Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

registry: bug fixes #2600

Merged
merged 5 commits into from
Jan 27, 2020
Merged

registry: bug fixes #2600

merged 5 commits into from
Jan 27, 2020

Conversation

Yawning
Copy link
Contributor

@Yawning Yawning commented Jan 27, 2020

Fixes #2058
Fixes #2598
Fixes #2599

This change is breaking as the old certificates are no longer supported,
and they must be regenerated.  Note that this uses the slower runtime
library ed25519 implementation instead of ours due to runtime library
limitations.
@Yawning Yawning added p:0 Priority: High! bugs, address immediately c:registry Category: entity/node/runtime registry service c:breaking/consensus Category: breaking consensus changes c:security Category: security sensitive labels Jan 27, 2020
@Yawning Yawning self-assigned this Jan 27, 2020
To ensure that nodes demonstrate proof that they posess the private keys
for all public keys contained in their descriptor, node descriptors now
must be signed by the node, consensus, p2p and TLS certificate key.

Note: Node descriptors generated prior to this change are now invalid and
will be rejected.
@Yawning Yawning marked this pull request as ready for review January 27, 2020 09:32
@Yawning Yawning force-pushed the yawning/fix/sigset branch from 2e7209b to c497227 Compare January 27, 2020 09:33
go/registry/api/api.go Outdated Show resolved Hide resolved
go/registry/api/api.go Outdated Show resolved Hide resolved
@Yawning Yawning force-pushed the yawning/fix/sigset branch from c497227 to 351983a Compare January 27, 2020 09:43
The dump/restore process requires this to be permitted as expired
registrations are persisted through an entity's debonding period.
@Yawning Yawning force-pushed the yawning/fix/sigset branch from 351983a to cab8294 Compare January 27, 2020 10:01
@codecov
Copy link

codecov bot commented Jan 27, 2020

Codecov Report

Merging #2600 into master will increase coverage by 0.12%.
The diff coverage is 78.31%.

Impacted file tree graph

@@            Coverage Diff             @@
##           master    #2600      +/-   ##
==========================================
+ Coverage   63.28%   63.41%   +0.12%     
==========================================
  Files         357      357              
  Lines       33474    33671     +197     
==========================================
+ Hits        21185    21353     +168     
- Misses       9689     9711      +22     
- Partials     2600     2607       +7
Impacted Files Coverage Δ
go/registry/api/sanity_check.go 61.9% <ø> (ø) ⬆️
go/consensus/tendermint/apps/registry/genesis.go 53.04% <100%> (ø) ⬆️
...n/crypto/signature/signers/memory/memory_signer.go 71.42% <100%> (+2.19%) ⬆️
go/common/identity/identity.go 73.07% <100%> (ø) ⬆️
.../consensus/tendermint/apps/registry/state/state.go 77.81% <100%> (ø) ⬆️
go/consensus/tendermint/apps/registry/registry.go 65.65% <100%> (ø) ⬆️
go/oasis-node/cmd/debug/byzantine/registry.go 85.45% <100%> (+2.84%) ⬆️
go/oasis-node/cmd/genesis/genesis.go 51.05% <100%> (ø) ⬆️
go/common/crypto/tls/cert.go 62.85% <100%> (ø) ⬆️
go/oasis-node/cmd/registry/entity/entity.go 44.01% <16.66%> (-0.58%) ⬇️
... and 22 more

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 4fae67d...cab8294. Read the comment docs.

@Yawning Yawning merged commit 2008e5f into master Jan 27, 2020
@Yawning Yawning deleted the yawning/fix/sigset branch January 27, 2020 10:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
c:breaking/consensus Category: breaking consensus changes c:registry Category: entity/node/runtime registry service c:security Category: security sensitive p:0 Priority: High! bugs, address immediately
Projects
None yet
3 participants