Commit Graph

3404 Commits

Author SHA1 Message Date
Justin Hernandez
fdbe00aef1 Merge pull request #1954 from selfxyz/release/staging-2026-04-10
Release to Staging v2.9.17 - 2026-04-10
2026-04-09 18:04:21 -07:00
Justin Hernandez
b9c5b4a266 fix google play (#1953) 2026-04-09 17:46:55 -07:00
Justin Hernandez
81bd30e919 clean up resolutions warnings (#1949) 2026-04-09 17:18:11 -07:00
Justin Hernandez
35fa541dcc Merge pull request #1952 from selfxyz/release/staging-2026-04-09
Release to Staging v2.9.17 - 2026-04-09
2026-04-09 15:19:57 -07:00
Justin Hernandez
fb9da6e66b chore: bump mobile app version to 2.9.17 (#1951)
* save skill

* bump version
2026-04-09 15:18:24 -07:00
Justin Hernandez
385d020f23 Merge pull request #1950 from selfxyz/release/staging-2026-04-09
Release: staging v2.9.16 — recovery, navigation, security, cleanup
2026-04-09 15:11:49 -07:00
Justin Hernandez
4bae15d164 SELF-2540: Fix account recovery flow after phone restore (#1942)
* bug fix

* fix pipelines

* fix race condition

* fixes

* try again

* fix maestro

* update copy and abstract

* fixes...i hope

* fix ios pipeline?

* pipeline fix

* fix pipeline

* fix e2e test

* fix pipelines?

* formatting
2026-04-09 12:32:03 -07:00
Justin Hernandez
c3a805c6c8 Rename KYC_TEE_URL and fix nav header regressions (#1948)
* rename kyc tee env var

* fix header text and close button

* format
2026-04-09 04:01:40 -07:00
Justin Hernandez
b13ec9a052 Remove Points and Self Apps screens, update navigation and copy (#1945)
* commit

* remove stale

* create hook to open support form in webview; pr feedback

* tests

* ignore mcp

* test

* fix pipelines
2026-04-09 02:48:32 -07:00
Justin Hernandez
3e714facf5 Rename KYC references to be platform agnostic (#1947)
* first pass

* clean up

* format

* pr feedback and format
2026-04-08 16:56:32 -07:00
Justin Hernandez
77df53b990 Add Firebase Analytics and upgrade app dependencies (#1944)
* updates

* upgrade packages

* fixes
2026-04-08 10:43:50 -07:00
Justin Hernandez
690d576d54 Upgrade Wave 2 mobile app dependencies (React Navigation, Tamagui, WalletConnect, Lottie, XState) (#1941)
* Upgrade wave 2 mobile app dependencies

* fix pipelines
2026-04-08 09:42:12 -07:00
Justin Hernandez
97e3e37287 Merge pull request #1943 from selfxyz/release/staging-2026-04-08
Release to Staging v2.9.16 - 2026-04-08
2026-04-08 08:55:18 -07:00
Justin Hernandez
9887286476 Bump dependencies across app and root workspaces (#1939)
* Upgrade wave 1 mobile app dependencies

* Pin react-native-webview to 13.16.0 (#1940)

* revert svg upgrade
2026-04-08 08:04:28 -07:00
Seshanth.S
0f3cef7f56 Update SDK distribution spec to add kmp publishing plan (#1929)
* Update SDK distribution specifications and add remote publishing plan

* fix(spec): align SD-06 plan with SD-04 conventions

- Rename gpr.key to gpr.token for consistency with SD-04
- Move publish workflow from out-of-scope into scope
- Add workflow section (Section 4) matching publish-android-sdk.yml pattern
- Fix access model description (public repo, auth still required)
- Add workflow to files-to-modify and definition-of-done

---------

Co-authored-by: Javier Cortejoso <javier.cortejoso@gmail.com>
2026-04-08 12:01:17 +05:30
Justin Hernandez
06a513918f Fix reproducible Ruby gem installs and upgrade dependencies (#1937)
* fixes?

* fix order

* fix nokogiri build error

* upgrade pkgs and lock

* update podfile lock

* fix resolutions

* speed up installs

* increase install speed

* pr feedback

* fix

* only build for relevant webview paths

* attempt to fix oom issue

* actually fix

* pr feedback

* updaet package
2026-04-07 23:27:51 -07:00
Seshanth.S
5ead228589 Fix WebView layout, Android insets, and iOS dev server support (#1935)
* fix version

* Fix: webview displays over camera and statusbar

* Fix: Update ProviderLaunchScreen layout

* fixes

* more fixes

* add ios webview dev url capabilities

* fix ios building

* pr feedback

---------

Co-authored-by: Justin Hernandez <justin.hernandez@self.xyz>
2026-04-07 23:26:05 -07:00
Seshanth.S
147b593e7f Fix: Navigating to account recovery (#1934)
* Fix: remove manual dsc to register chaining

* Add delay before navigating to disclose
2026-04-07 22:40:03 +05:30
Justin Hernandez
f29130587b Harden WebView bridge and asset serving across native shells (#1924)
* security fix

* more security fixes

* fixes

* pr feedback

* Restore remote URL loading in native-shell-ios and native-shell-android

Remove bundled-asset-only loading and SHA-256 integrity checks from both
native shell packages. WebViews now load directly from the remote URL
(default: https://self-app-alpha.vercel.app) over HTTPS, matching the
pattern already implemented in kmp-sdk and self-sdk-swift.

Also fixes ObjC selector mismatch in self-sdk-swift WebViewProviderImpl
for configureRemoteLoading.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>

* Restore remote URL loading in kmp-sdk and self-sdk-swift

Remove bundled-asset-only loading from kmp-sdk AndroidWebViewHost and
self-sdk-swift WebViewProviderImpl. Both now load directly from the
remote URL (default: https://self-app-alpha.vercel.app) over HTTPS.

Adds remoteWebAppBaseUrl to SelfSdkConfig and pipes it through
IosWebViewHost via the new configureRemoteLoading protocol method.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>

* coderabbit comments

* lint

* coderabbit comments

---------

Co-authored-by: seshanthS <seshanth@protonmail.com>
Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
2026-04-07 22:39:27 +05:30
Justin Hernandez
40f283b2db feat(webview): add recovery phrase screen to post-registration onboarding (#1917)
* add mnemonic screen

* add run ios command

* update recovery link, hide social, fix showing words

* bump packae

* pr feedback

* feedback
2026-04-07 00:21:00 -07:00
Justin Hernandez
8cb8913e09 Fix tunnel flow back-navigation leaking out of flow (#1916)
* add new screens

* fixes

* cover additional gap

* add webview dev url env var

* better menu

* updates
2026-04-06 23:21:44 -07:00
Nesopie
822e1eea4d Feat/OFAC auto updater upgrades (#1855)
* test: ofac updating tests

* feat: add registry deployment info

* chore: add gitignore for generated files

* feat: add kyc documents to upgrade scripts

* docs: update upgrade script readme for kyc

* feat: IdentityRegistryKyc v1.1.0 deployed on Celo-sepolia

Add TEE-attested OFAC root updates via updateOfacRootsWithProof

  - Implementation: 0x530eEA7E5b286108926B05510491560c4bAE018e
  - Adds updateOfacRootsWithProof() for ZK-verified OFAC root updates
  - New errors: InvalidRootsHash, InvalidRootsCount
  - New event: OfacRootsUpdatedWithProof

* feat: add OFAC rolling root window to all 4 registries

Add previousRoot storage variables to all identity registries so that
  checkOfacRoots accepts both the current and previous root for each OFAC tree. This prevents verification failures for users mid-proof when roots are updated on-chain between proof generation and on-chain verification.

  - Passport: 3 prev roots (passportNo, nameAndDob, nameAndYob)
  - KYC, ID Card, Aadhaar: 2 prev roots each (nameAndDob, nameAndYob)
  - KYC updateOfacRootsWithProof also rotates previous roots
  - Added getPrev* getter functions on all registries
  - Storage appended at end of each storage contract (UUPS-safe)
  - 17 new tests covering all registries (window=1 acceptance/rejection)

* feat: deploy IdentityRegistryKyc v1.2.0 to Celo Sepolia

Add rolling OFAC root window: store previous roots alongside current, accept either in checkOfacRoots for graceful mid-verification transitions.

  New impl: 0x6E2889Bc9baa6F53bDdf4843675155811F0AAAEd
  Proxy: 0x90e907E4AaB6e9bcFB94997Af4A097e8CAadBdf3
  Pending Safe multisig execution for proxy upgrade.

* feat: add TEE-attested OFAC root updates to Aadhaar, IdCard, and Passport registries

Extend updateOfacRootsWithProof() to the remaining 3 identity registries, matching the pattern already deployed on the KYC registry (v1.1.0).

- Add GCP JWT verifier, PCR0Manager, TEE address, and root CA pubkey hash storage to each registry
- Add initializeOfacProof() reinitializer for upgrade path
- Add onlyTEE modifier and updateOfacRootsWithProof() with Groth16 proof verification, TEE attestation validation, timestamp checks, and global roots hash commitment verification
- Rolling window behavior preserved: previous roots saved before overwrite
- Admin functions for updating TEE infrastructure (SECURITY_ROLE gated)
- Bumps all 3 registries to v1.3.0

* refactor: simplify updateOfacRootsWithProof to use per-registry roots hash as nonce

* fix: address CodeRabbit review comments on OFAC proof upgrade

- Add onlyProxy + onlyRole(DEFAULT_ADMIN_ROLE) guard to initializeOfacProof()
  on Passport, Aadhaar, and IdCard registries to prevent front-running during
  the window between upgradeToAndCall and the separate initializer call
- Fix checkOfacRoots() across all 4 registries to use atomic snapshot comparison
  instead of per-root matching — prevents accepting Frankenstein pairs like
  (new DOB root, old YOB root) that were never attested together
- Add IdentityRegistryKycImplV1 to PoseidonT3 linking branch in prepare.ts so
  upgrade:prepare works correctly for KYC
- Add prev* slot assertions and mixed-pair rejection test to ofacUpgradePath.test.ts

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>

* feat: add view getters, fix initializeOfacProof guard, add upgrade scripts

- Add getGcpJwtVerifier() and getPcr0Manager() getters to KYC and Aadhaar
- Fix initializeOfacProof guard: SECURITY_ROLE instead of DEFAULT_ADMIN_ROLE
  (DEFAULT_ADMIN_ROLE is never granted in governance setup)
- Add Ignition upgrade scripts for KYC and Aadhaar registries
- Comment out registry deploy in deployKycRegistry (verifier-only redeploy)
- Update deployed_addresses.json with sepolia upgrade artifacts
- Bump KYC to v1.2.1, Aadhaar to v1.3.1

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

* fix: addresses and error selectors

* style: format registry contracts and upgrade scripts

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

* fix: formatting

* fix: error selectors

* fix: error selectors

* fix: error selectors

---------

Co-authored-by: Evi Nova <tranquil_flow@protonmail.com>
Co-authored-by: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-04-06 16:50:03 +05:30
Justin Hernandez
e9ce8f0643 Merge pull request #1919 from selfxyz/release/staging-2026-04-03
Release to Staging v2.9.16 - 2026-04-03
2026-04-05 21:24:04 -07:00
Justin Hernandez
b7ff7c4c8e Fix gitleaks config and refactor npm-publish version checks (#1926)
* fix pipelines

* fixes

* fixes

* pr feedback
2026-04-05 20:37:28 -07:00
Justin Hernandez
f490533cb5 Fix gesture handler patch for v2.22.1 and add patches to e2e trigger (#1921)
* test patch

* test install failure

* test

* smarter fix

* pr feedback; yarn format fixes

* fix gaps

* fix
2026-04-05 11:10:34 -07:00
Evi Nova
641dfe52b1 fix: remove contractErrors files accidentally merged into dev (#1923)
These files were part of PR #1911 (custom Solidity error decoding) which
is not yet merged. They were accidentally included in the #1905 squash
merge. The missing error-selector-map.json dependency breaks workspace
CI (build, lint, type-check) across all branches.
2026-04-04 14:06:17 +10:00
Justin Hernandez
9b8e081435 Add remote webview integrity checks (#1907)
* Add remote webview integrity checks

* fixes

* feedback

* update tests; fix pipelines

* fix ci

* feat(webview): add subresource integrity (SRI) to build output

The SHA-256 remote integrity check only covers the entry HTML document.
Sub-resources (JS, CSS) loaded by that HTML were fetched without
integrity verification, allowing a compromised CDN to swap bundles.

Add a custom Vite plugin that injects SRI sha384 hashes into all
script and link tags in the built index.html. The browser natively
enforces these hashes, blocking any tampered sub-resources.

Includes tests verifying integrity attributes are present and that
hashes match the actual file contents on disk.

---------

Co-authored-by: Tranquil-Flow <tranquil_flow@protonmail.com>
2026-04-04 13:55:31 +10:00
Justin Hernandez
5268ccb767 Fix recovery rollback handling (#1905)
* Fix recovery rollback handling

* Restore registration state on rollback

* Restore selected document on rollback

* fix(webview): clear both keys on partial rollback to prevent mnemonic/secret mismatch

When restoreSnapshotBestEffort partially fails (e.g. mnemonic rollback fails but secret rollback succeeds), the stored mnemonic and private key can end up mismatched — deriving from the stored mnemonic produces a different key than what's stored. This is silent data corruption that could lock users out of recovery.

Fix: when any rollback write fails, clear both keys so ensureSecret can regenerate a consistent pair from scratch. A missing pair is recoverable; a mismatched pair is not.

Adds a test in restoreSecretFromMnemonic that proves the mismatch scenario and verifies both keys are cleared.

* feat(new-common): add humanizeContractError utility with tests

* fix: prettier formatting in secretManager test

---------

Co-authored-by: Tranquil-Flow <tranquil_flow@protonmail.com>
2026-04-04 10:27:21 +10:00
Justin Hernandez
e7a607caef Harden native lifecycle result handling (#1906)
* Harden native lifecycle result handling

* Harden native shell lifecycle handling

* fixes
2026-04-04 10:27:14 +10:00
Seshanth.S
37b8f0ca71 Scope KMP SDK to 3-domain parity (KR-01, KR-02, KR-03) (#1915)
* KR-01: Scope KMP Android to 3-domain parity with provider delegation

Move SecureStorageProvider, CryptoProvider, and CryptoBridgeHandler to
commonMain so both platforms share the same contract. Add default Android
providers (EncryptedSharedPreferencesProvider, AndroidKeystoreCryptoProvider)
that consumers can replace via SdkProviderRegistry.

- Rewrite Android SecureStorageBridgeHandler to delegate to provider and
  fix get() response shape to return { value: string | null }
- Register only 3 handlers (secureStorage, crypto, lifecycle) in Activity
- Add WebChromeClient with permission and file upload handling
- Add query param support to WebView URL loading
- Add bridge protocol version validation to MessageRouter
- Remove NFC/camera/biometric dependencies from build.gradle.kts
- Remove out-of-scope permissions from AndroidManifest.xml
- Create IosProviderRegistry for iOS-specific provider fields

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>

* KR-02: Scope KMP iOS to 3-domain parity with query param support

Move SecureStorageBridgeHandler to commonMain (fixes iOS get() response
shape to return { value: string | null } matching the bridge adapter).
Both Android and iOS now share the same handler via commonMain.

- Register only 3 handlers on iOS (secureStorage, crypto, lifecycle)
- Add queryParams parameter to WebViewProvider interface
- Update IosWebViewHost to forward query params from VerificationRequest
- Update WebViewProviderImpl.swift to append query params to URL
- Relax isConfigured check to only require secureStorage + crypto + webView
- Remove unused handler imports from SelfSdk.ios.kt

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>

* KR-03: Simplify test app to 3-domain smoke harness

Gut the MRZ/NFC-first flow from the test app and replace with a focused
3-domain smoke test screen that validates secureStorage (set/get/remove
round-trip), crypto (generateKey/getPublicKey/sign/deleteKey), and
lifecycle (validated via SDK launch flow).

- Add DomainSmokeScreen with pass/fail output per domain
- Remove MRZ/NFC navigation routes and expect/actual screen declarations
- Remove NFC/CAMERA permissions from Android manifest
- Remove camera dependency from build.gradle.kts
- Scope iOS test app to register only required providers (secureStorage,
  crypto, webView)

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>

* Fix issues - test app

* coderabbit comments

* fix ci

* klint

* coderabbit review comments

* Enhance permission handling in AndroidWebViewHost

* fix registry

---------

Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
Co-authored-by: Justin Hernandez <justin.hernandez@self.xyz>
2026-04-03 11:45:07 -07:00
Justin Hernandez
16ba8f1937 quiet gitleaks (#1920) 2026-04-03 11:20:10 -07:00
Justin Hernandez
d23cc2b47f update (#1918) 2026-04-02 16:26:25 -07:00
Justin Hernandez
70bf6728bc Add native shell CI workflow and unit test suites (#1914)
* format and ci

* fix ref

* fix type

* fix linting

* fix build

* Fix iOS escape test expectations
2026-04-02 09:44:08 -07:00
Justin Hernandez
48e872f44d Add native shell CI workflow and unit test suites (#1913)
* Harden native lifecycle result handling

* Harden native shell lifecycle handling

* fixes

* commit

* fixes

* fix ci and pr feedback
2026-04-02 00:35:08 -07:00
Evi Nova
5124af930b fix(webview): screen dimension fixes, tunnel fail state, cleanup (#1904)
* fix(webview): screen dimension fixes, bump euclid 1.4.0, cleanup

Set WEB_SAFE_AREA top to 0 — native shell handles status bar insets edge-to-edge. Add flex wrappers to ConfirmIdentificationScreen and VerificationResultScreen so StatusState fills viewport. Bump @selfxyz/euclid and euclid-core to 1.4.0 (edge-to-edge backgrounds, responsive animations, centered text, fixed button visibility). Delete orphaned KycMockScreen replaced by TunnelKycWrapper.

* fix(rn-sdk-test-app): gracefully skip pod install when Ruby < 3.2

The postinstall script requires Ruby 3.2+ and bundler 2.6.9 for CocoaPods. On macOS with system Ruby 2.6, this hard-failed yarn install for the entire monorepo. Now checks Ruby version first and skips with a message instead of failing.
2026-04-02 14:28:34 +10:00
Justin Hernandez
737f39d955 udpate specs (#1909) 2026-04-01 17:53:51 -07:00
Seshanth.S
c5e3b03e42 Stitch tunnel flow screens with proving machine and recovery (#1896)
* stitch tunnelflow screens

* save wip formatting

* add failure flow

* stub account recovery

* add tests

* add spec wv-17

* prep for review

* serialize

* fixes

* fix bug

* fix dev building

* fix: close Didit modal on completion, show KycPendingScreen while waiting (#1900)

- Close Didit SDK modal immediately when onComplete fires
- Show Euclid KycPendingScreen with animation while Socket.IO waits for TEE attestation
- Replaces generic spinner for the 'In Review' waiting state

Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

* navigate to disclose step on restore

* skip disclose confirmation screen

* Update Recovery flow

* Navigate to account recovery if TEE rejects it as already registered

* Navigate to disclose directly if the selected document is registered

* SELF-2348: Load webapp from url

* update sdk-test-app

* fix result from sdk

* fixes?

* fix build issue

* fix install pipeline

* carry pr feedback. fix formatting

---------

Co-authored-by: Justin Hernandez <justin.hernandez@self.xyz>
Co-authored-by: Nesopie <87437291+Nesopie@users.noreply.github.com>
Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-01 14:14:52 -07:00
Seshanth.S
1d0c6fe187 add kmp specs (#1902) 2026-04-01 13:44:44 -07:00
Evi Nova
f4000c2532 fix(sdk): store correct metadata for KYC documents in storeDocumentWithDeduplication (#1898)
KYC documents fell through to the Aadhaar qrData branch, storing empty string as metadata.data. This breaks ManageDocumentsScreen which calls deserializeApplicantInfo(metadata.data) to display KYC document names. Now correctly stores serializedApplicantInfo and idType for KYC documents.
2026-04-01 18:33:03 +10:00
Seshanth.S
bf4e5927ee Add provingmachine flow in Tunnel flow (#1890)
* feat: store KYC document in keychain after receiving TEE attestation

Build a KycData document from the attestation (signature, applicantInfo,
pubkey) and persist it via storePassportData → keychain-backed adapter.
This makes the document available for the proving machine.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

* fix: KYC document mock is always false

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

* provingmachine flow with mock passport

* add yarn.lock

* Fix coderabbit comments

* lint

* update coderabbit comments

* coderabbit comments

* Merge branch 'dev' into feat/didit-keychain-storage

* fix: reorder KYC constants declarations and fix formatting

Constants were declared out of order causing "used before declaration"
TS errors. Reordered to match the 295-byte layout sequentially.
Also ran prettier on common package.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

* fix proving phase handling and add delete catalog debug button

- TunnelProvingScreen: use `phase !== 'disclose'` to handle completion
  for both passport (dsc→register→disclose) and kyc/aadhaar (register→disclose)
- KeychainDebugScreen: add Delete Catalog button to clear all documents

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>

* coderabbit comments

---------

Co-authored-by: ayman <aymanshaik1015@gmail.com>
Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-01 00:14:15 +05:30
Seshanth.S
d54fab68e2 update KeychainStorageProvider in sdk-test-app (#1895) 2026-03-31 18:35:04 +05:30
Seshanth.S
02e7608050 SELF-2484: Delegate keychain to consumer (#1894)
* SELF-2484: Delegate keychain to consumer

* lint

* update coderabbit comments
2026-03-31 18:29:33 +05:30
Seshanth.S
868532d12d Add NSL-04: Delegate keychain management to SDK consumers (#1893) 2026-03-31 16:10:54 +05:30
Nesopie
10f18d8d7f Fix/kyc register inputs raw bytes (#1892)
* fix: use raw bytes for KYC register circuit inputs instead of deserialize+reserialize

The deserialize→reserialize path strips the namespace prefix from
id_type, producing different bytes than what the TEE signed. This
causes EdDSA signature verification to fail in the circuit.

Use raw base64-decoded bytes directly, matching the TEE's signed data.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

* fix: use raw bytes for KYC register circuit inputs in common and new-common

The deserialize→reserialize path strips the namespace prefix from
id_type (\x05didit), producing different bytes than what the TEE
signed. This causes EdDSA signature verification to fail in the
register_kyc circuit.

Use raw base64-decoded bytes directly in both common/ and new-common/.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

* fix: use raw bytes for KYC disclose circuit inputs

Same issue as register — .toString('utf-8') corrupts bytes >= 128,
causing Num2Bits assertion failures in vc_and_disclose_kyc circuit.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

* fix: use raw bytes for KYC disclose circuit inputs in new-common

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

* chore: remove dev functions from KYC registry, add upgrade module, clean up debug logs

- Remove devRemoveNullifier and devResetTree (no longer needed)
- Add upgradeKycRegistry ignition module
- Update deployed_addresses.json with new KYC registry proxy
- Remove debug logging from provingMachine

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

---------

Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-31 15:11:40 +05:30
Leszek Stachowski
d60932d031 feat(tunnel-flow): call setResult upon receiving verification result (#1887) 2026-03-31 11:03:20 +02:00
Justin Hernandez
1e51c47977 Add disclose proof request, generation, and result route spine (#1891)
* save wip

* commit

* fixes
2026-03-31 12:02:24 +05:30
Justin Hernandez
da415b81ff Merge pull request #1889 from selfxyz/release/staging-2026-03-30
Release to Staging v2.9.16 - 2026-03-30
2026-03-30 11:52:35 -07:00
Justin Hernandez
3aa6cb682b Add Vercel deployment config for webview-app (#1880)
* add vercel config

* update config

* fix

* make monorepo private for vercel

* set node version

* fix install

* test

* fix vercel webapp deploys

* fix build command

* better skip

* prettier

* format

* fix deploy
2026-03-30 10:31:43 -07:00
Nesopie
fe4eb3786a fix: use raw bytes for KYC register circuit inputs (#1888)
* fix: use raw bytes for KYC register circuit inputs instead of deserialize+reserialize

The deserialize→reserialize path strips the namespace prefix from
id_type, producing different bytes than what the TEE signed. This
causes EdDSA signature verification to fail in the circuit.

Use raw base64-decoded bytes directly, matching the TEE's signed data.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

* fix: use raw bytes for KYC register circuit inputs in common and new-common

The deserialize→reserialize path strips the namespace prefix from
id_type (\x05didit), producing different bytes than what the TEE
signed. This causes EdDSA signature verification to fail in the
register_kyc circuit.

Use raw base64-decoded bytes directly in both common/ and new-common/.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

---------

Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-30 21:43:41 +05:30
Evi Nova
1f5d39a3f1 Expand SelfSdkConfig with environment, version, and verification fields (#1884)
Replace unused teeUrl with environment ("prod"/"staging") for endpoint selection. The webview never consumed teeUrl — the proving machine resolves TEE URLs internally from the circuit DNS mapping API based on environment.

Add version (default 1) for config protocol versioning. Add optional verification config fields: scope, disclosures, appName, appEndpoint, resultType — needed for the tunnel flow to render the proof request UI correctly. The webview already parsed these from URL params; the native shells just weren't sending them.

Update webview to parse environment and version from URL params with defensive defaults. Update both test apps to use the new config shape.
2026-03-30 21:47:19 +10:00