mirror of
https://gitlab.com/pulsechaincom/erigon-pulse.git
synced 2025-01-19 00:54:12 +00:00
7c15ed59e4
* Enable prealloc linter * Set inital slice len to 0
1357 lines
43 KiB
Go
1357 lines
43 KiB
Go
package bor
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/hex"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"math/big"
|
|
"sort"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/google/btree"
|
|
lru "github.com/hashicorp/golang-lru"
|
|
"github.com/ledgerwatch/erigon-lib/kv"
|
|
"github.com/ledgerwatch/erigon/accounts/abi"
|
|
"github.com/ledgerwatch/erigon/common"
|
|
"github.com/ledgerwatch/erigon/consensus"
|
|
"github.com/ledgerwatch/erigon/consensus/misc"
|
|
"github.com/ledgerwatch/erigon/core"
|
|
"github.com/ledgerwatch/erigon/core/state"
|
|
"github.com/ledgerwatch/erigon/core/types"
|
|
"github.com/ledgerwatch/erigon/core/types/accounts"
|
|
"github.com/ledgerwatch/erigon/crypto"
|
|
"github.com/ledgerwatch/erigon/params"
|
|
"github.com/ledgerwatch/erigon/params/networkname"
|
|
"github.com/ledgerwatch/erigon/rlp"
|
|
"github.com/ledgerwatch/erigon/rpc"
|
|
"github.com/ledgerwatch/log/v3"
|
|
"golang.org/x/crypto/sha3"
|
|
)
|
|
|
|
const (
|
|
checkpointInterval = 1024 // Number of blocks after which to save the vote snapshot to the database
|
|
inmemorySnapshots = 128 // Number of recent vote snapshots to keep in memory
|
|
inmemorySignatures = 4096 // Number of recent block signatures to keep in memory
|
|
)
|
|
|
|
// Bor protocol constants.
|
|
var (
|
|
defaultSprintLength = uint64(64) // Default number of blocks after which to checkpoint and reset the pending votes
|
|
|
|
extraVanity = 32 // Fixed number of extra-data prefix bytes reserved for signer vanity
|
|
extraSeal = 65 // Fixed number of extra-data suffix bytes reserved for signer seal
|
|
|
|
uncleHash = types.CalcUncleHash(nil) // Always Keccak256(RLP([])) as uncles are meaningless outside of PoW.
|
|
|
|
// diffInTurn = big.NewInt(2) // Block difficulty for in-turn signatures
|
|
// diffNoTurn = big.NewInt(1) // Block difficulty for out-of-turn signatures
|
|
|
|
validatorHeaderBytesLength = common.AddressLength + 20 // address + power
|
|
// systemAddress = common.HexToAddress("0xffffFFFfFFffffffffffffffFfFFFfffFFFfFFfE")
|
|
)
|
|
|
|
// Various error messages to mark blocks invalid. These should be private to
|
|
// prevent engine specific errors from being referenced in the remainder of the
|
|
// codebase, inherently breaking if the engine is swapped out. Please put common
|
|
// error types into the consensus package.
|
|
var (
|
|
// errUnknownBlock is returned when the list of signers is requested for a block
|
|
// that is not part of the local blockchain.
|
|
errUnknownBlock = errors.New("unknown block")
|
|
|
|
// errInvalidCheckpointBeneficiary is returned if a checkpoint/epoch transition
|
|
// block has a beneficiary set to non-zeroes.
|
|
// errInvalidCheckpointBeneficiary = errors.New("beneficiary in checkpoint block non-zero")
|
|
|
|
// errInvalidVote is returned if a nonce value is something else that the two
|
|
// allowed constants of 0x00..0 or 0xff..f.
|
|
// errInvalidVote = errors.New("vote nonce not 0x00..0 or 0xff..f")
|
|
|
|
// errInvalidCheckpointVote is returned if a checkpoint/epoch transition block
|
|
// has a vote nonce set to non-zeroes.
|
|
// errInvalidCheckpointVote = errors.New("vote nonce in checkpoint block non-zero")
|
|
|
|
// errMissingVanity is returned if a block's extra-data section is shorter than
|
|
// 32 bytes, which is required to store the signer vanity.
|
|
errMissingVanity = errors.New("extra-data 32 byte vanity prefix missing")
|
|
|
|
// errMissingSignature is returned if a block's extra-data section doesn't seem
|
|
// to contain a 65 byte secp256k1 signature.
|
|
errMissingSignature = errors.New("extra-data 65 byte signature suffix missing")
|
|
|
|
// errExtraValidators is returned if non-sprint-end block contain validator data in
|
|
// their extra-data fields.
|
|
errExtraValidators = errors.New("non-sprint-end block contains extra validator list")
|
|
|
|
// errInvalidSpanValidators is returned if a block contains an
|
|
// invalid list of validators (i.e. non divisible by 40 bytes).
|
|
errInvalidSpanValidators = errors.New("invalid validator list on sprint end block")
|
|
|
|
// errInvalidMixDigest is returned if a block's mix digest is non-zero.
|
|
errInvalidMixDigest = errors.New("non-zero mix digest")
|
|
|
|
// errInvalidUncleHash is returned if a block contains an non-empty uncle list.
|
|
errInvalidUncleHash = errors.New("non empty uncle hash")
|
|
|
|
// errInvalidDifficulty is returned if the difficulty of a block neither 1 or 2.
|
|
errInvalidDifficulty = errors.New("invalid difficulty")
|
|
|
|
// ErrInvalidTimestamp is returned if the timestamp of a block is lower than
|
|
// the previous block's timestamp + the minimum block period.
|
|
ErrInvalidTimestamp = errors.New("invalid timestamp")
|
|
|
|
// errOutOfRangeChain is returned if an authorization list is attempted to
|
|
// be modified via out-of-range or non-contiguous headers.
|
|
errOutOfRangeChain = errors.New("out of range or non-contiguous chain")
|
|
)
|
|
|
|
// SignerFn is a signer callback function to request a header to be signed by a
|
|
// backing account.
|
|
type SignerFn func(signer common.Address, mimeType string, message []byte) ([]byte, error)
|
|
|
|
// ecrecover extracts the Ethereum account address from a signed header.
|
|
func ecrecover(header *types.Header, sigcache *lru.ARCCache, c *params.BorConfig) (common.Address, error) {
|
|
// If the signature's already cached, return that
|
|
hash := header.Hash()
|
|
if address, known := sigcache.Get(hash); known {
|
|
return address.(common.Address), nil
|
|
}
|
|
// Retrieve the signature from the header extra-data
|
|
if len(header.Extra) < extraSeal {
|
|
return common.Address{}, errMissingSignature
|
|
}
|
|
signature := header.Extra[len(header.Extra)-extraSeal:]
|
|
|
|
// Recover the public key and the Ethereum address
|
|
pubkey, err := crypto.Ecrecover(SealHash(header, c).Bytes(), signature)
|
|
if err != nil {
|
|
return common.Address{}, err
|
|
}
|
|
var signer common.Address
|
|
copy(signer[:], crypto.Keccak256(pubkey[1:])[12:])
|
|
|
|
sigcache.Add(hash, signer)
|
|
return signer, nil
|
|
}
|
|
|
|
// SealHash returns the hash of a block prior to it being sealed.
|
|
func SealHash(header *types.Header, c *params.BorConfig) (hash common.Hash) {
|
|
hasher := sha3.NewLegacyKeccak256()
|
|
encodeSigHeader(hasher, header, c)
|
|
hasher.Sum(hash[:0])
|
|
return hash
|
|
}
|
|
|
|
func encodeSigHeader(w io.Writer, header *types.Header, c *params.BorConfig) {
|
|
enc := []interface{}{
|
|
header.ParentHash,
|
|
header.UncleHash,
|
|
header.Coinbase,
|
|
header.Root,
|
|
header.TxHash,
|
|
header.ReceiptHash,
|
|
header.Bloom,
|
|
header.Difficulty,
|
|
header.Number,
|
|
header.GasLimit,
|
|
header.GasUsed,
|
|
header.Time,
|
|
header.Extra[:len(header.Extra)-65], // Yes, this will panic if extra is too short
|
|
header.MixDigest,
|
|
header.Nonce,
|
|
}
|
|
|
|
if c.IsJaipur(header.Number.Uint64()) {
|
|
if header.BaseFee != nil {
|
|
enc = append(enc, header.BaseFee)
|
|
}
|
|
}
|
|
if err := rlp.Encode(w, enc); err != nil {
|
|
panic("can't encode: " + err.Error())
|
|
}
|
|
}
|
|
|
|
// CalcProducerDelay is the block delay algorithm based on block time, period, producerDelay and turn-ness of a signer
|
|
func CalcProducerDelay(number uint64, succession int, c *params.BorConfig) uint64 {
|
|
// When the block is the first block of the sprint, it is expected to be delayed by `producerDelay`.
|
|
// That is to allow time for block propagation in the last sprint
|
|
delay := c.CalculatePeriod(number)
|
|
if number%c.Sprint == 0 {
|
|
delay = c.ProducerDelay
|
|
}
|
|
if succession > 0 {
|
|
delay += uint64(succession) * c.CalculateBackupMultiplier(number)
|
|
}
|
|
return delay
|
|
}
|
|
|
|
// BorRLP returns the rlp bytes which needs to be signed for the bor
|
|
// sealing. The RLP to sign consists of the entire header apart from the 65 byte signature
|
|
// contained at the end of the extra data.
|
|
//
|
|
// Note, the method requires the extra data to be at least 65 bytes, otherwise it
|
|
// panics. This is done to avoid accidentally using both forms (signature present
|
|
// or not), which could be abused to produce different hashes for the same header.
|
|
func BorRLP(header *types.Header, c *params.BorConfig) []byte {
|
|
b := new(bytes.Buffer)
|
|
encodeSigHeader(b, header, c)
|
|
return b.Bytes()
|
|
}
|
|
|
|
// Bor is the matic-bor consensus engine
|
|
type Bor struct {
|
|
chainConfig *params.ChainConfig // Chain config
|
|
config *params.BorConfig // Consensus engine configuration parameters for bor consensus
|
|
DB kv.RwDB // Database to store and retrieve snapshot checkpoints
|
|
|
|
recents *lru.ARCCache // Snapshots for recent block to speed up reorgs
|
|
signatures *lru.ARCCache // Signatures of recent blocks to speed up mining
|
|
|
|
signer common.Address // Ethereum address of the signing key
|
|
signFn SignerFn // Signer function to authorize hashes with
|
|
lock *sync.RWMutex // Protects the signer fields
|
|
|
|
execCtx context.Context // context of caller execution stage
|
|
|
|
GenesisContractsClient *GenesisContractsClient
|
|
validatorSetABI abi.ABI
|
|
stateReceiverABI abi.ABI
|
|
HeimdallClient IHeimdallClient
|
|
WithoutHeimdall bool
|
|
|
|
// scope event.SubscriptionScope
|
|
// The fields below are for testing only
|
|
fakeDiff bool // Skip difficulty verifications
|
|
spanCache *btree.BTree
|
|
}
|
|
|
|
// New creates a Matic Bor consensus engine.
|
|
func New(
|
|
chainConfig *params.ChainConfig,
|
|
db kv.RwDB,
|
|
heimdallURL string,
|
|
withoutHeimdall bool,
|
|
) *Bor {
|
|
// get bor config
|
|
borConfig := chainConfig.Bor
|
|
|
|
// Set any missing consensus parameters to their defaults
|
|
if borConfig != nil && borConfig.Sprint == 0 {
|
|
borConfig.Sprint = defaultSprintLength
|
|
}
|
|
|
|
// Allocate the snapshot caches and create the engine
|
|
recents, _ := lru.NewARC(inmemorySnapshots)
|
|
signatures, _ := lru.NewARC(inmemorySignatures)
|
|
vABI, _ := abi.JSON(strings.NewReader(validatorsetABI))
|
|
sABI, _ := abi.JSON(strings.NewReader(stateReceiverABI))
|
|
heimdallClient, _ := NewHeimdallClient(heimdallURL)
|
|
genesisContractsClient := NewGenesisContractsClient(chainConfig, borConfig.ValidatorContract, borConfig.StateReceiverContract)
|
|
c := &Bor{
|
|
chainConfig: chainConfig,
|
|
config: borConfig,
|
|
DB: db,
|
|
recents: recents,
|
|
signatures: signatures,
|
|
validatorSetABI: vABI,
|
|
stateReceiverABI: sABI,
|
|
GenesisContractsClient: genesisContractsClient,
|
|
HeimdallClient: heimdallClient,
|
|
WithoutHeimdall: withoutHeimdall,
|
|
spanCache: btree.New(32),
|
|
execCtx: context.Background(),
|
|
lock: &sync.RWMutex{},
|
|
}
|
|
|
|
// make sure we can decode all the GenesisAlloc in the BorConfig.
|
|
for key, genesisAlloc := range c.config.BlockAlloc {
|
|
if _, err := decodeGenesisAlloc(genesisAlloc); err != nil {
|
|
panic(fmt.Sprintf("BUG: Block alloc '%s' in genesis is not correct: %v", key, err))
|
|
}
|
|
}
|
|
|
|
return c
|
|
}
|
|
|
|
// Type returns underlying consensus engine
|
|
func (c *Bor) Type() params.ConsensusType {
|
|
return params.BorConsensus
|
|
}
|
|
|
|
// Author implements consensus.Engine, returning the Ethereum address recovered
|
|
// from the signature in the header's extra-data section.
|
|
func (c *Bor) Author(header *types.Header) (common.Address, error) {
|
|
return ecrecover(header, c.signatures, c.config)
|
|
}
|
|
|
|
// VerifyHeader checks whether a header conforms to the consensus rules.
|
|
func (c *Bor) VerifyHeader(chain consensus.ChainHeaderReader, header *types.Header, seal bool) error {
|
|
|
|
return c.verifyHeader(chain, header, nil)
|
|
}
|
|
|
|
func (c *Bor) WithExecutionContext(ctx context.Context) *Bor {
|
|
subclient := *c
|
|
subclient.execCtx = ctx
|
|
return &subclient
|
|
}
|
|
|
|
// verifyHeader checks whether a header conforms to the consensus rules.The
|
|
// caller may optionally pass in a batch of parents (ascending order) to avoid
|
|
// looking those up from the database. This is useful for concurrently verifying
|
|
// a batch of new headers.
|
|
func (c *Bor) verifyHeader(chain consensus.ChainHeaderReader, header *types.Header, parents []*types.Header) error {
|
|
if header.Number == nil {
|
|
return errUnknownBlock
|
|
}
|
|
number := header.Number.Uint64()
|
|
|
|
// Don't waste time checking blocks from the future
|
|
if header.Time > uint64(time.Now().Unix()) {
|
|
return consensus.ErrFutureBlock
|
|
}
|
|
|
|
if err := validateHeaderExtraField(header.Extra); err != nil {
|
|
return err
|
|
}
|
|
|
|
// check extr adata
|
|
isSprintEnd := (number+1)%c.config.Sprint == 0
|
|
|
|
// Ensure that the extra-data contains a signer list on checkpoint, but none otherwise
|
|
signersBytes := len(header.Extra) - extraVanity - extraSeal
|
|
if !isSprintEnd && signersBytes != 0 {
|
|
return errExtraValidators
|
|
}
|
|
if isSprintEnd && signersBytes%validatorHeaderBytesLength != 0 {
|
|
return errInvalidSpanValidators
|
|
}
|
|
// Ensure that the mix digest is zero as we don't have fork protection currently
|
|
if header.MixDigest != (common.Hash{}) {
|
|
return errInvalidMixDigest
|
|
}
|
|
// Ensure that the block doesn't contain any uncles which are meaningless in PoA
|
|
if header.UncleHash != uncleHash {
|
|
return errInvalidUncleHash
|
|
}
|
|
// Ensure that the block's difficulty is meaningful (may not be correct at this point)
|
|
if number > 0 {
|
|
if header.Difficulty == nil {
|
|
return errInvalidDifficulty
|
|
}
|
|
}
|
|
// If all checks passed, validate any special fields for hard forks
|
|
if err := misc.VerifyForkHashes(chain.Config(), header, false); err != nil {
|
|
return err
|
|
}
|
|
// All basic checks passed, verify cascading fields
|
|
return c.verifyCascadingFields(chain, header, parents)
|
|
}
|
|
|
|
// validateHeaderExtraField validates that the extra-data contains both the vanity and signature.
|
|
// header.Extra = header.Vanity + header.ProducerBytes (optional) + header.Seal
|
|
func validateHeaderExtraField(extraBytes []byte) error {
|
|
if len(extraBytes) < extraVanity {
|
|
return errMissingVanity
|
|
}
|
|
if len(extraBytes) < extraVanity+extraSeal {
|
|
return errMissingSignature
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// verifyCascadingFields verifies all the header fields that are not standalone,
|
|
// rather depend on a batch of previous headers. The caller may optionally pass
|
|
// in a batch of parents (ascending order) to avoid looking those up from the
|
|
// database. This is useful for concurrently verifying a batch of new headers.
|
|
func (c *Bor) verifyCascadingFields(chain consensus.ChainHeaderReader, header *types.Header, parents []*types.Header) error {
|
|
// The genesis block is the always valid dead-end
|
|
number := header.Number.Uint64()
|
|
if number == 0 {
|
|
return nil
|
|
}
|
|
|
|
// Ensure that the block's timestamp isn't too close to it's parent
|
|
var parent *types.Header
|
|
if len(parents) > 0 {
|
|
parent = parents[len(parents)-1]
|
|
} else {
|
|
parent = chain.GetHeader(header.ParentHash, number-1)
|
|
}
|
|
|
|
if parent == nil || parent.Number.Uint64() != number-1 || parent.Hash() != header.ParentHash {
|
|
return consensus.ErrUnknownAncestor
|
|
}
|
|
|
|
// Verify that the gasUsed is <= gasLimit
|
|
if header.GasUsed > header.GasLimit {
|
|
return fmt.Errorf("invalid gasUsed: have %d, gasLimit %d", header.GasUsed, header.GasLimit)
|
|
}
|
|
if !chain.Config().IsLondon(header.Number.Uint64()) {
|
|
// Verify BaseFee not present before EIP-1559 fork.
|
|
if header.BaseFee != nil {
|
|
return fmt.Errorf("invalid baseFee before fork: have %d, want <nil>", header.BaseFee)
|
|
}
|
|
if err := misc.VerifyGaslimit(parent.GasLimit, header.GasLimit); err != nil {
|
|
return err
|
|
}
|
|
} else if err := misc.VerifyEip1559Header(chain.Config(), parent, header); err != nil {
|
|
// Verify the header's EIP-1559 attributes.
|
|
return err
|
|
}
|
|
|
|
if parent.Time+c.config.CalculatePeriod(number) > header.Time {
|
|
return ErrInvalidTimestamp
|
|
}
|
|
|
|
// Retrieve the snapshot needed to verify this header and cache it
|
|
snap, err := c.snapshot(chain, number-1, header.ParentHash, parents)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// verify the validator list in the last sprint block
|
|
if isSprintStart(number, c.config.Sprint) {
|
|
parentValidatorBytes := parent.Extra[extraVanity : len(parent.Extra)-extraSeal]
|
|
validatorsBytes := make([]byte, len(snap.ValidatorSet.Validators)*validatorHeaderBytesLength)
|
|
|
|
currentValidators := snap.ValidatorSet.Copy().Validators
|
|
// sort validator by address
|
|
sort.Sort(ValidatorsByAddress(currentValidators))
|
|
for i, validator := range currentValidators {
|
|
copy(validatorsBytes[i*validatorHeaderBytesLength:], validator.HeaderBytes())
|
|
}
|
|
// len(header.Extra) >= extraVanity+extraSeal has already been validated in validateHeaderExtraField, so this won't result in a panic
|
|
if !bytes.Equal(parentValidatorBytes, validatorsBytes) {
|
|
return &MismatchingValidatorsError{number - 1, validatorsBytes, parentValidatorBytes}
|
|
}
|
|
}
|
|
|
|
// All basic checks passed, verify the seal and return
|
|
return c.verifySeal(chain, header, parents)
|
|
}
|
|
|
|
// snapshot retrieves the authorization snapshot at a given point in time.
|
|
func (c *Bor) snapshot(chain consensus.ChainHeaderReader, number uint64, hash common.Hash, parents []*types.Header) (*Snapshot, error) {
|
|
// Search for a snapshot in memory or on disk for checkpoints
|
|
var (
|
|
snap *Snapshot
|
|
)
|
|
|
|
cont := true // Continue applying snapshots
|
|
limit := 256
|
|
for cont {
|
|
var headersList [][]*types.Header // List of lists because we will apply headers to snapshot such that we can persist snapshot after every list
|
|
var headers []*types.Header
|
|
h := hash
|
|
n := number
|
|
p := parents
|
|
cont = false
|
|
for snap == nil {
|
|
// If an in-memory snapshot was found, use that
|
|
if s, ok := c.recents.Get(h); ok {
|
|
snap = s.(*Snapshot)
|
|
break
|
|
}
|
|
|
|
// If an on-disk checkpoint snapshot can be found, use that
|
|
if n%checkpointInterval == 0 {
|
|
if s, err := loadSnapshot(c.config, c.signatures, c.DB, h); err == nil {
|
|
log.Trace("Loaded snapshot from disk", "number", n, "hash", h)
|
|
snap = s
|
|
break
|
|
}
|
|
}
|
|
|
|
// If we're at the genesis, snapshot the initial state. Alternatively if we're
|
|
// at a checkpoint block without a parent (light client CHT), or we have piled
|
|
// up more headers than allowed to be reorged (chain reinit from a freezer),
|
|
// consider the checkpoint trusted and snapshot it.
|
|
// TODO fix this
|
|
if n == 0 {
|
|
checkpoint := chain.GetHeaderByNumber(n)
|
|
if checkpoint != nil {
|
|
// get checkpoint data
|
|
h := checkpoint.Hash()
|
|
|
|
// get validators and current span
|
|
validators, err := c.GetCurrentValidators(n + 1)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// new snap shot
|
|
snap = newSnapshot(c.config, c.signatures, n, h, validators)
|
|
if err := snap.store(c.DB); err != nil {
|
|
return nil, err
|
|
}
|
|
log.Info("Stored checkpoint snapshot to disk", "number", n, "hash", h)
|
|
break
|
|
}
|
|
}
|
|
|
|
// No snapshot for this header, gather the header and move backward
|
|
var header *types.Header
|
|
if len(p) > 0 {
|
|
// If we have explicit parents, pick from there (enforced)
|
|
header = p[len(p)-1]
|
|
if header.Hash() != h || header.Number.Uint64() != n {
|
|
return nil, consensus.ErrUnknownAncestor
|
|
}
|
|
p = p[:len(p)-1]
|
|
} else {
|
|
// No explicit parents (or no more left), reach out to the database
|
|
header = chain.GetHeader(h, n)
|
|
if header == nil {
|
|
return nil, consensus.ErrUnknownAncestor
|
|
}
|
|
}
|
|
if n%checkpointInterval == 0 && len(headers) > 0 {
|
|
headersList = append(headersList, headers)
|
|
if len(headersList) > limit {
|
|
headersList = headersList[1:]
|
|
cont = true
|
|
}
|
|
headers = nil
|
|
}
|
|
headers = append(headers, header)
|
|
n--
|
|
h = header.ParentHash
|
|
}
|
|
|
|
// check if snapshot is nil
|
|
if snap == nil {
|
|
return nil, fmt.Errorf("unknown error while retrieving snapshot at block number %v", n)
|
|
}
|
|
if len(headers) > 0 {
|
|
headersList = append(headersList, headers)
|
|
}
|
|
|
|
// Previous snapshot found, apply any pending headers on top of it
|
|
if cont {
|
|
lastList := headersList[len(headersList)-1]
|
|
firstList := headersList[0]
|
|
log.Info("Applying headers to snapshot", "from", lastList[len(lastList)-1].Number.Uint64(), "to", firstList[0].Number.Uint64())
|
|
}
|
|
for i := 0; i < len(headersList)/2; i++ {
|
|
headersList[i], headersList[len(headersList)-1-i] = headersList[len(headersList)-1-i], headersList[i]
|
|
}
|
|
for j := 0; j < len(headersList); j++ {
|
|
hs := headersList[j]
|
|
for i := 0; i < len(hs)/2; i++ {
|
|
hs[i], hs[len(hs)-1-i] = hs[len(hs)-1-i], hs[i]
|
|
}
|
|
var err error
|
|
snap, err = snap.apply(hs)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
c.recents.Add(snap.Hash, snap)
|
|
// We've generated a new checkpoint snapshot, save to disk
|
|
if err = snap.store(c.DB); err != nil {
|
|
return nil, err
|
|
}
|
|
log.Trace("Stored snapshot to disk", "number", snap.Number, "hash", snap.Hash)
|
|
}
|
|
if cont {
|
|
snap = nil
|
|
}
|
|
}
|
|
|
|
return snap, nil
|
|
}
|
|
|
|
// VerifyUncles implements consensus.Engine, always returning an error for any
|
|
// uncles as this consensus mechanism doesn't permit uncles.
|
|
// VerifyUncles implements consensus.Engine, always returning an error for any
|
|
// uncles as this consensus mechanism doesn't permit uncles.
|
|
func (c *Bor) VerifyUncles(chain consensus.ChainReader, header *types.Header, uncles []*types.Header) error {
|
|
if len(uncles) > 0 {
|
|
return errors.New("uncles not allowed")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// VerifySeal implements consensus.Engine, checking whether the signature contained
|
|
// in the header satisfies the consensus protocol requirements.
|
|
func (c *Bor) VerifySeal(chain consensus.ChainHeaderReader, header *types.Header) error {
|
|
return c.verifySeal(chain, header, nil)
|
|
}
|
|
|
|
// verifySeal checks whether the signature contained in the header satisfies the
|
|
// consensus protocol requirements. The method accepts an optional list of parent
|
|
// headers that aren't yet part of the local blockchain to generate the snapshots
|
|
// from.
|
|
func (c *Bor) verifySeal(chain consensus.ChainHeaderReader, header *types.Header, parents []*types.Header) error {
|
|
// Verifying the genesis block is not supported
|
|
number := header.Number.Uint64()
|
|
if number == 0 {
|
|
return errUnknownBlock
|
|
}
|
|
|
|
// Resolve the authorization key and check against signers
|
|
signer, err := ecrecover(header, c.signatures, c.config)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
// Retrieve the snapshot needed to verify this header and cache it
|
|
snap, err := c.snapshot(chain, number-1, header.ParentHash, parents)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if !snap.ValidatorSet.HasAddress(signer.Bytes()) {
|
|
// Check the UnauthorizedSignerError.Error() msg to see why we pass number-1
|
|
return &UnauthorizedSignerError{number - 1, signer.Bytes()}
|
|
}
|
|
|
|
succession, err := snap.GetSignerSuccessionNumber(signer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var parent *types.Header
|
|
if len(parents) > 0 { // if parents is nil, len(parents) is zero
|
|
parent = parents[len(parents)-1]
|
|
} else if number > 0 {
|
|
parent = chain.GetHeader(header.ParentHash, number-1)
|
|
}
|
|
|
|
if parent != nil && header.Time < parent.Time+CalcProducerDelay(number, succession, c.config) {
|
|
return &BlockTooSoonError{number, succession}
|
|
}
|
|
|
|
// Ensure that the difficulty corresponds to the turn-ness of the signer
|
|
if !c.fakeDiff {
|
|
difficulty := snap.Difficulty(signer)
|
|
if header.Difficulty.Uint64() != difficulty {
|
|
return &WrongDifficultyError{number, difficulty, header.Difficulty.Uint64(), signer.Bytes()}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Prepare implements consensus.Engine, preparing all the consensus fields of the
|
|
// header for running the transactions on top.
|
|
func (c *Bor) Prepare(chain consensus.ChainHeaderReader, header *types.Header, state *state.IntraBlockState) error {
|
|
|
|
// If the block isn't a checkpoint, cast a random vote (good enough for now)
|
|
header.Coinbase = common.Address{}
|
|
header.Nonce = types.BlockNonce{}
|
|
|
|
number := header.Number.Uint64()
|
|
// Assemble the validator snapshot to check which votes make sense
|
|
snap, err := c.snapshot(chain, number-1, header.ParentHash, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Set the correct difficulty
|
|
header.Difficulty = new(big.Int).SetUint64(snap.Difficulty(c.signer))
|
|
|
|
// Ensure the extra data has all it's components
|
|
if len(header.Extra) < extraVanity {
|
|
header.Extra = append(header.Extra, bytes.Repeat([]byte{0x00}, extraVanity-len(header.Extra))...)
|
|
}
|
|
header.Extra = header.Extra[:extraVanity]
|
|
|
|
// get validator set if number
|
|
if (number+1)%c.config.Sprint == 0 {
|
|
newValidators, err := c.GetCurrentValidators(number + 1)
|
|
if err != nil {
|
|
return errors.New("unknown validators")
|
|
}
|
|
|
|
// sort validator by address
|
|
sort.Sort(ValidatorsByAddress(newValidators))
|
|
for _, validator := range newValidators {
|
|
header.Extra = append(header.Extra, validator.HeaderBytes()...)
|
|
}
|
|
}
|
|
|
|
// add extra seal space
|
|
header.Extra = append(header.Extra, make([]byte, extraSeal)...)
|
|
|
|
// Mix digest is reserved for now, set to empty
|
|
header.MixDigest = common.Hash{}
|
|
|
|
// Ensure the timestamp has the correct delay
|
|
parent := chain.GetHeader(header.ParentHash, number-1)
|
|
if parent == nil {
|
|
return consensus.ErrUnknownAncestor
|
|
}
|
|
|
|
var succession int
|
|
// if signer is not empty
|
|
if !bytes.Equal(c.signer.Bytes(), common.Address{}.Bytes()) {
|
|
succession, err = snap.GetSignerSuccessionNumber(c.signer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
header.Time = parent.Time + CalcProducerDelay(number, succession, c.config)
|
|
if header.Time < uint64(time.Now().Unix()) {
|
|
header.Time = uint64(time.Now().Unix())
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Finalize implements consensus.Engine, ensuring no uncles are set, nor block
|
|
// rewards given.
|
|
func (c *Bor) Finalize(config *params.ChainConfig, header *types.Header, state *state.IntraBlockState, txs types.Transactions, uncles []*types.Header, r types.Receipts, e consensus.EpochReader, chain consensus.ChainHeaderReader, syscall consensus.SystemCall) (types.Transactions, types.Receipts, error) {
|
|
var err error
|
|
headerNumber := header.Number.Uint64()
|
|
if headerNumber%c.config.Sprint == 0 {
|
|
cx := chainContext{Chain: chain, Bor: c}
|
|
// check and commit span
|
|
if err := c.checkAndCommitSpan(state, header, cx, syscall); err != nil {
|
|
log.Error("Error while committing span", "err", err)
|
|
return nil, types.Receipts{}, err
|
|
}
|
|
|
|
if !c.WithoutHeimdall {
|
|
// commit states
|
|
_, err = c.CommitStates(state, header, cx, syscall)
|
|
if err != nil {
|
|
log.Error("Error while committing states", "err", err)
|
|
return nil, types.Receipts{}, err
|
|
}
|
|
}
|
|
}
|
|
|
|
if err = c.changeContractCodeIfNeeded(headerNumber, state); err != nil {
|
|
log.Error("Error changing contract code", "err", err)
|
|
return nil, types.Receipts{}, err
|
|
}
|
|
|
|
// No block rewards in PoA, so the state remains as is and uncles are dropped
|
|
// header.Root = state.IntermediateRoot(chain.Config().IsSpuriousDragon(header.Number.Uint64()))
|
|
header.UncleHash = types.CalcUncleHash(nil)
|
|
|
|
// Set state sync data to blockchain
|
|
// bc := chain.(*core.BlockChain)
|
|
// bc.SetStateSync(stateSyncData)
|
|
return nil, types.Receipts{}, nil
|
|
}
|
|
|
|
func decodeGenesisAlloc(i interface{}) (core.GenesisAlloc, error) {
|
|
var alloc core.GenesisAlloc
|
|
b, err := json.Marshal(i)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if err := json.Unmarshal(b, &alloc); err != nil {
|
|
return nil, err
|
|
}
|
|
return alloc, nil
|
|
}
|
|
|
|
func (c *Bor) changeContractCodeIfNeeded(headerNumber uint64, state *state.IntraBlockState) error {
|
|
for blockNumber, genesisAlloc := range c.config.BlockAlloc {
|
|
if blockNumber == strconv.FormatUint(headerNumber, 10) {
|
|
allocs, err := decodeGenesisAlloc(genesisAlloc)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to decode genesis alloc: %v", err)
|
|
}
|
|
for addr, account := range allocs {
|
|
log.Trace("change contract code", "address", addr)
|
|
state.SetCode(addr, account.Code)
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// FinalizeAndAssemble implements consensus.Engine, ensuring no uncles are set,
|
|
// nor block rewards given, and returns the final block.
|
|
func (c *Bor) FinalizeAndAssemble(chainConfig *params.ChainConfig, header *types.Header, state *state.IntraBlockState, txs types.Transactions, uncles []*types.Header, receipts types.Receipts,
|
|
e consensus.EpochReader, chain consensus.ChainHeaderReader, syscall consensus.SystemCall, call consensus.Call) (*types.Block, types.Transactions, types.Receipts, error) {
|
|
// stateSyncData := []*types.StateSyncData{}
|
|
|
|
headerNumber := header.Number.Uint64()
|
|
if headerNumber%c.config.Sprint == 0 {
|
|
cx := chainContext{Chain: chain, Bor: c}
|
|
|
|
// check and commit span
|
|
err := c.checkAndCommitSpan(state, header, cx, syscall)
|
|
if err != nil {
|
|
log.Error("Error while committing span", "err", err)
|
|
return nil, nil, types.Receipts{}, err
|
|
}
|
|
|
|
if !c.WithoutHeimdall {
|
|
// commit states
|
|
_, err = c.CommitStates(state, header, cx, syscall)
|
|
if err != nil {
|
|
log.Error("Error while committing states", "err", err)
|
|
return nil, nil, types.Receipts{}, err
|
|
}
|
|
}
|
|
}
|
|
|
|
if err := c.changeContractCodeIfNeeded(headerNumber, state); err != nil {
|
|
log.Error("Error changing contract code", "err", err)
|
|
return nil, nil, types.Receipts{}, err
|
|
}
|
|
|
|
// No block rewards in PoA, so the state remains as is and uncles are dropped
|
|
// header.Root = state.IntermediateRoot(chain.Config().IsSpuriousDragon(header.Number))
|
|
header.UncleHash = types.CalcUncleHash(nil)
|
|
|
|
// Assemble block
|
|
block := types.NewBlock(header, txs, nil, receipts)
|
|
|
|
// set state sync
|
|
// bc := chain.(*core.BlockChain)
|
|
// bc.SetStateSync(stateSyncData)
|
|
|
|
// return the final block for sealing
|
|
return block, nil, types.Receipts{}, nil
|
|
}
|
|
|
|
func (c *Bor) GenerateSeal(chain consensus.ChainHeaderReader, currnt, parent *types.Header, call consensus.Call) []rlp.RawValue {
|
|
return nil
|
|
}
|
|
|
|
func (c *Bor) Initialize(config *params.ChainConfig, chain consensus.ChainHeaderReader, e consensus.EpochReader, header *types.Header, txs []types.Transaction, uncles []*types.Header, syscall consensus.SystemCall) {
|
|
}
|
|
|
|
// Authorize injects a private key into the consensus engine to mint new blocks
|
|
// with.
|
|
func (c *Bor) Authorize(signer common.Address, signFn SignerFn) {
|
|
c.lock.Lock()
|
|
defer c.lock.Unlock()
|
|
|
|
c.signer = signer
|
|
c.signFn = signFn
|
|
}
|
|
|
|
// Seal implements consensus.Engine, attempting to create a sealed block using
|
|
// the local signing credentials.
|
|
func (c *Bor) Seal(chain consensus.ChainHeaderReader, block *types.Block, results chan<- *types.Block, stop <-chan struct{}) error {
|
|
header := block.Header()
|
|
// Sealing the genesis block is not supported
|
|
number := header.Number.Uint64()
|
|
if number == 0 {
|
|
return errUnknownBlock
|
|
}
|
|
// For 0-period chains, refuse to seal empty blocks (no reward but would spin sealing)
|
|
if c.config.CalculatePeriod(number) == 0 && len(block.Transactions()) == 0 {
|
|
log.Trace("Sealing paused, waiting for transactions")
|
|
return nil
|
|
}
|
|
// Don't hold the signer fields for the entire sealing procedure
|
|
c.lock.RLock()
|
|
signer, signFn := c.signer, c.signFn
|
|
c.lock.RUnlock()
|
|
|
|
snap, err := c.snapshot(chain, number-1, header.ParentHash, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Bail out if we're unauthorized to sign a block
|
|
if !snap.ValidatorSet.HasAddress(signer.Bytes()) {
|
|
// Check the UnauthorizedSignerError.Error() msg to see why we pass number-1
|
|
return &UnauthorizedSignerError{number - 1, signer.Bytes()}
|
|
}
|
|
|
|
successionNumber, err := snap.GetSignerSuccessionNumber(signer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Sweet, the protocol permits us to sign the block, wait for our time
|
|
delay := time.Unix(int64(header.Time), 0).Sub(time.Now()) // nolint: gosimple
|
|
// wiggle was already accounted for in header.Time, this is just for logging
|
|
wiggle := time.Duration(successionNumber) * time.Duration(c.config.CalculateBackupMultiplier(number)) * time.Second
|
|
|
|
// Sign all the things!
|
|
sighash, err := signFn(signer, accounts.MimetypeBor, BorRLP(header, c.config))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
copy(header.Extra[len(header.Extra)-extraSeal:], sighash)
|
|
|
|
// Wait until sealing is terminated or delay timeout.
|
|
log.Trace("Waiting for slot to sign and propagate", "delay", common.PrettyDuration(delay))
|
|
go func() {
|
|
select {
|
|
case <-stop:
|
|
log.Debug("Discarding sealing operation for block", "number", number)
|
|
return
|
|
case <-time.After(delay):
|
|
if wiggle > 0 {
|
|
log.Trace(
|
|
"Sealing out-of-turn",
|
|
"number", number,
|
|
"wiggle", common.PrettyDuration(wiggle),
|
|
"in-turn-signer", snap.ValidatorSet.GetProposer().Address.Hex(),
|
|
)
|
|
}
|
|
log.Trace(
|
|
"Sealing successful",
|
|
"number", number,
|
|
"delay", delay,
|
|
"headerDifficulty", header.Difficulty,
|
|
)
|
|
}
|
|
select {
|
|
case results <- block.WithSeal(header):
|
|
default:
|
|
log.Warn("Sealing result was not read by miner", "number", number, "sealhash", SealHash(header, c.config))
|
|
}
|
|
}()
|
|
return nil
|
|
}
|
|
|
|
// CalcDifficulty is the difficulty adjustment algorithm. It returns the difficulty
|
|
// that a new block should have based on the previous blocks in the chain and the
|
|
// current signer.
|
|
// func (c *Bor) CalcDifficulty(chain consensus.ChainHeaderReader, time uint64, parent *types.Header) *big.Int {
|
|
// snap, err := c.snapshot(chain, parent.Number.Uint64(), parent.Hash(), nil)
|
|
// if err != nil {
|
|
// return nil
|
|
// }
|
|
// return new(big.Int).SetUint64(snap.Difficulty(c.signer))
|
|
// }
|
|
|
|
func (c *Bor) CalcDifficulty(chain consensus.ChainHeaderReader, _, _ uint64, _ *big.Int, parentNumber uint64, parentHash, _ common.Hash, _ []rlp.RawValue) *big.Int {
|
|
|
|
snap, err := c.snapshot(chain, parentNumber, parentHash, nil)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
return new(big.Int).SetUint64(snap.Difficulty(c.signer))
|
|
}
|
|
|
|
// SealHash returns the hash of a block prior to it being sealed.
|
|
func (c *Bor) SealHash(header *types.Header) common.Hash {
|
|
return SealHash(header, c.config)
|
|
}
|
|
|
|
// APIs implements consensus.Engine, returning the user facing RPC API to allow
|
|
// controlling the signer voting.
|
|
func (c *Bor) APIs(chain consensus.ChainHeaderReader) []rpc.API {
|
|
return []rpc.API{{
|
|
Namespace: "bor",
|
|
Version: "1.0",
|
|
Service: &API{chain: chain, bor: c},
|
|
Public: false,
|
|
}}
|
|
}
|
|
|
|
// Close implements consensus.Engine. It's a noop for bor as there are no background threads.
|
|
func (c *Bor) Close() error {
|
|
c.DB.Close()
|
|
return nil
|
|
}
|
|
|
|
// GetCurrentSpan get current span from contract
|
|
func (c *Bor) GetCurrentSpan(header *types.Header, state *state.IntraBlockState, chain chainContext, syscall consensus.SystemCall) (*Span, error) {
|
|
|
|
// method
|
|
method := "getCurrentSpan"
|
|
data, err := c.validatorSetABI.Pack(method)
|
|
if err != nil {
|
|
log.Error("Unable to pack tx for getCurrentSpan", "err", err)
|
|
return nil, err
|
|
}
|
|
|
|
result, err := syscall(common.HexToAddress(c.config.ValidatorContract), data)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// span result
|
|
ret := new(struct {
|
|
Number *big.Int
|
|
StartBlock *big.Int
|
|
EndBlock *big.Int
|
|
})
|
|
if err := c.validatorSetABI.UnpackIntoInterface(ret, method, result); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// create new span
|
|
span := Span{
|
|
ID: ret.Number.Uint64(),
|
|
StartBlock: ret.StartBlock.Uint64(),
|
|
EndBlock: ret.EndBlock.Uint64(),
|
|
}
|
|
|
|
return &span, nil
|
|
}
|
|
|
|
// GetCurrentValidators get current validators
|
|
func (c *Bor) GetCurrentValidators(blockNumber uint64) ([]*Validator, error) {
|
|
// Use signer as validator in case of bor devent
|
|
if c.chainConfig.ChainName == networkname.BorDevnetChainName {
|
|
validators := []*Validator{
|
|
{
|
|
ID: 1,
|
|
Address: c.signer,
|
|
VotingPower: 1000,
|
|
ProposerPriority: 1,
|
|
},
|
|
}
|
|
|
|
return validators, nil
|
|
}
|
|
|
|
span, err := c.getSpanForBlock(blockNumber)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return span.ValidatorSet.Validators, nil
|
|
}
|
|
|
|
func (c *Bor) checkAndCommitSpan(
|
|
state *state.IntraBlockState,
|
|
header *types.Header,
|
|
chain chainContext,
|
|
syscall consensus.SystemCall,
|
|
) error {
|
|
headerNumber := header.Number.Uint64()
|
|
span, err := c.GetCurrentSpan(header, state, chain, syscall)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if c.needToCommitSpan(span, headerNumber) {
|
|
err := c.fetchAndCommitSpan(span.ID+1, state, header, chain, syscall)
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (c *Bor) needToCommitSpan(span *Span, headerNumber uint64) bool {
|
|
// if span is nil
|
|
if span == nil {
|
|
return false
|
|
}
|
|
|
|
// check span is not set initially
|
|
if span.EndBlock == 0 {
|
|
return true
|
|
}
|
|
|
|
// if current block is first block of last sprint in current span
|
|
if span.EndBlock > c.config.Sprint && span.EndBlock-c.config.Sprint+1 == headerNumber {
|
|
return true
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
func (c *Bor) getSpanForBlock(blockNum uint64) (*HeimdallSpan, error) {
|
|
log.Info("Getting span", "for block", blockNum)
|
|
var span *HeimdallSpan
|
|
c.spanCache.AscendGreaterOrEqual(&HeimdallSpan{Span: Span{EndBlock: blockNum}}, func(item btree.Item) bool {
|
|
span = item.(*HeimdallSpan)
|
|
return false
|
|
})
|
|
if span == nil {
|
|
// Span with high enough block number is not loaded
|
|
var spanID uint64
|
|
if c.spanCache.Len() > 0 {
|
|
spanID = c.spanCache.Max().(*HeimdallSpan).ID + 1
|
|
}
|
|
for span == nil || span.EndBlock < blockNum {
|
|
var heimdallSpan HeimdallSpan
|
|
log.Info("Span with high enough block number is not loaded", "fetching span", spanID)
|
|
response, err := c.HeimdallClient.FetchWithRetry(c.execCtx, fmt.Sprintf("bor/span/%d", spanID), "")
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if err := json.Unmarshal(response.Result, &heimdallSpan); err != nil {
|
|
return nil, err
|
|
}
|
|
span = &heimdallSpan
|
|
c.spanCache.ReplaceOrInsert(span)
|
|
spanID++
|
|
}
|
|
} else {
|
|
for span.StartBlock > blockNum {
|
|
// Span wit low enough block number is not loaded
|
|
var spanID = span.ID - 1
|
|
var heimdallSpan HeimdallSpan
|
|
log.Info("Span with low enough block number is not loaded", "fetching span", spanID)
|
|
response, err := c.HeimdallClient.FetchWithRetry(c.execCtx, fmt.Sprintf("bor/span/%d", spanID), "")
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if err := json.Unmarshal(response.Result, &heimdallSpan); err != nil {
|
|
return nil, err
|
|
}
|
|
span = &heimdallSpan
|
|
c.spanCache.ReplaceOrInsert(span)
|
|
}
|
|
}
|
|
for c.spanCache.Len() > 128 {
|
|
c.spanCache.DeleteMin()
|
|
}
|
|
return span, nil
|
|
}
|
|
|
|
func (c *Bor) fetchAndCommitSpan(
|
|
newSpanID uint64,
|
|
state *state.IntraBlockState,
|
|
header *types.Header,
|
|
chain chainContext,
|
|
syscall consensus.SystemCall,
|
|
) error {
|
|
var heimdallSpan HeimdallSpan
|
|
|
|
if c.WithoutHeimdall {
|
|
s, err := c.getNextHeimdallSpanForTest(newSpanID, state, header, chain, syscall)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
heimdallSpan = *s
|
|
} else {
|
|
response, err := c.HeimdallClient.FetchWithRetry(c.execCtx, fmt.Sprintf("bor/span/%d", newSpanID), "")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := json.Unmarshal(response.Result, &heimdallSpan); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// check if chain id matches with heimdall span
|
|
if heimdallSpan.ChainID != c.chainConfig.ChainID.String() {
|
|
return fmt.Errorf(
|
|
"chain id proposed span, %s, and bor chain id, %s, doesn't match",
|
|
heimdallSpan.ChainID,
|
|
c.chainConfig.ChainID.String(),
|
|
)
|
|
}
|
|
|
|
// get validators bytes
|
|
validators := make([]MinimalVal, 0, len(heimdallSpan.ValidatorSet.Validators))
|
|
for _, val := range heimdallSpan.ValidatorSet.Validators {
|
|
validators = append(validators, val.MinimalVal())
|
|
}
|
|
validatorBytes, err := rlp.EncodeToBytes(validators)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// get producers bytes
|
|
producers := make([]MinimalVal, 0, len(heimdallSpan.SelectedProducers))
|
|
for _, val := range heimdallSpan.SelectedProducers {
|
|
producers = append(producers, val.MinimalVal())
|
|
}
|
|
producerBytes, err := rlp.EncodeToBytes(producers)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// method
|
|
method := "commitSpan"
|
|
log.Debug("✅ Committing new span",
|
|
"id", heimdallSpan.ID,
|
|
"startBlock", heimdallSpan.StartBlock,
|
|
"endBlock", heimdallSpan.EndBlock,
|
|
"validatorBytes", hex.EncodeToString(validatorBytes),
|
|
"producerBytes", hex.EncodeToString(producerBytes),
|
|
)
|
|
|
|
// get packed data
|
|
data, err := c.validatorSetABI.Pack(method,
|
|
big.NewInt(0).SetUint64(heimdallSpan.ID),
|
|
big.NewInt(0).SetUint64(heimdallSpan.StartBlock),
|
|
big.NewInt(0).SetUint64(heimdallSpan.EndBlock),
|
|
validatorBytes,
|
|
producerBytes,
|
|
)
|
|
if err != nil {
|
|
log.Error("Unable to pack tx for commitSpan", "err", err)
|
|
return err
|
|
}
|
|
|
|
_, err = syscall(common.HexToAddress(c.config.ValidatorContract), data)
|
|
// apply message
|
|
return err
|
|
}
|
|
|
|
// CommitStates commit states
|
|
func (c *Bor) CommitStates(
|
|
state *state.IntraBlockState,
|
|
header *types.Header,
|
|
chain chainContext,
|
|
syscall consensus.SystemCall,
|
|
) ([]*types.StateSyncData, error) {
|
|
stateSyncs := make([]*types.StateSyncData, 0)
|
|
number := header.Number.Uint64()
|
|
_lastStateID, err := c.GenesisContractsClient.LastStateId(header, state, chain, c, syscall)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
to := time.Unix(int64(chain.Chain.GetHeaderByNumber(number-c.config.Sprint).Time), 0)
|
|
lastStateID := _lastStateID.Uint64()
|
|
log.Trace(
|
|
"Fetching state updates from Heimdall",
|
|
"fromID", lastStateID+1,
|
|
"to", to.Format(time.RFC3339))
|
|
eventRecords, err := c.HeimdallClient.FetchStateSyncEvents(c.execCtx, lastStateID+1, to.Unix())
|
|
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if c.config.OverrideStateSyncRecords != nil {
|
|
if val, ok := c.config.OverrideStateSyncRecords[strconv.FormatUint(number, 10)]; ok {
|
|
eventRecords = eventRecords[0:val]
|
|
}
|
|
}
|
|
|
|
chainID := c.chainConfig.ChainID.String()
|
|
for _, eventRecord := range eventRecords {
|
|
if eventRecord.ID <= lastStateID {
|
|
continue
|
|
}
|
|
if err := validateEventRecord(eventRecord, number, to, lastStateID, chainID); err != nil {
|
|
log.Error(err.Error())
|
|
break
|
|
}
|
|
|
|
stateData := types.StateSyncData{
|
|
ID: eventRecord.ID,
|
|
Contract: eventRecord.Contract,
|
|
Data: hex.EncodeToString(eventRecord.Data),
|
|
TxHash: eventRecord.TxHash,
|
|
}
|
|
stateSyncs = append(stateSyncs, &stateData)
|
|
|
|
if err := c.GenesisContractsClient.CommitState(eventRecord, state, header, chain, c, syscall); err != nil {
|
|
return nil, err
|
|
}
|
|
lastStateID++
|
|
}
|
|
return stateSyncs, nil
|
|
}
|
|
|
|
func validateEventRecord(eventRecord *EventRecordWithTime, number uint64, to time.Time, lastStateID uint64, chainID string) error {
|
|
// event id should be sequential and event.Time should lie in the range [from, to)
|
|
if lastStateID+1 != eventRecord.ID || eventRecord.ChainID != chainID || !eventRecord.Time.Before(to) {
|
|
return &InvalidStateReceivedError{number, lastStateID, &to, eventRecord}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (c *Bor) SetHeimdallClient(h IHeimdallClient) {
|
|
c.HeimdallClient = h
|
|
}
|
|
|
|
//
|
|
// Private methods
|
|
//
|
|
|
|
func (c *Bor) getNextHeimdallSpanForTest(
|
|
newSpanID uint64,
|
|
state *state.IntraBlockState,
|
|
header *types.Header,
|
|
chain chainContext,
|
|
syscall consensus.SystemCall,
|
|
) (*HeimdallSpan, error) {
|
|
headerNumber := header.Number.Uint64()
|
|
span, err := c.GetCurrentSpan(header, state, chain, syscall)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Retrieve the snapshot needed to verify this header and cache it
|
|
snap, err := c.snapshot(chain.Chain, headerNumber-1, header.ParentHash, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// new span
|
|
span.ID = newSpanID
|
|
if span.EndBlock == 0 {
|
|
span.StartBlock = 256
|
|
} else {
|
|
span.StartBlock = span.EndBlock + 1
|
|
}
|
|
span.EndBlock = span.StartBlock + (100 * c.config.Sprint) - 1
|
|
|
|
selectedProducers := make([]Validator, len(snap.ValidatorSet.Validators))
|
|
for i, v := range snap.ValidatorSet.Validators {
|
|
selectedProducers[i] = *v
|
|
}
|
|
heimdallSpan := &HeimdallSpan{
|
|
Span: *span,
|
|
ValidatorSet: *snap.ValidatorSet,
|
|
SelectedProducers: selectedProducers,
|
|
ChainID: c.chainConfig.ChainID.String(),
|
|
}
|
|
|
|
return heimdallSpan, nil
|
|
}
|
|
|
|
//
|
|
// Chain context
|
|
//
|
|
|
|
// chain context
|
|
type chainContext struct {
|
|
Chain consensus.ChainHeaderReader
|
|
Bor consensus.Engine
|
|
}
|
|
|
|
func (c chainContext) Engine() consensus.Engine {
|
|
return c.Bor
|
|
}
|
|
|
|
func (c chainContext) GetHeader(hash common.Hash, number uint64) *types.Header {
|
|
return c.Chain.GetHeader(hash, number)
|
|
}
|
|
|
|
func validatorContains(a []*Validator, x *Validator) (*Validator, bool) {
|
|
for _, n := range a {
|
|
if bytes.Equal(n.Address.Bytes(), x.Address.Bytes()) {
|
|
return n, true
|
|
}
|
|
}
|
|
return nil, false
|
|
}
|
|
|
|
func getUpdatedValidatorSet(oldValidatorSet *ValidatorSet, newVals []*Validator) *ValidatorSet {
|
|
v := oldValidatorSet
|
|
oldVals := v.Validators
|
|
|
|
changes := make([]*Validator, 0, len(oldVals))
|
|
for _, ov := range oldVals {
|
|
if f, ok := validatorContains(newVals, ov); ok {
|
|
ov.VotingPower = f.VotingPower
|
|
} else {
|
|
ov.VotingPower = 0
|
|
}
|
|
|
|
changes = append(changes, ov)
|
|
}
|
|
|
|
for _, nv := range newVals {
|
|
if _, ok := validatorContains(changes, nv); !ok {
|
|
changes = append(changes, nv)
|
|
}
|
|
}
|
|
|
|
v.UpdateWithChangeSet(changes)
|
|
return v
|
|
}
|
|
|
|
func isSprintStart(number, sprint uint64) bool {
|
|
return number%sprint == 0
|
|
}
|