• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

iotaledger / iota / 25707832140
67%

Build:
DEFAULT BRANCH: develop
Ran 12 May 2026 02:32AM UTC
Jobs 1
Files 1214
Run time 2min
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

11 May 2026 04:07PM UTC coverage: 63.204% (+0.01%) from 63.193%
25707832140

push

github

web-flow
feat(cli): support Move authenticator as gas sponsor (#11306)

## Description of change

Allow the CLI to sign a sponsored transaction where the gas sponsor is
an
abstract account authenticated via a `MoveAuthenticator`. Previously,
the
sender's `--auth-call-args` / `--auth-type-args` were reused for the
sponsor,
which resolved the wrong `AuthenticatorFunctionRefV1` and prepended the
sender's address into the sponsor's auth args.

Introduces dedicated `--sponsor-auth-call-args` /
`--sponsor-auth-type-args`
flags on `TxProcessingArgs` (and the PTB command), and a
`build_auth_args_for_signing`
helper that fetches the authenticator info per signer. This enables the
regular-sender / AA-sponsor and AA-sender / AA-sponsor flows unlocked by
the protocol-level work in #10947.

## Links to any relevant issues

Closes #11087 

## How the change has been tested

- [x] Basic tests (linting, compilation, formatting, unit/integration
tests)
- [x] Patch-specific tests (correctness, functionality coverage)
- [x] I have added tests that prove my fix is effective or that my
feature works
- [ ] I have checked that new and existing unit tests pass locally with
my changes

Also in devnet, move auth sponsor only:
https://explorer.iota.org/txblock/CSDXM56jBpR9DJqHvR23XajQezkUiKRT1TNAHTgiSfBi?network=devnet
Move auth sponsor and sender:
https://explorer.iota.org/txblock/6H4bLGQ7oHkWH1WVK4zs3qUCSQTdRsPpZTxnKndoqfh3?network=devnet
```bash
#!/usr/bin/env bash
# Manual reproduction of `test_move_authenticator_sender_and_sponsor`
# from iota/crates/iota/tests/cli_tests.rs
#
# Publishes the `account` example package twice to get two distinct
# MoveAuthenticator-backed Accounts, then runs a PTB where one AA is the
# sender and the other is the gas sponsor.

set -euo pipefail

iota client switch --env devnet >/dev/null

PKG_PATH="/home/t/Desktop/iota/iota/examples/move/account"
GAS_BUDGET_PUBLISH=1000000000
GAS_BUDGET_TX=200000000
FUND_AMOUNT=2000000000

need() { command -v "$1" >/d... (continued)

72 of 78 new or added lines in 2 files covered. (92.31%)

667 existing lines in 12 files now uncovered.

155702 of 246347 relevant lines covered (63.2%)

444479.02 hits per line

Uncovered Changes

Lines Coverage ∆ File
6
52.92
2.24% crates/iota/src/client_ptb/ptb.rs

Coverage Regressions

Lines Coverage ∆ File
324
60.0
0.59% crates/iota-json-rpc-types/src/iota_transaction.rs
221
83.02
0.21% crates/iota-types/src/transaction.rs
46
89.16
0.05% crates/iota-network/src/state_sync/mod.rs
34
5.21
0.0% crates/iota-tool/src/lib.rs
19
95.07
0.0% crates/iota-types/src/move_package.rs
8
0.0
0.0% crates/iota-tool/src/db_tool/mod.rs
6
83.82
-1.47% crates/iota-core/src/storage.rs
5
85.59
-2.25% crates/starfish/core/src/leader_timeout.rs
1
80.25
-0.11% crates/iota-core/src/authority_server.rs
1
89.69
0.0% crates/iota-core/src/connection_monitor.rs
1
95.65
-4.35% crates/iota-keys/src/random_names.rs
1
96.76
-0.1% crates/starfish/core/src/cordial_knowledge.rs
Jobs
ID Job ID Ran Files Coverage
1 nextest+simtest - 25707832140.1 12 May 2026 02:32AM UTC 1214
63.2
GitHub Action Run
Source Files on build 25707832140
  • Tree
  • List 1214
  • Changed 21
  • Source Changed 9
  • Coverage Changed 20
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Repo
  • Github Actions Build #25707832140
  • 24e41a9b on github
  • Prev Build on develop (#25645774928)
  • Next Build on develop (#25772766423)
  • Delete
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc