-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[DPA-1519]: feat(solana): allow override authority on Configurer #329
Conversation
🦋 Changeset detectedLatest commit: 635b70a The changes in this PR will be included in the next version bump. This PR includes changesets to release 1 package
Not sure what this means? Click here to learn what changesets are. Click here if you're a maintainer who wants to add another changeset to this PR |
@@ -118,6 +132,20 @@ func TestConfigurer_SetConfig(t *testing.T) { | |||
bindings.NewSetConfigInstructionBuilder().Build(), | |||
}, | |||
}, | |||
{ | |||
name: "success - override authority", | |||
auth: auth, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
not super happy with the current testing coverage as it ignores a bunch of relevant details, but something to come back and improve.
b04fa9e
to
f865c5f
Compare
When executing SetConfig via MCMS, the authority has to be the timelock signer, the current implementation does not allow any override and only accepts the `auth` or deploykey as the authority. JIRA: https://smartcontract-it.atlassian.net/browse/DPA-1519
f865c5f
to
635b70a
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what's the use case for this? IIRC, in the review of the original PR, i remember we decided we wouldn't need something like this.
So the main reason for this, is because in order to call setconfig via an MCMS proposal, we need to override the authority to be the timelock signer PDA instead of the deployer keys. |
@gustavogama-cll the use case is related to my SetConfig changset PR, currrently the test is failing because we have to provide the timelock signer PDA as the authority instead of the deployerKey |
Hmm... then I think we made a bad decision to change the functional option after this discussion. There doesn't seem to be a valid use case for using the two options ( |
|
I wonder should we combine them into 1 then, like |
I'd leave it as is. |
This PR was opened by the [Changesets release](https://github.com/changesets/action) GitHub action. When you're ready to do a release, you can merge this and the packages will be published to npm automatically. If you're not ready to do a release yet, that's fine, whenever you add more changesets to main, this PR will be updated. # Releases ## @smartcontractkit/[email protected] ### Minor Changes - [#329](#329) [`031adfb`](031adfb) Thanks [@graham-chainlink](https://github.com/graham-chainlink)! - feat(solana): override authority on Configurer Co-authored-by: app-token-issuer-engops[bot] <144731339+app-token-issuer-engops[bot]@users.noreply.github.com>
When executing SetConfig via MCMS, the authority has to be the timelock signer, the current implementation does not allow any override and only accepts the `auth` or deploykey as the authority. JIRA: https://smartcontract-it.atlassian.net/browse/DPA-1519
This PR was opened by the [Changesets release](https://github.com/changesets/action) GitHub action. When you're ready to do a release, you can merge this and the packages will be published to npm automatically. If you're not ready to do a release yet, that's fine, whenever you add more changesets to main, this PR will be updated. # Releases ## @smartcontractkit/[email protected] ### Minor Changes - [#329](#329) [`031adfb`](031adfb) Thanks [@graham-chainlink](https://github.com/graham-chainlink)! - feat(solana): override authority on Configurer Co-authored-by: app-token-issuer-engops[bot] <144731339+app-token-issuer-engops[bot]@users.noreply.github.com>
When executing SetConfig via MCMS, the authority has to be the timelock signer, the current implementation does not allow any override and only accepts the
auth
or deploykey as the authority.JIRA: https://smartcontract-it.atlassian.net/browse/DPA-1519