Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add primary key to account #2085

Closed
appetrosyan opened this issue Apr 12, 2022 · 32 comments · Fixed by #4411
Closed

Add primary key to account #2085

appetrosyan opened this issue Apr 12, 2022 · 32 comments · Fixed by #4411
Assignees
Labels
Enhancement New feature or request iroha2-dev The re-implementation of a BFT hyperledger in RUST Refactor Improvement to overall code quality
Milestone

Comments

@appetrosyan
Copy link
Contributor

appetrosyan commented Apr 12, 2022

Refactor the accounts to only optionally have an alias.

We still need to retain the current semantics of account structure, but most data should be stored in a separate location: hash-table keyed by the account's ss58 (or pub_key) address, which contains actual data, an account alias is only an interface to all of that.

@appetrosyan appetrosyan added iroha2-dev The re-implementation of a BFT hyperledger in RUST Enhancement New feature or request Refactor Improvement to overall code quality labels Apr 12, 2022
@appetrosyan appetrosyan self-assigned this May 23, 2022
@s8sato s8sato added the Green label Aug 1, 2022
appetrosyan added a commit to appetrosyan/iroha that referenced this issue Aug 25, 2022
Signed-off-by: Aleksandr Petrosyan <a-p-petrosyan@yandex.ru>
appetrosyan added a commit to appetrosyan/iroha that referenced this issue Aug 28, 2022
Signed-off-by: Aleksandr Petrosyan <a-p-petrosyan@yandex.ru>
@appetrosyan appetrosyan removed the Green label Sep 12, 2022
@mversic
Copy link
Contributor

mversic commented Jan 24, 2024

relevant RFC

@s8sato
Copy link
Contributor

s8sato commented Feb 21, 2024

My plan

  • Make AccountId some string derived from the account signatories
    • Stay consistent with shared wallets (accounts such that 1 < account.signatories.len())
    • Refactor the data access flow as AccountId lost DomainId
    • Absorb any other impacts
  • Prototype aliases

Out of scope

The following are left to other issues:

  • From ADR
    • Account alias
    • Primary and secondary keys
    • Account archival
    • Key versioning
  • Other concerns
    • Any functionalities other than as an identifier
    • Discussion on appropriate size of ID

Why is this change necessary?

Pros

  • Rare collisions between newly requested and the existing IDs
    • Offline account creation will be feasible
  • One less step to create account
    • Users don't have to come up with their own names
  • Possibility of utilizing namespace other than those can be derived from public keys
    • If non-user accounts are introduced due to some implementation needs

Cons

  • Signatories change involves account ID change
    • Some blockchains have signatories immutable. What about Iroha?
  • Not easy strings for users to remember and induce input errors
    • In any case, the string should have a checksum or require some confirmation before transaction execution
  • No special use other than as an identifier at the moment
Record of my thoughts

Record of my thoughts

  • Motivation?
    • Offline account creation?
      • Regardless of whether "name@domain" or a key-derived ID is requested, shouldn't its collision be checked when it first comes online?
        • Key-derived IDs would be much less likely to collide
    • It may be a degeneracy, "name@domain" is easier for users to handle
      • In fact, ENS is a move away from hexadecimal addresses. Some other blockchains also offer name services such as SNS or PNS, where users subscribe to paid domains and tie them to their accounts
        • But having a default address has the advantage of saving one step in creating an account. No more forcing users to come up with their own names
      • Speaking of UX, strings input by users should have a checksum or other confirmation to protect them from errors
    • Other (cryptographic) functionalities?
      • Probably public keys are used just for convenience to create identifiers and they have no use other than as identifiers
        • Do we have a pair ("name@domain", public_keys) or a map some_fn(public_keys) -> account_id ?
          • Any example of the use of the strings derived from keys?
            • Use of the complementary space of the "human" IDs that can be derived from keys, which could be called "system", "internal", "program", "contract", or "trigger" IDs that are guaranteed to be inaccessible to users with any key
              • Such a system account can "sign" transactions without keys
                • Program Derived Addresses
                • This means triggers could be regarded as primary entities that can execute transactions, which may not applicable for Iroha, where triggers are secondary state as a result of transaction executions
            • Ethereum address is path to the account state in Merkle Patricia Trie, but Iroha does not and should not adopt this, I think

@mversic
Copy link
Contributor

mversic commented Feb 21, 2024

Refactor the data access flow as AccountId lost DomainId

Do we necessarily have to exclude DomainId? how do we absorb this impact because we have accounts as part of domain

Account alias

I think we need this, but it must remain optional

Primary and second keys

so every account will have to have a unique primary key, but secondary keys can be used by multiple accounts

Account archival

we can leave this for later

Key versioning

what is meant by this?

@mversic
Copy link
Contributor

mversic commented Feb 21, 2024

Make AccountId some string derived from the account signatories

does it have to be derived? it can be any string set by the user, but when setting it we have to make sure it's unique in the blockchain

@mversic
Copy link
Contributor

mversic commented Feb 21, 2024

Make AccountId some string derived from the account signatories

does it have to be derived? it can be any string set by the user, but when setting it we have to make sure it's unique in the blockchain

obviously in this case offline creation can fail if user sets a non-unique account alias

@s8sato
Copy link
Contributor

s8sato commented Feb 21, 2024

Added the Record of my thoughts section to the bottom of #2085 (comment)
I'd appreciate if anyone reviews as I don't think I have a solid vision at the moment

@Mingela
Copy link
Contributor

Mingela commented Feb 22, 2024

So, implicitly an account is going to be identified by it's public key unless an optional alias (name@domain) is introduced, right? Whereas public key formatted aliases should be prohibited?
Introducing the requirement that key pairs (at least ones which are used for a primary key) have to be unique.

Consequently I've got some further questions:

  • What if two accounts get created offline using the same key pair, what's the collision resolution here? Actually how can we distinct them?
  • Can an account have multiple aliases?
  • Can an account drop or change an alias?
  • Can an account set an alias used by someone else in the past?

@mversic
Copy link
Contributor

mversic commented Feb 27, 2024

What if two accounts get created offline using the same key pair, what's the collision resolution here? Actually how can we distinct them?

we consider this so improbable that for all intents and purposes is impossible

Can an account have multiple aliases?

I'd prefer not

Can an account drop or change an alias?

I'd say no, let's keep it simple. User can only define an alias when registering account.

Can an account set an alias used by someone else in the past?

yes

@Mingela
Copy link
Contributor

Mingela commented Feb 27, 2024

Can an account set an alias used by someone else in the past?

yes

Seems all entities referencing an account must rely on the key based identification exclusively though (assets, permission tokens, maybe smth else) to prevent unregistering + registering with same alias kind of 'attack'. Alternatively, aliases might be made exclusive no matter whether the associated account is unregistered or not (which does not seem memory effective though).

Can an account drop or change an alias?

I'd say no, let's keep it simple. User can only define an alias when registering account.

If that's optional I guess we still should allow an account to set that after registering, right?

The other question is how an account is going to be addressed 'by default' (alias alternative), just the primary public key?

@mversic
Copy link
Contributor

mversic commented Feb 27, 2024

Seems all entities referencing an account must rely on the key based identification exclusively though (assets, permission tokens, maybe smth else) to prevent unregistering + registering with same alias kind of 'attack'. Alternatively, aliases might be made exclusive no matter whether the associated account is unregistered or not (which does not seem memory effective though).

if that is a problem, then that is a problem even with the current accounts, no? We've had a similar problem with permission tokens. I've opened #4329 for this

If that's optional I guess we still should allow an account to set that after registering, right?

why? it's optional but you have to decide at the time of registering whether or not to set an alias. If that is really required we can always add that functionality. To keep it simple let's just allow defining aliases at the time of registering

@Mingela
Copy link
Contributor

Mingela commented Feb 27, 2024

Seems all entities referencing an account must rely on the key based identification exclusively though (assets, permission tokens, maybe smth else) to prevent unregistering + registering with same alias kind of 'attack'. Alternatively, aliases might be made exclusive no matter whether the associated account is unregistered or not (which does not seem memory effective though).

if that is a problem, then that is a problem even with the current accounts, no? We've had a similar problem with permission tokens. I've opened #4329 for this

right, seems so even now, though I was rather referring to a scenario of taking over an asset or entity ownership (apparently) via registering an account with the alias used by the initial account

If that's optional I guess we still should allow an account to set that after registering, right?

why? it's optional but you have to decide at the time of registering whether or not to set an alias. If that is really required we can always add that functionality. To keep it simple let's just allow defining aliases at the time of registering

agree

@s8sato
Copy link
Contributor

s8sato commented Feb 27, 2024

Prerequisite

  • Before reading my reply to your comments, please take a look at this gist which describes the underlying understanding @mversic @Mingela
    The reason why gist apart from here is to make the internal links work

  • Aliases was included in the scope of this issue as it seemed to be inseparable from the initial restructural change

@s8sato
Copy link
Contributor

s8sato commented Feb 27, 2024

Replies to comments

@mversic

1. Need to exclude domain ID?

This question brought insight. See "K" and "KD" comparison in the table

2. Impacts of account ID without domain ID?

The basic idea to absorb those impacts would be to consider the data access flow separately from the organizational chart.

for example:

  • All identifiable entities are stored as key-value pairs flatten in the world
    • Those entities have referential IDs of other entities
- world.domains: Map<DomainId, Domain>
  - domain.accounts: Set<AccountId>
  - domain.assets: Set<AssetId>
- world.accounts: Map<AccountId, Account>
  - account.domain: DomainId
  - account.assets: Set<AssetId>
  - account.portfolio(): Map<AssetId, Balance>
- world.assets: Map<AssetId, Asset>
  - asset.domain: DomainId
  - asset.distribution: Map<AccountId, Balance>

where:

  • EntityId and Entity here are the current Entity divided into id and other fields
  • Asset here is a consolidation of the current Asset and AssetDefinition
  • Mutable APIs must be carefully implemented to maintain consistent relationships between entities

3. Primary and secondary keys?

I have no idea about secondary keys at the moment.
If only for the purpose of mitigating the risk of key theft, another small change might work:
introduce "m of n" signature check condition and set it as an authentication policy for personal accounts

4. Is uniqueness enough?

Yeah, that's exactly why I'm cautious about this change.
I think this question comes down to a comparison of K and U.
If there was a motive to K, it would be about the space that cannot be derived from keys

@Mingela

5. Identified by keys unless has aliases?

In the user interface, that will be true.
In the chain, on the other hand, since aliases are supposed to resolve to IDs on the chain surface, accounts will be identified by IDs (essentially keys in K case) regardless of aliases.
If backwards compatibility in the user interface is a concern, aliases are optional for new accounts but required for existing accounts

6. Deny aliases of KD format?

Yeah, KD-format ID and KD-format alias will never be distinguished.
This means a situation where aliases block new accounts.
Maybe KD-format IDs should be rejected?

7. Same key for different IDs?

See KD collides by KD

8. Multiple aliases?

Feasible. Aliases are optional, which means they are mapped to IDs internally

9. Remove or modify aliases?

Feasible. Keys of the alias-to-id map will be checked if they collide

10. Alias transfer, or hijacking?

An alias released by someone else can be retrieved at the next block time.
But I don't think something like a takeover would happen.
Since alias is supposed to be resolve to ID on the chain surface, alias modification would not affect the relationship between entities linked by IDs.
Any query or transaction cannot target the previous holder of the alias because the world state forgets it.
On the chain, no one can act as someone else without stealing the private key, regardless of aliases.
So if there is a problem, it will happen outside the chain.
For example, when an alias acts as an address in the user interface, there may be cases where the alias change is not well known to the parties involved, and the transferred alias could be specified as the destination and the asset could be lost.
I can't think of a good solution, but at least this will be not a flaw in the alias specification

@Mingela
Copy link
Contributor

Mingela commented Feb 28, 2024

@s8sato

  • I really would like an account to be referenceable in a static way, if we don't introduce a primary key which would be the only argument of K's keyhash function result (may be even just the public key), I'd rather support UUIDs. To elaborate, we'd just need Map<String, AccountId> to resolve aliases to AccountId (which are UUIDs in this case), preferably aliases still could be in the name@domain format
  • Generally a domain inclusion to an account id becomes unnecessary unless we define a domain being the uniqueness scope for primary keys

@s8sato
Copy link
Contributor

s8sato commented Mar 6, 2024

After reviewing the original requirements, I found the new account IDs required more than just uniqueness.
Let me refute my own comment:

UUID as an account ID suggested in ADR would be still feasible as long as it is coupled with the account signatories

The problem is that for such account that does not require registration, there is no clue to the "account signatories" other than its ID (address)

Role of AccountId in authentication

Let’s look back at the current transaction authentication:

// outside chain
- transaction
    - payload
        - authority: AccountId  // 1. authenticator fetches `authority` which the transaction senders claim to have
    - signatures                // 4. authenticator verifies `signatures` with `signatories`
// inside chain
- account
    - id: AccountId             // 2. authenticator finds the account matched with `authority`
    - signatories: [PublicKey]  // 3. authenticator decides who should sign the transaction
    - signature_check_condition

And we are trying to realize the following scenario:

  1. Bob generates keys offline, gets an account ID (address), and asks Alice to send assets to the address
  2. Alice sends assets to Bob, who is not yet on the chain. This transfer is valid and Bob's account is created from ID (address) only
  3. Bob sends a transaction with himself as the authority

The situation at this time, assuming no additional fields, is as follows:

// outside chain
- transaction
    - payload
        - authority: AccountId  // 1. authenticator fetches `authority` which the transaction senders claim to have
    - signatures                // 3. authenticator verifies `signatures` with `account.id`
// inside chain                                                                 ^^^^^^^^^^
- account
    - id: AccountId             // 2. authenticator finds the account matched with `authority`
    - signatories: []
    - signature_check_condition

If we continue to follow the design where multi-signature transactions directly target multi-signatory accounts, we would fall into one of the following:

  • Have AccountId fully contains signatories: [PublicKey]

  • Add transaction.payload.signatories field:

    signatories in transaction
    // outside chain
    - transaction
        - payload
            - authority: KeysHash as AccountId  // 1. authenticator fetches `authority` which the transaction senders claim to have
            - signatories: [PublicKey]          // 2. authenticator checks if `authority` is derived from `signatories`
        - signatures                            // 4. authenticator verifies `signatures` with `signatories`
    // inside chain
    - account
        - id: KeysHash as AccountId             // 3. authenticator finds the account matched with `authority`
        // - signatories: []
        - signature_check_condition

Instead, I think a better way would be to prevent transactions from directly targeting shared accounts.
In this case, transactions would have single signature.
Also, AccountId can simply be the same representation as PublicKey:

// outside chain
- transaction
    - payload
        - authority: PublicKey as AccountId     // 1. authenticator fetches `authority` which the transaction sender claims to have
    - signature                                 // 2. authenticator verifies `signature` with `authority`
// inside chain                                                                                ^^^^^^^^^
- account_personal
    - id: PublicKey as AccountId
    // - signatories: []
    // - signature_check_condition

Another remarkable thing here would be that transaction authentication is self-contained without reference to the chain

Multi-signature alternatives

Thus, since a single transaction can no longer have sufficient authority over shared accounts, another method of registering and modifying shared accounts should be provided.
I think stateful triggers would be one of the solutions:

  1. A proposal for a shared account is sent by one of the members:

    // outside chain
    - transaction
        - payload
            - authority: PublicKey as AccountId
            - instructions: [RegisterTrigger(shared_account_registerer)]
        - signature
  2. The dedicated trigger for the shared account registration is registered and begins collecting signatures:

    // inside chain
    - shared_account_registerer
        - payload
            - id: TriggerId
            - executable                        // will register the shared account
                - account_candidate
                    - signatories: [PublicKey]  // members of the shared account
                    - signature_check_condition
        - signatures                            // collected from signatories
  3. Each member of the shared account votes on the account registration proposal:

    // outside chain
    - transaction
        - payload
            - authority: PublicKey as AccountId
            - instructions: [ApproveTrigger(shared_account_registerer.payload.id, signature(shared_account_registerer.payload))]
        - signature
  4. Once all necessary signatures are gathered, the trigger executes and the shared account is registered:

    // inside chain
    - account_shared
        - id: PublicKeyLike as AccountId    // generated from other fields
        - signatories: [PublicKey]
        - signature_check_condition

    where:

    • PublicKeyLike has the same representation as PublicKey, but indicates "system" accounts and is guaranteed to be invalid as a PublicKey

Instructions other than registration for shared accounts would be performed in a similar manner

@Mingela
Copy link
Contributor

Mingela commented Mar 6, 2024

If shared_account_registerer trigger is introduced why not use such approach for any multisignature transaction instead? I mean instead of registering another type of entity (account_shared), why not execute the target logic right away?
Example would look exactly like step 2, but instead of registering the shared account the executable would perform the 'target' logic.
Basically that means callable triggers might be defined just with custom signature_check_condition to represent 'multisignature' nature of an action.

@s8sato
Copy link
Contributor

s8sato commented Mar 6, 2024

@Mingela

  • A shared account would be registered as an entity to be allowed to hold assets and permissions
  • A shared account would be the same Account type as a personal account, which is the intent of PublicKeyLike

I think I recently here suggested something close to what you are thinking of

@0x009922
Copy link
Contributor

0x009922 commented Mar 7, 2024

I have looked into the comments and thoughts, but don't have any comments/objections.

@s8sato
Copy link
Contributor

s8sato commented Mar 8, 2024

Register account that does not require registration?

It may seem contradictory that registration is required for shared accounts when no registration is required, so let me explain.

  1. Alice sends assets to Bob, who is not yet on the chain. This transfer is valid and Bob's account is created from ID (address) only
  2. Bob sends a transaction with himself as the authority

There is a gap between being the object of a transaction (2) and being the subject that exercises authority (3).
The latter condition is that the account is equipped with authentication credentials:

  • id for personal accounts
  • signatories and signature_check_condition for shared accounts
// inside chain
- account_personal
    - id: PublicKey as AccountId        // required for authentication
    - signatories: []
    - signature_check_condition: None
- account_shared
    - id: PublicKeyLike as AccountId
    - signatories: [PublicKey]          // required for authentication
    - signature_check_condition         // required for authentication

That's why additional registration (or "activation") is required for shared accounts.

Also, this is the reason why PublicKeyLike must be invalid as a PublicKey, in other words, there can be no corresponding private key.
Otherwise, a single transaction signed by such a private key could modify the shared account, since its authority should be interpreted as a personal public key, which passes the authentication.

PoC

Reference

@s8sato
Copy link
Contributor

s8sato commented Mar 8, 2024

If we go forward with this, I'd like to have a more solid basis for rejecting other candidates.

For example, I suggested implementing multi-signature using triggers, but I'm not sure if that's a good way to go.
Another suggestion was collecting signatures outside the chain, perhaps like bitcoin, which would mean this feature relies on another trustful network.
One question here is, do we provide a way to handle such a situation where the representative, who has collected signatures and about to submit the multi-signature transaction, disappears despite the signature check condition is met?

Impacts on the existing codebase

  • AccountId no longer including DomainId entails changes in data structure and access flow
  • Account signatories become immutable, or mutable involving the account ID
  • Anything remarkable else?

@s8sato
Copy link
Contributor

s8sato commented Mar 11, 2024

Motivation

Currently, new participants cannot take any action without having their accounts registered by others, which is not what a public blockchain does.
It is therefore a requirement that pre-registration of accounts becomes optional (or is eliminated and their domain is later requested).
Why this leads to the account restructuring can be revealed by the following questions:

  • What if the current name@domain were to become valid address (transfer destination)?
  • How can the chain properly handle requests from name@domain with no registration?
  • In other words, how can name@domain (or just a unique value) alone be authenticated?

The rest is detailed here #2085 (comment)

s8sato added a commit to s8sato/iroha that referenced this issue Apr 24, 2024
Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
@mversic mversic added this to the 2.0.0-rc.1 milestone Apr 24, 2024
s8sato added a commit to s8sato/iroha that referenced this issue Apr 27, 2024
Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue Apr 28, 2024
Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue Apr 28, 2024
Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue Apr 28, 2024
Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 6, 2024
Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 6, 2024
Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 6, 2024
Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 6, 2024
Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 6, 2024
Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 6, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 7, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 7, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 7, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 9, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 9, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 9, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
mversic pushed a commit to s8sato/iroha that referenced this issue May 14, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 14, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 14, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 14, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 14, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 14, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 15, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
s8sato added a commit to s8sato/iroha that referenced this issue May 15, 2024
BREAKING CHANGE:

- change `AccountId` from "name@domain" to "multihash@domain"
- make account signatory single
- make transaction signature single
- remove query `FindAccountsByName`

closes issue hyperledger#2085

Signed-off-by: Shunkichi Sato <49983831+s8sato@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Enhancement New feature or request iroha2-dev The re-implementation of a BFT hyperledger in RUST Refactor Improvement to overall code quality
Projects
Archived in project
Development

Successfully merging a pull request may close this issue.

5 participants