-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Outline current state of the collateral simulations #501
Comments
|
Solutions
|
One remark here: As this relates to all of the collateral types that have been offboarded (also the reason why |
same: impersonate, call
See #503 |
Thanks! Please link them to the appropriate points in #501 (comment) From my perspective, |
Sorry, i don't understand the things that you're asking to compare. The first one i assume is #503 as it is. The second is "find&liquidate existing vault". I either don't see the common line/ground there, or i did not get one/both of the compared items correctly
|
The comment with solutions specifies two options to support
Please edit the links so they correspond to specific solutions, not problems, since there can be many solutions per problem |
Option (a) is outlined for CRVV1ETHSTETH-A in the linked issue. Option (b) would be heavily dependant on the mechanism that we should have by the end of the current global scope (i.e. ideally having the api at hand that we can use to query for vaults of specific type). For now it seems like the solution would be to:
the listed option seems like an easier thing to implement at first glance. The deal-breaker here is the fact that there's no need to deploy a ds-proxy contract into the fork. |
adding the support for CRVV1ETHSTETH-A in #510
|
Summary of currently known proxies that are used with the supported collaterals one way or another:
a proxy-based token. This means that the logic of this token is specified in another contract, while the information is stored in the token(proxy) contract.
a usual token. But the vault is proxied. The vault can be created and instantly drawn from if one uses DSS-PROXY-ACTIONS type of contract (e.g. 0xa2f69F8B9B341CFE9BfBb3aaB5fe116C89C95bAF). One has to use DS-PROXY when making a call to it for security/safety reasons.
|
Additionally, GUSD (gemini) token now is hidden behind the proxy. This means that we have two cases that require to fallback to increasing vat balance currently (instead of increasing wallet balnce) during the simulations:
Updated #501 (comment) |
Removing the fallback of increasing vat-balance instead of wallet for proxy-based tokens seems trickier than expected. There seems to be no consistent layout of where the data is stored. For instance, the G-USD token has a separate storage contract that is referenced by the logic one. But sadly the same layout does not appear to be present for ren-btc. Which essentially means that it's not exactly clear what's the uniform way of overwriting storage of the proxy-contract. As of "what if it just works" - running balance slot discovery on the GUSD and RENBTC did not work out for both cases: overwriting the logic contract and the token contract/ |
Goal
List of supported and unsupported collaterals, list of potential fixes
Context
Since we're working on the collateral auctions simulations for quite some time already and faced different kinds of problems, we need to summarise somewhere its state and come up with a list of solutions to move forward and prioritise them. Therefore, let's summarise it here or even create/modify test script that will do it for us.
Assets
Issues where simulations were previously developed and improved:
CRVV1ETHSTETH-*
vaults Add support for CRVV1ETHSTETH collateral vaults. #484YFI-A
testing Catch Vat-ceiling-exceeded #500Previous state: #479 (comment)
Tasks
collateral type - state - reason
The text was updated successfully, but these errors were encountered: