we don't need the social_proof field in IdentityKeyInfo on wallet login. when we are registering a new wallet user, the SIWE message and signature are the social proof for the user. we can serialize this struct for now to avoid any DDB changes. in the future, we may want to store the signature and message separately, but @will can handle this as part of ENG-6372.
Details
haven't tested yet, but two diffs after this one will test by calling the login_wallet_user RPC from native and confirming that the serialized social proof is present in DDB
Diff Detail
- Repository
- rCOMM Comm
- Lint
Lint Not Applicable - Unit
Tests Not Applicable
Event Timeline
@varun asked me to confirm that for the LogInWalletUser RPC, we should be looking at siwe_message / siwe_signature in WalletLoginRequest instead of social_proof in IdentityKeyInfo.
Confirming that here, but resigning since I don't have context on the Rust code.
Sidenote – It looks like GetInboundKeysForUser and GetOutboundKeysForUser use IdentityKeyInfo in their response types. If we remove social_proof from IdentityKeyInfo, we'll need to find another place to put it for those RPCs.
Might make sense to just fork IdentityKeyInfo. cc @will
Looks good to me. How about removing the social_proof from DeviceKeyUpload?
This is what ENG-6481 is about. We agreed that social proof can be removed from devices' IdentityKeyInfo and moved to the identity response field.
Looks good to me. How about removing the social_proof from DeviceKeyUpload?
I assume you meant the DeviceKeyUploadActions trait. I agree we can remove social_proof() from that trait and the implementation. Will make this change before landing