@reclaimprotocol/attestor-core 3.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (204) hide show
  1. package/README.md +39 -0
  2. package/lib/avs/abis/avsDirectoryABI.d.ts +60 -0
  3. package/lib/avs/abis/avsDirectoryABI.js +344 -0
  4. package/lib/avs/abis/delegationABI.d.ts +126 -0
  5. package/lib/avs/abis/delegationABI.js +5 -0
  6. package/lib/avs/abis/registryABI.d.ts +136 -0
  7. package/lib/avs/abis/registryABI.js +729 -0
  8. package/lib/avs/client/create-claim-on-avs.d.ts +10 -0
  9. package/lib/avs/client/create-claim-on-avs.js +147 -0
  10. package/lib/avs/config.d.ts +7 -0
  11. package/lib/avs/config.js +24 -0
  12. package/lib/avs/contracts/ReclaimServiceManager.d.ts +697 -0
  13. package/lib/avs/contracts/ReclaimServiceManager.js +3 -0
  14. package/lib/avs/contracts/common.d.ts +21 -0
  15. package/lib/avs/contracts/common.js +3 -0
  16. package/lib/avs/contracts/factories/ReclaimServiceManager__factory.d.ts +888 -0
  17. package/lib/avs/contracts/factories/ReclaimServiceManager__factory.js +1174 -0
  18. package/lib/avs/contracts/factories/index.d.ts +1 -0
  19. package/lib/avs/contracts/factories/index.js +9 -0
  20. package/lib/avs/contracts/index.d.ts +3 -0
  21. package/lib/avs/contracts/index.js +30 -0
  22. package/lib/avs/tests/test.operator.d.ts +11 -0
  23. package/lib/avs/tests/test.operator.js +313 -0
  24. package/lib/avs/tests/utils.d.ts +2 -0
  25. package/lib/avs/tests/utils.js +50 -0
  26. package/lib/avs/types/index.d.ts +55 -0
  27. package/lib/avs/types/index.js +3 -0
  28. package/lib/avs/utils/contracts.d.ts +21 -0
  29. package/lib/avs/utils/contracts.js +38 -0
  30. package/lib/avs/utils/register.d.ts +27 -0
  31. package/lib/avs/utils/register.js +76 -0
  32. package/lib/avs/utils/tasks.d.ts +22 -0
  33. package/lib/avs/utils/tasks.js +45 -0
  34. package/lib/client/create-claim.d.ts +5 -0
  35. package/lib/client/create-claim.js +357 -0
  36. package/lib/client/index.d.ts +3 -0
  37. package/lib/client/index.js +20 -0
  38. package/lib/client/tunnels/make-rpc-tcp-tunnel.d.ts +16 -0
  39. package/lib/client/tunnels/make-rpc-tcp-tunnel.js +60 -0
  40. package/lib/client/tunnels/make-rpc-tls-tunnel.d.ts +25 -0
  41. package/lib/client/tunnels/make-rpc-tls-tunnel.js +135 -0
  42. package/lib/client/utils/attestor-pool.d.ts +6 -0
  43. package/lib/client/utils/attestor-pool.js +28 -0
  44. package/lib/client/utils/client-socket.d.ts +9 -0
  45. package/lib/client/utils/client-socket.js +77 -0
  46. package/lib/client/utils/message-handler.d.ts +4 -0
  47. package/lib/client/utils/message-handler.js +93 -0
  48. package/lib/config/index.d.ts +23 -0
  49. package/lib/config/index.js +35 -0
  50. package/lib/index.d.ts +9 -0
  51. package/lib/index.js +39 -0
  52. package/lib/proto/api.d.ts +414 -0
  53. package/lib/proto/api.js +2756 -0
  54. package/lib/providers/http/index.d.ts +3 -0
  55. package/lib/providers/http/index.js +472 -0
  56. package/lib/providers/http/utils.d.ts +44 -0
  57. package/lib/providers/http/utils.js +302 -0
  58. package/lib/providers/index.d.ts +4 -0
  59. package/lib/providers/index.js +11 -0
  60. package/lib/scripts/check-avs-registration.d.ts +1 -0
  61. package/lib/scripts/check-avs-registration.js +28 -0
  62. package/lib/scripts/generate-provider-types.d.ts +5 -0
  63. package/lib/scripts/generate-provider-types.js +82 -0
  64. package/lib/scripts/generate-receipt.d.ts +9 -0
  65. package/lib/scripts/generate-receipt.js +93 -0
  66. package/lib/scripts/register-avs-operator.d.ts +1 -0
  67. package/lib/scripts/register-avs-operator.js +6 -0
  68. package/lib/scripts/start-server.d.ts +1 -0
  69. package/lib/scripts/start-server.js +6 -0
  70. package/lib/scripts/verify-root-ca.d.ts +1 -0
  71. package/lib/scripts/verify-root-ca.js +51 -0
  72. package/lib/server/create-server.d.ts +7 -0
  73. package/lib/server/create-server.js +85 -0
  74. package/lib/server/handlers/claimTunnel.d.ts +2 -0
  75. package/lib/server/handlers/claimTunnel.js +55 -0
  76. package/lib/server/handlers/completeClaimOnChain.d.ts +2 -0
  77. package/lib/server/handlers/completeClaimOnChain.js +28 -0
  78. package/lib/server/handlers/createClaimOnChain.d.ts +2 -0
  79. package/lib/server/handlers/createClaimOnChain.js +31 -0
  80. package/lib/server/handlers/createTunnel.d.ts +2 -0
  81. package/lib/server/handlers/createTunnel.js +65 -0
  82. package/lib/server/handlers/disconnectTunnel.d.ts +2 -0
  83. package/lib/server/handlers/disconnectTunnel.js +10 -0
  84. package/lib/server/handlers/index.d.ts +4 -0
  85. package/lib/server/handlers/index.js +18 -0
  86. package/lib/server/handlers/init.d.ts +2 -0
  87. package/lib/server/handlers/init.js +21 -0
  88. package/lib/server/index.d.ts +4 -0
  89. package/lib/server/index.js +21 -0
  90. package/lib/server/socket.d.ts +11 -0
  91. package/lib/server/socket.js +95 -0
  92. package/lib/server/tunnels/make-tcp-tunnel.d.ts +20 -0
  93. package/lib/server/tunnels/make-tcp-tunnel.js +182 -0
  94. package/lib/server/utils/apm.d.ts +11 -0
  95. package/lib/server/utils/apm.js +39 -0
  96. package/lib/server/utils/assert-valid-claim-request.d.ts +29 -0
  97. package/lib/server/utils/assert-valid-claim-request.js +189 -0
  98. package/lib/server/utils/config-env.d.ts +1 -0
  99. package/lib/server/utils/config-env.js +7 -0
  100. package/lib/server/utils/generics.d.ts +22 -0
  101. package/lib/server/utils/generics.js +59 -0
  102. package/lib/server/utils/iso.d.ts +1 -0
  103. package/lib/server/utils/iso.js +260 -0
  104. package/lib/server/utils/keep-alive.d.ts +7 -0
  105. package/lib/server/utils/keep-alive.js +42 -0
  106. package/lib/server/utils/process-handshake.d.ts +13 -0
  107. package/lib/server/utils/process-handshake.js +179 -0
  108. package/lib/server/utils/verify-server-certificates.d.ts +7 -0
  109. package/lib/server/utils/verify-server-certificates.js +102 -0
  110. package/lib/tests/describe-with-server.d.ts +21 -0
  111. package/lib/tests/describe-with-server.js +67 -0
  112. package/lib/tests/mock-provider-server.d.ts +13 -0
  113. package/lib/tests/mock-provider-server.js +65 -0
  114. package/lib/tests/mocks.d.ts +4 -0
  115. package/lib/tests/mocks.js +23 -0
  116. package/lib/tests/test.claim-creation.d.ts +1 -0
  117. package/lib/tests/test.claim-creation.js +187 -0
  118. package/lib/tests/test.http-parser.d.ts +1 -0
  119. package/lib/tests/test.http-parser.js +118 -0
  120. package/lib/tests/test.http-provider-utils.d.ts +1 -0
  121. package/lib/tests/test.http-provider-utils.js +1932 -0
  122. package/lib/tests/test.http-provider.d.ts +1 -0
  123. package/lib/tests/test.http-provider.js +43 -0
  124. package/lib/tests/test.rpc-communication.d.ts +1 -0
  125. package/lib/tests/test.rpc-communication.js +64 -0
  126. package/lib/tests/test.rpc-tunnel.d.ts +1 -0
  127. package/lib/tests/test.rpc-tunnel.js +168 -0
  128. package/lib/tests/test.signatures.d.ts +1 -0
  129. package/lib/tests/test.signatures.js +24 -0
  130. package/lib/tests/test.tcp-tunnel.d.ts +1 -0
  131. package/lib/tests/test.tcp-tunnel.js +64 -0
  132. package/lib/tests/test.zk.d.ts +1 -0
  133. package/lib/tests/test.zk.js +169 -0
  134. package/lib/tests/utils.d.ts +12 -0
  135. package/lib/tests/utils.js +49 -0
  136. package/lib/types/claims.d.ts +64 -0
  137. package/lib/types/claims.js +3 -0
  138. package/lib/types/client.d.ts +136 -0
  139. package/lib/types/client.js +3 -0
  140. package/lib/types/general.d.ts +39 -0
  141. package/lib/types/general.js +3 -0
  142. package/lib/types/handlers.d.ts +10 -0
  143. package/lib/types/handlers.js +3 -0
  144. package/lib/types/index.d.ts +9 -0
  145. package/lib/types/index.js +26 -0
  146. package/lib/types/providers.d.ts +135 -0
  147. package/lib/types/providers.gen.d.ts +414 -0
  148. package/lib/types/providers.gen.js +14 -0
  149. package/lib/types/providers.js +3 -0
  150. package/lib/types/rpc.d.ts +35 -0
  151. package/lib/types/rpc.js +3 -0
  152. package/lib/types/signatures.d.ts +28 -0
  153. package/lib/types/signatures.js +3 -0
  154. package/lib/types/tunnel.d.ts +18 -0
  155. package/lib/types/tunnel.js +3 -0
  156. package/lib/types/zk.d.ts +16 -0
  157. package/lib/types/zk.js +3 -0
  158. package/lib/utils/benchmark.d.ts +1 -0
  159. package/lib/utils/benchmark.js +70 -0
  160. package/lib/utils/claims.d.ts +33 -0
  161. package/lib/utils/claims.js +112 -0
  162. package/lib/utils/env.d.ts +3 -0
  163. package/lib/utils/env.js +20 -0
  164. package/lib/utils/error.d.ts +27 -0
  165. package/lib/utils/error.js +43 -0
  166. package/lib/utils/generics.d.ts +112 -0
  167. package/lib/utils/generics.js +348 -0
  168. package/lib/utils/http-parser.d.ts +55 -0
  169. package/lib/utils/http-parser.js +249 -0
  170. package/lib/utils/index.d.ts +10 -0
  171. package/lib/utils/index.js +27 -0
  172. package/lib/utils/logger.d.ts +13 -0
  173. package/lib/utils/logger.js +100 -0
  174. package/lib/utils/prepare-packets.d.ts +16 -0
  175. package/lib/utils/prepare-packets.js +61 -0
  176. package/lib/utils/redactions.d.ts +41 -0
  177. package/lib/utils/redactions.js +111 -0
  178. package/lib/utils/retries.d.ts +12 -0
  179. package/lib/utils/retries.js +28 -0
  180. package/lib/utils/signatures/eth.d.ts +2 -0
  181. package/lib/utils/signatures/eth.js +33 -0
  182. package/lib/utils/signatures/index.d.ts +5 -0
  183. package/lib/utils/signatures/index.js +11 -0
  184. package/lib/utils/socket-base.d.ts +21 -0
  185. package/lib/utils/socket-base.js +89 -0
  186. package/lib/utils/tls.d.ts +2 -0
  187. package/lib/utils/tls.js +32 -0
  188. package/lib/utils/validation.d.ts +2 -0
  189. package/lib/utils/validation.js +46 -0
  190. package/lib/utils/ws.d.ts +12 -0
  191. package/lib/utils/ws.js +21 -0
  192. package/lib/utils/zk.d.ts +50 -0
  193. package/lib/utils/zk.js +282 -0
  194. package/lib/window-rpc/index.d.ts +3 -0
  195. package/lib/window-rpc/index.js +20 -0
  196. package/lib/window-rpc/setup-window-rpc.d.ts +5 -0
  197. package/lib/window-rpc/setup-window-rpc.js +239 -0
  198. package/lib/window-rpc/types.d.ts +184 -0
  199. package/lib/window-rpc/types.js +3 -0
  200. package/lib/window-rpc/utils.d.ts +13 -0
  201. package/lib/window-rpc/utils.js +76 -0
  202. package/lib/window-rpc/window-rpc-zk.d.ts +11 -0
  203. package/lib/window-rpc/window-rpc-zk.js +72 -0
  204. package/package.json +117 -0
@@ -0,0 +1,76 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.registerOperator = registerOperator;
4
+ const ethers_1 = require("ethers");
5
+ const config_1 = require("src/avs/config");
6
+ const contracts_1 = require("src/avs/utils/contracts");
7
+ const utils_1 = require("src/utils");
8
+ /**
9
+ * Registers the operator on the chain, if required.
10
+ * If already registered -- will just pass through
11
+ */
12
+ async function registerOperator({ logger = utils_1.logger, chainId = config_1.SELECTED_CHAIN_ID, wallet = (0, contracts_1.getContracts)(chainId).wallet, reclaimRpcUrl = config_1.RECLAIM_PUBLIC_URL } = {}) {
13
+ const contracts = (0, contracts_1.getContracts)(chainId);
14
+ const delegationManager = contracts.delegationManager
15
+ .connect(wallet);
16
+ const avsDirectory = contracts.avsDirectory
17
+ .connect(wallet);
18
+ const contract = contracts.contract
19
+ .connect(wallet);
20
+ const registryContract = contracts.registryContract
21
+ .connect(wallet);
22
+ const addr = await wallet.address;
23
+ try {
24
+ const tx1 = await delegationManager
25
+ .registerAsOperator({
26
+ earningsReceiver: addr,
27
+ delegationApprover: '0x0000000000000000000000000000000000000000',
28
+ stakerOptOutWindowBlocks: 0
29
+ }, '');
30
+ await tx1.wait();
31
+ logger.info('operator registered on DM successfully');
32
+ }
33
+ catch (err) {
34
+ if (!err.message.includes('operator has already registered')) {
35
+ throw err;
36
+ }
37
+ logger.info('Operator already registered on EL');
38
+ }
39
+ const salt = ethers_1.ethers.utils.hexlify(ethers_1.ethers.utils.randomBytes(32));
40
+ // Example expiry, 1 hour from now
41
+ const expiry = Math.floor(Date.now() / 1000) + 3600;
42
+ // Define the output structure
43
+ const operatorSignature = {
44
+ expiry: expiry,
45
+ salt: salt,
46
+ signature: ''
47
+ };
48
+ // Calculate the digest hash using the avsDirectory's method
49
+ const digestHash = await avsDirectory
50
+ .calculateOperatorAVSRegistrationDigestHash(addr, contract.address, salt, expiry);
51
+ // Sign the digest hash with the operator's private key
52
+ const signingKey = new ethers_1.ethers.utils.SigningKey(wallet.privateKey);
53
+ const signature = signingKey.signDigest(digestHash);
54
+ // Encode the signature in the required format
55
+ operatorSignature.signature = ethers_1.ethers.utils.joinSignature(signature);
56
+ logger.info('operator signature generated successfully');
57
+ if (!(await registryContract.operatorRegistered(addr))) {
58
+ const tx2 = await registryContract
59
+ .registerOperatorWithSignature(addr, operatorSignature);
60
+ await tx2.wait();
61
+ logger.info('operator registered on AVS successfully');
62
+ }
63
+ else {
64
+ logger.info('Operator already registered on AVS');
65
+ }
66
+ const existingMetadata = await contract.getMetadataForOperator(addr);
67
+ const metadata = { addr, url: reclaimRpcUrl };
68
+ if (existingMetadata.addr === metadata.addr
69
+ && existingMetadata.url === metadata.url) {
70
+ logger.info('operator metadata already up to date');
71
+ return;
72
+ }
73
+ await contract.updateOperatorMetadata(metadata);
74
+ logger.info({ metadata }, 'operator metadata updated successfully');
75
+ }
76
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoicmVnaXN0ZXIuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvYXZzL3V0aWxzL3JlZ2lzdGVyLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7O0FBNkJBLDRDQXVGQztBQXBIRCxtQ0FBK0I7QUFDL0IsMkNBQXNFO0FBQ3RFLHVEQUFzRDtBQUN0RCxxQ0FBNEM7QUFzQjVDOzs7R0FHRztBQUNJLEtBQUssVUFBVSxnQkFBZ0IsQ0FBQyxFQUN0QyxNQUFNLEdBQUcsY0FBTSxFQUNmLE9BQU8sR0FBRywwQkFBaUIsRUFDM0IsTUFBTSxHQUFHLElBQUEsd0JBQVksRUFBQyxPQUFPLENBQUMsQ0FBQyxNQUFPLEVBQ3RDLGFBQWEsR0FBRywyQkFBa0IsS0FDakIsRUFBRTtJQUNuQixNQUFNLFNBQVMsR0FBRyxJQUFBLHdCQUFZLEVBQUMsT0FBTyxDQUFDLENBQUE7SUFDdkMsTUFBTSxpQkFBaUIsR0FBRyxTQUFTLENBQUMsaUJBQWlCO1NBQ25ELE9BQU8sQ0FBQyxNQUFNLENBQUMsQ0FBQTtJQUNqQixNQUFNLFlBQVksR0FBRyxTQUFTLENBQUMsWUFBWTtTQUN6QyxPQUFPLENBQUMsTUFBTSxDQUFDLENBQUE7SUFDakIsTUFBTSxRQUFRLEdBQUcsU0FBUyxDQUFDLFFBQVE7U0FDakMsT0FBTyxDQUFDLE1BQU0sQ0FBQyxDQUFBO0lBQ2pCLE1BQU0sZ0JBQWdCLEdBQUcsU0FBUyxDQUFDLGdCQUFnQjtTQUNqRCxPQUFPLENBQUMsTUFBTSxDQUFDLENBQUE7SUFFakIsTUFBTSxJQUFJLEdBQUcsTUFBTSxNQUFNLENBQUMsT0FBTyxDQUFBO0lBQ2pDLElBQUksQ0FBQztRQUNKLE1BQU0sR0FBRyxHQUFHLE1BQU0saUJBQWlCO2FBQ2pDLGtCQUFrQixDQUFDO1lBQ25CLGdCQUFnQixFQUFFLElBQUk7WUFDdEIsa0JBQWtCLEVBQ2pCLDRDQUE0QztZQUM3Qyx3QkFBd0IsRUFBRSxDQUFDO1NBQzNCLEVBQUUsRUFBRSxDQUFDLENBQUE7UUFDUCxNQUFNLEdBQUcsQ0FBQyxJQUFJLEVBQUUsQ0FBQTtRQUNoQixNQUFNLENBQUMsSUFBSSxDQUFDLHdDQUF3QyxDQUFDLENBQUE7SUFDdEQsQ0FBQztJQUFDLE9BQU0sR0FBRyxFQUFFLENBQUM7UUFDYixJQUFHLENBQUMsR0FBRyxDQUFDLE9BQU8sQ0FBQyxRQUFRLENBQUMsaUNBQWlDLENBQUMsRUFBRSxDQUFDO1lBQzdELE1BQU0sR0FBRyxDQUFBO1FBQ1YsQ0FBQztRQUVELE1BQU0sQ0FBQyxJQUFJLENBQUMsbUNBQW1DLENBQUMsQ0FBQTtJQUNqRCxDQUFDO0lBRUQsTUFBTSxJQUFJLEdBQUcsZUFBTSxDQUFDLEtBQUssQ0FBQyxPQUFPLENBQUMsZUFBTSxDQUFDLEtBQUssQ0FBQyxXQUFXLENBQUMsRUFBRSxDQUFDLENBQUMsQ0FBQTtJQUMvRCxrQ0FBa0M7SUFDbEMsTUFBTSxNQUFNLEdBQUcsSUFBSSxDQUFDLEtBQUssQ0FBQyxJQUFJLENBQUMsR0FBRyxFQUFFLEdBQUcsSUFBSSxDQUFDLEdBQUcsSUFBSSxDQUFBO0lBQ25ELDhCQUE4QjtJQUM5QixNQUFNLGlCQUFpQixHQUFHO1FBQ3pCLE1BQU0sRUFBRSxNQUFNO1FBQ2QsSUFBSSxFQUFFLElBQUk7UUFDVixTQUFTLEVBQUUsRUFBRTtLQUNiLENBQUE7SUFFRCw0REFBNEQ7SUFDNUQsTUFBTSxVQUFVLEdBQUcsTUFBTSxZQUFZO1NBQ25DLDBDQUEwQyxDQUMxQyxJQUFJLEVBQ0osUUFBUSxDQUFDLE9BQU8sRUFDaEIsSUFBSSxFQUNKLE1BQU0sQ0FDTixDQUFBO0lBRUYsdURBQXVEO0lBQ3ZELE1BQU0sVUFBVSxHQUFHLElBQUksZUFBTSxDQUFDLEtBQUssQ0FBQyxVQUFVLENBQzdDLE1BQU0sQ0FBQyxVQUFVLENBQ2pCLENBQUE7SUFDRCxNQUFNLFNBQVMsR0FBRyxVQUFVLENBQUMsVUFBVSxDQUFDLFVBQVUsQ0FBQyxDQUFBO0lBRW5ELDhDQUE4QztJQUM5QyxpQkFBaUIsQ0FBQyxTQUFTLEdBQUcsZUFBTSxDQUFDLEtBQUssQ0FBQyxhQUFhLENBQUMsU0FBUyxDQUFDLENBQUE7SUFFbkUsTUFBTSxDQUFDLElBQUksQ0FBQywyQ0FBMkMsQ0FBQyxDQUFBO0lBRXhELElBQUcsQ0FBQyxDQUFDLE1BQU0sZ0JBQWdCLENBQUMsa0JBQWtCLENBQUMsSUFBSSxDQUFDLENBQUMsRUFBRSxDQUFDO1FBQ3ZELE1BQU0sR0FBRyxHQUFHLE1BQU0sZ0JBQWdCO2FBQ2hDLDZCQUE2QixDQUFDLElBQUksRUFBRSxpQkFBaUIsQ0FBQyxDQUFBO1FBQ3hELE1BQU0sR0FBRyxDQUFDLElBQUksRUFBRSxDQUFBO1FBQ2hCLE1BQU0sQ0FBQyxJQUFJLENBQUMseUNBQXlDLENBQUMsQ0FBQTtJQUN2RCxDQUFDO1NBQU0sQ0FBQztRQUNQLE1BQU0sQ0FBQyxJQUFJLENBQUMsb0NBQW9DLENBQUMsQ0FBQTtJQUNsRCxDQUFDO0lBRUQsTUFBTSxnQkFBZ0IsR0FBRyxNQUFNLFFBQVEsQ0FBQyxzQkFBc0IsQ0FBQyxJQUFJLENBQUMsQ0FBQTtJQUNwRSxNQUFNLFFBQVEsR0FBRyxFQUFFLElBQUksRUFBRSxHQUFHLEVBQUUsYUFBYSxFQUFFLENBQUE7SUFDN0MsSUFDQyxnQkFBZ0IsQ0FBQyxJQUFJLEtBQUssUUFBUSxDQUFDLElBQUk7V0FDcEMsZ0JBQWdCLENBQUMsR0FBRyxLQUFLLFFBQVEsQ0FBQyxHQUFHLEVBQ3ZDLENBQUM7UUFDRixNQUFNLENBQUMsSUFBSSxDQUFDLHNDQUFzQyxDQUFDLENBQUE7UUFDbkQsT0FBTTtJQUNQLENBQUM7SUFFRCxNQUFNLFFBQVEsQ0FBQyxzQkFBc0IsQ0FBQyxRQUFRLENBQUMsQ0FBQTtJQUUvQyxNQUFNLENBQUMsSUFBSSxDQUFDLEVBQUUsUUFBUSxFQUFFLEVBQUUsd0NBQXdDLENBQUMsQ0FBQTtBQUNwRSxDQUFDIn0=
@@ -0,0 +1,22 @@
1
+ import { ethers, type Wallet } from 'ethers';
2
+ import type { IReclaimServiceManager, NewTaskCreatedEventObject } from 'src/avs/contracts/ReclaimServiceManager';
3
+ type CreateClaimWithoutOwner = Omit<IReclaimServiceManager.ClaimRequestStruct, 'owner'>;
4
+ type CreateNewClaimRequestOnChainOpts = {
5
+ request: CreateClaimWithoutOwner;
6
+ payer: Wallet;
7
+ chainId?: string;
8
+ } & ({
9
+ owner: Wallet;
10
+ } | {
11
+ /**
12
+ * Address of the owner of the claim
13
+ */
14
+ owner: string;
15
+ requestSignature?: string | Uint8Array;
16
+ });
17
+ export declare function createNewClaimRequestOnChain({ request, payer, chainId, ...rest }: CreateNewClaimRequestOnChainOpts): Promise<{
18
+ task: NewTaskCreatedEventObject;
19
+ tx: ethers.ContractReceipt;
20
+ }>;
21
+ export declare function signClaimRequest(request: IReclaimServiceManager.ClaimRequestStruct, owner: Wallet, chainId?: string): Promise<Uint8Array>;
22
+ export {};
@@ -0,0 +1,45 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.createNewClaimRequestOnChain = createNewClaimRequestOnChain;
4
+ exports.signClaimRequest = signClaimRequest;
5
+ const ethers_1 = require("ethers");
6
+ const contracts_1 = require("src/avs/utils/contracts");
7
+ async function createNewClaimRequestOnChain({ request, payer, chainId, ...rest }) {
8
+ const contracts = (0, contracts_1.getContracts)(chainId);
9
+ const contract = contracts.contract.connect(payer);
10
+ const ownerAddress = typeof rest.owner === 'string'
11
+ ? rest.owner
12
+ : rest.owner.address;
13
+ const fullRequest = {
14
+ ...request,
15
+ owner: ownerAddress
16
+ };
17
+ const signature = await getSignature();
18
+ const task = await contract.createNewTask(fullRequest, signature || '0x00');
19
+ const rslt = await task.wait();
20
+ const events = rslt.events;
21
+ // check task created event was emitted
22
+ const ev = events === null || events === void 0 ? void 0 : events[0];
23
+ const arg = ev === null || ev === void 0 ? void 0 : ev.args;
24
+ return { task: arg, tx: rslt };
25
+ function getSignature() {
26
+ if (ownerAddress.toLowerCase() === payer.address.toLowerCase()) {
27
+ return;
28
+ }
29
+ if ('requestSignature' in rest) {
30
+ return rest.requestSignature;
31
+ }
32
+ if (typeof rest.owner !== 'object') {
33
+ throw new Error('Owner wallet must be provided or'
34
+ + ' requestSignature must be provided');
35
+ }
36
+ return signClaimRequest(fullRequest, rest.owner, chainId);
37
+ }
38
+ }
39
+ async function signClaimRequest(request, owner, chainId) {
40
+ const contract = (0, contracts_1.getContracts)(chainId).contract;
41
+ const encoded = await contract.encodeClaimRequest(request);
42
+ const strSig = await owner.signMessage(ethers_1.ethers.utils.arrayify(encoded));
43
+ return ethers_1.ethers.utils.arrayify(strSig);
44
+ }
45
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,5 @@
1
+ import { CreateClaimOnAttestorOpts, ProviderName } from 'src/types';
2
+ /**
3
+ * Create a claim on the attestor
4
+ */
5
+ export declare function createClaimOnAttestor<N extends ProviderName>({ logger: _logger, ...opts }: CreateClaimOnAttestorOpts<N>): Promise<import("src/proto/api").ClaimTunnelResponse>;
@@ -0,0 +1,357 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.createClaimOnAttestor = createClaimOnAttestor;
4
+ const tls_1 = require("@reclaimprotocol/tls");
5
+ const utils_1 = require("ethers/lib/utils");
6
+ const make_rpc_tls_tunnel_1 = require("src/client/tunnels/make-rpc-tls-tunnel");
7
+ const attestor_pool_1 = require("src/client/utils/attestor-pool");
8
+ const config_1 = require("src/config");
9
+ const api_1 = require("src/proto/api");
10
+ const providers_1 = require("src/providers");
11
+ const utils_2 = require("src/utils");
12
+ const retries_1 = require("src/utils/retries");
13
+ const signatures_1 = require("src/utils/signatures");
14
+ const tls_2 = require("src/utils/tls");
15
+ /**
16
+ * Create a claim on the attestor
17
+ */
18
+ function createClaimOnAttestor({ logger: _logger, ...opts }) {
19
+ const logger = _logger
20
+ // if the client has already been initialised
21
+ // and no logger is provided, use the client's logger
22
+ // otherwise default to the global logger
23
+ || ('logger' in opts.client ? opts.client.logger : utils_2.logger);
24
+ return (0, retries_1.executeWithRetries)(attempt => (_createClaimOnAttestor({
25
+ ...opts,
26
+ logger: attempt
27
+ ? logger.child({ attempt })
28
+ : logger
29
+ })), { logger, shouldRetry });
30
+ }
31
+ function shouldRetry(err) {
32
+ if (err instanceof TypeError) {
33
+ return false;
34
+ }
35
+ return err instanceof utils_2.AttestorError
36
+ && err.code !== 'ERROR_INVALID_CLAIM'
37
+ && err.code !== 'ERROR_BAD_REQUEST';
38
+ }
39
+ async function _createClaimOnAttestor({ name, params, secretParams, context, onStep, ownerPrivateKey, client: clientInit, logger = utils_2.logger, timestampS, updateProviderParams, ...zkOpts }) {
40
+ const provider = providers_1.providers[name];
41
+ const hostPort = (0, utils_2.getProviderValue)(params, provider.hostPort);
42
+ const geoLocation = (0, utils_2.getProviderValue)(params, provider.geoLocation);
43
+ const providerTlsOpts = (0, utils_2.getProviderValue)(params, provider.additionalClientOptions);
44
+ const tlsOpts = {
45
+ ...(0, tls_2.getDefaultTlsOptions)(),
46
+ ...providerTlsOpts,
47
+ };
48
+ let redactionMode = (0, utils_2.getProviderValue)(params, provider.writeRedactionMode);
49
+ const [host, port] = hostPort.split(':');
50
+ const resParser = (0, utils_2.makeHttpResponseParser)();
51
+ let client;
52
+ let lastMsgRevealed = false;
53
+ const revealMap = new Map();
54
+ onStep === null || onStep === void 0 ? void 0 : onStep({ name: 'connecting' });
55
+ let endedHttpRequest;
56
+ const createTunnelReq = {
57
+ host,
58
+ port: port ? +port : config_1.DEFAULT_HTTPS_PORT,
59
+ geoLocation,
60
+ id: (0, utils_2.generateTunnelId)()
61
+ };
62
+ const tunnel = await (0, make_rpc_tls_tunnel_1.makeRpcTlsTunnel)({
63
+ tlsOpts,
64
+ connect: (initMessages) => {
65
+ let created = false;
66
+ if ('metadata' in clientInit) {
67
+ client = clientInit;
68
+ }
69
+ else {
70
+ client = (0, attestor_pool_1.getAttestorClientFromPool)(clientInit.url, () => {
71
+ created = true;
72
+ return { initMessages, logger };
73
+ });
74
+ }
75
+ if (!created) {
76
+ client
77
+ .waitForInit()
78
+ .then(() => client.sendMessage(...initMessages))
79
+ .catch(err => {
80
+ logger.error({ err }, 'error in sending init msgs');
81
+ });
82
+ }
83
+ return client;
84
+ },
85
+ logger,
86
+ request: createTunnelReq,
87
+ onMessage(data) {
88
+ logger.debug({ bytes: data.length }, 'recv data from server');
89
+ resParser.onChunk(data);
90
+ if (resParser.res.complete) {
91
+ logger === null || logger === void 0 ? void 0 : logger.debug('got complete HTTP response from server');
92
+ // wait a little bit to make sure the client has
93
+ // finished writing the response
94
+ setTimeout(() => {
95
+ endedHttpRequest === null || endedHttpRequest === void 0 ? void 0 : endedHttpRequest();
96
+ }, 100);
97
+ }
98
+ },
99
+ onClose(err) {
100
+ const level = err ? 'error' : 'debug';
101
+ logger === null || logger === void 0 ? void 0 : logger[level]({ err }, 'tls session ended');
102
+ endedHttpRequest === null || endedHttpRequest === void 0 ? void 0 : endedHttpRequest(err);
103
+ try {
104
+ resParser.streamEnded();
105
+ }
106
+ catch (_a) { }
107
+ },
108
+ });
109
+ const { version: tlsVersion, cipherSuite } = tunnel.tls.getMetadata();
110
+ if (tlsVersion === 'TLS1_2' && redactionMode !== 'zk') {
111
+ redactionMode = 'zk';
112
+ logger.info('TLS1.2 detected, defaulting to zk redaction mode');
113
+ }
114
+ const { redactions, data: requestStr } = provider.createRequest(
115
+ // @ts-ignore
116
+ secretParams, params);
117
+ const requestData = typeof requestStr === 'string'
118
+ ? (0, tls_1.strToUint8Array)(requestStr)
119
+ : requestStr;
120
+ logger.debug({ redactions: redactions.length }, 'generated request');
121
+ const waitForAllData = new Promise((resolve, reject) => {
122
+ endedHttpRequest = err => (err ? reject(err) : resolve());
123
+ });
124
+ onStep === null || onStep === void 0 ? void 0 : onStep({ name: 'sending-request-data' });
125
+ try {
126
+ if (redactionMode === 'zk') {
127
+ await writeRedactedZk();
128
+ }
129
+ else {
130
+ await writeRedactedWithKeyUpdate();
131
+ }
132
+ logger.info('wrote request to server');
133
+ }
134
+ catch (err) {
135
+ // wait for complete stream end when the session is closed
136
+ // mid-write, as this means the server could not process
137
+ // our request due to some error. Hope the stream end
138
+ // error will be more descriptive
139
+ logger.error({ err }, 'session errored during write, waiting for stream end');
140
+ }
141
+ onStep === null || onStep === void 0 ? void 0 : onStep({ name: 'waiting-for-response' });
142
+ await waitForAllData;
143
+ await tunnel.close();
144
+ logger.info('got full response from server');
145
+ // update the response selections
146
+ if (updateProviderParams) {
147
+ const { params: updatedParms, secretParams: updatedSecretParms } = await updateProviderParams(tunnel.transcript, tlsVersion !== null && tlsVersion !== void 0 ? tlsVersion : 'TLS1_2');
148
+ params = { ...params, ...updatedParms };
149
+ secretParams = { ...secretParams, ...updatedSecretParms };
150
+ }
151
+ const signatureAlg = signatures_1.SIGNATURES[client.metadata.signatureType];
152
+ let serverIV;
153
+ let clientIV;
154
+ const serverBlock = getLastBlock('server');
155
+ if (serverBlock && serverBlock.message.type === 'ciphertext') {
156
+ serverIV = serverBlock.message.fixedIv;
157
+ }
158
+ const clientBlock = getLastBlock('client');
159
+ if (clientBlock && clientBlock.message.type === 'ciphertext') {
160
+ clientIV = clientBlock.message.fixedIv;
161
+ }
162
+ // now that we have the full transcript, we need
163
+ // to generate the ZK proofs & send them to the attestor
164
+ // to verify & sign our claim
165
+ const claimTunnelReq = api_1.ClaimTunnelRequest.create({
166
+ request: createTunnelReq,
167
+ data: {
168
+ provider: name,
169
+ parameters: (0, utils_2.canonicalStringify)(params),
170
+ context: (0, utils_2.canonicalStringify)(context),
171
+ timestampS: timestampS !== null && timestampS !== void 0 ? timestampS : (0, utils_2.unixTimestampSeconds)(),
172
+ owner: getAddress(),
173
+ },
174
+ transcript: await generateTranscript(),
175
+ zkEngine: zkOpts.zkEngine === 'gnark' ? api_1.ZKProofEngine.ZK_ENGINE_GNARK : api_1.ZKProofEngine.ZK_ENGINE_SNARKJS,
176
+ fixedServerIV: serverIV,
177
+ fixedClientIV: clientIV,
178
+ });
179
+ onStep === null || onStep === void 0 ? void 0 : onStep({ name: 'waiting-for-verification' });
180
+ const claimTunnelBytes = api_1.ClaimTunnelRequest
181
+ .encode(claimTunnelReq).finish();
182
+ const requestSignature = await signatureAlg
183
+ .sign(claimTunnelBytes, ownerPrivateKey);
184
+ claimTunnelReq.signatures = { requestSignature };
185
+ const result = await client.rpc('claimTunnel', claimTunnelReq);
186
+ logger.info({ success: !!result.claim }, 'recv claim response');
187
+ return result;
188
+ async function writeRedactedWithKeyUpdate() {
189
+ var _a;
190
+ let currentIndex = 0;
191
+ for (const section of redactions) {
192
+ const block = requestData
193
+ .slice(currentIndex, section.fromIndex);
194
+ if (block.length) {
195
+ await writeWithReveal(block, true);
196
+ }
197
+ const redacted = requestData
198
+ .slice(section.fromIndex, section.toIndex);
199
+ await writeWithReveal(redacted, false);
200
+ currentIndex = section.toIndex;
201
+ }
202
+ // write if redactions were there
203
+ const lastBlockStart = ((_a = redactions === null || redactions === void 0 ? void 0 : redactions[redactions.length - 1]) === null || _a === void 0 ? void 0 : _a.toIndex) || 0;
204
+ const block = requestData.slice(lastBlockStart);
205
+ if (block.length) {
206
+ await writeWithReveal(block, true);
207
+ }
208
+ }
209
+ async function writeRedactedZk() {
210
+ await tunnel.tls.write(requestData);
211
+ setRevealOfLastSentBlock({
212
+ type: 'zk',
213
+ redactedPlaintext: (0, utils_2.redactSlices)(requestData, redactions)
214
+ });
215
+ }
216
+ /**
217
+ * Write data to the tunnel, with the option to mark the packet
218
+ * as revealable to the attestor or not
219
+ */
220
+ async function writeWithReveal(data, reveal) {
221
+ // if the reveal state has changed, update the traffic keys
222
+ // to not accidentally reveal a packet not meant to be revealed
223
+ // and vice versa
224
+ if (reveal !== lastMsgRevealed) {
225
+ await tunnel.tls.updateTrafficKeys();
226
+ }
227
+ await tunnel.write(data);
228
+ // now we mark the packet to be revealed to the attestor
229
+ setRevealOfLastSentBlock(reveal ? { type: 'complete' } : undefined);
230
+ lastMsgRevealed = reveal;
231
+ }
232
+ function setRevealOfLastSentBlock(reveal) {
233
+ const lastBlock = getLastBlock('client');
234
+ if (!lastBlock) {
235
+ return;
236
+ }
237
+ setRevealOfMessage(lastBlock.message, reveal);
238
+ }
239
+ function getLastBlock(sender) {
240
+ // set the correct index for the server blocks
241
+ for (let i = tunnel.transcript.length - 1; i >= 0; i--) {
242
+ const block = tunnel.transcript[i];
243
+ if (block.sender === sender) {
244
+ return block;
245
+ }
246
+ }
247
+ }
248
+ /**
249
+ * Generate transcript with reveal data for the attestor to verify
250
+ */
251
+ async function generateTranscript() {
252
+ addServerSideReveals();
253
+ const startMs = Date.now();
254
+ const revealedMessages = await (0, utils_2.preparePacketsForReveal)(tunnel.transcript, revealMap, {
255
+ logger,
256
+ cipherSuite: cipherSuite,
257
+ onZkProgress(done, total) {
258
+ const timeSinceStartMs = Date.now() - startMs;
259
+ const timePerBlockMs = timeSinceStartMs / done;
260
+ const timeLeftMs = timePerBlockMs * (total - done);
261
+ onStep === null || onStep === void 0 ? void 0 : onStep({
262
+ name: 'generating-zk-proofs',
263
+ proofsDone: done,
264
+ proofsTotal: total,
265
+ approxTimeLeftS: Math.round(timeLeftMs / 1000),
266
+ });
267
+ },
268
+ ...zkOpts,
269
+ });
270
+ return revealedMessages;
271
+ }
272
+ /**
273
+ * Add reveals for server side blocks, using
274
+ * the provider's redaction function if available.
275
+ * Otherwise, opts to reveal all server side blocks.
276
+ */
277
+ function addServerSideReveals() {
278
+ const allPackets = tunnel.transcript;
279
+ let serverPacketsToReveal = 'all';
280
+ const packets = [];
281
+ const serverBlocks = [];
282
+ for (const b of allPackets) {
283
+ if (b.message.type !== 'ciphertext'
284
+ || !(0, utils_2.isApplicationData)(b.message, tlsVersion)) {
285
+ continue;
286
+ }
287
+ const plaintext = tlsVersion === 'TLS1_3'
288
+ ? b.message.plaintext.slice(0, -1)
289
+ : b.message.plaintext;
290
+ packets.push({
291
+ message: plaintext,
292
+ sender: b.sender
293
+ });
294
+ if (b.sender === 'server') {
295
+ serverBlocks.push({
296
+ plaintext: plaintext,
297
+ message: b.message
298
+ });
299
+ }
300
+ }
301
+ provider.assertValidProviderReceipt(packets, {
302
+ ...params,
303
+ secretParams: secretParams //provide secret params for proper request body validation
304
+ });
305
+ if (provider.getResponseRedactions) {
306
+ serverPacketsToReveal = (0, utils_2.getBlocksToReveal)(serverBlocks, total => provider.getResponseRedactions(total, params));
307
+ }
308
+ if (serverPacketsToReveal === 'all') {
309
+ // reveal all server side blocks
310
+ for (const { message, sender } of allPackets) {
311
+ if (sender === 'server') {
312
+ setRevealOfMessage(message, { type: 'complete' });
313
+ }
314
+ }
315
+ }
316
+ else {
317
+ for (const { block, redactedPlaintext } of serverPacketsToReveal) {
318
+ setRevealOfMessage(block.message, {
319
+ type: 'zk',
320
+ redactedPlaintext
321
+ });
322
+ }
323
+ if (Array.isArray(serverPacketsToReveal)) {
324
+ const msgs = serverPacketsToReveal.map(m => m.redactedPlaintext);
325
+ const serverTranscript = utils_1.base64.encode((0, tls_1.concatenateUint8Arrays)(msgs));
326
+ logger.debug({ redactedResponse: serverTranscript });
327
+ }
328
+ }
329
+ // reveal all handshake blocks
330
+ // so the attestor can verify there was no
331
+ // hanky-panky
332
+ for (const p of allPackets) {
333
+ if (p.message.type !== 'ciphertext') {
334
+ continue;
335
+ }
336
+ // break the moment we hit the first
337
+ // application data packet
338
+ if ((0, utils_2.isApplicationData)(p.message, tlsVersion)) {
339
+ break;
340
+ }
341
+ setRevealOfMessage(p.message, { type: 'complete' });
342
+ }
343
+ }
344
+ function setRevealOfMessage(message, reveal) {
345
+ if (reveal) {
346
+ revealMap.set(message, reveal);
347
+ return;
348
+ }
349
+ revealMap.delete(message);
350
+ }
351
+ function getAddress() {
352
+ const { getAddress, getPublicKey, } = signatureAlg;
353
+ const pubKey = getPublicKey(ownerPrivateKey);
354
+ return getAddress(pubKey);
355
+ }
356
+ }
357
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"create-claim.js","sourceRoot":"","sources":["../../src/client/create-claim.ts"],"names":[],"mappings":";;AAiCA,sDAmBC;AApDD,8CAAgG;AAChG,4CAAyC;AACzC,gFAAyE;AACzE,kEAA0E;AAC1E,uCAA+C;AAC/C,uCAAiE;AACjE,6CAAyC;AAEzC,qCAYkB;AAClB,+CAAsD;AACtD,qDAAiD;AACjD,uCAAoD;AAOpD;;GAEG;AACH,SAAgB,qBAAqB,CACpC,EAAE,MAAM,EAAE,OAAO,EAAE,GAAG,IAAI,EAAgC;IAE1D,MAAM,MAAM,GAAG,OAAO;QACrB,6CAA6C;QAC7C,qDAAqD;QACrD,yCAAyC;WACtC,CAAC,QAAQ,IAAI,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,cAAM,CAAC,CAAA;IAC3D,OAAO,IAAA,4BAAkB,EACxB,OAAO,CAAC,EAAE,CAAC,CACV,sBAAsB,CAAI;QACzB,GAAG,IAAI;QACP,MAAM,EAAE,OAAO;YACd,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,OAAO,EAAE,CAAC;YAC3B,CAAC,CAAC,MAAM;KACT,CAAC,CACF,EACD,EAAE,MAAM,EAAE,WAAW,EAAE,CACvB,CAAA;AACF,CAAC;AAED,SAAS,WAAW,CAAC,GAAU;IAC9B,IAAG,GAAG,YAAY,SAAS,EAAE,CAAC;QAC7B,OAAO,KAAK,CAAA;IACb,CAAC;IAED,OAAO,GAAG,YAAY,qBAAa;WAC/B,GAAG,CAAC,IAAI,KAAK,qBAAqB;WAClC,GAAG,CAAC,IAAI,KAAK,mBAAmB,CAAA;AACrC,CAAC;AAED,KAAK,UAAU,sBAAsB,CACpC,EACC,IAAI,EACJ,MAAM,EACN,YAAY,EACZ,OAAO,EACP,MAAM,EACN,eAAe,EACf,MAAM,EAAE,UAAU,EAClB,MAAM,GAAG,cAAM,EACf,UAAU,EACV,oBAAoB,EACpB,GAAG,MAAM,EACqB;IAE/B,MAAM,QAAQ,GAAG,qBAAS,CAAC,IAAI,CAAC,CAAA;IAChC,MAAM,QAAQ,GAAG,IAAA,wBAAgB,EAAC,MAAM,EAAE,QAAQ,CAAC,QAAQ,CAAC,CAAA;IAC5D,MAAM,WAAW,GAAG,IAAA,wBAAgB,EAAC,MAAM,EAAE,QAAQ,CAAC,WAAW,CAAC,CAAA;IAClE,MAAM,eAAe,GAAG,IAAA,wBAAgB,EACvC,MAAM,EACN,QAAQ,CAAC,uBAAuB,CAChC,CAAA;IACD,MAAM,OAAO,GAAG;QACf,GAAG,IAAA,0BAAoB,GAAE;QACzB,GAAG,eAAe;KAClB,CAAA;IAED,IAAI,aAAa,GAAG,IAAA,wBAAgB,EAAC,MAAM,EAAE,QAAQ,CAAC,kBAAkB,CAAC,CAAA;IAEzE,MAAM,CAAC,IAAI,EAAE,IAAI,CAAC,GAAG,QAAQ,CAAC,KAAK,CAAC,GAAG,CAAC,CAAA;IACxC,MAAM,SAAS,GAAG,IAAA,8BAAsB,GAAE,CAAA;IAE1C,IAAI,MAAuB,CAAA;IAC3B,IAAI,eAAe,GAAG,KAAK,CAAA;IAE3B,MAAM,SAAS,GAAG,IAAI,GAAG,EAAuC,CAAA;IAEhE,MAAM,aAAN,MAAM,uBAAN,MAAM,CAAG,EAAE,IAAI,EAAE,YAAY,EAAE,CAAC,CAAA;IAEhC,IAAI,gBAAqD,CAAA;IACzD,MAAM,eAAe,GAAG;QACvB,IAAI;QACJ,IAAI,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,2BAAkB;QACvC,WAAW;QACX,EAAE,EAAE,IAAA,wBAAgB,GAAE;KACtB,CAAA;IAED,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAgB,EAAC;QACrC,OAAO;QACP,OAAO,EAAE,CAAC,YAAY,EAAE,EAAE;YACzB,IAAI,OAAO,GAAG,KAAK,CAAA;YACnB,IAAG,UAAU,IAAI,UAAU,EAAE,CAAC;gBAC7B,MAAM,GAAG,UAAU,CAAA;YACpB,CAAC;iBAAM,CAAC;gBACP,MAAM,GAAG,IAAA,yCAAyB,EACjC,UAAU,CAAC,GAAG,EACd,GAAG,EAAE;oBACJ,OAAO,GAAG,IAAI,CAAA;oBACd,OAAO,EAAE,YAAY,EAAE,MAAM,EAAE,CAAA;gBAChC,CAAC,CACD,CAAA;YACF,CAAC;YAED,IAAG,CAAC,OAAO,EAAE,CAAC;gBACb,MAAM;qBACJ,WAAW,EAAE;qBACb,IAAI,CAAC,GAAG,EAAE,CAAC,MAAM,CAAC,WAAW,CAAC,GAAG,YAAY,CAAC,CAAC;qBAC/C,KAAK,CAAC,GAAG,CAAC,EAAE;oBACZ,MAAM,CAAC,KAAK,CACX,EAAE,GAAG,EAAE,EACP,4BAA4B,CAC5B,CAAA;gBACF,CAAC,CAAC,CAAA;YACJ,CAAC;YAED,OAAO,MAAM,CAAA;QACd,CAAC;QACD,MAAM;QACN,OAAO,EAAE,eAAe;QACxB,SAAS,CAAC,IAAI;YACb,MAAM,CAAC,KAAK,CAAC,EAAE,KAAK,EAAE,IAAI,CAAC,MAAM,EAAE,EAAE,uBAAuB,CAAC,CAAA;YAE7D,SAAS,CAAC,OAAO,CAAC,IAAI,CAAC,CAAA;YACvB,IAAG,SAAS,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAC;gBAC3B,MAAM,aAAN,MAAM,uBAAN,MAAM,CAAE,KAAK,CAAC,wCAAwC,CAAC,CAAA;gBACvD,gDAAgD;gBAChD,gCAAgC;gBAChC,UAAU,CAAC,GAAG,EAAE;oBACf,gBAAgB,aAAhB,gBAAgB,uBAAhB,gBAAgB,EAAI,CAAA;gBACrB,CAAC,EAAE,GAAG,CAAC,CAAA;YACR,CAAC;QACF,CAAC;QACD,OAAO,CAAC,GAAG;YACV,MAAM,KAAK,GAAG,GAAG,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,OAAO,CAAA;YACrC,MAAM,aAAN,MAAM,uBAAN,MAAM,CAAG,KAAK,EAAE,EAAE,GAAG,EAAE,EAAE,mBAAmB,CAAC,CAAA;YAC7C,gBAAgB,aAAhB,gBAAgB,uBAAhB,gBAAgB,CAAG,GAAG,CAAC,CAAA;YACvB,IAAI,CAAC;gBACJ,SAAS,CAAC,WAAW,EAAE,CAAA;YACxB,CAAC;YAAC,WAAK,CAAC,CAAC,CAAC;QACX,CAAC;KACD,CAAC,CAAA;IACF,MAAM,EACL,OAAO,EAAE,UAAU,EACnB,WAAW,EACX,GAAG,MAAM,CAAC,GAAG,CAAC,WAAW,EAAE,CAAA;IAC5B,IAAG,UAAU,KAAK,QAAQ,IAAI,aAAa,KAAK,IAAI,EAAE,CAAC;QACtD,aAAa,GAAG,IAAI,CAAA;QACpB,MAAM,CAAC,IAAI,CAAC,kDAAkD,CAAC,CAAA;IAChE,CAAC;IAED,MAAM,EACL,UAAU,EACV,IAAI,EAAE,UAAU,EAChB,GAAG,QAAQ,CAAC,aAAa;IACzB,aAAa;IACb,YAAY,EACZ,MAAM,CACN,CAAA;IACD,MAAM,WAAW,GAAG,OAAO,UAAU,KAAK,QAAQ;QACjD,CAAC,CAAC,IAAA,qBAAe,EAAC,UAAU,CAAC;QAC7B,CAAC,CAAC,UAAU,CAAA;IAEb,MAAM,CAAC,KAAK,CACX,EAAE,UAAU,EAAE,UAAU,CAAC,MAAM,EAAE,EACjC,mBAAmB,CACnB,CAAA;IAED,MAAM,cAAc,GAAG,IAAI,OAAO,CACjC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;QACnB,gBAAgB,GAAG,GAAG,CAAC,EAAE,CAAC,CACzB,GAAG,CAAC,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,OAAO,EAAE,CAC7B,CAAA;IACF,CAAC,CACD,CAAA;IAED,MAAM,aAAN,MAAM,uBAAN,MAAM,CAAG,EAAE,IAAI,EAAE,sBAAsB,EAAE,CAAC,CAAA;IAE1C,IAAI,CAAC;QACJ,IAAG,aAAa,KAAK,IAAI,EAAE,CAAC;YAC3B,MAAM,eAAe,EAAE,CAAA;QACxB,CAAC;aAAM,CAAC;YACP,MAAM,0BAA0B,EAAE,CAAA;QACnC,CAAC;QAED,MAAM,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAA;IACvC,CAAC;IAAC,OAAM,GAAG,EAAE,CAAC;QACb,0DAA0D;QAC1D,wDAAwD;QACxD,qDAAqD;QACrD,iCAAiC;QACjC,MAAM,CAAC,KAAK,CACX,EAAE,GAAG,EAAE,EACP,sDAAsD,CACtD,CAAA;IACF,CAAC;IAED,MAAM,aAAN,MAAM,uBAAN,MAAM,CAAG,EAAE,IAAI,EAAE,sBAAsB,EAAE,CAAC,CAAA;IAE1C,MAAM,cAAc,CAAA;IACpB,MAAM,MAAM,CAAC,KAAK,EAAE,CAAA;IAEpB,MAAM,CAAC,IAAI,CAAC,+BAA+B,CAAC,CAAA;IAE5C,iCAAiC;IACjC,IAAG,oBAAoB,EAAE,CAAC;QACzB,MAAM,EAAE,MAAM,EAAC,YAAY,EAAE,YAAY,EAAC,kBAAkB,EAAE,GAAG,MAAM,oBAAoB,CAAC,MAAM,CAAC,UAAU,EAAE,UAAU,aAAV,UAAU,cAAV,UAAU,GAAI,QAAQ,CAAC,CAAA;QACtI,MAAM,GAAG,EAAE,GAAG,MAAM,EAAE,GAAG,YAAY,EAAE,CAAA;QACvC,YAAY,GAAG,EAAE,GAAG,YAAY,EAAE,GAAG,kBAAkB,EAAE,CAAA;IAC1D,CAAC;IAED,MAAM,YAAY,GAAG,uBAAU,CAAC,MAAO,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAA;IAE/D,IAAI,QAAoB,CAAA;IACxB,IAAI,QAAoB,CAAA;IACxB,MAAM,WAAW,GAAG,YAAY,CAAC,QAAQ,CAAC,CAAA;IAC1C,IAAG,WAAW,IAAI,WAAW,CAAC,OAAO,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;QAC7D,QAAQ,GAAG,WAAW,CAAC,OAAO,CAAC,OAAO,CAAA;IACvC,CAAC;IAED,MAAM,WAAW,GAAG,YAAY,CAAC,QAAQ,CAAC,CAAA;IAC1C,IAAG,WAAW,IAAI,WAAW,CAAC,OAAO,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;QAC7D,QAAQ,GAAG,WAAW,CAAC,OAAO,CAAC,OAAO,CAAA;IACvC,CAAC;IAGD,gDAAgD;IAChD,wDAAwD;IACxD,6BAA6B;IAC7B,MAAM,cAAc,GAAG,wBAAkB,CAAC,MAAM,CAAC;QAChD,OAAO,EAAE,eAAe;QACxB,IAAI,EAAE;YACL,QAAQ,EAAE,IAAI;YACd,UAAU,EAAE,IAAA,0BAAkB,EAAC,MAAM,CAAC;YACtC,OAAO,EAAE,IAAA,0BAAkB,EAAC,OAAO,CAAC;YACpC,UAAU,EAAE,UAAU,aAAV,UAAU,cAAV,UAAU,GAAI,IAAA,4BAAoB,GAAE;YAChD,KAAK,EAAE,UAAU,EAAE;SACnB;QACD,UAAU,EAAE,MAAM,kBAAkB,EAAE;QACtC,QAAQ,EAAE,MAAM,CAAC,QAAQ,KAAK,OAAO,CAAC,CAAC,CAAC,mBAAa,CAAC,eAAe,CAAC,CAAC,CAAC,mBAAa,CAAC,iBAAiB;QACvG,aAAa,EAAE,QAAS;QACxB,aAAa,EAAE,QAAS;KACxB,CAAC,CAAA;IAEF,MAAM,aAAN,MAAM,uBAAN,MAAM,CAAG,EAAE,IAAI,EAAE,0BAA0B,EAAE,CAAC,CAAA;IAE9C,MAAM,gBAAgB,GAAG,wBAAkB;SACzC,MAAM,CAAC,cAAc,CAAC,CAAC,MAAM,EAAE,CAAA;IACjC,MAAM,gBAAgB,GAAG,MAAM,YAAY;SACzC,IAAI,CAAC,gBAAgB,EAAE,eAAe,CAAC,CAAA;IACzC,cAAc,CAAC,UAAU,GAAG,EAAE,gBAAgB,EAAE,CAAA;IAEhD,MAAM,MAAM,GAAG,MAAM,MAAO,CAAC,GAAG,CAAC,aAAa,EAAE,cAAc,CAAC,CAAA;IAE/D,MAAM,CAAC,IAAI,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC,MAAM,CAAC,KAAK,EAAE,EAAE,qBAAqB,CAAC,CAAA;IAE/D,OAAO,MAAM,CAAA;IAEb,KAAK,UAAU,0BAA0B;;QACxC,IAAI,YAAY,GAAG,CAAC,CAAA;QACpB,KAAI,MAAM,OAAO,IAAI,UAAU,EAAE,CAAC;YACjC,MAAM,KAAK,GAAG,WAAW;iBACvB,KAAK,CAAC,YAAY,EAAE,OAAO,CAAC,SAAS,CAAC,CAAA;YACxC,IAAG,KAAK,CAAC,MAAM,EAAE,CAAC;gBACjB,MAAM,eAAe,CAAC,KAAK,EAAE,IAAI,CAAC,CAAA;YACnC,CAAC;YAED,MAAM,QAAQ,GAAG,WAAW;iBAC1B,KAAK,CAAC,OAAO,CAAC,SAAS,EAAE,OAAO,CAAC,OAAO,CAAC,CAAA;YAC3C,MAAM,eAAe,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAA;YACtC,YAAY,GAAG,OAAO,CAAC,OAAO,CAAA;QAC/B,CAAC;QAED,iCAAiC;QACjC,MAAM,cAAc,GAAG,CAAA,MAAA,UAAU,aAAV,UAAU,uBAAV,UAAU,CAAG,UAAU,CAAC,MAAM,GAAG,CAAC,CAAC,0CACvD,OAAO,KAAI,CAAC,CAAA;QACf,MAAM,KAAK,GAAG,WAAW,CAAC,KAAK,CAAC,cAAc,CAAC,CAAA;QAC/C,IAAG,KAAK,CAAC,MAAM,EAAE,CAAC;YACjB,MAAM,eAAe,CAAC,KAAK,EAAE,IAAI,CAAC,CAAA;QACnC,CAAC;IACF,CAAC;IAED,KAAK,UAAU,eAAe;QAC7B,MAAM,MAAM,CAAC,GAAG,CAAC,KAAK,CAAC,WAAW,CAAC,CAAA;QACnC,wBAAwB,CACvB;YACC,IAAI,EAAE,IAAI;YACV,iBAAiB,EAAE,IAAA,oBAAY,EAAC,WAAW,EAAE,UAAU,CAAC;SACxD,CACD,CAAA;IACF,CAAC;IAED;;;OAGG;IACH,KAAK,UAAU,eAAe,CAAC,IAAgB,EAAE,MAAe;QAC/D,2DAA2D;QAC3D,+DAA+D;QAC/D,iBAAiB;QACjB,IAAG,MAAM,KAAK,eAAe,EAAE,CAAC;YAC/B,MAAM,MAAM,CAAC,GAAG,CAAC,iBAAiB,EAAE,CAAA;QACrC,CAAC;QAED,MAAM,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,CAAA;QACxB,wDAAwD;QACxD,wBAAwB,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,IAAI,EAAE,UAAU,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC,CAAA;QACnE,eAAe,GAAG,MAAM,CAAA;IACzB,CAAC;IAED,SAAS,wBAAwB,CAChC,MAAqC;QAErC,MAAM,SAAS,GAAG,YAAY,CAAC,QAAQ,CAAC,CAAA;QACxC,IAAG,CAAC,SAAS,EAAE,CAAC;YACf,OAAM;QACP,CAAC;QAED,kBAAkB,CAAC,SAAS,CAAC,OAAO,EAAE,MAAM,CAAC,CAAA;IAC9C,CAAC;IAED,SAAS,YAAY,CAAC,MAA2B;QAChD,8CAA8C;QAC9C,KAAI,IAAI,CAAC,GAAG,MAAM,CAAC,UAAU,CAAC,MAAM,GAAG,CAAC,EAAC,CAAC,IAAI,CAAC,EAAC,CAAC,EAAE,EAAE,CAAC;YACrD,MAAM,KAAK,GAAG,MAAM,CAAC,UAAU,CAAC,CAAC,CAAC,CAAA;YAClC,IAAG,KAAK,CAAC,MAAM,KAAK,MAAM,EAAE,CAAC;gBAC5B,OAAO,KAAK,CAAA;YACb,CAAC;QACF,CAAC;IACF,CAAC;IAED;;OAEG;IACH,KAAK,UAAU,kBAAkB;QAChC,oBAAoB,EAAE,CAAA;QAEtB,MAAM,OAAO,GAAG,IAAI,CAAC,GAAG,EAAE,CAAA;QAC1B,MAAM,gBAAgB,GAAG,MAAM,IAAA,+BAAuB,EACrD,MAAM,CAAC,UAAU,EACjB,SAAS,EACT;YACC,MAAM;YACN,WAAW,EAAE,WAAY;YACzB,YAAY,CAAC,IAAI,EAAE,KAAK;gBACvB,MAAM,gBAAgB,GAAG,IAAI,CAAC,GAAG,EAAE,GAAG,OAAO,CAAA;gBAC7C,MAAM,cAAc,GAAG,gBAAgB,GAAG,IAAI,CAAA;gBAC9C,MAAM,UAAU,GAAG,cAAc,GAAG,CAAC,KAAK,GAAG,IAAI,CAAC,CAAA;gBAClD,MAAM,aAAN,MAAM,uBAAN,MAAM,CAAG;oBACR,IAAI,EAAE,sBAAsB;oBAC5B,UAAU,EAAE,IAAI;oBAChB,WAAW,EAAE,KAAK;oBAClB,eAAe,EAAE,IAAI,CAAC,KAAK,CAAC,UAAU,GAAG,IAAI,CAAC;iBAC9C,CAAC,CAAA;YACH,CAAC;YACD,GAAG,MAAM;SACT,CACD,CAAA;QAED,OAAO,gBAAgB,CAAA;IACxB,CAAC;IAED;;;;OAIG;IACH,SAAS,oBAAoB;QAC5B,MAAM,UAAU,GAAG,MAAM,CAAC,UAAU,CAAA;QACpC,IAAI,qBAAqB,GAA8D,KAAK,CAAA;QAE5F,MAAM,OAAO,GAA2B,EAAE,CAAA;QAC1C,MAAM,YAAY,GAA0B,EAAE,CAAA;QAC9C,KAAI,MAAM,CAAC,IAAI,UAAU,EAAE,CAAC;YAC3B,IAAG,CAAC,CAAC,OAAO,CAAC,IAAI,KAAK,YAAY;mBAC9B,CAAC,IAAA,yBAAiB,EAAC,CAAC,CAAC,OAAO,EAAE,UAAU,CAAC,EAC3C,CAAC;gBACF,SAAQ;YACT,CAAC;YAED,MAAM,SAAS,GAAG,UAAU,KAAK,QAAQ;gBACxC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;gBAClC,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,SAAS,CAAA;YAEtB,OAAO,CAAC,IAAI,CAAC;gBACZ,OAAO,EAAE,SAAS;gBAClB,MAAM,EAAC,CAAC,CAAC,MAAM;aACf,CAAC,CAAA;YAEF,IAAG,CAAC,CAAC,MAAM,KAAK,QAAQ,EAAE,CAAC;gBAC1B,YAAY,CAAC,IAAI,CAAC;oBACjB,SAAS,EAAC,SAAS;oBACnB,OAAO,EAAE,CAAC,CAAC,OAAO;iBAClB,CAAC,CAAA;YACH,CAAC;QACF,CAAC;QAED,QAAQ,CAAC,0BAA0B,CAAC,OAAO,EAAE;YAC5C,GAAG,MAAM;YACT,YAAY,EAAC,YAAY,CAAC,0DAA0D;SACpF,CAAC,CAAA;QAEF,IAAG,QAAQ,CAAC,qBAAqB,EAAE,CAAC;YACnC,qBAAqB,GAAG,IAAA,yBAAiB,EACxC,YAAY,EACZ,KAAK,CAAC,EAAE,CAAC,QAAQ,CAAC,qBAAsB,CACvC,KAAK,EACL,MAAM,CACN,CACD,CAAA;QACF,CAAC;QAED,IAAG,qBAAqB,KAAK,KAAK,EAAE,CAAC;YACpC,gCAAgC;YAChC,KAAI,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,IAAI,UAAU,EAAE,CAAC;gBAC7C,IAAG,MAAM,KAAK,QAAQ,EAAE,CAAC;oBACxB,kBAAkB,CAAC,OAAO,EAAE,EAAE,IAAI,EAAE,UAAU,EAAE,CAAC,CAAA;gBAClD,CAAC;YACF,CAAC;QACF,CAAC;aAAM,CAAC;YACP,KAAI,MAAM,EAAE,KAAK,EAAE,iBAAiB,EAAE,IAAI,qBAAqB,EAAE,CAAC;gBACjE,kBAAkB,CAAC,KAAK,CAAC,OAAO,EAAE;oBACjC,IAAI,EAAE,IAAI;oBACV,iBAAiB;iBACjB,CAAC,CAAA;YACH,CAAC;YAED,IAAG,KAAK,CAAC,OAAO,CAAC,qBAAqB,CAAC,EAAE,CAAC;gBACzC,MAAM,IAAI,GAAG,qBAAqB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAA;gBAChE,MAAM,gBAAgB,GAAG,cAAM,CAAC,MAAM,CAAC,IAAA,4BAAsB,EAAC,IAAI,CAAC,CAAC,CAAA;gBACpE,MAAM,CAAC,KAAK,CAAC,EAAE,gBAAgB,EAAC,gBAAgB,EAAE,CAAC,CAAA;YACpD,CAAC;QACF,CAAC;QAGD,8BAA8B;QAC9B,0CAA0C;QAC1C,cAAc;QACd,KAAI,MAAM,CAAC,IAAI,UAAU,EAAE,CAAC;YAC3B,IAAG,CAAC,CAAC,OAAO,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;gBACpC,SAAQ;YACT,CAAC;YAED,oCAAoC;YACpC,0BAA0B;YAC1B,IAAG,IAAA,yBAAiB,EAAC,CAAC,CAAC,OAAO,EAAE,UAAU,CAAC,EAAE,CAAC;gBAC7C,MAAK;YACN,CAAC;YAED,kBAAkB,CAAC,CAAC,CAAC,OAAO,EAAE,EAAE,IAAI,EAAE,UAAU,EAAE,CAAC,CAAA;QACpD,CAAC;IACF,CAAC;IAED,SAAS,kBAAkB,CAAC,OAAyB,EAAE,MAAqC;QAC3F,IAAG,MAAM,EAAE,CAAC;YACX,SAAS,CAAC,GAAG,CAAC,OAAO,EAAE,MAAM,CAAC,CAAA;YAC9B,OAAM;QACP,CAAC;QAED,SAAS,CAAC,MAAM,CAAC,OAAO,CAAC,CAAA;IAC1B,CAAC;IAED,SAAS,UAAU;QAClB,MAAM,EACL,UAAU,EACV,YAAY,GACZ,GAAG,YAAY,CAAA;QAChB,MAAM,MAAM,GAAG,YAAY,CAAC,eAAe,CAAC,CAAA;QAC5C,OAAO,UAAU,CAAC,MAAM,CAAC,CAAA;IAC1B,CAAC;AACF,CAAC"}
@@ -0,0 +1,3 @@
1
+ export * from './create-claim';
2
+ export * from './utils/attestor-pool';
3
+ export * from './utils/client-socket';
@@ -0,0 +1,20 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
14
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
15
+ };
16
+ Object.defineProperty(exports, "__esModule", { value: true });
17
+ __exportStar(require("./create-claim"), exports);
18
+ __exportStar(require("./utils/attestor-pool"), exports);
19
+ __exportStar(require("./utils/client-socket"), exports);
20
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvY2xpZW50L2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7Ozs7Ozs7Ozs7Ozs7QUFBQSxpREFBOEI7QUFDOUIsd0RBQXFDO0FBQ3JDLHdEQUFxQyJ9
@@ -0,0 +1,16 @@
1
+ import { CreateTunnelRequest } from 'src/proto/api';
2
+ import { IAttestorClient, MakeTunnelFn } from 'src/types';
3
+ export type TCPTunnelCreateOpts = {
4
+ /**
5
+ * The tunnel ID to communicate with.
6
+ */
7
+ tunnelId: CreateTunnelRequest['id'];
8
+ client: IAttestorClient;
9
+ };
10
+ /**
11
+ * Makes a tunnel communication wrapper for a TCP tunnel.
12
+ *
13
+ * It listens for messages and disconnect events from the server,
14
+ * and appropriately calls the `onMessage` and `onClose` callbacks.
15
+ */
16
+ export declare const makeRpcTcpTunnel: MakeTunnelFn<TCPTunnelCreateOpts>;
@@ -0,0 +1,60 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.makeRpcTcpTunnel = void 0;
4
+ const utils_1 = require("src/utils");
5
+ /**
6
+ * Makes a tunnel communication wrapper for a TCP tunnel.
7
+ *
8
+ * It listens for messages and disconnect events from the server,
9
+ * and appropriately calls the `onMessage` and `onClose` callbacks.
10
+ */
11
+ const makeRpcTcpTunnel = ({ tunnelId, client, onClose, onMessage, }) => {
12
+ let closed = false;
13
+ client.addEventListener('tunnel-message', onMessageListener);
14
+ client.addEventListener('tunnel-disconnect-event', onDisconnectListener);
15
+ client.addEventListener('connection-terminated', onConnectionTerminatedListener);
16
+ return {
17
+ write(message) {
18
+ return client.sendMessage({
19
+ tunnelMessage: { tunnelId, message }
20
+ });
21
+ },
22
+ async close(err) {
23
+ if (closed) {
24
+ return;
25
+ }
26
+ onErrorRecv(err);
27
+ await client.rpc('disconnectTunnel', { id: tunnelId });
28
+ }
29
+ };
30
+ function onMessageListener({ data }) {
31
+ if (data.tunnelId !== tunnelId) {
32
+ return;
33
+ }
34
+ onMessage === null || onMessage === void 0 ? void 0 : onMessage(data.message);
35
+ }
36
+ function onDisconnectListener({ data }) {
37
+ var _a;
38
+ if (data.tunnelId !== tunnelId) {
39
+ return;
40
+ }
41
+ onErrorRecv(((_a = data.error) === null || _a === void 0 ? void 0 : _a.code)
42
+ ? utils_1.AttestorError.fromProto(data.error)
43
+ : undefined);
44
+ }
45
+ function onConnectionTerminatedListener({ data }) {
46
+ onErrorRecv(data);
47
+ }
48
+ function onErrorRecv(err) {
49
+ var _a;
50
+ (_a = client.logger) === null || _a === void 0 ? void 0 : _a.debug({ tunnelId, err }, 'TCP tunnel closed');
51
+ client.removeEventListener('tunnel-message', onMessageListener);
52
+ client.removeEventListener('tunnel-disconnect-event', onDisconnectListener);
53
+ client.removeEventListener('connection-terminated', onConnectionTerminatedListener);
54
+ onClose === null || onClose === void 0 ? void 0 : onClose(err);
55
+ onClose = undefined;
56
+ closed = true;
57
+ }
58
+ };
59
+ exports.makeRpcTcpTunnel = makeRpcTcpTunnel;
60
+ //# sourceMappingURL=data:application/json;base64,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