-
Notifications
You must be signed in to change notification settings - Fork 122
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat!: key assignment checking key in use #1339
Conversation
* feat: store chain in proposal * add govHook * delete GetChainsInProposal * check proposal type * update key * feat: add query proposed chainIDs * feat: set govhook * feat: parse key * refactor: names * feat: add list proposed consumer chains * test: add e2e test * add e2e test * update comments * update ProposeConsumerChains in e2e test * remove wait for block * docs: update changelog * fix: lint * add TestParseProposedConsumerChainKey * refactor gov hook * Update proto/interchain_security/ccv/provider/v1/query.proto Co-authored-by: MSalopek <[email protected]> * update proto * add test for set kv * refactor key to be prefix_proposalID * formatting * update e2e test * format * Update x/ccv/provider/keeper/gov_hook.go Co-authored-by: Shawn <[email protected]> * Update x/ccv/provider/keeper/keeper.go Co-authored-by: Shawn <[email protected]> * Update x/ccv/provider/keeper/keeper.go Co-authored-by: Shawn <[email protected]> * fix e2e test * fix gosec * remove type url check * test: add unit test * lint * fix lint * fix err --------- Co-authored-by: MSalopek <[email protected]> Co-authored-by: Shawn <[email protected]>
…ey in use (#1279) * update GetAllValidatorsByConsumerAddr * fix test * update ValidatorConsensusKeyInUse
Production code LGTM. I will complete the memory testing. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There are changes needed.
Some context was dropped and my previous review is actually invalid. I have overlooked important details.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
https://github.com/cosmos/interchain-security/blob/main/x/ccv/provider/keeper/key_assignment.go#L374
We need to check that the chain_id
exists in the function above. Keeper.AssignConsumerKey()
already checks if the key is in use.
…ent-in-use.md Co-authored-by: Marius Poke <[email protected]>
func (k Keeper) AssignConsumerKey( | ||
ctx sdk.Context, | ||
chainID string, | ||
validator stakingtypes.Validator, | ||
consumerKey tmprotocrypto.PublicKey, | ||
) error { | ||
// check that the consumer chain is either registered or that | ||
// ConsumerAdditionProposal was voted on. | ||
if !k.CheckIfConsumerIsProposedOrRegistered(ctx, chainID) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@mpoke This is the change that prevents key assignments for non-registered consumer chains.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approve!
Thanks for refactoring this.
Please resolve conflicts before we can move to merging.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. Great work.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why is this changelog entry here?
9d49c8b
to
4a38b9a
Compare
Resolved conflicts and updated broken tests. Ready to merge. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for fixing the tests!
* feat!: store proposed chainID before voting finishes (#1289) * feat: store chain in proposal * add govHook * delete GetChainsInProposal * check proposal type * update key * feat: add query proposed chainIDs * feat: set govhook * feat: parse key * refactor: names * feat: add list proposed consumer chains * test: add e2e test * add e2e test * update comments * update ProposeConsumerChains in e2e test * remove wait for block * docs: update changelog * fix: lint * add TestParseProposedConsumerChainKey * refactor gov hook * Update proto/interchain_security/ccv/provider/v1/query.proto Co-authored-by: MSalopek <[email protected]> * update proto * add test for set kv * refactor key to be prefix_proposalID * formatting * update e2e test * format * Update x/ccv/provider/keeper/gov_hook.go Co-authored-by: Shawn <[email protected]> * Update x/ccv/provider/keeper/keeper.go Co-authored-by: Shawn <[email protected]> * Update x/ccv/provider/keeper/keeper.go Co-authored-by: Shawn <[email protected]> * fix e2e test * fix gosec * remove type url check * test: add unit test * lint * fix lint * fix err --------- Co-authored-by: MSalopek <[email protected]> Co-authored-by: Shawn <[email protected]> * fix test * feat: update GetAllValidatorsByConsumerAddr for fast find consensus key in use (#1279) * update GetAllValidatorsByConsumerAddr * fix test * update ValidatorConsensusKeyInUse * update changelog * Update proto/interchain_security/ccv/provider/v1/query.proto * Update x/ccv/provider/keeper/gov_hook.go * Update x/ccv/provider/keeper/keeper.go * Update x/ccv/provider/keeper/keeper.go * Update x/ccv/provider/keeper/keeper.go * fix gov hooks * fix bug and add tests * finish unit testing of consu addition legacy prop getter * nit * update changelog * lint * update changelog entry * Update .changelog/unreleased/features/provider/1339-check-key-assignment-in-use.md Co-authored-by: Marius Poke <[email protected]> * fix #1282 * remove todos and update doc * tests: fix broken unit tests * tests: fix broken integration test consumer registration * tests: update names --------- Co-authored-by: MSalopek <[email protected]> Co-authored-by: Shawn <[email protected]> Co-authored-by: Simon Noetzlin <[email protected]> Co-authored-by: Marius Poke <[email protected]>
Description
Closes: #1282, #603
This PR is state-breaking!
Author Checklist
All items are required. Please add a note to the item if the item is not applicable and
please add links to any relevant follow up issues.
I have...
!
to the type prefix if state-machine breaking change (i.e., requires coordinated upgrade)CHANGELOG.md
Reviewers Checklist
All items are required. Please add a note if the item is not applicable and please add
your handle next to the items reviewed if you only reviewed selected items.
I have...
!
in the type prefix if API or client breaking change