Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update monitoring service to contract changes #360

Merged
merged 4 commits into from
Dec 10, 2018

Conversation

karlb
Copy link
Contributor

@karlb karlb commented Dec 4, 2018

The monitoring service contracts did not stay in sync with signature
changes in other contracts. This should bring it up to date.

karlb added a commit to karlb/raiden-contracts that referenced this pull request Dec 4, 2018
These contracts are required to put the monitoring and path finding
services to work. Merge
raiden-network#360
first, to avoid compilation errors.
@karlb karlb mentioned this pull request Dec 4, 2018
@loredanacirstea
Copy link
Contributor

Please also re-enable the MS tests, to make sure things work. E.g. https://github.com/raiden-network/raiden-contracts/blob/master/raiden_contracts/tests/test_monitoring_service.py#L40 (MS tests need some love soon)

@palango
Copy link
Contributor

palango commented Dec 4, 2018

@loredanacirstea Should we do this stuff in a development/Ithaca branch for now or is master ok going forward?

@loredanacirstea
Copy link
Contributor

loredanacirstea commented Dec 4, 2018

@palango , seems raiden is sticking to master == development and releases == stable. So, I went for the same approach.
As long as we don't include the service contracts in the released package, I say we can stick with developing them on master.

@palango
Copy link
Contributor

palango commented Dec 4, 2018

seems raiden is sticking to master == development and releases == stable. So, I went for the same approach.

I think Raiden master is still blocked for red eyes

@loredanacirstea
Copy link
Contributor

loredanacirstea commented Dec 4, 2018

@palango tl;dr if it is easier for the MS team to make an Ithaca branch to start development, feel free to do so. We can realign after Red Eyes.

@loredanacirstea
Copy link
Contributor

My comment here #360 (comment) is wrong. The service contracts can be included in the compiled data (otherwise you cannot use them), and I think we can also deploy them on the test nets.
The problem is that they are currently in development and we do not want users to think they are reliable. Not deploying them on mainnet should be enough to make this point. A separate Ithaca branch is also fine.

@palango
Copy link
Contributor

palango commented Dec 6, 2018

Let's merge stuff to master then, no need to create more branches.

karlb added a commit to karlb/raiden-contracts that referenced this pull request Dec 6, 2018
These contracts are required to put the monitoring and path finding
services to work. Merge
raiden-network#360
first, to avoid compilation errors.
@karlb
Copy link
Contributor Author

karlb commented Dec 7, 2018

Please also re-enable the MS tests, to make sure things work. E.g. https://github.com/raiden-network/raiden-contracts/blob/master/raiden_contracts/tests/test_monitoring_service.py#L40 (MS tests need some love soon)

Tests are enabled and pass, now.

karlb added 4 commits December 7, 2018 11:15
The monitoring service contracts did not stay in sync with signature
changes in other contracts. This should bring it up to date.
I had to add a channel_identifier parameter to claimReward, as
getChannelIdentifier doesn't return a channel id after the settlement.
These contracts are required to put the monitoring and path finding
services to work. Merge
raiden-network#360
first, to avoid compilation errors.
Copy link
Contributor

@loredanacirstea loredanacirstea left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good. Left a comment that can be addressed in another PR.
This review did not have security in scope.

@@ -204,9 +204,11 @@ contract MonitoringService is Utils {
reward_proof_signature
);
TokenNetwork token_network = TokenNetwork(token_network_address);
uint256 channel_identifier = token_network.getChannelIdentifier(closing_participant, non_closing_participant);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Consider adding the token_network_address & channel_identifier to the NewBalanceProofReceived event, so you can make a distinction between channels in time (between same participants) and between networks.

You can maybe use the reward_identifier in the event, but then again, you might want to filter all the NewBalanceProofReceived for a specific token network - so this might be over-optimizing.

Can be done in a different PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants