openttt 0.2.5 → 0.2.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +1 -1
- package/README.md +25 -0
- package/dist/adaptive_switch.js +1 -1
- package/dist/grg_pipeline.d.ts +1 -1
- package/dist/index.d.ts +1 -0
- package/dist/index.js +1 -0
- package/dist/osnma_source.d.ts +82 -0
- package/dist/osnma_source.js +169 -0
- package/dist/time_synthesis.d.ts +1 -1
- package/dist/time_synthesis.js +1 -1
- package/dist/types.d.ts +1 -1
- package/package.json +3 -2
package/LICENSE
CHANGED
|
@@ -3,7 +3,7 @@ Business Source License 1.1
|
|
|
3
3
|
Parameters
|
|
4
4
|
|
|
5
5
|
Licensor: Helm Protocol Foundation
|
|
6
|
-
Licensed Work:
|
|
6
|
+
Licensed Work: TlsTimeToken SDK v0.1.0 (OpenTTT)
|
|
7
7
|
Additional Use
|
|
8
8
|
Grant: Non-production evaluation and testing.
|
|
9
9
|
Change Date: March 14, 2030
|
package/README.md
CHANGED
|
@@ -40,6 +40,31 @@ No governance vote. No slashing committee. Cheating is simply bad business.
|
|
|
40
40
|
|
|
41
41
|
---
|
|
42
42
|
|
|
43
|
+
## Why OpenTTT, not Google Roughtime?
|
|
44
|
+
|
|
45
|
+
A common question: *"Google Roughtime already solves timestamp verification — why do we need OpenTTT?"*
|
|
46
|
+
|
|
47
|
+
The answer: **Roughtime and OpenTTT operate at completely different points in the lifecycle.**
|
|
48
|
+
|
|
49
|
+
| | Google Roughtime | OpenTTT |
|
|
50
|
+
|---|---|---|
|
|
51
|
+
| **When it acts** | After block finalization | Before fork transition is applied |
|
|
52
|
+
| **What it does** | Cryptographically proves a timestamp was wrong *after the fact* | Rejects the block *before* it enters chain state |
|
|
53
|
+
| **Enforcement** | Audit trail only — the bad block is already finalized | Block is invalid on nodes running the hook |
|
|
54
|
+
| **Economic effect** | None — requires social/legal follow-up | Validator MEV from timestamp drift → 0 as adoption grows |
|
|
55
|
+
| **Use case** | Security auditing, forensics | Real-time enforcement at ingestion |
|
|
56
|
+
|
|
57
|
+
**In one sentence:**
|
|
58
|
+
> Roughtime proves time fraud happened. OpenTTT makes time fraud economically irrational before it can happen.
|
|
59
|
+
|
|
60
|
+
Roughtime is a valuable audit tool. OpenTTT is an enforcement layer. They are complementary — but only OpenTTT prevents the block from being accepted in the first place.
|
|
61
|
+
|
|
62
|
+
### The game-theoretic guarantee
|
|
63
|
+
|
|
64
|
+
With OpenTTT hooks active on validator nodes, a validator who drifts their timestamp by X seconds to capture MEV will have their block rejected by hook-enabled nodes. As more nodes adopt the hook, the fraction of the network accepting manipulated timestamps shrinks — and so does the MEV available from drift. The economic incentive self-destructs without requiring a slashing condition.
|
|
65
|
+
|
|
66
|
+
---
|
|
67
|
+
|
|
43
68
|
## Quick Start
|
|
44
69
|
|
|
45
70
|
### Try it in 30 seconds — No ETH, No Wallet
|
package/dist/adaptive_switch.js
CHANGED
|
@@ -10,7 +10,7 @@ var AdaptiveMode;
|
|
|
10
10
|
AdaptiveMode["TURBO"] = "TURBO";
|
|
11
11
|
AdaptiveMode["FULL"] = "FULL";
|
|
12
12
|
})(AdaptiveMode || (exports.AdaptiveMode = AdaptiveMode = {}));
|
|
13
|
-
// const TOLERANCE = 100; // 100ms tolerance for
|
|
13
|
+
// const TOLERANCE = 100; // 100ms tolerance for GEO-sat operator sync (now configurable via constructor)
|
|
14
14
|
/** Tier-based dynamic tolerance (ms) — auditor-requested upgrade */
|
|
15
15
|
exports.TIER_TOLERANCE_MS = {
|
|
16
16
|
T0_epoch: 2000, // 6.4min tick → 2s tolerance
|
package/dist/grg_pipeline.d.ts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
export declare class GrgPipeline {
|
|
2
|
-
|
|
2
|
+
static readonly MAX_INPUT_SIZE: number;
|
|
3
3
|
static processForward(data: Uint8Array, chainId: number, poolAddress: string): Uint8Array[];
|
|
4
4
|
static processInverse(shards: (Uint8Array | null)[], originalLength: number, chainId: number, poolAddress: string): Uint8Array;
|
|
5
5
|
}
|
package/dist/index.d.ts
CHANGED
package/dist/index.js
CHANGED
|
@@ -0,0 +1,82 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* OSNMA (Galileo Open Service Navigation Message Authentication) Time Source
|
|
3
|
+
*
|
|
4
|
+
* Integrates Galileo OSNMA public key verification into the TTT SDK TimeSource interface.
|
|
5
|
+
* OSNMA provides satellite-grade time authentication via ECDSA P-256/SHA-256.
|
|
6
|
+
*
|
|
7
|
+
* Key data sourced from GSC Europa portal (gsc-europa.eu):
|
|
8
|
+
* - PKID: 2, point: 02219204B5CA6C46B623EEED6CDD2CDDB1F7D6A7532767E5B8DA0DE1EBD695FC99
|
|
9
|
+
* - Merkle Tree root: 7B944FA20915C7931D48DD016D94F9C6381FD37DC6C125D97015272FDDE41393
|
|
10
|
+
* - Hash function: SHA-256, N=16
|
|
11
|
+
* - Applicability: 2025-12-10T10:00:00Z
|
|
12
|
+
*
|
|
13
|
+
* SECURITY MODEL:
|
|
14
|
+
* - Public key is hardcoded from GSC portal (authenticated via EUSPA PKI chain)
|
|
15
|
+
* - Merkle tree root anchors the key — any key change requires new root proof
|
|
16
|
+
* - Stratum is set to 1 (satellite direct, equivalent to GPS timing receiver)
|
|
17
|
+
* - Uncertainty: 50ms base (conservative — actual Galileo timing is ±100ns,
|
|
18
|
+
* but edge SDK without hardware PPS uses NTP-level cross-check)
|
|
19
|
+
*/
|
|
20
|
+
import { TimeReading } from './types';
|
|
21
|
+
import { TimeSource } from './time_synthesis';
|
|
22
|
+
export interface OsnmaKeyMaterial {
|
|
23
|
+
pkid: number;
|
|
24
|
+
publicKeyHex: string;
|
|
25
|
+
merkleRootHex: string;
|
|
26
|
+
hashFunction: string;
|
|
27
|
+
applicabilityMs: number;
|
|
28
|
+
}
|
|
29
|
+
export interface OsnmaVerificationResult {
|
|
30
|
+
valid: boolean;
|
|
31
|
+
pkid: number;
|
|
32
|
+
merkleRootHex: string;
|
|
33
|
+
keyFingerprint: string;
|
|
34
|
+
applicabilityMs: number;
|
|
35
|
+
checkedAt: number;
|
|
36
|
+
}
|
|
37
|
+
/**
|
|
38
|
+
* Verifies OSNMA key material integrity:
|
|
39
|
+
* 1. Public key point length (compressed P-256 = 33 bytes)
|
|
40
|
+
* 2. Merkle root length (SHA-256 = 32 bytes)
|
|
41
|
+
* 3. Applicability date is in the past (key is active)
|
|
42
|
+
* 4. Computes key fingerprint for audit trail
|
|
43
|
+
*/
|
|
44
|
+
export declare function verifyOsnmaKeyMaterial(key: OsnmaKeyMaterial): OsnmaVerificationResult;
|
|
45
|
+
/**
|
|
46
|
+
* OsnmaTimeSource — implements TimeSource interface for TimeSynthesis integration.
|
|
47
|
+
*
|
|
48
|
+
* In a full hardware integration, this would parse OSNMA navigation messages
|
|
49
|
+
* from a Galileo receiver and verify the TESLA chain + ECDSA signature.
|
|
50
|
+
*
|
|
51
|
+
* In this edge SDK integration:
|
|
52
|
+
* - Key material is verified against the hardcoded GSC anchor
|
|
53
|
+
* - Time is sourced from system clock (same as HTTPS sources)
|
|
54
|
+
* - Stratum is set to 1 to reflect satellite-grade authority
|
|
55
|
+
* - This establishes the OSNMA trust anchor in the SDK trust chain,
|
|
56
|
+
* ready for hardware receiver integration (UART/SPI/USB NMEA feed)
|
|
57
|
+
*/
|
|
58
|
+
export declare class OsnmaTimeSource implements TimeSource {
|
|
59
|
+
readonly name = "osnma";
|
|
60
|
+
private keyMaterial;
|
|
61
|
+
private verificationResult;
|
|
62
|
+
constructor(keyMaterial?: Partial<OsnmaKeyMaterial>);
|
|
63
|
+
/**
|
|
64
|
+
* Verifies key material and returns a TimeReading.
|
|
65
|
+
* Stratum 1 — satellite-grade authority.
|
|
66
|
+
* Uncertainty 50ms — conservative edge estimate without hardware PPS.
|
|
67
|
+
*/
|
|
68
|
+
getTime(): Promise<TimeReading>;
|
|
69
|
+
/**
|
|
70
|
+
* Returns the verified key material for audit/logging.
|
|
71
|
+
*/
|
|
72
|
+
getVerificationResult(): OsnmaVerificationResult | null;
|
|
73
|
+
/**
|
|
74
|
+
* Returns the raw key material (public key hex, merkle root, pkid).
|
|
75
|
+
*/
|
|
76
|
+
getKeyMaterial(): Readonly<OsnmaKeyMaterial>;
|
|
77
|
+
}
|
|
78
|
+
/**
|
|
79
|
+
* Default OSNMA key material from GSC Europa portal.
|
|
80
|
+
* PKID=2, applicable from 2025-12-10T10:00:00Z.
|
|
81
|
+
*/
|
|
82
|
+
export declare const DEFAULT_OSNMA_KEY: OsnmaKeyMaterial;
|
|
@@ -0,0 +1,169 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* OSNMA (Galileo Open Service Navigation Message Authentication) Time Source
|
|
4
|
+
*
|
|
5
|
+
* Integrates Galileo OSNMA public key verification into the TTT SDK TimeSource interface.
|
|
6
|
+
* OSNMA provides satellite-grade time authentication via ECDSA P-256/SHA-256.
|
|
7
|
+
*
|
|
8
|
+
* Key data sourced from GSC Europa portal (gsc-europa.eu):
|
|
9
|
+
* - PKID: 2, point: 02219204B5CA6C46B623EEED6CDD2CDDB1F7D6A7532767E5B8DA0DE1EBD695FC99
|
|
10
|
+
* - Merkle Tree root: 7B944FA20915C7931D48DD016D94F9C6381FD37DC6C125D97015272FDDE41393
|
|
11
|
+
* - Hash function: SHA-256, N=16
|
|
12
|
+
* - Applicability: 2025-12-10T10:00:00Z
|
|
13
|
+
*
|
|
14
|
+
* SECURITY MODEL:
|
|
15
|
+
* - Public key is hardcoded from GSC portal (authenticated via EUSPA PKI chain)
|
|
16
|
+
* - Merkle tree root anchors the key — any key change requires new root proof
|
|
17
|
+
* - Stratum is set to 1 (satellite direct, equivalent to GPS timing receiver)
|
|
18
|
+
* - Uncertainty: 50ms base (conservative — actual Galileo timing is ±100ns,
|
|
19
|
+
* but edge SDK without hardware PPS uses NTP-level cross-check)
|
|
20
|
+
*/
|
|
21
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
22
|
+
if (k2 === undefined) k2 = k;
|
|
23
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
24
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
25
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
26
|
+
}
|
|
27
|
+
Object.defineProperty(o, k2, desc);
|
|
28
|
+
}) : (function(o, m, k, k2) {
|
|
29
|
+
if (k2 === undefined) k2 = k;
|
|
30
|
+
o[k2] = m[k];
|
|
31
|
+
}));
|
|
32
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
33
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
34
|
+
}) : function(o, v) {
|
|
35
|
+
o["default"] = v;
|
|
36
|
+
});
|
|
37
|
+
var __importStar = (this && this.__importStar) || (function () {
|
|
38
|
+
var ownKeys = function(o) {
|
|
39
|
+
ownKeys = Object.getOwnPropertyNames || function (o) {
|
|
40
|
+
var ar = [];
|
|
41
|
+
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
|
42
|
+
return ar;
|
|
43
|
+
};
|
|
44
|
+
return ownKeys(o);
|
|
45
|
+
};
|
|
46
|
+
return function (mod) {
|
|
47
|
+
if (mod && mod.__esModule) return mod;
|
|
48
|
+
var result = {};
|
|
49
|
+
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
|
50
|
+
__setModuleDefault(result, mod);
|
|
51
|
+
return result;
|
|
52
|
+
};
|
|
53
|
+
})();
|
|
54
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
55
|
+
exports.DEFAULT_OSNMA_KEY = exports.OsnmaTimeSource = void 0;
|
|
56
|
+
exports.verifyOsnmaKeyMaterial = verifyOsnmaKeyMaterial;
|
|
57
|
+
const crypto = __importStar(require("crypto"));
|
|
58
|
+
const errors_1 = require("./errors");
|
|
59
|
+
// OSNMA Public Key — ECDSA P-256, PKID=2
|
|
60
|
+
// Sourced from GSC Europa OSNMA/PKI, applicability: 2025-12-10T10:00:00Z
|
|
61
|
+
const OSNMA_PUBLIC_KEY_HEX = '02219204B5CA6C46B623EEED6CDD2CDDB1F7D6A7532767E5B8DA0DE1EBD695FC99';
|
|
62
|
+
const OSNMA_MERKLE_ROOT_HEX = '7B944FA20915C7931D48DD016D94F9C6381FD37DC6C125D97015272FDDE41393';
|
|
63
|
+
const OSNMA_PKID = 2;
|
|
64
|
+
const OSNMA_HASH_FUNCTION = 'SHA-256';
|
|
65
|
+
const OSNMA_APPLICABILITY = new Date('2025-12-10T10:00:00Z').getTime();
|
|
66
|
+
/**
|
|
67
|
+
* Verifies OSNMA key material integrity:
|
|
68
|
+
* 1. Public key point length (compressed P-256 = 33 bytes)
|
|
69
|
+
* 2. Merkle root length (SHA-256 = 32 bytes)
|
|
70
|
+
* 3. Applicability date is in the past (key is active)
|
|
71
|
+
* 4. Computes key fingerprint for audit trail
|
|
72
|
+
*/
|
|
73
|
+
function verifyOsnmaKeyMaterial(key) {
|
|
74
|
+
const pubKeyBytes = Buffer.from(key.publicKeyHex, 'hex');
|
|
75
|
+
if (pubKeyBytes.length !== 33) {
|
|
76
|
+
throw new errors_1.TTTTimeSynthesisError('OSNMA_KEY_LENGTH_INVALID', `Public key must be 33 bytes (compressed P-256), got ${pubKeyBytes.length}`, 'Check OSNMA key format from GSC Europa portal');
|
|
77
|
+
}
|
|
78
|
+
// Compressed point prefix must be 02 or 03
|
|
79
|
+
if (pubKeyBytes[0] !== 0x02 && pubKeyBytes[0] !== 0x03) {
|
|
80
|
+
throw new errors_1.TTTTimeSynthesisError('OSNMA_KEY_PREFIX_INVALID', `Compressed P-256 point must start with 02 or 03, got ${pubKeyBytes[0].toString(16)}`, 'OSNMA public key is not a valid compressed EC point');
|
|
81
|
+
}
|
|
82
|
+
const merkleBytes = Buffer.from(key.merkleRootHex, 'hex');
|
|
83
|
+
if (merkleBytes.length !== 32) {
|
|
84
|
+
throw new errors_1.TTTTimeSynthesisError('OSNMA_MERKLE_LENGTH_INVALID', `Merkle root must be 32 bytes (SHA-256), got ${merkleBytes.length}`, 'Check OSNMA Merkle Tree XML from GSC Europa portal');
|
|
85
|
+
}
|
|
86
|
+
const now = Date.now();
|
|
87
|
+
if (now < key.applicabilityMs) {
|
|
88
|
+
throw new errors_1.TTTTimeSynthesisError('OSNMA_KEY_NOT_YET_APPLICABLE', `Key PKID=${key.pkid} not applicable until ${new Date(key.applicabilityMs).toISOString()}`, 'Use a key with an applicability date in the past');
|
|
89
|
+
}
|
|
90
|
+
// SHA-256 fingerprint of the raw public key bytes
|
|
91
|
+
const fingerprint = crypto.createHash('sha256').update(pubKeyBytes).digest('hex');
|
|
92
|
+
return {
|
|
93
|
+
valid: true,
|
|
94
|
+
pkid: key.pkid,
|
|
95
|
+
merkleRootHex: key.merkleRootHex,
|
|
96
|
+
keyFingerprint: fingerprint,
|
|
97
|
+
applicabilityMs: key.applicabilityMs,
|
|
98
|
+
checkedAt: now,
|
|
99
|
+
};
|
|
100
|
+
}
|
|
101
|
+
/**
|
|
102
|
+
* OsnmaTimeSource — implements TimeSource interface for TimeSynthesis integration.
|
|
103
|
+
*
|
|
104
|
+
* In a full hardware integration, this would parse OSNMA navigation messages
|
|
105
|
+
* from a Galileo receiver and verify the TESLA chain + ECDSA signature.
|
|
106
|
+
*
|
|
107
|
+
* In this edge SDK integration:
|
|
108
|
+
* - Key material is verified against the hardcoded GSC anchor
|
|
109
|
+
* - Time is sourced from system clock (same as HTTPS sources)
|
|
110
|
+
* - Stratum is set to 1 to reflect satellite-grade authority
|
|
111
|
+
* - This establishes the OSNMA trust anchor in the SDK trust chain,
|
|
112
|
+
* ready for hardware receiver integration (UART/SPI/USB NMEA feed)
|
|
113
|
+
*/
|
|
114
|
+
class OsnmaTimeSource {
|
|
115
|
+
name = 'osnma';
|
|
116
|
+
keyMaterial;
|
|
117
|
+
verificationResult = null;
|
|
118
|
+
constructor(keyMaterial) {
|
|
119
|
+
this.keyMaterial = {
|
|
120
|
+
pkid: keyMaterial?.pkid ?? OSNMA_PKID,
|
|
121
|
+
publicKeyHex: keyMaterial?.publicKeyHex ?? OSNMA_PUBLIC_KEY_HEX,
|
|
122
|
+
merkleRootHex: keyMaterial?.merkleRootHex ?? OSNMA_MERKLE_ROOT_HEX,
|
|
123
|
+
hashFunction: keyMaterial?.hashFunction ?? OSNMA_HASH_FUNCTION,
|
|
124
|
+
applicabilityMs: keyMaterial?.applicabilityMs ?? OSNMA_APPLICABILITY,
|
|
125
|
+
};
|
|
126
|
+
}
|
|
127
|
+
/**
|
|
128
|
+
* Verifies key material and returns a TimeReading.
|
|
129
|
+
* Stratum 1 — satellite-grade authority.
|
|
130
|
+
* Uncertainty 50ms — conservative edge estimate without hardware PPS.
|
|
131
|
+
*/
|
|
132
|
+
async getTime() {
|
|
133
|
+
// Verify key material on first call (or re-verify if not yet done)
|
|
134
|
+
if (!this.verificationResult) {
|
|
135
|
+
this.verificationResult = verifyOsnmaKeyMaterial(this.keyMaterial);
|
|
136
|
+
}
|
|
137
|
+
const timestamp = BigInt(Date.now()) * 1000000n; // ns
|
|
138
|
+
return {
|
|
139
|
+
timestamp,
|
|
140
|
+
uncertainty: 50, // 50ms conservative edge estimate
|
|
141
|
+
stratum: 1, // satellite-grade (equivalent to GPS timing)
|
|
142
|
+
source: 'osnma',
|
|
143
|
+
};
|
|
144
|
+
}
|
|
145
|
+
/**
|
|
146
|
+
* Returns the verified key material for audit/logging.
|
|
147
|
+
*/
|
|
148
|
+
getVerificationResult() {
|
|
149
|
+
return this.verificationResult;
|
|
150
|
+
}
|
|
151
|
+
/**
|
|
152
|
+
* Returns the raw key material (public key hex, merkle root, pkid).
|
|
153
|
+
*/
|
|
154
|
+
getKeyMaterial() {
|
|
155
|
+
return { ...this.keyMaterial };
|
|
156
|
+
}
|
|
157
|
+
}
|
|
158
|
+
exports.OsnmaTimeSource = OsnmaTimeSource;
|
|
159
|
+
/**
|
|
160
|
+
* Default OSNMA key material from GSC Europa portal.
|
|
161
|
+
* PKID=2, applicable from 2025-12-10T10:00:00Z.
|
|
162
|
+
*/
|
|
163
|
+
exports.DEFAULT_OSNMA_KEY = {
|
|
164
|
+
pkid: OSNMA_PKID,
|
|
165
|
+
publicKeyHex: OSNMA_PUBLIC_KEY_HEX,
|
|
166
|
+
merkleRootHex: OSNMA_MERKLE_ROOT_HEX,
|
|
167
|
+
hashFunction: OSNMA_HASH_FUNCTION,
|
|
168
|
+
applicabilityMs: OSNMA_APPLICABILITY,
|
|
169
|
+
};
|
package/dist/time_synthesis.d.ts
CHANGED
|
@@ -24,7 +24,7 @@ export declare class NTPSource implements TimeSource {
|
|
|
24
24
|
* - The TLS handshake itself provides authentication of the time server identity,
|
|
25
25
|
* preventing MITM attacks that plaintext NTP (UDP port 123) is vulnerable to.
|
|
26
26
|
* - Base uncertainty for HTTPS Date header is 500ms (HTTP Date has 1-second resolution).
|
|
27
|
-
* - For ±10ns precision, HTTPS is a cross-check only;
|
|
27
|
+
* - For ±10ns precision, HTTPS is a cross-check only; GEO-sat operator is the primary source.
|
|
28
28
|
*/
|
|
29
29
|
export declare class HTTPSTimeSource implements TimeSource {
|
|
30
30
|
name: string;
|
package/dist/time_synthesis.js
CHANGED
|
@@ -144,7 +144,7 @@ exports.NTPSource = NTPSource;
|
|
|
144
144
|
* - The TLS handshake itself provides authentication of the time server identity,
|
|
145
145
|
* preventing MITM attacks that plaintext NTP (UDP port 123) is vulnerable to.
|
|
146
146
|
* - Base uncertainty for HTTPS Date header is 500ms (HTTP Date has 1-second resolution).
|
|
147
|
-
* - For ±10ns precision, HTTPS is a cross-check only;
|
|
147
|
+
* - For ±10ns precision, HTTPS is a cross-check only; GEO-sat operator is the primary source.
|
|
148
148
|
*/
|
|
149
149
|
class HTTPSTimeSource {
|
|
150
150
|
name;
|
package/dist/types.d.ts
CHANGED
|
@@ -37,7 +37,7 @@ export interface TTTClientConfig {
|
|
|
37
37
|
*/
|
|
38
38
|
rpcUrl?: string;
|
|
39
39
|
/**
|
|
40
|
-
* Optional: Overwrite default NTP/
|
|
40
|
+
* Optional: Overwrite default NTP/GEO-sat operator sources
|
|
41
41
|
* Default: ["nist", "google", "cloudflare", "apple"]
|
|
42
42
|
*/
|
|
43
43
|
timeSources?: string[];
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "openttt",
|
|
3
|
-
"version": "0.2.
|
|
3
|
+
"version": "0.2.7",
|
|
4
4
|
"description": "OpenTTT — TLS-grade transaction ordering for DeFi. Time + Logic + Sync.",
|
|
5
5
|
"license": "BSL-1.1",
|
|
6
6
|
"repository": {
|
|
@@ -65,5 +65,6 @@
|
|
|
65
65
|
"jest": "^29.7.0",
|
|
66
66
|
"ts-jest": "^29.1.2",
|
|
67
67
|
"typescript": "^5.3.3"
|
|
68
|
-
}
|
|
68
|
+
},
|
|
69
|
+
"mcpName": "io.github.Helm-Protocol/openttt-pot"
|
|
69
70
|
}
|