Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Axelar fixes #240

Merged
merged 45 commits into from
Dec 14, 2023
Merged

Axelar fixes #240

merged 45 commits into from
Dec 14, 2023

Conversation

EricBolten
Copy link
Contributor

Draft PR for updates to the Axelar module.

need to fix IBC middleware mocks
needs regenerated mocks for staking
Invalid legacy proposals do not seem to return a specific error code,
but rather fail silently. For the initial invalid proposal test, we
submit it and then query the gov module to see that no props have been
created.
@EricBolten EricBolten marked this pull request as ready for review December 13, 2023 05:35
Copy link
Member

@cbrit cbrit left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Couple of questions

{
Name: "arbitrum",
Id: 42161,
ProxyAddress: "0xEe75bA2C81C04DcA4b0ED6d1B7077c188FEde4d2",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So we use the same proxy contract for each? the proxy routes to the correct gateway?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There's no targeting of gateways. The proxy contract is the contract we're trying to hit that is an Axelar executable. The gateway reaches out itself to call the executable (calling the execute function on the proxy contract) when the call is recorded in state on Axelar.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The addresses are the same because Crispy deterministically deployed it to each L2.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The addresses are the same because Crispy deterministically deployed it to each L2.

Is there anything expecting the casing checksum to match the respective chains?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not certain, we're passing along a string in the ICS-20 message and Axelar is handling it. I assume they are resolving it correctly.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Eth doesn't include chain information in the checksums for addresses like Cosmos does

x/axelarcork/keeper/keeper.go Show resolved Hide resolved
@EricBolten EricBolten merged commit a42cede into main Dec 14, 2023
9 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants