAgB;iBACjB,CAEA,CAAC;YACJ,CAAC;YAED,OAAO,eAAe,CAAC;gBACrB,OAAO;gBACP,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,YAAY;gBACZ,eAAe,EAAE,IAAI,CAAC,eAAe;gBACrC,eAAe;aAChB,CAEA,CAAC;QACJ,CAAC;QAED,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,eAAe,CAAC;YACrB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,YAAY;YACZ,eAAe,EAAE,IAAI,CAAC,eAAe;SACtC,CAAyE,CAAC;IAC7E,CAAC;IAoDD,0BAA0B,CACxB,gBAAkC,EAClC,uBAAgD,EAChD,OAAoB,EACpB,IAA0C,EAC1C,IAAgD,EAChD,IAA6B;QAM7B,IAAI,IAAI,YAAY,UAAU,EAAE,CAAC;YAC/B,MAAM,eAAe,GAAG,IAAI,CAAC;YAC7B,IAAI,gBAA8C,CAAC;YACnD,IAAI,aAAiD,CAAC;YAEtD,IAAI,IAAI,IAAI,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrC,gBAAgB,GAAG,IAAI,CAAC;gBACxB,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;iBAAM,CAAC;gBACN,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;YAED,IAAI,gBAAgB,EAAE,CAAC;gBACrB,OAAO,yBAAyB,CAAC;oBAC/B,aAAa;oBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;oBACjD,eAAe,EAAE,IAAI,CAAC,eAAe;oBACrC,gBAAgB;oBAChB,uBAAuB;oBACvB,OAAO;oBACP,eAAe;oBACf,gBAAgB;iBACjB,CAEA,CAAC;YACJ,CAAC;YAED,OAAO,yBAAyB,CAAC;gBAC/B,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,eAAe,EAAE,IAAI,CAAC,eAAe;gBACrC,gBAAgB;gBAChB,uBAAuB;gBACvB,OAAO;gBACP,eAAe;aAChB,CAEA,CAAC;QACJ,CAAC;QAED,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,yBAAyB,CAAC;YAC/B,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,gBAAgB;YAChB,uBAAuB;YACvB,OAAO;SACR,CAAyE,CAAC;IAC7E,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACH,eAAe,CACb,YAAqD,EACrD,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,aAAsC;QAEtC,OAAO,sBAAsB,CAAC;YAC5B,YAAY;YACZ,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;OAaG;IACH,0BAA0B,CACxB,gBAAkC,EAClC,uBAAgD,EAChD,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,aAAsC;QAEtC,OAAO,yBAAyB,CAAC;YAC/B,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,gBAAgB;YAChB,uBAAuB;YACvB,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;OAYG;IACH,cAAc,CACZ,OAAoB,EACpB,aAAsC;QAEtC,OAAO,eAAe,CAAC;YACrB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;SACtC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,kBAAkB,CAC9B,UAAgD,EAChD,SAAiB;QAEjB,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,UAAU,CAAC;QACxD,OAAO,KAAK,CAAC,IAAI,CACf,EAAE,MAAM,EAAE,SAAS,EAAE,EACrB,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CACP,WAAW,eAAe,CAAC,WAAW,EAAE,IAAI,OAAO,IAAI,MAAM,IAAI,CAAC,GAAG,CAAC,WAAW,CACpF,CAAC;IACJ,CAAC;IAEO,MAAM,CAAC,UAAU,CAAC,EAAgB;QACxC,OAAQ,EAAuB,CAAC,IAAI,KAAK,SAAS,CAAC;IACrD,CAAC;IAEO,MAAM,CAAC,kBAAkB,CAC/B,KAAQ,EACR,IAAc;QAEd,IAAI,OAAO,KAAK,KAAK,SAAS,EAAE,CAAC;YAC/B,OAAO;gBACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,WAAW,CAAC,KAAK;gBACvB,KAAK,EAAE,KAAK;aACsC,CAAC;QACvD,CAAC;aAAM,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAClE,OAAO;gBACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,IAAI,IAAI,WAAW,CAAC,QAAQ;gBAClC,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC;aAC8B,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oBAAoB,OAAO,KAAK,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;IAEM,MAAM,CAAC,KAAK,CAAC,iBAAiB,CACnC,MAAoB,EACpB,eAAwB;QAExB,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,uBAAuB,CAC1D,MAAM,EACN,eAAe,CAChB,CAAC;QACF,OAAO,MAAM,YAAY,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;IAC/C,CAAC;IAEM,MAAM,CAAC,KAAK,CAAC,uBAAuB,CACzC,MAAoB,EACpB,eAAwB;QAIxB,MAAM,qBAAqB,GAAG,WAAW,CAAC;YACxC,GAAG,EAAE,gBAAgB;YACrB,OAAO,EAAE,eAAe;YACxB,MAAM;SACP,CAAC,CAAC;QACH,MAAM,mBAAmB,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QAC5E,MAAM,YAAY,GAAG,WAAW,CAAC;YAC/B,GAAG,EAAE,eAAe;YACpB,OAAO,EAAE,mBAA8B;YACvC,MAAM;SACP,CAAC,CAAC;QACH,OAAO,CAAC,GAAG,CAAC,eAAe,EAAE,qBAAqB,CAAC,OAAO,CAAC,CAAC;QAC5D,OAAO,CAAC,GAAG,CAAC,eAAe,EAAE,YAAY,CAAC,OAAO,CAAC,CAAC;QAEnD,OAAO,YAAY,CAAC;IACtB,CAAC;IAED;;;;;;OAMG;IACK,MAAM,CAAC,KAAK,CAAC,0BAA0B,CAC7C,eAAwB,EACxB,MAAoB;QAEpB,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,uBAAuB,CAC1D,MAAM,EACN,eAAe,CAChB,CAAC;QAEF,MAAM,SAAS,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QACzD,MAAM,WAAW,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;QAE1D,MAAM,YAAY,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,eAAe,EAAE,CAAC;QAC/D,MAAM,eAAe,GAAG,EAAE,CAAC;QAC3B,KAAK,IAAI,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,YAAY,EAAE,CAAC,EAAE,EAAE,CAAC;YAC9C,eAAe,CAAC,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QAChE,CAAC;QACD,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC;QAEnD,OAAO;YACL,SAAS,EAAE,MAAM,CAAC,SAAS,CAAC;YAC5B,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC;YAClC,WAAW;SACZ,CAAC;IACJ,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,cAAc,CACjC,UAAsB,EACtB,MAAoB;QAEpB,IAAI,IAAI,CAAC,0BAA0B,CAAC,UAAU,CAAC,EAAE,CAAC;YAChD,OAAO,MAAM,IAAI,CAAC,0BAA0B,CAC1C,UAAU,CAAC,eAA0B,EACrC,MAAM,CACP,CAAC;QACJ,CAAC;QACD,OAAO,IAAI,CAAC,6BAA6B,EAAE,CAAC;IAC9C,CAAC;IAED,4EAA4E;IACpE,MAAM,CAAC,0BAA0B,CAAC,UAAsB;QAC9D,iIAAiI;QACjI,OAAO,UAAU,CAAC,OAAO,EAAE,KAAK,IAAI,CAAC,IAAI,UAAU,CAAC,OAAO,EAAE,KAAK,IAAI,CAAC,CAAC;IAC1E,CAAC;IAED,oGAAoG;IACpG,8EAA8E;IAC9E,0GAA0G;IAClG,MAAM,CAAC,6BAA6B;QAC1C,OAAO;YACL,SAAS,EAAE,CAAC;YACZ,OAAO,EAAE,CAAC,WAAsB,CAAC;YACjC,WAAW,EAAE,kBAAkB;SAChC,CAAC;IACJ,CAAC;CACF"}
|
|
@@ -4,13 +4,12 @@ export declare const LocalNodeEnv: Schema.Struct<{
|
|
|
4
4
|
STATE_DUMP: typeof Schema.String;
|
|
5
5
|
EXECUTOR_ADDRESS: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
|
6
6
|
ECIES_PUBLIC_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
7
|
-
CALLBACK_ADDRESS: Schema.TemplateLiteral<`0x${string}`>;
|
|
8
7
|
SENDER_ADDRESS: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
|
9
8
|
SENDER_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
9
|
+
EIP712_SIGNER_ADDRESS: Schema.optional<Schema.TemplateLiteral<`0x${string}`>>;
|
|
10
10
|
PEPPER: typeof Schema.String;
|
|
11
11
|
COVALIDATOR_ECIES_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
12
12
|
COVALIDATOR_EIP712_PRIVATE_SIGNING_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
13
|
-
COVALIDATOR_CALLBACK_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
14
13
|
COVALIDATOR_ACL_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
|
15
14
|
COVALIDATOR_INCO_EXECUTOR_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
|
16
15
|
COVALIDATOR_DECRYPTION_HANDLER_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|