@inco/js 0.8.0-devnet-1 → 0.8.0-devnet-3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (40) hide show
  1. package/dist/cjs/advancedacl/session-key.d.ts +12 -2
  2. package/dist/cjs/advancedacl/session-key.js +49 -6
  3. package/dist/cjs/generated/abis/lightning.d.ts +1 -1
  4. package/dist/cjs/generated/abis/lightning.js +2 -2
  5. package/dist/cjs/generated/abis/verifier.d.ts +20 -12
  6. package/dist/cjs/generated/abis/verifier.js +23 -9
  7. package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +13 -0
  8. package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.js +3 -2
  9. package/dist/cjs/generated/es/inco/helioswrapper/v1/helioswrapper_pb.d.ts +77 -0
  10. package/dist/cjs/generated/es/inco/helioswrapper/v1/helioswrapper_pb.js +28 -0
  11. package/dist/cjs/kms/thresholdPromises.js +2 -2
  12. package/dist/cjs/lite/lightning.d.ts +33 -6
  13. package/dist/cjs/lite/lightning.js +58 -9
  14. package/dist/cjs/local/local-node.d.ts +3 -3
  15. package/dist/cjs/local/local-node.js +8 -4
  16. package/dist/cjs/retry.js +4 -2
  17. package/dist/esm/advancedacl/session-key.d.ts +12 -2
  18. package/dist/esm/advancedacl/session-key.js +48 -6
  19. package/dist/esm/generated/abis/lightning.d.ts +1 -1
  20. package/dist/esm/generated/abis/lightning.js +2 -2
  21. package/dist/esm/generated/abis/verifier.d.ts +20 -12
  22. package/dist/esm/generated/abis/verifier.js +23 -9
  23. package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +13 -0
  24. package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.js +3 -2
  25. package/dist/esm/generated/es/inco/helioswrapper/v1/helioswrapper_pb.d.ts +77 -0
  26. package/dist/esm/generated/es/inco/helioswrapper/v1/helioswrapper_pb.js +25 -0
  27. package/dist/esm/kms/thresholdPromises.js +2 -2
  28. package/dist/esm/lite/lightning.d.ts +33 -6
  29. package/dist/esm/lite/lightning.js +59 -10
  30. package/dist/esm/local/local-node.d.ts +3 -3
  31. package/dist/esm/local/local-node.js +8 -4
  32. package/dist/esm/retry.js +4 -2
  33. package/dist/types/advancedacl/session-key.d.ts +12 -2
  34. package/dist/types/generated/abis/lightning.d.ts +1 -1
  35. package/dist/types/generated/abis/verifier.d.ts +20 -12
  36. package/dist/types/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +13 -0
  37. package/dist/types/generated/es/inco/helioswrapper/v1/helioswrapper_pb.d.ts +77 -0
  38. package/dist/types/lite/lightning.d.ts +33 -6
  39. package/dist/types/local/local-node.d.ts +3 -3
  40. package/package.json +1 -1
@@ -4,13 +4,17 @@ export const LocalNodeEnv = Schema.Struct({
4
4
  DEPLOYER_ADDRESS: Address,
5
5
  STATE_DUMP: Schema.String,
6
6
  EXECUTOR_ADDRESS: Address,
7
- NETWORK_PUBKEY: HexString,
7
+ // Empty if compute-server is remote
8
+ NETWORK_PUBKEY: Schema.optional(HexString),
8
9
  SENDER_ADDRESS: Address,
9
10
  SENDER_PRIVATE_KEY: HexString,
11
+ // Empty if compute-server is remote
10
12
  EIP712_SIGNER_ADDRESS: Schema.optional(HexString),
11
13
  PEPPER: Schema.String,
12
- COVALIDATOR_NETWORK_PRIVATE_KEY: HexString,
13
- COVALIDATOR_EIP712_PRIVATE_SIGNING_KEY: HexString,
14
+ // Empty if compute-server is remote
15
+ COVALIDATOR_NETWORK_PRIVATE_KEY: Schema.optional(HexString),
16
+ // Empty if compute-server is remote
17
+ COVALIDATOR_EIP712_PRIVATE_SIGNING_KEY: Schema.optional(HexString),
14
18
  COVALIDATOR_INCO_EXECUTOR_ADDR: Address,
15
19
  COVALIDATOR_HOST_CHAIN_ID: Schema.optional(Schema.String),
16
20
  COVALIDATOR_URL: Schema.optional(Schema.String),
@@ -54,4 +58,4 @@ function parseEnv(envContent) {
54
58
  }
55
59
  return env;
56
60
  }
57
- //# sourceMappingURL=data:application/json;base64,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
61
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoibG9jYWwtbm9kZS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9sb2NhbC9sb2NhbC1ub2RlLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLE9BQU8sRUFBRSxNQUFNLEVBQUUsTUFBTSxRQUFRLENBQUM7QUFDaEMsT0FBTyxFQUFFLE9BQU8sRUFBRSxTQUFTLEVBQUUsTUFBTSxjQUFjLENBQUM7QUFFbEQsTUFBTSxDQUFDLE1BQU0sWUFBWSxHQUFHLE1BQU0sQ0FBQyxNQUFNLENBQUM7SUFDeEMsZ0JBQWdCLEVBQUUsT0FBTztJQUN6QixVQUFVLEVBQUUsTUFBTSxDQUFDLE1BQU07SUFDekIsZ0JBQWdCLEVBQUUsT0FBTztJQUN6QixvQ0FBb0M7SUFDcEMsY0FBYyxFQUFFLE1BQU0sQ0FBQyxRQUFRLENBQUMsU0FBUyxDQUFDO0lBQzFDLGNBQWMsRUFBRSxPQUFPO0lBQ3ZCLGtCQUFrQixFQUFFLFNBQVM7SUFDN0Isb0NBQW9DO0lBQ3BDLHFCQUFxQixFQUFFLE1BQU0sQ0FBQyxRQUFRLENBQUMsU0FBUyxDQUFDO0lBQ2pELE1BQU0sRUFBRSxNQUFNLENBQUMsTUFBTTtJQUNyQixvQ0FBb0M7SUFDcEMsK0JBQStCLEVBQUUsTUFBTSxDQUFDLFFBQVEsQ0FBQyxTQUFTLENBQUM7SUFDM0Qsb0NBQW9DO0lBQ3BDLHNDQUFzQyxFQUFFLE1BQU0sQ0FBQyxRQUFRLENBQUMsU0FBUyxDQUFDO0lBQ2xFLDhCQUE4QixFQUFFLE9BQU87SUFDdkMseUJBQXlCLEVBQUUsTUFBTSxDQUFDLFFBQVEsQ0FBQyxNQUFNLENBQUMsTUFBTSxDQUFDO0lBQ3pELGVBQWUsRUFBRSxNQUFNLENBQUMsUUFBUSxDQUFDLE1BQU0sQ0FBQyxNQUFNLENBQUM7SUFDL0MsOEJBQThCLEVBQUUsTUFBTSxDQUFDLFFBQVEsQ0FBQyxNQUFNLENBQUMsTUFBTSxDQUFDO0NBQy9ELENBQUMsQ0FBQztBQUlILHNFQUFzRTtBQUN0RSxnRUFBZ0U7QUFDaEUsTUFBTSxVQUFVLGFBQWEsQ0FBQyxZQUE4QjtJQUMxRCxNQUFNLE1BQU0sR0FBRyxZQUFZLENBQUMsQ0FBQyxDQUFDLE9BQU8sQ0FBQyxZQUFZLENBQUMsQ0FBQyxDQUFDLENBQUMsT0FBTyxDQUFDLEdBQUcsQ0FBQztJQUNsRSxPQUFPLE1BQU0sQ0FBQyxpQkFBaUIsQ0FBQyxZQUFZLENBQUMsQ0FBQyxNQUFNLENBQUMsQ0FBQztBQUN4RCxDQUFDO0FBRUQsU0FBUyxPQUFPLENBQUMsVUFBMkI7SUFDMUMsT0FBTyxRQUFRLENBQUMsVUFBVSxDQUFDLFFBQVEsRUFBRSxDQUFDLENBQUM7QUFDekMsQ0FBQztBQUVELG1GQUFtRjtBQUNuRixTQUFTLFFBQVEsQ0FBQyxVQUFrQjtJQUNsQyxJQUFJLEdBQUcsR0FBMkIsRUFBRSxDQUFDO0lBQ3JDLE1BQU0sS0FBSyxHQUFHLFVBQVUsQ0FBQyxLQUFLLENBQUMsSUFBSSxDQUFDLENBQUM7SUFFckMsaUNBQWlDO0lBQ2pDLEtBQUssTUFBTSxJQUFJLElBQUksS0FBSyxFQUFFLENBQUM7UUFDekIsTUFBTSxXQUFXLEdBQUcsSUFBSSxDQUFDLElBQUksRUFBRSxDQUFDO1FBQ2hDLElBQUksV0FBVyxJQUFJLENBQUMsV0FBVyxDQUFDLFVBQVUsQ0FBQyxHQUFHLENBQUMsRUFBRSxDQUFDO1lBQ2hELE1BQU0sVUFBVSxHQUFHLFdBQVcsQ0FBQyxPQUFPLENBQUMsR0FBRyxDQUFDLENBQUM7WUFDNUMsSUFBSSxVQUFVLEtBQUssQ0FBQyxDQUFDLEVBQUUsQ0FBQztnQkFDdEIsTUFBTSxHQUFHLEdBQUcsV0FBVyxDQUFDLFNBQVMsQ0FBQyxDQUFDLEVBQUUsVUFBVSxDQUFDLENBQUMsSUFBSSxFQUFFLENBQUM7Z0JBQ3hELElBQUksS0FBSyxHQUFHLFdBQVcsQ0FBQyxTQUFTLENBQUMsVUFBVSxHQUFHLENBQUMsQ0FBQyxDQUFDLElBQUksRUFBRSxDQUFDO2dCQUV6RCx1QkFBdUI7Z0JBQ3ZCLElBQ0UsQ0FBQyxLQUFLLENBQUMsVUFBVSxDQUFDLEdBQUcsQ0FBQyxJQUFJLEtBQUssQ0FBQyxRQUFRLENBQUMsR0FBRyxDQUFDLENBQUM7b0JBQzlDLENBQUMsS0FBSyxDQUFDLFVBQVUsQ0FBQyxHQUFHLENBQUMsSUFBSSxLQUFLLENBQUMsUUFBUSxDQUFDLEdBQUcsQ0FBQyxDQUFDLEVBQzlDLENBQUM7b0JBQ0QsS0FBSyxHQUFHLEtBQUssQ0FBQyxTQUFTLENBQUMsQ0FBQyxFQUFFLEtBQUssQ0FBQyxNQUFNLEdBQUcsQ0FBQyxDQUFDLENBQUM7Z0JBQy9DLENBQUM7Z0JBRUQsR0FBRyxDQUFDLEdBQUcsQ0FBQyxHQUFHLEtBQUssQ0FBQztZQUNuQixDQUFDO1FBQ0gsQ0FBQztJQUNILENBQUM7SUFFRCx5REFBeUQ7SUFDekQsS0FBSyxNQUFNLENBQUMsR0FBRyxFQUFFLEtBQUssQ0FBQyxJQUFJLE1BQU0sQ0FBQyxPQUFPLENBQUMsR0FBRyxDQUFDLEVBQUUsQ0FBQztRQUMvQyxHQUFHLENBQUMsR0FBRyxDQUFDLEdBQUcsS0FBSyxDQUFDLE9BQU8sQ0FBQyxjQUFjLEVBQUUsQ0FBQyxDQUFDLEVBQUUsT0FBZSxFQUFFLEVBQUU7WUFDOUQsT0FBTyxHQUFHLENBQUMsT0FBTyxDQUFDLElBQUksRUFBRSxDQUFDO1FBQzVCLENBQUMsQ0FBQyxDQUFDO0lBQ0wsQ0FBQztJQUVELE9BQU8sR0FBRyxDQUFDO0FBQ2IsQ0FBQyJ9
package/dist/esm/retry.js CHANGED
@@ -4,7 +4,9 @@
4
4
  * @param config - Optional backoff configuration
5
5
  * @returns Promise that resolves with the result of the function
6
6
  */
7
- export async function retryWithBackoff(fn, { maxRetries = 10, baseDelayInMs = 1000, backoffFactor = 1.5, errHandler = () => 'continue', } = {}) {
7
+ export async function retryWithBackoff(fn, {
8
+ // These default values will make it return an error after ~10s if the fn response is fast.
9
+ maxRetries = 5, baseDelayInMs = 1000, backoffFactor = 1.5, errHandler = () => 'continue', } = {}) {
8
10
  let lastError;
9
11
  for (let attempt = 0; attempt < maxRetries; attempt++) {
10
12
  try {
@@ -23,4 +25,4 @@ export async function retryWithBackoff(fn, { maxRetries = 10, baseDelayInMs = 10
23
25
  }
24
26
  throw lastError;
25
27
  }
26
- //# sourceMappingURL=data:application/json;base64,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
28
+ //# sourceMappingURL=data:application/json;base64,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
@@ -21,7 +21,15 @@ export interface GrantSessionKeyArgs {
21
21
  sharerWalletClient: WalletClient<Transport, Chain, Account>;
22
22
  expiresAt: Date;
23
23
  }
24
+ export interface GrantSessionKeyCustomVerifierArgs {
25
+ chainId: bigint;
26
+ incoLiteAddress: Address;
27
+ sessionVerifierContractAddress: Address;
28
+ sharerWalletClient: WalletClient<Transport, Chain, Account>;
29
+ sharerArgData: Hex;
30
+ }
24
31
  export declare function grantSessionKey({ chainId, incoLiteAddress, sessionVerifierContractAddress, granteeAddress, sharerWalletClient, expiresAt, }: GrantSessionKeyArgs): Promise<AllowanceVoucherWithSig>;
32
+ export declare function grantSessionKeyCustomVerifier({ chainId, incoLiteAddress, sessionVerifierContractAddress, sharerWalletClient, sharerArgData, }: GrantSessionKeyCustomVerifierArgs): Promise<AllowanceVoucherWithSig>;
25
33
  export declare function updateActiveVouchersSessionNonce(incoLiteAddress: Address, sharerWalletClient: WalletClient<Transport, Chain, Account>): Promise<`0x${string}`>;
26
34
  export interface SessionKeyAttestedComputeArgs {
27
35
  chainId: SupportedChainId;
@@ -31,19 +39,21 @@ export interface SessionKeyAttestedComputeArgs {
31
39
  lhsHandle: HexString;
32
40
  op: AttestedComputeOP;
33
41
  rhsPlaintext: bigint | boolean;
42
+ requesterArgData?: Hex | undefined;
34
43
  backoffConfig?: Partial<BackoffConfig> | undefined;
35
44
  ethClient?: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account> | undefined;
36
45
  executorAddress?: HexString | undefined;
37
46
  reencryptPubKey?: Uint8Array | undefined;
38
47
  reencryptKeypair?: Secp256k1Keypair | undefined;
39
48
  }
40
- export declare function sessionKeyAttestedCompute<T extends SupportedFheType>({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsQuorumClient, ephemeralKeypair, allowanceVoucherWithSig, ethClient, executorAddress, reencryptPubKey, reencryptKeypair, }: SessionKeyAttestedComputeArgs): Promise<DecryptionAttestation<EciesScheme, SupportedFheType> | EncryptedDecryptionAttestation<EciesScheme, SupportedFheType>>;
49
+ export declare function sessionKeyAttestedCompute<T extends SupportedFheType>({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsQuorumClient, ephemeralKeypair, allowanceVoucherWithSig, requesterArgData, ethClient, executorAddress, reencryptPubKey, reencryptKeypair, }: SessionKeyAttestedComputeArgs): Promise<DecryptionAttestation<EciesScheme, SupportedFheType> | EncryptedDecryptionAttestation<EciesScheme, SupportedFheType>>;
41
50
  export interface SessionKeyAttestedDecryptArgs {
42
51
  chainId: SupportedChainId;
43
52
  ephemeralKeypair: Secp256k1Keypair;
44
53
  kmsQuorumClient: KmsQuorumClient;
45
54
  allowanceVoucherWithSig: AllowanceVoucherWithSig;
46
55
  handles: HexString[];
56
+ requesterArgData?: Hex | undefined;
47
57
  backoffConfig?: Partial<BackoffConfig> | undefined;
48
58
  reencryptPubKey?: Uint8Array | undefined;
49
59
  reencryptKeypair?: Secp256k1Keypair | undefined;
@@ -80,4 +90,4 @@ export interface SessionKeyAttestedDecryptArgs {
80
90
  * );
81
91
  * ```
82
92
  */
83
- export declare function sessionKeyAttestedDecrypt({ chainId, kmsQuorumClient, handles, ephemeralKeypair, allowanceVoucherWithSig, backoffConfig, reencryptPubKey, reencryptKeypair, ethClient, executorAddress, }: SessionKeyAttestedDecryptArgs): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType> | EncryptedDecryptionAttestation<EciesScheme, SupportedFheType>>>;
93
+ export declare function sessionKeyAttestedDecrypt({ chainId, kmsQuorumClient, handles, ephemeralKeypair, allowanceVoucherWithSig, requesterArgData, backoffConfig, reencryptPubKey, reencryptKeypair, ethClient, executorAddress, }: SessionKeyAttestedDecryptArgs): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType> | EncryptedDecryptionAttestation<EciesScheme, SupportedFheType>>>;
@@ -1911,7 +1911,7 @@ export declare const sessionVerifierAbi: readonly [{
1911
1911
  readonly internalType: "bytes";
1912
1912
  readonly type: "bytes";
1913
1913
  }, {
1914
- readonly name: "";
1914
+ readonly name: "requesterArgData";
1915
1915
  readonly internalType: "bytes";
1916
1916
  readonly type: "bytes";
1917
1917
  }];
@@ -641,6 +641,16 @@ export declare const incoVerifierAbi: readonly [{
641
641
  readonly type: "address";
642
642
  }];
643
643
  readonly stateMutability: "view";
644
+ }, {
645
+ readonly type: "function";
646
+ readonly inputs: readonly [{
647
+ readonly name: "mrAggregated";
648
+ readonly internalType: "bytes32";
649
+ readonly type: "bytes32";
650
+ }];
651
+ readonly name: "removeApprovedTeeVersion";
652
+ readonly outputs: readonly [];
653
+ readonly stateMutability: "nonpayable";
644
654
  }, {
645
655
  readonly type: "function";
646
656
  readonly inputs: readonly [{
@@ -940,6 +950,16 @@ export declare const incoVerifierAbi: readonly [{
940
950
  readonly indexed: true;
941
951
  }];
942
952
  readonly name: "SignerHasUpdatedTDX";
953
+ }, {
954
+ readonly type: "event";
955
+ readonly anonymous: false;
956
+ readonly inputs: readonly [{
957
+ readonly name: "mrAggregated";
958
+ readonly internalType: "bytes32";
959
+ readonly type: "bytes32";
960
+ readonly indexed: true;
961
+ }];
962
+ readonly name: "TEEVersionRemoved";
943
963
  }, {
944
964
  readonly type: "event";
945
965
  readonly anonymous: false;
@@ -1149,18 +1169,6 @@ export declare const incoVerifierAbi: readonly [{
1149
1169
  readonly type: "address";
1150
1170
  }];
1151
1171
  readonly name: "SignerNotFound";
1152
- }, {
1153
- readonly type: "error";
1154
- readonly inputs: readonly [{
1155
- readonly name: "currentSigner";
1156
- readonly internalType: "address";
1157
- readonly type: "address";
1158
- }, {
1159
- readonly name: "lastSigner";
1160
- readonly internalType: "address";
1161
- readonly type: "address";
1162
- }];
1163
- readonly name: "SignersNotInAscendingOrder";
1164
1172
  }, {
1165
1173
  readonly type: "error";
1166
1174
  readonly inputs: readonly [];
@@ -3,6 +3,7 @@ import type { CryptogramWithProof, InputCryptogram, StoredCryptogram } from "./t
3
3
  import type { DecryptionAttestation } from "../../../kms/lite/v1/kms_service_pb";
4
4
  import type { ACLProof, SupportedScalarBinaryOp } from "../../../kms/lite/v1/types_pb";
5
5
  import type { RATlsServer } from "../../../sealingfetcher/v1/sealingfetcher_pb";
6
+ import type { StartHeliosRequest } from "../../../helioswrapper/v1/helioswrapper_pb";
6
7
  import type { Message } from "@bufbuild/protobuf";
7
8
  /**
8
9
  * Describes the file inco/covalidator/compute/v1/server.proto.
@@ -567,6 +568,12 @@ export type ConfigureRequest = Message<"inco.covalidator.compute.v1.ConfigureReq
567
568
  * @generated from field: repeated inco.sealingfetcher.v1.RATlsServer sealing_providers = 1;
568
569
  */
569
570
  sealingProviders: RATlsServer[];
571
+ /**
572
+ * Provide Helios-specific configuration to start the Helios from compute service.
573
+ *
574
+ * @generated from field: inco.helioswrapper.v1.StartHeliosRequest helios_config = 2;
575
+ */
576
+ heliosConfig?: StartHeliosRequest;
570
577
  };
571
578
  /**
572
579
  * Describes the message inco.covalidator.compute.v1.ConfigureRequest.
@@ -585,6 +592,12 @@ export type ConfigureResponse = Message<"inco.covalidator.compute.v1.ConfigureRe
585
592
  * @generated from field: bool success = 1;
586
593
  */
587
594
  success: boolean;
595
+ /**
596
+ * True if the compute service has successfully started the Helios light client.
597
+ *
598
+ * @generated from field: bool helios_started = 2;
599
+ */
600
+ heliosStarted: boolean;
588
601
  };
589
602
  /**
590
603
  * Describes the message inco.covalidator.compute.v1.ConfigureResponse.
@@ -0,0 +1,77 @@
1
+ import type { GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv2";
2
+ import type { Message } from "@bufbuild/protobuf";
3
+ /**
4
+ * Describes the file inco/helioswrapper/v1/helioswrapper.proto.
5
+ */
6
+ export declare const file_inco_helioswrapper_v1_helioswrapper: GenFile;
7
+ /**
8
+ * StartHeliosRequest contains the parameters needed for starting a Helios light client.
9
+ *
10
+ * @generated from message inco.helioswrapper.v1.StartHeliosRequest
11
+ */
12
+ export type StartHeliosRequest = Message<"inco.helioswrapper.v1.StartHeliosRequest"> & {
13
+ /**
14
+ * The execution rpc to use. This doesn't need to be a trusted RPC endpoint for integrity, but needs to be one for liveness.
15
+ *
16
+ * @generated from field: string execution_rpc = 1;
17
+ */
18
+ executionRpc: string;
19
+ /**
20
+ * The consensus rpc to use. This doesn't need to be a trusted RPC endpoint for integrity, but needs to be one for liveness. Defaults to Nimbus for sepolia testnet and defaults to "https://www.lightclientdata.org" for mainnet.
21
+ *
22
+ * @generated from field: optional string consensus_rpc = 2;
23
+ */
24
+ consensusRpc?: string;
25
+ /**
26
+ * The latest hex encoded checkpoint. This should be a trusted checkpoint that is no greater than ~2 weeks old.
27
+ * If you are unsure what checkpoint to use, you can skip this option and set either `load_external_fallback` or `fallback` values (described below) to fetch a checkpoint. Though this is not recommended and less secure.
28
+ *
29
+ * @generated from field: optional string checkpoint = 3;
30
+ */
31
+ checkpoint?: string;
32
+ /**
33
+ * A checkpoint fallback is used if no checkpoint is provided or the given checkpoint is too old.
34
+ * This is expected to be a trusted checkpoint sync api endpoint.
35
+ *
36
+ * @generated from field: optional string fallback = 4;
37
+ */
38
+ fallback?: string;
39
+ };
40
+ /**
41
+ * Describes the message inco.helioswrapper.v1.StartHeliosRequest.
42
+ * Use `create(StartHeliosRequestSchema)` to create a new message.
43
+ */
44
+ export declare const StartHeliosRequestSchema: GenMessage<StartHeliosRequest>;
45
+ /**
46
+ * StartHeliosResponse contains a success flag indicating whether the Helios client was started successfully or not.
47
+ *
48
+ * @generated from message inco.helioswrapper.v1.StartHeliosResponse
49
+ */
50
+ export type StartHeliosResponse = Message<"inco.helioswrapper.v1.StartHeliosResponse"> & {
51
+ /**
52
+ * @generated from field: bool success = 1;
53
+ */
54
+ success: boolean;
55
+ };
56
+ /**
57
+ * Describes the message inco.helioswrapper.v1.StartHeliosResponse.
58
+ * Use `create(StartHeliosResponseSchema)` to create a new message.
59
+ */
60
+ export declare const StartHeliosResponseSchema: GenMessage<StartHeliosResponse>;
61
+ /**
62
+ * HeliosWrapperService contains a single method for starting a Helios light client.
63
+ *
64
+ * @generated from service inco.helioswrapper.v1.HeliosWrapperService
65
+ */
66
+ export declare const HeliosWrapperService: GenService<{
67
+ /**
68
+ * StartHelios starts the Helios light client with the given url parameters.
69
+ *
70
+ * @generated from rpc inco.helioswrapper.v1.HeliosWrapperService.StartHelios
71
+ */
72
+ startHelios: {
73
+ methodKind: "unary";
74
+ input: typeof StartHeliosRequestSchema;
75
+ output: typeof StartHeliosResponseSchema;
76
+ };
77
+ }>;
@@ -157,6 +157,33 @@ export declare class Lightning<T extends DeploymentSlice = DeploymentSlice> {
157
157
  * ```
158
158
  */
159
159
  grantSessionKeyAllowanceVoucher(walletClient: WalletClient<Transport, Chain, Account>, granteeAddress: string, expiresAt: Date, sessionVerifierAddress: string): Promise<AllowanceVoucherWithSig>;
160
+ /**
161
+ * Grants a session key allowance voucher using a custom session verifier contract.
162
+ *
163
+ * This method creates a signed allowance voucher that authorizes reencryption operations
164
+ * using a custom session verifier. Unlike `grantSessionKeyAllowanceVoucher`, this method
165
+ * allows specifying custom `sharerArgData` for use with custom verifier contracts that
166
+ * require additional authorization parameters.
167
+ *
168
+ * @param walletClient - The wallet client used for signing the allowance voucher
169
+ * @param sessionVerifierAddress - The address of the custom session verifier contract
170
+ * @param sharerArgData - Custom encoded arguments for the session verifier's `canUseSession` function
171
+ * @returns A promise that resolves to an AllowanceVoucherWithSig containing the signed allowance voucher
172
+ *
173
+ * @example
174
+ * ```typescript
175
+ * const sharerArgData = encodeAbiParameters(
176
+ * [{ type: 'address' }, { type: 'uint256' }],
177
+ * [granteeAddress, expiresAt]
178
+ * );
179
+ * const voucher = await lightning.grantCustomSessionKeyAllowanceVoucher(
180
+ * walletClient,
181
+ * "0x5678...", // custom verifier address
182
+ * sharerArgData
183
+ * );
184
+ * ```
185
+ */
186
+ grantCustomSessionKeyAllowanceVoucher(walletClient: WalletClient<Transport, Chain, Account>, sessionVerifierAddress: string, sharerArgData: HexString): Promise<AllowanceVoucherWithSig>;
160
187
  /**
161
188
  * Updates the active session nonce for the given wallet client.
162
189
  *
@@ -230,9 +257,9 @@ export declare class Lightning<T extends DeploymentSlice = DeploymentSlice> {
230
257
  * );
231
258
  * ```
232
259
  */
233
- attestedDecryptWithVoucher(ephemeralKeypair: Secp256k1Keypair, allowanceVoucherWithSig: AllowanceVoucherWithSig, ethClient: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account>, handles: HexString[], backoffConfig?: Partial<BackoffConfig>): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
234
- attestedDecryptWithVoucher(ephemeralKeypair: Secp256k1Keypair, allowanceVoucherWithSig: AllowanceVoucherWithSig, ethClient: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account>, handles: HexString[], reencryptPubKey: Uint8Array, backoffConfig?: Partial<BackoffConfig>): Promise<Array<EncryptedDecryptionAttestation<EciesScheme, SupportedFheType>>>;
235
- attestedDecryptWithVoucher(ephemeralKeypair: Secp256k1Keypair, allowanceVoucherWithSig: AllowanceVoucherWithSig, ethClient: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account>, handles: HexString[], reencryptPubKey: Uint8Array, reencryptKeypair: Secp256k1Keypair, backoffConfig?: Partial<BackoffConfig>): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
260
+ attestedDecryptWithVoucher(ephemeralKeypair: Secp256k1Keypair, allowanceVoucherWithSig: AllowanceVoucherWithSig, ethClient: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account>, handles: HexString[], requesterArgData?: HexString, backoffConfig?: Partial<BackoffConfig>): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
261
+ attestedDecryptWithVoucher(ephemeralKeypair: Secp256k1Keypair, allowanceVoucherWithSig: AllowanceVoucherWithSig, ethClient: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account>, handles: HexString[], reencryptPubKey: Uint8Array, requesterArgData?: HexString, backoffConfig?: Partial<BackoffConfig>): Promise<Array<EncryptedDecryptionAttestation<EciesScheme, SupportedFheType>>>;
262
+ attestedDecryptWithVoucher(ephemeralKeypair: Secp256k1Keypair, allowanceVoucherWithSig: AllowanceVoucherWithSig, ethClient: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account>, handles: HexString[], reencryptPubKey: Uint8Array, reencryptKeypair: Secp256k1Keypair, requesterArgData?: HexString, backoffConfig?: Partial<BackoffConfig>): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
236
263
  /**
237
264
  * Get an attested compute for the given wallet client.
238
265
  *
@@ -323,9 +350,9 @@ export declare class Lightning<T extends DeploymentSlice = DeploymentSlice> {
323
350
  * console.log(decrypted.plaintext.value);
324
351
  * ```
325
352
  */
326
- attestedComputeWithVoucher(ephemeralKeypair: Secp256k1Keypair, allowanceVoucherWithSig: AllowanceVoucherWithSig, ethClient: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account>, lhsHandle: HexString, op: AttestedComputeOP, rhsPlaintext: bigint | boolean, backoffConfig?: Partial<BackoffConfig>): Promise<DecryptionAttestation<EciesScheme, SupportedFheType>>;
327
- attestedComputeWithVoucher(ephemeralKeypair: Secp256k1Keypair, allowanceVoucherWithSig: AllowanceVoucherWithSig, ethClient: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account>, lhsHandle: HexString, op: AttestedComputeOP, rhsPlaintext: bigint | boolean, reencryptPubKey: Uint8Array, backoffConfig?: Partial<BackoffConfig>): Promise<EncryptedDecryptionAttestation<EciesScheme, SupportedFheType>>;
328
- attestedComputeWithVoucher(ephemeralKeypair: Secp256k1Keypair, allowanceVoucherWithSig: AllowanceVoucherWithSig, ethClient: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account>, lhsHandle: HexString, op: AttestedComputeOP, rhsPlaintext: bigint | boolean, reencryptPubKey: Uint8Array, reencryptKeypair: Secp256k1Keypair, backoffConfig?: Partial<BackoffConfig>): Promise<DecryptionAttestation<EciesScheme, SupportedFheType>>;
353
+ attestedComputeWithVoucher(ephemeralKeypair: Secp256k1Keypair, allowanceVoucherWithSig: AllowanceVoucherWithSig, ethClient: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account>, lhsHandle: HexString, op: AttestedComputeOP, rhsPlaintext: bigint | boolean, requesterArgData?: HexString, backoffConfig?: Partial<BackoffConfig>): Promise<DecryptionAttestation<EciesScheme, SupportedFheType>>;
354
+ attestedComputeWithVoucher(ephemeralKeypair: Secp256k1Keypair, allowanceVoucherWithSig: AllowanceVoucherWithSig, ethClient: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account>, lhsHandle: HexString, op: AttestedComputeOP, rhsPlaintext: bigint | boolean, reencryptPubKey: Uint8Array, requesterArgData?: HexString, backoffConfig?: Partial<BackoffConfig>): Promise<EncryptedDecryptionAttestation<EciesScheme, SupportedFheType>>;
355
+ attestedComputeWithVoucher(ephemeralKeypair: Secp256k1Keypair, allowanceVoucherWithSig: AllowanceVoucherWithSig, ethClient: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account>, lhsHandle: HexString, op: AttestedComputeOP, rhsPlaintext: bigint | boolean, reencryptPubKey: Uint8Array, reencryptKeypair: Secp256k1Keypair, requesterArgData?: HexString, backoffConfig?: Partial<BackoffConfig>): Promise<DecryptionAttestation<EciesScheme, SupportedFheType>>;
329
356
  /**
330
357
  * Get an decryption of publicly revealed handles.
331
358
  *
@@ -3,13 +3,13 @@ export declare const LocalNodeEnv: Schema.Struct<{
3
3
  DEPLOYER_ADDRESS: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
4
4
  STATE_DUMP: typeof Schema.String;
5
5
  EXECUTOR_ADDRESS: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
6
- NETWORK_PUBKEY: Schema.TemplateLiteral<`0x${string}`>;
6
+ NETWORK_PUBKEY: Schema.optional<Schema.TemplateLiteral<`0x${string}`>>;
7
7
  SENDER_ADDRESS: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
8
8
  SENDER_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
9
9
  EIP712_SIGNER_ADDRESS: Schema.optional<Schema.TemplateLiteral<`0x${string}`>>;
10
10
  PEPPER: typeof Schema.String;
11
- COVALIDATOR_NETWORK_PRIVATE_KEY: Schema.TemplateLiteral<`0x${string}`>;
12
- COVALIDATOR_EIP712_PRIVATE_SIGNING_KEY: Schema.TemplateLiteral<`0x${string}`>;
11
+ COVALIDATOR_NETWORK_PRIVATE_KEY: Schema.optional<Schema.TemplateLiteral<`0x${string}`>>;
12
+ COVALIDATOR_EIP712_PRIVATE_SIGNING_KEY: Schema.optional<Schema.TemplateLiteral<`0x${string}`>>;
13
13
  COVALIDATOR_INCO_EXECUTOR_ADDR: Schema.brand<Schema.filter<Schema.TemplateLiteral<`0x${string}`>>, "Address">;
14
14
  COVALIDATOR_HOST_CHAIN_ID: Schema.optional<typeof Schema.String>;
15
15
  COVALIDATOR_URL: Schema.optional<typeof Schema.String>;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@inco/js",
3
- "version": "0.8.0-devnet-1",
3
+ "version": "0.8.0-devnet-3",
4
4
  "repository": "https://github.com/Inco-fhevm/inco-monorepo",
5
5
  "license": "Apache-2.0",
6
6
  "sideEffects": false,