rspace-online/scripts/test-passkey-signer.ts

94 lines
3.1 KiB
TypeScript

/**
* test-passkey-signer.ts — Test the passkey x402 signer module.
*
* Verifies that createPasskeySigner() and createPasskeySignerFromKeys()
* work correctly with simulated PRF output. Does NOT make actual payments
* (that requires a funded wallet + live facilitator).
*
* Usage:
* bun run scripts/test-passkey-signer.ts
*/
import { createPasskeySigner, createPasskeySignerFromKeys } from '../shared/x402/passkey-signer';
import { deriveEOAFromPRF } from '../src/encryptid/eoa-derivation';
import { EncryptIDKeyManager, type DerivedKeys } from '../src/encryptid/key-derivation';
let passed = 0;
let failed = 0;
function assert(condition: boolean, msg: string) {
if (condition) {
console.log(`${msg}`);
passed++;
} else {
console.error(`${msg}`);
failed++;
}
}
async function main() {
console.log('=== Passkey Signer Tests ===\n');
// Fixed PRF output
const prfOutput = new Uint8Array(32);
for (let i = 0; i < 32; i++) prfOutput[i] = i + 1;
// Expected EOA from this PRF
const expectedEOA = deriveEOAFromPRF(prfOutput);
// Test 1: createPasskeySigner from raw PRF
console.log('[1] createPasskeySigner (from raw PRF)');
const signer = await createPasskeySigner({ prfOutput });
assert(signer.eoaAddress === expectedEOA.address, 'EOA address matches derivation');
assert(typeof signer.paidFetch === 'function', 'paidFetch is a function');
assert(typeof signer.cleanup === 'function', 'cleanup is a function');
console.log(` EOA: ${signer.eoaAddress}`);
// Test 2: Cleanup zeros the key
console.log('\n[2] Cleanup');
signer.cleanup();
// Can't directly check the internal state, but we verify it doesn't throw
assert(true, 'Cleanup ran without error');
// Test 3: createPasskeySignerFromKeys (from DerivedKeys)
console.log('\n[3] createPasskeySignerFromKeys');
const km = new EncryptIDKeyManager();
await km.initFromPRF(prfOutput.buffer);
const keys = await km.getKeys();
const signer2 = await createPasskeySignerFromKeys(keys);
assert(signer2 !== null, 'Signer created from DerivedKeys');
assert(signer2!.eoaAddress === expectedEOA.address, 'Same EOA address from keys');
assert(typeof signer2!.paidFetch === 'function', 'paidFetch is a function');
signer2!.cleanup();
// Test 4: createPasskeySignerFromKeys returns null for passphrase keys
console.log('\n[4] Returns null for passphrase-derived keys (no EOA)');
const km2 = new EncryptIDKeyManager();
await km2.initFromPassphrase('test-pass', new Uint8Array(32));
const passKeys = await km2.getKeys();
const signer3 = await createPasskeySignerFromKeys(passKeys);
assert(signer3 === null, 'Returns null when no EOA keys');
km2.clear();
// Test 5: Custom network
console.log('\n[5] Custom network');
const signer4 = await createPasskeySigner({
prfOutput,
network: 'eip155:8453', // Base mainnet
});
assert(signer4.eoaAddress === expectedEOA.address, 'Same EOA regardless of network');
signer4.cleanup();
// Cleanup
km.clear();
console.log(`\n=== Results: ${passed} passed, ${failed} failed ===`);
process.exit(failed > 0 ? 1 : 0);
}
main().catch(err => {
console.error('Fatal:', err);
process.exit(1);
});