@inco/js 0.6.9 → 0.7.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (115) hide show
  1. package/README.md +8 -8
  2. package/dist/cjs/advancedacl/session-key.d.ts +39 -26
  3. package/dist/cjs/advancedacl/session-key.js +53 -136
  4. package/dist/cjs/attestedcompute/attested-compute.d.ts +6 -6
  5. package/dist/cjs/attestedcompute/attested-compute.js +5 -35
  6. package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +36 -21
  7. package/dist/cjs/attesteddecrypt/attested-decrypt.js +107 -108
  8. package/dist/cjs/attesteddecrypt/types.d.ts +4 -4
  9. package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
  10. package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
  11. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
  12. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +3 -4
  13. package/dist/cjs/generated/lightning.d.ts +40 -0
  14. package/dist/cjs/generated/lightning.js +43 -1
  15. package/dist/cjs/generated/local-node.d.ts +11 -7
  16. package/dist/cjs/generated/local-node.js +28 -8
  17. package/dist/cjs/kms/client.d.ts +8 -4
  18. package/dist/cjs/kms/client.js +9 -4
  19. package/dist/cjs/kms/quorumClient.d.ts +58 -0
  20. package/dist/cjs/kms/quorumClient.js +378 -0
  21. package/dist/cjs/kms/thresholdPromises.d.ts +7 -0
  22. package/dist/cjs/kms/thresholdPromises.js +52 -0
  23. package/dist/cjs/lite/ecies.d.ts +2 -0
  24. package/dist/cjs/lite/ecies.js +5 -2
  25. package/dist/cjs/lite/index.d.ts +0 -1
  26. package/dist/cjs/lite/index.js +1 -2
  27. package/dist/cjs/lite/lightning.d.ts +110 -74
  28. package/dist/cjs/lite/lightning.js +272 -127
  29. package/dist/cjs/local/local-node.d.ts +1 -2
  30. package/dist/cjs/local/local-node.js +2 -3
  31. package/dist/cjs/test/mocks.d.ts +3 -0
  32. package/dist/cjs/test/mocks.js +19 -1
  33. package/dist/cjs/viem.d.ts +2 -4
  34. package/dist/cjs/viem.js +6 -2
  35. package/dist/esm/advancedacl/session-key.d.ts +39 -26
  36. package/dist/esm/advancedacl/session-key.js +44 -126
  37. package/dist/esm/attestedcompute/attested-compute.d.ts +6 -6
  38. package/dist/esm/attestedcompute/attested-compute.js +6 -36
  39. package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +36 -21
  40. package/dist/esm/attesteddecrypt/attested-decrypt.js +106 -108
  41. package/dist/esm/attesteddecrypt/types.d.ts +4 -4
  42. package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
  43. package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
  44. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
  45. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +2 -3
  46. package/dist/esm/generated/lightning.d.ts +40 -0
  47. package/dist/esm/generated/lightning.js +43 -1
  48. package/dist/esm/generated/local-node.d.ts +11 -7
  49. package/dist/esm/generated/local-node.js +28 -8
  50. package/dist/esm/kms/client.d.ts +8 -4
  51. package/dist/esm/kms/client.js +8 -4
  52. package/dist/esm/kms/quorumClient.d.ts +58 -0
  53. package/dist/esm/kms/quorumClient.js +374 -0
  54. package/dist/esm/kms/thresholdPromises.d.ts +7 -0
  55. package/dist/esm/kms/thresholdPromises.js +49 -0
  56. package/dist/esm/lite/ecies.d.ts +2 -0
  57. package/dist/esm/lite/ecies.js +4 -2
  58. package/dist/esm/lite/index.d.ts +0 -1
  59. package/dist/esm/lite/index.js +1 -2
  60. package/dist/esm/lite/lightning.d.ts +110 -74
  61. package/dist/esm/lite/lightning.js +276 -131
  62. package/dist/esm/local/local-node.d.ts +1 -2
  63. package/dist/esm/local/local-node.js +2 -3
  64. package/dist/esm/test/mocks.d.ts +3 -0
  65. package/dist/esm/test/mocks.js +17 -1
  66. package/dist/esm/viem.d.ts +2 -4
  67. package/dist/esm/viem.js +6 -2
  68. package/dist/types/advancedacl/session-key.d.ts +39 -26
  69. package/dist/types/attestedcompute/attested-compute.d.ts +6 -6
  70. package/dist/types/attesteddecrypt/attested-decrypt.d.ts +36 -21
  71. package/dist/types/attesteddecrypt/types.d.ts +4 -4
  72. package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
  73. package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
  74. package/dist/types/generated/lightning.d.ts +40 -0
  75. package/dist/types/generated/local-node.d.ts +11 -7
  76. package/dist/types/kms/client.d.ts +8 -4
  77. package/dist/types/kms/quorumClient.d.ts +58 -0
  78. package/dist/types/kms/thresholdPromises.d.ts +7 -0
  79. package/dist/types/lite/ecies.d.ts +2 -0
  80. package/dist/types/lite/index.d.ts +0 -1
  81. package/dist/types/lite/lightning.d.ts +110 -74
  82. package/dist/types/local/local-node.d.ts +1 -2
  83. package/dist/types/test/mocks.d.ts +3 -0
  84. package/dist/types/viem.d.ts +2 -4
  85. package/package.json +6 -3
  86. package/dist/cjs/attestedreveal/attested-reveal.d.ts +0 -21
  87. package/dist/cjs/attestedreveal/attested-reveal.js +0 -69
  88. package/dist/cjs/attestedreveal/index.d.ts +0 -1
  89. package/dist/cjs/attestedreveal/index.js +0 -18
  90. package/dist/cjs/attestedreveal/types.d.ts +0 -7
  91. package/dist/cjs/attestedreveal/types.js +0 -16
  92. package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
  93. package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.js +0 -118
  94. package/dist/cjs/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
  95. package/dist/cjs/generated/es/inco/fhe/v1/types_pb.js +0 -136
  96. package/dist/cjs/lite/reencrypt.d.ts +0 -21
  97. package/dist/cjs/lite/reencrypt.js +0 -141
  98. package/dist/esm/attestedreveal/attested-reveal.d.ts +0 -21
  99. package/dist/esm/attestedreveal/attested-reveal.js +0 -66
  100. package/dist/esm/attestedreveal/index.d.ts +0 -1
  101. package/dist/esm/attestedreveal/index.js +0 -2
  102. package/dist/esm/attestedreveal/types.d.ts +0 -7
  103. package/dist/esm/attestedreveal/types.js +0 -12
  104. package/dist/esm/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
  105. package/dist/esm/generated/es/cosmos_proto/cosmos_pb.js +0 -115
  106. package/dist/esm/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
  107. package/dist/esm/generated/es/inco/fhe/v1/types_pb.js +0 -133
  108. package/dist/esm/lite/reencrypt.d.ts +0 -21
  109. package/dist/esm/lite/reencrypt.js +0 -131
  110. package/dist/types/attestedreveal/attested-reveal.d.ts +0 -21
  111. package/dist/types/attestedreveal/index.d.ts +0 -1
  112. package/dist/types/attestedreveal/types.d.ts +0 -7
  113. package/dist/types/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
  114. package/dist/types/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
  115. package/dist/types/lite/reencrypt.d.ts +0 -21
@@ -1,10 +1,8 @@
1
- import * as fs from 'fs/promises';
2
- import { getContract, hexToBytes, } from 'viem';
1
+ import { createPublicClient, getContract, hexToBytes, http, zeroAddress, } from 'viem';
3
2
  import { baseSepolia } from 'viem/chains';
4
- import { grantSessionKey, sessionKeyAttestedCompute, sessionKeyAttestedDecrypt, sessionKeyReencryptor, updateActiveVouchersSessionNonce, } from '../advancedacl/session-key.js';
5
- import { attestedCompute } from '../attestedcompute/attested-compute.js';
3
+ import { grantSessionKey, sessionKeyAttestedCompute, sessionKeyAttestedDecrypt, updateActiveVouchersSessionNonce, } from '../advancedacl/session-key.js';
4
+ import { attestedCompute as performAttestedCompute } from '../attestedcompute/attested-compute.js';
6
5
  import { attestedDecrypt } from '../attesteddecrypt/attested-decrypt.js';
7
- import { attestedReveal } from '../attestedreveal/attested-reveal.js';
8
6
  import { HexString, parseAddress } from '../binary.js';
9
7
  import { encryptionSchemes, } from '../encryption/index.js';
10
8
  import { incoLightningAbi } from '../generated/abis/lightning.js';
@@ -12,35 +10,56 @@ import { incoVerifierAbi } from '../generated/abis/verifier.js';
12
10
  import { lightningDeployments } from '../generated/lightning.js';
13
11
  import { localNodeLightningConfig } from '../generated/local-node.js';
14
12
  import { handleTypes } from '../handle.js';
13
+ import { getViemChain } from '../index.js';
14
+ import { KmsQuorumClient } from '../kms/quorumClient.js';
15
15
  import { parseLocalEnv } from '../local/index.js';
16
16
  import { parse } from '../schema.js';
17
- import { decodeSecp256k1PublicKey, generateSecp256k1Keypair, getEciesEncryptor, } from './ecies.js';
18
- import { getKmsClient, incoLiteReencryptor } from './reencrypt.js';
17
+ import { decodeSecp256k1PublicKey, generateSecp256k1Keypair, getEciesEncryptor, TEST_ECIES_PUB_KEY, } from './ecies.js';
19
18
  const DefaultPepper = 'testnet';
19
+ function isSecp256k1Keypair(value) {
20
+ return !!value && typeof value === 'object' && 'kp' in value;
21
+ }
22
+ function isLocalNodeEnvFileSource(value) {
23
+ return (!!value &&
24
+ typeof value === 'object' &&
25
+ 'filePath' in value &&
26
+ typeof value.filePath === 'string');
27
+ }
20
28
  /**
21
29
  * The Lightning class provides a convenient way to interact with the Inco Lightning contract by binding to a specific
22
30
  * deployment.
23
31
  */
24
32
  export class Lightning {
25
33
  _deployment;
26
- covalidatorUrl;
34
+ covalidatorUrls;
35
+ signers;
36
+ threshold;
37
+ eciesPubKey;
27
38
  executorAddress;
28
39
  chainId;
29
40
  ephemeralKeypair;
30
- kmsClient;
31
- constructor(_deployment, covalidatorUrl) {
41
+ kmsQuorumClient;
42
+ encryptor;
43
+ constructor(_deployment, covalidatorUrls, signers, threshold, eciesPubKey) {
32
44
  this._deployment = _deployment;
33
- this.covalidatorUrl = covalidatorUrl;
45
+ this.covalidatorUrls = covalidatorUrls;
46
+ this.signers = signers;
47
+ this.threshold = threshold;
48
+ this.eciesPubKey = eciesPubKey;
34
49
  this.executorAddress = parseAddress(_deployment.executorAddress);
35
50
  this.chainId = BigInt(_deployment.chainId);
36
51
  this.ephemeralKeypair = generateSecp256k1Keypair();
37
- this.kmsClient = getKmsClient(covalidatorUrl);
52
+ this.encryptor = getEciesEncryptor({
53
+ pubKeyA: decodeSecp256k1PublicKey(hexToBytes(parse(HexString, this.eciesPubKey))),
54
+ privKeyB: this.ephemeralKeypair,
55
+ });
56
+ this.kmsQuorumClient = KmsQuorumClient.fromUrls(this.covalidatorUrls, this.signers, this.threshold);
38
57
  }
39
58
  /**
40
59
  * Get a Lightning instance bound to the latest Lightning deployment for the Base Sepolia testnet.
41
60
  */
42
61
  static async baseSepoliaTestnet() {
43
- return await Lightning.latest('testnet', baseSepolia.id);
62
+ return Lightning.latest('testnet', baseSepolia.id);
44
63
  }
45
64
  /**
46
65
  * Get a Lightning instance bound to our canonical Anvil-based test node and test Covalidator node
@@ -59,18 +78,33 @@ export class Lightning {
59
78
  */
60
79
  static async localNode(env) {
61
80
  if (!env) {
62
- return await Lightning.custom(localNodeLightningConfig[DefaultPepper]);
81
+ const config = localNodeLightningConfig[DefaultPepper];
82
+ return Lightning.custom({
83
+ ...config,
84
+ covalidatorUrls: [...config.covalidatorUrls],
85
+ signers: config.signers.map((s) => parseAddress(s)),
86
+ });
63
87
  }
64
88
  if (typeof env === 'string') {
65
- return await Lightning.custom(localNodeLightningConfig[env]);
89
+ const config = localNodeLightningConfig[env];
90
+ return Lightning.custom({
91
+ ...config,
92
+ covalidatorUrls: [...config.covalidatorUrls],
93
+ signers: config.signers.map((s) => parseAddress(s)),
94
+ });
66
95
  }
67
96
  const conf = localNodeLightningConfig[DefaultPepper];
68
- return await Lightning.custom({
97
+ return Lightning.custom({
69
98
  // We assume that we always run a local node as the default anvil node
70
99
  chainId: env.COVALIDATOR_HOST_CHAIN_ID
71
100
  ? Number(env.COVALIDATOR_HOST_CHAIN_ID)
72
101
  : conf.chainId,
73
- covalidatorUrl: env.COVALIDATOR_URL ?? conf.covalidatorUrl,
102
+ covalidatorUrls: env.COVALIDATOR_URL
103
+ ? env.COVALIDATOR_URL.split(',')
104
+ : [...conf.covalidatorUrls],
105
+ signers: env.EIP712_SIGNER_ADDRESS
106
+ ? env.EIP712_SIGNER_ADDRESS.split(',').map((address) => parseAddress(address))
107
+ : conf.signers.map((s) => parseAddress(s)),
74
108
  hostChainRpcUrl: env.COVALIDATOR_HOST_CHAIN_RPC_URL ??
75
109
  conf.hostChainRpcUrl ??
76
110
  'http://localhost:8545',
@@ -84,9 +118,19 @@ export class Lightning {
84
118
  *
85
119
  * @param filePath the path to the file containing the environment variables in dotenv format
86
120
  */
87
- static async localNodeFromEnv(filePath) {
88
- const buf = filePath ? await fs.readFile(filePath) : undefined;
89
- const env = parseLocalEnv(buf);
121
+ static async localNodeFromEnv(source) {
122
+ let envContent;
123
+ if (isLocalNodeEnvFileSource(source)) {
124
+ if (typeof process === 'undefined' || !process.versions?.node) {
125
+ throw new Error('Lightning.localNodeFromEnv with a file path is only available in Node environments.');
126
+ }
127
+ const { readFile } = await import('fs/promises');
128
+ envContent = await readFile(source.filePath);
129
+ }
130
+ else {
131
+ envContent = source;
132
+ }
133
+ const env = parseLocalEnv(envContent);
90
134
  return await Lightning.localNode(env);
91
135
  }
92
136
  /**
@@ -102,7 +146,13 @@ export class Lightning {
102
146
  if (!deployment) {
103
147
  throw new Error(`No deployment found for ${JSON.stringify(id)}`);
104
148
  }
105
- return new Lightning(deployment, Lightning.getCovalidatorUrl(deployment));
149
+ const chain = getViemChain({ id: deployment.chainId });
150
+ const client = createPublicClient({
151
+ chain,
152
+ transport: http(),
153
+ });
154
+ const { threshold, signers, eciesPubKey } = await Lightning.getChainConfig(deployment, client);
155
+ return new Lightning(deployment, Lightning.getCovalidatorUrls(deployment, threshold), signers, threshold, eciesPubKey);
106
156
  }
107
157
  /**
108
158
  * Get a Lightning deployment for a local or custom node
@@ -111,21 +161,13 @@ export class Lightning {
111
161
  * additional fields past will be made available as part of the `deployment` property.
112
162
  */
113
163
  static async custom(config) {
114
- return new Lightning(config, config.covalidatorUrl);
115
- }
116
- static async getEciesPublicKey(client, executorAddress) {
117
- const incoLightningContract = getContract({
118
- abi: incoLightningAbi,
119
- address: executorAddress,
120
- client,
121
- });
122
- const incoVerifierAddress = await incoLightningContract.read.incoVerifier();
123
- const incoVerifier = getContract({
124
- abi: incoVerifierAbi,
125
- address: incoVerifierAddress,
126
- client,
164
+ const chain = getViemChain({ id: config.chainId });
165
+ const client = createPublicClient({
166
+ chain,
167
+ transport: config.hostChainRpcUrl ? http(config.hostChainRpcUrl) : http(),
127
168
  });
128
- return await incoVerifier.read.eciesPubkey();
169
+ const { threshold, signers, eciesPubKey } = await Lightning.getVerifierContractDetails(config.executorAddress, client);
170
+ return new Lightning(config, config.covalidatorUrls, signers, threshold, eciesPubKey);
129
171
  }
130
172
  /**
131
173
  * Get the latest deployment for a given pepper, which usually denotes a family of deployments distinct from their
@@ -150,10 +192,10 @@ export class Lightning {
150
192
  * will not be compatible with the new version.
151
193
  *
152
194
  * @param pepper the pepper to use to filter the deployments
153
- * @param chainId the chainId to use to filter the deployments
195
+ * @param chain the chain to use to filter the deployments
154
196
  */
155
197
  static async latest(pepper, chainId) {
156
- return await Lightning.at(Lightning.latestDeployment(pepper, chainId));
198
+ return Lightning.at(Lightning.latestDeployment(pepper, chainId));
157
199
  }
158
200
  /*
159
201
  * Get the latest deployment for a given pepper, which usually denotes a family of deployments distinct from their
@@ -168,10 +210,15 @@ export class Lightning {
168
210
  * @param value a boolean or numeric value to encrypt
169
211
  * @param accountAddress the address of the account interacting with the dapp contract, normally an Externally Owned Account (EOA)
170
212
  * @param dappAddress the address of the dapp contract that interacts with the Inco Lightning contract or library
213
+ * @param handleType (optional) the handle type to be used for encrypting the value - this is required in case of non-default handle types
214
+ * default handle types:
215
+ * - boolean -> handleTypes.ebool
216
+ * - number | bigint -> handleTypes.euint256
217
+ * @returns a promise that resolves to the encrypted value as a HexString
171
218
  */
172
- async encrypt(value, { accountAddress, dappAddress }, encryptor) {
173
- const { ciphertext } = await encryptor({
174
- plaintext: Lightning.plaintextFromValue(value),
219
+ async encrypt(value, { accountAddress, dappAddress, handleType }) {
220
+ const { ciphertext } = await this.encryptor({
221
+ plaintext: Lightning.plaintextFromValue(value, handleType),
175
222
  context: {
176
223
  hostChainId: this.chainId,
177
224
  aclAddress: this.executorAddress,
@@ -181,27 +228,6 @@ export class Lightning {
181
228
  });
182
229
  return ciphertext.value;
183
230
  }
184
- /**
185
- * Obtain a reencryptor for a particular Externally Owned Account (EOA) to request decrypted values.
186
- * The account associated with the walletClient must have permissions to decrypt the handle or ciphertext passed
187
- * to the reencryptor function.
188
- *
189
- * @param walletClient the wallet client to use for signing the reencrypt request.
190
- */
191
- getReencryptor(walletClient) {
192
- return incoLiteReencryptor({
193
- walletClient,
194
- kmsConnectRpcEndpointOrClient: this.kmsClient,
195
- chainId: this.chainId,
196
- ephemeralKeypair: this.ephemeralKeypair,
197
- });
198
- }
199
- getEncryptor(eciesPubkey) {
200
- return getEciesEncryptor({
201
- pubKeyA: decodeSecp256k1PublicKey(hexToBytes(parse(HexString, eciesPubkey))),
202
- privKeyB: this.ephemeralKeypair,
203
- });
204
- }
205
231
  /**
206
232
  * Grants a session key allowance voucher for secure reencryption operations.
207
233
  *
@@ -235,31 +261,6 @@ export class Lightning {
235
261
  expiresAt,
236
262
  });
237
263
  }
238
- /**
239
- * Creates a session key reencryptor for secure data reencryption operations.
240
- *
241
- * This method returns a reencryptor instance that can be used to perform reencryption
242
- * operations using session keys. The reencryptor is configured with the provided
243
- * allowance voucher and ephemeral keypair for secure communication.
244
- *
245
- * @param allowanceVoucherWithSig - The signed allowance voucher obtained from grantSessionKeyAllowanceVoucher
246
- * @param ephemeralKeypair - The ephemeral keypair used for secure communication with the KMS make sure it has allowance to voucher
247
- * @returns A reencryptor instance configured for session key operations
248
- *
249
- * @example
250
- * ```typescript
251
- * const reencryptor = await lightning.getSessionKeyRencryptor(voucher, ephemeralKeypair);
252
- * const decryptedValue = await reencryptor({handle: resultHandle});
253
- * ```
254
- */
255
- getSessionKeyRencryptor(allowanceVoucherWithSig, ephemeralKeypair) {
256
- return sessionKeyReencryptor({
257
- chainId: this.chainId,
258
- kmsConnectRpcEndpointOrClient: this.kmsClient,
259
- ephemeralKeypair,
260
- allowanceVoucherWithSig,
261
- });
262
- }
263
264
  /**
264
265
  * Updates the active session nonce for the given wallet client.
265
266
  *
@@ -272,62 +273,142 @@ export class Lightning {
272
273
  updateActiveVouchersSessionNonce(walletClient) {
273
274
  return updateActiveVouchersSessionNonce(this.executorAddress, walletClient);
274
275
  }
275
- attestedDecrypt(arg1, arg2, arg3, arg4) {
276
- if (Array.isArray(arg2)) {
277
- const walletClient = arg1;
278
- const handles = arg2;
279
- const backoffConfig = arg3;
276
+ attestedDecrypt(walletClient, handles, arg3, arg4, arg5) {
277
+ if (arg3 instanceof Uint8Array) {
278
+ const reencryptPubKey = arg3;
279
+ let reencryptKeypair;
280
+ let backoffConfig;
281
+ if (arg4 && isSecp256k1Keypair(arg4)) {
282
+ reencryptKeypair = arg4;
283
+ backoffConfig = arg5;
284
+ }
285
+ else {
286
+ backoffConfig = arg4;
287
+ }
288
+ if (reencryptKeypair) {
289
+ return attestedDecrypt({
290
+ handles,
291
+ backoffConfig,
292
+ chainId: Number(this.chainId),
293
+ walletClient,
294
+ kmsQuorumClient: this.kmsQuorumClient,
295
+ reencryptPubKey,
296
+ reencryptKeypair,
297
+ });
298
+ }
280
299
  return attestedDecrypt({
281
300
  handles,
282
301
  backoffConfig,
283
302
  chainId: Number(this.chainId),
284
303
  walletClient,
285
- kmsConnectRpcEndpointOrClient: this.kmsClient,
304
+ kmsQuorumClient: this.kmsQuorumClient,
305
+ reencryptPubKey,
286
306
  });
287
307
  }
288
- else {
289
- const ephemeralKeypair = arg1;
290
- const allowanceVoucherWithSig = arg2;
291
- const handles = arg3;
292
- const backoffConfig = arg4;
308
+ const backoffConfig = arg3;
309
+ return attestedDecrypt({
310
+ handles,
311
+ backoffConfig,
312
+ chainId: Number(this.chainId),
313
+ walletClient,
314
+ kmsQuorumClient: this.kmsQuorumClient,
315
+ });
316
+ }
317
+ attestedDecryptWithVoucher(ephemeralKeypair, allowanceVoucherWithSig, handles, arg4, arg5, arg6) {
318
+ if (arg4 instanceof Uint8Array) {
319
+ const reencryptPubKey = arg4;
320
+ let reencryptKeypair;
321
+ let backoffConfig;
322
+ if (arg5 && isSecp256k1Keypair(arg5)) {
323
+ reencryptKeypair = arg5;
324
+ backoffConfig = arg6;
325
+ }
326
+ else {
327
+ backoffConfig = arg5;
328
+ }
329
+ if (reencryptKeypair) {
330
+ return sessionKeyAttestedDecrypt({
331
+ backoffConfig,
332
+ chainId: Number(this.chainId),
333
+ kmsQuorumClient: this.kmsQuorumClient,
334
+ ephemeralKeypair,
335
+ allowanceVoucherWithSig,
336
+ handles,
337
+ reencryptPubKey,
338
+ reencryptKeypair,
339
+ });
340
+ }
293
341
  return sessionKeyAttestedDecrypt({
294
342
  backoffConfig,
295
343
  chainId: Number(this.chainId),
296
- kmsConnectRpcEndpointOrClient: this.kmsClient,
344
+ kmsQuorumClient: this.kmsQuorumClient,
297
345
  ephemeralKeypair,
298
346
  allowanceVoucherWithSig,
299
347
  handles,
348
+ reencryptPubKey,
300
349
  });
301
350
  }
351
+ const backoffConfig = arg4;
352
+ return sessionKeyAttestedDecrypt({
353
+ backoffConfig,
354
+ chainId: Number(this.chainId),
355
+ kmsQuorumClient: this.kmsQuorumClient,
356
+ ephemeralKeypair,
357
+ allowanceVoucherWithSig,
358
+ handles,
359
+ });
302
360
  }
303
- attestedCompute(arg1, lhsHandle, op, rhsPlaintext, arg5, arg6) {
304
- if (typeof arg5 === 'object' &&
305
- arg5 !== null &&
306
- 'voucher' in arg5 &&
307
- 'voucherSignature' in arg5 &&
308
- 'sharer' in arg5) {
309
- // Session-key path
310
- const ephemeralKeypair = arg1;
311
- const allowanceVoucherWithSig = arg5;
312
- const backoffConfig = arg6;
313
- return sessionKeyAttestedCompute({
314
- chainId: Number(this.chainId),
315
- kmsConnectRpcEndpointOrClient: this.kmsClient,
316
- ephemeralKeypair,
317
- allowanceVoucherWithSig,
318
- lhsHandle,
319
- op,
320
- rhsPlaintext,
321
- backoffConfig,
322
- });
323
- }
324
- // Wallet-client path
325
- const walletClient = arg1;
326
- const backoffConfig = arg5;
327
- return attestedCompute({
361
+ /**
362
+ * Get an attested compute for the given wallet client.
363
+ *
364
+ * @param walletClient - The wallet client used for signing the attested compute request
365
+ * @param lhsHandle - The handle to compute
366
+ * @param op - The operation to perform
367
+ * @param rhsPlaintext - The plaintext to compute with
368
+ * @param backoffConfig - The backoff configuration for the attested compute request
369
+ * @returns The decryption attestation
370
+ *
371
+ * @example
372
+ * ```typescript
373
+ * import { AttestedComputeSupportedOps } from '../lite/attested-compute.js';
374
+ * const lhsHandle = '0x...';
375
+ * const rhsPlaintext = 1337n;
376
+ * const op = AttestedComputeSupportedOps.Eq;
377
+ * const response = await lightning.attestedCompute(walletClient, lhsHandle, op, rhsPlaintext);
378
+ * const { plaintext, covalidatorSignature, handle } = response;
379
+ * ```
380
+ */
381
+ attestedCompute(walletClient, lhsHandle, op, rhsPlaintext, backoffConfig) {
382
+ return performAttestedCompute({
328
383
  walletClient,
329
- kmsConnectRpcEndpointOrClient: this.kmsClient,
384
+ kmsQuorumClient: this.kmsQuorumClient,
385
+ chainId: Number(this.chainId),
386
+ lhsHandle,
387
+ op,
388
+ rhsPlaintext,
389
+ backoffConfig,
390
+ });
391
+ }
392
+ /**
393
+ * Performs attested compute via a voucher-backed session key.
394
+ *
395
+ * @example
396
+ * ```ts
397
+ * const attestation = await lightning.attestedComputeWithVoucher(
398
+ * ephemeralKeypair,
399
+ * voucher,
400
+ * lhsHandle,
401
+ * AttestedComputeSupportedOps.Eq,
402
+ * true,
403
+ * );
404
+ * ```
405
+ */
406
+ attestedComputeWithVoucher(ephemeralKeypair, allowanceVoucherWithSig, lhsHandle, op, rhsPlaintext, backoffConfig) {
407
+ return sessionKeyAttestedCompute({
330
408
  chainId: Number(this.chainId),
409
+ kmsQuorumClient: this.kmsQuorumClient,
410
+ ephemeralKeypair,
411
+ allowanceVoucherWithSig,
331
412
  lhsHandle,
332
413
  op,
333
414
  rhsPlaintext,
@@ -348,24 +429,24 @@ export class Lightning {
348
429
  * ```
349
430
  */
350
431
  attestedReveal(handles, backoffConfig) {
351
- return attestedReveal({
432
+ return attestedDecrypt({
352
433
  handles,
353
434
  backoffConfig,
354
435
  chainId: Number(this.chainId),
355
- kmsConnectRpcEndpointOrClient: this.kmsClient,
436
+ kmsQuorumClient: this.kmsQuorumClient,
356
437
  });
357
438
  }
358
439
  /**
359
440
  * Get the GRPC endpoint for the covalidator that services this deployment.
360
441
  */
361
- static getCovalidatorUrl(deployment) {
442
+ static getCovalidatorUrls(deployment, threshold) {
362
443
  const { executorAddress, chainId, pepper } = deployment;
363
- return `https://${executorAddress.toLowerCase()}.${chainId}.${pepper}.inco.org`;
444
+ return Array.from({ length: threshold }, (_, i) => `https://${executorAddress.toLowerCase()}.${chainId}.${pepper}.${i + 1}.inco.org`);
364
445
  }
365
446
  static isIdByName(id) {
366
447
  return id.name !== undefined;
367
448
  }
368
- static plaintextFromValue(value) {
449
+ static plaintextFromValue(value, type) {
369
450
  if (typeof value === 'boolean') {
370
451
  return {
371
452
  scheme: encryptionSchemes.ecies,
@@ -376,7 +457,7 @@ export class Lightning {
376
457
  else if (typeof value === 'bigint' || typeof value === 'number') {
377
458
  return {
378
459
  scheme: encryptionSchemes.ecies,
379
- type: handleTypes.euint256,
460
+ type: type ?? handleTypes.euint256,
380
461
  value: BigInt(value),
381
462
  };
382
463
  }
@@ -384,5 +465,69 @@ export class Lightning {
384
465
  throw new Error(`Unsupported type ${typeof value}`);
385
466
  }
386
467
  }
468
+ static async getEciesPublicKey(client, executorAddress) {
469
+ const incoVerifier = await Lightning.getIncoVerifierContract(client, executorAddress);
470
+ return await incoVerifier.read.eciesPubkey();
471
+ }
472
+ static async getIncoVerifierContract(client, executorAddress) {
473
+ const incoLightningContract = getContract({
474
+ abi: incoLightningAbi,
475
+ address: executorAddress,
476
+ client,
477
+ });
478
+ const incoVerifierAddress = await incoLightningContract.read.incoVerifier();
479
+ const incoVerifier = getContract({
480
+ abi: incoVerifierAbi,
481
+ address: incoVerifierAddress,
482
+ client,
483
+ });
484
+ console.log('inco executor', incoLightningContract.address);
485
+ console.log('inco verifier', incoVerifier.address);
486
+ return incoVerifier;
487
+ }
488
+ /**
489
+ * Retrieves the verifier contract details including threshold, signers, and ECIES public key from the Inco Verifier contract.
490
+ *
491
+ * @param executorAddress The address of the Inco Lightning executor contract.
492
+ * @param client The public client to interact with the blockchain.
493
+ * @returns An object containing the threshold, signers, and ECIES public key.
494
+ */
495
+ static async getVerifierContractDetails(executorAddress, client) {
496
+ const incoVerifier = await Lightning.getIncoVerifierContract(client, executorAddress);
497
+ const threshold = await incoVerifier.read.getThreshold();
498
+ const eciesPubKey = await incoVerifier.read.eciesPubkey();
499
+ const signersCount = await incoVerifier.read.getSignersCount();
500
+ const signersPromises = [];
501
+ for (let i = BigInt(0); i < signersCount; i++) {
502
+ signersPromises.push(incoVerifier.read.getSignerAtIndex([i]));
503
+ }
504
+ const signers = await Promise.all(signersPromises);
505
+ return {
506
+ threshold: Number(threshold),
507
+ signers: signers.map(parseAddress),
508
+ eciesPubKey,
509
+ };
510
+ }
511
+ static async getChainConfig(deployment, client) {
512
+ if (this.supportsThresholdRetrieval(deployment)) {
513
+ return await this.getVerifierContractDetails(deployment.executorAddress, client);
514
+ }
515
+ return this.getDefaultThresholdAndSigners();
516
+ }
517
+ // Check if the deployment supports threshold retrieval based on its version
518
+ static supportsThresholdRetrieval(deployment) {
519
+ // Assumes that the threshold retrieval is supported if the smart contract / deployment version is greater than or equal to 1.1.0
520
+ return deployment.version?.major >= 1 && deployment.version?.minor >= 1;
521
+ }
522
+ // NOTE: we are proceeding with lot's of state braking changes and the defaults below can be removed
523
+ // once all deployments support threshold. signers and ecies pub key retrieval
524
+ // For now this is added to ensure that the tests that we have using previous deployments continue to work
525
+ static getDefaultThresholdAndSigners() {
526
+ return {
527
+ threshold: 1,
528
+ signers: [zeroAddress],
529
+ eciesPubKey: TEST_ECIES_PUB_KEY,
530
+ };
531
+ }
387
532
  }
388
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/lite/lightning.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,MAAM,aAAa,CAAC;AAClC,OAAO,EAGL,WAAW,EACX,UAAU,GAIX,MAAM,MAAM,CAAC;AACd,OAAO,EAAE,WAAW,EAAE,MAAM,aAAa,CAAC;AAC1C,OAAO,EACL,eAAe,EACf,yBAAyB,EACzB,yBAAyB,EACzB,qBAAqB,EACrB,gCAAgC,GACjC,MAAM,+BAA+B,CAAC;AAEvC,OAAO,EAAE,eAAe,EAAE,MAAM,wCAAwC,CAAC;AAEzE,OAAO,EAAE,eAAe,EAAE,MAAM,wCAAwC,CAAC;AAEzE,OAAO,EAAE,cAAc,EAAE,MAAM,sCAAsC,CAAC;AACtE,OAAO,EAAW,SAAS,EAAE,YAAY,EAAE,MAAM,cAAc,CAAC;AAEhE,OAAO,EAEL,iBAAiB,GAIlB,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,gBAAgB,EAAE,MAAM,gCAAgC,CAAC;AAClE,OAAO,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AAEhE,OAAO,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAC;AACjE,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAE,WAAW,EAAE,MAAM,cAAc,CAAC;AAC3C,OAAO,EAAgB,aAAa,EAAE,MAAM,mBAAmB,CAAC;AAGhE,OAAO,EAAE,KAAK,EAAE,MAAM,cAAc,CAAC;AACrC,OAAO,EACL,wBAAwB,EACxB,wBAAwB,EACxB,iBAAiB,GAElB,MAAM,YAAY,CAAC;AACpB,OAAO,EAAE,YAAY,EAAE,mBAAmB,EAAE,MAAM,gBAAgB,CAAC;AA6BnE,MAAM,aAAa,GAAoB,SAAS,CAAC;AAyBjD;;;GAGG;AACH,MAAM,OAAO,SAAS;IAQD;IACD;IARF,eAAe,CAAU;IACzB,OAAO,CAAS;IAEf,gBAAgB,CAAmB;IACnC,SAAS,CAA4B;IAEtD,YACmB,WAAc,EACf,cAAsB;QADrB,gBAAW,GAAX,WAAW,CAAG;QACf,mBAAc,GAAd,cAAc,CAAQ;QAEtC,IAAI,CAAC,eAAe,GAAG,YAAY,CAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACjE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE3C,IAAI,CAAC,gBAAgB,GAAG,wBAAwB,EAAE,CAAC;QACnD,IAAI,CAAC,SAAS,GAAG,YAAY,CAAC,cAAc,CAAC,CAAC;IAChD,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,kBAAkB;QAC7B,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE,CAAC,CAAC;IAC3D,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,KAAK,CAAC,SAAS,CACpB,GAAoC;QAEpC,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC,wBAAwB,CAAC,aAAa,CAAC,CAAC,CAAC;QACzE,CAAC;QACD,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC,wBAAwB,CAAC,GAAG,CAAC,CAAC,CAAC;QAC/D,CAAC;QACD,MAAM,IAAI,GAAG,wBAAwB,CAAC,aAAa,CAAC,CAAC;QACrD,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC;YAC5B,sEAAsE;YACtE,OAAO,EAAE,GAAG,CAAC,yBAAyB;gBACpC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,yBAAyB,CAAC;gBACvC,CAAC,CAAC,IAAI,CAAC,OAAO;YAChB,cAAc,EAAE,GAAG,CAAC,eAAe,IAAI,IAAI,CAAC,cAAc;YAC1D,eAAe,EACb,GAAG,CAAC,8BAA8B;gBAClC,IAAI,CAAC,eAAe;gBACpB,uBAAuB;YACzB,uCAAuC;YACvC,eAAe,EAAE,GAAG,CAAC,gBAAgB;YACrC,gBAAgB,EAAE,GAAG,CAAC,kBAAkB;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAC3B,QAAiB;QAEjB,MAAM,GAAG,GAAG,QAAQ,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAC/D,MAAM,GAAG,GAAG,aAAa,CAAC,GAAG,CAAC,CAAC;QAC/B,OAAO,MAAM,SAAS,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,EAAgB;QAC9B,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,CAAC,CAAC,oBAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,EAAE,CAAC,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CACtD;YACH,CAAC,CAAC,oBAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,eAAe,KAAK,EAAE,CAAC,eAAe;gBACxC,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAC3B,CAAC;QACN,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,2BAA2B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;QACnE,CAAC;QAED,OAAO,IAAI,SAAS,CAAC,UAAU,EAAE,SAAS,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC,CAAC;IAC5E,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS;QAET,OAAO,IAAI,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,cAAc,CAAC,CAAC;IACtD,CAAC;IAED,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAC5B,MAAoB,EACpB,eAAwB;QAExB,MAAM,qBAAqB,GAAG,WAAW,CAAC;YACxC,GAAG,EAAE,gBAAgB;YACrB,OAAO,EAAE,eAA0B;YACnC,MAAM;SACP,CAAC,CAAC;QACH,MAAM,mBAAmB,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QAC5E,MAAM,YAAY,GAAG,WAAW,CAAC;YAC/B,GAAG,EAAE,eAAe;YACpB,OAAO,EAAE,mBAA8B;YACvC,MAAM;SACP,CAAC,CAAC;QACH,OAAO,MAAM,YAAY,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;IAC/C,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,gBAAgB,CACrB,MAAS,EACT,OAAgB;QAEhB,sEAAsE;QACtE,MAAM,cAAc,GAAG,oBAAoB,CAAC,IAAI,CAC9C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,IAAI,CAAC,CAAC,OAAO,KAAK,OAAO,CACpD,CAAC;QACF,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,4GAA4G;YAC5G,wBAAwB;YACxB,MAAM,IAAI,KAAK,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;QACD,OAAO,cAAc,CAAC;IACxB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS,EACT,OAAgB;QAEhB,OAAO,MAAM,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IACzE,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,EAAE,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CACX,KAAQ,EACR,EAAE,cAAc,EAAE,WAAW,EAAqB,EAClD,SAAiC;QAEjC,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,SAAS,CAAC;YACrC,SAAS,EAAE,SAAS,CAAC,kBAAkB,CAAC,KAAK,CAAC;YAC9C,OAAO,EAAE;gBACP,WAAW,EAAE,IAAI,CAAC,OAAO;gBACzB,UAAU,EAAE,IAAI,CAAC,eAAe;gBAChC,WAAW,EAAE,YAAY,CAAC,cAAc,CAAC;gBACzC,eAAe,EAAE,YAAY,CAAC,WAAW,CAAC;aAC3C;SACF,CAAC,CAAC;QACH,OAAO,UAAU,CAAC,KAAK,CAAC;IAC1B,CAAC;IAED;;;;;;OAMG;IACH,cAAc,CACZ,YAAqD;QAErD,OAAO,mBAAmB,CAAC;YACzB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;SACxC,CAAC,CAAC;IACL,CAAC;IAED,YAAY,CAAC,WAAsB;QACjC,OAAO,iBAAiB,CAAC;YACvB,OAAO,EAAE,wBAAwB,CAC/B,UAAU,CAAC,KAAK,CAAC,SAAS,EAAE,WAAW,CAAC,CAAC,CAC1C;YACD,QAAQ,EAAE,IAAI,CAAC,gBAAgB;SAChC,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACH,+BAA+B,CAC7B,YAAqD,EACrD,cAAsB,EACtB,SAAe,EACf,sBAA8B;QAE9B,OAAO,eAAe,CAAC;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,8BAA8B,EAAE,YAAY,CAAC,sBAAsB,CAAC;YACpE,cAAc,EAAE,YAAY,CAAC,cAAc,CAAC;YAC5C,kBAAkB,EAAE,YAAY;YAChC,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACH,uBAAuB,CACrB,uBAAgD,EAChD,gBAAkC;QAElC,OAAO,qBAAqB,CAAC;YAC3B,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,gBAAgB;YAChB,uBAAuB;SACxB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;OAQG;IACH,gCAAgC,CAC9B,YAAqD;QAErD,OAAO,gCAAgC,CAAC,IAAI,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IAC9E,CAAC;IA2CD,eAAe,CACb,IAAgE,EAChE,IAA2C,EAC3C,IAA2C,EAC3C,IAA6B;QAE7B,IAAI,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;YACxB,MAAM,YAAY,GAAG,IAA+C,CAAC;YACrE,MAAM,OAAO,GAAG,IAAmB,CAAC;YACpC,MAAM,aAAa,GAAG,IAA0C,CAAC;YACjE,OAAO,eAAe,CAAC;gBACrB,OAAO;gBACP,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,YAAY;gBACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;aAC9C,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,MAAM,gBAAgB,GAAG,IAAwB,CAAC;YAClD,MAAM,uBAAuB,GAAG,IAA+B,CAAC;YAChE,MAAM,OAAO,GAAG,IAAmB,CAAC;YACpC,MAAM,aAAa,GAAG,IAA0C,CAAC;YACjE,OAAO,yBAAyB,CAAC;gBAC/B,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;gBAC7C,gBAAgB;gBAChB,uBAAuB;gBACvB,OAAO;aACR,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAuDD,eAAe,CACb,IAAgE,EAChE,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,IAAuD,EACvD,IAA6B;QAE7B,IACE,OAAO,IAAI,KAAK,QAAQ;YACxB,IAAI,KAAK,IAAI;YACb,SAAS,IAAI,IAAI;YACjB,kBAAkB,IAAI,IAAI;YAC1B,QAAQ,IAAI,IAAI,EAChB,CAAC;YACD,mBAAmB;YACnB,MAAM,gBAAgB,GAAG,IAAwB,CAAC;YAClD,MAAM,uBAAuB,GAAG,IAA+B,CAAC;YAChE,MAAM,aAAa,GAAG,IAAI,CAAC;YAC3B,OAAO,yBAAyB,CAAC;gBAC/B,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;gBAC7C,gBAAgB;gBAChB,uBAAuB;gBACvB,SAAS;gBACT,EAAE;gBACF,YAAY;gBACZ,aAAa;aACd,CAAC,CAAC;QACL,CAAC;QAED,qBAAqB;QACrB,MAAM,YAAY,GAAG,IAA+C,CAAC;QACrE,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,eAAe,CAAC;YACrB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;OAYG;IACH,cAAc,CACZ,OAAoB,EACpB,aAAsC;QAEtC,OAAO,cAAc,CAAC;YACpB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;SAC9C,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,iBAAiB,CAC7B,UAAgD;QAEhD,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,UAAU,CAAC;QACxD,OAAO,WAAW,eAAe,CAAC,WAAW,EAAE,IAAI,OAAO,IAAI,MAAM,WAAW,CAAC;IAClF,CAAC;IAEO,MAAM,CAAC,UAAU,CAAC,EAAgB;QACxC,OAAQ,EAAuB,CAAC,IAAI,KAAK,SAAS,CAAC;IACrD,CAAC;IAEO,MAAM,CAAC,kBAAkB,CAC/B,KAAQ;QAER,IAAI,OAAO,KAAK,KAAK,SAAS,EAAE,CAAC;YAC/B,OAAO;gBACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,WAAW,CAAC,KAAK;gBACvB,KAAK,EAAE,KAAK;aACsC,CAAC;QACvD,CAAC;aAAM,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAClE,OAAO;gBACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,WAAW,CAAC,QAAQ;gBAC1B,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC;aAC8B,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oBAAoB,OAAO,KAAK,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;CACF"}
533
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/lite/lightning.ts"],"names":[],"mappings":"AAAA,OAAO,EAGL,kBAAkB,EAClB,WAAW,EAEX,UAAU,EACV,IAAI,EAIJ,WAAW,GACZ,MAAM,MAAM,CAAC;AACd,OAAO,EAAE,WAAW,EAAE,MAAM,aAAa,CAAC;AAC1C,OAAO,EACL,eAAe,EACf,yBAAyB,EACzB,yBAAyB,EACzB,gCAAgC,GACjC,MAAM,+BAA+B,CAAC;AAEvC,OAAO,EAAE,eAAe,IAAI,sBAAsB,EAAE,MAAM,wCAAwC,CAAC;AAEnG,OAAO,EAAE,eAAe,EAAE,MAAM,wCAAwC,CAAC;AAKzE,OAAO,EAAW,SAAS,EAAE,YAAY,EAAE,MAAM,cAAc,CAAC;AAEhE,OAAO,EAEL,iBAAiB,GAIlB,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,gBAAgB,EAAE,MAAM,gCAAgC,CAAC;AAClE,OAAO,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAC;AACjE,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAW,WAAW,EAAE,MAAM,cAAc,CAAC;AACpD,OAAO,EAAE,YAAY,EAAE,MAAM,aAAa,CAAC;AAC3C,OAAO,EAAE,eAAe,EAAE,MAAM,wBAAwB,CAAC;AACzD,OAAO,EAAgB,aAAa,EAAE,MAAM,mBAAmB,CAAC;AAEhE,OAAO,EAAE,KAAK,EAAE,MAAM,cAAc,CAAC;AACrC,OAAO,EACL,wBAAwB,EACxB,wBAAwB,EACxB,iBAAiB,EAEjB,kBAAkB,GACnB,MAAM,YAAY,CAAC;AA6BpB,MAAM,aAAa,GAAoB,SAAS,CAAC;AAEjD,SAAS,kBAAkB,CAAC,KAAc;IACxC,OAAO,CAAC,CAAC,KAAK,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,IAAI,IAAI,KAAK,CAAC;AAC/D,CAAC;AAwCD,SAAS,wBAAwB,CAC/B,KAA2D;IAE3D,OAAO,CACL,CAAC,CAAC,KAAK;QACP,OAAO,KAAK,KAAK,QAAQ;QACzB,UAAU,IAAI,KAAK;QACnB,OAAQ,KAAiC,CAAC,QAAQ,KAAK,QAAQ,CAChE,CAAC;AACJ,CAAC;AAED;;;GAGG;AACH,MAAM,OAAO,SAAS;IASD;IACA;IACA;IACA;IACA;IAZH,eAAe,CAAU;IACzB,OAAO,CAAS;IAEf,gBAAgB,CAAmB;IACnC,eAAe,CAAkB;IACjC,SAAS,CAAyB;IAEnD,YACmB,WAAc,EACd,eAAyB,EACzB,OAAkB,EAClB,SAAiB,EACjB,WAAsB;QAJtB,gBAAW,GAAX,WAAW,CAAG;QACd,oBAAe,GAAf,eAAe,CAAU;QACzB,YAAO,GAAP,OAAO,CAAW;QAClB,cAAS,GAAT,SAAS,CAAQ;QACjB,gBAAW,GAAX,WAAW,CAAW;QAEvC,IAAI,CAAC,eAAe,GAAG,YAAY,CAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACjE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE3C,IAAI,CAAC,gBAAgB,GAAG,wBAAwB,EAAE,CAAC;QACnD,IAAI,CAAC,SAAS,GAAG,iBAAiB,CAAC;YACjC,OAAO,EAAE,wBAAwB,CAC/B,UAAU,CAAC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAC/C;YACD,QAAQ,EAAE,IAAI,CAAC,gBAAgB;SAChC,CAAC,CAAC;QAEH,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC,QAAQ,CAC7C,IAAI,CAAC,eAAe,EACpB,IAAI,CAAC,OAAO,EACZ,IAAI,CAAC,SAAS,CACf,CAAC;IACJ,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,kBAAkB;QAC7B,OAAO,SAAS,CAAC,MAAM,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE,CAAC,CAAC;IACrD,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,KAAK,CAAC,SAAS,CACpB,GAAoC;QAEpC,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,MAAM,MAAM,GAAG,wBAAwB,CAAC,aAAa,CAAC,CAAC;YACvD,OAAO,SAAS,CAAC,MAAM,CAAC;gBACtB,GAAG,MAAM;gBACT,eAAe,EAAE,CAAC,GAAG,MAAM,CAAC,eAAe,CAAC;gBAC5C,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;aACpD,CAAC,CAAC;QACL,CAAC;QACD,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,MAAM,MAAM,GAAG,wBAAwB,CAAC,GAAG,CAAC,CAAC;YAC7C,OAAO,SAAS,CAAC,MAAM,CAAC;gBACtB,GAAG,MAAM;gBACT,eAAe,EAAE,CAAC,GAAG,MAAM,CAAC,eAAe,CAAC;gBAC5C,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;aACpD,CAAC,CAAC;QACL,CAAC;QACD,MAAM,IAAI,GAAG,wBAAwB,CAAC,aAAa,CAAC,CAAC;QAErD,OAAO,SAAS,CAAC,MAAM,CAAC;YACtB,sEAAsE;YACtE,OAAO,EAAE,GAAG,CAAC,yBAAyB;gBACpC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,yBAAyB,CAAC;gBACvC,CAAC,CAAC,IAAI,CAAC,OAAO;YAChB,eAAe,EAAE,GAAG,CAAC,eAAe;gBAClC,CAAC,CAAC,GAAG,CAAC,eAAe,CAAC,KAAK,CAAC,GAAG,CAAC;gBAChC,CAAC,CAAC,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC;YAC7B,OAAO,EAAE,GAAG,CAAC,qBAAqB;gBAChC,CAAC,CAAC,GAAG,CAAC,qBAAqB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CACnD,YAAY,CAAC,OAAO,CAAC,CACtB;gBACH,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;YAC5C,eAAe,EACb,GAAG,CAAC,8BAA8B;gBAClC,IAAI,CAAC,eAAe;gBACpB,uBAAuB;YACzB,uCAAuC;YACvC,eAAe,EAAE,GAAG,CAAC,gBAAgB;YACrC,gBAAgB,EAAE,GAAG,CAAC,kBAAkB;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAC3B,MAAiD;QAEjD,IAAI,UAAuC,CAAC;QAC5C,IAAI,wBAAwB,CAAC,MAAM,CAAC,EAAE,CAAC;YACrC,IAAI,OAAO,OAAO,KAAK,WAAW,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,IAAI,EAAE,CAAC;gBAC9D,MAAM,IAAI,KAAK,CACb,qFAAqF,CACtF,CAAC;YACJ,CAAC;YACD,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,MAAM,CAAC,aAAa,CAAC,CAAC;YACjD,UAAU,GAAG,MAAM,QAAQ,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;QAC/C,CAAC;aAAM,CAAC;YACN,UAAU,GAAG,MAAM,CAAC;QACtB,CAAC;QACD,MAAM,GAAG,GAAG,aAAa,CAAC,UAAU,CAAC,CAAC;QACtC,OAAO,MAAM,SAAS,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,EAAgB;QAC9B,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,CAAC,CAAC,oBAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,EAAE,CAAC,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CACtD;YACH,CAAC,CAAC,oBAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,eAAe,KAAK,EAAE,CAAC,eAAe;gBACxC,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAC3B,CAAC;QACN,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,2BAA2B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;QACnE,CAAC;QAED,MAAM,KAAK,GAAG,YAAY,CAAC,EAAE,EAAE,EAAE,UAAU,CAAC,OAAO,EAAE,CAAC,CAAC;QACvD,MAAM,MAAM,GAAG,kBAAkB,CAAC;YAChC,KAAK;YACL,SAAS,EAAE,IAAI,EAAE;SAClB,CAAC,CAAC;QAEH,MAAM,EAAE,SAAS,EAAE,OAAO,EAAE,WAAW,EAAE,GAAG,MAAM,SAAS,CAAC,cAAc,CACxE,UAAU,EACV,MAAM,CACP,CAAC;QAEF,OAAO,IAAI,SAAS,CAClB,UAAU,EACV,SAAS,CAAC,kBAAkB,CAAC,UAAU,EAAE,SAAS,CAAC,EACnD,OAAO,EACP,SAAS,EACT,WAAW,CACZ,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS;QAET,MAAM,KAAK,GAAG,YAAY,CAAC,EAAE,EAAE,EAAE,MAAM,CAAC,OAAO,EAAE,CAAC,CAAC;QACnD,MAAM,MAAM,GAAG,kBAAkB,CAAC;YAChC,KAAK;YACL,SAAS,EAAE,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE;SAC1E,CAAC,CAAC;QAEH,MAAM,EAAE,SAAS,EAAE,OAAO,EAAE,WAAW,EAAE,GACvC,MAAM,SAAS,CAAC,0BAA0B,CACxC,MAAM,CAAC,eAA0B,EACjC,MAAM,CACP,CAAC;QAEJ,OAAO,IAAI,SAAS,CAClB,MAAM,EACN,MAAM,CAAC,eAAe,EACtB,OAAO,EACP,SAAS,EACT,WAAW,CACZ,CAAC;IACJ,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,gBAAgB,CACrB,MAAS,EACT,OAAgB;QAEhB,sEAAsE;QACtE,MAAM,cAAc,GAAG,oBAAoB,CAAC,IAAI,CAC9C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,IAAI,CAAC,CAAC,OAAO,KAAK,OAAO,CACpD,CAAC;QACF,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,4GAA4G;YAC5G,wBAAwB;YACxB,MAAM,IAAI,KAAK,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;QACD,OAAO,cAAc,CAAC;IACxB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS,EACT,OAAgB;QAEhB,OAAO,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,EAAE,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC;IAED;;;;;;;;;;;OAWG;IACH,KAAK,CAAC,OAAO,CACX,KAAQ,EACR,EAAE,cAAc,EAAE,WAAW,EAAE,UAAU,EAAqB;QAE9D,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC;YAC1C,SAAS,EAAE,SAAS,CAAC,kBAAkB,CAAC,KAAK,EAAE,UAAU,CAAC;YAC1D,OAAO,EAAE;gBACP,WAAW,EAAE,IAAI,CAAC,OAAO;gBACzB,UAAU,EAAE,IAAI,CAAC,eAAe;gBAChC,WAAW,EAAE,YAAY,CAAC,cAAc,CAAC;gBACzC,eAAe,EAAE,YAAY,CAAC,WAAW,CAAC;aAC3C;SACF,CAAC,CAAC;QAEH,OAAO,UAAU,CAAC,KAAK,CAAC;IAC1B,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACH,+BAA+B,CAC7B,YAAqD,EACrD,cAAsB,EACtB,SAAe,EACf,sBAA8B;QAE9B,OAAO,eAAe,CAAC;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,8BAA8B,EAAE,YAAY,CAAC,sBAAsB,CAAC;YACpE,cAAc,EAAE,YAAY,CAAC,cAAc,CAAC;YAC5C,kBAAkB,EAAE,YAAY;YAChC,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;OAQG;IACH,gCAAgC,CAC9B,YAAqD;QAErD,OAAO,gCAAgC,CAAC,IAAI,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IAC9E,CAAC;IAoDD,eAAe,CACb,YAAqD,EACrD,OAAoB,EACpB,IAA0C,EAC1C,IAAgD,EAChD,IAA6B;QAM7B,IAAI,IAAI,YAAY,UAAU,EAAE,CAAC;YAC/B,MAAM,eAAe,GAAG,IAAI,CAAC;YAC7B,IAAI,gBAA8C,CAAC;YACnD,IAAI,aAAiD,CAAC;YAEtD,IAAI,IAAI,IAAI,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrC,gBAAgB,GAAG,IAAI,CAAC;gBACxB,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;iBAAM,CAAC;gBACN,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;YAED,IAAI,gBAAgB,EAAE,CAAC;gBACrB,OAAO,eAAe,CAAC;oBACrB,OAAO;oBACP,aAAa;oBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;oBACjD,YAAY;oBACZ,eAAe,EAAE,IAAI,CAAC,eAAe;oBACrC,eAAe;oBACf,gBAAgB;iBACjB,CAEA,CAAC;YACJ,CAAC;YAED,OAAO,eAAe,CAAC;gBACrB,OAAO;gBACP,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,YAAY;gBACZ,eAAe,EAAE,IAAI,CAAC,eAAe;gBACrC,eAAe;aAChB,CAEA,CAAC;QACJ,CAAC;QAED,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,eAAe,CAAC;YACrB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,YAAY;YACZ,eAAe,EAAE,IAAI,CAAC,eAAe;SACtC,CAAyE,CAAC;IAC7E,CAAC;IAoDD,0BAA0B,CACxB,gBAAkC,EAClC,uBAAgD,EAChD,OAAoB,EACpB,IAA0C,EAC1C,IAAgD,EAChD,IAA6B;QAM7B,IAAI,IAAI,YAAY,UAAU,EAAE,CAAC;YAC/B,MAAM,eAAe,GAAG,IAAI,CAAC;YAC7B,IAAI,gBAA8C,CAAC;YACnD,IAAI,aAAiD,CAAC;YAEtD,IAAI,IAAI,IAAI,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrC,gBAAgB,GAAG,IAAI,CAAC;gBACxB,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;iBAAM,CAAC;gBACN,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;YAED,IAAI,gBAAgB,EAAE,CAAC;gBACrB,OAAO,yBAAyB,CAAC;oBAC/B,aAAa;oBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;oBACjD,eAAe,EAAE,IAAI,CAAC,eAAe;oBACrC,gBAAgB;oBAChB,uBAAuB;oBACvB,OAAO;oBACP,eAAe;oBACf,gBAAgB;iBACjB,CAEA,CAAC;YACJ,CAAC;YAED,OAAO,yBAAyB,CAAC;gBAC/B,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,eAAe,EAAE,IAAI,CAAC,eAAe;gBACrC,gBAAgB;gBAChB,uBAAuB;gBACvB,OAAO;gBACP,eAAe;aAChB,CAEA,CAAC;QACJ,CAAC;QAED,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,yBAAyB,CAAC;YAC/B,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,gBAAgB;YAChB,uBAAuB;YACvB,OAAO;SACR,CAAyE,CAAC;IAC7E,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACH,eAAe,CACb,YAAqD,EACrD,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,aAAsC;QAEtC,OAAO,sBAAsB,CAAC;YAC5B,YAAY;YACZ,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;OAaG;IACH,0BAA0B,CACxB,gBAAkC,EAClC,uBAAgD,EAChD,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,aAAsC;QAEtC,OAAO,yBAAyB,CAAC;YAC/B,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,gBAAgB;YAChB,uBAAuB;YACvB,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;OAYG;IACH,cAAc,CACZ,OAAoB,EACpB,aAAsC;QAEtC,OAAO,eAAe,CAAC;YACrB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;SACtC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,kBAAkB,CAC9B,UAAgD,EAChD,SAAiB;QAEjB,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,UAAU,CAAC;QACxD,OAAO,KAAK,CAAC,IAAI,CACf,EAAE,MAAM,EAAE,SAAS,EAAE,EACrB,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CACP,WAAW,eAAe,CAAC,WAAW,EAAE,IAAI,OAAO,IAAI,MAAM,IAAI,CAAC,GAAG,CAAC,WAAW,CACpF,CAAC;IACJ,CAAC;IAEO,MAAM,CAAC,UAAU,CAAC,EAAgB;QACxC,OAAQ,EAAuB,CAAC,IAAI,KAAK,SAAS,CAAC;IACrD,CAAC;IAEO,MAAM,CAAC,kBAAkB,CAC/B,KAAQ,EACR,IAAc;QAEd,IAAI,OAAO,KAAK,KAAK,SAAS,EAAE,CAAC;YAC/B,OAAO;gBACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,WAAW,CAAC,KAAK;gBACvB,KAAK,EAAE,KAAK;aACsC,CAAC;QACvD,CAAC;aAAM,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAClE,OAAO;gBACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,IAAI,IAAI,WAAW,CAAC,QAAQ;gBAClC,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC;aAC8B,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oBAAoB,OAAO,KAAK,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;IAEM,MAAM,CAAC,KAAK,CAAC,iBAAiB,CACnC,MAAoB,EACpB,eAAwB;QAExB,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,uBAAuB,CAC1D,MAAM,EACN,eAAe,CAChB,CAAC;QACF,OAAO,MAAM,YAAY,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;IAC/C,CAAC;IAEM,MAAM,CAAC,KAAK,CAAC,uBAAuB,CACzC,MAAoB,EACpB,eAAwB;QAIxB,MAAM,qBAAqB,GAAG,WAAW,CAAC;YACxC,GAAG,EAAE,gBAAgB;YACrB,OAAO,EAAE,eAAe;YACxB,MAAM;SACP,CAAC,CAAC;QACH,MAAM,mBAAmB,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QAC5E,MAAM,YAAY,GAAG,WAAW,CAAC;YAC/B,GAAG,EAAE,eAAe;YACpB,OAAO,EAAE,mBAA8B;YACvC,MAAM;SACP,CAAC,CAAC;QACH,OAAO,CAAC,GAAG,CAAC,eAAe,EAAE,qBAAqB,CAAC,OAAO,CAAC,CAAC;QAC5D,OAAO,CAAC,GAAG,CAAC,eAAe,EAAE,YAAY,CAAC,OAAO,CAAC,CAAC;QAEnD,OAAO,YAAY,CAAC;IACtB,CAAC;IAED;;;;;;OAMG;IACK,MAAM,CAAC,KAAK,CAAC,0BAA0B,CAC7C,eAAwB,EACxB,MAAoB;QAEpB,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,uBAAuB,CAC1D,MAAM,EACN,eAAe,CAChB,CAAC;QAEF,MAAM,SAAS,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QACzD,MAAM,WAAW,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;QAE1D,MAAM,YAAY,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,eAAe,EAAE,CAAC;QAC/D,MAAM,eAAe,GAAG,EAAE,CAAC;QAC3B,KAAK,IAAI,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,YAAY,EAAE,CAAC,EAAE,EAAE,CAAC;YAC9C,eAAe,CAAC,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QAChE,CAAC;QACD,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC;QAEnD,OAAO;YACL,SAAS,EAAE,MAAM,CAAC,SAAS,CAAC;YAC5B,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC;YAClC,WAAW;SACZ,CAAC;IACJ,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,cAAc,CACjC,UAAsB,EACtB,MAAoB;QAEpB,IAAI,IAAI,CAAC,0BAA0B,CAAC,UAAU,CAAC,EAAE,CAAC;YAChD,OAAO,MAAM,IAAI,CAAC,0BAA0B,CAC1C,UAAU,CAAC,eAA0B,EACrC,MAAM,CACP,CAAC;QACJ,CAAC;QACD,OAAO,IAAI,CAAC,6BAA6B,EAAE,CAAC;IAC9C,CAAC;IAED,4EAA4E;IACpE,MAAM,CAAC,0BAA0B,CAAC,UAAsB;QAC9D,iIAAiI;QACjI,OAAO,UAAU,CAAC,OAAO,EAAE,KAAK,IAAI,CAAC,IAAI,UAAU,CAAC,OAAO,EAAE,KAAK,IAAI,CAAC,CAAC;IAC1E,CAAC;IAED,oGAAoG;IACpG,8EAA8E;IAC9E,0GAA0G;IAClG,MAAM,CAAC,6BAA6B;QAC1C,OAAO;YACL,SAAS,EAAE,CAAC;YACZ,OAAO,EAAE,CAAC,WAAsB,CAAC;YACjC,WAAW,EAAE,kBAAkB;SAChC,CAAC;IACJ,CAAC;CACF"}
@@ -4,13 +4,12 @@ export declare const LocalNodeEnv: Schema.Struct<{
4
4
  STATE_DUMP: typeof Schema.String;
5
5
  EXECUTOR_ADDRESS: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
6
6
  ECIES_PUBLIC_KEY: Schema.TemplateLiteral<`0x${string}`>;
7
- CALLBACK_ADDRESS: Schema.TemplateLiteral<`0x${string}`>;
8
7
  SENDER_ADDRESS: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
9
8
  SENDER_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
9
+ EIP712_SIGNER_ADDRESS: Schema.optional<Schema.TemplateLiteral<`0x${string}`>>;
10
10
  PEPPER: typeof Schema.String;
11
11
  COVALIDATOR_ECIES_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
12
12
  COVALIDATOR_EIP712_PRIVATE_SIGNING_KEY: Schema.TemplateLiteral<`0x${string}`>;
13
- COVALIDATOR_CALLBACK_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
14
13
  COVALIDATOR_ACL_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
15
14
  COVALIDATOR_INCO_EXECUTOR_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
16
15
  COVALIDATOR_DECRYPTION_HANDLER_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;