-
Notifications
You must be signed in to change notification settings - Fork 0
Release v0.5.0 #522
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Release v0.5.0 #522
Conversation
AnnaShaleva
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let me also check the consensus part before the release.
|
I get the It wasn't like that in 1.13+, and looks like it's related to the chain freeze. Although DB is initialized in the end. Is it expected behaviour? |
I have to say yes, and our client still works with this error log. I'm also syncing the TestNet, very close to the latest. |
|
Another note that I have: all our existing nodes use So starting from this version if anyone want to initialize a new database, an explicit |
The case is a bit complicated, archive nodes are now enforced to It depends on the Geth implementation, but yes, we can add it somewhere. |
5254ed0 to
8860fa4
Compare
|
There's one thing in #499 I have doubts about: go-ethereum/consensus/dbft/dbft.go Lines 929 to 936 in 8f74015
@txhsl, what is the desired behaviour, should we accept blob transactions? If we prohibit blob transactions, then they should be excluded from the miner's proposal at the PrepareRequest construction level, so that the rest of block fields were aligned with an actual transaction list. Then, at the PrepareRequest/PreBlock verification level if there's a blob transaction in the list, then the current proposal should be considered as invalid and CV should happen. The same logic is relevant for decrypted transactions. If we allow blob transactions, then I suppose we should have some verification logic for them at the consensus level. |
If we can, then we should. I prefer to accept all compatible features from Ethereum. Only blob pool can handle blob transactions, and the state of these two pools are supposed to be independent. So blob transactions are skipped here. // ErrAlreadyReserved is returned if the sender address has a pending transaction
// in a different subpool. For example, this error is returned in response to any
// input transaction of non-blob type when a blob transaction from this sender
// remains pending (and vice-versa).
ErrAlreadyReserved = errors.New("address already reserved")
It sounds different, but I think somehow similar to the current implementation. Blob transactions are ignored in PreBlock verification, because they can't and don't need to be verified by legacy pool. Blob transactions and legacy pool transactions are mixed in the list, separating them and then putting them back together seems redundant.
Yes, we should verify them. IMO, they are verified within |
|
Good, then everything is OK.
Probably not, from what I saw. |
AnnaShaleva
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
Ready for review. The activation of Testnet Cancun and Prague are both scheduled to timestamp
1761600000, which is 2025-10-28T05:20:00+08:00, about 133 hours from now on.