-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature request for AuRa: Extended service transactions #57
Comments
No, we don't need to extend it. The current interface and implementation of Certifier contract fits our current needs.
I propose just to add separate
I think there is no need in changing of Parity code for this. Parity uses the Registry contract as described here: https://wiki.parity.io/Permissioning.html#how-it-works-3 |
I agree, if we just extend the existing permissions contract, we don't need to change the way the registry contract works. |
Then I think all we have to do for the implementation is adding a version 3 branch here where we call the new function instead, and extending the JSON ABI. |
Do we need a copy of the |
Yes, that's what I'm thinking, too. I added something like that to #52. If you're okay with it, feel free to merge that PR. |
OK, thanks. That works for #50 as well. I'll use it. |
If we add a new version for the |
I will take this one. |
@DemiMarie I also started it here |
Looks like this has been extended before. The discussion here is probably relevant: openethereum#8400 |
Yes, it looks like so. The current The example of the contract: They still didn't update the docs for some reason: https://wiki.parity.io/Permissioning.html#how-it-works-1 Anyway, we still need |
Do we really need a |
For our purposes we're just adding it to distinguish service transactions (gas price 0) from regular transactions. That way we'll be able to allow validators to make both
|
Yes, we do. The The For example, if the validator sends a few coins to some address, he must set gas price to 1 gwei. If he set gas price to zero, such a transaction must be declined by On the other hand, if the validator calls some function of That's why we need the To avoid DDoS with zero gas price for our contracts, we will use |
The |
Fixed by #60 |
Validators need to be able to make service transactions with zero gas price. There is already a service transaction checker feature that allows configuring a contract to whitelist nodes for this. In addition, a transaction permissions contract can decide which types of transactions a node is allowed to make: transfer, contract deployment and/or contract interaction. The ABIs for these are
service_transaction.json
andtx_acl.json
. They seem to be used inServiceTransactionChecker
andTransactionFilter
.However, these two features are separate and the permissions are pretty coarse-grained. We'd like to whitelist
Let's add an extended version of
allowedTxTypes
(suggested by @varasev):That would allow writing a transaction permissions contract taking all of the above into account.
We need to figure out:
tx_acl.json
or add a separate, new type of contract,The text was updated successfully, but these errors were encountered: