mirror of
https://gitlab.com/pulsechaincom/erigon-pulse.git
synced 2025-01-19 00:54:12 +00:00
1322 lines
42 KiB
Go
1322 lines
42 KiB
Go
package bor
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/hex"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"math/big"
|
|
"sort"
|
|
"strconv"
|
|
"sync"
|
|
"sync/atomic"
|
|
"time"
|
|
|
|
"github.com/google/btree"
|
|
lru "github.com/hashicorp/golang-lru/v2"
|
|
"github.com/ledgerwatch/erigon-lib/chain"
|
|
libcommon "github.com/ledgerwatch/erigon-lib/common"
|
|
"github.com/ledgerwatch/erigon-lib/common/length"
|
|
"github.com/ledgerwatch/erigon-lib/kv"
|
|
"github.com/ledgerwatch/log/v3"
|
|
|
|
"github.com/ledgerwatch/erigon/common"
|
|
"github.com/ledgerwatch/erigon/consensus"
|
|
"github.com/ledgerwatch/erigon/consensus/bor/clerk"
|
|
"github.com/ledgerwatch/erigon/consensus/bor/heimdall/span"
|
|
"github.com/ledgerwatch/erigon/consensus/bor/statefull"
|
|
"github.com/ledgerwatch/erigon/consensus/bor/valset"
|
|
"github.com/ledgerwatch/erigon/consensus/misc"
|
|
"github.com/ledgerwatch/erigon/core/state"
|
|
"github.com/ledgerwatch/erigon/core/types"
|
|
"github.com/ledgerwatch/erigon/core/types/accounts"
|
|
"github.com/ledgerwatch/erigon/crypto"
|
|
"github.com/ledgerwatch/erigon/crypto/cryptopool"
|
|
"github.com/ledgerwatch/erigon/rlp"
|
|
"github.com/ledgerwatch/erigon/rpc"
|
|
)
|
|
|
|
const (
|
|
checkpointInterval = 1024 // Number of blocks after which to save the vote snapshot to the database
|
|
inmemorySnapshots = 128 // Number of recent vote snapshots to keep in memory
|
|
inmemorySignatures = 4096 // Number of recent block signatures to keep in memory
|
|
)
|
|
|
|
// Bor protocol constants.
|
|
var (
|
|
defaultSprintLength = map[string]uint64{
|
|
"0": 64,
|
|
} // Default number of blocks after which to checkpoint and reset the pending votes
|
|
|
|
extraVanity = 32 // Fixed number of extra-data prefix bytes reserved for signer vanity
|
|
extraSeal = 65 // Fixed number of extra-data suffix bytes reserved for signer seal
|
|
|
|
uncleHash = types.CalcUncleHash(nil) // Always Keccak256(RLP([])) as uncles are meaningless outside of PoW.
|
|
|
|
// diffInTurn = big.NewInt(2) // Block difficulty for in-turn signatures
|
|
// diffNoTurn = big.NewInt(1) // Block difficulty for out-of-turn signatures
|
|
|
|
validatorHeaderBytesLength = length.Addr + 20 // address + power
|
|
// systemAddress = libcommon.HexToAddress("0xffffFFFfFFffffffffffffffFfFFFfffFFFfFFfE")
|
|
)
|
|
|
|
// Various error messages to mark blocks invalid. These should be private to
|
|
// prevent engine specific errors from being referenced in the remainder of the
|
|
// codebase, inherently breaking if the engine is swapped out. Please put common
|
|
// error types into the consensus package.
|
|
var (
|
|
// errUnknownBlock is returned when the list of signers is requested for a block
|
|
// that is not part of the local blockchain.
|
|
errUnknownBlock = errors.New("unknown block")
|
|
|
|
// errInvalidCheckpointBeneficiary is returned if a checkpoint/epoch transition
|
|
// block has a beneficiary set to non-zeroes.
|
|
// errInvalidCheckpointBeneficiary = errors.New("beneficiary in checkpoint block non-zero")
|
|
|
|
// errInvalidVote is returned if a nonce value is something else that the two
|
|
// allowed constants of 0x00..0 or 0xff..f.
|
|
// errInvalidVote = errors.New("vote nonce not 0x00..0 or 0xff..f")
|
|
|
|
// errInvalidCheckpointVote is returned if a checkpoint/epoch transition block
|
|
// has a vote nonce set to non-zeroes.
|
|
// errInvalidCheckpointVote = errors.New("vote nonce in checkpoint block non-zero")
|
|
|
|
// errMissingVanity is returned if a block's extra-data section is shorter than
|
|
// 32 bytes, which is required to store the signer vanity.
|
|
errMissingVanity = errors.New("extra-data 32 byte vanity prefix missing")
|
|
|
|
// errMissingSignature is returned if a block's extra-data section doesn't seem
|
|
// to contain a 65 byte secp256k1 signature.
|
|
errMissingSignature = errors.New("extra-data 65 byte signature suffix missing")
|
|
|
|
// errExtraValidators is returned if non-sprint-end block contain validator data in
|
|
// their extra-data fields.
|
|
errExtraValidators = errors.New("non-sprint-end block contains extra validator list")
|
|
|
|
// errInvalidSpanValidators is returned if a block contains an
|
|
// invalid list of validators (i.e. non divisible by 40 bytes).
|
|
errInvalidSpanValidators = errors.New("invalid validator list on sprint end block")
|
|
|
|
// errInvalidMixDigest is returned if a block's mix digest is non-zero.
|
|
errInvalidMixDigest = errors.New("non-zero mix digest")
|
|
|
|
// errInvalidUncleHash is returned if a block contains an non-empty uncle list.
|
|
errInvalidUncleHash = errors.New("non empty uncle hash")
|
|
|
|
// errInvalidDifficulty is returned if the difficulty of a block neither 1 or 2.
|
|
errInvalidDifficulty = errors.New("invalid difficulty")
|
|
|
|
// ErrInvalidTimestamp is returned if the timestamp of a block is lower than
|
|
// the previous block's timestamp + the minimum block period.
|
|
ErrInvalidTimestamp = errors.New("invalid timestamp")
|
|
|
|
// errOutOfRangeChain is returned if an authorization list is attempted to
|
|
// be modified via out-of-range or non-contiguous headers.
|
|
errOutOfRangeChain = errors.New("out of range or non-contiguous chain")
|
|
|
|
errUncleDetected = errors.New("uncles not allowed")
|
|
errUnknownValidators = errors.New("unknown validators")
|
|
)
|
|
|
|
// SignerFn is a signer callback function to request a header to be signed by a
|
|
// backing account.
|
|
type SignerFn func(signer libcommon.Address, mimeType string, message []byte) ([]byte, error)
|
|
|
|
// ecrecover extracts the Ethereum account address from a signed header.
|
|
func ecrecover(header *types.Header, sigcache *lru.ARCCache[libcommon.Hash, libcommon.Address], c *chain.BorConfig) (libcommon.Address, error) {
|
|
// If the signature's already cached, return that
|
|
hash := header.Hash()
|
|
if address, known := sigcache.Get(hash); known {
|
|
return address, nil
|
|
}
|
|
// Retrieve the signature from the header extra-data
|
|
if len(header.Extra) < extraSeal {
|
|
return libcommon.Address{}, errMissingSignature
|
|
}
|
|
|
|
signature := header.Extra[len(header.Extra)-extraSeal:]
|
|
|
|
// Recover the public key and the Ethereum address
|
|
pubkey, err := crypto.Ecrecover(SealHash(header, c).Bytes(), signature)
|
|
if err != nil {
|
|
return libcommon.Address{}, err
|
|
}
|
|
var signer libcommon.Address
|
|
copy(signer[:], crypto.Keccak256(pubkey[1:])[12:])
|
|
|
|
sigcache.Add(hash, signer)
|
|
|
|
return signer, nil
|
|
}
|
|
|
|
// SealHash returns the hash of a block prior to it being sealed.
|
|
func SealHash(header *types.Header, c *chain.BorConfig) (hash libcommon.Hash) {
|
|
hasher := cryptopool.NewLegacyKeccak256()
|
|
defer cryptopool.ReturnToPoolKeccak256(hasher)
|
|
|
|
encodeSigHeader(hasher, header, c)
|
|
hasher.Sum(hash[:0])
|
|
|
|
return hash
|
|
}
|
|
|
|
func encodeSigHeader(w io.Writer, header *types.Header, c *chain.BorConfig) {
|
|
enc := []interface{}{
|
|
header.ParentHash,
|
|
header.UncleHash,
|
|
header.Coinbase,
|
|
header.Root,
|
|
header.TxHash,
|
|
header.ReceiptHash,
|
|
header.Bloom,
|
|
header.Difficulty,
|
|
header.Number,
|
|
header.GasLimit,
|
|
header.GasUsed,
|
|
header.Time,
|
|
header.Extra[:len(header.Extra)-65], // Yes, this will panic if extra is too short
|
|
header.MixDigest,
|
|
header.Nonce,
|
|
}
|
|
|
|
if c.IsJaipur(header.Number.Uint64()) {
|
|
if header.BaseFee != nil {
|
|
enc = append(enc, header.BaseFee)
|
|
}
|
|
}
|
|
|
|
if err := rlp.Encode(w, enc); err != nil {
|
|
panic("can't encode: " + err.Error())
|
|
}
|
|
}
|
|
|
|
// CalcProducerDelay is the block delay algorithm based on block time, period, producerDelay and turn-ness of a signer
|
|
func CalcProducerDelay(number uint64, succession int, c *chain.BorConfig) uint64 {
|
|
// When the block is the first block of the sprint, it is expected to be delayed by `producerDelay`.
|
|
// That is to allow time for block propagation in the last sprint
|
|
delay := c.CalculatePeriod(number)
|
|
if number%c.CalculateSprint(number) == 0 {
|
|
delay = c.CalculateProducerDelay(number)
|
|
}
|
|
|
|
if succession > 0 {
|
|
delay += uint64(succession) * c.CalculateBackupMultiplier(number)
|
|
}
|
|
|
|
return delay
|
|
}
|
|
|
|
// BorRLP returns the rlp bytes which needs to be signed for the bor
|
|
// sealing. The RLP to sign consists of the entire header apart from the 65 byte signature
|
|
// contained at the end of the extra data.
|
|
//
|
|
// Note, the method requires the extra data to be at least 65 bytes, otherwise it
|
|
// panics. This is done to avoid accidentally using both forms (signature present
|
|
// or not), which could be abused to produce different hashes for the same header.
|
|
func BorRLP(header *types.Header, c *chain.BorConfig) []byte {
|
|
b := new(bytes.Buffer)
|
|
encodeSigHeader(b, header, c)
|
|
|
|
return b.Bytes()
|
|
}
|
|
|
|
// Bor is the matic-bor consensus engine
|
|
type Bor struct {
|
|
chainConfig *chain.Config // Chain config
|
|
config *chain.BorConfig // Consensus engine configuration parameters for bor consensus
|
|
DB kv.RwDB // Database to store and retrieve snapshot checkpoints
|
|
|
|
recents *lru.ARCCache[libcommon.Hash, *Snapshot] // Snapshots for recent block to speed up reorgs
|
|
signatures *lru.ARCCache[libcommon.Hash, libcommon.Address] // Signatures of recent blocks to speed up mining
|
|
|
|
authorizedSigner atomic.Pointer[signer] // Ethereum address and sign function of the signing key
|
|
|
|
execCtx context.Context // context of caller execution stage
|
|
|
|
spanner Spanner
|
|
GenesisContractsClient GenesisContract
|
|
HeimdallClient IHeimdallClient
|
|
|
|
// scope event.SubscriptionScope
|
|
// The fields below are for testing only
|
|
fakeDiff bool // Skip difficulty verifications
|
|
spanCache *btree.BTree
|
|
|
|
closeOnce sync.Once
|
|
}
|
|
|
|
type signer struct {
|
|
signer libcommon.Address // Ethereum address of the signing key
|
|
signFn SignerFn // Signer function to authorize hashes with
|
|
}
|
|
|
|
// New creates a Matic Bor consensus engine.
|
|
func New(
|
|
chainConfig *chain.Config,
|
|
db kv.RwDB,
|
|
spanner Spanner,
|
|
heimdallClient IHeimdallClient,
|
|
genesisContracts GenesisContract,
|
|
) *Bor {
|
|
// get bor config
|
|
borConfig := chainConfig.Bor
|
|
|
|
// Set any missing consensus parameters to their defaults
|
|
if borConfig != nil && borConfig.CalculateSprint(0) == 0 {
|
|
borConfig.Sprint = defaultSprintLength
|
|
}
|
|
|
|
// Allocate the snapshot caches and create the engine
|
|
recents, _ := lru.NewARC[libcommon.Hash, *Snapshot](inmemorySnapshots)
|
|
signatures, _ := lru.NewARC[libcommon.Hash, libcommon.Address](inmemorySignatures)
|
|
c := &Bor{
|
|
chainConfig: chainConfig,
|
|
config: borConfig,
|
|
DB: db,
|
|
recents: recents,
|
|
signatures: signatures,
|
|
spanner: spanner,
|
|
GenesisContractsClient: genesisContracts,
|
|
HeimdallClient: heimdallClient,
|
|
spanCache: btree.New(32),
|
|
execCtx: context.Background(),
|
|
}
|
|
|
|
c.authorizedSigner.Store(&signer{
|
|
libcommon.Address{},
|
|
func(_ libcommon.Address, _ string, i []byte) ([]byte, error) {
|
|
// return an error to prevent panics
|
|
return nil, &UnauthorizedSignerError{0, libcommon.Address{}.Bytes()}
|
|
},
|
|
})
|
|
|
|
// make sure we can decode all the GenesisAlloc in the BorConfig.
|
|
for key, genesisAlloc := range c.config.BlockAlloc {
|
|
if _, err := decodeGenesisAlloc(genesisAlloc); err != nil {
|
|
panic(fmt.Sprintf("BUG: Block alloc '%s' in genesis is not correct: %v", key, err))
|
|
}
|
|
}
|
|
|
|
return c
|
|
}
|
|
|
|
// Type returns underlying consensus engine
|
|
func (c *Bor) Type() chain.ConsensusName {
|
|
return chain.BorConsensus
|
|
}
|
|
|
|
// Author implements consensus.Engine, returning the Ethereum address recovered
|
|
// from the signature in the header's extra-data section.
|
|
// This is thread-safe (only access the header and config (which is never updated),
|
|
// as well as signatures, which are lru.ARCCache, which is thread-safe)
|
|
func (c *Bor) Author(header *types.Header) (libcommon.Address, error) {
|
|
return ecrecover(header, c.signatures, c.config)
|
|
}
|
|
|
|
// VerifyHeader checks whether a header conforms to the consensus rules.
|
|
func (c *Bor) VerifyHeader(chain consensus.ChainHeaderReader, header *types.Header, seal bool) error {
|
|
|
|
return c.verifyHeader(chain, header, nil)
|
|
}
|
|
|
|
// VerifyHeaders is similar to VerifyHeader, but verifies a batch of headers. The
|
|
// method returns a quit channel to abort the operations and a results channel to
|
|
// retrieve the async verifications (the order is that of the input slice).
|
|
func (c *Bor) VerifyHeaders(chain consensus.ChainHeaderReader, headers []*types.Header, _ []bool) (chan<- struct{}, <-chan error) {
|
|
abort := make(chan struct{})
|
|
results := make(chan error, len(headers))
|
|
|
|
go func() {
|
|
for i, header := range headers {
|
|
err := c.verifyHeader(chain, header, headers[:i])
|
|
|
|
select {
|
|
case <-abort:
|
|
return
|
|
case results <- err:
|
|
}
|
|
}
|
|
}()
|
|
|
|
return abort, results
|
|
}
|
|
|
|
// verifyHeader checks whether a header conforms to the consensus rules.The
|
|
// caller may optionally pass in a batch of parents (ascending order) to avoid
|
|
// looking those up from the database. This is useful for concurrently verifying
|
|
// a batch of new headers.
|
|
func (c *Bor) verifyHeader(chain consensus.ChainHeaderReader, header *types.Header, parents []*types.Header) error {
|
|
if header.Number == nil {
|
|
return errUnknownBlock
|
|
}
|
|
|
|
number := header.Number.Uint64()
|
|
|
|
// Don't waste time checking blocks from the future
|
|
if header.Time > uint64(time.Now().Unix()) {
|
|
return consensus.ErrFutureBlock
|
|
}
|
|
|
|
if err := validateHeaderExtraField(header.Extra); err != nil {
|
|
return err
|
|
}
|
|
|
|
// check extr adata
|
|
isSprintEnd := isSprintStart(number+1, c.config.CalculateSprint(number))
|
|
|
|
// Ensure that the extra-data contains a signer list on checkpoint, but none otherwise
|
|
signersBytes := len(header.Extra) - extraVanity - extraSeal
|
|
if !isSprintEnd && signersBytes != 0 {
|
|
return errExtraValidators
|
|
}
|
|
|
|
if isSprintEnd && signersBytes%validatorHeaderBytesLength != 0 {
|
|
return errInvalidSpanValidators
|
|
}
|
|
|
|
// Ensure that the mix digest is zero as we don't have fork protection currently
|
|
if header.MixDigest != (libcommon.Hash{}) {
|
|
return errInvalidMixDigest
|
|
}
|
|
|
|
// Ensure that the block doesn't contain any uncles which are meaningless in PoA
|
|
if header.UncleHash != uncleHash {
|
|
return errInvalidUncleHash
|
|
}
|
|
|
|
// Ensure that the block's difficulty is meaningful (may not be correct at this point)
|
|
if number > 0 {
|
|
if header.Difficulty == nil {
|
|
return errInvalidDifficulty
|
|
}
|
|
}
|
|
|
|
// Verify that the gas limit is <= 2^63-1
|
|
gasCap := uint64(0x7fffffffffffffff)
|
|
|
|
if header.GasLimit > gasCap {
|
|
return fmt.Errorf("invalid gasLimit: have %v, max %v", header.GasLimit, gasCap)
|
|
}
|
|
|
|
// All basic checks passed, verify cascading fields
|
|
return c.verifyCascadingFields(chain, header, parents)
|
|
}
|
|
|
|
// validateHeaderExtraField validates that the extra-data contains both the vanity and signature.
|
|
// header.Extra = header.Vanity + header.ProducerBytes (optional) + header.Seal
|
|
func validateHeaderExtraField(extraBytes []byte) error {
|
|
if len(extraBytes) < extraVanity {
|
|
return errMissingVanity
|
|
}
|
|
|
|
if len(extraBytes) < extraVanity+extraSeal {
|
|
return errMissingSignature
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// verifyCascadingFields verifies all the header fields that are not standalone,
|
|
// rather depend on a batch of previous headers. The caller may optionally pass
|
|
// in a batch of parents (ascending order) to avoid looking those up from the
|
|
// database. This is useful for concurrently verifying a batch of new headers.
|
|
func (c *Bor) verifyCascadingFields(chain consensus.ChainHeaderReader, header *types.Header, parents []*types.Header) error {
|
|
// The genesis block is the always valid dead-end
|
|
number := header.Number.Uint64()
|
|
|
|
if number == 0 {
|
|
return nil
|
|
}
|
|
|
|
// Ensure that the block's timestamp isn't too close to it's parent
|
|
var parent *types.Header
|
|
|
|
if len(parents) > 0 {
|
|
parent = parents[len(parents)-1]
|
|
} else {
|
|
parent = chain.GetHeader(header.ParentHash, number-1)
|
|
}
|
|
|
|
if parent == nil || parent.Number.Uint64() != number-1 || parent.Hash() != header.ParentHash {
|
|
return consensus.ErrUnknownAncestor
|
|
}
|
|
|
|
// Verify that the gasUsed is <= gasLimit
|
|
if header.GasUsed > header.GasLimit {
|
|
return fmt.Errorf("invalid gasUsed: have %d, gasLimit %d", header.GasUsed, header.GasLimit)
|
|
}
|
|
|
|
if !chain.Config().IsLondon(header.Number.Uint64()) {
|
|
// Verify BaseFee not present before EIP-1559 fork.
|
|
if header.BaseFee != nil {
|
|
return fmt.Errorf("invalid baseFee before fork: have %d, want <nil>", header.BaseFee)
|
|
}
|
|
if err := misc.VerifyGaslimit(parent.GasLimit, header.GasLimit); err != nil {
|
|
return err
|
|
}
|
|
} else if err := misc.VerifyEip1559Header(chain.Config(), parent, header); err != nil {
|
|
// Verify the header's EIP-1559 attributes.
|
|
return err
|
|
}
|
|
|
|
if header.WithdrawalsHash != nil {
|
|
return consensus.ErrUnexpectedWithdrawals
|
|
}
|
|
|
|
if parent.Time+c.config.CalculatePeriod(number) > header.Time {
|
|
return ErrInvalidTimestamp
|
|
}
|
|
|
|
// Retrieve the snapshot needed to verify this header and cache it
|
|
snap, err := c.snapshot(chain, number-1, header.ParentHash, parents)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// verify the validator list in the last sprint block
|
|
if isSprintStart(number, c.config.CalculateSprint(number)) {
|
|
parentValidatorBytes := parent.Extra[extraVanity : len(parent.Extra)-extraSeal]
|
|
validatorsBytes := make([]byte, len(snap.ValidatorSet.Validators)*validatorHeaderBytesLength)
|
|
|
|
currentValidators := snap.ValidatorSet.Copy().Validators
|
|
// sort validator by address
|
|
sort.Sort(valset.ValidatorsByAddress(currentValidators))
|
|
for i, validator := range currentValidators {
|
|
copy(validatorsBytes[i*validatorHeaderBytesLength:], validator.HeaderBytes())
|
|
}
|
|
// len(header.Extra) >= extraVanity+extraSeal has already been validated in validateHeaderExtraField, so this won't result in a panic
|
|
if !bytes.Equal(parentValidatorBytes, validatorsBytes) {
|
|
return &MismatchingValidatorsError{number - 1, validatorsBytes, parentValidatorBytes}
|
|
}
|
|
}
|
|
|
|
// All basic checks passed, verify the seal and return
|
|
return c.verifySeal(chain, header, parents)
|
|
}
|
|
|
|
// snapshot retrieves the authorization snapshot at a given point in time.
|
|
func (c *Bor) snapshot(chain consensus.ChainHeaderReader, number uint64, hash libcommon.Hash, parents []*types.Header) (*Snapshot, error) {
|
|
// Search for a snapshot in memory or on disk for checkpoints
|
|
var snap *Snapshot
|
|
|
|
headers := make([]*types.Header, 0, 16)
|
|
|
|
//nolint:govet
|
|
for snap == nil {
|
|
// If an in-memory snapshot was found, use that
|
|
if s, ok := c.recents.Get(hash); ok {
|
|
snap = s
|
|
|
|
break
|
|
}
|
|
|
|
// If an on-disk checkpoint snapshot can be found, use that
|
|
if number%checkpointInterval == 0 {
|
|
if s, err := loadSnapshot(c.config, c.signatures, c.DB, hash); err == nil {
|
|
log.Trace("Loaded snapshot from disk", "number", number, "hash", hash)
|
|
|
|
snap = s
|
|
|
|
break
|
|
}
|
|
}
|
|
|
|
// If we're at the genesis, snapshot the initial state. Alternatively if we're
|
|
// at a checkpoint block without a parent (light client CHT), or we have piled
|
|
// up more headers than allowed to be reorged (chain reinit from a freezer),
|
|
// consider the checkpoint trusted and snapshot it.
|
|
|
|
// TODO fix this
|
|
// nolint:nestif
|
|
if number == 0 {
|
|
checkpoint := chain.GetHeaderByNumber(number)
|
|
if checkpoint != nil {
|
|
// get checkpoint data
|
|
hash := checkpoint.Hash()
|
|
|
|
// get validators and current span
|
|
validators, err := c.spanner.GetCurrentValidators(number+1, c.authorizedSigner.Load().signer, c.getSpanForBlock)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// new snap shot
|
|
snap = newSnapshot(c.config, c.signatures, number, hash, validators)
|
|
if err := snap.store(c.DB); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
log.Info("Stored checkpoint snapshot to disk", "number", number, "hash", hash)
|
|
|
|
break
|
|
}
|
|
}
|
|
|
|
// No snapshot for this header, gather the header and move backward
|
|
var header *types.Header
|
|
if len(parents) > 0 {
|
|
// If we have explicit parents, pick from there (enforced)
|
|
header = parents[len(parents)-1]
|
|
if header.Hash() != hash || header.Number.Uint64() != number {
|
|
return nil, consensus.ErrUnknownAncestor
|
|
}
|
|
|
|
parents = parents[:len(parents)-1]
|
|
} else {
|
|
// No explicit parents (or no more left), reach out to the database
|
|
header = chain.GetHeader(hash, number)
|
|
if header == nil {
|
|
return nil, consensus.ErrUnknownAncestor
|
|
}
|
|
}
|
|
|
|
headers = append(headers, header)
|
|
number, hash = number-1, header.ParentHash
|
|
}
|
|
|
|
// check if snapshot is nil
|
|
if snap == nil {
|
|
return nil, fmt.Errorf("unknown error while retrieving snapshot at block number %v", number)
|
|
}
|
|
|
|
// Previous snapshot found, apply any pending headers on top of it
|
|
for i := 0; i < len(headers)/2; i++ {
|
|
headers[i], headers[len(headers)-1-i] = headers[len(headers)-1-i], headers[i]
|
|
}
|
|
|
|
snap, err := snap.apply(headers)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
c.recents.Add(snap.Hash, snap)
|
|
|
|
// If we've generated a new checkpoint snapshot, save to disk
|
|
if snap.Number%checkpointInterval == 0 && len(headers) > 0 {
|
|
if err = snap.store(c.DB); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
log.Trace("Stored snapshot to disk", "number", snap.Number, "hash", snap.Hash)
|
|
}
|
|
|
|
return snap, err
|
|
}
|
|
|
|
// VerifyUncles implements consensus.Engine, always returning an error for any
|
|
// uncles as this consensus mechanism doesn't permit uncles.
|
|
// VerifyUncles implements consensus.Engine, always returning an error for any
|
|
// uncles as this consensus mechanism doesn't permit uncles.
|
|
func (c *Bor) VerifyUncles(_ consensus.ChainReader, _ *types.Header, uncles []*types.Header) error {
|
|
if len(uncles) > 0 {
|
|
return errUncleDetected
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// VerifySeal implements consensus.Engine, checking whether the signature contained
|
|
// in the header satisfies the consensus protocol requirements.
|
|
func (c *Bor) VerifySeal(chain consensus.ChainHeaderReader, header *types.Header) error {
|
|
return c.verifySeal(chain, header, nil)
|
|
}
|
|
|
|
// verifySeal checks whether the signature contained in the header satisfies the
|
|
// consensus protocol requirements. The method accepts an optional list of parent
|
|
// headers that aren't yet part of the local blockchain to generate the snapshots
|
|
// from.
|
|
func (c *Bor) verifySeal(chain consensus.ChainHeaderReader, header *types.Header, parents []*types.Header) error {
|
|
// Verifying the genesis block is not supported
|
|
number := header.Number.Uint64()
|
|
if number == 0 {
|
|
return errUnknownBlock
|
|
}
|
|
// Resolve the authorization key and check against signers
|
|
signer, err := ecrecover(header, c.signatures, c.config)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Retrieve the snapshot needed to verify this header and cache it
|
|
snap, err := c.snapshot(chain, number-1, header.ParentHash, parents)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if !snap.ValidatorSet.HasAddress(signer) {
|
|
// Check the UnauthorizedSignerError.Error() msg to see why we pass number-1
|
|
return &UnauthorizedSignerError{number - 1, signer.Bytes()}
|
|
}
|
|
|
|
succession, err := snap.GetSignerSuccessionNumber(signer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var parent *types.Header
|
|
if len(parents) > 0 { // if parents is nil, len(parents) is zero
|
|
parent = parents[len(parents)-1]
|
|
} else if number > 0 {
|
|
parent = chain.GetHeader(header.ParentHash, number-1)
|
|
}
|
|
|
|
if parent != nil && header.Time < parent.Time+CalcProducerDelay(number, succession, c.config) {
|
|
return &BlockTooSoonError{number, succession}
|
|
}
|
|
|
|
// Ensure that the difficulty corresponds to the turn-ness of the signer
|
|
if !c.fakeDiff {
|
|
difficulty := snap.Difficulty(signer)
|
|
if header.Difficulty.Uint64() != difficulty {
|
|
return &WrongDifficultyError{number, difficulty, header.Difficulty.Uint64(), signer.Bytes()}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func IsBlockOnTime(parent *types.Header, header *types.Header, number uint64, succession int, cfg *chain.BorConfig) bool {
|
|
return parent != nil && header.Time < parent.Time+CalcProducerDelay(number, succession, cfg)
|
|
}
|
|
|
|
// Prepare implements consensus.Engine, preparing all the consensus fields of the
|
|
// header for running the transactions on top.
|
|
func (c *Bor) Prepare(chain consensus.ChainHeaderReader, header *types.Header, state *state.IntraBlockState) error {
|
|
// If the block isn't a checkpoint, cast a random vote (good enough for now)
|
|
header.Coinbase = libcommon.Address{}
|
|
header.Nonce = types.BlockNonce{}
|
|
|
|
number := header.Number.Uint64()
|
|
// Assemble the validator snapshot to check which votes make sense
|
|
snap, err := c.snapshot(chain, number-1, header.ParentHash, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Set the correct difficulty
|
|
header.Difficulty = new(big.Int).SetUint64(snap.Difficulty(c.authorizedSigner.Load().signer))
|
|
|
|
// Ensure the extra data has all it's components
|
|
if len(header.Extra) < extraVanity {
|
|
header.Extra = append(header.Extra, bytes.Repeat([]byte{0x00}, extraVanity-len(header.Extra))...)
|
|
}
|
|
|
|
header.Extra = header.Extra[:extraVanity]
|
|
|
|
// get validator set if number
|
|
if isSprintStart(number+1, c.config.CalculateSprint(number)) {
|
|
newValidators, err := c.spanner.GetCurrentValidators(number+1, c.authorizedSigner.Load().signer, c.getSpanForBlock)
|
|
if err != nil {
|
|
return errUnknownValidators
|
|
}
|
|
|
|
// sort validator by address
|
|
sort.Sort(valset.ValidatorsByAddress(newValidators))
|
|
|
|
for _, validator := range newValidators {
|
|
header.Extra = append(header.Extra, validator.HeaderBytes()...)
|
|
}
|
|
}
|
|
|
|
// add extra seal space
|
|
header.Extra = append(header.Extra, make([]byte, extraSeal)...)
|
|
|
|
// Mix digest is reserved for now, set to empty
|
|
header.MixDigest = libcommon.Hash{}
|
|
|
|
// Ensure the timestamp has the correct delay
|
|
parent := chain.GetHeader(header.ParentHash, number-1)
|
|
if parent == nil {
|
|
return consensus.ErrUnknownAncestor
|
|
}
|
|
|
|
var succession int
|
|
// if signer is not empty
|
|
if !bytes.Equal(c.authorizedSigner.Load().signer.Bytes(), libcommon.Address{}.Bytes()) {
|
|
succession, err = snap.GetSignerSuccessionNumber(c.authorizedSigner.Load().signer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
header.Time = parent.Time + CalcProducerDelay(number, succession, c.config)
|
|
if header.Time < uint64(time.Now().Unix()) {
|
|
header.Time = uint64(time.Now().Unix())
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Finalize implements consensus.Engine, ensuring no uncles are set, nor block
|
|
// rewards given.
|
|
func (c *Bor) Finalize(config *chain.Config, header *types.Header, state *state.IntraBlockState,
|
|
txs types.Transactions, uncles []*types.Header, r types.Receipts, withdrawals []*types.Withdrawal,
|
|
chain consensus.ChainHeaderReader, syscall consensus.SystemCall,
|
|
) (types.Transactions, types.Receipts, error) {
|
|
var err error
|
|
|
|
headerNumber := header.Number.Uint64()
|
|
|
|
if isSprintStart(headerNumber, c.config.CalculateSprint(headerNumber)) {
|
|
cx := statefull.ChainContext{Chain: chain, Bor: c}
|
|
// check and commit span
|
|
if err := c.checkAndCommitSpan(state, header, cx, syscall); err != nil {
|
|
log.Error("Error while committing span", "err", err)
|
|
return nil, types.Receipts{}, err
|
|
}
|
|
|
|
if c.HeimdallClient != nil {
|
|
// commit states
|
|
_, err = c.CommitStates(state, header, cx, syscall)
|
|
if err != nil {
|
|
log.Error("Error while committing states", "err", err)
|
|
return nil, types.Receipts{}, err
|
|
}
|
|
}
|
|
}
|
|
|
|
if err = c.changeContractCodeIfNeeded(headerNumber, state); err != nil {
|
|
log.Error("Error changing contract code", "err", err)
|
|
return nil, types.Receipts{}, err
|
|
}
|
|
|
|
// No block rewards in PoA, so the state remains as is and uncles are dropped
|
|
// header.Root = state.IntermediateRoot(chain.Config().IsSpuriousDragon(header.Number.Uint64()))
|
|
header.UncleHash = types.CalcUncleHash(nil)
|
|
|
|
// Set state sync data to blockchain
|
|
// bc := chain.(*core.BlockChain)
|
|
// bc.SetStateSync(stateSyncData)
|
|
return nil, types.Receipts{}, nil
|
|
}
|
|
|
|
func decodeGenesisAlloc(i interface{}) (types.GenesisAlloc, error) {
|
|
var alloc types.GenesisAlloc
|
|
|
|
b, err := json.Marshal(i)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if err := json.Unmarshal(b, &alloc); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return alloc, nil
|
|
}
|
|
|
|
func (c *Bor) changeContractCodeIfNeeded(headerNumber uint64, state *state.IntraBlockState) error {
|
|
for blockNumber, genesisAlloc := range c.config.BlockAlloc {
|
|
if blockNumber == strconv.FormatUint(headerNumber, 10) {
|
|
allocs, err := decodeGenesisAlloc(genesisAlloc)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to decode genesis alloc: %v", err)
|
|
}
|
|
|
|
for addr, account := range allocs {
|
|
log.Trace("change contract code", "address", addr)
|
|
state.SetCode(addr, account.Code)
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// FinalizeAndAssemble implements consensus.Engine, ensuring no uncles are set,
|
|
// nor block rewards given, and returns the final block.
|
|
func (c *Bor) FinalizeAndAssemble(chainConfig *chain.Config, header *types.Header, state *state.IntraBlockState,
|
|
txs types.Transactions, uncles []*types.Header, receipts types.Receipts, withdrawals []*types.Withdrawal,
|
|
chain consensus.ChainHeaderReader, syscall consensus.SystemCall, call consensus.Call,
|
|
) (*types.Block, types.Transactions, types.Receipts, error) {
|
|
// stateSyncData := []*types.StateSyncData{}
|
|
|
|
headerNumber := header.Number.Uint64()
|
|
if isSprintStart(headerNumber, c.config.CalculateSprint(headerNumber)) {
|
|
cx := statefull.ChainContext{Chain: chain, Bor: c}
|
|
|
|
// check and commit span
|
|
err := c.checkAndCommitSpan(state, header, cx, syscall)
|
|
if err != nil {
|
|
log.Error("Error while committing span", "err", err)
|
|
return nil, nil, types.Receipts{}, err
|
|
}
|
|
|
|
if c.HeimdallClient != nil {
|
|
// commit states
|
|
_, err = c.CommitStates(state, header, cx, syscall)
|
|
if err != nil {
|
|
log.Error("Error while committing states", "err", err)
|
|
return nil, nil, types.Receipts{}, err
|
|
}
|
|
}
|
|
}
|
|
|
|
if err := c.changeContractCodeIfNeeded(headerNumber, state); err != nil {
|
|
log.Error("Error changing contract code", "err", err)
|
|
return nil, nil, types.Receipts{}, err
|
|
}
|
|
|
|
// No block rewards in PoA, so the state remains as is and uncles are dropped
|
|
// header.Root = state.IntermediateRoot(chain.Config().IsSpuriousDragon(header.Number))
|
|
header.UncleHash = types.CalcUncleHash(nil)
|
|
|
|
// Assemble block
|
|
block := types.NewBlock(header, txs, nil, receipts, withdrawals)
|
|
|
|
// set state sync
|
|
// bc := chain.(*core.BlockChain)
|
|
// bc.SetStateSync(stateSyncData)
|
|
|
|
// return the final block for sealing
|
|
return block, txs, receipts, nil
|
|
}
|
|
|
|
func (c *Bor) GenerateSeal(chain consensus.ChainHeaderReader, currnt, parent *types.Header, call consensus.Call) []byte {
|
|
return nil
|
|
}
|
|
|
|
func (c *Bor) Initialize(config *chain.Config, chain consensus.ChainHeaderReader, header *types.Header,
|
|
state *state.IntraBlockState, txs []types.Transaction, uncles []*types.Header, syscall consensus.SystemCall) {
|
|
}
|
|
|
|
// Authorize injects a private key into the consensus engine to mint new blocks
|
|
// with.
|
|
func (c *Bor) Authorize(currentSigner libcommon.Address, signFn SignerFn) {
|
|
c.authorizedSigner.Store(&signer{
|
|
signer: currentSigner,
|
|
signFn: signFn,
|
|
})
|
|
}
|
|
|
|
// Seal implements consensus.Engine, attempting to create a sealed block using
|
|
// the local signing credentials.
|
|
func (c *Bor) Seal(chain consensus.ChainHeaderReader, block *types.Block, results chan<- *types.Block, stop <-chan struct{}) error {
|
|
header := block.Header()
|
|
// Sealing the genesis block is not supported
|
|
number := header.Number.Uint64()
|
|
|
|
if number == 0 {
|
|
return errUnknownBlock
|
|
}
|
|
|
|
// For 0-period chains, refuse to seal empty blocks (no reward but would spin sealing)
|
|
if c.config.CalculatePeriod(number) == 0 && len(block.Transactions()) == 0 {
|
|
log.Trace("Sealing paused, waiting for transactions")
|
|
return nil
|
|
}
|
|
|
|
// Don't hold the signer fields for the entire sealing procedure
|
|
currentSigner := c.authorizedSigner.Load()
|
|
signer, signFn := currentSigner.signer, currentSigner.signFn
|
|
|
|
snap, err := c.snapshot(chain, number-1, header.ParentHash, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Bail out if we're unauthorized to sign a block
|
|
if !snap.ValidatorSet.HasAddress(signer) {
|
|
// Check the UnauthorizedSignerError.Error() msg to see why we pass number-1
|
|
return &UnauthorizedSignerError{number - 1, signer.Bytes()}
|
|
}
|
|
|
|
successionNumber, err := snap.GetSignerSuccessionNumber(signer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Sweet, the protocol permits us to sign the block, wait for our time
|
|
delay := time.Unix(int64(header.Time), 0).Sub(time.Now()) // nolint: gosimple
|
|
// wiggle was already accounted for in header.Time, this is just for logging
|
|
wiggle := time.Duration(successionNumber) * time.Duration(c.config.CalculateBackupMultiplier(number)) * time.Second
|
|
|
|
// Sign all the things!
|
|
sighash, err := signFn(signer, accounts.MimetypeBor, BorRLP(header, c.config))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
copy(header.Extra[len(header.Extra)-extraSeal:], sighash)
|
|
|
|
// Wait until sealing is terminated or delay timeout.
|
|
log.Info("Waiting for slot to sign and propagate", "number", number, "hash", header.Hash, "delay-in-sec", uint(delay), "delay", common.PrettyDuration(delay))
|
|
|
|
go func() {
|
|
select {
|
|
case <-stop:
|
|
log.Info("Discarding sealing operation for block", "number", number)
|
|
return
|
|
case <-time.After(delay):
|
|
if wiggle > 0 {
|
|
log.Info(
|
|
"Sealing out-of-turn",
|
|
"number", number,
|
|
"wiggle", common.PrettyDuration(wiggle),
|
|
"in-turn-signer", snap.ValidatorSet.GetProposer().Address.Hex(),
|
|
)
|
|
}
|
|
|
|
log.Info(
|
|
"Sealing successful",
|
|
"number", number,
|
|
"delay", delay,
|
|
"headerDifficulty", header.Difficulty,
|
|
)
|
|
}
|
|
select {
|
|
case results <- block.WithSeal(header):
|
|
default:
|
|
log.Warn("Sealing result was not read by miner", "number", number, "sealhash", SealHash(header, c.config))
|
|
}
|
|
}()
|
|
return nil
|
|
}
|
|
|
|
// CalcDifficulty is the difficulty adjustment algorithm. It returns the difficulty
|
|
// that a new block should have based on the previous blocks in the chain and the
|
|
// current signer.
|
|
// func (c *Bor) CalcDifficulty(chain consensus.ChainHeaderReader, time uint64, parent *types.Header) *big.Int {
|
|
// snap, err := c.snapshot(chain, parent.Number.Uint64(), parent.Hash(), nil)
|
|
// if err != nil {
|
|
// return nil
|
|
// }
|
|
// return new(big.Int).SetUint64(snap.Difficulty(c.signer))
|
|
// }
|
|
|
|
func (c *Bor) CalcDifficulty(chain consensus.ChainHeaderReader, _, _ uint64, _ *big.Int, parentNumber uint64, parentHash, _ libcommon.Hash, _ uint64) *big.Int {
|
|
snap, err := c.snapshot(chain, parentNumber, parentHash, nil)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
|
|
return new(big.Int).SetUint64(snap.Difficulty(c.authorizedSigner.Load().signer))
|
|
}
|
|
|
|
// SealHash returns the hash of a block prior to it being sealed.
|
|
func (c *Bor) SealHash(header *types.Header) libcommon.Hash {
|
|
return SealHash(header, c.config)
|
|
}
|
|
|
|
func (c *Bor) IsServiceTransaction(sender libcommon.Address, syscall consensus.SystemCall) bool {
|
|
return false
|
|
}
|
|
|
|
// APIs implements consensus.Engine, returning the user facing RPC API to allow
|
|
// controlling the signer voting.
|
|
func (c *Bor) APIs(chain consensus.ChainHeaderReader) []rpc.API {
|
|
return []rpc.API{{
|
|
Namespace: "bor",
|
|
Version: "1.0",
|
|
Service: &API{chain: chain, bor: c},
|
|
Public: false,
|
|
}}
|
|
}
|
|
|
|
// Close implements consensus.Engine. It's a noop for bor as there are no background threads.
|
|
func (c *Bor) Close() error {
|
|
c.closeOnce.Do(func() {
|
|
if c.HeimdallClient != nil {
|
|
c.HeimdallClient.Close()
|
|
}
|
|
})
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *Bor) checkAndCommitSpan(
|
|
state *state.IntraBlockState,
|
|
header *types.Header,
|
|
chain statefull.ChainContext,
|
|
syscall consensus.SystemCall,
|
|
) error {
|
|
headerNumber := header.Number.Uint64()
|
|
|
|
span, err := c.spanner.GetCurrentSpan(syscall)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if c.needToCommitSpan(span, headerNumber) {
|
|
err := c.fetchAndCommitSpan(span.ID+1, state, header, chain, syscall)
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *Bor) needToCommitSpan(currentSpan *span.Span, headerNumber uint64) bool {
|
|
// if span is nil
|
|
if currentSpan == nil {
|
|
return false
|
|
}
|
|
|
|
// check span is not set initially
|
|
if currentSpan.EndBlock == 0 {
|
|
return true
|
|
}
|
|
|
|
// if current block is first block of last sprint in current span
|
|
if currentSpan.EndBlock > c.config.CalculateSprint(headerNumber) && currentSpan.EndBlock-c.config.CalculateSprint(headerNumber)+1 == headerNumber {
|
|
return true
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
func (c *Bor) getSpanForBlock(blockNum uint64) (*span.HeimdallSpan, error) {
|
|
log.Info("Getting span", "for block", blockNum)
|
|
var borSpan *span.HeimdallSpan
|
|
c.spanCache.AscendGreaterOrEqual(&span.HeimdallSpan{Span: span.Span{EndBlock: blockNum}}, func(item btree.Item) bool {
|
|
borSpan = item.(*span.HeimdallSpan)
|
|
return false
|
|
})
|
|
|
|
if borSpan == nil {
|
|
// Span with high enough block number is not loaded
|
|
var spanID uint64
|
|
if c.spanCache.Len() > 0 {
|
|
spanID = c.spanCache.Max().(*span.HeimdallSpan).ID + 1
|
|
}
|
|
for borSpan == nil || borSpan.EndBlock < blockNum {
|
|
log.Info("Span with high enough block number is not loaded", "fetching span", spanID)
|
|
response, err := c.HeimdallClient.Span(c.execCtx, spanID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
borSpan = response
|
|
c.spanCache.ReplaceOrInsert(borSpan)
|
|
spanID++
|
|
}
|
|
} else {
|
|
for borSpan.StartBlock > blockNum {
|
|
// Span wit low enough block number is not loaded
|
|
var spanID = borSpan.ID - 1
|
|
log.Info("Span with low enough block number is not loaded", "fetching span", spanID)
|
|
response, err := c.HeimdallClient.Span(c.execCtx, spanID)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
borSpan = response
|
|
c.spanCache.ReplaceOrInsert(borSpan)
|
|
}
|
|
}
|
|
|
|
for c.spanCache.Len() > 128 {
|
|
c.spanCache.DeleteMin()
|
|
}
|
|
|
|
return borSpan, nil
|
|
}
|
|
|
|
func (c *Bor) fetchAndCommitSpan(
|
|
newSpanID uint64,
|
|
state *state.IntraBlockState,
|
|
header *types.Header,
|
|
chain statefull.ChainContext,
|
|
syscall consensus.SystemCall,
|
|
) error {
|
|
var heimdallSpan span.HeimdallSpan
|
|
|
|
if c.HeimdallClient == nil {
|
|
// fixme: move to a new mock or fake and remove c.HeimdallClient completely
|
|
s, err := c.getNextHeimdallSpanForTest(newSpanID, state, header, chain, syscall)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
heimdallSpan = *s
|
|
} else {
|
|
response, err := c.HeimdallClient.Span(c.execCtx, newSpanID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
heimdallSpan = *response
|
|
}
|
|
|
|
// check if chain id matches with heimdall span
|
|
if heimdallSpan.ChainID != c.chainConfig.ChainID.String() {
|
|
return fmt.Errorf(
|
|
"chain id proposed span, %s, and bor chain id, %s, doesn't match",
|
|
heimdallSpan.ChainID,
|
|
c.chainConfig.ChainID.String(),
|
|
)
|
|
}
|
|
|
|
return c.spanner.CommitSpan(heimdallSpan, syscall)
|
|
}
|
|
|
|
// CommitStates commit states
|
|
func (c *Bor) CommitStates(
|
|
state *state.IntraBlockState,
|
|
header *types.Header,
|
|
chain statefull.ChainContext,
|
|
syscall consensus.SystemCall,
|
|
) ([]*types.StateSyncData, error) {
|
|
stateSyncs := make([]*types.StateSyncData, 0)
|
|
number := header.Number.Uint64()
|
|
|
|
_lastStateID, err := c.GenesisContractsClient.LastStateId(syscall)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
to := time.Unix(int64(chain.Chain.GetHeaderByNumber(number-c.config.CalculateSprint(number)).Time), 0)
|
|
lastStateID := _lastStateID.Uint64()
|
|
|
|
log.Debug(
|
|
"Fetching state updates from Heimdall",
|
|
"fromID", lastStateID+1,
|
|
"to", to.Format(time.RFC3339))
|
|
|
|
eventRecords, err := c.HeimdallClient.StateSyncEvents(c.execCtx, lastStateID+1, to.Unix())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if c.config.OverrideStateSyncRecords != nil {
|
|
if val, ok := c.config.OverrideStateSyncRecords[strconv.FormatUint(number, 10)]; ok {
|
|
eventRecords = eventRecords[0:val]
|
|
}
|
|
}
|
|
|
|
chainID := c.chainConfig.ChainID.String()
|
|
for _, eventRecord := range eventRecords {
|
|
if eventRecord.ID <= lastStateID {
|
|
continue
|
|
}
|
|
|
|
if err := validateEventRecord(eventRecord, number, to, lastStateID, chainID); err != nil {
|
|
log.Error(err.Error())
|
|
break
|
|
}
|
|
|
|
stateData := types.StateSyncData{
|
|
ID: eventRecord.ID,
|
|
Contract: eventRecord.Contract,
|
|
Data: hex.EncodeToString(eventRecord.Data),
|
|
TxHash: eventRecord.TxHash,
|
|
}
|
|
stateSyncs = append(stateSyncs, &stateData)
|
|
|
|
if err := c.GenesisContractsClient.CommitState(eventRecord, syscall); err != nil {
|
|
return nil, err
|
|
}
|
|
lastStateID++
|
|
}
|
|
|
|
return stateSyncs, nil
|
|
}
|
|
|
|
func validateEventRecord(eventRecord *clerk.EventRecordWithTime, number uint64, to time.Time, lastStateID uint64, chainID string) error {
|
|
// event id should be sequential and event.Time should lie in the range [from, to)
|
|
if lastStateID+1 != eventRecord.ID || eventRecord.ChainID != chainID || !eventRecord.Time.Before(to) {
|
|
return &InvalidStateReceivedError{number, lastStateID, &to, eventRecord}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *Bor) SetHeimdallClient(h IHeimdallClient) {
|
|
c.HeimdallClient = h
|
|
}
|
|
|
|
func (c *Bor) GetCurrentValidators(blockNumber uint64, signer libcommon.Address, getSpanForBlock func(blockNum uint64) (*span.HeimdallSpan, error)) ([]*valset.Validator, error) {
|
|
return c.spanner.GetCurrentValidators(blockNumber, signer, getSpanForBlock)
|
|
}
|
|
|
|
//
|
|
// Private methods
|
|
//
|
|
|
|
func (c *Bor) getNextHeimdallSpanForTest(
|
|
newSpanID uint64,
|
|
state *state.IntraBlockState,
|
|
header *types.Header,
|
|
chain statefull.ChainContext,
|
|
syscall consensus.SystemCall,
|
|
) (*span.HeimdallSpan, error) {
|
|
headerNumber := header.Number.Uint64()
|
|
|
|
spanBor, err := c.spanner.GetCurrentSpan(syscall)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Retrieve the snapshot needed to verify this header and cache it
|
|
snap, err := c.snapshot(chain.Chain, headerNumber-1, header.ParentHash, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// new span
|
|
spanBor.ID = newSpanID
|
|
if spanBor.EndBlock == 0 {
|
|
spanBor.StartBlock = 256
|
|
} else {
|
|
spanBor.StartBlock = spanBor.EndBlock + 1
|
|
}
|
|
|
|
spanBor.EndBlock = spanBor.StartBlock + (100 * c.config.CalculateSprint(headerNumber)) - 1
|
|
|
|
selectedProducers := make([]valset.Validator, len(snap.ValidatorSet.Validators))
|
|
for i, v := range snap.ValidatorSet.Validators {
|
|
selectedProducers[i] = *v
|
|
}
|
|
|
|
heimdallSpan := &span.HeimdallSpan{
|
|
Span: *spanBor,
|
|
ValidatorSet: *snap.ValidatorSet,
|
|
SelectedProducers: selectedProducers,
|
|
ChainID: c.chainConfig.ChainID.String(),
|
|
}
|
|
|
|
return heimdallSpan, nil
|
|
}
|
|
|
|
func validatorContains(a []*valset.Validator, x *valset.Validator) (*valset.Validator, bool) {
|
|
for _, n := range a {
|
|
if bytes.Equal(n.Address.Bytes(), x.Address.Bytes()) {
|
|
return n, true
|
|
}
|
|
}
|
|
|
|
return nil, false
|
|
}
|
|
|
|
func getUpdatedValidatorSet(oldValidatorSet *valset.ValidatorSet, newVals []*valset.Validator) *valset.ValidatorSet {
|
|
v := oldValidatorSet
|
|
oldVals := v.Validators
|
|
|
|
changes := make([]*valset.Validator, 0, len(oldVals))
|
|
|
|
for _, ov := range oldVals {
|
|
if f, ok := validatorContains(newVals, ov); ok {
|
|
ov.VotingPower = f.VotingPower
|
|
} else {
|
|
ov.VotingPower = 0
|
|
}
|
|
|
|
changes = append(changes, ov)
|
|
}
|
|
|
|
for _, nv := range newVals {
|
|
if _, ok := validatorContains(changes, nv); !ok {
|
|
changes = append(changes, nv)
|
|
}
|
|
}
|
|
|
|
if err := v.UpdateWithChangeSet(changes); err != nil {
|
|
log.Error("Error while updating change set", "error", err)
|
|
}
|
|
|
|
return v
|
|
}
|
|
|
|
func isSprintStart(number, sprint uint64) bool {
|
|
return number%sprint == 0
|
|
}
|