SponsoredCall
Permissionless sponsored transactions
Last updated
Permissionless sponsored transactions
Last updated
After reading this page:
You'll know how to use theSponsoredCall
SDK method. This uses the payment method, allowing you to sponsor some/all of your user's gas costs.
You'll see some code which will help you send a relay request within minutes.
Please proceed to our page and read it thoroughly before advancing with your implementation. It is crucial to understand all potential security risks and measures to mitigate them.
The nature of sponsoredCall
is permissionless and does not enforce any security. Target contracts should not whitelist the calling contract as an authorized msg.sender
. The contract address is subject to change without further notice.
sponsoredCall
method utilises authentication via a sponsor API key to sponsor gasless transactions for your users securely. The payment method is Gelato .
request
: this is the used to send a request.
sponsorApiKey
: an API key used to authenticate your sponsorship.
options
: RelayRequestOptions
is an optional request object.
gasLimit
: the gas limit of the relay call. This effectively sets an upper price limit for the relay call.
If you are using your own custom gas limit, please add a 150k gas buffer on top of the expected gas usage for the transaction. This is for the Gelato Relay execution overhead, and adding this buffer reduces your chance of the task cancelling before it is executed on-chain.
If your contract has any hardcoded requirements about gas usage, please always explicitly pass the gasLimit
to the SDK/API, as Gelato will not know what hardcoded gas expectations your contract has. Otherwise, your relay requests might not be executable.
retries
: the number of retries that Gelato should attempt before discarding this relay call. This can be useful if the state of the target
contract is not fully known and such reverts can not be definitively avoided.
If you need to dispatch transactions from Safe smart contract wallets using Gelato Relay via sponsoredCall
, you can opt to activate Safe-enabled transactions in your Relay Dapp configuration.
Usually when submitting Gelato Relay transactions that originate from Safe smart contract wallets, the Safe wallet address is specified in the target
field of the Relay API request, whereas both the actual target contract address and its calldata
are encoded into the execTransaction
payload. By activating Safe-enabled transactions - accomplished by checking the "Allow sponsored transactions from Safes" box - Gelato Relay will validate your Safe smart contract and decode the target contract address and function selector from the execTransaction
calldata
. It will then apply your pre-configured Relay Dapp rules to these values, rather than to the values given in the Relay request.
If your intention is to deploy Safe smart contract wallets prior to their usage, be sure to whitelist the multicall
contract address in your Relay Dapp. This contract is typically invoked when you deploy a Safe smart contract wallet before it can be used for the first time.
chainId
: the chain ID of the chain where the target
smart contract is deployed.
target
: the address of the target smart contract.
data
: encoded payload data (usually a function selector plus the required arguments) used to call the required target
address.
Since sponsoredCall
assumes you have your own security logic built in (i.e. replay and re-entrancy protection), you can go ahead and generate the payload for your function call and populate a request object.
taskId
: your unique relay task ID which can be used for .
This is an example using Gelato's SimpleCounter.sol
which is deployed on and .