bsc/consensus/parlia/snapshot.go

429 lines
14 KiB
Go
Raw Normal View History

2020-05-20 06:46:45 +03:00
// Copyright 2017 The go-ethereum Authors
// This file is part of the go-ethereum library.
//
// The go-ethereum library is free software: you can redistribute it and/or modify
// it under the terms of the GNU Lesser General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// The go-ethereum library is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Lesser General Public License for more details.
//
// You should have received a copy of the GNU Lesser General Public License
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
package parlia
import (
"bytes"
"encoding/hex"
2020-05-20 06:46:45 +03:00
"encoding/json"
"errors"
"fmt"
2020-05-20 06:46:45 +03:00
"sort"
lru "github.com/hashicorp/golang-lru"
2020-05-20 06:46:45 +03:00
"github.com/ethereum/go-ethereum/common"
"github.com/ethereum/go-ethereum/consensus"
"github.com/ethereum/go-ethereum/core/types"
"github.com/ethereum/go-ethereum/ethdb"
"github.com/ethereum/go-ethereum/internal/ethapi"
"github.com/ethereum/go-ethereum/log"
2020-05-20 06:46:45 +03:00
"github.com/ethereum/go-ethereum/params"
)
// Snapshot is the state of the validatorSet at a given point.
type Snapshot struct {
config *params.ParliaConfig // Consensus engine parameters to fine tune behavior
ethAPI *ethapi.PublicBlockChainAPI
sigCache *lru.ARCCache // Cache of recent block signatures to speed up ecrecover
Number uint64 `json:"number"` // Block number where the snapshot was created
Hash common.Hash `json:"hash"` // Block hash where the snapshot was created
Validators map[common.Address]*ValidatorInfo `json:"validators"` // Set of authorized validators at this moment
Recents map[uint64]common.Address `json:"recents"` // Set of recent validators for spam protections
RecentForkHashes map[uint64]string `json:"recent_fork_hashes"` // Set of recent forkHash
Attestation *types.VoteData `json:"attestation:omitempty"` // Attestation for fast finality
}
type ValidatorInfo struct {
Index int `json:"index:omitempty"` // The index should offset by 1
VoteAddress types.BLSPublicKey `json:"vote_address,omitempty"`
2020-05-20 06:46:45 +03:00
}
// newSnapshot creates a new snapshot with the specified startup parameters. This
// method does not initialize the set of recent validators, so only ever use it for
// the genesis block.
func newSnapshot(
config *params.ParliaConfig,
sigCache *lru.ARCCache,
number uint64,
hash common.Hash,
validators []common.Address,
voteAddrs []types.BLSPublicKey,
2020-05-20 06:46:45 +03:00
ethAPI *ethapi.PublicBlockChainAPI,
) *Snapshot {
snap := &Snapshot{
config: config,
ethAPI: ethAPI,
sigCache: sigCache,
Number: number,
Hash: hash,
Recents: make(map[uint64]common.Address),
RecentForkHashes: make(map[uint64]string),
Validators: make(map[common.Address]*ValidatorInfo),
2020-05-20 06:46:45 +03:00
}
for idx, v := range validators {
// The luban fork from the genesis block
if len(voteAddrs) == len(validators) {
snap.Validators[v] = &ValidatorInfo{
VoteAddress: voteAddrs[idx],
}
} else {
snap.Validators[v] = &ValidatorInfo{}
}
}
// The luban fork from the genesis block
if len(voteAddrs) == len(validators) {
validators := snap.validators()
for idx, v := range validators {
snap.Validators[v].Index = idx + 1 // offset by 1
}
2020-05-20 06:46:45 +03:00
}
return snap
}
// validatorsAscending implements the sort interface to allow sorting a list of addresses
type validatorsAscending []common.Address
func (s validatorsAscending) Len() int { return len(s) }
func (s validatorsAscending) Less(i, j int) bool { return bytes.Compare(s[i][:], s[j][:]) < 0 }
func (s validatorsAscending) Swap(i, j int) { s[i], s[j] = s[j], s[i] }
// loadSnapshot loads an existing snapshot from the database.
func loadSnapshot(config *params.ParliaConfig, sigCache *lru.ARCCache, db ethdb.Database, hash common.Hash, ethAPI *ethapi.PublicBlockChainAPI) (*Snapshot, error) {
blob, err := db.Get(append([]byte("parlia-"), hash[:]...))
if err != nil {
return nil, err
}
snap := new(Snapshot)
if err := json.Unmarshal(blob, snap); err != nil {
return nil, err
}
snap.config = config
snap.sigCache = sigCache
snap.ethAPI = ethAPI
return snap, nil
}
// store inserts the snapshot into the database.
func (s *Snapshot) store(db ethdb.Database) error {
blob, err := json.Marshal(s)
if err != nil {
return err
}
return db.Put(append([]byte("parlia-"), s.Hash[:]...), blob)
}
// copy creates a deep copy of the snapshot
func (s *Snapshot) copy() *Snapshot {
cpy := &Snapshot{
config: s.config,
ethAPI: s.ethAPI,
sigCache: s.sigCache,
Number: s.Number,
Hash: s.Hash,
Validators: make(map[common.Address]*ValidatorInfo),
Recents: make(map[uint64]common.Address),
RecentForkHashes: make(map[uint64]string),
2020-05-20 06:46:45 +03:00
}
for v := range s.Validators {
cpy.Validators[v] = &ValidatorInfo{
Index: s.Validators[v].Index,
VoteAddress: s.Validators[v].VoteAddress,
}
2020-05-20 06:46:45 +03:00
}
for block, v := range s.Recents {
cpy.Recents[block] = v
}
for block, id := range s.RecentForkHashes {
cpy.RecentForkHashes[block] = id
}
if s.Attestation != nil {
cpy.Attestation = &types.VoteData{
SourceNumber: s.Attestation.SourceNumber,
SourceHash: s.Attestation.SourceHash,
TargetNumber: s.Attestation.TargetNumber,
TargetHash: s.Attestation.TargetHash,
}
}
2020-05-20 06:46:45 +03:00
return cpy
}
func (s *Snapshot) isMajorityFork(forkHash string) bool {
ally := 0
for _, h := range s.RecentForkHashes {
if h == forkHash {
ally++
}
}
return ally > len(s.RecentForkHashes)/2
}
func (s *Snapshot) updateAttestation(header *types.Header, chainConfig *params.ChainConfig, parliaConfig *params.ParliaConfig) {
if !chainConfig.IsLuban(header.Number) {
return
}
// The attestation should have been checked in verify header, update directly
attestation, _ := getVoteAttestationFromHeader(header, chainConfig, parliaConfig)
if attestation == nil {
return
}
// Headers with bad attestation are accepted before Plato upgrade,
// but Attestation of snapshot is only updated when the target block is direct parent of the header
targetNumber := attestation.Data.TargetNumber
targetHash := attestation.Data.TargetHash
if targetHash != header.ParentHash || targetNumber+1 != header.Number.Uint64() {
log.Warn("updateAttestation failed", "error", fmt.Errorf("invalid attestation, target mismatch, expected block: %d, hash: %s; real block: %d, hash: %s",
header.Number.Uint64()-1, header.ParentHash, targetNumber, targetHash))
updateAttestationErrorCounter.Inc(1)
return
}
// Update attestation
s.Attestation = &types.VoteData{
SourceNumber: attestation.Data.SourceNumber,
SourceHash: attestation.Data.SourceHash,
TargetNumber: attestation.Data.TargetNumber,
TargetHash: attestation.Data.TargetHash,
}
}
func (s *Snapshot) SignRecently(validator common.Address) bool {
for seen, recent := range s.Recents {
if recent == validator {
if limit := uint64(len(s.Validators)/2 + 1); s.Number+1 < limit || seen > s.Number+1-limit {
return true
}
}
}
return false
}
func (s *Snapshot) apply(headers []*types.Header, chain consensus.ChainHeaderReader, parents []*types.Header, chainConfig *params.ChainConfig) (*Snapshot, error) {
2020-05-20 06:46:45 +03:00
// Allow passing in no headers for cleaner code
if len(headers) == 0 {
return s, nil
}
// Sanity check that the headers can be applied
for i := 0; i < len(headers)-1; i++ {
if headers[i+1].Number.Uint64() != headers[i].Number.Uint64()+1 {
return nil, errOutOfRangeChain
}
if !bytes.Equal(headers[i+1].ParentHash.Bytes(), headers[i].Hash().Bytes()) {
return nil, errBlockHashInconsistent
}
}
if headers[0].Number.Uint64() != s.Number+1 {
return nil, errOutOfRangeChain
}
if !bytes.Equal(headers[0].ParentHash.Bytes(), s.Hash.Bytes()) {
return nil, errBlockHashInconsistent
}
// Iterate through the headers and create a new snapshot
snap := s.copy()
for _, header := range headers {
number := header.Number.Uint64()
// Delete the oldest validator from the recent list to allow it signing again
if limit := uint64(len(snap.Validators)/2 + 1); number >= limit {
delete(snap.Recents, number-limit)
}
if limit := uint64(len(snap.Validators)); number >= limit {
delete(snap.RecentForkHashes, number-limit)
}
2020-05-20 06:46:45 +03:00
// Resolve the authorization key and check against signers
validator, err := ecrecover(header, s.sigCache, chainConfig.ChainID)
2020-05-20 06:46:45 +03:00
if err != nil {
return nil, err
}
if _, ok := snap.Validators[validator]; !ok {
return nil, errUnauthorizedValidator
}
for _, recent := range snap.Recents {
if recent == validator {
return nil, errRecentlySigned
}
}
snap.Recents[number] = validator
// change validator set
if number > 0 && number%s.config.Epoch == uint64(len(snap.Validators)/2) {
checkpointHeader := FindAncientHeader(header, uint64(len(snap.Validators)/2), chain, parents)
if checkpointHeader == nil {
return nil, consensus.ErrUnknownAncestor
}
// get validators from headers and use that for new validator set
newValArr, voteAddrs, err := parseValidators(checkpointHeader, chainConfig, s.config)
2020-05-20 06:46:45 +03:00
if err != nil {
return nil, err
}
newVals := make(map[common.Address]*ValidatorInfo, len(newValArr))
for idx, val := range newValArr {
if !chainConfig.IsLuban(header.Number) {
newVals[val] = &ValidatorInfo{}
} else {
newVals[val] = &ValidatorInfo{
VoteAddress: voteAddrs[idx],
}
}
2020-05-20 06:46:45 +03:00
}
oldLimit := len(snap.Validators)/2 + 1
newLimit := len(newVals)/2 + 1
if newLimit < oldLimit {
for i := 0; i < oldLimit-newLimit; i++ {
delete(snap.Recents, number-uint64(newLimit)-uint64(i))
}
}
2021-01-11 09:41:03 +03:00
oldLimit = len(snap.Validators)
newLimit = len(newVals)
if newLimit < oldLimit {
for i := 0; i < oldLimit-newLimit; i++ {
delete(snap.RecentForkHashes, number-uint64(newLimit)-uint64(i))
}
}
2020-05-20 06:46:45 +03:00
snap.Validators = newVals
if chainConfig.IsLuban(header.Number) {
validators := snap.validators()
for idx, val := range validators {
snap.Validators[val].Index = idx + 1 // offset by 1
}
}
2020-05-20 06:46:45 +03:00
}
snap.updateAttestation(header, chainConfig, s.config)
snap.RecentForkHashes[number] = hex.EncodeToString(header.Extra[extraVanity-nextForkHashSize : extraVanity])
2020-05-20 06:46:45 +03:00
}
snap.Number += uint64(len(headers))
snap.Hash = headers[len(headers)-1].Hash()
return snap, nil
}
// validators retrieves the list of validators in ascending order.
func (s *Snapshot) validators() []common.Address {
validators := make([]common.Address, 0, len(s.Validators))
for v := range s.Validators {
validators = append(validators, v)
}
sort.Sort(validatorsAscending(validators))
return validators
}
// inturn returns if a validator at a given block height is in-turn or not.
func (s *Snapshot) inturn(validator common.Address) bool {
2020-05-20 06:46:45 +03:00
validators := s.validators()
offset := (s.Number + 1) % uint64(len(validators))
2020-05-20 06:46:45 +03:00
return validators[offset] == validator
}
2021-05-17 14:32:39 +03:00
func (s *Snapshot) enoughDistance(validator common.Address, header *types.Header) bool {
idx := s.indexOfVal(validator)
if idx < 0 {
return true
}
validatorNum := int64(len(s.validators()))
2021-05-17 14:32:39 +03:00
if validatorNum == 1 {
return true
}
if validator == header.Coinbase {
return false
}
offset := (int64(s.Number) + 1) % validatorNum
if int64(idx) >= offset {
2021-05-17 14:32:39 +03:00
return int64(idx)-offset >= validatorNum-2
} else {
2021-05-17 14:32:39 +03:00
return validatorNum+int64(idx)-offset >= validatorNum-2
}
}
2020-08-10 05:54:14 +03:00
func (s *Snapshot) indexOfVal(validator common.Address) int {
if validator, ok := s.Validators[validator]; ok && validator.Index > 0 {
return validator.Index - 1 // Index is offset by 1
}
validators := s.validators()
2020-08-10 05:54:14 +03:00
for idx, val := range validators {
if val == validator {
return idx
}
}
2020-08-10 05:54:14 +03:00
return -1
}
2020-05-20 06:46:45 +03:00
func (s *Snapshot) supposeValidator() common.Address {
validators := s.validators()
index := (s.Number + 1) % uint64(len(validators))
return validators[index]
}
func parseValidators(header *types.Header, chainConfig *params.ChainConfig, parliaConfig *params.ParliaConfig) ([]common.Address, []types.BLSPublicKey, error) {
validatorsBytes := getValidatorBytesFromHeader(header, chainConfig, parliaConfig)
if len(validatorsBytes) == 0 {
return nil, nil, errors.New("invalid validators bytes")
}
if !chainConfig.IsLuban(header.Number) {
n := len(validatorsBytes) / validatorBytesLengthBeforeLuban
result := make([]common.Address, n)
for i := 0; i < n; i++ {
result[i] = common.BytesToAddress(validatorsBytes[i*validatorBytesLengthBeforeLuban : (i+1)*validatorBytesLengthBeforeLuban])
}
return result, nil, nil
2020-05-20 06:46:45 +03:00
}
2020-05-20 06:46:45 +03:00
n := len(validatorsBytes) / validatorBytesLength
cnsAddrs := make([]common.Address, n)
voteAddrs := make([]types.BLSPublicKey, n)
2020-05-20 06:46:45 +03:00
for i := 0; i < n; i++ {
cnsAddrs[i] = common.BytesToAddress(validatorsBytes[i*validatorBytesLength : i*validatorBytesLength+common.AddressLength])
copy(voteAddrs[i][:], validatorsBytes[i*validatorBytesLength+common.AddressLength:(i+1)*validatorBytesLength])
2020-05-20 06:46:45 +03:00
}
return cnsAddrs, voteAddrs, nil
2020-05-20 06:46:45 +03:00
}
2021-04-16 07:45:26 +03:00
func FindAncientHeader(header *types.Header, ite uint64, chain consensus.ChainHeaderReader, candidateParents []*types.Header) *types.Header {
2020-05-20 06:46:45 +03:00
ancient := header
for i := uint64(1); i <= ite; i++ {
parentHash := ancient.ParentHash
parentHeight := ancient.Number.Uint64() - 1
found := false
if len(candidateParents) > 0 {
index := sort.Search(len(candidateParents), func(i int) bool {
return candidateParents[i].Number.Uint64() >= parentHeight
})
if index < len(candidateParents) && candidateParents[index].Number.Uint64() == parentHeight &&
candidateParents[index].Hash() == parentHash {
ancient = candidateParents[index]
found = true
}
}
if !found {
ancient = chain.GetHeader(parentHash, parentHeight)
found = true
}
if ancient == nil || !found {
return nil
}
}
return ancient
}