-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add abstract account to govdetails #476
Add abstract account to govdetails #476
Conversation
Deploying abstract-docs with Cloudflare Pages
|
#[cfg(feature = "xion")] | ||
{ | ||
if let Some(is_admin) = crate::state::AUTH_ADMIN.may_load(deps.storage)? { | ||
// Clear auth if it was set |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
maybe this should be cleared in the post_tx hook?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's tough one! Clearing it here disallows more than 1 admin action per tx, but clearing it in post-tx can allow whitelisted module to execute as admin
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actually clearing it in post tx will pretty much have same result as having check of if account caller is account address and no AUTH_ADMIN at all
* init xion deployment script * formatting [skip ci] * update artifacts * add abstract package * lock * progress * guest/host error * Instantiated xion absacc * fix: abstract deployment * typo * update * formatting [skip ci] * fix account wasm selection * add query check on VC to ensure err on local deployments * remove default wasm build * remove redundant proto msg * update script * Add abstract account to govdetails (#476) * add abstract account to govdetails * Too big auth id * small cleanup * unused custom q * format * small doc comment on type * require xion for schema * comment out logic and checks --------- Co-authored-by: Buckram <[email protected]> Co-authored-by: Mykhailo Donchenko <[email protected]>
* add absacc * compiles * wip one auth per account * addauth * Move everything to account * account generic auth * feature flag * wasm compilable * use default type * update workspace hack * formatting [skip ci] * V2/xion deploy (#473) * init xion deployment script * formatting [skip ci] * update artifacts * add abstract package * lock * progress * guest/host error * Instantiated xion absacc * fix: abstract deployment * typo * update * formatting [skip ci] * fix account wasm selection * add query check on VC to ensure err on local deployments * remove default wasm build * remove redundant proto msg * update script * Add abstract account to govdetails (#476) * add abstract account to govdetails * Too big auth id * small cleanup * unused custom q * format * small doc comment on type * require xion for schema * comment out logic and checks --------- Co-authored-by: Buckram <[email protected]> Co-authored-by: Mykhailo Donchenko <[email protected]> * postmerge fixes * move xion script to interchain/scripts --------- Co-authored-by: cyberhoward <[email protected]> Co-authored-by: CyberHoward <[email protected]>
Adding AbstractAccount Governance and admin check based on first bit of signature id. This bit will set AUTH_ADMIN in state and used to verify admin call
#473 is base