@inco/js 0.6.9 → 0.7.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -8
- package/dist/cjs/advancedacl/session-key.d.ts +39 -26
- package/dist/cjs/advancedacl/session-key.js +53 -136
- package/dist/cjs/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/cjs/attestedcompute/attested-compute.js +5 -35
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +36 -21
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +107 -108
- package/dist/cjs/attesteddecrypt/types.d.ts +4 -4
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +3 -4
- package/dist/cjs/generated/lightning.d.ts +40 -0
- package/dist/cjs/generated/lightning.js +43 -1
- package/dist/cjs/generated/local-node.d.ts +11 -7
- package/dist/cjs/generated/local-node.js +28 -8
- package/dist/cjs/kms/client.d.ts +8 -4
- package/dist/cjs/kms/client.js +9 -4
- package/dist/cjs/kms/quorumClient.d.ts +58 -0
- package/dist/cjs/kms/quorumClient.js +378 -0
- package/dist/cjs/kms/thresholdPromises.d.ts +7 -0
- package/dist/cjs/kms/thresholdPromises.js +52 -0
- package/dist/cjs/lite/ecies.d.ts +2 -0
- package/dist/cjs/lite/ecies.js +5 -2
- package/dist/cjs/lite/index.d.ts +0 -1
- package/dist/cjs/lite/index.js +1 -2
- package/dist/cjs/lite/lightning.d.ts +110 -74
- package/dist/cjs/lite/lightning.js +272 -127
- package/dist/cjs/local/local-node.d.ts +1 -2
- package/dist/cjs/local/local-node.js +2 -3
- package/dist/cjs/test/mocks.d.ts +3 -0
- package/dist/cjs/test/mocks.js +19 -1
- package/dist/cjs/viem.d.ts +2 -4
- package/dist/cjs/viem.js +6 -2
- package/dist/esm/advancedacl/session-key.d.ts +39 -26
- package/dist/esm/advancedacl/session-key.js +44 -126
- package/dist/esm/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/esm/attestedcompute/attested-compute.js +6 -36
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +36 -21
- package/dist/esm/attesteddecrypt/attested-decrypt.js +106 -108
- package/dist/esm/attesteddecrypt/types.d.ts +4 -4
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +1 -1
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +2 -3
- package/dist/esm/generated/lightning.d.ts +40 -0
- package/dist/esm/generated/lightning.js +43 -1
- package/dist/esm/generated/local-node.d.ts +11 -7
- package/dist/esm/generated/local-node.js +28 -8
- package/dist/esm/kms/client.d.ts +8 -4
- package/dist/esm/kms/client.js +8 -4
- package/dist/esm/kms/quorumClient.d.ts +58 -0
- package/dist/esm/kms/quorumClient.js +374 -0
- package/dist/esm/kms/thresholdPromises.d.ts +7 -0
- package/dist/esm/kms/thresholdPromises.js +49 -0
- package/dist/esm/lite/ecies.d.ts +2 -0
- package/dist/esm/lite/ecies.js +4 -2
- package/dist/esm/lite/index.d.ts +0 -1
- package/dist/esm/lite/index.js +1 -2
- package/dist/esm/lite/lightning.d.ts +110 -74
- package/dist/esm/lite/lightning.js +276 -131
- package/dist/esm/local/local-node.d.ts +1 -2
- package/dist/esm/local/local-node.js +2 -3
- package/dist/esm/test/mocks.d.ts +3 -0
- package/dist/esm/test/mocks.js +17 -1
- package/dist/esm/viem.d.ts +2 -4
- package/dist/esm/viem.js +6 -2
- package/dist/types/advancedacl/session-key.d.ts +39 -26
- package/dist/types/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +36 -21
- package/dist/types/attesteddecrypt/types.d.ts +4 -4
- package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +15 -1
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +13 -5
- package/dist/types/generated/lightning.d.ts +40 -0
- package/dist/types/generated/local-node.d.ts +11 -7
- package/dist/types/kms/client.d.ts +8 -4
- package/dist/types/kms/quorumClient.d.ts +58 -0
- package/dist/types/kms/thresholdPromises.d.ts +7 -0
- package/dist/types/lite/ecies.d.ts +2 -0
- package/dist/types/lite/index.d.ts +0 -1
- package/dist/types/lite/lightning.d.ts +110 -74
- package/dist/types/local/local-node.d.ts +1 -2
- package/dist/types/test/mocks.d.ts +3 -0
- package/dist/types/viem.d.ts +2 -4
- package/package.json +6 -3
- package/dist/cjs/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/cjs/attestedreveal/attested-reveal.js +0 -69
- package/dist/cjs/attestedreveal/index.d.ts +0 -1
- package/dist/cjs/attestedreveal/index.js +0 -18
- package/dist/cjs/attestedreveal/types.d.ts +0 -7
- package/dist/cjs/attestedreveal/types.js +0 -16
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/cjs/generated/es/cosmos_proto/cosmos_pb.js +0 -118
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/cjs/generated/es/inco/fhe/v1/types_pb.js +0 -136
- package/dist/cjs/lite/reencrypt.d.ts +0 -21
- package/dist/cjs/lite/reencrypt.js +0 -141
- package/dist/esm/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/esm/attestedreveal/attested-reveal.js +0 -66
- package/dist/esm/attestedreveal/index.d.ts +0 -1
- package/dist/esm/attestedreveal/index.js +0 -2
- package/dist/esm/attestedreveal/types.d.ts +0 -7
- package/dist/esm/attestedreveal/types.js +0 -12
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/esm/generated/es/cosmos_proto/cosmos_pb.js +0 -115
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/esm/generated/es/inco/fhe/v1/types_pb.js +0 -133
- package/dist/esm/lite/reencrypt.d.ts +0 -21
- package/dist/esm/lite/reencrypt.js +0 -131
- package/dist/types/attestedreveal/attested-reveal.d.ts +0 -21
- package/dist/types/attestedreveal/index.d.ts +0 -1
- package/dist/types/attestedreveal/types.d.ts +0 -7
- package/dist/types/generated/es/cosmos_proto/cosmos_pb.d.ts +0 -174
- package/dist/types/generated/es/inco/fhe/v1/types_pb.d.ts +0 -419
- package/dist/types/lite/reencrypt.d.ts +0 -21
|
@@ -1,13 +1,11 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.Lightning = void 0;
|
|
4
|
-
const fs = require("fs/promises");
|
|
5
4
|
const viem_1 = require("viem");
|
|
6
5
|
const chains_1 = require("viem/chains");
|
|
7
6
|
const session_key_js_1 = require("../advancedacl/session-key.js");
|
|
8
7
|
const attested_compute_js_1 = require("../attestedcompute/attested-compute.js");
|
|
9
8
|
const attested_decrypt_js_1 = require("../attesteddecrypt/attested-decrypt.js");
|
|
10
|
-
const attested_reveal_js_1 = require("../attestedreveal/attested-reveal.js");
|
|
11
9
|
const binary_js_1 = require("../binary.js");
|
|
12
10
|
const index_js_1 = require("../encryption/index.js");
|
|
13
11
|
const lightning_js_1 = require("../generated/abis/lightning.js");
|
|
@@ -15,35 +13,56 @@ const verifier_js_1 = require("../generated/abis/verifier.js");
|
|
|
15
13
|
const lightning_js_2 = require("../generated/lightning.js");
|
|
16
14
|
const local_node_js_1 = require("../generated/local-node.js");
|
|
17
15
|
const handle_js_1 = require("../handle.js");
|
|
18
|
-
const index_js_2 = require("../
|
|
16
|
+
const index_js_2 = require("../index.js");
|
|
17
|
+
const quorumClient_js_1 = require("../kms/quorumClient.js");
|
|
18
|
+
const index_js_3 = require("../local/index.js");
|
|
19
19
|
const schema_js_1 = require("../schema.js");
|
|
20
20
|
const ecies_js_1 = require("./ecies.js");
|
|
21
|
-
const reencrypt_js_1 = require("./reencrypt.js");
|
|
22
21
|
const DefaultPepper = 'testnet';
|
|
22
|
+
function isSecp256k1Keypair(value) {
|
|
23
|
+
return !!value && typeof value === 'object' && 'kp' in value;
|
|
24
|
+
}
|
|
25
|
+
function isLocalNodeEnvFileSource(value) {
|
|
26
|
+
return (!!value &&
|
|
27
|
+
typeof value === 'object' &&
|
|
28
|
+
'filePath' in value &&
|
|
29
|
+
typeof value.filePath === 'string');
|
|
30
|
+
}
|
|
23
31
|
/**
|
|
24
32
|
* The Lightning class provides a convenient way to interact with the Inco Lightning contract by binding to a specific
|
|
25
33
|
* deployment.
|
|
26
34
|
*/
|
|
27
35
|
class Lightning {
|
|
28
36
|
_deployment;
|
|
29
|
-
|
|
37
|
+
covalidatorUrls;
|
|
38
|
+
signers;
|
|
39
|
+
threshold;
|
|
40
|
+
eciesPubKey;
|
|
30
41
|
executorAddress;
|
|
31
42
|
chainId;
|
|
32
43
|
ephemeralKeypair;
|
|
33
|
-
|
|
34
|
-
|
|
44
|
+
kmsQuorumClient;
|
|
45
|
+
encryptor;
|
|
46
|
+
constructor(_deployment, covalidatorUrls, signers, threshold, eciesPubKey) {
|
|
35
47
|
this._deployment = _deployment;
|
|
36
|
-
this.
|
|
48
|
+
this.covalidatorUrls = covalidatorUrls;
|
|
49
|
+
this.signers = signers;
|
|
50
|
+
this.threshold = threshold;
|
|
51
|
+
this.eciesPubKey = eciesPubKey;
|
|
37
52
|
this.executorAddress = (0, binary_js_1.parseAddress)(_deployment.executorAddress);
|
|
38
53
|
this.chainId = BigInt(_deployment.chainId);
|
|
39
54
|
this.ephemeralKeypair = (0, ecies_js_1.generateSecp256k1Keypair)();
|
|
40
|
-
this.
|
|
55
|
+
this.encryptor = (0, ecies_js_1.getEciesEncryptor)({
|
|
56
|
+
pubKeyA: (0, ecies_js_1.decodeSecp256k1PublicKey)((0, viem_1.hexToBytes)((0, schema_js_1.parse)(binary_js_1.HexString, this.eciesPubKey))),
|
|
57
|
+
privKeyB: this.ephemeralKeypair,
|
|
58
|
+
});
|
|
59
|
+
this.kmsQuorumClient = quorumClient_js_1.KmsQuorumClient.fromUrls(this.covalidatorUrls, this.signers, this.threshold);
|
|
41
60
|
}
|
|
42
61
|
/**
|
|
43
62
|
* Get a Lightning instance bound to the latest Lightning deployment for the Base Sepolia testnet.
|
|
44
63
|
*/
|
|
45
64
|
static async baseSepoliaTestnet() {
|
|
46
|
-
return
|
|
65
|
+
return Lightning.latest('testnet', chains_1.baseSepolia.id);
|
|
47
66
|
}
|
|
48
67
|
/**
|
|
49
68
|
* Get a Lightning instance bound to our canonical Anvil-based test node and test Covalidator node
|
|
@@ -62,18 +81,33 @@ class Lightning {
|
|
|
62
81
|
*/
|
|
63
82
|
static async localNode(env) {
|
|
64
83
|
if (!env) {
|
|
65
|
-
|
|
84
|
+
const config = local_node_js_1.localNodeLightningConfig[DefaultPepper];
|
|
85
|
+
return Lightning.custom({
|
|
86
|
+
...config,
|
|
87
|
+
covalidatorUrls: [...config.covalidatorUrls],
|
|
88
|
+
signers: config.signers.map((s) => (0, binary_js_1.parseAddress)(s)),
|
|
89
|
+
});
|
|
66
90
|
}
|
|
67
91
|
if (typeof env === 'string') {
|
|
68
|
-
|
|
92
|
+
const config = local_node_js_1.localNodeLightningConfig[env];
|
|
93
|
+
return Lightning.custom({
|
|
94
|
+
...config,
|
|
95
|
+
covalidatorUrls: [...config.covalidatorUrls],
|
|
96
|
+
signers: config.signers.map((s) => (0, binary_js_1.parseAddress)(s)),
|
|
97
|
+
});
|
|
69
98
|
}
|
|
70
99
|
const conf = local_node_js_1.localNodeLightningConfig[DefaultPepper];
|
|
71
|
-
return
|
|
100
|
+
return Lightning.custom({
|
|
72
101
|
// We assume that we always run a local node as the default anvil node
|
|
73
102
|
chainId: env.COVALIDATOR_HOST_CHAIN_ID
|
|
74
103
|
? Number(env.COVALIDATOR_HOST_CHAIN_ID)
|
|
75
104
|
: conf.chainId,
|
|
76
|
-
|
|
105
|
+
covalidatorUrls: env.COVALIDATOR_URL
|
|
106
|
+
? env.COVALIDATOR_URL.split(',')
|
|
107
|
+
: [...conf.covalidatorUrls],
|
|
108
|
+
signers: env.EIP712_SIGNER_ADDRESS
|
|
109
|
+
? env.EIP712_SIGNER_ADDRESS.split(',').map((address) => (0, binary_js_1.parseAddress)(address))
|
|
110
|
+
: conf.signers.map((s) => (0, binary_js_1.parseAddress)(s)),
|
|
77
111
|
hostChainRpcUrl: env.COVALIDATOR_HOST_CHAIN_RPC_URL ??
|
|
78
112
|
conf.hostChainRpcUrl ??
|
|
79
113
|
'http://localhost:8545',
|
|
@@ -87,9 +121,19 @@ class Lightning {
|
|
|
87
121
|
*
|
|
88
122
|
* @param filePath the path to the file containing the environment variables in dotenv format
|
|
89
123
|
*/
|
|
90
|
-
static async localNodeFromEnv(
|
|
91
|
-
|
|
92
|
-
|
|
124
|
+
static async localNodeFromEnv(source) {
|
|
125
|
+
let envContent;
|
|
126
|
+
if (isLocalNodeEnvFileSource(source)) {
|
|
127
|
+
if (typeof process === 'undefined' || !process.versions?.node) {
|
|
128
|
+
throw new Error('Lightning.localNodeFromEnv with a file path is only available in Node environments.');
|
|
129
|
+
}
|
|
130
|
+
const { readFile } = await Promise.resolve().then(() => require('fs/promises'));
|
|
131
|
+
envContent = await readFile(source.filePath);
|
|
132
|
+
}
|
|
133
|
+
else {
|
|
134
|
+
envContent = source;
|
|
135
|
+
}
|
|
136
|
+
const env = (0, index_js_3.parseLocalEnv)(envContent);
|
|
93
137
|
return await Lightning.localNode(env);
|
|
94
138
|
}
|
|
95
139
|
/**
|
|
@@ -105,7 +149,13 @@ class Lightning {
|
|
|
105
149
|
if (!deployment) {
|
|
106
150
|
throw new Error(`No deployment found for ${JSON.stringify(id)}`);
|
|
107
151
|
}
|
|
108
|
-
|
|
152
|
+
const chain = (0, index_js_2.getViemChain)({ id: deployment.chainId });
|
|
153
|
+
const client = (0, viem_1.createPublicClient)({
|
|
154
|
+
chain,
|
|
155
|
+
transport: (0, viem_1.http)(),
|
|
156
|
+
});
|
|
157
|
+
const { threshold, signers, eciesPubKey } = await Lightning.getChainConfig(deployment, client);
|
|
158
|
+
return new Lightning(deployment, Lightning.getCovalidatorUrls(deployment, threshold), signers, threshold, eciesPubKey);
|
|
109
159
|
}
|
|
110
160
|
/**
|
|
111
161
|
* Get a Lightning deployment for a local or custom node
|
|
@@ -114,21 +164,13 @@ class Lightning {
|
|
|
114
164
|
* additional fields past will be made available as part of the `deployment` property.
|
|
115
165
|
*/
|
|
116
166
|
static async custom(config) {
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
|
|
120
|
-
|
|
121
|
-
abi: lightning_js_1.incoLightningAbi,
|
|
122
|
-
address: executorAddress,
|
|
123
|
-
client,
|
|
124
|
-
});
|
|
125
|
-
const incoVerifierAddress = await incoLightningContract.read.incoVerifier();
|
|
126
|
-
const incoVerifier = (0, viem_1.getContract)({
|
|
127
|
-
abi: verifier_js_1.incoVerifierAbi,
|
|
128
|
-
address: incoVerifierAddress,
|
|
129
|
-
client,
|
|
167
|
+
const chain = (0, index_js_2.getViemChain)({ id: config.chainId });
|
|
168
|
+
const client = (0, viem_1.createPublicClient)({
|
|
169
|
+
chain,
|
|
170
|
+
transport: config.hostChainRpcUrl ? (0, viem_1.http)(config.hostChainRpcUrl) : (0, viem_1.http)(),
|
|
130
171
|
});
|
|
131
|
-
|
|
172
|
+
const { threshold, signers, eciesPubKey } = await Lightning.getVerifierContractDetails(config.executorAddress, client);
|
|
173
|
+
return new Lightning(config, config.covalidatorUrls, signers, threshold, eciesPubKey);
|
|
132
174
|
}
|
|
133
175
|
/**
|
|
134
176
|
* Get the latest deployment for a given pepper, which usually denotes a family of deployments distinct from their
|
|
@@ -153,10 +195,10 @@ class Lightning {
|
|
|
153
195
|
* will not be compatible with the new version.
|
|
154
196
|
*
|
|
155
197
|
* @param pepper the pepper to use to filter the deployments
|
|
156
|
-
* @param
|
|
198
|
+
* @param chain the chain to use to filter the deployments
|
|
157
199
|
*/
|
|
158
200
|
static async latest(pepper, chainId) {
|
|
159
|
-
return
|
|
201
|
+
return Lightning.at(Lightning.latestDeployment(pepper, chainId));
|
|
160
202
|
}
|
|
161
203
|
/*
|
|
162
204
|
* Get the latest deployment for a given pepper, which usually denotes a family of deployments distinct from their
|
|
@@ -171,10 +213,15 @@ class Lightning {
|
|
|
171
213
|
* @param value a boolean or numeric value to encrypt
|
|
172
214
|
* @param accountAddress the address of the account interacting with the dapp contract, normally an Externally Owned Account (EOA)
|
|
173
215
|
* @param dappAddress the address of the dapp contract that interacts with the Inco Lightning contract or library
|
|
216
|
+
* @param handleType (optional) the handle type to be used for encrypting the value - this is required in case of non-default handle types
|
|
217
|
+
* default handle types:
|
|
218
|
+
* - boolean -> handleTypes.ebool
|
|
219
|
+
* - number | bigint -> handleTypes.euint256
|
|
220
|
+
* @returns a promise that resolves to the encrypted value as a HexString
|
|
174
221
|
*/
|
|
175
|
-
async encrypt(value, { accountAddress, dappAddress }
|
|
176
|
-
const { ciphertext } = await encryptor({
|
|
177
|
-
plaintext: Lightning.plaintextFromValue(value),
|
|
222
|
+
async encrypt(value, { accountAddress, dappAddress, handleType }) {
|
|
223
|
+
const { ciphertext } = await this.encryptor({
|
|
224
|
+
plaintext: Lightning.plaintextFromValue(value, handleType),
|
|
178
225
|
context: {
|
|
179
226
|
hostChainId: this.chainId,
|
|
180
227
|
aclAddress: this.executorAddress,
|
|
@@ -184,27 +231,6 @@ class Lightning {
|
|
|
184
231
|
});
|
|
185
232
|
return ciphertext.value;
|
|
186
233
|
}
|
|
187
|
-
/**
|
|
188
|
-
* Obtain a reencryptor for a particular Externally Owned Account (EOA) to request decrypted values.
|
|
189
|
-
* The account associated with the walletClient must have permissions to decrypt the handle or ciphertext passed
|
|
190
|
-
* to the reencryptor function.
|
|
191
|
-
*
|
|
192
|
-
* @param walletClient the wallet client to use for signing the reencrypt request.
|
|
193
|
-
*/
|
|
194
|
-
getReencryptor(walletClient) {
|
|
195
|
-
return (0, reencrypt_js_1.incoLiteReencryptor)({
|
|
196
|
-
walletClient,
|
|
197
|
-
kmsConnectRpcEndpointOrClient: this.kmsClient,
|
|
198
|
-
chainId: this.chainId,
|
|
199
|
-
ephemeralKeypair: this.ephemeralKeypair,
|
|
200
|
-
});
|
|
201
|
-
}
|
|
202
|
-
getEncryptor(eciesPubkey) {
|
|
203
|
-
return (0, ecies_js_1.getEciesEncryptor)({
|
|
204
|
-
pubKeyA: (0, ecies_js_1.decodeSecp256k1PublicKey)((0, viem_1.hexToBytes)((0, schema_js_1.parse)(binary_js_1.HexString, eciesPubkey))),
|
|
205
|
-
privKeyB: this.ephemeralKeypair,
|
|
206
|
-
});
|
|
207
|
-
}
|
|
208
234
|
/**
|
|
209
235
|
* Grants a session key allowance voucher for secure reencryption operations.
|
|
210
236
|
*
|
|
@@ -238,31 +264,6 @@ class Lightning {
|
|
|
238
264
|
expiresAt,
|
|
239
265
|
});
|
|
240
266
|
}
|
|
241
|
-
/**
|
|
242
|
-
* Creates a session key reencryptor for secure data reencryption operations.
|
|
243
|
-
*
|
|
244
|
-
* This method returns a reencryptor instance that can be used to perform reencryption
|
|
245
|
-
* operations using session keys. The reencryptor is configured with the provided
|
|
246
|
-
* allowance voucher and ephemeral keypair for secure communication.
|
|
247
|
-
*
|
|
248
|
-
* @param allowanceVoucherWithSig - The signed allowance voucher obtained from grantSessionKeyAllowanceVoucher
|
|
249
|
-
* @param ephemeralKeypair - The ephemeral keypair used for secure communication with the KMS make sure it has allowance to voucher
|
|
250
|
-
* @returns A reencryptor instance configured for session key operations
|
|
251
|
-
*
|
|
252
|
-
* @example
|
|
253
|
-
* ```typescript
|
|
254
|
-
* const reencryptor = await lightning.getSessionKeyRencryptor(voucher, ephemeralKeypair);
|
|
255
|
-
* const decryptedValue = await reencryptor({handle: resultHandle});
|
|
256
|
-
* ```
|
|
257
|
-
*/
|
|
258
|
-
getSessionKeyRencryptor(allowanceVoucherWithSig, ephemeralKeypair) {
|
|
259
|
-
return (0, session_key_js_1.sessionKeyReencryptor)({
|
|
260
|
-
chainId: this.chainId,
|
|
261
|
-
kmsConnectRpcEndpointOrClient: this.kmsClient,
|
|
262
|
-
ephemeralKeypair,
|
|
263
|
-
allowanceVoucherWithSig,
|
|
264
|
-
});
|
|
265
|
-
}
|
|
266
267
|
/**
|
|
267
268
|
* Updates the active session nonce for the given wallet client.
|
|
268
269
|
*
|
|
@@ -275,62 +276,142 @@ class Lightning {
|
|
|
275
276
|
updateActiveVouchersSessionNonce(walletClient) {
|
|
276
277
|
return (0, session_key_js_1.updateActiveVouchersSessionNonce)(this.executorAddress, walletClient);
|
|
277
278
|
}
|
|
278
|
-
attestedDecrypt(
|
|
279
|
-
if (
|
|
280
|
-
const
|
|
281
|
-
|
|
282
|
-
|
|
279
|
+
attestedDecrypt(walletClient, handles, arg3, arg4, arg5) {
|
|
280
|
+
if (arg3 instanceof Uint8Array) {
|
|
281
|
+
const reencryptPubKey = arg3;
|
|
282
|
+
let reencryptKeypair;
|
|
283
|
+
let backoffConfig;
|
|
284
|
+
if (arg4 && isSecp256k1Keypair(arg4)) {
|
|
285
|
+
reencryptKeypair = arg4;
|
|
286
|
+
backoffConfig = arg5;
|
|
287
|
+
}
|
|
288
|
+
else {
|
|
289
|
+
backoffConfig = arg4;
|
|
290
|
+
}
|
|
291
|
+
if (reencryptKeypair) {
|
|
292
|
+
return (0, attested_decrypt_js_1.attestedDecrypt)({
|
|
293
|
+
handles,
|
|
294
|
+
backoffConfig,
|
|
295
|
+
chainId: Number(this.chainId),
|
|
296
|
+
walletClient,
|
|
297
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
298
|
+
reencryptPubKey,
|
|
299
|
+
reencryptKeypair,
|
|
300
|
+
});
|
|
301
|
+
}
|
|
283
302
|
return (0, attested_decrypt_js_1.attestedDecrypt)({
|
|
284
303
|
handles,
|
|
285
304
|
backoffConfig,
|
|
286
305
|
chainId: Number(this.chainId),
|
|
287
306
|
walletClient,
|
|
288
|
-
|
|
307
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
308
|
+
reencryptPubKey,
|
|
289
309
|
});
|
|
290
310
|
}
|
|
291
|
-
|
|
292
|
-
|
|
293
|
-
|
|
294
|
-
|
|
295
|
-
|
|
311
|
+
const backoffConfig = arg3;
|
|
312
|
+
return (0, attested_decrypt_js_1.attestedDecrypt)({
|
|
313
|
+
handles,
|
|
314
|
+
backoffConfig,
|
|
315
|
+
chainId: Number(this.chainId),
|
|
316
|
+
walletClient,
|
|
317
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
318
|
+
});
|
|
319
|
+
}
|
|
320
|
+
attestedDecryptWithVoucher(ephemeralKeypair, allowanceVoucherWithSig, handles, arg4, arg5, arg6) {
|
|
321
|
+
if (arg4 instanceof Uint8Array) {
|
|
322
|
+
const reencryptPubKey = arg4;
|
|
323
|
+
let reencryptKeypair;
|
|
324
|
+
let backoffConfig;
|
|
325
|
+
if (arg5 && isSecp256k1Keypair(arg5)) {
|
|
326
|
+
reencryptKeypair = arg5;
|
|
327
|
+
backoffConfig = arg6;
|
|
328
|
+
}
|
|
329
|
+
else {
|
|
330
|
+
backoffConfig = arg5;
|
|
331
|
+
}
|
|
332
|
+
if (reencryptKeypair) {
|
|
333
|
+
return (0, session_key_js_1.sessionKeyAttestedDecrypt)({
|
|
334
|
+
backoffConfig,
|
|
335
|
+
chainId: Number(this.chainId),
|
|
336
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
337
|
+
ephemeralKeypair,
|
|
338
|
+
allowanceVoucherWithSig,
|
|
339
|
+
handles,
|
|
340
|
+
reencryptPubKey,
|
|
341
|
+
reencryptKeypair,
|
|
342
|
+
});
|
|
343
|
+
}
|
|
296
344
|
return (0, session_key_js_1.sessionKeyAttestedDecrypt)({
|
|
297
345
|
backoffConfig,
|
|
298
346
|
chainId: Number(this.chainId),
|
|
299
|
-
|
|
347
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
300
348
|
ephemeralKeypair,
|
|
301
349
|
allowanceVoucherWithSig,
|
|
302
350
|
handles,
|
|
351
|
+
reencryptPubKey,
|
|
303
352
|
});
|
|
304
353
|
}
|
|
354
|
+
const backoffConfig = arg4;
|
|
355
|
+
return (0, session_key_js_1.sessionKeyAttestedDecrypt)({
|
|
356
|
+
backoffConfig,
|
|
357
|
+
chainId: Number(this.chainId),
|
|
358
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
359
|
+
ephemeralKeypair,
|
|
360
|
+
allowanceVoucherWithSig,
|
|
361
|
+
handles,
|
|
362
|
+
});
|
|
305
363
|
}
|
|
306
|
-
|
|
307
|
-
|
|
308
|
-
|
|
309
|
-
|
|
310
|
-
|
|
311
|
-
|
|
312
|
-
|
|
313
|
-
|
|
314
|
-
|
|
315
|
-
|
|
316
|
-
|
|
317
|
-
|
|
318
|
-
|
|
319
|
-
|
|
320
|
-
|
|
321
|
-
|
|
322
|
-
|
|
323
|
-
|
|
324
|
-
|
|
325
|
-
|
|
326
|
-
|
|
327
|
-
// Wallet-client path
|
|
328
|
-
const walletClient = arg1;
|
|
329
|
-
const backoffConfig = arg5;
|
|
364
|
+
/**
|
|
365
|
+
* Get an attested compute for the given wallet client.
|
|
366
|
+
*
|
|
367
|
+
* @param walletClient - The wallet client used for signing the attested compute request
|
|
368
|
+
* @param lhsHandle - The handle to compute
|
|
369
|
+
* @param op - The operation to perform
|
|
370
|
+
* @param rhsPlaintext - The plaintext to compute with
|
|
371
|
+
* @param backoffConfig - The backoff configuration for the attested compute request
|
|
372
|
+
* @returns The decryption attestation
|
|
373
|
+
*
|
|
374
|
+
* @example
|
|
375
|
+
* ```typescript
|
|
376
|
+
* import { AttestedComputeSupportedOps } from '../lite/attested-compute.js';
|
|
377
|
+
* const lhsHandle = '0x...';
|
|
378
|
+
* const rhsPlaintext = 1337n;
|
|
379
|
+
* const op = AttestedComputeSupportedOps.Eq;
|
|
380
|
+
* const response = await lightning.attestedCompute(walletClient, lhsHandle, op, rhsPlaintext);
|
|
381
|
+
* const { plaintext, covalidatorSignature, handle } = response;
|
|
382
|
+
* ```
|
|
383
|
+
*/
|
|
384
|
+
attestedCompute(walletClient, lhsHandle, op, rhsPlaintext, backoffConfig) {
|
|
330
385
|
return (0, attested_compute_js_1.attestedCompute)({
|
|
331
386
|
walletClient,
|
|
332
|
-
|
|
387
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
388
|
+
chainId: Number(this.chainId),
|
|
389
|
+
lhsHandle,
|
|
390
|
+
op,
|
|
391
|
+
rhsPlaintext,
|
|
392
|
+
backoffConfig,
|
|
393
|
+
});
|
|
394
|
+
}
|
|
395
|
+
/**
|
|
396
|
+
* Performs attested compute via a voucher-backed session key.
|
|
397
|
+
*
|
|
398
|
+
* @example
|
|
399
|
+
* ```ts
|
|
400
|
+
* const attestation = await lightning.attestedComputeWithVoucher(
|
|
401
|
+
* ephemeralKeypair,
|
|
402
|
+
* voucher,
|
|
403
|
+
* lhsHandle,
|
|
404
|
+
* AttestedComputeSupportedOps.Eq,
|
|
405
|
+
* true,
|
|
406
|
+
* );
|
|
407
|
+
* ```
|
|
408
|
+
*/
|
|
409
|
+
attestedComputeWithVoucher(ephemeralKeypair, allowanceVoucherWithSig, lhsHandle, op, rhsPlaintext, backoffConfig) {
|
|
410
|
+
return (0, session_key_js_1.sessionKeyAttestedCompute)({
|
|
333
411
|
chainId: Number(this.chainId),
|
|
412
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
413
|
+
ephemeralKeypair,
|
|
414
|
+
allowanceVoucherWithSig,
|
|
334
415
|
lhsHandle,
|
|
335
416
|
op,
|
|
336
417
|
rhsPlaintext,
|
|
@@ -351,24 +432,24 @@ class Lightning {
|
|
|
351
432
|
* ```
|
|
352
433
|
*/
|
|
353
434
|
attestedReveal(handles, backoffConfig) {
|
|
354
|
-
return (0,
|
|
435
|
+
return (0, attested_decrypt_js_1.attestedDecrypt)({
|
|
355
436
|
handles,
|
|
356
437
|
backoffConfig,
|
|
357
438
|
chainId: Number(this.chainId),
|
|
358
|
-
|
|
439
|
+
kmsQuorumClient: this.kmsQuorumClient,
|
|
359
440
|
});
|
|
360
441
|
}
|
|
361
442
|
/**
|
|
362
443
|
* Get the GRPC endpoint for the covalidator that services this deployment.
|
|
363
444
|
*/
|
|
364
|
-
static
|
|
445
|
+
static getCovalidatorUrls(deployment, threshold) {
|
|
365
446
|
const { executorAddress, chainId, pepper } = deployment;
|
|
366
|
-
return `https://${executorAddress.toLowerCase()}.${chainId}.${pepper}.inco.org
|
|
447
|
+
return Array.from({ length: threshold }, (_, i) => `https://${executorAddress.toLowerCase()}.${chainId}.${pepper}.${i + 1}.inco.org`);
|
|
367
448
|
}
|
|
368
449
|
static isIdByName(id) {
|
|
369
450
|
return id.name !== undefined;
|
|
370
451
|
}
|
|
371
|
-
static plaintextFromValue(value) {
|
|
452
|
+
static plaintextFromValue(value, type) {
|
|
372
453
|
if (typeof value === 'boolean') {
|
|
373
454
|
return {
|
|
374
455
|
scheme: index_js_1.encryptionSchemes.ecies,
|
|
@@ -379,7 +460,7 @@ class Lightning {
|
|
|
379
460
|
else if (typeof value === 'bigint' || typeof value === 'number') {
|
|
380
461
|
return {
|
|
381
462
|
scheme: index_js_1.encryptionSchemes.ecies,
|
|
382
|
-
type: handle_js_1.handleTypes.euint256,
|
|
463
|
+
type: type ?? handle_js_1.handleTypes.euint256,
|
|
383
464
|
value: BigInt(value),
|
|
384
465
|
};
|
|
385
466
|
}
|
|
@@ -387,6 +468,70 @@ class Lightning {
|
|
|
387
468
|
throw new Error(`Unsupported type ${typeof value}`);
|
|
388
469
|
}
|
|
389
470
|
}
|
|
471
|
+
static async getEciesPublicKey(client, executorAddress) {
|
|
472
|
+
const incoVerifier = await Lightning.getIncoVerifierContract(client, executorAddress);
|
|
473
|
+
return await incoVerifier.read.eciesPubkey();
|
|
474
|
+
}
|
|
475
|
+
static async getIncoVerifierContract(client, executorAddress) {
|
|
476
|
+
const incoLightningContract = (0, viem_1.getContract)({
|
|
477
|
+
abi: lightning_js_1.incoLightningAbi,
|
|
478
|
+
address: executorAddress,
|
|
479
|
+
client,
|
|
480
|
+
});
|
|
481
|
+
const incoVerifierAddress = await incoLightningContract.read.incoVerifier();
|
|
482
|
+
const incoVerifier = (0, viem_1.getContract)({
|
|
483
|
+
abi: verifier_js_1.incoVerifierAbi,
|
|
484
|
+
address: incoVerifierAddress,
|
|
485
|
+
client,
|
|
486
|
+
});
|
|
487
|
+
console.log('inco executor', incoLightningContract.address);
|
|
488
|
+
console.log('inco verifier', incoVerifier.address);
|
|
489
|
+
return incoVerifier;
|
|
490
|
+
}
|
|
491
|
+
/**
|
|
492
|
+
* Retrieves the verifier contract details including threshold, signers, and ECIES public key from the Inco Verifier contract.
|
|
493
|
+
*
|
|
494
|
+
* @param executorAddress The address of the Inco Lightning executor contract.
|
|
495
|
+
* @param client The public client to interact with the blockchain.
|
|
496
|
+
* @returns An object containing the threshold, signers, and ECIES public key.
|
|
497
|
+
*/
|
|
498
|
+
static async getVerifierContractDetails(executorAddress, client) {
|
|
499
|
+
const incoVerifier = await Lightning.getIncoVerifierContract(client, executorAddress);
|
|
500
|
+
const threshold = await incoVerifier.read.getThreshold();
|
|
501
|
+
const eciesPubKey = await incoVerifier.read.eciesPubkey();
|
|
502
|
+
const signersCount = await incoVerifier.read.getSignersCount();
|
|
503
|
+
const signersPromises = [];
|
|
504
|
+
for (let i = BigInt(0); i < signersCount; i++) {
|
|
505
|
+
signersPromises.push(incoVerifier.read.getSignerAtIndex([i]));
|
|
506
|
+
}
|
|
507
|
+
const signers = await Promise.all(signersPromises);
|
|
508
|
+
return {
|
|
509
|
+
threshold: Number(threshold),
|
|
510
|
+
signers: signers.map(binary_js_1.parseAddress),
|
|
511
|
+
eciesPubKey,
|
|
512
|
+
};
|
|
513
|
+
}
|
|
514
|
+
static async getChainConfig(deployment, client) {
|
|
515
|
+
if (this.supportsThresholdRetrieval(deployment)) {
|
|
516
|
+
return await this.getVerifierContractDetails(deployment.executorAddress, client);
|
|
517
|
+
}
|
|
518
|
+
return this.getDefaultThresholdAndSigners();
|
|
519
|
+
}
|
|
520
|
+
// Check if the deployment supports threshold retrieval based on its version
|
|
521
|
+
static supportsThresholdRetrieval(deployment) {
|
|
522
|
+
// Assumes that the threshold retrieval is supported if the smart contract / deployment version is greater than or equal to 1.1.0
|
|
523
|
+
return deployment.version?.major >= 1 && deployment.version?.minor >= 1;
|
|
524
|
+
}
|
|
525
|
+
// NOTE: we are proceeding with lot's of state braking changes and the defaults below can be removed
|
|
526
|
+
// once all deployments support threshold. signers and ecies pub key retrieval
|
|
527
|
+
// For now this is added to ensure that the tests that we have using previous deployments continue to work
|
|
528
|
+
static getDefaultThresholdAndSigners() {
|
|
529
|
+
return {
|
|
530
|
+
threshold: 1,
|
|
531
|
+
signers: [viem_1.zeroAddress],
|
|
532
|
+
eciesPubKey: ecies_js_1.TEST_ECIES_PUB_KEY,
|
|
533
|
+
};
|
|
534
|
+
}
|
|
390
535
|
}
|
|
391
536
|
exports.Lightning = Lightning;
|
|
392
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/lite/lightning.ts"],"names":[],"mappings":";;;AACA,kCAAkC;AAClC,+BAQc;AACd,wCAA0C;AAC1C,kEAMuC;AAEvC,gFAAyE;AAEzE,gFAAyE;AAEzE,6EAAsE;AACtE,4CAAgE;AAEhE,qDAMgC;AAChC,iEAAkE;AAClE,+DAAgE;AAEhE,4DAAiE;AACjE,8DAAsE;AACtE,4CAA2C;AAC3C,gDAAgE;AAGhE,4CAAqC;AACrC,yCAKoB;AACpB,iDAAmE;AA6BnE,MAAM,aAAa,GAAoB,SAAS,CAAC;AAyBjD;;;GAGG;AACH,MAAa,SAAS;IAQD;IACD;IARF,eAAe,CAAU;IACzB,OAAO,CAAS;IAEf,gBAAgB,CAAmB;IACnC,SAAS,CAA4B;IAEtD,YACmB,WAAc,EACf,cAAsB;QADrB,gBAAW,GAAX,WAAW,CAAG;QACf,mBAAc,GAAd,cAAc,CAAQ;QAEtC,IAAI,CAAC,eAAe,GAAG,IAAA,wBAAY,EAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACjE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE3C,IAAI,CAAC,gBAAgB,GAAG,IAAA,mCAAwB,GAAE,CAAC;QACnD,IAAI,CAAC,SAAS,GAAG,IAAA,2BAAY,EAAC,cAAc,CAAC,CAAC;IAChD,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,kBAAkB;QAC7B,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC,SAAS,EAAE,oBAAW,CAAC,EAAE,CAAC,CAAC;IAC3D,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,KAAK,CAAC,SAAS,CACpB,GAAoC;QAEpC,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC,wCAAwB,CAAC,aAAa,CAAC,CAAC,CAAC;QACzE,CAAC;QACD,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC,wCAAwB,CAAC,GAAG,CAAC,CAAC,CAAC;QAC/D,CAAC;QACD,MAAM,IAAI,GAAG,wCAAwB,CAAC,aAAa,CAAC,CAAC;QACrD,OAAO,MAAM,SAAS,CAAC,MAAM,CAAC;YAC5B,sEAAsE;YACtE,OAAO,EAAE,GAAG,CAAC,yBAAyB;gBACpC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,yBAAyB,CAAC;gBACvC,CAAC,CAAC,IAAI,CAAC,OAAO;YAChB,cAAc,EAAE,GAAG,CAAC,eAAe,IAAI,IAAI,CAAC,cAAc;YAC1D,eAAe,EACb,GAAG,CAAC,8BAA8B;gBAClC,IAAI,CAAC,eAAe;gBACpB,uBAAuB;YACzB,uCAAuC;YACvC,eAAe,EAAE,GAAG,CAAC,gBAAgB;YACrC,gBAAgB,EAAE,GAAG,CAAC,kBAAkB;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAC3B,QAAiB;QAEjB,MAAM,GAAG,GAAG,QAAQ,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;QAC/D,MAAM,GAAG,GAAG,IAAA,wBAAa,EAAC,GAAG,CAAC,CAAC;QAC/B,OAAO,MAAM,SAAS,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,EAAgB;QAC9B,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,CAAC,CAAC,mCAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,EAAE,CAAC,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CACtD;YACH,CAAC,CAAC,mCAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,eAAe,KAAK,EAAE,CAAC,eAAe;gBACxC,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAC3B,CAAC;QACN,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,2BAA2B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;QACnE,CAAC;QAED,OAAO,IAAI,SAAS,CAAC,UAAU,EAAE,SAAS,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAC,CAAC;IAC5E,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS;QAET,OAAO,IAAI,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,cAAc,CAAC,CAAC;IACtD,CAAC;IAED,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAC5B,MAAoB,EACpB,eAAwB;QAExB,MAAM,qBAAqB,GAAG,IAAA,kBAAW,EAAC;YACxC,GAAG,EAAE,+BAAgB;YACrB,OAAO,EAAE,eAA0B;YACnC,MAAM;SACP,CAAC,CAAC;QACH,MAAM,mBAAmB,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QAC5E,MAAM,YAAY,GAAG,IAAA,kBAAW,EAAC;YAC/B,GAAG,EAAE,6BAAe;YACpB,OAAO,EAAE,mBAA8B;YACvC,MAAM;SACP,CAAC,CAAC;QACH,OAAO,MAAM,YAAY,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;IAC/C,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,gBAAgB,CACrB,MAAS,EACT,OAAgB;QAEhB,sEAAsE;QACtE,MAAM,cAAc,GAAG,mCAAoB,CAAC,IAAI,CAC9C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,IAAI,CAAC,CAAC,OAAO,KAAK,OAAO,CACpD,CAAC;QACF,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,4GAA4G;YAC5G,wBAAwB;YACxB,MAAM,IAAI,KAAK,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;QACD,OAAO,cAAc,CAAC;IACxB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS,EACT,OAAgB;QAEhB,OAAO,MAAM,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IACzE,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,EAAE,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC;IAED;;;;;;OAMG;IACH,KAAK,CAAC,OAAO,CACX,KAAQ,EACR,EAAE,cAAc,EAAE,WAAW,EAAqB,EAClD,SAAiC;QAEjC,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,SAAS,CAAC;YACrC,SAAS,EAAE,SAAS,CAAC,kBAAkB,CAAC,KAAK,CAAC;YAC9C,OAAO,EAAE;gBACP,WAAW,EAAE,IAAI,CAAC,OAAO;gBACzB,UAAU,EAAE,IAAI,CAAC,eAAe;gBAChC,WAAW,EAAE,IAAA,wBAAY,EAAC,cAAc,CAAC;gBACzC,eAAe,EAAE,IAAA,wBAAY,EAAC,WAAW,CAAC;aAC3C;SACF,CAAC,CAAC;QACH,OAAO,UAAU,CAAC,KAAK,CAAC;IAC1B,CAAC;IAED;;;;;;OAMG;IACH,cAAc,CACZ,YAAqD;QAErD,OAAO,IAAA,kCAAmB,EAAC;YACzB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;SACxC,CAAC,CAAC;IACL,CAAC;IAED,YAAY,CAAC,WAAsB;QACjC,OAAO,IAAA,4BAAiB,EAAC;YACvB,OAAO,EAAE,IAAA,mCAAwB,EAC/B,IAAA,iBAAU,EAAC,IAAA,iBAAK,EAAC,qBAAS,EAAE,WAAW,CAAC,CAAC,CAC1C;YACD,QAAQ,EAAE,IAAI,CAAC,gBAAgB;SAChC,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACH,+BAA+B,CAC7B,YAAqD,EACrD,cAAsB,EACtB,SAAe,EACf,sBAA8B;QAE9B,OAAO,IAAA,gCAAe,EAAC;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,8BAA8B,EAAE,IAAA,wBAAY,EAAC,sBAAsB,CAAC;YACpE,cAAc,EAAE,IAAA,wBAAY,EAAC,cAAc,CAAC;YAC5C,kBAAkB,EAAE,YAAY;YAChC,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;;;;OAgBG;IACH,uBAAuB,CACrB,uBAAgD,EAChD,gBAAkC;QAElC,OAAO,IAAA,sCAAqB,EAAC;YAC3B,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,gBAAgB;YAChB,uBAAuB;SACxB,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;OAQG;IACH,gCAAgC,CAC9B,YAAqD;QAErD,OAAO,IAAA,iDAAgC,EAAC,IAAI,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IAC9E,CAAC;IA2CD,eAAe,CACb,IAAgE,EAChE,IAA2C,EAC3C,IAA2C,EAC3C,IAA6B;QAE7B,IAAI,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC;YACxB,MAAM,YAAY,GAAG,IAA+C,CAAC;YACrE,MAAM,OAAO,GAAG,IAAmB,CAAC;YACpC,MAAM,aAAa,GAAG,IAA0C,CAAC;YACjE,OAAO,IAAA,qCAAe,EAAC;gBACrB,OAAO;gBACP,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,YAAY;gBACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;aAC9C,CAAC,CAAC;QACL,CAAC;aAAM,CAAC;YACN,MAAM,gBAAgB,GAAG,IAAwB,CAAC;YAClD,MAAM,uBAAuB,GAAG,IAA+B,CAAC;YAChE,MAAM,OAAO,GAAG,IAAmB,CAAC;YACpC,MAAM,aAAa,GAAG,IAA0C,CAAC;YACjE,OAAO,IAAA,0CAAyB,EAAC;gBAC/B,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;gBAC7C,gBAAgB;gBAChB,uBAAuB;gBACvB,OAAO;aACR,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAuDD,eAAe,CACb,IAAgE,EAChE,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,IAAuD,EACvD,IAA6B;QAE7B,IACE,OAAO,IAAI,KAAK,QAAQ;YACxB,IAAI,KAAK,IAAI;YACb,SAAS,IAAI,IAAI;YACjB,kBAAkB,IAAI,IAAI;YAC1B,QAAQ,IAAI,IAAI,EAChB,CAAC;YACD,mBAAmB;YACnB,MAAM,gBAAgB,GAAG,IAAwB,CAAC;YAClD,MAAM,uBAAuB,GAAG,IAA+B,CAAC;YAChE,MAAM,aAAa,GAAG,IAAI,CAAC;YAC3B,OAAO,IAAA,0CAAyB,EAAC;gBAC/B,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;gBAC7C,gBAAgB;gBAChB,uBAAuB;gBACvB,SAAS;gBACT,EAAE;gBACF,YAAY;gBACZ,aAAa;aACd,CAAC,CAAC;QACL,CAAC;QAED,qBAAqB;QACrB,MAAM,YAAY,GAAG,IAA+C,CAAC;QACrE,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,IAAA,qCAAe,EAAC;YACrB,YAAY;YACZ,6BAA6B,EAAE,IAAI,CAAC,SAAS;YAC7C,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;OAYG;IACH,cAAc,CACZ,OAAoB,EACpB,aAAsC;QAEtC,OAAO,IAAA,mCAAc,EAAC;YACpB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,6BAA6B,EAAE,IAAI,CAAC,SAAS;SAC9C,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,iBAAiB,CAC7B,UAAgD;QAEhD,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,UAAU,CAAC;QACxD,OAAO,WAAW,eAAe,CAAC,WAAW,EAAE,IAAI,OAAO,IAAI,MAAM,WAAW,CAAC;IAClF,CAAC;IAEO,MAAM,CAAC,UAAU,CAAC,EAAgB;QACxC,OAAQ,EAAuB,CAAC,IAAI,KAAK,SAAS,CAAC;IACrD,CAAC;IAEO,MAAM,CAAC,kBAAkB,CAC/B,KAAQ;QAER,IAAI,OAAO,KAAK,KAAK,SAAS,EAAE,CAAC;YAC/B,OAAO;gBACL,MAAM,EAAE,4BAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,uBAAW,CAAC,KAAK;gBACvB,KAAK,EAAE,KAAK;aACsC,CAAC;QACvD,CAAC;aAAM,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAClE,OAAO;gBACL,MAAM,EAAE,4BAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,uBAAW,CAAC,QAAQ;gBAC1B,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC;aAC8B,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oBAAoB,OAAO,KAAK,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;CACF;AA7hBD,8BA6hBC"}
|
|
537
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"lightning.js","sourceRoot":"","sources":["../../../src/lite/lightning.ts"],"names":[],"mappings":";;;AAAA,+BAYc;AACd,wCAA0C;AAC1C,kEAKuC;AAEvC,gFAAmG;AAEnG,gFAAyE;AAKzE,4CAAgE;AAEhE,qDAMgC;AAChC,iEAAkE;AAClE,+DAAgE;AAChE,4DAAiE;AACjE,8DAAsE;AACtE,4CAAoD;AACpD,0CAA2C;AAC3C,4DAAyD;AACzD,gDAAgE;AAEhE,4CAAqC;AACrC,yCAMoB;AA6BpB,MAAM,aAAa,GAAoB,SAAS,CAAC;AAEjD,SAAS,kBAAkB,CAAC,KAAc;IACxC,OAAO,CAAC,CAAC,KAAK,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,IAAI,IAAI,KAAK,CAAC;AAC/D,CAAC;AAwCD,SAAS,wBAAwB,CAC/B,KAA2D;IAE3D,OAAO,CACL,CAAC,CAAC,KAAK;QACP,OAAO,KAAK,KAAK,QAAQ;QACzB,UAAU,IAAI,KAAK;QACnB,OAAQ,KAAiC,CAAC,QAAQ,KAAK,QAAQ,CAChE,CAAC;AACJ,CAAC;AAED;;;GAGG;AACH,MAAa,SAAS;IASD;IACA;IACA;IACA;IACA;IAZH,eAAe,CAAU;IACzB,OAAO,CAAS;IAEf,gBAAgB,CAAmB;IACnC,eAAe,CAAkB;IACjC,SAAS,CAAyB;IAEnD,YACmB,WAAc,EACd,eAAyB,EACzB,OAAkB,EAClB,SAAiB,EACjB,WAAsB;QAJtB,gBAAW,GAAX,WAAW,CAAG;QACd,oBAAe,GAAf,eAAe,CAAU;QACzB,YAAO,GAAP,OAAO,CAAW;QAClB,cAAS,GAAT,SAAS,CAAQ;QACjB,gBAAW,GAAX,WAAW,CAAW;QAEvC,IAAI,CAAC,eAAe,GAAG,IAAA,wBAAY,EAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACjE,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;QAE3C,IAAI,CAAC,gBAAgB,GAAG,IAAA,mCAAwB,GAAE,CAAC;QACnD,IAAI,CAAC,SAAS,GAAG,IAAA,4BAAiB,EAAC;YACjC,OAAO,EAAE,IAAA,mCAAwB,EAC/B,IAAA,iBAAU,EAAC,IAAA,iBAAK,EAAC,qBAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAC/C;YACD,QAAQ,EAAE,IAAI,CAAC,gBAAgB;SAChC,CAAC,CAAC;QAEH,IAAI,CAAC,eAAe,GAAG,iCAAe,CAAC,QAAQ,CAC7C,IAAI,CAAC,eAAe,EACpB,IAAI,CAAC,OAAO,EACZ,IAAI,CAAC,SAAS,CACf,CAAC;IACJ,CAAC;IAED;;OAEG;IACH,MAAM,CAAC,KAAK,CAAC,kBAAkB;QAC7B,OAAO,SAAS,CAAC,MAAM,CAAC,SAAS,EAAE,oBAAW,CAAC,EAAE,CAAC,CAAC;IACrD,CAAC;IAED;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,KAAK,CAAC,SAAS,CACpB,GAAoC;QAEpC,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,MAAM,MAAM,GAAG,wCAAwB,CAAC,aAAa,CAAC,CAAC;YACvD,OAAO,SAAS,CAAC,MAAM,CAAC;gBACtB,GAAG,MAAM;gBACT,eAAe,EAAE,CAAC,GAAG,MAAM,CAAC,eAAe,CAAC;gBAC5C,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAA,wBAAY,EAAC,CAAC,CAAC,CAAC;aACpD,CAAC,CAAC;QACL,CAAC;QACD,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,MAAM,MAAM,GAAG,wCAAwB,CAAC,GAAG,CAAC,CAAC;YAC7C,OAAO,SAAS,CAAC,MAAM,CAAC;gBACtB,GAAG,MAAM;gBACT,eAAe,EAAE,CAAC,GAAG,MAAM,CAAC,eAAe,CAAC;gBAC5C,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAA,wBAAY,EAAC,CAAC,CAAC,CAAC;aACpD,CAAC,CAAC;QACL,CAAC;QACD,MAAM,IAAI,GAAG,wCAAwB,CAAC,aAAa,CAAC,CAAC;QAErD,OAAO,SAAS,CAAC,MAAM,CAAC;YACtB,sEAAsE;YACtE,OAAO,EAAE,GAAG,CAAC,yBAAyB;gBACpC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,yBAAyB,CAAC;gBACvC,CAAC,CAAC,IAAI,CAAC,OAAO;YAChB,eAAe,EAAE,GAAG,CAAC,eAAe;gBAClC,CAAC,CAAC,GAAG,CAAC,eAAe,CAAC,KAAK,CAAC,GAAG,CAAC;gBAChC,CAAC,CAAC,CAAC,GAAG,IAAI,CAAC,eAAe,CAAC;YAC7B,OAAO,EAAE,GAAG,CAAC,qBAAqB;gBAChC,CAAC,CAAC,GAAG,CAAC,qBAAqB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC,OAAO,EAAE,EAAE,CACnD,IAAA,wBAAY,EAAC,OAAO,CAAC,CACtB;gBACH,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAA,wBAAY,EAAC,CAAC,CAAC,CAAC;YAC5C,eAAe,EACb,GAAG,CAAC,8BAA8B;gBAClC,IAAI,CAAC,eAAe;gBACpB,uBAAuB;YACzB,uCAAuC;YACvC,eAAe,EAAE,GAAG,CAAC,gBAAgB;YACrC,gBAAgB,EAAE,GAAG,CAAC,kBAAkB;SACzC,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAC3B,MAAiD;QAEjD,IAAI,UAAuC,CAAC;QAC5C,IAAI,wBAAwB,CAAC,MAAM,CAAC,EAAE,CAAC;YACrC,IAAI,OAAO,OAAO,KAAK,WAAW,IAAI,CAAC,OAAO,CAAC,QAAQ,EAAE,IAAI,EAAE,CAAC;gBAC9D,MAAM,IAAI,KAAK,CACb,qFAAqF,CACtF,CAAC;YACJ,CAAC;YACD,MAAM,EAAE,QAAQ,EAAE,GAAG,2CAAa,aAAa,EAAC,CAAC;YACjD,UAAU,GAAG,MAAM,QAAQ,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;QAC/C,CAAC;aAAM,CAAC;YACN,UAAU,GAAG,MAAM,CAAC;QACtB,CAAC;QACD,MAAM,GAAG,GAAG,IAAA,wBAAa,EAAC,UAAU,CAAC,CAAC;QACtC,OAAO,MAAM,SAAS,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,EAAgB;QAC9B,MAAM,UAAU,GAAG,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;YACpC,CAAC,CAAC,mCAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,IAAI,KAAK,EAAE,CAAC,IAAI,IAAI,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CACtD;YACH,CAAC,CAAC,mCAAoB,CAAC,IAAI,CACvB,CAAC,CAAC,EAAE,EAAE,CACJ,CAAC,CAAC,eAAe,KAAK,EAAE,CAAC,eAAe;gBACxC,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,OAAO,CAC3B,CAAC;QACN,IAAI,CAAC,UAAU,EAAE,CAAC;YAChB,MAAM,IAAI,KAAK,CAAC,2BAA2B,IAAI,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;QACnE,CAAC;QAED,MAAM,KAAK,GAAG,IAAA,uBAAY,EAAC,EAAE,EAAE,EAAE,UAAU,CAAC,OAAO,EAAE,CAAC,CAAC;QACvD,MAAM,MAAM,GAAG,IAAA,yBAAkB,EAAC;YAChC,KAAK;YACL,SAAS,EAAE,IAAA,WAAI,GAAE;SAClB,CAAC,CAAC;QAEH,MAAM,EAAE,SAAS,EAAE,OAAO,EAAE,WAAW,EAAE,GAAG,MAAM,SAAS,CAAC,cAAc,CACxE,UAAU,EACV,MAAM,CACP,CAAC;QAEF,OAAO,IAAI,SAAS,CAClB,UAAU,EACV,SAAS,CAAC,kBAAkB,CAAC,UAAU,EAAE,SAAS,CAAC,EACnD,OAAO,EACP,SAAS,EACT,WAAW,CACZ,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS;QAET,MAAM,KAAK,GAAG,IAAA,uBAAY,EAAC,EAAE,EAAE,EAAE,MAAM,CAAC,OAAO,EAAE,CAAC,CAAC;QACnD,MAAM,MAAM,GAAG,IAAA,yBAAkB,EAAC;YAChC,KAAK;YACL,SAAS,EAAE,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,IAAA,WAAI,EAAC,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,IAAA,WAAI,GAAE;SAC1E,CAAC,CAAC;QAEH,MAAM,EAAE,SAAS,EAAE,OAAO,EAAE,WAAW,EAAE,GACvC,MAAM,SAAS,CAAC,0BAA0B,CACxC,MAAM,CAAC,eAA0B,EACjC,MAAM,CACP,CAAC;QAEJ,OAAO,IAAI,SAAS,CAClB,MAAM,EACN,MAAM,CAAC,eAAe,EACtB,OAAO,EACP,SAAS,EACT,WAAW,CACZ,CAAC;IACJ,CAAC;IAED;;;;;;OAMG;IACH,MAAM,CAAC,gBAAgB,CACrB,MAAS,EACT,OAAgB;QAEhB,sEAAsE;QACtE,MAAM,cAAc,GAAG,mCAAoB,CAAC,IAAI,CAC9C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,KAAK,MAAM,IAAI,CAAC,CAAC,OAAO,KAAK,OAAO,CACpD,CAAC;QACF,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,4GAA4G;YAC5G,wBAAwB;YACxB,MAAM,IAAI,KAAK,CAAC,kCAAkC,MAAM,EAAE,CAAC,CAAC;QAC9D,CAAC;QACD,OAAO,cAAc,CAAC;IACxB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,KAAK,CAAC,MAAM,CACjB,MAAS,EACT,OAAgB;QAEhB,OAAO,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,UAAU;QACZ,OAAO,EAAE,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACjC,CAAC;IAED;;;;;;;;;;;OAWG;IACH,KAAK,CAAC,OAAO,CACX,KAAQ,EACR,EAAE,cAAc,EAAE,WAAW,EAAE,UAAU,EAAqB;QAE9D,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC;YAC1C,SAAS,EAAE,SAAS,CAAC,kBAAkB,CAAC,KAAK,EAAE,UAAU,CAAC;YAC1D,OAAO,EAAE;gBACP,WAAW,EAAE,IAAI,CAAC,OAAO;gBACzB,UAAU,EAAE,IAAI,CAAC,eAAe;gBAChC,WAAW,EAAE,IAAA,wBAAY,EAAC,cAAc,CAAC;gBACzC,eAAe,EAAE,IAAA,wBAAY,EAAC,WAAW,CAAC;aAC3C;SACF,CAAC,CAAC;QAEH,OAAO,UAAU,CAAC,KAAK,CAAC;IAC1B,CAAC;IAED;;;;;;;;;;;;;;;;;;;;;;OAsBG;IACH,+BAA+B,CAC7B,YAAqD,EACrD,cAAsB,EACtB,SAAe,EACf,sBAA8B;QAE9B,OAAO,IAAA,gCAAe,EAAC;YACrB,OAAO,EAAE,IAAI,CAAC,OAAO;YACrB,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,8BAA8B,EAAE,IAAA,wBAAY,EAAC,sBAAsB,CAAC;YACpE,cAAc,EAAE,IAAA,wBAAY,EAAC,cAAc,CAAC;YAC5C,kBAAkB,EAAE,YAAY;YAChC,SAAS;SACV,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;OAQG;IACH,gCAAgC,CAC9B,YAAqD;QAErD,OAAO,IAAA,iDAAgC,EAAC,IAAI,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IAC9E,CAAC;IAoDD,eAAe,CACb,YAAqD,EACrD,OAAoB,EACpB,IAA0C,EAC1C,IAAgD,EAChD,IAA6B;QAM7B,IAAI,IAAI,YAAY,UAAU,EAAE,CAAC;YAC/B,MAAM,eAAe,GAAG,IAAI,CAAC;YAC7B,IAAI,gBAA8C,CAAC;YACnD,IAAI,aAAiD,CAAC;YAEtD,IAAI,IAAI,IAAI,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrC,gBAAgB,GAAG,IAAI,CAAC;gBACxB,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;iBAAM,CAAC;gBACN,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;YAED,IAAI,gBAAgB,EAAE,CAAC;gBACrB,OAAO,IAAA,qCAAe,EAAC;oBACrB,OAAO;oBACP,aAAa;oBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;oBACjD,YAAY;oBACZ,eAAe,EAAE,IAAI,CAAC,eAAe;oBACrC,eAAe;oBACf,gBAAgB;iBACjB,CAEA,CAAC;YACJ,CAAC;YAED,OAAO,IAAA,qCAAe,EAAC;gBACrB,OAAO;gBACP,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,YAAY;gBACZ,eAAe,EAAE,IAAI,CAAC,eAAe;gBACrC,eAAe;aAChB,CAEA,CAAC;QACJ,CAAC;QAED,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,IAAA,qCAAe,EAAC;YACrB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,YAAY;YACZ,eAAe,EAAE,IAAI,CAAC,eAAe;SACtC,CAAyE,CAAC;IAC7E,CAAC;IAoDD,0BAA0B,CACxB,gBAAkC,EAClC,uBAAgD,EAChD,OAAoB,EACpB,IAA0C,EAC1C,IAAgD,EAChD,IAA6B;QAM7B,IAAI,IAAI,YAAY,UAAU,EAAE,CAAC;YAC/B,MAAM,eAAe,GAAG,IAAI,CAAC;YAC7B,IAAI,gBAA8C,CAAC;YACnD,IAAI,aAAiD,CAAC;YAEtD,IAAI,IAAI,IAAI,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;gBACrC,gBAAgB,GAAG,IAAI,CAAC;gBACxB,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;iBAAM,CAAC;gBACN,aAAa,GAAG,IAA0C,CAAC;YAC7D,CAAC;YAED,IAAI,gBAAgB,EAAE,CAAC;gBACrB,OAAO,IAAA,0CAAyB,EAAC;oBAC/B,aAAa;oBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;oBACjD,eAAe,EAAE,IAAI,CAAC,eAAe;oBACrC,gBAAgB;oBAChB,uBAAuB;oBACvB,OAAO;oBACP,eAAe;oBACf,gBAAgB;iBACjB,CAEA,CAAC;YACJ,CAAC;YAED,OAAO,IAAA,0CAAyB,EAAC;gBAC/B,aAAa;gBACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;gBACjD,eAAe,EAAE,IAAI,CAAC,eAAe;gBACrC,gBAAgB;gBAChB,uBAAuB;gBACvB,OAAO;gBACP,eAAe;aAChB,CAEA,CAAC;QACJ,CAAC;QAED,MAAM,aAAa,GAAG,IAA0C,CAAC;QACjE,OAAO,IAAA,0CAAyB,EAAC;YAC/B,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,gBAAgB;YAChB,uBAAuB;YACvB,OAAO;SACR,CAAyE,CAAC;IAC7E,CAAC;IAED;;;;;;;;;;;;;;;;;;;OAmBG;IACH,eAAe,CACb,YAAqD,EACrD,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,aAAsC;QAEtC,OAAO,IAAA,qCAAsB,EAAC;YAC5B,YAAY;YACZ,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;;OAaG;IACH,0BAA0B,CACxB,gBAAkC,EAClC,uBAAgD,EAChD,SAAoB,EACpB,EAAqB,EACrB,YAA8B,EAC9B,aAAsC;QAEtC,OAAO,IAAA,0CAAyB,EAAC;YAC/B,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;YACrC,gBAAgB;YAChB,uBAAuB;YACvB,SAAS;YACT,EAAE;YACF,YAAY;YACZ,aAAa;SACd,CAAC,CAAC;IACL,CAAC;IAED;;;;;;;;;;;;OAYG;IACH,cAAc,CACZ,OAAoB,EACpB,aAAsC;QAEtC,OAAO,IAAA,qCAAe,EAAC;YACrB,OAAO;YACP,aAAa;YACb,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAqB;YACjD,eAAe,EAAE,IAAI,CAAC,eAAe;SACtC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACI,MAAM,CAAC,kBAAkB,CAC9B,UAAgD,EAChD,SAAiB;QAEjB,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,MAAM,EAAE,GAAG,UAAU,CAAC;QACxD,OAAO,KAAK,CAAC,IAAI,CACf,EAAE,MAAM,EAAE,SAAS,EAAE,EACrB,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CACP,WAAW,eAAe,CAAC,WAAW,EAAE,IAAI,OAAO,IAAI,MAAM,IAAI,CAAC,GAAG,CAAC,WAAW,CACpF,CAAC;IACJ,CAAC;IAEO,MAAM,CAAC,UAAU,CAAC,EAAgB;QACxC,OAAQ,EAAuB,CAAC,IAAI,KAAK,SAAS,CAAC;IACrD,CAAC;IAEO,MAAM,CAAC,kBAAkB,CAC/B,KAAQ,EACR,IAAc;QAEd,IAAI,OAAO,KAAK,KAAK,SAAS,EAAE,CAAC;YAC/B,OAAO;gBACL,MAAM,EAAE,4BAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,uBAAW,CAAC,KAAK;gBACvB,KAAK,EAAE,KAAK;aACsC,CAAC;QACvD,CAAC;aAAM,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;YAClE,OAAO;gBACL,MAAM,EAAE,4BAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,IAAI,IAAI,uBAAW,CAAC,QAAQ;gBAClC,KAAK,EAAE,MAAM,CAAC,KAAK,CAAC;aAC8B,CAAC;QACvD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oBAAoB,OAAO,KAAK,EAAE,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;IAEM,MAAM,CAAC,KAAK,CAAC,iBAAiB,CACnC,MAAoB,EACpB,eAAwB;QAExB,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,uBAAuB,CAC1D,MAAM,EACN,eAAe,CAChB,CAAC;QACF,OAAO,MAAM,YAAY,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;IAC/C,CAAC;IAEM,MAAM,CAAC,KAAK,CAAC,uBAAuB,CACzC,MAAoB,EACpB,eAAwB;QAIxB,MAAM,qBAAqB,GAAG,IAAA,kBAAW,EAAC;YACxC,GAAG,EAAE,+BAAgB;YACrB,OAAO,EAAE,eAAe;YACxB,MAAM;SACP,CAAC,CAAC;QACH,MAAM,mBAAmB,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QAC5E,MAAM,YAAY,GAAG,IAAA,kBAAW,EAAC;YAC/B,GAAG,EAAE,6BAAe;YACpB,OAAO,EAAE,mBAA8B;YACvC,MAAM;SACP,CAAC,CAAC;QACH,OAAO,CAAC,GAAG,CAAC,eAAe,EAAE,qBAAqB,CAAC,OAAO,CAAC,CAAC;QAC5D,OAAO,CAAC,GAAG,CAAC,eAAe,EAAE,YAAY,CAAC,OAAO,CAAC,CAAC;QAEnD,OAAO,YAAY,CAAC;IACtB,CAAC;IAED;;;;;;OAMG;IACK,MAAM,CAAC,KAAK,CAAC,0BAA0B,CAC7C,eAAwB,EACxB,MAAoB;QAEpB,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,uBAAuB,CAC1D,MAAM,EACN,eAAe,CAChB,CAAC;QAEF,MAAM,SAAS,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;QACzD,MAAM,WAAW,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;QAE1D,MAAM,YAAY,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,eAAe,EAAE,CAAC;QAC/D,MAAM,eAAe,GAAG,EAAE,CAAC;QAC3B,KAAK,IAAI,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,GAAG,YAAY,EAAE,CAAC,EAAE,EAAE,CAAC;YAC9C,eAAe,CAAC,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QAChE,CAAC;QACD,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC;QAEnD,OAAO;YACL,SAAS,EAAE,MAAM,CAAC,SAAS,CAAC;YAC5B,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,wBAAY,CAAC;YAClC,WAAW;SACZ,CAAC;IACJ,CAAC;IAEO,MAAM,CAAC,KAAK,CAAC,cAAc,CACjC,UAAsB,EACtB,MAAoB;QAEpB,IAAI,IAAI,CAAC,0BAA0B,CAAC,UAAU,CAAC,EAAE,CAAC;YAChD,OAAO,MAAM,IAAI,CAAC,0BAA0B,CAC1C,UAAU,CAAC,eAA0B,EACrC,MAAM,CACP,CAAC;QACJ,CAAC;QACD,OAAO,IAAI,CAAC,6BAA6B,EAAE,CAAC;IAC9C,CAAC;IAED,4EAA4E;IACpE,MAAM,CAAC,0BAA0B,CAAC,UAAsB;QAC9D,iIAAiI;QACjI,OAAO,UAAU,CAAC,OAAO,EAAE,KAAK,IAAI,CAAC,IAAI,UAAU,CAAC,OAAO,EAAE,KAAK,IAAI,CAAC,CAAC;IAC1E,CAAC;IAED,oGAAoG;IACpG,8EAA8E;IAC9E,0GAA0G;IAClG,MAAM,CAAC,6BAA6B;QAC1C,OAAO;YACL,SAAS,EAAE,CAAC;YACZ,OAAO,EAAE,CAAC,kBAAsB,CAAC;YACjC,WAAW,EAAE,6BAAkB;SAChC,CAAC;IACJ,CAAC;CACF;AAxwBD,8BAwwBC"}
|
|
@@ -4,13 +4,12 @@ export declare const LocalNodeEnv: Schema.Struct<{
|
|
|
4
4
|
STATE_DUMP: typeof Schema.String;
|
|
5
5
|
EXECUTOR_ADDRESS: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
|
6
6
|
ECIES_PUBLIC_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
7
|
-
CALLBACK_ADDRESS: Schema.TemplateLiteral<`0x${string}`>;
|
|
8
7
|
SENDER_ADDRESS: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
|
9
8
|
SENDER_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
9
|
+
EIP712_SIGNER_ADDRESS: Schema.optional<Schema.TemplateLiteral<`0x${string}`>>;
|
|
10
10
|
PEPPER: typeof Schema.String;
|
|
11
11
|
COVALIDATOR_ECIES_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
12
12
|
COVALIDATOR_EIP712_PRIVATE_SIGNING_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
13
|
-
COVALIDATOR_CALLBACK_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
|
|
14
13
|
COVALIDATOR_ACL_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
|
15
14
|
COVALIDATOR_INCO_EXECUTOR_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|
|
16
15
|
COVALIDATOR_DECRYPTION_HANDLER_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
|