The JavaScript SDK for Fhenix
fhenix.js allows developers to add support for encrypted data when developing dApps on Fhenix. fhenix.js includes easy helpers for encryption, unsealing and helpers to create apps that utilize private data.
(only node 20+ is supported until I fix this)
# Using npm
npm install fhenixjs
For browsers or environments that don't want to mess with WASM bundling, we recommend installing the prepackaged versions directly which is available in the ./dist/ folder in this repo.
You can also install from a CDN e.g.
https://cdn.jsdelivr.net/npm/fhenixjs@0.3.0-alpha.1/dist/fhenix.umd.min.js
You can install as a module:
<script type="module">
import { fhenixjs } from "./dist/fhenix.esm.min.js";
</script>
Or from a UMD:
<script id="fhenixjs" src="./dist/fhenix.umd.min.js"></script>
FhenixJS uses WASM for all the FHE goodness. If you're using the non-prepackaged version you'll need to configure next.js to properly use WASM via the next.config.js
file.
Otherwise, you can use the prepackaged version above that avoids having to bundle WASM.
Here's a working config I managed to conjure up from various Github and StackOverflow issues (please suggest improvements):
/** @type {import('next').NextConfig} */
module.exports = {
webpack: (config, { isServer }) => {
patchWasmModuleImport(config, isServer);
if (!isServer) {
config.output.environment = { ...config.output.environment, asyncFunction: true };
}
return config
}
}
function patchWasmModuleImport(config, isServer) {
config.experiments = Object.assign(config.experiments || {}, {
asyncWebAssembly: true,
layers: true,
topLevelAwait: true
});
config.optimization.moduleIds = 'named';
config.module.rules.push({
test: /\.wasm$/,
type: 'asset/resource',
});
// TODO: improve this function -> track https://github.com/vercel/next.js/issues/25852
if (isServer) {
config.output.webassemblyModuleFilename = './../static/wasm/tfhe_bg.wasm';
} else {
config.output.webassemblyModuleFilename = 'static/wasm/tfhe_bg.wasm';
}
}
If you have any problems with bundlers or frameworks, please open an issue in this repo and/or reach out on Discord/TG.
Also, if you had to fiddle with a bundler or config to get it working, please share the config with us so we can add it as a reference for others!
Completely untested. Maybe yes, maybe no, maybe both.
fhenixsdk
is designed to make interacting with FHE enabled blockchains typesafe and as streamlined as possible by providing utility functions for inputs, permits (permissions), and outputs. The sdk is an opinionated implementation of the underling PermitV2
class, therefor if the sdk is too limiting for your use case (e.g. multiple active users), you can easily drop down into the core PermitV2
class to extend its functionality.
NOTE: fhenixsdk
is still in beta, and while we will try to avoid it, we may release breaking changes in the future if necessary.
The sdk can be imported by:
import { fhenixsdk } from "fhenix.js"
Before interacting with your users' permits, you must first initialize the sdk:
await fhenixsdk.initialize({
provider: userProvider, // Implementation of AbstractAccount in `types.ts`
signer: userSigner, // Implementation of AbstractSigner in `types.ts`
projects: [...], // List of projects that your user's permits must allow access to, eg "FHERC20" to read token balances.
contracts: [...] // List of contract addresses that your user's permits must allow access to.
})
NOTE: When the user changes, it is recommended to re-initialize the sdk with the updated provider
and signer
then, to create a new Permit, simply:
await fhenixsdk.createPermit({
type: "self",
issuer: userAddress,
projects: ["FHERC20"]
})
// Alternatively, you can create a permit with the default options:
// type: "self"
// issuer: address of signer passed into `fhenixsdk.initialize`
// projects: list of projects passed into `fhenixsdk.initialize`
// contracts: list of contracts passed into `fhenixsdk.initialize`
await fhenixsdk.createPermit()
Now that the user has an active permit, we can extract the relevant Permission
data from that permit:
const permit = fhenixsdk.getPermit()
const permission = permit.getPermission()
which can then be used as an argument for a solidity function:
function getCounterPermitSealed(
PermissionV2 memory permission
) public view withPermission(permission) returns (SealedUint memory) {
return FHE.sealoutputTyped(userCounter[permission.issuer], permission.sealingKey);
}
NOTE: We will return to this SealedUint
output struct in the "Output data" section below.
You can read more about how Permits enable Fhenix to privately fetch encrypted data from on-chain by taking a look at our docs or the PermissionedV2.sol
contract.
Passing data to the contracts involves an additional step where the user's encryptable variables are encrypted. FHE enabled contracts require private data to be passed in as EncryptedUintXX
(or the other variants), which requires pre-encryption using the FHE enabled network's publicKey.
For a solidity function:
function add(inEuint32 calldata encryptedValue) public {
euint32 value = FHE.asEuint32(encryptedValue);
userCounter[msg.sender] = userCounter[msg.sender] + value;
}
We need to pass an encrypted value into inEuint32
. Using fhenixsdk
this is accomplished by:
const encryptableValue = Encryptable.uint32(5);
const encryptedArgs = client.encrypt(encryptableValue)
// ^? encryptedArgs - [EncryptedUint32]
These args can now be sent to the contract. .encrypt
will also replace "permission"
with the user's currently active permit permission
referenced above. It will also recursively encrypt any nested input data ([...]
/ {...}
):
const encrypted = client.encrypt(
"permission", // <== Will be replaced by the user's active `PermitV2.getPermission()`
Encryptable.uint8(5),
[Encryptable.uint128("50"), Encryptable.bool(true)],
50n,
"hello"
)
// typeof encrypted - [PermissionV2, EncryptedUint8, [EncryptedUint128, EncryptedBool], bigint, string]
Encrypted data is sealed before it is returned to the users, at which point it can be unsealed on the client. By using the structs SealedUint
/ SealedBool
/ SealedAddress
provided in FHE.sol
, the sealed output variables can be automatically decrypted into the correct type using fhenixsdk.unseal
.
A function with the following return type:
function getSealedData(PermissionedV2 memory permission) view returns (uint256, string memory, SealedUint memory, SealedUint memory, SealedBool memory);
can be unsealed with fhenixsdk
:
const data = await contract.getSealedData(permission);
const unsealed = await client.unseal(data)
// ?^ - [bigint, string, bigint, bigint, bool]
As with fhenixsdk.encrypt
above, unseal
will also recursively unseal any nested data structures.
fhenixsdk
useszustand
behind the scenes to persist your user's Permits. These zustand stores can be imported directly to be used as part of hooks. In the future we will also expose hooks to streamline interacting with the sdk in your react enabled dApps.- We plan to provide viem hooks inspired by
scaffold-eth
'suseScaffoldContractRead
anduseScaffoldContractWrite
to automatically encrypt input data, inject permissions, and unseal output data.
FhenixClient
uses the legacy Permission system (V1), it is recommended to migrate to fhenixsdk
and PermitV2
s above.
// initialize your web3 provider
const provider = new JsonRpcProvider("http://localhost:8545");
// initialize Fhenix Client
const client = new FhenixClient({ provider });
// to encrypt data for a Fhenix contract
let encrypted = await client.encrypt(5, EncryptionTypes.uint8);
// ... call contract with `encrypted`
// to unseal data from a Fhenix contract
const cleartext = client.unseal(contractAddress, sealed);
If you need to use the encrypt_xxxx()
functions of FhenixClient synchronously (ex: top level of a component / in a hook), then you may want to use FhenixClientSync
.
// Created using a static method instead of the `new` keyword
const clientSync = await FhenixClientSync.create({ provider });
// to encrypt data for a Fhenix contract (sync)
let encrypted = clientSync.encrypt(5, EncryptionTypes.uint8);
// ... call contract with `encrypted`
FhenixClientSync
and FhenixClient
share all functionality other than the async/sync encrypt_xxxx()
functions.
By default, FhenixClientSync
is configured to only use the default security zone 0. If you need to interact with additional security zones, they can be initialized when creating the sync client as follows:
const clientSync = await FhenixClientSync.create({
provider,
securityZones: [0, 1],
});
We recommend the helper Permit
structure, which is a built-in method for providing access control for your FHE-enabled view functions.
This project is based on fhevmjs by Zama and utilizes tfhe.rs to provide FHE functionality
Open an issue or Pull Request on Github! Or reach out to us on Discord or Telegram.