Highlights
- Arctic Code Vault Contributor
Create your own GitHub profile
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 50 million developers.
Sign up
Pinned
2,054 contributions in the last year
Activity overview
Contribution activity
September 2020
Created a pull request in libra/libra that received 21 comments
[management] improve all tools
Composite PR that covers a whole host of outstanding issues: Add ability to read keys from files so libra / treasury root can submit their keys fr…
+249
−43
•
21
comments
- Make it easy to run a simple testnet
- [management] support the remainder of governance tasks
- [genesis] updates
- [network] handle storage read errors more gracefully during network address decryption
- [docker] Add initial documentation / framework for public full node support
- [terraform] deprecated and deleted upon landing
- [management] error codes for errors in genesis tool
- [genesis] make validator_owner keys optional
- [logger] do not expect on setting logger
- [genesis] actually push names into validators and operators
- [cluster-test][reconfiguration] expect epoch and add report text
- [network] Add NetworkContext to onchain discovery & RPC
- [network] Print out connected peers state every minute
- x: only check for newline at EOF if file isn't empty
- [dkr] Update prod testnet endpoints in client image
- [consensus] improve consensusdb
- [Safety Rules] Force a panic if storage returns an Error::PermissionDenied error.
- [vault] Switch to native-tls for ureq
- network: add per-peer connected metrics
- [Safety Rules] Maintain an in-memory cached SafetyData to avoid unnecessary reads from storage.
- [vault] Perform writes with check-and-set
- [json-rpc] fix invalid json example in method_get_metadata.md
- [Smoke Tests] Create smoke-tests crate under testsuite and partially refactor the layout.
- Convert remaining network logs to structured logs
- [Safety Rules] Don't load safety data before verifying signer.
- [fuzzing] adding two fuzzers to find incorrect deserialization
- [Safety Rules] Display errors on failed key reconciliations and display key names and versions.
- [metrics] Set a max limit on number of counters
- update client checklist doc
- [ci] Request dep-audit team review if TCB deps are changed
- [network] remove StructuredLogEntry
- [docker] Add initial documentation / framework for public full node support
- [Libra Swarm] Display IO errors specifically rather than simply displaying just the error type.
- [network] refactor most network counters to include context and avoid allocs
- [CI][1/x] enable DockerHub pub on master
- Some pull request reviews not shown.
Created an issue in libra/libra that received 2 comments
Operational Tooling
Problem We lack reference implementation for operational tools across both node operators and libra root. While the former is required for producti…
•
2
comments
7
contributions
in private repositories
Sep 2 – Sep 16

