Skip to content

feat(e2e tests): invalid signature penalizes peer #243

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 14 commits into
base: main
Choose a base branch
from

Conversation

jonastheis
Copy link
Contributor

This PR addresses the following item of #141:

Block with invalid signature that is gossiped over the network should be rejected and the peer should be penalized.

Base automatically changed from feat/e2e-tests-invalid-block-penalizes-peer to main August 11, 2025 22:53
Copy link
Collaborator

@greged93 greged93 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One small nit otherwise lgtm!

// Use the signer configured by SignerArgs
let chain_id = chain_spec.chain().id();
self.signer_args.signer(chain_id).await?.map(rollup_node_signer::Signer::spawn)
None
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should probably add a log with warn level here just to notify that the node is running without signer.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Then this would print for every node start, even if the node is not configured as a sequencer.

Maybe I'm not understanding the previous behavior correctly but I think it is the same. map(rollup_node_signer::Signer::spawn) should only get called when self.signer_args.signer(chain_id).await? is Some(...). If it's None then signer will become None.

The if now has the same behavior except that imo it's a bit easier to understand and it changes the priority of the branches so that we can also manually configure a signer in a test

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants