-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Implement native Notary contract #3178
base: master
Are you sure you want to change the base?
Conversation
Close #2896. Use a stub for native Notary contract hash since this contract is not implemented yet. Thus, technically, NotaryAssisted attribute verification will always fail on real network until native Notary is implemented. Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
…ribute Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
Transactions network fee should be split between Primary node and Notary nodes. Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
Once Notary contract is implemented, this hash will be replaced by a proper Notary contract hash. The exact value won't be changed since Notary contract has constant hash as any other native contract. Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
No functional changes, just a refactoring for better code readability. Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
Is this PR to be merged now or after next release? |
|
This contract has a
In this method, we verify that Here is an attack vector. A malicious notary can sign as many transactions as it wants and then publish at most 500 txs on chain while If it's not a malicious notary, someone could still get a chance to make the notary sign something multiple times and cache them then publish them at once. By the way, do you know how many core modules will be affected by this |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am not seeing the part of the code we discussed on Discord, @AnnaShaleva, you mentioned about a delegated powered notary signing.
"The contract itself don't send the transactions. It's a designated Notary node who is powered to send transactions on behalf of notary service users. "
I want to check that because it should be, at least, similar to the oracles design.
Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
No functional changes, just a refactoring. Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
To be able to process existing NeoFS chains that use Notary - yes, it's the last PR. But ideally in future we'd like to implement
It's a part of Notary service plugin. See the example implementation in https://github.com/nspcc-dev/neo-go/blob/master/pkg/services/notary/notary.go. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
as @dusmart said , verify
method should be used with extreme caution. and is there a fork introduced?
That's a valid concern, but there are multiple ways to handle it, we'll get to it after #3175 merge. |
{ | ||
if (!engine.CheckWitnessInternal(from)) throw new InvalidOperationException(string.Format("Failed to check witness for {0}", from.ToString())); | ||
var receive = to is null ? from : to; | ||
var deposit = GetDepositFor(engine.SnapshotCache, from) ?? throw new InvalidOperationException(string.Format("Deposit of {0} is null", from.ToString())); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Remove can return the deposit (interoperableClone) not related to the storage, and avoid get/remove
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Remove can return the deposit
But we're not interested in return value, it's just not needed, we're OK with the fact that deposit is removed.
and avoid get/remove
We need to perform some validation checks before removal, otherwise it's illegal. Also, it's nice to have separate get/remove functions because they are reused from several Notary methods.
Ref. https://github.com/neo-project/neo/pull/3178/files/56acd97e4b2e93601b7e3d4b15b5ccafc9455fcd#r2010316964. Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
No functional changes. Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
This test requires Notary nodes to be properly designated via native RoleManagement contract, it's hard to mock this behaviour during test, I wasn't able to properly do it. This test may be restored once we have better testing system. Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
Ref. #3178 (comment). Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
No functional changes, ref. #3178 (comment). Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
@neo-project/core please review one more time, all conversations should be resolved now. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR implements the native Notary contract, which adds functionality for multisignature transaction assistance and deposit management. Key changes include:
- New native Notary contract implementation with methods for verifying transactions, handling GAS deposits, and rewarding notary nodes.
- New unit tests for the Notary contract and updated test utilities and extension methods.
- Updates to native contract references and test fixtures to include the Notary contract.
Reviewed Changes
Copilot reviewed 8 out of 8 changed files in this pull request and generated no comments.
Show a summary per file
File | Description |
---|---|
tests/Neo.UnitTests/TestUtils.Transaction.cs | Introduces a new overload to create transactions with an extra signer. |
tests/Neo.UnitTests/SmartContract/Native/UT_NativeContract.cs | Adds Notary contract configuration in test setups. |
tests/Neo.UnitTests/SmartContract/Native/UT_GasToken.cs | Removes an existing test method for Notary-assisted persist, which may affect test coverage. |
tests/Neo.UnitTests/Extensions/Nep17NativeContractExtensions.cs | Updates extension methods to pass deposit-related data to the transfer call. |
tests/Neo.UnitTests/Extensions/NativeContractExtensions.cs | Adds an overload for Call to support ApplicationEngine. |
src/Neo/SmartContract/Native/Notary.cs | Implements the Notary contract with methods for deposit handling, reward calculation, and verification. |
src/Neo/SmartContract/Native/NativeContract.cs | Registers the new Notary contract in the native contract collection. |
Comments suppressed due to low confidence (1)
tests/Neo.UnitTests/SmartContract/Native/UT_GasToken.cs:154
- The removal of the 'Check_OnPersist_NotaryAssisted' test in UT_GasToken.cs reduces the test coverage for the GAS token's handling of Notary-assisted transactions; please ensure that the new Notary functionality is adequately covered by corresponding tests.
[TestMethod] public void Check_OnPersist_NotaryAssisted() { ... }
No functional changes, just adopt the #3859. Signed-off-by: Anna Shaleva <shaleva.ann@nspcc.ru>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
My review #3870 some styles and one concern with null balance
* Update Notary.cs * Update Notary.cs * Update Notary.cs * fix * clean * Clean * Update src/Neo/SmartContract/Native/Notary.cs
Description
Implement native Notary contract.
Close #2897.
Type of change
How Has This Been Tested?
Checklist: