-
Notifications
You must be signed in to change notification settings - Fork 667
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Debug/dkg results #4660
Debug/dkg results #4660
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Just realized we should retarget this to develop. I will rebase and force push that change here. |
…nimize unnecessary DKG triggering Signed-off-by: Jacinta Ferrant <[email protected]>
0598e6e
to
da120a8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, trivial question about if matches!()
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM - small comment about a log message that might just be me misreading something
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Small nits but LGTM
@jferrant can you double check my conflict resolution in the last commit here? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can't approve, but looks good to me :D
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
We needlessly were triggering DKG rounds due to a timing issue between our first check to see if a key was approved and the later threshold check being exceeded.
Now if we have not locally stored an approved key, we will always attempt the DKG queue checks. It will always follow this check by a final loading of whatever is set in the contract. Not bothering to queue a command if it finds an approved key. This should mitigate needless triggering of DKG for the obvious case.
However, we still need the later update to retrieve DKG shares based on round ID in #4654 as we can never be sure that our view of the contract is correct at the time of triggering a DKG round. (we could be milliseconds off when checking the approved key is set still).