package bor import ( "bytes" "encoding/hex" "encoding/json" "errors" "fmt" "io" "math/big" "sort" "strconv" "strings" "sync" "time" "github.com/google/btree" lru "github.com/hashicorp/golang-lru" "github.com/ledgerwatch/erigon-lib/kv" "github.com/ledgerwatch/erigon/accounts/abi" "github.com/ledgerwatch/erigon/common" "github.com/ledgerwatch/erigon/consensus" "github.com/ledgerwatch/erigon/consensus/misc" "github.com/ledgerwatch/erigon/core" "github.com/ledgerwatch/erigon/core/state" "github.com/ledgerwatch/erigon/core/types" "github.com/ledgerwatch/erigon/core/types/accounts" "github.com/ledgerwatch/erigon/crypto" "github.com/ledgerwatch/erigon/params" "github.com/ledgerwatch/erigon/rlp" "github.com/ledgerwatch/erigon/rpc" "github.com/ledgerwatch/log/v3" "golang.org/x/crypto/sha3" ) const ( checkpointInterval = 1024 // Number of blocks after which to save the vote snapshot to the database inmemorySnapshots = 128 // Number of recent vote snapshots to keep in memory inmemorySignatures = 4096 // Number of recent block signatures to keep in memory ) // Bor protocol constants. var ( defaultSprintLength = uint64(64) // Default number of blocks after which to checkpoint and reset the pending votes extraVanity = 32 // Fixed number of extra-data prefix bytes reserved for signer vanity extraSeal = 65 // Fixed number of extra-data suffix bytes reserved for signer seal uncleHash = types.CalcUncleHash(nil) // Always Keccak256(RLP([])) as uncles are meaningless outside of PoW. // diffInTurn = big.NewInt(2) // Block difficulty for in-turn signatures // diffNoTurn = big.NewInt(1) // Block difficulty for out-of-turn signatures validatorHeaderBytesLength = common.AddressLength + 20 // address + power // systemAddress = common.HexToAddress("0xffffFFFfFFffffffffffffffFfFFFfffFFFfFFfE") ) // Various error messages to mark blocks invalid. These should be private to // prevent engine specific errors from being referenced in the remainder of the // codebase, inherently breaking if the engine is swapped out. Please put common // error types into the consensus package. var ( // errUnknownBlock is returned when the list of signers is requested for a block // that is not part of the local blockchain. errUnknownBlock = errors.New("unknown block") // errInvalidCheckpointBeneficiary is returned if a checkpoint/epoch transition // block has a beneficiary set to non-zeroes. // errInvalidCheckpointBeneficiary = errors.New("beneficiary in checkpoint block non-zero") // errInvalidVote is returned if a nonce value is something else that the two // allowed constants of 0x00..0 or 0xff..f. // errInvalidVote = errors.New("vote nonce not 0x00..0 or 0xff..f") // errInvalidCheckpointVote is returned if a checkpoint/epoch transition block // has a vote nonce set to non-zeroes. // errInvalidCheckpointVote = errors.New("vote nonce in checkpoint block non-zero") // errMissingVanity is returned if a block's extra-data section is shorter than // 32 bytes, which is required to store the signer vanity. errMissingVanity = errors.New("extra-data 32 byte vanity prefix missing") // errMissingSignature is returned if a block's extra-data section doesn't seem // to contain a 65 byte secp256k1 signature. errMissingSignature = errors.New("extra-data 65 byte signature suffix missing") // errExtraValidators is returned if non-sprint-end block contain validator data in // their extra-data fields. errExtraValidators = errors.New("non-sprint-end block contains extra validator list") // errInvalidSpanValidators is returned if a block contains an // invalid list of validators (i.e. non divisible by 40 bytes). errInvalidSpanValidators = errors.New("invalid validator list on sprint end block") // errInvalidMixDigest is returned if a block's mix digest is non-zero. errInvalidMixDigest = errors.New("non-zero mix digest") // errInvalidUncleHash is returned if a block contains an non-empty uncle list. errInvalidUncleHash = errors.New("non empty uncle hash") // errInvalidDifficulty is returned if the difficulty of a block neither 1 or 2. errInvalidDifficulty = errors.New("invalid difficulty") // ErrInvalidTimestamp is returned if the timestamp of a block is lower than // the previous block's timestamp + the minimum block period. ErrInvalidTimestamp = errors.New("invalid timestamp") // errOutOfRangeChain is returned if an authorization list is attempted to // be modified via out-of-range or non-contiguous headers. errOutOfRangeChain = errors.New("out of range or non-contiguous chain") ) // SignerFn is a signer callback function to request a header to be signed by a // backing account. type SignerFn func(signer common.Address, mimeType string, message []byte) ([]byte, error) // ecrecover extracts the Ethereum account address from a signed header. func ecrecover(header *types.Header, sigcache *lru.ARCCache, c *params.BorConfig) (common.Address, error) { // If the signature's already cached, return that hash := header.Hash() if address, known := sigcache.Get(hash); known { return address.(common.Address), nil } // Retrieve the signature from the header extra-data if len(header.Extra) < extraSeal { return common.Address{}, errMissingSignature } signature := header.Extra[len(header.Extra)-extraSeal:] // Recover the public key and the Ethereum address pubkey, err := crypto.Ecrecover(SealHash(header, c).Bytes(), signature) if err != nil { return common.Address{}, err } var signer common.Address copy(signer[:], crypto.Keccak256(pubkey[1:])[12:]) sigcache.Add(hash, signer) return signer, nil } // SealHash returns the hash of a block prior to it being sealed. func SealHash(header *types.Header, c *params.BorConfig) (hash common.Hash) { hasher := sha3.NewLegacyKeccak256() encodeSigHeader(hasher, header, c) hasher.Sum(hash[:0]) return hash } func encodeSigHeader(w io.Writer, header *types.Header, c *params.BorConfig) { enc := []interface{}{ header.ParentHash, header.UncleHash, header.Coinbase, header.Root, header.TxHash, header.ReceiptHash, header.Bloom, header.Difficulty, header.Number, header.GasLimit, header.GasUsed, header.Time, header.Extra[:len(header.Extra)-65], // Yes, this will panic if extra is too short header.MixDigest, header.Nonce, } if c.IsJaipur(header.Number.Uint64()) { if header.BaseFee != nil { enc = append(enc, header.BaseFee) } } if err := rlp.Encode(w, enc); err != nil { panic("can't encode: " + err.Error()) } } // CalcProducerDelay is the block delay algorithm based on block time, period, producerDelay and turn-ness of a signer func CalcProducerDelay(number uint64, succession int, c *params.BorConfig) uint64 { // When the block is the first block of the sprint, it is expected to be delayed by `producerDelay`. // That is to allow time for block propagation in the last sprint delay := c.CalculatePeriod(number) if number%c.Sprint == 0 { delay = c.ProducerDelay } if succession > 0 { delay += uint64(succession) * c.CalculateBackupMultiplier(number) } return delay } // BorRLP returns the rlp bytes which needs to be signed for the bor // sealing. The RLP to sign consists of the entire header apart from the 65 byte signature // contained at the end of the extra data. // // Note, the method requires the extra data to be at least 65 bytes, otherwise it // panics. This is done to avoid accidentally using both forms (signature present // or not), which could be abused to produce different hashes for the same header. func BorRLP(header *types.Header, c *params.BorConfig) []byte { b := new(bytes.Buffer) encodeSigHeader(b, header, c) return b.Bytes() } // Bor is the matic-bor consensus engine type Bor struct { chainConfig *params.ChainConfig // Chain config config *params.BorConfig // Consensus engine configuration parameters for bor consensus DB kv.RwDB // Database to store and retrieve snapshot checkpoints recents *lru.ARCCache // Snapshots for recent block to speed up reorgs signatures *lru.ARCCache // Signatures of recent blocks to speed up mining signer common.Address // Ethereum address of the signing key signFn SignerFn // Signer function to authorize hashes with lock sync.RWMutex // Protects the signer fields GenesisContractsClient *GenesisContractsClient validatorSetABI abi.ABI stateReceiverABI abi.ABI HeimdallClient IHeimdallClient WithoutHeimdall bool // scope event.SubscriptionScope // The fields below are for testing only fakeDiff bool // Skip difficulty verifications spanCache *btree.BTree } // New creates a Matic Bor consensus engine. func New( chainConfig *params.ChainConfig, db kv.RwDB, heimdallURL string, withoutHeimdall bool, ) *Bor { // get bor config borConfig := chainConfig.Bor // Set any missing consensus parameters to their defaults if borConfig != nil && borConfig.Sprint == 0 { borConfig.Sprint = defaultSprintLength } // Allocate the snapshot caches and create the engine recents, _ := lru.NewARC(inmemorySnapshots) signatures, _ := lru.NewARC(inmemorySignatures) vABI, _ := abi.JSON(strings.NewReader(validatorsetABI)) sABI, _ := abi.JSON(strings.NewReader(stateReceiverABI)) heimdallClient, _ := NewHeimdallClient(heimdallURL) genesisContractsClient := NewGenesisContractsClient(chainConfig, borConfig.ValidatorContract, borConfig.StateReceiverContract) c := &Bor{ chainConfig: chainConfig, config: borConfig, DB: db, recents: recents, signatures: signatures, validatorSetABI: vABI, stateReceiverABI: sABI, GenesisContractsClient: genesisContractsClient, HeimdallClient: heimdallClient, WithoutHeimdall: withoutHeimdall, spanCache: btree.New(32), } // make sure we can decode all the GenesisAlloc in the BorConfig. for key, genesisAlloc := range c.config.BlockAlloc { if _, err := decodeGenesisAlloc(genesisAlloc); err != nil { panic(fmt.Sprintf("BUG: Block alloc '%s' in genesis is not correct: %v", key, err)) } } return c } // Type returns underlying consensus engine func (c *Bor) Type() params.ConsensusType { return params.BorConsensus } // Author implements consensus.Engine, returning the Ethereum address recovered // from the signature in the header's extra-data section. func (c *Bor) Author(header *types.Header) (common.Address, error) { return ecrecover(header, c.signatures, c.config) } // VerifyHeader checks whether a header conforms to the consensus rules. func (c *Bor) VerifyHeader(chain consensus.ChainHeaderReader, header *types.Header, seal bool) error { return c.verifyHeader(chain, header, nil) } // verifyHeader checks whether a header conforms to the consensus rules.The // caller may optionally pass in a batch of parents (ascending order) to avoid // looking those up from the database. This is useful for concurrently verifying // a batch of new headers. func (c *Bor) verifyHeader(chain consensus.ChainHeaderReader, header *types.Header, parents []*types.Header) error { if header.Number == nil { return errUnknownBlock } number := header.Number.Uint64() // Don't waste time checking blocks from the future if header.Time > uint64(time.Now().Unix()) { return consensus.ErrFutureBlock } if err := validateHeaderExtraField(header.Extra); err != nil { return err } // check extr adata isSprintEnd := (number+1)%c.config.Sprint == 0 // Ensure that the extra-data contains a signer list on checkpoint, but none otherwise signersBytes := len(header.Extra) - extraVanity - extraSeal if !isSprintEnd && signersBytes != 0 { return errExtraValidators } if isSprintEnd && signersBytes%validatorHeaderBytesLength != 0 { return errInvalidSpanValidators } // Ensure that the mix digest is zero as we don't have fork protection currently if header.MixDigest != (common.Hash{}) { return errInvalidMixDigest } // Ensure that the block doesn't contain any uncles which are meaningless in PoA if header.UncleHash != uncleHash { return errInvalidUncleHash } // Ensure that the block's difficulty is meaningful (may not be correct at this point) if number > 0 { if header.Difficulty == nil { return errInvalidDifficulty } } // If all checks passed, validate any special fields for hard forks if err := misc.VerifyForkHashes(chain.Config(), header, false); err != nil { return err } // All basic checks passed, verify cascading fields return c.verifyCascadingFields(chain, header, parents) } // validateHeaderExtraField validates that the extra-data contains both the vanity and signature. // header.Extra = header.Vanity + header.ProducerBytes (optional) + header.Seal func validateHeaderExtraField(extraBytes []byte) error { if len(extraBytes) < extraVanity { return errMissingVanity } if len(extraBytes) < extraVanity+extraSeal { return errMissingSignature } return nil } // verifyCascadingFields verifies all the header fields that are not standalone, // rather depend on a batch of previous headers. The caller may optionally pass // in a batch of parents (ascending order) to avoid looking those up from the // database. This is useful for concurrently verifying a batch of new headers. func (c *Bor) verifyCascadingFields(chain consensus.ChainHeaderReader, header *types.Header, parents []*types.Header) error { // The genesis block is the always valid dead-end number := header.Number.Uint64() if number == 0 { return nil } // Ensure that the block's timestamp isn't too close to it's parent var parent *types.Header if len(parents) > 0 { parent = parents[len(parents)-1] } else { parent = chain.GetHeader(header.ParentHash, number-1) } if parent == nil || parent.Number.Uint64() != number-1 || parent.Hash() != header.ParentHash { return consensus.ErrUnknownAncestor } // Verify that the gasUsed is <= gasLimit if header.GasUsed > header.GasLimit { return fmt.Errorf("invalid gasUsed: have %d, gasLimit %d", header.GasUsed, header.GasLimit) } if !chain.Config().IsLondon(header.Number.Uint64()) { // Verify BaseFee not present before EIP-1559 fork. if header.BaseFee != nil { return fmt.Errorf("invalid baseFee before fork: have %d, want ", header.BaseFee) } if err := misc.VerifyGaslimit(parent.GasLimit, header.GasLimit); err != nil { return err } } else if err := misc.VerifyEip1559Header(chain.Config(), parent, header); err != nil { // Verify the header's EIP-1559 attributes. return err } if parent.Time+c.config.CalculatePeriod(number) > header.Time { return ErrInvalidTimestamp } // Retrieve the snapshot needed to verify this header and cache it snap, err := c.snapshot(chain, number-1, header.ParentHash, parents) if err != nil { return err } // verify the validator list in the last sprint block if isSprintStart(number, c.config.Sprint) { parentValidatorBytes := parent.Extra[extraVanity : len(parent.Extra)-extraSeal] validatorsBytes := make([]byte, len(snap.ValidatorSet.Validators)*validatorHeaderBytesLength) currentValidators := snap.ValidatorSet.Copy().Validators // sort validator by address sort.Sort(ValidatorsByAddress(currentValidators)) for i, validator := range currentValidators { copy(validatorsBytes[i*validatorHeaderBytesLength:], validator.HeaderBytes()) } // len(header.Extra) >= extraVanity+extraSeal has already been validated in validateHeaderExtraField, so this won't result in a panic if !bytes.Equal(parentValidatorBytes, validatorsBytes) { return &MismatchingValidatorsError{number - 1, validatorsBytes, parentValidatorBytes} } } // All basic checks passed, verify the seal and return return c.verifySeal(chain, header, parents) } // snapshot retrieves the authorization snapshot at a given point in time. func (c *Bor) snapshot(chain consensus.ChainHeaderReader, number uint64, hash common.Hash, parents []*types.Header) (*Snapshot, error) { // Search for a snapshot in memory or on disk for checkpoints var ( snap *Snapshot ) cont := true // Continue applying snapshots limit := 256 for cont { var headersList [][]*types.Header // List of lists because we will apply headers to snapshot such that we can persist snapshot after every list var headers []*types.Header h := hash n := number p := parents cont = false for snap == nil { // If an in-memory snapshot was found, use that if s, ok := c.recents.Get(h); ok { snap = s.(*Snapshot) break } // If an on-disk checkpoint snapshot can be found, use that if n%checkpointInterval == 0 { if s, err := loadSnapshot(c.config, c.signatures, c.DB, h); err == nil { log.Trace("Loaded snapshot from disk", "number", n, "hash", h) snap = s break } } // If we're at the genesis, snapshot the initial state. Alternatively if we're // at a checkpoint block without a parent (light client CHT), or we have piled // up more headers than allowed to be reorged (chain reinit from a freezer), // consider the checkpoint trusted and snapshot it. // TODO fix this if n == 0 { checkpoint := chain.GetHeaderByNumber(n) if checkpoint != nil { // get checkpoint data h := checkpoint.Hash() // get validators and current span validators, err := c.GetCurrentValidators(n + 1) if err != nil { return nil, err } // new snap shot snap = newSnapshot(c.config, c.signatures, n, h, validators) if err := snap.store(c.DB); err != nil { return nil, err } log.Info("Stored checkpoint snapshot to disk", "number", n, "hash", h) break } } // No snapshot for this header, gather the header and move backward var header *types.Header if len(p) > 0 { // If we have explicit parents, pick from there (enforced) header = p[len(p)-1] if header.Hash() != h || header.Number.Uint64() != n { return nil, consensus.ErrUnknownAncestor } p = p[:len(p)-1] } else { // No explicit parents (or no more left), reach out to the database header = chain.GetHeader(h, n) if header == nil { return nil, consensus.ErrUnknownAncestor } } if n%checkpointInterval == 0 && len(headers) > 0 { headersList = append(headersList, headers) if len(headersList) > limit { headersList = headersList[1:] cont = true } headers = nil } headers = append(headers, header) n-- h = header.ParentHash } // check if snapshot is nil if snap == nil { return nil, fmt.Errorf("unknown error while retrieving snapshot at block number %v", n) } if len(headers) > 0 { headersList = append(headersList, headers) } // Previous snapshot found, apply any pending headers on top of it if cont { lastList := headersList[len(headersList)-1] firstList := headersList[0] log.Info("Applying headers to snapshot", "from", lastList[len(lastList)-1].Number.Uint64(), "to", firstList[0].Number.Uint64()) } for i := 0; i < len(headersList)/2; i++ { headersList[i], headersList[len(headersList)-1-i] = headersList[len(headersList)-1-i], headersList[i] } for j := 0; j < len(headersList); j++ { hs := headersList[j] for i := 0; i < len(hs)/2; i++ { hs[i], hs[len(hs)-1-i] = hs[len(hs)-1-i], hs[i] } var err error snap, err = snap.apply(hs) if err != nil { return nil, err } c.recents.Add(snap.Hash, snap) // We've generated a new checkpoint snapshot, save to disk if err = snap.store(c.DB); err != nil { return nil, err } log.Trace("Stored snapshot to disk", "number", snap.Number, "hash", snap.Hash) } if cont { snap = nil } } return snap, nil } // VerifyUncles implements consensus.Engine, always returning an error for any // uncles as this consensus mechanism doesn't permit uncles. // VerifyUncles implements consensus.Engine, always returning an error for any // uncles as this consensus mechanism doesn't permit uncles. func (c *Bor) VerifyUncles(chain consensus.ChainReader, header *types.Header, uncles []*types.Header) error { if len(uncles) > 0 { return errors.New("uncles not allowed") } return nil } // VerifySeal implements consensus.Engine, checking whether the signature contained // in the header satisfies the consensus protocol requirements. func (c *Bor) VerifySeal(chain consensus.ChainHeaderReader, header *types.Header) error { return c.verifySeal(chain, header, nil) } // verifySeal checks whether the signature contained in the header satisfies the // consensus protocol requirements. The method accepts an optional list of parent // headers that aren't yet part of the local blockchain to generate the snapshots // from. func (c *Bor) verifySeal(chain consensus.ChainHeaderReader, header *types.Header, parents []*types.Header) error { // Verifying the genesis block is not supported number := header.Number.Uint64() if number == 0 { return errUnknownBlock } // Resolve the authorization key and check against signers signer, err := ecrecover(header, c.signatures, c.config) if err != nil { return err } // Retrieve the snapshot needed to verify this header and cache it snap, err := c.snapshot(chain, number-1, header.ParentHash, parents) if err != nil { return err } if !snap.ValidatorSet.HasAddress(signer.Bytes()) { // Check the UnauthorizedSignerError.Error() msg to see why we pass number-1 return &UnauthorizedSignerError{number - 1, signer.Bytes()} } succession, err := snap.GetSignerSuccessionNumber(signer) if err != nil { return err } var parent *types.Header if len(parents) > 0 { // if parents is nil, len(parents) is zero parent = parents[len(parents)-1] } else if number > 0 { parent = chain.GetHeader(header.ParentHash, number-1) } if parent != nil && header.Time < parent.Time+CalcProducerDelay(number, succession, c.config) { return &BlockTooSoonError{number, succession} } // Ensure that the difficulty corresponds to the turn-ness of the signer if !c.fakeDiff { difficulty := snap.Difficulty(signer) if header.Difficulty.Uint64() != difficulty { return &WrongDifficultyError{number, difficulty, header.Difficulty.Uint64(), signer.Bytes()} } } return nil } // Prepare implements consensus.Engine, preparing all the consensus fields of the // header for running the transactions on top. func (c *Bor) Prepare(chain consensus.ChainHeaderReader, header *types.Header, state *state.IntraBlockState) error { // If the block isn't a checkpoint, cast a random vote (good enough for now) header.Coinbase = common.Address{} header.Nonce = types.BlockNonce{} number := header.Number.Uint64() // Assemble the validator snapshot to check which votes make sense snap, err := c.snapshot(chain, number-1, header.ParentHash, nil) if err != nil { return err } // Set the correct difficulty header.Difficulty = new(big.Int).SetUint64(snap.Difficulty(c.signer)) // Ensure the extra data has all it's components if len(header.Extra) < extraVanity { header.Extra = append(header.Extra, bytes.Repeat([]byte{0x00}, extraVanity-len(header.Extra))...) } header.Extra = header.Extra[:extraVanity] // get validator set if number if (number+1)%c.config.Sprint == 0 { newValidators, err := c.GetCurrentValidators(number + 1) if err != nil { return errors.New("unknown validators") } // sort validator by address sort.Sort(ValidatorsByAddress(newValidators)) for _, validator := range newValidators { header.Extra = append(header.Extra, validator.HeaderBytes()...) } } // add extra seal space header.Extra = append(header.Extra, make([]byte, extraSeal)...) // Mix digest is reserved for now, set to empty header.MixDigest = common.Hash{} // Ensure the timestamp has the correct delay parent := chain.GetHeader(header.ParentHash, number-1) if parent == nil { return consensus.ErrUnknownAncestor } var succession int // if signer is not empty if !bytes.Equal(c.signer.Bytes(), common.Address{}.Bytes()) { succession, err = snap.GetSignerSuccessionNumber(c.signer) if err != nil { return err } } header.Time = parent.Time + CalcProducerDelay(number, succession, c.config) if header.Time < uint64(time.Now().Unix()) { header.Time = uint64(time.Now().Unix()) } return nil } // Finalize implements consensus.Engine, ensuring no uncles are set, nor block // rewards given. func (c *Bor) Finalize(config *params.ChainConfig, header *types.Header, state *state.IntraBlockState, txs types.Transactions, uncles []*types.Header, r types.Receipts, e consensus.EpochReader, chain consensus.ChainHeaderReader, syscall consensus.SystemCall) (types.Transactions, types.Receipts, error) { var err error headerNumber := header.Number.Uint64() if headerNumber%c.config.Sprint == 0 { cx := chainContext{Chain: chain, Bor: c} // check and commit span if err := c.checkAndCommitSpan(state, header, cx, syscall); err != nil { log.Error("Error while committing span", "err", err) return nil, types.Receipts{}, err } if !c.WithoutHeimdall { // commit states _, err = c.CommitStates(state, header, cx, syscall) if err != nil { log.Error("Error while committing states", "err", err) return nil, types.Receipts{}, err } } } if err = c.changeContractCodeIfNeeded(headerNumber, state); err != nil { log.Error("Error changing contract code", "err", err) return nil, types.Receipts{}, err } // No block rewards in PoA, so the state remains as is and uncles are dropped // header.Root = state.IntermediateRoot(chain.Config().IsEIP158(header.Number.Uint64())) header.UncleHash = types.CalcUncleHash(nil) // Set state sync data to blockchain // bc := chain.(*core.BlockChain) // bc.SetStateSync(stateSyncData) return nil, types.Receipts{}, nil } func decodeGenesisAlloc(i interface{}) (core.GenesisAlloc, error) { var alloc core.GenesisAlloc b, err := json.Marshal(i) if err != nil { return nil, err } if err := json.Unmarshal(b, &alloc); err != nil { return nil, err } return alloc, nil } func (c *Bor) changeContractCodeIfNeeded(headerNumber uint64, state *state.IntraBlockState) error { for blockNumber, genesisAlloc := range c.config.BlockAlloc { if blockNumber == strconv.FormatUint(headerNumber, 10) { allocs, err := decodeGenesisAlloc(genesisAlloc) if err != nil { return fmt.Errorf("failed to decode genesis alloc: %v", err) } for addr, account := range allocs { log.Trace("change contract code", "address", addr) state.SetCode(addr, account.Code) } } } return nil } // FinalizeAndAssemble implements consensus.Engine, ensuring no uncles are set, // nor block rewards given, and returns the final block. func (c *Bor) FinalizeAndAssemble(chainConfig *params.ChainConfig, header *types.Header, state *state.IntraBlockState, txs types.Transactions, uncles []*types.Header, receipts types.Receipts, e consensus.EpochReader, chain consensus.ChainHeaderReader, syscall consensus.SystemCall, call consensus.Call) (*types.Block, types.Transactions, types.Receipts, error) { // stateSyncData := []*types.StateSyncData{} headerNumber := header.Number.Uint64() if headerNumber%c.config.Sprint == 0 { cx := chainContext{Chain: chain, Bor: c} // check and commit span err := c.checkAndCommitSpan(state, header, cx, syscall) if err != nil { log.Error("Error while committing span", "err", err) return nil, nil, types.Receipts{}, err } if !c.WithoutHeimdall { // commit states _, err = c.CommitStates(state, header, cx, syscall) if err != nil { log.Error("Error while committing states", "err", err) return nil, nil, types.Receipts{}, err } } } if err := c.changeContractCodeIfNeeded(headerNumber, state); err != nil { log.Error("Error changing contract code", "err", err) return nil, nil, types.Receipts{}, err } // No block rewards in PoA, so the state remains as is and uncles are dropped // header.Root = state.IntermediateRoot(chain.Config().IsEIP158(header.Number)) header.UncleHash = types.CalcUncleHash(nil) // Assemble block block := types.NewBlock(header, txs, nil, receipts) // set state sync // bc := chain.(*core.BlockChain) // bc.SetStateSync(stateSyncData) // return the final block for sealing return block, nil, types.Receipts{}, nil } func (c *Bor) GenerateSeal(chain consensus.ChainHeaderReader, currnt, parent *types.Header, call consensus.Call) []rlp.RawValue { return nil } func (c *Bor) Initialize(config *params.ChainConfig, chain consensus.ChainHeaderReader, e consensus.EpochReader, header *types.Header, txs []types.Transaction, uncles []*types.Header, syscall consensus.SystemCall) { } // Authorize injects a private key into the consensus engine to mint new blocks // with. func (c *Bor) Authorize(signer common.Address, signFn SignerFn) { c.lock.Lock() defer c.lock.Unlock() c.signer = signer c.signFn = signFn } // Seal implements consensus.Engine, attempting to create a sealed block using // the local signing credentials. func (c *Bor) Seal(chain consensus.ChainHeaderReader, block *types.Block, results chan<- *types.Block, stop <-chan struct{}) error { header := block.Header() // Sealing the genesis block is not supported number := header.Number.Uint64() if number == 0 { return errUnknownBlock } // For 0-period chains, refuse to seal empty blocks (no reward but would spin sealing) if c.config.CalculatePeriod(number) == 0 && len(block.Transactions()) == 0 { log.Trace("Sealing paused, waiting for transactions") return nil } // Don't hold the signer fields for the entire sealing procedure c.lock.RLock() signer, signFn := c.signer, c.signFn c.lock.RUnlock() snap, err := c.snapshot(chain, number-1, header.ParentHash, nil) if err != nil { return err } // Bail out if we're unauthorized to sign a block if !snap.ValidatorSet.HasAddress(signer.Bytes()) { // Check the UnauthorizedSignerError.Error() msg to see why we pass number-1 return &UnauthorizedSignerError{number - 1, signer.Bytes()} } successionNumber, err := snap.GetSignerSuccessionNumber(signer) if err != nil { return err } // Sweet, the protocol permits us to sign the block, wait for our time delay := time.Unix(int64(header.Time), 0).Sub(time.Now()) // nolint: gosimple // wiggle was already accounted for in header.Time, this is just for logging wiggle := time.Duration(successionNumber) * time.Duration(c.config.CalculateBackupMultiplier(number)) * time.Second // Sign all the things! sighash, err := signFn(signer, accounts.MimetypeBor, BorRLP(header, c.config)) if err != nil { return err } copy(header.Extra[len(header.Extra)-extraSeal:], sighash) // Wait until sealing is terminated or delay timeout. log.Trace("Waiting for slot to sign and propagate", "delay", common.PrettyDuration(delay)) go func() { select { case <-stop: log.Debug("Discarding sealing operation for block", "number", number) return case <-time.After(delay): if wiggle > 0 { log.Trace( "Sealing out-of-turn", "number", number, "wiggle", common.PrettyDuration(wiggle), "in-turn-signer", snap.ValidatorSet.GetProposer().Address.Hex(), ) } log.Trace( "Sealing successful", "number", number, "delay", delay, "headerDifficulty", header.Difficulty, ) } select { case results <- block.WithSeal(header): default: log.Warn("Sealing result was not read by miner", "number", number, "sealhash", SealHash(header, c.config)) } }() return nil } // CalcDifficulty is the difficulty adjustment algorithm. It returns the difficulty // that a new block should have based on the previous blocks in the chain and the // current signer. // func (c *Bor) CalcDifficulty(chain consensus.ChainHeaderReader, time uint64, parent *types.Header) *big.Int { // snap, err := c.snapshot(chain, parent.Number.Uint64(), parent.Hash(), nil) // if err != nil { // return nil // } // return new(big.Int).SetUint64(snap.Difficulty(c.signer)) // } func (c *Bor) CalcDifficulty(chain consensus.ChainHeaderReader, _, _ uint64, _ *big.Int, parentNumber uint64, parentHash, _ common.Hash, _ []rlp.RawValue) *big.Int { snap, err := c.snapshot(chain, parentNumber, parentHash, nil) if err != nil { return nil } return new(big.Int).SetUint64(snap.Difficulty(c.signer)) } // SealHash returns the hash of a block prior to it being sealed. func (c *Bor) SealHash(header *types.Header) common.Hash { return SealHash(header, c.config) } // APIs implements consensus.Engine, returning the user facing RPC API to allow // controlling the signer voting. func (c *Bor) APIs(chain consensus.ChainHeaderReader) []rpc.API { return []rpc.API{{ Namespace: "bor", Version: "1.0", Service: &API{chain: chain, bor: c}, Public: false, }} } // Close implements consensus.Engine. It's a noop for bor as there are no background threads. func (c *Bor) Close() error { c.DB.Close() return nil } // GetCurrentSpan get current span from contract func (c *Bor) GetCurrentSpan(header *types.Header, state *state.IntraBlockState, chain chainContext, syscall consensus.SystemCall) (*Span, error) { // method method := "getCurrentSpan" data, err := c.validatorSetABI.Pack(method) if err != nil { log.Error("Unable to pack tx for getCurrentSpan", "err", err) return nil, err } result, err := syscall(common.HexToAddress(c.config.ValidatorContract), data) if err != nil { return nil, err } // span result ret := new(struct { Number *big.Int StartBlock *big.Int EndBlock *big.Int }) if err := c.validatorSetABI.UnpackIntoInterface(ret, method, result); err != nil { return nil, err } // create new span span := Span{ ID: ret.Number.Uint64(), StartBlock: ret.StartBlock.Uint64(), EndBlock: ret.EndBlock.Uint64(), } return &span, nil } // GetCurrentValidators get current validators func (c *Bor) GetCurrentValidators(blockNumber uint64) ([]*Validator, error) { span, err := c.getSpanForBlock(blockNumber) if err != nil { return nil, err } return span.ValidatorSet.Validators, nil } func (c *Bor) checkAndCommitSpan( state *state.IntraBlockState, header *types.Header, chain chainContext, syscall consensus.SystemCall, ) error { headerNumber := header.Number.Uint64() span, err := c.GetCurrentSpan(header, state, chain, syscall) if err != nil { return err } if c.needToCommitSpan(span, headerNumber) { err := c.fetchAndCommitSpan(span.ID+1, state, header, chain, syscall) return err } return nil } func (c *Bor) needToCommitSpan(span *Span, headerNumber uint64) bool { // if span is nil if span == nil { return false } // check span is not set initially if span.EndBlock == 0 { return true } // if current block is first block of last sprint in current span if span.EndBlock > c.config.Sprint && span.EndBlock-c.config.Sprint+1 == headerNumber { return true } return false } func (c *Bor) getSpanForBlock(blockNum uint64) (*HeimdallSpan, error) { log.Info("Getting span", "for block", blockNum) var span *HeimdallSpan c.spanCache.AscendGreaterOrEqual(&HeimdallSpan{Span: Span{EndBlock: blockNum}}, func(item btree.Item) bool { span = item.(*HeimdallSpan) return false }) if span == nil { // Span with high enough block number is not loaded var spanID uint64 if c.spanCache.Len() > 0 { spanID = c.spanCache.Max().(*HeimdallSpan).ID + 1 } for span == nil || span.EndBlock < blockNum { var heimdallSpan HeimdallSpan log.Info("Span with high enough block number is not loaded", "fetching span", spanID) response, err := c.HeimdallClient.FetchWithRetry(fmt.Sprintf("bor/span/%d", spanID), "") if err != nil { return nil, err } if err := json.Unmarshal(response.Result, &heimdallSpan); err != nil { return nil, err } span = &heimdallSpan c.spanCache.ReplaceOrInsert(span) spanID++ } } else { for span.StartBlock > blockNum { // Span wit low enough block number is not loaded var spanID uint64 = span.ID - 1 var heimdallSpan HeimdallSpan log.Info("Span with low enough block number is not loaded", "fetching span", spanID) response, err := c.HeimdallClient.FetchWithRetry(fmt.Sprintf("bor/span/%d", spanID), "") if err != nil { return nil, err } if err := json.Unmarshal(response.Result, &heimdallSpan); err != nil { return nil, err } span = &heimdallSpan c.spanCache.ReplaceOrInsert(span) } } return span, nil } func (c *Bor) fetchAndCommitSpan( newSpanID uint64, state *state.IntraBlockState, header *types.Header, chain chainContext, syscall consensus.SystemCall, ) error { var heimdallSpan HeimdallSpan if c.WithoutHeimdall { s, err := c.getNextHeimdallSpanForTest(newSpanID, state, header, chain, syscall) if err != nil { return err } heimdallSpan = *s } else { response, err := c.HeimdallClient.FetchWithRetry(fmt.Sprintf("bor/span/%d", newSpanID), "") if err != nil { return err } if err := json.Unmarshal(response.Result, &heimdallSpan); err != nil { return err } } // check if chain id matches with heimdall span if heimdallSpan.ChainID != c.chainConfig.ChainID.String() { return fmt.Errorf( "chain id proposed span, %s, and bor chain id, %s, doesn't match", heimdallSpan.ChainID, c.chainConfig.ChainID.String(), ) } // get validators bytes var validators []MinimalVal for _, val := range heimdallSpan.ValidatorSet.Validators { validators = append(validators, val.MinimalVal()) } validatorBytes, err := rlp.EncodeToBytes(validators) if err != nil { return err } // get producers bytes var producers []MinimalVal for _, val := range heimdallSpan.SelectedProducers { producers = append(producers, val.MinimalVal()) } producerBytes, err := rlp.EncodeToBytes(producers) if err != nil { return err } // method method := "commitSpan" log.Debug("✅ Committing new span", "id", heimdallSpan.ID, "startBlock", heimdallSpan.StartBlock, "endBlock", heimdallSpan.EndBlock, "validatorBytes", hex.EncodeToString(validatorBytes), "producerBytes", hex.EncodeToString(producerBytes), ) // get packed data data, err := c.validatorSetABI.Pack(method, big.NewInt(0).SetUint64(heimdallSpan.ID), big.NewInt(0).SetUint64(heimdallSpan.StartBlock), big.NewInt(0).SetUint64(heimdallSpan.EndBlock), validatorBytes, producerBytes, ) if err != nil { log.Error("Unable to pack tx for commitSpan", "err", err) return err } _, err = syscall(common.HexToAddress(c.config.ValidatorContract), data) // apply message return err } // CommitStates commit states func (c *Bor) CommitStates( state *state.IntraBlockState, header *types.Header, chain chainContext, syscall consensus.SystemCall, ) ([]*types.StateSyncData, error) { stateSyncs := make([]*types.StateSyncData, 0) number := header.Number.Uint64() _lastStateID, err := c.GenesisContractsClient.LastStateId(header, state, chain, c, syscall) if err != nil { return nil, err } to := time.Unix(int64(chain.Chain.GetHeaderByNumber(number-c.config.Sprint).Time), 0) lastStateID := _lastStateID.Uint64() log.Trace( "Fetching state updates from Heimdall", "fromID", lastStateID+1, "to", to.Format(time.RFC3339)) eventRecords, err := c.HeimdallClient.FetchStateSyncEvents(lastStateID+1, to.Unix()) if err != nil { return nil, err } if c.config.OverrideStateSyncRecords != nil { if val, ok := c.config.OverrideStateSyncRecords[strconv.FormatUint(number, 10)]; ok { eventRecords = eventRecords[0:val] } } chainID := c.chainConfig.ChainID.String() for _, eventRecord := range eventRecords { if eventRecord.ID <= lastStateID { continue } if err := validateEventRecord(eventRecord, number, to, lastStateID, chainID); err != nil { log.Error(err.Error()) break } stateData := types.StateSyncData{ ID: eventRecord.ID, Contract: eventRecord.Contract, Data: hex.EncodeToString(eventRecord.Data), TxHash: eventRecord.TxHash, } stateSyncs = append(stateSyncs, &stateData) if err := c.GenesisContractsClient.CommitState(eventRecord, state, header, chain, c, syscall); err != nil { return nil, err } lastStateID++ } return stateSyncs, nil } func validateEventRecord(eventRecord *EventRecordWithTime, number uint64, to time.Time, lastStateID uint64, chainID string) error { // event id should be sequential and event.Time should lie in the range [from, to) if lastStateID+1 != eventRecord.ID || eventRecord.ChainID != chainID || !eventRecord.Time.Before(to) { return &InvalidStateReceivedError{number, lastStateID, &to, eventRecord} } return nil } func (c *Bor) SetHeimdallClient(h IHeimdallClient) { c.HeimdallClient = h } // // Private methods // func (c *Bor) getNextHeimdallSpanForTest( newSpanID uint64, state *state.IntraBlockState, header *types.Header, chain chainContext, syscall consensus.SystemCall, ) (*HeimdallSpan, error) { headerNumber := header.Number.Uint64() span, err := c.GetCurrentSpan(header, state, chain, syscall) if err != nil { return nil, err } // Retrieve the snapshot needed to verify this header and cache it snap, err := c.snapshot(chain.Chain, headerNumber-1, header.ParentHash, nil) if err != nil { return nil, err } // new span span.ID = newSpanID if span.EndBlock == 0 { span.StartBlock = 256 } else { span.StartBlock = span.EndBlock + 1 } span.EndBlock = span.StartBlock + (100 * c.config.Sprint) - 1 selectedProducers := make([]Validator, len(snap.ValidatorSet.Validators)) for i, v := range snap.ValidatorSet.Validators { selectedProducers[i] = *v } heimdallSpan := &HeimdallSpan{ Span: *span, ValidatorSet: *snap.ValidatorSet, SelectedProducers: selectedProducers, ChainID: c.chainConfig.ChainID.String(), } return heimdallSpan, nil } // // Chain context // // chain context type chainContext struct { Chain consensus.ChainHeaderReader Bor consensus.Engine } func (c chainContext) Engine() consensus.Engine { return c.Bor } func (c chainContext) GetHeader(hash common.Hash, number uint64) *types.Header { return c.Chain.GetHeader(hash, number) } func validatorContains(a []*Validator, x *Validator) (*Validator, bool) { for _, n := range a { if bytes.Equal(n.Address.Bytes(), x.Address.Bytes()) { return n, true } } return nil, false } func getUpdatedValidatorSet(oldValidatorSet *ValidatorSet, newVals []*Validator) *ValidatorSet { v := oldValidatorSet oldVals := v.Validators var changes []*Validator for _, ov := range oldVals { if f, ok := validatorContains(newVals, ov); ok { ov.VotingPower = f.VotingPower } else { ov.VotingPower = 0 } changes = append(changes, ov) } for _, nv := range newVals { if _, ok := validatorContains(changes, nv); !ok { changes = append(changes, nv) } } v.UpdateWithChangeSet(changes) return v } func isSprintStart(number, sprint uint64) bool { return number%sprint == 0 }