Skip to content

fix: misreported hw key bug#936

Merged
coodos merged 6 commits intomainfrom
fix/eid-wallet-misreported-software-key-bug
Mar 30, 2026
Merged

fix: misreported hw key bug#936
coodos merged 6 commits intomainfrom
fix/eid-wallet-misreported-software-key-bug

Conversation

@coodos
Copy link
Copy Markdown
Contributor

@coodos coodos commented Mar 30, 2026

Description of change

  • getManager() now checks persisted context (+ cross-context by keyId) and queries eVault before falling back to factory
  • signPayload() runs #ensureKeySyncedToEvault() before every sign (cached per session per keyId)
  • On sign failure: tries eVault key resolution first, then hardware→software fallback
  • New methods: #resolveManagerByEvaultKey(), #ensureKeySyncedToEvault(), #findPersistedByKeyId(), setEvaultKeyResolver(), setEvaultSyncHandler()

Issue Number

Type of change

  • Fix (a change which fixes an issue)

How the change has been tested

Change checklist

  • I have ensured that the CI Checks pass locally
  • I have removed any unnecessary logic
  • My code is well documented
  • I have signed my commits
  • My code follows the pattern of the application
  • I have self reviewed my code

Summary by CodeRabbit

Release Notes

  • New Features

    • Added eVault integration for public key registration and automatic synchronization during signing operations.
  • Improvements

    • Enhanced error handling and user-facing messages when processing social binding QR codes, with fallback identity display on request failures.
    • Refined key resolution logic across signing workflows for improved reliability.
  • Refactor

    • Code formatting and structure improvements throughout the codebase.

@coderabbitai
Copy link
Copy Markdown
Contributor

coderabbitai bot commented Mar 30, 2026

Warning

Rate limit exceeded

@coodos has exceeded the limit for the number of commits that can be reviewed per hour. Please wait 15 minutes and 19 seconds before requesting another review.

Your organization is not enrolled in usage-based pricing. Contact your admin to enable usage-based pricing to continue reviews beyond the rate limit, or try again in 15 minutes and 19 seconds.

⌛ How to resolve this issue?

After the wait time has elapsed, a review can be triggered using the @coderabbitai review command as a PR comment. Alternatively, push new commits to this PR.

We recommend that you space out your commits to avoid hitting the rate limit.

🚦 How do rate limits work?

CodeRabbit enforces hourly rate limits for each developer per organization.

Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout.

Please see our FAQ for further information.

ℹ️ Review info
⚙️ Run configuration

Configuration used: defaults

Review profile: CHILL

Plan: Pro

Run ID: 650f3af1-ca28-4d56-8ae9-2ccdc9d7fdff

📥 Commits

Reviewing files that changed from the base of the PR and between ccb48cc and 44ed4ee.

📒 Files selected for processing (6)
  • infrastructure/eid-wallet/package.json
  • infrastructure/eid-wallet/src-tauri/tauri.conf.json
  • infrastructure/eid-wallet/src/lib/global/controllers/evault.ts
  • infrastructure/eid-wallet/src/lib/global/controllers/key.ts
  • infrastructure/eid-wallet/src/lib/global/state.ts
  • infrastructure/eid-wallet/src/routes/(app)/settings/+page.svelte
📝 Walkthrough

Walkthrough

This PR integrates eVault-based key resolution and synchronization into the wallet. It adds a method to VaultController to fetch registered public keys from eVault's /whois endpoint, extends KeyService to resolve keys via eVault as a fallback mechanism and ensure keys are synced before signing, and wires these new handlers into GlobalState. Multiple UI components are updated to use a new signing context parameter.

Changes

Cohort / File(s) Summary
eVault Key Resolution & Sync
infrastructure/eid-wallet/src/lib/global/controllers/evault.ts, infrastructure/eid-wallet/src/lib/global/controllers/key.ts, infrastructure/eid-wallet/src/lib/global/state.ts
Added fetchRegisteredPublicKeys() to retrieve keys from eVault /whois endpoint; extended KeyService with resolver/sync callbacks and eVault-based key resolution fallback in getManager(); integrated handlers into GlobalState constructor.
UI Signing Context Updates
infrastructure/eid-wallet/src/routes/(app)/ePassport/+page.svelte, infrastructure/eid-wallet/src/routes/(app)/scan-qr/scanLogic.ts, infrastructure/eid-wallet/src/routes/(auth)/onboarding/+page.svelte
Updated wallet signing calls to use "signing" context instead of "default"; enhanced error handling in social binding QR scan logic with explicit catch and user-facing messages.
Formatting & Refactoring
platforms/blabsy/client/src/components/chat/chat-window.tsx, platforms/blabsy/client/src/lib/context/chat-context.tsx, platforms/esigner/client/src/lib/stores/files.ts, platforms/pictique/client/src/routes/(protected)/messages/[id]/+page.svelte
Reformatted type annotations, state initializations, and conditional expressions without functional changes.

Sequence Diagram

sequenceDiagram
    actor User
    participant UI as UI Component
    participant KeyService
    participant VaultController
    participant eVault as eVault API
    participant Storage as Local Storage

    User->>UI: Request signing
    UI->>KeyService: getManager() / signPayload()
    KeyService->>Storage: Restore persisted context
    alt Persisted context found
        KeyService->>Storage: Verify key exists
        KeyService-->>UI: Use restored manager
    else Persisted context missing/invalid
        KeyService->>KeyService: setEvaultKeyResolver()
        KeyService->>VaultController: Call resolver
        VaultController->>eVault: GET /whois (with ename)
        eVault-->>VaultController: Return keyBindingCertificates
        VaultController->>VaultController: Decode & filter certs
        VaultController-->>KeyService: Return public keys[]
        KeyService->>Storage: Compare with local keys
        KeyService-->>UI: Resolved manager
    end
    
    UI->>KeyService: signPayload() pre-sign
    KeyService->>KeyService: setEvaultSyncHandler()
    KeyService->>VaultController: Call sync handler
    VaultController->>eVault: Sync public key
    eVault-->>VaultController: Sync complete
    
    KeyService->>Storage: Sign with resolved key
    Storage-->>KeyService: Signature
    KeyService-->>UI: Return signature
Loading

Estimated code review effort

🎯 4 (Complex) | ⏱️ ~45 minutes

Possibly related PRs

Suggested labels

evault-refactor

Suggested reviewers

  • xPathin
  • sosweetham

Poem

🐰 Keys dancing in the eVault store,
Syncing secrets we adore,
Resolving paths where none exist,
With JWT payloads gently kissed,
A rabbit's blessing on your quest! 🔐✨

🚥 Pre-merge checks | ❌ 3

❌ Failed checks (3 warnings)

Check name Status Explanation Resolution
Title check ⚠️ Warning The title refers to fixing a hardware key bug, but the changeset shows substantial eVault integration, key resolution logic, and signing context changes across multiple files. Revise the title to better reflect the primary changes, such as 'feat: add eVault-based key resolution and sync integration' or clarify what 'misreported hw key bug' specifically addresses.
Docstring Coverage ⚠️ Warning Docstring coverage is 0.00% which is insufficient. The required threshold is 80.00%. Write docstrings for the functions missing them to satisfy the coverage threshold.
Description check ⚠️ Warning PR description is incomplete and missing required information. Type of change is identified but testing details and reasoning are absent. Add 'How the change has been tested' section with specific test cases and steps. Provide issue number or link context. Explain the bug being fixed in 'Description of change' and detail testing methodology.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch fix/eid-wallet-misreported-software-key-bug

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@coodos coodos marked this pull request as ready for review March 30, 2026 10:51
Copy link
Copy Markdown
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 3

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@infrastructure/eid-wallet/src/lib/global/controllers/evault.ts`:
- Around line 721-723: The JWT payload decoding omits base64url padding before
calling atob, causing InvalidCharacterError for unpadded segments; update the
decoding in the evault controller (the code that builds b64 from parts[1] and
parses payload) to add '=' padding until b64.length % 4 === 0 before calling
atob, then JSON.parse the result into the existing payload variable so valid
certificates aren't skipped.

In `@infrastructure/eid-wallet/src/lib/global/controllers/key.ts`:
- Around line 25-26: The pre-sign sync hook currently lacks a signing context
and a success result which lets the wrong keyId be cached as "synced"; update
the hook signature(s) and callers so the handler receives the exact keyId and
signing context and returns a boolean success. Concretely: change
EvaultKeyResolver/EvaultSyncHandler types and any GlobalState hook/method
signatures to accept (keyId: string, context: string) and return
Promise<boolean>, update VaultController.syncPublicKey to accept the same
(keyId, context) and return true only when the upload actually succeeds
(propagate errors instead of swallowing), and modify the code that caches synced
keys (the lines that currently store raw keyId after handler return) to cache
only when the handler returned true. Ensure all call sites (including where
VaultController.syncPublicKey is invoked) pass the validated keyId and context
through.
- Around line 99-119: The current logic deletes this.#contexts entry using
cacheKey when a restored manager is missing, but if persisted came from
`#findPersistedByKeyId`(keyId) you must delete the actual persisted map entry
instead of cacheKey; change the cleanup to remove the map key that corresponds
to the persisted entry (e.g., capture the mapKey returned/identified by
`#findPersistedByKeyId` or locate the matching entry in this.#contexts and call
this.#contexts.delete(matchingMapKey)), then call this.#store.set(CONTEXTS_KEY,
Object.fromEntries(this.#contexts)); apply the same fix for the other occurrence
at the 481-487 region.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: defaults

Review profile: CHILL

Plan: Pro

Run ID: 9dbcefad-352b-45cb-9819-a4130689444b

📥 Commits

Reviewing files that changed from the base of the PR and between 718f013 and ccb48cc.

📒 Files selected for processing (10)
  • infrastructure/eid-wallet/src/lib/global/controllers/evault.ts
  • infrastructure/eid-wallet/src/lib/global/controllers/key.ts
  • infrastructure/eid-wallet/src/lib/global/state.ts
  • infrastructure/eid-wallet/src/routes/(app)/ePassport/+page.svelte
  • infrastructure/eid-wallet/src/routes/(app)/scan-qr/scanLogic.ts
  • infrastructure/eid-wallet/src/routes/(auth)/onboarding/+page.svelte
  • platforms/blabsy/client/src/components/chat/chat-window.tsx
  • platforms/blabsy/client/src/lib/context/chat-context.tsx
  • platforms/esigner/client/src/lib/stores/files.ts
  • platforms/pictique/client/src/routes/(protected)/messages/[id]/+page.svelte

@coderabbitai
Copy link
Copy Markdown
Contributor

coderabbitai bot commented Mar 30, 2026

Caution

Failed to replace (edit) comment. This is likely due to insufficient permissions or the comment being deleted.

Error details
{}

@coodos coodos merged commit 9512a3d into main Mar 30, 2026
4 checks passed
@coodos coodos deleted the fix/eid-wallet-misreported-software-key-bug branch March 30, 2026 14:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant