New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Spurious ames: breach peer [~ship-name]
#6172
Comments
Running an old pier will cause issues with your ship on the network - if it was only for a short time I think that means those issues will be less obvious, but still present (you likely won't be able to talk to some handful of ships the old pier reached out to). |
I solicited this issue from @nisfeb. Running an old pier will certainly cause problems in most scenarios, but it's impossible for me to imagine how that could synthesize a breach notification. This points at least some flakiness in %ames/%jael interaction, possibly something much worse. |
Just booted mine today and got a breach peer. There is only one version of my planet, to the best of my knowledge. I have had it hosted on a Vultr VPS for many months, but the script to kick it off keeps getting killed, and I never check back, and so I am currently trying to get back up-to-date. What does "breach peer" mean?
|
@permezel A "breach peer" notification by itself isn't harmful or indicative of a problem. |
I don't think there's an issue with the log shared by @permezel (unless of course that a breach never happened, but looking at the network explorer, ~fabbel breached about a month ago). @nisfeb's case is interesting because there was never a breach, I presume. The print happens in %ames after receiving a gift from %jael. %jael gets all azimuth events from /app/azimuth. A spurious breach notification could happen if we are notified of a peer's rift, after we had its %keys—the first time, so rift 0—so /app/azimuth will send us %rift and %keys events in the wrong order... But looking at the code path in %jael, this will not happen for rift 0 because the comparison is +gth and both the rift we get as an event and the (bunted) from the peer are 0. /app/azimuth actually gives us the diffs as keys first and then rift—we flop the diffs before we return them. But that seems ok if those peers were actually breaching (increasing the rift) in the past, I think, so the print in this case makes sense. As a note, both %rift and %keys diffs have a boot=? flag because if we load azimuth state from a snapshot we might be skipping some intermediate rift/life and going straight to whatever is in the snapshot (this was addressed here) I still can't see how this can happen for rift=0 but I'm trying to see If I can reproduce this. |
Describe the bug
A few weeks ago I booted a ship on the wrong machine and it started from an old pier. I stopped it quickly (less than a minute). There were never 2 instances of this ship running and I didn't notice any communication issues. Then, several weeks later, I booted a different ship and during boot I saw
ames: breach pier [~ship-name]
. I'm still able to use everything as normal. My messages come in and go out without issue.I also ran the below on both the ship that was incorrectly booted and the ship that manifested the
ames
log. Both ships gave the same result for both commands:To Reproduce
Steps to (maybe?) reproduce the behaviour:
ames: breach pier [~ship-name]
for the ship from steps 1 and 2.Expected behaviour
No
ames: breach pier [~ship-name]
in logs.System (please supply the following information, if relevant):
0v1r.0fp5a.98elp.votc5.3ne9d.aei0r.0k1pm.dr69j.iukr2.067p8.2ucn6
The text was updated successfully, but these errors were encountered: