-
Notifications
You must be signed in to change notification settings - Fork 2.6k
Support for multiple signature scheme for BEEFY primitves #14373
Support for multiple signature scheme for BEEFY primitves #14373
Conversation
…support from old pull to current code
…ives - Fix remaining crypto -> ecdsa_crypto - code build but not tests
…ent`. - Remove apk proof keyset_commitment from `BeefyAuthoritySet`. - Fix failing signed commitment and signature to witness test. - Make client compatible with BeefyAPI generic on AuthorityId. - `crypto` → `ecdsa_crypto` in BEEFY client and frame.
…gnature-scheme-beefy-primitves
…gnature-scheme-beefy-primitves
…gnature-scheme-beefy-primitves
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Everything looks good, except single question below.
Probably at some point you'll need to embed this key type in the keys used by some node (in SessionKeys here). This is used to generate new keys "on demand" via the BTW, to add a key type there you need to implement the As a reference see the bandersnatch-vrf PR here: substrate/primitives/application-crypto/src/bandersnatch.rs Lines 32 to 57 in bdd3df4
|
…c/lib.rs Co-authored-by: Davide Galassi <davxy@datawok.net>
- Make new `BeeyApi` functinos also generic over AuthorityId and Signature
…ttps://github.com/w3f/substrate into skalman-multiple-signature-scheme-beefy-primitves
…ives and bls crypto. - CamelCase ECDSA and BLS everywhere.
Hmm, I did but you removed them for some reason. I can bring them back if you think they are OK. |
@drskalman we don't require to implement the full set of methods because most of them require host functions support ( Unfortunately, working on analoguous code for introducing bandersnatch-vrf, I noticed that if you want to use the key as part of the session keys set then you require to implement at least the Now, as you can see from the snip I've shared, I just implemented the
|
…pto.rs` according to new convention.
- Add `bls-experimental` to `sp-io` Does not compile because PassByCodec can not derive PassBy using customly implemented PassByIner.
@davxy : It seems that
Should we also manually implement |
… skalman-multiple-signature-scheme-beefy-primitves
I think I addressed all the new ones. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm. just minor nits
Co-authored-by: André Silva <123550+andresilva@users.noreply.github.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm - one comment re. consistency on path forward wrt. host functions.
bot merge |
Error: Github API says "Allow edits from maintainers" is not enabled for paritytech/polkadot#7562. The bot would use that permission to push the lockfile update after merging this PR. Please check https://docs.github.com/en/github/collaborating-with-pull-requests/working-with-forks/allowing-changes-to-a-pull-request-branch-created-from-a-fork. |
@drskalman apparently you have to enable "allow edits from maintainers" in your polkadot PR |
there seems to be a known GH issue that still hasn't been solved, which prevents "allow edits from maintainers" to be engaged on our end: https://github.com/orgs/community/discussions/5634 Have you ever managed to bypass this problem ? |
cc @paritytech/ci |
bot merge |
Error: "Check reviews" status is not passing for paritytech/polkadot#7572 |
bot merge |
This is a subset of the changes introduced by Pull request #13311 which tends to enable BEEFY to support more than one signature scheme at the time in order to accommodate various bridged chains. This is only the changes needed in
primitives/consensus/beefy
while keeping the current client backward compatible in order to facilitate reviewing and merging.polkadot companion: paritytech/polkadot#7572
cumulus companion: paritytech/cumulus#2962