@trufnetwork/sdk-js 0.5.6 → 0.5.8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -155,8 +155,8 @@ var AttestationAction = class extends import_action.Action {
155
155
  /**
156
156
  * List attestation metadata with optional filtering
157
157
  *
158
- * This returns metadata for attestations, optionally filtered by requester address or request transaction ID.
159
- * Supports pagination and sorting.
158
+ * This returns metadata for attestations, optionally filtered by requester address, request transaction ID,
159
+ * attestation hash, or result canonical bytes. Supports pagination and sorting.
160
160
  *
161
161
  * @param input - Filter and pagination parameters
162
162
  * @returns Promise resolving to array of attestation metadata
@@ -185,6 +185,8 @@ var AttestationAction = class extends import_action.Action {
185
185
  const params = {
186
186
  $requester: input.requester ?? new Uint8Array(0),
187
187
  $request_tx_id: input.requestTxId ?? null,
188
+ $attestation_hash: input.attestationHash ?? new Uint8Array(0),
189
+ $result_canonical: input.resultCanonical ?? new Uint8Array(0),
188
190
  $limit: limit,
189
191
  $offset: offset,
190
192
  $order_by: input.orderBy ?? null
@@ -207,25 +209,31 @@ function parseAttestationRow(row, idx) {
207
209
  let requestTxId;
208
210
  let attestationHash;
209
211
  let requester;
212
+ let dataProvider;
213
+ let streamId;
210
214
  let createdHeight;
211
215
  let signedHeight;
212
216
  let encryptSig;
213
217
  if (Array.isArray(row)) {
214
- if (row.length < 6) {
218
+ if (row.length < 8) {
215
219
  throw new Error(
216
- `Row ${idx}: expected 6 columns, got ${row.length}`
220
+ `Row ${idx}: expected 8 columns, got ${row.length}`
217
221
  );
218
222
  }
219
223
  requestTxId = row[0];
220
224
  attestationHash = decodeBytea(row[1], idx, "attestation_hash");
221
225
  requester = decodeBytea(row[2], idx, "requester");
222
- createdHeight = parseInt(row[3], 10);
223
- signedHeight = row[4] !== null ? parseInt(row[4], 10) : null;
224
- encryptSig = row[5];
226
+ dataProvider = row[3];
227
+ streamId = row[4];
228
+ createdHeight = parseInt(row[5], 10);
229
+ signedHeight = row[6] !== null ? parseInt(row[6], 10) : null;
230
+ encryptSig = row[7];
225
231
  } else {
226
232
  requestTxId = row.request_tx_id;
227
233
  attestationHash = decodeBytea(row.attestation_hash, idx, "attestation_hash");
228
234
  requester = decodeBytea(row.requester, idx, "requester");
235
+ dataProvider = row.data_provider;
236
+ streamId = row.stream_id;
229
237
  createdHeight = parseInt(row.created_height, 10);
230
238
  signedHeight = row.signed_height !== null ? parseInt(row.signed_height, 10) : null;
231
239
  encryptSig = row.encrypt_sig;
@@ -234,6 +242,8 @@ function parseAttestationRow(row, idx) {
234
242
  requestTxId,
235
243
  attestationHash,
236
244
  requester,
245
+ dataProvider,
246
+ streamId,
237
247
  createdHeight,
238
248
  signedHeight,
239
249
  encryptSig
@@ -294,6 +304,8 @@ if (import_meta.vitest) {
294
304
  "tx123",
295
305
  Buffer.from([1, 2, 3]).toString("base64"),
296
306
  Buffer.from([4, 5, 6]).toString("base64"),
307
+ "0x4710a8d8f0d845da110086812a32de6d90d7ff5c",
308
+ "stai0000000000000000000000000000",
297
309
  "100",
298
310
  "200",
299
311
  true
@@ -302,6 +314,8 @@ if (import_meta.vitest) {
302
314
  expect(metadata.requestTxId).toBe("tx123");
303
315
  expect(Array.from(metadata.attestationHash)).toEqual([1, 2, 3]);
304
316
  expect(Array.from(metadata.requester)).toEqual([4, 5, 6]);
317
+ expect(metadata.dataProvider).toBe("0x4710a8d8f0d845da110086812a32de6d90d7ff5c");
318
+ expect(metadata.streamId).toBe("stai0000000000000000000000000000");
305
319
  expect(metadata.createdHeight).toBe(100);
306
320
  expect(metadata.signedHeight).toBe(200);
307
321
  expect(metadata.encryptSig).toBe(true);
@@ -311,6 +325,8 @@ if (import_meta.vitest) {
311
325
  request_tx_id: "tx456",
312
326
  attestation_hash: Buffer.from([7, 8, 9]).toString("base64"),
313
327
  requester: Buffer.from([10, 11, 12]).toString("base64"),
328
+ data_provider: "0x1234567890123456789012345678901234567890",
329
+ stream_id: "stbx0000000000000000000000000000",
314
330
  created_height: "300",
315
331
  signed_height: null,
316
332
  encrypt_sig: false
@@ -319,6 +335,8 @@ if (import_meta.vitest) {
319
335
  expect(metadata.requestTxId).toBe("tx456");
320
336
  expect(Array.from(metadata.attestationHash)).toEqual([7, 8, 9]);
321
337
  expect(Array.from(metadata.requester)).toEqual([10, 11, 12]);
338
+ expect(metadata.dataProvider).toBe("0x1234567890123456789012345678901234567890");
339
+ expect(metadata.streamId).toBe("stbx0000000000000000000000000000");
322
340
  expect(metadata.createdHeight).toBe(300);
323
341
  expect(metadata.signedHeight).toBe(null);
324
342
  expect(metadata.encryptSig).toBe(false);
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../src/contracts-api/attestationAction.ts"],
4
- "sourcesContent": ["/**\n * Attestation action implementation\n *\n * This module provides methods for requesting, retrieving, and listing attestations.\n * Attestations are cryptographically signed proofs of query results that can be\n * consumed by smart contracts and external applications.\n */\n\nimport { Types, Utils } from '@trufnetwork/kwil-js';\nimport { Action } from './action';\nimport {\n RequestAttestationInput,\n RequestAttestationResult,\n GetSignedAttestationInput,\n SignedAttestationResult,\n ListAttestationsInput,\n AttestationMetadata,\n validateAttestationRequest,\n validateListAttestationsInput,\n} from '../types/attestation';\nimport { encodeActionArgs } from '../util/AttestationEncoding';\n\n/**\n * AttestationAction provides methods for working with data attestations\n *\n * Attestations enable validators to cryptographically sign query results,\n * providing verifiable proofs that can be used in smart contracts.\n *\n * @example\n * ```typescript\n * const client = new NodeTNClient({ ... });\n * const attestationAction = client.loadAttestationAction();\n *\n * // Request an attestation\n * const result = await attestationAction.requestAttestation({\n * dataProvider: \"0x4710a8d8f0d845da110086812a32de6d90d7ff5c\",\n * streamId: \"stai0000000000000000000000000000\",\n * actionName: \"get_record\",\n * args: [dataProvider, streamId, fromTime, toTime, null, false],\n * encryptSig: false,\n * maxFee: 1000000,\n * });\n *\n * // Wait for signing (1-2 blocks)\n * await new Promise(resolve => setTimeout(resolve, 10000));\n *\n * // Retrieve signed attestation\n * const signed = await attestationAction.getSignedAttestation({\n * requestTxId: result.requestTxId,\n * });\n * ```\n */\nexport class AttestationAction extends Action {\n /**\n * Request a signed attestation of query results\n *\n * This submits a transaction requesting that validators execute a query\n * and sign the results. The leader validator will sign the attestation\n * asynchronously (typically 1-2 blocks later).\n *\n * @param input - Attestation request parameters\n * @returns Promise resolving to request result with transaction ID\n * @throws Error if validation fails or transaction fails\n *\n * @example\n * ```typescript\n * const result = await attestationAction.requestAttestation({\n * dataProvider: \"0x4710a8d8f0d845da110086812a32de6d90d7ff5c\",\n * streamId: \"stai0000000000000000000000000000\",\n * actionName: \"get_record\",\n * args: [\n * \"0x4710a8d8f0d845da110086812a32de6d90d7ff5c\",\n * \"stai0000000000000000000000000000\",\n * Math.floor(Date.now() / 1000) - 86400, // 1 day ago\n * Math.floor(Date.now() / 1000),\n * null,\n * false,\n * ],\n * encryptSig: false,\n * maxFee: 1000000,\n * });\n * console.log(`Request TX ID: ${result.requestTxId}`);\n * ```\n */\n async requestAttestation(\n input: RequestAttestationInput\n ): Promise<RequestAttestationResult> {\n // Validate input\n validateAttestationRequest(input);\n\n // Encode arguments\n const argsBytes = encodeActionArgs(input.args);\n\n // Prepare named parameters for request_attestation action\n // Note: maxFee must be a string with NUMERIC type to encode as NUMERIC(788,0) for wei amounts\n const params: Types.NamedParams[] = [{\n $data_provider: input.dataProvider,\n $stream_id: input.streamId,\n $action_name: input.actionName,\n $args_bytes: argsBytes,\n $encrypt_sig: input.encryptSig,\n $max_fee: input.maxFee.toString(),\n }];\n\n // Specify types - maxFee needs NUMERIC(78,0) for large wei amounts\n const types = {\n $max_fee: Utils.DataType.Numeric(78, 0),\n };\n\n // Execute request_attestation action\n const result = await this.executeWithNamedParams('request_attestation', params, types);\n\n // Check for errors\n if (!result.data?.tx_hash) {\n throw new Error(\n 'Failed to request attestation: no transaction hash returned'\n );\n }\n\n // Return the 64-char hex tx_hash\n return {\n requestTxId: result.data.tx_hash,\n };\n }\n\n /**\n * Retrieve a complete signed attestation payload\n *\n * This fetches the signed attestation payload for a given request transaction ID.\n * The attestation must have been signed by the leader validator first.\n *\n * If the attestation is not yet signed, this will throw an error. Clients should\n * poll with exponential backoff or wait for 1-2 blocks after requesting.\n *\n * @param input - Request transaction ID\n * @returns Promise resolving to signed attestation payload\n * @throws Error if attestation not found or not yet signed\n *\n * @example\n * ```typescript\n * // Poll for signature\n * for (let i = 0; i < 15; i++) {\n * try {\n * const signed = await attestationAction.getSignedAttestation({\n * requestTxId: \"0x123...\",\n * });\n * console.log(`Payload: ${Buffer.from(signed.payload).toString('hex')}`);\n * break;\n * } catch (e) {\n * await new Promise(resolve => setTimeout(resolve, 2000));\n * }\n * }\n * ```\n */\n async getSignedAttestation(\n input: GetSignedAttestationInput\n ): Promise<SignedAttestationResult> {\n // Validate and normalize input\n const trimmed = input.requestTxId?.trim() || '';\n if (trimmed === '') {\n throw new Error('request_tx_id is required');\n }\n\n // Strip optional \"0x\" prefix and lowercase for normalization\n const normalizedRequestTxId = trimmed.startsWith('0x')\n ? trimmed.slice(2).toLowerCase()\n : trimmed.toLowerCase();\n\n // Call get_signed_attestation view action\n const result = await this.call<Array<{ payload: string | Uint8Array }>>(\n 'get_signed_attestation',\n { $request_tx_id: normalizedRequestTxId }\n );\n\n // Extract the right value from Either, or throw if Left\n const data = result.throw();\n\n // The action returns an array of rows - extract the first row\n if (!data || !Array.isArray(data) || data.length === 0) {\n throw new Error('No attestation found for request_tx_id - may not exist or is not yet signed');\n }\n\n const row = data[0];\n if (!row || !row.payload) {\n throw new Error('No payload in attestation row');\n }\n\n // Decode base64 to bytes\n let payloadBytes: Uint8Array;\n const payloadValue = row.payload;\n\n if (typeof payloadValue === 'string') {\n // Node.js environment\n if (typeof Buffer !== 'undefined') {\n payloadBytes = new Uint8Array(Buffer.from(payloadValue, 'base64'));\n } else {\n // Browser environment\n const binaryString = atob(payloadValue);\n payloadBytes = new Uint8Array(binaryString.length);\n for (let i = 0; i < binaryString.length; i++) {\n payloadBytes[i] = binaryString.charCodeAt(i);\n }\n }\n } else if (payloadValue instanceof Uint8Array) {\n // Already decoded\n payloadBytes = payloadValue;\n } else {\n throw new Error(`Unexpected payload type: ${typeof payloadValue}`);\n }\n\n return {\n payload: payloadBytes,\n };\n }\n\n /**\n * List attestation metadata with optional filtering\n *\n * This returns metadata for attestations, optionally filtered by requester address or request transaction ID.\n * Supports pagination and sorting.\n *\n * @param input - Filter and pagination parameters\n * @returns Promise resolving to array of attestation metadata\n * @throws Error if parameters are invalid\n *\n * @example\n * ```typescript\n * // List my recent attestations\n * const myAddress = new Uint8Array(Buffer.from(wallet.address.slice(2), 'hex'));\n * const attestations = await attestationAction.listAttestations({\n * requester: myAddress,\n * limit: 10,\n * offset: 0,\n * orderBy: \"created_height desc\",\n * });\n *\n * attestations.forEach(att => {\n * console.log(`TX: ${att.requestTxId}, Height: ${att.createdHeight}`);\n * });\n * ```\n */\n async listAttestations(\n input: ListAttestationsInput\n ): Promise<AttestationMetadata[]> {\n // Validate input\n validateListAttestationsInput(input);\n\n // Set defaults\n const limit = input.limit ?? 5000;\n const offset = input.offset ?? 0;\n\n // Prepare parameters for list_attestations view action\n // Note: Empty Uint8Array represents BYTEA NULL (handled by kwil-js 0.9.10+)\n const params: Types.NamedParams = {\n $requester: input.requester ?? new Uint8Array(0),\n $request_tx_id: input.requestTxId ?? null,\n $limit: limit,\n $offset: offset,\n $order_by: input.orderBy ?? null,\n };\n\n // Call list_attestations view action\n const result = await this.call<any[]>('list_attestations', params);\n\n // Check for errors\n if (result.isLeft()) {\n throw new Error(\n `Failed to list attestations: HTTP status ${result.value}`\n );\n }\n\n // Extract the right value from Either\n // Note: result.value might be a getter function, so call it if needed\n const rightValue = typeof result.value === 'function' ? result.value() : result.value;\n const rows = Array.isArray(rightValue) ? rightValue : [];\n\n // If no rows, return empty array\n if (!rows || rows.length === 0) {\n return [];\n }\n\n // Parse rows into AttestationMetadata\n return rows.map((row: any, idx: number) => parseAttestationRow(row, idx));\n }\n}\n\n/**\n * Parse a single row from list_attestations result into AttestationMetadata\n *\n * Expected columns (in order):\n * 0. request_tx_id (TEXT)\n * 1. attestation_hash (BYTEA)\n * 2. requester (BYTEA)\n * 3. created_height (INT8)\n * 4. signed_height (INT8, nullable)\n * 5. encrypt_sig (BOOLEAN)\n */\nfunction parseAttestationRow(row: any, idx: number): AttestationMetadata {\n // kwil-js returns rows as objects with column names as keys\n // or as arrays depending on the query format\n let requestTxId: string;\n let attestationHash: Uint8Array;\n let requester: Uint8Array;\n let createdHeight: number;\n let signedHeight: number | null;\n let encryptSig: boolean;\n\n // Handle both array and object formats\n if (Array.isArray(row)) {\n // Array format: [col0, col1, col2, ...]\n if (row.length < 6) {\n throw new Error(\n `Row ${idx}: expected 6 columns, got ${row.length}`\n );\n }\n\n requestTxId = row[0];\n attestationHash = decodeBytea(row[1], idx, 'attestation_hash');\n requester = decodeBytea(row[2], idx, 'requester');\n createdHeight = parseInt(row[3], 10);\n signedHeight = row[4] !== null ? parseInt(row[4], 10) : null;\n encryptSig = row[5];\n } else {\n // Object format: { request_tx_id: ..., attestation_hash: ..., ... }\n requestTxId = row.request_tx_id;\n attestationHash = decodeBytea(row.attestation_hash, idx, 'attestation_hash');\n requester = decodeBytea(row.requester, idx, 'requester');\n createdHeight = parseInt(row.created_height, 10);\n signedHeight = row.signed_height !== null ? parseInt(row.signed_height, 10) : null;\n encryptSig = row.encrypt_sig;\n }\n\n return {\n requestTxId,\n attestationHash,\n requester,\n createdHeight,\n signedHeight,\n encryptSig,\n };\n}\n\n/**\n * Decode a BYTEA column from base64\n */\nfunction decodeBytea(value: any, rowIdx: number, colName: string): Uint8Array {\n if (value === null || value === undefined) {\n throw new Error(`Row ${rowIdx}: ${colName} is null or undefined`);\n }\n\n // If already Uint8Array, return as-is\n if (value instanceof Uint8Array) {\n return value;\n }\n\n // If string, decode from base64\n if (typeof value === 'string') {\n try {\n // Node.js environment\n if (typeof Buffer !== 'undefined') {\n return new Uint8Array(Buffer.from(value, 'base64'));\n } else {\n // Browser environment\n const binaryString = atob(value);\n const bytes = new Uint8Array(binaryString.length);\n for (let i = 0; i < binaryString.length; i++) {\n bytes[i] = binaryString.charCodeAt(i);\n }\n return bytes;\n }\n } catch (err) {\n throw new Error(\n `Row ${rowIdx}: failed to decode ${colName} as base64: ${err}`\n );\n }\n }\n\n throw new Error(\n `Row ${rowIdx}: expected ${colName} to be string or Uint8Array, got ${typeof value}`\n );\n}\n\n// Inline unit tests\nif (import.meta.vitest) {\n const { describe, it, expect } = import.meta.vitest;\n\n describe('decodeBytea', () => {\n it('should decode base64 string', () => {\n const base64 = Buffer.from([1, 2, 3, 4]).toString('base64');\n const decoded = decodeBytea(base64, 0, 'test');\n expect(Array.from(decoded)).toEqual([1, 2, 3, 4]);\n });\n\n it('should return Uint8Array as-is', () => {\n const bytes = new Uint8Array([1, 2, 3, 4]);\n const decoded = decodeBytea(bytes, 0, 'test');\n expect(decoded).toBe(bytes);\n });\n\n it('should throw on null', () => {\n expect(() => decodeBytea(null, 0, 'test')).toThrow('null or undefined');\n });\n\n it('should throw on invalid type', () => {\n expect(() => decodeBytea(123, 0, 'test')).toThrow('expected test to be string or Uint8Array');\n });\n });\n\n describe('parseAttestationRow', () => {\n it('should parse array format row', () => {\n const row = [\n 'tx123',\n Buffer.from([1, 2, 3]).toString('base64'),\n Buffer.from([4, 5, 6]).toString('base64'),\n '100',\n '200',\n true,\n ];\n\n const metadata = parseAttestationRow(row, 0);\n\n expect(metadata.requestTxId).toBe('tx123');\n expect(Array.from(metadata.attestationHash)).toEqual([1, 2, 3]);\n expect(Array.from(metadata.requester)).toEqual([4, 5, 6]);\n expect(metadata.createdHeight).toBe(100);\n expect(metadata.signedHeight).toBe(200);\n expect(metadata.encryptSig).toBe(true);\n });\n\n it('should parse object format row', () => {\n const row = {\n request_tx_id: 'tx456',\n attestation_hash: Buffer.from([7, 8, 9]).toString('base64'),\n requester: Buffer.from([10, 11, 12]).toString('base64'),\n created_height: '300',\n signed_height: null,\n encrypt_sig: false,\n };\n\n const metadata = parseAttestationRow(row, 0);\n\n expect(metadata.requestTxId).toBe('tx456');\n expect(Array.from(metadata.attestationHash)).toEqual([7, 8, 9]);\n expect(Array.from(metadata.requester)).toEqual([10, 11, 12]);\n expect(metadata.createdHeight).toBe(300);\n expect(metadata.signedHeight).toBe(null);\n expect(metadata.encryptSig).toBe(false);\n });\n });\n}\n"],
5
- "mappings": ";;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAQA,qBAA6B;AAC7B,oBAAuB;AACvB,yBASO;AACP,iCAAiC;AApBjC;AAoDO,IAAM,oBAAN,cAAgC,qBAAO;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAgC5C,MAAM,mBACJ,OACmC;AAEnC,uDAA2B,KAAK;AAGhC,UAAM,gBAAY,6CAAiB,MAAM,IAAI;AAI7C,UAAM,SAA8B,CAAC;AAAA,MACnC,gBAAgB,MAAM;AAAA,MACtB,YAAY,MAAM;AAAA,MAClB,cAAc,MAAM;AAAA,MACpB,aAAa;AAAA,MACb,cAAc,MAAM;AAAA,MACpB,UAAU,MAAM,OAAO,SAAS;AAAA,IAClC,CAAC;AAGD,UAAM,QAAQ;AAAA,MACZ,UAAU,qBAAM,SAAS,QAAQ,IAAI,CAAC;AAAA,IACxC;AAGA,UAAM,SAAS,MAAM,KAAK,uBAAuB,uBAAuB,QAAQ,KAAK;AAGrF,QAAI,CAAC,OAAO,MAAM,SAAS;AACzB,YAAM,IAAI;AAAA,QACR;AAAA,MACF;AAAA,IACF;AAGA,WAAO;AAAA,MACL,aAAa,OAAO,KAAK;AAAA,IAC3B;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EA+BA,MAAM,qBACJ,OACkC;AAElC,UAAM,UAAU,MAAM,aAAa,KAAK,KAAK;AAC7C,QAAI,YAAY,IAAI;AAClB,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AAGA,UAAM,wBAAwB,QAAQ,WAAW,IAAI,IACjD,QAAQ,MAAM,CAAC,EAAE,YAAY,IAC7B,QAAQ,YAAY;AAGxB,UAAM,SAAS,MAAM,KAAK;AAAA,MACxB;AAAA,MACA,EAAE,gBAAgB,sBAAsB;AAAA,IAC1C;AAGA,UAAM,OAAO,OAAO,MAAM;AAG1B,QAAI,CAAC,QAAQ,CAAC,MAAM,QAAQ,IAAI,KAAK,KAAK,WAAW,GAAG;AACtD,YAAM,IAAI,MAAM,6EAA6E;AAAA,IAC/F;AAEA,UAAM,MAAM,KAAK,CAAC;AAClB,QAAI,CAAC,OAAO,CAAC,IAAI,SAAS;AACxB,YAAM,IAAI,MAAM,+BAA+B;AAAA,IACjD;AAGA,QAAI;AACJ,UAAM,eAAe,IAAI;AAEzB,QAAI,OAAO,iBAAiB,UAAU;AAEpC,UAAI,OAAO,WAAW,aAAa;AACjC,uBAAe,IAAI,WAAW,OAAO,KAAK,cAAc,QAAQ,CAAC;AAAA,MACnE,OAAO;AAEL,cAAM,eAAe,KAAK,YAAY;AACtC,uBAAe,IAAI,WAAW,aAAa,MAAM;AACjD,iBAAS,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;AAC5C,uBAAa,CAAC,IAAI,aAAa,WAAW,CAAC;AAAA,QAC7C;AAAA,MACF;AAAA,IACF,WAAW,wBAAwB,YAAY;AAE7C,qBAAe;AAAA,IACjB,OAAO;AACL,YAAM,IAAI,MAAM,4BAA4B,OAAO,YAAY,EAAE;AAAA,IACnE;AAEA,WAAO;AAAA,MACL,SAAS;AAAA,IACX;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EA4BA,MAAM,iBACJ,OACgC;AAEhC,0DAA8B,KAAK;AAGnC,UAAM,QAAQ,MAAM,SAAS;AAC7B,UAAM,SAAS,MAAM,UAAU;AAI/B,UAAM,SAA4B;AAAA,MAChC,YAAY,MAAM,aAAa,IAAI,WAAW,CAAC;AAAA,MAC/C,gBAAgB,MAAM,eAAe;AAAA,MACrC,QAAQ;AAAA,MACR,SAAS;AAAA,MACT,WAAW,MAAM,WAAW;AAAA,IAC9B;AAGA,UAAM,SAAS,MAAM,KAAK,KAAY,qBAAqB,MAAM;AAGjE,QAAI,OAAO,OAAO,GAAG;AACnB,YAAM,IAAI;AAAA,QACR,4CAA4C,OAAO,KAAK;AAAA,MAC1D;AAAA,IACF;AAIA,UAAM,aAAa,OAAO,OAAO,UAAU,aAAa,OAAO,MAAM,IAAI,OAAO;AAChF,UAAM,OAAO,MAAM,QAAQ,UAAU,IAAI,aAAa,CAAC;AAGvD,QAAI,CAAC,QAAQ,KAAK,WAAW,GAAG;AAC9B,aAAO,CAAC;AAAA,IACV;AAGA,WAAO,KAAK,IAAI,CAAC,KAAU,QAAgB,oBAAoB,KAAK,GAAG,CAAC;AAAA,EAC1E;AACF;AAaA,SAAS,oBAAoB,KAAU,KAAkC;AAGvE,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AAGJ,MAAI,MAAM,QAAQ,GAAG,GAAG;AAEtB,QAAI,IAAI,SAAS,GAAG;AAClB,YAAM,IAAI;AAAA,QACR,OAAO,GAAG,6BAA6B,IAAI,MAAM;AAAA,MACnD;AAAA,IACF;AAEA,kBAAc,IAAI,CAAC;AACnB,sBAAkB,YAAY,IAAI,CAAC,GAAG,KAAK,kBAAkB;AAC7D,gBAAY,YAAY,IAAI,CAAC,GAAG,KAAK,WAAW;AAChD,oBAAgB,SAAS,IAAI,CAAC,GAAG,EAAE;AACnC,mBAAe,IAAI,CAAC,MAAM,OAAO,SAAS,IAAI,CAAC,GAAG,EAAE,IAAI;AACxD,iBAAa,IAAI,CAAC;AAAA,EACpB,OAAO;AAEL,kBAAc,IAAI;AAClB,sBAAkB,YAAY,IAAI,kBAAkB,KAAK,kBAAkB;AAC3E,gBAAY,YAAY,IAAI,WAAW,KAAK,WAAW;AACvD,oBAAgB,SAAS,IAAI,gBAAgB,EAAE;AAC/C,mBAAe,IAAI,kBAAkB,OAAO,SAAS,IAAI,eAAe,EAAE,IAAI;AAC9E,iBAAa,IAAI;AAAA,EACnB;AAEA,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;AAKA,SAAS,YAAY,OAAY,QAAgB,SAA6B;AAC5E,MAAI,UAAU,QAAQ,UAAU,QAAW;AACzC,UAAM,IAAI,MAAM,OAAO,MAAM,KAAK,OAAO,uBAAuB;AAAA,EAClE;AAGA,MAAI,iBAAiB,YAAY;AAC/B,WAAO;AAAA,EACT;AAGA,MAAI,OAAO,UAAU,UAAU;AAC7B,QAAI;AAEF,UAAI,OAAO,WAAW,aAAa;AACjC,eAAO,IAAI,WAAW,OAAO,KAAK,OAAO,QAAQ,CAAC;AAAA,MACpD,OAAO;AAEL,cAAM,eAAe,KAAK,KAAK;AAC/B,cAAM,QAAQ,IAAI,WAAW,aAAa,MAAM;AAChD,iBAAS,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;AAC5C,gBAAM,CAAC,IAAI,aAAa,WAAW,CAAC;AAAA,QACtC;AACA,eAAO;AAAA,MACT;AAAA,IACF,SAAS,KAAK;AACZ,YAAM,IAAI;AAAA,QACR,OAAO,MAAM,sBAAsB,OAAO,eAAe,GAAG;AAAA,MAC9D;AAAA,IACF;AAAA,EACF;AAEA,QAAM,IAAI;AAAA,IACR,OAAO,MAAM,cAAc,OAAO,oCAAoC,OAAO,KAAK;AAAA,EACpF;AACF;AAGA,IAAI,YAAY,QAAQ;AACtB,QAAM,EAAE,UAAU,IAAI,OAAO,IAAI,YAAY;AAE7C,WAAS,eAAe,MAAM;AAC5B,OAAG,+BAA+B,MAAM;AACtC,YAAM,SAAS,OAAO,KAAK,CAAC,GAAG,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAC1D,YAAM,UAAU,YAAY,QAAQ,GAAG,MAAM;AAC7C,aAAO,MAAM,KAAK,OAAO,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,GAAG,CAAC,CAAC;AAAA,IAClD,CAAC;AAED,OAAG,kCAAkC,MAAM;AACzC,YAAM,QAAQ,IAAI,WAAW,CAAC,GAAG,GAAG,GAAG,CAAC,CAAC;AACzC,YAAM,UAAU,YAAY,OAAO,GAAG,MAAM;AAC5C,aAAO,OAAO,EAAE,KAAK,KAAK;AAAA,IAC5B,CAAC;AAED,OAAG,wBAAwB,MAAM;AAC/B,aAAO,MAAM,YAAY,MAAM,GAAG,MAAM,CAAC,EAAE,QAAQ,mBAAmB;AAAA,IACxE,CAAC;AAED,OAAG,gCAAgC,MAAM;AACvC,aAAO,MAAM,YAAY,KAAK,GAAG,MAAM,CAAC,EAAE,QAAQ,0CAA0C;AAAA,IAC9F,CAAC;AAAA,EACH,CAAC;AAED,WAAS,uBAAuB,MAAM;AACpC,OAAG,iCAAiC,MAAM;AACxC,YAAM,MAAM;AAAA,QACV;AAAA,QACA,OAAO,KAAK,CAAC,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAAA,QACxC,OAAO,KAAK,CAAC,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAAA,QACxC;AAAA,QACA;AAAA,QACA;AAAA,MACF;AAEA,YAAM,WAAW,oBAAoB,KAAK,CAAC;AAE3C,aAAO,SAAS,WAAW,EAAE,KAAK,OAAO;AACzC,aAAO,MAAM,KAAK,SAAS,eAAe,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;AAC9D,aAAO,MAAM,KAAK,SAAS,SAAS,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;AACxD,aAAO,SAAS,aAAa,EAAE,KAAK,GAAG;AACvC,aAAO,SAAS,YAAY,EAAE,KAAK,GAAG;AACtC,aAAO,SAAS,UAAU,EAAE,KAAK,IAAI;AAAA,IACvC,CAAC;AAED,OAAG,kCAAkC,MAAM;AACzC,YAAM,MAAM;AAAA,QACV,eAAe;AAAA,QACf,kBAAkB,OAAO,KAAK,CAAC,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAAA,QAC1D,WAAW,OAAO,KAAK,CAAC,IAAI,IAAI,EAAE,CAAC,EAAE,SAAS,QAAQ;AAAA,QACtD,gBAAgB;AAAA,QAChB,eAAe;AAAA,QACf,aAAa;AAAA,MACf;AAEA,YAAM,WAAW,oBAAoB,KAAK,CAAC;AAE3C,aAAO,SAAS,WAAW,EAAE,KAAK,OAAO;AACzC,aAAO,MAAM,KAAK,SAAS,eAAe,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;AAC9D,aAAO,MAAM,KAAK,SAAS,SAAS,CAAC,EAAE,QAAQ,CAAC,IAAI,IAAI,EAAE,CAAC;AAC3D,aAAO,SAAS,aAAa,EAAE,KAAK,GAAG;AACvC,aAAO,SAAS,YAAY,EAAE,KAAK,IAAI;AACvC,aAAO,SAAS,UAAU,EAAE,KAAK,KAAK;AAAA,IACxC,CAAC;AAAA,EACH,CAAC;AACH;",
4
+ "sourcesContent": ["/**\n * Attestation action implementation\n *\n * This module provides methods for requesting, retrieving, and listing attestations.\n * Attestations are cryptographically signed proofs of query results that can be\n * consumed by smart contracts and external applications.\n */\n\nimport { Types, Utils } from '@trufnetwork/kwil-js';\nimport { Action } from './action';\nimport {\n RequestAttestationInput,\n RequestAttestationResult,\n GetSignedAttestationInput,\n SignedAttestationResult,\n ListAttestationsInput,\n AttestationMetadata,\n validateAttestationRequest,\n validateListAttestationsInput,\n} from '../types/attestation';\nimport { encodeActionArgs } from '../util/AttestationEncoding';\n\n/**\n * AttestationAction provides methods for working with data attestations\n *\n * Attestations enable validators to cryptographically sign query results,\n * providing verifiable proofs that can be used in smart contracts.\n *\n * @example\n * ```typescript\n * const client = new NodeTNClient({ ... });\n * const attestationAction = client.loadAttestationAction();\n *\n * // Request an attestation\n * const result = await attestationAction.requestAttestation({\n * dataProvider: \"0x4710a8d8f0d845da110086812a32de6d90d7ff5c\",\n * streamId: \"stai0000000000000000000000000000\",\n * actionName: \"get_record\",\n * args: [dataProvider, streamId, fromTime, toTime, null, false],\n * encryptSig: false,\n * maxFee: 1000000,\n * });\n *\n * // Wait for signing (1-2 blocks)\n * await new Promise(resolve => setTimeout(resolve, 10000));\n *\n * // Retrieve signed attestation\n * const signed = await attestationAction.getSignedAttestation({\n * requestTxId: result.requestTxId,\n * });\n * ```\n */\nexport class AttestationAction extends Action {\n /**\n * Request a signed attestation of query results\n *\n * This submits a transaction requesting that validators execute a query\n * and sign the results. The leader validator will sign the attestation\n * asynchronously (typically 1-2 blocks later).\n *\n * @param input - Attestation request parameters\n * @returns Promise resolving to request result with transaction ID\n * @throws Error if validation fails or transaction fails\n *\n * @example\n * ```typescript\n * const result = await attestationAction.requestAttestation({\n * dataProvider: \"0x4710a8d8f0d845da110086812a32de6d90d7ff5c\",\n * streamId: \"stai0000000000000000000000000000\",\n * actionName: \"get_record\",\n * args: [\n * \"0x4710a8d8f0d845da110086812a32de6d90d7ff5c\",\n * \"stai0000000000000000000000000000\",\n * Math.floor(Date.now() / 1000) - 86400, // 1 day ago\n * Math.floor(Date.now() / 1000),\n * null,\n * false,\n * ],\n * encryptSig: false,\n * maxFee: 1000000,\n * });\n * console.log(`Request TX ID: ${result.requestTxId}`);\n * ```\n */\n async requestAttestation(\n input: RequestAttestationInput\n ): Promise<RequestAttestationResult> {\n // Validate input\n validateAttestationRequest(input);\n\n // Encode arguments\n const argsBytes = encodeActionArgs(input.args);\n\n // Prepare named parameters for request_attestation action\n // Note: maxFee must be a string with NUMERIC type to encode as NUMERIC(788,0) for wei amounts\n const params: Types.NamedParams[] = [{\n $data_provider: input.dataProvider,\n $stream_id: input.streamId,\n $action_name: input.actionName,\n $args_bytes: argsBytes,\n $encrypt_sig: input.encryptSig,\n $max_fee: input.maxFee.toString(),\n }];\n\n // Specify types - maxFee needs NUMERIC(78,0) for large wei amounts\n const types = {\n $max_fee: Utils.DataType.Numeric(78, 0),\n };\n\n // Execute request_attestation action\n const result = await this.executeWithNamedParams('request_attestation', params, types);\n\n // Check for errors\n if (!result.data?.tx_hash) {\n throw new Error(\n 'Failed to request attestation: no transaction hash returned'\n );\n }\n\n // Return the 64-char hex tx_hash\n return {\n requestTxId: result.data.tx_hash,\n };\n }\n\n /**\n * Retrieve a complete signed attestation payload\n *\n * This fetches the signed attestation payload for a given request transaction ID.\n * The attestation must have been signed by the leader validator first.\n *\n * If the attestation is not yet signed, this will throw an error. Clients should\n * poll with exponential backoff or wait for 1-2 blocks after requesting.\n *\n * @param input - Request transaction ID\n * @returns Promise resolving to signed attestation payload\n * @throws Error if attestation not found or not yet signed\n *\n * @example\n * ```typescript\n * // Poll for signature\n * for (let i = 0; i < 15; i++) {\n * try {\n * const signed = await attestationAction.getSignedAttestation({\n * requestTxId: \"0x123...\",\n * });\n * console.log(`Payload: ${Buffer.from(signed.payload).toString('hex')}`);\n * break;\n * } catch (e) {\n * await new Promise(resolve => setTimeout(resolve, 2000));\n * }\n * }\n * ```\n */\n async getSignedAttestation(\n input: GetSignedAttestationInput\n ): Promise<SignedAttestationResult> {\n // Validate and normalize input\n const trimmed = input.requestTxId?.trim() || '';\n if (trimmed === '') {\n throw new Error('request_tx_id is required');\n }\n\n // Strip optional \"0x\" prefix and lowercase for normalization\n const normalizedRequestTxId = trimmed.startsWith('0x')\n ? trimmed.slice(2).toLowerCase()\n : trimmed.toLowerCase();\n\n // Call get_signed_attestation view action\n const result = await this.call<Array<{ payload: string | Uint8Array }>>(\n 'get_signed_attestation',\n { $request_tx_id: normalizedRequestTxId }\n );\n\n // Extract the right value from Either, or throw if Left\n const data = result.throw();\n\n // The action returns an array of rows - extract the first row\n if (!data || !Array.isArray(data) || data.length === 0) {\n throw new Error('No attestation found for request_tx_id - may not exist or is not yet signed');\n }\n\n const row = data[0];\n if (!row || !row.payload) {\n throw new Error('No payload in attestation row');\n }\n\n // Decode base64 to bytes\n let payloadBytes: Uint8Array;\n const payloadValue = row.payload;\n\n if (typeof payloadValue === 'string') {\n // Node.js environment\n if (typeof Buffer !== 'undefined') {\n payloadBytes = new Uint8Array(Buffer.from(payloadValue, 'base64'));\n } else {\n // Browser environment\n const binaryString = atob(payloadValue);\n payloadBytes = new Uint8Array(binaryString.length);\n for (let i = 0; i < binaryString.length; i++) {\n payloadBytes[i] = binaryString.charCodeAt(i);\n }\n }\n } else if (payloadValue instanceof Uint8Array) {\n // Already decoded\n payloadBytes = payloadValue;\n } else {\n throw new Error(`Unexpected payload type: ${typeof payloadValue}`);\n }\n\n return {\n payload: payloadBytes,\n };\n }\n\n /**\n * List attestation metadata with optional filtering\n *\n * This returns metadata for attestations, optionally filtered by requester address, request transaction ID,\n * attestation hash, or result canonical bytes. Supports pagination and sorting.\n *\n * @param input - Filter and pagination parameters\n * @returns Promise resolving to array of attestation metadata\n * @throws Error if parameters are invalid\n *\n * @example\n * ```typescript\n * // List my recent attestations\n * const myAddress = new Uint8Array(Buffer.from(wallet.address.slice(2), 'hex'));\n * const attestations = await attestationAction.listAttestations({\n * requester: myAddress,\n * limit: 10,\n * offset: 0,\n * orderBy: \"created_height desc\",\n * });\n *\n * attestations.forEach(att => {\n * console.log(`TX: ${att.requestTxId}, Height: ${att.createdHeight}`);\n * });\n * ```\n */\n async listAttestations(\n input: ListAttestationsInput\n ): Promise<AttestationMetadata[]> {\n // Validate input\n validateListAttestationsInput(input);\n\n // Set defaults\n const limit = input.limit ?? 5000;\n const offset = input.offset ?? 0;\n\n // Prepare parameters for list_attestations view action\n // Note: Empty Uint8Array represents BYTEA NULL (handled by kwil-js 0.9.10+)\n const params: Types.NamedParams = {\n $requester: input.requester ?? new Uint8Array(0),\n $request_tx_id: input.requestTxId ?? null,\n $attestation_hash: input.attestationHash ?? new Uint8Array(0),\n $result_canonical: input.resultCanonical ?? new Uint8Array(0),\n $limit: limit,\n $offset: offset,\n $order_by: input.orderBy ?? null,\n };\n\n // Call list_attestations view action\n const result = await this.call<any[]>('list_attestations', params);\n\n // Check for errors\n if (result.isLeft()) {\n throw new Error(\n `Failed to list attestations: HTTP status ${result.value}`\n );\n }\n\n // Extract the right value from Either\n // Note: result.value might be a getter function, so call it if needed\n const rightValue = typeof result.value === 'function' ? result.value() : result.value;\n const rows = Array.isArray(rightValue) ? rightValue : [];\n\n // If no rows, return empty array\n if (!rows || rows.length === 0) {\n return [];\n }\n\n // Parse rows into AttestationMetadata\n return rows.map((row: any, idx: number) => parseAttestationRow(row, idx));\n }\n}\n\n/**\n * Parse a single row from list_attestations result into AttestationMetadata\n *\n * Expected columns (in order):\n * 0. request_tx_id (TEXT)\n * 1. attestation_hash (BYTEA)\n * 2. requester (BYTEA)\n * 3. data_provider (TEXT)\n * 4. stream_id (TEXT)\n * 5. created_height (INT8)\n * 6. signed_height (INT8, nullable)\n * 7. encrypt_sig (BOOLEAN)\n */\nfunction parseAttestationRow(row: any, idx: number): AttestationMetadata {\n // kwil-js returns rows as objects with column names as keys\n // or as arrays depending on the query format\n let requestTxId: string;\n let attestationHash: Uint8Array;\n let requester: Uint8Array;\n let dataProvider: string;\n let streamId: string;\n let createdHeight: number;\n let signedHeight: number | null;\n let encryptSig: boolean;\n\n // Handle both array and object formats\n if (Array.isArray(row)) {\n // Array format: [col0, col1, col2, ...]\n if (row.length < 8) {\n throw new Error(\n `Row ${idx}: expected 8 columns, got ${row.length}`\n );\n }\n\n requestTxId = row[0];\n attestationHash = decodeBytea(row[1], idx, 'attestation_hash');\n requester = decodeBytea(row[2], idx, 'requester');\n dataProvider = row[3];\n streamId = row[4];\n createdHeight = parseInt(row[5], 10);\n signedHeight = row[6] !== null ? parseInt(row[6], 10) : null;\n encryptSig = row[7];\n } else {\n // Object format: { request_tx_id: ..., attestation_hash: ..., ... }\n requestTxId = row.request_tx_id;\n attestationHash = decodeBytea(row.attestation_hash, idx, 'attestation_hash');\n requester = decodeBytea(row.requester, idx, 'requester');\n dataProvider = row.data_provider;\n streamId = row.stream_id;\n createdHeight = parseInt(row.created_height, 10);\n signedHeight = row.signed_height !== null ? parseInt(row.signed_height, 10) : null;\n encryptSig = row.encrypt_sig;\n }\n\n return {\n requestTxId,\n attestationHash,\n requester,\n dataProvider,\n streamId,\n createdHeight,\n signedHeight,\n encryptSig,\n };\n}\n\n/**\n * Decode a BYTEA column from base64\n */\nfunction decodeBytea(value: any, rowIdx: number, colName: string): Uint8Array {\n if (value === null || value === undefined) {\n throw new Error(`Row ${rowIdx}: ${colName} is null or undefined`);\n }\n\n // If already Uint8Array, return as-is\n if (value instanceof Uint8Array) {\n return value;\n }\n\n // If string, decode from base64\n if (typeof value === 'string') {\n try {\n // Node.js environment\n if (typeof Buffer !== 'undefined') {\n return new Uint8Array(Buffer.from(value, 'base64'));\n } else {\n // Browser environment\n const binaryString = atob(value);\n const bytes = new Uint8Array(binaryString.length);\n for (let i = 0; i < binaryString.length; i++) {\n bytes[i] = binaryString.charCodeAt(i);\n }\n return bytes;\n }\n } catch (err) {\n throw new Error(\n `Row ${rowIdx}: failed to decode ${colName} as base64: ${err}`\n );\n }\n }\n\n throw new Error(\n `Row ${rowIdx}: expected ${colName} to be string or Uint8Array, got ${typeof value}`\n );\n}\n\n// Inline unit tests\nif (import.meta.vitest) {\n const { describe, it, expect } = import.meta.vitest;\n\n describe('decodeBytea', () => {\n it('should decode base64 string', () => {\n const base64 = Buffer.from([1, 2, 3, 4]).toString('base64');\n const decoded = decodeBytea(base64, 0, 'test');\n expect(Array.from(decoded)).toEqual([1, 2, 3, 4]);\n });\n\n it('should return Uint8Array as-is', () => {\n const bytes = new Uint8Array([1, 2, 3, 4]);\n const decoded = decodeBytea(bytes, 0, 'test');\n expect(decoded).toBe(bytes);\n });\n\n it('should throw on null', () => {\n expect(() => decodeBytea(null, 0, 'test')).toThrow('null or undefined');\n });\n\n it('should throw on invalid type', () => {\n expect(() => decodeBytea(123, 0, 'test')).toThrow('expected test to be string or Uint8Array');\n });\n });\n\n describe('parseAttestationRow', () => {\n it('should parse array format row', () => {\n const row = [\n 'tx123',\n Buffer.from([1, 2, 3]).toString('base64'),\n Buffer.from([4, 5, 6]).toString('base64'),\n '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n 'stai0000000000000000000000000000',\n '100',\n '200',\n true,\n ];\n\n const metadata = parseAttestationRow(row, 0);\n\n expect(metadata.requestTxId).toBe('tx123');\n expect(Array.from(metadata.attestationHash)).toEqual([1, 2, 3]);\n expect(Array.from(metadata.requester)).toEqual([4, 5, 6]);\n expect(metadata.dataProvider).toBe('0x4710a8d8f0d845da110086812a32de6d90d7ff5c');\n expect(metadata.streamId).toBe('stai0000000000000000000000000000');\n expect(metadata.createdHeight).toBe(100);\n expect(metadata.signedHeight).toBe(200);\n expect(metadata.encryptSig).toBe(true);\n });\n\n it('should parse object format row', () => {\n const row = {\n request_tx_id: 'tx456',\n attestation_hash: Buffer.from([7, 8, 9]).toString('base64'),\n requester: Buffer.from([10, 11, 12]).toString('base64'),\n data_provider: '0x1234567890123456789012345678901234567890',\n stream_id: 'stbx0000000000000000000000000000',\n created_height: '300',\n signed_height: null,\n encrypt_sig: false,\n };\n\n const metadata = parseAttestationRow(row, 0);\n\n expect(metadata.requestTxId).toBe('tx456');\n expect(Array.from(metadata.attestationHash)).toEqual([7, 8, 9]);\n expect(Array.from(metadata.requester)).toEqual([10, 11, 12]);\n expect(metadata.dataProvider).toBe('0x1234567890123456789012345678901234567890');\n expect(metadata.streamId).toBe('stbx0000000000000000000000000000');\n expect(metadata.createdHeight).toBe(300);\n expect(metadata.signedHeight).toBe(null);\n expect(metadata.encryptSig).toBe(false);\n });\n });\n}\n"],
5
+ "mappings": ";;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAQA,qBAA6B;AAC7B,oBAAuB;AACvB,yBASO;AACP,iCAAiC;AApBjC;AAoDO,IAAM,oBAAN,cAAgC,qBAAO;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAgC5C,MAAM,mBACJ,OACmC;AAEnC,uDAA2B,KAAK;AAGhC,UAAM,gBAAY,6CAAiB,MAAM,IAAI;AAI7C,UAAM,SAA8B,CAAC;AAAA,MACnC,gBAAgB,MAAM;AAAA,MACtB,YAAY,MAAM;AAAA,MAClB,cAAc,MAAM;AAAA,MACpB,aAAa;AAAA,MACb,cAAc,MAAM;AAAA,MACpB,UAAU,MAAM,OAAO,SAAS;AAAA,IAClC,CAAC;AAGD,UAAM,QAAQ;AAAA,MACZ,UAAU,qBAAM,SAAS,QAAQ,IAAI,CAAC;AAAA,IACxC;AAGA,UAAM,SAAS,MAAM,KAAK,uBAAuB,uBAAuB,QAAQ,KAAK;AAGrF,QAAI,CAAC,OAAO,MAAM,SAAS;AACzB,YAAM,IAAI;AAAA,QACR;AAAA,MACF;AAAA,IACF;AAGA,WAAO;AAAA,MACL,aAAa,OAAO,KAAK;AAAA,IAC3B;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EA+BA,MAAM,qBACJ,OACkC;AAElC,UAAM,UAAU,MAAM,aAAa,KAAK,KAAK;AAC7C,QAAI,YAAY,IAAI;AAClB,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AAGA,UAAM,wBAAwB,QAAQ,WAAW,IAAI,IACjD,QAAQ,MAAM,CAAC,EAAE,YAAY,IAC7B,QAAQ,YAAY;AAGxB,UAAM,SAAS,MAAM,KAAK;AAAA,MACxB;AAAA,MACA,EAAE,gBAAgB,sBAAsB;AAAA,IAC1C;AAGA,UAAM,OAAO,OAAO,MAAM;AAG1B,QAAI,CAAC,QAAQ,CAAC,MAAM,QAAQ,IAAI,KAAK,KAAK,WAAW,GAAG;AACtD,YAAM,IAAI,MAAM,6EAA6E;AAAA,IAC/F;AAEA,UAAM,MAAM,KAAK,CAAC;AAClB,QAAI,CAAC,OAAO,CAAC,IAAI,SAAS;AACxB,YAAM,IAAI,MAAM,+BAA+B;AAAA,IACjD;AAGA,QAAI;AACJ,UAAM,eAAe,IAAI;AAEzB,QAAI,OAAO,iBAAiB,UAAU;AAEpC,UAAI,OAAO,WAAW,aAAa;AACjC,uBAAe,IAAI,WAAW,OAAO,KAAK,cAAc,QAAQ,CAAC;AAAA,MACnE,OAAO;AAEL,cAAM,eAAe,KAAK,YAAY;AACtC,uBAAe,IAAI,WAAW,aAAa,MAAM;AACjD,iBAAS,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;AAC5C,uBAAa,CAAC,IAAI,aAAa,WAAW,CAAC;AAAA,QAC7C;AAAA,MACF;AAAA,IACF,WAAW,wBAAwB,YAAY;AAE7C,qBAAe;AAAA,IACjB,OAAO;AACL,YAAM,IAAI,MAAM,4BAA4B,OAAO,YAAY,EAAE;AAAA,IACnE;AAEA,WAAO;AAAA,MACL,SAAS;AAAA,IACX;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EA4BA,MAAM,iBACJ,OACgC;AAEhC,0DAA8B,KAAK;AAGnC,UAAM,QAAQ,MAAM,SAAS;AAC7B,UAAM,SAAS,MAAM,UAAU;AAI/B,UAAM,SAA4B;AAAA,MAChC,YAAY,MAAM,aAAa,IAAI,WAAW,CAAC;AAAA,MAC/C,gBAAgB,MAAM,eAAe;AAAA,MACrC,mBAAmB,MAAM,mBAAmB,IAAI,WAAW,CAAC;AAAA,MAC5D,mBAAmB,MAAM,mBAAmB,IAAI,WAAW,CAAC;AAAA,MAC5D,QAAQ;AAAA,MACR,SAAS;AAAA,MACT,WAAW,MAAM,WAAW;AAAA,IAC9B;AAGA,UAAM,SAAS,MAAM,KAAK,KAAY,qBAAqB,MAAM;AAGjE,QAAI,OAAO,OAAO,GAAG;AACnB,YAAM,IAAI;AAAA,QACR,4CAA4C,OAAO,KAAK;AAAA,MAC1D;AAAA,IACF;AAIA,UAAM,aAAa,OAAO,OAAO,UAAU,aAAa,OAAO,MAAM,IAAI,OAAO;AAChF,UAAM,OAAO,MAAM,QAAQ,UAAU,IAAI,aAAa,CAAC;AAGvD,QAAI,CAAC,QAAQ,KAAK,WAAW,GAAG;AAC9B,aAAO,CAAC;AAAA,IACV;AAGA,WAAO,KAAK,IAAI,CAAC,KAAU,QAAgB,oBAAoB,KAAK,GAAG,CAAC;AAAA,EAC1E;AACF;AAeA,SAAS,oBAAoB,KAAU,KAAkC;AAGvE,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AAGJ,MAAI,MAAM,QAAQ,GAAG,GAAG;AAEtB,QAAI,IAAI,SAAS,GAAG;AAClB,YAAM,IAAI;AAAA,QACR,OAAO,GAAG,6BAA6B,IAAI,MAAM;AAAA,MACnD;AAAA,IACF;AAEA,kBAAc,IAAI,CAAC;AACnB,sBAAkB,YAAY,IAAI,CAAC,GAAG,KAAK,kBAAkB;AAC7D,gBAAY,YAAY,IAAI,CAAC,GAAG,KAAK,WAAW;AAChD,mBAAe,IAAI,CAAC;AACpB,eAAW,IAAI,CAAC;AAChB,oBAAgB,SAAS,IAAI,CAAC,GAAG,EAAE;AACnC,mBAAe,IAAI,CAAC,MAAM,OAAO,SAAS,IAAI,CAAC,GAAG,EAAE,IAAI;AACxD,iBAAa,IAAI,CAAC;AAAA,EACpB,OAAO;AAEL,kBAAc,IAAI;AAClB,sBAAkB,YAAY,IAAI,kBAAkB,KAAK,kBAAkB;AAC3E,gBAAY,YAAY,IAAI,WAAW,KAAK,WAAW;AACvD,mBAAe,IAAI;AACnB,eAAW,IAAI;AACf,oBAAgB,SAAS,IAAI,gBAAgB,EAAE;AAC/C,mBAAe,IAAI,kBAAkB,OAAO,SAAS,IAAI,eAAe,EAAE,IAAI;AAC9E,iBAAa,IAAI;AAAA,EACnB;AAEA,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;AAKA,SAAS,YAAY,OAAY,QAAgB,SAA6B;AAC5E,MAAI,UAAU,QAAQ,UAAU,QAAW;AACzC,UAAM,IAAI,MAAM,OAAO,MAAM,KAAK,OAAO,uBAAuB;AAAA,EAClE;AAGA,MAAI,iBAAiB,YAAY;AAC/B,WAAO;AAAA,EACT;AAGA,MAAI,OAAO,UAAU,UAAU;AAC7B,QAAI;AAEF,UAAI,OAAO,WAAW,aAAa;AACjC,eAAO,IAAI,WAAW,OAAO,KAAK,OAAO,QAAQ,CAAC;AAAA,MACpD,OAAO;AAEL,cAAM,eAAe,KAAK,KAAK;AAC/B,cAAM,QAAQ,IAAI,WAAW,aAAa,MAAM;AAChD,iBAAS,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;AAC5C,gBAAM,CAAC,IAAI,aAAa,WAAW,CAAC;AAAA,QACtC;AACA,eAAO;AAAA,MACT;AAAA,IACF,SAAS,KAAK;AACZ,YAAM,IAAI;AAAA,QACR,OAAO,MAAM,sBAAsB,OAAO,eAAe,GAAG;AAAA,MAC9D;AAAA,IACF;AAAA,EACF;AAEA,QAAM,IAAI;AAAA,IACR,OAAO,MAAM,cAAc,OAAO,oCAAoC,OAAO,KAAK;AAAA,EACpF;AACF;AAGA,IAAI,YAAY,QAAQ;AACtB,QAAM,EAAE,UAAU,IAAI,OAAO,IAAI,YAAY;AAE7C,WAAS,eAAe,MAAM;AAC5B,OAAG,+BAA+B,MAAM;AACtC,YAAM,SAAS,OAAO,KAAK,CAAC,GAAG,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAC1D,YAAM,UAAU,YAAY,QAAQ,GAAG,MAAM;AAC7C,aAAO,MAAM,KAAK,OAAO,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,GAAG,CAAC,CAAC;AAAA,IAClD,CAAC;AAED,OAAG,kCAAkC,MAAM;AACzC,YAAM,QAAQ,IAAI,WAAW,CAAC,GAAG,GAAG,GAAG,CAAC,CAAC;AACzC,YAAM,UAAU,YAAY,OAAO,GAAG,MAAM;AAC5C,aAAO,OAAO,EAAE,KAAK,KAAK;AAAA,IAC5B,CAAC;AAED,OAAG,wBAAwB,MAAM;AAC/B,aAAO,MAAM,YAAY,MAAM,GAAG,MAAM,CAAC,EAAE,QAAQ,mBAAmB;AAAA,IACxE,CAAC;AAED,OAAG,gCAAgC,MAAM;AACvC,aAAO,MAAM,YAAY,KAAK,GAAG,MAAM,CAAC,EAAE,QAAQ,0CAA0C;AAAA,IAC9F,CAAC;AAAA,EACH,CAAC;AAED,WAAS,uBAAuB,MAAM;AACpC,OAAG,iCAAiC,MAAM;AACxC,YAAM,MAAM;AAAA,QACV;AAAA,QACA,OAAO,KAAK,CAAC,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAAA,QACxC,OAAO,KAAK,CAAC,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAAA,QACxC;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF;AAEA,YAAM,WAAW,oBAAoB,KAAK,CAAC;AAE3C,aAAO,SAAS,WAAW,EAAE,KAAK,OAAO;AACzC,aAAO,MAAM,KAAK,SAAS,eAAe,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;AAC9D,aAAO,MAAM,KAAK,SAAS,SAAS,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;AACxD,aAAO,SAAS,YAAY,EAAE,KAAK,4CAA4C;AAC/E,aAAO,SAAS,QAAQ,EAAE,KAAK,kCAAkC;AACjE,aAAO,SAAS,aAAa,EAAE,KAAK,GAAG;AACvC,aAAO,SAAS,YAAY,EAAE,KAAK,GAAG;AACtC,aAAO,SAAS,UAAU,EAAE,KAAK,IAAI;AAAA,IACvC,CAAC;AAED,OAAG,kCAAkC,MAAM;AACzC,YAAM,MAAM;AAAA,QACV,eAAe;AAAA,QACf,kBAAkB,OAAO,KAAK,CAAC,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAAA,QAC1D,WAAW,OAAO,KAAK,CAAC,IAAI,IAAI,EAAE,CAAC,EAAE,SAAS,QAAQ;AAAA,QACtD,eAAe;AAAA,QACf,WAAW;AAAA,QACX,gBAAgB;AAAA,QAChB,eAAe;AAAA,QACf,aAAa;AAAA,MACf;AAEA,YAAM,WAAW,oBAAoB,KAAK,CAAC;AAE3C,aAAO,SAAS,WAAW,EAAE,KAAK,OAAO;AACzC,aAAO,MAAM,KAAK,SAAS,eAAe,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;AAC9D,aAAO,MAAM,KAAK,SAAS,SAAS,CAAC,EAAE,QAAQ,CAAC,IAAI,IAAI,EAAE,CAAC;AAC3D,aAAO,SAAS,YAAY,EAAE,KAAK,4CAA4C;AAC/E,aAAO,SAAS,QAAQ,EAAE,KAAK,kCAAkC;AACjE,aAAO,SAAS,aAAa,EAAE,KAAK,GAAG;AACvC,aAAO,SAAS,YAAY,EAAE,KAAK,IAAI;AACvC,aAAO,SAAS,UAAU,EAAE,KAAK,KAAK;AAAA,IACxC,CAAC;AAAA,EACH,CAAC;AACH;",
6
6
  "names": []
7
7
  }
@@ -242,6 +242,9 @@ if (import_meta.vitest) {
242
242
  expect(
243
243
  () => validateListAttestationsInput({
244
244
  requester: new Uint8Array(20),
245
+ requestTxId: "abc123",
246
+ attestationHash: new Uint8Array(32),
247
+ resultCanonical: new Uint8Array(100),
245
248
  limit: 100,
246
249
  offset: 0,
247
250
  orderBy: "created_height desc"
@@ -251,6 +254,20 @@ if (import_meta.vitest) {
251
254
  it("should accept valid input with no optional fields", () => {
252
255
  expect(() => validateListAttestationsInput({})).not.toThrow();
253
256
  });
257
+ it("should accept attestationHash filter", () => {
258
+ expect(
259
+ () => validateListAttestationsInput({
260
+ attestationHash: new Uint8Array(32)
261
+ })
262
+ ).not.toThrow();
263
+ });
264
+ it("should accept resultCanonical filter", () => {
265
+ expect(
266
+ () => validateListAttestationsInput({
267
+ resultCanonical: new Uint8Array(64)
268
+ })
269
+ ).not.toThrow();
270
+ });
254
271
  it("should reject limit < 1", () => {
255
272
  expect(
256
273
  () => validateListAttestationsInput({
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../src/types/attestation.ts"],
4
- "sourcesContent": ["/**\n * Type definitions for attestation operations\n *\n * Attestations enable validators to cryptographically sign query results,\n * providing verifiable proofs that can be consumed by smart contracts and\n * external applications.\n */\n\n/**\n * Input parameters for requesting an attestation\n */\nexport interface RequestAttestationInput {\n /**\n * Data provider address (0x-prefixed, 42 characters)\n * Example: \"0x4710a8d8f0d845da110086812a32de6d90d7ff5c\"\n */\n dataProvider: string;\n\n /**\n * Stream ID (32 characters)\n * Example: \"stai0000000000000000000000000000\"\n */\n streamId: string;\n\n /**\n * Action name to attest (must be in allowlist)\n * Example: \"get_record\", \"get_index\"\n */\n actionName: string;\n\n /**\n * Action arguments (will be encoded)\n * Must match the signature of the action\n */\n args: any[];\n\n /**\n * Whether to encrypt the signature (must be false in MVP)\n * Future: ECIES encryption to requester's public key\n */\n encryptSig: boolean;\n\n /**\n * Maximum fee willing to pay (in wei, as NUMERIC(78,0))\n * Accepts number, string, or bigint for large values (up to 40 TRUF = 40e18 wei)\n * Transaction will abort if actual fee exceeds this\n * Accepts number, string, or bigint for large values\n */\n maxFee: number | string | bigint;\n}\n\n/**\n * Result of requesting an attestation\n */\nexport interface RequestAttestationResult {\n /**\n * Transaction ID for this attestation request\n * Use this to retrieve the signed attestation later\n */\n requestTxId: string;\n}\n\n/**\n * Input parameters for retrieving a signed attestation\n */\nexport interface GetSignedAttestationInput {\n /**\n * Transaction ID from request_attestation\n */\n requestTxId: string;\n}\n\n/**\n * Result of retrieving a signed attestation\n */\nexport interface SignedAttestationResult {\n /**\n * Complete attestation payload: canonical (8 fields) + signature\n *\n * Format: version | algo | height | provider | stream | action | args | result | signature\n *\n * This payload can be passed to EVM contracts for verification\n */\n payload: Uint8Array;\n}\n\n/**\n * Input parameters for listing attestations\n */\nexport interface ListAttestationsInput {\n /**\n * Optional: Filter by requester address (20 bytes)\n * If provided, only returns attestations requested by this address\n */\n requester?: Uint8Array;\n\n /**\n * Optional: Filter by request transaction ID\n * If provided, only returns attestations matching this transaction ID\n */\n requestTxId?: string;\n\n /**\n * Optional: Maximum number of results (1-5000, default 5000)\n */\n limit?: number;\n\n /**\n * Optional: Pagination offset (default 0)\n */\n offset?: number;\n\n /**\n * Optional: Sort order\n *\n * Allowed values:\n * - \"created_height asc\"\n * - \"created_height desc\"\n * - \"signed_height asc\"\n * - \"signed_height desc\"\n *\n * Case-insensitive\n */\n orderBy?: string;\n}\n\n/**\n * Metadata for a single attestation\n */\nexport interface AttestationMetadata {\n /**\n * Transaction ID for this attestation request\n */\n requestTxId: string;\n\n /**\n * Attestation hash (identifies this attestation)\n */\n attestationHash: Uint8Array;\n\n /**\n * Address of the requester (20 bytes)\n */\n requester: Uint8Array;\n\n /**\n * Block height when attestation was created\n */\n createdHeight: number;\n\n /**\n * Block height when attestation was signed (null if not yet signed)\n */\n signedHeight: number | null;\n\n /**\n * Whether signature is encrypted\n */\n encryptSig: boolean;\n}\n\n/**\n * Validates attestation request input\n *\n * @param input - The attestation request to validate\n * @throws Error if validation fails\n */\nexport function validateAttestationRequest(input: RequestAttestationInput): void {\n // Data provider validation\n if (input.dataProvider.length !== 42) {\n throw new Error(\n `data_provider must be 0x-prefixed 40 hex characters, got ${input.dataProvider.length} chars`\n );\n }\n\n if (!input.dataProvider.startsWith('0x')) {\n throw new Error('data_provider must start with 0x prefix');\n }\n\n // Validate hex after 0x prefix\n const hex = input.dataProvider.slice(2);\n if (!/^[0-9a-fA-F]{40}$/.test(hex)) {\n throw new Error('data_provider must contain valid hex characters after 0x prefix');\n }\n\n // Stream ID validation\n if (input.streamId.length !== 32) {\n throw new Error(`stream_id must be 32 characters, got ${input.streamId.length}`);\n }\n\n // Action name validation\n if (!input.actionName || input.actionName.trim() === '') {\n throw new Error('action_name cannot be empty');\n }\n\n // Encryption validation\n if (input.encryptSig) {\n throw new Error('encryption not implemented in MVP');\n }\n\n // Fee validation - handle number, string, or bigint\n const maxFeeNum = typeof input.maxFee === 'bigint'\n ? input.maxFee\n : typeof input.maxFee === 'string'\n ? BigInt(input.maxFee)\n : BigInt(Math.floor(input.maxFee));\n\n if (maxFeeNum < 0n) {\n throw new Error(`max_fee must be non-negative, got ${input.maxFee}`);\n }\n}\n\n/**\n * Whitelist of valid orderBy values (lowercase canonical form)\n */\nconst VALID_ORDER_BY_VALUES = [\n 'created_height asc',\n 'created_height desc',\n 'signed_height asc',\n 'signed_height desc',\n];\n\n/**\n * Validates orderBy parameter (case-insensitive)\n *\n * @param orderBy - The orderBy value to validate\n * @returns true if valid, false otherwise\n */\nexport function isValidOrderBy(orderBy: string): boolean {\n // Normalize to lowercase for case-insensitive comparison\n const normalized = orderBy.trim().toLowerCase();\n return VALID_ORDER_BY_VALUES.includes(normalized);\n}\n\n/**\n * Validates list attestations input\n *\n * @param input - The list attestations input to validate\n * @throws Error if validation fails\n */\nexport function validateListAttestationsInput(input: ListAttestationsInput): void {\n // Validate limit\n if (input.limit !== undefined) {\n if (input.limit < 1 || input.limit > 5000) {\n throw new Error('limit must be between 1 and 5000');\n }\n }\n\n // Validate offset\n if (input.offset !== undefined) {\n if (input.offset < 0) {\n throw new Error('offset must be non-negative');\n }\n }\n\n // Validate requester length\n if (input.requester !== undefined) {\n if (input.requester.length !== 20) {\n throw new Error('requester must be exactly 20 bytes');\n }\n }\n\n // Validate orderBy\n if (input.orderBy !== undefined) {\n if (!isValidOrderBy(input.orderBy)) {\n throw new Error(\n `Invalid orderBy value. Must be one of: ${VALID_ORDER_BY_VALUES.slice(0, 4).join(', ')}`\n );\n }\n }\n}\n\n// Inline unit tests\nif (import.meta.vitest) {\n const { describe, it, expect } = import.meta.vitest;\n\n describe('validateAttestationRequest', () => {\n it('should accept valid input', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'stai0000000000000000000000000000',\n actionName: 'get_record',\n args: [],\n encryptSig: false,\n maxFee: 1000000,\n })\n ).not.toThrow();\n });\n\n it('should reject invalid data_provider length', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0xinvalid',\n streamId: 'stai0000000000000000000000000000',\n actionName: 'get_record',\n args: [],\n encryptSig: false,\n maxFee: 1000,\n })\n ).toThrow('data_provider must be 0x-prefixed 40 hex characters');\n });\n\n it('should reject data_provider without 0x prefix', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '4710a8d8f0d845da110086812a32de6d90d7ff5c00',\n streamId: 'stai0000000000000000000000000000',\n actionName: 'get_record',\n args: [],\n encryptSig: false,\n maxFee: 1000,\n })\n ).toThrow('data_provider must start with 0x prefix');\n });\n\n it('should reject data_provider with invalid hex', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0xGGGGa8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'stai0000000000000000000000000000',\n actionName: 'get_record',\n args: [],\n encryptSig: false,\n maxFee: 1000,\n })\n ).toThrow('data_provider must contain valid hex characters');\n });\n\n it('should reject short stream_id', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'short',\n actionName: 'get_record',\n args: [],\n encryptSig: false,\n maxFee: 1000,\n })\n ).toThrow('stream_id must be 32 characters');\n });\n\n it('should reject long stream_id', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'stai00000000000000000000000000000000',\n actionName: 'get_record',\n args: [],\n encryptSig: false,\n maxFee: 1000,\n })\n ).toThrow('stream_id must be 32 characters');\n });\n\n it('should reject empty action_name', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'stai0000000000000000000000000000',\n actionName: '',\n args: [],\n encryptSig: false,\n maxFee: 1000,\n })\n ).toThrow('action_name cannot be empty');\n });\n\n it('should reject whitespace-only action_name', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'stai0000000000000000000000000000',\n actionName: ' ',\n args: [],\n encryptSig: false,\n maxFee: 1000,\n })\n ).toThrow('action_name cannot be empty');\n });\n\n it('should reject encryptSig=true', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'stai0000000000000000000000000000',\n actionName: 'get_record',\n args: [],\n encryptSig: true,\n maxFee: 1000,\n })\n ).toThrow('encryption not implemented in MVP');\n });\n\n it('should reject negative maxFee', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'stai0000000000000000000000000000',\n actionName: 'get_record',\n args: [],\n encryptSig: false,\n maxFee: -1,\n })\n ).toThrow('max_fee must be non-negative');\n });\n });\n\n describe('isValidOrderBy', () => {\n it('should accept valid lowercase orderBy', () => {\n expect(isValidOrderBy('created_height asc')).toBe(true);\n expect(isValidOrderBy('created_height desc')).toBe(true);\n expect(isValidOrderBy('signed_height asc')).toBe(true);\n expect(isValidOrderBy('signed_height desc')).toBe(true);\n });\n\n it('should accept valid uppercase orderBy', () => {\n expect(isValidOrderBy('created_height ASC')).toBe(true);\n expect(isValidOrderBy('created_height DESC')).toBe(true);\n expect(isValidOrderBy('signed_height ASC')).toBe(true);\n expect(isValidOrderBy('signed_height DESC')).toBe(true);\n });\n\n it('should accept mixed case and trim whitespace', () => {\n expect(isValidOrderBy(' created_height ASC ')).toBe(true);\n expect(isValidOrderBy('Created_Height Desc')).toBe(true);\n expect(isValidOrderBy('SIGNED_HEIGHT asc')).toBe(true);\n expect(isValidOrderBy(' signed_height DESC ')).toBe(true);\n });\n\n it('should reject invalid orderBy', () => {\n expect(isValidOrderBy('invalid')).toBe(false);\n expect(isValidOrderBy('created_height')).toBe(false);\n expect(isValidOrderBy('created_height ascending')).toBe(false);\n expect(isValidOrderBy('')).toBe(false);\n });\n });\n\n describe('validateListAttestationsInput', () => {\n it('should accept valid input with all fields', () => {\n expect(() =>\n validateListAttestationsInput({\n requester: new Uint8Array(20),\n limit: 100,\n offset: 0,\n orderBy: 'created_height desc',\n })\n ).not.toThrow();\n });\n\n it('should accept valid input with no optional fields', () => {\n expect(() => validateListAttestationsInput({})).not.toThrow();\n });\n\n it('should reject limit < 1', () => {\n expect(() =>\n validateListAttestationsInput({\n limit: 0,\n })\n ).toThrow('limit must be between 1 and 5000');\n });\n\n it('should reject limit > 5000', () => {\n expect(() =>\n validateListAttestationsInput({\n limit: 5001,\n })\n ).toThrow('limit must be between 1 and 5000');\n });\n\n it('should reject negative offset', () => {\n expect(() =>\n validateListAttestationsInput({\n offset: -1,\n })\n ).toThrow('offset must be non-negative');\n });\n\n it('should reject requester != 20 bytes (too long)', () => {\n expect(() =>\n validateListAttestationsInput({\n requester: new Uint8Array(21),\n })\n ).toThrow('requester must be exactly 20 bytes');\n });\n\n it('should reject requester != 20 bytes (too short)', () => {\n expect(() =>\n validateListAttestationsInput({\n requester: new Uint8Array(19),\n })\n ).toThrow('requester must be exactly 20 bytes');\n });\n\n it('should reject invalid orderBy', () => {\n expect(() =>\n validateListAttestationsInput({\n orderBy: 'invalid',\n })\n ).toThrow('Invalid orderBy value');\n });\n });\n}\n"],
5
- "mappings": ";;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAuKO,SAAS,2BAA2B,OAAsC;AAE/E,MAAI,MAAM,aAAa,WAAW,IAAI;AACpC,UAAM,IAAI;AAAA,MACR,4DAA4D,MAAM,aAAa,MAAM;AAAA,IACvF;AAAA,EACF;AAEA,MAAI,CAAC,MAAM,aAAa,WAAW,IAAI,GAAG;AACxC,UAAM,IAAI,MAAM,yCAAyC;AAAA,EAC3D;AAGA,QAAM,MAAM,MAAM,aAAa,MAAM,CAAC;AACtC,MAAI,CAAC,oBAAoB,KAAK,GAAG,GAAG;AAClC,UAAM,IAAI,MAAM,iEAAiE;AAAA,EACnF;AAGA,MAAI,MAAM,SAAS,WAAW,IAAI;AAChC,UAAM,IAAI,MAAM,wCAAwC,MAAM,SAAS,MAAM,EAAE;AAAA,EACjF;AAGA,MAAI,CAAC,MAAM,cAAc,MAAM,WAAW,KAAK,MAAM,IAAI;AACvD,UAAM,IAAI,MAAM,6BAA6B;AAAA,EAC/C;AAGA,MAAI,MAAM,YAAY;AACpB,UAAM,IAAI,MAAM,mCAAmC;AAAA,EACrD;AAGA,QAAM,YAAY,OAAO,MAAM,WAAW,WACtC,MAAM,SACN,OAAO,MAAM,WAAW,WACxB,OAAO,MAAM,MAAM,IACnB,OAAO,KAAK,MAAM,MAAM,MAAM,CAAC;AAEnC,MAAI,YAAY,IAAI;AAClB,UAAM,IAAI,MAAM,qCAAqC,MAAM,MAAM,EAAE;AAAA,EACrE;AACF;AAKA,IAAM,wBAAwB;AAAA,EAC5B;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAQO,SAAS,eAAe,SAA0B;AAEvD,QAAM,aAAa,QAAQ,KAAK,EAAE,YAAY;AAC9C,SAAO,sBAAsB,SAAS,UAAU;AAClD;AAQO,SAAS,8BAA8B,OAAoC;AAEhF,MAAI,MAAM,UAAU,QAAW;AAC7B,QAAI,MAAM,QAAQ,KAAK,MAAM,QAAQ,KAAM;AACzC,YAAM,IAAI,MAAM,kCAAkC;AAAA,IACpD;AAAA,EACF;AAGA,MAAI,MAAM,WAAW,QAAW;AAC9B,QAAI,MAAM,SAAS,GAAG;AACpB,YAAM,IAAI,MAAM,6BAA6B;AAAA,IAC/C;AAAA,EACF;AAGA,MAAI,MAAM,cAAc,QAAW;AACjC,QAAI,MAAM,UAAU,WAAW,IAAI;AACjC,YAAM,IAAI,MAAM,oCAAoC;AAAA,IACtD;AAAA,EACF;AAGA,MAAI,MAAM,YAAY,QAAW;AAC/B,QAAI,CAAC,eAAe,MAAM,OAAO,GAAG;AAClC,YAAM,IAAI;AAAA,QACR,0CAA0C,sBAAsB,MAAM,GAAG,CAAC,EAAE,KAAK,IAAI,CAAC;AAAA,MACxF;AAAA,IACF;AAAA,EACF;AACF;AAGA,IAAI,YAAY,QAAQ;AACtB,QAAM,EAAE,UAAU,IAAI,OAAO,IAAI,YAAY;AAE7C,WAAS,8BAA8B,MAAM;AAC3C,OAAG,6BAA6B,MAAM;AACpC;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,IAAI,QAAQ;AAAA,IAChB,CAAC;AAED,OAAG,8CAA8C,MAAM;AACrD;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,qDAAqD;AAAA,IACjE,CAAC;AAED,OAAG,iDAAiD,MAAM;AACxD;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,yCAAyC;AAAA,IACrD,CAAC;AAED,OAAG,gDAAgD,MAAM;AACvD;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,iDAAiD;AAAA,IAC7D,CAAC;AAED,OAAG,iCAAiC,MAAM;AACxC;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,iCAAiC;AAAA,IAC7C,CAAC;AAED,OAAG,gCAAgC,MAAM;AACvC;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,iCAAiC;AAAA,IAC7C,CAAC;AAED,OAAG,mCAAmC,MAAM;AAC1C;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,6BAA6B;AAAA,IACzC,CAAC;AAED,OAAG,6CAA6C,MAAM;AACpD;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,6BAA6B;AAAA,IACzC,CAAC;AAED,OAAG,iCAAiC,MAAM;AACxC;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,mCAAmC;AAAA,IAC/C,CAAC;AAED,OAAG,iCAAiC,MAAM;AACxC;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,8BAA8B;AAAA,IAC1C,CAAC;AAAA,EACH,CAAC;AAED,WAAS,kBAAkB,MAAM;AAC/B,OAAG,yCAAyC,MAAM;AAChD,aAAO,eAAe,oBAAoB,CAAC,EAAE,KAAK,IAAI;AACtD,aAAO,eAAe,qBAAqB,CAAC,EAAE,KAAK,IAAI;AACvD,aAAO,eAAe,mBAAmB,CAAC,EAAE,KAAK,IAAI;AACrD,aAAO,eAAe,oBAAoB,CAAC,EAAE,KAAK,IAAI;AAAA,IACxD,CAAC;AAED,OAAG,yCAAyC,MAAM;AAChD,aAAO,eAAe,oBAAoB,CAAC,EAAE,KAAK,IAAI;AACtD,aAAO,eAAe,qBAAqB,CAAC,EAAE,KAAK,IAAI;AACvD,aAAO,eAAe,mBAAmB,CAAC,EAAE,KAAK,IAAI;AACrD,aAAO,eAAe,oBAAoB,CAAC,EAAE,KAAK,IAAI;AAAA,IACxD,CAAC;AAED,OAAG,gDAAgD,MAAM;AACvD,aAAO,eAAe,wBAAwB,CAAC,EAAE,KAAK,IAAI;AAC1D,aAAO,eAAe,qBAAqB,CAAC,EAAE,KAAK,IAAI;AACvD,aAAO,eAAe,mBAAmB,CAAC,EAAE,KAAK,IAAI;AACrD,aAAO,eAAe,sBAAsB,CAAC,EAAE,KAAK,IAAI;AAAA,IAC1D,CAAC;AAED,OAAG,iCAAiC,MAAM;AACxC,aAAO,eAAe,SAAS,CAAC,EAAE,KAAK,KAAK;AAC5C,aAAO,eAAe,gBAAgB,CAAC,EAAE,KAAK,KAAK;AACnD,aAAO,eAAe,0BAA0B,CAAC,EAAE,KAAK,KAAK;AAC7D,aAAO,eAAe,EAAE,CAAC,EAAE,KAAK,KAAK;AAAA,IACvC,CAAC;AAAA,EACH,CAAC;AAED,WAAS,iCAAiC,MAAM;AAC9C,OAAG,6CAA6C,MAAM;AACpD;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,WAAW,IAAI,WAAW,EAAE;AAAA,UAC5B,OAAO;AAAA,UACP,QAAQ;AAAA,UACR,SAAS;AAAA,QACX,CAAC;AAAA,MACH,EAAE,IAAI,QAAQ;AAAA,IAChB,CAAC;AAED,OAAG,qDAAqD,MAAM;AAC5D,aAAO,MAAM,8BAA8B,CAAC,CAAC,CAAC,EAAE,IAAI,QAAQ;AAAA,IAC9D,CAAC;AAED,OAAG,2BAA2B,MAAM;AAClC;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,OAAO;AAAA,QACT,CAAC;AAAA,MACH,EAAE,QAAQ,kCAAkC;AAAA,IAC9C,CAAC;AAED,OAAG,8BAA8B,MAAM;AACrC;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,OAAO;AAAA,QACT,CAAC;AAAA,MACH,EAAE,QAAQ,kCAAkC;AAAA,IAC9C,CAAC;AAED,OAAG,iCAAiC,MAAM;AACxC;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,6BAA6B;AAAA,IACzC,CAAC;AAED,OAAG,kDAAkD,MAAM;AACzD;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,WAAW,IAAI,WAAW,EAAE;AAAA,QAC9B,CAAC;AAAA,MACH,EAAE,QAAQ,oCAAoC;AAAA,IAChD,CAAC;AAED,OAAG,mDAAmD,MAAM;AAC1D;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,WAAW,IAAI,WAAW,EAAE;AAAA,QAC9B,CAAC;AAAA,MACH,EAAE,QAAQ,oCAAoC;AAAA,IAChD,CAAC;AAED,OAAG,iCAAiC,MAAM;AACxC;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,SAAS;AAAA,QACX,CAAC;AAAA,MACH,EAAE,QAAQ,uBAAuB;AAAA,IACnC,CAAC;AAAA,EACH,CAAC;AACH;",
4
+ "sourcesContent": ["/**\n * Type definitions for attestation operations\n *\n * Attestations enable validators to cryptographically sign query results,\n * providing verifiable proofs that can be consumed by smart contracts and\n * external applications.\n */\n\n/**\n * Input parameters for requesting an attestation\n */\nexport interface RequestAttestationInput {\n /**\n * Data provider address (0x-prefixed, 42 characters)\n * Example: \"0x4710a8d8f0d845da110086812a32de6d90d7ff5c\"\n */\n dataProvider: string;\n\n /**\n * Stream ID (32 characters)\n * Example: \"stai0000000000000000000000000000\"\n */\n streamId: string;\n\n /**\n * Action name to attest (must be in allowlist)\n * Example: \"get_record\", \"get_index\"\n */\n actionName: string;\n\n /**\n * Action arguments (will be encoded)\n * Must match the signature of the action\n */\n args: any[];\n\n /**\n * Whether to encrypt the signature (must be false in MVP)\n * Future: ECIES encryption to requester's public key\n */\n encryptSig: boolean;\n\n /**\n * Maximum fee willing to pay (in wei, as NUMERIC(78,0))\n * Accepts number, string, or bigint for large values (up to 40 TRUF = 40e18 wei)\n * Transaction will abort if actual fee exceeds this\n * Accepts number, string, or bigint for large values\n */\n maxFee: number | string | bigint;\n}\n\n/**\n * Result of requesting an attestation\n */\nexport interface RequestAttestationResult {\n /**\n * Transaction ID for this attestation request\n * Use this to retrieve the signed attestation later\n */\n requestTxId: string;\n}\n\n/**\n * Input parameters for retrieving a signed attestation\n */\nexport interface GetSignedAttestationInput {\n /**\n * Transaction ID from request_attestation\n */\n requestTxId: string;\n}\n\n/**\n * Result of retrieving a signed attestation\n */\nexport interface SignedAttestationResult {\n /**\n * Complete attestation payload: canonical (8 fields) + signature\n *\n * Format: version | algo | height | provider | stream | action | args | result | signature\n *\n * This payload can be passed to EVM contracts for verification\n */\n payload: Uint8Array;\n}\n\n/**\n * Input parameters for listing attestations\n */\nexport interface ListAttestationsInput {\n /**\n * Optional: Filter by requester address (20 bytes)\n * If provided, only returns attestations requested by this address\n */\n requester?: Uint8Array;\n\n /**\n * Optional: Filter by request transaction ID\n * If provided, only returns attestations matching this transaction ID\n */\n requestTxId?: string;\n\n /**\n * Optional: Filter by attestation hash\n * If provided, only returns attestations matching this hash\n */\n attestationHash?: Uint8Array;\n\n /**\n * Optional: Filter by result canonical bytes\n * If provided, only returns attestations matching this canonical result\n */\n resultCanonical?: Uint8Array;\n\n /**\n * Optional: Maximum number of results (1-5000, default 5000)\n */\n limit?: number;\n\n /**\n * Optional: Pagination offset (default 0)\n */\n offset?: number;\n\n /**\n * Optional: Sort order\n *\n * Allowed values:\n * - \"created_height asc\"\n * - \"created_height desc\"\n * - \"signed_height asc\"\n * - \"signed_height desc\"\n *\n * Case-insensitive\n */\n orderBy?: string;\n}\n\n/**\n * Metadata for a single attestation\n */\nexport interface AttestationMetadata {\n /**\n * Transaction ID for this attestation request\n */\n requestTxId: string;\n\n /**\n * Attestation hash (identifies this attestation)\n */\n attestationHash: Uint8Array;\n\n /**\n * Address of the requester (20 bytes)\n */\n requester: Uint8Array;\n\n /**\n * Data provider address\n */\n dataProvider: string;\n\n /**\n * Stream ID\n */\n streamId: string;\n\n /**\n * Block height when attestation was created\n */\n createdHeight: number;\n\n /**\n * Block height when attestation was signed (null if not yet signed)\n */\n signedHeight: number | null;\n\n /**\n * Whether signature is encrypted\n */\n encryptSig: boolean;\n}\n\n/**\n * Validates attestation request input\n *\n * @param input - The attestation request to validate\n * @throws Error if validation fails\n */\nexport function validateAttestationRequest(input: RequestAttestationInput): void {\n // Data provider validation\n if (input.dataProvider.length !== 42) {\n throw new Error(\n `data_provider must be 0x-prefixed 40 hex characters, got ${input.dataProvider.length} chars`\n );\n }\n\n if (!input.dataProvider.startsWith('0x')) {\n throw new Error('data_provider must start with 0x prefix');\n }\n\n // Validate hex after 0x prefix\n const hex = input.dataProvider.slice(2);\n if (!/^[0-9a-fA-F]{40}$/.test(hex)) {\n throw new Error('data_provider must contain valid hex characters after 0x prefix');\n }\n\n // Stream ID validation\n if (input.streamId.length !== 32) {\n throw new Error(`stream_id must be 32 characters, got ${input.streamId.length}`);\n }\n\n // Action name validation\n if (!input.actionName || input.actionName.trim() === '') {\n throw new Error('action_name cannot be empty');\n }\n\n // Encryption validation\n if (input.encryptSig) {\n throw new Error('encryption not implemented in MVP');\n }\n\n // Fee validation - handle number, string, or bigint\n const maxFeeNum = typeof input.maxFee === 'bigint'\n ? input.maxFee\n : typeof input.maxFee === 'string'\n ? BigInt(input.maxFee)\n : BigInt(Math.floor(input.maxFee));\n\n if (maxFeeNum < 0n) {\n throw new Error(`max_fee must be non-negative, got ${input.maxFee}`);\n }\n}\n\n/**\n * Whitelist of valid orderBy values (lowercase canonical form)\n */\nconst VALID_ORDER_BY_VALUES = [\n 'created_height asc',\n 'created_height desc',\n 'signed_height asc',\n 'signed_height desc',\n];\n\n/**\n * Validates orderBy parameter (case-insensitive)\n *\n * @param orderBy - The orderBy value to validate\n * @returns true if valid, false otherwise\n */\nexport function isValidOrderBy(orderBy: string): boolean {\n // Normalize to lowercase for case-insensitive comparison\n const normalized = orderBy.trim().toLowerCase();\n return VALID_ORDER_BY_VALUES.includes(normalized);\n}\n\n/**\n * Validates list attestations input\n *\n * @param input - The list attestations input to validate\n * @throws Error if validation fails\n */\nexport function validateListAttestationsInput(input: ListAttestationsInput): void {\n // Validate limit\n if (input.limit !== undefined) {\n if (input.limit < 1 || input.limit > 5000) {\n throw new Error('limit must be between 1 and 5000');\n }\n }\n\n // Validate offset\n if (input.offset !== undefined) {\n if (input.offset < 0) {\n throw new Error('offset must be non-negative');\n }\n }\n\n // Validate requester length\n if (input.requester !== undefined) {\n if (input.requester.length !== 20) {\n throw new Error('requester must be exactly 20 bytes');\n }\n }\n\n // Validate orderBy\n if (input.orderBy !== undefined) {\n if (!isValidOrderBy(input.orderBy)) {\n throw new Error(\n `Invalid orderBy value. Must be one of: ${VALID_ORDER_BY_VALUES.slice(0, 4).join(', ')}`\n );\n }\n }\n}\n\n// Inline unit tests\nif (import.meta.vitest) {\n const { describe, it, expect } = import.meta.vitest;\n\n describe('validateAttestationRequest', () => {\n it('should accept valid input', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'stai0000000000000000000000000000',\n actionName: 'get_record',\n args: [],\n encryptSig: false,\n maxFee: 1000000,\n })\n ).not.toThrow();\n });\n\n it('should reject invalid data_provider length', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0xinvalid',\n streamId: 'stai0000000000000000000000000000',\n actionName: 'get_record',\n args: [],\n encryptSig: false,\n maxFee: 1000,\n })\n ).toThrow('data_provider must be 0x-prefixed 40 hex characters');\n });\n\n it('should reject data_provider without 0x prefix', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '4710a8d8f0d845da110086812a32de6d90d7ff5c00',\n streamId: 'stai0000000000000000000000000000',\n actionName: 'get_record',\n args: [],\n encryptSig: false,\n maxFee: 1000,\n })\n ).toThrow('data_provider must start with 0x prefix');\n });\n\n it('should reject data_provider with invalid hex', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0xGGGGa8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'stai0000000000000000000000000000',\n actionName: 'get_record',\n args: [],\n encryptSig: false,\n maxFee: 1000,\n })\n ).toThrow('data_provider must contain valid hex characters');\n });\n\n it('should reject short stream_id', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'short',\n actionName: 'get_record',\n args: [],\n encryptSig: false,\n maxFee: 1000,\n })\n ).toThrow('stream_id must be 32 characters');\n });\n\n it('should reject long stream_id', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'stai00000000000000000000000000000000',\n actionName: 'get_record',\n args: [],\n encryptSig: false,\n maxFee: 1000,\n })\n ).toThrow('stream_id must be 32 characters');\n });\n\n it('should reject empty action_name', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'stai0000000000000000000000000000',\n actionName: '',\n args: [],\n encryptSig: false,\n maxFee: 1000,\n })\n ).toThrow('action_name cannot be empty');\n });\n\n it('should reject whitespace-only action_name', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'stai0000000000000000000000000000',\n actionName: ' ',\n args: [],\n encryptSig: false,\n maxFee: 1000,\n })\n ).toThrow('action_name cannot be empty');\n });\n\n it('should reject encryptSig=true', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'stai0000000000000000000000000000',\n actionName: 'get_record',\n args: [],\n encryptSig: true,\n maxFee: 1000,\n })\n ).toThrow('encryption not implemented in MVP');\n });\n\n it('should reject negative maxFee', () => {\n expect(() =>\n validateAttestationRequest({\n dataProvider: '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n streamId: 'stai0000000000000000000000000000',\n actionName: 'get_record',\n args: [],\n encryptSig: false,\n maxFee: -1,\n })\n ).toThrow('max_fee must be non-negative');\n });\n });\n\n describe('isValidOrderBy', () => {\n it('should accept valid lowercase orderBy', () => {\n expect(isValidOrderBy('created_height asc')).toBe(true);\n expect(isValidOrderBy('created_height desc')).toBe(true);\n expect(isValidOrderBy('signed_height asc')).toBe(true);\n expect(isValidOrderBy('signed_height desc')).toBe(true);\n });\n\n it('should accept valid uppercase orderBy', () => {\n expect(isValidOrderBy('created_height ASC')).toBe(true);\n expect(isValidOrderBy('created_height DESC')).toBe(true);\n expect(isValidOrderBy('signed_height ASC')).toBe(true);\n expect(isValidOrderBy('signed_height DESC')).toBe(true);\n });\n\n it('should accept mixed case and trim whitespace', () => {\n expect(isValidOrderBy(' created_height ASC ')).toBe(true);\n expect(isValidOrderBy('Created_Height Desc')).toBe(true);\n expect(isValidOrderBy('SIGNED_HEIGHT asc')).toBe(true);\n expect(isValidOrderBy(' signed_height DESC ')).toBe(true);\n });\n\n it('should reject invalid orderBy', () => {\n expect(isValidOrderBy('invalid')).toBe(false);\n expect(isValidOrderBy('created_height')).toBe(false);\n expect(isValidOrderBy('created_height ascending')).toBe(false);\n expect(isValidOrderBy('')).toBe(false);\n });\n });\n\n describe('validateListAttestationsInput', () => {\n it('should accept valid input with all fields', () => {\n expect(() =>\n validateListAttestationsInput({\n requester: new Uint8Array(20),\n requestTxId: 'abc123',\n attestationHash: new Uint8Array(32),\n resultCanonical: new Uint8Array(100),\n limit: 100,\n offset: 0,\n orderBy: 'created_height desc',\n })\n ).not.toThrow();\n });\n\n it('should accept valid input with no optional fields', () => {\n expect(() => validateListAttestationsInput({})).not.toThrow();\n });\n\n it('should accept attestationHash filter', () => {\n expect(() =>\n validateListAttestationsInput({\n attestationHash: new Uint8Array(32),\n })\n ).not.toThrow();\n });\n\n it('should accept resultCanonical filter', () => {\n expect(() =>\n validateListAttestationsInput({\n resultCanonical: new Uint8Array(64),\n })\n ).not.toThrow();\n });\n\n it('should reject limit < 1', () => {\n expect(() =>\n validateListAttestationsInput({\n limit: 0,\n })\n ).toThrow('limit must be between 1 and 5000');\n });\n\n it('should reject limit > 5000', () => {\n expect(() =>\n validateListAttestationsInput({\n limit: 5001,\n })\n ).toThrow('limit must be between 1 and 5000');\n });\n\n it('should reject negative offset', () => {\n expect(() =>\n validateListAttestationsInput({\n offset: -1,\n })\n ).toThrow('offset must be non-negative');\n });\n\n it('should reject requester != 20 bytes (too long)', () => {\n expect(() =>\n validateListAttestationsInput({\n requester: new Uint8Array(21),\n })\n ).toThrow('requester must be exactly 20 bytes');\n });\n\n it('should reject requester != 20 bytes (too short)', () => {\n expect(() =>\n validateListAttestationsInput({\n requester: new Uint8Array(19),\n })\n ).toThrow('requester must be exactly 20 bytes');\n });\n\n it('should reject invalid orderBy', () => {\n expect(() =>\n validateListAttestationsInput({\n orderBy: 'invalid',\n })\n ).toThrow('Invalid orderBy value');\n });\n });\n}\n"],
5
+ "mappings": ";;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AA6LO,SAAS,2BAA2B,OAAsC;AAE/E,MAAI,MAAM,aAAa,WAAW,IAAI;AACpC,UAAM,IAAI;AAAA,MACR,4DAA4D,MAAM,aAAa,MAAM;AAAA,IACvF;AAAA,EACF;AAEA,MAAI,CAAC,MAAM,aAAa,WAAW,IAAI,GAAG;AACxC,UAAM,IAAI,MAAM,yCAAyC;AAAA,EAC3D;AAGA,QAAM,MAAM,MAAM,aAAa,MAAM,CAAC;AACtC,MAAI,CAAC,oBAAoB,KAAK,GAAG,GAAG;AAClC,UAAM,IAAI,MAAM,iEAAiE;AAAA,EACnF;AAGA,MAAI,MAAM,SAAS,WAAW,IAAI;AAChC,UAAM,IAAI,MAAM,wCAAwC,MAAM,SAAS,MAAM,EAAE;AAAA,EACjF;AAGA,MAAI,CAAC,MAAM,cAAc,MAAM,WAAW,KAAK,MAAM,IAAI;AACvD,UAAM,IAAI,MAAM,6BAA6B;AAAA,EAC/C;AAGA,MAAI,MAAM,YAAY;AACpB,UAAM,IAAI,MAAM,mCAAmC;AAAA,EACrD;AAGA,QAAM,YAAY,OAAO,MAAM,WAAW,WACtC,MAAM,SACN,OAAO,MAAM,WAAW,WACxB,OAAO,MAAM,MAAM,IACnB,OAAO,KAAK,MAAM,MAAM,MAAM,CAAC;AAEnC,MAAI,YAAY,IAAI;AAClB,UAAM,IAAI,MAAM,qCAAqC,MAAM,MAAM,EAAE;AAAA,EACrE;AACF;AAKA,IAAM,wBAAwB;AAAA,EAC5B;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAQO,SAAS,eAAe,SAA0B;AAEvD,QAAM,aAAa,QAAQ,KAAK,EAAE,YAAY;AAC9C,SAAO,sBAAsB,SAAS,UAAU;AAClD;AAQO,SAAS,8BAA8B,OAAoC;AAEhF,MAAI,MAAM,UAAU,QAAW;AAC7B,QAAI,MAAM,QAAQ,KAAK,MAAM,QAAQ,KAAM;AACzC,YAAM,IAAI,MAAM,kCAAkC;AAAA,IACpD;AAAA,EACF;AAGA,MAAI,MAAM,WAAW,QAAW;AAC9B,QAAI,MAAM,SAAS,GAAG;AACpB,YAAM,IAAI,MAAM,6BAA6B;AAAA,IAC/C;AAAA,EACF;AAGA,MAAI,MAAM,cAAc,QAAW;AACjC,QAAI,MAAM,UAAU,WAAW,IAAI;AACjC,YAAM,IAAI,MAAM,oCAAoC;AAAA,IACtD;AAAA,EACF;AAGA,MAAI,MAAM,YAAY,QAAW;AAC/B,QAAI,CAAC,eAAe,MAAM,OAAO,GAAG;AAClC,YAAM,IAAI;AAAA,QACR,0CAA0C,sBAAsB,MAAM,GAAG,CAAC,EAAE,KAAK,IAAI,CAAC;AAAA,MACxF;AAAA,IACF;AAAA,EACF;AACF;AAGA,IAAI,YAAY,QAAQ;AACtB,QAAM,EAAE,UAAU,IAAI,OAAO,IAAI,YAAY;AAE7C,WAAS,8BAA8B,MAAM;AAC3C,OAAG,6BAA6B,MAAM;AACpC;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,IAAI,QAAQ;AAAA,IAChB,CAAC;AAED,OAAG,8CAA8C,MAAM;AACrD;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,qDAAqD;AAAA,IACjE,CAAC;AAED,OAAG,iDAAiD,MAAM;AACxD;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,yCAAyC;AAAA,IACrD,CAAC;AAED,OAAG,gDAAgD,MAAM;AACvD;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,iDAAiD;AAAA,IAC7D,CAAC;AAED,OAAG,iCAAiC,MAAM;AACxC;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,iCAAiC;AAAA,IAC7C,CAAC;AAED,OAAG,gCAAgC,MAAM;AACvC;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,iCAAiC;AAAA,IAC7C,CAAC;AAED,OAAG,mCAAmC,MAAM;AAC1C;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,6BAA6B;AAAA,IACzC,CAAC;AAED,OAAG,6CAA6C,MAAM;AACpD;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,6BAA6B;AAAA,IACzC,CAAC;AAED,OAAG,iCAAiC,MAAM;AACxC;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,mCAAmC;AAAA,IAC/C,CAAC;AAED,OAAG,iCAAiC,MAAM;AACxC;AAAA,QAAO,MACL,2BAA2B;AAAA,UACzB,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,UACZ,MAAM,CAAC;AAAA,UACP,YAAY;AAAA,UACZ,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,8BAA8B;AAAA,IAC1C,CAAC;AAAA,EACH,CAAC;AAED,WAAS,kBAAkB,MAAM;AAC/B,OAAG,yCAAyC,MAAM;AAChD,aAAO,eAAe,oBAAoB,CAAC,EAAE,KAAK,IAAI;AACtD,aAAO,eAAe,qBAAqB,CAAC,EAAE,KAAK,IAAI;AACvD,aAAO,eAAe,mBAAmB,CAAC,EAAE,KAAK,IAAI;AACrD,aAAO,eAAe,oBAAoB,CAAC,EAAE,KAAK,IAAI;AAAA,IACxD,CAAC;AAED,OAAG,yCAAyC,MAAM;AAChD,aAAO,eAAe,oBAAoB,CAAC,EAAE,KAAK,IAAI;AACtD,aAAO,eAAe,qBAAqB,CAAC,EAAE,KAAK,IAAI;AACvD,aAAO,eAAe,mBAAmB,CAAC,EAAE,KAAK,IAAI;AACrD,aAAO,eAAe,oBAAoB,CAAC,EAAE,KAAK,IAAI;AAAA,IACxD,CAAC;AAED,OAAG,gDAAgD,MAAM;AACvD,aAAO,eAAe,wBAAwB,CAAC,EAAE,KAAK,IAAI;AAC1D,aAAO,eAAe,qBAAqB,CAAC,EAAE,KAAK,IAAI;AACvD,aAAO,eAAe,mBAAmB,CAAC,EAAE,KAAK,IAAI;AACrD,aAAO,eAAe,sBAAsB,CAAC,EAAE,KAAK,IAAI;AAAA,IAC1D,CAAC;AAED,OAAG,iCAAiC,MAAM;AACxC,aAAO,eAAe,SAAS,CAAC,EAAE,KAAK,KAAK;AAC5C,aAAO,eAAe,gBAAgB,CAAC,EAAE,KAAK,KAAK;AACnD,aAAO,eAAe,0BAA0B,CAAC,EAAE,KAAK,KAAK;AAC7D,aAAO,eAAe,EAAE,CAAC,EAAE,KAAK,KAAK;AAAA,IACvC,CAAC;AAAA,EACH,CAAC;AAED,WAAS,iCAAiC,MAAM;AAC9C,OAAG,6CAA6C,MAAM;AACpD;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,WAAW,IAAI,WAAW,EAAE;AAAA,UAC5B,aAAa;AAAA,UACb,iBAAiB,IAAI,WAAW,EAAE;AAAA,UAClC,iBAAiB,IAAI,WAAW,GAAG;AAAA,UACnC,OAAO;AAAA,UACP,QAAQ;AAAA,UACR,SAAS;AAAA,QACX,CAAC;AAAA,MACH,EAAE,IAAI,QAAQ;AAAA,IAChB,CAAC;AAED,OAAG,qDAAqD,MAAM;AAC5D,aAAO,MAAM,8BAA8B,CAAC,CAAC,CAAC,EAAE,IAAI,QAAQ;AAAA,IAC9D,CAAC;AAED,OAAG,wCAAwC,MAAM;AAC/C;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,iBAAiB,IAAI,WAAW,EAAE;AAAA,QACpC,CAAC;AAAA,MACH,EAAE,IAAI,QAAQ;AAAA,IAChB,CAAC;AAED,OAAG,wCAAwC,MAAM;AAC/C;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,iBAAiB,IAAI,WAAW,EAAE;AAAA,QACpC,CAAC;AAAA,MACH,EAAE,IAAI,QAAQ;AAAA,IAChB,CAAC;AAED,OAAG,2BAA2B,MAAM;AAClC;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,OAAO;AAAA,QACT,CAAC;AAAA,MACH,EAAE,QAAQ,kCAAkC;AAAA,IAC9C,CAAC;AAED,OAAG,8BAA8B,MAAM;AACrC;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,OAAO;AAAA,QACT,CAAC;AAAA,MACH,EAAE,QAAQ,kCAAkC;AAAA,IAC9C,CAAC;AAED,OAAG,iCAAiC,MAAM;AACxC;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,QAAQ;AAAA,QACV,CAAC;AAAA,MACH,EAAE,QAAQ,6BAA6B;AAAA,IACzC,CAAC;AAED,OAAG,kDAAkD,MAAM;AACzD;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,WAAW,IAAI,WAAW,EAAE;AAAA,QAC9B,CAAC;AAAA,MACH,EAAE,QAAQ,oCAAoC;AAAA,IAChD,CAAC;AAED,OAAG,mDAAmD,MAAM;AAC1D;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,WAAW,IAAI,WAAW,EAAE;AAAA,QAC9B,CAAC;AAAA,MACH,EAAE,QAAQ,oCAAoC;AAAA,IAChD,CAAC;AAED,OAAG,iCAAiC,MAAM;AACxC;AAAA,QAAO,MACL,8BAA8B;AAAA,UAC5B,SAAS;AAAA,QACX,CAAC;AAAA,MACH,EAAE,QAAQ,uBAAuB;AAAA,IACnC,CAAC;AAAA,EACH,CAAC;AACH;",
6
6
  "names": []
7
7
  }
@@ -133,8 +133,8 @@ var AttestationAction = class extends Action {
133
133
  /**
134
134
  * List attestation metadata with optional filtering
135
135
  *
136
- * This returns metadata for attestations, optionally filtered by requester address or request transaction ID.
137
- * Supports pagination and sorting.
136
+ * This returns metadata for attestations, optionally filtered by requester address, request transaction ID,
137
+ * attestation hash, or result canonical bytes. Supports pagination and sorting.
138
138
  *
139
139
  * @param input - Filter and pagination parameters
140
140
  * @returns Promise resolving to array of attestation metadata
@@ -163,6 +163,8 @@ var AttestationAction = class extends Action {
163
163
  const params = {
164
164
  $requester: input.requester ?? new Uint8Array(0),
165
165
  $request_tx_id: input.requestTxId ?? null,
166
+ $attestation_hash: input.attestationHash ?? new Uint8Array(0),
167
+ $result_canonical: input.resultCanonical ?? new Uint8Array(0),
166
168
  $limit: limit,
167
169
  $offset: offset,
168
170
  $order_by: input.orderBy ?? null
@@ -185,25 +187,31 @@ function parseAttestationRow(row, idx) {
185
187
  let requestTxId;
186
188
  let attestationHash;
187
189
  let requester;
190
+ let dataProvider;
191
+ let streamId;
188
192
  let createdHeight;
189
193
  let signedHeight;
190
194
  let encryptSig;
191
195
  if (Array.isArray(row)) {
192
- if (row.length < 6) {
196
+ if (row.length < 8) {
193
197
  throw new Error(
194
- `Row ${idx}: expected 6 columns, got ${row.length}`
198
+ `Row ${idx}: expected 8 columns, got ${row.length}`
195
199
  );
196
200
  }
197
201
  requestTxId = row[0];
198
202
  attestationHash = decodeBytea(row[1], idx, "attestation_hash");
199
203
  requester = decodeBytea(row[2], idx, "requester");
200
- createdHeight = parseInt(row[3], 10);
201
- signedHeight = row[4] !== null ? parseInt(row[4], 10) : null;
202
- encryptSig = row[5];
204
+ dataProvider = row[3];
205
+ streamId = row[4];
206
+ createdHeight = parseInt(row[5], 10);
207
+ signedHeight = row[6] !== null ? parseInt(row[6], 10) : null;
208
+ encryptSig = row[7];
203
209
  } else {
204
210
  requestTxId = row.request_tx_id;
205
211
  attestationHash = decodeBytea(row.attestation_hash, idx, "attestation_hash");
206
212
  requester = decodeBytea(row.requester, idx, "requester");
213
+ dataProvider = row.data_provider;
214
+ streamId = row.stream_id;
207
215
  createdHeight = parseInt(row.created_height, 10);
208
216
  signedHeight = row.signed_height !== null ? parseInt(row.signed_height, 10) : null;
209
217
  encryptSig = row.encrypt_sig;
@@ -212,6 +220,8 @@ function parseAttestationRow(row, idx) {
212
220
  requestTxId,
213
221
  attestationHash,
214
222
  requester,
223
+ dataProvider,
224
+ streamId,
215
225
  createdHeight,
216
226
  signedHeight,
217
227
  encryptSig
@@ -272,6 +282,8 @@ if (import.meta.vitest) {
272
282
  "tx123",
273
283
  Buffer.from([1, 2, 3]).toString("base64"),
274
284
  Buffer.from([4, 5, 6]).toString("base64"),
285
+ "0x4710a8d8f0d845da110086812a32de6d90d7ff5c",
286
+ "stai0000000000000000000000000000",
275
287
  "100",
276
288
  "200",
277
289
  true
@@ -280,6 +292,8 @@ if (import.meta.vitest) {
280
292
  expect(metadata.requestTxId).toBe("tx123");
281
293
  expect(Array.from(metadata.attestationHash)).toEqual([1, 2, 3]);
282
294
  expect(Array.from(metadata.requester)).toEqual([4, 5, 6]);
295
+ expect(metadata.dataProvider).toBe("0x4710a8d8f0d845da110086812a32de6d90d7ff5c");
296
+ expect(metadata.streamId).toBe("stai0000000000000000000000000000");
283
297
  expect(metadata.createdHeight).toBe(100);
284
298
  expect(metadata.signedHeight).toBe(200);
285
299
  expect(metadata.encryptSig).toBe(true);
@@ -289,6 +303,8 @@ if (import.meta.vitest) {
289
303
  request_tx_id: "tx456",
290
304
  attestation_hash: Buffer.from([7, 8, 9]).toString("base64"),
291
305
  requester: Buffer.from([10, 11, 12]).toString("base64"),
306
+ data_provider: "0x1234567890123456789012345678901234567890",
307
+ stream_id: "stbx0000000000000000000000000000",
292
308
  created_height: "300",
293
309
  signed_height: null,
294
310
  encrypt_sig: false
@@ -297,6 +313,8 @@ if (import.meta.vitest) {
297
313
  expect(metadata.requestTxId).toBe("tx456");
298
314
  expect(Array.from(metadata.attestationHash)).toEqual([7, 8, 9]);
299
315
  expect(Array.from(metadata.requester)).toEqual([10, 11, 12]);
316
+ expect(metadata.dataProvider).toBe("0x1234567890123456789012345678901234567890");
317
+ expect(metadata.streamId).toBe("stbx0000000000000000000000000000");
300
318
  expect(metadata.createdHeight).toBe(300);
301
319
  expect(metadata.signedHeight).toBe(null);
302
320
  expect(metadata.encryptSig).toBe(false);
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../src/contracts-api/attestationAction.ts"],
4
- "sourcesContent": ["/**\n * Attestation action implementation\n *\n * This module provides methods for requesting, retrieving, and listing attestations.\n * Attestations are cryptographically signed proofs of query results that can be\n * consumed by smart contracts and external applications.\n */\n\nimport { Types, Utils } from '@trufnetwork/kwil-js';\nimport { Action } from './action';\nimport {\n RequestAttestationInput,\n RequestAttestationResult,\n GetSignedAttestationInput,\n SignedAttestationResult,\n ListAttestationsInput,\n AttestationMetadata,\n validateAttestationRequest,\n validateListAttestationsInput,\n} from '../types/attestation';\nimport { encodeActionArgs } from '../util/AttestationEncoding';\n\n/**\n * AttestationAction provides methods for working with data attestations\n *\n * Attestations enable validators to cryptographically sign query results,\n * providing verifiable proofs that can be used in smart contracts.\n *\n * @example\n * ```typescript\n * const client = new NodeTNClient({ ... });\n * const attestationAction = client.loadAttestationAction();\n *\n * // Request an attestation\n * const result = await attestationAction.requestAttestation({\n * dataProvider: \"0x4710a8d8f0d845da110086812a32de6d90d7ff5c\",\n * streamId: \"stai0000000000000000000000000000\",\n * actionName: \"get_record\",\n * args: [dataProvider, streamId, fromTime, toTime, null, false],\n * encryptSig: false,\n * maxFee: 1000000,\n * });\n *\n * // Wait for signing (1-2 blocks)\n * await new Promise(resolve => setTimeout(resolve, 10000));\n *\n * // Retrieve signed attestation\n * const signed = await attestationAction.getSignedAttestation({\n * requestTxId: result.requestTxId,\n * });\n * ```\n */\nexport class AttestationAction extends Action {\n /**\n * Request a signed attestation of query results\n *\n * This submits a transaction requesting that validators execute a query\n * and sign the results. The leader validator will sign the attestation\n * asynchronously (typically 1-2 blocks later).\n *\n * @param input - Attestation request parameters\n * @returns Promise resolving to request result with transaction ID\n * @throws Error if validation fails or transaction fails\n *\n * @example\n * ```typescript\n * const result = await attestationAction.requestAttestation({\n * dataProvider: \"0x4710a8d8f0d845da110086812a32de6d90d7ff5c\",\n * streamId: \"stai0000000000000000000000000000\",\n * actionName: \"get_record\",\n * args: [\n * \"0x4710a8d8f0d845da110086812a32de6d90d7ff5c\",\n * \"stai0000000000000000000000000000\",\n * Math.floor(Date.now() / 1000) - 86400, // 1 day ago\n * Math.floor(Date.now() / 1000),\n * null,\n * false,\n * ],\n * encryptSig: false,\n * maxFee: 1000000,\n * });\n * console.log(`Request TX ID: ${result.requestTxId}`);\n * ```\n */\n async requestAttestation(\n input: RequestAttestationInput\n ): Promise<RequestAttestationResult> {\n // Validate input\n validateAttestationRequest(input);\n\n // Encode arguments\n const argsBytes = encodeActionArgs(input.args);\n\n // Prepare named parameters for request_attestation action\n // Note: maxFee must be a string with NUMERIC type to encode as NUMERIC(788,0) for wei amounts\n const params: Types.NamedParams[] = [{\n $data_provider: input.dataProvider,\n $stream_id: input.streamId,\n $action_name: input.actionName,\n $args_bytes: argsBytes,\n $encrypt_sig: input.encryptSig,\n $max_fee: input.maxFee.toString(),\n }];\n\n // Specify types - maxFee needs NUMERIC(78,0) for large wei amounts\n const types = {\n $max_fee: Utils.DataType.Numeric(78, 0),\n };\n\n // Execute request_attestation action\n const result = await this.executeWithNamedParams('request_attestation', params, types);\n\n // Check for errors\n if (!result.data?.tx_hash) {\n throw new Error(\n 'Failed to request attestation: no transaction hash returned'\n );\n }\n\n // Return the 64-char hex tx_hash\n return {\n requestTxId: result.data.tx_hash,\n };\n }\n\n /**\n * Retrieve a complete signed attestation payload\n *\n * This fetches the signed attestation payload for a given request transaction ID.\n * The attestation must have been signed by the leader validator first.\n *\n * If the attestation is not yet signed, this will throw an error. Clients should\n * poll with exponential backoff or wait for 1-2 blocks after requesting.\n *\n * @param input - Request transaction ID\n * @returns Promise resolving to signed attestation payload\n * @throws Error if attestation not found or not yet signed\n *\n * @example\n * ```typescript\n * // Poll for signature\n * for (let i = 0; i < 15; i++) {\n * try {\n * const signed = await attestationAction.getSignedAttestation({\n * requestTxId: \"0x123...\",\n * });\n * console.log(`Payload: ${Buffer.from(signed.payload).toString('hex')}`);\n * break;\n * } catch (e) {\n * await new Promise(resolve => setTimeout(resolve, 2000));\n * }\n * }\n * ```\n */\n async getSignedAttestation(\n input: GetSignedAttestationInput\n ): Promise<SignedAttestationResult> {\n // Validate and normalize input\n const trimmed = input.requestTxId?.trim() || '';\n if (trimmed === '') {\n throw new Error('request_tx_id is required');\n }\n\n // Strip optional \"0x\" prefix and lowercase for normalization\n const normalizedRequestTxId = trimmed.startsWith('0x')\n ? trimmed.slice(2).toLowerCase()\n : trimmed.toLowerCase();\n\n // Call get_signed_attestation view action\n const result = await this.call<Array<{ payload: string | Uint8Array }>>(\n 'get_signed_attestation',\n { $request_tx_id: normalizedRequestTxId }\n );\n\n // Extract the right value from Either, or throw if Left\n const data = result.throw();\n\n // The action returns an array of rows - extract the first row\n if (!data || !Array.isArray(data) || data.length === 0) {\n throw new Error('No attestation found for request_tx_id - may not exist or is not yet signed');\n }\n\n const row = data[0];\n if (!row || !row.payload) {\n throw new Error('No payload in attestation row');\n }\n\n // Decode base64 to bytes\n let payloadBytes: Uint8Array;\n const payloadValue = row.payload;\n\n if (typeof payloadValue === 'string') {\n // Node.js environment\n if (typeof Buffer !== 'undefined') {\n payloadBytes = new Uint8Array(Buffer.from(payloadValue, 'base64'));\n } else {\n // Browser environment\n const binaryString = atob(payloadValue);\n payloadBytes = new Uint8Array(binaryString.length);\n for (let i = 0; i < binaryString.length; i++) {\n payloadBytes[i] = binaryString.charCodeAt(i);\n }\n }\n } else if (payloadValue instanceof Uint8Array) {\n // Already decoded\n payloadBytes = payloadValue;\n } else {\n throw new Error(`Unexpected payload type: ${typeof payloadValue}`);\n }\n\n return {\n payload: payloadBytes,\n };\n }\n\n /**\n * List attestation metadata with optional filtering\n *\n * This returns metadata for attestations, optionally filtered by requester address or request transaction ID.\n * Supports pagination and sorting.\n *\n * @param input - Filter and pagination parameters\n * @returns Promise resolving to array of attestation metadata\n * @throws Error if parameters are invalid\n *\n * @example\n * ```typescript\n * // List my recent attestations\n * const myAddress = new Uint8Array(Buffer.from(wallet.address.slice(2), 'hex'));\n * const attestations = await attestationAction.listAttestations({\n * requester: myAddress,\n * limit: 10,\n * offset: 0,\n * orderBy: \"created_height desc\",\n * });\n *\n * attestations.forEach(att => {\n * console.log(`TX: ${att.requestTxId}, Height: ${att.createdHeight}`);\n * });\n * ```\n */\n async listAttestations(\n input: ListAttestationsInput\n ): Promise<AttestationMetadata[]> {\n // Validate input\n validateListAttestationsInput(input);\n\n // Set defaults\n const limit = input.limit ?? 5000;\n const offset = input.offset ?? 0;\n\n // Prepare parameters for list_attestations view action\n // Note: Empty Uint8Array represents BYTEA NULL (handled by kwil-js 0.9.10+)\n const params: Types.NamedParams = {\n $requester: input.requester ?? new Uint8Array(0),\n $request_tx_id: input.requestTxId ?? null,\n $limit: limit,\n $offset: offset,\n $order_by: input.orderBy ?? null,\n };\n\n // Call list_attestations view action\n const result = await this.call<any[]>('list_attestations', params);\n\n // Check for errors\n if (result.isLeft()) {\n throw new Error(\n `Failed to list attestations: HTTP status ${result.value}`\n );\n }\n\n // Extract the right value from Either\n // Note: result.value might be a getter function, so call it if needed\n const rightValue = typeof result.value === 'function' ? result.value() : result.value;\n const rows = Array.isArray(rightValue) ? rightValue : [];\n\n // If no rows, return empty array\n if (!rows || rows.length === 0) {\n return [];\n }\n\n // Parse rows into AttestationMetadata\n return rows.map((row: any, idx: number) => parseAttestationRow(row, idx));\n }\n}\n\n/**\n * Parse a single row from list_attestations result into AttestationMetadata\n *\n * Expected columns (in order):\n * 0. request_tx_id (TEXT)\n * 1. attestation_hash (BYTEA)\n * 2. requester (BYTEA)\n * 3. created_height (INT8)\n * 4. signed_height (INT8, nullable)\n * 5. encrypt_sig (BOOLEAN)\n */\nfunction parseAttestationRow(row: any, idx: number): AttestationMetadata {\n // kwil-js returns rows as objects with column names as keys\n // or as arrays depending on the query format\n let requestTxId: string;\n let attestationHash: Uint8Array;\n let requester: Uint8Array;\n let createdHeight: number;\n let signedHeight: number | null;\n let encryptSig: boolean;\n\n // Handle both array and object formats\n if (Array.isArray(row)) {\n // Array format: [col0, col1, col2, ...]\n if (row.length < 6) {\n throw new Error(\n `Row ${idx}: expected 6 columns, got ${row.length}`\n );\n }\n\n requestTxId = row[0];\n attestationHash = decodeBytea(row[1], idx, 'attestation_hash');\n requester = decodeBytea(row[2], idx, 'requester');\n createdHeight = parseInt(row[3], 10);\n signedHeight = row[4] !== null ? parseInt(row[4], 10) : null;\n encryptSig = row[5];\n } else {\n // Object format: { request_tx_id: ..., attestation_hash: ..., ... }\n requestTxId = row.request_tx_id;\n attestationHash = decodeBytea(row.attestation_hash, idx, 'attestation_hash');\n requester = decodeBytea(row.requester, idx, 'requester');\n createdHeight = parseInt(row.created_height, 10);\n signedHeight = row.signed_height !== null ? parseInt(row.signed_height, 10) : null;\n encryptSig = row.encrypt_sig;\n }\n\n return {\n requestTxId,\n attestationHash,\n requester,\n createdHeight,\n signedHeight,\n encryptSig,\n };\n}\n\n/**\n * Decode a BYTEA column from base64\n */\nfunction decodeBytea(value: any, rowIdx: number, colName: string): Uint8Array {\n if (value === null || value === undefined) {\n throw new Error(`Row ${rowIdx}: ${colName} is null or undefined`);\n }\n\n // If already Uint8Array, return as-is\n if (value instanceof Uint8Array) {\n return value;\n }\n\n // If string, decode from base64\n if (typeof value === 'string') {\n try {\n // Node.js environment\n if (typeof Buffer !== 'undefined') {\n return new Uint8Array(Buffer.from(value, 'base64'));\n } else {\n // Browser environment\n const binaryString = atob(value);\n const bytes = new Uint8Array(binaryString.length);\n for (let i = 0; i < binaryString.length; i++) {\n bytes[i] = binaryString.charCodeAt(i);\n }\n return bytes;\n }\n } catch (err) {\n throw new Error(\n `Row ${rowIdx}: failed to decode ${colName} as base64: ${err}`\n );\n }\n }\n\n throw new Error(\n `Row ${rowIdx}: expected ${colName} to be string or Uint8Array, got ${typeof value}`\n );\n}\n\n// Inline unit tests\nif (import.meta.vitest) {\n const { describe, it, expect } = import.meta.vitest;\n\n describe('decodeBytea', () => {\n it('should decode base64 string', () => {\n const base64 = Buffer.from([1, 2, 3, 4]).toString('base64');\n const decoded = decodeBytea(base64, 0, 'test');\n expect(Array.from(decoded)).toEqual([1, 2, 3, 4]);\n });\n\n it('should return Uint8Array as-is', () => {\n const bytes = new Uint8Array([1, 2, 3, 4]);\n const decoded = decodeBytea(bytes, 0, 'test');\n expect(decoded).toBe(bytes);\n });\n\n it('should throw on null', () => {\n expect(() => decodeBytea(null, 0, 'test')).toThrow('null or undefined');\n });\n\n it('should throw on invalid type', () => {\n expect(() => decodeBytea(123, 0, 'test')).toThrow('expected test to be string or Uint8Array');\n });\n });\n\n describe('parseAttestationRow', () => {\n it('should parse array format row', () => {\n const row = [\n 'tx123',\n Buffer.from([1, 2, 3]).toString('base64'),\n Buffer.from([4, 5, 6]).toString('base64'),\n '100',\n '200',\n true,\n ];\n\n const metadata = parseAttestationRow(row, 0);\n\n expect(metadata.requestTxId).toBe('tx123');\n expect(Array.from(metadata.attestationHash)).toEqual([1, 2, 3]);\n expect(Array.from(metadata.requester)).toEqual([4, 5, 6]);\n expect(metadata.createdHeight).toBe(100);\n expect(metadata.signedHeight).toBe(200);\n expect(metadata.encryptSig).toBe(true);\n });\n\n it('should parse object format row', () => {\n const row = {\n request_tx_id: 'tx456',\n attestation_hash: Buffer.from([7, 8, 9]).toString('base64'),\n requester: Buffer.from([10, 11, 12]).toString('base64'),\n created_height: '300',\n signed_height: null,\n encrypt_sig: false,\n };\n\n const metadata = parseAttestationRow(row, 0);\n\n expect(metadata.requestTxId).toBe('tx456');\n expect(Array.from(metadata.attestationHash)).toEqual([7, 8, 9]);\n expect(Array.from(metadata.requester)).toEqual([10, 11, 12]);\n expect(metadata.createdHeight).toBe(300);\n expect(metadata.signedHeight).toBe(null);\n expect(metadata.encryptSig).toBe(false);\n });\n });\n}\n"],
5
- "mappings": ";AAQA,SAAgB,aAAa;AAC7B,SAAS,cAAc;AACvB;AAAA,EAOE;AAAA,EACA;AAAA,OACK;AACP,SAAS,wBAAwB;AAgC1B,IAAM,oBAAN,cAAgC,OAAO;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAgC5C,MAAM,mBACJ,OACmC;AAEnC,+BAA2B,KAAK;AAGhC,UAAM,YAAY,iBAAiB,MAAM,IAAI;AAI7C,UAAM,SAA8B,CAAC;AAAA,MACnC,gBAAgB,MAAM;AAAA,MACtB,YAAY,MAAM;AAAA,MAClB,cAAc,MAAM;AAAA,MACpB,aAAa;AAAA,MACb,cAAc,MAAM;AAAA,MACpB,UAAU,MAAM,OAAO,SAAS;AAAA,IAClC,CAAC;AAGD,UAAM,QAAQ;AAAA,MACZ,UAAU,MAAM,SAAS,QAAQ,IAAI,CAAC;AAAA,IACxC;AAGA,UAAM,SAAS,MAAM,KAAK,uBAAuB,uBAAuB,QAAQ,KAAK;AAGrF,QAAI,CAAC,OAAO,MAAM,SAAS;AACzB,YAAM,IAAI;AAAA,QACR;AAAA,MACF;AAAA,IACF;AAGA,WAAO;AAAA,MACL,aAAa,OAAO,KAAK;AAAA,IAC3B;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EA+BA,MAAM,qBACJ,OACkC;AAElC,UAAM,UAAU,MAAM,aAAa,KAAK,KAAK;AAC7C,QAAI,YAAY,IAAI;AAClB,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AAGA,UAAM,wBAAwB,QAAQ,WAAW,IAAI,IACjD,QAAQ,MAAM,CAAC,EAAE,YAAY,IAC7B,QAAQ,YAAY;AAGxB,UAAM,SAAS,MAAM,KAAK;AAAA,MACxB;AAAA,MACA,EAAE,gBAAgB,sBAAsB;AAAA,IAC1C;AAGA,UAAM,OAAO,OAAO,MAAM;AAG1B,QAAI,CAAC,QAAQ,CAAC,MAAM,QAAQ,IAAI,KAAK,KAAK,WAAW,GAAG;AACtD,YAAM,IAAI,MAAM,6EAA6E;AAAA,IAC/F;AAEA,UAAM,MAAM,KAAK,CAAC;AAClB,QAAI,CAAC,OAAO,CAAC,IAAI,SAAS;AACxB,YAAM,IAAI,MAAM,+BAA+B;AAAA,IACjD;AAGA,QAAI;AACJ,UAAM,eAAe,IAAI;AAEzB,QAAI,OAAO,iBAAiB,UAAU;AAEpC,UAAI,OAAO,WAAW,aAAa;AACjC,uBAAe,IAAI,WAAW,OAAO,KAAK,cAAc,QAAQ,CAAC;AAAA,MACnE,OAAO;AAEL,cAAM,eAAe,KAAK,YAAY;AACtC,uBAAe,IAAI,WAAW,aAAa,MAAM;AACjD,iBAAS,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;AAC5C,uBAAa,CAAC,IAAI,aAAa,WAAW,CAAC;AAAA,QAC7C;AAAA,MACF;AAAA,IACF,WAAW,wBAAwB,YAAY;AAE7C,qBAAe;AAAA,IACjB,OAAO;AACL,YAAM,IAAI,MAAM,4BAA4B,OAAO,YAAY,EAAE;AAAA,IACnE;AAEA,WAAO;AAAA,MACL,SAAS;AAAA,IACX;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EA4BA,MAAM,iBACJ,OACgC;AAEhC,kCAA8B,KAAK;AAGnC,UAAM,QAAQ,MAAM,SAAS;AAC7B,UAAM,SAAS,MAAM,UAAU;AAI/B,UAAM,SAA4B;AAAA,MAChC,YAAY,MAAM,aAAa,IAAI,WAAW,CAAC;AAAA,MAC/C,gBAAgB,MAAM,eAAe;AAAA,MACrC,QAAQ;AAAA,MACR,SAAS;AAAA,MACT,WAAW,MAAM,WAAW;AAAA,IAC9B;AAGA,UAAM,SAAS,MAAM,KAAK,KAAY,qBAAqB,MAAM;AAGjE,QAAI,OAAO,OAAO,GAAG;AACnB,YAAM,IAAI;AAAA,QACR,4CAA4C,OAAO,KAAK;AAAA,MAC1D;AAAA,IACF;AAIA,UAAM,aAAa,OAAO,OAAO,UAAU,aAAa,OAAO,MAAM,IAAI,OAAO;AAChF,UAAM,OAAO,MAAM,QAAQ,UAAU,IAAI,aAAa,CAAC;AAGvD,QAAI,CAAC,QAAQ,KAAK,WAAW,GAAG;AAC9B,aAAO,CAAC;AAAA,IACV;AAGA,WAAO,KAAK,IAAI,CAAC,KAAU,QAAgB,oBAAoB,KAAK,GAAG,CAAC;AAAA,EAC1E;AACF;AAaA,SAAS,oBAAoB,KAAU,KAAkC;AAGvE,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AAGJ,MAAI,MAAM,QAAQ,GAAG,GAAG;AAEtB,QAAI,IAAI,SAAS,GAAG;AAClB,YAAM,IAAI;AAAA,QACR,OAAO,GAAG,6BAA6B,IAAI,MAAM;AAAA,MACnD;AAAA,IACF;AAEA,kBAAc,IAAI,CAAC;AACnB,sBAAkB,YAAY,IAAI,CAAC,GAAG,KAAK,kBAAkB;AAC7D,gBAAY,YAAY,IAAI,CAAC,GAAG,KAAK,WAAW;AAChD,oBAAgB,SAAS,IAAI,CAAC,GAAG,EAAE;AACnC,mBAAe,IAAI,CAAC,MAAM,OAAO,SAAS,IAAI,CAAC,GAAG,EAAE,IAAI;AACxD,iBAAa,IAAI,CAAC;AAAA,EACpB,OAAO;AAEL,kBAAc,IAAI;AAClB,sBAAkB,YAAY,IAAI,kBAAkB,KAAK,kBAAkB;AAC3E,gBAAY,YAAY,IAAI,WAAW,KAAK,WAAW;AACvD,oBAAgB,SAAS,IAAI,gBAAgB,EAAE;AAC/C,mBAAe,IAAI,kBAAkB,OAAO,SAAS,IAAI,eAAe,EAAE,IAAI;AAC9E,iBAAa,IAAI;AAAA,EACnB;AAEA,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;AAKA,SAAS,YAAY,OAAY,QAAgB,SAA6B;AAC5E,MAAI,UAAU,QAAQ,UAAU,QAAW;AACzC,UAAM,IAAI,MAAM,OAAO,MAAM,KAAK,OAAO,uBAAuB;AAAA,EAClE;AAGA,MAAI,iBAAiB,YAAY;AAC/B,WAAO;AAAA,EACT;AAGA,MAAI,OAAO,UAAU,UAAU;AAC7B,QAAI;AAEF,UAAI,OAAO,WAAW,aAAa;AACjC,eAAO,IAAI,WAAW,OAAO,KAAK,OAAO,QAAQ,CAAC;AAAA,MACpD,OAAO;AAEL,cAAM,eAAe,KAAK,KAAK;AAC/B,cAAM,QAAQ,IAAI,WAAW,aAAa,MAAM;AAChD,iBAAS,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;AAC5C,gBAAM,CAAC,IAAI,aAAa,WAAW,CAAC;AAAA,QACtC;AACA,eAAO;AAAA,MACT;AAAA,IACF,SAAS,KAAK;AACZ,YAAM,IAAI;AAAA,QACR,OAAO,MAAM,sBAAsB,OAAO,eAAe,GAAG;AAAA,MAC9D;AAAA,IACF;AAAA,EACF;AAEA,QAAM,IAAI;AAAA,IACR,OAAO,MAAM,cAAc,OAAO,oCAAoC,OAAO,KAAK;AAAA,EACpF;AACF;AAGA,IAAI,YAAY,QAAQ;AACtB,QAAM,EAAE,UAAU,IAAI,OAAO,IAAI,YAAY;AAE7C,WAAS,eAAe,MAAM;AAC5B,OAAG,+BAA+B,MAAM;AACtC,YAAM,SAAS,OAAO,KAAK,CAAC,GAAG,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAC1D,YAAM,UAAU,YAAY,QAAQ,GAAG,MAAM;AAC7C,aAAO,MAAM,KAAK,OAAO,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,GAAG,CAAC,CAAC;AAAA,IAClD,CAAC;AAED,OAAG,kCAAkC,MAAM;AACzC,YAAM,QAAQ,IAAI,WAAW,CAAC,GAAG,GAAG,GAAG,CAAC,CAAC;AACzC,YAAM,UAAU,YAAY,OAAO,GAAG,MAAM;AAC5C,aAAO,OAAO,EAAE,KAAK,KAAK;AAAA,IAC5B,CAAC;AAED,OAAG,wBAAwB,MAAM;AAC/B,aAAO,MAAM,YAAY,MAAM,GAAG,MAAM,CAAC,EAAE,QAAQ,mBAAmB;AAAA,IACxE,CAAC;AAED,OAAG,gCAAgC,MAAM;AACvC,aAAO,MAAM,YAAY,KAAK,GAAG,MAAM,CAAC,EAAE,QAAQ,0CAA0C;AAAA,IAC9F,CAAC;AAAA,EACH,CAAC;AAED,WAAS,uBAAuB,MAAM;AACpC,OAAG,iCAAiC,MAAM;AACxC,YAAM,MAAM;AAAA,QACV;AAAA,QACA,OAAO,KAAK,CAAC,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAAA,QACxC,OAAO,KAAK,CAAC,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAAA,QACxC;AAAA,QACA;AAAA,QACA;AAAA,MACF;AAEA,YAAM,WAAW,oBAAoB,KAAK,CAAC;AAE3C,aAAO,SAAS,WAAW,EAAE,KAAK,OAAO;AACzC,aAAO,MAAM,KAAK,SAAS,eAAe,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;AAC9D,aAAO,MAAM,KAAK,SAAS,SAAS,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;AACxD,aAAO,SAAS,aAAa,EAAE,KAAK,GAAG;AACvC,aAAO,SAAS,YAAY,EAAE,KAAK,GAAG;AACtC,aAAO,SAAS,UAAU,EAAE,KAAK,IAAI;AAAA,IACvC,CAAC;AAED,OAAG,kCAAkC,MAAM;AACzC,YAAM,MAAM;AAAA,QACV,eAAe;AAAA,QACf,kBAAkB,OAAO,KAAK,CAAC,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAAA,QAC1D,WAAW,OAAO,KAAK,CAAC,IAAI,IAAI,EAAE,CAAC,EAAE,SAAS,QAAQ;AAAA,QACtD,gBAAgB;AAAA,QAChB,eAAe;AAAA,QACf,aAAa;AAAA,MACf;AAEA,YAAM,WAAW,oBAAoB,KAAK,CAAC;AAE3C,aAAO,SAAS,WAAW,EAAE,KAAK,OAAO;AACzC,aAAO,MAAM,KAAK,SAAS,eAAe,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;AAC9D,aAAO,MAAM,KAAK,SAAS,SAAS,CAAC,EAAE,QAAQ,CAAC,IAAI,IAAI,EAAE,CAAC;AAC3D,aAAO,SAAS,aAAa,EAAE,KAAK,GAAG;AACvC,aAAO,SAAS,YAAY,EAAE,KAAK,IAAI;AACvC,aAAO,SAAS,UAAU,EAAE,KAAK,KAAK;AAAA,IACxC,CAAC;AAAA,EACH,CAAC;AACH;",
4
+ "sourcesContent": ["/**\n * Attestation action implementation\n *\n * This module provides methods for requesting, retrieving, and listing attestations.\n * Attestations are cryptographically signed proofs of query results that can be\n * consumed by smart contracts and external applications.\n */\n\nimport { Types, Utils } from '@trufnetwork/kwil-js';\nimport { Action } from './action';\nimport {\n RequestAttestationInput,\n RequestAttestationResult,\n GetSignedAttestationInput,\n SignedAttestationResult,\n ListAttestationsInput,\n AttestationMetadata,\n validateAttestationRequest,\n validateListAttestationsInput,\n} from '../types/attestation';\nimport { encodeActionArgs } from '../util/AttestationEncoding';\n\n/**\n * AttestationAction provides methods for working with data attestations\n *\n * Attestations enable validators to cryptographically sign query results,\n * providing verifiable proofs that can be used in smart contracts.\n *\n * @example\n * ```typescript\n * const client = new NodeTNClient({ ... });\n * const attestationAction = client.loadAttestationAction();\n *\n * // Request an attestation\n * const result = await attestationAction.requestAttestation({\n * dataProvider: \"0x4710a8d8f0d845da110086812a32de6d90d7ff5c\",\n * streamId: \"stai0000000000000000000000000000\",\n * actionName: \"get_record\",\n * args: [dataProvider, streamId, fromTime, toTime, null, false],\n * encryptSig: false,\n * maxFee: 1000000,\n * });\n *\n * // Wait for signing (1-2 blocks)\n * await new Promise(resolve => setTimeout(resolve, 10000));\n *\n * // Retrieve signed attestation\n * const signed = await attestationAction.getSignedAttestation({\n * requestTxId: result.requestTxId,\n * });\n * ```\n */\nexport class AttestationAction extends Action {\n /**\n * Request a signed attestation of query results\n *\n * This submits a transaction requesting that validators execute a query\n * and sign the results. The leader validator will sign the attestation\n * asynchronously (typically 1-2 blocks later).\n *\n * @param input - Attestation request parameters\n * @returns Promise resolving to request result with transaction ID\n * @throws Error if validation fails or transaction fails\n *\n * @example\n * ```typescript\n * const result = await attestationAction.requestAttestation({\n * dataProvider: \"0x4710a8d8f0d845da110086812a32de6d90d7ff5c\",\n * streamId: \"stai0000000000000000000000000000\",\n * actionName: \"get_record\",\n * args: [\n * \"0x4710a8d8f0d845da110086812a32de6d90d7ff5c\",\n * \"stai0000000000000000000000000000\",\n * Math.floor(Date.now() / 1000) - 86400, // 1 day ago\n * Math.floor(Date.now() / 1000),\n * null,\n * false,\n * ],\n * encryptSig: false,\n * maxFee: 1000000,\n * });\n * console.log(`Request TX ID: ${result.requestTxId}`);\n * ```\n */\n async requestAttestation(\n input: RequestAttestationInput\n ): Promise<RequestAttestationResult> {\n // Validate input\n validateAttestationRequest(input);\n\n // Encode arguments\n const argsBytes = encodeActionArgs(input.args);\n\n // Prepare named parameters for request_attestation action\n // Note: maxFee must be a string with NUMERIC type to encode as NUMERIC(788,0) for wei amounts\n const params: Types.NamedParams[] = [{\n $data_provider: input.dataProvider,\n $stream_id: input.streamId,\n $action_name: input.actionName,\n $args_bytes: argsBytes,\n $encrypt_sig: input.encryptSig,\n $max_fee: input.maxFee.toString(),\n }];\n\n // Specify types - maxFee needs NUMERIC(78,0) for large wei amounts\n const types = {\n $max_fee: Utils.DataType.Numeric(78, 0),\n };\n\n // Execute request_attestation action\n const result = await this.executeWithNamedParams('request_attestation', params, types);\n\n // Check for errors\n if (!result.data?.tx_hash) {\n throw new Error(\n 'Failed to request attestation: no transaction hash returned'\n );\n }\n\n // Return the 64-char hex tx_hash\n return {\n requestTxId: result.data.tx_hash,\n };\n }\n\n /**\n * Retrieve a complete signed attestation payload\n *\n * This fetches the signed attestation payload for a given request transaction ID.\n * The attestation must have been signed by the leader validator first.\n *\n * If the attestation is not yet signed, this will throw an error. Clients should\n * poll with exponential backoff or wait for 1-2 blocks after requesting.\n *\n * @param input - Request transaction ID\n * @returns Promise resolving to signed attestation payload\n * @throws Error if attestation not found or not yet signed\n *\n * @example\n * ```typescript\n * // Poll for signature\n * for (let i = 0; i < 15; i++) {\n * try {\n * const signed = await attestationAction.getSignedAttestation({\n * requestTxId: \"0x123...\",\n * });\n * console.log(`Payload: ${Buffer.from(signed.payload).toString('hex')}`);\n * break;\n * } catch (e) {\n * await new Promise(resolve => setTimeout(resolve, 2000));\n * }\n * }\n * ```\n */\n async getSignedAttestation(\n input: GetSignedAttestationInput\n ): Promise<SignedAttestationResult> {\n // Validate and normalize input\n const trimmed = input.requestTxId?.trim() || '';\n if (trimmed === '') {\n throw new Error('request_tx_id is required');\n }\n\n // Strip optional \"0x\" prefix and lowercase for normalization\n const normalizedRequestTxId = trimmed.startsWith('0x')\n ? trimmed.slice(2).toLowerCase()\n : trimmed.toLowerCase();\n\n // Call get_signed_attestation view action\n const result = await this.call<Array<{ payload: string | Uint8Array }>>(\n 'get_signed_attestation',\n { $request_tx_id: normalizedRequestTxId }\n );\n\n // Extract the right value from Either, or throw if Left\n const data = result.throw();\n\n // The action returns an array of rows - extract the first row\n if (!data || !Array.isArray(data) || data.length === 0) {\n throw new Error('No attestation found for request_tx_id - may not exist or is not yet signed');\n }\n\n const row = data[0];\n if (!row || !row.payload) {\n throw new Error('No payload in attestation row');\n }\n\n // Decode base64 to bytes\n let payloadBytes: Uint8Array;\n const payloadValue = row.payload;\n\n if (typeof payloadValue === 'string') {\n // Node.js environment\n if (typeof Buffer !== 'undefined') {\n payloadBytes = new Uint8Array(Buffer.from(payloadValue, 'base64'));\n } else {\n // Browser environment\n const binaryString = atob(payloadValue);\n payloadBytes = new Uint8Array(binaryString.length);\n for (let i = 0; i < binaryString.length; i++) {\n payloadBytes[i] = binaryString.charCodeAt(i);\n }\n }\n } else if (payloadValue instanceof Uint8Array) {\n // Already decoded\n payloadBytes = payloadValue;\n } else {\n throw new Error(`Unexpected payload type: ${typeof payloadValue}`);\n }\n\n return {\n payload: payloadBytes,\n };\n }\n\n /**\n * List attestation metadata with optional filtering\n *\n * This returns metadata for attestations, optionally filtered by requester address, request transaction ID,\n * attestation hash, or result canonical bytes. Supports pagination and sorting.\n *\n * @param input - Filter and pagination parameters\n * @returns Promise resolving to array of attestation metadata\n * @throws Error if parameters are invalid\n *\n * @example\n * ```typescript\n * // List my recent attestations\n * const myAddress = new Uint8Array(Buffer.from(wallet.address.slice(2), 'hex'));\n * const attestations = await attestationAction.listAttestations({\n * requester: myAddress,\n * limit: 10,\n * offset: 0,\n * orderBy: \"created_height desc\",\n * });\n *\n * attestations.forEach(att => {\n * console.log(`TX: ${att.requestTxId}, Height: ${att.createdHeight}`);\n * });\n * ```\n */\n async listAttestations(\n input: ListAttestationsInput\n ): Promise<AttestationMetadata[]> {\n // Validate input\n validateListAttestationsInput(input);\n\n // Set defaults\n const limit = input.limit ?? 5000;\n const offset = input.offset ?? 0;\n\n // Prepare parameters for list_attestations view action\n // Note: Empty Uint8Array represents BYTEA NULL (handled by kwil-js 0.9.10+)\n const params: Types.NamedParams = {\n $requester: input.requester ?? new Uint8Array(0),\n $request_tx_id: input.requestTxId ?? null,\n $attestation_hash: input.attestationHash ?? new Uint8Array(0),\n $result_canonical: input.resultCanonical ?? new Uint8Array(0),\n $limit: limit,\n $offset: offset,\n $order_by: input.orderBy ?? null,\n };\n\n // Call list_attestations view action\n const result = await this.call<any[]>('list_attestations', params);\n\n // Check for errors\n if (result.isLeft()) {\n throw new Error(\n `Failed to list attestations: HTTP status ${result.value}`\n );\n }\n\n // Extract the right value from Either\n // Note: result.value might be a getter function, so call it if needed\n const rightValue = typeof result.value === 'function' ? result.value() : result.value;\n const rows = Array.isArray(rightValue) ? rightValue : [];\n\n // If no rows, return empty array\n if (!rows || rows.length === 0) {\n return [];\n }\n\n // Parse rows into AttestationMetadata\n return rows.map((row: any, idx: number) => parseAttestationRow(row, idx));\n }\n}\n\n/**\n * Parse a single row from list_attestations result into AttestationMetadata\n *\n * Expected columns (in order):\n * 0. request_tx_id (TEXT)\n * 1. attestation_hash (BYTEA)\n * 2. requester (BYTEA)\n * 3. data_provider (TEXT)\n * 4. stream_id (TEXT)\n * 5. created_height (INT8)\n * 6. signed_height (INT8, nullable)\n * 7. encrypt_sig (BOOLEAN)\n */\nfunction parseAttestationRow(row: any, idx: number): AttestationMetadata {\n // kwil-js returns rows as objects with column names as keys\n // or as arrays depending on the query format\n let requestTxId: string;\n let attestationHash: Uint8Array;\n let requester: Uint8Array;\n let dataProvider: string;\n let streamId: string;\n let createdHeight: number;\n let signedHeight: number | null;\n let encryptSig: boolean;\n\n // Handle both array and object formats\n if (Array.isArray(row)) {\n // Array format: [col0, col1, col2, ...]\n if (row.length < 8) {\n throw new Error(\n `Row ${idx}: expected 8 columns, got ${row.length}`\n );\n }\n\n requestTxId = row[0];\n attestationHash = decodeBytea(row[1], idx, 'attestation_hash');\n requester = decodeBytea(row[2], idx, 'requester');\n dataProvider = row[3];\n streamId = row[4];\n createdHeight = parseInt(row[5], 10);\n signedHeight = row[6] !== null ? parseInt(row[6], 10) : null;\n encryptSig = row[7];\n } else {\n // Object format: { request_tx_id: ..., attestation_hash: ..., ... }\n requestTxId = row.request_tx_id;\n attestationHash = decodeBytea(row.attestation_hash, idx, 'attestation_hash');\n requester = decodeBytea(row.requester, idx, 'requester');\n dataProvider = row.data_provider;\n streamId = row.stream_id;\n createdHeight = parseInt(row.created_height, 10);\n signedHeight = row.signed_height !== null ? parseInt(row.signed_height, 10) : null;\n encryptSig = row.encrypt_sig;\n }\n\n return {\n requestTxId,\n attestationHash,\n requester,\n dataProvider,\n streamId,\n createdHeight,\n signedHeight,\n encryptSig,\n };\n}\n\n/**\n * Decode a BYTEA column from base64\n */\nfunction decodeBytea(value: any, rowIdx: number, colName: string): Uint8Array {\n if (value === null || value === undefined) {\n throw new Error(`Row ${rowIdx}: ${colName} is null or undefined`);\n }\n\n // If already Uint8Array, return as-is\n if (value instanceof Uint8Array) {\n return value;\n }\n\n // If string, decode from base64\n if (typeof value === 'string') {\n try {\n // Node.js environment\n if (typeof Buffer !== 'undefined') {\n return new Uint8Array(Buffer.from(value, 'base64'));\n } else {\n // Browser environment\n const binaryString = atob(value);\n const bytes = new Uint8Array(binaryString.length);\n for (let i = 0; i < binaryString.length; i++) {\n bytes[i] = binaryString.charCodeAt(i);\n }\n return bytes;\n }\n } catch (err) {\n throw new Error(\n `Row ${rowIdx}: failed to decode ${colName} as base64: ${err}`\n );\n }\n }\n\n throw new Error(\n `Row ${rowIdx}: expected ${colName} to be string or Uint8Array, got ${typeof value}`\n );\n}\n\n// Inline unit tests\nif (import.meta.vitest) {\n const { describe, it, expect } = import.meta.vitest;\n\n describe('decodeBytea', () => {\n it('should decode base64 string', () => {\n const base64 = Buffer.from([1, 2, 3, 4]).toString('base64');\n const decoded = decodeBytea(base64, 0, 'test');\n expect(Array.from(decoded)).toEqual([1, 2, 3, 4]);\n });\n\n it('should return Uint8Array as-is', () => {\n const bytes = new Uint8Array([1, 2, 3, 4]);\n const decoded = decodeBytea(bytes, 0, 'test');\n expect(decoded).toBe(bytes);\n });\n\n it('should throw on null', () => {\n expect(() => decodeBytea(null, 0, 'test')).toThrow('null or undefined');\n });\n\n it('should throw on invalid type', () => {\n expect(() => decodeBytea(123, 0, 'test')).toThrow('expected test to be string or Uint8Array');\n });\n });\n\n describe('parseAttestationRow', () => {\n it('should parse array format row', () => {\n const row = [\n 'tx123',\n Buffer.from([1, 2, 3]).toString('base64'),\n Buffer.from([4, 5, 6]).toString('base64'),\n '0x4710a8d8f0d845da110086812a32de6d90d7ff5c',\n 'stai0000000000000000000000000000',\n '100',\n '200',\n true,\n ];\n\n const metadata = parseAttestationRow(row, 0);\n\n expect(metadata.requestTxId).toBe('tx123');\n expect(Array.from(metadata.attestationHash)).toEqual([1, 2, 3]);\n expect(Array.from(metadata.requester)).toEqual([4, 5, 6]);\n expect(metadata.dataProvider).toBe('0x4710a8d8f0d845da110086812a32de6d90d7ff5c');\n expect(metadata.streamId).toBe('stai0000000000000000000000000000');\n expect(metadata.createdHeight).toBe(100);\n expect(metadata.signedHeight).toBe(200);\n expect(metadata.encryptSig).toBe(true);\n });\n\n it('should parse object format row', () => {\n const row = {\n request_tx_id: 'tx456',\n attestation_hash: Buffer.from([7, 8, 9]).toString('base64'),\n requester: Buffer.from([10, 11, 12]).toString('base64'),\n data_provider: '0x1234567890123456789012345678901234567890',\n stream_id: 'stbx0000000000000000000000000000',\n created_height: '300',\n signed_height: null,\n encrypt_sig: false,\n };\n\n const metadata = parseAttestationRow(row, 0);\n\n expect(metadata.requestTxId).toBe('tx456');\n expect(Array.from(metadata.attestationHash)).toEqual([7, 8, 9]);\n expect(Array.from(metadata.requester)).toEqual([10, 11, 12]);\n expect(metadata.dataProvider).toBe('0x1234567890123456789012345678901234567890');\n expect(metadata.streamId).toBe('stbx0000000000000000000000000000');\n expect(metadata.createdHeight).toBe(300);\n expect(metadata.signedHeight).toBe(null);\n expect(metadata.encryptSig).toBe(false);\n });\n });\n}\n"],
5
+ "mappings": ";AAQA,SAAgB,aAAa;AAC7B,SAAS,cAAc;AACvB;AAAA,EAOE;AAAA,EACA;AAAA,OACK;AACP,SAAS,wBAAwB;AAgC1B,IAAM,oBAAN,cAAgC,OAAO;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAgC5C,MAAM,mBACJ,OACmC;AAEnC,+BAA2B,KAAK;AAGhC,UAAM,YAAY,iBAAiB,MAAM,IAAI;AAI7C,UAAM,SAA8B,CAAC;AAAA,MACnC,gBAAgB,MAAM;AAAA,MACtB,YAAY,MAAM;AAAA,MAClB,cAAc,MAAM;AAAA,MACpB,aAAa;AAAA,MACb,cAAc,MAAM;AAAA,MACpB,UAAU,MAAM,OAAO,SAAS;AAAA,IAClC,CAAC;AAGD,UAAM,QAAQ;AAAA,MACZ,UAAU,MAAM,SAAS,QAAQ,IAAI,CAAC;AAAA,IACxC;AAGA,UAAM,SAAS,MAAM,KAAK,uBAAuB,uBAAuB,QAAQ,KAAK;AAGrF,QAAI,CAAC,OAAO,MAAM,SAAS;AACzB,YAAM,IAAI;AAAA,QACR;AAAA,MACF;AAAA,IACF;AAGA,WAAO;AAAA,MACL,aAAa,OAAO,KAAK;AAAA,IAC3B;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EA+BA,MAAM,qBACJ,OACkC;AAElC,UAAM,UAAU,MAAM,aAAa,KAAK,KAAK;AAC7C,QAAI,YAAY,IAAI;AAClB,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AAGA,UAAM,wBAAwB,QAAQ,WAAW,IAAI,IACjD,QAAQ,MAAM,CAAC,EAAE,YAAY,IAC7B,QAAQ,YAAY;AAGxB,UAAM,SAAS,MAAM,KAAK;AAAA,MACxB;AAAA,MACA,EAAE,gBAAgB,sBAAsB;AAAA,IAC1C;AAGA,UAAM,OAAO,OAAO,MAAM;AAG1B,QAAI,CAAC,QAAQ,CAAC,MAAM,QAAQ,IAAI,KAAK,KAAK,WAAW,GAAG;AACtD,YAAM,IAAI,MAAM,6EAA6E;AAAA,IAC/F;AAEA,UAAM,MAAM,KAAK,CAAC;AAClB,QAAI,CAAC,OAAO,CAAC,IAAI,SAAS;AACxB,YAAM,IAAI,MAAM,+BAA+B;AAAA,IACjD;AAGA,QAAI;AACJ,UAAM,eAAe,IAAI;AAEzB,QAAI,OAAO,iBAAiB,UAAU;AAEpC,UAAI,OAAO,WAAW,aAAa;AACjC,uBAAe,IAAI,WAAW,OAAO,KAAK,cAAc,QAAQ,CAAC;AAAA,MACnE,OAAO;AAEL,cAAM,eAAe,KAAK,YAAY;AACtC,uBAAe,IAAI,WAAW,aAAa,MAAM;AACjD,iBAAS,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;AAC5C,uBAAa,CAAC,IAAI,aAAa,WAAW,CAAC;AAAA,QAC7C;AAAA,MACF;AAAA,IACF,WAAW,wBAAwB,YAAY;AAE7C,qBAAe;AAAA,IACjB,OAAO;AACL,YAAM,IAAI,MAAM,4BAA4B,OAAO,YAAY,EAAE;AAAA,IACnE;AAEA,WAAO;AAAA,MACL,SAAS;AAAA,IACX;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EA4BA,MAAM,iBACJ,OACgC;AAEhC,kCAA8B,KAAK;AAGnC,UAAM,QAAQ,MAAM,SAAS;AAC7B,UAAM,SAAS,MAAM,UAAU;AAI/B,UAAM,SAA4B;AAAA,MAChC,YAAY,MAAM,aAAa,IAAI,WAAW,CAAC;AAAA,MAC/C,gBAAgB,MAAM,eAAe;AAAA,MACrC,mBAAmB,MAAM,mBAAmB,IAAI,WAAW,CAAC;AAAA,MAC5D,mBAAmB,MAAM,mBAAmB,IAAI,WAAW,CAAC;AAAA,MAC5D,QAAQ;AAAA,MACR,SAAS;AAAA,MACT,WAAW,MAAM,WAAW;AAAA,IAC9B;AAGA,UAAM,SAAS,MAAM,KAAK,KAAY,qBAAqB,MAAM;AAGjE,QAAI,OAAO,OAAO,GAAG;AACnB,YAAM,IAAI;AAAA,QACR,4CAA4C,OAAO,KAAK;AAAA,MAC1D;AAAA,IACF;AAIA,UAAM,aAAa,OAAO,OAAO,UAAU,aAAa,OAAO,MAAM,IAAI,OAAO;AAChF,UAAM,OAAO,MAAM,QAAQ,UAAU,IAAI,aAAa,CAAC;AAGvD,QAAI,CAAC,QAAQ,KAAK,WAAW,GAAG;AAC9B,aAAO,CAAC;AAAA,IACV;AAGA,WAAO,KAAK,IAAI,CAAC,KAAU,QAAgB,oBAAoB,KAAK,GAAG,CAAC;AAAA,EAC1E;AACF;AAeA,SAAS,oBAAoB,KAAU,KAAkC;AAGvE,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AACJ,MAAI;AAGJ,MAAI,MAAM,QAAQ,GAAG,GAAG;AAEtB,QAAI,IAAI,SAAS,GAAG;AAClB,YAAM,IAAI;AAAA,QACR,OAAO,GAAG,6BAA6B,IAAI,MAAM;AAAA,MACnD;AAAA,IACF;AAEA,kBAAc,IAAI,CAAC;AACnB,sBAAkB,YAAY,IAAI,CAAC,GAAG,KAAK,kBAAkB;AAC7D,gBAAY,YAAY,IAAI,CAAC,GAAG,KAAK,WAAW;AAChD,mBAAe,IAAI,CAAC;AACpB,eAAW,IAAI,CAAC;AAChB,oBAAgB,SAAS,IAAI,CAAC,GAAG,EAAE;AACnC,mBAAe,IAAI,CAAC,MAAM,OAAO,SAAS,IAAI,CAAC,GAAG,EAAE,IAAI;AACxD,iBAAa,IAAI,CAAC;AAAA,EACpB,OAAO;AAEL,kBAAc,IAAI;AAClB,sBAAkB,YAAY,IAAI,kBAAkB,KAAK,kBAAkB;AAC3E,gBAAY,YAAY,IAAI,WAAW,KAAK,WAAW;AACvD,mBAAe,IAAI;AACnB,eAAW,IAAI;AACf,oBAAgB,SAAS,IAAI,gBAAgB,EAAE;AAC/C,mBAAe,IAAI,kBAAkB,OAAO,SAAS,IAAI,eAAe,EAAE,IAAI;AAC9E,iBAAa,IAAI;AAAA,EACnB;AAEA,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;AAKA,SAAS,YAAY,OAAY,QAAgB,SAA6B;AAC5E,MAAI,UAAU,QAAQ,UAAU,QAAW;AACzC,UAAM,IAAI,MAAM,OAAO,MAAM,KAAK,OAAO,uBAAuB;AAAA,EAClE;AAGA,MAAI,iBAAiB,YAAY;AAC/B,WAAO;AAAA,EACT;AAGA,MAAI,OAAO,UAAU,UAAU;AAC7B,QAAI;AAEF,UAAI,OAAO,WAAW,aAAa;AACjC,eAAO,IAAI,WAAW,OAAO,KAAK,OAAO,QAAQ,CAAC;AAAA,MACpD,OAAO;AAEL,cAAM,eAAe,KAAK,KAAK;AAC/B,cAAM,QAAQ,IAAI,WAAW,aAAa,MAAM;AAChD,iBAAS,IAAI,GAAG,IAAI,aAAa,QAAQ,KAAK;AAC5C,gBAAM,CAAC,IAAI,aAAa,WAAW,CAAC;AAAA,QACtC;AACA,eAAO;AAAA,MACT;AAAA,IACF,SAAS,KAAK;AACZ,YAAM,IAAI;AAAA,QACR,OAAO,MAAM,sBAAsB,OAAO,eAAe,GAAG;AAAA,MAC9D;AAAA,IACF;AAAA,EACF;AAEA,QAAM,IAAI;AAAA,IACR,OAAO,MAAM,cAAc,OAAO,oCAAoC,OAAO,KAAK;AAAA,EACpF;AACF;AAGA,IAAI,YAAY,QAAQ;AACtB,QAAM,EAAE,UAAU,IAAI,OAAO,IAAI,YAAY;AAE7C,WAAS,eAAe,MAAM;AAC5B,OAAG,+BAA+B,MAAM;AACtC,YAAM,SAAS,OAAO,KAAK,CAAC,GAAG,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAC1D,YAAM,UAAU,YAAY,QAAQ,GAAG,MAAM;AAC7C,aAAO,MAAM,KAAK,OAAO,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,GAAG,CAAC,CAAC;AAAA,IAClD,CAAC;AAED,OAAG,kCAAkC,MAAM;AACzC,YAAM,QAAQ,IAAI,WAAW,CAAC,GAAG,GAAG,GAAG,CAAC,CAAC;AACzC,YAAM,UAAU,YAAY,OAAO,GAAG,MAAM;AAC5C,aAAO,OAAO,EAAE,KAAK,KAAK;AAAA,IAC5B,CAAC;AAED,OAAG,wBAAwB,MAAM;AAC/B,aAAO,MAAM,YAAY,MAAM,GAAG,MAAM,CAAC,EAAE,QAAQ,mBAAmB;AAAA,IACxE,CAAC;AAED,OAAG,gCAAgC,MAAM;AACvC,aAAO,MAAM,YAAY,KAAK,GAAG,MAAM,CAAC,EAAE,QAAQ,0CAA0C;AAAA,IAC9F,CAAC;AAAA,EACH,CAAC;AAED,WAAS,uBAAuB,MAAM;AACpC,OAAG,iCAAiC,MAAM;AACxC,YAAM,MAAM;AAAA,QACV;AAAA,QACA,OAAO,KAAK,CAAC,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAAA,QACxC,OAAO,KAAK,CAAC,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAAA,QACxC;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF;AAEA,YAAM,WAAW,oBAAoB,KAAK,CAAC;AAE3C,aAAO,SAAS,WAAW,EAAE,KAAK,OAAO;AACzC,aAAO,MAAM,KAAK,SAAS,eAAe,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;AAC9D,aAAO,MAAM,KAAK,SAAS,SAAS,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;AACxD,aAAO,SAAS,YAAY,EAAE,KAAK,4CAA4C;AAC/E,aAAO,SAAS,QAAQ,EAAE,KAAK,kCAAkC;AACjE,aAAO,SAAS,aAAa,EAAE,KAAK,GAAG;AACvC,aAAO,SAAS,YAAY,EAAE,KAAK,GAAG;AACtC,aAAO,SAAS,UAAU,EAAE,KAAK,IAAI;AAAA,IACvC,CAAC;AAED,OAAG,kCAAkC,MAAM;AACzC,YAAM,MAAM;AAAA,QACV,eAAe;AAAA,QACf,kBAAkB,OAAO,KAAK,CAAC,GAAG,GAAG,CAAC,CAAC,EAAE,SAAS,QAAQ;AAAA,QAC1D,WAAW,OAAO,KAAK,CAAC,IAAI,IAAI,EAAE,CAAC,EAAE,SAAS,QAAQ;AAAA,QACtD,eAAe;AAAA,QACf,WAAW;AAAA,QACX,gBAAgB;AAAA,QAChB,eAAe;AAAA,QACf,aAAa;AAAA,MACf;AAEA,YAAM,WAAW,oBAAoB,KAAK,CAAC;AAE3C,aAAO,SAAS,WAAW,EAAE,KAAK,OAAO;AACzC,aAAO,MAAM,KAAK,SAAS,eAAe,CAAC,EAAE,QAAQ,CAAC,GAAG,GAAG,CAAC,CAAC;AAC9D,aAAO,MAAM,KAAK,SAAS,SAAS,CAAC,EAAE,QAAQ,CAAC,IAAI,IAAI,EAAE,CAAC;AAC3D,aAAO,SAAS,YAAY,EAAE,KAAK,4CAA4C;AAC/E,aAAO,SAAS,QAAQ,EAAE,KAAK,kCAAkC;AACjE,aAAO,SAAS,aAAa,EAAE,KAAK,GAAG;AACvC,aAAO,SAAS,YAAY,EAAE,KAAK,IAAI;AACvC,aAAO,SAAS,UAAU,EAAE,KAAK,KAAK;AAAA,IACxC,CAAC;AAAA,EACH,CAAC;AACH;",
6
6
  "names": []
7
7
  }
@@ -215,6 +215,9 @@ if (import.meta.vitest) {
215
215
  expect(
216
216
  () => validateListAttestationsInput({
217
217
  requester: new Uint8Array(20),
218
+ requestTxId: "abc123",
219
+ attestationHash: new Uint8Array(32),
220
+ resultCanonical: new Uint8Array(100),
218
221
  limit: 100,
219
222
  offset: 0,
220
223
  orderBy: "created_height desc"
@@ -224,6 +227,20 @@ if (import.meta.vitest) {
224
227
  it("should accept valid input with no optional fields", () => {
225
228
  expect(() => validateListAttestationsInput({})).not.toThrow();
226
229
  });
230
+ it("should accept attestationHash filter", () => {
231
+ expect(
232
+ () => validateListAttestationsInput({
233
+ attestationHash: new Uint8Array(32)
234
+ })
235
+ ).not.toThrow();
236
+ });
237
+ it("should accept resultCanonical filter", () => {
238
+ expect(
239
+ () => validateListAttestationsInput({
240
+ resultCanonical: new Uint8Array(64)
241
+ })
242
+ ).not.toThrow();
243
+ });
227
244
  it("should reject limit < 1", () => {
228
245
  expect(
229
246
  () => validateListAttestationsInput({