- Apr 23, 2020
-
-
Chevdor authored
* Fix error message when providing an incorrect peer-id * Fix error message to cover all cases Co-authored-by: Pierre Krieger <[email protected]>
-
Alexander Popiak authored
-
Arkadiy Paronyan authored
-
Dan Forbes authored
-
Hoani Bryson authored
Co-Authored-By: thiolliere <[email protected]>
-
Nikolay Volf authored
-
Bastian Köcher authored
-
Ashley authored
-
Svyatoslav Nikolsky authored
-
Nikolay Volf authored
-
Benjamin Kampmann authored
-
Nikolay Volf authored
-
Max Inden authored
* client/network-gossip/src/state_machine: Add unit test for on_incoming Add two unit tests to ensure `on_incoming` is ingoring discarded messages and reports and ignores messages from unknown peers. * client/network-gossip/state_machine: Reduce indentation level * client/network-gossip/bridge: Remove unnecessary into_iter * client/network-gossip/state_machine: Report success after register check * client/network-gossip/state_machine: Error not report on unregistered `peers` contains all the peers we're connected to. If we receive a message from a peer not in this list, that means there's an internal problem within the local client. It's not the fault of the peer in question. With the above in mind instead of reducing the reputation of such peer, log an error.
-
Toralf Wittner authored
* network: Only insert global addresses into the DHT. Currently every address reported via libp2p-identify is inserted into the DHT which thus contains a multitude of unreachable addresses such as from 127.0.0.0/8 or 10.0.0.0/8. Issue #5099 suggested a dedicated service over UDP to gauge the reachability of an address, which would however incur extra I/O costs and be of limited use. As an alternative and simpler tactic, this PR only allows global IP addresses to be inserted into the DHT unless an explicit command-line flag `--allow-non-global-addresses-in-dht` is given or a node is started with `--dev`. This opt-in behaviour is meant to allow site-local networks to still make use of a DHT. * Enable non-global in more test setups. * Replace command-line option with different name. * Another test fix.
-
André Silva authored
* slots: extract slot lenience from babe and aura * slots: add tests for slot lenience * slots: fix comment in test
-
- Apr 22, 2020
-
-
Ashley authored
* Fix the browser tests * Mistyping * Fix warnings Co-authored-by: Pierre Krieger <[email protected]>
-
Bastian Köcher authored
-
Kian Paimani authored
* enum Pays for PaysFee * Fix doc test * Update bin/node/executor/tests/basic.rs * Update bin/node/executor/tests/basic.rs
-
Pierre Krieger authored
* Enable yamux flow control by default * Tweak description * Apply suggestions from code review
-
Pierre Krieger authored
* Add a protocol that answers finality proofs * Fix documentation * Use Toggle
-
Pierre Krieger authored
* Send a status message on block announce handshake * Make sure to send the handshake to all handlers
-
Kian Paimani authored
* Migrate away from SimpleDispatchInfo * Fix imports * Better doc * Update lib.rs Co-authored-by: Shawn Tabrizi <[email protected]>
-
- Apr 21, 2020
-
-
Pierre Krieger authored
-
pscott authored
* Remove TaskManagerBuilder * Clean up use declaration fo SpawnTaskHandle Co-Authored-By: Pierre Krieger <[email protected]> Co-authored-by: Pierre Krieger <[email protected]>
-
Bastian Köcher authored
* Require `fn` token in `decl_storage` `get` The `fn` token was already for quite some time as an optional parameter. It was introduced to make these functions better findable. This pr makes the `fn` token required. * Remove `GetterNoFnkeyword`
-
Rakan Alhneiti authored
* New approach to offchain signing. * Use in im-online * Rewrite to use Account<T> * DRY signing. * Implement send_raw_unsigned_transaction * WiP * Expunge LocalCall * Expunge LocalCall * Fix compilation. * Solve call. * Make it compile again. * Finalize implementation. * Change CreateTransaction * Clear CreateTransaction. * Add price payload * Send raw transaction * Submit signed payload / unsigned transaction (WIP) * Supertrait requirements on T::Signature * Validate signature of payload on an unsigned transaction * Fix encoding - part 1 * Make it compile. * Fix compilation of unsigned validator. * Pass price payload to the transaction * Make block number part of the signed payload * Send signed transaction * Implement all_accounts, any_account * Fix formatting * Implement submit_transaction * Submit signed transaction (ForAll, ForAny) * Fix formatting * Implement CreateSignedTransaction * Move sign and verify to AppCrypto * Sign transaction * Call `use_encoded` * Remove SubmitAndSignTransaction * Implement runtime using new SigningTypes * Adapt offchain example to changes * Fix im-online pallet * Quick fix: rename AuthorityId2 * Fix offchain example tests * Add a comment on why keystore is required in unsigned transaction test * Use UintAuthorityId instead of u64 * WIP * Remove IdentifyAccount from UintAuthorityId * Implement PublicWrapper type * Fix im-online tests * Fix runtime test * Bump spec version * Fix executor tests * Rename ImOnlineAuthId -> ImOnlineAuthorityId and formatting * Fix merge * Documentation * Revert u64 -> UintAuthorityId conversion * Fix string errors * Document public members in offchain module * Introduce SubmitTransaction * Update pallets to use SubmitTransaction * WIP * Use SubmitTransaction in offchain * Use `submit_unsigned_transaction` * Fix tests * Update docs * Remove SigningTypes requirement from `SendTransactionTypes` * Fix tests * Update frame/system/src/offchain.rs Co-Authored-By: Kian Paimani <[email protected]> * Update frame/system/src/offchain.rs Co-Authored-By: Kian Paimani <[email protected]> * Update frame/example-offchain-worker/src/tests.rs Co-Authored-By: Kian Paimani <[email protected]> * Update frame/system/src/offchain.rs Co-Authored-By: Kian Paimani <[email protected]> * Update frame/system/src/offchain.rs Co-Authored-By: Kian Paimani <[email protected]> * Remove leftover from previous iterations * Change enum to struct * Remove public * Move mock to node/executor/tests * Cleanup test-helpers * Make `application-crypto` `std` feature internal The macros should not generate code that requires that the calling crate has a feature with the name `std` defined. * Revert cargo lock update * Use TestAuthorityId from common * Restore members of account to public * Tidy up imports * Fix benchmarking pallet * Add tests demonstrating ForAll, ForAny on signer * Move definition of AppCrypto in example-offchain-worker from tests to mod::crypto * Cleanup stray comment * Fix ValidTransaction * Re-fix CreateSignedTransaction * Address PR feedback * Add can_sign method to signer * Propagate error * Improve documentation * Fix vec! macro not available * Document SendTransactiontypes * Add some docs. * Split signing examples * Add tests for signing examples * WIP can_sign - PR feedback * WIP * Split for_any / for_all into different calls * Verify payload and signature in test * Fix can_sign implementation * Fix impl_version * Import Box from sp_std * Create issues for TODOs * Ignore doctest. * Add test directly to system. Adjust UintTypes. * Add some tests to account filtering. * Remove code samples and point to example offchain worker * Fix doc links * Fix im-online tests using signatures. Co-authored-by: Tomasz Drwięga <[email protected]> Co-authored-by: Kian Paimani <[email protected]> Co-authored-by: Bastian Köcher <[email protected]>
-
Max Inden authored
Expose the amount of addresses that are passed from the authority discovery module down to the network peer set manager as a priority group in order to connect to the corresponding nodes. ``` authority_discovery_priority_group_size 10 ```
-
Joshy Orndorff authored
-
Pierre Krieger authored
-
- Apr 20, 2020
-
-
Max Inden authored
* client/network-gossip: Move sink IO outside of state_machine `ConsensusGossip` is supposed to be a deterministic state machine. `GossipEngine` wrapping `ConsensusGossip` should handle IO operations. This commit moves the `message_sink` IO operations to `GossipEngine`. More specifically on incoming messages a `GossipEngine` calls `ConsensusGossip::on_incoming` to validate and register the messages. `ConsensusGossip` returns the valid messages which are then forwarded by `GossipEngine` to the upper layer via the `message_sinks`. * client/network-gossip: Adjust and extend tests * Update client/network-gossip/src/bridge.rs Co-authored-by: Benjamin Kampmann <[email protected]>
-
Yuanchao Sun authored
* Add RPC function state_getProof, resolves #1110 * Apply suggestions from code review * Update client/rpc/src/state/state_full.rs Co-Authored-By: Bastian Köcher <[email protected]> * Update Cargo.lock * Make block hash optional * Wrap StorageProof as Bytes * Add struct ReadProof * Fix typo Co-authored-by: Bastian Köcher <[email protected]>
-
Vladimir Komendantskiy authored
-
cheme authored
Co-Authored-By: thiolliere <[email protected]>
-
Shawn Tabrizi authored
* impl try_mutate for storage value and storage double map * Docs + Reuse `try_mutate` in `mutate`
-
Ashley authored
Co-Authored-By: Pierre Krieger <[email protected]>
-
Bastian Köcher authored
* Improve tracing implementation * Enable tracing in runtime interfaces * Switch to `TRACE` level
-
Pierre Krieger authored
-
thiolliere authored
-
Jaco Greeff authored
* Pass max-total to RewardRemainder on end_era * add test and event * add doc Co-authored-by: thiolliere <[email protected]>
-
Igor Matuszewski authored
* sc-cli: Use type-safe constructors for RPC/Prometheus interfaces * service: Simplify rpc handler creation Could probably be further simplifies once [this][commit] lands. [commit]: https://github.com/paritytech/jsonrpc/commit/20485387ed06a48f1a70bf4d609a7cde6cf0accf * service: Streamline some HTTP & WS server start logic * client: Introduce a simple RPC policy mechanism * rpc/system: Check unsafe RPCs * rpc/offchain: Check unsafe RPCs * rpc/author: Check unsafe RPCs
-