-
Notifications
You must be signed in to change notification settings - Fork 205
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix authorization docs for contract keys #3835
Conversation
This should hopefully match what we have actually implemented.
@@ -50,12 +50,11 @@ Use ``fetchByKey`` to fetch the ID and data of the contract with the specified k | |||
|
|||
It returns a tuple of the ID and the contract object (containing all its data). | |||
|
|||
You need authorization from **at least one** of the maintainers to run ``fetchByKey``. A maintainer can authorize by being a signatory, or by submitting the command/being a controller for the choice. | |||
``fetchByKey`` is authorized like ``fetch`` so you need to be a stakeholder to run ``fetchByKey``. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not sure this conveys the correct meaning. In particular, it's not clear who is "you". The authorization context might contain multiple parties. In my understanding, the that context needs to contain at least one stakeholder for a fetchByKey
to be well-authorized. There are no conditions on the submitter though.
@bame-da can you confirm?
That's my understanding as well
…On Thu, 12 Dec 2019, 18:47 Martin Huschenbett, ***@***.***> wrote:
***@***.**** commented on this pull request.
------------------------------
In docs/source/daml/reference/contract-keys.rst
<#3835 (comment)>:
> @@ -50,12 +50,11 @@ Use ``fetchByKey`` to fetch the ID and data of the contract with the specified k
It returns a tuple of the ID and the contract object (containing all its data).
-You need authorization from **at least one** of the maintainers to run ``fetchByKey``. A maintainer can authorize by being a signatory, or by submitting the command/being a controller for the choice.
+``fetchByKey`` is authorized like ``fetch`` so you need to be a stakeholder to run ``fetchByKey``.
I'm not sure this conveys the correct meaning. In particular, it's not
clear who is "you". The authorization context might contain multiple
parties. In my understanding, the that context needs to contain at least
one stakeholder for a fetchByKey to be well-authorized. There are no
conditions on the submitter though.
@bame-da <https://github.com/bame-da> can you confirm?
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#3835?email_source=notifications&email_token=AJW7WQQZB3VBJP6KCEDUHG3QYJ2KJA5CNFSM4J2A27AKYY3PNVWWK3TUL52HS4DFWFIHK3DMKJSXC5LFON2FEZLWNFSXPKTDN5WW2ZLOORPWSZGOCPAOS4Q#pullrequestreview-331409778>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AJW7WQXTMP3LCFER4QRMYH3QYJ2KJANCNFSM4J2A27AA>
.
--
This message, and any attachments, is for the intended recipient(s) only,
may contain information that is privileged, confidential and/or proprietary
and subject to important terms and conditions available at
http://www.digitalasset.com/emaildisclaimer.html
<http://www.digitalasset.com/emaildisclaimer.html>. If you are not the
intended recipient, please delete this message.
|
I’ve changed the wording, let me know if that makes it more clear or if you have better suggestions. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Much better. Thanks a lot.
This should hopefully match what we have actually implemented.
Pull Request Checklist
CHANGELOG_BEGIN
andCHANGELOG_END
tags, if appropriateNOTE: CI is not automatically run on non-members pull-requests for security
reasons. The reviewer will have to comment with
/AzurePipelines run
totrigger the build.