Minimize trust (backport #19279) (#19335)

* docs: Mainnet Beta inflation has been enabled for quite some time

(cherry picked from commit 169ded9a70)

* validator: Trusted validators are now called known validators

(cherry picked from commit e0bc5fa690)

* docs: trust minimize

(cherry picked from commit 40613161a0)

* docs: correct known validator operator

(cherry picked from commit eced50d103)

* docs: Remove decommissioned testnet archetype validator

(cherry picked from commit a587eec20b)

* docs: update devnet start args with new validators

(cherry picked from commit 2a877ae06e)

Co-authored-by: Trent Nelson <trent@solana.com>
This commit is contained in:
mergify[bot]
2021-08-20 06:24:43 +00:00
committed by GitHub
parent 1495b94f7a
commit caea9c99cd
14 changed files with 78 additions and 66 deletions

View File

@@ -451,7 +451,7 @@ fn get_rpc_node(
.count();
info!(
"Total {} RPC nodes found. {} trusted, {} blacklisted ",
"Total {} RPC nodes found. {} known, {} blacklisted ",
rpc_peers_total, rpc_peers_trusted, rpc_peers_blacklisted
);
@@ -464,7 +464,7 @@ fn get_rpc_node(
blacklisted_rpc_nodes.clear();
Some("Blacklist timeout expired".to_owned())
} else {
Some("Wait for trusted rpc peers".to_owned())
Some("Wait for known rpc peers".to_owned())
};
continue;
}
@@ -924,11 +924,12 @@ fn rpc_bootstrap(
&& trusted_validators.len() == 1
&& bootstrap_config.no_untrusted_rpc {
warn!("The snapshot download is too slow, throughput: {} < min speed {} bytes/sec, but will NOT abort \
and try a different node as it is the only trusted validator and the no-untrusted-rpc is set. \
and try a different node as it is the only known validator and the --only-known-rpc flag \
is set. \
Abort count: {}, Progress detail: {:?}",
download_progress.last_throughput, minimal_snapshot_download_speed,
download_abort_count, download_progress);
return true; // Do not abort download from the one-and-only trusted validator
return true; // Do not abort download from the one-and-only known validator
}
}
warn!("The snapshot download is too slow, throughput: {} < min speed {} bytes/sec, will abort \
@@ -1245,10 +1246,10 @@ pub fn main() {
.value_name("SLOT_DISTANCE")
.takes_value(true)
.default_value("150")
.help("If --trusted-validators are specified, report this validator healthy \
.help("If --known-validators are specified, report this validator healthy \
if its latest account hash is no further behind than this number of \
slots from the latest trusted validator account hash. \
If no --trusted-validators are specified, the validator will always \
slots from the latest known validator account hash. \
If no --known-validators are specified, the validator will always \
report itself to be healthy")
)
.arg(
@@ -1492,7 +1493,8 @@ pub fn main() {
)
.arg(
Arg::with_name("trusted_validators")
.long("trusted-validator")
.alias("trusted-validator")
.long("known-validator")
.validator(is_pubkey)
.value_name("VALIDATOR IDENTITY")
.multiple(true)
@@ -1511,9 +1513,10 @@ pub fn main() {
)
.arg(
Arg::with_name("no_untrusted_rpc")
.long("no-untrusted-rpc")
.alias("no-untrusted-rpc")
.long("only-known-rpc")
.takes_value(false)
.help("Use the RPC service of trusted validators only")
.help("Use the RPC service of known validators only")
)
.arg(
Arg::with_name("repair_validators")
@@ -1681,10 +1684,11 @@ pub fn main() {
)
.arg(
Arg::with_name("halt_on_trusted_validators_accounts_hash_mismatch")
.long("halt-on-trusted-validators-accounts-hash-mismatch")
.alias("halt-on-trusted-validators-accounts-hash-mismatch")
.long("halt-on-known-validators-accounts-hash-mismatch")
.requires("trusted_validators")
.takes_value(false)
.help("Abort the validator if a bank hash mismatch is detected within trusted validator set"),
.help("Abort the validator if a bank hash mismatch is detected within known validator set"),
)
.arg(
Arg::with_name("frozen_accounts")
@@ -2161,7 +2165,7 @@ pub fn main() {
&identity_keypair.pubkey(),
&matches,
"trusted_validators",
"--trusted-validator",
"--known-validator",
);
let repair_validators = validators_set(
&identity_keypair.pubkey(),