Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CAIP-275: remove extra request and expand on chain property usage #292

Merged

Conversation

FedericoAmura
Copy link
Contributor

Following comments on #290 (and this comment) we expand some more on how to treat the chain property in authentication config. Also we remove the need for an extra request that can cause issues or degrade UX when using different wallets for authentication and other things

remove address resolution request and only use address in authentication flows configuration to improve UX with smart accounts

#### Wallet connect to any wallet
However, this configuration is not recommended as having multiple wallets in the browser generates a race condition, and can result in false positives where there is a wallet extension, but it does not have the account linked to the domain.
We recommend using [EIP-6963][] by specifying a wallet rnds in the URI field if possible, to avoid this issue.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe it would be smoother to write this section as a

SHOULD check rdns against 6963 signaling channel first to avoid false-positives or wallet impersonation via protocol pollution

followed by

MUST check window.ethereum if 6963 signal not detected.

This way your own SDK could do it right with 1193 as fallback and lazy implementations or implementations biased towards certain wallets/formfactors would have the option to skimp, but a stronger warning not to?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm adding an EIP-6963 example before this one and those notes

The configurations for 6963 and injected are explicitly different. Using the injected wallet should not be the default case when trying to use 6963 without success as there is a clear intent to use a specific one

CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved

## Self hosting authentication flows
## Self-hosting authentication flows

In case the user does not trust any authentication flow provider to store their info, they can easily host it themselves using a public serverless function and saving its URL in the ENS `authenticator` record.

## Direct authentication flows resolution
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm a little confused on the organization here-- maybe we could move usecases to one ##-level section and map each ###-level usecase inside of it explicitly to a ###-level flow specification inside of a ##-level Flows section? Not urgent but as this doc gets longer making it more readable/skimmable will help

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure I get your exact point here

Copy link
Collaborator

@bumblefudge bumblefudge Aug 7, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

5 weeks passed and now I don't get (i.e. remember) my point either

- The user wants a truly decentralized solution and does not care about the gas cost of storing lots of data in blockchain; then they can write a stringified version of their authentication flows definition in the `authenticator` text record
- Application will resolve only its issued names, therefore the authentication flows or their location are likely already known. In such cases the application will likely use its own backend to resolve `authenticator` instead of ENS or another Crypto Domain system NFT system. Responding with the stringified version of the saves the user of the extra request as it does not provide any useful information.
- The user wants a truly decentralized solution and does not care about the gas cost of storing lots of data in blockchain; then they can write a stringified version of their authentication flows definition in the `authenticator` text record.
- Application will resolve only its issued names, therefore the authentication flows or their location are likely already known. In such cases the application can use its own backend to resolve `authenticator` instead of ENS or another Crypto Domain system NFT system. Responding with the stringified version of the saves the user of the extra request as it does not provide any useful information.

# Login With Name Flow
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

similarly, i think it might be clearer to lead with the macro-level flow first and then detail individual flows second and use-cases third?

CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved
@@ -350,9 +337,9 @@ export class ENS implements NameResolver {

# Rationale
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it might be good to add a kind of high-level rationale, like "this doesn't compete with other authentication method, it is just an opt-in discovery system that name-controllers can use and that applications can trust to automate one friction point."
it might also be the right section to explain how future authentication methods (#teamWearables) get added to the mix-- followup CAIPs? are you providing a template for those? 😄

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added. I imagine the followups should come in the new proposals themselves.
Or in another CAIP that updates this one with the platforms and connections that start getting popular and used in web3

@@ -361,8 +348,8 @@ Existing NFTs and applications will continue to function normally.

## Reference Implementation
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not to be a stickler, but the two main differences between a sample implementation and a reference implementation is that
1.) ongoing maintenance - it has to still work for a long time, and you have to remove or rename this section if you stop maintaining it later
2.) all optional extensions supported -- i.e., you have to update (or at least accept PRs) if #teamWearables writes a CAIP a year from now adding logic for a wearables flow.

one dodge if you don't want to commit to that before going final with this CAIP is calling it a "sample implementation" 😅

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is, in fact, a great point. And anyway I can definitely see big players providing their own infra or versions of the implementation to suit their needs

BTW, sample implementation is open to contributions 🙂

Added eip-6963 example
Revised references
Updated semantics and organization
@FedericoAmura
Copy link
Contributor Author

Hi @bumblefudge !
Were you able to review the updated version? Do you have any more feedback?

@bumblefudge
Copy link
Collaborator

Sorry, I missed that last commit somehow. Reviewing now

Copy link
Collaborator

@bumblefudge bumblefudge left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, 2nd reviewer and we're good. @obstropolos ? @glitch003, @davidlsneider, @GregTheGreek ?

Copy link
Contributor

@obstropolos obstropolos left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Might be some additional notes here but for now just some slight errata

CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved
CAIPs/caip-275.md Outdated Show resolved Hide resolved
@FedericoAmura
Copy link
Contributor Author

Might be some additional notes here but for now just some slight errata

Applied suggested changes. Thanks!!!

@bumblefudge bumblefudge merged commit c88ef39 into ChainAgnostic:main Aug 15, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants