Skip to content

Commit 007af44

Browse files
richardpringledarioush
authored andcommitted
Update avalanchego version (#779)
Co-authored-by: Darioush Jalali <[email protected]>
1 parent 640a8f0 commit 007af44

File tree

6 files changed

+59
-28
lines changed

6 files changed

+59
-28
lines changed

go.mod

+1-1
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ require (
5757
require (
5858
github.com/DataDog/zstd v1.5.2 // indirect
5959
github.com/NYTimes/gziphandler v1.1.1 // indirect
60-
github.com/ava-labs/coreth v0.14.1-rc.1.0.20250217192834-6060a4a6a6d3 // indirect
60+
github.com/ava-labs/coreth v0.14.1-acp-176.1 // indirect
6161
github.com/beorn7/perks v1.0.1 // indirect
6262
github.com/bits-and-blooms/bitset v1.10.0 // indirect
6363
github.com/btcsuite/btcd/btcec/v2 v2.3.2 // indirect

go.sum

+2-2
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,8 @@ github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5 h1:0CwZNZbxp69SHPd
6262
github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5/go.mod h1:wHh0iHkYZB8zMSxRWpUBQtwG5a7fFgvEO+odwuTv2gs=
6363
github.com/ava-labs/avalanchego v1.12.3-name-fortuna.0 h1:jABN/xZU6Tp0PTw3Q5lpaHJN/FBseVfJu81lH/2s2hw=
6464
github.com/ava-labs/avalanchego v1.12.3-name-fortuna.0/go.mod h1:SlofKg/9oP71zX8BQT78JWPBNff19tBNY7Cvp6QGQL0=
65-
github.com/ava-labs/coreth v0.14.1-rc.1.0.20250217192834-6060a4a6a6d3 h1:0OrQidq+b3kb7KlnDqc5mkB/73i1zxYEMiXioWSU4+w=
66-
github.com/ava-labs/coreth v0.14.1-rc.1.0.20250217192834-6060a4a6a6d3/go.mod h1:/XrU+CAm/0wiY5Ui05TLj2/n+czbCV6/Qrw/UMWp5aI=
65+
github.com/ava-labs/coreth v0.14.1-acp-176.1 h1:44iXYYeLR4LzTM+5DB7ohGqysDiTFPIvxiuFY9vZJAI=
66+
github.com/ava-labs/coreth v0.14.1-acp-176.1/go.mod h1:AEQcF8MWrKH0sS114wEZlkSfeGF5F66xTbQYqqimNLI=
6767
github.com/aymerick/raymond v2.0.3-0.20180322193309-b565731e1464+incompatible/go.mod h1:osfaiScAUVup+UC9Nfq76eWqDhXlp+4UYaA8uhTBO6g=
6868
github.com/beorn7/perks v1.0.1 h1:VlbKKnNfV8bJzeqoa4cOKqO6bYr3WgKZxO8Z16+hsOM=
6969
github.com/beorn7/perks v1.0.1/go.mod h1:G2ZrVWU2WbWT9wwq4/hrbKbnv/1ERSJQ0ibhJ6rlkpw=

plugin/evm/vm_warp_test.go

+8-3
Original file line numberDiff line numberDiff line change
@@ -285,13 +285,15 @@ func testWarpVMTransaction(t *testing.T, unsignedMessage *avalancheWarp.Unsigned
285285
blsSecretKey1, err := localsigner.New()
286286
require.NoError(err)
287287
blsPublicKey1 := blsSecretKey1.PublicKey()
288-
blsSignature1 := blsSecretKey1.Sign(unsignedMessage.Bytes())
288+
blsSignature1, err := blsSecretKey1.Sign(unsignedMessage.Bytes())
289+
require.NoError(err)
289290

290291
nodeID2 := ids.GenerateTestNodeID()
291292
blsSecretKey2, err := localsigner.New()
292293
require.NoError(err)
293294
blsPublicKey2 := blsSecretKey2.PublicKey()
294-
blsSignature2 := blsSecretKey2.Sign(unsignedMessage.Bytes())
295+
blsSignature2, err := blsSecretKey2.Sign(unsignedMessage.Bytes())
296+
require.NoError(err)
295297

296298
blsAggregatedSignature, err := bls.AggregateSignatures([]*bls.Signature{blsSignature1, blsSignature2})
297299
require.NoError(err)
@@ -554,11 +556,14 @@ func testReceiveWarpMessage(
554556
newSigner := func(networkID ids.ID, weight uint64) signer {
555557
secret, err := localsigner.New()
556558
require.NoError(err)
559+
sig, err := secret.Sign(unsignedMessage.Bytes())
560+
require.NoError(err)
561+
557562
return signer{
558563
networkID: networkID,
559564
nodeID: ids.GenerateTestNodeID(),
560565
secret: secret,
561-
signature: secret.Sign(unsignedMessage.Bytes()),
566+
signature: sig,
562567
weight: weight,
563568
}
564569
}

precompile/contracts/warp/predicate_test.go

+8-2
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,10 @@ func init() {
9494
}
9595

9696
for _, testVdr := range testVdrs {
97-
blsSignature := testVdr.sk.Sign(unsignedMsg.Bytes())
97+
blsSignature, err := testVdr.sk.Sign(unsignedMsg.Bytes())
98+
if err != nil {
99+
panic(err)
100+
}
98101
blsSignatures = append(blsSignatures, blsSignature)
99102
}
100103

@@ -235,13 +238,16 @@ func testWarpMessageFromPrimaryNetwork(t *testing.T, requirePrimaryNetworkSigner
235238
getValidatorsOutput := make(map[ids.NodeID]*validators.GetValidatorOutput)
236239
blsSignatures := make([]*bls.Signature, 0, numKeys)
237240
for i := 0; i < numKeys; i++ {
241+
sig, err := testVdrs[i].sk.Sign(unsignedMsg.Bytes())
242+
require.NoError(err)
243+
238244
validatorOutput := &validators.GetValidatorOutput{
239245
NodeID: testVdrs[i].nodeID,
240246
Weight: 20,
241247
PublicKey: testVdrs[i].vdr.PublicKey,
242248
}
243249
getValidatorsOutput[testVdrs[i].nodeID] = validatorOutput
244-
blsSignatures = append(blsSignatures, testVdrs[i].sk.Sign(unsignedMsg.Bytes()))
250+
blsSignatures = append(blsSignatures, sig)
245251
}
246252
aggregateSignature, err := bls.AggregateSignatures(blsSignatures)
247253
require.NoError(err)

precompile/contracts/warp/signature_verification_test.go

+32-16
Original file line numberDiff line numberDiff line change
@@ -213,8 +213,10 @@ func TestSignatureVerification(t *testing.T) {
213213
signers.Add(1)
214214

215215
unsignedBytes := unsignedMsg.Bytes()
216-
vdr0Sig := testVdrs[0].sk.Sign(unsignedBytes)
217-
vdr1Sig := testVdrs[1].sk.Sign(unsignedBytes)
216+
vdr0Sig, err := testVdrs[0].sk.Sign(unsignedBytes)
217+
require.NoError(err)
218+
vdr1Sig, err := testVdrs[1].sk.Sign(unsignedBytes)
219+
require.NoError(err)
218220
aggSig, err := bls.AggregateSignatures([]*bls.Signature{vdr0Sig, vdr1Sig})
219221
require.NoError(err)
220222
aggSigBytes := [bls.SignatureLen]byte{}
@@ -285,7 +287,8 @@ func TestSignatureVerification(t *testing.T) {
285287
require.NoError(err)
286288

287289
unsignedBytes := unsignedMsg.Bytes()
288-
vdr0Sig := testVdrs[0].sk.Sign(unsignedBytes)
290+
vdr0Sig, err := testVdrs[0].sk.Sign(unsignedBytes)
291+
require.NoError(err)
289292
aggSigBytes := [bls.SignatureLen]byte{}
290293
copy(aggSigBytes[:], bls.SignatureToBytes(vdr0Sig))
291294

@@ -324,10 +327,12 @@ func TestSignatureVerification(t *testing.T) {
324327
signers.Add(1)
325328

326329
unsignedBytes := unsignedMsg.Bytes()
327-
vdr0Sig := testVdrs[0].sk.Sign(unsignedBytes)
330+
vdr0Sig, err := testVdrs[0].sk.Sign(unsignedBytes)
331+
require.NoError(err)
328332
// Give sig from vdr[2] even though the bit vector says it
329333
// should be from vdr[1]
330-
vdr2Sig := testVdrs[2].sk.Sign(unsignedBytes)
334+
vdr2Sig, err := testVdrs[2].sk.Sign(unsignedBytes)
335+
require.NoError(err)
331336
aggSig, err := bls.AggregateSignatures([]*bls.Signature{vdr0Sig, vdr2Sig})
332337
require.NoError(err)
333338
aggSigBytes := [bls.SignatureLen]byte{}
@@ -368,7 +373,8 @@ func TestSignatureVerification(t *testing.T) {
368373
signers.Add(1)
369374

370375
unsignedBytes := unsignedMsg.Bytes()
371-
vdr0Sig := testVdrs[0].sk.Sign(unsignedBytes)
376+
vdr0Sig, err := testVdrs[0].sk.Sign(unsignedBytes)
377+
require.NoError(err)
372378
// Don't give the sig from vdr[1]
373379
aggSigBytes := [bls.SignatureLen]byte{}
374380
copy(aggSigBytes[:], bls.SignatureToBytes(vdr0Sig))
@@ -408,11 +414,14 @@ func TestSignatureVerification(t *testing.T) {
408414
signers.Add(1)
409415

410416
unsignedBytes := unsignedMsg.Bytes()
411-
vdr0Sig := testVdrs[0].sk.Sign(unsignedBytes)
412-
vdr1Sig := testVdrs[1].sk.Sign(unsignedBytes)
417+
vdr0Sig, err := testVdrs[0].sk.Sign(unsignedBytes)
418+
require.NoError(err)
419+
vdr1Sig, err := testVdrs[1].sk.Sign(unsignedBytes)
420+
require.NoError(err)
413421
// Give sig from vdr[2] even though the bit vector doesn't have
414422
// it
415-
vdr2Sig := testVdrs[2].sk.Sign(unsignedBytes)
423+
vdr2Sig, err := testVdrs[2].sk.Sign(unsignedBytes)
424+
require.NoError(err)
416425
aggSig, err := bls.AggregateSignatures([]*bls.Signature{vdr0Sig, vdr1Sig, vdr2Sig})
417426
require.NoError(err)
418427
aggSigBytes := [bls.SignatureLen]byte{}
@@ -455,8 +464,10 @@ func TestSignatureVerification(t *testing.T) {
455464
signers.Add(2)
456465

457466
unsignedBytes := unsignedMsg.Bytes()
458-
vdr1Sig := testVdrs[1].sk.Sign(unsignedBytes)
459-
vdr2Sig := testVdrs[2].sk.Sign(unsignedBytes)
467+
vdr1Sig, err := testVdrs[1].sk.Sign(unsignedBytes)
468+
require.NoError(err)
469+
vdr2Sig, err := testVdrs[2].sk.Sign(unsignedBytes)
470+
require.NoError(err)
460471
aggSig, err := bls.AggregateSignatures([]*bls.Signature{vdr1Sig, vdr2Sig})
461472
require.NoError(err)
462473
aggSigBytes := [bls.SignatureLen]byte{}
@@ -499,8 +510,10 @@ func TestSignatureVerification(t *testing.T) {
499510
signers.Add(2)
500511

501512
unsignedBytes := unsignedMsg.Bytes()
502-
vdr1Sig := testVdrs[1].sk.Sign(unsignedBytes)
503-
vdr2Sig := testVdrs[2].sk.Sign(unsignedBytes)
513+
vdr1Sig, err := testVdrs[1].sk.Sign(unsignedBytes)
514+
require.NoError(err)
515+
vdr2Sig, err := testVdrs[2].sk.Sign(unsignedBytes)
516+
require.NoError(err)
504517
aggSig, err := bls.AggregateSignatures([]*bls.Signature{vdr1Sig, vdr2Sig})
505518
require.NoError(err)
506519
aggSigBytes := [bls.SignatureLen]byte{}
@@ -560,8 +573,10 @@ func TestSignatureVerification(t *testing.T) {
560573
signers.Add(1) // vdr[2]
561574

562575
unsignedBytes := unsignedMsg.Bytes()
563-
vdr1Sig := testVdrs[1].sk.Sign(unsignedBytes)
564-
vdr2Sig := testVdrs[2].sk.Sign(unsignedBytes)
576+
vdr1Sig, err := testVdrs[1].sk.Sign(unsignedBytes)
577+
require.NoError(err)
578+
vdr2Sig, err := testVdrs[2].sk.Sign(unsignedBytes)
579+
require.NoError(err)
565580
aggSig, err := bls.AggregateSignatures([]*bls.Signature{vdr1Sig, vdr2Sig})
566581
require.NoError(err)
567582
aggSigBytes := [bls.SignatureLen]byte{}
@@ -622,7 +637,8 @@ func TestSignatureVerification(t *testing.T) {
622637

623638
unsignedBytes := unsignedMsg.Bytes()
624639
// Because vdr[1] and vdr[2] share a key, only one of them sign.
625-
vdr2Sig := testVdrs[2].sk.Sign(unsignedBytes)
640+
vdr2Sig, err := testVdrs[2].sk.Sign(unsignedBytes)
641+
require.NoError(err)
626642
aggSigBytes := [bls.SignatureLen]byte{}
627643
copy(aggSigBytes[:], bls.SignatureToBytes(vdr2Sig))
628644

warp/aggregator/aggregator_test.go

+8-4
Original file line numberDiff line numberDiff line change
@@ -44,17 +44,21 @@ func TestAggregateSignatures(t *testing.T) {
4444
vdr1sk, vdr1 := newValidator(t, vdrWeight)
4545
vdr2sk, vdr2 := newValidator(t, vdrWeight+1)
4646
vdr3sk, vdr3 := newValidator(t, vdrWeight-1)
47-
sig1 := vdr1sk.Sign(unsignedMsg.Bytes())
48-
sig2 := vdr2sk.Sign(unsignedMsg.Bytes())
49-
sig3 := vdr3sk.Sign(unsignedMsg.Bytes())
47+
sig1, err := vdr1sk.Sign(unsignedMsg.Bytes())
48+
require.NoError(t, err)
49+
sig2, err := vdr2sk.Sign(unsignedMsg.Bytes())
50+
require.NoError(t, err)
51+
sig3, err := vdr3sk.Sign(unsignedMsg.Bytes())
52+
require.NoError(t, err)
5053
vdrToSig := map[*avalancheWarp.Validator]*bls.Signature{
5154
vdr1: sig1,
5255
vdr2: sig2,
5356
vdr3: sig3,
5457
}
5558
nonVdrSk, err := localsigner.New()
5659
require.NoError(t, err)
57-
nonVdrSig := nonVdrSk.Sign(unsignedMsg.Bytes())
60+
nonVdrSig, err := nonVdrSk.Sign(unsignedMsg.Bytes())
61+
require.NoError(t, err)
5862
vdrs := []*avalancheWarp.Validator{
5963
{
6064
PublicKey: vdr1.PublicKey,

0 commit comments

Comments
 (0)