@inco/js 0.7.2 → 0.7.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,5 +1,6 @@
1
1
  import type { GenEnum, GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv2";
2
2
  import type { InputCryptogram, StoredCryptogram } from "./types_pb";
3
+ import type { RATlsServer } from "../../../sealingfetcher/v1/sealingfetcher_pb";
3
4
  import type { Message } from "@bufbuild/protobuf";
4
5
  /**
5
6
  * Describes the file inco/covalidator/compute/v1/server.proto.
@@ -472,6 +473,42 @@ export type InputToStoredCryptogramResponse = Message<"inco.covalidator.compute.
472
473
  * Use `create(InputToStoredCryptogramResponseSchema)` to create a new message.
473
474
  */
474
475
  export declare const InputToStoredCryptogramResponseSchema: GenMessage<InputToStoredCryptogramResponse>;
476
+ /**
477
+ * ConfigureRequest is a request to configure the compute service.
478
+ *
479
+ * @generated from message inco.covalidator.compute.v1.ConfigureRequest
480
+ */
481
+ export type ConfigureRequest = Message<"inco.covalidator.compute.v1.ConfigureRequest"> & {
482
+ /**
483
+ * The sealing providers to use to fetch the TEE keys.
484
+ *
485
+ * @generated from field: repeated inco.sealingfetcher.v1.RATlsServer sealing_providers = 1;
486
+ */
487
+ sealingProviders: RATlsServer[];
488
+ };
489
+ /**
490
+ * Describes the message inco.covalidator.compute.v1.ConfigureRequest.
491
+ * Use `create(ConfigureRequestSchema)` to create a new message.
492
+ */
493
+ export declare const ConfigureRequestSchema: GenMessage<ConfigureRequest>;
494
+ /**
495
+ * ConfigureResponse is a response to ConfigureRequest.
496
+ *
497
+ * @generated from message inco.covalidator.compute.v1.ConfigureResponse
498
+ */
499
+ export type ConfigureResponse = Message<"inco.covalidator.compute.v1.ConfigureResponse"> & {
500
+ /**
501
+ * True if the compute service was configured successfully.
502
+ *
503
+ * @generated from field: bool success = 1;
504
+ */
505
+ success: boolean;
506
+ };
507
+ /**
508
+ * Describes the message inco.covalidator.compute.v1.ConfigureResponse.
509
+ * Use `create(ConfigureResponseSchema)` to create a new message.
510
+ */
511
+ export declare const ConfigureResponseSchema: GenMessage<ConfigureResponse>;
475
512
  /**
476
513
  * @generated from enum inco.covalidator.compute.v1.FheOperation
477
514
  */
@@ -603,6 +640,18 @@ export declare const FheOperationSchema: GenEnum<FheOperation>;
603
640
  * @generated from service inco.covalidator.compute.v1.ComputeService
604
641
  */
605
642
  export declare const ComputeService: GenService<{
643
+ /**
644
+ * Configure contains all necessary configuration to start the compute service
645
+ * which are not part of the MR_AGGREGATED fingerprint. These usually include
646
+ * parameters that are specific to each TEE operator.
647
+ *
648
+ * @generated from rpc inco.covalidator.compute.v1.ComputeService.Configure
649
+ */
650
+ configure: {
651
+ methodKind: "unary";
652
+ input: typeof ConfigureRequestSchema;
653
+ output: typeof ConfigureResponseSchema;
654
+ };
606
655
  /**
607
656
  * InputToStoredCryptogram converts an input ciphertext into a compute
608
657
  * ciphertext.
@@ -3,14 +3,15 @@
3
3
  // @generated from file inco/covalidator/compute/v1/server.proto (package inco.covalidator.compute.v1, syntax proto3)
4
4
  /* eslint-disable */
5
5
  Object.defineProperty(exports, "__esModule", { value: true });
6
- exports.ComputeService = exports.FheOperationSchema = exports.FheOperation = exports.InputToStoredCryptogramResponseSchema = exports.InputToStoredCryptogramRequestSchema = exports.SingleVerificationResponseSchema = exports.SingleCiphertextResponseSchema = exports.SingleEListReverseOpRequestSchema = exports.SingleEListShuffleOpRequestSchema = exports.SingleEListRangeOpRequestSchema = exports.SingleEListSetOpRequestSchema = exports.SingleEListGetOrOpRequestSchema = exports.SingleEListGetOpRequestSchema = exports.SingleEListSliceOpRequestSchema = exports.SingleEListConcatOpRequestSchema = exports.SingleEListInsertOpRequestSchema = exports.SingleEListAppendOpRequestSchema = exports.SingleNewEListOpRequestSchema = exports.SingleRandBoundedOpRequestSchema = exports.SingleRandOpRequestSchema = exports.SingleTrivialOpRequestSchema = exports.SingleTernaryOpRequestSchema = exports.SingleBinaryOpScalarRequestSchema = exports.SingleBinaryOpRequestSchema = exports.SingleUnaryOpRequestSchema = exports.SingleCastOpRequestSchema = exports.file_inco_covalidator_compute_v1_server = void 0;
6
+ exports.ComputeService = exports.FheOperationSchema = exports.FheOperation = exports.ConfigureResponseSchema = exports.ConfigureRequestSchema = exports.InputToStoredCryptogramResponseSchema = exports.InputToStoredCryptogramRequestSchema = exports.SingleVerificationResponseSchema = exports.SingleCiphertextResponseSchema = exports.SingleEListReverseOpRequestSchema = exports.SingleEListShuffleOpRequestSchema = exports.SingleEListRangeOpRequestSchema = exports.SingleEListSetOpRequestSchema = exports.SingleEListGetOrOpRequestSchema = exports.SingleEListGetOpRequestSchema = exports.SingleEListSliceOpRequestSchema = exports.SingleEListConcatOpRequestSchema = exports.SingleEListInsertOpRequestSchema = exports.SingleEListAppendOpRequestSchema = exports.SingleNewEListOpRequestSchema = exports.SingleRandBoundedOpRequestSchema = exports.SingleRandOpRequestSchema = exports.SingleTrivialOpRequestSchema = exports.SingleTernaryOpRequestSchema = exports.SingleBinaryOpScalarRequestSchema = exports.SingleBinaryOpRequestSchema = exports.SingleUnaryOpRequestSchema = exports.SingleCastOpRequestSchema = exports.file_inco_covalidator_compute_v1_server = void 0;
7
7
  const codegenv2_1 = require("@bufbuild/protobuf/codegenv2");
8
- const types_pb_1 = require("../../../kms/lite/v1/types_pb");
9
- const types_pb_2 = require("./types_pb");
8
+ const types_pb_1 = require("./types_pb");
9
+ const types_pb_2 = require("../../../kms/lite/v1/types_pb");
10
+ const sealingfetcher_pb_1 = require("../../../sealingfetcher/v1/sealingfetcher_pb");
10
11
  /**
11
12
  * Describes the file inco/covalidator/compute/v1/server.proto.
12
13
  */
13
- exports.file_inco_covalidator_compute_v1_server = (0, codegenv2_1.fileDesc)("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", [types_pb_1.file_inco_kms_lite_v1_types, types_pb_2.file_inco_covalidator_compute_v1_types]);
14
+ exports.file_inco_covalidator_compute_v1_server = (0, codegenv2_1.fileDesc)("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", [types_pb_1.file_inco_covalidator_compute_v1_types, types_pb_2.file_inco_kms_lite_v1_types, sealingfetcher_pb_1.file_inco_sealingfetcher_v1_sealingfetcher]);
14
15
  /**
15
16
  * Describes the message inco.covalidator.compute.v1.SingleCastOpRequest.
16
17
  * Use `create(SingleCastOpRequestSchema)` to create a new message.
@@ -126,6 +127,16 @@ exports.InputToStoredCryptogramRequestSchema = (0, codegenv2_1.messageDesc)(expo
126
127
  * Use `create(InputToStoredCryptogramResponseSchema)` to create a new message.
127
128
  */
128
129
  exports.InputToStoredCryptogramResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_covalidator_compute_v1_server, 22);
130
+ /**
131
+ * Describes the message inco.covalidator.compute.v1.ConfigureRequest.
132
+ * Use `create(ConfigureRequestSchema)` to create a new message.
133
+ */
134
+ exports.ConfigureRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_covalidator_compute_v1_server, 23);
135
+ /**
136
+ * Describes the message inco.covalidator.compute.v1.ConfigureResponse.
137
+ * Use `create(ConfigureResponseSchema)` to create a new message.
138
+ */
139
+ exports.ConfigureResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_covalidator_compute_v1_server, 24);
129
140
  /**
130
141
  * @generated from enum inco.covalidator.compute.v1.FheOperation
131
142
  */
@@ -258,4 +269,4 @@ exports.FheOperationSchema = (0, codegenv2_1.enumDesc)(exports.file_inco_covalid
258
269
  * @generated from service inco.covalidator.compute.v1.ComputeService
259
270
  */
260
271
  exports.ComputeService = (0, codegenv2_1.serviceDesc)(exports.file_inco_covalidator_compute_v1_server, 0);
261
- //# sourceMappingURL=data:application/json;base64,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
272
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoic2VydmVyX3BiLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vc3JjL2dlbmVyYXRlZC9lcy9pbmNvL2NvdmFsaWRhdG9yL2NvbXB1dGUvdjEvc2VydmVyX3BiLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7QUFBQSxpRUFBaUU7QUFDakUscUhBQXFIO0FBQ3JILG9CQUFvQjs7O0FBR3BCLDREQUE0RjtBQUU1Rix5Q0FBb0U7QUFDcEUsNERBQTRFO0FBRTVFLG9GQUEwRztBQUcxRzs7R0FFRztBQUNVLFFBQUEsdUNBQXVDLEdBQ2xELElBQUEsb0JBQVEsRUFBQywwOFJBQTA4UixFQUFFLENBQUMsaURBQXNDLEVBQUUsc0NBQTJCLEVBQUUsOERBQTBDLENBQUMsQ0FBQyxDQUFDO0FBc0Ixa1M7OztHQUdHO0FBQ1UsUUFBQSx5QkFBeUIsR0FDcEMsSUFBQSx1QkFBVyxFQUFDLCtDQUF1QyxFQUFFLENBQUMsQ0FBQyxDQUFDO0FBaUIxRDs7O0dBR0c7QUFDVSxRQUFBLDBCQUEwQixHQUNyQyxJQUFBLHVCQUFXLEVBQUMsK0NBQXVDLEVBQUUsQ0FBQyxDQUFDLENBQUM7QUFzQjFEOzs7R0FHRztBQUNVLFFBQUEsMkJBQTJCLEdBQ3RDLElBQUEsdUJBQVcsRUFBQywrQ0FBdUMsRUFBRSxDQUFDLENBQUMsQ0FBQztBQXNCMUQ7OztHQUdHO0FBQ1UsUUFBQSxpQ0FBaUMsR0FDNUMsSUFBQSx1QkFBVyxFQUFDLCtDQUF1QyxFQUFFLENBQUMsQ0FBQyxDQUFDO0FBMkIxRDs7O0dBR0c7QUFDVSxRQUFBLDRCQUE0QixHQUN2QyxJQUFBLHVCQUFXLEVBQUMsK0NBQXVDLEVBQUUsQ0FBQyxDQUFDLENBQUM7QUFpQjFEOzs7R0FHRztBQUNVLFFBQUEsNEJBQTRCLEdBQ3ZDLElBQUEsdUJBQVcsRUFBQywrQ0FBdUMsRUFBRSxDQUFDLENBQUMsQ0FBQztBQXNCMUQ7OztHQUdHO0FBQ1UsUUFBQSx5QkFBeUIsR0FDcEMsSUFBQSx1QkFBVyxFQUFDLCtDQUF1QyxFQUFFLENBQUMsQ0FBQyxDQUFDO0FBMkIxRDs7O0dBR0c7QUFDVSxRQUFBLGdDQUFnQyxHQUMzQyxJQUFBLHVCQUFXLEVBQUMsK0NBQXVDLEVBQUUsQ0FBQyxDQUFDLENBQUM7QUFpQjFEOzs7R0FHRztBQUNVLFFBQUEsNkJBQTZCLEdBQ3hDLElBQUEsdUJBQVcsRUFBQywrQ0FBdUMsRUFBRSxDQUFDLENBQUMsQ0FBQztBQWlCMUQ7OztHQUdHO0FBQ1UsUUFBQSxnQ0FBZ0MsR0FDM0MsSUFBQSx1QkFBVyxFQUFDLCtDQUF1QyxFQUFFLENBQUMsQ0FBQyxDQUFDO0FBc0IxRDs7O0dBR0c7QUFDVSxRQUFBLGdDQUFnQyxHQUMzQyxJQUFBLHVCQUFXLEVBQUMsK0NBQXVDLEVBQUUsRUFBRSxDQUFDLENBQUM7QUFpQjNEOzs7R0FHRztBQUNVLFFBQUEsZ0NBQWdDLEdBQzNDLElBQUEsdUJBQVcsRUFBQywrQ0FBdUMsRUFBRSxFQUFFLENBQUMsQ0FBQztBQTJCM0Q7OztHQUdHO0FBQ1UsUUFBQSwrQkFBK0IsR0FDMUMsSUFBQSx1QkFBVyxFQUFDLCtDQUF1QyxFQUFFLEVBQUUsQ0FBQyxDQUFDO0FBaUIzRDs7O0dBR0c7QUFDVSxRQUFBLDZCQUE2QixHQUN4QyxJQUFBLHVCQUFXLEVBQUMsK0NBQXVDLEVBQUUsRUFBRSxDQUFDLENBQUM7QUFzQjNEOzs7R0FHRztBQUNVLFFBQUEsK0JBQStCLEdBQzFDLElBQUEsdUJBQVcsRUFBQywrQ0FBdUMsRUFBRSxFQUFFLENBQUMsQ0FBQztBQXNCM0Q7OztHQUdHO0FBQ1UsUUFBQSw2QkFBNkIsR0FDeEMsSUFBQSx1QkFBVyxFQUFDLCtDQUF1QyxFQUFFLEVBQUUsQ0FBQyxDQUFDO0FBaUIzRDs7O0dBR0c7QUFDVSxRQUFBLCtCQUErQixHQUMxQyxJQUFBLHVCQUFXLEVBQUMsK0NBQXVDLEVBQUUsRUFBRSxDQUFDLENBQUM7QUFpQjNEOzs7R0FHRztBQUNVLFFBQUEsaUNBQWlDLEdBQzVDLElBQUEsdUJBQVcsRUFBQywrQ0FBdUMsRUFBRSxFQUFFLENBQUMsQ0FBQztBQVkzRDs7O0dBR0c7QUFDVSxRQUFBLGlDQUFpQyxHQUM1QyxJQUFBLHVCQUFXLEVBQUMsK0NBQXVDLEVBQUUsRUFBRSxDQUFDLENBQUM7QUFZM0Q7OztHQUdHO0FBQ1UsUUFBQSw4QkFBOEIsR0FDekMsSUFBQSx1QkFBVyxFQUFDLCtDQUF1QyxFQUFFLEVBQUUsQ0FBQyxDQUFDO0FBWTNEOzs7R0FHRztBQUNVLFFBQUEsZ0NBQWdDLEdBQzNDLElBQUEsdUJBQVcsRUFBQywrQ0FBdUMsRUFBRSxFQUFFLENBQUMsQ0FBQztBQStCM0Q7OztHQUdHO0FBQ1UsUUFBQSxvQ0FBb0MsR0FDL0MsSUFBQSx1QkFBVyxFQUFDLCtDQUF1QyxFQUFFLEVBQUUsQ0FBQyxDQUFDO0FBZ0IzRDs7O0dBR0c7QUFDVSxRQUFBLHFDQUFxQyxHQUNoRCxJQUFBLHVCQUFXLEVBQUMsK0NBQXVDLEVBQUUsRUFBRSxDQUFDLENBQUM7QUFnQjNEOzs7R0FHRztBQUNVLFFBQUEsc0JBQXNCLEdBQ2pDLElBQUEsdUJBQVcsRUFBQywrQ0FBdUMsRUFBRSxFQUFFLENBQUMsQ0FBQztBQWdCM0Q7OztHQUdHO0FBQ1UsUUFBQSx1QkFBdUIsR0FDbEMsSUFBQSx1QkFBVyxFQUFDLCtDQUF1QyxFQUFFLEVBQUUsQ0FBQyxDQUFDO0FBRTNEOztHQUVHO0FBQ0gsSUFBWSxZQW1KWDtBQW5KRCxXQUFZLFlBQVk7SUFDdEI7O09BRUc7SUFDSCxxREFBVyxDQUFBO0lBRVg7O09BRUc7SUFDSCxxREFBVyxDQUFBO0lBRVg7O09BRUc7SUFDSCxxREFBVyxDQUFBO0lBRVg7O09BRUc7SUFDSCxxREFBVyxDQUFBO0lBRVg7O09BRUc7SUFDSCxxREFBVyxDQUFBO0lBRVg7O09BRUc7SUFDSCw2REFBZSxDQUFBO0lBRWY7O09BRUc7SUFDSCwyREFBYyxDQUFBO0lBRWQ7O09BRUc7SUFDSCw2REFBZSxDQUFBO0lBRWY7O09BRUc7SUFDSCxxREFBVyxDQUFBO0lBRVg7O09BRUc7SUFDSCxxREFBVyxDQUFBO0lBRVg7O09BRUc7SUFDSCx3REFBYSxDQUFBO0lBRWI7O09BRUc7SUFDSCx3REFBYSxDQUFBO0lBRWI7O09BRUc7SUFDSCxvREFBVyxDQUFBO0lBRVg7O09BRUc7SUFDSCxvREFBVyxDQUFBO0lBRVg7O09BRUc7SUFDSCxvREFBVyxDQUFBO0lBRVg7O09BRUc7SUFDSCxvREFBVyxDQUFBO0lBRVg7O09BRUc7SUFDSCxvREFBVyxDQUFBO0lBRVg7O09BRUc7SUFDSCxvREFBVyxDQUFBO0lBRVg7O09BRUc7SUFDSCxzREFBWSxDQUFBO0lBRVo7O09BRUc7SUFDSCxzREFBWSxDQUFBO0lBRVo7O09BRUc7SUFDSCxzREFBWSxDQUFBO0lBRVo7O09BRUc7SUFDSCxzREFBWSxDQUFBO0lBRVo7Ozs7T0FJRztJQUNILGtGQUEwQixDQUFBO0lBRTFCOztPQUVHO0lBQ0gsd0RBQWEsQ0FBQTtJQUViOztPQUVHO0lBQ0gsOEVBQXdCLENBQUE7SUFFeEI7O09BRUc7SUFDSCx3RUFBcUIsQ0FBQTtJQUVyQjs7T0FFRztJQUNILHdEQUFhLENBQUE7SUFFYjs7T0FFRztJQUNILHdFQUFxQixDQUFBO0lBRXJCOztPQUVHO0lBQ0gsNEVBQXVCLENBQUE7QUFDekIsQ0FBQyxFQW5KVyxZQUFZLDRCQUFaLFlBQVksUUFtSnZCO0FBRUQ7O0dBRUc7QUFDVSxRQUFBLGtCQUFrQixHQUM3QixJQUFBLG9CQUFRLEVBQUMsK0NBQXVDLEVBQUUsQ0FBQyxDQUFDLENBQUM7QUFFdkQ7O0dBRUc7QUFDVSxRQUFBLGNBQWMsR0F1THpCLElBQUEsdUJBQVcsRUFBQywrQ0FBdUMsRUFBRSxDQUFDLENBQUMsQ0FBQyJ9
@@ -0,0 +1,364 @@
1
+ import type { GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv2";
2
+ import type { Message } from "@bufbuild/protobuf";
3
+ /**
4
+ * Describes the file inco/sealingfetcher/v1/sealingfetcher.proto.
5
+ */
6
+ export declare const file_inco_sealingfetcher_v1_sealingfetcher: GenFile;
7
+ /**
8
+ * StartBackupRequest is the request type of StartBackup rpc.
9
+ * This request backs up all TEE keys (EOA, Network, and Storage keys).
10
+ *
11
+ * @generated from message inco.sealingfetcher.v1.StartBackupRequest
12
+ */
13
+ export type StartBackupRequest = Message<"inco.sealingfetcher.v1.StartBackupRequest"> & {
14
+ /**
15
+ * The Sealing Provider to backup the TEE keys to.
16
+ *
17
+ * @generated from field: inco.sealingfetcher.v1.RATlsServer sealing_provider = 1;
18
+ */
19
+ sealingProvider?: RATlsServer;
20
+ /**
21
+ * The TEE keys to backup. All three keys (EOA, Network, and Storage) should be provided.
22
+ *
23
+ * @generated from field: inco.sealingfetcher.v1.TeeKeys tee_keys = 2;
24
+ */
25
+ teeKeys?: TeeKeys;
26
+ };
27
+ /**
28
+ * Describes the message inco.sealingfetcher.v1.StartBackupRequest.
29
+ * Use `create(StartBackupRequestSchema)` to create a new message.
30
+ */
31
+ export declare const StartBackupRequestSchema: GenMessage<StartBackupRequest>;
32
+ /**
33
+ * RATlsServer is the information on how to connect to the RA-TLS secured server.
34
+ *
35
+ * @generated from message inco.sealingfetcher.v1.RATlsServer
36
+ */
37
+ export type RATlsServer = Message<"inco.sealingfetcher.v1.RATlsServer"> & {
38
+ /**
39
+ * tls_service_url is the URL of the TLS server that is a secured using RA-TLS.
40
+ *
41
+ * @generated from field: string tls_service_url = 1;
42
+ */
43
+ tlsServiceUrl: string;
44
+ /**
45
+ * cert_service_url is the URL of the certificate service to get the certificate for the RA-TLS gRPC server.
46
+ * It is not necessarily a secure channel.
47
+ *
48
+ * @generated from field: string cert_service_url = 2;
49
+ */
50
+ certServiceUrl: string;
51
+ };
52
+ /**
53
+ * Describes the message inco.sealingfetcher.v1.RATlsServer.
54
+ * Use `create(RATlsServerSchema)` to create a new message.
55
+ */
56
+ export declare const RATlsServerSchema: GenMessage<RATlsServer>;
57
+ /**
58
+ * StartBackupEOARequest is the request type of StartBackupEOA rpc.
59
+ * This request backs up only the EOA private key.
60
+ *
61
+ * @generated from message inco.sealingfetcher.v1.StartBackupEOARequest
62
+ */
63
+ export type StartBackupEOARequest = Message<"inco.sealingfetcher.v1.StartBackupEOARequest"> & {
64
+ /**
65
+ * The Sealing Provider to backup the EOA key to.
66
+ *
67
+ * @generated from field: inco.sealingfetcher.v1.RATlsServer sealing_provider = 1;
68
+ */
69
+ sealingProvider?: RATlsServer;
70
+ /**
71
+ * The EOA private key to backup.
72
+ * The private key is encoded as an unsigned 256-bit big-endian integer in
73
+ * the range [0, N-1], where N is the order of the curve.
74
+ *
75
+ * @generated from field: bytes eoa_privkey = 2;
76
+ */
77
+ eoaPrivkey: Uint8Array;
78
+ };
79
+ /**
80
+ * Describes the message inco.sealingfetcher.v1.StartBackupEOARequest.
81
+ * Use `create(StartBackupEOARequestSchema)` to create a new message.
82
+ */
83
+ export declare const StartBackupEOARequestSchema: GenMessage<StartBackupEOARequest>;
84
+ /**
85
+ * StartBackupEOAResponse is the response type of StartBackupEOA rpc.
86
+ *
87
+ * @generated from message inco.sealingfetcher.v1.StartBackupEOAResponse
88
+ */
89
+ export type StartBackupEOAResponse = Message<"inco.sealingfetcher.v1.StartBackupEOAResponse"> & {};
90
+ /**
91
+ * Describes the message inco.sealingfetcher.v1.StartBackupEOAResponse.
92
+ * Use `create(StartBackupEOAResponseSchema)` to create a new message.
93
+ */
94
+ export declare const StartBackupEOAResponseSchema: GenMessage<StartBackupEOAResponse>;
95
+ /**
96
+ * TeeKeys is a struct containing all the TEE keys, unsealed.
97
+ *
98
+ * @generated from message inco.sealingfetcher.v1.TeeKeys
99
+ */
100
+ export type TeeKeys = Message<"inco.sealingfetcher.v1.TeeKeys"> & {
101
+ /**
102
+ * The EOA private key belonging to that TEE
103
+ * The private key is encoded as an unsigned 256-bit big-endian integer in
104
+ * the range [0, N-1], where N is the order of the curve.
105
+ *
106
+ * @generated from field: bytes eoa_privkey = 1;
107
+ */
108
+ eoaPrivkey: Uint8Array;
109
+ /**
110
+ * The Network private key that the TEE generated during the bootstrap process.
111
+ * This is simply a 32-byte array, that can be used as-is as a sepc256k1
112
+ * private key.
113
+ *
114
+ * @generated from field: bytes network_privkey = 2;
115
+ */
116
+ networkPrivkey: Uint8Array;
117
+ /**
118
+ * The storage private key belonging to that TEE
119
+ * This is simply a 32-byte array, that can be used as-is as a 256-bit
120
+ * ChaCha20-Poly1305 secret key.
121
+ *
122
+ * @generated from field: bytes storage_privkey = 3;
123
+ */
124
+ storagePrivkey: Uint8Array;
125
+ };
126
+ /**
127
+ * Describes the message inco.sealingfetcher.v1.TeeKeys.
128
+ * Use `create(TeeKeysSchema)` to create a new message.
129
+ */
130
+ export declare const TeeKeysSchema: GenMessage<TeeKeys>;
131
+ /**
132
+ * StartBackupResponse is the response type of StartBackup rpc.
133
+ *
134
+ * @generated from message inco.sealingfetcher.v1.StartBackupResponse
135
+ */
136
+ export type StartBackupResponse = Message<"inco.sealingfetcher.v1.StartBackupResponse"> & {};
137
+ /**
138
+ * Describes the message inco.sealingfetcher.v1.StartBackupResponse.
139
+ * Use `create(StartBackupResponseSchema)` to create a new message.
140
+ */
141
+ export declare const StartBackupResponseSchema: GenMessage<StartBackupResponse>;
142
+ /**
143
+ * HasTEEKeysRequest is the request type of HasTEEKeys rpc.
144
+ *
145
+ * @generated from message inco.sealingfetcher.v1.HasTEEKeysRequest
146
+ */
147
+ export type HasTEEKeysRequest = Message<"inco.sealingfetcher.v1.HasTEEKeysRequest"> & {};
148
+ /**
149
+ * Describes the message inco.sealingfetcher.v1.HasTEEKeysRequest.
150
+ * Use `create(HasTEEKeysRequestSchema)` to create a new message.
151
+ */
152
+ export declare const HasTEEKeysRequestSchema: GenMessage<HasTEEKeysRequest>;
153
+ /**
154
+ * HasTEEKeysResponse is the response type of HasTEEKeys rpc.
155
+ *
156
+ * @generated from message inco.sealingfetcher.v1.HasTEEKeysResponse
157
+ */
158
+ export type HasTEEKeysResponse = Message<"inco.sealingfetcher.v1.HasTEEKeysResponse"> & {
159
+ /**
160
+ * True if the TEE keys are present in the sealing fetcher's memory.
161
+ *
162
+ * @generated from field: bool has_tee_keys = 1;
163
+ */
164
+ hasTeeKeys: boolean;
165
+ };
166
+ /**
167
+ * Describes the message inco.sealingfetcher.v1.HasTEEKeysResponse.
168
+ * Use `create(HasTEEKeysResponseSchema)` to create a new message.
169
+ */
170
+ export declare const HasTEEKeysResponseSchema: GenMessage<HasTEEKeysResponse>;
171
+ /**
172
+ * GetTEEKeysRequest is the request type of GetTEEKeys rpc.
173
+ *
174
+ * @generated from message inco.sealingfetcher.v1.GetTEEKeysRequest
175
+ */
176
+ export type GetTEEKeysRequest = Message<"inco.sealingfetcher.v1.GetTEEKeysRequest"> & {};
177
+ /**
178
+ * Describes the message inco.sealingfetcher.v1.GetTEEKeysRequest.
179
+ * Use `create(GetTEEKeysRequestSchema)` to create a new message.
180
+ */
181
+ export declare const GetTEEKeysRequestSchema: GenMessage<GetTEEKeysRequest>;
182
+ /**
183
+ * GetTEEKeysResponse is the response type of GetTEEKeys rpc.
184
+ *
185
+ * @generated from message inco.sealingfetcher.v1.GetTEEKeysResponse
186
+ */
187
+ export type GetTEEKeysResponse = Message<"inco.sealingfetcher.v1.GetTEEKeysResponse"> & {
188
+ /**
189
+ * The TEE keys.
190
+ *
191
+ * @generated from field: inco.sealingfetcher.v1.TeeKeys tee_keys = 1;
192
+ */
193
+ teeKeys?: TeeKeys;
194
+ };
195
+ /**
196
+ * Describes the message inco.sealingfetcher.v1.GetTEEKeysResponse.
197
+ * Use `create(GetTEEKeysResponseSchema)` to create a new message.
198
+ */
199
+ export declare const GetTEEKeysResponseSchema: GenMessage<GetTEEKeysResponse>;
200
+ /**
201
+ * RecoverTEEKeysRequest is the request type of RecoverTEEKeys rpc.
202
+ *
203
+ * @generated from message inco.sealingfetcher.v1.RecoverTEEKeysRequest
204
+ */
205
+ export type RecoverTEEKeysRequest = Message<"inco.sealingfetcher.v1.RecoverTEEKeysRequest"> & {
206
+ /**
207
+ * The Sealing Providers to recover the TEE keys from.
208
+ * The sealing fetcher will try each provider in order until one succeeds.
209
+ *
210
+ * @generated from field: repeated inco.sealingfetcher.v1.RATlsServer sealing_providers = 1;
211
+ */
212
+ sealingProviders: RATlsServer[];
213
+ };
214
+ /**
215
+ * Describes the message inco.sealingfetcher.v1.RecoverTEEKeysRequest.
216
+ * Use `create(RecoverTEEKeysRequestSchema)` to create a new message.
217
+ */
218
+ export declare const RecoverTEEKeysRequestSchema: GenMessage<RecoverTEEKeysRequest>;
219
+ /**
220
+ * RecoverTEEKeysResponse is the response type of RecoverTEEKeys rpc.
221
+ *
222
+ * @generated from message inco.sealingfetcher.v1.RecoverTEEKeysResponse
223
+ */
224
+ export type RecoverTEEKeysResponse = Message<"inco.sealingfetcher.v1.RecoverTEEKeysResponse"> & {
225
+ /**
226
+ * The TEE keys.
227
+ *
228
+ * @generated from field: inco.sealingfetcher.v1.TeeKeys tee_keys = 1;
229
+ */
230
+ teeKeys?: TeeKeys;
231
+ };
232
+ /**
233
+ * Describes the message inco.sealingfetcher.v1.RecoverTEEKeysResponse.
234
+ * Use `create(RecoverTEEKeysResponseSchema)` to create a new message.
235
+ */
236
+ export declare const RecoverTEEKeysResponseSchema: GenMessage<RecoverTEEKeysResponse>;
237
+ /**
238
+ * RecoverEOAKeyRequest is the request type of RecoverEOAKey rpc.
239
+ *
240
+ * @generated from message inco.sealingfetcher.v1.RecoverEOAKeyRequest
241
+ */
242
+ export type RecoverEOAKeyRequest = Message<"inco.sealingfetcher.v1.RecoverEOAKeyRequest"> & {
243
+ /**
244
+ * The Sealing Providers to recover the EOA key from.
245
+ * The sealing fetcher will try each provider in order until one succeeds.
246
+ *
247
+ * @generated from field: repeated inco.sealingfetcher.v1.RATlsServer sealing_providers = 1;
248
+ */
249
+ sealingProviders: RATlsServer[];
250
+ /**
251
+ * The EOA address (checksummed or lowercase, 0x-prefixed) to construct the filename.
252
+ * The filename will be addnode_eoa_{eoa_address_lowercase}.json
253
+ *
254
+ * @generated from field: string eoa = 2;
255
+ */
256
+ eoa: string;
257
+ };
258
+ /**
259
+ * Describes the message inco.sealingfetcher.v1.RecoverEOAKeyRequest.
260
+ * Use `create(RecoverEOAKeyRequestSchema)` to create a new message.
261
+ */
262
+ export declare const RecoverEOAKeyRequestSchema: GenMessage<RecoverEOAKeyRequest>;
263
+ /**
264
+ * RecoverEOAKeyResponse is the response type of RecoverEOAKey rpc.
265
+ *
266
+ * @generated from message inco.sealingfetcher.v1.RecoverEOAKeyResponse
267
+ */
268
+ export type RecoverEOAKeyResponse = Message<"inco.sealingfetcher.v1.RecoverEOAKeyResponse"> & {
269
+ /**
270
+ * The EOA private key.
271
+ * The private key is encoded as an unsigned 256-bit big-endian integer in
272
+ * the range [0, N-1], where N is the order of the curve.
273
+ *
274
+ * @generated from field: bytes eoa_privkey = 1;
275
+ */
276
+ eoaPrivkey: Uint8Array;
277
+ };
278
+ /**
279
+ * Describes the message inco.sealingfetcher.v1.RecoverEOAKeyResponse.
280
+ * Use `create(RecoverEOAKeyResponseSchema)` to create a new message.
281
+ */
282
+ export declare const RecoverEOAKeyResponseSchema: GenMessage<RecoverEOAKeyResponse>;
283
+ /**
284
+ * SealingFetcherService contains all RPC endpoints for the Sealing fetcher.
285
+ *
286
+ * @generated from service inco.sealingfetcher.v1.SealingFetcherService
287
+ */
288
+ export declare const SealingFetcherService: GenService<{
289
+ /**
290
+ * StartBackup starts the backup process for the sealing provider.
291
+ * This RPC backs up all TEE keys (EOA, Network, and Storage keys) to the sealing provider.
292
+ * It stores the keys in the sealing fetcher's memory and seals all three keys to the sealing provider.
293
+ * Use this during bootstrap and upgrade flows when all keys are available.
294
+ *
295
+ * @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.StartBackup
296
+ */
297
+ startBackup: {
298
+ methodKind: "unary";
299
+ input: typeof StartBackupRequestSchema;
300
+ output: typeof StartBackupResponseSchema;
301
+ };
302
+ /**
303
+ * StartBackupEOA starts the backup process for only the EOA key.
304
+ * This RPC backs up only the EOA private key to the sealing provider, without backing up
305
+ * the Network or Storage keys. It stores the EOA key in the sealing provider.
306
+ * Use this during the Add Node flow when only the EOA key has been generated, before
307
+ * the Network and Storage keys are populated.
308
+ *
309
+ * @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.StartBackupEOA
310
+ */
311
+ startBackupEOA: {
312
+ methodKind: "unary";
313
+ input: typeof StartBackupEOARequestSchema;
314
+ output: typeof StartBackupEOAResponseSchema;
315
+ };
316
+ /**
317
+ * HasTEEKeys checks if the TEE keys are present in the sealing fetcher's memory.
318
+ * If not, then RecoverTEEKeys should be called first
319
+ *
320
+ * @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.HasTEEKeys
321
+ */
322
+ hasTEEKeys: {
323
+ methodKind: "unary";
324
+ input: typeof HasTEEKeysRequestSchema;
325
+ output: typeof HasTEEKeysResponseSchema;
326
+ };
327
+ /**
328
+ * GetTEEKeys returns the set of network key, EOA key and storage key
329
+ * that the TEE can access.
330
+ * If the TEE keys are not present in the sealing fetcher's memory, then
331
+ * this rpc will return an error.
332
+ *
333
+ * @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.GetTEEKeys
334
+ */
335
+ getTEEKeys: {
336
+ methodKind: "unary";
337
+ input: typeof GetTEEKeysRequestSchema;
338
+ output: typeof GetTEEKeysResponseSchema;
339
+ };
340
+ /**
341
+ * RecoverTEEKeys recovers the TEE keys from the sealed TEE keys, and stores
342
+ * them in the sealing fetcher's memory.
343
+ *
344
+ * @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.RecoverTEEKeys
345
+ */
346
+ recoverTEEKeys: {
347
+ methodKind: "unary";
348
+ input: typeof RecoverTEEKeysRequestSchema;
349
+ output: typeof RecoverTEEKeysResponseSchema;
350
+ };
351
+ /**
352
+ * RecoverEOAKey recovers only the EOA private key from the sealing provider.
353
+ * This is used during the Add Node flow to retrieve the EOA key that was
354
+ * previously backed up via StartBackupEOA. The EOA key is stored with filename
355
+ * addnode_eoa_{eoa_address_lowercase}.json in the sealing provider.
356
+ *
357
+ * @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.RecoverEOAKey
358
+ */
359
+ recoverEOAKey: {
360
+ methodKind: "unary";
361
+ input: typeof RecoverEOAKeyRequestSchema;
362
+ output: typeof RecoverEOAKeyResponseSchema;
363
+ };
364
+ }>;
@@ -0,0 +1,88 @@
1
+ "use strict";
2
+ // @generated by protoc-gen-es v2.10.0 with parameter "target=ts"
3
+ // @generated from file inco/sealingfetcher/v1/sealingfetcher.proto (package inco.sealingfetcher.v1, syntax proto3)
4
+ /* eslint-disable */
5
+ Object.defineProperty(exports, "__esModule", { value: true });
6
+ exports.SealingFetcherService = exports.RecoverEOAKeyResponseSchema = exports.RecoverEOAKeyRequestSchema = exports.RecoverTEEKeysResponseSchema = exports.RecoverTEEKeysRequestSchema = exports.GetTEEKeysResponseSchema = exports.GetTEEKeysRequestSchema = exports.HasTEEKeysResponseSchema = exports.HasTEEKeysRequestSchema = exports.StartBackupResponseSchema = exports.TeeKeysSchema = exports.StartBackupEOAResponseSchema = exports.StartBackupEOARequestSchema = exports.RATlsServerSchema = exports.StartBackupRequestSchema = exports.file_inco_sealingfetcher_v1_sealingfetcher = void 0;
7
+ const codegenv2_1 = require("@bufbuild/protobuf/codegenv2");
8
+ /**
9
+ * Describes the file inco/sealingfetcher/v1/sealingfetcher.proto.
10
+ */
11
+ exports.file_inco_sealingfetcher_v1_sealingfetcher = (0, codegenv2_1.fileDesc)("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");
12
+ /**
13
+ * Describes the message inco.sealingfetcher.v1.StartBackupRequest.
14
+ * Use `create(StartBackupRequestSchema)` to create a new message.
15
+ */
16
+ exports.StartBackupRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 0);
17
+ /**
18
+ * Describes the message inco.sealingfetcher.v1.RATlsServer.
19
+ * Use `create(RATlsServerSchema)` to create a new message.
20
+ */
21
+ exports.RATlsServerSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 1);
22
+ /**
23
+ * Describes the message inco.sealingfetcher.v1.StartBackupEOARequest.
24
+ * Use `create(StartBackupEOARequestSchema)` to create a new message.
25
+ */
26
+ exports.StartBackupEOARequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 2);
27
+ /**
28
+ * Describes the message inco.sealingfetcher.v1.StartBackupEOAResponse.
29
+ * Use `create(StartBackupEOAResponseSchema)` to create a new message.
30
+ */
31
+ exports.StartBackupEOAResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 3);
32
+ /**
33
+ * Describes the message inco.sealingfetcher.v1.TeeKeys.
34
+ * Use `create(TeeKeysSchema)` to create a new message.
35
+ */
36
+ exports.TeeKeysSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 4);
37
+ /**
38
+ * Describes the message inco.sealingfetcher.v1.StartBackupResponse.
39
+ * Use `create(StartBackupResponseSchema)` to create a new message.
40
+ */
41
+ exports.StartBackupResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 5);
42
+ /**
43
+ * Describes the message inco.sealingfetcher.v1.HasTEEKeysRequest.
44
+ * Use `create(HasTEEKeysRequestSchema)` to create a new message.
45
+ */
46
+ exports.HasTEEKeysRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 6);
47
+ /**
48
+ * Describes the message inco.sealingfetcher.v1.HasTEEKeysResponse.
49
+ * Use `create(HasTEEKeysResponseSchema)` to create a new message.
50
+ */
51
+ exports.HasTEEKeysResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 7);
52
+ /**
53
+ * Describes the message inco.sealingfetcher.v1.GetTEEKeysRequest.
54
+ * Use `create(GetTEEKeysRequestSchema)` to create a new message.
55
+ */
56
+ exports.GetTEEKeysRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 8);
57
+ /**
58
+ * Describes the message inco.sealingfetcher.v1.GetTEEKeysResponse.
59
+ * Use `create(GetTEEKeysResponseSchema)` to create a new message.
60
+ */
61
+ exports.GetTEEKeysResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 9);
62
+ /**
63
+ * Describes the message inco.sealingfetcher.v1.RecoverTEEKeysRequest.
64
+ * Use `create(RecoverTEEKeysRequestSchema)` to create a new message.
65
+ */
66
+ exports.RecoverTEEKeysRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 10);
67
+ /**
68
+ * Describes the message inco.sealingfetcher.v1.RecoverTEEKeysResponse.
69
+ * Use `create(RecoverTEEKeysResponseSchema)` to create a new message.
70
+ */
71
+ exports.RecoverTEEKeysResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 11);
72
+ /**
73
+ * Describes the message inco.sealingfetcher.v1.RecoverEOAKeyRequest.
74
+ * Use `create(RecoverEOAKeyRequestSchema)` to create a new message.
75
+ */
76
+ exports.RecoverEOAKeyRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 12);
77
+ /**
78
+ * Describes the message inco.sealingfetcher.v1.RecoverEOAKeyResponse.
79
+ * Use `create(RecoverEOAKeyResponseSchema)` to create a new message.
80
+ */
81
+ exports.RecoverEOAKeyResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 13);
82
+ /**
83
+ * SealingFetcherService contains all RPC endpoints for the Sealing fetcher.
84
+ *
85
+ * @generated from service inco.sealingfetcher.v1.SealingFetcherService
86
+ */
87
+ exports.SealingFetcherService = (0, codegenv2_1.serviceDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 0);
88
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoic2VhbGluZ2ZldGNoZXJfcGIuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi8uLi8uLi8uLi9zcmMvZ2VuZXJhdGVkL2VzL2luY28vc2VhbGluZ2ZldGNoZXIvdjEvc2VhbGluZ2ZldGNoZXJfcGIudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IjtBQUFBLGlFQUFpRTtBQUNqRSxtSEFBbUg7QUFDbkgsb0JBQW9COzs7QUFHcEIsNERBQWtGO0FBR2xGOztHQUVHO0FBQ1UsUUFBQSwwQ0FBMEMsR0FDckQsSUFBQSxvQkFBUSxFQUFDLHd3RUFBd3dFLENBQUMsQ0FBQztBQXdCcnhFOzs7R0FHRztBQUNVLFFBQUEsd0JBQXdCLEdBQ25DLElBQUEsdUJBQVcsRUFBQyxrREFBMEMsRUFBRSxDQUFDLENBQUMsQ0FBQztBQXdCN0Q7OztHQUdHO0FBQ1UsUUFBQSxpQkFBaUIsR0FDNUIsSUFBQSx1QkFBVyxFQUFDLGtEQUEwQyxFQUFFLENBQUMsQ0FBQyxDQUFDO0FBMEI3RDs7O0dBR0c7QUFDVSxRQUFBLDJCQUEyQixHQUN0QyxJQUFBLHVCQUFXLEVBQUMsa0RBQTBDLEVBQUUsQ0FBQyxDQUFDLENBQUM7QUFVN0Q7OztHQUdHO0FBQ1UsUUFBQSw0QkFBNEIsR0FDdkMsSUFBQSx1QkFBVyxFQUFDLGtEQUEwQyxFQUFFLENBQUMsQ0FBQyxDQUFDO0FBb0M3RDs7O0dBR0c7QUFDVSxRQUFBLGFBQWEsR0FDeEIsSUFBQSx1QkFBVyxFQUFDLGtEQUEwQyxFQUFFLENBQUMsQ0FBQyxDQUFDO0FBVTdEOzs7R0FHRztBQUNVLFFBQUEseUJBQXlCLEdBQ3BDLElBQUEsdUJBQVcsRUFBQyxrREFBMEMsRUFBRSxDQUFDLENBQUMsQ0FBQztBQVU3RDs7O0dBR0c7QUFDVSxRQUFBLHVCQUF1QixHQUNsQyxJQUFBLHVCQUFXLEVBQUMsa0RBQTBDLEVBQUUsQ0FBQyxDQUFDLENBQUM7QUFnQjdEOzs7R0FHRztBQUNVLFFBQUEsd0JBQXdCLEdBQ25DLElBQUEsdUJBQVcsRUFBQyxrREFBMEMsRUFBRSxDQUFDLENBQUMsQ0FBQztBQVU3RDs7O0dBR0c7QUFDVSxRQUFBLHVCQUF1QixHQUNsQyxJQUFBLHVCQUFXLEVBQUMsa0RBQTBDLEVBQUUsQ0FBQyxDQUFDLENBQUM7QUFnQjdEOzs7R0FHRztBQUNVLFFBQUEsd0JBQXdCLEdBQ25DLElBQUEsdUJBQVcsRUFBQyxrREFBMEMsRUFBRSxDQUFDLENBQUMsQ0FBQztBQWlCN0Q7OztHQUdHO0FBQ1UsUUFBQSwyQkFBMkIsR0FDdEMsSUFBQSx1QkFBVyxFQUFDLGtEQUEwQyxFQUFFLEVBQUUsQ0FBQyxDQUFDO0FBZ0I5RDs7O0dBR0c7QUFDVSxRQUFBLDRCQUE0QixHQUN2QyxJQUFBLHVCQUFXLEVBQUMsa0RBQTBDLEVBQUUsRUFBRSxDQUFDLENBQUM7QUF5QjlEOzs7R0FHRztBQUNVLFFBQUEsMEJBQTBCLEdBQ3JDLElBQUEsdUJBQVcsRUFBQyxrREFBMEMsRUFBRSxFQUFFLENBQUMsQ0FBQztBQWtCOUQ7OztHQUdHO0FBQ1UsUUFBQSwyQkFBMkIsR0FDdEMsSUFBQSx1QkFBVyxFQUFDLGtEQUEwQyxFQUFFLEVBQUUsQ0FBQyxDQUFDO0FBRTlEOzs7O0dBSUc7QUFDVSxRQUFBLHFCQUFxQixHQTZFaEMsSUFBQSx1QkFBVyxFQUFDLGtEQUEwQyxFQUFFLENBQUMsQ0FBQyxDQUFDIn0=
@@ -18,6 +18,26 @@ export declare const lightningDeployments: readonly [{
18
18
  readonly commit: "v0.6.9-17-g217794f3-dirty";
19
19
  readonly active: true;
20
20
  readonly includesPreviewFeatures: true;
21
+ }, {
22
+ readonly name: "incoLightningPreview_2_0_0__295237520";
23
+ readonly majorVersion: 2;
24
+ readonly deployer: "0x8202D2D747784Cb7D48868E44C42C4bf162a70BC";
25
+ readonly pepper: "devnet";
26
+ readonly executorAddress: "0xC64BB070D6F5aa796e79fA19c1008647ffF736ED";
27
+ readonly salt: "0x8202d2d747784cb7d48868e44c42c4bf162a70bc008d5a963bd519d8493f5190";
28
+ readonly chainId: 84532;
29
+ readonly chainName: "Base Sepolia";
30
+ readonly version: {
31
+ readonly major: 2;
32
+ readonly minor: 0;
33
+ readonly patch: 0;
34
+ readonly shortSalt: "295237520";
35
+ };
36
+ readonly blockNumber: 34835187;
37
+ readonly deployDate: "2025-12-11T07:37:48.943Z";
38
+ readonly commit: "v0.7.2-3-g4d31fa62-dirty";
39
+ readonly active: true;
40
+ readonly includesPreviewFeatures: true;
21
41
  }, {
22
42
  readonly name: "incoLightningPreview_1_1_0__725458969";
23
43
  readonly majorVersion: 1;