@inco/js 0.7.1 → 0.7.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/advancedacl/session-key.d.ts +9 -3
- package/dist/cjs/advancedacl/session-key.js +18 -7
- package/dist/cjs/attestedcompute/attested-compute.d.ts +32 -4
- package/dist/cjs/attestedcompute/attested-compute.js +13 -13
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +12 -6
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +40 -7
- package/dist/cjs/attesteddecrypt/types.d.ts +1 -0
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +49 -0
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.js +16 -5
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +28 -14
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +2 -2
- package/dist/cjs/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +364 -0
- package/dist/cjs/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.js +88 -0
- package/dist/cjs/generated/lightning.d.ts +20 -0
- package/dist/cjs/generated/lightning.js +22 -1
- package/dist/cjs/generated/local-node.d.ts +3 -3
- package/dist/cjs/generated/local-node.js +3 -3
- package/dist/cjs/kms/quorumClient.d.ts +1 -1
- package/dist/cjs/kms/quorumClient.js +118 -17
- package/dist/cjs/lite/attested-compute.d.ts +2 -2
- package/dist/cjs/lite/attested-compute.js +3 -3
- package/dist/cjs/lite/attested-decrypt.d.ts +2 -2
- package/dist/cjs/lite/attested-decrypt.js +3 -3
- package/dist/cjs/lite/lightning.d.ts +67 -7
- package/dist/cjs/lite/lightning.js +105 -40
- package/dist/cjs/test/mocks.js +4 -2
- package/dist/esm/advancedacl/session-key.d.ts +9 -3
- package/dist/esm/advancedacl/session-key.js +20 -9
- package/dist/esm/attestedcompute/attested-compute.d.ts +32 -4
- package/dist/esm/attestedcompute/attested-compute.js +14 -14
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +12 -6
- package/dist/esm/attesteddecrypt/attested-decrypt.js +39 -7
- package/dist/esm/attesteddecrypt/types.d.ts +1 -0
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +49 -0
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.js +14 -3
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +28 -14
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +2 -2
- package/dist/esm/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +364 -0
- package/dist/esm/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.js +85 -0
- package/dist/esm/generated/lightning.d.ts +20 -0
- package/dist/esm/generated/lightning.js +22 -1
- package/dist/esm/generated/local-node.d.ts +3 -3
- package/dist/esm/generated/local-node.js +3 -3
- package/dist/esm/kms/quorumClient.d.ts +1 -1
- package/dist/esm/kms/quorumClient.js +118 -17
- package/dist/esm/lite/attested-compute.d.ts +2 -2
- package/dist/esm/lite/attested-compute.js +3 -3
- package/dist/esm/lite/attested-decrypt.d.ts +2 -2
- package/dist/esm/lite/attested-decrypt.js +3 -3
- package/dist/esm/lite/lightning.d.ts +67 -7
- package/dist/esm/lite/lightning.js +105 -40
- package/dist/esm/test/mocks.js +4 -2
- package/dist/types/advancedacl/session-key.d.ts +9 -3
- package/dist/types/attestedcompute/attested-compute.d.ts +32 -4
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +12 -6
- package/dist/types/attesteddecrypt/types.d.ts +1 -0
- package/dist/types/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +49 -0
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +28 -14
- package/dist/types/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +364 -0
- package/dist/types/generated/lightning.d.ts +20 -0
- package/dist/types/generated/local-node.d.ts +3 -3
- package/dist/types/kms/quorumClient.d.ts +1 -1
- package/dist/types/lite/attested-compute.d.ts +2 -2
- package/dist/types/lite/attested-decrypt.d.ts +2 -2
- package/dist/types/lite/lightning.d.ts +67 -7
- package/package.json +1 -1
|
@@ -3,14 +3,15 @@
|
|
|
3
3
|
// @generated from file inco/covalidator/compute/v1/server.proto (package inco.covalidator.compute.v1, syntax proto3)
|
|
4
4
|
/* eslint-disable */
|
|
5
5
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
exports.ComputeService = exports.FheOperationSchema = exports.FheOperation = exports.InputToStoredCryptogramResponseSchema = exports.InputToStoredCryptogramRequestSchema = exports.SingleVerificationResponseSchema = exports.SingleCiphertextResponseSchema = exports.SingleEListReverseOpRequestSchema = exports.SingleEListShuffleOpRequestSchema = exports.SingleEListRangeOpRequestSchema = exports.SingleEListSetOpRequestSchema = exports.SingleEListGetOrOpRequestSchema = exports.SingleEListGetOpRequestSchema = exports.SingleEListSliceOpRequestSchema = exports.SingleEListConcatOpRequestSchema = exports.SingleEListInsertOpRequestSchema = exports.SingleEListAppendOpRequestSchema = exports.SingleNewEListOpRequestSchema = exports.SingleRandBoundedOpRequestSchema = exports.SingleRandOpRequestSchema = exports.SingleTrivialOpRequestSchema = exports.SingleTernaryOpRequestSchema = exports.SingleBinaryOpScalarRequestSchema = exports.SingleBinaryOpRequestSchema = exports.SingleUnaryOpRequestSchema = exports.SingleCastOpRequestSchema = exports.file_inco_covalidator_compute_v1_server = void 0;
|
|
6
|
+
exports.ComputeService = exports.FheOperationSchema = exports.FheOperation = exports.ConfigureResponseSchema = exports.ConfigureRequestSchema = exports.InputToStoredCryptogramResponseSchema = exports.InputToStoredCryptogramRequestSchema = exports.SingleVerificationResponseSchema = exports.SingleCiphertextResponseSchema = exports.SingleEListReverseOpRequestSchema = exports.SingleEListShuffleOpRequestSchema = exports.SingleEListRangeOpRequestSchema = exports.SingleEListSetOpRequestSchema = exports.SingleEListGetOrOpRequestSchema = exports.SingleEListGetOpRequestSchema = exports.SingleEListSliceOpRequestSchema = exports.SingleEListConcatOpRequestSchema = exports.SingleEListInsertOpRequestSchema = exports.SingleEListAppendOpRequestSchema = exports.SingleNewEListOpRequestSchema = exports.SingleRandBoundedOpRequestSchema = exports.SingleRandOpRequestSchema = exports.SingleTrivialOpRequestSchema = exports.SingleTernaryOpRequestSchema = exports.SingleBinaryOpScalarRequestSchema = exports.SingleBinaryOpRequestSchema = exports.SingleUnaryOpRequestSchema = exports.SingleCastOpRequestSchema = exports.file_inco_covalidator_compute_v1_server = void 0;
|
|
7
7
|
const codegenv2_1 = require("@bufbuild/protobuf/codegenv2");
|
|
8
|
-
const types_pb_1 = require("
|
|
9
|
-
const types_pb_2 = require("
|
|
8
|
+
const types_pb_1 = require("./types_pb");
|
|
9
|
+
const types_pb_2 = require("../../../kms/lite/v1/types_pb");
|
|
10
|
+
const sealingfetcher_pb_1 = require("../../../sealingfetcher/v1/sealingfetcher_pb");
|
|
10
11
|
/**
|
|
11
12
|
* Describes the file inco/covalidator/compute/v1/server.proto.
|
|
12
13
|
*/
|
|
13
|
-
exports.file_inco_covalidator_compute_v1_server = (0, codegenv2_1.fileDesc)("
|
|
14
|
+
exports.file_inco_covalidator_compute_v1_server = (0, codegenv2_1.fileDesc)("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", [types_pb_1.file_inco_covalidator_compute_v1_types, types_pb_2.file_inco_kms_lite_v1_types, sealingfetcher_pb_1.file_inco_sealingfetcher_v1_sealingfetcher]);
|
|
14
15
|
/**
|
|
15
16
|
* Describes the message inco.covalidator.compute.v1.SingleCastOpRequest.
|
|
16
17
|
* Use `create(SingleCastOpRequestSchema)` to create a new message.
|
|
@@ -126,6 +127,16 @@ exports.InputToStoredCryptogramRequestSchema = (0, codegenv2_1.messageDesc)(expo
|
|
|
126
127
|
* Use `create(InputToStoredCryptogramResponseSchema)` to create a new message.
|
|
127
128
|
*/
|
|
128
129
|
exports.InputToStoredCryptogramResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_covalidator_compute_v1_server, 22);
|
|
130
|
+
/**
|
|
131
|
+
* Describes the message inco.covalidator.compute.v1.ConfigureRequest.
|
|
132
|
+
* Use `create(ConfigureRequestSchema)` to create a new message.
|
|
133
|
+
*/
|
|
134
|
+
exports.ConfigureRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_covalidator_compute_v1_server, 23);
|
|
135
|
+
/**
|
|
136
|
+
* Describes the message inco.covalidator.compute.v1.ConfigureResponse.
|
|
137
|
+
* Use `create(ConfigureResponseSchema)` to create a new message.
|
|
138
|
+
*/
|
|
139
|
+
exports.ConfigureResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_covalidator_compute_v1_server, 24);
|
|
129
140
|
/**
|
|
130
141
|
* @generated from enum inco.covalidator.compute.v1.FheOperation
|
|
131
142
|
*/
|
|
@@ -258,4 +269,4 @@ exports.FheOperationSchema = (0, codegenv2_1.enumDesc)(exports.file_inco_covalid
|
|
|
258
269
|
* @generated from service inco.covalidator.compute.v1.ComputeService
|
|
259
270
|
*/
|
|
260
271
|
exports.ComputeService = (0, codegenv2_1.serviceDesc)(exports.file_inco_covalidator_compute_v1_server, 0);
|
|
261
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
272
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -146,10 +146,23 @@ export type AttestedComputeRequest = Message<"inco.kms.lite.v1.AttestedComputeRe
|
|
|
146
146
|
* @generated from field: string user_address = 1;
|
|
147
147
|
*/
|
|
148
148
|
userAddress: string;
|
|
149
|
+
/**
|
|
150
|
+
* reencrypt_pub_key is the encoding of the user's public
|
|
151
|
+
* encryption key (secp256k1) used to reencrypt the result for.
|
|
152
|
+
* It is encoded in its 33-byte compressed format.
|
|
153
|
+
* If empty, the KMS will return plaintext decryption instead of reencryption.
|
|
154
|
+
*
|
|
155
|
+
* @generated from field: bytes reencrypt_pub_key = 2;
|
|
156
|
+
*/
|
|
157
|
+
reencryptPubKey: Uint8Array;
|
|
149
158
|
/**
|
|
150
159
|
* eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
|
|
151
160
|
* `user_address` (note that we only give a JSON representation for the sake of
|
|
152
|
-
* readability, but the actual signed data is defined in the EIP-712 spec):
|
|
161
|
+
* readability, but the actual signed data is defined in the EIP-712 spec) where:
|
|
162
|
+
* op - operation to perform
|
|
163
|
+
* lhs - handle of the ciphertext to perform computation on
|
|
164
|
+
* rhs - second plaintext scalar operand
|
|
165
|
+
* publicKey - 0x prefixed reencrypt_pub_key (if any). "0x" otherwise if empty.
|
|
153
166
|
*
|
|
154
167
|
* ```json
|
|
155
168
|
* {
|
|
@@ -160,9 +173,10 @@ export type AttestedComputeRequest = Message<"inco.kms.lite.v1.AttestedComputeRe
|
|
|
160
173
|
* { "name": "chainId", "type": "uint256" }
|
|
161
174
|
* ],
|
|
162
175
|
* "AttestedComputeRequest": [
|
|
163
|
-
* { "name": "op", "type" "uint8"},
|
|
164
|
-
* { "name": "lhs", "type" "bytes32"},
|
|
165
|
-
* { "name": "rhs", "type" "bytes32"}
|
|
176
|
+
* { "name": "op", "type": "uint8"},
|
|
177
|
+
* { "name": "lhs", "type": "bytes32"},
|
|
178
|
+
* { "name": "rhs", "type": "bytes32"},
|
|
179
|
+
* { "name": "publicKey", "type": "bytes" },
|
|
166
180
|
* ]
|
|
167
181
|
* },
|
|
168
182
|
* "primaryType": "AttestedComputeRequest",
|
|
@@ -174,18 +188,19 @@ export type AttestedComputeRequest = Message<"inco.kms.lite.v1.AttestedComputeRe
|
|
|
174
188
|
* "message": {
|
|
175
189
|
* "op": <operation>,
|
|
176
190
|
* "lhs": "<handle1>",
|
|
177
|
-
* "rhs": <plaintextBytes
|
|
191
|
+
* "rhs": <plaintextBytes>, // Also add a comment on length & encoding
|
|
192
|
+
* "publicKey": "0x<reencrypt_pub_key>"
|
|
178
193
|
* }
|
|
179
194
|
* }
|
|
180
195
|
* ```
|
|
181
196
|
*
|
|
182
|
-
* @generated from field: bytes eip712_signature =
|
|
197
|
+
* @generated from field: bytes eip712_signature = 3;
|
|
183
198
|
*/
|
|
184
199
|
eip712Signature: Uint8Array;
|
|
185
200
|
/**
|
|
186
201
|
* Subset of supported binary operations that can be performed on a handle.
|
|
187
202
|
*
|
|
188
|
-
* @generated from field: inco.kms.lite.v1.SupportedScalarBinaryOp op =
|
|
203
|
+
* @generated from field: inco.kms.lite.v1.SupportedScalarBinaryOp op = 4;
|
|
189
204
|
*/
|
|
190
205
|
op: SupportedScalarBinaryOp;
|
|
191
206
|
/**
|
|
@@ -193,13 +208,13 @@ export type AttestedComputeRequest = Message<"inco.kms.lite.v1.AttestedComputeRe
|
|
|
193
208
|
* The user_address must have ACL access to the handle for the attested
|
|
194
209
|
* compute to succeed.
|
|
195
210
|
*
|
|
196
|
-
* @generated from field: string lhs_handle =
|
|
211
|
+
* @generated from field: string lhs_handle = 5;
|
|
197
212
|
*/
|
|
198
213
|
lhsHandle: string;
|
|
199
214
|
/**
|
|
200
215
|
* Second plaintext scalar operand encoded as a hex string (with or without 0x prefix)
|
|
201
216
|
*
|
|
202
|
-
* @generated from field: string rhs_plaintext =
|
|
217
|
+
* @generated from field: string rhs_plaintext = 6;
|
|
203
218
|
*/
|
|
204
219
|
rhsPlaintext: string;
|
|
205
220
|
/**
|
|
@@ -207,7 +222,7 @@ export type AttestedComputeRequest = Message<"inco.kms.lite.v1.AttestedComputeRe
|
|
|
207
222
|
* Either the user_address or sharer must have ACL access to the handles for the attested
|
|
208
223
|
* compute to succeed.
|
|
209
224
|
*
|
|
210
|
-
* @generated from field: inco.kms.lite.v1.ACLProof acl_proof =
|
|
225
|
+
* @generated from field: inco.kms.lite.v1.ACLProof acl_proof = 7;
|
|
211
226
|
*/
|
|
212
227
|
aclProof?: ACLProof;
|
|
213
228
|
};
|
|
@@ -303,12 +318,11 @@ export type Reencryption = Message<"inco.kms.lite.v1.Reencryption"> & {
|
|
|
303
318
|
*/
|
|
304
319
|
userCiphertext: Uint8Array;
|
|
305
320
|
/**
|
|
306
|
-
*
|
|
307
|
-
* TODO scalar declaration.
|
|
321
|
+
* Encrypted signature over the plaintext, encrypted to the user's public key. Can only be decrypted by the user.
|
|
308
322
|
*
|
|
309
|
-
* @generated from field:
|
|
323
|
+
* @generated from field: bytes encrypted_signature = 3;
|
|
310
324
|
*/
|
|
311
|
-
|
|
325
|
+
encryptedSignature: Uint8Array;
|
|
312
326
|
};
|
|
313
327
|
/**
|
|
314
328
|
* Describes the message inco.kms.lite.v1.Reencryption.
|
|
@@ -9,7 +9,7 @@ const types_pb_1 = require("./types_pb");
|
|
|
9
9
|
/**
|
|
10
10
|
* Describes the file inco/kms/lite/v1/kms_service.proto.
|
|
11
11
|
*/
|
|
12
|
-
exports.file_inco_kms_lite_v1_kms_service = (0, codegenv2_1.fileDesc)("
|
|
12
|
+
exports.file_inco_kms_lite_v1_kms_service = (0, codegenv2_1.fileDesc)("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", [types_pb_1.file_inco_kms_lite_v1_types]);
|
|
13
13
|
/**
|
|
14
14
|
* Describes the message inco.kms.lite.v1.KeyRequest.
|
|
15
15
|
* Use `create(KeyRequestSchema)` to create a new message.
|
|
@@ -162,4 +162,4 @@ exports.SupportedScalarBinaryOpSchema = (0, codegenv2_1.enumDesc)(exports.file_i
|
|
|
162
162
|
* @generated from service inco.kms.lite.v1.KmsService
|
|
163
163
|
*/
|
|
164
164
|
exports.KmsService = (0, codegenv2_1.serviceDesc)(exports.file_inco_kms_lite_v1_kms_service, 0);
|
|
165
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
165
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,364 @@
|
|
|
1
|
+
import type { GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv2";
|
|
2
|
+
import type { Message } from "@bufbuild/protobuf";
|
|
3
|
+
/**
|
|
4
|
+
* Describes the file inco/sealingfetcher/v1/sealingfetcher.proto.
|
|
5
|
+
*/
|
|
6
|
+
export declare const file_inco_sealingfetcher_v1_sealingfetcher: GenFile;
|
|
7
|
+
/**
|
|
8
|
+
* StartBackupRequest is the request type of StartBackup rpc.
|
|
9
|
+
* This request backs up all TEE keys (EOA, Network, and Storage keys).
|
|
10
|
+
*
|
|
11
|
+
* @generated from message inco.sealingfetcher.v1.StartBackupRequest
|
|
12
|
+
*/
|
|
13
|
+
export type StartBackupRequest = Message<"inco.sealingfetcher.v1.StartBackupRequest"> & {
|
|
14
|
+
/**
|
|
15
|
+
* The Sealing Provider to backup the TEE keys to.
|
|
16
|
+
*
|
|
17
|
+
* @generated from field: inco.sealingfetcher.v1.RATlsServer sealing_provider = 1;
|
|
18
|
+
*/
|
|
19
|
+
sealingProvider?: RATlsServer;
|
|
20
|
+
/**
|
|
21
|
+
* The TEE keys to backup. All three keys (EOA, Network, and Storage) should be provided.
|
|
22
|
+
*
|
|
23
|
+
* @generated from field: inco.sealingfetcher.v1.TeeKeys tee_keys = 2;
|
|
24
|
+
*/
|
|
25
|
+
teeKeys?: TeeKeys;
|
|
26
|
+
};
|
|
27
|
+
/**
|
|
28
|
+
* Describes the message inco.sealingfetcher.v1.StartBackupRequest.
|
|
29
|
+
* Use `create(StartBackupRequestSchema)` to create a new message.
|
|
30
|
+
*/
|
|
31
|
+
export declare const StartBackupRequestSchema: GenMessage<StartBackupRequest>;
|
|
32
|
+
/**
|
|
33
|
+
* RATlsServer is the information on how to connect to the RA-TLS secured server.
|
|
34
|
+
*
|
|
35
|
+
* @generated from message inco.sealingfetcher.v1.RATlsServer
|
|
36
|
+
*/
|
|
37
|
+
export type RATlsServer = Message<"inco.sealingfetcher.v1.RATlsServer"> & {
|
|
38
|
+
/**
|
|
39
|
+
* tls_service_url is the URL of the TLS server that is a secured using RA-TLS.
|
|
40
|
+
*
|
|
41
|
+
* @generated from field: string tls_service_url = 1;
|
|
42
|
+
*/
|
|
43
|
+
tlsServiceUrl: string;
|
|
44
|
+
/**
|
|
45
|
+
* cert_service_url is the URL of the certificate service to get the certificate for the RA-TLS gRPC server.
|
|
46
|
+
* It is not necessarily a secure channel.
|
|
47
|
+
*
|
|
48
|
+
* @generated from field: string cert_service_url = 2;
|
|
49
|
+
*/
|
|
50
|
+
certServiceUrl: string;
|
|
51
|
+
};
|
|
52
|
+
/**
|
|
53
|
+
* Describes the message inco.sealingfetcher.v1.RATlsServer.
|
|
54
|
+
* Use `create(RATlsServerSchema)` to create a new message.
|
|
55
|
+
*/
|
|
56
|
+
export declare const RATlsServerSchema: GenMessage<RATlsServer>;
|
|
57
|
+
/**
|
|
58
|
+
* StartBackupEOARequest is the request type of StartBackupEOA rpc.
|
|
59
|
+
* This request backs up only the EOA private key.
|
|
60
|
+
*
|
|
61
|
+
* @generated from message inco.sealingfetcher.v1.StartBackupEOARequest
|
|
62
|
+
*/
|
|
63
|
+
export type StartBackupEOARequest = Message<"inco.sealingfetcher.v1.StartBackupEOARequest"> & {
|
|
64
|
+
/**
|
|
65
|
+
* The Sealing Provider to backup the EOA key to.
|
|
66
|
+
*
|
|
67
|
+
* @generated from field: inco.sealingfetcher.v1.RATlsServer sealing_provider = 1;
|
|
68
|
+
*/
|
|
69
|
+
sealingProvider?: RATlsServer;
|
|
70
|
+
/**
|
|
71
|
+
* The EOA private key to backup.
|
|
72
|
+
* The private key is encoded as an unsigned 256-bit big-endian integer in
|
|
73
|
+
* the range [0, N-1], where N is the order of the curve.
|
|
74
|
+
*
|
|
75
|
+
* @generated from field: bytes eoa_privkey = 2;
|
|
76
|
+
*/
|
|
77
|
+
eoaPrivkey: Uint8Array;
|
|
78
|
+
};
|
|
79
|
+
/**
|
|
80
|
+
* Describes the message inco.sealingfetcher.v1.StartBackupEOARequest.
|
|
81
|
+
* Use `create(StartBackupEOARequestSchema)` to create a new message.
|
|
82
|
+
*/
|
|
83
|
+
export declare const StartBackupEOARequestSchema: GenMessage<StartBackupEOARequest>;
|
|
84
|
+
/**
|
|
85
|
+
* StartBackupEOAResponse is the response type of StartBackupEOA rpc.
|
|
86
|
+
*
|
|
87
|
+
* @generated from message inco.sealingfetcher.v1.StartBackupEOAResponse
|
|
88
|
+
*/
|
|
89
|
+
export type StartBackupEOAResponse = Message<"inco.sealingfetcher.v1.StartBackupEOAResponse"> & {};
|
|
90
|
+
/**
|
|
91
|
+
* Describes the message inco.sealingfetcher.v1.StartBackupEOAResponse.
|
|
92
|
+
* Use `create(StartBackupEOAResponseSchema)` to create a new message.
|
|
93
|
+
*/
|
|
94
|
+
export declare const StartBackupEOAResponseSchema: GenMessage<StartBackupEOAResponse>;
|
|
95
|
+
/**
|
|
96
|
+
* TeeKeys is a struct containing all the TEE keys, unsealed.
|
|
97
|
+
*
|
|
98
|
+
* @generated from message inco.sealingfetcher.v1.TeeKeys
|
|
99
|
+
*/
|
|
100
|
+
export type TeeKeys = Message<"inco.sealingfetcher.v1.TeeKeys"> & {
|
|
101
|
+
/**
|
|
102
|
+
* The EOA private key belonging to that TEE
|
|
103
|
+
* The private key is encoded as an unsigned 256-bit big-endian integer in
|
|
104
|
+
* the range [0, N-1], where N is the order of the curve.
|
|
105
|
+
*
|
|
106
|
+
* @generated from field: bytes eoa_privkey = 1;
|
|
107
|
+
*/
|
|
108
|
+
eoaPrivkey: Uint8Array;
|
|
109
|
+
/**
|
|
110
|
+
* The Network private key that the TEE generated during the bootstrap process.
|
|
111
|
+
* This is simply a 32-byte array, that can be used as-is as a sepc256k1
|
|
112
|
+
* private key.
|
|
113
|
+
*
|
|
114
|
+
* @generated from field: bytes network_privkey = 2;
|
|
115
|
+
*/
|
|
116
|
+
networkPrivkey: Uint8Array;
|
|
117
|
+
/**
|
|
118
|
+
* The storage private key belonging to that TEE
|
|
119
|
+
* This is simply a 32-byte array, that can be used as-is as a 256-bit
|
|
120
|
+
* ChaCha20-Poly1305 secret key.
|
|
121
|
+
*
|
|
122
|
+
* @generated from field: bytes storage_privkey = 3;
|
|
123
|
+
*/
|
|
124
|
+
storagePrivkey: Uint8Array;
|
|
125
|
+
};
|
|
126
|
+
/**
|
|
127
|
+
* Describes the message inco.sealingfetcher.v1.TeeKeys.
|
|
128
|
+
* Use `create(TeeKeysSchema)` to create a new message.
|
|
129
|
+
*/
|
|
130
|
+
export declare const TeeKeysSchema: GenMessage<TeeKeys>;
|
|
131
|
+
/**
|
|
132
|
+
* StartBackupResponse is the response type of StartBackup rpc.
|
|
133
|
+
*
|
|
134
|
+
* @generated from message inco.sealingfetcher.v1.StartBackupResponse
|
|
135
|
+
*/
|
|
136
|
+
export type StartBackupResponse = Message<"inco.sealingfetcher.v1.StartBackupResponse"> & {};
|
|
137
|
+
/**
|
|
138
|
+
* Describes the message inco.sealingfetcher.v1.StartBackupResponse.
|
|
139
|
+
* Use `create(StartBackupResponseSchema)` to create a new message.
|
|
140
|
+
*/
|
|
141
|
+
export declare const StartBackupResponseSchema: GenMessage<StartBackupResponse>;
|
|
142
|
+
/**
|
|
143
|
+
* HasTEEKeysRequest is the request type of HasTEEKeys rpc.
|
|
144
|
+
*
|
|
145
|
+
* @generated from message inco.sealingfetcher.v1.HasTEEKeysRequest
|
|
146
|
+
*/
|
|
147
|
+
export type HasTEEKeysRequest = Message<"inco.sealingfetcher.v1.HasTEEKeysRequest"> & {};
|
|
148
|
+
/**
|
|
149
|
+
* Describes the message inco.sealingfetcher.v1.HasTEEKeysRequest.
|
|
150
|
+
* Use `create(HasTEEKeysRequestSchema)` to create a new message.
|
|
151
|
+
*/
|
|
152
|
+
export declare const HasTEEKeysRequestSchema: GenMessage<HasTEEKeysRequest>;
|
|
153
|
+
/**
|
|
154
|
+
* HasTEEKeysResponse is the response type of HasTEEKeys rpc.
|
|
155
|
+
*
|
|
156
|
+
* @generated from message inco.sealingfetcher.v1.HasTEEKeysResponse
|
|
157
|
+
*/
|
|
158
|
+
export type HasTEEKeysResponse = Message<"inco.sealingfetcher.v1.HasTEEKeysResponse"> & {
|
|
159
|
+
/**
|
|
160
|
+
* True if the TEE keys are present in the sealing fetcher's memory.
|
|
161
|
+
*
|
|
162
|
+
* @generated from field: bool has_tee_keys = 1;
|
|
163
|
+
*/
|
|
164
|
+
hasTeeKeys: boolean;
|
|
165
|
+
};
|
|
166
|
+
/**
|
|
167
|
+
* Describes the message inco.sealingfetcher.v1.HasTEEKeysResponse.
|
|
168
|
+
* Use `create(HasTEEKeysResponseSchema)` to create a new message.
|
|
169
|
+
*/
|
|
170
|
+
export declare const HasTEEKeysResponseSchema: GenMessage<HasTEEKeysResponse>;
|
|
171
|
+
/**
|
|
172
|
+
* GetTEEKeysRequest is the request type of GetTEEKeys rpc.
|
|
173
|
+
*
|
|
174
|
+
* @generated from message inco.sealingfetcher.v1.GetTEEKeysRequest
|
|
175
|
+
*/
|
|
176
|
+
export type GetTEEKeysRequest = Message<"inco.sealingfetcher.v1.GetTEEKeysRequest"> & {};
|
|
177
|
+
/**
|
|
178
|
+
* Describes the message inco.sealingfetcher.v1.GetTEEKeysRequest.
|
|
179
|
+
* Use `create(GetTEEKeysRequestSchema)` to create a new message.
|
|
180
|
+
*/
|
|
181
|
+
export declare const GetTEEKeysRequestSchema: GenMessage<GetTEEKeysRequest>;
|
|
182
|
+
/**
|
|
183
|
+
* GetTEEKeysResponse is the response type of GetTEEKeys rpc.
|
|
184
|
+
*
|
|
185
|
+
* @generated from message inco.sealingfetcher.v1.GetTEEKeysResponse
|
|
186
|
+
*/
|
|
187
|
+
export type GetTEEKeysResponse = Message<"inco.sealingfetcher.v1.GetTEEKeysResponse"> & {
|
|
188
|
+
/**
|
|
189
|
+
* The TEE keys.
|
|
190
|
+
*
|
|
191
|
+
* @generated from field: inco.sealingfetcher.v1.TeeKeys tee_keys = 1;
|
|
192
|
+
*/
|
|
193
|
+
teeKeys?: TeeKeys;
|
|
194
|
+
};
|
|
195
|
+
/**
|
|
196
|
+
* Describes the message inco.sealingfetcher.v1.GetTEEKeysResponse.
|
|
197
|
+
* Use `create(GetTEEKeysResponseSchema)` to create a new message.
|
|
198
|
+
*/
|
|
199
|
+
export declare const GetTEEKeysResponseSchema: GenMessage<GetTEEKeysResponse>;
|
|
200
|
+
/**
|
|
201
|
+
* RecoverTEEKeysRequest is the request type of RecoverTEEKeys rpc.
|
|
202
|
+
*
|
|
203
|
+
* @generated from message inco.sealingfetcher.v1.RecoverTEEKeysRequest
|
|
204
|
+
*/
|
|
205
|
+
export type RecoverTEEKeysRequest = Message<"inco.sealingfetcher.v1.RecoverTEEKeysRequest"> & {
|
|
206
|
+
/**
|
|
207
|
+
* The Sealing Providers to recover the TEE keys from.
|
|
208
|
+
* The sealing fetcher will try each provider in order until one succeeds.
|
|
209
|
+
*
|
|
210
|
+
* @generated from field: repeated inco.sealingfetcher.v1.RATlsServer sealing_providers = 1;
|
|
211
|
+
*/
|
|
212
|
+
sealingProviders: RATlsServer[];
|
|
213
|
+
};
|
|
214
|
+
/**
|
|
215
|
+
* Describes the message inco.sealingfetcher.v1.RecoverTEEKeysRequest.
|
|
216
|
+
* Use `create(RecoverTEEKeysRequestSchema)` to create a new message.
|
|
217
|
+
*/
|
|
218
|
+
export declare const RecoverTEEKeysRequestSchema: GenMessage<RecoverTEEKeysRequest>;
|
|
219
|
+
/**
|
|
220
|
+
* RecoverTEEKeysResponse is the response type of RecoverTEEKeys rpc.
|
|
221
|
+
*
|
|
222
|
+
* @generated from message inco.sealingfetcher.v1.RecoverTEEKeysResponse
|
|
223
|
+
*/
|
|
224
|
+
export type RecoverTEEKeysResponse = Message<"inco.sealingfetcher.v1.RecoverTEEKeysResponse"> & {
|
|
225
|
+
/**
|
|
226
|
+
* The TEE keys.
|
|
227
|
+
*
|
|
228
|
+
* @generated from field: inco.sealingfetcher.v1.TeeKeys tee_keys = 1;
|
|
229
|
+
*/
|
|
230
|
+
teeKeys?: TeeKeys;
|
|
231
|
+
};
|
|
232
|
+
/**
|
|
233
|
+
* Describes the message inco.sealingfetcher.v1.RecoverTEEKeysResponse.
|
|
234
|
+
* Use `create(RecoverTEEKeysResponseSchema)` to create a new message.
|
|
235
|
+
*/
|
|
236
|
+
export declare const RecoverTEEKeysResponseSchema: GenMessage<RecoverTEEKeysResponse>;
|
|
237
|
+
/**
|
|
238
|
+
* RecoverEOAKeyRequest is the request type of RecoverEOAKey rpc.
|
|
239
|
+
*
|
|
240
|
+
* @generated from message inco.sealingfetcher.v1.RecoverEOAKeyRequest
|
|
241
|
+
*/
|
|
242
|
+
export type RecoverEOAKeyRequest = Message<"inco.sealingfetcher.v1.RecoverEOAKeyRequest"> & {
|
|
243
|
+
/**
|
|
244
|
+
* The Sealing Providers to recover the EOA key from.
|
|
245
|
+
* The sealing fetcher will try each provider in order until one succeeds.
|
|
246
|
+
*
|
|
247
|
+
* @generated from field: repeated inco.sealingfetcher.v1.RATlsServer sealing_providers = 1;
|
|
248
|
+
*/
|
|
249
|
+
sealingProviders: RATlsServer[];
|
|
250
|
+
/**
|
|
251
|
+
* The EOA address (checksummed or lowercase, 0x-prefixed) to construct the filename.
|
|
252
|
+
* The filename will be addnode_eoa_{eoa_address_lowercase}.json
|
|
253
|
+
*
|
|
254
|
+
* @generated from field: string eoa = 2;
|
|
255
|
+
*/
|
|
256
|
+
eoa: string;
|
|
257
|
+
};
|
|
258
|
+
/**
|
|
259
|
+
* Describes the message inco.sealingfetcher.v1.RecoverEOAKeyRequest.
|
|
260
|
+
* Use `create(RecoverEOAKeyRequestSchema)` to create a new message.
|
|
261
|
+
*/
|
|
262
|
+
export declare const RecoverEOAKeyRequestSchema: GenMessage<RecoverEOAKeyRequest>;
|
|
263
|
+
/**
|
|
264
|
+
* RecoverEOAKeyResponse is the response type of RecoverEOAKey rpc.
|
|
265
|
+
*
|
|
266
|
+
* @generated from message inco.sealingfetcher.v1.RecoverEOAKeyResponse
|
|
267
|
+
*/
|
|
268
|
+
export type RecoverEOAKeyResponse = Message<"inco.sealingfetcher.v1.RecoverEOAKeyResponse"> & {
|
|
269
|
+
/**
|
|
270
|
+
* The EOA private key.
|
|
271
|
+
* The private key is encoded as an unsigned 256-bit big-endian integer in
|
|
272
|
+
* the range [0, N-1], where N is the order of the curve.
|
|
273
|
+
*
|
|
274
|
+
* @generated from field: bytes eoa_privkey = 1;
|
|
275
|
+
*/
|
|
276
|
+
eoaPrivkey: Uint8Array;
|
|
277
|
+
};
|
|
278
|
+
/**
|
|
279
|
+
* Describes the message inco.sealingfetcher.v1.RecoverEOAKeyResponse.
|
|
280
|
+
* Use `create(RecoverEOAKeyResponseSchema)` to create a new message.
|
|
281
|
+
*/
|
|
282
|
+
export declare const RecoverEOAKeyResponseSchema: GenMessage<RecoverEOAKeyResponse>;
|
|
283
|
+
/**
|
|
284
|
+
* SealingFetcherService contains all RPC endpoints for the Sealing fetcher.
|
|
285
|
+
*
|
|
286
|
+
* @generated from service inco.sealingfetcher.v1.SealingFetcherService
|
|
287
|
+
*/
|
|
288
|
+
export declare const SealingFetcherService: GenService<{
|
|
289
|
+
/**
|
|
290
|
+
* StartBackup starts the backup process for the sealing provider.
|
|
291
|
+
* This RPC backs up all TEE keys (EOA, Network, and Storage keys) to the sealing provider.
|
|
292
|
+
* It stores the keys in the sealing fetcher's memory and seals all three keys to the sealing provider.
|
|
293
|
+
* Use this during bootstrap and upgrade flows when all keys are available.
|
|
294
|
+
*
|
|
295
|
+
* @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.StartBackup
|
|
296
|
+
*/
|
|
297
|
+
startBackup: {
|
|
298
|
+
methodKind: "unary";
|
|
299
|
+
input: typeof StartBackupRequestSchema;
|
|
300
|
+
output: typeof StartBackupResponseSchema;
|
|
301
|
+
};
|
|
302
|
+
/**
|
|
303
|
+
* StartBackupEOA starts the backup process for only the EOA key.
|
|
304
|
+
* This RPC backs up only the EOA private key to the sealing provider, without backing up
|
|
305
|
+
* the Network or Storage keys. It stores the EOA key in the sealing provider.
|
|
306
|
+
* Use this during the Add Node flow when only the EOA key has been generated, before
|
|
307
|
+
* the Network and Storage keys are populated.
|
|
308
|
+
*
|
|
309
|
+
* @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.StartBackupEOA
|
|
310
|
+
*/
|
|
311
|
+
startBackupEOA: {
|
|
312
|
+
methodKind: "unary";
|
|
313
|
+
input: typeof StartBackupEOARequestSchema;
|
|
314
|
+
output: typeof StartBackupEOAResponseSchema;
|
|
315
|
+
};
|
|
316
|
+
/**
|
|
317
|
+
* HasTEEKeys checks if the TEE keys are present in the sealing fetcher's memory.
|
|
318
|
+
* If not, then RecoverTEEKeys should be called first
|
|
319
|
+
*
|
|
320
|
+
* @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.HasTEEKeys
|
|
321
|
+
*/
|
|
322
|
+
hasTEEKeys: {
|
|
323
|
+
methodKind: "unary";
|
|
324
|
+
input: typeof HasTEEKeysRequestSchema;
|
|
325
|
+
output: typeof HasTEEKeysResponseSchema;
|
|
326
|
+
};
|
|
327
|
+
/**
|
|
328
|
+
* GetTEEKeys returns the set of network key, EOA key and storage key
|
|
329
|
+
* that the TEE can access.
|
|
330
|
+
* If the TEE keys are not present in the sealing fetcher's memory, then
|
|
331
|
+
* this rpc will return an error.
|
|
332
|
+
*
|
|
333
|
+
* @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.GetTEEKeys
|
|
334
|
+
*/
|
|
335
|
+
getTEEKeys: {
|
|
336
|
+
methodKind: "unary";
|
|
337
|
+
input: typeof GetTEEKeysRequestSchema;
|
|
338
|
+
output: typeof GetTEEKeysResponseSchema;
|
|
339
|
+
};
|
|
340
|
+
/**
|
|
341
|
+
* RecoverTEEKeys recovers the TEE keys from the sealed TEE keys, and stores
|
|
342
|
+
* them in the sealing fetcher's memory.
|
|
343
|
+
*
|
|
344
|
+
* @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.RecoverTEEKeys
|
|
345
|
+
*/
|
|
346
|
+
recoverTEEKeys: {
|
|
347
|
+
methodKind: "unary";
|
|
348
|
+
input: typeof RecoverTEEKeysRequestSchema;
|
|
349
|
+
output: typeof RecoverTEEKeysResponseSchema;
|
|
350
|
+
};
|
|
351
|
+
/**
|
|
352
|
+
* RecoverEOAKey recovers only the EOA private key from the sealing provider.
|
|
353
|
+
* This is used during the Add Node flow to retrieve the EOA key that was
|
|
354
|
+
* previously backed up via StartBackupEOA. The EOA key is stored with filename
|
|
355
|
+
* addnode_eoa_{eoa_address_lowercase}.json in the sealing provider.
|
|
356
|
+
*
|
|
357
|
+
* @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.RecoverEOAKey
|
|
358
|
+
*/
|
|
359
|
+
recoverEOAKey: {
|
|
360
|
+
methodKind: "unary";
|
|
361
|
+
input: typeof RecoverEOAKeyRequestSchema;
|
|
362
|
+
output: typeof RecoverEOAKeyResponseSchema;
|
|
363
|
+
};
|
|
364
|
+
}>;
|