Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prohibit using disjoint signatures to cover the auth tree. #942

Merged
merged 2 commits into from
Jul 14, 2023

Conversation

dmkozh
Copy link
Contributor

@dmkozh dmkozh commented Jul 11, 2023

What

Prohibit using disjoint signatures to cover the auth tree.

Also did a passing-by cleanup to not load the source account lazily. We should have source account available in relevant contexts that use enforcing auth.

Why

This makes it so require auth calls like A->B can't succeed if signatures for A and B are passed separately. This is achieved via requiring all the authorized calls to belong to some active root higher up the tree (if any).

It is still possible to have multiple disjoint trees on behalf of the same address, but they must have their roots at the same call tree level.

Known limitations

N/A

This makes it so require auth calls like A->B can't succeed if signatures for A and B are passed separately. This is achieved via requiring all the authorized calls to belong to some active root higher up the tree (if any).

It is still possible to have multiple disjoint trees on behalf of the same address, but they must have their roots at the same call tree level.
@dmkozh dmkozh enabled auto-merge (squash) July 13, 2023 23:47
@dmkozh dmkozh merged commit 33a840b into stellar:main Jul 14, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants