-
mj-xmr[m]
-
mj-xmr[m]
Conclusions:
-
mj-xmr[m]
- the forked repo reused the master's cache
-
mj-xmr[m]
- even though the buil directory was different (monero-mj), ccache didn't need to rebuild itself
-
dEBRUYNE
-
mj-xmr[m]
selsta: nice catch
-
selsta
it would be weird to share cache IMO, it's unlikely
-
hyc
have never seen such a monerod behavior. getting a perf snapshot would tell what it's doing
-
selsta
hyc: there is no perf on mac, but I will ask them to do something similar
-
mj-xmr[m]
selsta: I replied in the thread. Mystery solved. The `depends` cache's ID is the same across various forks and master, because it is built from a hash of input files, which happen to be the same. But it's not the same "cache file" from GH perspective, so it's not shared.
-
hyc
selsta: oh I overlooked this was on OSX. from what I've seen, monerod definitely behaves badly on OSX
-
hyc
haven't dug into it but it's pretty unreliable on my M1 Mac
-
selsta
it works perfectly on my mac, which is weird
-
selsta
anyway I bought one of these new M1 Pro Macs, will see if I can reproduce some of your issues
-
hyc
cool, def interested in hearing your results
-
hyc
prob will sell this M1 mac if the M1 pro works better
-
selsta
do you have incoming connections on your home network?
-
hyc
yes
-
hyc
ipv4, i2p, and tor
-
selsta
that might be why I can't reproduce the issues, I only have outgoing connections on my mac
-
Guest0000
hello
-
Guest0000
after changing data dir "-data-dir" monerod cant read new directory and goes allways to standard one "/home/user/.bitmonero"
-
Guest0000
i have 75gb blockchain!
-
hyc
should be "--data-dir"
-
Guest0000
sorry --data-dir
-
Guest0000
what to do
-
hyc
monerod won't fallback to another path if the one you specify doesn't work.
-
Guest0000
is madness to download again
-
hyc
so whatever you're running sounds like something else
-
Guest0000
./monerod --data-dir /old/blcockhain
-
hyc
anyway, not relevant to monero-dev channel. try asking in #monero
-
Guest0000
on monero need reg
-
selsta
are you using the GUI?
-
Guest0000
no cmd
-
Guest0000
monerod fallback because start from the begining
-
Guest0000
start to download block 0,1,2,
-
Guest0000
and by default goes to .bitmonero
-
selsta
Guest0000: try #monero no, no more reg necessary
-
selsta
now*
-
BigmenPixel[m]
selsta: Hello. Patch for normal version display works, but even with `-DGUI_VERSION_TAG=release` displays `0.17.2.3-unknown (Qt 5.15.3)`
-
selsta
I didn't test that
-
selsta
will check if it works for me
-
BigmenPixel[m]
selsta: ok
-
selsta
mj-xmr[m]: c++14 build issue solved (with help)
monero-project/monero #8016
-
UkoeHB
moneromooo: re: wiping secrets in multisig kex strings; it seems RPC request/response structs all use `std::string`. Do I need to change all these to `epee::wipeable_string`?
-
moneromooo
No, RPC goes over the wire, so no point wipeing.
-
moneromooo
But what can be encrypted should be.
-
UkoeHB
In that case, none of the kex messages should be wipeable (they are all exposed to rpc)
-
UkoeHB
In multisig key exchange there are Diffie-Hellman secrets (public keys, that are secret). Since the code doesn't have a wipeable pubkey, I am thinking to add this to `crypto.h`:
-
UkoeHB
```
-
UkoeHB
using public_key_memsafe = epee::mlocked<tools::scrubbed<public_key>>;
-
UkoeHB
```
-
UkoeHB
Any thoughts/objections?
-
UkoeHB
If I change `m_multisig_derivations` from `wallet2` to `crypto::public_key_memsafe`, would there be problems with serialization (or, would it be pointless to use memsafe for that variable, since it can be serialized to file)?
-
moneromooo
I don't think serializatoin would change, but it's easy to test, right ?
-
moneromooo
Change a few pubkeys in wallet2.h to that, load an existing wallet cache.
-
UkoeHB
Ah, backward compatibility isn't necessary, since `m_multisig_derivations` is a temporary variable only used during multisig wallet setup. The current PR will invalidate old stuff anyway.
-
UkoeHB
old unfinished multisig setups*
-
moneromooo
As to pointless or not, is it stored plaintext ?
-
UkoeHB
Idk... are the things in `wallet2::get_keys_file_data()` stored plaintext?
-
moneromooo
No.
-
UkoeHB
Ok :)
-
UkoeHB
The problem is `::serialization::parse_binary` and `::serialization::dump_binary` parse to `std::string`... lol
-
UkoeHB
Eh it's not that important.
-
UkoeHB
`m_multisig_derivations` are useless secrets without user private keys.
-
moneromooo
Ah. OK then.
-
UkoeHB
Anyone know why I can do unordered map of `secret_key`, but not `public_key_memsafe`?
-
UkoeHB
-
UkoeHB
well my static analyzer says it's invalid (still compiling...); it doesn't complain about `std::unordered_set<crypto::public_key_memsafe>`
-
moneromooo
unordered needs hashable (as opposed to operator <).
-
moneromooo
There's a macro somewhere to add a hash for a type.
-
moneromooo
CRYPTO_MAKE_HASHABLE(public_key)
-
moneromooo
You need the same, or just a thin wrapper.
-
UkoeHB
heyy that worked!
-
UkoeHB
moneromooo: what do you mean by making `on_finalize_multisig()` a nop in RPC? Just clear the request/response structs and always return false from `on_finalize_multisig()` (or maybe leave the struct alone and just return false)?
-
moneromooo
I'd say always return true, but that'd work only if it doesn't return data in the previous version.
-
moneromooo
The intent being that an existing RPC user that creates multisig addresses would still work.
-
moneromooo
If it's not that simple, forget about it.
-
UkoeHB
Hmm I think backward compatibility can be maintained. However, would it be better to just clean up the dead code? Maybe that would require more work (i.e. go through and delete all the dead code at once).
-
moneromooo
Depends on the details I guess.
-
UkoeHB
Would bumping the major version require all RPC users to update their code, or just those calling finalize_multisig?
-
moneromooo
Well... depends :)
-
moneromooo
If htey check major version, they'll stop working.
-
moneromooo
If they don't, they'll break if they use finalize_multisig.
-
moneromooo
"stop working" meaning "complain about the version change".
-
UkoeHB
ah gotcha
-
moneromooo
So the mechanism to tell users of an incompatible change ends up being more annoying in practice here. Unfortunte.
-
UkoeHB
Do you know how many dead/deprecated RPC methods there are currently?
-
moneromooo
No, but not many I think.
-
moneromooo
transfer is the only one I can think of.
-
UkoeHB
I will just bump the major. It should be rolled out at same time as a hardfork, so the disruption can be bundled with that larger disruption.
-
selsta
can clients with a higher major connect to daemons with a lower major?