Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix authorization docs for contract keys #3835

Merged
merged 2 commits into from
Dec 12, 2019
Merged

Fix authorization docs for contract keys #3835

merged 2 commits into from
Dec 12, 2019

Conversation

cocreature
Copy link
Contributor

This should hopefully match what we have actually implemented.

Pull Request Checklist

  • Read and understand the contribution guidelines
  • Include appropriate tests
  • Set a descriptive title and thorough description
  • Add a reference to the issue this PR will solve, if appropriate
  • Include changelog additions in one or more commit message bodies between the CHANGELOG_BEGIN and CHANGELOG_END tags, if appropriate
  • Normal production system change, include purpose of change in description

NOTE: CI is not automatically run on non-members pull-requests for security
reasons. The reviewer will have to comment with /AzurePipelines run to
trigger the build.

This should hopefully match what we have actually implemented.
@@ -50,12 +50,11 @@ Use ``fetchByKey`` to fetch the ID and data of the contract with the specified k

It returns a tuple of the ID and the contract object (containing all its data).

You need authorization from **at least one** of the maintainers to run ``fetchByKey``. A maintainer can authorize by being a signatory, or by submitting the command/being a controller for the choice.
``fetchByKey`` is authorized like ``fetch`` so you need to be a stakeholder to run ``fetchByKey``.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure this conveys the correct meaning. In particular, it's not clear who is "you". The authorization context might contain multiple parties. In my understanding, the that context needs to contain at least one stakeholder for a fetchByKey to be well-authorized. There are no conditions on the submitter though.
@bame-da can you confirm?

@bame-da
Copy link
Contributor

bame-da commented Dec 12, 2019 via email

@cocreature
Copy link
Contributor Author

I’ve changed the wording, let me know if that makes it more clear or if you have better suggestions.

Copy link
Contributor

@hurryabit hurryabit left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Much better. Thanks a lot.

@mergify mergify bot merged commit 787e555 into master Dec 12, 2019
@mergify mergify bot deleted the auth-contract-key branch December 12, 2019 20:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants