-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
p10 auth #4
p10 auth #4
Conversation
@dmkozh sorry I accidentally resolved our last convo 😄 So when I look at the interface for I believe this is the right object, looking at the authorization entry here Maybe we're missing this in the sdk? @Shaptic any tips on this one? |
That's because nonce is a part of address credentials only (another variant for credentials is source account, which doesn't need nonce). IIUC in the SDK that corresponds to |
ah got it, thank you! |
@dmkozh as far signing the appropriate auth entry goes, I have a few questions - I have a tx for an atomic swap which does the following require auth calls Once the tx is built, I end up with 2 auth entries. Should each one of those be signed by both swappers in this case or is there a specific entry that should be signed by each? I sort of expected to be able to match addresses from the entry to a specific signer in order to sign the appropriate one, by doing something like this -
Only one entry is a |
Maybe it's because another one is invoker? The address in |
ah got it, yup that makes sense. The first swapper is the invoker in this case. Thanks again! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
gotta love seeing those deleted files amirite 😎
@dmkozh do you know what the correct value would be for building a key for a LedgerKeyContractData? I have the following but it seems I'm missing something.
when trying to get that key I end up in this xdr error -
|
Shaun pointed out the empty contract instance for key but not sure what that should actually be. |
@aristidesstaffieri this is before the Is the |
yup that was totally it, thanks @Shaptic you wizard 🧙 |
af9b0f2
to
32fe7af
Compare
ae68139
to
bb107d7
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🏎️
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nyyyyyyyeaow 🏎️
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
hell:clap:yeah:clap:
Migrates auth usage to p10, updates sdk version.
Notes -
This relies on this PR to be able to sign arbitrary blobs with Freighter - stellar/freighter#912
Also relies on this PR to be able to pass signed auth entries through assembly - stellar/js-soroban-client#114 (I have an assembleTransaction fn locally that we can throw away when that ships)
We use this external lib to abstract over wallet integration, so we need this to land as well before this will work.
Creit-Tech/Stellar-Wallets-Kit#1
This allows multi-party auth to create and execute a swap, optionally using invoker auth as one of the auth entries. If the user who acts as the exchange is also one of the swappers, their signing process will be skipped and the same signature that the tx uses will be used for contract auth.