2017-04-10 13:24:12 +03:00
|
|
|
// Copyright 2017 The go-ethereum Authors
|
|
|
|
// This file is part of the go-ethereum library.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
// Package clique implements the proof-of-authority consensus engine.
|
|
|
|
package clique
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"errors"
|
2021-05-07 11:31:01 +03:00
|
|
|
"fmt"
|
accounts, eth, clique, signer: support for external signer API (#18079)
* accounts, eth, clique: implement external backend + move sighash calc to backend
* signer: implement account_Version on external API
* accounts/external: enable ipc, add copyright
* accounts, internal, signer: formatting
* node: go fmt
* flags: disallow --dev in combo with --externalsigner
* accounts: remove clique-specific signing method, replace with more generic
* accounts, consensus: formatting + fix error in tests
* signer/core: remove (test-) import cycle
* clique: remove unused import
* accounts: remove CliqueHash and avoid dependency on package crypto
* consensus/clique: unduplicate header encoding
2019-02-05 13:23:57 +03:00
|
|
|
"io"
|
2017-04-10 13:24:12 +03:00
|
|
|
"math/big"
|
|
|
|
"math/rand"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
|
|
"github.com/ethereum/go-ethereum/common/hexutil"
|
2024-03-02 23:42:50 +03:00
|
|
|
"github.com/ethereum/go-ethereum/common/lru"
|
2017-04-10 13:24:12 +03:00
|
|
|
"github.com/ethereum/go-ethereum/consensus"
|
2017-10-10 11:54:47 +03:00
|
|
|
"github.com/ethereum/go-ethereum/consensus/misc"
|
2023-08-01 12:58:45 +03:00
|
|
|
"github.com/ethereum/go-ethereum/consensus/misc/eip1559"
|
2017-04-10 13:24:12 +03:00
|
|
|
"github.com/ethereum/go-ethereum/core/state"
|
|
|
|
"github.com/ethereum/go-ethereum/core/types"
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 09:03:36 +03:00
|
|
|
"github.com/ethereum/go-ethereum/core/vm"
|
2017-04-10 13:24:12 +03:00
|
|
|
"github.com/ethereum/go-ethereum/crypto"
|
|
|
|
"github.com/ethereum/go-ethereum/ethdb"
|
|
|
|
"github.com/ethereum/go-ethereum/log"
|
|
|
|
"github.com/ethereum/go-ethereum/params"
|
|
|
|
"github.com/ethereum/go-ethereum/rlp"
|
|
|
|
"github.com/ethereum/go-ethereum/rpc"
|
2020-08-21 15:10:40 +03:00
|
|
|
"github.com/ethereum/go-ethereum/trie"
|
2019-01-04 01:15:26 +03:00
|
|
|
"golang.org/x/crypto/sha3"
|
2017-04-10 13:24:12 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
checkpointInterval = 1024 // Number of blocks after which to save the vote snapshot to the database
|
|
|
|
inmemorySnapshots = 128 // Number of recent vote snapshots to keep in memory
|
2017-05-29 22:05:30 +03:00
|
|
|
inmemorySignatures = 4096 // Number of recent block signatures to keep in memory
|
2017-04-10 13:24:12 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
// Clique proof-of-authority protocol constants.
|
|
|
|
var (
|
|
|
|
epochLength = uint64(30000) // Default number of blocks after which to checkpoint and reset the pending votes
|
|
|
|
|
2019-08-22 16:14:06 +03:00
|
|
|
extraVanity = 32 // Fixed number of extra-data prefix bytes reserved for signer vanity
|
|
|
|
extraSeal = crypto.SignatureLength // Fixed number of extra-data suffix bytes reserved for signer seal
|
2017-04-10 13:24:12 +03:00
|
|
|
|
|
|
|
nonceAuthVote = hexutil.MustDecode("0xffffffffffffffff") // Magic nonce number to vote on adding a new signer
|
|
|
|
nonceDropVote = hexutil.MustDecode("0x0000000000000000") // Magic nonce number to vote on removing a signer.
|
|
|
|
|
|
|
|
uncleHash = types.CalcUncleHash(nil) // Always Keccak256(RLP([])) as uncles are meaningless outside of PoW.
|
|
|
|
|
|
|
|
diffInTurn = big.NewInt(2) // Block difficulty for in-turn signatures
|
|
|
|
diffNoTurn = big.NewInt(1) // Block difficulty for out-of-turn signatures
|
|
|
|
)
|
|
|
|
|
|
|
|
// Various error messages to mark blocks invalid. These should be private to
|
|
|
|
// prevent engine specific errors from being referenced in the remainder of the
|
|
|
|
// codebase, inherently breaking if the engine is swapped out. Please put common
|
|
|
|
// error types into the consensus package.
|
|
|
|
var (
|
|
|
|
// errUnknownBlock is returned when the list of signers is requested for a block
|
|
|
|
// that is not part of the local blockchain.
|
|
|
|
errUnknownBlock = errors.New("unknown block")
|
|
|
|
|
|
|
|
// errInvalidCheckpointBeneficiary is returned if a checkpoint/epoch transition
|
2017-06-12 15:45:17 +03:00
|
|
|
// block has a beneficiary set to non-zeroes.
|
2017-04-10 13:24:12 +03:00
|
|
|
errInvalidCheckpointBeneficiary = errors.New("beneficiary in checkpoint block non-zero")
|
|
|
|
|
|
|
|
// errInvalidVote is returned if a nonce value is something else that the two
|
|
|
|
// allowed constants of 0x00..0 or 0xff..f.
|
|
|
|
errInvalidVote = errors.New("vote nonce not 0x00..0 or 0xff..f")
|
|
|
|
|
|
|
|
// errInvalidCheckpointVote is returned if a checkpoint/epoch transition block
|
2017-06-12 15:45:17 +03:00
|
|
|
// has a vote nonce set to non-zeroes.
|
2017-04-10 13:24:12 +03:00
|
|
|
errInvalidCheckpointVote = errors.New("vote nonce in checkpoint block non-zero")
|
|
|
|
|
|
|
|
// errMissingVanity is returned if a block's extra-data section is shorter than
|
|
|
|
// 32 bytes, which is required to store the signer vanity.
|
|
|
|
errMissingVanity = errors.New("extra-data 32 byte vanity prefix missing")
|
|
|
|
|
|
|
|
// errMissingSignature is returned if a block's extra-data section doesn't seem
|
|
|
|
// to contain a 65 byte secp256k1 signature.
|
2018-09-10 17:12:39 +03:00
|
|
|
errMissingSignature = errors.New("extra-data 65 byte signature suffix missing")
|
2017-04-10 13:24:12 +03:00
|
|
|
|
|
|
|
// errExtraSigners is returned if non-checkpoint block contain signer data in
|
|
|
|
// their extra-data fields.
|
|
|
|
errExtraSigners = errors.New("non-checkpoint block contains extra signer list")
|
|
|
|
|
2017-06-20 05:12:48 +03:00
|
|
|
// errInvalidCheckpointSigners is returned if a checkpoint block contains an
|
2018-09-10 17:12:39 +03:00
|
|
|
// invalid list of signers (i.e. non divisible by 20 bytes).
|
2017-06-20 05:12:48 +03:00
|
|
|
errInvalidCheckpointSigners = errors.New("invalid signer list on checkpoint block")
|
2017-04-10 13:24:12 +03:00
|
|
|
|
2018-09-10 17:12:39 +03:00
|
|
|
// errMismatchingCheckpointSigners is returned if a checkpoint block contains a
|
|
|
|
// list of signers different than the one the local node calculated.
|
|
|
|
errMismatchingCheckpointSigners = errors.New("mismatching signer list on checkpoint block")
|
|
|
|
|
2017-06-12 15:45:17 +03:00
|
|
|
// errInvalidMixDigest is returned if a block's mix digest is non-zero.
|
2017-04-10 13:24:12 +03:00
|
|
|
errInvalidMixDigest = errors.New("non-zero mix digest")
|
|
|
|
|
|
|
|
// errInvalidUncleHash is returned if a block contains an non-empty uncle list.
|
|
|
|
errInvalidUncleHash = errors.New("non empty uncle hash")
|
|
|
|
|
2018-09-10 17:12:39 +03:00
|
|
|
// errInvalidDifficulty is returned if the difficulty of a block neither 1 or 2.
|
2017-04-10 13:24:12 +03:00
|
|
|
errInvalidDifficulty = errors.New("invalid difficulty")
|
|
|
|
|
2018-09-10 17:12:39 +03:00
|
|
|
// errWrongDifficulty is returned if the difficulty of a block doesn't match the
|
|
|
|
// turn of the signer.
|
|
|
|
errWrongDifficulty = errors.New("wrong difficulty")
|
|
|
|
|
2020-05-27 17:12:13 +03:00
|
|
|
// errInvalidTimestamp is returned if the timestamp of a block is lower than
|
2017-04-10 13:24:12 +03:00
|
|
|
// the previous block's timestamp + the minimum block period.
|
2020-05-27 17:12:13 +03:00
|
|
|
errInvalidTimestamp = errors.New("invalid timestamp")
|
2017-04-10 13:24:12 +03:00
|
|
|
|
|
|
|
// errInvalidVotingChain is returned if an authorization list is attempted to
|
|
|
|
// be modified via out-of-range or non-contiguous headers.
|
|
|
|
errInvalidVotingChain = errors.New("invalid voting chain")
|
|
|
|
|
2018-09-10 17:12:39 +03:00
|
|
|
// errUnauthorizedSigner is returned if a header is signed by a non-authorized entity.
|
|
|
|
errUnauthorizedSigner = errors.New("unauthorized signer")
|
|
|
|
|
|
|
|
// errRecentlySigned is returned if a header is signed by an authorized entity
|
|
|
|
// that already signed a header recently, thus is temporarily not allowed to.
|
|
|
|
errRecentlySigned = errors.New("recently signed")
|
2017-04-10 13:24:12 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
// ecrecover extracts the Ethereum account address from a signed header.
|
2022-11-17 13:15:28 +03:00
|
|
|
func ecrecover(header *types.Header, sigcache *sigLRU) (common.Address, error) {
|
2017-05-29 22:05:30 +03:00
|
|
|
// If the signature's already cached, return that
|
|
|
|
hash := header.Hash()
|
|
|
|
if address, known := sigcache.Get(hash); known {
|
2022-11-17 13:15:28 +03:00
|
|
|
return address, nil
|
2017-05-29 22:05:30 +03:00
|
|
|
}
|
2017-04-10 13:24:12 +03:00
|
|
|
// Retrieve the signature from the header extra-data
|
|
|
|
if len(header.Extra) < extraSeal {
|
|
|
|
return common.Address{}, errMissingSignature
|
|
|
|
}
|
|
|
|
signature := header.Extra[len(header.Extra)-extraSeal:]
|
|
|
|
|
|
|
|
// Recover the public key and the Ethereum address
|
accounts, eth, clique, signer: support for external signer API (#18079)
* accounts, eth, clique: implement external backend + move sighash calc to backend
* signer: implement account_Version on external API
* accounts/external: enable ipc, add copyright
* accounts, internal, signer: formatting
* node: go fmt
* flags: disallow --dev in combo with --externalsigner
* accounts: remove clique-specific signing method, replace with more generic
* accounts, consensus: formatting + fix error in tests
* signer/core: remove (test-) import cycle
* clique: remove unused import
* accounts: remove CliqueHash and avoid dependency on package crypto
* consensus/clique: unduplicate header encoding
2019-02-05 13:23:57 +03:00
|
|
|
pubkey, err := crypto.Ecrecover(SealHash(header).Bytes(), signature)
|
2017-04-10 13:24:12 +03:00
|
|
|
if err != nil {
|
|
|
|
return common.Address{}, err
|
|
|
|
}
|
|
|
|
var signer common.Address
|
|
|
|
copy(signer[:], crypto.Keccak256(pubkey[1:])[12:])
|
|
|
|
|
2017-05-29 22:05:30 +03:00
|
|
|
sigcache.Add(hash, signer)
|
2017-04-10 13:24:12 +03:00
|
|
|
return signer, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Clique is the proof-of-authority consensus engine proposed to support the
|
|
|
|
// Ethereum testnet following the Ropsten attacks.
|
|
|
|
type Clique struct {
|
|
|
|
config *params.CliqueConfig // Consensus engine configuration parameters
|
|
|
|
db ethdb.Database // Database to store and retrieve snapshot checkpoints
|
|
|
|
|
2022-11-17 13:15:28 +03:00
|
|
|
recents *lru.Cache[common.Hash, *Snapshot] // Snapshots for recent block to speed up reorgs
|
|
|
|
signatures *sigLRU // Signatures of recent blocks to speed up mining
|
2017-04-10 13:24:12 +03:00
|
|
|
|
|
|
|
proposals map[common.Address]bool // Current list of proposals we are pushing
|
|
|
|
|
|
|
|
signer common.Address // Ethereum address of the signing key
|
2022-05-30 14:00:23 +03:00
|
|
|
lock sync.RWMutex // Protects the signer and proposals fields
|
2018-09-10 17:12:39 +03:00
|
|
|
|
|
|
|
// The fields below are for testing only
|
|
|
|
fakeDiff bool // Skip difficulty verifications
|
2017-04-10 13:24:12 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// New creates a Clique proof-of-authority consensus engine with the initial
|
|
|
|
// signers set to the ones provided by the user.
|
|
|
|
func New(config *params.CliqueConfig, db ethdb.Database) *Clique {
|
|
|
|
// Set any missing consensus parameters to their defaults
|
|
|
|
conf := *config
|
|
|
|
if conf.Epoch == 0 {
|
|
|
|
conf.Epoch = epochLength
|
|
|
|
}
|
|
|
|
// Allocate the snapshot caches and create the engine
|
2022-11-17 13:15:28 +03:00
|
|
|
recents := lru.NewCache[common.Hash, *Snapshot](inmemorySnapshots)
|
|
|
|
signatures := lru.NewCache[common.Hash, common.Address](inmemorySignatures)
|
2017-04-10 13:24:12 +03:00
|
|
|
|
|
|
|
return &Clique{
|
|
|
|
config: &conf,
|
|
|
|
db: db,
|
|
|
|
recents: recents,
|
|
|
|
signatures: signatures,
|
|
|
|
proposals: make(map[common.Address]bool),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-12 16:38:31 +03:00
|
|
|
// Author implements consensus.Engine, returning the Ethereum address recovered
|
|
|
|
// from the signature in the header's extra-data section.
|
|
|
|
func (c *Clique) Author(header *types.Header) (common.Address, error) {
|
2017-05-29 22:05:30 +03:00
|
|
|
return ecrecover(header, c.signatures)
|
2017-04-12 16:38:31 +03:00
|
|
|
}
|
|
|
|
|
2017-04-10 13:24:12 +03:00
|
|
|
// VerifyHeader checks whether a header conforms to the consensus rules.
|
2023-05-03 12:58:39 +03:00
|
|
|
func (c *Clique) VerifyHeader(chain consensus.ChainHeaderReader, header *types.Header) error {
|
2017-04-10 13:24:12 +03:00
|
|
|
return c.verifyHeader(chain, header, nil)
|
|
|
|
}
|
|
|
|
|
|
|
|
// VerifyHeaders is similar to VerifyHeader, but verifies a batch of headers. The
|
|
|
|
// method returns a quit channel to abort the operations and a results channel to
|
|
|
|
// retrieve the async verifications (the order is that of the input slice).
|
2023-05-03 12:58:39 +03:00
|
|
|
func (c *Clique) VerifyHeaders(chain consensus.ChainHeaderReader, headers []*types.Header) (chan<- struct{}, <-chan error) {
|
2017-04-10 13:24:12 +03:00
|
|
|
abort := make(chan struct{})
|
|
|
|
results := make(chan error, len(headers))
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
for i, header := range headers {
|
|
|
|
err := c.verifyHeader(chain, header, headers[:i])
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-abort:
|
|
|
|
return
|
|
|
|
case results <- err:
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
return abort, results
|
|
|
|
}
|
|
|
|
|
|
|
|
// verifyHeader checks whether a header conforms to the consensus rules.The
|
|
|
|
// caller may optionally pass in a batch of parents (ascending order) to avoid
|
|
|
|
// looking those up from the database. This is useful for concurrently verifying
|
|
|
|
// a batch of new headers.
|
2020-07-28 18:02:35 +03:00
|
|
|
func (c *Clique) verifyHeader(chain consensus.ChainHeaderReader, header *types.Header, parents []*types.Header) error {
|
2017-04-10 13:24:12 +03:00
|
|
|
if header.Number == nil {
|
|
|
|
return errUnknownBlock
|
|
|
|
}
|
|
|
|
number := header.Number.Uint64()
|
|
|
|
|
|
|
|
// Don't waste time checking blocks from the future
|
2019-04-02 23:28:48 +03:00
|
|
|
if header.Time > uint64(time.Now().Unix()) {
|
2017-04-10 13:24:12 +03:00
|
|
|
return consensus.ErrFutureBlock
|
|
|
|
}
|
|
|
|
// Checkpoint blocks need to enforce zero beneficiary
|
|
|
|
checkpoint := (number % c.config.Epoch) == 0
|
|
|
|
if checkpoint && header.Coinbase != (common.Address{}) {
|
|
|
|
return errInvalidCheckpointBeneficiary
|
|
|
|
}
|
|
|
|
// Nonces must be 0x00..0 or 0xff..f, zeroes enforced on checkpoints
|
|
|
|
if !bytes.Equal(header.Nonce[:], nonceAuthVote) && !bytes.Equal(header.Nonce[:], nonceDropVote) {
|
|
|
|
return errInvalidVote
|
|
|
|
}
|
|
|
|
if checkpoint && !bytes.Equal(header.Nonce[:], nonceDropVote) {
|
|
|
|
return errInvalidCheckpointVote
|
|
|
|
}
|
|
|
|
// Check that the extra-data contains both the vanity and signature
|
|
|
|
if len(header.Extra) < extraVanity {
|
|
|
|
return errMissingVanity
|
|
|
|
}
|
|
|
|
if len(header.Extra) < extraVanity+extraSeal {
|
|
|
|
return errMissingSignature
|
|
|
|
}
|
|
|
|
// Ensure that the extra-data contains a signer list on checkpoint, but none otherwise
|
|
|
|
signersBytes := len(header.Extra) - extraVanity - extraSeal
|
|
|
|
if !checkpoint && signersBytes != 0 {
|
|
|
|
return errExtraSigners
|
|
|
|
}
|
|
|
|
if checkpoint && signersBytes%common.AddressLength != 0 {
|
2017-06-20 05:12:48 +03:00
|
|
|
return errInvalidCheckpointSigners
|
2017-04-10 13:24:12 +03:00
|
|
|
}
|
|
|
|
// Ensure that the mix digest is zero as we don't have fork protection currently
|
|
|
|
if header.MixDigest != (common.Hash{}) {
|
|
|
|
return errInvalidMixDigest
|
|
|
|
}
|
|
|
|
// Ensure that the block doesn't contain any uncles which are meaningless in PoA
|
|
|
|
if header.UncleHash != uncleHash {
|
|
|
|
return errInvalidUncleHash
|
|
|
|
}
|
|
|
|
// Ensure that the block's difficulty is meaningful (may not be correct at this point)
|
|
|
|
if number > 0 {
|
|
|
|
if header.Difficulty == nil || (header.Difficulty.Cmp(diffInTurn) != 0 && header.Difficulty.Cmp(diffNoTurn) != 0) {
|
|
|
|
return errInvalidDifficulty
|
|
|
|
}
|
|
|
|
}
|
2021-05-07 11:31:01 +03:00
|
|
|
// Verify that the gas limit is <= 2^63-1
|
2021-12-14 12:17:25 +03:00
|
|
|
if header.GasLimit > params.MaxGasLimit {
|
|
|
|
return fmt.Errorf("invalid gasLimit: have %v, max %v", header.GasLimit, params.MaxGasLimit)
|
2021-05-07 11:31:01 +03:00
|
|
|
}
|
2023-05-19 11:27:19 +03:00
|
|
|
if chain.Config().IsShanghai(header.Number, header.Time) {
|
2023-05-25 09:57:34 +03:00
|
|
|
return errors.New("clique does not support shanghai fork")
|
2023-01-25 17:32:25 +03:00
|
|
|
}
|
2023-11-28 23:29:00 +03:00
|
|
|
// Verify the non-existence of withdrawalsHash.
|
|
|
|
if header.WithdrawalsHash != nil {
|
|
|
|
return fmt.Errorf("invalid withdrawalsHash: have %x, expected nil", header.WithdrawalsHash)
|
|
|
|
}
|
2023-05-19 11:27:19 +03:00
|
|
|
if chain.Config().IsCancun(header.Number, header.Time) {
|
2023-05-25 09:57:34 +03:00
|
|
|
return errors.New("clique does not support cancun fork")
|
2023-04-04 10:02:50 +03:00
|
|
|
}
|
2023-11-28 23:29:00 +03:00
|
|
|
// Verify the non-existence of cancun-specific header fields
|
|
|
|
switch {
|
|
|
|
case header.ExcessBlobGas != nil:
|
|
|
|
return fmt.Errorf("invalid excessBlobGas: have %d, expected nil", header.ExcessBlobGas)
|
|
|
|
case header.BlobGasUsed != nil:
|
|
|
|
return fmt.Errorf("invalid blobGasUsed: have %d, expected nil", header.BlobGasUsed)
|
|
|
|
case header.ParentBeaconRoot != nil:
|
|
|
|
return fmt.Errorf("invalid parentBeaconRoot, have %#x, expected nil", header.ParentBeaconRoot)
|
|
|
|
}
|
2017-04-10 13:24:12 +03:00
|
|
|
// All basic checks passed, verify cascading fields
|
|
|
|
return c.verifyCascadingFields(chain, header, parents)
|
|
|
|
}
|
|
|
|
|
|
|
|
// verifyCascadingFields verifies all the header fields that are not standalone,
|
|
|
|
// rather depend on a batch of previous headers. The caller may optionally pass
|
|
|
|
// in a batch of parents (ascending order) to avoid looking those up from the
|
|
|
|
// database. This is useful for concurrently verifying a batch of new headers.
|
2020-07-28 18:02:35 +03:00
|
|
|
func (c *Clique) verifyCascadingFields(chain consensus.ChainHeaderReader, header *types.Header, parents []*types.Header) error {
|
2017-04-10 13:24:12 +03:00
|
|
|
// The genesis block is the always valid dead-end
|
|
|
|
number := header.Number.Uint64()
|
|
|
|
if number == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
2019-10-28 10:57:34 +03:00
|
|
|
// Ensure that the block's timestamp isn't too close to its parent
|
2017-04-10 13:24:12 +03:00
|
|
|
var parent *types.Header
|
|
|
|
if len(parents) > 0 {
|
|
|
|
parent = parents[len(parents)-1]
|
|
|
|
} else {
|
|
|
|
parent = chain.GetHeader(header.ParentHash, number-1)
|
|
|
|
}
|
|
|
|
if parent == nil || parent.Number.Uint64() != number-1 || parent.Hash() != header.ParentHash {
|
|
|
|
return consensus.ErrUnknownAncestor
|
|
|
|
}
|
2019-04-02 23:28:48 +03:00
|
|
|
if parent.Time+c.config.Period > header.Time {
|
2020-05-27 17:12:13 +03:00
|
|
|
return errInvalidTimestamp
|
2017-04-10 13:24:12 +03:00
|
|
|
}
|
2021-05-17 16:13:22 +03:00
|
|
|
// Verify that the gasUsed is <= gasLimit
|
|
|
|
if header.GasUsed > header.GasLimit {
|
|
|
|
return fmt.Errorf("invalid gasUsed: have %d, gasLimit %d", header.GasUsed, header.GasLimit)
|
2021-05-07 11:31:01 +03:00
|
|
|
}
|
2021-05-17 16:13:22 +03:00
|
|
|
if !chain.Config().IsLondon(header.Number) {
|
|
|
|
// Verify BaseFee not present before EIP-1559 fork.
|
|
|
|
if header.BaseFee != nil {
|
|
|
|
return fmt.Errorf("invalid baseFee before fork: have %d, want <nil>", header.BaseFee)
|
|
|
|
}
|
|
|
|
if err := misc.VerifyGaslimit(parent.GasLimit, header.GasLimit); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-08-01 12:58:45 +03:00
|
|
|
} else if err := eip1559.VerifyEIP1559Header(chain.Config(), parent, header); err != nil {
|
2021-05-17 16:13:22 +03:00
|
|
|
// Verify the header's EIP-1559 attributes.
|
|
|
|
return err
|
2021-05-07 11:31:01 +03:00
|
|
|
}
|
2017-04-10 13:24:12 +03:00
|
|
|
// Retrieve the snapshot needed to verify this header and cache it
|
|
|
|
snap, err := c.snapshot(chain, number-1, header.ParentHash, parents)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// If the block is a checkpoint block, verify the signer list
|
|
|
|
if number%c.config.Epoch == 0 {
|
|
|
|
signers := make([]byte, len(snap.Signers)*common.AddressLength)
|
|
|
|
for i, signer := range snap.signers() {
|
|
|
|
copy(signers[i*common.AddressLength:], signer[:])
|
|
|
|
}
|
|
|
|
extraSuffix := len(header.Extra) - extraSeal
|
|
|
|
if !bytes.Equal(header.Extra[extraVanity:extraSuffix], signers) {
|
2018-09-10 17:12:39 +03:00
|
|
|
return errMismatchingCheckpointSigners
|
2017-04-10 13:24:12 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
// All basic checks passed, verify the seal and return
|
2021-10-12 00:16:46 +03:00
|
|
|
return c.verifySeal(snap, header, parents)
|
2017-04-10 13:24:12 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// snapshot retrieves the authorization snapshot at a given point in time.
|
2020-07-28 18:02:35 +03:00
|
|
|
func (c *Clique) snapshot(chain consensus.ChainHeaderReader, number uint64, hash common.Hash, parents []*types.Header) (*Snapshot, error) {
|
2017-04-10 13:24:12 +03:00
|
|
|
// Search for a snapshot in memory or on disk for checkpoints
|
|
|
|
var (
|
|
|
|
headers []*types.Header
|
2017-04-12 15:37:10 +03:00
|
|
|
snap *Snapshot
|
2017-04-10 13:24:12 +03:00
|
|
|
)
|
|
|
|
for snap == nil {
|
|
|
|
// If an in-memory snapshot was found, use that
|
|
|
|
if s, ok := c.recents.Get(hash); ok {
|
2022-11-17 13:15:28 +03:00
|
|
|
snap = s
|
2017-04-10 13:24:12 +03:00
|
|
|
break
|
|
|
|
}
|
|
|
|
// If an on-disk checkpoint snapshot can be found, use that
|
|
|
|
if number%checkpointInterval == 0 {
|
2017-05-29 22:05:30 +03:00
|
|
|
if s, err := loadSnapshot(c.config, c.signatures, c.db, hash); err == nil {
|
2018-05-19 11:39:41 +03:00
|
|
|
log.Trace("Loaded voting snapshot from disk", "number", number, "hash", hash)
|
2017-04-10 13:24:12 +03:00
|
|
|
snap = s
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
2019-05-15 14:33:33 +03:00
|
|
|
// If we're at the genesis, snapshot the initial state. Alternatively if we're
|
|
|
|
// at a checkpoint block without a parent (light client CHT), or we have piled
|
|
|
|
// up more headers than allowed to be reorged (chain reinit from a freezer),
|
|
|
|
// consider the checkpoint trusted and snapshot it.
|
2020-07-13 12:02:54 +03:00
|
|
|
if number == 0 || (number%c.config.Epoch == 0 && (len(headers) > params.FullImmutabilityThreshold || chain.GetHeaderByNumber(number-1) == nil)) {
|
2018-08-21 14:39:28 +03:00
|
|
|
checkpoint := chain.GetHeaderByNumber(number)
|
|
|
|
if checkpoint != nil {
|
|
|
|
hash := checkpoint.Hash()
|
|
|
|
|
|
|
|
signers := make([]common.Address, (len(checkpoint.Extra)-extraVanity-extraSeal)/common.AddressLength)
|
|
|
|
for i := 0; i < len(signers); i++ {
|
|
|
|
copy(signers[i][:], checkpoint.Extra[extraVanity+i*common.AddressLength:])
|
|
|
|
}
|
|
|
|
snap = newSnapshot(c.config, c.signatures, number, hash, signers)
|
|
|
|
if err := snap.store(c.db); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
log.Info("Stored checkpoint snapshot to disk", "number", number, "hash", hash)
|
|
|
|
break
|
2017-04-10 13:24:12 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
// No snapshot for this header, gather the header and move backward
|
|
|
|
var header *types.Header
|
|
|
|
if len(parents) > 0 {
|
|
|
|
// If we have explicit parents, pick from there (enforced)
|
|
|
|
header = parents[len(parents)-1]
|
|
|
|
if header.Hash() != hash || header.Number.Uint64() != number {
|
|
|
|
return nil, consensus.ErrUnknownAncestor
|
|
|
|
}
|
|
|
|
parents = parents[:len(parents)-1]
|
|
|
|
} else {
|
|
|
|
// No explicit parents (or no more left), reach out to the database
|
|
|
|
header = chain.GetHeader(hash, number)
|
|
|
|
if header == nil {
|
|
|
|
return nil, consensus.ErrUnknownAncestor
|
|
|
|
}
|
|
|
|
}
|
|
|
|
headers = append(headers, header)
|
|
|
|
number, hash = number-1, header.ParentHash
|
|
|
|
}
|
|
|
|
// Previous snapshot found, apply any pending headers on top of it
|
|
|
|
for i := 0; i < len(headers)/2; i++ {
|
|
|
|
headers[i], headers[len(headers)-1-i] = headers[len(headers)-1-i], headers[i]
|
|
|
|
}
|
|
|
|
snap, err := snap.apply(headers)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
c.recents.Add(snap.Hash, snap)
|
|
|
|
|
|
|
|
// If we've generated a new checkpoint snapshot, save to disk
|
|
|
|
if snap.Number%checkpointInterval == 0 && len(headers) > 0 {
|
|
|
|
if err = snap.store(c.db); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
log.Trace("Stored voting snapshot to disk", "number", snap.Number, "hash", snap.Hash)
|
|
|
|
}
|
|
|
|
return snap, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// VerifyUncles implements consensus.Engine, always returning an error for any
|
|
|
|
// uncles as this consensus mechanism doesn't permit uncles.
|
|
|
|
func (c *Clique) VerifyUncles(chain consensus.ChainReader, block *types.Block) error {
|
|
|
|
if len(block.Uncles()) > 0 {
|
|
|
|
return errors.New("uncles not allowed")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// verifySeal checks whether the signature contained in the header satisfies the
|
|
|
|
// consensus protocol requirements. The method accepts an optional list of parent
|
|
|
|
// headers that aren't yet part of the local blockchain to generate the snapshots
|
|
|
|
// from.
|
2021-10-12 00:16:46 +03:00
|
|
|
func (c *Clique) verifySeal(snap *Snapshot, header *types.Header, parents []*types.Header) error {
|
2017-04-10 13:24:12 +03:00
|
|
|
// Verifying the genesis block is not supported
|
|
|
|
number := header.Number.Uint64()
|
|
|
|
if number == 0 {
|
|
|
|
return errUnknownBlock
|
|
|
|
}
|
|
|
|
// Resolve the authorization key and check against signers
|
2017-05-29 22:05:30 +03:00
|
|
|
signer, err := ecrecover(header, c.signatures)
|
2017-04-10 13:24:12 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if _, ok := snap.Signers[signer]; !ok {
|
2018-09-10 17:12:39 +03:00
|
|
|
return errUnauthorizedSigner
|
2017-04-10 13:24:12 +03:00
|
|
|
}
|
|
|
|
for seen, recent := range snap.Recents {
|
|
|
|
if recent == signer {
|
2017-06-20 05:12:48 +03:00
|
|
|
// Signer is among recents, only fail if the current block doesn't shift it out
|
2017-04-10 13:24:12 +03:00
|
|
|
if limit := uint64(len(snap.Signers)/2 + 1); seen > number-limit {
|
2018-09-10 17:12:39 +03:00
|
|
|
return errRecentlySigned
|
2017-04-10 13:24:12 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-06-20 05:12:48 +03:00
|
|
|
// Ensure that the difficulty corresponds to the turn-ness of the signer
|
2018-09-10 17:12:39 +03:00
|
|
|
if !c.fakeDiff {
|
|
|
|
inturn := snap.inturn(header.Number.Uint64(), signer)
|
|
|
|
if inturn && header.Difficulty.Cmp(diffInTurn) != 0 {
|
|
|
|
return errWrongDifficulty
|
|
|
|
}
|
|
|
|
if !inturn && header.Difficulty.Cmp(diffNoTurn) != 0 {
|
|
|
|
return errWrongDifficulty
|
|
|
|
}
|
2017-04-10 13:24:12 +03:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Prepare implements consensus.Engine, preparing all the consensus fields of the
|
|
|
|
// header for running the transactions on top.
|
2020-07-28 18:02:35 +03:00
|
|
|
func (c *Clique) Prepare(chain consensus.ChainHeaderReader, header *types.Header) error {
|
2017-06-12 15:45:17 +03:00
|
|
|
// If the block isn't a checkpoint, cast a random vote (good enough for now)
|
2017-04-10 13:24:12 +03:00
|
|
|
header.Coinbase = common.Address{}
|
|
|
|
header.Nonce = types.BlockNonce{}
|
|
|
|
|
|
|
|
number := header.Number.Uint64()
|
2017-06-23 11:05:20 +03:00
|
|
|
// Assemble the voting snapshot to check which votes make sense
|
2017-06-14 11:49:33 +03:00
|
|
|
snap, err := c.snapshot(chain, number-1, header.ParentHash, nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-05-30 14:00:23 +03:00
|
|
|
c.lock.RLock()
|
2017-04-10 13:24:12 +03:00
|
|
|
if number%c.config.Epoch != 0 {
|
2017-06-23 11:05:20 +03:00
|
|
|
// Gather all the proposals that make sense voting on
|
|
|
|
addresses := make([]common.Address, 0, len(c.proposals))
|
2017-06-14 11:49:33 +03:00
|
|
|
for address, authorize := range c.proposals {
|
|
|
|
if snap.validVote(address, authorize) {
|
2017-04-10 13:24:12 +03:00
|
|
|
addresses = append(addresses, address)
|
|
|
|
}
|
2017-06-14 11:49:33 +03:00
|
|
|
}
|
2017-06-23 11:05:20 +03:00
|
|
|
// If there's pending proposals, cast a vote on them
|
2017-06-14 11:49:33 +03:00
|
|
|
if len(addresses) > 0 {
|
2017-04-10 13:24:12 +03:00
|
|
|
header.Coinbase = addresses[rand.Intn(len(addresses))]
|
|
|
|
if c.proposals[header.Coinbase] {
|
|
|
|
copy(header.Nonce[:], nonceAuthVote)
|
|
|
|
} else {
|
|
|
|
copy(header.Nonce[:], nonceDropVote)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-05-30 14:00:23 +03:00
|
|
|
|
|
|
|
// Copy signer protected by mutex to avoid race condition
|
|
|
|
signer := c.signer
|
|
|
|
c.lock.RUnlock()
|
|
|
|
|
2017-06-14 11:49:33 +03:00
|
|
|
// Set the correct difficulty
|
2022-05-30 14:00:23 +03:00
|
|
|
header.Difficulty = calcDifficulty(snap, signer)
|
2017-12-22 15:37:50 +03:00
|
|
|
|
2019-10-28 10:57:34 +03:00
|
|
|
// Ensure the extra data has all its components
|
2017-04-10 13:24:12 +03:00
|
|
|
if len(header.Extra) < extraVanity {
|
|
|
|
header.Extra = append(header.Extra, bytes.Repeat([]byte{0x00}, extraVanity-len(header.Extra))...)
|
|
|
|
}
|
|
|
|
header.Extra = header.Extra[:extraVanity]
|
|
|
|
|
|
|
|
if number%c.config.Epoch == 0 {
|
|
|
|
for _, signer := range snap.signers() {
|
|
|
|
header.Extra = append(header.Extra, signer[:]...)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
header.Extra = append(header.Extra, make([]byte, extraSeal)...)
|
|
|
|
|
|
|
|
// Mix digest is reserved for now, set to empty
|
|
|
|
header.MixDigest = common.Hash{}
|
|
|
|
|
|
|
|
// Ensure the timestamp has the correct delay
|
|
|
|
parent := chain.GetHeader(header.ParentHash, number-1)
|
|
|
|
if parent == nil {
|
|
|
|
return consensus.ErrUnknownAncestor
|
|
|
|
}
|
2019-04-02 23:28:48 +03:00
|
|
|
header.Time = parent.Time + c.config.Period
|
|
|
|
if header.Time < uint64(time.Now().Unix()) {
|
|
|
|
header.Time = uint64(time.Now().Unix())
|
2017-04-10 13:24:12 +03:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-03-16 22:34:25 +03:00
|
|
|
// Finalize implements consensus.Engine. There is no post-transaction
|
|
|
|
// consensus rules in clique, do nothing here.
|
core/state: move state log mechanism to a separate layer (#30569)
This PR moves the logging/tracing-facilities out of `*state.StateDB`,
in to a wrapping struct which implements `vm.StateDB` instead.
In most places, it is a pretty straight-forward change:
- First, hoisting the invocations from state objects up to the statedb.
- Then making the mutation-methods simply return the previous value, so
that the external logging layer could log everything.
Some internal code uses the direct object-accessors to mutate the state,
particularly in testing and in setting up state overrides, which means
that these changes are unobservable for the hooked layer. Thus, configuring
the overrides are not necessarily part of the API we want to publish.
The trickiest part about the layering is that when the selfdestructs are
finally deleted during `Finalise`, there's the possibility that someone
sent some ether to it, which is burnt at that point, and thus needs to
be logged. The hooked layer reaches into the inner layer to figure out
these events.
In package `vm`, the conversion from `state.StateDB + hooks` into a
hooked `vm.StateDB` is performed where needed.
---------
Co-authored-by: Gary Rong <garyrong0905@gmail.com>
2024-10-23 09:03:36 +03:00
|
|
|
func (c *Clique) Finalize(chain consensus.ChainHeaderReader, header *types.Header, state vm.StateDB, body *types.Body) {
|
2023-03-16 22:34:25 +03:00
|
|
|
// No block rewards in PoA, so the state remains as is
|
2019-04-30 16:42:36 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// FinalizeAndAssemble implements consensus.Engine, ensuring no uncles are set,
|
|
|
|
// nor block rewards given, and returns the final block.
|
2024-03-20 16:58:47 +03:00
|
|
|
func (c *Clique) FinalizeAndAssemble(chain consensus.ChainHeaderReader, header *types.Header, state *state.StateDB, body *types.Body, receipts []*types.Receipt) (*types.Block, error) {
|
|
|
|
if len(body.Withdrawals) > 0 {
|
2023-01-25 17:32:25 +03:00
|
|
|
return nil, errors.New("clique does not support withdrawals")
|
|
|
|
}
|
2020-12-11 17:49:44 +03:00
|
|
|
// Finalize block
|
2024-03-20 16:58:47 +03:00
|
|
|
c.Finalize(chain, header, state, body)
|
2017-04-10 13:24:12 +03:00
|
|
|
|
2023-03-16 22:34:25 +03:00
|
|
|
// Assign the final state root to header.
|
|
|
|
header.Root = state.IntermediateRoot(chain.Config().IsEIP158(header.Number))
|
|
|
|
|
|
|
|
// Assemble and return the final block for sealing.
|
2024-04-30 15:55:08 +03:00
|
|
|
return types.NewBlock(header, &types.Body{Transactions: body.Transactions}, receipts, trie.NewStackTrie(nil)), nil
|
2017-04-10 13:24:12 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// Authorize injects a private key into the consensus engine to mint new blocks
|
|
|
|
// with.
|
2024-10-21 09:24:28 +03:00
|
|
|
func (c *Clique) Authorize(signer common.Address) {
|
2017-04-10 13:24:12 +03:00
|
|
|
c.lock.Lock()
|
|
|
|
defer c.lock.Unlock()
|
|
|
|
|
|
|
|
c.signer = signer
|
|
|
|
}
|
|
|
|
|
|
|
|
// Seal implements consensus.Engine, attempting to create a sealed block using
|
|
|
|
// the local signing credentials.
|
2020-07-28 18:02:35 +03:00
|
|
|
func (c *Clique) Seal(chain consensus.ChainHeaderReader, block *types.Block, results chan<- *types.Block, stop <-chan struct{}) error {
|
2024-10-21 09:24:28 +03:00
|
|
|
panic("clique (poa) sealing not supported any more")
|
2017-04-10 13:24:12 +03:00
|
|
|
}
|
|
|
|
|
2017-12-22 15:37:50 +03:00
|
|
|
// CalcDifficulty is the difficulty adjustment algorithm. It returns the difficulty
|
2020-10-13 12:00:42 +03:00
|
|
|
// that a new block should have:
|
|
|
|
// * DIFF_NOTURN(2) if BLOCK_NUMBER % SIGNER_COUNT != SIGNER_INDEX
|
|
|
|
// * DIFF_INTURN(1) if BLOCK_NUMBER % SIGNER_COUNT == SIGNER_INDEX
|
2020-07-28 18:02:35 +03:00
|
|
|
func (c *Clique) CalcDifficulty(chain consensus.ChainHeaderReader, time uint64, parent *types.Header) *big.Int {
|
2017-12-22 15:37:50 +03:00
|
|
|
snap, err := c.snapshot(chain, parent.Number.Uint64(), parent.Hash(), nil)
|
|
|
|
if err != nil {
|
|
|
|
return nil
|
|
|
|
}
|
2022-05-30 14:00:23 +03:00
|
|
|
c.lock.RLock()
|
|
|
|
signer := c.signer
|
|
|
|
c.lock.RUnlock()
|
|
|
|
return calcDifficulty(snap, signer)
|
2017-12-22 15:37:50 +03:00
|
|
|
}
|
|
|
|
|
2020-10-13 12:00:42 +03:00
|
|
|
func calcDifficulty(snap *Snapshot, signer common.Address) *big.Int {
|
2017-12-22 15:37:50 +03:00
|
|
|
if snap.inturn(snap.Number+1, signer) {
|
|
|
|
return new(big.Int).Set(diffInTurn)
|
|
|
|
}
|
|
|
|
return new(big.Int).Set(diffNoTurn)
|
|
|
|
}
|
|
|
|
|
2018-08-23 16:02:57 +03:00
|
|
|
// SealHash returns the hash of a block prior to it being sealed.
|
|
|
|
func (c *Clique) SealHash(header *types.Header) common.Hash {
|
accounts, eth, clique, signer: support for external signer API (#18079)
* accounts, eth, clique: implement external backend + move sighash calc to backend
* signer: implement account_Version on external API
* accounts/external: enable ipc, add copyright
* accounts, internal, signer: formatting
* node: go fmt
* flags: disallow --dev in combo with --externalsigner
* accounts: remove clique-specific signing method, replace with more generic
* accounts, consensus: formatting + fix error in tests
* signer/core: remove (test-) import cycle
* clique: remove unused import
* accounts: remove CliqueHash and avoid dependency on package crypto
* consensus/clique: unduplicate header encoding
2019-02-05 13:23:57 +03:00
|
|
|
return SealHash(header)
|
2018-08-23 16:02:57 +03:00
|
|
|
}
|
|
|
|
|
2018-11-14 15:50:30 +03:00
|
|
|
// Close implements consensus.Engine. It's a noop for clique as there are no background threads.
|
2018-08-03 11:33:37 +03:00
|
|
|
func (c *Clique) Close() error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-04-10 13:24:12 +03:00
|
|
|
// APIs implements consensus.Engine, returning the user facing RPC API to allow
|
|
|
|
// controlling the signer voting.
|
2020-07-28 18:02:35 +03:00
|
|
|
func (c *Clique) APIs(chain consensus.ChainHeaderReader) []rpc.API {
|
2017-04-10 13:24:12 +03:00
|
|
|
return []rpc.API{{
|
|
|
|
Namespace: "clique",
|
|
|
|
Service: &API{chain: chain, clique: c},
|
|
|
|
}}
|
|
|
|
}
|
accounts, eth, clique, signer: support for external signer API (#18079)
* accounts, eth, clique: implement external backend + move sighash calc to backend
* signer: implement account_Version on external API
* accounts/external: enable ipc, add copyright
* accounts, internal, signer: formatting
* node: go fmt
* flags: disallow --dev in combo with --externalsigner
* accounts: remove clique-specific signing method, replace with more generic
* accounts, consensus: formatting + fix error in tests
* signer/core: remove (test-) import cycle
* clique: remove unused import
* accounts: remove CliqueHash and avoid dependency on package crypto
* consensus/clique: unduplicate header encoding
2019-02-05 13:23:57 +03:00
|
|
|
|
|
|
|
// SealHash returns the hash of a block prior to it being sealed.
|
|
|
|
func SealHash(header *types.Header) (hash common.Hash) {
|
|
|
|
hasher := sha3.NewLegacyKeccak256()
|
|
|
|
encodeSigHeader(hasher, header)
|
2021-07-02 10:18:50 +03:00
|
|
|
hasher.(crypto.KeccakState).Read(hash[:])
|
accounts, eth, clique, signer: support for external signer API (#18079)
* accounts, eth, clique: implement external backend + move sighash calc to backend
* signer: implement account_Version on external API
* accounts/external: enable ipc, add copyright
* accounts, internal, signer: formatting
* node: go fmt
* flags: disallow --dev in combo with --externalsigner
* accounts: remove clique-specific signing method, replace with more generic
* accounts, consensus: formatting + fix error in tests
* signer/core: remove (test-) import cycle
* clique: remove unused import
* accounts: remove CliqueHash and avoid dependency on package crypto
* consensus/clique: unduplicate header encoding
2019-02-05 13:23:57 +03:00
|
|
|
return hash
|
|
|
|
}
|
|
|
|
|
|
|
|
// CliqueRLP returns the rlp bytes which needs to be signed for the proof-of-authority
|
|
|
|
// sealing. The RLP to sign consists of the entire header apart from the 65 byte signature
|
|
|
|
// contained at the end of the extra data.
|
|
|
|
//
|
|
|
|
// Note, the method requires the extra data to be at least 65 bytes, otherwise it
|
|
|
|
// panics. This is done to avoid accidentally using both forms (signature present
|
|
|
|
// or not), which could be abused to produce different hashes for the same header.
|
|
|
|
func CliqueRLP(header *types.Header) []byte {
|
|
|
|
b := new(bytes.Buffer)
|
|
|
|
encodeSigHeader(b, header)
|
|
|
|
return b.Bytes()
|
|
|
|
}
|
|
|
|
|
|
|
|
func encodeSigHeader(w io.Writer, header *types.Header) {
|
2021-05-17 16:13:22 +03:00
|
|
|
enc := []interface{}{
|
accounts, eth, clique, signer: support for external signer API (#18079)
* accounts, eth, clique: implement external backend + move sighash calc to backend
* signer: implement account_Version on external API
* accounts/external: enable ipc, add copyright
* accounts, internal, signer: formatting
* node: go fmt
* flags: disallow --dev in combo with --externalsigner
* accounts: remove clique-specific signing method, replace with more generic
* accounts, consensus: formatting + fix error in tests
* signer/core: remove (test-) import cycle
* clique: remove unused import
* accounts: remove CliqueHash and avoid dependency on package crypto
* consensus/clique: unduplicate header encoding
2019-02-05 13:23:57 +03:00
|
|
|
header.ParentHash,
|
|
|
|
header.UncleHash,
|
|
|
|
header.Coinbase,
|
|
|
|
header.Root,
|
|
|
|
header.TxHash,
|
|
|
|
header.ReceiptHash,
|
|
|
|
header.Bloom,
|
|
|
|
header.Difficulty,
|
|
|
|
header.Number,
|
|
|
|
header.GasLimit,
|
|
|
|
header.GasUsed,
|
|
|
|
header.Time,
|
2019-08-22 16:14:06 +03:00
|
|
|
header.Extra[:len(header.Extra)-crypto.SignatureLength], // Yes, this will panic if extra is too short
|
accounts, eth, clique, signer: support for external signer API (#18079)
* accounts, eth, clique: implement external backend + move sighash calc to backend
* signer: implement account_Version on external API
* accounts/external: enable ipc, add copyright
* accounts, internal, signer: formatting
* node: go fmt
* flags: disallow --dev in combo with --externalsigner
* accounts: remove clique-specific signing method, replace with more generic
* accounts, consensus: formatting + fix error in tests
* signer/core: remove (test-) import cycle
* clique: remove unused import
* accounts: remove CliqueHash and avoid dependency on package crypto
* consensus/clique: unduplicate header encoding
2019-02-05 13:23:57 +03:00
|
|
|
header.MixDigest,
|
|
|
|
header.Nonce,
|
2021-05-17 16:13:22 +03:00
|
|
|
}
|
|
|
|
if header.BaseFee != nil {
|
|
|
|
enc = append(enc, header.BaseFee)
|
|
|
|
}
|
2023-01-25 17:32:25 +03:00
|
|
|
if header.WithdrawalsHash != nil {
|
|
|
|
panic("unexpected withdrawal hash value in clique")
|
|
|
|
}
|
2023-11-28 23:29:00 +03:00
|
|
|
if header.ExcessBlobGas != nil {
|
|
|
|
panic("unexpected excess blob gas value in clique")
|
|
|
|
}
|
|
|
|
if header.BlobGasUsed != nil {
|
|
|
|
panic("unexpected blob gas used value in clique")
|
|
|
|
}
|
|
|
|
if header.ParentBeaconRoot != nil {
|
|
|
|
panic("unexpected parent beacon root value in clique")
|
|
|
|
}
|
2021-05-17 16:13:22 +03:00
|
|
|
if err := rlp.Encode(w, enc); err != nil {
|
accounts, eth, clique, signer: support for external signer API (#18079)
* accounts, eth, clique: implement external backend + move sighash calc to backend
* signer: implement account_Version on external API
* accounts/external: enable ipc, add copyright
* accounts, internal, signer: formatting
* node: go fmt
* flags: disallow --dev in combo with --externalsigner
* accounts: remove clique-specific signing method, replace with more generic
* accounts, consensus: formatting + fix error in tests
* signer/core: remove (test-) import cycle
* clique: remove unused import
* accounts: remove CliqueHash and avoid dependency on package crypto
* consensus/clique: unduplicate header encoding
2019-02-05 13:23:57 +03:00
|
|
|
panic("can't encode: " + err.Error())
|
|
|
|
}
|
|
|
|
}
|