-
Notifications
You must be signed in to change notification settings - Fork 3.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(accounts): allow accounts to query and execute modules #17685
Conversation
@testinginprod your pull request is missing a changelog! |
func (k Keeper) makeAccountContext(ctx context.Context, accountAddr, sender []byte, isQuery bool) context.Context { | ||
// if it's not a query we create a context that allows to do anything. | ||
if !isQuery { | ||
return implementation.MakeAccountContext( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
do we want to add event emission here too?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
100%, I think we progressively add services to the account, although I'll want a proxy account service which also defines which is the account emitting the event.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
utACK
|
||
"cosmossdk.io/core/store" | ||
"cosmossdk.io/x/accounts/internal/prefixstore" | ||
) | ||
|
||
var errUnauthorized = errors.New("unauthorized") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we expect callers to be able to inspect and handle errors from handlers gracefully? If so, sentinel errors should be public.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
i don't think this error will be exported since it usually means that an account intentionally or not was trying to impersonate someone else.
this is still gated behind an internal package, so when done with the implementation we can carefully pick what to re-export.
Description
Closes: #17686
Author Checklist
All items are required. Please add a note to the item if the item is not applicable and
please add links to any relevant follow up issues.
I have...
!
to the type prefix if API or client breaking changeCHANGELOG.md
make lint
andmake test
Reviewers Checklist
All items are required. Please add a note if the item is not applicable and please add
your handle next to the items reviewed if you only reviewed selected items.
I have...
!
in the type prefix if API or client breaking change