Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow INVALID_SIGNATURE status on EthTx value sent to EOA with receiverSigRequired=true #6779

Merged
merged 1 commit into from May 25, 2023

Conversation

tinker-michaelj
Copy link
Collaborator

Description:

Signed-off-by: Michael Tinker <michael.tinker@swirldslabs.com>
@github-actions
Copy link

Node: Unit Test Results

    1 415 files      1 415 suites   1h 18m 25s ⏱️
  98 671 tests   98 664 ✔️ 7 💤 0
103 836 runs  103 829 ✔️ 7 💤 0

Results for commit b96a76b.

@sonarcloud
Copy link

sonarcloud bot commented May 25, 2023

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
0.0% 0.0% Duplication

@github-actions
Copy link

Node: Integration Test Results

    4 files      4 suites   13m 32s ⏱️
170 tests 170 ✔️ 0 💤 0
172 runs  172 ✔️ 0 💤 0

Results for commit b96a76b.

@github-actions
Copy link

Node: E2E Test Results

    1 files      1 suites   18m 15s ⏱️
310 tests 310 ✔️ 0 💤 0
328 runs  328 ✔️ 0 💤 0

Results for commit b96a76b.

@tinker-michaelj tinker-michaelj merged commit eec2226 into develop May 25, 2023
23 of 28 checks passed
@tinker-michaelj tinker-michaelj deleted the 06774-stabilize-id-fuzzing-eth-xfer branch May 25, 2023 22:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

addressAliasIdFuzzing() has intermittent failures in CI
3 participants