Skip to content

Conversation

@geoff-vball
Copy link
Contributor

@geoff-vball geoff-vball commented Nov 5, 2025

Why this should be merged

How this works

  1. The first step is making a commit to icm-contracts which moves all the files into a sub-directory called icm-contracts (we could use a different name). This is so the repo is entirely contained when grafting it over. Otherwise all the top level files conflict and it's a mess.
  2. All top level files (go.mod, .gitgitnore, etc) are consolidated.
  3. .github folders are consolidated. I consolidated all linting type workflows into one file.
  4. scripts folders are consolidated. E2E tests for icm-contracts renamed to contracts_e2e_test.sh
  5. BatchCrossChainMessenger, which was the only contract in icm-services in consolidated with all the other contracts
  6. ABI bindings moved out to top level
  7. icm-services go.mod dependency on icm-services removed.

TODOs

  1. Change top-level README to reflect new repo structure.
  2. Lift lib to top level.
  3. Consolidate test utils.
  4. Only run E2E tests when affected files have changed.
  5. Remove icm-contracts dependency on icm-services commit (just use the code in the repo).
  6. Consolidate CONTRIBUTING.md

How this was tested

Existing CI

How is this documented

TODO

cam-schultz and others added 30 commits April 17, 2025 15:06
L-01 Validators May Not Be Able to Exit Due to Churn Limits
Update formatting to conform to solhint 5.1.0
M-02 Clarify selection of PoA weights
Bumps [golang.org/x/tools](https://github.com/golang/tools) from 0.32.0 to 0.33.0.
- [Release notes](https://github.com/golang/tools/releases)
- [Commits](golang/tools@v0.32.0...v0.33.0)

---
updated-dependencies:
- dependency-name: golang.org/x/tools
  dependency-version: 0.33.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
…g/x/tools-0.33.0

Bump golang.org/x/tools from 0.32.0 to 0.33.0
…methods to initiate[Validator/Delegator]Registration
Move rewardRecipient fields from removal to registration methods
geoff-vball and others added 25 commits October 20, 2025 12:32
Bumps [golang.org/x/tools](https://github.com/golang/tools) from 0.37.0 to 0.38.0.
- [Release notes](https://github.com/golang/tools/releases)
- [Commits](golang/tools@v0.37.0...v0.38.0)

---
updated-dependencies:
- dependency-name: golang.org/x/tools
  dependency-version: 0.38.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
…g/x/tools-0.38.0

Bump golang.org/x/tools from 0.37.0 to 0.38.0
Bumps google.golang.org/protobuf from 1.36.9 to 1.36.10.

---
updated-dependencies:
- dependency-name: google.golang.org/protobuf
  dependency-version: 1.36.10
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <[email protected]>
…lang.org/protobuf-1.36.10

Bump google.golang.org/protobuf from 1.36.9 to 1.36.10
Bumps [github.com/onsi/ginkgo/v2](https://github.com/onsi/ginkgo) from 2.25.3 to 2.27.2.
- [Release notes](https://github.com/onsi/ginkgo/releases)
- [Changelog](https://github.com/onsi/ginkgo/blob/master/CHANGELOG.md)
- [Commits](onsi/ginkgo@v2.25.3...v2.27.2)

---
updated-dependencies:
- dependency-name: github.com/onsi/ginkgo/v2
  dependency-version: 2.27.2
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
…m/onsi/ginkgo/v2-2.27.2

Bump github.com/onsi/ginkgo/v2 from 2.25.3 to 2.27.2
@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

Copy link

@github-advanced-security github-advanced-security bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Slither found more than 20 potential problems in the proposed changes. Check the Files changed tab for more details.

Copy link

@github-advanced-security github-advanced-security bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Semgrep PRO found more than 20 potential problems in the proposed changes. Check the Files changed tab for more details.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

8 participants