Skip to content

Commit 3b3fcea

Browse files
committed
feat: allow inline public keys in messages
1 parent 65fe4a5 commit 3b3fcea

File tree

3 files changed

+44
-3
lines changed

3 files changed

+44
-3
lines changed

package.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@
5858
"libp2p-websocket-star-rendezvous": "~0.3.0",
5959
"lodash": "^4.17.11",
6060
"multiaddr": "^6.0.6",
61-
"peer-id": "~0.12.2",
61+
"peer-id": "~0.12.5",
6262
"peer-info": "~0.15.1"
6363
},
6464
"dependencies": {

src/message/sign.js

+7-2
Original file line numberDiff line numberDiff line change
@@ -72,9 +72,14 @@ function messagePublicKey (message, callback) {
7272
callback(new Error('Public Key does not match the originator'))
7373
})
7474
return
75+
} else {
76+
// should be available in the from property of the message (peer id)
77+
const from = PeerId.createFromBytes(message.from)
78+
if (from.pubKey) {
79+
return callback(null, from.pubKey)
80+
}
7581
}
76-
// TODO: Once js libp2p supports inlining public keys with the peer id
77-
// attempt to unmarshal the public key here.
82+
7883
callback(new Error('Could not get the public key from the originator id'))
7984
}
8085

test/sign.spec.js

+36
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,42 @@ describe('message signing', () => {
5656
})
5757
})
5858

59+
it('should be able to extract the public key from an inlined key', (done) => {
60+
const testSecp256k1 = (peerId) => {
61+
const message = {
62+
from: peerId.id,
63+
data: 'hello',
64+
seqno: randomSeqno(),
65+
topicIDs: ['test-topic']
66+
}
67+
68+
const bytesToSign = Buffer.concat([SignPrefix, Message.encode(message)])
69+
peerId.privKey.sign(bytesToSign, (err, expectedSignature) => {
70+
if (err) return done(err)
71+
72+
signMessage(peerId, message, (err, signedMessage) => {
73+
if (err) return done(err)
74+
75+
// Check the signature and public key
76+
expect(signedMessage.signature).to.eql(expectedSignature)
77+
signedMessage.key = undefined
78+
79+
// Verify the signature
80+
verifySignature(signedMessage, (err, verified) => {
81+
expect(err).to.not.exist()
82+
expect(verified).to.eql(true)
83+
done(err)
84+
})
85+
})
86+
})
87+
}
88+
89+
PeerId.create({ keyType: 'secp256k1', bits: 256 }, (err, peerId) => {
90+
expect(err).to.not.exist()
91+
testSecp256k1(peerId)
92+
})
93+
})
94+
5995
it('should be able to extract the public key from the message', (done) => {
6096
const message = {
6197
from: peerId.id,

0 commit comments

Comments
 (0)