diff --git a/op-txproxy/conditional_txs.go b/op-txproxy/conditional_txs.go index dd0e5d16..58c9ccdb 100644 --- a/op-txproxy/conditional_txs.go +++ b/op-txproxy/conditional_txs.go @@ -90,7 +90,11 @@ func (s *ConditionalTxService) SendRawTransactionConditional(ctx context.Context authInfo := AuthFromContext(ctx) if authInfo == nil { s.failures.WithLabelValues("missing auth").Inc() - return common.Hash{}, missingAuthenticationErr + + // See Issue: https://github.com/ethereum-optimism/infra/issues/68. + // We'll be re-enforcing authentcation when fixed + //return common.Hash{}, missingAuthenticationErr + authInfo = &AuthContext{} } // Handle the request. For now, we do nothing with the authenticated signer diff --git a/op-txproxy/conditional_txs_test.go b/op-txproxy/conditional_txs_test.go index 2bdd9dd0..a7a994e7 100644 --- a/op-txproxy/conditional_txs_test.go +++ b/op-txproxy/conditional_txs_test.go @@ -59,9 +59,16 @@ func TestSendRawTransactionConditionalDisabled(t *testing.T) { func TestSendRawTransactionConditionalMissingAuth(t *testing.T) { svc := setupSvc(t) - hash, err := svc.SendRawTransactionConditional(context.Background(), nil, types.TransactionConditional{}) - require.Zero(t, hash) - require.Equal(t, missingAuthenticationErr, err) + + tx := types.NewTransaction(0, predeploys.EntryPoint_v060Addr, big.NewInt(0), 0, big.NewInt(0), nil) + txBytes, err := rlp.EncodeToBytes(tx) + require.NoError(t, err) + + // See Issue: https://github.com/ethereum-optimism/infra/issues/68. + // We'll be re-enforcing authentcation when fixed + hash, err := svc.SendRawTransactionConditional(context.Background(), txBytes, types.TransactionConditional{}) + require.Equal(t, hash, tx.Hash()) + require.Nil(t, err) } func TestSendRawTransactionConditionalInvalidTxTarget(t *testing.T) {