Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dev upgrade Merge from Auditing Change #418

Merged
merged 36 commits into from Feb 5, 2024
Merged

Dev upgrade Merge from Auditing Change #418

merged 36 commits into from Feb 5, 2024

Conversation

liam-lai
Copy link
Collaborator

@liam-lai liam-lai commented Feb 4, 2024

Proposed changes

Merge all the auditing change and deployment improvement.

fea90a9 (HEAD -> dev-upgrade, origin/dev-upgrade) RIN-02 Panic Due to Integer Overflow in Signature Size Calculation (#401)
95e108c fix: limit the max size of lending item extradata can be inside the t… (#405)
b4d842b chore: remove unnecessary order.status assignment (#407)
976dd79 chore: remove redunant nil check (#408)
326a8c8 fix: Fix Potential Index Out of Bound (#409)
0664e9f chore: remove the unused false return value from GetCollaterals method (#410)
d70c156 chore: remove the unused method in ringct.go (#411)
cac03bd fix: GenNewKeyRing should return out of bound error if s and ring size equal in value (#412)
743fc85 chore: return statement optimization (#406)
a3c392c Fix xdcx infinite recursive calls (#404)
2504961 fix: replace all time.after with the time.newtimer (#400)
0d7dd86 Merge pull request #402 from gzliudan/XDP-02
7403063 Merge pull request #403 from gzliudan/fix-func-PadTo32Bytes
ffa38cd fix bug and eliminate loop in func PadTo32Bytes
e097f2b remove key with empty value from map txs in func NewOrderTransactionByNonce
559bb4f Merge pull request #394 from XinFinOrg/xds-01-fixing-rpc-module
513114d Merge pull request #398 from XinFinOrg/XDC-01
ddac0a6 Merge pull request #399 from XinFinOrg/xdp-01
71c4425 chore: log the error object
786e379 (origin/xdp-01) fix: remove unnecessary assignment
7f02151 (origin/xds-01-fixing-rpc-module) fix: update rpc module to include eth fix from ethereum#26064 and ethereum#26723
9bb8c8c XDP-03 (#396)
aaa246f PDF-01 (#397)
81ff642 fix Panic In ProcessOrderPending Leads To Chain Halt (#392)
d4b9806 (origin/XDC-01) crypto/bn256/cloudflare: fix asm for dynamic linking (ethereum#24476)
af8c4d4 crypto/cloudflare/bn256: fix in-place addition and unmarshalling (ethereum#23419)
3a6e26b crypto/bn256: improve bn256 fuzzer (ethereum#21815)
c48e987 crypto/bn256/cloudflare: checks for nil pointers in Marshal functions (ethereum#19609)
3d635c5 crypto/secp256k1: add checking z sign in affineFromJacobian (ethereum#18419)
a76c885 devnet deployment issue (#395)
c36df9f Merge pull request #393 from XinFinOrg/fix-timeout-too-fast
3e6ce89 (origin/fix-timeout-too-fast, fix-timeout-too-fast) fix timeout too fast issue
d24f187 Host rpc node in ecs (#391)
3225467 Merge pull request #370 from gzliudan/fix-issue-369
ded4e0f fix nil Error in func reportBlock (#369)

Types of changes

What types of changes does your code introduce to XDC network?
Put an in the boxes that apply

  • Bugfix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • Documentation Update (if none of the other choices apply)
  • Regular KTLO or any of the maintaince work. e.g code style
  • CICD Improvement

Impacted Components

Which part of the codebase this PR will touch base on,

Put an in the boxes that apply

  • Consensus
  • Account
  • Network
  • Geth
  • Smart Contract
  • External components
  • Not sure (Please specify below)

Checklist

Put an in the boxes once you have confirmed below actions (or provide reasons on not doing so) that

  • This PR has sufficient test coverage (unit/integration test) OR I have provided reason in the PR description for not having test coverage
  • Provide an end-to-end test plan in the PR description on how to manually test it on the devnet/testnet.
  • Tested the backwards compatibility.
  • Tested with XDC nodes running this version co-exist with those running the previous version.
  • Relevant documentation has been updated as part of this PR
  • N/A

gzliudan and others added 30 commits December 5, 2023 20:29
Fix nil Error in function reportBlock
Co-authored-by: Liam Lai <liamlai@Liams-Laptop.local>
…#18419)

The z == 0 check is hit whenever we Add two points with the same x1/x2
coordinate. crypto/elliptic uses the same check in their affineFromJacobian
function. This change does not affect block processing or tx signature verification
in any way, because it does not use the Add or Double methods.
…ethereum#19609)

* Added checks for nil pointers in Marshal functions

* Set nil pointer to identity in GT before marshaling
* crypto/cloudflare: fix nil deref in random G1/G2 reading

* crypto/bn256: improve fuzzer

* crypto/bn256: fix some flaws in fuzzer
When using -buildmode=shared, R15 is clobbered by a global variable
access; use a different register instead.

Fixes: ethereum#24439
Co-authored-by: Liam Lai <liamlai@Liams-Laptop.local>
* replace deprecated ioutil lib calls

* fix for FileInfo type required

* fix for ioutil.Discard

* fix .Discard

* fix for go-bindata generated files
* add error catching skeleton

* add debug logs

* change to Warn level log

* change to Warn level 2

* verbose logging
fix: remove unnecessary assignment
XDC-01 | Potential Missed Fixings in `crypto` Module
fix bug and eliminate loop in func PadTo32Bytes
remove key with empty value from map txs in function NewOrderTransactionByNonce
* fix: Make the unused methods in leveldb.go in XDCxDAO to panic or return error if called

* fix: apply the same fix in mongodb of the XDCxDAO as well
wjrjerome and others added 5 commits January 29, 2024 11:31
#405)

* fix: limit the max size of lending item extradata can be inside the trading and lending transactions

* chore: add comment for the MaxLendingExtraDataSize constant
)

* RIN-02 Panic Due to Integer Overflow in Signature Size Calculation

* assert the error

* simply overflow check

* simply overflow check

---------

Co-authored-by: Liam Lai <liam.lai@datameshgroup.com>
Co-authored-by: wjrjerome <wjrjerome@babylonchain.io>
@liam-lai liam-lai merged commit d31552b into master Feb 5, 2024
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

9 participants