-
Notifications
You must be signed in to change notification settings - Fork 680
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Barrier should be able to deny certain XCMs from happening explicitly #837
Labels
T6-XCM
This PR/Issue is related to XCM.
Comments
Supporting a mechanism of this ilk should mean that we can delete code introduced in cumulus PR: paritytech/cumulus#1169 |
claravanstaden
pushed a commit
to Snowfork/polkadot-sdk
that referenced
this issue
Dec 8, 2023
serban300
pushed a commit
to serban300/polkadot-sdk
that referenced
this issue
Apr 8, 2024
* Remove chains. * Move relay clients. * Flatten generic. * Fix fmt.
serban300
pushed a commit
to serban300/polkadot-sdk
that referenced
this issue
Apr 8, 2024
* Remove chains. * Move relay clients. * Flatten generic. * Fix fmt.
serban300
pushed a commit
to serban300/polkadot-sdk
that referenced
this issue
Apr 8, 2024
* Remove chains. * Move relay clients. * Flatten generic. * Fix fmt.
serban300
pushed a commit
to serban300/polkadot-sdk
that referenced
this issue
Apr 8, 2024
* Remove chains. * Move relay clients. * Flatten generic. * Fix fmt.
serban300
pushed a commit
to serban300/polkadot-sdk
that referenced
this issue
Apr 9, 2024
* Remove chains. * Move relay clients. * Flatten generic. * Fix fmt.
serban300
pushed a commit
to serban300/polkadot-sdk
that referenced
this issue
Apr 9, 2024
* Remove chains. * Move relay clients. * Flatten generic. * Fix fmt.
serban300
pushed a commit
to serban300/polkadot-sdk
that referenced
this issue
Apr 9, 2024
* Remove chains. * Move relay clients. * Flatten generic. * Fix fmt.
serban300
pushed a commit
to serban300/polkadot-sdk
that referenced
this issue
Apr 9, 2024
* Remove chains. * Move relay clients. * Flatten generic. * Fix fmt.
serban300
pushed a commit
to serban300/polkadot-sdk
that referenced
this issue
Apr 9, 2024
* Remove chains. * Move relay clients. * Flatten generic. * Fix fmt.
serban300
pushed a commit
to serban300/polkadot-sdk
that referenced
this issue
Apr 9, 2024
* Remove chains. * Move relay clients. * Flatten generic. * Fix fmt.
serban300
pushed a commit
to serban300/polkadot-sdk
that referenced
this issue
Apr 10, 2024
* Remove chains. * Move relay clients. * Flatten generic. * Fix fmt.
serban300
pushed a commit
to serban300/polkadot-sdk
that referenced
this issue
Apr 10, 2024
* Remove chains. * Move relay clients. * Flatten generic. * Fix fmt.
bkchr
pushed a commit
that referenced
this issue
Apr 10, 2024
* Remove chains. * Move relay clients. * Flatten generic. * Fix fmt.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
We currently have a set of allow rules that will let certain messages through using the
ShouldExecute
tuple.The suggestion is to have a guard that ensures that any matching message is denied:
At the moment
DenyThenTry<(),(.....)>
would always deny with the empty tuple because it returns Err() on nothing matched.Keith mentioned that returning
NoRulesMatched
fromRejectReason
that paritytech/polkadot#5035 is introducing might help. It might be clearer if we had an opposite of theShouldExecute
trait.The text was updated successfully, but these errors were encountered: