2018-02-26 16:39:40 +00:00
|
|
|
// Copyright (c) 2014-2018, The Monero Project
|
|
|
|
//
|
|
|
|
// All rights reserved.
|
|
|
|
//
|
|
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
|
|
// permitted provided that the following conditions are met:
|
|
|
|
//
|
|
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
|
|
// conditions and the following disclaimer.
|
|
|
|
//
|
|
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
|
|
// materials provided with the distribution.
|
|
|
|
//
|
|
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
|
|
// used to endorse or promote products derived from this software without specific
|
|
|
|
// prior written permission.
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
|
|
|
#include <boost/range/adaptor/transformed.hpp>
|
|
|
|
#include <boost/algorithm/string.hpp>
|
2018-03-18 10:55:21 +00:00
|
|
|
#include <boost/archive/portable_binary_iarchive.hpp>
|
|
|
|
#include <boost/archive/portable_binary_oarchive.hpp>
|
|
|
|
#include "common/unordered_containers_boost_serialization.h"
|
2018-02-26 16:39:40 +00:00
|
|
|
#include "common/command_line.h"
|
|
|
|
#include "common/varint.h"
|
2018-03-18 10:55:21 +00:00
|
|
|
#include "serialization/crypto.h"
|
|
|
|
#include "cryptonote_basic/cryptonote_boost_serialization.h"
|
2018-02-26 16:39:40 +00:00
|
|
|
#include "cryptonote_core/tx_pool.h"
|
|
|
|
#include "cryptonote_core/cryptonote_core.h"
|
|
|
|
#include "cryptonote_core/blockchain.h"
|
|
|
|
#include "blockchain_db/blockchain_db.h"
|
|
|
|
#include "blockchain_db/db_types.h"
|
|
|
|
#include "wallet/ringdb.h"
|
|
|
|
#include "version.h"
|
|
|
|
|
|
|
|
#undef MONERO_DEFAULT_LOG_CATEGORY
|
|
|
|
#define MONERO_DEFAULT_LOG_CATEGORY "bcutil"
|
|
|
|
|
|
|
|
namespace po = boost::program_options;
|
|
|
|
using namespace epee;
|
|
|
|
using namespace cryptonote;
|
|
|
|
|
|
|
|
struct output_data
|
|
|
|
{
|
|
|
|
uint64_t amount;
|
|
|
|
uint64_t index;
|
2018-03-18 10:55:21 +00:00
|
|
|
output_data(): amount(0), index(0) {}
|
2018-02-26 16:39:40 +00:00
|
|
|
output_data(uint64_t a, uint64_t i): amount(a), index(i) {}
|
|
|
|
bool operator==(const output_data &other) const { return other.amount == amount && other.index == index; }
|
2018-03-18 10:55:21 +00:00
|
|
|
template <typename t_archive> void serialize(t_archive &a, const unsigned int ver)
|
|
|
|
{
|
|
|
|
a & amount;
|
|
|
|
a & index;
|
|
|
|
}
|
2018-02-26 16:39:40 +00:00
|
|
|
};
|
2018-03-18 10:55:21 +00:00
|
|
|
BOOST_CLASS_VERSION(output_data, 0)
|
|
|
|
|
2018-02-26 16:39:40 +00:00
|
|
|
namespace std
|
|
|
|
{
|
|
|
|
template<> struct hash<output_data>
|
|
|
|
{
|
|
|
|
size_t operator()(const output_data &od) const
|
|
|
|
{
|
|
|
|
const uint64_t data[2] = {od.amount, od.index};
|
|
|
|
crypto::hash h;
|
|
|
|
crypto::cn_fast_hash(data, 2 * sizeof(uint64_t), h);
|
|
|
|
return reinterpret_cast<const std::size_t &>(h);
|
|
|
|
}
|
|
|
|
};
|
2018-04-19 08:36:31 +00:00
|
|
|
template<> struct hash<std::vector<uint64_t>>
|
|
|
|
{
|
|
|
|
size_t operator()(const std::vector<uint64_t> &v) const
|
|
|
|
{
|
|
|
|
crypto::hash h;
|
|
|
|
crypto::cn_fast_hash(v.data(), v.size() * sizeof(uint64_t), h);
|
|
|
|
return reinterpret_cast<const std::size_t &>(h);
|
|
|
|
}
|
|
|
|
};
|
2018-02-26 16:39:40 +00:00
|
|
|
}
|
|
|
|
|
2018-03-18 10:55:21 +00:00
|
|
|
struct blackball_state_t
|
|
|
|
{
|
|
|
|
std::unordered_map<crypto::key_image, std::vector<uint64_t>> relative_rings;
|
|
|
|
std::unordered_map<output_data, std::unordered_set<crypto::key_image>> outputs;
|
|
|
|
std::unordered_map<std::string, uint64_t> processed_heights;
|
|
|
|
std::unordered_set<output_data> spent;
|
2018-04-19 08:36:31 +00:00
|
|
|
std::unordered_map<std::vector<uint64_t>, size_t> ring_instances;
|
2018-03-18 10:55:21 +00:00
|
|
|
|
|
|
|
template <typename t_archive> void serialize(t_archive &a, const unsigned int ver)
|
|
|
|
{
|
|
|
|
a & relative_rings;
|
|
|
|
a & outputs;
|
|
|
|
a & processed_heights;
|
|
|
|
a & spent;
|
2018-04-19 08:36:31 +00:00
|
|
|
if (ver < 1)
|
|
|
|
return;
|
|
|
|
a & ring_instances;
|
2018-03-18 10:55:21 +00:00
|
|
|
}
|
|
|
|
};
|
2018-04-19 08:36:31 +00:00
|
|
|
BOOST_CLASS_VERSION(blackball_state_t, 1)
|
2018-03-18 10:55:21 +00:00
|
|
|
|
2018-02-26 16:39:40 +00:00
|
|
|
static std::string get_default_db_path()
|
|
|
|
{
|
|
|
|
boost::filesystem::path dir = tools::get_default_data_dir();
|
|
|
|
// remove .bitmonero, replace with .shared-ringdb
|
|
|
|
dir = dir.remove_filename();
|
|
|
|
dir /= ".shared-ringdb";
|
|
|
|
return dir.string();
|
|
|
|
}
|
|
|
|
|
2018-03-18 10:55:21 +00:00
|
|
|
static bool for_all_transactions(const std::string &filename, uint64_t &start_idx, const std::function<bool(const cryptonote::transaction_prefix&)> &f)
|
2018-02-26 16:39:40 +00:00
|
|
|
{
|
|
|
|
MDB_env *env;
|
|
|
|
MDB_dbi dbi;
|
|
|
|
MDB_txn *txn;
|
|
|
|
MDB_cursor *cur;
|
|
|
|
int dbr;
|
|
|
|
bool tx_active = false;
|
|
|
|
|
|
|
|
dbr = mdb_env_create(&env);
|
|
|
|
if (dbr) throw std::runtime_error("Failed to create LDMB environment: " + std::string(mdb_strerror(dbr)));
|
|
|
|
dbr = mdb_env_set_maxdbs(env, 2);
|
|
|
|
if (dbr) throw std::runtime_error("Failed to set max env dbs: " + std::string(mdb_strerror(dbr)));
|
|
|
|
const std::string actual_filename = filename;
|
|
|
|
dbr = mdb_env_open(env, actual_filename.c_str(), 0, 0664);
|
|
|
|
if (dbr) throw std::runtime_error("Failed to open rings database file '"
|
|
|
|
+ actual_filename + "': " + std::string(mdb_strerror(dbr)));
|
|
|
|
|
|
|
|
dbr = mdb_txn_begin(env, NULL, 0, &txn);
|
|
|
|
if (dbr) throw std::runtime_error("Failed to create LMDB transaction: " + std::string(mdb_strerror(dbr)));
|
|
|
|
epee::misc_utils::auto_scope_leave_caller txn_dtor = epee::misc_utils::create_scope_leave_handler([&](){if (tx_active) mdb_txn_abort(txn);});
|
|
|
|
tx_active = true;
|
|
|
|
|
|
|
|
dbr = mdb_dbi_open(txn, "txs_pruned", MDB_INTEGERKEY, &dbi);
|
|
|
|
if (dbr)
|
|
|
|
dbr = mdb_dbi_open(txn, "txs", MDB_INTEGERKEY, &dbi);
|
|
|
|
if (dbr) throw std::runtime_error("Failed to open LMDB dbi: " + std::string(mdb_strerror(dbr)));
|
|
|
|
dbr = mdb_cursor_open(txn, dbi, &cur);
|
|
|
|
if (dbr) throw std::runtime_error("Failed to create LMDB cursor: " + std::string(mdb_strerror(dbr)));
|
|
|
|
|
|
|
|
MDB_val k;
|
|
|
|
MDB_val v;
|
|
|
|
bool fret = true;
|
|
|
|
|
2018-03-18 10:55:21 +00:00
|
|
|
k.mv_size = sizeof(uint64_t);
|
|
|
|
k.mv_data = &start_idx;
|
|
|
|
MDB_cursor_op op = MDB_SET;
|
2018-02-26 16:39:40 +00:00
|
|
|
while (1)
|
|
|
|
{
|
|
|
|
int ret = mdb_cursor_get(cur, &k, &v, op);
|
|
|
|
op = MDB_NEXT;
|
|
|
|
if (ret == MDB_NOTFOUND)
|
|
|
|
break;
|
|
|
|
if (ret)
|
|
|
|
throw std::runtime_error("Failed to enumerate transactions: " + std::string(mdb_strerror(ret)));
|
|
|
|
|
2018-03-18 10:55:21 +00:00
|
|
|
if (k.mv_size != sizeof(uint64_t))
|
|
|
|
throw std::runtime_error("Bad key size");
|
|
|
|
const uint64_t idx = *(uint64_t*)k.mv_data;
|
|
|
|
if (idx < start_idx)
|
|
|
|
continue;
|
|
|
|
|
2018-02-26 16:39:40 +00:00
|
|
|
cryptonote::transaction_prefix tx;
|
|
|
|
blobdata bd;
|
|
|
|
bd.assign(reinterpret_cast<char*>(v.mv_data), v.mv_size);
|
|
|
|
std::stringstream ss;
|
|
|
|
ss << bd;
|
|
|
|
binary_archive<false> ba(ss);
|
|
|
|
bool r = do_serialize(ba, tx);
|
|
|
|
CHECK_AND_ASSERT_MES(r, false, "Failed to parse transaction from blob");
|
|
|
|
|
2018-03-18 10:55:21 +00:00
|
|
|
start_idx = *(uint64_t*)k.mv_data;
|
2018-02-26 16:39:40 +00:00
|
|
|
if (!f(tx)) {
|
|
|
|
fret = false;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mdb_cursor_close(cur);
|
|
|
|
mdb_txn_commit(txn);
|
|
|
|
tx_active = false;
|
|
|
|
mdb_dbi_close(env, dbi);
|
|
|
|
mdb_env_close(env);
|
|
|
|
return fret;
|
|
|
|
}
|
|
|
|
|
2018-04-19 08:36:31 +00:00
|
|
|
static std::vector<uint64_t> canonicalize(const std::vector<uint64_t> &v)
|
|
|
|
{
|
|
|
|
std::vector<uint64_t> c;
|
|
|
|
c.reserve(v.size());
|
|
|
|
c.push_back(v[0]);
|
|
|
|
for (size_t n = 1; n < v.size(); ++n)
|
|
|
|
{
|
|
|
|
if (v[n] != 0)
|
|
|
|
c.push_back(v[n]);
|
|
|
|
}
|
|
|
|
if (c.size() < v.size())
|
|
|
|
{
|
|
|
|
MINFO("Ring has duplicate member(s): " <<
|
|
|
|
boost::join(v | boost::adaptors::transformed([](uint64_t out){return std::to_string(out);}), " "));
|
|
|
|
}
|
|
|
|
return c;
|
|
|
|
}
|
|
|
|
|
2018-02-26 16:39:40 +00:00
|
|
|
int main(int argc, char* argv[])
|
|
|
|
{
|
|
|
|
TRY_ENTRY();
|
|
|
|
|
|
|
|
epee::string_tools::set_module_name_and_folder(argv[0]);
|
|
|
|
|
|
|
|
std::string default_db_type = "lmdb";
|
|
|
|
|
|
|
|
std::string available_dbs = cryptonote::blockchain_db_types(", ");
|
|
|
|
available_dbs = "available: " + available_dbs;
|
|
|
|
|
|
|
|
uint32_t log_level = 0;
|
|
|
|
|
|
|
|
tools::on_startup();
|
|
|
|
|
|
|
|
boost::filesystem::path output_file_path;
|
|
|
|
|
|
|
|
po::options_description desc_cmd_only("Command line options");
|
|
|
|
po::options_description desc_cmd_sett("Command line options and settings options");
|
|
|
|
const command_line::arg_descriptor<std::string, false, true, 2> arg_blackball_db_dir = {
|
|
|
|
"blackball-db-dir", "Specify blackball database directory",
|
|
|
|
get_default_db_path(),
|
|
|
|
{{ &arg_testnet_on, &arg_stagenet_on }},
|
2018-06-04 10:02:06 +00:00
|
|
|
[](std::array<bool, 2> testnet_stagenet, bool defaulted, std::string val)->std::string {
|
2018-02-26 16:39:40 +00:00
|
|
|
if (testnet_stagenet[0])
|
|
|
|
return (boost::filesystem::path(val) / "testnet").string();
|
|
|
|
else if (testnet_stagenet[1])
|
|
|
|
return (boost::filesystem::path(val) / "stagenet").string();
|
|
|
|
return val;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
const command_line::arg_descriptor<std::string> arg_log_level = {"log-level", "0-4 or categories", ""};
|
|
|
|
const command_line::arg_descriptor<std::string> arg_database = {
|
|
|
|
"database", available_dbs.c_str(), default_db_type
|
|
|
|
};
|
|
|
|
const command_line::arg_descriptor<bool> arg_rct_only = {"rct-only", "Only work on ringCT outputs", false};
|
|
|
|
const command_line::arg_descriptor<std::vector<std::string> > arg_inputs = {"inputs", "Path to Monero DB, and path to any fork DBs"};
|
|
|
|
|
|
|
|
command_line::add_arg(desc_cmd_sett, arg_blackball_db_dir);
|
|
|
|
command_line::add_arg(desc_cmd_sett, cryptonote::arg_testnet_on);
|
|
|
|
command_line::add_arg(desc_cmd_sett, cryptonote::arg_stagenet_on);
|
|
|
|
command_line::add_arg(desc_cmd_sett, arg_log_level);
|
|
|
|
command_line::add_arg(desc_cmd_sett, arg_database);
|
|
|
|
command_line::add_arg(desc_cmd_sett, arg_rct_only);
|
|
|
|
command_line::add_arg(desc_cmd_sett, arg_inputs);
|
|
|
|
command_line::add_arg(desc_cmd_only, command_line::arg_help);
|
|
|
|
|
|
|
|
po::options_description desc_options("Allowed options");
|
|
|
|
desc_options.add(desc_cmd_only).add(desc_cmd_sett);
|
|
|
|
|
|
|
|
po::positional_options_description positional_options;
|
|
|
|
positional_options.add(arg_inputs.name, -1);
|
|
|
|
|
|
|
|
po::variables_map vm;
|
|
|
|
bool r = command_line::handle_error_helper(desc_options, [&]()
|
|
|
|
{
|
|
|
|
auto parser = po::command_line_parser(argc, argv).options(desc_options).positional(positional_options);
|
|
|
|
po::store(parser.run(), vm);
|
|
|
|
po::notify(vm);
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
if (! r)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (command_line::get_arg(vm, command_line::arg_help))
|
|
|
|
{
|
|
|
|
std::cout << "Monero '" << MONERO_RELEASE_NAME << "' (v" << MONERO_VERSION_FULL << ")" << ENDL << ENDL;
|
|
|
|
std::cout << desc_options << std::endl;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
mlog_configure(mlog_get_default_log_path("monero-blockchain-blackball.log"), true);
|
|
|
|
if (!command_line::is_arg_defaulted(vm, arg_log_level))
|
|
|
|
mlog_set_log(command_line::get_arg(vm, arg_log_level).c_str());
|
|
|
|
else
|
|
|
|
mlog_set_log(std::string(std::to_string(log_level) + ",bcutil:INFO").c_str());
|
|
|
|
|
|
|
|
LOG_PRINT_L0("Starting...");
|
|
|
|
|
|
|
|
bool opt_testnet = command_line::get_arg(vm, cryptonote::arg_testnet_on);
|
|
|
|
bool opt_stagenet = command_line::get_arg(vm, cryptonote::arg_stagenet_on);
|
|
|
|
network_type net_type = opt_testnet ? TESTNET : opt_stagenet ? STAGENET : MAINNET;
|
|
|
|
output_file_path = command_line::get_arg(vm, arg_blackball_db_dir);
|
|
|
|
bool opt_rct_only = command_line::get_arg(vm, arg_rct_only);
|
|
|
|
|
|
|
|
std::string db_type = command_line::get_arg(vm, arg_database);
|
|
|
|
if (!cryptonote::blockchain_valid_db_type(db_type))
|
|
|
|
{
|
|
|
|
std::cerr << "Invalid database type: " << db_type << std::endl;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we wanted to use the memory pool, we would set up a fake_core.
|
|
|
|
|
|
|
|
// Use Blockchain instead of lower-level BlockchainDB for two reasons:
|
|
|
|
// 1. Blockchain has the init() method for easy setup
|
|
|
|
// 2. exporter needs to use get_current_blockchain_height(), get_block_id_by_height(), get_block_by_hash()
|
|
|
|
//
|
|
|
|
// cannot match blockchain_storage setup above with just one line,
|
|
|
|
// e.g.
|
|
|
|
// Blockchain* core_storage = new Blockchain(NULL);
|
|
|
|
// because unlike blockchain_storage constructor, which takes a pointer to
|
|
|
|
// tx_memory_pool, Blockchain's constructor takes tx_memory_pool object.
|
|
|
|
LOG_PRINT_L0("Initializing source blockchain (BlockchainDB)");
|
|
|
|
const std::vector<std::string> inputs = command_line::get_arg(vm, arg_inputs);
|
|
|
|
if (inputs.empty())
|
|
|
|
{
|
|
|
|
LOG_PRINT_L0("No inputs given");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
std::vector<std::unique_ptr<Blockchain>> core_storage(inputs.size());
|
2018-04-12 12:51:26 +00:00
|
|
|
Blockchain *blockchain = NULL;
|
|
|
|
tx_memory_pool m_mempool(*blockchain);
|
2018-02-26 16:39:40 +00:00
|
|
|
for (size_t n = 0; n < inputs.size(); ++n)
|
|
|
|
{
|
|
|
|
core_storage[n].reset(new Blockchain(m_mempool));
|
|
|
|
|
|
|
|
BlockchainDB* db = new_db(db_type);
|
|
|
|
if (db == NULL)
|
|
|
|
{
|
|
|
|
LOG_ERROR("Attempted to use non-existent database type: " << db_type);
|
|
|
|
throw std::runtime_error("Attempting to use non-existent database type");
|
|
|
|
}
|
|
|
|
LOG_PRINT_L0("database: " << db_type);
|
|
|
|
|
|
|
|
std::string filename = inputs[n];
|
|
|
|
while (boost::ends_with(filename, "/") || boost::ends_with(filename, "\\"))
|
|
|
|
filename.pop_back();
|
|
|
|
LOG_PRINT_L0("Loading blockchain from folder " << filename << " ...");
|
|
|
|
|
|
|
|
try
|
|
|
|
{
|
|
|
|
db->open(filename, DBF_RDONLY);
|
|
|
|
}
|
|
|
|
catch (const std::exception& e)
|
|
|
|
{
|
|
|
|
LOG_PRINT_L0("Error opening database: " << e.what());
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
r = core_storage[n]->init(db, net_type);
|
|
|
|
|
|
|
|
CHECK_AND_ASSERT_MES(r, 1, "Failed to initialize source blockchain storage");
|
|
|
|
LOG_PRINT_L0("Source blockchain storage initialized OK");
|
|
|
|
}
|
|
|
|
|
|
|
|
boost::filesystem::path direc(output_file_path.string());
|
|
|
|
if (boost::filesystem::exists(direc))
|
|
|
|
{
|
|
|
|
if (!boost::filesystem::is_directory(direc))
|
|
|
|
{
|
|
|
|
MERROR("LMDB needs a directory path, but a file was passed: " << output_file_path.string());
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (!boost::filesystem::create_directories(direc))
|
|
|
|
{
|
|
|
|
MERROR("Failed to create directory: " << output_file_path.string());
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
LOG_PRINT_L0("Scanning for blackballable outputs...");
|
|
|
|
|
|
|
|
size_t done = 0;
|
2018-03-18 10:55:21 +00:00
|
|
|
blackball_state_t state;
|
|
|
|
std::unordered_set<output_data> newly_spent;
|
|
|
|
const std::string state_file_path = (boost::filesystem::path(output_file_path) / "blackball-state.bin").string();
|
|
|
|
|
|
|
|
LOG_PRINT_L0("Loading state data from " << state_file_path);
|
|
|
|
std::ifstream state_data_in;
|
|
|
|
state_data_in.open(state_file_path, std::ios_base::binary | std::ios_base::in);
|
|
|
|
if (!state_data_in.fail())
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
boost::archive::portable_binary_iarchive a(state_data_in);
|
|
|
|
a >> state;
|
|
|
|
}
|
|
|
|
catch (const std::exception &e)
|
|
|
|
{
|
|
|
|
MERROR("Failed to load state data from " << state_file_path << ", restarting from scratch");
|
|
|
|
state = blackball_state_t();
|
|
|
|
}
|
|
|
|
state_data_in.close();
|
|
|
|
}
|
|
|
|
uint64_t start_blackballed_outputs = state.spent.size();
|
2018-03-04 13:30:40 +00:00
|
|
|
|
|
|
|
cryptonote::block b = core_storage[0]->get_db().get_block_from_height(0);
|
|
|
|
tools::ringdb ringdb(output_file_path.string(), epee::string_tools::pod_to_hex(get_block_hash(b)));
|
2018-02-26 16:39:40 +00:00
|
|
|
|
|
|
|
for (size_t n = 0; n < inputs.size(); ++n)
|
|
|
|
{
|
2018-03-18 10:55:21 +00:00
|
|
|
const std::string canonical = boost::filesystem::canonical(inputs[n]).string();
|
|
|
|
uint64_t start_idx = 0;
|
|
|
|
auto it = state.processed_heights.find(canonical);
|
|
|
|
if (it != state.processed_heights.end())
|
|
|
|
start_idx = it->second;
|
|
|
|
LOG_PRINT_L0("Reading blockchain from " << inputs[n] << " from " << start_idx);
|
|
|
|
for_all_transactions(inputs[n], start_idx, [&](const cryptonote::transaction_prefix &tx)->bool
|
2018-02-26 16:39:40 +00:00
|
|
|
{
|
|
|
|
for (const auto &in: tx.vin)
|
|
|
|
{
|
|
|
|
if (in.type() != typeid(txin_to_key))
|
|
|
|
continue;
|
|
|
|
const auto &txin = boost::get<txin_to_key>(in);
|
|
|
|
if (opt_rct_only && txin.amount != 0)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
const std::vector<uint64_t> absolute = cryptonote::relative_output_offsets_to_absolute(txin.key_offsets);
|
|
|
|
if (n == 0)
|
|
|
|
for (uint64_t out: absolute)
|
2018-03-18 10:55:21 +00:00
|
|
|
state.outputs[output_data(txin.amount, out)].insert(txin.k_image);
|
2018-02-26 16:39:40 +00:00
|
|
|
|
2018-04-19 08:36:31 +00:00
|
|
|
std::vector<uint64_t> new_ring = canonicalize(txin.key_offsets);
|
2018-02-26 16:39:40 +00:00
|
|
|
const uint32_t ring_size = txin.key_offsets.size();
|
2018-04-19 08:36:31 +00:00
|
|
|
state.ring_instances[new_ring] += 1;
|
2018-02-26 16:39:40 +00:00
|
|
|
if (ring_size == 1)
|
|
|
|
{
|
2018-04-19 08:36:31 +00:00
|
|
|
const crypto::public_key pkey = core_storage[n]->get_output_key(txin.amount, absolute[0]);
|
2018-02-26 16:39:40 +00:00
|
|
|
MINFO("Blackballing output " << pkey << ", due to being used in a 1-ring");
|
2018-02-27 08:30:59 +00:00
|
|
|
ringdb.blackball(pkey);
|
2018-04-19 08:36:31 +00:00
|
|
|
newly_spent.insert(output_data(txin.amount, absolute[0]));
|
|
|
|
state.spent.insert(output_data(txin.amount, absolute[0]));
|
|
|
|
}
|
|
|
|
else if (state.ring_instances[new_ring] == new_ring.size())
|
|
|
|
{
|
|
|
|
for (size_t o = 0; o < new_ring.size(); ++o)
|
|
|
|
{
|
|
|
|
const crypto::public_key pkey = core_storage[n]->get_output_key(txin.amount, absolute[o]);
|
|
|
|
MINFO("Blackballing output " << pkey << ", due to being used in " << new_ring.size() << " identical " << new_ring.size() << "-rings");
|
|
|
|
ringdb.blackball(pkey);
|
|
|
|
newly_spent.insert(output_data(txin.amount, absolute[o]));
|
|
|
|
state.spent.insert(output_data(txin.amount, absolute[o]));
|
|
|
|
}
|
2018-02-26 16:39:40 +00:00
|
|
|
}
|
2018-03-18 10:55:21 +00:00
|
|
|
else if (state.relative_rings.find(txin.k_image) != state.relative_rings.end())
|
2018-02-26 16:39:40 +00:00
|
|
|
{
|
|
|
|
MINFO("Key image " << txin.k_image << " already seen: rings " <<
|
2018-03-18 10:55:21 +00:00
|
|
|
boost::join(state.relative_rings[txin.k_image] | boost::adaptors::transformed([](uint64_t out){return std::to_string(out);}), " ") <<
|
2018-02-26 16:39:40 +00:00
|
|
|
", " << boost::join(txin.key_offsets | boost::adaptors::transformed([](uint64_t out){return std::to_string(out);}), " "));
|
2018-03-18 10:55:21 +00:00
|
|
|
if (state.relative_rings[txin.k_image] != txin.key_offsets)
|
2018-02-26 16:39:40 +00:00
|
|
|
{
|
|
|
|
MINFO("Rings are different");
|
2018-03-18 10:55:21 +00:00
|
|
|
const std::vector<uint64_t> r0 = cryptonote::relative_output_offsets_to_absolute(state.relative_rings[txin.k_image]);
|
2018-02-26 16:39:40 +00:00
|
|
|
const std::vector<uint64_t> r1 = cryptonote::relative_output_offsets_to_absolute(txin.key_offsets);
|
|
|
|
std::vector<uint64_t> common;
|
|
|
|
for (uint64_t out: r0)
|
|
|
|
{
|
|
|
|
if (std::find(r1.begin(), r1.end(), out) != r1.end())
|
|
|
|
common.push_back(out);
|
|
|
|
}
|
|
|
|
if (common.empty())
|
|
|
|
{
|
|
|
|
MERROR("Rings for the same key image are disjoint");
|
|
|
|
}
|
|
|
|
else if (common.size() == 1)
|
|
|
|
{
|
|
|
|
const crypto::public_key pkey = core_storage[n]->get_output_key(txin.amount, common[0]);
|
|
|
|
MINFO("Blackballing output " << pkey << ", due to being used in rings with a single common element");
|
2018-02-27 08:30:59 +00:00
|
|
|
ringdb.blackball(pkey);
|
2018-02-26 16:39:40 +00:00
|
|
|
newly_spent.insert(output_data(txin.amount, common[0]));
|
2018-03-18 10:55:21 +00:00
|
|
|
state.spent.insert(output_data(txin.amount, common[0]));
|
2018-02-26 16:39:40 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
MINFO("The intersection has more than one element, it's still ok");
|
|
|
|
for (const auto &out: r0)
|
|
|
|
if (std::find(common.begin(), common.end(), out) != common.end())
|
|
|
|
new_ring.push_back(out);
|
|
|
|
new_ring = cryptonote::absolute_output_offsets_to_relative(new_ring);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-03-18 10:55:21 +00:00
|
|
|
state.relative_rings[txin.k_image] = new_ring;
|
2018-02-26 16:39:40 +00:00
|
|
|
}
|
|
|
|
return true;
|
|
|
|
});
|
2018-03-18 10:55:21 +00:00
|
|
|
state.processed_heights[canonical] = start_idx;
|
2018-02-26 16:39:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
while (!newly_spent.empty())
|
|
|
|
{
|
|
|
|
LOG_PRINT_L0("Secondary pass due to " << newly_spent.size() << " newly found spent outputs");
|
|
|
|
std::unordered_set<output_data> work_spent = std::move(newly_spent);
|
|
|
|
newly_spent.clear();
|
|
|
|
|
|
|
|
for (const output_data &od: work_spent)
|
|
|
|
{
|
2018-03-18 10:55:21 +00:00
|
|
|
for (const crypto::key_image &ki: state.outputs[od])
|
2018-02-26 16:39:40 +00:00
|
|
|
{
|
2018-03-18 10:55:21 +00:00
|
|
|
std::vector<uint64_t> absolute = cryptonote::relative_output_offsets_to_absolute(state.relative_rings[ki]);
|
2018-02-26 16:39:40 +00:00
|
|
|
size_t known = 0;
|
|
|
|
uint64_t last_unknown = 0;
|
|
|
|
for (uint64_t out: absolute)
|
|
|
|
{
|
|
|
|
output_data new_od(od.amount, out);
|
2018-03-18 10:55:21 +00:00
|
|
|
if (state.spent.find(new_od) != state.spent.end())
|
2018-02-26 16:39:40 +00:00
|
|
|
++known;
|
|
|
|
else
|
|
|
|
last_unknown = out;
|
|
|
|
}
|
|
|
|
if (known == absolute.size() - 1)
|
|
|
|
{
|
|
|
|
const crypto::public_key pkey = core_storage[0]->get_output_key(od.amount, last_unknown);
|
2018-02-27 08:30:59 +00:00
|
|
|
MINFO("Blackballing output " << pkey << ", due to being used in a " <<
|
|
|
|
absolute.size() << "-ring where all other outputs are known to be spent");
|
|
|
|
ringdb.blackball(pkey);
|
2018-02-26 16:39:40 +00:00
|
|
|
newly_spent.insert(output_data(od.amount, last_unknown));
|
2018-03-18 10:55:21 +00:00
|
|
|
state.spent.insert(output_data(od.amount, last_unknown));
|
2018-02-26 16:39:40 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-18 10:55:21 +00:00
|
|
|
LOG_PRINT_L0("Saving state data to " << state_file_path);
|
|
|
|
std::ofstream state_data_out;
|
|
|
|
state_data_out.open(state_file_path, std::ios_base::binary | std::ios_base::out | std::ios::trunc);
|
|
|
|
if (!state_data_out.fail())
|
|
|
|
{
|
|
|
|
try
|
|
|
|
{
|
|
|
|
boost::archive::portable_binary_oarchive a(state_data_out);
|
|
|
|
a << state;
|
|
|
|
}
|
|
|
|
catch (const std::exception &e)
|
|
|
|
{
|
|
|
|
MERROR("Failed to save state data to " << state_file_path);
|
|
|
|
}
|
|
|
|
state_data_out.close();
|
|
|
|
}
|
|
|
|
|
|
|
|
uint64_t diff = state.spent.size() - start_blackballed_outputs;
|
|
|
|
LOG_PRINT_L0(std::to_string(diff) << " new outputs blackballed, " << state.spent.size() << " total outputs blackballed");
|
2018-02-26 16:39:40 +00:00
|
|
|
LOG_PRINT_L0("Blockchain blackball data exported OK");
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
CATCH_ENTRY("Export error", 1);
|
|
|
|
}
|