-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: access control #44
Conversation
contract OracleTypehash { | ||
bytes32 internal constant PROPOSE_TYPEHASH = keccak256('ProposeResponse(Request _request, Response _response)'); | ||
bytes32 internal constant DISPUTE_TYPEHASH = | ||
keccak256('DisputeResponse(Request _request, Response _response, Dispute _dispute,)'); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
keccak256('DisputeResponse(Request _request, Response _response, Dispute _dispute,)'); | |
keccak256('DisputeResponse(Request _request, Response _response, Dispute _dispute)'); |
i understand this is a WIP, but this one im pointing because it can be easy to miss
revert ERC2612ExpiredSignature(_permit.deadline); | ||
} | ||
// signature, params (removing the last parameter for the access control), nonce, deadline | ||
bytes32 structHash = keccak256(abi.encode(_signature, _params, _useNonce(_user), _permit.deadline)); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should we add block.chainId for cross-chain, and something like address(this) - this last one not so sure about just want to make sure that this signature is not repeatable in another access control module?
🤖 Linear
Closes OPO-XXX