refactor(multisig): fix requested changes#461
Open
0xisk wants to merge 8 commits intoadd-multisigfrom
Open
Conversation
|
Important Review skippedAuto reviews are disabled on base/target branches other than the default branch. Please check the settings in the CodeRabbit UI or the ⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: You can disable this status message by setting the Use the checkbox below for a quick retry:
✨ Finishing Touches🧪 Generate unit tests (beta)
Comment |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Types of changes
What types of changes does your code introduce to OpenZeppelin Midnight Contracts?
Put an `` in the boxes that apply
Fixes #???
Contracts
createShieldedProposalrecipient kind — rejectsUnshieldedUser, preventing permanently unexecutable proposals.@notice/@warningdocumenting that contract-address signers are unreachable until C2C auth lands, with CMA-based upgrade path.thresh <= 2to match the 2-signatureexecutesurface.sendShielded(mirrors_deposit)._shieldedReceived/_shieldedSent→_received/_sent._senddocstring synchronized with the real signature (coin, not color)._signerschanged fromMap<T, Boolean>toSet<T>.export.Utils
UINT128_MAXandselfAsRecipientfrom both treasuries intoUtils.compact; consumers now import viaUtils_prefix.UINT128_MAXtagged with TODO to remove once a math module is available.Tests
SignerManagerSimulatorsigner type to an exportedSignerSetreadonly 3-tuple — compile-time enforcement of theVector<3>contract invariant.createShieldedProposalfor recipient-kind guard (rejectUnshieldedUser, acceptContract).utils.test.tsforselfAsRecipientandUINT128_MAX.UINT128_MAXexposure from treasury mocks/simulators/tests (now covered in Utils).Docs / hygiene
multisig/*.compactfiles.@paramand@returnsin all multisig contracts.…Witness.ts→…Witnesses.ts) in 4 files.turbo.json—compact:multisiginputs corrected fromsrc/access/**/*.compacttosrc/multisig/**/*.compact.PR Checklist
Further comments
If this is a relatively large or complex change, kick off the discussion by explaining why you chose the solution you did and what alternatives you considered, etc...