This repository has been archived by the owner on Nov 15, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 2.6k
Authentication of PeerIds in authority discovery records #10317
Merged
Merged
Changes from 6 commits
Commits
Show all changes
17 commits
Select commit
Hold shift + click to select a range
4f55b6e
Consolidating test and production code
44ebe91
Signing/verifying authority discovery records with PeerId
62632a1
Merge remote-tracking branch 'origin/master' into wigy-auth-auth-disco
eadd8ab
Upgrading to libp2p 0.40
51d0fe8
libp2p::identity and sp_core::crypto Ed25519 are compatible
9202a47
Rejecting authority records unsigned by peer id can be configured
4ee7685
Fixes based on review comments
1f6d13b
No command-line argument needed
aba6745
info was still too much spam in the logs
a92ba6d
Added tests for both strict and loose validation
88e166f
Fixing based on review comments
a14ae47
Pierre preferred a signing method
47b686d
Ooops, I need to slow down
29c1d2e
Update bin/node/cli/src/service.rs
bkchr f4c5727
Reexport libp2p crypto used in sc-network
cb009e0
Added proto3 compatibility tests. And import noise.
7d45f01
Merge remote-tracking branch 'origin/master' into wigy-auth-auth-disco
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,9 +1,9 @@ | ||
Substrate authority discovery. | ||
# Substrate authority discovery | ||
|
||
This crate enables Substrate authorities to discover and directly connect to | ||
other authorities. It is split into two components the [`Worker`] and the | ||
[`Service`]. | ||
|
||
See [`Worker`] and [`Service`] for more documentation. | ||
|
||
License: GPL-3.0-or-later WITH Classpath-exception-2.0 | ||
License: GPL-3.0-or-later WITH Classpath-exception-2.0 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
IMO this should default to
true
to have new networks enabled this by default.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That would cause silent breaking for existing networks, which use
Default::default()
in theirsc-authority-discovery::Worker
instantiation. I would be more conservative here and reduce gotchas in the ecosystem.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think no one uses this, but fine.
Then we should document this in the docs of the crate?