-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Next
Steps
#2
base: development
Are you sure you want to change the base?
Next
Steps
#2
Conversation
Unused dependencies (31)
Unused devDependencies (5)
Unresolved imports (1)
|
@0x4007 This is where I'm at with things over the last couple days. First comment covers things I just forgot to tag While I've been using TailwindCSS inline off the cuff, I know it doesn't make for very maintainable code. Once the logic is firmer and a real vision for the UI exists that will be the first thought when refactoring the demo UI. |
Its really cool to see that I can log in with iCloud keychain. I think this is ideal, and I can access the same account from all my devices. I couldn't understand how to actually use the wallet at all though. Any way I can see the wallet address? I don't understand when or how the faucet operations work, but would be interesting to see on chain. |
This makes us heavily reliant on OAuth as right now everything is bound to a user through auth attached to a session but the pros outweigh the cons. I'm going to remove credential entropy usage and find some elsewhere that way the EOA/Safe is attached to the account which is accessed with passkeys.
It's mostly a logic empty UI right now. I expect to have it all ready over the weekend and will have improved
Right now it's manual via the UI and only a few wei is being sent, I need more gas and to top it up. The faucet accepts an address param and funds the address. I have no checks or guards on it right now but basically we'd create the EOA store it in the database and either fund it immediately or do it pre-permit.
https://amoy.polygonscan.com/address/0xcdd8145c082fb1c08874eda94f671cf6725553eb |
Found my address! Cool to see |
I've got server side transactions like transfers and minting test tokens but was having issues with sending |
In the past I've used not the latest version of ethers because of ChatGPT code generation not knowing the latest. I think its a valid strategy to do if its easier/faster to ship. |
Perhaps instead of using faucet as a worker at This way the flow for an end user would be:
In the next iteration (if we decide to implement safe gasless transactions) we could simply remove faucet plugin from the organization config and let |
@Keyrxng There is a new issue for a crypto faucet plugin at ubiquity-os/plugins-wishlist#35. Regarding this PR we should:
Correct? |
Correct mate yeah! I had placed this on hold sort of while I (we) focused on pushing V2 urgent or high priority issues but yeah So a user would register at this UI, we'd create their wallet etc and then the faucet plugin funds their account on issue.closed so long as they haven't been subsidized before. The faucet can be streamlined so much as a plugin and would be better not being based off of our faucet imo, i.e no need for oz defender etc anymore. |
You mean that since we have access to a partner's private key we can simply fund accounts from that address? It makes sense to keep a separate address for the faucet in order not to mix funds between rewards and faucet payouts. |
Requires #1
NextJS
integratedWebAuthn
flow (leveraging@simplewebauthn
)Signer
never exposed to the clientMy design skills leave you wanting but the UI isn't the main focus here early on. I was just beefing it up to make the demo look a bit more presentable.
My intention is to implement permits generated for the new EOA to claim with the faucet funds which will round off V1 if the stopping point is implementing 3rd party AA solutions like
Safe
.Still working towards the goal of no OAuth for the claim portal, just passkey, but I haven't put any work into the portal besides having it render.
Once I have the full logic down E2E I'll focus on refining logic, finding bugs and improving security.
Still a WIP but it should be E2E testable for anyone via the deployment url. It works both locally and remotely for me so I expect no real issues.
There's a CSS callback issue happening that seems to resolve by clicking the UI
When in
/account
theaccount management
tabs may take a little bit to load and may require a manual refresh but once rendered it doesn't happen again even after refreshThe
faucet
worker seems to hit CPU limits after each successful request and then becomes inactive for some period of time afterwards. The worker I have deployed is a refactored memory optimized version of the currentdevelopment
branch which improved things slightly but I'm not sure how improve this further (advice I've taken is from stackEx etc)Testable here: Removed because my OAuth is now pointing to localhost
Screen.Recording.2024-07-11.001733.mp4