aboutsummaryrefslogtreecommitdiff
path: root/src (follow)
AgeCommit message (Collapse)AuthorFilesLines
2024-04-09net: add IPv6 nodes to default listdev/beber/ipv6Bertrand Jacquin1-0/+3
2024-04-06net: enable IPv6 by defaultBertrand Jacquin7-19/+35
As of 2024-04-01, IPv6 represents ~43% of traffic entering Google with up to 75% is some country, and in generally more available when IPv6 was introduced in Monero in 2019 as part of 155475d97196 ("Add IPv6 support"). Monero overall has a very low presence over IPv6 which in part can be explained from the fact that IPv6 need to be specifically enabled before it is used and often requires nodes to be manually added in configuration. This commit enabled IPv6 by default for both RPC and P2P as an attempt to improve Monero network mesh diversity. The change has been tested in a lot of different scenario: IPv4 only, IPv6 only, IPv4+IPv6, IPv4+IPv6 with broken/invalid IPv4 system configuration, IPv4+IPv6 with broken/invalid IPv6 system configuration. * --p2p-use-ipv6 is now deprecated and has no effect * --p2p-ignore-ipv6 is introduced to ignore unsuccessful IPv6 P2P binding * --rpc-use-ipv6 is now deprecated and has no effect * --rpc-ignore-ipv6 is introduced to ignore unsuccessful IPv6 RPC binding See: https://github.com/monero-project/monero/issues/8818 See: https://www.google.com/intl/en/ipv6/statistics.html See: https://www.vyncke.org/ipv6status/
2024-04-06dns: perform AAAA resolutionBertrand Jacquin2-4/+27
Address backlog item to resolve IPv6 address in addition to IPv4 address. See: https://github.com/monero-project/monero/issues/8818
2024-04-06net: add retro compatibility with legacy IPv4 optionsdev/beber/ipv4Bertrand Jacquin5-0/+47
To ensure retro compatibility, legacy IPv4 daemon arguments and configuration settings changes are marked as deprecated, but can still be used falling back to new option name when new options are not used. Raise warning in case legacy option are used. * --p2p-bind-ip is an alias to --p2p-bind-ipv4-address * --p2p-bind-port is an alias to --p2p-bind-ipv4-port * --p2p-bind-port-ipv6 is an alias to --p2p-bind-ipv6-port * --rpc-bind-ip is an alias to --rpc-bind-ipv4-address * --rpc-restricted-bind-ip is an alias to --rpc-restricted-bind-ipv4-address
2024-04-06net: bring consistency between IPv4 port and IPv6 portBertrand Jacquin3-10/+10
* --p2p-bind-port-ipv4 is replaced with --p2p-bind-ipv4-port * --p2p-bind-port-ipv6 is replaced with --p2p-bind-ipv6-port
2024-04-06net: define IPv4 object explicitlyBertrand Jacquin9-68/+68
Modify all IPv4 variables, function arguments name and daemon arguments to IPv4 specific naming to raise consistency with IPv6. This change is done in order to make source code more legible before addressing #8818. * --p2p-bind-ip is replaced with --p2p-bind-ipv4-address * --p2p-bind-port is replaced with --p2p-bind-port-ipv4 * --rpc-bind-ip is replaced with --rpc-bind-ipv4-address * --rpc-restricted-bind-ip is replaced with --rpc-restricted-bind-ipv4-address Bug: https://github.com/monero-project/monero/issues/8818
2024-03-11ringct: fix trunc_amount field name changejeffro2561-1/+1
Caused in commit 05231400cebfeedbbc0a5386f38a033bba6314b3, PR #9035.
2024-03-08Merge pull request #9225luigi11112-7/+19
a01d7cc Fixed mempool pruning (SChernykh)
2024-03-08Merge pull request #9219luigi11112-3/+3
e6f4875 wallet2: adjust fee during backlog, fix set priority (selsta)
2024-03-08Fixed mempool pruningSChernykh2-7/+19
- Fixed undefined behavior after a call to `remove_tx_from_transient_lists` (it used an invalid iterator) - Fixed `txCompare` (it wasn't strictly weak ordered)
2024-03-08Merge pull request #9222luigi11111-1/+1
66e5081 get_block_template_backlog: better sorting logic (SChernykh)
2024-03-08Merge pull request #9218luigi11111-0/+1
7815023 tx_memory_pool: make double spends a no-drop offense (jeffro256)
2024-03-08get_block_template_backlog: better sorting logicSChernykh1-1/+1
std::sort is unstable, so it can return random sets of transactions when mempool has many transactions with the same fee/byte. It can result in p2pool mining empty blocks sometimes because it doesn't pick up "new" transactions immediately.
2024-03-08wallet2: adjust fee during backlog, fix set priorityselsta2-3/+3
2024-03-07Merge pull request #9195luigi11111-0/+44
2a2da79 free function serialization DSL (jeffro256)
2024-03-07tx_memory_pool: make double spends a no-drop offensejeffro2561-0/+1
Nodes who see different txs in a double spend attack will drop each other, splitting the network. Issue found by @boog900.
2024-02-24free function serialization DSLjeffro2561-0/+44
Example usage for Seraphis types (in global or `sp` namespace): ``` BEGIN_SERIALIZE_OBJECT_FN(sp::SpCoinbaseEnoteCore) FIELD_F(onetime_address) VARINT_FIELD_F(amount) END_SERIALIZE() BEGIN_SERIALIZE_OBJECT_FN(sp::SpEnoteCore) FIELD_F(onetime_address) FIELD_F(amount_commitment) END_SERIALIZE() ```
2024-02-24cmake: require libsodiumtobtoht2-2/+2
2024-02-24Merge pull request #9189luigi11111-1/+2
f7670c9 cryptonote_core: early out on out of bounds scaling parameter (selsta)
2024-02-24Merge pull request #9160luigi11115-4/+31
c50ade5 Daemon-specific proxy for the wallet-rpc. (0xFFFC0000)
2024-02-24Merge pull request #9155luigi11111-0/+4
ed50938 Zero initialize rctSigBase elements (Lee *!* Clagett)
2024-02-24Merge pull request #9138luigi11114-43/+15
cd7ccfb Disable/fix ports with I2P (Lee Clagett)
2024-02-24Merge pull request #9137luigi11111-0/+19
8d25418 daemon: warn user on specifiying ZMQ args with --no-zmq (jeffro256)
2024-02-24Merge pull request #9125luigi11111-1/+0
0c545f6 epee/test: remove levin_protocol_handler and core_proxy tests (jeffro256)
2024-02-24Merge pull request #9006luigi11111-4/+4
47042ce wallet2: call on_reorg callback in handle_reorg (j-berman)
2024-02-20wallet: feature: transfer amount with fee includedjeffro2567-42/+265
To transfer ~5 XMR to an address such that your balance drops by exactly 5 XMR, provide a `subtractfeefrom` flag to the `transfer` command. For example: transfer 76bDHojqFYiFCCYYtzTveJ8oFtmpNp3X1TgV2oKP7rHmZyFK1RvyE4r8vsJzf7SyNohMnbKT9wbcD3XUTgsZLX8LU5JBCfm 5 subtractfeefrom=all If my walet balance was exactly 30 XMR before this transaction, it will be exactly 25 XMR afterwards and the destination address will receive slightly less than 5 XMR. You can manually select which destinations fund the transaction fee and which ones do not by providing the destination index. For example: transfer 75sr8AAr... 3 74M7W4eg... 4 7AbWqDZ6... 5 subtractfeefrom=0,2 This will drop your balance by exactly 12 XMR including fees and will spread the fee cost proportionally (3:5 ratio) over destinations with addresses `75sr8AAr...` and `7AbWqDZ6...`, respectively. Disclaimer: This feature was paid for by @LocalMonero.
2024-02-21cryptonote_core: early out on out of bounds scaling parameterselsta1-1/+2
2024-02-18Daemon-specific proxy for the wallet-rpc.0xFFFC00005-4/+31
1. Daemon-specific proxy is exclusive with global proxy (--proxy). 2. If you set global proxy (--proxy) you cannot set daemon-specific proxy. 3. If you don't set global proxy, you can set proxy (or not set) proxy for each daemon connection with the proxy field in jsonrpc to the wallet-rpc.
2024-02-07daemon: warn user on specifiying ZMQ args with --no-zmqjeffro2561-0/+19
Resolves https://github.com/monero-project/monero/issues/9127
2024-02-06Zero initialize rctSigBase elementsLee *!* Clagett1-0/+4
2024-01-30Disable/fix ports with I2PLee Clagett4-43/+15
2024-01-18Merge pull request #9090luigi11111-34/+10
430b102 Cleanup scoped_ptr in src/common/dns_utils.cpp and header include: * No need for entire new class (Fix #8732). * Fix stdint.h header include in contrib/epee/include/net/http_base.h. (0xFFFC0000)
2024-01-18Merge pull request #9079luigi11111-0/+201
eed975d Fix missing checks for IsObject in ZMQ jsonrpc reading (Lee Clagett)
2024-01-18Merge pull request #9077luigi11115-125/+81
2525200 serialization: remove container wrappers and serialize directly (jeffro256)
2024-01-18Merge pull request #9073luigi11117-25/+49
53e632b fix merge mining with more than one merge mined chain (Crypto City)
2024-01-18Merge pull request #9069luigi11118-147/+53
a11e03a serialization: fix infinite loops and clean up dispatching (jeffro256)
2024-01-18Merge pull request #9059luigi11111-0/+13
2766d12 MMS: Ignore 2 more API errors thrown by latest PyBitmessage (rbrunner7)
2024-01-18Merge pull request #9052luigi11111-7/+16
4acae11 Fix EAGAIN bug in ZMQ-RPC/ZMQ-PUB (Lee *!* Clagett)
2024-01-18Merge pull request #9049luigi11111-3/+1
1062b17 wallet: sign_tx: get tx pubkey from extra (tobtoht)
2024-01-18Merge pull request #9023luigi11111-16/+43
b2eb47d wallet: mitigate statistical dependence for decoy selection within rings (jeffro256)
2024-01-17epee/test: remove levin_protocol_handler and core_proxy testsjeffro2561-1/+0
2023-12-19Cleanup scoped_ptr in src/common/dns_utils.cpp and header include:0xFFFC00001-34/+10
* No need for entire new class (Fix #8732). * Fix stdint.h header include in contrib/epee/include/net/http_base.h.
2023-11-30fix merge mining with more than one merge mined chainCrypto City7-25/+49
reported by sech1
2023-11-28Fix missing checks for IsObject in ZMQ jsonrpc readingLee Clagett1-0/+201
2023-11-28serialization: remove container wrappers and serialize directlyjeffro2565-125/+81
Some downstream code (most notably PR https://github.com/UkoeHB/monero/pull/25) wants to use the src/serialization lib for storing information persistently. When one builds classes/machines wishing to serialize containers, they must use the `serializable_*` container classes. In this case, this makes the Seraphis library code unnecessarily tightly coupled with the src/serialization code since one cannot swap out their type of storage format without major refactoring of class field types. By serializing STL containers directly, we can abstract the serialization details away, making for much cleaner design. Also small bonus side effect of this change is that STL containers with custom Comparators, Allocators, and Hashers are serializable. `std::multimap` is added to the list of serializable containers. Depends upon https://github.com/monero-project/monero/pull/9069.
2023-11-18serialization: fix infinite loops and clean up dispatchingjeffro2568-147/+53
Resolves #8687
2023-11-06Merge pull request #9050luigi11111-0/+26
23179a0 wallet: fix multisig key memory leak (jeffro256)
2023-11-06Merge pull request #9042luigi11111-4/+13
ade57b6 JH hash compiler workarounds (SChernykh)
2023-11-06Merge pull request #9038luigi11115-2/+3
e191083 epee: remove dead code in math_helper and string_tools (jeffro256)
2023-11-06Merge pull request #9035luigi11111-3/+9
0523140 ringct: make ctSigBase serialization follow strict aliasing rule (jeffro256)
2023-11-06Merge pull request #9033luigi11111-0/+1
56dab0f cryptonote_config: include cstdint (jeffro256)
2023-11-06Merge pull request #8990luigi11114-0/+449
c17f73a add sp_transcript (koe) 51e40f7 add seraphis_crypto directory (koe)
2023-11-06Merge pull request #8979luigi11115-7/+11
80b5bf8 gcc: fix uninitialized constructor warnings (jeff)
2023-11-06Merge pull request #8965luigi11111-0/+1
1e2e703 core_rpc_server: silence unused warnings (jeffro256)
2023-11-05MMS: Ignore 2 more API errors thrown by latest PyBitmessagerbrunner71-0/+13
2023-11-04add sp_transcriptkoe1-0/+397
2023-11-04JH hash compiler workaroundsSChernykh1-4/+13
- Fixed uninitialized `state->x` warning - Fixed broken code with `-O3` or `-Ofast` The old code is known to break GCC 10.1 and GCC 11.4
2023-11-04Fix EAGAIN bug in ZMQ-RPC/ZMQ-PUBLee *!* Clagett1-7/+16
2023-11-02wallet: sign_tx: get tx pubkey from extratobtoht1-3/+1
2023-11-02wallet: fix multisig key memory leakjeffro2561-0/+26
Multisig keys per-transfer were being wiped, but not erased, which lead to a ginormous quadratic bloat the more transfers and exports you performed with the wallet.
2023-10-26device: boost -> std locks to fix c++17 compilationselsta3-18/+13
2023-10-25Merge pull request #9002luigi11111-0/+3
932bba3 depends: remove libiconv: unused (tobtoht)
2023-10-25Merge pull request #8989luigi11111-0/+71
9b231c9 add account_generators for mapping public EC generators to account keys (koe)
2023-10-25Merge pull request #8974luigi11111-1/+1
759293d wallet2: fix version check at hf version 1 (j-berman)
2023-10-25Merge pull request #8969luigi11113-91/+91
8190f25 KV_SERIALIZE: remove extraneous semicolons in DSL (jeffro256)
2023-10-25Merge pull request #8966luigi11111-3/+6
f71e2dc multisig: better errors for small malformed kex msgs (jeffro256)
2023-10-25Merge pull request #8958luigi11119-0/+257
b0bf49a blockchain_db: add k-anonymity to txid fetching (jeffro256)
2023-10-25Merge pull request #8752luigi11118-53/+102
c444a7e trezor: support v2.5.2+, add more trezor tests, fix chaingen and tests (Dusan Klinec) 056c996 fix chaingen tests (Dusan Klinec)
2023-10-25epee: remove dead code in math_helper and string_toolsjeffro2565-2/+3
2023-10-23ringct: make `rctSigBase` serialization follow strict aliasing rulejeffro2561-3/+9
Accessing an object of type `char` thru an lvalue of type `crypto::hash8` is undefined behavior. https://developers.redhat.com/blog/2020/06/03/the-joys-and-perils-of-aliasing-in-c-and-c-part-2
2023-10-22cryptonote_config: include cstdintjeffro2561-0/+1
Header was using `uint64_t` without including `<cstdint>` which caused some issues downstream for windows builds
2023-10-17wallet: mitigate statistical dependence for decoy selection within ringsjeffro2561-16/+43
Since we are required to check for uniqueness of decoy picks within any given ring, and since some decoy picks may fail due to unlock time or malformed EC points, the wallet2 decoy selection code was building up a larger than needed *unique* set of decoys for each ring according to a certain distribution *without replacement*. After filtering out the outputs that it couldn't use, it chooses from the remaining decoys uniformly random *without replacement*. The problem with this is that the picks later in the picking process are not independent from the picks earlier in the picking process, and the later picks do not follow the intended decoy distribution as closely as the earlier picks. To understand this intuitively, imagine that you have 1023 marbles. You label 512 marbles with the letter A, label 256 with the letter B, so on and so forth, finally labelling one marble with the letter J. You put them all into a bag, shake it well, and pick 8 marbles from the bag, but everytime you pick a marble of a certain letter, you remove all the other marbles from that bag with the same letter. That very first pick, the odds of picking a certain marble are exactly how you would expect: you are twice as likely to pick A as you are B, twice as likely to pick B as you are C, etc. However, on the second pick, the odds of getting the first pick are 0%, and the chances for everything else is higher. As you go down the line, your picked marbles will have letters that are increasingly more unlikely to pick if you hadn't remove the other marbles. In other words, the distribution of the later marbles will be more "skewed" in comparison to your original distribution of marbles. In Monero's decoy selection, this same statistical effect applies. It is not as dramatic since the distribution is not so steep, and we have more unique values to choose from, but the effect *is* measureable. Because of the protocol rules, we cannot have duplicate ring members, so unless that restriction is removed, we will never have perfectly independent picking. However, since the earlier picks are less affected by this statistical effect, the workaround that this commit offers is to store the order that the outputs were picked and commit to this order after fetching output information over RPC.
2023-10-16gcc: fix uninitialized constructor warningsjeff5-7/+11
2023-10-01Fix: long term block weight cacheBoog9001-33/+2
The long term block weight cache was doing a wrong calculation when adding a new block to the cache.
2023-09-30trezor: support v2.5.2+, add more trezor tests, fix chaingen and testsDusan Klinec8-53/+102
- passphrase logic: remove backward compatibility for 2.4.3, code cleanup. - fix LibUSB cmake for static builds on OSX - tests: all tests now work with passphrase logic enabled. Passphrase test added with different passphrase. no_passphrase test added, Trezor pin test added. Testing wallet opening with correct and incorrect passphrase. Trezor test chain revamp, cleanup. Smaller chain, chain file versioning added. - tests: Trezor tests support TEST_MINING_ENABLED, TEST_MINING_TIMEOUT env vars to change mining-related tests behaviour. - requires protobuf@21 on osx for now (c++14), building with unlinked protobuf: `CMAKE_PREFIX_PATH=$(find /opt/homebrew/Cellar/protobuf@21 -maxdepth 1 -type d -name "21.*" -print -quit) \ make debug-test-trezor -j8`
2023-09-26wallet2: call on_reorg callback in handle_reorgj-berman1-4/+4
2023-09-25depends: remove libiconv: unusedtobtoht1-0/+3
2023-09-21wallet: store watch-only wallet correctly when `change_password()` is calledjeff1-2/+2
The Monero GUI code was calling `Monero::wallet::setPassword()` on every open/close for some reason, and the old `store_to()` code called `store_keys()` with `watch_only=false`, even for watch-only wallets. This caused a bug where the watch-only keys file got saved with with the JSON field `watch_only` set to 0, and after saving a watch-only wallet once, a user could never open it back up against because `load()` errored out. This never got brought up before this because you would have to change the file location of the watch-only wallet to see this bug, and I guess that didn't happen often, but calling the new `store_to()` function with the new `force_rewrite` parameter set to `true` triggers key restoring and the bug appeared.
2023-09-10add seraphis_crypto directorykoe3-0/+52
2023-09-10add account_generators for mapping public EC generators to account keyskoe1-0/+71
2023-08-23wallet2: fix `store_to()` and `change_password()`jeffro2562-34/+90
Resolves #8932 and: 2. Not storing cache when new path is different from old in `store_to()` and 3. Detecting same path when new path contains entire string of old path in `store_to()` and 4. Changing your password / decrypting your keys (in this method or others) and providing a bad original password and getting no error and 5. Changing your password and storing to a new file
2023-08-17wallet2: fix version check at hf version 1j-berman1-1/+1
2023-08-17Merge pull request #8956luigi11111-4/+9
f7fb5c7 scan_tx: fix custom comparator for == case; fixes #8951 (j-berman)
2023-08-17Merge pull request #8955luigi11114-19/+5
192d87c remove more 'using namespace' statements from headers (jeffro256)
2023-08-17Merge pull request #8950luigi11111-4/+4
a0e5c3c wallet2: when checking frozen multisig tx set, don't assume order (jeffro256)
2023-08-17Merge pull request #8927luigi11111-0/+4
1104b59 Update help for set command in simplewallet Add help for max-reorg-depth and load-deprecated-formats options (MasFlam)
2023-08-17Merge pull request #8924luigi111112-98/+115
ffbf9f4 blockchain_and_pool: move to crytonote_core and enforce its usage (jeffro256) d6f86e5 Avoid nullptr dereference when constructing Blockchain and tx_memory_pool (lukas)
2023-08-17Merge pull request #8914luigi11114-25/+59
45b52de wallet-rpc: restore from multisig seed (jeffro256)
2023-08-17Merge pull request #8913luigi11111-1/+1
2a2cf03 blockchain_db: add clarification to get_block_already_generated_coins (jeffro256)
2023-08-17Merge pull request #8890luigi11112-2/+7
e8cac61 core_rpc_server: return ID of submitted block (jeffro256)
2023-08-17Merge pull request #8882luigi11111-3/+3
a8d2a58 wallet2: ensure transfers and sweeps use same fee calc logic (j-berman)
2023-08-17Merge pull request #8853luigi11112-5/+2
6ff87ef net: tor_address: remove support for v2 onion addresses (tobtoht)
2023-08-17Merge pull request #8840luigi11111-1/+2
503c3e0 core: do not force sync the db when finding a block in regtest mode (Crypto City)
2023-08-10`KV_SERIALIZE`: remove extraneous semicolons in DSLjeffro2563-91/+91
Prereq of https://github.com/monero-project/monero/pull/8867
2023-08-08multisig: better errors for small malformed kex msgsjeffro2561-3/+6
Resolves https://github.com/monero-project/monero/issues/8493
2023-08-01core_rpc_server: silence unused warningsjeffro2561-0/+1
2023-08-01blockchain_db: add k-anonymity to txid fetchingjeffro2569-0/+257
Read more about k-anonymity [here](https://en.wikipedia.org/wiki/K-anonymity). We implement this feature in the monero daemon for transactions by providing a "Txid Template", which is simply a txid with all but `num_matching_bits` bits zeroed out, and the number `num_matching_bits`. We add an operation to `BlockchainLMDB` called `get_txids_loose` which takes a txid template and returns all txids in the database (chain and mempool) that satisfy that template. Thus, a client can ask about a specific transaction from a daemon without revealing the exact transaction they are inquiring about. The client can control the statistical chance that other TXIDs (besides the one in question) match the txid template sent to the daemon up to a power of 2. For example, if a client sets their `num_matching_bits` to 5, then statistically any txid has a 1/(2^5) chance to match. With `num_matching_bits`=10, there is a 1/(2^10) chance, so on and so forth. Co-authored-by: ACK-J <60232273+ACK-J@users.noreply.github.com>
2023-07-28wallet-rpc: restore from multisig seedjeffro2564-25/+59
2023-07-19scan_tx: fix custom comparator for == case; fixes #8951j-berman1-4/+9
Co-authored-by: woodser <woodser@protonmail.com>
2023-07-18remove more 'using namespace' statements from headersjeffro2564-19/+5
2023-07-16wallet2: when checking frozen multisig tx set, don't assume orderjeffro2561-4/+4
2023-07-06Merge pull request #8919luigi11111-0/+2
1c20198 Fixup error message. (ComputeryPony)
2023-07-06Merge pull request #8904luigi11112-2/+40
369a5a8 wallet: respect frozen key images in multisig wallets (jeffro256)
2023-07-06Merge pull request #8903luigi11112-0/+29
2608b24 Add CLSAG serialization to ZMQ code (Lee Clagett)
2023-07-06Merge pull request #8902luigi11111-0/+4
c138a28 wallet2: take ignored-by-value outputs into account in balance (Crypto City)
2023-07-06Merge pull request #8894luigi11111-1/+1
c589e15 Speed up perf_timer init on x86 (SChernykh)
2023-07-06Merge pull request #8854luigi11111-20/+15
d9c7cd5 common: do not use DNS to determine if address is local (tobtoht)
2023-07-06Merge pull request #8850luigi11111-1/+1
d391ac0 blockchain: ensure base fee cannot reach 0 (Crypto City)
2023-07-06Merge pull request #8747luigi11113-24/+2
a668312 wallet: remove CLI code for non default ring sizes (Jeffro256)
2023-07-06Merge pull request #8662luigi11113-0/+234
16d17f6 add crypto/generators for direct access to canonical fixed generators (koe)
2023-07-06Merge pull request #8344luigi11112-25/+29
70bbd25 core_rpc_server: new file: rpc_ssl.fingerprint (Jeffrey Ryan)
2023-07-06Merge pull request #8250luigi11115-176/+0
ce86368 Remove src/platform (Jeffrey)
2023-07-06Merge pull request #8888luigi11111-157/+59
a6639df wallet_rpc_server: dedup transfer RPC responses (jeffro256) Very special PR.
2023-07-03common: do not use DNS to determine if address is localtobtoht1-20/+15
Co-authored-by: j-berman <justinberman@protonmail.com>
2023-07-02core_rpc_server: new file: rpc_ssl.fingerprintJeffrey Ryan2-25/+29
2023-07-02Remove src/platformJeffrey5-176/+0
All the files in src/platform are currently unused and unnecessary. See below: * `mingw/alloca.h`: unused throughout project * `msc/sys/param.h`: 1. In `fix_darwin.patch`, `sys/param.h` is well-defined to be used only in OpenBSD environment 2. `int-util.h` already handles when `sys/param.h` is not present and injects its own values 3. `db_drivers/liblmdb/mdb.c` is a similar situation: already explicity handles different platforms 4. `src/crypto/chacha.h` uses `int-util.h` for endianness context * `msc/alloca.h`: unused * `msc/inline_c.h`: not needed. the `inline` keyword is supported for C99 I believe, and certainly for C11, C14+ * `msc/stdbool.h`: `stdbool.h` is standard since C99, and MSVC has supported it for a long time (~10 years)
2023-07-01blockchain_and_pool: move to crytonote_core and enforce its usagejeffro25612-52/+46
2023-07-01Update help for set command in simplewalletMasFlam1-0/+4
Add help for max-reorg-depth and load-deprecated-formats options
2023-06-30core_rpc_server: return ID of submitted blockjeffro2562-2/+7
2023-06-30Avoid nullptr dereference when constructing Blockchain and tx_memory_poollukas8-60/+83
2023-06-28add crypto/generators for direct access to canonical fixed generatorskoe3-0/+234
2023-06-27wallet: remove CLI code for non default ring sizesJeffro2563-24/+2
2023-06-27Fixup error message.ComputeryPony1-0/+2
Looks like the extra MWARNING was supposed to be guarded by the if statement.
2023-06-27Merge pull request #8884luigi11111-0/+2
eeda4a8 wallet2: do not lose exception in current thread on refresh (Crypto City f868768 wallet2: fix missing exceptions from failing wallet refresh (Crypto City)
2023-06-27Merge pull request #8862luigi11111-0/+10
9f80797 protocol: drop peers sending duplicate txes (moneromooo-monero)
2023-06-27Merge pull request #8855luigi11111-9/+0
bb83eb1 daemon: remove --fluffy-blocks (tobtoht)
2023-06-27Merge pull request #8848luigi11113-284/+0
6b8dfb8 daemon: remove os-version (tobtoht)
2023-06-27Merge pull request #8844luigi11111-1/+1
7206ef8 cryptonote_basic: fix amount overflow detection on 32-bit systems (jeffro256)
2023-06-27Merge pull request #8839luigi11111-0/+4
24d56c5 bump lmdb sync threshold for performance (moneromooo-monero)
2023-06-27Merge pull request #8832luigi11111-1/+8
092e964 Fixed RandomX initialization when mining from scratch (SChernykh)
2023-06-27Merge pull request #8804luigi11111-0/+1
ca6c42a Message about DNS_PUBLIC to help users with issue #8452 (OrvilleRed)
2023-06-27Merge pull request #8772luigi11115-11/+7
87e2a64 Allow option 'non-interactive' in monerod config file (almalh)
2023-06-27Merge pull request #8703luigi11112-3/+15
c90c1c3 Show IPv6 addresses in connection list (Guillaume Le Vaillant)
2023-06-27Merge pull request #8661luigi11111-0/+170
f50b9e3 revisions (koe) e5aa058 vtnerd review comments (koe) c60b11f add compare_func() method so user-defined comparison functions are easier to use (koe) 7329873 adjust is_sorted_and_unique() (koe) 3d60475 comment updates (koe) acfaaed add container helpers (koe)
2023-06-27Merge pull request #8660luigi11112-0/+170
2a7435e variant: add mutable unwrap and visitation (koe) bc3cec4 add variant class with cleaner interface than boost::variant<> (koe)
2023-06-21blockchain_db: add clarification to get_block_already_generated_coinsjeffro2561-1/+1
2023-06-15wallet2: fix rescanning tx via scan_txj-berman8-56/+402
- Detach & re-process txs >= lowest scan height - ensures that if a user calls scan_tx(tx1) after scanning tx2, the wallet correctly processes tx1 and tx2 - if a user provides a tx with a height higher than the wallet's last scanned height, the wallet will scan starting from that tx's height - scan_tx requires trusted daemon iff need to re-process existing txs: in addition to querying a daemon for txids, if a user provides a txid of a tx with height *lower* than any *already* scanned txs in the wallet, then the wallet will also query the daemon for all the *higher* txs as well. This is likely unexpected behavior to a caller, and so to protect a caller from revealing txid's to an untrusted daemon in an unexpected way, require the daemon be trusted.
2023-06-12wallet: respect frozen key images in multisig walletsjeffro2562-2/+40
Before this change, if a multisig peer asked you to sign a transaction with a frozen enote, the wallet will do it without any error or warning. This change makes it so that wallets will refuse to sign multisig transactions with frozen enotes. Disclaimer: This PR was generously funded by @LocalMonero.
2023-06-10Add CLSAG serialization to ZMQ codeLee Clagett2-0/+29
2023-06-10wallet2: take ignored-by-value outputs into account in balanceCrypto City1-0/+4
2023-06-08Speed up perf_timer init on x86SChernykh1-1/+1
All Monero binaries have 1 second startup delay because of this code. This is especially noticeable and affects UX in Monero GUI wallet with local node where it often starts another monerod instance to run commands and query node status.
2023-06-07protocol: drop peers sending duplicate txesmoneromooo-monero1-0/+10
2023-06-02cryptonote_basic: fix amount overflow detection on 32-bit systemsjeffro2561-1/+1
On systems where `ULONG_MAX` != `ULLONG_MAX` (e.g. most 32-bit systems), the `round_money_up` function will not correctly detect overflows.
2023-06-02wallet_rpc_server: dedup transfer RPC responsesjeffro2561-157/+59
2023-05-30wallet2: do not lose exception in current thread on refreshCrypto City1-0/+1
2023-05-30wallet2: fix missing exceptions from failing wallet refreshCrypto City1-0/+1
2023-05-27wallet2: ensure transfers and sweeps use same fee calc logicj-berman1-3/+3
Ensures both transfers and sweeps use a fee that's calculated from the tx's weight. Using different logic could theoretically enable distinguishability between the two types of txs. We don't want that.
2023-05-12daemon: remove --fluffy-blockstobtoht1-9/+0
2023-05-12net: tor_address: remove support for v2 onion addressestobtoht2-5/+2
2023-05-11blockchain: ensure base fee cannot reach 0Crypto City1-1/+1
reported by sech1
2023-05-10daemon: remove os-versiontobtoht3-284/+0
2023-05-06fix missing <cstdint> includestobtoht2-0/+2
2023-05-05core: do not force sync the db when finding a block in regtest modeCrypto City1-1/+2
for a slight performance boost in functional tests
2023-05-05bump lmdb sync threshold for performancemoneromooo-monero1-0/+4
Force sync every 100k blocks instead of every 1k blocks. Bumping this value is reported to make a big difference in sync performance, eg: https://github.com/monero-project/monero/issues/8189
2023-04-27Fixed RandomX initialization when mining from scratchSChernykh1-1/+8
2023-04-26Merge pull request #8760luigi11116-1185/+21
1698cb1 remove defunct light wallet code (tobtoht)
2023-04-25remove defunct light wallet codetobtoht6-1185/+21
2023-04-25serialization: remove unused function dump_jsonJeffrey Ryan3-49/+0
2023-04-25Merge pull request #8724luigi111113-1022/+32
d2a591d wallet, simplewallet: Drop support for mine-to-use RPC system (Jeffrey Ryan)
2023-04-25Merge pull request #8802luigi11111-2/+2
eb0e405 gamma picker: relax constructor requirements and test for selecting outputs from first spendable block (jeffro256)
2023-04-25Merge pull request #8798luigi11112-12/+11
f383fd3 wallet2: make m_process_pool_txs local to refresh method (jeffro256)
2023-04-25Merge pull request #8796luigi11111-0/+18
7a4a03d wallet2: do not commit transactions more than once (moneromooo-monero)
2023-04-25Merge pull request #8789luigi11111-3/+0
df9aa6b epee: remove dead code in net_helper (Jeffro256)
2023-04-25Merge pull request #8788luigi11111-4/+9
c61d33e wallet2: fix outdated wallet check (Crypto City)
2023-04-25Merge pull request #8780luigi11111-0/+1
4e16559 rpc: give reason when sending non-hex raw tx (jeffro256)
2023-04-25Merge pull request #8771luigi11111-1/+1
2eaa523 cryptonote::transaction_prefix: fix IDE parsing error (koe)
2023-04-25Merge pull request #8765luigi11111-9/+0
630906c cryptonote_basic: remove unused struct (tobtoht)
2023-04-25Merge pull request #8764luigi11111-0/+13
b13ddb9 Handle case where a command line flag is not allowed in the config file (almalh)
2023-04-25wallet, simplewallet: Drop support for mine-to-use RPC systemJeffrey Ryan13-1022/+32
Using post-PR wallet with pre-PR node will generate error message specific to this PR and not generic "command failed" mesages.
2023-04-25Merge pull request #8748luigi11111-0/+2
11a8360 simplewallet: print fully qualified filename for new wallets (moneromooo-monero)
2023-04-25Merge pull request #8730luigi11111-2/+2
9e09093 wallet_rpc_server: allow creating more than 64 addresses at once (moneromooo-monero)
2023-04-25Merge pull request #8716luigi11112-1/+5
9c7d28b wallet2: add on_reorg callback (Crypto City)
2023-04-25Merge pull request #8698luigi1111419-419/+419
5b4fea7 Copyright: Update to 2023 (mj-xmr)
2023-04-25Merge pull request #8694luigi11111-1/+1
d89e7a2 util: make GMT timestamps explicit for clarity (moneromooo-monero)
2023-04-25Merge pull request #8679luigi11112-45/+55
b986421 adjust multiexp pippenger_cached_data for better reusability (koe)
2023-04-15Allow option 'non-interactive' in monerod config filealmalh5-11/+7
2023-04-14Show IPv6 addresses in connection listGuillaume Le Vaillant3-4/+16
2023-04-02gamma picker: relax constructor requirements and test for selecting outputs ↵jeffro2561-2/+2
from first spendable block
2023-04-02Merge pull request #8810luigi11112-5/+8
d594981 Fixed deadlock and crash when syncing with full dataset on Windows (SChernykh)
2023-04-02Merge pull request #8808luigi11114-3/+10
caa7561 cryptonote core/protocol: don't drop peers for soft offenses (jeffro256)
2023-04-02Merge pull request #8794luigi11112-3/+4
85a4558 wallet2: fix infinite loop in fake out selection (Crypto City)
2023-03-30wallet2: fix infinite loop in fake out selectionCrypto City2-3/+4
The gamma picker and the caller code did not quite agree on the number of rct outputs available for use - by one block - which caused an infinite loop if the picker could never pick outputs from that block but already had picked all other outputs from previous blocks. Also change the range to select from using code from UkoeHB.
2023-03-29cryptonote core/protocol: don't drop peers for soft offensesjeffro2564-3/+10
Also: txs with tx_extra which is too large will not get published to ZMQ Co-authored-by: SChernykh <sergey.v.chernykh@gmail.com>
2023-03-29Fixed deadlock and crash when syncing with full dataset on WindowsSChernykh2-5/+8
It's not allowed to use WaitForSingleObject with _beginthread, because the thread closes its own handle before exiting. So the wait function will either wait on an invalid handle, or on a different handle used by something else. Or, if it starts waiting before the thread exits, the behavior is undefined according to MS: "If this handle is closed while the wait is still pending, the function's behavior is undefined." In my test sync I observed threads getting stuck infinitely on WaitForSingleObject, and then rx_set_main_seedhash spamming new threads when RandomX seed changes again. Eventually the system ran out of resources, and monerod aborted with "Couldn't start RandomX seed thread" message. This PR fixes it by using `_beginthreadex` instead and explicitly closing the handle when it's safe.
2023-03-27Message about DNS_PUBLIC to help users with issue #8452OrvilleRed1-0/+1
2023-03-24Merge pull request #8770luigi11111-2/+22
d7a81cc p2p: do not log to global when re-blocking a subnet (moneromooo-monero) d84a0d7 p2p: avoid spam blocking ipv4 addresses in a blocked subnet (moneromooo-monero)
2023-03-21wallet2: make m_process_pool_txs local to refresh methodjeffro2562-12/+11
2023-03-21wallet2: do not commit transactions more than oncemoneromooo-monero1-0/+18
Fixes #8793
2023-03-19epee: remove dead code in net_helperJeffro2561-3/+0
2023-03-19wallet2: fix outdated wallet checkCrypto City1-4/+9
it was mistaking the number of forks in the fork table for the last fork, and assuming the table was including every single fork
2023-03-18Merge pull request #8775luigi11111-0/+1
1b27fcd device: Add ledger Stax device id to device detection (Francois Beutin)
2023-03-18Merge pull request #8733luigi11116-1/+22
3771641 Add a size limit for tx_extra in tx pool (tevador)
2023-03-18Merge pull request #8707luigi11119-111/+288
7159f92 verRctNonSemanticsSimpleCached: fix fragility (Jeffrey Ryan)
2023-03-18Merge pull request #8076luigi111113-295/+924
c4af33e Enforce restricted # pool txs served via RPC + optimize chunked reqs (j-berman) 9752116 wallet2, RPC: Optimize RPC calls for periodic refresh from 3 down to 1 call (rbrunner7)
2023-03-17verRctNonSemanticsSimpleCached: fix fragilityJeffrey Ryan9-111/+288
2023-03-17rpc: give reason when sending non-hex raw txjeffro2561-0/+1
2023-03-14device: Add ledger Stax device id to device detectionFrancois Beutin1-0/+1
2023-03-09cryptonote::transaction_prefix: fix IDE parsing errorkoe1-1/+1
2023-03-09p2p: do not log to global when re-blocking a subnetmoneromooo-monero1-1/+5
2023-03-07Enforce restricted # pool txs served via RPC + optimize chunked reqsj-berman12-168/+243
- `/getblocks.bin` respects the `RESTRICTED_TX_COUNT` (=100) when returning pool txs via a restricted RPC daemon. - A restricted RPC daemon includes a max of `RESTRICTED_TX_COUNT` txs in the `added_pool_txs` field, and returns any remaining pool hashes in the `remaining_added_pool_txids` field. The client then requests the remaining txs via `/gettransactions` in chunks. - `/gettransactions` no longer does expensive no-ops for ALL pool txs if the client requests a subset of pool txs. Instead it searches for the txs the client explicitly requests. - Reset `m_pool_info_query_time` when a user: (1) rescans the chain (so the wallet re-requests the whole pool) (2) changes the daemon their wallets points to (a new daemon would have a different view of the pool) - `/getblocks.bin` respects the `req.prune` field when returning pool txs. - Pool extension fields in response to `/getblocks.bin` are optional with default 0'd values.