Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Decommission signer registration with declarative PoolId #653

Merged

Conversation

jpraynaud
Copy link
Member

@jpraynaud jpraynaud commented Dec 13, 2022

Content

This PR decommissions the declarative PoolId signer registration mode. Once this PR is merged SPOs will be required to provide their Operational Certificate and KES Secret Key to certify that they are the owner of a PoolId.

Pre-submit checklist

  • Branch
    • Commit sequence broadly makes sense
    • Key commits have useful messages
  • PR
    • No clippy warnings in the CI
    • Self-reviewed the diff
    • Useful pull request description
    • Reviewer requested
  • Documentation
    • Update documentation website
    • Update dev blog post

Issue(s)

Closes #621

@jpraynaud jpraynaud force-pushed the jpraynaud/621-decommission-unverified-signer-registration branch from b074d03 to 90061ff Compare December 13, 2022 17:02
@jpraynaud jpraynaud self-assigned this Dec 13, 2022
@github-actions
Copy link

github-actions bot commented Dec 13, 2022

Test Results

    3 files  ±0    28 suites  ±0   2m 33s ⏱️ ±0s
377 tests ±0  377 ✔️ ±0  0 💤 ±0  0 ±0 
438 runs  ±0  438 ✔️ ±0  0 💤 ±0  0 ±0 

Results for commit 8240859. ± Comparison against base commit 30c6517.

♻️ This comment has been updated with latest results.

@jpraynaud jpraynaud temporarily deployed to testing-preview December 13, 2022 18:13 — with GitHub Actions Inactive
@@ -252,7 +252,7 @@ impl KeyRegWrapper {
if cfg!(not(feature = "allow_skip_signer_certification")) {
Err(ProtocolRegistrationErrorWrapper::OpCertMissing)?
}
println!("WARNING: Uncertified signer regsitration by providing a Pool Id is deprecated and will be removed soon! (Pool Id: {:?})", party_id);
println!("WARNING: Uncertified signer regsitration by providing a Pool Id is decommissionned and must be used for tests only! (Pool Id: {:?})", party_id);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we put this warning directly when the signers are initialised? So, rather than warn users only when they've tried to register, if they already run the node with the "allow_skip_signer_certification", then this warning should appear, saying they won't be able to register. WDYT?

Copy link
Member Author

@jpraynaud jpraynaud Dec 16, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's difficult to know that at signer initialization if the signer will be certified or not because the feature flag allow_skip_signer_certification is applied to mithril-common. But I agree with you that this could be a good option 🤔

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ah, good point. We could put the warning with StmInitializerWrapper::setup() then. WDYT?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, I moved the warning in StmInitializerWrapper::setup() in b83300e

Copy link
Contributor

@iquerejeta iquerejeta left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changes look good. Just a minor comment on 'when' to notify the signer that their registration will not be successful except for testing.

@jpraynaud jpraynaud force-pushed the jpraynaud/621-decommission-unverified-signer-registration branch from 90061ff to b00a5cc Compare December 16, 2022 09:47
@jpraynaud jpraynaud temporarily deployed to testing-preview December 16, 2022 10:07 — with GitHub Actions Inactive
@jpraynaud jpraynaud temporarily deployed to testing-preview December 19, 2022 10:49 — with GitHub Actions Inactive
@jpraynaud jpraynaud temporarily deployed to testing-preview December 19, 2022 16:05 — with GitHub Actions Inactive
Moved to 'StmInitializerWrapper::setup()' to warn earlier in the process.
To make all tests pass in signer registerer of aggregator. This is a temporary fix.
This issue will be resolved in #663.
@jpraynaud jpraynaud force-pushed the jpraynaud/621-decommission-unverified-signer-registration branch from b83300e to fcd16bb Compare December 19, 2022 16:33
Avoid unwanted usage of features when building the artifacts from the workspace.
Split in 2 phases: tooling first and then distribution.
@jpraynaud jpraynaud force-pushed the jpraynaud/621-decommission-unverified-signer-registration branch from fcd16bb to 16cf8fe Compare December 20, 2022 08:53
@jpraynaud jpraynaud temporarily deployed to testing-preview December 20, 2022 09:01 — with GitHub Actions Inactive
Also remove the 'allow_skip_signer_certification' feature that was misused.
Use directly 'mithril-stm' as dependency in this crate to retrieve protocol types.
@jpraynaud jpraynaud temporarily deployed to testing-preview December 20, 2022 10:06 — with GitHub Actions Inactive
@jpraynaud jpraynaud merged commit 751e93d into main Dec 20, 2022
@jpraynaud jpraynaud deleted the jpraynaud/621-decommission-unverified-signer-registration branch December 20, 2022 10:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Deactivate uncertified signer registration
4 participants