Skip to content
Snippets Groups Projects
Select Git revision
  • 328bb1a72c97a97e346938e5471330f87cb7da16
  • main default protected
  • release/1.1
  • encrypt_comments
  • mnemonic_dewif
  • authors_rules
  • 0.14
  • rtd
  • 1.2.1 protected
  • 1.2.0 protected
  • 1.1.1 protected
  • 1.1.0 protected
  • 1.0.0 protected
  • 1.0.0rc1 protected
  • 1.0.0rc0 protected
  • 1.0.0-rc protected
  • 0.62.0 protected
  • 0.61.0 protected
  • 0.60.1 protected
  • 0.58.1 protected
  • 0.60.0 protected
  • 0.58.0 protected
  • 0.57.0 protected
  • 0.56.0 protected
  • 0.55.1 protected
  • 0.55.0 protected
  • 0.54.3 protected
  • 0.54.2 protected
28 results

load_binary_signed_message.py

Blame
  • verify-runtime-code.md 754 B

    Compile the runtime with srtool

    When voting for a runtime upgrade, you should check that the proposed hash actually corresponds to the published code you reviewed. Otherwise, a malicious runtime upgrade could be advertised as a legitimate one.

    docker run \
      -i \
      --rm \
      -e PACKAGE=gdev-runtime \
      -e RUNTIME_DIR=runtime/gdev \
      -v $PWD:/build \
      paritytech/srtool:1.60.0 build --app --json -cM

    Then, the runtime wasm bytecode is generated in this location:

    runtime/gdev/target/srtool/release/wbuild/gdev-runtime/gdev_runtime.compact.compressed.wasm

    To compare it to last official :