Skip to content

Commit 63a7fe2

Browse files
committed
fix: merge naga main in
1 parent 1329391 commit 63a7fe2

File tree

16 files changed

+38
-38
lines changed

16 files changed

+38
-38
lines changed

docs/sdk/auth/pkp-custom-auth/pkp-custom-auth.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,13 @@ description: "Implement custom PKP authentication methods with Lit Actions"
1515

1616
Custom Authentication allows <b>dApp owners</b> to provide PKPs (Programmable Key Pairs) to their users without requiring them to understand blockchain technology or manage private keys. Instead of forcing users to learn new authentication methods, you can leverage your existing authentication systems (OAuth, APIs, databases) while providing them with powerful web3 capabilities.
1717

18-
This demonstrates the complete <b>dApp-centric custom authentication</b> flow from both perspectives: the <b>Site Owner</b> who sets up the system and the User who interacts with it.
18+
This demonstrates the complete <b>dApp-centric custom authentication</b> flow from both perspectives: the <b>Site Owner</b> who sets up the system and the <b>User</b> who interacts with it.
1919

2020
# Overview
2121

2222
In this example:
2323

24-
- site owners control the PKP minting process and provide immutable validation logic via IPFS.
24+
- Site owners control the PKP minting process and provide immutable validation logic via IPFS.
2525
- Users get pre-minted PKPs and authenticate through the site owner's validation Lit Action.
2626

2727
# Site Owner Walkthrough

docs/sdk/auth/pkp-native-auth/pkp-discord-auth.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ description: "Discord Authentication uses your Discord account to authenticate v
4949
</Step>
5050

5151
<Step title="Generate Auth Context">
52-
Use your newly minted PKP to create an AuthContext. This method will cache two things:
52+
Use your PKP's public key to create an AuthContext. This method will cache two things:
5353
1. session key pair - a temporary cryptographic key pair generated on the client side that acts as a temporary identity for the client application. It consists of:
5454
- A public key - shared with the Lit nodes
5555
- A secret key (private key) - kept securely on the client
@@ -59,7 +59,7 @@ Use your newly minted PKP to create an AuthContext. This method will cache two t
5959

6060
const authContext = await authManager.createPkpAuthContext({
6161
authData: authData, // <-- Retrieved earlier
62-
pkpPublicKey: pkpInfo.pubkey, // <-- Minted earlier
62+
pkpPublicKey: pkpInfo.pubkey,
6363
authConfig: {
6464
resources: [
6565
["pkp-signing", "*"],

docs/sdk/auth/pkp-native-auth/pkp-eoa-auth.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ description: "Externally Owned Account (EOA) authentication uses your existing E
3838

3939
<Step title="Authenticate with EOA">
4040

41-
Use the WalletClientAuthenticator/ViemAccountAuthenticator to authenticate your connected wallet and generate auth data.
41+
Use the `WalletClientAuthenticator` or `ViemAccountAuthenticator` to authenticate your connected wallet and generate auth data.
4242

4343
<CodeGroup>
4444
```ts wagmi
@@ -97,17 +97,17 @@ You can select an existing PKP associated with your account or mint a new one.
9797
</Step>
9898

9999
<Step title="Generate Auth Context">
100-
Use your newly minted PKP to create an AuthContext. This method will cache two things:
100+
Use your PKP's public key to create an AuthContext. This method will cache two things:
101101
1. session key pair - a temporary cryptographic key pair generated on the client side that acts as a temporary identity for the client application. It consists of:
102102
- A public key - shared with the Lit nodes
103103
- A secret key (private key) - kept securely on the client
104-
2. Delegation AuthSig aka. the inner auth sig - a cryptographic attestation from the Lit Protocol nodes that authorises your session key to act on behalf of your PKP.
104+
2. Delegation AuthSig (aka. the inner auth sig) - a cryptographic attestation from the Lit Protocol nodes that authorises your session key to act on behalf of your PKP.
105105

106106
```ts
107107

108108
const authContext = await authManager.createPkpAuthContext({
109109
authData: authData, // <-- Retrieved earlier
110-
pkpPublicKey: pkpInfo.pubkey, // <-- Minted earlier
110+
pkpPublicKey: pkpInfo.pubkey,
111111
authConfig: {
112112
resources: [
113113
["pkp-signing", "*"],

docs/sdk/auth/pkp-native-auth/pkp-google-auth.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ description: "Google Authentication uses your Google account to authenticate via
4949
</Step>
5050

5151
<Step title="Generate Auth Context">
52-
Use your newly minted PKP to create an AuthContext. This method will cache two things:
52+
Use your PKP's public key to create an AuthContext. This method will cache two things:
5353
1. session key pair - a temporary cryptographic key pair generated on the client side that acts as a temporary identity for the client application. It consists of:
5454
- A public key - shared with the Lit nodes
5555
- A secret key (private key) - kept securely on the client
@@ -59,7 +59,7 @@ Use your newly minted PKP to create an AuthContext. This method will cache two t
5959

6060
const authContext = await authManager.createPkpAuthContext({
6161
authData: authData, // <-- Retrieved earlier
62-
pkpPublicKey: pkpInfo.pubkey, // <-- Minted earlier
62+
pkpPublicKey: pkpInfo.pubkey,
6363
authConfig: {
6464
resources: [
6565
["pkp-signing", "*"],

docs/sdk/auth/pkp-native-auth/pkp-stytch-2fa-totp-auth.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: "Stytch TOTP 2FA Authentication is a secondary authentication metho
66
# Prerequisites
77

88
<Warning>
9-
⚠️ Backend Required: This authentication method requires a backend service
9+
Backend Required: This authentication method requires a backend service
1010
that handles Stytch Email OTP operations. The auth service already has the
1111
implementation in place with the `/stytch/email/send-otp` and
1212
`/stytch/email/verify-otp` endpoints, but they are disabled by default. Simply
@@ -121,7 +121,7 @@ const authData = await StytchWhatsAppOtpAuthenticator.authenticate({
121121

122122
<Step title="Generate Auth Context">
123123

124-
Use your newly minted PKP to create an AuthContext. This method will cache two things:
124+
Use your PKP's public key to create an AuthContext. This method will cache two things:
125125

126126
1. session key pair - a temporary cryptographic key pair generated on the client side that acts as a temporary identity for the client application. It consists of:
127127
- A public key - shared with the Lit nodes
@@ -131,7 +131,7 @@ Use your newly minted PKP to create an AuthContext. This method will cache two t
131131
```ts
132132
const authContext = await authManager.createPkpAuthContext({
133133
authData: authData, // <-- Retrieved earlier
134-
pkpPublicKey: pkpInfo.pubkey, // <-- Minted earlier
134+
pkpPublicKey: pkpInfo.pubkey,
135135
authConfig: {
136136
resources: [
137137
["pkp-signing", "*"],

docs/sdk/auth/pkp-native-auth/pkp-stytch-email-otp-auth.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: "Stytch Email OTP Authentication uses Stytch's Email OTP service to
66
# Prerequisites
77

88
<Warning>
9-
⚠️ Backend Required: This authentication method requires a backend service that handles Stytch Email OTP operations. The auth service already has the implementation in place with the `/stytch/email/send-otp` and `/stytch/email/verify-otp` endpoints, but they are disabled by default. Simply run your auth service at the configured URL to enable Stytch Email OTP functionality.
9+
Backend Required: This authentication method requires a backend service that handles Stytch Email OTP operations. The auth service already has the implementation in place with the `/stytch/email/send-otp` and `/stytch/email/verify-otp` endpoints, but they are disabled by default. Simply run your auth service at the configured URL to enable Stytch Email OTP functionality.
1010
</Warning>
1111

1212
<Note>
@@ -75,7 +75,7 @@ description: "Stytch Email OTP Authentication uses Stytch's Email OTP service to
7575
</Step>
7676

7777
<Step title="Generate Auth Context">
78-
Use your newly minted PKP to create an AuthContext. This method will cache two things:
78+
Use your PKP's public key to create an AuthContext. This method will cache two things:
7979
1. session key pair - a temporary cryptographic key pair generated on the client side that acts as a temporary identity for the client application. It consists of:
8080
- A public key - shared with the Lit nodes
8181
- A secret key (private key) - kept securely on the client
@@ -85,7 +85,7 @@ Use your newly minted PKP to create an AuthContext. This method will cache two t
8585

8686
const authContext = await authManager.createPkpAuthContext({
8787
authData: authData, // <-- Retrieved earlier
88-
pkpPublicKey: pkpInfo.pubkey, // <-- Minted earlier
88+
pkpPublicKey: pkpInfo.pubkey,
8989
authConfig: {
9090
resources: [
9191
["pkp-signing", "*"],

docs/sdk/auth/pkp-native-auth/pkp-stytch-sms-otp-auth.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: "Stytch SMS OTP Authentication uses Stytch's SMS OTP service to aut
66
# Prerequisites
77

88
<Warning>
9-
⚠️ Backend Required: This authentication method requires a backend service
9+
Backend Required: This authentication method requires a backend service
1010
that handles Stytch Email OTP operations. The auth service already has the
1111
implementation in place with the `/stytch/email/send-otp` and
1212
`/stytch/email/verify-otp` endpoints, but they are disabled by default. Simply
@@ -82,7 +82,7 @@ const authData = await StytchSmsOtpAuthenticator.authenticate({
8282

8383
<Step title="Generate Auth Context">
8484

85-
Use your newly minted PKP to create an AuthContext. This method will cache two things:
85+
Use your PKP's public key to create an AuthContext. This method will cache two things:
8686

8787
1. session key pair - a temporary cryptographic key pair generated on the client side that acts as a temporary identity for the client application. It consists of:
8888
- A public key - shared with the Lit nodes
@@ -92,7 +92,7 @@ Use your newly minted PKP to create an AuthContext. This method will cache two t
9292
```ts
9393
const authContext = await authManager.createPkpAuthContext({
9494
authData: authData, // <-- Retrieved earlier
95-
pkpPublicKey: pkpInfo.pubkey, // <-- Minted earlier
95+
pkpPublicKey: pkpInfo.pubkey,
9696
authConfig: {
9797
resources: [
9898
["pkp-signing", "*"],

docs/sdk/auth/pkp-native-auth/pkp-stytch-whatsapp-otp-auth.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: "Enter your phone number to receive a one-time password (OTP) via W
66
# Prerequisites
77

88
<Warning>
9-
⚠️ Backend Required: This authentication method requires a backend service
9+
Backend Required: This authentication method requires a backend service
1010
that handles Stytch Email OTP operations. The auth service already has the
1111
implementation in place with the `/stytch/email/send-otp` and
1212
`/stytch/email/verify-otp` endpoints, but they are disabled by default. Simply
@@ -83,7 +83,7 @@ const authData = await StytchWhatsAppOtpAuthenticator.authenticate({
8383

8484
<Step title="Generate Auth Context">
8585

86-
Use your newly minted PKP to create an AuthContext. This method will cache two things:
86+
Use your PKP's public key to create an AuthContext. This method will cache two things:
8787

8888
1. session key pair - a temporary cryptographic key pair generated on the client side that acts as a temporary identity for the client application. It consists of:
8989
- A public key - shared with the Lit nodes
@@ -93,7 +93,7 @@ Use your newly minted PKP to create an AuthContext. This method will cache two t
9393
```ts
9494
const authContext = await authManager.createPkpAuthContext({
9595
authData: authData, // <-- Retrieved earlier
96-
pkpPublicKey: pkpInfo.pubkey, // <-- Minted earlier
96+
pkpPublicKey: pkpInfo.pubkey,
9797
authConfig: {
9898
resources: [
9999
["pkp-signing", "*"],

docs/sdk/auth/pkp-native-auth/pkp-webauthn-auth.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ description: "WebAuthn Authentication uses your device's secure hardware (such a
5757
</Step>
5858

5959
<Step title="Generate Auth Context">
60-
Use your newly minted PKP to create an AuthContext. This method will cache two things:
60+
Use your PKP's public key to create an AuthContext. This method will cache two things:
6161
1. session key pair - a temporary cryptographic key pair generated on the client side that acts as a temporary identity for the client application. It consists of:
6262
- A public key - shared with the Lit nodes
6363
- A secret key (private key) - kept securely on the client
@@ -67,7 +67,7 @@ Use your newly minted PKP to create an AuthContext. This method will cache two t
6767

6868
const authContext = await authManager.createPkpAuthContext({
6969
authData: authData, // <-- Retrieved earlier
70-
pkpPublicKey: pkpInfo.pubkey, // <-- Minted earlier
70+
pkpPublicKey: pkpInfo.pubkey,
7171
authConfig: {
7272
resources: [
7373
["pkp-signing", "*"],

package.json

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@
55
"scripts": {
66
"sync:contracts": "nx run contracts:sync",
77
"sync:docs-changelog": "node tools/sync-docs-changelog.js",
8+
"sync:check": "sh -c 'if [ -n \"$PKG\" ]; then pnpm syncpack list-mismatches --types prod,dev,peer --filter \"$PKG\"; else pnpm syncpack list-mismatches --types prod,dev,peer; fi'",
9+
"sync:fix": "sh -c 'if [ -n \"$PKG\" ]; then pnpm syncpack fix-mismatches --types prod,dev,peer --filter \"$PKG\"; else pnpm syncpack fix-mismatches --types prod,dev,peer; fi'",
810
"reset": "rimraf dist pnpm-lock.yaml node_modules tmp yarn-error.log yarn.lock package-lock.json learn-debug.log .nx lit-auth-storage pkp-tokens lit-auth-local ./e2e/dist ./e2e/node_modules",
911
"build": "nx run-many --parallel=false --target=build --all --exclude=wrapped-keys,wrapped-keys-lit-actions",
1012
"gen:local-network-context": "dotenvx run --env-file=.env -- node --conditions=import --import tsx packages/networks/src/networks/vNaga/shared/scripts/generate-abi-signatures.ts",
@@ -16,13 +18,11 @@
1618
"test:custom": "npx jest --clearCache --config ./jest.e2e.config.ts && LOG_LEVEL=${LOG_LEVEL:-silent} dotenvx run --env-file=.env -- jest --runInBand --detectOpenHandles --forceExit --config ./jest.e2e.config.ts --testTimeout=50000000",
1719
"test:e2e:ci": "npx jest --clearCache --config ./jest.e2e.config.ts && LOG_LEVEL=${LOG_LEVEL:-silent} npx jest --runInBand --detectOpenHandles --forceExit --config ./jest.e2e.config.ts --testTimeout=50000000 --runTestsByPath",
1820
"test:health": "LOG_LEVEL=${LOG_LEVEL:-silent} dotenvx run --env-file=.env -- tsx packages/e2e/src/health/index.ts",
19-
"ci:health": "LOG_LEVEL=${LOG_LEVEL:-silent} tsx packages/e2e/src/health/index.ts",
20-
"sync:check": "sh -c 'if [ -n \"$PKG\" ]; then pnpm syncpack list-mismatches --types prod,dev,peer --filter \"$PKG\"; else pnpm syncpack list-mismatches --types prod,dev,peer; fi'",
21-
"sync:fix": "sh -c 'if [ -n \"$PKG\" ]; then pnpm syncpack fix-mismatches --types prod,dev,peer --filter \"$PKG\"; else pnpm syncpack fix-mismatches --types prod,dev,peer; fi'"
21+
"ci:health": "LOG_LEVEL=${LOG_LEVEL:-silent} tsx packages/e2e/src/health/index.ts"
2222
},
2323
"private": true,
2424
"dependencies": {
25-
"@babel/core": "7.28.4",
25+
"@babel/core": "7.28.5",
2626
"@babel/preset-env": "7.28.3",
2727
"@babel/preset-typescript": "7.27.1",
2828
"@dotenvx/dotenvx": "1.6.4",
@@ -37,7 +37,7 @@
3737
"@simplewebauthn/typescript-types": "7.0.0",
3838
"@wagmi/core": "2.22.1",
3939
"ajv": "8.12.0",
40-
"babel-jest": "29",
40+
"babel-jest": "30.2.0",
4141
"base64url": "3.0.1",
4242
"bs58": "6.0.0",
4343
"cbor-web": "9.0.2",
@@ -72,7 +72,7 @@
7272
"@types/depd": "1.1.36",
7373
"@types/events": "3.0.3",
7474
"@types/inquirer": "9.0.8",
75-
"@types/jest": "27.4.1",
75+
"@types/jest": "30.0.0",
7676
"@types/node": "20.0.0",
7777
"@types/node-localstorage": "1.3.3",
7878
"@types/secp256k1": "4.0.6",
@@ -90,7 +90,7 @@
9090
"eslint-plugin-import": "2.29.1",
9191
"eslint-plugin-jsx-a11y": "6.9.0",
9292
"ipfs-unixfs-importer": "12.0.1",
93-
"jest": "29.2.2",
93+
"jest": "30.2.0",
9494
"jest-environment-jsdom": "29.7.0",
9595
"node-fetch": "2.6.1",
9696
"node-localstorage": "3.0.5",

0 commit comments

Comments
 (0)