Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature/set431 global whitelist contracts #1695

Conversation

rodion-lim-partior
Copy link
Contributor

[ADDED] quorum global whitelist into enhanced permissioning contracts
[ADDED] quorum global whitelist API function
[ADDED] quorum global whitelist checks during state transitions
[UPDATED] upgrade solidity version from 0.5 to 0.8

feat: SET-315 fix generating uuid requiring admin account
…emory-leak

fix: memory leak from policy registration (Consensys#1660)
This updates the no-cgo implementations in the crypto package to use
the github.com/btcsuite/btcd/btcec/v2 module instead of the older btcec
package that was part of the main github.com/btcsuite/btcd module.

name                   old time/op  new time/op  delta
EcrecoverSignature-32   198µs ± 0%   144µs ± 0%  -27.11%
VerifySignature-32      177µs ± 0%   128µs ± 0%  -27.44%
DecompressPubkey-32    20.9µs ± 0%  10.1µs ± 0%  -51.51%

Use (*ModNScalar).IsOverHalfOrder instead of math/big.Int when checking
for malleable signatures.
* Use loaded rpc modules to deduce which consensus algorithm is running.
* Previous use of nodeInfo isn't valid anymore as those fields were
  removed in Geth 1.10 and the protocol manager that ensured the
  field is set doesn't exist anymore
This is the initial step for support of Solidity errors in contract bindings.
As of this change, errors can be decoded, but are not supported in
bindings yet.

Closes #23157
@CLAassistant
Copy link

CLAassistant commented Mar 11, 2024

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you all sign our Contributor License Agreement before we can accept your contribution.
5 out of 7 committers have signed the CLA.

✅ rodion-lim-partior
✅ vdamle
✅ NickSneo
✅ hhsel
✅ antonydenyer
❌ anthony-yeong-partior
❌ chappjc
You have signed the CLA already but the status is still pending? Let us recheck it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

9 participants