sponsoredCall
Permissionless sponsored transactions
Last updated
Permissionless sponsored transactions
Last updated
After reading this page:
You'll know how to use theSponsoredCall
SDK method. This uses the payment method, allowing you to sponsor some/all of your user's gas costs.
You'll see some code which will help you send a relay request within minutes.
Please proceed to our page and read it thoroughly before advancing with your implementation. It is crucial to understand all potential security risks and measures to mitigate them.
The nature of sponsoredCall
is permissionless and does not enforce any security. Target contracts should not whitelist the calling contract as an authorized msg.sender
. The contract address is subject to change without further notice.
sponsoredCall
method utilises authentication via a sponsor API key to sponsor gasless transactions for your users securely. The payment method is Gelato .
request
: this is the used to send a request.
sponsorApiKey
: an API key used to authenticate your sponsorship.
options
: RelayRequestOptions
is an optional request object.
If you need to dispatch transactions from Safe smart contract wallets using Gelato Relay via sponsoredCall
, you can opt to activate Safe-enabled transactions in your Relay Dapp configuration.
Usually when submitting Gelato Relay transactions that originate from Safe smart contract wallets, the Safe wallet address is specified in the target
field of the Relay API request, whereas both the actual target contract address and its calldata
are encoded into the execTransaction
payload. By activating Safe-enabled transactions - accomplished by checking the "Allow sponsored transactions from Safes" box - Gelato Relay will validate your Safe smart contract and decode the target contract address and function selector from the execTransaction
calldata
. It will then apply your pre-configured Relay Dapp rules to these values, rather than to the values given in the Relay request.
If your intention is to deploy Safe smart contract wallets prior to their usage, be sure to whitelist the multicall
contract address in your Relay Dapp. This contract is typically invoked when you deploy a Safe smart contract wallet before it can be used for the first time.
chainId
: the chain ID of the chain where the target
smart contract is deployed.
target
: the address of the target smart contract.
data
: encoded payload data (usually a function selector plus the required arguments) used to call the required target
address.
Since sponsoredCall
assumes you have your own security logic built in (i.e. replay and re-entrancy protection), you can go ahead and generate the payload for your function call and populate a request object.
taskId
: your unique relay task ID which can be used for .
See .
This is an example using Gelato's SimpleCounter.sol
which is deployed on and .
Now Supporting Viem: The Relay SDK has expanded its capabilities to include support for Viem, providing an alternative to Ethers. Learn more by heading over to