@@ -493,18 +493,18 @@ func (proc *Processor) validatePatch(
493493 return nil , nil
494494 }
495495 }
496+ if bytes .Equal (indexMAC , exerrors .Must (hex .DecodeString ("a9f10469e5862e0fb7ae1d0d4276e01ee233e29f36d311e4b6e95c6a7827e38b" ))) {
497+ zerolog .Ctx (ctx ).Debug ().Uint64 ("version" , version ).Msg ("DEBUG: applying hack 1" )
498+ return hex .DecodeString ("c7d81bdec860404e60f3355304e8114973079146cf845842fe990fce2733d619" )
499+ } else if bytes .Equal (indexMAC , exerrors .Must (hex .DecodeString ("9384a89d86d59e9623c4c34b55dd6b0db4e0a2d7568ac55b3e1a0cec6bfc6ea5" ))) {
500+ zerolog .Ctx (ctx ).Debug ().Uint64 ("version" , version ).Msg ("DEBUG: applying hack 2" )
501+ return hex .DecodeString ("2d2e64fc70aa6b05d7dab825d6b869e5fbbf843332bfcc94ebb4c25a9d3dcd49" )
502+ }
496503 // Previous value not found in current patch, look in the database
497504 vm , err := proc .Store .AppState .GetAppStateMutationMAC (ctx , string (patchName ), indexMAC )
498505 if vm != nil || err != nil || ! allowEvilLIDHack {
499506 return vm , err
500507 }
501- /*if version == 150 && bytes.Equal(indexMAC, exerrors.Must(hex.DecodeString("a9f10469e5862e0fb7ae1d0d4276e01ee233e29f36d311e4b6e95c6a7827e38b"))) {
502- zerolog.Ctx(ctx).Debug().Msg("DEBUG: applying hack")
503- return hex.DecodeString("c7d81bdec860404e60f3355304e8114973079146cf845842fe990fce2733d619")
504- } else */ if version == 150 && bytes .Equal (indexMAC , exerrors .Must (hex .DecodeString ("9384a89d86d59e9623c4c34b55dd6b0db4e0a2d7568ac55b3e1a0cec6bfc6ea5" ))) {
505- zerolog .Ctx (ctx ).Debug ().Msg ("DEBUG: applying hack" )
506- return hex .DecodeString ("2d2e64fc70aa6b05d7dab825d6b869e5fbbf843332bfcc94ebb4c25a9d3dcd49" )
507- }
508508 vm , newIndexMAC , err := proc .evilHackForLIDMutation (
509509 ctx , patchName , indexMAC , patch .Mutations [maxIndex ], maxIndex , patch .Mutations , true ,
510510 )
0 commit comments