Draft
Conversation
seunlanlege
reviewed
Oct 9, 2025
seunlanlege
reviewed
Oct 9, 2025
seunlanlege
reviewed
Oct 9, 2025
seunlanlege
reviewed
Oct 9, 2025
Member
|
Looks like a great start, lets get tests |
seunlanlege
reviewed
Jan 27, 2026
seunlanlege
reviewed
Jan 27, 2026
seunlanlege
reviewed
Jan 27, 2026
seunlanlege
reviewed
Jan 27, 2026
Comment on lines
+194
to
+196
| ) -> Result<(), Error> { | ||
| Ok(()) | ||
| } |
…/beefy-consensus-client # Conflicts: # Cargo.toml # modules/pallets/testsuite/Cargo.toml # modules/pallets/testsuite/src/runtime.rs
verify fraud proof fix tests
seunlanlege
reviewed
Feb 23, 2026
| type Hash = [u8; 32]; | ||
|
|
||
| fn hash(data: &[u8]) -> Self::Hash { | ||
| keccak256(data) |
Member
There was a problem hiding this comment.
i think this should be generic
seunlanlege
reviewed
Feb 23, 2026
| let mut data = [0u8; 64]; | ||
| data[..32].copy_from_slice(left); | ||
| data[32..].copy_from_slice(right); | ||
| Ok(keccak256(&data)) |
seunlanlege
reviewed
Feb 23, 2026
Comment on lines
+79
to
+80
| let (state, heads_root) = verify_mmr_update_proof::<H>(trusted_state, proof.relay)?; | ||
| Ok((state.encode(), heads_root)) |
Member
There was a problem hiding this comment.
missing parachain header verification
seunlanlege
reviewed
Feb 23, 2026
Comment on lines
+137
to
+144
| println!("\n======= VERIFIER DEBUG ======="); | ||
| let target_root = if is_current_authorities { | ||
| trusted_state.current_authorities.keyset_commitment | ||
| } else { | ||
| trusted_state.next_authorities.keyset_commitment | ||
| }; | ||
| println!("Target Merkle Root: {:?}", H256::from(target_root)); | ||
| println!("Verifier-side calculated authority leaf hashes:"); |
seunlanlege
reviewed
Feb 23, 2026
Comment on lines
+149
to
+154
| let k256_sig = K256Signature::from_slice(&sig.signature[0..64]) | ||
| .map_err(|_| Error::InvalidSignatureFormat)?; | ||
|
|
||
| let recovered_verifying_key = | ||
| VerifyingKey::recover_from_prehash(commitment_hash.as_ref(), &k256_sig, recovery_id) | ||
| .map_err(|_| Error::FailedToRecoverPublicKey)?; |
seunlanlege
reviewed
Feb 23, 2026
Comment on lines
+126
to
+131
| if !Parachains::<T>::contains_key(para_header.para_id) { | ||
| Err(Error::Custom(format!( | ||
| "Parachain with id {} not registered", | ||
| para_header.para_id | ||
| )))? | ||
| } |
Member
There was a problem hiding this comment.
also why are we using ismp_parachain storage?
verify parachain headers
…/beefy-consensus-client # Conflicts: # modules/pallets/testsuite/Cargo.toml
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This pull request introduces the ismp-beefy pallet, a consensus client for ISMP designed to verify Polkadot's BEEFY finality proofs. This implementation allows ISMP to process consensus updates from BEEFY, making it possible to trustlessly verify state commitments.