94 lines
3.1 KiB
TypeScript
94 lines
3.1 KiB
TypeScript
/**
|
|
* test-passkey-signer.ts — Test the passkey x402 signer module.
|
|
*
|
|
* Verifies that createPasskeySigner() and createPasskeySignerFromKeys()
|
|
* work correctly with simulated PRF output. Does NOT make actual payments
|
|
* (that requires a funded wallet + live facilitator).
|
|
*
|
|
* Usage:
|
|
* bun run scripts/test-passkey-signer.ts
|
|
*/
|
|
|
|
import { createPasskeySigner, createPasskeySignerFromKeys } from '../shared/x402/passkey-signer';
|
|
import { deriveEOAFromPRF } from '../src/encryptid/eoa-derivation';
|
|
import { EncryptIDKeyManager, type DerivedKeys } from '../src/encryptid/key-derivation';
|
|
|
|
let passed = 0;
|
|
let failed = 0;
|
|
|
|
function assert(condition: boolean, msg: string) {
|
|
if (condition) {
|
|
console.log(` ✓ ${msg}`);
|
|
passed++;
|
|
} else {
|
|
console.error(` ✗ ${msg}`);
|
|
failed++;
|
|
}
|
|
}
|
|
|
|
async function main() {
|
|
console.log('=== Passkey Signer Tests ===\n');
|
|
|
|
// Fixed PRF output
|
|
const prfOutput = new Uint8Array(32);
|
|
for (let i = 0; i < 32; i++) prfOutput[i] = i + 1;
|
|
|
|
// Expected EOA from this PRF
|
|
const expectedEOA = deriveEOAFromPRF(prfOutput);
|
|
|
|
// Test 1: createPasskeySigner from raw PRF
|
|
console.log('[1] createPasskeySigner (from raw PRF)');
|
|
const signer = await createPasskeySigner({ prfOutput });
|
|
assert(signer.eoaAddress === expectedEOA.address, 'EOA address matches derivation');
|
|
assert(typeof signer.paidFetch === 'function', 'paidFetch is a function');
|
|
assert(typeof signer.cleanup === 'function', 'cleanup is a function');
|
|
console.log(` EOA: ${signer.eoaAddress}`);
|
|
|
|
// Test 2: Cleanup zeros the key
|
|
console.log('\n[2] Cleanup');
|
|
signer.cleanup();
|
|
// Can't directly check the internal state, but we verify it doesn't throw
|
|
assert(true, 'Cleanup ran without error');
|
|
|
|
// Test 3: createPasskeySignerFromKeys (from DerivedKeys)
|
|
console.log('\n[3] createPasskeySignerFromKeys');
|
|
const km = new EncryptIDKeyManager();
|
|
await km.initFromPRF(prfOutput.buffer);
|
|
const keys = await km.getKeys();
|
|
|
|
const signer2 = await createPasskeySignerFromKeys(keys);
|
|
assert(signer2 !== null, 'Signer created from DerivedKeys');
|
|
assert(signer2!.eoaAddress === expectedEOA.address, 'Same EOA address from keys');
|
|
assert(typeof signer2!.paidFetch === 'function', 'paidFetch is a function');
|
|
signer2!.cleanup();
|
|
|
|
// Test 4: createPasskeySignerFromKeys returns null for passphrase keys
|
|
console.log('\n[4] Returns null for passphrase-derived keys (no EOA)');
|
|
const km2 = new EncryptIDKeyManager();
|
|
await km2.initFromPassphrase('test-pass', new Uint8Array(32));
|
|
const passKeys = await km2.getKeys();
|
|
const signer3 = await createPasskeySignerFromKeys(passKeys);
|
|
assert(signer3 === null, 'Returns null when no EOA keys');
|
|
km2.clear();
|
|
|
|
// Test 5: Custom network
|
|
console.log('\n[5] Custom network');
|
|
const signer4 = await createPasskeySigner({
|
|
prfOutput,
|
|
network: 'eip155:8453', // Base mainnet
|
|
});
|
|
assert(signer4.eoaAddress === expectedEOA.address, 'Same EOA regardless of network');
|
|
signer4.cleanup();
|
|
|
|
// Cleanup
|
|
km.clear();
|
|
|
|
console.log(`\n=== Results: ${passed} passed, ${failed} failed ===`);
|
|
process.exit(failed > 0 ? 1 : 0);
|
|
}
|
|
|
|
main().catch(err => {
|
|
console.error('Fatal:', err);
|
|
process.exit(1);
|
|
});
|