-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarification on signer methods and return types #78
Comments
Any thoughts on using a more generic underlying library such as jose? Would extend the number of supported algorithms :) |
Yes, this relates directly to that approach. If this lib makes assumptions about the structure of signatures then it essentially prohibits the use of libs like |
Is that because of the use of |
Yes, so there would still be special handling of non-standard algorithms; at least for a while. Regarding ES256K-R, in the long run it should not even be a thing since, even for ethereumAddress as keys, it can be verified almost the same as ES256K. In parallel, I made a proposal to ethr-did-resolver to use public keys as identifiers instead of ethereum addresses. That would alleviate the need to have special handling here. |
That sounds great :) FYI, we are likely to start using the |
* feat: add did:key provider creator * feat: add support for NaclSigner with Ed25519 issuer key * fix: use base64 encoding for private keys with NaclSigner see [decentralized-identity/did-jwt#78](decentralized-identity/did-jwt#78) * docs: add did-key-provider to docsconfig.json * style: remove unreachable code Co-authored-by: Oliver Terbu <[email protected]> Co-authored-by: Mircea Nistor <[email protected]>
fixes #78 This deprecates `SimpleSigner`, `NaclSigner`, and `EllipticSigner`. They will be removed in the next major release.
This deprecates `SimpleSigner`, `NaclSigner`, and `EllipticSigner`. They will be removed in the next major release. fixes #78
🎉 This issue has been resolved in version 4.9.0 🎉 The release is available on: Your semantic-release bot 📦🚀 |
signer
params are very confusing at the moment.ES256K signers are expected to produce ECDSASignature objects while Ed25519 signers are expected to produce strings.
The developer is notified of this by an error.
See SignerAlgorithm.ts#L28 and SignerAlgorithm.ts#L41
This should be improved.
Signers should only produce strings since that way, signing can be externalized and there would no longer be a need to understand all algorithms locally, thus allowing support for many more crypto suites.
The text was updated successfully, but these errors were encountered: