-
Notifications
You must be signed in to change notification settings - Fork 80
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Archival node #3778
Archival node #3778
Conversation
That's the way it's defined and used in C#, see neo-project/neo#3639 also. Signed-off-by: Roman Khimov <[email protected]>
916444f
to
a129a81
Compare
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #3778 +/- ##
==========================================
+ Coverage 83.13% 83.16% +0.03%
==========================================
Files 335 335
Lines 46855 46873 +18
==========================================
+ Hits 38954 38984 +30
+ Misses 6311 6299 -12
Partials 1590 1590 ☔ View full report in Codecov by Sentry. |
a129a81
to
e36b28a
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Linter is failing. Otherwise LGTM, but need to check one thing.
Follow neo-project/neo#3639. Signed-off-by: Roman Khimov <[email protected]>
It's more symmetric than the C# counterpart, but the essence is the same: we can accept capabilities we can't interpret. Refs. neo-project/neo#3639 Signed-off-by: Roman Khimov <[email protected]>
This will be used to differentiate full history nodes from state only. Currently it's just a definition, we can not use it safely on current networks because nodes will refuse this Version, so actual code using the attribute will be added in newer versions. Signed-off-by: Roman Khimov <[email protected]>
e36b28a
to
82b4007
Compare
Otherwise it can't be properly passed through the P2P network which makes it impossible to use UnknownCapabilities as an extensions in the existing networks. Follow nspcc-dev/neo-go#3778. Signed-off-by: Anna Shaleva <[email protected]>
Without this commit every `Addr` message containing UnknownCapability will be considered as invalid. The desired behaviour is to include node with UnknownCapability into the list of peers. Follow the nspcc-dev/neo-go#3778, should be a part of #3639. Signed-off-by: Anna Shaleva <[email protected]>
Make the behaviour compatible with nspcc-dev/neo-go#3778. Signed-off-by: Anna Shaleva <[email protected]>
Please, check neo-project/neo#3647, from the current implementation it seems to me that UnknownCapability can be passed through the network without any restrictions, which is correct, but prohibited in C# node. |
It's mentioned in commits and |
No description provided.