-
Notifications
You must be signed in to change notification settings - Fork 922
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use new proposal protection format #7518
Use new proposal protection format #7518
Conversation
…proposal_protection_format
…aticlabs/prysm into use_new_proposal_protection_format
@terencechain added link to pr description |
…aticlabs/prysm into use_new_proposal_protection_format
…proposal_protection_format # Conflicts: # validator/accounts/v1/BUILD.bazel # validator/accounts/v1/account_test.go # validator/client/propose.go # validator/client/propose_protect_test.go
Codecov Report
@@ Coverage Diff @@
## master #7518 +/- ##
==========================================
- Coverage 61.83% 61.69% -0.15%
==========================================
Files 422 422
Lines 29527 29493 -34
==========================================
- Hits 18259 18196 -63
- Misses 8343 8379 +36
+ Partials 2925 2918 -7 |
|
||
for i, key := range pubKeys { | ||
proposalHistory := bitfield.Bitlist{byte(i), 0x00, 0x00, 0x00, 0x01} | ||
if err := store.SaveProposalHistoryForEpoch(context.Background(), key[:], 0, proposalHistory); err != nil { | ||
signingRoot := bytesutil.PadTo([]byte{byte(i)}, 32) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is confusing, why is the signing root the index of the pubkey ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just to have different values
Co-authored-by: Nishant Das <nishdas93@gmail.com>
…aticlabs/prysm into use_new_proposal_protection_format
…aticlabs/prysm into use_new_proposal_protection_format
…proposal_protection_format # Conflicts: # validator/client/propose_protect.go # validator/client/propose_test.go
…aticlabs/prysm into use_new_proposal_protection_format
What type of PR is this?
Feature
What does this PR do? Why is it needed?
Use the new proposal protection format in runtime
Why
As part of the effort to support slashing protection data interchange format and the need to add signing root to our protection db i have found that proposals db was built for the old slashing rule (1 proposal per epoch) since that rule changed to (1 proposal per slot) there is no benefit for saving this data on epoch context and adding complexity .
The new db structure saves proposals signing roots per slot for slashing protection.
Which issues(s) does this PR fix?
Part of #7196
data interchange format
https://hackmd.io/@sproul/Bk0Y0qdGD#Implementations