@inco/js 0.7.2 → 0.7.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +49 -0
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.js +16 -5
- package/dist/cjs/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +364 -0
- package/dist/cjs/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.js +88 -0
- package/dist/cjs/generated/lightning.d.ts +20 -0
- package/dist/cjs/generated/lightning.js +22 -1
- package/dist/cjs/generated/local-node.d.ts +3 -3
- package/dist/cjs/generated/local-node.js +3 -3
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +49 -0
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.js +14 -3
- package/dist/esm/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +364 -0
- package/dist/esm/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.js +85 -0
- package/dist/esm/generated/lightning.d.ts +20 -0
- package/dist/esm/generated/lightning.js +22 -1
- package/dist/esm/generated/local-node.d.ts +3 -3
- package/dist/esm/generated/local-node.js +3 -3
- package/dist/types/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +49 -0
- package/dist/types/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +364 -0
- package/dist/types/generated/lightning.d.ts +20 -0
- package/dist/types/generated/local-node.d.ts +3 -3
- package/package.json +1 -1
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
import type { GenEnum, GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv2";
|
|
2
2
|
import type { InputCryptogram, StoredCryptogram } from "./types_pb";
|
|
3
|
+
import type { RATlsServer } from "../../../sealingfetcher/v1/sealingfetcher_pb";
|
|
3
4
|
import type { Message } from "@bufbuild/protobuf";
|
|
4
5
|
/**
|
|
5
6
|
* Describes the file inco/covalidator/compute/v1/server.proto.
|
|
@@ -472,6 +473,42 @@ export type InputToStoredCryptogramResponse = Message<"inco.covalidator.compute.
|
|
|
472
473
|
* Use `create(InputToStoredCryptogramResponseSchema)` to create a new message.
|
|
473
474
|
*/
|
|
474
475
|
export declare const InputToStoredCryptogramResponseSchema: GenMessage<InputToStoredCryptogramResponse>;
|
|
476
|
+
/**
|
|
477
|
+
* ConfigureRequest is a request to configure the compute service.
|
|
478
|
+
*
|
|
479
|
+
* @generated from message inco.covalidator.compute.v1.ConfigureRequest
|
|
480
|
+
*/
|
|
481
|
+
export type ConfigureRequest = Message<"inco.covalidator.compute.v1.ConfigureRequest"> & {
|
|
482
|
+
/**
|
|
483
|
+
* The sealing providers to use to fetch the TEE keys.
|
|
484
|
+
*
|
|
485
|
+
* @generated from field: repeated inco.sealingfetcher.v1.RATlsServer sealing_providers = 1;
|
|
486
|
+
*/
|
|
487
|
+
sealingProviders: RATlsServer[];
|
|
488
|
+
};
|
|
489
|
+
/**
|
|
490
|
+
* Describes the message inco.covalidator.compute.v1.ConfigureRequest.
|
|
491
|
+
* Use `create(ConfigureRequestSchema)` to create a new message.
|
|
492
|
+
*/
|
|
493
|
+
export declare const ConfigureRequestSchema: GenMessage<ConfigureRequest>;
|
|
494
|
+
/**
|
|
495
|
+
* ConfigureResponse is a response to ConfigureRequest.
|
|
496
|
+
*
|
|
497
|
+
* @generated from message inco.covalidator.compute.v1.ConfigureResponse
|
|
498
|
+
*/
|
|
499
|
+
export type ConfigureResponse = Message<"inco.covalidator.compute.v1.ConfigureResponse"> & {
|
|
500
|
+
/**
|
|
501
|
+
* True if the compute service was configured successfully.
|
|
502
|
+
*
|
|
503
|
+
* @generated from field: bool success = 1;
|
|
504
|
+
*/
|
|
505
|
+
success: boolean;
|
|
506
|
+
};
|
|
507
|
+
/**
|
|
508
|
+
* Describes the message inco.covalidator.compute.v1.ConfigureResponse.
|
|
509
|
+
* Use `create(ConfigureResponseSchema)` to create a new message.
|
|
510
|
+
*/
|
|
511
|
+
export declare const ConfigureResponseSchema: GenMessage<ConfigureResponse>;
|
|
475
512
|
/**
|
|
476
513
|
* @generated from enum inco.covalidator.compute.v1.FheOperation
|
|
477
514
|
*/
|
|
@@ -603,6 +640,18 @@ export declare const FheOperationSchema: GenEnum<FheOperation>;
|
|
|
603
640
|
* @generated from service inco.covalidator.compute.v1.ComputeService
|
|
604
641
|
*/
|
|
605
642
|
export declare const ComputeService: GenService<{
|
|
643
|
+
/**
|
|
644
|
+
* Configure contains all necessary configuration to start the compute service
|
|
645
|
+
* which are not part of the MR_AGGREGATED fingerprint. These usually include
|
|
646
|
+
* parameters that are specific to each TEE operator.
|
|
647
|
+
*
|
|
648
|
+
* @generated from rpc inco.covalidator.compute.v1.ComputeService.Configure
|
|
649
|
+
*/
|
|
650
|
+
configure: {
|
|
651
|
+
methodKind: "unary";
|
|
652
|
+
input: typeof ConfigureRequestSchema;
|
|
653
|
+
output: typeof ConfigureResponseSchema;
|
|
654
|
+
};
|
|
606
655
|
/**
|
|
607
656
|
* InputToStoredCryptogram converts an input ciphertext into a compute
|
|
608
657
|
* ciphertext.
|
|
@@ -3,14 +3,15 @@
|
|
|
3
3
|
// @generated from file inco/covalidator/compute/v1/server.proto (package inco.covalidator.compute.v1, syntax proto3)
|
|
4
4
|
/* eslint-disable */
|
|
5
5
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
exports.ComputeService = exports.FheOperationSchema = exports.FheOperation = exports.InputToStoredCryptogramResponseSchema = exports.InputToStoredCryptogramRequestSchema = exports.SingleVerificationResponseSchema = exports.SingleCiphertextResponseSchema = exports.SingleEListReverseOpRequestSchema = exports.SingleEListShuffleOpRequestSchema = exports.SingleEListRangeOpRequestSchema = exports.SingleEListSetOpRequestSchema = exports.SingleEListGetOrOpRequestSchema = exports.SingleEListGetOpRequestSchema = exports.SingleEListSliceOpRequestSchema = exports.SingleEListConcatOpRequestSchema = exports.SingleEListInsertOpRequestSchema = exports.SingleEListAppendOpRequestSchema = exports.SingleNewEListOpRequestSchema = exports.SingleRandBoundedOpRequestSchema = exports.SingleRandOpRequestSchema = exports.SingleTrivialOpRequestSchema = exports.SingleTernaryOpRequestSchema = exports.SingleBinaryOpScalarRequestSchema = exports.SingleBinaryOpRequestSchema = exports.SingleUnaryOpRequestSchema = exports.SingleCastOpRequestSchema = exports.file_inco_covalidator_compute_v1_server = void 0;
|
|
6
|
+
exports.ComputeService = exports.FheOperationSchema = exports.FheOperation = exports.ConfigureResponseSchema = exports.ConfigureRequestSchema = exports.InputToStoredCryptogramResponseSchema = exports.InputToStoredCryptogramRequestSchema = exports.SingleVerificationResponseSchema = exports.SingleCiphertextResponseSchema = exports.SingleEListReverseOpRequestSchema = exports.SingleEListShuffleOpRequestSchema = exports.SingleEListRangeOpRequestSchema = exports.SingleEListSetOpRequestSchema = exports.SingleEListGetOrOpRequestSchema = exports.SingleEListGetOpRequestSchema = exports.SingleEListSliceOpRequestSchema = exports.SingleEListConcatOpRequestSchema = exports.SingleEListInsertOpRequestSchema = exports.SingleEListAppendOpRequestSchema = exports.SingleNewEListOpRequestSchema = exports.SingleRandBoundedOpRequestSchema = exports.SingleRandOpRequestSchema = exports.SingleTrivialOpRequestSchema = exports.SingleTernaryOpRequestSchema = exports.SingleBinaryOpScalarRequestSchema = exports.SingleBinaryOpRequestSchema = exports.SingleUnaryOpRequestSchema = exports.SingleCastOpRequestSchema = exports.file_inco_covalidator_compute_v1_server = void 0;
|
|
7
7
|
const codegenv2_1 = require("@bufbuild/protobuf/codegenv2");
|
|
8
|
-
const types_pb_1 = require("
|
|
9
|
-
const types_pb_2 = require("
|
|
8
|
+
const types_pb_1 = require("./types_pb");
|
|
9
|
+
const types_pb_2 = require("../../../kms/lite/v1/types_pb");
|
|
10
|
+
const sealingfetcher_pb_1 = require("../../../sealingfetcher/v1/sealingfetcher_pb");
|
|
10
11
|
/**
|
|
11
12
|
* Describes the file inco/covalidator/compute/v1/server.proto.
|
|
12
13
|
*/
|
|
13
|
-
exports.file_inco_covalidator_compute_v1_server = (0, codegenv2_1.fileDesc)("
|
|
14
|
+
exports.file_inco_covalidator_compute_v1_server = (0, codegenv2_1.fileDesc)("CihpbmNvL2NvdmFsaWRhdG9yL2NvbXB1dGUvdjEvc2VydmVyLnByb3RvEhtpbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEingEKE1NpbmdsZUNhc3RPcFJlcXVlc3QSPAoJb3BlcmF0aW9uGAEgASgOMikuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLkZoZU9wZXJhdGlvbhI5CgJjdBgCIAEoCzItLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TdG9yZWRDcnlwdG9ncmFtEg4KBnRvVHlwZRgDIAEoBSKPAQoUU2luZ2xlVW5hcnlPcFJlcXVlc3QSPAoJb3BlcmF0aW9uGAEgASgOMikuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLkZoZU9wZXJhdGlvbhI5CgJjdBgCIAEoCzItLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TdG9yZWRDcnlwdG9ncmFtIs0BChVTaW5nbGVCaW5hcnlPcFJlcXVlc3QSPAoJb3BlcmF0aW9uGAEgASgOMikuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLkZoZU9wZXJhdGlvbhI6CgNsaHMYAiABKAsyLS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU3RvcmVkQ3J5cHRvZ3JhbRI6CgNyaHMYAyABKAsyLS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU3RvcmVkQ3J5cHRvZ3JhbSKkAQobU2luZ2xlQmluYXJ5T3BTY2FsYXJSZXF1ZXN0EjwKCW9wZXJhdGlvbhgBIAEoDjIpLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5GaGVPcGVyYXRpb24SOgoDbGhzGAIgASgLMi0uaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlN0b3JlZENyeXB0b2dyYW0SCwoDcmhzGAMgASgMIo0CChZTaW5nbGVUZXJuYXJ5T3BSZXF1ZXN0EjwKCW9wZXJhdGlvbhgBIAEoDjIpLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5GaGVPcGVyYXRpb24SOgoDbGhzGAIgASgLMi0uaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlN0b3JlZENyeXB0b2dyYW0SPQoGbWlkZGxlGAMgASgLMi0uaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlN0b3JlZENyeXB0b2dyYW0SOgoDcmhzGAQgASgLMi0uaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlN0b3JlZENyeXB0b2dyYW0iNAoWU2luZ2xlVHJpdmlhbE9wUmVxdWVzdBIKCgJwdBgBIAEoDBIOCgZ0b1R5cGUYAiABKAUiegoTU2luZ2xlUmFuZE9wUmVxdWVzdBI8CglvcGVyYXRpb24YASABKA4yKS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuRmhlT3BlcmF0aW9uEhAKCHJhbmRUeXBlGAIgASgFEhMKC2NvdW50ZXJSYW5kGAMgASgMIsQBChpTaW5nbGVSYW5kQm91bmRlZE9wUmVxdWVzdBI8CglvcGVyYXRpb24YASABKA4yKS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuRmhlT3BlcmF0aW9uEkEKCnVwcGVyQm91bmQYAiABKAsyLS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU3RvcmVkQ3J5cHRvZ3JhbRIQCghyYW5kVHlwZRgDIAEoBRITCgtjb3VudGVyUmFuZBgEIAEoDCJvChdTaW5nbGVOZXdFTGlzdE9wUmVxdWVzdBJCCgtjaXBoZXJ0ZXh0cxgCIAMoCzItLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TdG9yZWRDcnlwdG9ncmFtEhAKCGxpc3RUeXBlGAMgASgFIpgBChpTaW5nbGVFTGlzdEFwcGVuZE9wUmVxdWVzdBI8CgVlbGlzdBgCIAEoCzItLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TdG9yZWRDcnlwdG9ncmFtEjwKBXZhbHVlGAMgASgLMi0uaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlN0b3JlZENyeXB0b2dyYW0i1gEKGlNpbmdsZUVMaXN0SW5zZXJ0T3BSZXF1ZXN0EjwKBWVsaXN0GAIgASgLMi0uaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlN0b3JlZENyeXB0b2dyYW0SPAoFaW5kZXgYAyABKAsyLS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU3RvcmVkQ3J5cHRvZ3JhbRI8CgV2YWx1ZRgEIAEoCzItLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TdG9yZWRDcnlwdG9ncmFtIpoBChpTaW5nbGVFTGlzdENvbmNhdE9wUmVxdWVzdBI9CgZlbGlzdDEYASABKAsyLS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU3RvcmVkQ3J5cHRvZ3JhbRI9CgZlbGlzdDIYAiABKAsyLS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU3RvcmVkQ3J5cHRvZ3JhbSLpAQoZU2luZ2xlRUxpc3RTbGljZU9wUmVxdWVzdBI8CgVlbGlzdBgBIAEoCzItLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TdG9yZWRDcnlwdG9ncmFtEjwKBXN0YXJ0GAIgASgLMi0uaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlN0b3JlZENyeXB0b2dyYW0SCwoDbGVuGAMgASgFEkMKDGRlZmF1bHRWYWx1ZRgEIAEoCzItLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TdG9yZWRDcnlwdG9ncmFtImYKF1NpbmdsZUVMaXN0R2V0T3BSZXF1ZXN0EjwKBWVsaXN0GAEgASgLMi0uaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlN0b3JlZENyeXB0b2dyYW0SDQoFaW5kZXgYAiABKAUi3AEKGVNpbmdsZUVMaXN0R2V0T3JPcFJlcXVlc3QSPAoFZWxpc3QYASABKAsyLS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU3RvcmVkQ3J5cHRvZ3JhbRI8CgVpbmRleBgCIAEoCzItLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TdG9yZWRDcnlwdG9ncmFtEkMKDGRlZmF1bHRWYWx1ZRgDIAEoCzItLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TdG9yZWRDcnlwdG9ncmFtItMBChdTaW5nbGVFTGlzdFNldE9wUmVxdWVzdBI8CgVlbGlzdBgBIAEoCzItLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TdG9yZWRDcnlwdG9ncmFtEjwKBWluZGV4GAIgASgLMi0uaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlN0b3JlZENyeXB0b2dyYW0SPAoFdmFsdWUYAyABKAsyLS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU3RvcmVkQ3J5cHRvZ3JhbSI3ChlTaW5nbGVFTGlzdFJhbmdlT3BSZXF1ZXN0Eg0KBXN0YXJ0GAEgASgFEgsKA2VuZBgCIAEoBSJqChtTaW5nbGVFTGlzdFNodWZmbGVPcFJlcXVlc3QSPAoFZWxpc3QYASABKAsyLS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU3RvcmVkQ3J5cHRvZ3JhbRINCgVub25jZRgCIAEoDCJbChtTaW5nbGVFTGlzdFJldmVyc2VPcFJlcXVlc3QSPAoFZWxpc3QYASABKAsyLS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU3RvcmVkQ3J5cHRvZ3JhbSJdChhTaW5nbGVDaXBoZXJ0ZXh0UmVzcG9uc2USQQoKY2lwaGVydGV4dBgBIAEoCzItLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TdG9yZWRDcnlwdG9ncmFtIi4KGlNpbmdsZVZlcmlmaWNhdGlvblJlc3BvbnNlEhAKCHZlcmlmaWVkGAEgASgIIoEBCh5JbnB1dFRvU3RvcmVkQ3J5cHRvZ3JhbVJlcXVlc3QSOwoFaW5wdXQYASABKAsyLC5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuSW5wdXRDcnlwdG9ncmFtEgwKBHR5cGUYAiABKAUSFAoMaW5kZXhfaGFuZGxlGAMgASgFImQKH0lucHV0VG9TdG9yZWRDcnlwdG9ncmFtUmVzcG9uc2USQQoKY2lwaGVydGV4dBgBIAEoCzItLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TdG9yZWRDcnlwdG9ncmFtIlIKEENvbmZpZ3VyZVJlcXVlc3QSPgoRc2VhbGluZ19wcm92aWRlcnMYASADKAsyIy5pbmNvLnNlYWxpbmdmZXRjaGVyLnYxLlJBVGxzU2VydmVyIiQKEUNvbmZpZ3VyZVJlc3BvbnNlEg8KB3N1Y2Nlc3MYASABKAgqxwMKDEZoZU9wZXJhdGlvbhILCgdGSEVfQUREEAASCwoHRkhFX1NVQhABEgsKB0ZIRV9NVUwQAhILCgdGSEVfRElWEAMSCwoHRkhFX1JFTRAEEg8KC0ZIRV9CSVRfQU5EEAUSDgoKRkhFX0JJVF9PUhAGEg8KC0ZIRV9CSVRfWE9SEAcSCwoHRkhFX1NITBAIEgsKB0ZIRV9TSFIQCRIMCghGSEVfUk9UTBAKEgwKCEZIRV9ST1RSEAsSCgoGRkhFX0VREAwSCgoGRkhFX05FEA0SCgoGRkhFX0dFEA4SCgoGRkhFX0dUEA8SCgoGRkhFX0xFEBASCgoGRkhFX0xUEBESCwoHRkhFX01JThASEgsKB0ZIRV9NQVgQExILCgdGSEVfTkVHEBQSCwoHRkhFX05PVBAVEhkKFUZIRV9WRVJJRllfQ0lQSEVSVEVYVBAWEgwKCEZIRV9DQVNUEBcSFwoTRkhFX1RSSVZJQUxfRU5DUllQVBAYEhQKEEZIRV9JRl9USEVOX0VMU0UQGRIMCghGSEVfUkFORBAaEhQKEEZIRV9SQU5EX0JPVU5ERUQQGxIWChJGSEVfR0VUX0NJUEhFUlRFWFQQIDLOFQoOQ29tcHV0ZVNlcnZpY2USagoJQ29uZmlndXJlEi0uaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLkNvbmZpZ3VyZVJlcXVlc3QaLi5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuQ29uZmlndXJlUmVzcG9uc2USlAEKF0lucHV0VG9TdG9yZWRDcnlwdG9ncmFtEjsuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLklucHV0VG9TdG9yZWRDcnlwdG9ncmFtUmVxdWVzdBo8LmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5JbnB1dFRvU3RvcmVkQ3J5cHRvZ3JhbVJlc3BvbnNlEncKDFNpbmdsZUNhc3RPcBIwLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TaW5nbGVDYXN0T3BSZXF1ZXN0GjUuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZUNpcGhlcnRleHRSZXNwb25zZRJ5Cg1TaW5nbGVVbmFyeU9wEjEuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZVVuYXJ5T3BSZXF1ZXN0GjUuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZUNpcGhlcnRleHRSZXNwb25zZRJ7Cg5TaW5nbGVCaW5hcnlPcBIyLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TaW5nbGVCaW5hcnlPcFJlcXVlc3QaNS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU2luZ2xlQ2lwaGVydGV4dFJlc3BvbnNlEocBChRTaW5nbGVCaW5hcnlTY2FsYXJPcBI4LmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TaW5nbGVCaW5hcnlPcFNjYWxhclJlcXVlc3QaNS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU2luZ2xlQ2lwaGVydGV4dFJlc3BvbnNlEn0KD1NpbmdsZVRlcm5hcnlPcBIzLmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TaW5nbGVUZXJuYXJ5T3BSZXF1ZXN0GjUuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZUNpcGhlcnRleHRSZXNwb25zZRJ9Cg9TaW5nbGVUcml2aWFsT3ASMy5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU2luZ2xlVHJpdmlhbE9wUmVxdWVzdBo1LmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TaW5nbGVDaXBoZXJ0ZXh0UmVzcG9uc2USdwoMU2luZ2xlUmFuZE9wEjAuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZVJhbmRPcFJlcXVlc3QaNS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU2luZ2xlQ2lwaGVydGV4dFJlc3BvbnNlEoUBChNTaW5nbGVSYW5kQm91bmRlZE9wEjcuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZVJhbmRCb3VuZGVkT3BSZXF1ZXN0GjUuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZUNpcGhlcnRleHRSZXNwb25zZRJ/ChBTaW5nbGVOZXdFTGlzdE9wEjQuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZU5ld0VMaXN0T3BSZXF1ZXN0GjUuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZUNpcGhlcnRleHRSZXNwb25zZRJ/ChBTaW5nbGVFTGlzdEdldE9wEjQuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZUVMaXN0R2V0T3BSZXF1ZXN0GjUuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZUNpcGhlcnRleHRSZXNwb25zZRKDAQoSU2luZ2xlRUxpc3RHZXRPck9wEjYuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZUVMaXN0R2V0T3JPcFJlcXVlc3QaNS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU2luZ2xlQ2lwaGVydGV4dFJlc3BvbnNlEn8KEFNpbmdsZUVMaXN0U2V0T3ASNC5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU2luZ2xlRUxpc3RTZXRPcFJlcXVlc3QaNS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU2luZ2xlQ2lwaGVydGV4dFJlc3BvbnNlEoUBChNTaW5nbGVFTGlzdEFwcGVuZE9wEjcuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZUVMaXN0QXBwZW5kT3BSZXF1ZXN0GjUuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZUNpcGhlcnRleHRSZXNwb25zZRKFAQoTU2luZ2xlRUxpc3RJbnNlcnRPcBI3LmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TaW5nbGVFTGlzdEluc2VydE9wUmVxdWVzdBo1LmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TaW5nbGVDaXBoZXJ0ZXh0UmVzcG9uc2UShQEKE1NpbmdsZUVMaXN0Q29uY2F0T3ASNy5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU2luZ2xlRUxpc3RDb25jYXRPcFJlcXVlc3QaNS5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU2luZ2xlQ2lwaGVydGV4dFJlc3BvbnNlEoMBChJTaW5nbGVFTGlzdFNsaWNlT3ASNi5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU2luZ2xlRUxpc3RTbGljZU9wUmVxdWVzdBo1LmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TaW5nbGVDaXBoZXJ0ZXh0UmVzcG9uc2USgwEKElNpbmdsZUVMaXN0UmFuZ2VPcBI2LmluY28uY292YWxpZGF0b3IuY29tcHV0ZS52MS5TaW5nbGVFTGlzdFJhbmdlT3BSZXF1ZXN0GjUuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZUNpcGhlcnRleHRSZXNwb25zZRKHAQoUU2luZ2xlRUxpc3RTaHVmZmxlT3ASOC5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU2luZ2xlRUxpc3RTaHVmZmxlT3BSZXF1ZXN0GjUuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZUNpcGhlcnRleHRSZXNwb25zZRKHAQoUU2luZ2xlRUxpc3RSZXZlcnNlT3ASOC5pbmNvLmNvdmFsaWRhdG9yLmNvbXB1dGUudjEuU2luZ2xlRUxpc3RSZXZlcnNlT3BSZXF1ZXN0GjUuaW5jby5jb3ZhbGlkYXRvci5jb21wdXRlLnYxLlNpbmdsZUNpcGhlcnRleHRSZXNwb25zZUI3WjVnaXRodWIuY29tL2luY28tZmhldm0vaW5jby1tb25vcmVwby9jb3ZhbGlkYXRvci90eXBlc2IGcHJvdG8z", [types_pb_1.file_inco_covalidator_compute_v1_types, types_pb_2.file_inco_kms_lite_v1_types, sealingfetcher_pb_1.file_inco_sealingfetcher_v1_sealingfetcher]);
|
|
14
15
|
/**
|
|
15
16
|
* Describes the message inco.covalidator.compute.v1.SingleCastOpRequest.
|
|
16
17
|
* Use `create(SingleCastOpRequestSchema)` to create a new message.
|
|
@@ -126,6 +127,16 @@ exports.InputToStoredCryptogramRequestSchema = (0, codegenv2_1.messageDesc)(expo
|
|
|
126
127
|
* Use `create(InputToStoredCryptogramResponseSchema)` to create a new message.
|
|
127
128
|
*/
|
|
128
129
|
exports.InputToStoredCryptogramResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_covalidator_compute_v1_server, 22);
|
|
130
|
+
/**
|
|
131
|
+
* Describes the message inco.covalidator.compute.v1.ConfigureRequest.
|
|
132
|
+
* Use `create(ConfigureRequestSchema)` to create a new message.
|
|
133
|
+
*/
|
|
134
|
+
exports.ConfigureRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_covalidator_compute_v1_server, 23);
|
|
135
|
+
/**
|
|
136
|
+
* Describes the message inco.covalidator.compute.v1.ConfigureResponse.
|
|
137
|
+
* Use `create(ConfigureResponseSchema)` to create a new message.
|
|
138
|
+
*/
|
|
139
|
+
exports.ConfigureResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_covalidator_compute_v1_server, 24);
|
|
129
140
|
/**
|
|
130
141
|
* @generated from enum inco.covalidator.compute.v1.FheOperation
|
|
131
142
|
*/
|
|
@@ -258,4 +269,4 @@ exports.FheOperationSchema = (0, codegenv2_1.enumDesc)(exports.file_inco_covalid
|
|
|
258
269
|
* @generated from service inco.covalidator.compute.v1.ComputeService
|
|
259
270
|
*/
|
|
260
271
|
exports.ComputeService = (0, codegenv2_1.serviceDesc)(exports.file_inco_covalidator_compute_v1_server, 0);
|
|
261
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
272
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,364 @@
|
|
|
1
|
+
import type { GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv2";
|
|
2
|
+
import type { Message } from "@bufbuild/protobuf";
|
|
3
|
+
/**
|
|
4
|
+
* Describes the file inco/sealingfetcher/v1/sealingfetcher.proto.
|
|
5
|
+
*/
|
|
6
|
+
export declare const file_inco_sealingfetcher_v1_sealingfetcher: GenFile;
|
|
7
|
+
/**
|
|
8
|
+
* StartBackupRequest is the request type of StartBackup rpc.
|
|
9
|
+
* This request backs up all TEE keys (EOA, Network, and Storage keys).
|
|
10
|
+
*
|
|
11
|
+
* @generated from message inco.sealingfetcher.v1.StartBackupRequest
|
|
12
|
+
*/
|
|
13
|
+
export type StartBackupRequest = Message<"inco.sealingfetcher.v1.StartBackupRequest"> & {
|
|
14
|
+
/**
|
|
15
|
+
* The Sealing Provider to backup the TEE keys to.
|
|
16
|
+
*
|
|
17
|
+
* @generated from field: inco.sealingfetcher.v1.RATlsServer sealing_provider = 1;
|
|
18
|
+
*/
|
|
19
|
+
sealingProvider?: RATlsServer;
|
|
20
|
+
/**
|
|
21
|
+
* The TEE keys to backup. All three keys (EOA, Network, and Storage) should be provided.
|
|
22
|
+
*
|
|
23
|
+
* @generated from field: inco.sealingfetcher.v1.TeeKeys tee_keys = 2;
|
|
24
|
+
*/
|
|
25
|
+
teeKeys?: TeeKeys;
|
|
26
|
+
};
|
|
27
|
+
/**
|
|
28
|
+
* Describes the message inco.sealingfetcher.v1.StartBackupRequest.
|
|
29
|
+
* Use `create(StartBackupRequestSchema)` to create a new message.
|
|
30
|
+
*/
|
|
31
|
+
export declare const StartBackupRequestSchema: GenMessage<StartBackupRequest>;
|
|
32
|
+
/**
|
|
33
|
+
* RATlsServer is the information on how to connect to the RA-TLS secured server.
|
|
34
|
+
*
|
|
35
|
+
* @generated from message inco.sealingfetcher.v1.RATlsServer
|
|
36
|
+
*/
|
|
37
|
+
export type RATlsServer = Message<"inco.sealingfetcher.v1.RATlsServer"> & {
|
|
38
|
+
/**
|
|
39
|
+
* tls_service_url is the URL of the TLS server that is a secured using RA-TLS.
|
|
40
|
+
*
|
|
41
|
+
* @generated from field: string tls_service_url = 1;
|
|
42
|
+
*/
|
|
43
|
+
tlsServiceUrl: string;
|
|
44
|
+
/**
|
|
45
|
+
* cert_service_url is the URL of the certificate service to get the certificate for the RA-TLS gRPC server.
|
|
46
|
+
* It is not necessarily a secure channel.
|
|
47
|
+
*
|
|
48
|
+
* @generated from field: string cert_service_url = 2;
|
|
49
|
+
*/
|
|
50
|
+
certServiceUrl: string;
|
|
51
|
+
};
|
|
52
|
+
/**
|
|
53
|
+
* Describes the message inco.sealingfetcher.v1.RATlsServer.
|
|
54
|
+
* Use `create(RATlsServerSchema)` to create a new message.
|
|
55
|
+
*/
|
|
56
|
+
export declare const RATlsServerSchema: GenMessage<RATlsServer>;
|
|
57
|
+
/**
|
|
58
|
+
* StartBackupEOARequest is the request type of StartBackupEOA rpc.
|
|
59
|
+
* This request backs up only the EOA private key.
|
|
60
|
+
*
|
|
61
|
+
* @generated from message inco.sealingfetcher.v1.StartBackupEOARequest
|
|
62
|
+
*/
|
|
63
|
+
export type StartBackupEOARequest = Message<"inco.sealingfetcher.v1.StartBackupEOARequest"> & {
|
|
64
|
+
/**
|
|
65
|
+
* The Sealing Provider to backup the EOA key to.
|
|
66
|
+
*
|
|
67
|
+
* @generated from field: inco.sealingfetcher.v1.RATlsServer sealing_provider = 1;
|
|
68
|
+
*/
|
|
69
|
+
sealingProvider?: RATlsServer;
|
|
70
|
+
/**
|
|
71
|
+
* The EOA private key to backup.
|
|
72
|
+
* The private key is encoded as an unsigned 256-bit big-endian integer in
|
|
73
|
+
* the range [0, N-1], where N is the order of the curve.
|
|
74
|
+
*
|
|
75
|
+
* @generated from field: bytes eoa_privkey = 2;
|
|
76
|
+
*/
|
|
77
|
+
eoaPrivkey: Uint8Array;
|
|
78
|
+
};
|
|
79
|
+
/**
|
|
80
|
+
* Describes the message inco.sealingfetcher.v1.StartBackupEOARequest.
|
|
81
|
+
* Use `create(StartBackupEOARequestSchema)` to create a new message.
|
|
82
|
+
*/
|
|
83
|
+
export declare const StartBackupEOARequestSchema: GenMessage<StartBackupEOARequest>;
|
|
84
|
+
/**
|
|
85
|
+
* StartBackupEOAResponse is the response type of StartBackupEOA rpc.
|
|
86
|
+
*
|
|
87
|
+
* @generated from message inco.sealingfetcher.v1.StartBackupEOAResponse
|
|
88
|
+
*/
|
|
89
|
+
export type StartBackupEOAResponse = Message<"inco.sealingfetcher.v1.StartBackupEOAResponse"> & {};
|
|
90
|
+
/**
|
|
91
|
+
* Describes the message inco.sealingfetcher.v1.StartBackupEOAResponse.
|
|
92
|
+
* Use `create(StartBackupEOAResponseSchema)` to create a new message.
|
|
93
|
+
*/
|
|
94
|
+
export declare const StartBackupEOAResponseSchema: GenMessage<StartBackupEOAResponse>;
|
|
95
|
+
/**
|
|
96
|
+
* TeeKeys is a struct containing all the TEE keys, unsealed.
|
|
97
|
+
*
|
|
98
|
+
* @generated from message inco.sealingfetcher.v1.TeeKeys
|
|
99
|
+
*/
|
|
100
|
+
export type TeeKeys = Message<"inco.sealingfetcher.v1.TeeKeys"> & {
|
|
101
|
+
/**
|
|
102
|
+
* The EOA private key belonging to that TEE
|
|
103
|
+
* The private key is encoded as an unsigned 256-bit big-endian integer in
|
|
104
|
+
* the range [0, N-1], where N is the order of the curve.
|
|
105
|
+
*
|
|
106
|
+
* @generated from field: bytes eoa_privkey = 1;
|
|
107
|
+
*/
|
|
108
|
+
eoaPrivkey: Uint8Array;
|
|
109
|
+
/**
|
|
110
|
+
* The Network private key that the TEE generated during the bootstrap process.
|
|
111
|
+
* This is simply a 32-byte array, that can be used as-is as a sepc256k1
|
|
112
|
+
* private key.
|
|
113
|
+
*
|
|
114
|
+
* @generated from field: bytes network_privkey = 2;
|
|
115
|
+
*/
|
|
116
|
+
networkPrivkey: Uint8Array;
|
|
117
|
+
/**
|
|
118
|
+
* The storage private key belonging to that TEE
|
|
119
|
+
* This is simply a 32-byte array, that can be used as-is as a 256-bit
|
|
120
|
+
* ChaCha20-Poly1305 secret key.
|
|
121
|
+
*
|
|
122
|
+
* @generated from field: bytes storage_privkey = 3;
|
|
123
|
+
*/
|
|
124
|
+
storagePrivkey: Uint8Array;
|
|
125
|
+
};
|
|
126
|
+
/**
|
|
127
|
+
* Describes the message inco.sealingfetcher.v1.TeeKeys.
|
|
128
|
+
* Use `create(TeeKeysSchema)` to create a new message.
|
|
129
|
+
*/
|
|
130
|
+
export declare const TeeKeysSchema: GenMessage<TeeKeys>;
|
|
131
|
+
/**
|
|
132
|
+
* StartBackupResponse is the response type of StartBackup rpc.
|
|
133
|
+
*
|
|
134
|
+
* @generated from message inco.sealingfetcher.v1.StartBackupResponse
|
|
135
|
+
*/
|
|
136
|
+
export type StartBackupResponse = Message<"inco.sealingfetcher.v1.StartBackupResponse"> & {};
|
|
137
|
+
/**
|
|
138
|
+
* Describes the message inco.sealingfetcher.v1.StartBackupResponse.
|
|
139
|
+
* Use `create(StartBackupResponseSchema)` to create a new message.
|
|
140
|
+
*/
|
|
141
|
+
export declare const StartBackupResponseSchema: GenMessage<StartBackupResponse>;
|
|
142
|
+
/**
|
|
143
|
+
* HasTEEKeysRequest is the request type of HasTEEKeys rpc.
|
|
144
|
+
*
|
|
145
|
+
* @generated from message inco.sealingfetcher.v1.HasTEEKeysRequest
|
|
146
|
+
*/
|
|
147
|
+
export type HasTEEKeysRequest = Message<"inco.sealingfetcher.v1.HasTEEKeysRequest"> & {};
|
|
148
|
+
/**
|
|
149
|
+
* Describes the message inco.sealingfetcher.v1.HasTEEKeysRequest.
|
|
150
|
+
* Use `create(HasTEEKeysRequestSchema)` to create a new message.
|
|
151
|
+
*/
|
|
152
|
+
export declare const HasTEEKeysRequestSchema: GenMessage<HasTEEKeysRequest>;
|
|
153
|
+
/**
|
|
154
|
+
* HasTEEKeysResponse is the response type of HasTEEKeys rpc.
|
|
155
|
+
*
|
|
156
|
+
* @generated from message inco.sealingfetcher.v1.HasTEEKeysResponse
|
|
157
|
+
*/
|
|
158
|
+
export type HasTEEKeysResponse = Message<"inco.sealingfetcher.v1.HasTEEKeysResponse"> & {
|
|
159
|
+
/**
|
|
160
|
+
* True if the TEE keys are present in the sealing fetcher's memory.
|
|
161
|
+
*
|
|
162
|
+
* @generated from field: bool has_tee_keys = 1;
|
|
163
|
+
*/
|
|
164
|
+
hasTeeKeys: boolean;
|
|
165
|
+
};
|
|
166
|
+
/**
|
|
167
|
+
* Describes the message inco.sealingfetcher.v1.HasTEEKeysResponse.
|
|
168
|
+
* Use `create(HasTEEKeysResponseSchema)` to create a new message.
|
|
169
|
+
*/
|
|
170
|
+
export declare const HasTEEKeysResponseSchema: GenMessage<HasTEEKeysResponse>;
|
|
171
|
+
/**
|
|
172
|
+
* GetTEEKeysRequest is the request type of GetTEEKeys rpc.
|
|
173
|
+
*
|
|
174
|
+
* @generated from message inco.sealingfetcher.v1.GetTEEKeysRequest
|
|
175
|
+
*/
|
|
176
|
+
export type GetTEEKeysRequest = Message<"inco.sealingfetcher.v1.GetTEEKeysRequest"> & {};
|
|
177
|
+
/**
|
|
178
|
+
* Describes the message inco.sealingfetcher.v1.GetTEEKeysRequest.
|
|
179
|
+
* Use `create(GetTEEKeysRequestSchema)` to create a new message.
|
|
180
|
+
*/
|
|
181
|
+
export declare const GetTEEKeysRequestSchema: GenMessage<GetTEEKeysRequest>;
|
|
182
|
+
/**
|
|
183
|
+
* GetTEEKeysResponse is the response type of GetTEEKeys rpc.
|
|
184
|
+
*
|
|
185
|
+
* @generated from message inco.sealingfetcher.v1.GetTEEKeysResponse
|
|
186
|
+
*/
|
|
187
|
+
export type GetTEEKeysResponse = Message<"inco.sealingfetcher.v1.GetTEEKeysResponse"> & {
|
|
188
|
+
/**
|
|
189
|
+
* The TEE keys.
|
|
190
|
+
*
|
|
191
|
+
* @generated from field: inco.sealingfetcher.v1.TeeKeys tee_keys = 1;
|
|
192
|
+
*/
|
|
193
|
+
teeKeys?: TeeKeys;
|
|
194
|
+
};
|
|
195
|
+
/**
|
|
196
|
+
* Describes the message inco.sealingfetcher.v1.GetTEEKeysResponse.
|
|
197
|
+
* Use `create(GetTEEKeysResponseSchema)` to create a new message.
|
|
198
|
+
*/
|
|
199
|
+
export declare const GetTEEKeysResponseSchema: GenMessage<GetTEEKeysResponse>;
|
|
200
|
+
/**
|
|
201
|
+
* RecoverTEEKeysRequest is the request type of RecoverTEEKeys rpc.
|
|
202
|
+
*
|
|
203
|
+
* @generated from message inco.sealingfetcher.v1.RecoverTEEKeysRequest
|
|
204
|
+
*/
|
|
205
|
+
export type RecoverTEEKeysRequest = Message<"inco.sealingfetcher.v1.RecoverTEEKeysRequest"> & {
|
|
206
|
+
/**
|
|
207
|
+
* The Sealing Providers to recover the TEE keys from.
|
|
208
|
+
* The sealing fetcher will try each provider in order until one succeeds.
|
|
209
|
+
*
|
|
210
|
+
* @generated from field: repeated inco.sealingfetcher.v1.RATlsServer sealing_providers = 1;
|
|
211
|
+
*/
|
|
212
|
+
sealingProviders: RATlsServer[];
|
|
213
|
+
};
|
|
214
|
+
/**
|
|
215
|
+
* Describes the message inco.sealingfetcher.v1.RecoverTEEKeysRequest.
|
|
216
|
+
* Use `create(RecoverTEEKeysRequestSchema)` to create a new message.
|
|
217
|
+
*/
|
|
218
|
+
export declare const RecoverTEEKeysRequestSchema: GenMessage<RecoverTEEKeysRequest>;
|
|
219
|
+
/**
|
|
220
|
+
* RecoverTEEKeysResponse is the response type of RecoverTEEKeys rpc.
|
|
221
|
+
*
|
|
222
|
+
* @generated from message inco.sealingfetcher.v1.RecoverTEEKeysResponse
|
|
223
|
+
*/
|
|
224
|
+
export type RecoverTEEKeysResponse = Message<"inco.sealingfetcher.v1.RecoverTEEKeysResponse"> & {
|
|
225
|
+
/**
|
|
226
|
+
* The TEE keys.
|
|
227
|
+
*
|
|
228
|
+
* @generated from field: inco.sealingfetcher.v1.TeeKeys tee_keys = 1;
|
|
229
|
+
*/
|
|
230
|
+
teeKeys?: TeeKeys;
|
|
231
|
+
};
|
|
232
|
+
/**
|
|
233
|
+
* Describes the message inco.sealingfetcher.v1.RecoverTEEKeysResponse.
|
|
234
|
+
* Use `create(RecoverTEEKeysResponseSchema)` to create a new message.
|
|
235
|
+
*/
|
|
236
|
+
export declare const RecoverTEEKeysResponseSchema: GenMessage<RecoverTEEKeysResponse>;
|
|
237
|
+
/**
|
|
238
|
+
* RecoverEOAKeyRequest is the request type of RecoverEOAKey rpc.
|
|
239
|
+
*
|
|
240
|
+
* @generated from message inco.sealingfetcher.v1.RecoverEOAKeyRequest
|
|
241
|
+
*/
|
|
242
|
+
export type RecoverEOAKeyRequest = Message<"inco.sealingfetcher.v1.RecoverEOAKeyRequest"> & {
|
|
243
|
+
/**
|
|
244
|
+
* The Sealing Providers to recover the EOA key from.
|
|
245
|
+
* The sealing fetcher will try each provider in order until one succeeds.
|
|
246
|
+
*
|
|
247
|
+
* @generated from field: repeated inco.sealingfetcher.v1.RATlsServer sealing_providers = 1;
|
|
248
|
+
*/
|
|
249
|
+
sealingProviders: RATlsServer[];
|
|
250
|
+
/**
|
|
251
|
+
* The EOA address (checksummed or lowercase, 0x-prefixed) to construct the filename.
|
|
252
|
+
* The filename will be addnode_eoa_{eoa_address_lowercase}.json
|
|
253
|
+
*
|
|
254
|
+
* @generated from field: string eoa = 2;
|
|
255
|
+
*/
|
|
256
|
+
eoa: string;
|
|
257
|
+
};
|
|
258
|
+
/**
|
|
259
|
+
* Describes the message inco.sealingfetcher.v1.RecoverEOAKeyRequest.
|
|
260
|
+
* Use `create(RecoverEOAKeyRequestSchema)` to create a new message.
|
|
261
|
+
*/
|
|
262
|
+
export declare const RecoverEOAKeyRequestSchema: GenMessage<RecoverEOAKeyRequest>;
|
|
263
|
+
/**
|
|
264
|
+
* RecoverEOAKeyResponse is the response type of RecoverEOAKey rpc.
|
|
265
|
+
*
|
|
266
|
+
* @generated from message inco.sealingfetcher.v1.RecoverEOAKeyResponse
|
|
267
|
+
*/
|
|
268
|
+
export type RecoverEOAKeyResponse = Message<"inco.sealingfetcher.v1.RecoverEOAKeyResponse"> & {
|
|
269
|
+
/**
|
|
270
|
+
* The EOA private key.
|
|
271
|
+
* The private key is encoded as an unsigned 256-bit big-endian integer in
|
|
272
|
+
* the range [0, N-1], where N is the order of the curve.
|
|
273
|
+
*
|
|
274
|
+
* @generated from field: bytes eoa_privkey = 1;
|
|
275
|
+
*/
|
|
276
|
+
eoaPrivkey: Uint8Array;
|
|
277
|
+
};
|
|
278
|
+
/**
|
|
279
|
+
* Describes the message inco.sealingfetcher.v1.RecoverEOAKeyResponse.
|
|
280
|
+
* Use `create(RecoverEOAKeyResponseSchema)` to create a new message.
|
|
281
|
+
*/
|
|
282
|
+
export declare const RecoverEOAKeyResponseSchema: GenMessage<RecoverEOAKeyResponse>;
|
|
283
|
+
/**
|
|
284
|
+
* SealingFetcherService contains all RPC endpoints for the Sealing fetcher.
|
|
285
|
+
*
|
|
286
|
+
* @generated from service inco.sealingfetcher.v1.SealingFetcherService
|
|
287
|
+
*/
|
|
288
|
+
export declare const SealingFetcherService: GenService<{
|
|
289
|
+
/**
|
|
290
|
+
* StartBackup starts the backup process for the sealing provider.
|
|
291
|
+
* This RPC backs up all TEE keys (EOA, Network, and Storage keys) to the sealing provider.
|
|
292
|
+
* It stores the keys in the sealing fetcher's memory and seals all three keys to the sealing provider.
|
|
293
|
+
* Use this during bootstrap and upgrade flows when all keys are available.
|
|
294
|
+
*
|
|
295
|
+
* @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.StartBackup
|
|
296
|
+
*/
|
|
297
|
+
startBackup: {
|
|
298
|
+
methodKind: "unary";
|
|
299
|
+
input: typeof StartBackupRequestSchema;
|
|
300
|
+
output: typeof StartBackupResponseSchema;
|
|
301
|
+
};
|
|
302
|
+
/**
|
|
303
|
+
* StartBackupEOA starts the backup process for only the EOA key.
|
|
304
|
+
* This RPC backs up only the EOA private key to the sealing provider, without backing up
|
|
305
|
+
* the Network or Storage keys. It stores the EOA key in the sealing provider.
|
|
306
|
+
* Use this during the Add Node flow when only the EOA key has been generated, before
|
|
307
|
+
* the Network and Storage keys are populated.
|
|
308
|
+
*
|
|
309
|
+
* @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.StartBackupEOA
|
|
310
|
+
*/
|
|
311
|
+
startBackupEOA: {
|
|
312
|
+
methodKind: "unary";
|
|
313
|
+
input: typeof StartBackupEOARequestSchema;
|
|
314
|
+
output: typeof StartBackupEOAResponseSchema;
|
|
315
|
+
};
|
|
316
|
+
/**
|
|
317
|
+
* HasTEEKeys checks if the TEE keys are present in the sealing fetcher's memory.
|
|
318
|
+
* If not, then RecoverTEEKeys should be called first
|
|
319
|
+
*
|
|
320
|
+
* @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.HasTEEKeys
|
|
321
|
+
*/
|
|
322
|
+
hasTEEKeys: {
|
|
323
|
+
methodKind: "unary";
|
|
324
|
+
input: typeof HasTEEKeysRequestSchema;
|
|
325
|
+
output: typeof HasTEEKeysResponseSchema;
|
|
326
|
+
};
|
|
327
|
+
/**
|
|
328
|
+
* GetTEEKeys returns the set of network key, EOA key and storage key
|
|
329
|
+
* that the TEE can access.
|
|
330
|
+
* If the TEE keys are not present in the sealing fetcher's memory, then
|
|
331
|
+
* this rpc will return an error.
|
|
332
|
+
*
|
|
333
|
+
* @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.GetTEEKeys
|
|
334
|
+
*/
|
|
335
|
+
getTEEKeys: {
|
|
336
|
+
methodKind: "unary";
|
|
337
|
+
input: typeof GetTEEKeysRequestSchema;
|
|
338
|
+
output: typeof GetTEEKeysResponseSchema;
|
|
339
|
+
};
|
|
340
|
+
/**
|
|
341
|
+
* RecoverTEEKeys recovers the TEE keys from the sealed TEE keys, and stores
|
|
342
|
+
* them in the sealing fetcher's memory.
|
|
343
|
+
*
|
|
344
|
+
* @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.RecoverTEEKeys
|
|
345
|
+
*/
|
|
346
|
+
recoverTEEKeys: {
|
|
347
|
+
methodKind: "unary";
|
|
348
|
+
input: typeof RecoverTEEKeysRequestSchema;
|
|
349
|
+
output: typeof RecoverTEEKeysResponseSchema;
|
|
350
|
+
};
|
|
351
|
+
/**
|
|
352
|
+
* RecoverEOAKey recovers only the EOA private key from the sealing provider.
|
|
353
|
+
* This is used during the Add Node flow to retrieve the EOA key that was
|
|
354
|
+
* previously backed up via StartBackupEOA. The EOA key is stored with filename
|
|
355
|
+
* addnode_eoa_{eoa_address_lowercase}.json in the sealing provider.
|
|
356
|
+
*
|
|
357
|
+
* @generated from rpc inco.sealingfetcher.v1.SealingFetcherService.RecoverEOAKey
|
|
358
|
+
*/
|
|
359
|
+
recoverEOAKey: {
|
|
360
|
+
methodKind: "unary";
|
|
361
|
+
input: typeof RecoverEOAKeyRequestSchema;
|
|
362
|
+
output: typeof RecoverEOAKeyResponseSchema;
|
|
363
|
+
};
|
|
364
|
+
}>;
|
|
@@ -0,0 +1,88 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// @generated by protoc-gen-es v2.10.0 with parameter "target=ts"
|
|
3
|
+
// @generated from file inco/sealingfetcher/v1/sealingfetcher.proto (package inco.sealingfetcher.v1, syntax proto3)
|
|
4
|
+
/* eslint-disable */
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
exports.SealingFetcherService = exports.RecoverEOAKeyResponseSchema = exports.RecoverEOAKeyRequestSchema = exports.RecoverTEEKeysResponseSchema = exports.RecoverTEEKeysRequestSchema = exports.GetTEEKeysResponseSchema = exports.GetTEEKeysRequestSchema = exports.HasTEEKeysResponseSchema = exports.HasTEEKeysRequestSchema = exports.StartBackupResponseSchema = exports.TeeKeysSchema = exports.StartBackupEOAResponseSchema = exports.StartBackupEOARequestSchema = exports.RATlsServerSchema = exports.StartBackupRequestSchema = exports.file_inco_sealingfetcher_v1_sealingfetcher = void 0;
|
|
7
|
+
const codegenv2_1 = require("@bufbuild/protobuf/codegenv2");
|
|
8
|
+
/**
|
|
9
|
+
* Describes the file inco/sealingfetcher/v1/sealingfetcher.proto.
|
|
10
|
+
*/
|
|
11
|
+
exports.file_inco_sealingfetcher_v1_sealingfetcher = (0, codegenv2_1.fileDesc)("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");
|
|
12
|
+
/**
|
|
13
|
+
* Describes the message inco.sealingfetcher.v1.StartBackupRequest.
|
|
14
|
+
* Use `create(StartBackupRequestSchema)` to create a new message.
|
|
15
|
+
*/
|
|
16
|
+
exports.StartBackupRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 0);
|
|
17
|
+
/**
|
|
18
|
+
* Describes the message inco.sealingfetcher.v1.RATlsServer.
|
|
19
|
+
* Use `create(RATlsServerSchema)` to create a new message.
|
|
20
|
+
*/
|
|
21
|
+
exports.RATlsServerSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 1);
|
|
22
|
+
/**
|
|
23
|
+
* Describes the message inco.sealingfetcher.v1.StartBackupEOARequest.
|
|
24
|
+
* Use `create(StartBackupEOARequestSchema)` to create a new message.
|
|
25
|
+
*/
|
|
26
|
+
exports.StartBackupEOARequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 2);
|
|
27
|
+
/**
|
|
28
|
+
* Describes the message inco.sealingfetcher.v1.StartBackupEOAResponse.
|
|
29
|
+
* Use `create(StartBackupEOAResponseSchema)` to create a new message.
|
|
30
|
+
*/
|
|
31
|
+
exports.StartBackupEOAResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 3);
|
|
32
|
+
/**
|
|
33
|
+
* Describes the message inco.sealingfetcher.v1.TeeKeys.
|
|
34
|
+
* Use `create(TeeKeysSchema)` to create a new message.
|
|
35
|
+
*/
|
|
36
|
+
exports.TeeKeysSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 4);
|
|
37
|
+
/**
|
|
38
|
+
* Describes the message inco.sealingfetcher.v1.StartBackupResponse.
|
|
39
|
+
* Use `create(StartBackupResponseSchema)` to create a new message.
|
|
40
|
+
*/
|
|
41
|
+
exports.StartBackupResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 5);
|
|
42
|
+
/**
|
|
43
|
+
* Describes the message inco.sealingfetcher.v1.HasTEEKeysRequest.
|
|
44
|
+
* Use `create(HasTEEKeysRequestSchema)` to create a new message.
|
|
45
|
+
*/
|
|
46
|
+
exports.HasTEEKeysRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 6);
|
|
47
|
+
/**
|
|
48
|
+
* Describes the message inco.sealingfetcher.v1.HasTEEKeysResponse.
|
|
49
|
+
* Use `create(HasTEEKeysResponseSchema)` to create a new message.
|
|
50
|
+
*/
|
|
51
|
+
exports.HasTEEKeysResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 7);
|
|
52
|
+
/**
|
|
53
|
+
* Describes the message inco.sealingfetcher.v1.GetTEEKeysRequest.
|
|
54
|
+
* Use `create(GetTEEKeysRequestSchema)` to create a new message.
|
|
55
|
+
*/
|
|
56
|
+
exports.GetTEEKeysRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 8);
|
|
57
|
+
/**
|
|
58
|
+
* Describes the message inco.sealingfetcher.v1.GetTEEKeysResponse.
|
|
59
|
+
* Use `create(GetTEEKeysResponseSchema)` to create a new message.
|
|
60
|
+
*/
|
|
61
|
+
exports.GetTEEKeysResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 9);
|
|
62
|
+
/**
|
|
63
|
+
* Describes the message inco.sealingfetcher.v1.RecoverTEEKeysRequest.
|
|
64
|
+
* Use `create(RecoverTEEKeysRequestSchema)` to create a new message.
|
|
65
|
+
*/
|
|
66
|
+
exports.RecoverTEEKeysRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 10);
|
|
67
|
+
/**
|
|
68
|
+
* Describes the message inco.sealingfetcher.v1.RecoverTEEKeysResponse.
|
|
69
|
+
* Use `create(RecoverTEEKeysResponseSchema)` to create a new message.
|
|
70
|
+
*/
|
|
71
|
+
exports.RecoverTEEKeysResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 11);
|
|
72
|
+
/**
|
|
73
|
+
* Describes the message inco.sealingfetcher.v1.RecoverEOAKeyRequest.
|
|
74
|
+
* Use `create(RecoverEOAKeyRequestSchema)` to create a new message.
|
|
75
|
+
*/
|
|
76
|
+
exports.RecoverEOAKeyRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 12);
|
|
77
|
+
/**
|
|
78
|
+
* Describes the message inco.sealingfetcher.v1.RecoverEOAKeyResponse.
|
|
79
|
+
* Use `create(RecoverEOAKeyResponseSchema)` to create a new message.
|
|
80
|
+
*/
|
|
81
|
+
exports.RecoverEOAKeyResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 13);
|
|
82
|
+
/**
|
|
83
|
+
* SealingFetcherService contains all RPC endpoints for the Sealing fetcher.
|
|
84
|
+
*
|
|
85
|
+
* @generated from service inco.sealingfetcher.v1.SealingFetcherService
|
|
86
|
+
*/
|
|
87
|
+
exports.SealingFetcherService = (0, codegenv2_1.serviceDesc)(exports.file_inco_sealingfetcher_v1_sealingfetcher, 0);
|
|
88
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -18,6 +18,26 @@ export declare const lightningDeployments: readonly [{
|
|
|
18
18
|
readonly commit: "v0.6.9-17-g217794f3-dirty";
|
|
19
19
|
readonly active: true;
|
|
20
20
|
readonly includesPreviewFeatures: true;
|
|
21
|
+
}, {
|
|
22
|
+
readonly name: "incoLightningPreview_2_0_0__295237520";
|
|
23
|
+
readonly majorVersion: 2;
|
|
24
|
+
readonly deployer: "0x8202D2D747784Cb7D48868E44C42C4bf162a70BC";
|
|
25
|
+
readonly pepper: "devnet";
|
|
26
|
+
readonly executorAddress: "0xC64BB070D6F5aa796e79fA19c1008647ffF736ED";
|
|
27
|
+
readonly salt: "0x8202d2d747784cb7d48868e44c42c4bf162a70bc008d5a963bd519d8493f5190";
|
|
28
|
+
readonly chainId: 84532;
|
|
29
|
+
readonly chainName: "Base Sepolia";
|
|
30
|
+
readonly version: {
|
|
31
|
+
readonly major: 2;
|
|
32
|
+
readonly minor: 0;
|
|
33
|
+
readonly patch: 0;
|
|
34
|
+
readonly shortSalt: "295237520";
|
|
35
|
+
};
|
|
36
|
+
readonly blockNumber: 34835187;
|
|
37
|
+
readonly deployDate: "2025-12-11T07:37:48.943Z";
|
|
38
|
+
readonly commit: "v0.7.2-3-g4d31fa62-dirty";
|
|
39
|
+
readonly active: true;
|
|
40
|
+
readonly includesPreviewFeatures: true;
|
|
21
41
|
}, {
|
|
22
42
|
readonly name: "incoLightningPreview_1_1_0__725458969";
|
|
23
43
|
readonly majorVersion: 1;
|