diff --git a/packages/auth-server/stores/client.ts b/packages/auth-server/stores/client.ts index b258c17d..fb65803f 100644 --- a/packages/auth-server/stores/client.ts +++ b/packages/auth-server/stores/client.ts @@ -28,8 +28,8 @@ export const contractsByChain: Record = { }, [zksyncInMemoryNode.id]: { session: "0x8543528a4561E3a5EC7d51Bfd3776457b0E7b7dc", - passkey: "0x07734BA326b6AD13BfC0115b0903EB14268F1617", - accountFactory: "0xaAF5f437fB0524492886fbA64D703df15BF619AE", + passkey: "0x975df0c7f5CB728ae9F96480491Ec5d1E17296f4", + accountFactory: "0xC86Be232B7f65Db88a3B25afE68E8E1c298231A2", accountPaymaster: "0x2879853afd8d066ca66e224A8E85621aC43d6F59", }, }; diff --git a/packages/contracts/src/AAFactory.sol b/packages/contracts/src/AAFactory.sol index 4d053440..442b2dca 100644 --- a/packages/contracts/src/AAFactory.sol +++ b/packages/contracts/src/AAFactory.sol @@ -19,7 +19,15 @@ contract AAFactory is UpgradeableBeacon { beaconProxyBytecodeHash = _beaconProxyBytecodeHash; } - function addNewUniqueId(bytes32 uniqueAccountId) external {} + function deployProxy7579Account( + bytes32 salt, + string calldata uniqueAccountId, + bytes[] calldata initialValidators, + bytes[] calldata initialModules, + address[] calldata initialK1Owners + ) external returns (address) { + return this.deployProxySsoAccount(salt, uniqueAccountId, initialValidators, initialModules, initialK1Owners); + } function deployProxySsoAccount( bytes32 salt, diff --git a/packages/contracts/src/interfaces/IERC7579Validator.sol b/packages/contracts/src/interfaces/IERC7579Validator.sol deleted file mode 100644 index b1ffa9b5..00000000 --- a/packages/contracts/src/interfaces/IERC7579Validator.sol +++ /dev/null @@ -1,26 +0,0 @@ -// SPDX-License-Identifier: MIT -pragma solidity ^0.8.24; - -import { IERC7579Module } from "./IERC7579Module.sol"; -import { PackedUserOperation } from "./PackedUserOperation.sol"; - -interface IUserOpValidatERC7579or is IERC7579Module { - error InvalidTargetAddress(address target); - - /** - * @dev Validates a transaction on behalf of the account. - * This function is intended to be called by the MSA during the ERC-4337 validation phase - * Note: solely relying on bytes32 hash and signature is not sufficient for some - * validation implementations (i.e. SessionKeys often need access to userOp.calldata) - * @param userOp The user operation to be validated. The userOp MUST NOT contain any metadata. - * The MSA MUST clean up the userOp before sending it to the validator. - * @param userOpHash The hash of the user operation to be validated - * @return return value according to ERC-4337 - */ - function validateUserOp(PackedUserOperation calldata userOp, bytes32 userOpHash) external returns (uint256); - - /** - * Validator can be used for ERC-1271 validation - */ - function isValidSignatureWithSender(address sender, bytes32 hash, bytes calldata data) external view returns (bytes4); -}