Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

validator remove, and fix unauthorized leave #378

Merged
merged 2 commits into from
Nov 6, 2023
Merged

Conversation

jchappelow
Copy link
Member

@jchappelow jchappelow commented Nov 3, 2023

Resolves both #377 and #365

No integration tests for the remove process, but it works in manual testing.

Both changes are important for release, but especially. #377

@jchappelow jchappelow added this to the v0.6.0 milestone Nov 6, 2023

// upgradeValidatorsDBfrom1To2 upgrades the validators db from version 1 to 2.
// Just create the removals table and bump the version.
func (vs *validatorStore) upgradeValidatorsDBfrom1To2(ctx context.Context) error {
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

since we will likely have breaking changes (given the proposed auth changes), should we just consider this a totally new version and break the old one?

Other things will have to break anyways, so it seems like it may just be easier to still consider this a v1.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are all existing deployments running at v1 certainly going to be wiped?

We can certainly scrub this upgradeValidatorsDBfrom1To2, but that makes the existing upgradeValidatorsDBfrom0To1 incorrect and we'd actually have to move the sqlInitRemovalsTableV2 execution into that previous upgrade. That can be done, but I think that's not generally beneficial, and it ends up being more complicated. It also breaks the upgrade tests established for that v0 -> v1 update and we'd need to regenerate test data.

There were also some issues with the general upgrade framework that are sorted though, so it feels like a good test of it all anyway.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Gotcha. Yeah, all deployments will likely have to be wiped. Mostly b/c it looks like we will likely pursue some sort of identity approach that allows EVM users to use just their addresses, instead of having to recover their public keys. This is a pretty large change, since EVM users are the default users.

@brennanjl brennanjl merged commit 2000bb3 into main Nov 6, 2023
2 checks passed
@brennanjl brennanjl deleted the validator-remove branch November 6, 2023 20:33
brennanjl pushed a commit that referenced this pull request Feb 26, 2024
* authorized leave

* remove validator
brennanjl pushed a commit that referenced this pull request Feb 26, 2024
* authorized leave

* remove validator
jchappelow added a commit that referenced this pull request Feb 26, 2024
* authorized leave

* remove validator
brennanjl pushed a commit that referenced this pull request Feb 26, 2024
* authorized leave

* remove validator
brennanjl pushed a commit that referenced this pull request Feb 26, 2024
* authorized leave

* remove validator
brennanjl pushed a commit that referenced this pull request Feb 26, 2024
* authorized leave

* remove validator
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants