{
    "Function": "checkSignatureValidity",
    "File": "contracts/Community.sol",
    "Parent Contracts": [
        "node_modules/@openzeppelin/contracts-upgradeable/metatx/ERC2771ContextUpgradeable.sol",
        "node_modules/@openzeppelin/contracts-upgradeable/security/ReentrancyGuardUpgradeable.sol",
        "node_modules/@openzeppelin/contracts-upgradeable/security/PausableUpgradeable.sol",
        "node_modules/@openzeppelin/contracts-upgradeable/utils/ContextUpgradeable.sol",
        "node_modules/@openzeppelin/contracts-upgradeable/proxy/utils/Initializable.sol",
        "contracts/interfaces/ICommunity.sol"
    ],
    "High-Level Calls": [
        "SignatureDecoder"
    ],
    "Internal Calls": [
        "require(bool,string)"
    ],
    "Library Calls": [
        "recoverKey"
    ],
    "Low-Level Calls": [],
    "Code": "function checkSignatureValidity(\n        address _address,\n        bytes32 _hash,\n        bytes memory _signature,\n        uint256 _signatureIndex\n    ) internal virtual {\n        // Decode signer\n        address _recoveredSignature = SignatureDecoder.recoverKey(\n            _hash,\n            _signature,\n            _signatureIndex\n        );\n\n        // Revert if decoded signer does not match expected address\n        // Or if hash is not approved by the expected address.\n        require(\n            _recoveredSignature == _address || approvedHashes[_address][_hash],\n            \"Community::invalid signature\"\n        );\n\n        // Delete from approvedHash. So that signature cannot be reused.\n        delete approvedHashes[_address][_hash];\n    }"
}