mirror of
https://github.com/nspcc-dev/neofs-node.git
synced 2026-03-01 04:29:10 +00:00
SN pays for container estimations #1334
Labels
No labels
I1
I2
I3
I4
S0
S1
S2
S3
S4
U0
U1
U2
U3
U4
blocked
bug
config
dependencies
discussion
documentation
enhancement
enhancement
epic
feature
go
good first issue
help wanted
neofs-adm
neofs-cli
neofs-cli
neofs-cli
neofs-ir
neofs-lens
neofs-storage
neofs-storage
performance
question
security
task
test
windows
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
nspcc-dev/neofs-node#1334
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @roman-khimov on GitHub (Feb 13, 2025).
Originally assigned to: @End-rey on GitHub.
Expected Behavior
Proxy contract paying for transactions.
Current Behavior
NYmvupSPkJEuYWaofaNErKF3YF5Gddxyfgis one of SNs. It signs and sends a transaction.Possible Solution
Make proxy contract pay for it, make it sender and add alpha witness for it. Send as notary request.
Steps to Reproduce (for bugs)
Watch container estimations.
Context
Mainnet. This makes nodes lose their GAS pretty quickly as we get more and more containers on the network.
Regression
Probably in some way, once upon a time container estimations were completely broken. Now they're fine, but GAS is a problem.
Your Environment
uname -a): Debian stable@carpawell commented on GitHub (Feb 20, 2025):
Does it mean we also need to add Alphabet signature check to the PutContainerSize?
@roman-khimov commented on GitHub (Feb 20, 2025):
That's a somewhat separate matter. Ideally we should check SN belongs to the respective container. But we can't really do it now at the contract level. We can check IR-side when processing notary request, but this check doesn't prevent SN from misbehavior, so this means an additional alpha-sig check can be beneficial to prevent unauthorized puts.
@carpawell commented on GitHub (Feb 20, 2025):
I agree, that IR can do it much easier and it should do it. But since we always have alpha signature now, IMO, it should be checked.
We... now can with
nspcc-dev/neofs-contract@6bc4a62a01/contracts/container/contract.go (L795-L818)?@roman-khimov commented on GitHub (Feb 20, 2025):
You know the current status of these lists, not yet.