-
Notifications
You must be signed in to change notification settings - Fork 683
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bounty Pallet: add approve_bounty_with_curator
call to bounties
pallet
#5961
Conversation
approve_bounty_with_curator
call to bounties
palletapprove_bounty_with_curator
call to bounties
pallet
bot bench polkadot-pallet --pallet=pallet_bounties --runtime=westend |
@davidk-pt https://gitlab.parity.io/parity/mirrors/polkadot-sdk/-/jobs/7533738 was started for your command Comment |
@davidk-pt Command |
@@ -174,6 +175,11 @@ pub enum BountyStatus<AccountId, BlockNumber> { | |||
/// When the bounty can be claimed. | |||
unlock_at: BlockNumber, | |||
}, | |||
/// The bounty is approved with curator assigned. | |||
ApprovedWithCurator { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why we need a new status? why cannot it be exactly the same behaviour as a batch of approve_bounty
and propose_curator
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@muharem Because there still needs some time to pass when bounty is funded because as I understand only at beginning of the block bounties are funded. There could be a time when bounty is approved but funds are not available for some time. So, if we were to jump to a Funded status we would be trying to fund the bounty right away taking from the treasury, and if we don't have funds we can't fund bounty and propose a curator yet. So we have status that bounty is ApprovedWithCurator to be able to approve the bounty without having funds yet.
Correct me if I'm wrong in this
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
you are right
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I’m not very familiar with the code, but having multiple statuses with similar meanings seems like a potential code smell.
How about modifying Approved
with the field maybe_curator: Option<AccountId>
? Probably we want to avoid any breaking change (which is totally understandable)? Though any indexer now needs to support the ApprovedWithCurator
status as well, so I guess breaking change in this scenario is better.
I leave the judgement to you guys. Though it would be great to have some doc explaining expected lifecycle of a bounty (I couldn't find one).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
But my thought was - better non breaking change, all clients keep working. new feature available only to the clients adopting the new status.
Generally speaking, breaking changes should be avoided if possible (when discussing downstream clients, and tools), and if they are necessary then they should be correctly communicated in a changelog - and/or runtime release docs.
It would be helpful to create a document (or perhaps even a talk, followed by a document) to give runtime developers a clearer understanding of existing client use cases, what constitutes a breaking change for a client (less and more painful)
Even though this would be a tall task, I totally agree. I would love to see more documentation on this front.
It could clarify what is generated dynamically from metadata and what isn’t
Atleast from the perspective of PJS - everything is dynamically generated from the metadata now. That being said the static typing (not to be confused with the dynamic generation at runtime) requires a few longer steps to get the types reflected in the PJS libraries - generate the static types - fix any required changes - release the api - then update all deps downstream.
If I am not mistaken the PAPI descriptors do a way better job at supplying the types (But I am no expert - yet :))
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If we want to make this effort future-proof, and bring it up to date with #4722, we should be asking ourselves:
BountyStatus
is the status enum that the internal logic of the pallet would need to care about. Is it even reasonable to expose this to the users?
For example, if we are to design a fn status_of(bounty) -> BountyStatus
as a view function, what would the return type be?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How about modifying
Approved
with the fieldmaybe_curator: Option<AccountId>
?
I'm sorry that I'm late to the party. Modifying Approved
to be an Option<AccountId>
would have been a better way to go IMO.
The reason is simple: if a DApp has not been updated to take into account the new variant, then if they receive the variant "ApprovedWithCurator
" the DApp will almost surely blow up, because they don't know how to deal with that variant.
On the other hand, modifying the Approved
variant to support an optional value, may prevent some DApps from blowing up (sure, they may not take into account the value of the variant, but perhaps they don't need to). Also, at least with PAPI, it makes it much simpler for DApp developers to adapt to the change on their DApps.
Long story short: adding new variants on enums that are used as inputs is a good way to prevent breaking changes on DApps. However, adding new variants on enums that are used as outputs is a guaranteed way to trigger breaking changes on DApps.
New variants on read enums: bad.
New variants on write enums: good.
I'm sorry that I'm sharing this after the PR has been merged.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This means the impact can be different for dapps and indexers. We need to learn more about it and document. It seems like we really can improve the status quo.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I really fail to understand why this change is better for indexers.
// Estimated: `0` | ||
// Minimum execution time: 0_000 picoseconds. | ||
Weight::from_parts(0, 0) | ||
.saturating_add(Weight::from_parts(0, 0)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
you need to run the benchmarks to have an actual weights here and test your benchmark code. you can do it here in PR with a bot. try to comment bot help
bot help |
Here's a link to docs |
bot bench-all pallet --pallet=bounties |
@davidk-pt https://gitlab.parity.io/parity/mirrors/polkadot-sdk/-/jobs/7607483 was started for your command Comment |
@davidk-pt Command |
bot bench-all pallet --pallet=bounties |
@davidk-pt https://gitlab.parity.io/parity/mirrors/polkadot-sdk/-/jobs/7608309 was started for your command Comment |
@davidk-pt Command |
bot bench-all pallet --pallet=pallet-bounties |
@davidk-pt option '--pallet ' argument 'pallet-bounties' is invalid. argument pallet is not matching rule ^([a-z_]+)([:]{2}[a-z_]+)?$ |
bot bench-all pallet --pallet=pallet_bounties |
@davidk-pt https://gitlab.parity.io/parity/mirrors/polkadot-sdk/-/jobs/7617747 was started for your command Comment |
@davidk-pt Command |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good. Two minor comments
@@ -174,6 +175,11 @@ pub enum BountyStatus<AccountId, BlockNumber> { | |||
/// When the bounty can be claimed. | |||
unlock_at: BlockNumber, | |||
}, | |||
/// The bounty is approved with curator assigned. | |||
ApprovedWithCurator { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
you are right
@@ -808,6 +824,52 @@ pub mod pallet { | |||
Self::deposit_event(Event::<T, I>::BountyExtended { index: bounty_id }); | |||
Ok(()) | |||
} | |||
|
|||
/// Approve bountry and propose a curator simultaneously. | |||
/// This call is a shortcut to calling `approve_bounty` and `propose_curator` separately. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This call seems like is an example of #5958.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
But just looking at the diff, and knowing little about this pallet, I disagree with this statement.
If this call was purely an equivalent of batch(approve, propose)
, then:
- The implementation should be merely a
approve().and(propose)
. Perhaps this would be less efficient, but it should be functionally the same. - There would be no need to introduce a new
BountyStatus
variant.
So perhaps this PR is actually doing more than just introducing a shorthand for combining two existing atomic operations?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The issue is ( #5961 (comment) ) that after bounty is approved some time must pass until bounty reaches Funded
status because bounty fundings happen in the beginning of every block.
The only way for this to be atomic is if with approval we try to fund the bounty right away, from Funded
then it could go to CuratorProposed
state, but there may not be enough money in the treasury and such action will revert.
I'm open to simpler solutions which may keep the flow backwards compatible with previous version.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for explaining! The current solution is good, I was mainly interested in the relationship between this and #5958.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Couple of questions but in general PR looks fine to me.
@@ -174,6 +175,11 @@ pub enum BountyStatus<AccountId, BlockNumber> { | |||
/// When the bounty can be claimed. | |||
unlock_at: BlockNumber, | |||
}, | |||
/// The bounty is approved with curator assigned. | |||
ApprovedWithCurator { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I’m not very familiar with the code, but having multiple statuses with similar meanings seems like a potential code smell.
How about modifying Approved
with the field maybe_curator: Option<AccountId>
? Probably we want to avoid any breaking change (which is totally understandable)? Though any indexer now needs to support the ApprovedWithCurator
status as well, so I guess breaking change in this scenario is better.
I leave the judgement to you guys. Though it would be great to have some doc explaining expected lifecycle of a bounty (I couldn't find one).
})?; | ||
|
||
Self::deposit_event(Event::<T, I>::BountyApproved { index: bounty_id }); | ||
Self::deposit_event(Event::<T, I>::CuratorProposed { bounty_id, curator }); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we need to emit both events? Is BountyApproved
inferable from CuratorProposed
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we need to emit both, because this function does logically what approve_bounty
and propose_curator
does, and they emit these events separately.
Yes, BountyApproved
could be inferred from CuratorProposed
in the state machine, CuratorProposed
can happen only after bounty is approved. But then I think people would need to start assuming implementation details of how this pallet works when indexing.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I’m not very familiar with the code, but having multiple statuses with similar meanings seems like a potential code smell.
How about modifying Approved with the field maybe_curator: Option<AccountId>? Probably we want to avoid any breaking change (which is totally understandable)? Though any indexer now needs to support the ApprovedWithCurator status as well, so I guess breaking change in this scenario is better.
I leave the judgement to you guys. Though it would be great to have some doc explaining expected lifecycle of a bounty (I couldn't find one).
Wouldn't maybe_curator: Option<AccountId>
break existing which used Approved
enum? I think it would add at least 1 byte for the option of Approved
whether it is None
or Some
, with these changes we leave the rest of the enums unmodified and people would only need to add support for the new one
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we need to emit both, because this function does logically what approve_bounty and propose_curator does, and they emit these events separately.
Only ask this since events are expensive and stored in state of each block. But of course if you have a good reason to emit both, go for it.
Wouldn't maybe_curator: Option break existing which used Approved enum?
Is breaking change always bad? Especially since old clients may have unexpected side effects, i.e. just miss the approved (ApprovedWithCurator
) status altogether if they depend on the existing Approved
status.
Also types are dynamically generated from substrate metadata and potentially for js clients this might not even be a breaking change.
P.S.: None of this is a huge deal tbh. I’m comfortable with either approach, as long as we’re mindful of the tradeoffs.
* master: (129 commits) pallet-revive: Use `RUSTUP_TOOLCHAIN` if set (#6365) [eth-rpc] proxy /health (#6360) [Release|CI/CD] adjust release pipelines (#6366) Bump the known_good_semver group across 1 directory with 3 updates (#6339) Run check semver in MQ (#6287) [Deprecation] deprecate treasury `spend_local` call and related items (#6169) refactor and harden check_core_index (#6217) litep2p: Update litep2p to v0.8.0 (#6353) [pallet-staking] Additional check for virtual stakers (#5985) migrate pallet-remarks to v2 bench syntax (#6291) Remove leftover references of Wococo (#6361) snowbridge: allow account conversion for Ethereum accounts (#6221) authority-discovery: Populate DHT records with public listen addresses (#6298) Bounty Pallet: add `approve_bounty_with_curator` call to `bounties` pallet (#5961) Silent annoying log (#6351) [pallet-revive] rework balance transfers (#6187) `statement-distribution`: RFC103 implementation (#5883) Disable flaky tests reported in #6343 / #6345 (#6346) migrate pallet-recovery to benchmark V2 syntax (#6299) inclusion emulator: correctly handle UMP signals (#6178) ...
Resolves issue #5928
Adds
approve_bounty_with_curator
call to thebounties
pallet to combine functions ofapprove_bounty
andpropose_curator
into one call. Also adds a new statusApprovedWithCurator
required to distinguish if bounty was approved with curator when skipping throughFunded
status and moving toCuratorProposed
status.If
unassign_curator
is called afterapprove_bounty_with_curator
the process will fall back to the old flow of callingpropose_curator
separately.