Skip to content

Commit

Permalink
fix: clarify operation of relayers (#1153)
Browse files Browse the repository at this point in the history
  • Loading branch information
StephenFluin authored Sep 10, 2024
1 parent 198bb1b commit 5c9f17d
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion src/pages/learn/network/flow.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,7 @@ By using proof-of-stake consensus to secure cross-chain messages, additional ass

After the message is approved by Axelar network validators, it needs to be authorized. The Gateway can only allow actions on the external chain if the number of validators holding key shares who authorize the action reaches a set threshold.

Once a message is authorized, anyone can take this signed message and submit it to the destination chain for processing. Similar to the relayer services described earlier, which observe external chain events and bring them into Axelar network, another set of relayer services monitors outgoing transaction queues containing cross-chain messages that are already approved and signed, and periodically submits these transactions to external chains. Just as for incoming messages, these outbound Axelar relayer services are a free, operational convenience Axelar provides, and can be run by anyone who wishes to create and use their own relayer service instead.
Once a message is authorized, anyone can take this signed message and submit it to the destination chain for processing. Similar to the relayer services described earlier, which observe external chain events and bring them into Axelar network, another set of relayer services monitors outgoing transaction queues containing cross-chain messages that are already approved and signed, and periodically submits these transactions to external chains. Relayers can be run by anyone who wishes to create and use their own relayer service instead.

After a relayer sends it out, a Gateway on the destination chain receives the approved message, where its payload is marked as approved by Axelar. The Gateway stores the contract call approval along with a hash of the payload, representing the legitimacy of this cross-chain message. The approved payload can now be executed by anyone at any time.

Expand Down

0 comments on commit 5c9f17d

Please sign in to comment.