Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chainweaver does not prevent error on cross-chain k: account creation resulting in single account protocol violation #705

Open
trendzetter opened this issue Nov 22, 2021 · 2 comments

Comments

@trendzetter
Copy link

trendzetter commented Nov 22, 2021

Scenario:

  1. select transfer coins
  2. fill out a cross chain transfer to an non-existing k: account. choose keys-any

actual result:

the transfer fails on continuation and cannot continue. the account cannot be created as k: account standard because it requires keys-all for account creation and the receiver guard has keys-any. error single account protocol.

expected result:

the rules of the k account creation are checked if the account does not exist. The transfer cannot be confirmed if the entered data does not conform the rules of k account creation

@trendzetter trendzetter changed the title chainweaver does not warn on cross-chain non-matching guards chainweaver does not prevent error on cross-chain k: account creation: single account protocol violation Nov 22, 2021
@trendzetter trendzetter changed the title chainweaver does not prevent error on cross-chain k: account creation: single account protocol violation chainweaver does not prevent error on cross-chain k: account creation resulting in single account protocol violation Nov 22, 2021
@jmininger
Copy link
Contributor

Note. This requires that the default has been overridden. You should not have to specify a keyset when sending to k-accounts. The correct one will be chosen for you.

@trendzetter
Copy link
Author

I know but some people seem to play with these options when they don't know what they are doing. I think when we are talking about manually writing contract calls users should know what they are doing and do their own checks.
But for the wizard the options are limited and the result preferable never be invalid. users could be warned if they choose an option in the wizard that will not work at all.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants