Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Deprecate /lambdas/crypto/validate-signature and /lambdas/contracts/* #1518

Open
4 of 8 tasks
hugoArregui opened this issue Apr 27, 2023 · 6 comments
Open
4 of 8 tasks
Labels
epic lambdas-deprecation Lambdas deprecation

Comments

@hugoArregui
Copy link
Contributor

hugoArregui commented Apr 27, 2023

Tasks:

  • Add validateSignature function to @dcl/crypto library replacing /lambdas/crypto/validate-signature endpoint functionality
  • Remove /lambdas/crypto/validate-signature endpoint from Lambdas service
  • Expose functions to retrieve DAO nodes from catalyst-client
  • Remove /lambdas/contracts/servers from Lambdas service
  • Expose functions to retrieve point of interests from catalyst-client
  • Remove /lambdas/contracts/denylisted-names from Lambdas service
  • Expose functions to retrieve blacklisted names from catalyst-client
  • Remove /lambdas/contracts/pois from Lambdas service
@menduz
Copy link
Member

menduz commented Apr 27, 2023

This function can work entirely client side using the @dcl/crypto library, can even live inside the catalyst-client.

If you add it to lamb2, can you please add a X-Deprecation-Warning header explaining that? And delay it's response by 10sec? to not break the contract and to prevent people from using it because it is slow

@hugoArregui
Copy link
Contributor Author

hugoArregui commented Apr 27, 2023

This function can work entirely client side using the @dcl/crypto library, can even live inside the catalyst-client.

If you add it to lamb2, can you please add a X-Deprecation-Warning header explaining that? And delay it's response by 10sec? to not break the contract and to prevent people from using it because it is slow

That was 100% the idea, I added this to the new version of catalyst-client, but then talking with Frami he explained to us that this is used by every web having support for smart contract wallets for login, so we decided to keep it here.

@menduz
Copy link
Member

menduz commented Apr 27, 2023

IS IT? how does it work? because smart contract wallets check against an ethereum node, not against the catalyst. You can read the code in @dcl/crypto, the client side code uses that lib

@hugoArregui
Copy link
Contributor Author

hugoArregui commented Apr 27, 2023

@menduz
Copy link
Member

menduz commented Apr 27, 2023

I don't see the point... In order to login from the web, you already have an window.ethereum provider there. Or WalletConnect, thus you can still use @dcl/crypto with that provider.

There is really nothing special about that server-side provider that cannot be used from the web

@hugoArregui
Copy link
Contributor Author

Ok, I did not know that you will always have an ethereum provider in the frontend. Here's what I would suggest: I still think we need to port this to lamb2 in order to don't delay the deprecation of lambdas, but I'm writing an ADR with all the deprecated endpoints for lambdas (which would we later submit as proposals, one per endpoint), so I'll include this there. Wdyt?

@hugoArregui hugoArregui changed the title Move /lambdas/crypto/validate-signature to lamb2 Deprecate /lambdas/crypto/validate-signature Apr 27, 2023
@hugoArregui hugoArregui changed the title Deprecate /lambdas/crypto/validate-signature Deprecate /lambdas/crypto/validate-signature and /lambdas/contracts/* Apr 28, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
epic lambdas-deprecation Lambdas deprecation
Projects
Status: In Progress
Development

Successfully merging a pull request may close this issue.

4 participants