Compare commits

..

No commits in common. "main" and "pallet-slow-clap" have entirely different histories.

8 changed files with 183 additions and 134 deletions

4
Cargo.lock generated
View File

@ -1186,7 +1186,7 @@ dependencies = [
[[package]] [[package]]
name = "casper-runtime" name = "casper-runtime"
version = "3.5.36" version = "3.5.35"
dependencies = [ dependencies = [
"casper-runtime-constants", "casper-runtime-constants",
"frame-benchmarking", "frame-benchmarking",
@ -3837,7 +3837,7 @@ dependencies = [
[[package]] [[package]]
name = "ghost-slow-clap" name = "ghost-slow-clap"
version = "0.4.7" version = "0.4.5"
dependencies = [ dependencies = [
"frame-benchmarking", "frame-benchmarking",
"frame-support", "frame-support",

126
README.md
View File

@ -150,8 +150,28 @@ rustup default stable
rustup update rustup update
``` ```
Add the nightly release and the nightly WebAssembly (wasm) targets
to your development environment by running the following commands:
```bash ```bash
rustup target add wasm32-unknown-unknown --toolchain stable rustup update nightly
```
```bash
rustup target add wasm32-unknown-unknown --toolchain nightly
```
```bash
rustup target add wasm32-unknown-unknown --toolchain stable-x86_64-unknown-linux-gnu
```
If you are trying to install WebAssembly (wasm) on an ARM-based processor like the ones in Raspberry Pi try this instead:
```bash
rustup target add wasm32-unknown-unknown --toolchain stable-aarch64-unknown-linux-gnu
```
**_IF error try_**
```bash
rustup target add wasm32-unknown-unknown --toolchain default
``` ```
Verify the configuration of your development environment by running Verify the configuration of your development environment by running
@ -160,6 +180,10 @@ the following command:
rustup show rustup show
``` ```
```bash
rustup +nightly show
```
You should see something like this: You should see something like this:
![images/img_9.png](images/img_9.png) ![images/img_9.png](images/img_9.png)
@ -170,6 +194,13 @@ Now run:
rustup component add rust-src --toolchain stable rustup component add rust-src --toolchain stable
``` ```
**_IF error try_**
```bash
rustup component add rust-src --toolchain default
```
## Install GHOST ## Install GHOST
Check if Git is already installed: Check if Git is already installed:
@ -180,7 +211,7 @@ git --version
Make a GHOST Directory and go to it: Make a GHOST Directory and go to it:
```bash ```bash
mkdir ~/ghost && cd ~/ghost mkdir ghost && cd ghost
``` ```
Clone GHOST Node Git: Clone GHOST Node Git:
@ -195,7 +226,7 @@ cd ghost-node
Compile the node template by running the following command: Compile the node template by running the following command:
```bash ```bash
./scripts/starter.sh --release cargo build --release
``` ```
The build can take up to 20 minutes depending on the specifications of your machine. The build can take up to 20 minutes depending on the specifications of your machine.
@ -203,6 +234,7 @@ The build can take up to 20 minutes depending on the specifications of your mach
![images/img_12.png](images/img_12.png) ![images/img_12.png](images/img_12.png)
# Boot Node Qualification # Boot Node Qualification
## Boot Node Qualification Test ## Boot Node Qualification Test
@ -288,7 +320,7 @@ Only `port 30333` should be opened.
Press _CTRL+C_ to stop the node. Press _CTRL+C_ to stop the node.
# Launching GHOST TestNet # Launching GHOST TestNet 3.1
Switch to main GIT branch: Switch to main GIT branch:
```bash ```bash
@ -316,7 +348,66 @@ To generate the node key use the following command:
./target/release/ghost key generate-node-key --bin --file=/etc/ghost/node-key ./target/release/ghost key generate-node-key --bin --file=/etc/ghost/node-key
``` ```
Feel free to backup the file on a separate storage device. Generate Wallet Key file with the following command:
```bash
./target/release/ghost key generate | grep "Secret seed" | awk '{$1=$2=""; sub(/^[ \t]+/, ""); print}' > /etc/ghost/wallet-key
```
Display the wallet-key on the screen by using cat command:
```bash
./target/release/ghost key inspect $(cat /etc/ghost/wallet-key)
```
![images/img_22.png](images/img_22.png)
Feel free to back the file on a separate storage device.
Generate Stash Key file with the following command:
```bash
./target/release/ghost key generate | grep "Secret seed" | awk '{$1=$2=""; sub(/^[ \t]+/, ""); print}' > /etc/ghost/stash-key
```
Display the stash-key on the screen by using cat command:
```bash
./target/release/ghost key inspect $(cat /etc/ghost/stash-key)
```
![images/img_23.png](images/img_23.png)
Generate Session Key file with the following command:
```bash
./target/release/ghost key generate | grep "Secret seed" | awk '{$1=$2=""; sub(/^[ \t]+/, ""); print}' > /etc/ghost/session-key
```
You have generates 4 types of Session Keys:
1. Session Key AUDI
2. Session Key BABE
3. Session Key SLOW
4. Session Key GRAN
Now let's display them!
Display the session-key//audi on the screen by using cat command:
```bash
./target/release/ghost key inspect "$(cat /etc/ghost/session-key)//audi"
```
![images/img_24.png](images/img_24.png)
Display the session-key//babe on the screen by using cat command:
```bash
./target/release/ghost key inspect "$(cat /etc/ghost/session-key)//babe"
```
![images/img_25.png](images/img_25.png)
Display the session-key//slow on the screen by using cat command:
```bash
./target/release/ghost key inspect "$(cat /etc/ghost/session-key)//slow"
```
![images/img_26.png](images/img_26.png)
Display the session-key//gran on the screen by using cat command:
```bash
./target/release/ghost key inspect "$(cat /etc/ghost/session-key)//gran" --scheme=ed25519
```
![images/img_27.png](images/img_27.png)
## Build and start the ghost-node ## Build and start the ghost-node
@ -346,7 +437,7 @@ sha256sum /etc/ghost/casper.json
You should see: You should see:
``` ```
9da6045ed6d4fd844e3939573b31c013d0e564e542029330faa6d978cb4a915a ad653233c978bfd00c5e4525b17628632bc4319c5f5f4b4dcc2f050ef3c3d145
``` ```
Create running `ghost-node` service that starts on system boot using `--unit-file` flag. Create running `ghost-node` service that starts on system boot using `--unit-file` flag.
@ -372,7 +463,10 @@ To choose default options press Enter here:
![images/img_30.png](images/img_30.png) ![images/img_30.png](images/img_30.png)
If you want to validate from this node press Enter: Currently, you have to qualify to become a validator node through [GHOST Whales](https://ghostchain.io/whales-apply).
If you were NOT included in the [ghosties file](https://git.ghostchain.io/ghostchain/ghost-node/src/branch/main/service/ghosties) then you cannot be a validator node,
and you can only be a full node so for `disable validator mode? [y/N]` type `y`.
If you were included in the ghosties file you can press Enter:
``` ```
disable validator mode? [y/N]: y disable validator mode? [y/N]: y
``` ```
@ -417,6 +511,17 @@ Type `y` and press _Enter_ for create dedicated user for running `ghost-node`:
![images/img_37.png](images/img_37.png) ![images/img_37.png](images/img_37.png)
Now you can check whether or not the keys on your GHOST Node match those
in the [ghosties file](https://git.ghostchain.io/ghostchain/ghost-node/src/branch/main/service/ghosties) on GHOST Git.
If you are running a **Validator Node** and if you have followed
the Generating Keys Part you will see all `[+]`.
If you are a running a **Full Node** you will see errors:
(Press _Enter_ for prompts)
```bash
./scripts/starter.sh --check-keys
```
Full Node: Full Node:
![images/img_38.png](images/img_38.png) ![images/img_38.png](images/img_38.png)
@ -430,7 +535,7 @@ Start `ghost-node`:
sudo systemctl start ghost-node sudo systemctl start ghost-node
``` ```
Wait ~60 seconds! Wait 60 seconds!
Check node is started: Check node is started:
```bash ```bash
@ -440,6 +545,11 @@ sudo systemctl status ghost-node
For exit press _CTRL+C_ For exit press _CTRL+C_
In order to insert keys run the following flags `--check-keys` `--insert-keys`:
```bash
./scripts/starter.sh --check-keys --insert-keys
```
Restart `ghost-node`: Restart `ghost-node`:
```bash ```bash
sudo systemctl restart ghost-node sudo systemctl restart ghost-node

View File

@ -1,6 +1,6 @@
[package] [package]
name = "ghost-slow-clap" name = "ghost-slow-clap"
version = "0.4.7" version = "0.4.5"
description = "Applause protocol for the EVM bridge" description = "Applause protocol for the EVM bridge"
license.workspace = true license.workspace = true
authors.workspace = true authors.workspace = true

View File

@ -725,12 +725,7 @@ impl<T: Config> Pallet<T> {
let (current_commits, current_last_updated) = current_commitments let (current_commits, current_last_updated) = current_commitments
.get(&authority_index) .get(&authority_index)
.map(|details| { .map(|details| (details.commits + 1, details.last_updated))
(
details.commits.saturating_add(1),
details.last_updated.saturating_add(COMMITMENT_DELAY_MILLIS),
)
})
.unwrap_or((1, 0)); .unwrap_or((1, 0));
ensure!( ensure!(
@ -788,18 +783,34 @@ impl<T: Config> Pallet<T> {
fn start_slow_clapping(block_number: BlockNumberFor<T>) -> OffchainResult<T, ()> { fn start_slow_clapping(block_number: BlockNumberFor<T>) -> OffchainResult<T, ()> {
let session_index = T::ValidatorSet::session_index(); let session_index = T::ValidatorSet::session_index();
let networks = T::NetworkDataHandler::iter().collect::<Vec<_>>(); let networks_len = T::NetworkDataHandler::iter().count();
let network_index = block_number let network_in_use = T::NetworkDataHandler::iter()
.into() .nth(
.as_usize() block_number
.checked_rem(networks.len()) .into()
.unwrap_or_default(); .as_usize()
.checked_rem(networks_len)
let network_in_use = networks .unwrap_or_default(),
.iter() )
.nth(network_index)
.ok_or(OffchainErr::NoStoredNetworks)?; .ok_or(OffchainErr::NoStoredNetworks)?;
let network_id_encoded = network_in_use.0.encode();
let rate_limit_delay_key = Self::create_storage_key(b"rate-limit-", &network_id_encoded);
let rate_limit_delay = Self::read_persistent_offchain_storage(
&rate_limit_delay_key,
network_in_use.1.rate_limit_delay,
);
let network_lock_key = Self::create_storage_key(b"network-lock-", &network_id_encoded);
let block_until =
rt_offchain::Duration::from_millis(rate_limit_delay.max(MIN_LOCK_GUARD_PERIOD));
let mut network_lock = StorageLock::<Time>::with_deadline(&network_lock_key, block_until);
let _lock_guard = network_lock
.try_lock()
.map_err(|_| OffchainErr::OffchainTimeoutPeriod(network_in_use.0))?;
log::info!( log::info!(
target: LOG_TARGET, target: LOG_TARGET,
"👻 Offchain worker started for network #{:?} at block #{:?}", "👻 Offchain worker started for network #{:?} at block #{:?}",
@ -807,15 +818,6 @@ impl<T: Config> Pallet<T> {
block_number, block_number,
); );
let network_id_encoded = network_in_use.0.encode();
let network_lock_key = Self::create_storage_key(b"network-lock-", &network_id_encoded);
let lock_until = rt_offchain::Duration::from_millis(MIN_LOCK_GUARD_PERIOD);
let mut network_lock = StorageLock::<Time>::with_deadline(&network_lock_key, lock_until);
let _lock_guard = network_lock
.try_lock()
.map_err(|_| OffchainErr::OffchainTimeoutPeriod(network_in_use.0))?;
Self::do_evm_claps_or_save_block(session_index, network_in_use.0, &network_in_use.1) Self::do_evm_claps_or_save_block(session_index, network_in_use.0, &network_in_use.1)
} }

View File

@ -1008,8 +1008,8 @@ fn should_disable_on_commitment_inactivity() {
}; };
// two block commitments // two block commitments
for extra_time in 1..=3 { for extra_time in 0..=2 {
block_commitment.last_updated += COMMITMENT_DELAY_MILLIS + extra_time; block_commitment.last_updated += extra_time;
for i in 0..3 { for i in 0..3 {
assert_ok!(do_block_commitment( assert_ok!(do_block_commitment(
session_index, session_index,
@ -1066,9 +1066,9 @@ fn should_disable_on_commitment_block_deviation() {
}; };
// two block commitments // two block commitments
for extra_time in 1..=3 { for extra_time in 0..=2 {
block_commitment.last_updated += COMMITMENT_DELAY_MILLIS + extra_time; block_commitment.last_updated += extra_time;
bad_block_commitment.last_updated += COMMITMENT_DELAY_MILLIS + extra_time; bad_block_commitment.last_updated += extra_time;
for i in 0..3 { for i in 0..3 {
assert_ok!(do_block_commitment( assert_ok!(do_block_commitment(
session_index, session_index,
@ -1093,73 +1093,6 @@ fn should_disable_on_commitment_block_deviation() {
}); });
} }
#[test]
fn should_throw_error_on_fast_commitments() {
let (network_id, _, _) = generate_unique_hash(None, None, None, None, None);
new_test_ext().execute_with(|| {
let session_index = advance_session_and_get_index();
prepare_evm_network(None, None);
let timestamp = SystemTime::now()
.duration_since(UNIX_EPOCH)
.expect("Time went backwards")
.as_millis() as u64;
let mut block_commitment = CommitmentDetails {
last_stored_block: 9_500_000,
commits: 420,
last_updated: timestamp,
};
assert_ok!(do_block_commitment(
session_index,
network_id,
0,
&block_commitment
));
assert_err!(
do_block_commitment(session_index, network_id, 0, &block_commitment),
Error::<Runtime>::TimeWentBackwards,
);
block_commitment.last_updated += COMMITMENT_DELAY_MILLIS / 2;
assert_err!(
do_block_commitment(session_index, network_id, 0, &block_commitment),
Error::<Runtime>::TimeWentBackwards,
);
block_commitment.last_updated += COMMITMENT_DELAY_MILLIS / 2;
assert_err!(
do_block_commitment(session_index, network_id, 0, &block_commitment),
Error::<Runtime>::TimeWentBackwards,
);
block_commitment.last_updated += 1;
assert_ok!(do_block_commitment(
session_index,
network_id,
0,
&block_commitment
));
block_commitment.last_updated = timestamp;
assert_err!(
do_block_commitment(session_index, network_id, 0, &block_commitment),
Error::<Runtime>::TimeWentBackwards,
);
for commitment_details in BlockCommitments::<Runtime>::get(network_id).values() {
assert_eq!(commitment_details.last_stored_block, 9_500_000);
assert_eq!(
commitment_details.last_updated,
timestamp + COMMITMENT_DELAY_MILLIS + 1
);
assert_eq!(commitment_details.commits, 2);
}
});
}
#[test] #[test]
fn should_not_offend_disabled_authorities() { fn should_not_offend_disabled_authorities() {
let (network_id, _, _) = generate_unique_hash(None, None, None, None, None); let (network_id, _, _) = generate_unique_hash(None, None, None, None, None);
@ -1186,8 +1119,8 @@ fn should_not_offend_disabled_authorities() {
Session::disable_index(3); Session::disable_index(3);
// two block commitments // two block commitments
for extra_time in 1..=3 { for extra_time in 0..=2 {
block_commitment.last_updated += COMMITMENT_DELAY_MILLIS + extra_time; block_commitment.last_updated += extra_time;
for i in 0..3 { for i in 0..3 {
assert_ok!(do_block_commitment( assert_ok!(do_block_commitment(
session_index, session_index,
@ -1231,8 +1164,8 @@ fn should_not_slash_by_applause_if_disabled_by_commitment() {
Session::disable_index(3); Session::disable_index(3);
// two block commitments // two block commitments
for extra_time in 1..=3 { for extra_time in 0..=2 {
block_commitment.last_updated += COMMITMENT_DELAY_MILLIS + extra_time; block_commitment.last_updated += extra_time;
for i in 0..3 { for i in 0..3 {
assert_ok!(do_block_commitment( assert_ok!(do_block_commitment(
session_index, session_index,
@ -1270,18 +1203,20 @@ fn should_not_nullify_on_incorrect_block_commitment() {
for i in 0..4 { for i in 0..4 {
assert_ok!(do_block_commitment( assert_ok!(do_block_commitment(
session_index, session_index,
network_id, network_id,
i, i,
&block_commitment &block_commitment
)); ));
} }
block_commitment.last_updated = 0; block_commitment.last_updated = 0;
assert_err!( assert_err!(do_block_commitment(
do_block_commitment(session_index, network_id, 3, &block_commitment), session_index,
Error::<Runtime>::TimeWentBackwards network_id,
); 3,
&block_commitment),
Error::<Runtime>::TimeWentBackwards);
for commitment_details in BlockCommitments::<Runtime>::get(network_id).values() { for commitment_details in BlockCommitments::<Runtime>::get(network_id).values() {
assert_eq!(commitment_details.last_stored_block, 9_500_000); assert_eq!(commitment_details.last_stored_block, 9_500_000);

View File

@ -1,6 +1,6 @@
[package] [package]
name = "casper-runtime" name = "casper-runtime"
version = "3.5.36" version = "3.5.35"
build = "build.rs" build = "build.rs"
description = "Runtime of the Casper Network" description = "Runtime of the Casper Network"
edition.workspace = true edition.workspace = true

View File

@ -118,7 +118,7 @@ pub const VERSION: RuntimeVersion = RuntimeVersion {
impl_name: create_runtime_str!("casper-svengali"), impl_name: create_runtime_str!("casper-svengali"),
authoring_version: 0, authoring_version: 0,
spec_version: 3, spec_version: 3,
impl_version: 2, impl_version: 1,
apis: RUNTIME_API_VERSIONS, apis: RUNTIME_API_VERSIONS,
transaction_version: 1, transaction_version: 1,
state_version: 1, state_version: 1,

View File

@ -81,18 +81,20 @@ extract_seed() {
} }
downgrade_compiler_if_needed() { downgrade_compiler_if_needed() {
echo "[+] fetching the latest ghost-node source code" # TODO: uncomment later
git switch main # echo "[+] fetching the latest ghost-node source code"
git pull origin main # git switch main
# git pull origin main
# 1.86.0 works fine, tested with: # 1.83.0 works fine, tested with:
# ...
# 1.87.0 throws errors during compilation # 1.87.0 throws errors during compilation
# 1.88.0 throws errors during compilation # 1.88.0 throws errors during compilation
LATEST_TESTED_VERSION=86 LATEST_TESTED_VERSION=83
cargo_version=$(cargo --version | cut -d'.' -f2) cargo_version=$(cargo --version | cut -d'.' -f2)
if [ "$cargo_version" -gt "$LATEST_TESTED_VERSION" ]; then if [ "$cargo_version" -gt "$LATEST_TESTED_VERSION" ]; then
echo "[+] downgrading rustc compiler version to 1.86.0" echo "[+] downgrading rustc compiler version to 1.83.0"
rustup default 1.86.0 rustup default 1.83.0
toolchain_name=$(rustup show | grep default | head -n 1 | cut -d' ' -f1) toolchain_name=$(rustup show | grep default | head -n 1 | cut -d' ' -f1)
rustup target add wasm32-unknown-unknown --toolchain $toolchain_name rustup target add wasm32-unknown-unknown --toolchain $toolchain_name
rustup component add rust-src --toolchain $toolchain_name rustup component add rust-src --toolchain $toolchain_name
@ -226,11 +228,11 @@ if [[ $HARD_RESET = true ]]; then
echo "[+] trying to remove locally stored ledger" echo "[+] trying to remove locally stored ledger"
sudo rm -rf "$BASE_PATH/chains/casper_staging_testnet" sudo rm -rf "$BASE_PATH/chains/casper_staging_testnet"
cd $PROJECT_FOLDER # TODO: remove before merging to main
git switch main #cd $PROJECT_FOLDER
git pull origin main #git pull origin main
echo "[+] starting build in 3 seconds..." #echo "[+] starting build in 3 seconds..."
sleep 3 #sleep 3
cargo build --release cargo build --release
printf "[?] are you ready to continue?" printf "[?] are you ready to continue?"