1021 lines
47 KiB
TypeScript
1021 lines
47 KiB
TypeScript
// @generated by protobuf-ts 2.11.1
|
|
// @generated from protobuf file "walletunlocker.proto" (package "lnrpc", syntax proto3)
|
|
// tslint:disable
|
|
import { ServiceType } from "@protobuf-ts/runtime-rpc";
|
|
import type { BinaryWriteOptions } from "@protobuf-ts/runtime";
|
|
import type { IBinaryWriter } from "@protobuf-ts/runtime";
|
|
import { WireType } from "@protobuf-ts/runtime";
|
|
import type { BinaryReadOptions } from "@protobuf-ts/runtime";
|
|
import type { IBinaryReader } from "@protobuf-ts/runtime";
|
|
import { UnknownFieldHandler } from "@protobuf-ts/runtime";
|
|
import type { PartialMessage } from "@protobuf-ts/runtime";
|
|
import { reflectionMergePartial } from "@protobuf-ts/runtime";
|
|
import { MessageType } from "@protobuf-ts/runtime";
|
|
import { ChanBackupSnapshot } from "./lightning.js";
|
|
/**
|
|
* @generated from protobuf message lnrpc.GenSeedRequest
|
|
*/
|
|
export interface GenSeedRequest {
|
|
/**
|
|
*
|
|
* aezeed_passphrase is an optional user provided passphrase that will be used
|
|
* to encrypt the generated aezeed cipher seed. When using REST, this field
|
|
* must be encoded as base64.
|
|
*
|
|
* @generated from protobuf field: bytes aezeed_passphrase = 1
|
|
*/
|
|
aezeedPassphrase: Uint8Array;
|
|
/**
|
|
*
|
|
* seed_entropy is an optional 16-bytes generated via CSPRNG. If not
|
|
* specified, then a fresh set of randomness will be used to create the seed.
|
|
* When using REST, this field must be encoded as base64.
|
|
*
|
|
* @generated from protobuf field: bytes seed_entropy = 2
|
|
*/
|
|
seedEntropy: Uint8Array;
|
|
}
|
|
/**
|
|
* @generated from protobuf message lnrpc.GenSeedResponse
|
|
*/
|
|
export interface GenSeedResponse {
|
|
/**
|
|
*
|
|
* cipher_seed_mnemonic is a 24-word mnemonic that encodes a prior aezeed
|
|
* cipher seed obtained by the user. This field is optional, as if not
|
|
* provided, then the daemon will generate a new cipher seed for the user.
|
|
* Otherwise, then the daemon will attempt to recover the wallet state linked
|
|
* to this cipher seed.
|
|
*
|
|
* @generated from protobuf field: repeated string cipher_seed_mnemonic = 1
|
|
*/
|
|
cipherSeedMnemonic: string[];
|
|
/**
|
|
*
|
|
* enciphered_seed are the raw aezeed cipher seed bytes. This is the raw
|
|
* cipher text before run through our mnemonic encoding scheme.
|
|
*
|
|
* @generated from protobuf field: bytes enciphered_seed = 2
|
|
*/
|
|
encipheredSeed: Uint8Array;
|
|
}
|
|
/**
|
|
* @generated from protobuf message lnrpc.InitWalletRequest
|
|
*/
|
|
export interface InitWalletRequest {
|
|
/**
|
|
*
|
|
* wallet_password is the passphrase that should be used to encrypt the
|
|
* wallet. This MUST be at least 8 chars in length. After creation, this
|
|
* password is required to unlock the daemon. When using REST, this field
|
|
* must be encoded as base64.
|
|
*
|
|
* @generated from protobuf field: bytes wallet_password = 1
|
|
*/
|
|
walletPassword: Uint8Array;
|
|
/**
|
|
*
|
|
* cipher_seed_mnemonic is a 24-word mnemonic that encodes a prior aezeed
|
|
* cipher seed obtained by the user. This may have been generated by the
|
|
* GenSeed method, or be an existing seed.
|
|
*
|
|
* @generated from protobuf field: repeated string cipher_seed_mnemonic = 2
|
|
*/
|
|
cipherSeedMnemonic: string[];
|
|
/**
|
|
*
|
|
* aezeed_passphrase is an optional user provided passphrase that will be used
|
|
* to encrypt the generated aezeed cipher seed. When using REST, this field
|
|
* must be encoded as base64.
|
|
*
|
|
* @generated from protobuf field: bytes aezeed_passphrase = 3
|
|
*/
|
|
aezeedPassphrase: Uint8Array;
|
|
/**
|
|
*
|
|
* recovery_window is an optional argument specifying the address lookahead
|
|
* when restoring a wallet seed. The recovery window applies to each
|
|
* individual branch of the BIP44 derivation paths. Supplying a recovery
|
|
* window of zero indicates that no addresses should be recovered, such after
|
|
* the first initialization of the wallet.
|
|
*
|
|
* @generated from protobuf field: int32 recovery_window = 4
|
|
*/
|
|
recoveryWindow: number;
|
|
/**
|
|
*
|
|
* channel_backups is an optional argument that allows clients to recover the
|
|
* settled funds within a set of channels. This should be populated if the
|
|
* user was unable to close out all channels and sweep funds before partial or
|
|
* total data loss occurred. If specified, then after on-chain recovery of
|
|
* funds, lnd begin to carry out the data loss recovery protocol in order to
|
|
* recover the funds in each channel from a remote force closed transaction.
|
|
*
|
|
* @generated from protobuf field: lnrpc.ChanBackupSnapshot channel_backups = 5
|
|
*/
|
|
channelBackups?: ChanBackupSnapshot;
|
|
/**
|
|
*
|
|
* stateless_init is an optional argument instructing the daemon NOT to create
|
|
* any *.macaroon files in its filesystem. If this parameter is set, then the
|
|
* admin macaroon returned in the response MUST be stored by the caller of the
|
|
* RPC as otherwise all access to the daemon will be lost!
|
|
*
|
|
* @generated from protobuf field: bool stateless_init = 6
|
|
*/
|
|
statelessInit: boolean;
|
|
/**
|
|
*
|
|
* extended_master_key is an alternative to specifying cipher_seed_mnemonic and
|
|
* aezeed_passphrase. Instead of deriving the master root key from the entropy
|
|
* of an aezeed cipher seed, the given extended master root key is used
|
|
* directly as the wallet's master key. This allows users to import/use a
|
|
* master key from another wallet. When doing so, lnd still uses its default
|
|
* SegWit only (BIP49/84) derivation paths and funds from custom/non-default
|
|
* derivation paths will not automatically appear in the on-chain wallet. Using
|
|
* an 'xprv' instead of an aezeed also has the disadvantage that the wallet's
|
|
* birthday is not known as that is an information that's only encoded in the
|
|
* aezeed, not the xprv. Therefore a birthday needs to be specified in
|
|
* extended_master_key_birthday_timestamp or a "safe" default value will be
|
|
* used.
|
|
*
|
|
* @generated from protobuf field: string extended_master_key = 7
|
|
*/
|
|
extendedMasterKey: string;
|
|
/**
|
|
*
|
|
* extended_master_key_birthday_timestamp is the optional unix timestamp in
|
|
* seconds to use as the wallet's birthday when using an extended master key
|
|
* to restore the wallet. lnd will only start scanning for funds in blocks that
|
|
* are after the birthday which can speed up the process significantly. If the
|
|
* birthday is not known, this should be left at its default value of 0 in
|
|
* which case lnd will start scanning from the first SegWit block (481824 on
|
|
* mainnet).
|
|
*
|
|
* @generated from protobuf field: uint64 extended_master_key_birthday_timestamp = 8
|
|
*/
|
|
extendedMasterKeyBirthdayTimestamp: bigint;
|
|
/**
|
|
*
|
|
* watch_only is the third option of initializing a wallet: by importing
|
|
* account xpubs only and therefore creating a watch-only wallet that does not
|
|
* contain any private keys. That means the wallet won't be able to sign for
|
|
* any of the keys and _needs_ to be run with a remote signer that has the
|
|
* corresponding private keys and can serve signing RPC requests.
|
|
*
|
|
* @generated from protobuf field: lnrpc.WatchOnly watch_only = 9
|
|
*/
|
|
watchOnly?: WatchOnly;
|
|
/**
|
|
*
|
|
* macaroon_root_key is an optional 32 byte macaroon root key that can be
|
|
* provided when initializing the wallet rather than letting lnd generate one
|
|
* on its own.
|
|
*
|
|
* @generated from protobuf field: bytes macaroon_root_key = 10
|
|
*/
|
|
macaroonRootKey: Uint8Array;
|
|
}
|
|
/**
|
|
* @generated from protobuf message lnrpc.InitWalletResponse
|
|
*/
|
|
export interface InitWalletResponse {
|
|
/**
|
|
*
|
|
* The binary serialized admin macaroon that can be used to access the daemon
|
|
* after creating the wallet. If the stateless_init parameter was set to true,
|
|
* this is the ONLY copy of the macaroon and MUST be stored safely by the
|
|
* caller. Otherwise a copy of this macaroon is also persisted on disk by the
|
|
* daemon, together with other macaroon files.
|
|
*
|
|
* @generated from protobuf field: bytes admin_macaroon = 1
|
|
*/
|
|
adminMacaroon: Uint8Array;
|
|
}
|
|
/**
|
|
* @generated from protobuf message lnrpc.WatchOnly
|
|
*/
|
|
export interface WatchOnly {
|
|
/**
|
|
*
|
|
* The unix timestamp in seconds of when the master key was created. lnd will
|
|
* only start scanning for funds in blocks that are after the birthday which
|
|
* can speed up the process significantly. If the birthday is not known, this
|
|
* should be left at its default value of 0 in which case lnd will start
|
|
* scanning from the first SegWit block (481824 on mainnet).
|
|
*
|
|
* @generated from protobuf field: uint64 master_key_birthday_timestamp = 1
|
|
*/
|
|
masterKeyBirthdayTimestamp: bigint;
|
|
/**
|
|
*
|
|
* The fingerprint of the root key (also known as the key with derivation path
|
|
* m/) from which the account public keys were derived from. This may be
|
|
* required by some hardware wallets for proper identification and signing. The
|
|
* bytes must be in big-endian order.
|
|
*
|
|
* @generated from protobuf field: bytes master_key_fingerprint = 2
|
|
*/
|
|
masterKeyFingerprint: Uint8Array;
|
|
/**
|
|
*
|
|
* The list of accounts to import. There _must_ be an account for all of lnd's
|
|
* main key scopes: BIP49/BIP84 (m/49'/0'/0', m/84'/0'/0', note that the
|
|
* coin type is always 0, even for testnet/regtest) and lnd's internal key
|
|
* scope (m/1017'/<coin_type>'/<account>'), where account is the key family as
|
|
* defined in `keychain/derivation.go` (currently indices 0 to 9).
|
|
*
|
|
* @generated from protobuf field: repeated lnrpc.WatchOnlyAccount accounts = 3
|
|
*/
|
|
accounts: WatchOnlyAccount[];
|
|
}
|
|
/**
|
|
* @generated from protobuf message lnrpc.WatchOnlyAccount
|
|
*/
|
|
export interface WatchOnlyAccount {
|
|
/**
|
|
*
|
|
* Purpose is the first number in the derivation path, must be either 49, 84
|
|
* or 1017.
|
|
*
|
|
* @generated from protobuf field: uint32 purpose = 1
|
|
*/
|
|
purpose: number;
|
|
/**
|
|
*
|
|
* Coin type is the second number in the derivation path, this is _always_ 0
|
|
* for purposes 49 and 84. It only needs to be set to 1 for purpose 1017 on
|
|
* testnet or regtest.
|
|
*
|
|
* @generated from protobuf field: uint32 coin_type = 2
|
|
*/
|
|
coinType: number;
|
|
/**
|
|
*
|
|
* Account is the third number in the derivation path. For purposes 49 and 84
|
|
* at least the default account (index 0) needs to be created but optional
|
|
* additional accounts are allowed. For purpose 1017 there needs to be exactly
|
|
* one account for each of the key families defined in `keychain/derivation.go`
|
|
* (currently indices 0 to 9)
|
|
*
|
|
* @generated from protobuf field: uint32 account = 3
|
|
*/
|
|
account: number;
|
|
/**
|
|
*
|
|
* The extended public key at depth 3 for the given account.
|
|
*
|
|
* @generated from protobuf field: string xpub = 4
|
|
*/
|
|
xpub: string;
|
|
}
|
|
/**
|
|
* @generated from protobuf message lnrpc.UnlockWalletRequest
|
|
*/
|
|
export interface UnlockWalletRequest {
|
|
/**
|
|
*
|
|
* wallet_password should be the current valid passphrase for the daemon. This
|
|
* will be required to decrypt on-disk material that the daemon requires to
|
|
* function properly. When using REST, this field must be encoded as base64.
|
|
*
|
|
* @generated from protobuf field: bytes wallet_password = 1
|
|
*/
|
|
walletPassword: Uint8Array;
|
|
/**
|
|
*
|
|
* recovery_window is an optional argument specifying the address lookahead
|
|
* when restoring a wallet seed. The recovery window applies to each
|
|
* individual branch of the BIP44 derivation paths. Supplying a recovery
|
|
* window of zero indicates that no addresses should be recovered, such after
|
|
* the first initialization of the wallet.
|
|
*
|
|
* @generated from protobuf field: int32 recovery_window = 2
|
|
*/
|
|
recoveryWindow: number;
|
|
/**
|
|
*
|
|
* channel_backups is an optional argument that allows clients to recover the
|
|
* settled funds within a set of channels. This should be populated if the
|
|
* user was unable to close out all channels and sweep funds before partial or
|
|
* total data loss occurred. If specified, then after on-chain recovery of
|
|
* funds, lnd begin to carry out the data loss recovery protocol in order to
|
|
* recover the funds in each channel from a remote force closed transaction.
|
|
*
|
|
* @generated from protobuf field: lnrpc.ChanBackupSnapshot channel_backups = 3
|
|
*/
|
|
channelBackups?: ChanBackupSnapshot;
|
|
/**
|
|
*
|
|
* stateless_init is an optional argument instructing the daemon NOT to create
|
|
* any *.macaroon files in its file system.
|
|
*
|
|
* @generated from protobuf field: bool stateless_init = 4
|
|
*/
|
|
statelessInit: boolean;
|
|
}
|
|
/**
|
|
* @generated from protobuf message lnrpc.UnlockWalletResponse
|
|
*/
|
|
export interface UnlockWalletResponse {
|
|
}
|
|
/**
|
|
* @generated from protobuf message lnrpc.ChangePasswordRequest
|
|
*/
|
|
export interface ChangePasswordRequest {
|
|
/**
|
|
*
|
|
* current_password should be the current valid passphrase used to unlock the
|
|
* daemon. When using REST, this field must be encoded as base64.
|
|
*
|
|
* @generated from protobuf field: bytes current_password = 1
|
|
*/
|
|
currentPassword: Uint8Array;
|
|
/**
|
|
*
|
|
* new_password should be the new passphrase that will be needed to unlock the
|
|
* daemon. When using REST, this field must be encoded as base64.
|
|
*
|
|
* @generated from protobuf field: bytes new_password = 2
|
|
*/
|
|
newPassword: Uint8Array;
|
|
/**
|
|
*
|
|
* stateless_init is an optional argument instructing the daemon NOT to create
|
|
* any *.macaroon files in its filesystem. If this parameter is set, then the
|
|
* admin macaroon returned in the response MUST be stored by the caller of the
|
|
* RPC as otherwise all access to the daemon will be lost!
|
|
*
|
|
* @generated from protobuf field: bool stateless_init = 3
|
|
*/
|
|
statelessInit: boolean;
|
|
/**
|
|
*
|
|
* new_macaroon_root_key is an optional argument instructing the daemon to
|
|
* rotate the macaroon root key when set to true. This will invalidate all
|
|
* previously generated macaroons.
|
|
*
|
|
* @generated from protobuf field: bool new_macaroon_root_key = 4
|
|
*/
|
|
newMacaroonRootKey: boolean;
|
|
}
|
|
/**
|
|
* @generated from protobuf message lnrpc.ChangePasswordResponse
|
|
*/
|
|
export interface ChangePasswordResponse {
|
|
/**
|
|
*
|
|
* The binary serialized admin macaroon that can be used to access the daemon
|
|
* after rotating the macaroon root key. If both the stateless_init and
|
|
* new_macaroon_root_key parameter were set to true, this is the ONLY copy of
|
|
* the macaroon that was created from the new root key and MUST be stored
|
|
* safely by the caller. Otherwise a copy of this macaroon is also persisted on
|
|
* disk by the daemon, together with other macaroon files.
|
|
*
|
|
* @generated from protobuf field: bytes admin_macaroon = 1
|
|
*/
|
|
adminMacaroon: Uint8Array;
|
|
}
|
|
// @generated message type with reflection information, may provide speed optimized methods
|
|
class GenSeedRequest$Type extends MessageType<GenSeedRequest> {
|
|
constructor() {
|
|
super("lnrpc.GenSeedRequest", [
|
|
{ no: 1, name: "aezeed_passphrase", kind: "scalar", T: 12 /*ScalarType.BYTES*/ },
|
|
{ no: 2, name: "seed_entropy", kind: "scalar", T: 12 /*ScalarType.BYTES*/ }
|
|
]);
|
|
}
|
|
create(value?: PartialMessage<GenSeedRequest>): GenSeedRequest {
|
|
const message = globalThis.Object.create((this.messagePrototype!));
|
|
message.aezeedPassphrase = new Uint8Array(0);
|
|
message.seedEntropy = new Uint8Array(0);
|
|
if (value !== undefined)
|
|
reflectionMergePartial<GenSeedRequest>(this, message, value);
|
|
return message;
|
|
}
|
|
internalBinaryRead(reader: IBinaryReader, length: number, options: BinaryReadOptions, target?: GenSeedRequest): GenSeedRequest {
|
|
let message = target ?? this.create(), end = reader.pos + length;
|
|
while (reader.pos < end) {
|
|
let [fieldNo, wireType] = reader.tag();
|
|
switch (fieldNo) {
|
|
case /* bytes aezeed_passphrase */ 1:
|
|
message.aezeedPassphrase = reader.bytes();
|
|
break;
|
|
case /* bytes seed_entropy */ 2:
|
|
message.seedEntropy = reader.bytes();
|
|
break;
|
|
default:
|
|
let u = options.readUnknownField;
|
|
if (u === "throw")
|
|
throw new globalThis.Error(`Unknown field ${fieldNo} (wire type ${wireType}) for ${this.typeName}`);
|
|
let d = reader.skip(wireType);
|
|
if (u !== false)
|
|
(u === true ? UnknownFieldHandler.onRead : u)(this.typeName, message, fieldNo, wireType, d);
|
|
}
|
|
}
|
|
return message;
|
|
}
|
|
internalBinaryWrite(message: GenSeedRequest, writer: IBinaryWriter, options: BinaryWriteOptions): IBinaryWriter {
|
|
/* bytes aezeed_passphrase = 1; */
|
|
if (message.aezeedPassphrase.length)
|
|
writer.tag(1, WireType.LengthDelimited).bytes(message.aezeedPassphrase);
|
|
/* bytes seed_entropy = 2; */
|
|
if (message.seedEntropy.length)
|
|
writer.tag(2, WireType.LengthDelimited).bytes(message.seedEntropy);
|
|
let u = options.writeUnknownFields;
|
|
if (u !== false)
|
|
(u == true ? UnknownFieldHandler.onWrite : u)(this.typeName, message, writer);
|
|
return writer;
|
|
}
|
|
}
|
|
/**
|
|
* @generated MessageType for protobuf message lnrpc.GenSeedRequest
|
|
*/
|
|
export const GenSeedRequest = new GenSeedRequest$Type();
|
|
// @generated message type with reflection information, may provide speed optimized methods
|
|
class GenSeedResponse$Type extends MessageType<GenSeedResponse> {
|
|
constructor() {
|
|
super("lnrpc.GenSeedResponse", [
|
|
{ no: 1, name: "cipher_seed_mnemonic", kind: "scalar", repeat: 2 /*RepeatType.UNPACKED*/, T: 9 /*ScalarType.STRING*/ },
|
|
{ no: 2, name: "enciphered_seed", kind: "scalar", T: 12 /*ScalarType.BYTES*/ }
|
|
]);
|
|
}
|
|
create(value?: PartialMessage<GenSeedResponse>): GenSeedResponse {
|
|
const message = globalThis.Object.create((this.messagePrototype!));
|
|
message.cipherSeedMnemonic = [];
|
|
message.encipheredSeed = new Uint8Array(0);
|
|
if (value !== undefined)
|
|
reflectionMergePartial<GenSeedResponse>(this, message, value);
|
|
return message;
|
|
}
|
|
internalBinaryRead(reader: IBinaryReader, length: number, options: BinaryReadOptions, target?: GenSeedResponse): GenSeedResponse {
|
|
let message = target ?? this.create(), end = reader.pos + length;
|
|
while (reader.pos < end) {
|
|
let [fieldNo, wireType] = reader.tag();
|
|
switch (fieldNo) {
|
|
case /* repeated string cipher_seed_mnemonic */ 1:
|
|
message.cipherSeedMnemonic.push(reader.string());
|
|
break;
|
|
case /* bytes enciphered_seed */ 2:
|
|
message.encipheredSeed = reader.bytes();
|
|
break;
|
|
default:
|
|
let u = options.readUnknownField;
|
|
if (u === "throw")
|
|
throw new globalThis.Error(`Unknown field ${fieldNo} (wire type ${wireType}) for ${this.typeName}`);
|
|
let d = reader.skip(wireType);
|
|
if (u !== false)
|
|
(u === true ? UnknownFieldHandler.onRead : u)(this.typeName, message, fieldNo, wireType, d);
|
|
}
|
|
}
|
|
return message;
|
|
}
|
|
internalBinaryWrite(message: GenSeedResponse, writer: IBinaryWriter, options: BinaryWriteOptions): IBinaryWriter {
|
|
/* repeated string cipher_seed_mnemonic = 1; */
|
|
for (let i = 0; i < message.cipherSeedMnemonic.length; i++)
|
|
writer.tag(1, WireType.LengthDelimited).string(message.cipherSeedMnemonic[i]);
|
|
/* bytes enciphered_seed = 2; */
|
|
if (message.encipheredSeed.length)
|
|
writer.tag(2, WireType.LengthDelimited).bytes(message.encipheredSeed);
|
|
let u = options.writeUnknownFields;
|
|
if (u !== false)
|
|
(u == true ? UnknownFieldHandler.onWrite : u)(this.typeName, message, writer);
|
|
return writer;
|
|
}
|
|
}
|
|
/**
|
|
* @generated MessageType for protobuf message lnrpc.GenSeedResponse
|
|
*/
|
|
export const GenSeedResponse = new GenSeedResponse$Type();
|
|
// @generated message type with reflection information, may provide speed optimized methods
|
|
class InitWalletRequest$Type extends MessageType<InitWalletRequest> {
|
|
constructor() {
|
|
super("lnrpc.InitWalletRequest", [
|
|
{ no: 1, name: "wallet_password", kind: "scalar", T: 12 /*ScalarType.BYTES*/ },
|
|
{ no: 2, name: "cipher_seed_mnemonic", kind: "scalar", repeat: 2 /*RepeatType.UNPACKED*/, T: 9 /*ScalarType.STRING*/ },
|
|
{ no: 3, name: "aezeed_passphrase", kind: "scalar", T: 12 /*ScalarType.BYTES*/ },
|
|
{ no: 4, name: "recovery_window", kind: "scalar", T: 5 /*ScalarType.INT32*/ },
|
|
{ no: 5, name: "channel_backups", kind: "message", T: () => ChanBackupSnapshot },
|
|
{ no: 6, name: "stateless_init", kind: "scalar", T: 8 /*ScalarType.BOOL*/ },
|
|
{ no: 7, name: "extended_master_key", kind: "scalar", T: 9 /*ScalarType.STRING*/ },
|
|
{ no: 8, name: "extended_master_key_birthday_timestamp", kind: "scalar", T: 4 /*ScalarType.UINT64*/, L: 0 /*LongType.BIGINT*/ },
|
|
{ no: 9, name: "watch_only", kind: "message", T: () => WatchOnly },
|
|
{ no: 10, name: "macaroon_root_key", kind: "scalar", T: 12 /*ScalarType.BYTES*/ }
|
|
]);
|
|
}
|
|
create(value?: PartialMessage<InitWalletRequest>): InitWalletRequest {
|
|
const message = globalThis.Object.create((this.messagePrototype!));
|
|
message.walletPassword = new Uint8Array(0);
|
|
message.cipherSeedMnemonic = [];
|
|
message.aezeedPassphrase = new Uint8Array(0);
|
|
message.recoveryWindow = 0;
|
|
message.statelessInit = false;
|
|
message.extendedMasterKey = "";
|
|
message.extendedMasterKeyBirthdayTimestamp = 0n;
|
|
message.macaroonRootKey = new Uint8Array(0);
|
|
if (value !== undefined)
|
|
reflectionMergePartial<InitWalletRequest>(this, message, value);
|
|
return message;
|
|
}
|
|
internalBinaryRead(reader: IBinaryReader, length: number, options: BinaryReadOptions, target?: InitWalletRequest): InitWalletRequest {
|
|
let message = target ?? this.create(), end = reader.pos + length;
|
|
while (reader.pos < end) {
|
|
let [fieldNo, wireType] = reader.tag();
|
|
switch (fieldNo) {
|
|
case /* bytes wallet_password */ 1:
|
|
message.walletPassword = reader.bytes();
|
|
break;
|
|
case /* repeated string cipher_seed_mnemonic */ 2:
|
|
message.cipherSeedMnemonic.push(reader.string());
|
|
break;
|
|
case /* bytes aezeed_passphrase */ 3:
|
|
message.aezeedPassphrase = reader.bytes();
|
|
break;
|
|
case /* int32 recovery_window */ 4:
|
|
message.recoveryWindow = reader.int32();
|
|
break;
|
|
case /* lnrpc.ChanBackupSnapshot channel_backups */ 5:
|
|
message.channelBackups = ChanBackupSnapshot.internalBinaryRead(reader, reader.uint32(), options, message.channelBackups);
|
|
break;
|
|
case /* bool stateless_init */ 6:
|
|
message.statelessInit = reader.bool();
|
|
break;
|
|
case /* string extended_master_key */ 7:
|
|
message.extendedMasterKey = reader.string();
|
|
break;
|
|
case /* uint64 extended_master_key_birthday_timestamp */ 8:
|
|
message.extendedMasterKeyBirthdayTimestamp = reader.uint64().toBigInt();
|
|
break;
|
|
case /* lnrpc.WatchOnly watch_only */ 9:
|
|
message.watchOnly = WatchOnly.internalBinaryRead(reader, reader.uint32(), options, message.watchOnly);
|
|
break;
|
|
case /* bytes macaroon_root_key */ 10:
|
|
message.macaroonRootKey = reader.bytes();
|
|
break;
|
|
default:
|
|
let u = options.readUnknownField;
|
|
if (u === "throw")
|
|
throw new globalThis.Error(`Unknown field ${fieldNo} (wire type ${wireType}) for ${this.typeName}`);
|
|
let d = reader.skip(wireType);
|
|
if (u !== false)
|
|
(u === true ? UnknownFieldHandler.onRead : u)(this.typeName, message, fieldNo, wireType, d);
|
|
}
|
|
}
|
|
return message;
|
|
}
|
|
internalBinaryWrite(message: InitWalletRequest, writer: IBinaryWriter, options: BinaryWriteOptions): IBinaryWriter {
|
|
/* bytes wallet_password = 1; */
|
|
if (message.walletPassword.length)
|
|
writer.tag(1, WireType.LengthDelimited).bytes(message.walletPassword);
|
|
/* repeated string cipher_seed_mnemonic = 2; */
|
|
for (let i = 0; i < message.cipherSeedMnemonic.length; i++)
|
|
writer.tag(2, WireType.LengthDelimited).string(message.cipherSeedMnemonic[i]);
|
|
/* bytes aezeed_passphrase = 3; */
|
|
if (message.aezeedPassphrase.length)
|
|
writer.tag(3, WireType.LengthDelimited).bytes(message.aezeedPassphrase);
|
|
/* int32 recovery_window = 4; */
|
|
if (message.recoveryWindow !== 0)
|
|
writer.tag(4, WireType.Varint).int32(message.recoveryWindow);
|
|
/* lnrpc.ChanBackupSnapshot channel_backups = 5; */
|
|
if (message.channelBackups)
|
|
ChanBackupSnapshot.internalBinaryWrite(message.channelBackups, writer.tag(5, WireType.LengthDelimited).fork(), options).join();
|
|
/* bool stateless_init = 6; */
|
|
if (message.statelessInit !== false)
|
|
writer.tag(6, WireType.Varint).bool(message.statelessInit);
|
|
/* string extended_master_key = 7; */
|
|
if (message.extendedMasterKey !== "")
|
|
writer.tag(7, WireType.LengthDelimited).string(message.extendedMasterKey);
|
|
/* uint64 extended_master_key_birthday_timestamp = 8; */
|
|
if (message.extendedMasterKeyBirthdayTimestamp !== 0n)
|
|
writer.tag(8, WireType.Varint).uint64(message.extendedMasterKeyBirthdayTimestamp);
|
|
/* lnrpc.WatchOnly watch_only = 9; */
|
|
if (message.watchOnly)
|
|
WatchOnly.internalBinaryWrite(message.watchOnly, writer.tag(9, WireType.LengthDelimited).fork(), options).join();
|
|
/* bytes macaroon_root_key = 10; */
|
|
if (message.macaroonRootKey.length)
|
|
writer.tag(10, WireType.LengthDelimited).bytes(message.macaroonRootKey);
|
|
let u = options.writeUnknownFields;
|
|
if (u !== false)
|
|
(u == true ? UnknownFieldHandler.onWrite : u)(this.typeName, message, writer);
|
|
return writer;
|
|
}
|
|
}
|
|
/**
|
|
* @generated MessageType for protobuf message lnrpc.InitWalletRequest
|
|
*/
|
|
export const InitWalletRequest = new InitWalletRequest$Type();
|
|
// @generated message type with reflection information, may provide speed optimized methods
|
|
class InitWalletResponse$Type extends MessageType<InitWalletResponse> {
|
|
constructor() {
|
|
super("lnrpc.InitWalletResponse", [
|
|
{ no: 1, name: "admin_macaroon", kind: "scalar", T: 12 /*ScalarType.BYTES*/ }
|
|
]);
|
|
}
|
|
create(value?: PartialMessage<InitWalletResponse>): InitWalletResponse {
|
|
const message = globalThis.Object.create((this.messagePrototype!));
|
|
message.adminMacaroon = new Uint8Array(0);
|
|
if (value !== undefined)
|
|
reflectionMergePartial<InitWalletResponse>(this, message, value);
|
|
return message;
|
|
}
|
|
internalBinaryRead(reader: IBinaryReader, length: number, options: BinaryReadOptions, target?: InitWalletResponse): InitWalletResponse {
|
|
let message = target ?? this.create(), end = reader.pos + length;
|
|
while (reader.pos < end) {
|
|
let [fieldNo, wireType] = reader.tag();
|
|
switch (fieldNo) {
|
|
case /* bytes admin_macaroon */ 1:
|
|
message.adminMacaroon = reader.bytes();
|
|
break;
|
|
default:
|
|
let u = options.readUnknownField;
|
|
if (u === "throw")
|
|
throw new globalThis.Error(`Unknown field ${fieldNo} (wire type ${wireType}) for ${this.typeName}`);
|
|
let d = reader.skip(wireType);
|
|
if (u !== false)
|
|
(u === true ? UnknownFieldHandler.onRead : u)(this.typeName, message, fieldNo, wireType, d);
|
|
}
|
|
}
|
|
return message;
|
|
}
|
|
internalBinaryWrite(message: InitWalletResponse, writer: IBinaryWriter, options: BinaryWriteOptions): IBinaryWriter {
|
|
/* bytes admin_macaroon = 1; */
|
|
if (message.adminMacaroon.length)
|
|
writer.tag(1, WireType.LengthDelimited).bytes(message.adminMacaroon);
|
|
let u = options.writeUnknownFields;
|
|
if (u !== false)
|
|
(u == true ? UnknownFieldHandler.onWrite : u)(this.typeName, message, writer);
|
|
return writer;
|
|
}
|
|
}
|
|
/**
|
|
* @generated MessageType for protobuf message lnrpc.InitWalletResponse
|
|
*/
|
|
export const InitWalletResponse = new InitWalletResponse$Type();
|
|
// @generated message type with reflection information, may provide speed optimized methods
|
|
class WatchOnly$Type extends MessageType<WatchOnly> {
|
|
constructor() {
|
|
super("lnrpc.WatchOnly", [
|
|
{ no: 1, name: "master_key_birthday_timestamp", kind: "scalar", T: 4 /*ScalarType.UINT64*/, L: 0 /*LongType.BIGINT*/ },
|
|
{ no: 2, name: "master_key_fingerprint", kind: "scalar", T: 12 /*ScalarType.BYTES*/ },
|
|
{ no: 3, name: "accounts", kind: "message", repeat: 2 /*RepeatType.UNPACKED*/, T: () => WatchOnlyAccount }
|
|
]);
|
|
}
|
|
create(value?: PartialMessage<WatchOnly>): WatchOnly {
|
|
const message = globalThis.Object.create((this.messagePrototype!));
|
|
message.masterKeyBirthdayTimestamp = 0n;
|
|
message.masterKeyFingerprint = new Uint8Array(0);
|
|
message.accounts = [];
|
|
if (value !== undefined)
|
|
reflectionMergePartial<WatchOnly>(this, message, value);
|
|
return message;
|
|
}
|
|
internalBinaryRead(reader: IBinaryReader, length: number, options: BinaryReadOptions, target?: WatchOnly): WatchOnly {
|
|
let message = target ?? this.create(), end = reader.pos + length;
|
|
while (reader.pos < end) {
|
|
let [fieldNo, wireType] = reader.tag();
|
|
switch (fieldNo) {
|
|
case /* uint64 master_key_birthday_timestamp */ 1:
|
|
message.masterKeyBirthdayTimestamp = reader.uint64().toBigInt();
|
|
break;
|
|
case /* bytes master_key_fingerprint */ 2:
|
|
message.masterKeyFingerprint = reader.bytes();
|
|
break;
|
|
case /* repeated lnrpc.WatchOnlyAccount accounts */ 3:
|
|
message.accounts.push(WatchOnlyAccount.internalBinaryRead(reader, reader.uint32(), options));
|
|
break;
|
|
default:
|
|
let u = options.readUnknownField;
|
|
if (u === "throw")
|
|
throw new globalThis.Error(`Unknown field ${fieldNo} (wire type ${wireType}) for ${this.typeName}`);
|
|
let d = reader.skip(wireType);
|
|
if (u !== false)
|
|
(u === true ? UnknownFieldHandler.onRead : u)(this.typeName, message, fieldNo, wireType, d);
|
|
}
|
|
}
|
|
return message;
|
|
}
|
|
internalBinaryWrite(message: WatchOnly, writer: IBinaryWriter, options: BinaryWriteOptions): IBinaryWriter {
|
|
/* uint64 master_key_birthday_timestamp = 1; */
|
|
if (message.masterKeyBirthdayTimestamp !== 0n)
|
|
writer.tag(1, WireType.Varint).uint64(message.masterKeyBirthdayTimestamp);
|
|
/* bytes master_key_fingerprint = 2; */
|
|
if (message.masterKeyFingerprint.length)
|
|
writer.tag(2, WireType.LengthDelimited).bytes(message.masterKeyFingerprint);
|
|
/* repeated lnrpc.WatchOnlyAccount accounts = 3; */
|
|
for (let i = 0; i < message.accounts.length; i++)
|
|
WatchOnlyAccount.internalBinaryWrite(message.accounts[i], writer.tag(3, WireType.LengthDelimited).fork(), options).join();
|
|
let u = options.writeUnknownFields;
|
|
if (u !== false)
|
|
(u == true ? UnknownFieldHandler.onWrite : u)(this.typeName, message, writer);
|
|
return writer;
|
|
}
|
|
}
|
|
/**
|
|
* @generated MessageType for protobuf message lnrpc.WatchOnly
|
|
*/
|
|
export const WatchOnly = new WatchOnly$Type();
|
|
// @generated message type with reflection information, may provide speed optimized methods
|
|
class WatchOnlyAccount$Type extends MessageType<WatchOnlyAccount> {
|
|
constructor() {
|
|
super("lnrpc.WatchOnlyAccount", [
|
|
{ no: 1, name: "purpose", kind: "scalar", T: 13 /*ScalarType.UINT32*/ },
|
|
{ no: 2, name: "coin_type", kind: "scalar", T: 13 /*ScalarType.UINT32*/ },
|
|
{ no: 3, name: "account", kind: "scalar", T: 13 /*ScalarType.UINT32*/ },
|
|
{ no: 4, name: "xpub", kind: "scalar", T: 9 /*ScalarType.STRING*/ }
|
|
]);
|
|
}
|
|
create(value?: PartialMessage<WatchOnlyAccount>): WatchOnlyAccount {
|
|
const message = globalThis.Object.create((this.messagePrototype!));
|
|
message.purpose = 0;
|
|
message.coinType = 0;
|
|
message.account = 0;
|
|
message.xpub = "";
|
|
if (value !== undefined)
|
|
reflectionMergePartial<WatchOnlyAccount>(this, message, value);
|
|
return message;
|
|
}
|
|
internalBinaryRead(reader: IBinaryReader, length: number, options: BinaryReadOptions, target?: WatchOnlyAccount): WatchOnlyAccount {
|
|
let message = target ?? this.create(), end = reader.pos + length;
|
|
while (reader.pos < end) {
|
|
let [fieldNo, wireType] = reader.tag();
|
|
switch (fieldNo) {
|
|
case /* uint32 purpose */ 1:
|
|
message.purpose = reader.uint32();
|
|
break;
|
|
case /* uint32 coin_type */ 2:
|
|
message.coinType = reader.uint32();
|
|
break;
|
|
case /* uint32 account */ 3:
|
|
message.account = reader.uint32();
|
|
break;
|
|
case /* string xpub */ 4:
|
|
message.xpub = reader.string();
|
|
break;
|
|
default:
|
|
let u = options.readUnknownField;
|
|
if (u === "throw")
|
|
throw new globalThis.Error(`Unknown field ${fieldNo} (wire type ${wireType}) for ${this.typeName}`);
|
|
let d = reader.skip(wireType);
|
|
if (u !== false)
|
|
(u === true ? UnknownFieldHandler.onRead : u)(this.typeName, message, fieldNo, wireType, d);
|
|
}
|
|
}
|
|
return message;
|
|
}
|
|
internalBinaryWrite(message: WatchOnlyAccount, writer: IBinaryWriter, options: BinaryWriteOptions): IBinaryWriter {
|
|
/* uint32 purpose = 1; */
|
|
if (message.purpose !== 0)
|
|
writer.tag(1, WireType.Varint).uint32(message.purpose);
|
|
/* uint32 coin_type = 2; */
|
|
if (message.coinType !== 0)
|
|
writer.tag(2, WireType.Varint).uint32(message.coinType);
|
|
/* uint32 account = 3; */
|
|
if (message.account !== 0)
|
|
writer.tag(3, WireType.Varint).uint32(message.account);
|
|
/* string xpub = 4; */
|
|
if (message.xpub !== "")
|
|
writer.tag(4, WireType.LengthDelimited).string(message.xpub);
|
|
let u = options.writeUnknownFields;
|
|
if (u !== false)
|
|
(u == true ? UnknownFieldHandler.onWrite : u)(this.typeName, message, writer);
|
|
return writer;
|
|
}
|
|
}
|
|
/**
|
|
* @generated MessageType for protobuf message lnrpc.WatchOnlyAccount
|
|
*/
|
|
export const WatchOnlyAccount = new WatchOnlyAccount$Type();
|
|
// @generated message type with reflection information, may provide speed optimized methods
|
|
class UnlockWalletRequest$Type extends MessageType<UnlockWalletRequest> {
|
|
constructor() {
|
|
super("lnrpc.UnlockWalletRequest", [
|
|
{ no: 1, name: "wallet_password", kind: "scalar", T: 12 /*ScalarType.BYTES*/ },
|
|
{ no: 2, name: "recovery_window", kind: "scalar", T: 5 /*ScalarType.INT32*/ },
|
|
{ no: 3, name: "channel_backups", kind: "message", T: () => ChanBackupSnapshot },
|
|
{ no: 4, name: "stateless_init", kind: "scalar", T: 8 /*ScalarType.BOOL*/ }
|
|
]);
|
|
}
|
|
create(value?: PartialMessage<UnlockWalletRequest>): UnlockWalletRequest {
|
|
const message = globalThis.Object.create((this.messagePrototype!));
|
|
message.walletPassword = new Uint8Array(0);
|
|
message.recoveryWindow = 0;
|
|
message.statelessInit = false;
|
|
if (value !== undefined)
|
|
reflectionMergePartial<UnlockWalletRequest>(this, message, value);
|
|
return message;
|
|
}
|
|
internalBinaryRead(reader: IBinaryReader, length: number, options: BinaryReadOptions, target?: UnlockWalletRequest): UnlockWalletRequest {
|
|
let message = target ?? this.create(), end = reader.pos + length;
|
|
while (reader.pos < end) {
|
|
let [fieldNo, wireType] = reader.tag();
|
|
switch (fieldNo) {
|
|
case /* bytes wallet_password */ 1:
|
|
message.walletPassword = reader.bytes();
|
|
break;
|
|
case /* int32 recovery_window */ 2:
|
|
message.recoveryWindow = reader.int32();
|
|
break;
|
|
case /* lnrpc.ChanBackupSnapshot channel_backups */ 3:
|
|
message.channelBackups = ChanBackupSnapshot.internalBinaryRead(reader, reader.uint32(), options, message.channelBackups);
|
|
break;
|
|
case /* bool stateless_init */ 4:
|
|
message.statelessInit = reader.bool();
|
|
break;
|
|
default:
|
|
let u = options.readUnknownField;
|
|
if (u === "throw")
|
|
throw new globalThis.Error(`Unknown field ${fieldNo} (wire type ${wireType}) for ${this.typeName}`);
|
|
let d = reader.skip(wireType);
|
|
if (u !== false)
|
|
(u === true ? UnknownFieldHandler.onRead : u)(this.typeName, message, fieldNo, wireType, d);
|
|
}
|
|
}
|
|
return message;
|
|
}
|
|
internalBinaryWrite(message: UnlockWalletRequest, writer: IBinaryWriter, options: BinaryWriteOptions): IBinaryWriter {
|
|
/* bytes wallet_password = 1; */
|
|
if (message.walletPassword.length)
|
|
writer.tag(1, WireType.LengthDelimited).bytes(message.walletPassword);
|
|
/* int32 recovery_window = 2; */
|
|
if (message.recoveryWindow !== 0)
|
|
writer.tag(2, WireType.Varint).int32(message.recoveryWindow);
|
|
/* lnrpc.ChanBackupSnapshot channel_backups = 3; */
|
|
if (message.channelBackups)
|
|
ChanBackupSnapshot.internalBinaryWrite(message.channelBackups, writer.tag(3, WireType.LengthDelimited).fork(), options).join();
|
|
/* bool stateless_init = 4; */
|
|
if (message.statelessInit !== false)
|
|
writer.tag(4, WireType.Varint).bool(message.statelessInit);
|
|
let u = options.writeUnknownFields;
|
|
if (u !== false)
|
|
(u == true ? UnknownFieldHandler.onWrite : u)(this.typeName, message, writer);
|
|
return writer;
|
|
}
|
|
}
|
|
/**
|
|
* @generated MessageType for protobuf message lnrpc.UnlockWalletRequest
|
|
*/
|
|
export const UnlockWalletRequest = new UnlockWalletRequest$Type();
|
|
// @generated message type with reflection information, may provide speed optimized methods
|
|
class UnlockWalletResponse$Type extends MessageType<UnlockWalletResponse> {
|
|
constructor() {
|
|
super("lnrpc.UnlockWalletResponse", []);
|
|
}
|
|
create(value?: PartialMessage<UnlockWalletResponse>): UnlockWalletResponse {
|
|
const message = globalThis.Object.create((this.messagePrototype!));
|
|
if (value !== undefined)
|
|
reflectionMergePartial<UnlockWalletResponse>(this, message, value);
|
|
return message;
|
|
}
|
|
internalBinaryRead(reader: IBinaryReader, length: number, options: BinaryReadOptions, target?: UnlockWalletResponse): UnlockWalletResponse {
|
|
let message = target ?? this.create(), end = reader.pos + length;
|
|
while (reader.pos < end) {
|
|
let [fieldNo, wireType] = reader.tag();
|
|
switch (fieldNo) {
|
|
default:
|
|
let u = options.readUnknownField;
|
|
if (u === "throw")
|
|
throw new globalThis.Error(`Unknown field ${fieldNo} (wire type ${wireType}) for ${this.typeName}`);
|
|
let d = reader.skip(wireType);
|
|
if (u !== false)
|
|
(u === true ? UnknownFieldHandler.onRead : u)(this.typeName, message, fieldNo, wireType, d);
|
|
}
|
|
}
|
|
return message;
|
|
}
|
|
internalBinaryWrite(message: UnlockWalletResponse, writer: IBinaryWriter, options: BinaryWriteOptions): IBinaryWriter {
|
|
let u = options.writeUnknownFields;
|
|
if (u !== false)
|
|
(u == true ? UnknownFieldHandler.onWrite : u)(this.typeName, message, writer);
|
|
return writer;
|
|
}
|
|
}
|
|
/**
|
|
* @generated MessageType for protobuf message lnrpc.UnlockWalletResponse
|
|
*/
|
|
export const UnlockWalletResponse = new UnlockWalletResponse$Type();
|
|
// @generated message type with reflection information, may provide speed optimized methods
|
|
class ChangePasswordRequest$Type extends MessageType<ChangePasswordRequest> {
|
|
constructor() {
|
|
super("lnrpc.ChangePasswordRequest", [
|
|
{ no: 1, name: "current_password", kind: "scalar", T: 12 /*ScalarType.BYTES*/ },
|
|
{ no: 2, name: "new_password", kind: "scalar", T: 12 /*ScalarType.BYTES*/ },
|
|
{ no: 3, name: "stateless_init", kind: "scalar", T: 8 /*ScalarType.BOOL*/ },
|
|
{ no: 4, name: "new_macaroon_root_key", kind: "scalar", T: 8 /*ScalarType.BOOL*/ }
|
|
]);
|
|
}
|
|
create(value?: PartialMessage<ChangePasswordRequest>): ChangePasswordRequest {
|
|
const message = globalThis.Object.create((this.messagePrototype!));
|
|
message.currentPassword = new Uint8Array(0);
|
|
message.newPassword = new Uint8Array(0);
|
|
message.statelessInit = false;
|
|
message.newMacaroonRootKey = false;
|
|
if (value !== undefined)
|
|
reflectionMergePartial<ChangePasswordRequest>(this, message, value);
|
|
return message;
|
|
}
|
|
internalBinaryRead(reader: IBinaryReader, length: number, options: BinaryReadOptions, target?: ChangePasswordRequest): ChangePasswordRequest {
|
|
let message = target ?? this.create(), end = reader.pos + length;
|
|
while (reader.pos < end) {
|
|
let [fieldNo, wireType] = reader.tag();
|
|
switch (fieldNo) {
|
|
case /* bytes current_password */ 1:
|
|
message.currentPassword = reader.bytes();
|
|
break;
|
|
case /* bytes new_password */ 2:
|
|
message.newPassword = reader.bytes();
|
|
break;
|
|
case /* bool stateless_init */ 3:
|
|
message.statelessInit = reader.bool();
|
|
break;
|
|
case /* bool new_macaroon_root_key */ 4:
|
|
message.newMacaroonRootKey = reader.bool();
|
|
break;
|
|
default:
|
|
let u = options.readUnknownField;
|
|
if (u === "throw")
|
|
throw new globalThis.Error(`Unknown field ${fieldNo} (wire type ${wireType}) for ${this.typeName}`);
|
|
let d = reader.skip(wireType);
|
|
if (u !== false)
|
|
(u === true ? UnknownFieldHandler.onRead : u)(this.typeName, message, fieldNo, wireType, d);
|
|
}
|
|
}
|
|
return message;
|
|
}
|
|
internalBinaryWrite(message: ChangePasswordRequest, writer: IBinaryWriter, options: BinaryWriteOptions): IBinaryWriter {
|
|
/* bytes current_password = 1; */
|
|
if (message.currentPassword.length)
|
|
writer.tag(1, WireType.LengthDelimited).bytes(message.currentPassword);
|
|
/* bytes new_password = 2; */
|
|
if (message.newPassword.length)
|
|
writer.tag(2, WireType.LengthDelimited).bytes(message.newPassword);
|
|
/* bool stateless_init = 3; */
|
|
if (message.statelessInit !== false)
|
|
writer.tag(3, WireType.Varint).bool(message.statelessInit);
|
|
/* bool new_macaroon_root_key = 4; */
|
|
if (message.newMacaroonRootKey !== false)
|
|
writer.tag(4, WireType.Varint).bool(message.newMacaroonRootKey);
|
|
let u = options.writeUnknownFields;
|
|
if (u !== false)
|
|
(u == true ? UnknownFieldHandler.onWrite : u)(this.typeName, message, writer);
|
|
return writer;
|
|
}
|
|
}
|
|
/**
|
|
* @generated MessageType for protobuf message lnrpc.ChangePasswordRequest
|
|
*/
|
|
export const ChangePasswordRequest = new ChangePasswordRequest$Type();
|
|
// @generated message type with reflection information, may provide speed optimized methods
|
|
class ChangePasswordResponse$Type extends MessageType<ChangePasswordResponse> {
|
|
constructor() {
|
|
super("lnrpc.ChangePasswordResponse", [
|
|
{ no: 1, name: "admin_macaroon", kind: "scalar", T: 12 /*ScalarType.BYTES*/ }
|
|
]);
|
|
}
|
|
create(value?: PartialMessage<ChangePasswordResponse>): ChangePasswordResponse {
|
|
const message = globalThis.Object.create((this.messagePrototype!));
|
|
message.adminMacaroon = new Uint8Array(0);
|
|
if (value !== undefined)
|
|
reflectionMergePartial<ChangePasswordResponse>(this, message, value);
|
|
return message;
|
|
}
|
|
internalBinaryRead(reader: IBinaryReader, length: number, options: BinaryReadOptions, target?: ChangePasswordResponse): ChangePasswordResponse {
|
|
let message = target ?? this.create(), end = reader.pos + length;
|
|
while (reader.pos < end) {
|
|
let [fieldNo, wireType] = reader.tag();
|
|
switch (fieldNo) {
|
|
case /* bytes admin_macaroon */ 1:
|
|
message.adminMacaroon = reader.bytes();
|
|
break;
|
|
default:
|
|
let u = options.readUnknownField;
|
|
if (u === "throw")
|
|
throw new globalThis.Error(`Unknown field ${fieldNo} (wire type ${wireType}) for ${this.typeName}`);
|
|
let d = reader.skip(wireType);
|
|
if (u !== false)
|
|
(u === true ? UnknownFieldHandler.onRead : u)(this.typeName, message, fieldNo, wireType, d);
|
|
}
|
|
}
|
|
return message;
|
|
}
|
|
internalBinaryWrite(message: ChangePasswordResponse, writer: IBinaryWriter, options: BinaryWriteOptions): IBinaryWriter {
|
|
/* bytes admin_macaroon = 1; */
|
|
if (message.adminMacaroon.length)
|
|
writer.tag(1, WireType.LengthDelimited).bytes(message.adminMacaroon);
|
|
let u = options.writeUnknownFields;
|
|
if (u !== false)
|
|
(u == true ? UnknownFieldHandler.onWrite : u)(this.typeName, message, writer);
|
|
return writer;
|
|
}
|
|
}
|
|
/**
|
|
* @generated MessageType for protobuf message lnrpc.ChangePasswordResponse
|
|
*/
|
|
export const ChangePasswordResponse = new ChangePasswordResponse$Type();
|
|
/**
|
|
* @generated ServiceType for protobuf service lnrpc.WalletUnlocker
|
|
*/
|
|
export const WalletUnlocker = new ServiceType("lnrpc.WalletUnlocker", [
|
|
{ name: "GenSeed", options: {}, I: GenSeedRequest, O: GenSeedResponse },
|
|
{ name: "InitWallet", options: {}, I: InitWalletRequest, O: InitWalletResponse },
|
|
{ name: "UnlockWallet", options: {}, I: UnlockWalletRequest, O: UnlockWalletResponse },
|
|
{ name: "ChangePassword", options: {}, I: ChangePasswordRequest, O: ChangePasswordResponse }
|
|
]);
|