mirror of
https://github.com/oxen-io/oxen-core.git
synced 2023-12-14 02:22:56 +01:00
6d6541670e
The replaces the deregistration mechanism with a new state change mechanism (beginning at the v12 fork) which can change a service node's network status via three potential values (and is extensible in the future to handle more): - deregistered -- this is the same as the existing deregistration; the SN is instantly removed from the SN list. - decommissioned -- this is a sort of temporary deregistration: your SN remains in the service node list, but is removed from the rewards list and from any network duties. - recommissioned -- this tx is sent by a quorum if they observe a decommissioned SN sending uptime proofs again. Upon reception, the SN is reactivated and put on the end of the reward list. Since this is broadening the quorum use, this also renames the relevant quorum to a "obligations" quorum (since it validates SN obligations), while the transactions are "state_change" transactions (since they change the state of a registered SN). The new parameters added to service_node_rules.h control how this works: // Service node decommissioning: as service nodes stay up they earn "credits" (measured in blocks) // towards a future outage. A new service node starts out with INITIAL_CREDIT, and then builds up // CREDIT_PER_DAY for each day the service node remains active up to a maximum of // DECOMMISSION_MAX_CREDIT. // // If a service node stops sending uptime proofs, a quorum will consider whether the service node // has built up enough credits (at least MINIMUM): if so, instead of submitting a deregistration, // it instead submits a decommission. This removes the service node from the list of active // service nodes both for rewards and for any active network duties. If the service node comes // back online (i.e. starts sending the required performance proofs again) before the credits run // out then a quorum will reinstate the service node using a recommission transaction, which adds // the service node back to the bottom of the service node reward list, and resets its accumulated // credits to 0. If it does not come back online within the required number of blocks (i.e. the // accumulated credit at the point of decommissioning) then a quorum will send a permanent // deregistration transaction to the network, starting a 30-day deregistration count down. This commit currently includes values (which are not necessarily finalized): - 8 hours (240 blocks) of credit required for activation of a decommission (rather than a deregister) - 0 initial credits at registration - a maximum of 24 hours (720 blocks) of credits - credits accumulate at a rate that you hit 24 hours of credits after 30 days of operation. Miscellaneous other details of this PR: - a new TX extra tag is used for the state change (including deregistrations). The old extra tag has no version or type tag, so couldn't be reused. The data in the new tag is slightly more efficiently packed than the old deregistration transaction, so it gets used for deregistrations (starting at the v12 fork) as well. - Correct validator/worker selection required generalizing the shuffle function to be able to shuffle just part of a vector. This lets us stick any down service nodes at the end of the potential list, then select validators by only shuffling the part of the index vector that contains active service indices. Once the validators are selected, the remainder of the list (this time including decommissioned SN indices) is shuffled to select quorum workers to check, thus allowing decommisioned nodes to be randomly included in the nodes to check without being selected as a validator. - Swarm recalculation was not quite right: swarms were recalculated on SN registrations, even if those registrations were include shared node registrations, but *not* recalculated on stakes. Starting with the upgrade this behaviour is fixed (swarms aren't actually used currently and aren't consensus-relevant so recalculating early won't hurt anything). - Details on decomm/dereg are added to RPC info and print_sn/print_sn_status - Slightly improves the % of reward output in the print_sn output by rounding it to two digits, and reserves space in the output string to avoid excessive reallocations. - Adds various debugging at higher debug levels to quorum voting (into all of voting itself, vote transmission, and vote reception). - Reset service node list internal data structure version to 0. The SN list has to be rescanned anyway at upgrade (its size has changed), so we might as well reset the version and remove the version-dependent serialization code. (Note that the affected code here is for SN states in lmdb storage, not for SN-to-SN communication serialization).
378 lines
12 KiB
C++
378 lines
12 KiB
C++
// Copyright (c) 2014-2019, The Monero Project
|
|
//
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
// permitted provided that the following conditions are met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
// conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
// materials provided with the distribution.
|
|
//
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
// used to endorse or promote products derived from this software without specific
|
|
// prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
//
|
|
// Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers
|
|
|
|
#pragma once
|
|
|
|
#include <boost/serialization/vector.hpp>
|
|
#include <boost/serialization/utility.hpp>
|
|
#include <boost/serialization/variant.hpp>
|
|
#include <boost/serialization/set.hpp>
|
|
#include <boost/serialization/map.hpp>
|
|
#include <boost/serialization/is_bitwise_serializable.hpp>
|
|
#include <boost/archive/binary_iarchive.hpp>
|
|
#include <boost/archive/portable_binary_iarchive.hpp>
|
|
#include <boost/archive/portable_binary_oarchive.hpp>
|
|
#include "cryptonote_basic.h"
|
|
#include "common/unordered_containers_boost_serialization.h"
|
|
#include "crypto/crypto.h"
|
|
#include "ringct/rctTypes.h"
|
|
#include "ringct/rctOps.h"
|
|
|
|
//namespace cryptonote {
|
|
namespace boost
|
|
{
|
|
namespace serialization
|
|
{
|
|
|
|
//---------------------------------------------------
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, crypto::public_key &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & reinterpret_cast<char (&)[sizeof(crypto::public_key)]>(x);
|
|
}
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, crypto::secret_key &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & reinterpret_cast<char (&)[sizeof(crypto::secret_key)]>(x);
|
|
}
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, crypto::key_derivation &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & reinterpret_cast<char (&)[sizeof(crypto::key_derivation)]>(x);
|
|
}
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, crypto::key_image &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & reinterpret_cast<char (&)[sizeof(crypto::key_image)]>(x);
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, crypto::signature &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & reinterpret_cast<char (&)[sizeof(crypto::signature)]>(x);
|
|
}
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, crypto::hash &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & reinterpret_cast<char (&)[sizeof(crypto::hash)]>(x);
|
|
}
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, crypto::hash8 &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & reinterpret_cast<char (&)[sizeof(crypto::hash8)]>(x);
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, cryptonote::txout_to_script &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.keys;
|
|
a & x.script;
|
|
}
|
|
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, cryptonote::txout_to_key &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.key;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, cryptonote::txout_to_scripthash &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.hash;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, cryptonote::txin_gen &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.height;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, cryptonote::txin_to_script &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.prev;
|
|
a & x.prevout;
|
|
a & x.sigset;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, cryptonote::txin_to_scripthash &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.prev;
|
|
a & x.prevout;
|
|
a & x.script;
|
|
a & x.sigset;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, cryptonote::txin_to_key &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.amount;
|
|
a & x.key_offsets;
|
|
a & x.k_image;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, cryptonote::tx_out &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.amount;
|
|
a & x.target;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, cryptonote::txversion &x, const boost::serialization::version_type ver)
|
|
{
|
|
uint16_t v = static_cast<uint16_t>(x);
|
|
a & v;
|
|
if (v >= static_cast<uint16_t>(cryptonote::txversion::_count))
|
|
throw boost::archive::archive_exception(boost::archive::archive_exception::other_exception, "Unsupported tx version");
|
|
x = static_cast<cryptonote::txversion>(v);
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, cryptonote::txtype &x, const boost::serialization::version_type ver)
|
|
{
|
|
uint16_t txtype = static_cast<uint16_t>(x);
|
|
a & txtype;
|
|
if (txtype >= static_cast<uint16_t>(cryptonote::txtype::_count))
|
|
throw boost::archive::archive_exception(boost::archive::archive_exception::other_exception, "Unsupported tx type");
|
|
x = static_cast<cryptonote::txtype>(txtype);
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, cryptonote::transaction_prefix &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.version;
|
|
if (x.version >= cryptonote::txversion::v3_per_output_unlock_times)
|
|
{
|
|
a & x.output_unlock_times;
|
|
if (x.version == cryptonote::txversion::v3_per_output_unlock_times) {
|
|
bool is_deregister = x.type == cryptonote::txtype::state_change;
|
|
a & is_deregister;
|
|
x.type = is_deregister ? cryptonote::txtype::state_change : cryptonote::txtype::standard;
|
|
}
|
|
}
|
|
a & x.unlock_time;
|
|
a & x.vin;
|
|
a & x.vout;
|
|
a & x.extra;
|
|
if (x.version >= cryptonote::txversion::v4_tx_types)
|
|
a & x.type;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, cryptonote::transaction &x, const boost::serialization::version_type ver)
|
|
{
|
|
serialize(a, static_cast<cryptonote::transaction_prefix &>(x), ver);
|
|
if (x.version == cryptonote::txversion::v1)
|
|
{
|
|
a & x.signatures;
|
|
}
|
|
else
|
|
{
|
|
a & (rct::rctSigBase&)x.rct_signatures;
|
|
if (x.rct_signatures.type != rct::RCTTypeNull)
|
|
a & x.rct_signatures.p;
|
|
}
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, cryptonote::block &b, const boost::serialization::version_type ver)
|
|
{
|
|
a & b.major_version;
|
|
a & b.minor_version;
|
|
a & b.timestamp;
|
|
a & b.prev_id;
|
|
a & b.nonce;
|
|
//------------------
|
|
a & b.miner_tx;
|
|
a & b.tx_hashes;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, rct::key &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & reinterpret_cast<char (&)[sizeof(rct::key)]>(x);
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, rct::ctkey &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.dest;
|
|
a & x.mask;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, rct::rangeSig &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.asig;
|
|
a & x.Ci;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, rct::Bulletproof &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.V;
|
|
a & x.A;
|
|
a & x.S;
|
|
a & x.T1;
|
|
a & x.T2;
|
|
a & x.taux;
|
|
a & x.mu;
|
|
a & x.L;
|
|
a & x.R;
|
|
a & x.a;
|
|
a & x.b;
|
|
a & x.t;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, rct::boroSig &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.s0;
|
|
a & x.s1;
|
|
a & x.ee;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, rct::mgSig &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.ss;
|
|
a & x.cc;
|
|
// a & x.II; // not serialized, we can recover it from the tx vin
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, rct::ecdhTuple &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.mask;
|
|
a & x.amount;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, rct::multisig_kLRki &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.k;
|
|
a & x.L;
|
|
a & x.R;
|
|
a & x.ki;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, rct::multisig_out &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.c;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline typename std::enable_if<Archive::is_loading::value, void>::type serializeOutPk(Archive &a, rct::ctkeyV &outPk_, const boost::serialization::version_type ver)
|
|
{
|
|
rct::keyV outPk;
|
|
a & outPk;
|
|
outPk_.resize(outPk.size());
|
|
for (size_t n = 0; n < outPk_.size(); ++n)
|
|
{
|
|
outPk_[n].dest = rct::identity();
|
|
outPk_[n].mask = outPk[n];
|
|
}
|
|
}
|
|
|
|
template <class Archive>
|
|
inline typename std::enable_if<Archive::is_saving::value, void>::type serializeOutPk(Archive &a, rct::ctkeyV &outPk_, const boost::serialization::version_type ver)
|
|
{
|
|
rct::keyV outPk(outPk_.size());
|
|
for (size_t n = 0; n < outPk_.size(); ++n)
|
|
outPk[n] = outPk_[n].mask;
|
|
a & outPk;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, rct::rctSigBase &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.type;
|
|
if (x.type == rct::RCTTypeNull)
|
|
return;
|
|
if (x.type != rct::RCTTypeFull && x.type != rct::RCTTypeSimple && x.type != rct::RCTTypeBulletproof && x.type != rct::RCTTypeBulletproof2)
|
|
throw boost::archive::archive_exception(boost::archive::archive_exception::other_exception, "Unsupported rct type");
|
|
// a & x.message; message is not serialized, as it can be reconstructed from the tx data
|
|
// a & x.mixRing; mixRing is not serialized, as it can be reconstructed from the offsets
|
|
if (x.type == rct::RCTTypeSimple) // moved to prunable with bulletproofs
|
|
a & x.pseudoOuts;
|
|
a & x.ecdhInfo;
|
|
serializeOutPk(a, x.outPk, ver);
|
|
a & x.txnFee;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, rct::rctSigPrunable &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.rangeSigs;
|
|
if (x.rangeSigs.empty())
|
|
a & x.bulletproofs;
|
|
a & x.MGs;
|
|
if (x.rangeSigs.empty())
|
|
a & x.pseudoOuts;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, rct::rctSig &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.type;
|
|
if (x.type == rct::RCTTypeNull)
|
|
return;
|
|
if (x.type != rct::RCTTypeFull && x.type != rct::RCTTypeSimple && x.type != rct::RCTTypeBulletproof && x.type != rct::RCTTypeBulletproof2)
|
|
throw boost::archive::archive_exception(boost::archive::archive_exception::other_exception, "Unsupported rct type");
|
|
// a & x.message; message is not serialized, as it can be reconstructed from the tx data
|
|
// a & x.mixRing; mixRing is not serialized, as it can be reconstructed from the offsets
|
|
if (x.type == rct::RCTTypeSimple)
|
|
a & x.pseudoOuts;
|
|
a & x.ecdhInfo;
|
|
serializeOutPk(a, x.outPk, ver);
|
|
a & x.txnFee;
|
|
//--------------
|
|
a & x.p.rangeSigs;
|
|
if (x.p.rangeSigs.empty())
|
|
a & x.p.bulletproofs;
|
|
a & x.p.MGs;
|
|
if (x.type == rct::RCTTypeBulletproof || x.type == rct::RCTTypeBulletproof2)
|
|
a & x.p.pseudoOuts;
|
|
}
|
|
|
|
template <class Archive>
|
|
inline void serialize(Archive &a, rct::RCTConfig &x, const boost::serialization::version_type ver)
|
|
{
|
|
a & x.range_proof_type;
|
|
a & x.bp_version;
|
|
}
|
|
}
|
|
}
|
|
|
|
//}
|