-
Notifications
You must be signed in to change notification settings - Fork 88
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cluster/manifest: refactor to 65 byte k1 sigs #2468
Conversation
Codecov ReportPatch coverage:
Additional details and impacted files@@ Coverage Diff @@
## main #2468 +/- ##
==========================================
- Coverage 53.83% 53.68% -0.15%
==========================================
Files 198 198
Lines 26501 26660 +159
==========================================
+ Hits 14267 14313 +46
- Misses 10474 10565 +91
- Partials 1760 1782 +22
☔ View full report in Codecov by Sentry. |
if err != nil { | ||
return errors.Wrap(err, "operator node signature check") | ||
} | ||
// verifyNodeSignatures returns true an error if the node signatures field is not correctly |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
// verifyNodeSignatures returns true an error if the node signatures field is not correctly | |
// verifyNodeSignatures returns an error if the node signatures field is not correctly |
} | ||
} | ||
|
||
return nil | ||
} | ||
|
||
// verifyBuilderRegistrations returns an error if populated builder registrations from json are invalid. | ||
// verifyBuilderRegistrations returns an error if the populated builder registrations are invalid. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
// verifyBuilderRegistrations returns an error if the populated builder registrations are invalid. | |
// verifyBuilderRegistrations returns an error if the builder registrations are not correctly | |
// populated or otherwise invalid. |
if def.Version != "v1.6.0" && def.Version != "v1.7.0" { | ||
return errors.New("only v1.6.0 and v1.7.0 cluster definition version supported") | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why do we need to enforce this?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
because it fails for earlier versions
// Assert Deposit Data | ||
require.EqualValues(t, val.PubKey, val.DepositData.PubKey) | ||
require.EqualValues(t, 32_000_000_000, val.DepositData.Amount) | ||
|
||
if !cluster.SupportPregenRegistrations(lock.Version) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can we have similar verification for node signatures as well?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yes I added that
Refactor manifest K1 sigs to 65 bytes to align with Ethereum standard.
Also improve cluster lock signature verification.
Also fix DKG to respect v1.6.0 config and not support earlier versions.
category: refactor
ticket: none