1. Jan 09, 2018
    • André Silva's avatar
      kvdb: update rust-rocksdb version (#7508) · 2d051e4f
      André Silva authored
      v1.8.6
      2d051e4f
    • Marek Kotewicz's avatar
      backports to beta (#7434) · a257827f
      Marek Kotewicz authored
      * Merge pull request #7368 from paritytech/td-future-blocks
      
      Wait for future blocks in AuRa
      
      * Fix tracing failed calls.
      
      * Problem: sending any Whisper message fails
      
      The error is "PoW too low to compete with other messages"
      
      This has been previously reported in #7144
      
      Solution: prevent the move semantics
      
      The source of the error is in PoolHandle.relay
      implementation for NetPoolHandle.
      
      Because of the move semantics, `res` variable is in fact
      copied (as it implements Copy) into the closure and for
      that reason, the returned result is always `false.
      
      * Merge pull request #7433 from paritytech/td-strict-config
      
      Strict config parsing
      
      * Problem: AuRa's unsafeties around step duration (#7282)
      
      Firstly, `Step.duration_remaining` casts it to u32, unnecesarily
      limiting it to 2^32. While theoretically this is "good enough" (at 3
      seconds steps it provides room for a little over 400 years), it is
      still a lossy way to calculate the remaining time until the next step.
      
      Secondly, step duration might be zero, triggering division by zero
      in `Step.calibrate`
      
      Solution: rework the code around the fact that duration is
      typically in single digits and never grows, hence, it can be represented
      by a much narrower range (u16) and this highlights the fact that
      multiplying u64 by u16 will only result in an overflow in even further
      future, at which point we should panic informatively (if anybody's
      still around)
      
      Similarly, panic when it is detected that incrementing the step
      counter wrapped around on the overflow of usize.
      
      As for the division by zero, prevent it by making zero an invalid
      value for step duration. This will make AuRa log the constraint
      mismatch and panic (after all, what purpose would zero step duration
      serve? it makes no sense within the definition of the protocol,
      as finality can only be achieved as per the specification
      if messages are received within the step duration, which would violate
      the speed of light and other physical laws in this case).
      
      * Merge pull request #7437 from paritytech/a5-chains-expanse
      
      Remove expanse chain
      
      * Expanse Byzantium update w/ correct metropolis difficulty increment divisor (#7463)
      
      * Byzantium Update for Expanse
      
      Here the changes go. Hope I didnt miss anything.
      
      * expip2 changes - update duration limit
      
      * Fix missing EXPIP-2 fields
      
      * Format numbers as hex
      
      * Fix compilation errors
      
      * Group expanse chain spec fields together
      
      * Set metropolisDifficultyIncrementDivisor for Expanse
      
      * Revert #7437
      
      * Add Expanse block 900_000 hash checkpoint
      
      * Advance AuRa step as far as we can and prevent invalid blocks. (#7451)
      
      * Advance AuRa step as far as we can.
      
      * Wait for future blocks.
      
      * fixed panic when io is not available for export block, closes #7486 (#7495)
      
      * Update Parity Mainnet Bootnodes (#7476)
      
      * Update Parity Mainnet Bootnodes
      
      * Replace the Azure HDD bootnodes with the new ones :)
      
      * Use https connection (#7503)
      
      Use https when connecting to etherscan.io API for price-info
      
      * Expose default gas price percentile configuration in CLI (#7497)
      
      * Expose gas price percentile.
      
      * Fix light eth_call.
      
      * fix gas_price in light client
      a257827f
    • Tomasz Drwięga's avatar
      [beta] Backport nonces reservations (#7439) · c3727266
      Tomasz Drwięga authored
      * Reserve nonces for signing (#6834)
      
      * Nonce future - reserve and dispatch
      
      * Single thread nonce tests
      
      * Track status of reserved nonces.
      
      * Initialization of nonce reservations.
      
      * Prospective Signer
      
      * Fix cli tests.
      
      * Merge pull request #7025 from paritytech/fix-nonce-reservation
      
      Fix nonce reservation
      
      * Fix build.
      c3727266
  2. Jan 04, 2018
  3. Jan 03, 2018
    • Marek Kotewicz's avatar
      Merge pull request #7438 from paritytech/beta-backports-kvdb · 849e574c
      Marek Kotewicz authored
      [beta] kvdb backports
      849e574c
    • André Silva's avatar
      Upgrade to RocksDB 5.8.8 and tune settings to reduce space amplification (#7348) · e93872e7
      André Silva authored
      * kvdb-rocksdb: update to RocksDB 5.8.8
      
      * kvdb-rocksdb: tune RocksDB options
      
      * Switch to level-style compaction
      * Increase default block size (16K), and use bigger blocks for HDDs (64K)
      * Increase default file size base (64MB SSDs, 256MB HDDs)
      * Create a single block cache shared across all column families
      * Tune compaction settings using RocksDB helper functions, taking into account
        memory budget spread across all columns
      * Configure backgrounds jobs based on the number of CPUs
      * Set some default recommended settings
      
      * ethcore: remove unused config blockchain.db_cache_size
      
      * parity: increase default value for db_cache_size
      
      * kvdb-rocksdb: enable compression on all levels
      
      * kvdb-rocksdb: set global db_write_bufer_size
      
      * kvdb-rocksdb: reduce db_write_bufer_size to force earlier flushing
      
      * kvdb-rocksdb: use master branch for rust-rocksdb dependency
      e93872e7
    • Marek Kotewicz's avatar
      Merge pull request #6720 from paritytech/kvdb_split · 61c3e1a2
      Marek Kotewicz authored
      separated kvdb into 3 crates: kvdb, kvdb-memorydb && kvdb-rocksdb
      61c3e1a2
  4. Dec 28, 2017
    • Afri Schoedon's avatar
      Beta Backports (#7297) · 54bae9a0
      Afri Schoedon authored
      * new warp enodes (#7287)
      
      * new warp enodes
      
      * added one more warp enode; replaced spaces with tabs
      
      * Bump beta to 1.8.5
      
      * Update kovan boot nodes
      
      * detect different node, same-key signing in aura (#7245)
      
      * detect different node, same-key signing in aura
      
      * reduce scope of warning
      
      * Fix Cargo.lock
      
      * Updating mainnet bootnodes.
      
      * Update bootnodes (#7363)
      
      * Updating mainnet bootnodes.
      
      * Add additional parity-beta bootnodes.
      
      * Restore old parity bootnodes and update foudation bootnodes
      v1.8.5
      54bae9a0
  5. Dec 27, 2017
  6. Dec 11, 2017
  7. Dec 08, 2017
    • Tomasz Drwięga's avatar
      [beta] Kovan HF (#7234) · 4e39c318
      Tomasz Drwięga authored and Arkadiy Paronyan's avatar Arkadiy Paronyan committed
      * Kovan HF.
      
      * Bump version.
      
      * Fix aura difficulty race (#7198)
      
      * Fix Aura difficulty race
      
      * fix test key
      
      * extract out score calculation
      
      * fix build
      
      * Update kovan HF block number.
      
      * Add missing byzantium builtins.
      
      * Bump installers versions.
      
      * Increase allowed time drift to 10s. (#7238)
      4e39c318
  8. Dec 06, 2017
  9. Dec 05, 2017
  10. Dec 04, 2017
  11. Nov 14, 2017
  12. Nov 13, 2017
  13. Nov 10, 2017
  14. Nov 03, 2017
  15. Oct 25, 2017
    • Arkadiy Paronyan's avatar
      [beta] Backports (#6891) · 1b6588cb
      Arkadiy Paronyan authored
      * v1.8.2
      
      * Refactor static context check in CREATE. (#6886)
      
      * Refactor static context check in CREATE.
      
      * Fix wasm.
      
      * Fix serialization of non-localized transactions (#6868)
      
      * Fix serialization of non-localized transactions.
      
      * Return proper SignedTransactions representation.
      
      * Allow force sealing and reseal=0 for non-dev chains. (#6878)
      v1.8.2
      1b6588cb
  16. Oct 20, 2017
    • Afri Schoedon's avatar
      Add ECIP1017 to Morden config (#6810) (#6845) · 0e4a06d0
      Afri Schoedon authored and Arkadiy Paronyan's avatar Arkadiy Paronyan committed
      * Add ECIP1017 setting to Morden config
      
      * Convert spaces to tabs
      
      * Update Morden bootnodes to match Geth
      v1.8.1
      0e4a06d0
    • Arkadiy Paronyan's avatar
      Ethstore optimizations (#6827) (#6844) · d470773f
      Arkadiy Paronyan authored
      d470773f
    • Arkadiy Paronyan's avatar
      v1.8.1 (#6843) · 8f0eb3e1
      Arkadiy Paronyan authored
      8f0eb3e1
    • Arkadiy Paronyan's avatar
      Backport #6815 and #6829 (#6837) · 48c7e4ab
      Arkadiy Paronyan authored
      * Tweaked snapshot sync threshold
      
      * Change keypath derivation logic (#6815)
      
      While the standard defined by Trezor as the default derivation path here
      https://blog.trezor.io/trezor-integration-with-myetherwallet-3e217a652e08
      says that it should be `m/44'/60'/0`, in practice they don't have an
      implementation of a wallet for Ethereum themselves and refer customers
      to MEW.
      
      MEW has a custom implementation of the path derivation logic that allows them to
      generate multiple addresses by essentially adding `/0`, `/1` etc to the path.
      
      In my initial implementation of Trezor I didn't take this into
      consideration unfortunately and just used the keypath that Trezor
      themselves recommended. However, given that it's seemingly standard
      practice to append `/0` for a "sub-address" (and this is what we've done
      for Ledger as well) it seems like a mistake on my part to not take that
      into consideration.
      
      Unfortunately, anyone who has used their Trezor device with Parity
      previously would now see a different address when they connect the
      Trezor device the next time. The only way they would have to access the
      old address is to use an old version, or by going through MEW and
      selecting the Ledger keypath.
      
      Also see #6811
      48c7e4ab
  17. Oct 19, 2017