-
Notifications
You must be signed in to change notification settings - Fork 3.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
keyless authenticator fixes: b64 fixes, training wheels signature #12287
Conversation
9dcf803
to
48b8ab1
Compare
1aeade7
to
d2e97e2
Compare
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #12287 +/- ##
=========================================
- Coverage 64.2% 64.2% -0.1%
=========================================
Files 793 793
Lines 176259 176268 +9
=========================================
Hits 113188 113188
- Misses 63071 63080 +9 ☔ View full report in Codecov by Sentry. |
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM overall. Seems like we may not do this since do signatures are required (one over the ZKP and another over the txn).
One thing I would do is just double check MAX_SIZE of the ZkidSignature to make sure it can accommodate a potentially 1024 byte Passkey signature inside.
@@ -104,6 +104,7 @@ pub enum FeatureFlag { | |||
RefundableBytes, | |||
ObjectCodeDeployment, | |||
MaxObjectNestingCheck, | |||
KeylessAccountsWithPasskeys, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If we want to be consistent with the naming we have in aptos-core maybe something like KeylessAccountWithWebAuthnCredential
would make more sense but I see we're calling OIDC -> Keyless so maybe that's not what you're going for
aa95a07
to
213a956
Compare
…one for the TXN and another for the non-malleability
213a956
to
c5a48d2
Compare
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
✅ Forge suite
|
✅ Forge suite
|
Description
KeylessSignature
should not be b64url-encodedexp_timestamp_secs
toexp_date_secs
for consistency with our terminologyOpenIdSig
should not be b64url-encoded_json
suffixNo passkey support, because it would require working around the need for two passkey signatures: one one the TXN and another on the ZKP (non-malleability)