Skip to content

Commit 64af948

Browse files
hyeonmin Songhyeonmin Song
authored andcommitted
linting
1 parent c97fde5 commit 64af948

3 files changed

Lines changed: 7 additions & 35 deletions

File tree

client/src/api/abstractCryptid.ts

Lines changed: 0 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -91,23 +91,6 @@ export abstract class AbstractCryptid implements Cryptid {
9191
}
9292
}
9393

94-
// async addKey(
95-
// publicKey: PublicKey,
96-
// alias: string
97-
// ): Promise<TransactionSignature> {
98-
// const signer = await this.getSignerForInternalTransaction();
99-
// const authority = await this.signer.publicKey;
100-
// const transaction = await addKeyTransaction(
101-
// this.options.connection,
102-
// this.did,
103-
// signer,
104-
// publicKey,
105-
// alias,
106-
// authority
107-
// );
108-
// return this.send(transaction);
109-
// }
110-
11194
// Base case for collecting all additional keys that must be provided when signing
11295
// a transaction with controller chains. Each controller layer adds an additional key here
11396
async additionalKeys(): Promise<PublicKey[]> {

client/src/api/cryptid.ts

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -56,13 +56,6 @@ export interface Cryptid {
5656

5757
cancelLarge(transactionAccount: PublicKey): Promise<TransactionSignature>;
5858

59-
// /**
60-
// * Adds a key to your the Crytid account
61-
// * @param publicKey The public key to add
62-
// * @param alias A unique alias for that key
63-
// */
64-
// addKey(publicKey: PublicKey, alias: string): Promise<TransactionSignature>;
65-
6659
/**
6760
* Retrieves the DID document for this Cryptid account
6861
*/

client/test/e2e/transfer.test.ts

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,7 @@ import {
66
Keypair,
77
LAMPORTS_PER_SOL,
88
PublicKey,
9-
// SIGNATURE_LENGTH_IN_BYTES,
109
SystemProgram,
11-
// Transaction,
1210
} from '@solana/web3.js';
1311
import {
1412
airdrop,
@@ -126,22 +124,21 @@ describe('transfers', function () {
126124

127125
it.skip('should sign a transaction from a DID with a second key', async () => {
128126
// the cryptid client for device 1 that will add the new key
129-
// const cryptidForDevice1 = cryptid;
127+
// const cryptidForDevice1 = cryptid;
130128

131129
// the new key that will be added to the DID
132130
const device2Key = Keypair.generate();
133-
// const alias = 'device2';
131+
// const alias = 'device2';
134132

135133
// airdrop to device2 key to cover fees for the transfer only
136134
await airdrop(connection, device2Key.publicKey, 10_000);
137135

138136
// add the new key and create a cryptid client for device 2
139-
// await cryptidForDevice1.addKey(device2Key.publicKey, alias);
137+
// await cryptidForDevice1.addKey(device2Key.publicKey, alias);
140138
// TODO: Challenge: Replace this with a did:sol library call for addKey
141-
// const id = DidSolIdentifier.parse(cryptid.did);
142-
// const service = await DidSolService.build(id);
143-
// service.addVerificationMethod(...);
144-
139+
// const id = DidSolIdentifier.parse(cryptid.did);
140+
// const service = await DidSolService.build(id);
141+
// service.addVerificationMethod(...);
145142
const cryptidForDevice2 = await build(did, device2Key, {
146143
connection,
147144
waitForConfirmation: true,
@@ -237,8 +234,7 @@ describe('transfers', function () {
237234
await airdrop(connection, controlledDIDKey.publicKey, 10_000);
238235

239236
// add the controller to the controlled DID (this anchors the controlled DID)
240-
// await controlledCryptid.addController(did);
241-
237+
// await controlledCryptid.addController(did);
242238
balances = await new Balances(connection).register(
243239
cryptidAddress, // controller cryptid
244240
controlledCryptidAddress, // controlled cryptid

0 commit comments

Comments
 (0)