From 8d307fca962cb69da48534b16e2ba5ae7888f582 Mon Sep 17 00:00:00 2001 From: ben-weinberg Date: Thu, 22 Feb 2024 15:07:35 +0000 Subject: [PATCH] fix: update express signup form (#788) * fix: update express signup form * fix: add period --------- Co-authored-by: MC <149421156+ffe9f8@users.noreply.github.com> --- src/pages/dev/general-message-passing/express.mdx | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/pages/dev/general-message-passing/express.mdx b/src/pages/dev/general-message-passing/express.mdx index 85247966d..09d9d99b9 100644 --- a/src/pages/dev/general-message-passing/express.mdx +++ b/src/pages/dev/general-message-passing/express.mdx @@ -28,7 +28,7 @@ The following information is required for an Express Relayer to be configured fo - The maximum value to be Expressed in a 30-minute window 3. The EVM chains to be enabled for Express transactions -Please complete this [form](https://docs.google.com/forms/d/1BPBpo6JBh9D7d3HhhacEI_a_kqm94yEDXY8a1aZh2kY/edit) to provide the required information +Please complete this [form](https://docs.google.com/forms/d/e/1FAIpQLSeIpbcdEzQQY0k00leK2jrOnR0KUUJlKc2SzeNzENyLWs80jA/viewform) to provide the required information. ## Axelar Executable vs. Axelar Valued Express Executable Regular Express Executables have tokens being sent with them. With the Valued Express Executable, the relayer is able to calculate the value of a GMP message in the event that the message itself has a value with no tokens being sent. @@ -83,4 +83,4 @@ Using Axelar Express comes with risks. Namely if anything changes on the source On the destination chain an Axelar relayer triggers the `_execute()`/ `_executeWithToken()` function to trigger a transaction. The GMP payload being used can be assumed to be true as it passes through the [validation process](https://github.com/axelarnetwork/axelar-cgp-solidity/blob/4d01eb6ea1b5413520d9ecab804f815103021148/contracts/AxelarGateway.sol#L233) on the Axelar Gateway. In an express call however the execution on the destination chain occurs before the source chain finalizes, meaning that you cannot rely on this validation process. To mitigate, data that is being passed in you can make use of the unique [`CommandId`](https://github.com/axelarnetwork/axelar-core/blob/main/docs/cli/axelard_query_evm_command.md). The `CommandId` is a unique identifier, which is available on the destination chain you're transacting to. With your unique commanId you can reconstruct the message that was passed in. ## Example -To see how to execute with Axelar Express at the contract level follow this example, see the [the Call Contract with Token (Express) sample contract](https://github.com/axelarnetwork/axelar-examples/tree/main/examples/evm/call-contract-with-token-express). The implementation is very similar to a regular Axelar GMP integration, however notice that the contract is inherting from `AxelarExpressExecutable` rather than `AxelarExecutable`. \ No newline at end of file +To see how to execute with Axelar Express at the contract level follow this example, see the [the Call Contract with Token (Express) sample contract](https://github.com/axelarnetwork/axelar-examples/tree/main/examples/evm/call-contract-with-token-express). The implementation is very similar to a regular Axelar GMP integration, however notice that the contract is inherting from `AxelarExpressExecutable` rather than `AxelarExecutable`.