-
Notifications
You must be signed in to change notification settings - Fork 3.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Experimental EIP-4844 support #7349
Conversation
51f1ac7
to
2a492f4
Compare
Hey @protolambda! This PR has merge conflicts. Please fix them before continuing review. |
// The remaining field elements each encode 31 bytes of the remaining input data, up until the end | ||
// of the input. | ||
// | ||
// TODO: version the encoding format to allow for future encoding changes |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
// | ||
// First, field elements are encoded as big-endian uint256 in BLS modulus range. To avoid modulus | ||
// overflow, we can't use the full 32 bytes, so we write data only to the topmost 31 bytes of each. | ||
// TODO: we can optimize this to get a bit more data from the blobs by using the top byte |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
d0122ec
to
6c1cd7d
Compare
6c1cd7d
to
d2f021c
Compare
Hey @protolambda! This PR has merge conflicts. Please fix them before continuing review. |
Semgrep found 14
An action sourced from a third-party repository on GitHub is not pinned to a full length commit SHA. Pinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA helps mitigate the risk of a bad actor adding a backdoor to the action's repository, as they would need to generate a SHA-1 collision for a valid Git object payload. Ignore this finding from third-party-action-not-pinned-to-commit-sha.Semgrep found 1
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. Ignore this finding from missing-user. |
72a93cb
to
a40a24a
Compare
I am concerned the fee pricing is being overlooked here. We need to have the |
c412a13
to
bcbf0ea
Compare
Semgrep found 1
Please create a Linear ticket for this TODO. Ignore this finding from todos_require_linear. |
Co-authored-by: protolambda <proto@protolambda.com> Co-authored-by: Roberto Bayardo <bayardo@alum.mit.edu>
This PR is stale because it has been open 14 days with no activity. Remove stale label or comment or this will be closed in 5 days. |
Original rebased prototype by proto, plus changes from Roberto: - encapsulate data <-> blob conversion code, add unit tests - update 4844 code to be compatible with latest beacon node api - remove stray file, include one more invalid blob test - misc other improvements Co-authored-by: Roberto Bayardo <bayardo@alum.mit.edu>
This PR is stale because it has been open 14 days with no activity. Remove stale label or comment or this will be closed in 5 days. |
Closing in favor of #8434 |
Description
This PR depends on the L1 Dencun support changes of #8131
This implements experimental EIP-4844 DA support.
Changes:
l1CancunTimeOffset
relative to genesis)l2BlobsUpgradeTimeOffset
relative to genesis)TODO:
Tests
Adds an op-e2e test that confirms an L2 transaction is included in a safe block, on a chain with 4844 blobs as DA!