Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Changed premint executor to use simpler method for determining if signer is authorized to sign a premint #344

Merged
merged 6 commits into from
Nov 17, 2023

Conversation

oveddan
Copy link
Collaborator

@oveddan oveddan commented Nov 10, 2023

  • Simplified authorization determining methods for premint;
    Instead of having a bunch of methods that need to decode a signature and determine if a creator is authorized to create premints, just have a single method that determines if the creator is authorized, and put the burden on external clients to decode the signature.

  • added new premint sdk method to replace existing isAuthorizedToSign function that existed on the contract`

@oveddan
Copy link
Collaborator Author

oveddan commented Nov 10, 2023

@oveddan oveddan changed the title Changed premint executor to use simpler method for determining if signer is authorized to sign Changed premint executor to use simpler method for determining if signer is authorized to sign a premint Nov 10, 2023
@oveddan oveddan force-pushed the get-supported-premint-version branch from 85e0a80 to 16241da Compare November 10, 2023 01:30
@oveddan oveddan changed the base branch from get-supported-premint-version to main November 17, 2023 22:41
@oveddan oveddan dismissed iainnash’s stale review November 17, 2023 22:41

The base branch was changed.

@oveddan
Copy link
Collaborator Author

oveddan commented Nov 17, 2023

Merge activity

  • Nov 17, 5:48 PM: @oveddan started a stack merge that includes this pull request via Graphite.
  • Nov 17, 5:48 PM: @oveddan merged this pull request with Graphite.

@oveddan oveddan merged commit de0b0b7 into main Nov 17, 2023
10 checks passed
@oveddan oveddan mentioned this pull request Nov 17, 2023
iainnash pushed a commit that referenced this pull request Jan 5, 2024
…ner is authorized to sign a premint (#344)

* Simplified authorization determining methods for premint;
Instead of having a bunch of methods that need to decode a signature and determine if a creator is authorized to create premints, just have a single method that determines if the creator is authorized, and put the burden on external clients to decode the signature.

* added new premint sdk method to replace existing `isAuthorizedToSign` function that existed on the contract`
iainnash pushed a commit that referenced this pull request Jan 11, 2024
…ner is authorized to sign a premint (#344)

* Simplified authorization determining methods for premint;
Instead of having a bunch of methods that need to decode a signature and determine if a creator is authorized to create premints, just have a single method that determines if the creator is authorized, and put the burden on external clients to decode the signature.

* added new premint sdk method to replace existing `isAuthorizedToSign` function that existed on the contract`
iainnash pushed a commit that referenced this pull request Jan 11, 2024
…ner is authorized to sign a premint (#344)

* Simplified authorization determining methods for premint;
Instead of having a bunch of methods that need to decode a signature and determine if a creator is authorized to create premints, just have a single method that determines if the creator is authorized, and put the burden on external clients to decode the signature.

* added new premint sdk method to replace existing `isAuthorizedToSign` function that existed on the contract`
@iainnash iainnash deleted the simplify-auth-method branch January 11, 2024 15:37
oveddan pushed a commit that referenced this pull request May 10, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants