good morning!!!!

Skip to content
Snippets Groups Projects
  1. Dec 10, 2020
  2. Dec 09, 2020
    • Felix Lange's avatar
      p2p/enode: avoid crashing for invalid IP (#21981) · 817a3fb5
      Felix Lange authored
      The database panicked for invalid IPs. This is usually no problem
      because all code paths leading to node DB access verify the IP, but it's
      dangerous because improper validation can turn this panic into a DoS
      vulnerability. The quick fix here is to just turn database accesses
      using invalid IP into a noop. This isn't great, but I'm planning to
      remove the node DB for discv5 long-term, so it should be fine to have
      this quick fix for half a year.
      
      Fixes #21849
      817a3fb5
    • Felix Lange's avatar
      crypto/signify, build: fix archive signing with signify (#21977) · f935b1d5
      Felix Lange authored
      This fixes some issues in crypto/signify and makes release signing work.
      
      The archive signing step in ci.go used getenvBase64, which decodes the key data.
      This is incorrect here because crypto/signify already base64-decodes the key.
      f935b1d5
    • Martin Holst Swende's avatar
    • Martin Holst Swende's avatar
      core,les: headerchain import in batches (#21471) · 40b6ccf3
      Martin Holst Swende authored
      
      * core: add test for headerchain inserts
      
      * core, light: write headerchains in batches
      
      * core: change to one callback per batch of inserted headers + review concerns
      
      * core: error-check on batch write
      
      * core: unexport writeHeaders
      
      * core: remove callback parameter in InsertHeaderChain
      
      The semantics of InsertHeaderChain are now much simpler: it is now an
      all-or-nothing operation. The new WriteStatus return value allows
      callers to check for the canonicality of the insertion. This change
      simplifies use of HeaderChain in package les, where the callback was
      previously used to post chain events.
      
      * core: skip some hashing when writing headers
      
      * core: less hashing in header validation
      
      * core: fix headerchain flaw regarding blacklisted hashes
      
      Co-authored-by: default avatarFelix Lange <fjl@twurst.com>
      40b6ccf3
  3. Dec 08, 2020
    • Li, Cheng's avatar
      common: improve printing of Hash and Address (#21834) · bd848aad
      Li, Cheng authored
      
      Both Hash and Address have a String method, which returns the value as
      hex with 0x prefix. They also had a Format method which tried to print
      the value using printf of []byte. The way Format worked was at odds with
      String though, leading to a situation where fmt.Sprintf("%v", hash)
      returned the decimal notation and hash.String() returned a hex string.
      
      This commit makes it consistent again. Both types now support the %v,
      %s, %q format verbs for 0x-prefixed hex output. %x, %X creates
      unprefixed hex output. %d is also supported and returns the decimal
      notation "[1 2 3...]".
      
      For Address, the case of hex characters in %v, %s, %q output is
      determined using the EIP-55 checksum. Using %x, %X with Address
      disables checksumming.
      
      Co-authored-by: default avatarFelix Lange <fjl@twurst.com>
      bd848aad
    • Marius van der Wijden's avatar
      accounts/abi/bind: allow specifying signer on transactOpts (#21356) · ed0670cb
      Marius van der Wijden authored
      This commit enables users to specify which signer they want to use while creating their transactOpts.
      Previously all contract interactions used the homestead signer. Now a user can specify whether they
      want to sign with homestead or EIP155 and specify the chainID which adds another layer of security.
      
      Closes #16484
      ed0670cb
    • Steve Ruckdashel's avatar
      crypto/secp256k1: add workaround for go mod vendor (#21735) · 6a4e7300
      Steve Ruckdashel authored
      Go won't vendor C files if there are no Go files present in the directory.
      Workaround is to add dummy Go files.
      
      Fixes: #20232
      6a4e7300
  4. Dec 07, 2020
  5. Dec 04, 2020
    • Martin Holst Swende's avatar
      cmd/geth: implement vulnerability check (#21859) · 15339cf1
      Martin Holst Swende authored
      
      * cmd/geth: implement vulnerability check
      
      * cmd/geth: use minisign to verify vulnerability feed
      
      * cmd/geth: add the test too
      
      * cmd/geth: more minisig/signify testing
      
      * cmd/geth: support multiple pubfiles for signing
      
      * cmd/geth: add @holiman minisig pubkey
      
      * cmd/geth: polishes on vulnerability check
      
      * cmd/geth: fix ineffassign linter nit
      
      * cmd/geth: add CVE to version check struct
      
      * cmd/geth/testdata: add missing testfile
      
      * cmd/geth: add more keys to versionchecker
      
      * cmd/geth: support file:// URLs in version check
      
      * cmd/geth: improve key ID printing when signature check fails
      
      Co-authored-by: default avatarFelix Lange <fjl@twurst.com>
      15339cf1
    • Martin Holst Swende's avatar
      core: improve contextual information on core errors (#21869) · 7770e41c
      Martin Holst Swende authored
      A lot of times when we hit 'core' errors, example: invalid tx, the information provided is
      insufficient. We miss several pieces of information: what account has nonce too high,
      and what transaction in that block was offending?
      
      This PR adds that information, using the new type of wrapped errors.
      It also adds a testcase which (partly) verifies the output from the errors.
      
      The first commit changes all usage of direct equality-checks on core errors, into
      using errors.Is. The second commit adds contextual information. This wraps most
      of the core errors with more information, and also wraps it one more time in
      stateprocessor, to further provide tx index and tx hash, if such a tx is encoutered in
      a block. The third commit uses the chainmaker to try to generate chains with such
      errors in them, thus triggering the errors and checking that the generated string meets
      expectations.
      7770e41c
    • Chris Ziogas's avatar
      core/vm/runtime: remove duplicated line (#21956) · 62cedb3a
      Chris Ziogas authored
      This line is duplicated, though it doesn't cause any issues. 
      62cedb3a
  6. Dec 03, 2020
  7. Dec 02, 2020
  8. Dec 01, 2020
  9. Nov 30, 2020
  10. Nov 29, 2020
    • Kristofer Peterson's avatar
      accounts, signer: fix Ledger Live account derivation path (clef) (#21757) · b71334ac
      Kristofer Peterson authored
      
      * signer/core/api: fix derivation of ledger live accounts
      
      For ledger hardware wallets, change account iteration as follows:
      
      - ledger legacy: m/44'/60'/0'/X; for 0<=X<5
      - ledger live: m/44'/60'/0'/0/X; for 0<=X<5
      
      - ledger legacy: m/44'/60'/0'/X; for 0<=X<10
      - ledger live: m/44'/60'/X'/0/0; for 0<=X<10
      
      Non-ledger derivation is unchanged and remains as:
      - non-ledger: m/44'/60'/0'/0/X; for 0<=X<10
      
      * signer/core/api: derive ten default paths for all hardware wallets, plus ten legacy and ten live paths for ledger wallets
      
      * signer/core/api: as .../0'/0/0 already included by default paths, do not include it again with ledger live paths
      
      * accounts, signer: implement path iterators for hd wallets
      
      Co-authored-by: default avatarMartin Holst Swende <martin@swende.se>
      b71334ac
  11. Nov 27, 2020
    • Guillaume Ballet's avatar
      crypto: signing builds with signify/minisign (#21798) · fa572cd2
      Guillaume Ballet authored
      
      * internal/build: implement signify's signing func
      * Add signify to the ci utility
      * fix output file format
      * Add unit test for signify
      * holiman's + travis' feedback
      * internal/build: verify signify's output
      * crypto: move signify to common dir
      * use go-minisign to verify binaries
      * more holiman feedback
      * crypto, ci: support minisign output
      * only accept one-line trusted comments
      * configurable untrusted comments
      * code cleanup in tests
      * revert to use ed25519 from the stdlib
      * bug: fix for empty untrusted comments
      * write timestamp as comment if trusted comment isn't present
      * rename line checker to commentHasManyLines
      * crypto: added signify fuzzer (#6)
      * crypto: added signify fuzzer
      * stuff
      * crypto: updated signify fuzzer to fuzz comments
      * crypto: repro signify crashes
      * rebased fuzzer on build-signify branch
      * hide fuzzer behind gofuzz build flag
      * extract key data inside a single function
      * don't treat \r as a newline
      * travis: fix signing command line
      * do not use an external binary in tests
      * crypto: move signify to crypto/signify
      * travis: fix formatting issue
      * ci: fix linter build after package move
      
      Co-authored-by: default avatarMarius van der Wijden <m.vanderwijden@live.de>
      fa572cd2
  12. Nov 25, 2020
  13. Nov 24, 2020
  14. Nov 23, 2020
  15. Nov 20, 2020
Loading