Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add snapshot booting proposal #6936

Conversation

TristanDebrunner
Copy link
Contributor

@TristanDebrunner TristanDebrunner commented Nov 13, 2019

Problem

A validator booting from a snapshot doesn't ensure that it is caught up and connected to the correct cluster before it starts voting.

Summary of Changes

Add a design proposal for confirming that a validator is caught up.

Towards #6727

@garious
Copy link
Contributor

garious commented Nov 14, 2019

The PR problem description doesn't describe a problem.

@TristanDebrunner
Copy link
Contributor Author

That better @garious?

@TristanDebrunner
Copy link
Contributor Author

After re-writing the problem description, I think it may be better to split this into two parts:

  1. Generate votes only if the proposed bank is not censoring the validator #6744 with the addition of rooting banks when some threshold roots them.

  2. The parts of this proposal pertaining to ensuring that the validator is joining the correct cluster.

@TristanDebrunner
Copy link
Contributor Author

After re-writing the problem description, I think it may be better to split this into two parts:

Though I'm not sure where restoring lockouts fits in, might be a third part.

book/src/proposals/booting-from-snapshot.md Outdated Show resolved Hide resolved
book/src/proposals/booting-from-snapshot.md Outdated Show resolved Hide resolved
book/src/proposals/booting-from-snapshot.md Outdated Show resolved Hide resolved
book/src/proposals/booting-from-snapshot.md Outdated Show resolved Hide resolved
book/src/proposals/booting-from-snapshot.md Outdated Show resolved Hide resolved
book/src/proposals/booting-from-snapshot.md Outdated Show resolved Hide resolved
@TristanDebrunner
Copy link
Contributor Author

I just spoke offline with greg, and he suggested that all the vote txs applied to the working banks should be included in the snapshots, then a validator can verify the signatures and be fully confident in the snapshot just from the information it contains.

@garious
Copy link
Contributor

garious commented Nov 15, 2019

My suggestion was that any vote on the slot height of the snapshot be included in the snapshot. After signature verification, the validator can be certain that a trusted validator calculated a bank hash that matches the hash of the accounts in the snapshot. Any use of validator stake to add weight to the notion of a "trusted" validator is completely optional. And the votes don't need to be on the ledger, since it's a slashable offense to vote on any other blockhash at that same slot height.

@carllin
Copy link
Contributor

carllin commented Nov 15, 2019

@garious, @TristanDebrunner, I think it would have to be a vote on the bank hash of the snapshot, otherwise, a somebody malicious could make up bank state in the snapshot.

A few questions:

  1. The votes are sufficient to show the bank state in the snapshot is correct, but not that the network actually set this snapshot slot as the root. How should we detect that the network has picked a different root than the one in the snapshot?

  2. Even with these votes included in the snapshot, we still have to wait for the canary tx procedure to complete to make sure the validator is caught up, correct? If we have to wait for the canary tx procedure, then it seems repetitive to also include the votes in the snapshot (in order for the canary to be detected, you'll need to see the votes from your trusted validiators) ?

@garious
Copy link
Contributor

garious commented Nov 18, 2019

@carllin, regarding the canary procedure, I think you might be two steps ahead of me and solving problems I haven't worked up to yet. If we have a valid snapshot, I think the next problem is: validator is not caught up to tip and therefore cannot vote and collect rewards. So, of course, the validator would make repair requests. What problems will it encounter there?

@carllin
Copy link
Contributor

carllin commented Nov 18, 2019

@garious, we are hoping repairman + repair will be sufficient to catch the validator up, but this has not been validated on a network going full throttle

@stale
Copy link

stale bot commented Mar 30, 2020

This pull request has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs.

@stale stale bot added the stale [bot only] Added to stale content; results in auto-close after a week. label Mar 30, 2020
@t-nelson t-nelson removed the stale [bot only] Added to stale content; results in auto-close after a week. label Mar 31, 2020
@stale
Copy link

stale bot commented Apr 7, 2020

This pull request has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs.

@stale stale bot added the stale [bot only] Added to stale content; results in auto-close after a week. label Apr 7, 2020
@stale
Copy link

stale bot commented Apr 14, 2020

This stale pull request has been automatically closed. Thank you for your contributions.

@stale stale bot closed this Apr 14, 2020
@mvines mvines reopened this Apr 14, 2020
@stale stale bot removed the stale [bot only] Added to stale content; results in auto-close after a week. label Apr 14, 2020
@stale
Copy link

stale bot commented Apr 22, 2020

This pull request has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs.

@stale stale bot added the stale [bot only] Added to stale content; results in auto-close after a week. label Apr 22, 2020
@stale
Copy link

stale bot commented Apr 29, 2020

This stale pull request has been automatically closed. Thank you for your contributions.

@stale stale bot closed this Apr 29, 2020
@mvines mvines reopened this Apr 29, 2020
@stale stale bot removed the stale [bot only] Added to stale content; results in auto-close after a week. label Apr 29, 2020
@mvines mvines added the noCI Suppress CI on this Pull Request label Apr 29, 2020
@stale
Copy link

stale bot commented May 6, 2020

This pull request has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs.

@stale stale bot added the stale [bot only] Added to stale content; results in auto-close after a week. label May 6, 2020
@stale
Copy link

stale bot commented May 13, 2020

This stale pull request has been automatically closed. Thank you for your contributions.

@stale stale bot closed this May 13, 2020
@mvines mvines reopened this May 13, 2020
@stale stale bot removed the stale [bot only] Added to stale content; results in auto-close after a week. label May 13, 2020
@stale
Copy link

stale bot commented May 20, 2020

This pull request has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs.

@stale stale bot added the stale [bot only] Added to stale content; results in auto-close after a week. label May 20, 2020
@mvines
Copy link
Member

mvines commented May 22, 2020

⚰️
We'll bring this back one day

@mvines mvines closed this May 22, 2020
@mvines mvines mentioned this pull request Jun 18, 2020
1 task
@ryoqun ryoqun mentioned this pull request Jul 16, 2020
1 task
@ryoqun ryoqun mentioned this pull request Jan 20, 2022
29 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
noCI Suppress CI on this Pull Request stale [bot only] Added to stale content; results in auto-close after a week.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

9 participants