| Crates.io | private-state-manager-client |
| lib.rs | private-state-manager-client |
| version | 0.1.0 |
| created_at | 2025-11-28 19:34:46.296245+00 |
| updated_at | 2025-11-28 19:34:46.296245+00 |
| description | Client library for Private State Manager |
| homepage | https://github.com/OpenZeppelin/private-state-manager |
| repository | https://github.com/OpenZeppelin/private-state-manager |
| max_upload_size | |
| id | 1955920 |
| size | 147,786 |
A minimal Rust client library for interacting with the Private State Manager gRPC service.
// Without authentication (only for configure endpoint)
let client = PsmClient::connect("https://testnet-psm.miden.network:50051").await?;
// With authentication (required for all other endpoints)
let secret_key = SecretKey::new();
let signer = Signer::new(secret_key);
let client = PsmClient::connect("https://testnet-psm.miden.network:50051")
.await?
.with_signer(signer);
The client uses Falcon RPO signatures for authentication. Here is how to set it up:
use miden_objects::crypto::dsa::rpo_falcon512::SecretKey;
use private_state_manager_client::signature::Signer;
// Generate a new secret key
let secret_key = SecretKey::new();
let signer = Signer::new(secret_key);
// Get the public key for authorization
let pubkey_hex = signer.public_key_hex();
let client = PsmClient::connect("https://testnet-psm.miden.network:50051")
.await?
.with_signer(signer);
use private_state_manager_client::auth;
// Add the public key to the account's authorized cosigners
let auth_config = auth::miden_falcon_rpo_auth(vec![pubkey_hex]);
After pushing a delta, the server returns an Acknowledgment signature that signs the new commitment. You should verify this signature to ensure the server is signing with the expected public key.
use private_state_manager_client::verify_commitment_signature;
let push_response = client.push_delta(&account_id, 1, prev_commitment, delta).await?;
if let Some(delta) = &push_response.delta {
if !delta.ack_sig.is_empty() {
// Get server public key (provided during account setup or configuration)
let server_pubkey = "0x..."; // Server's public key hex
let is_valid = verify_commitment_signature(
&delta.new_commitment,
server_pubkey,
&delta.ack_sig
)?;
if is_valid {
println!("Server signature verified!");
} else {
println!("Server signature verification failed!");
}
}
}
The server signs the new_commitment (the resulting commitment after applying the delta) to provide cryptographic proof that it processed the delta correctly.
cargo run --package private-state-manager-client --example e2e