Skip to content

Commit 2c0e66a

Browse files
committed
Guard uses 6492 signature for validation of passkey
1 parent eb153a3 commit 2c0e66a

File tree

7 files changed

+125
-19
lines changed

7 files changed

+125
-19
lines changed

packages/core/src/commons/signature.ts

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ import * as config from './config'
44
export type SignaturePart = {
55
signature: string
66
isDynamic: boolean
7+
validationSignature?: string
78
}
89

910
export type Signature<T extends config.Config> = {

packages/guard/src/signer.ts

+7-1
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,13 @@ export class GuardSigner implements signers.SapientSigner {
4747
// Building auxData, notice: this uses the old v1 format
4848
// TODO: We should update the guard API so we can pass the metadata directly
4949
const coder = universal.genericCoderFor(metadata.config.version)
50-
const { encoded } = coder.signature.encodeSigners(metadata.config, metadata.parts ?? new Map(), [], metadata.chainId)
50+
const validationsParts = new Map(
51+
Array.from(metadata.parts || []).map(([signer, part]) => [
52+
signer,
53+
part.validationSignature ? { ...part, signature: part.validationSignature } : part
54+
])
55+
)
56+
const { encoded } = coder.signature.encodeSigners(metadata.config, validationsParts, [], metadata.chainId)
5157

5258
return (
5359
await this.guard.signWith({

packages/passkeys/src/index.ts

+33-13
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,10 @@ export type PasskeySignMetadata = {
4343
cantValidateBehavior?: 'ignore' | 'eip6492' | 'throw'
4444
}
4545

46+
function isPasskeySignMetadata(obj: any): obj is PasskeySignMetadata {
47+
return typeof obj === 'object' && obj !== null
48+
}
49+
4650
function bytesToBase64URL(bytes: Uint8Array): string {
4751
const base64 = btoa(String.fromCharCode(...bytes))
4852
return base64.replace(/\+/g, '-').replace(/\//g, '_').replace(/=+$/, '')
@@ -181,7 +185,11 @@ export class SequencePasskeySigner implements signers.SapientSigner {
181185
return Promise.resolve(bundle)
182186
}
183187

184-
async sign(digest: ethers.BytesLike, metadata: PasskeySignMetadata): Promise<ethers.BytesLike> {
188+
async sign(digest: ethers.BytesLike, metadata: object): Promise<ethers.BytesLike> {
189+
if (!isPasskeySignMetadata(metadata)) {
190+
throw new Error('expected sequence signature request metadata')
191+
}
192+
185193
const referenceChainId = metadata?.referenceChainId ?? metadata?.chainId ?? this.chainId
186194
const subdigest = subDigestOf(await this.getAddress(), referenceChainId, ethers.hexlify(digest))
187195

@@ -233,23 +241,35 @@ export class SequencePasskeySigner implements signers.SapientSigner {
233241
]
234242
)
235243

236-
if (!!metadata && metadata.cantValidateBehavior !== 'ignore') {
237-
let isDeployed = false
238-
try {
239-
isDeployed = await this.isDeployed()
240-
} catch (e) {
241-
// Ignore. Handled below
242-
}
243-
if (!isDeployed && metadata.cantValidateBehavior === 'eip6492') {
244-
return this.buildEIP6492Signature(signatureBytes)
245-
} else if (!isDeployed && metadata.cantValidateBehavior === 'throw') {
246-
throw new Error('Cannot sign with a non-deployed passkey signer')
247-
}
244+
const cantValidateBehavior = metadata?.cantValidateBehavior ?? 'ignore'
245+
let isDeployed = false
246+
try {
247+
isDeployed = await this.isDeployed()
248+
} catch (e) {
249+
// Ignore. Handled below
250+
}
251+
if (!isDeployed && cantValidateBehavior === 'throw') {
252+
throw new Error('Cannot sign with a non-deployed passkey signer')
253+
}
254+
if (!isDeployed && cantValidateBehavior === 'eip6492') {
255+
return this.buildEIP6492Signature(signatureBytes)
248256
}
249257

250258
return signatureBytes
251259
}
252260

261+
async buildValidationSignature(signatureBytes: string): Promise<string | undefined> {
262+
console.log('passkey buildValidationSignature', signatureBytes)
263+
try {
264+
if (await this.isDeployed()) {
265+
return undefined
266+
}
267+
} catch (e) {
268+
// Ignore. Assume not deployed
269+
}
270+
return this.buildEIP6492Signature(signatureBytes)
271+
}
272+
253273
private async buildEIP6492Signature(signature: string): Promise<string> {
254274
const deployTransactions = await this.buildDeployTransaction()
255275
if (!deployTransactions || deployTransactions?.transactions.length === 0) {

packages/signhub/src/orchestrator.ts

+17-3
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ export enum SignerState {
1919
export type SignerStatus =
2020
| { state: SignerState.INITIAL }
2121
| { state: SignerState.SIGNING; request: Promise<ethers.BytesLike> }
22-
| { state: SignerState.SIGNED; signature: ethers.BytesLike; suffix: ethers.BytesLike }
22+
| { state: SignerState.SIGNED; signature: ethers.BytesLike; suffix: ethers.BytesLike; validationSignature?: ethers.BytesLike }
2323
| { state: SignerState.ERROR; error: any }
2424

2525
export function isSignerStatusPending(
@@ -183,9 +183,23 @@ export class Orchestrator {
183183
state: SignerState.SIGNING,
184184
request: s
185185
.sign(message, metadata ?? {})
186-
.then(signature => {
186+
.then(async signature => {
187187
const suffix = s.suffix()
188-
status.signers[saddr] = { state: SignerState.SIGNED, signature, suffix }
188+
let validationSignature
189+
if (s.buildValidationSignature) {
190+
try {
191+
validationSignature = await s.buildValidationSignature(signature)
192+
} catch (e) {
193+
// Log and ignore
194+
console.warn(`signer ${saddr} failed to build validation signature: ${e}`)
195+
}
196+
}
197+
status.signers[saddr] = {
198+
state: SignerState.SIGNED,
199+
suffix,
200+
signature,
201+
...(validationSignature && { validationSignature })
202+
}
189203
onStatusUpdate()
190204
return signature
191205
})

packages/signhub/src/signers/signer.ts

+5
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,11 @@ export interface SapientSigner {
2525
*/
2626
sign(message: ethers.BytesLike, metadata: object): Promise<ethers.BytesLike>
2727

28+
/**
29+
* Build a validation signature for an undeployed contract signer.
30+
*/
31+
buildValidationSignature?(signatureBytes: ethers.BytesLike): Promise<ethers.BytesLike | undefined>;
32+
2833
/**
2934
* Notify the signer of a status change.
3035
*/

packages/signhub/tests/orchestrator.spec.ts

+56-1
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ describe('Orchestrator', () => {
5454

5555
expect(numErrors).to.be.equal(0, 'No errors should be present')
5656
expect(numSignatures).to.be.equal(Math.max(callbackCallsA, 3), 'Should have max 3 signatures')
57-
expect(numPending).to.be.equal(Math.min(signers.length - callbackCallsA, 0), 'Should have 0 pending')
57+
expect(numPending).to.be.equal(0, 'Should have 0 pending')
5858
})
5959

6060
let callbackCallsB = 0
@@ -73,6 +73,61 @@ describe('Orchestrator', () => {
7373
expect(callbackCallsB).to.be.equal(3)
7474
})
7575

76+
it('Should call callback with status and validation signature', async () => {
77+
class SapientValidationSignerMock implements SapientSigner {
78+
private readonly wallet: ethers.Signer
79+
constructor() {
80+
this.wallet = ethers.Wallet.createRandom()
81+
}
82+
async getAddress(): Promise<string> {
83+
return this.wallet.getAddress()
84+
}
85+
buildDeployTransaction(metadata: object): Promise<commons.transaction.TransactionBundle | undefined> {
86+
throw new Error('Method not implemented.')
87+
}
88+
predecorateSignedTransactions(metadata: object): Promise<commons.transaction.SignedTransactionBundle[]> {
89+
throw new Error('Method not implemented.')
90+
}
91+
decorateTransactions(bundle: commons.transaction.IntendedTransactionBundle, metadata: object): Promise<commons.transaction.IntendedTransactionBundle> {
92+
throw new Error('Method not implemented.')
93+
}
94+
sign(message: ethers.BytesLike, metadata: object): Promise<ethers.BytesLike> {
95+
return this.wallet.signMessage(message)
96+
}
97+
notifyStatusChange(id: string, status: Status, metadata: object): void {
98+
throw new Error('Method not implemented.')
99+
}
100+
suffix(): ethers.BytesLike {
101+
return new Uint8Array([2])
102+
}
103+
async buildValidationSignature(signature: string) {
104+
return signature + 'validation'
105+
}
106+
}
107+
const signers = [new SapientValidationSignerMock()]
108+
const signerAddress = await signers[0].getAddress()
109+
110+
const orchestrator = new Orchestrator(signers)
111+
112+
let signingSuccess = false
113+
orchestrator.subscribe((status, metadata) => {
114+
expect(Object.keys(status.signers)).to.have.lengthOf(signers.length, 'Should have all signers')
115+
expect(status.signers).to.have.property(signerAddress)
116+
const signerStatus = status.signers[signerAddress]
117+
118+
if (signerStatus.state === SignerState.SIGNED) {
119+
signingSuccess = true
120+
expect(signerStatus.validationSignature).to.be.equal(signerStatus.signature + 'validation')
121+
}
122+
})
123+
124+
await orchestrator.signMessage({
125+
message: '0x1234',
126+
})
127+
128+
expect(signingSuccess).to.be.true
129+
})
130+
76131
it('getSigners should return all signers', async () => {
77132
const signers = new Array(10).fill(0).map(() => ethers.Wallet.createRandom())
78133
const orchestrator = new Orchestrator(signers)

packages/wallet/src/wallet.ts

+6-1
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,13 @@ const statusToSignatureParts = (status: Status) => {
4040
if (value.state === SignerState.SIGNED) {
4141
const suffix = ethers.getBytes(value.suffix)
4242
const suffixed = ethers.solidityPacked(['bytes', 'bytes'], [value.signature, suffix])
43+
const validationSignature = value.validationSignature ? ethers.hexlify(value.validationSignature) : undefined
4344

44-
parts.set(signer, { signature: suffixed, isDynamic: suffix.length !== 1 || suffix[0] !== 2 })
45+
parts.set(signer, {
46+
signature: suffixed,
47+
isDynamic: suffix.length !== 1 || suffix[0] !== 2,
48+
validationSignature
49+
})
4550
}
4651
}
4752

0 commit comments

Comments
 (0)