-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add legacy v2-signed keys #125
Conversation
// 'CreateIdentity' wallet signature | ||
message LegacyCreateIdentityAssociation { | ||
RecoverableEcdsaSignature signature = 1; | ||
SignedPublicKey legacy_create_identity_key = 2; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The creation time and account address can be derived from the nested SignedPublicKey
proto
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me
@neekolas, I added 059ce56, because I think the revocation must apply to the unsigned legacy identity key bytes, not a proto serialization of the signed key bytes. This is because the proto serialization could be different between implementations. Will land, but let me know if you have feedback or tweaks and I can put up another PR! |
🎉 This PR is included in version 3.37.0 🎉 The release is available on: Your semantic-release bot 📦🚀 |
That's good thinking. We don't want to rely on a byte-perfect proto serialization anywhere. |
Adds the option for v3 keys to be signed by v2 keys, to avoid additional wallet signatures on clients that already have a signed v2 key.