Skip to content

Commit 50e59ef

Browse files
shutter-service: fix lint ci
1 parent 1a37167 commit 50e59ef

File tree

5 files changed

+9
-9
lines changed

5 files changed

+9
-9
lines changed

rolling-shutter/keyperimpl/shutterservice/config.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ func (c *ChainConfig) Validate() error {
105105

106106
func (c *ChainConfig) SetDefaultValues() error {
107107
c.SyncStartBlockNumber = 0
108-
return nil
108+
return c.Contracts.SetDefaultValues()
109109
}
110110

111111
func (c *ChainConfig) SetExampleValues() error {

rolling-shutter/keyperimpl/shutterservice/handlers.go

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,6 @@ func (h *DecryptionKeySharesHandler) MessagePrototypes() []p2pmsg.Message {
2929
}
3030

3131
func (h *DecryptionKeySharesHandler) ValidateMessage(ctx context.Context, msg p2pmsg.Message) (pubsub.ValidationResult, error) {
32-
// TODO: should we implement some check that this identity is to be decrypted even or not, or this can be taken care of by implementing triggered block in decTrigger?
3332
keyShares := msg.(*p2pmsg.DecryptionKeyShares)
3433
extra, ok := keyShares.Extra.(*p2pmsg.DecryptionKeyShares_Service)
3534
if !ok {

rolling-shutter/keyperimpl/shutterservice/keyper.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ func (kpr *Keyper) initRegistrySyncer(ctx context.Context) error {
154154
return err
155155
}
156156

157-
// TODO: need to update go module after contract is finalised
157+
// TODO: need to update go module after contract is finalized
158158
kpr.registrySyncer = &RegistrySyncer{
159159
Contract: contract,
160160
DBPool: kpr.dbpool,
@@ -186,7 +186,6 @@ func (kpr *Keyper) processInputs(ctx context.Context) error {
186186
err = kpr.processNewKeyperSet(ctx, ev)
187187
case ev := <-kpr.newEonPublicKeys:
188188
err = kpr.processNewEonPublicKey(ctx, ev)
189-
// TODO: handle explicit decryption trigger, if needed
190189
case <-ctx.Done():
191190
return ctx.Err()
192191
}

rolling-shutter/keyperimpl/shutterservice/messagingmiddleware.go

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,8 @@ func (i *MessagingMiddleware) interceptDecryptionKeys(
205205
Limit: keyperSet.Threshold,
206206
})
207207
if err != nil {
208-
return nil, errors.Wrapf(err, "failed to count decryption signatures for eon %d and keyperConfigIndex %d", originalMsg.Eon, keyperSet.KeyperConfigIndex)
208+
return nil, errors.Wrapf(err, "failed to count decryption signatures for eon %d and keyperConfigIndex %d",
209+
originalMsg.Eon, keyperSet.KeyperConfigIndex)
209210
}
210211

211212
if len(signatures) < int(keyperSet.Threshold) {

rolling-shutter/keyperimpl/shutterservice/newblock.go

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -47,10 +47,11 @@ func (kpr *Keyper) maybeTriggerDecryption(ctx context.Context, block *syncevent.
4747
fmt.Println("--------------")
4848

4949
serviceDB := servicedatabase.New(kpr.dbpool)
50-
nonTriggeredEvents, err := serviceDB.GetNotDecryptedIdentityRegisteredEvents(ctx, servicedatabase.GetNotDecryptedIdentityRegisteredEventsParams{
51-
Timestamp: int64(lastTriggeredTime),
52-
Timestamp_2: int64(block.Header.Time),
53-
})
50+
nonTriggeredEvents, err := serviceDB.GetNotDecryptedIdentityRegisteredEvents(ctx,
51+
servicedatabase.GetNotDecryptedIdentityRegisteredEventsParams{
52+
Timestamp: int64(lastTriggeredTime),
53+
Timestamp_2: int64(block.Header.Time),
54+
})
5455
if err != nil && err != pgx.ErrNoRows {
5556
// pgx.ErrNoRows is expected if we're not part of the keyper set (which is checked later).
5657
// That's because non-keypers don't sync identity registered events. TODO: this needs to be implemented

0 commit comments

Comments
 (0)