-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Constrain token payment by auth entries #31
Conversation
…ctId mismatch, and sub invocations to token payment simulation
Preview is available here: |
Preview is available here: |
Preview is available here: |
1 similar comment
Preview is available here: |
src/helper/error.ts
Outdated
export const ERROR = { | ||
ACCOUNT_NOT_SOURCE: | ||
"Transfer contains authorization entry for a different account", | ||
FOREIGN_CONTRACT_AUTH: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
did we mean to use this error in this pull request or are you planning to use it in a follow-up change?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actually I'll remove that one, @sisuresh pointed how that check was already covered.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
removed in 3272c3c
src/route/index.ts
Outdated
|
||
const built = preparedTransaction.build(); | ||
const sorobanOp = built | ||
.operations[0] as Operation.InvokeHostFunction; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should we inspect all operations or is only looking at the first one always sufficient?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In the case of a tx with an InvokeHostFunction, there can only be 1 operation. We could check for the operation type here but only the InvokeHostFunction type has auth. I'll add an explicit check for the op type though, that seems a bit more clear.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added an explicit check for op type in 3272c3c
…or from mercury, removes unused token sim error
Preview is available here: |
Preview is available here: |
Preview is available here: |
Adds checks during token simulation to attempt to constrain simulation to a typical transfer implementation.