@inco/js 0.8.0-devnet-8 → 0.8.0-devnet-10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (83) hide show
  1. package/dist/cjs/advancedacl/session-key.js +15 -6
  2. package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +2 -6
  3. package/dist/cjs/attesteddecrypt/attested-decrypt.js +15 -22
  4. package/dist/cjs/generated/abis/lightning.d.ts +990 -95
  5. package/dist/cjs/generated/abis/lightning.js +645 -6
  6. package/dist/cjs/generated/abis/test-elist.d.ts +1 -1
  7. package/dist/cjs/generated/abis/test-elist.js +2 -2
  8. package/dist/cjs/generated/abis/verifier.d.ts +43 -0
  9. package/dist/cjs/generated/abis/verifier.js +23 -1
  10. package/dist/cjs/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +7 -0
  11. package/dist/cjs/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.js +2 -2
  12. package/dist/cjs/generated/lightning.d.ts +40 -0
  13. package/dist/cjs/generated/lightning.js +43 -1
  14. package/dist/cjs/generated/local-node.d.ts +4 -4
  15. package/dist/cjs/generated/local-node.js +22 -5
  16. package/dist/cjs/handle.d.ts +12 -0
  17. package/dist/cjs/handle.js +29 -2
  18. package/dist/cjs/kms/client.d.ts +1 -1
  19. package/dist/cjs/kms/client.js +4 -3
  20. package/dist/cjs/kms/quorumClient.d.ts +1 -0
  21. package/dist/cjs/kms/quorumClient.js +21 -4
  22. package/dist/cjs/lite/index.d.ts +1 -1
  23. package/dist/cjs/lite/index.js +2 -3
  24. package/dist/cjs/lite/lightning.d.ts +2 -3
  25. package/dist/cjs/lite/lightning.js +4 -14
  26. package/dist/cjs/lite/xwing.d.ts +25 -0
  27. package/dist/cjs/lite/xwing.js +49 -5
  28. package/dist/cjs/retry.d.ts +14 -0
  29. package/dist/cjs/retry.js +58 -2
  30. package/dist/cjs/test/mocks.d.ts +1 -0
  31. package/dist/cjs/test/mocks.js +3 -2
  32. package/dist/esm/advancedacl/session-key.js +13 -4
  33. package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +2 -6
  34. package/dist/esm/attesteddecrypt/attested-decrypt.js +14 -20
  35. package/dist/esm/generated/abis/lightning.d.ts +990 -95
  36. package/dist/esm/generated/abis/lightning.js +643 -4
  37. package/dist/esm/generated/abis/test-elist.d.ts +1 -1
  38. package/dist/esm/generated/abis/test-elist.js +2 -2
  39. package/dist/esm/generated/abis/verifier.d.ts +43 -0
  40. package/dist/esm/generated/abis/verifier.js +23 -1
  41. package/dist/esm/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +7 -0
  42. package/dist/esm/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.js +2 -2
  43. package/dist/esm/generated/lightning.d.ts +40 -0
  44. package/dist/esm/generated/lightning.js +43 -1
  45. package/dist/esm/generated/local-node.d.ts +4 -4
  46. package/dist/esm/generated/local-node.js +22 -5
  47. package/dist/esm/handle.d.ts +12 -0
  48. package/dist/esm/handle.js +27 -1
  49. package/dist/esm/kms/client.d.ts +1 -1
  50. package/dist/esm/kms/client.js +3 -2
  51. package/dist/esm/kms/quorumClient.d.ts +1 -0
  52. package/dist/esm/kms/quorumClient.js +21 -4
  53. package/dist/esm/lite/index.d.ts +1 -1
  54. package/dist/esm/lite/index.js +2 -2
  55. package/dist/esm/lite/lightning.d.ts +2 -3
  56. package/dist/esm/lite/lightning.js +6 -16
  57. package/dist/esm/lite/xwing.d.ts +25 -0
  58. package/dist/esm/lite/xwing.js +47 -5
  59. package/dist/esm/retry.d.ts +14 -0
  60. package/dist/esm/retry.js +56 -2
  61. package/dist/esm/test/mocks.d.ts +1 -0
  62. package/dist/esm/test/mocks.js +4 -3
  63. package/dist/types/attesteddecrypt/attested-decrypt.d.ts +2 -6
  64. package/dist/types/generated/abis/lightning.d.ts +990 -95
  65. package/dist/types/generated/abis/test-elist.d.ts +1 -1
  66. package/dist/types/generated/abis/verifier.d.ts +43 -0
  67. package/dist/types/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +7 -0
  68. package/dist/types/generated/lightning.d.ts +40 -0
  69. package/dist/types/generated/local-node.d.ts +4 -4
  70. package/dist/types/handle.d.ts +12 -0
  71. package/dist/types/kms/client.d.ts +1 -1
  72. package/dist/types/kms/quorumClient.d.ts +1 -0
  73. package/dist/types/lite/index.d.ts +1 -1
  74. package/dist/types/lite/lightning.d.ts +2 -3
  75. package/dist/types/lite/xwing.d.ts +25 -0
  76. package/dist/types/retry.d.ts +14 -0
  77. package/dist/types/test/mocks.d.ts +1 -0
  78. package/package.json +1 -1
  79. package/dist/cjs/generated/abis/lightning-preview.d.ts +0 -1441
  80. package/dist/cjs/generated/abis/lightning-preview.js +0 -907
  81. package/dist/esm/generated/abis/lightning-preview.d.ts +0 -1441
  82. package/dist/esm/generated/abis/lightning-preview.js +0 -904
  83. package/dist/types/generated/abis/lightning-preview.d.ts +0 -1441
@@ -13,12 +13,49 @@ const xwingKem = new XWing();
13
13
  * Combining ML-KEM-768 (1184 bytes) and X25519 (32 bytes).
14
14
  */
15
15
  export const XWING_PUBLIC_KEY_SIZE = xwingKem.publicKeySize;
16
- // Test network private key for testing
16
+ /**
17
+ * WARNING: TEST KEY - DO NOT USE IN PRODUCTION
18
+ * This is a well-known test seed (all zeros) that provides NO security.
19
+ * Anyone can derive the private key from this seed and decrypt all data.
20
+ * Only use for local development and testing.
21
+ */
17
22
  export const TEST_NETWORK_SEED_KEY = '0x0000000000000000000000000000000000000000000000000000000000000000';
18
- // Test network X-Wing public key (1216 bytes)
19
- // Generated from Go with seed of all zeros using HPKE layer: hpke.KEM_XWING.Scheme().DeriveKeyPair(seed)
20
- // This matches the key used in covalidator's GetXwingPrivateKeyForTesting() via DeriveXwingPrivateKey
23
+ const TEST_NETWORK_SEED_BYTES = bytesFromHexString(TEST_NETWORK_SEED_KEY);
24
+ /**
25
+ * WARNING: TEST KEY - DO NOT USE IN PRODUCTION
26
+ * This is the public key derived from TEST_NETWORK_SEED_KEY (all zeros).
27
+ * Data encrypted with this key can be decrypted by anyone who knows the seed.
28
+ * Only use for local development and testing.
29
+ *
30
+ * Generated from Go with seed of all zeros using HPKE layer: hpke.KEM_XWING.Scheme().DeriveKeyPair(seed)
31
+ * This matches the key used in covalidator's GetXwingPrivateKeyForTesting() via DeriveXwingPrivateKey
32
+ */
21
33
  export const TEST_NETWORK_XWING_PUBKEY = '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';
34
+ const TEST_NETWORK_PUBKEY_BYTES = bytesFromHexString(TEST_NETWORK_XWING_PUBKEY);
35
+ /**
36
+ * Check if a byte array matches the test seed key.
37
+ * Logs a warning if it does.
38
+ */
39
+ export function warnIfTestSeed(seed) {
40
+ const isTestSeed = seed.every((byte, i) => byte === TEST_NETWORK_SEED_BYTES[i]);
41
+ if (isTestSeed) {
42
+ console.warn('WARNING: Using TEST_NETWORK_SEED_KEY. This key provides no security ' +
43
+ 'and should only be used for local development and testing.');
44
+ }
45
+ return isTestSeed;
46
+ }
47
+ /**
48
+ * Check if a byte array matches the test public key.
49
+ * Logs a warning if it does.
50
+ */
51
+ export function warnIfTestPubKey(pubKeyBytes) {
52
+ const isTestPubKey = pubKeyBytes.every((byte, i) => byte === TEST_NETWORK_PUBKEY_BYTES[i]);
53
+ if (isTestPubKey) {
54
+ console.warn('WARNING: Using TEST_NETWORK_XWING_PUBKEY. Data encrypted with this key ' +
55
+ 'can be decrypted by anyone. Only use for local development and testing.');
56
+ }
57
+ return isTestPubKey;
58
+ }
22
59
  /**
23
60
  * Create HPKE cipher suite with X-Wing KEM, HKDF-SHA256, and ChaCha20-Poly1305 AEAD.
24
61
  * This configuration provides post-quantum security with hybrid classical/PQ encryption.
@@ -47,6 +84,7 @@ export async function deriveXwingKeypairFromSeed(seed) {
47
84
  if (seed.length !== 32) {
48
85
  throw new Error(`Invalid X-Wing seed length: expected 32 bytes, got ${seed.length}`);
49
86
  }
87
+ warnIfTestSeed(seed);
50
88
  const suite = await createXwingSuite();
51
89
  // Create a fresh ArrayBuffer copy to avoid SharedArrayBuffer issues
52
90
  const seedCopy = new Uint8Array(seed);
@@ -90,6 +128,7 @@ export async function decodeXwingPublicKey(pubKeyBytes) {
90
128
  if (pubKeyBytes.length !== suite.kem.publicKeySize) {
91
129
  throw new Error(`Invalid X-Wing public key length: expected ${XWING_PUBLIC_KEY_SIZE} bytes, got ${pubKeyBytes.length}`);
92
130
  }
131
+ warnIfTestPubKey(pubKeyBytes);
93
132
  // Create a fresh ArrayBuffer copy to avoid SharedArrayBuffer issues
94
133
  const pubKeyCopy = new Uint8Array(pubKeyBytes);
95
134
  return await suite.kem.deserializePublicKey(pubKeyCopy.buffer);
@@ -127,6 +166,9 @@ export async function encodeXwingPublicKey(publicKey) {
127
166
  */
128
167
  export async function encrypt(pubKeyA, msg, aad = new Uint8Array(0), info = new Uint8Array(0)) {
129
168
  const suite = await createXwingSuite();
169
+ // Warn if using the insecure test public key
170
+ const pubKeyBytes = new Uint8Array(await suite.kem.serializePublicKey(pubKeyA));
171
+ warnIfTestPubKey(pubKeyBytes);
130
172
  // Create fresh ArrayBuffer copies to avoid SharedArrayBuffer issues
131
173
  const infoCopy = new Uint8Array(info);
132
174
  const sender = await suite.createSenderContext({
@@ -260,4 +302,4 @@ export function getXwingDecryptor({ privKeyA, }) {
260
302
  return bytesToPlaintext(computable.value.value, encryptionSchemes.xwing, typ);
261
303
  };
262
304
  }
263
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"xwing.js","sourceRoot":"","sources":["../../../src/lite/xwing.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,gBAAgB,EAAE,MAAM,wBAAwB,CAAC;AAC1D,OAAO,EAAE,WAAW,EAAE,UAAU,EAAE,MAAM,YAAY,CAAC;AACrD,OAAO,EAAE,KAAK,EAAE,MAAM,wBAAwB,CAAC;AAC/C,OAAO,EAAE,SAAS,EAAE,kBAAkB,EAAE,UAAU,EAAE,MAAM,cAAc,CAAC;AACzE,OAAO,EACL,gBAAgB,EAEhB,qBAAqB,EAErB,qBAAqB,EACrB,iBAAiB,EAGjB,uBAAuB,EAGvB,gBAAgB,GAEjB,MAAM,6BAA6B,CAAC;AACrC,OAAO,EAAE,aAAa,EAAE,gBAAgB,EAAE,MAAM,cAAc,CAAC;AAE/D,OAAO,EAAE,KAAK,EAAE,MAAM,cAAc,CAAC;AACrC,OAAO,EAAE,WAAW,EAAE,WAAW,EAAE,MAAM,WAAW,CAAC;AAErD,wCAAwC;AACxC,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;AAE7B;;;GAGG;AACH,MAAM,CAAC,MAAM,qBAAqB,GAAG,QAAQ,CAAC,aAAa,CAAC;AAE5D,uCAAuC;AACvC,MAAM,CAAC,MAAM,qBAAqB,GAChC,oEAAoE,CAAC;AAEvE,8CAA8C;AAC9C,yGAAyG;AACzG,sGAAsG;AACtG,MAAM,CAAC,MAAM,yBAAyB,GACpC,o4EAAo4E,CAAC;AAev4E;;;;;GAKG;AACH,KAAK,UAAU,gBAAgB;IAC7B,MAAM,GAAG,GAAG,IAAI,KAAK,EAAE,CAAC;IACxB,qEAAqE;IACrE,iFAAiF;IACjF,MAAM,GAAG,CAAC,MAAM,EAAE,CAAC;IACnB,OAAO,IAAI,WAAW,CAAC;QACrB,GAAG;QACH,GAAG,EAAE,IAAI,UAAU,EAAE;QACrB,IAAI,EAAE,IAAI,gBAAgB,EAAE;KAC7B,CAAC,CAAC;AACL,CAAC;AAED;;;;;;GAMG;AACH,MAAM,CAAC,KAAK,UAAU,0BAA0B,CAC9C,IAAgB;IAEhB,IAAI,IAAI,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;QACvB,MAAM,IAAI,KAAK,CACb,sDAAsD,IAAI,CAAC,MAAM,EAAE,CACpE,CAAC;IACJ,CAAC;IAED,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,oEAAoE;IACpE,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;IAEtC,MAAM,OAAO,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/D,MAAM,cAAc,GAAG,IAAI,UAAU,CACnC,MAAM,KAAK,CAAC,GAAG,CAAC,kBAAkB,CAAC,OAAO,CAAC,SAAS,CAAC,CACtD,CAAC;IAEF,OAAO;QACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;QAC/B,SAAS,EAAE,OAAO,CAAC,SAAS;QAC5B,UAAU,EAAE,OAAO,CAAC,UAAU;QAC9B,eAAe;YACb,OAAO,cAAc,CAAC;QACxB,CAAC;KACF,CAAC;AACJ,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,oBAAoB;IACxC,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,MAAM,OAAO,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,eAAe,EAAE,CAAC;IAClD,MAAM,cAAc,GAAG,IAAI,UAAU,CACnC,MAAM,KAAK,CAAC,GAAG,CAAC,kBAAkB,CAAC,OAAO,CAAC,SAAS,CAAC,CACtD,CAAC;IAEF,OAAO;QACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;QAC/B,SAAS,EAAE,OAAO,CAAC,SAAS;QAC5B,UAAU,EAAE,OAAO,CAAC,UAAU;QAC9B,eAAe;YACb,OAAO,cAAc,CAAC;QACxB,CAAC;KACF,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,oBAAoB,CACxC,WAAuB;IAEvB,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,IAAI,WAAW,CAAC,MAAM,KAAK,KAAK,CAAC,GAAG,CAAC,aAAa,EAAE,CAAC;QACnD,MAAM,IAAI,KAAK,CACb,8CAA8C,qBAAqB,eAAe,WAAW,CAAC,MAAM,EAAE,CACvG,CAAC;IACJ,CAAC;IACD,oEAAoE;IACpE,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,WAAW,CAAC,CAAC;IAE/C,OAAO,MAAM,KAAK,CAAC,GAAG,CAAC,oBAAoB,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;AACjE,CAAC;AAED;;;;;;GAMG;AACH,MAAM,CAAC,KAAK,UAAU,qBAAqB,CACzC,IAAgB;IAEhB,OAAO,MAAM,0BAA0B,CAAC,IAAI,CAAC,CAAC;AAChD,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,oBAAoB,CACxC,SAAoB;IAEpB,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,OAAO,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,GAAG,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC,CAAC;AACvE,CAAC;AAkBD;;;;;;;;;;GAUG;AACH,MAAM,CAAC,KAAK,UAAU,OAAO,CAC3B,OAAkB,EAClB,GAAe,EACf,MAAkB,IAAI,UAAU,CAAC,CAAC,CAAC,EACnC,OAAmB,IAAI,UAAU,CAAC,CAAC,CAAC;IAEpC,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IAEvC,oEAAoE;IACpE,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;IAEtC,MAAM,MAAM,GAAG,MAAM,KAAK,CAAC,mBAAmB,CAAC;QAC7C,kBAAkB,EAAE,OAAO;QAC3B,IAAI,EAAE,QAAQ,CAAC,MAAM;KACtB,CAAC,CAAC;IAEH,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,GAAG,CAAC,CAAC;IACpC,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,GAAG,CAAC,CAAC;IAEpC,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,CAAC;IACrE,MAAM,WAAW,GAAG,MAAM,CAAC,GAAG,CAAC;IAE/B,yCAAyC;IACzC,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,WAAW,CAAC,UAAU,GAAG,UAAU,CAAC,UAAU,CAAC,CAAC;IAC9E,MAAM,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,CAAC;IAC3C,MAAM,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,UAAU,CAAC,EAAE,WAAW,CAAC,UAAU,CAAC,CAAC;IAE/D,OAAO,MAAM,CAAC;AAChB,CAAC;AAED;;;;;;;;;;GAUG;AACH,MAAM,CAAC,KAAK,UAAU,OAAO,CAC3B,QAAsB,EACtB,aAAyB,EACzB,MAAkB,IAAI,UAAU,CAAC,CAAC,CAAC,EACnC,OAAmB,IAAI,UAAU,CAAC,CAAC,CAAC;IAEpC,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IAEvC,4CAA4C;IAC5C,MAAM,eAAe,GAAG,KAAK,CAAC,GAAG,CAAC,OAAO,CAAC;IAC1C,IAAI,aAAa,CAAC,MAAM,GAAG,eAAe,EAAE,CAAC;QAC3C,MAAM,IAAI,KAAK,CACb,2DAA2D,eAAe,eAAe,aAAa,CAAC,MAAM,EAAE,CAChH,CAAC;IACJ,CAAC;IAED,mCAAmC;IACnC,MAAM,WAAW,GAAG,aAAa,CAAC,KAAK,CAAC,CAAC,EAAE,eAAe,CAAC,CAAC;IAC5D,MAAM,UAAU,GAAG,aAAa,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;IAExD,oEAAoE;IACpE,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;IACtC,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,WAAW,CAAC,CAAC;IAE5C,MAAM,SAAS,GAAG,MAAM,KAAK,CAAC,sBAAsB,CAAC;QACnD,YAAY,EAAE,QAAQ,CAAC,UAAU;QACjC,GAAG,EAAE,OAAO,CAAC,MAAM;QACnB,IAAI,EAAE,QAAQ,CAAC,MAAM;KACtB,CAAC,CAAC;IAEH,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,UAAU,CAAC,CAAC;IAC1C,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,GAAG,CAAC,CAAC;IAEpC,MAAM,SAAS,GAAG,MAAM,SAAS,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,CAAC;IAEtE,OAAO,IAAI,UAAU,CAAC,SAAS,CAAC,CAAC;AACnC,CAAC;AAED;;;;;;;;;;;;GAYG;AACH,MAAM,UAAU,iBAAiB,CAAC,EAChC,OAAO,GACY;IACnB,OAAO,KAAK,EAA8B,EACxC,SAAS,EACT,OAAO,GACgC,EAEvC,EAAE;QACF,IAAI,SAAS,CAAC,MAAM,KAAK,iBAAiB,CAAC,KAAK,EAAE,CAAC;YACjD,MAAM,IAAI,KAAK,CACb,yBAAyB,uBAAuB,CAAC,SAAS,CAAC,MAAM,CAAC,kCAAkC,CACrG,CAAC;QACJ,CAAC;QAED,gDAAgD;QAChD,MAAM,2BAA2B,GAAG,MAAM,CAAC,IAAI,CAC7C,WAAW,CAAC,EAAE,SAAS,EAAE,OAAO,EAAE,CAAC,CACpC,CAAC;QAEF,gDAAgD;QAChD,MAAM,GAAG,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC9B,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC/B,MAAM,EAAE,GAAG,MAAM,OAAO,CAAC,OAAO,EAAE,2BAA2B,EAAE,GAAG,EAAE,IAAI,CAAC,CAAC;QAE1E,uDAAuD;QACvD,MAAM,SAAS,GAAG,gBAAgB,CAAC;YACjC,UAAU,EAAE,EAAE;YACd,UAAU,EAAE,SAAS,CAAC,IAAI;YAC1B,WAAW,EAAE,CAAC;YACd,aAAa,EAAE,CAAC;SACjB,CAAC,CAAC;QAEH,MAAM,MAAM,GAAG,aAAa,CAAC;YAC3B,SAAS;YACT,OAAO,EAAE,OAAO;SACjB,CAAC,CAAC;QAEH,OAAO;YACL,SAAS,EAAE,SAAS,CAAC,SAAS,CAAC;YAC/B,MAAM,EAAE,SAAS,CAAC,MAAM,CAAC;YACzB,OAAO;YACP,UAAU,EAAE;gBACV,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,SAAS,CAAC,IAAI;gBACpB,0DAA0D;gBAC1D,KAAK,EAAE,qBAAqB,CAC1B,OAAO,CAAC,OAAO,EACf,UAAU,CAAC,MAAM,CAAC,EAClB,UAAU,CAAC,EAAE,CAAC,CACf;aACF;SACF,CAAC;IACJ,CAAC,CAAC;AACJ,CAAC;AAED;;;;;;;;;;;;GAYG;AACH,MAAM,UAAU,iBAAiB,CAAC,EAChC,QAAQ,GACW;IACnB,OAAO,KAAK,EAA8B,EACxC,MAAM,EACN,KAAK,GACwB,EAAwC,EAAE;QACvE,IAAI,MAAM,KAAK,iBAAiB,CAAC,KAAK,EAAE,CAAC;YACvC,MAAM,IAAI,KAAK,CACb,0BAA0B,uBAAuB,CAAC,MAAM,CAAC,kCAAkC,CAC5F,CAAC;QACJ,CAAC;QAED,8BAA8B;QAC9B,MAAM,EAAE,UAAU,EAAE,GAAG,qBAAqB,CAAC,KAAK,CAAC,CAAC;QAEpD,gDAAgD;QAChD,MAAM,GAAG,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC9B,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC/B,MAAM,KAAK,GAAG,MAAM,OAAO,CACzB,QAAQ,EACR,kBAAkB,CAAC,UAAU,CAAC,EAC9B,GAAG,EACH,IAAI,CACL,CAAC;QAEF,8BAA8B;QAC9B,MAAM,OAAO,GAAG,WAAW,CAAC,KAAK,CAAC,CAAC;QACnC,MAAM,UAAU,GAAG,OAAO,CAAC,KAAK,CAAC;QAEjC,IAAI,UAAU,CAAC,IAAI,KAAK,QAAQ,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CACb,iHAAiH,CAClH,CAAC;QACJ,CAAC;QAED,+BAA+B;QAC/B,MAAM,GAAG,GAAG,KAAK,CAAC,gBAAgB,EAAE,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAC3D,OAAO,gBAAgB,CACrB,UAAU,CAAC,KAAK,CAAC,KAAK,EACtB,iBAAiB,CAAC,KAAK,EACvB,GAAG,CAC2B,CAAC;IACnC,CAAC,CAAC;AACJ,CAAC"}
305
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"xwing.js","sourceRoot":"","sources":["../../../src/lite/xwing.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,gBAAgB,EAAE,MAAM,wBAAwB,CAAC;AAC1D,OAAO,EAAE,WAAW,EAAE,UAAU,EAAE,MAAM,YAAY,CAAC;AACrD,OAAO,EAAE,KAAK,EAAE,MAAM,wBAAwB,CAAC;AAC/C,OAAO,EAAE,SAAS,EAAE,kBAAkB,EAAE,UAAU,EAAE,MAAM,cAAc,CAAC;AACzE,OAAO,EACL,gBAAgB,EAEhB,qBAAqB,EAErB,qBAAqB,EACrB,iBAAiB,EAGjB,uBAAuB,EAGvB,gBAAgB,GAEjB,MAAM,6BAA6B,CAAC;AACrC,OAAO,EAAE,aAAa,EAAE,gBAAgB,EAAE,MAAM,cAAc,CAAC;AAE/D,OAAO,EAAE,KAAK,EAAE,MAAM,cAAc,CAAC;AACrC,OAAO,EAAE,WAAW,EAAE,WAAW,EAAE,MAAM,WAAW,CAAC;AAErD,wCAAwC;AACxC,MAAM,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;AAE7B;;;GAGG;AACH,MAAM,CAAC,MAAM,qBAAqB,GAAG,QAAQ,CAAC,aAAa,CAAC;AAE5D;;;;;GAKG;AACH,MAAM,CAAC,MAAM,qBAAqB,GAChC,oEAAoE,CAAC;AAEvE,MAAM,uBAAuB,GAAG,kBAAkB,CAAC,qBAAqB,CAAC,CAAC;AAE1E;;;;;;;;GAQG;AACH,MAAM,CAAC,MAAM,yBAAyB,GACpC,o4EAAo4E,CAAC;AAEv4E,MAAM,yBAAyB,GAAG,kBAAkB,CAAC,yBAAyB,CAAC,CAAC;AAEhF;;;GAGG;AACH,MAAM,UAAU,cAAc,CAAC,IAAgB;IAC7C,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAC3B,CAAC,IAAI,EAAE,CAAC,EAAE,EAAE,CAAC,IAAI,KAAK,uBAAuB,CAAC,CAAC,CAAC,CACjD,CAAC;IACF,IAAI,UAAU,EAAE,CAAC;QACf,OAAO,CAAC,IAAI,CACV,sEAAsE;YACpE,4DAA4D,CAC/D,CAAC;IACJ,CAAC;IACD,OAAO,UAAU,CAAC;AACpB,CAAC;AAED;;;GAGG;AACH,MAAM,UAAU,gBAAgB,CAAC,WAAuB;IACtD,MAAM,YAAY,GAAG,WAAW,CAAC,KAAK,CACpC,CAAC,IAAI,EAAE,CAAC,EAAE,EAAE,CAAC,IAAI,KAAK,yBAAyB,CAAC,CAAC,CAAC,CACnD,CAAC;IACF,IAAI,YAAY,EAAE,CAAC;QACjB,OAAO,CAAC,IAAI,CACV,yEAAyE;YACvE,yEAAyE,CAC5E,CAAC;IACJ,CAAC;IACD,OAAO,YAAY,CAAC;AACtB,CAAC;AAeD;;;;;GAKG;AACH,KAAK,UAAU,gBAAgB;IAC7B,MAAM,GAAG,GAAG,IAAI,KAAK,EAAE,CAAC;IACxB,qEAAqE;IACrE,iFAAiF;IACjF,MAAM,GAAG,CAAC,MAAM,EAAE,CAAC;IACnB,OAAO,IAAI,WAAW,CAAC;QACrB,GAAG;QACH,GAAG,EAAE,IAAI,UAAU,EAAE;QACrB,IAAI,EAAE,IAAI,gBAAgB,EAAE;KAC7B,CAAC,CAAC;AACL,CAAC;AAED;;;;;;GAMG;AACH,MAAM,CAAC,KAAK,UAAU,0BAA0B,CAC9C,IAAgB;IAEhB,IAAI,IAAI,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;QACvB,MAAM,IAAI,KAAK,CACb,sDAAsD,IAAI,CAAC,MAAM,EAAE,CACpE,CAAC;IACJ,CAAC;IAED,cAAc,CAAC,IAAI,CAAC,CAAC;IAErB,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,oEAAoE;IACpE,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;IAEtC,MAAM,OAAO,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/D,MAAM,cAAc,GAAG,IAAI,UAAU,CACnC,MAAM,KAAK,CAAC,GAAG,CAAC,kBAAkB,CAAC,OAAO,CAAC,SAAS,CAAC,CACtD,CAAC;IAEF,OAAO;QACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;QAC/B,SAAS,EAAE,OAAO,CAAC,SAAS;QAC5B,UAAU,EAAE,OAAO,CAAC,UAAU;QAC9B,eAAe;YACb,OAAO,cAAc,CAAC;QACxB,CAAC;KACF,CAAC;AACJ,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,oBAAoB;IACxC,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,MAAM,OAAO,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,eAAe,EAAE,CAAC;IAClD,MAAM,cAAc,GAAG,IAAI,UAAU,CACnC,MAAM,KAAK,CAAC,GAAG,CAAC,kBAAkB,CAAC,OAAO,CAAC,SAAS,CAAC,CACtD,CAAC;IAEF,OAAO;QACL,MAAM,EAAE,iBAAiB,CAAC,KAAK;QAC/B,SAAS,EAAE,OAAO,CAAC,SAAS;QAC5B,UAAU,EAAE,OAAO,CAAC,UAAU;QAC9B,eAAe;YACb,OAAO,cAAc,CAAC;QACxB,CAAC;KACF,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,oBAAoB,CACxC,WAAuB;IAEvB,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,IAAI,WAAW,CAAC,MAAM,KAAK,KAAK,CAAC,GAAG,CAAC,aAAa,EAAE,CAAC;QACnD,MAAM,IAAI,KAAK,CACb,8CAA8C,qBAAqB,eAAe,WAAW,CAAC,MAAM,EAAE,CACvG,CAAC;IACJ,CAAC;IAED,gBAAgB,CAAC,WAAW,CAAC,CAAC;IAE9B,oEAAoE;IACpE,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,WAAW,CAAC,CAAC;IAE/C,OAAO,MAAM,KAAK,CAAC,GAAG,CAAC,oBAAoB,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;AACjE,CAAC;AAED;;;;;;GAMG;AACH,MAAM,CAAC,KAAK,UAAU,qBAAqB,CACzC,IAAgB;IAEhB,OAAO,MAAM,0BAA0B,CAAC,IAAI,CAAC,CAAC;AAChD,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,oBAAoB,CACxC,SAAoB;IAEpB,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,OAAO,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,GAAG,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC,CAAC;AACvE,CAAC;AAkBD;;;;;;;;;;GAUG;AACH,MAAM,CAAC,KAAK,UAAU,OAAO,CAC3B,OAAkB,EAClB,GAAe,EACf,MAAkB,IAAI,UAAU,CAAC,CAAC,CAAC,EACnC,OAAmB,IAAI,UAAU,CAAC,CAAC,CAAC;IAEpC,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IAEvC,6CAA6C;IAC7C,MAAM,WAAW,GAAG,IAAI,UAAU,CAChC,MAAM,KAAK,CAAC,GAAG,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAC5C,CAAC;IACF,gBAAgB,CAAC,WAAW,CAAC,CAAC;IAE9B,oEAAoE;IACpE,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;IAEtC,MAAM,MAAM,GAAG,MAAM,KAAK,CAAC,mBAAmB,CAAC;QAC7C,kBAAkB,EAAE,OAAO;QAC3B,IAAI,EAAE,QAAQ,CAAC,MAAM;KACtB,CAAC,CAAC;IAEH,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,GAAG,CAAC,CAAC;IACpC,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,GAAG,CAAC,CAAC;IAEpC,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,CAAC;IACrE,MAAM,WAAW,GAAG,MAAM,CAAC,GAAG,CAAC;IAE/B,yCAAyC;IACzC,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,WAAW,CAAC,UAAU,GAAG,UAAU,CAAC,UAAU,CAAC,CAAC;IAC9E,MAAM,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,CAAC;IAC3C,MAAM,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,UAAU,CAAC,EAAE,WAAW,CAAC,UAAU,CAAC,CAAC;IAE/D,OAAO,MAAM,CAAC;AAChB,CAAC;AAED;;;;;;;;;;GAUG;AACH,MAAM,CAAC,KAAK,UAAU,OAAO,CAC3B,QAAsB,EACtB,aAAyB,EACzB,MAAkB,IAAI,UAAU,CAAC,CAAC,CAAC,EACnC,OAAmB,IAAI,UAAU,CAAC,CAAC,CAAC;IAEpC,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IAEvC,4CAA4C;IAC5C,MAAM,eAAe,GAAG,KAAK,CAAC,GAAG,CAAC,OAAO,CAAC;IAC1C,IAAI,aAAa,CAAC,MAAM,GAAG,eAAe,EAAE,CAAC;QAC3C,MAAM,IAAI,KAAK,CACb,2DAA2D,eAAe,eAAe,aAAa,CAAC,MAAM,EAAE,CAChH,CAAC;IACJ,CAAC;IAED,mCAAmC;IACnC,MAAM,WAAW,GAAG,aAAa,CAAC,KAAK,CAAC,CAAC,EAAE,eAAe,CAAC,CAAC;IAC5D,MAAM,UAAU,GAAG,aAAa,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;IAExD,oEAAoE;IACpE,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;IACtC,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,WAAW,CAAC,CAAC;IAE5C,MAAM,SAAS,GAAG,MAAM,KAAK,CAAC,sBAAsB,CAAC;QACnD,YAAY,EAAE,QAAQ,CAAC,UAAU;QACjC,GAAG,EAAE,OAAO,CAAC,MAAM;QACnB,IAAI,EAAE,QAAQ,CAAC,MAAM;KACtB,CAAC,CAAC;IAEH,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,UAAU,CAAC,CAAC;IAC1C,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,GAAG,CAAC,CAAC;IAEpC,MAAM,SAAS,GAAG,MAAM,SAAS,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,CAAC;IAEtE,OAAO,IAAI,UAAU,CAAC,SAAS,CAAC,CAAC;AACnC,CAAC;AAED;;;;;;;;;;;;GAYG;AACH,MAAM,UAAU,iBAAiB,CAAC,EAChC,OAAO,GACY;IACnB,OAAO,KAAK,EAA8B,EACxC,SAAS,EACT,OAAO,GACgC,EAEvC,EAAE;QACF,IAAI,SAAS,CAAC,MAAM,KAAK,iBAAiB,CAAC,KAAK,EAAE,CAAC;YACjD,MAAM,IAAI,KAAK,CACb,yBAAyB,uBAAuB,CAAC,SAAS,CAAC,MAAM,CAAC,kCAAkC,CACrG,CAAC;QACJ,CAAC;QAED,gDAAgD;QAChD,MAAM,2BAA2B,GAAG,MAAM,CAAC,IAAI,CAC7C,WAAW,CAAC,EAAE,SAAS,EAAE,OAAO,EAAE,CAAC,CACpC,CAAC;QAEF,gDAAgD;QAChD,MAAM,GAAG,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC9B,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC/B,MAAM,EAAE,GAAG,MAAM,OAAO,CAAC,OAAO,EAAE,2BAA2B,EAAE,GAAG,EAAE,IAAI,CAAC,CAAC;QAE1E,uDAAuD;QACvD,MAAM,SAAS,GAAG,gBAAgB,CAAC;YACjC,UAAU,EAAE,EAAE;YACd,UAAU,EAAE,SAAS,CAAC,IAAI;YAC1B,WAAW,EAAE,CAAC;YACd,aAAa,EAAE,CAAC;SACjB,CAAC,CAAC;QAEH,MAAM,MAAM,GAAG,aAAa,CAAC;YAC3B,SAAS;YACT,OAAO,EAAE,OAAO;SACjB,CAAC,CAAC;QAEH,OAAO;YACL,SAAS,EAAE,SAAS,CAAC,SAAS,CAAC;YAC/B,MAAM,EAAE,SAAS,CAAC,MAAM,CAAC;YACzB,OAAO;YACP,UAAU,EAAE;gBACV,MAAM,EAAE,iBAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,SAAS,CAAC,IAAI;gBACpB,0DAA0D;gBAC1D,KAAK,EAAE,qBAAqB,CAC1B,OAAO,CAAC,OAAO,EACf,UAAU,CAAC,MAAM,CAAC,EAClB,UAAU,CAAC,EAAE,CAAC,CACf;aACF;SACF,CAAC;IACJ,CAAC,CAAC;AACJ,CAAC;AAED;;;;;;;;;;;;GAYG;AACH,MAAM,UAAU,iBAAiB,CAAC,EAChC,QAAQ,GACW;IACnB,OAAO,KAAK,EAA8B,EACxC,MAAM,EACN,KAAK,GACwB,EAAwC,EAAE;QACvE,IAAI,MAAM,KAAK,iBAAiB,CAAC,KAAK,EAAE,CAAC;YACvC,MAAM,IAAI,KAAK,CACb,0BAA0B,uBAAuB,CAAC,MAAM,CAAC,kCAAkC,CAC5F,CAAC;QACJ,CAAC;QAED,8BAA8B;QAC9B,MAAM,EAAE,UAAU,EAAE,GAAG,qBAAqB,CAAC,KAAK,CAAC,CAAC;QAEpD,gDAAgD;QAChD,MAAM,GAAG,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC9B,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC/B,MAAM,KAAK,GAAG,MAAM,OAAO,CACzB,QAAQ,EACR,kBAAkB,CAAC,UAAU,CAAC,EAC9B,GAAG,EACH,IAAI,CACL,CAAC;QAEF,8BAA8B;QAC9B,MAAM,OAAO,GAAG,WAAW,CAAC,KAAK,CAAC,CAAC;QACnC,MAAM,UAAU,GAAG,OAAO,CAAC,KAAK,CAAC;QAEjC,IAAI,UAAU,CAAC,IAAI,KAAK,QAAQ,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CACb,iHAAiH,CAClH,CAAC;QACJ,CAAC;QAED,+BAA+B;QAC/B,MAAM,GAAG,GAAG,KAAK,CAAC,gBAAgB,EAAE,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAC3D,OAAO,gBAAgB,CACrB,UAAU,CAAC,KAAK,CAAC,KAAK,EACtB,iBAAiB,CAAC,KAAK,EACvB,GAAG,CAC2B,CAAC;IACnC,CAAC,CAAC;AACJ,CAAC"}
@@ -7,6 +7,20 @@ export type BackoffConfig = {
7
7
  backoffFactor: number;
8
8
  errHandler?: (error: Error, attempt: number) => 'stop' | 'continue';
9
9
  };
10
+ /**
11
+ * Checks if an error is safe to retry.
12
+ * Only transient errors matching the allowlist should return true.
13
+ * All other errors fail fast to avoid masking security-critical failures.
14
+ *
15
+ * @param error - The error to check
16
+ * @returns true if the error is transient and safe to retry, false otherwise
17
+ */
18
+ export declare function isRetryableError(error: Error): boolean;
19
+ /**
20
+ * Default error handler that only retries known transient errors.
21
+ * Security-critical errors will fail fast.
22
+ */
23
+ export declare function defaultRetryErrorHandler(error: Error): 'stop' | 'continue';
10
24
  /**
11
25
  * Helper function to implement exponential backoff retry logic.
12
26
  * @param fn - The function to retry
package/dist/esm/retry.js CHANGED
@@ -1,3 +1,57 @@
1
+ /**
2
+ * Allowlist of transient error patterns that are safe to retry.
3
+ * Each pattern includes a substring to match (case-insensitive) and a description.
4
+ *
5
+ * SECURITY: Only add patterns here for genuinely transient errors.
6
+ * Do NOT add patterns that could mask security-critical errors like:
7
+ * - Authentication failures
8
+ * - Permission denied
9
+ * - Signature validation errors
10
+ * - Invalid input/format errors
11
+ */
12
+ const RETRYABLE_ERROR_PATTERNS = [
13
+ // Explicit retry suggestions from the server
14
+ {
15
+ pattern: 'try again later',
16
+ description: 'Server explicitly suggests retry',
17
+ },
18
+ // Network/connectivity issues
19
+ { pattern: 'timeout', description: 'Request timeout' },
20
+ { pattern: 'etimedout', description: 'Connection timeout' },
21
+ { pattern: 'econnreset', description: 'Connection reset' },
22
+ { pattern: 'econnrefused', description: 'Connection refused' },
23
+ // Service availability
24
+ { pattern: '503', description: 'Service unavailable (503)' },
25
+ { pattern: 'service unavailable', description: 'Service unavailable' },
26
+ // Data propagation delays (eventual consistency)
27
+ {
28
+ pattern: 'ciphertext too short',
29
+ description: 'Ciphertext not yet propagated to covalidator',
30
+ },
31
+ ];
32
+ /**
33
+ * Checks if an error is safe to retry.
34
+ * Only transient errors matching the allowlist should return true.
35
+ * All other errors fail fast to avoid masking security-critical failures.
36
+ *
37
+ * @param error - The error to check
38
+ * @returns true if the error is transient and safe to retry, false otherwise
39
+ */
40
+ export function isRetryableError(error) {
41
+ const message = error.message?.toLowerCase() ?? '';
42
+ return RETRYABLE_ERROR_PATTERNS.some(({ pattern }) => message.includes(pattern));
43
+ }
44
+ /**
45
+ * Default error handler that only retries known transient errors.
46
+ * Security-critical errors will fail fast.
47
+ */
48
+ export function defaultRetryErrorHandler(error) {
49
+ if (isRetryableError(error)) {
50
+ console.warn(`Retrying after transient error: ${error.message}`);
51
+ return 'continue';
52
+ }
53
+ return 'stop';
54
+ }
1
55
  /**
2
56
  * Helper function to implement exponential backoff retry logic.
3
57
  * @param fn - The function to retry
@@ -6,7 +60,7 @@
6
60
  */
7
61
  export async function retryWithBackoff(fn, {
8
62
  // These default values will make it return an error after ~10s if the fn response is fast.
9
- maxRetries = 5, baseDelayInMs = 1000, backoffFactor = 1.5, errHandler = () => 'continue', } = {}) {
63
+ maxRetries = 5, baseDelayInMs = 1000, backoffFactor = 1.5, errHandler = defaultRetryErrorHandler, } = {}) {
10
64
  let lastError;
11
65
  for (let attempt = 0; attempt < maxRetries; attempt++) {
12
66
  try {
@@ -25,4 +79,4 @@ maxRetries = 5, baseDelayInMs = 1000, backoffFactor = 1.5, errHandler = () => 'c
25
79
  }
26
80
  throw lastError;
27
81
  }
28
- //# sourceMappingURL=data:application/json;base64,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
82
+ //# sourceMappingURL=data:application/json;base64,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
@@ -5,6 +5,7 @@ import { KmsQuorumClient } from '../kms/quorumClient.js';
5
5
  interface MinimalKmsClient {
6
6
  attestedCompute: ReturnType<typeof vi.fn>;
7
7
  attestedDecrypt: ReturnType<typeof vi.fn>;
8
+ attestedReveal: ReturnType<typeof vi.fn>;
8
9
  key: ReturnType<typeof vi.fn>;
9
10
  reencrypt: ReturnType<typeof vi.fn>;
10
11
  }
@@ -3,13 +3,14 @@ import { generatePrivateKey, privateKeyToAccount } from 'viem/accounts';
3
3
  import { sepolia } from 'viem/chains';
4
4
  import { vi } from 'vitest';
5
5
  import { TEST_RPC_URL } from '../attesteddecrypt/attested-decrypt.js';
6
- import { DEFAULT_COVALIDATOR_SIGNER } from '../kms/client.js';
6
+ import { TEST_DEFAULT_COVALIDATOR_SIGNER } from '../kms/client.js';
7
7
  import { KmsQuorumClient } from '../kms/quorumClient.js';
8
8
  // Create a mock that satisfies our minimal interface
9
9
  export function createMockKmsClient() {
10
10
  return {
11
11
  attestedCompute: vi.fn(),
12
12
  attestedDecrypt: vi.fn(),
13
+ attestedReveal: vi.fn(),
13
14
  key: vi.fn(),
14
15
  reencrypt: vi.fn(),
15
16
  };
@@ -18,7 +19,7 @@ export function createMockKmsClient() {
18
19
  export function createMockQuorumClient() {
19
20
  // Use the private constructor via type casting (similar to quorumClient.test.ts)
20
21
  const AnyClass = KmsQuorumClient;
21
- return new AnyClass([{ url: 'https://mock-kms', signer: DEFAULT_COVALIDATOR_SIGNER }], 1);
22
+ return new AnyClass([{ url: 'https://mock-kms', signer: TEST_DEFAULT_COVALIDATOR_SIGNER }], 1);
22
23
  }
23
24
  // Helper to set up the mock client inside the quorum client
24
25
  export function setupMockInQuorumClient(quorumClient, mockKmsClient) {
@@ -38,4 +39,4 @@ export function createTestWalletClient() {
38
39
  account,
39
40
  });
40
41
  }
41
- //# sourceMappingURL=data:application/json;base64,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
42
+ //# sourceMappingURL=data:application/json;base64,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
@@ -2,10 +2,12 @@ import type { Account, Chain, PublicClient, Transport, WalletClient } from 'viem
2
2
  import { type HexString } from '../binary.js';
3
3
  import { type SupportedChainId } from '../chain.js';
4
4
  import { EncryptionScheme, type SupportedFheType } from '../encryption/encryption.js';
5
+ import { validateHandle } from '../handle.js';
5
6
  import { KmsQuorumClient } from '../kms/quorumClient.js';
6
7
  import type { XwingKeypair } from '../lite/xwing.js';
7
8
  import type { BackoffConfig } from '../retry.js';
8
9
  import { type DecryptionAttestation, type EncryptedDecryptionAttestation } from './types.js';
10
+ export { validateHandle };
9
11
  export declare const ATTESTED_DECRYPT_DOMAIN_NAME = "IncoAttestedDecrypt";
10
12
  export declare const DEFAULT_ATTESTED_DECRYPT_DOMAIN_VERSION = "2";
11
13
  export declare const TEST_RPC_URL = "UNUSED IN TEST";
@@ -91,9 +93,3 @@ export declare function attestedDecrypt({ handles, backoffConfig, walletClient,
91
93
  }): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
92
94
  export declare function fetchEip712DomainVersion(executorAddress: HexString | undefined, defaultVersion: string, walletClient?: WalletClient<Transport, Chain, Account> | PublicClient<Transport, Chain>): Promise<string>;
93
95
  export declare function decryptEncryptedAttestations(attestations: Array<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>, reencryptKeypair: XwingKeypair): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
94
- /**
95
- * Validates a handle format.
96
- * @param handle - The handle to validate
97
- * @throws {AttestedDecryptError} If the handle format is invalid
98
- */
99
- export declare function validateHandle(handle: HexString): void;