Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat!: add claim_public_key to sidechain features #5619

Merged

Conversation

sdbondi
Copy link
Member

@sdbondi sdbondi commented Aug 8, 2023

Description

Add claim public key to validator node registration

Motivation and Context

This claim key is informational and will be used in L2 to restrict fee claims to a particular signing key

How Has This Been Tested?

Existing tests

What process can a PR reviewer use to test or verify this change?

Run register validator node wallet command

Breaking Changes

  • None
  • Requires data directory on base node to be deleted
  • Requires hard fork
  • Other - Please specify

@github-actions
Copy link

github-actions bot commented Aug 8, 2023

Test Results (CI)

1 200 tests   1 200 ✔️  10m 29s ⏱️
     38 suites         0 💤
       1 files           0

Results for commit 83cb39b.

♻️ This comment has been updated with latest results.

@ghpbot-tari-project ghpbot-tari-project added P-acks_required Process - Requires more ACKs or utACKs P-reviews_required Process - Requires a review from a lead maintainer to be merged labels Aug 8, 2023
@github-actions
Copy link

github-actions bot commented Aug 8, 2023

Test Results (Integration tests)

  2 files  +  2  11 suites  +11   13m 22s ⏱️ + 13m 22s
27 tests +27  26 ✔️ +26  0 💤 ±0  1 +1 
28 runs  +28  27 ✔️ +27  0 💤 ±0  1 +1 

For more details on these failures, see this check.

Results for commit 83cb39b. ± Comparison against base commit 45c20a3.

♻️ This comment has been updated with latest results.

Copy link
Contributor

@brianp brianp left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM utAck

I'm wondering how much stuff is being duplicated between the layers and if maybe things like constructing the challenge should come from an L2 lib, included into L1?

@ghpbot-tari-project ghpbot-tari-project removed the P-reviews_required Process - Requires a review from a lead maintainer to be merged label Aug 9, 2023
@sdbondi
Copy link
Member Author

sdbondi commented Aug 10, 2023

Yup agree, but the other way round - L2 depends on tari base libs in this repo. In this case it's ok because we reuse the ValidatorNodeSignature abstraction in L2. I would like a library of shared signature types and hash domains, mainly to avoid depending on the whole tari_core crate just for 1/2 hash domains.

@sdbondi sdbondi changed the base branch from development to feature-dan2 September 8, 2023 08:43
@stringhandler stringhandler merged commit 4bdd364 into tari-project:feature-dan2 Sep 8, 2023
13 of 14 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
P-acks_required Process - Requires more ACKs or utACKs
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants