-
Notifications
You must be signed in to change notification settings - Fork 957
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Check Signatures moved to Safe.sol #721
Conversation
Pull Request Test Coverage Report for Build 7330010573
💛 - Coveralls |
What are the bytecode size implications of this? IMO this PR was merged too early. |
For example, I wonder if it will be possible to fix this bug if this function is returned: #708. I prefer new features if we have to choose between gas savings for 3rd parties or new features. |
The bytecode size increased by around 400 for this PR. More info: #707 (comment) How much size increase is estimated for #708 PoC solution? |
With the draft solution in https://github.com/safe-global/safe-contracts/tree/bug/execTransactionFromModuleReturnData-mit-guard the SafeL2 is at 24222 bytes. EDIT: have just pulled from main, and it's above the limit with the |
So, around 50 bytes higher, right? I think I can solve that with the solution I am implementing for #713 So, it should not be a problem, but could be a blocker until I make a PR for that issue. |
Sounds good. I'm still curious whether bringing back an outdated function at the cost of being borderline to the bytecode limit is a good idea. That means that if we ever need to add a change that results in an increased bytecode size, be that a new feature or a bug fix, we might not be able to do that. |
TODO:
checkSignatures(bytes32,bytes,bytes)
to Safe.solCompatibilityFallbackHandler
contract to usecheckSignatures(...)
fromSafe
contract.fmt
script for formatting bothsol
andts
files together.Closes #707