Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fixing pages related to group admins #543

Merged
merged 3 commits into from
Feb 21, 2025
Merged

Fixing pages related to group admins #543

merged 3 commits into from
Feb 21, 2025

Conversation

CharlieMc0
Copy link
Member

@CharlieMc0 CharlieMc0 commented Feb 11, 2025

Fixing changes related the the group admins making it clear what they are and how they work.

Summary by CodeRabbit

  • Documentation
    • Revised policy account descriptions with clear naming conventions (groupEmergency, groupOperational, and groupAdmin) to reflect distinct permission levels.
    • Updated module version details and guidance links to ensure current references.

@CharlieMc0 CharlieMc0 requested a review from a team as a code owner February 11, 2025 22:41
Copy link

vercel bot commented Feb 11, 2025

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Updated (UTC)
docs-v2 ✅ Ready (Inspect) Visit Preview Feb 20, 2025 0:56am

Copy link
Contributor

coderabbitai bot commented Feb 11, 2025

📝 Walkthrough

Walkthrough

This pull request updates the privileged policies documentation. It revises the referenced Cosmos SDK module version from v0.46 to v0.50 and changes the URL for the observer module parameters to now point to authority policies. Additionally, the generic policy account names ("Group1" and "Group2") have been replaced with three specific names ("groupEmergency", "groupOperational", and "groupAdmin") to clarify the permission levels associated with the underlying privileged policy account. No alterations were made to exported or public entity declarations.

Changes

File(s) Change Summary
src/pages/developers/architecture/privileged.mdx - Updated Cosmos SDK module version from v0.46 to v0.50.
- Changed the observer module parameters URL to point to authority policies.
- Revised policy account names from "Group1"/"Group2" to "groupEmergency", "groupOperational", and "groupAdmin".

Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR. (Beta)
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🧹 Nitpick comments (1)
src/pages/developers/architecture/privileged.mdx (1)

43-47: LGTM! Consider minor formatting improvements.

The explanation of policy account naming is clear and informative. It effectively communicates that the names indicate permission levels rather than actual group associations.

Consider this minor formatting improvement for better readability:

-  Notice that policy accounts below are called "groupEmergency", "groupOperational", "groupAdmin". These are just names that indicate the level of 
-  permissions and are not related to the actual groups associated with policy accounts. As you can see in testnet there are three entries
-  that both point to the same policy account. This means that right now even though there are three
-  levels of permissions ("groupEmergency", "groupOperational", "groupAdmin") there is only one policy account that is authorized to perform   
-  privileged actions.
+  Notice that policy accounts below are called "groupEmergency", "groupOperational", and "groupAdmin". 
+  These are just names that indicate the level of permissions and are not related to the actual groups 
+  associated with policy accounts. As you can see in testnet, there are three entries that point to 
+  the same policy account. This means that right now, even though there are three levels of permissions 
+  ("groupEmergency", "groupOperational", "groupAdmin"), there is only one policy account that is 
+  authorized to perform privileged actions.
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between ad935b2 and c2e3a4e.

📒 Files selected for processing (1)
  • src/pages/developers/architecture/privileged.mdx (2 hunks)
🧰 Additional context used
🪛 LanguageTool
src/pages/developers/architecture/privileged.mdx

[typographical] ~24-~24: It appears that a comma is missing.
Context: ...ups. Anyone can create a group. In this document we only consider policy accounts that g...

(DURING_THAT_TIME_COMMA)


[duplication] ~28-~28: Possible typo: you repeated a word.
Context: ...icy accounts are defined in the [params of of the observer module](https://zetachain-...

(ENGLISH_WORD_REPEAT_RULE)

⏰ Context from checks skipped due to timeout of 90000ms (2)
  • GitHub Check: build
  • GitHub Check: Analyze (javascript)
🔇 Additional comments (1)
src/pages/developers/architecture/privileged.mdx (1)

28-29: Verify the authority policies endpoint accessibility.

Let's confirm that the new endpoint is accessible and returns the expected policy data.

✅ Verification successful

🏁 Script executed:

#!/bin/bash
# Description: Check if the authority policies endpoint is accessible
curl -s "https://zetachain-athens.blockpi.network/lcd/v1/public/zeta-chain/authority/policies" | jq '.'

Length of output: 572


Authority policies endpoint verified successfully.
The endpoint at https://zetachain-athens.blockpi.network/lcd/v1/public/zeta-chain/authority/policies is accessible and returns the expected JSON structure with the policy data. No changes are needed.

🧰 Tools
🪛 LanguageTool

[duplication] ~28-~28: Possible typo: you repeated a word.
Context: ...icy accounts are defined in the [params of of the observer module](https://zetachain-...

(ENGLISH_WORD_REPEAT_RULE)

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

♻️ Duplicate comments (1)
src/pages/developers/architecture/privileged.mdx (1)

28-29: ⚠️ Potential issue

Fix the duplicated word.

-These "special" policy accounts are defined in the [params of of the observer
+These "special" policy accounts are defined in the [params of the observer
🧰 Tools
🪛 LanguageTool

[duplication] ~28-~28: Possible typo: you repeated a word.
Context: ...icy accounts are defined in the [params of of the observer module](https://zetachain-...

(ENGLISH_WORD_REPEAT_RULE)

🧹 Nitpick comments (2)
src/pages/developers/architecture/privileged.mdx (2)

38-38: Enhance the endpoint reference with example response.

Consider adding a brief example of the response format to help users understand what information they can expect from this endpoint.


42-46: Improve readability of the policy account explanation.

The current text is a bit verbose and could be structured better. Consider this revision:

-  Notice that policy accounts below are called "groupEmergency", "groupOperational", "groupAdmin". These are just names that indicate the level of 
-  permissions and are not related to the actual groups associated with policy accounts. As you can see in testnet there are three entries
-  that both point to the same policy account. This means that right now even though there are three
-  levels of permissions ("groupEmergency", "groupOperational", "groupAdmin") there is only one policy account that is authorized to perform   
-  privileged actions.
+  The policy accounts are named "groupEmergency", "groupOperational", and "groupAdmin" to indicate their permission levels. These names are not related
+  to actual group associations. In the testnet, all three permission levels currently map to the same policy account, meaning a single policy account
+  is authorized to perform all privileged actions.
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between c2e3a4e and 3678b8b.

📒 Files selected for processing (1)
  • src/pages/developers/architecture/privileged.mdx (2 hunks)
🧰 Additional context used
🪛 LanguageTool
src/pages/developers/architecture/privileged.mdx

[typographical] ~24-~24: It appears that a comma is missing.
Context: ...ups. Anyone can create a group. In this document we only consider policy accounts that g...

(DURING_THAT_TIME_COMMA)


[duplication] ~28-~28: Possible typo: you repeated a word.
Context: ...icy accounts are defined in the [params of of the observer module](https://zetachain-...

(ENGLISH_WORD_REPEAT_RULE)

⏰ Context from checks skipped due to timeout of 90000ms (1)
  • GitHub Check: build
🔇 Additional comments (1)
src/pages/developers/architecture/privileged.mdx (1)

21-22: Update to the latest stable Cosmos SDK version.

The link currently points to v0.50 documentation, but Cosmos SDK v0.52.x (Olympus) is now the latest stable version. Consider updating the link to reflect this:

-module](https://docs.cosmos.network/v0.50/modules/group/).
+module](https://docs.cosmos.network/v0.52/modules/group/).

Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
@fadeev fadeev requested a review from a team as a code owner February 20, 2025 12:46
Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (1)
src/pages/developers/architecture/privileged.mdx (1)

21-23: Cosmos SDK Module Reference Update:
The link now points to https://docs.cosmos.network/v0.50/modules/group/, reflecting the change from the older v0.46 reference. Please verify that v0.50 is the intended version for your documentation. If the current stable release is v0.52 (as recent external information suggests), consider updating the reference accordingly.

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 3678b8b and 66f0201.

📒 Files selected for processing (1)
  • src/pages/developers/architecture/privileged.mdx (2 hunks)
🧰 Additional context used
🪛 LanguageTool
src/pages/developers/architecture/privileged.mdx

[typographical] ~24-~24: It appears that a comma is missing.
Context: ...ups. Anyone can create a group. In this document we only consider policy accounts that g...

(DURING_THAT_TIME_COMMA)

⏰ Context from checks skipped due to timeout of 90000ms (2)
  • GitHub Check: build
  • GitHub Check: Analyze (javascript)
🔇 Additional comments (3)
src/pages/developers/architecture/privileged.mdx (3)

28-30: Policy Accounts URL and Typo Resolution:
The description now clearly defines the special policy accounts and correctly points to the authority policies endpoint at https://zetachain-athens.blockpi.network/lcd/v1/public/zeta-chain/authority/policies. Additionally, the previously flagged duplicate "of" typographical error has been resolved.


38-38: Privileged Messaging Endpoint Update:
The endpoint for querying which policy accounts can send privileged messages has been updated to https://zetachain-athens.blockpi.network/lcd/v1/public/zeta-chain/authority/authorizations. Please ensure that this URL is correct and reflects the current API specifications.


42-46: Clarification on Policy Account Naming:
The alert now explicitly explains that the policy accounts are labeled as "groupEmergency", "groupOperational", and "groupAdmin" to denote varying permission levels—even though they reference the same underlying account. This added clarity benefits the reader.

@fadeev fadeev merged commit 548795c into main Feb 21, 2025
6 checks passed
@fadeev fadeev deleted the update-group-admin branch February 21, 2025 08:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants