Co-authored-by: Tyler <48813565+technicallyty@users.noreply.github.com> Co-authored-by: Alex | Cosmos Labs <alex@cosmoslabs.io>
1198 lines
40 KiB
Go
1198 lines
40 KiB
Go
package baseapp
|
|
|
|
import (
|
|
"fmt"
|
|
"maps"
|
|
"math"
|
|
"slices"
|
|
"strconv"
|
|
"sync"
|
|
|
|
"github.com/cockroachdb/errors"
|
|
abci "github.com/cometbft/cometbft/abci/types"
|
|
"github.com/cometbft/cometbft/crypto/tmhash"
|
|
cmtproto "github.com/cometbft/cometbft/proto/tendermint/types"
|
|
dbm "github.com/cosmos/cosmos-db"
|
|
"github.com/cosmos/gogoproto/proto"
|
|
"go.opentelemetry.io/otel"
|
|
"go.opentelemetry.io/otel/attribute"
|
|
"go.opentelemetry.io/otel/metric"
|
|
"go.opentelemetry.io/otel/trace"
|
|
protov2 "google.golang.org/protobuf/proto"
|
|
|
|
errorsmod "cosmossdk.io/errors"
|
|
"cosmossdk.io/log"
|
|
"cosmossdk.io/store"
|
|
storemetrics "cosmossdk.io/store/metrics"
|
|
"cosmossdk.io/store/snapshots"
|
|
storetypes "cosmossdk.io/store/types"
|
|
|
|
"github.com/cosmos/cosmos-sdk/baseapp/config"
|
|
"github.com/cosmos/cosmos-sdk/baseapp/oe"
|
|
"github.com/cosmos/cosmos-sdk/baseapp/state"
|
|
"github.com/cosmos/cosmos-sdk/codec"
|
|
codectypes "github.com/cosmos/cosmos-sdk/codec/types"
|
|
servertypes "github.com/cosmos/cosmos-sdk/server/types"
|
|
"github.com/cosmos/cosmos-sdk/telemetry"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
sdkerrors "github.com/cosmos/cosmos-sdk/types/errors"
|
|
"github.com/cosmos/cosmos-sdk/types/mempool"
|
|
"github.com/cosmos/cosmos-sdk/types/msgservice"
|
|
)
|
|
|
|
type (
|
|
// StoreLoader defines a customizable function to control how we load the
|
|
// CommitMultiStore from disk. This is useful for state migration, when
|
|
// loading a datastore written with an older version of the software. In
|
|
// particular, if a module changed the substore key name (or removed a substore)
|
|
// between two versions of the software.
|
|
StoreLoader func(ms storetypes.CommitMultiStore) error
|
|
)
|
|
|
|
const (
|
|
execModeCheck = sdk.ExecModeCheck // Check a transaction
|
|
execModeReCheck = sdk.ExecModeReCheck // Recheck a (pending) transaction after a commit
|
|
execModeSimulate = sdk.ExecModeSimulate // Simulate a transaction
|
|
execModePrepareProposal = sdk.ExecModePrepareProposal // Prepare a block proposal
|
|
execModeProcessProposal = sdk.ExecModeProcessProposal // Process a block proposal
|
|
execModeVoteExtension = sdk.ExecModeVoteExtension // Extend or verify a pre-commit vote
|
|
execModeVerifyVoteExtension = sdk.ExecModeVerifyVoteExtension // Verify a vote extension
|
|
execModeFinalize = sdk.ExecModeFinalize // Finalize a block proposal
|
|
)
|
|
|
|
var _ servertypes.ABCI = (*BaseApp)(nil)
|
|
|
|
var (
|
|
tracer = otel.Tracer("cosmos-sdk/baseapp")
|
|
meter = otel.Meter("cosmos-sdk/baseapp")
|
|
blockCounter metric.Int64Counter
|
|
txCounter metric.Int64Counter
|
|
)
|
|
|
|
func init() {
|
|
var err error
|
|
blockCounter, err = meter.Int64Counter("block.count")
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
txCounter, err = meter.Int64Counter("tx.count")
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
|
|
// BaseApp reflects the ABCI application implementation.
|
|
type BaseApp struct {
|
|
// initialized on creation
|
|
mu sync.Mutex // mu protects the fields below.
|
|
logger log.Logger
|
|
name string // application name from abci.BlockInfo
|
|
db dbm.DB // common DB backend
|
|
cms storetypes.CommitMultiStore // Main (uncached) state
|
|
qms storetypes.MultiStore // Optional alternative multistore for querying only.
|
|
storeLoader StoreLoader // function to handle store loading, may be overridden with SetStoreLoader()
|
|
grpcQueryRouter *GRPCQueryRouter // router for redirecting gRPC query calls
|
|
msgServiceRouter *MsgServiceRouter // router for redirecting Msg service messages
|
|
interfaceRegistry codectypes.InterfaceRegistry
|
|
txDecoder sdk.TxDecoder // unmarshal []byte into sdk.Tx
|
|
txEncoder sdk.TxEncoder // marshal sdk.Tx into []byte
|
|
|
|
mempool mempool.Mempool // application side mempool
|
|
anteHandler sdk.AnteHandler // ante handler for fee and auth
|
|
postHandler sdk.PostHandler // post handler, optional
|
|
|
|
abciHandlers sdk.ABCIHandlers
|
|
|
|
addrPeerFilter sdk.PeerFilter // filter peers by address and port
|
|
idPeerFilter sdk.PeerFilter // filter peers by node ID
|
|
fauxMerkleMode bool // if true, IAVL MountStores uses MountStoresDB for simulation speed.
|
|
sigverifyTx bool // in the simulation test, since the account does not have a private key, we have to ignore the tx sigverify.
|
|
|
|
// manages snapshots, i.e. dumps of app state at certain intervals
|
|
snapshotManager *snapshots.Manager
|
|
|
|
stateManager *state.Manager
|
|
|
|
// An inter-block write-through cache provided to the context during the ABCI
|
|
// FinalizeBlock call.
|
|
interBlockCache storetypes.MultiStorePersistentCache
|
|
|
|
// paramStore is used to query for ABCI consensus parameters from an
|
|
// application parameter store.
|
|
paramStore ParamStore
|
|
|
|
// gasConfig contains node-level gas configuration.
|
|
gasConfig config.GasConfig
|
|
|
|
// initialHeight is the initial height at which we start the BaseApp
|
|
initialHeight int64
|
|
|
|
// flag for sealing options and parameters to a BaseApp
|
|
sealed bool
|
|
|
|
// block height at which to halt the chain and gracefully shutdown
|
|
haltHeight uint64
|
|
|
|
// minimum block time (in Unix seconds) at which to halt the chain and gracefully shutdown
|
|
haltTime uint64
|
|
|
|
// minRetainBlocks defines the minimum block height offset from the current
|
|
// block being committed, such that all blocks past this offset are pruned
|
|
// from CometBFT. It is used as part of the process of determining the
|
|
// ResponseCommit.RetainHeight value during ABCI Commit. A value of 0 indicates
|
|
// that no blocks should be pruned.
|
|
//
|
|
// Note: CometBFT block pruning is dependent on this parameter in conjunction
|
|
// with the unbonding (safety threshold) period, state pruning and state sync
|
|
// snapshot parameters to determine the correct minimum value of
|
|
// ResponseCommit.RetainHeight.
|
|
minRetainBlocks uint64
|
|
|
|
// application's version string
|
|
version string
|
|
|
|
// application's protocol version that increments on every upgrade
|
|
// if BaseApp is passed to the upgrade keeper's NewKeeper method.
|
|
appVersion uint64
|
|
|
|
// recovery handler for app.runTx method
|
|
runTxRecoveryMiddleware recoveryMiddleware
|
|
|
|
// trace set will return full stack traces for errors in ABCI Log field
|
|
trace bool
|
|
|
|
// indexEvents defines the set of events in the form {eventType}.{attributeKey},
|
|
// which informs CometBFT what to index. If empty, all events will be indexed.
|
|
indexEvents map[string]struct{}
|
|
|
|
// streamingManager for managing instances and configuration of ABCIListener services
|
|
streamingManager storetypes.StreamingManager
|
|
|
|
chainID string
|
|
|
|
cdc codec.Codec
|
|
|
|
// optimisticExec contains the context required for Optimistic Execution,
|
|
// including the goroutine handling.This is experimental and must be enabled
|
|
// by developers.
|
|
optimisticExec *oe.OptimisticExecution
|
|
|
|
// disableBlockGasMeter will disable the block gas meter if true, block gas meter is tricky to support
|
|
// when executing transactions in parallel.
|
|
// when disabled, the block gas meter in context is a noop one.
|
|
//
|
|
// SAFETY: it's safe to do if validators validate the total gas wanted in the `ProcessProposal`, which is the case in the default handler.
|
|
disableBlockGasMeter bool
|
|
|
|
// Optional alternative tx runner, used for block-stm parallel transaction execution. If nil, default txRunner is used.
|
|
txRunner sdk.TxRunner
|
|
}
|
|
|
|
// NewBaseApp returns a reference to an initialized BaseApp. It accepts a
|
|
// variadic number of option functions, which act on the BaseApp to set
|
|
// configuration choices.
|
|
func NewBaseApp(
|
|
name string, logger log.Logger, db dbm.DB, txDecoder sdk.TxDecoder, options ...func(*BaseApp),
|
|
) *BaseApp {
|
|
app := &BaseApp{
|
|
logger: logger.With(log.ModuleKey, "baseapp"),
|
|
name: name,
|
|
db: db,
|
|
cms: store.NewCommitMultiStore(db, logger, storemetrics.NewNoOpMetrics()), // by default, we use a no-op metric gather in store
|
|
storeLoader: DefaultStoreLoader,
|
|
grpcQueryRouter: NewGRPCQueryRouter(),
|
|
msgServiceRouter: NewMsgServiceRouter(),
|
|
txDecoder: txDecoder,
|
|
fauxMerkleMode: false,
|
|
sigverifyTx: true,
|
|
gasConfig: config.GasConfig{QueryGasLimit: math.MaxUint64},
|
|
}
|
|
|
|
for _, option := range options {
|
|
option(app)
|
|
}
|
|
|
|
if app.mempool == nil {
|
|
app.SetMempool(mempool.NoOpMempool{})
|
|
}
|
|
|
|
abciProposalHandler := NewDefaultProposalHandler(app.mempool, app)
|
|
|
|
if app.abciHandlers.PrepareProposalHandler == nil {
|
|
app.SetPrepareProposal(abciProposalHandler.PrepareProposalHandler())
|
|
}
|
|
if app.abciHandlers.ProcessProposalHandler == nil {
|
|
app.SetProcessProposal(abciProposalHandler.ProcessProposalHandler())
|
|
}
|
|
if app.abciHandlers.ExtendVoteHandler == nil {
|
|
app.SetExtendVoteHandler(NoOpExtendVote())
|
|
}
|
|
if app.abciHandlers.VerifyVoteExtensionHandler == nil {
|
|
app.SetVerifyVoteExtensionHandler(NoOpVerifyVoteExtensionHandler())
|
|
}
|
|
if app.interBlockCache != nil {
|
|
app.cms.SetInterBlockCache(app.interBlockCache)
|
|
}
|
|
|
|
app.runTxRecoveryMiddleware = newDefaultRecoveryMiddleware()
|
|
|
|
// Initialize with an empty interface registry to avoid nil pointer dereference.
|
|
// Unless SetInterfaceRegistry is called with an interface registry with proper address codecs baseapp will panic.
|
|
app.cdc = codec.NewProtoCodec(codectypes.NewInterfaceRegistry())
|
|
|
|
protoFiles, err := proto.MergedRegistry()
|
|
if err != nil {
|
|
logger.Warn("error creating merged proto registry", "error", err)
|
|
} else {
|
|
err = msgservice.ValidateProtoAnnotations(protoFiles)
|
|
if err != nil {
|
|
// Once we switch to using protoreflect-based antehandlers, we might
|
|
// want to panic here instead of logging a warning.
|
|
logger.Warn("error validating merged proto registry annotations", "error", err)
|
|
}
|
|
}
|
|
|
|
app.stateManager = state.NewManager(app.gasConfig)
|
|
|
|
return app
|
|
}
|
|
|
|
// Name returns the name of the BaseApp.
|
|
func (app *BaseApp) Name() string {
|
|
return app.name
|
|
}
|
|
|
|
// AppVersion returns the application's protocol version.
|
|
func (app *BaseApp) AppVersion() uint64 {
|
|
return app.appVersion
|
|
}
|
|
|
|
// Version returns the application's version string.
|
|
func (app *BaseApp) Version() string {
|
|
return app.version
|
|
}
|
|
|
|
// Logger returns the logger of the BaseApp.
|
|
func (app *BaseApp) Logger() log.Logger {
|
|
return app.logger
|
|
}
|
|
|
|
// Trace returns the boolean value for logging error stack traces.
|
|
func (app *BaseApp) Trace() bool {
|
|
return app.trace
|
|
}
|
|
|
|
// MsgServiceRouter returns the MsgServiceRouter of a BaseApp.
|
|
func (app *BaseApp) MsgServiceRouter() *MsgServiceRouter { return app.msgServiceRouter }
|
|
|
|
// GRPCQueryRouter returns the GRPCQueryRouter of a BaseApp.
|
|
func (app *BaseApp) GRPCQueryRouter() *GRPCQueryRouter { return app.grpcQueryRouter }
|
|
|
|
// MountStores mounts all IAVL or DB stores to the provided keys in the BaseApp
|
|
// multistore.
|
|
func (app *BaseApp) MountStores(keys ...storetypes.StoreKey) {
|
|
for _, key := range keys {
|
|
switch key.(type) {
|
|
case *storetypes.KVStoreKey:
|
|
if !app.fauxMerkleMode {
|
|
app.MountStore(key, storetypes.StoreTypeIAVL)
|
|
} else {
|
|
// StoreTypeDB doesn't do anything upon commit, and it doesn't
|
|
// retain history, but it's useful for faster simulation.
|
|
app.MountStore(key, storetypes.StoreTypeDB)
|
|
}
|
|
|
|
case *storetypes.TransientStoreKey:
|
|
app.MountStore(key, storetypes.StoreTypeTransient)
|
|
|
|
case *storetypes.MemoryStoreKey:
|
|
app.MountStore(key, storetypes.StoreTypeMemory)
|
|
|
|
case *storetypes.ObjectStoreKey:
|
|
app.MountStore(key, storetypes.StoreTypeObject)
|
|
|
|
default:
|
|
panic(fmt.Sprintf("Unrecognized store key type :%T", key))
|
|
}
|
|
}
|
|
}
|
|
|
|
// MountKVStores mounts all IAVL or DB stores to the provided keys in the
|
|
// BaseApp multistore.
|
|
func (app *BaseApp) MountKVStores(keys map[string]*storetypes.KVStoreKey) {
|
|
for _, key := range keys {
|
|
if !app.fauxMerkleMode {
|
|
app.MountStore(key, storetypes.StoreTypeIAVL)
|
|
} else {
|
|
// StoreTypeDB doesn't do anything upon commit, and it doesn't
|
|
// retain history, but it's useful for faster simulation.
|
|
app.MountStore(key, storetypes.StoreTypeDB)
|
|
}
|
|
}
|
|
}
|
|
|
|
// MountTransientStores mounts all transient stores to the provided keys in
|
|
// the BaseApp multistore.
|
|
func (app *BaseApp) MountTransientStores(keys map[string]*storetypes.TransientStoreKey) {
|
|
for _, key := range keys {
|
|
app.MountStore(key, storetypes.StoreTypeTransient)
|
|
}
|
|
}
|
|
|
|
// MountMemoryStores mounts all in-memory KVStores with the BaseApp's internal
|
|
// commit multi-store.
|
|
func (app *BaseApp) MountMemoryStores(keys map[string]*storetypes.MemoryStoreKey) {
|
|
skeys := slices.Sorted(maps.Keys(keys))
|
|
for _, key := range skeys {
|
|
memKey := keys[key]
|
|
app.MountStore(memKey, storetypes.StoreTypeMemory)
|
|
}
|
|
}
|
|
|
|
// MountObjectStores mounts all transient object stores with the BaseApp's internal
|
|
// commit multi-store.
|
|
func (app *BaseApp) MountObjectStores(keys map[string]*storetypes.ObjectStoreKey) {
|
|
skeys := slices.Sorted(maps.Keys(keys))
|
|
for _, key := range skeys {
|
|
memKey := keys[key]
|
|
app.MountStore(memKey, storetypes.StoreTypeObject)
|
|
}
|
|
}
|
|
|
|
// MountStore mounts a store to the provided key in the BaseApp multistore,
|
|
// using the default DB.
|
|
func (app *BaseApp) MountStore(key storetypes.StoreKey, typ storetypes.StoreType) {
|
|
app.cms.MountStoreWithDB(key, typ, nil)
|
|
}
|
|
|
|
// LoadLatestVersion loads the latest application version. It will panic if
|
|
// called more than once on a running BaseApp.
|
|
func (app *BaseApp) LoadLatestVersion() error {
|
|
err := app.storeLoader(app.cms)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to load latest version: %w", err)
|
|
}
|
|
|
|
return app.Init()
|
|
}
|
|
|
|
// DefaultStoreLoader will be used by default and loads the latest version
|
|
func DefaultStoreLoader(ms storetypes.CommitMultiStore) error {
|
|
return ms.LoadLatestVersion()
|
|
}
|
|
|
|
// CommitMultiStore returns the root multi-store.
|
|
// App constructor can use this to access the `cms`.
|
|
// UNSAFE: must not be used during the abci life cycle.
|
|
func (app *BaseApp) CommitMultiStore() storetypes.CommitMultiStore {
|
|
return app.cms
|
|
}
|
|
|
|
// SnapshotManager returns the snapshot manager.
|
|
// application use this to register extra extension snapshotters.
|
|
func (app *BaseApp) SnapshotManager() *snapshots.Manager {
|
|
return app.snapshotManager
|
|
}
|
|
|
|
// LoadVersion loads the BaseApp application version. It will panic if called
|
|
// more than once on a running baseapp.
|
|
func (app *BaseApp) LoadVersion(version int64) error {
|
|
app.logger.Info("NOTICE: this could take a long time to migrate IAVL store to fastnode if you enable Fast Node.\n")
|
|
err := app.cms.LoadVersion(version)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to load version %d: %w", version, err)
|
|
}
|
|
|
|
return app.Init()
|
|
}
|
|
|
|
// LastCommitID returns the last CommitID of the multistore.
|
|
func (app *BaseApp) LastCommitID() storetypes.CommitID {
|
|
return app.cms.LastCommitID()
|
|
}
|
|
|
|
// LastBlockHeight returns the last committed block height.
|
|
func (app *BaseApp) LastBlockHeight() int64 {
|
|
return app.cms.LastCommitID().Version
|
|
}
|
|
|
|
// ChainID returns the chainID of the app.
|
|
func (app *BaseApp) ChainID() string {
|
|
return app.chainID
|
|
}
|
|
|
|
// AnteHandler returns the AnteHandler of the app.
|
|
func (app *BaseApp) AnteHandler() sdk.AnteHandler {
|
|
return app.anteHandler
|
|
}
|
|
|
|
// Mempool returns the Mempool of the app.
|
|
func (app *BaseApp) Mempool() mempool.Mempool {
|
|
return app.mempool
|
|
}
|
|
|
|
// Init initializes the app. It seals the app, preventing any
|
|
// further modifications. In addition, it validates the app against
|
|
// the earlier provided settings. Returns an error if validation fails.
|
|
// nil otherwise. Panics if the app is already sealed.
|
|
func (app *BaseApp) Init() error {
|
|
if app.sealed {
|
|
panic("cannot call initFromMainStore: baseapp already sealed")
|
|
}
|
|
|
|
if app.cms == nil {
|
|
return errors.New("commit multi-store must not be nil")
|
|
}
|
|
|
|
if app.stateManager == nil {
|
|
return errors.New("state manager must not be nil")
|
|
}
|
|
|
|
emptyHeader := cmtproto.Header{ChainID: app.chainID}
|
|
|
|
// needed for the export command which inits from store but never calls initchain
|
|
app.stateManager.SetState(execModeCheck, app.cms, emptyHeader, app.logger, app.streamingManager)
|
|
app.Seal()
|
|
|
|
return app.cms.GetPruning().Validate()
|
|
}
|
|
|
|
func (app *BaseApp) setMinGasPrices(gasPrices sdk.DecCoins) {
|
|
app.gasConfig.MinGasPrices = gasPrices
|
|
}
|
|
|
|
func (app *BaseApp) setHaltHeight(haltHeight uint64) {
|
|
app.haltHeight = haltHeight
|
|
}
|
|
|
|
func (app *BaseApp) setHaltTime(haltTime uint64) {
|
|
app.haltTime = haltTime
|
|
}
|
|
|
|
func (app *BaseApp) setMinRetainBlocks(minRetainBlocks uint64) {
|
|
app.minRetainBlocks = minRetainBlocks
|
|
}
|
|
|
|
func (app *BaseApp) setInterBlockCache(cache storetypes.MultiStorePersistentCache) {
|
|
app.interBlockCache = cache
|
|
}
|
|
|
|
func (app *BaseApp) setTrace(trace bool) {
|
|
app.trace = trace
|
|
}
|
|
|
|
func (app *BaseApp) setIndexEvents(ie []string) {
|
|
app.indexEvents = make(map[string]struct{})
|
|
|
|
for _, e := range ie {
|
|
app.indexEvents[e] = struct{}{}
|
|
}
|
|
}
|
|
|
|
// Seal seals a BaseApp. It prohibits any further modifications to a BaseApp.
|
|
func (app *BaseApp) Seal() { app.sealed = true }
|
|
|
|
// IsSealed returns true if the BaseApp is sealed and false otherwise.
|
|
func (app *BaseApp) IsSealed() bool { return app.sealed }
|
|
|
|
// SetCircuitBreaker sets the circuit breaker for the BaseApp.
|
|
// The circuit breaker is checked on every message execution to verify if a transaction should be executed or not.
|
|
func (app *BaseApp) SetCircuitBreaker(cb CircuitBreaker) {
|
|
if app.msgServiceRouter == nil {
|
|
panic("cannot set circuit breaker with no msg service router set")
|
|
}
|
|
app.msgServiceRouter.SetCircuit(cb)
|
|
}
|
|
|
|
// GetConsensusParams returns the current consensus parameters from the BaseApp's
|
|
// ParamStore. If the BaseApp has no ParamStore defined, nil is returned.
|
|
func (app *BaseApp) GetConsensusParams(ctx sdk.Context) cmtproto.ConsensusParams {
|
|
if app.paramStore == nil {
|
|
return cmtproto.ConsensusParams{}
|
|
}
|
|
|
|
cp, err := app.paramStore.Get(ctx)
|
|
if err != nil {
|
|
// This could happen while migrating from v0.45/v0.46 to v0.50, we should
|
|
// allow it to happen so during preblock the upgrade plan can be executed
|
|
// and the consensus params set for the first time in the new format.
|
|
app.logger.Error("failed to get consensus params", "err", err)
|
|
return cmtproto.ConsensusParams{}
|
|
}
|
|
|
|
return cp
|
|
}
|
|
|
|
// StoreConsensusParams sets the consensus parameters to the BaseApp's param
|
|
// store.
|
|
//
|
|
// NOTE: We're explicitly not storing the CometBFT app_version in the param store.
|
|
// It's stored instead in the x/upgrade store, with its own bump logic.
|
|
func (app *BaseApp) StoreConsensusParams(ctx sdk.Context, cp cmtproto.ConsensusParams) error {
|
|
if app.paramStore == nil {
|
|
return errors.New("cannot store consensus params with no params store set")
|
|
}
|
|
|
|
return app.paramStore.Set(ctx, cp)
|
|
}
|
|
|
|
// AddRunTxRecoveryHandler adds custom app.runTx method panic handlers.
|
|
func (app *BaseApp) AddRunTxRecoveryHandler(handlers ...RecoveryHandler) {
|
|
for _, h := range handlers {
|
|
app.runTxRecoveryMiddleware = newRecoveryMiddleware(h, app.runTxRecoveryMiddleware)
|
|
}
|
|
}
|
|
|
|
// GetMaximumBlockGas gets the maximum gas from the consensus params. It panics
|
|
// if maximum block gas is less than negative one and returns zero if negative
|
|
// one.
|
|
func (app *BaseApp) GetMaximumBlockGas(ctx sdk.Context) uint64 {
|
|
cp := app.GetConsensusParams(ctx)
|
|
if cp.Block == nil {
|
|
return 0
|
|
}
|
|
|
|
maxGas := cp.Block.MaxGas
|
|
|
|
switch {
|
|
case maxGas < -1:
|
|
panic(fmt.Sprintf("invalid maximum block gas: %d", maxGas))
|
|
|
|
case maxGas == -1:
|
|
return 0
|
|
|
|
default:
|
|
return uint64(maxGas)
|
|
}
|
|
}
|
|
|
|
func (app *BaseApp) validateFinalizeBlockHeight(req *abci.RequestFinalizeBlock) error {
|
|
if req.Height < 1 {
|
|
return fmt.Errorf("invalid height: %d", req.Height)
|
|
}
|
|
|
|
lastBlockHeight := app.LastBlockHeight()
|
|
|
|
// expectedHeight holds the expected height to validate
|
|
var expectedHeight int64
|
|
if lastBlockHeight == 0 && app.initialHeight > 1 {
|
|
// In this case, we're validating the first block of the chain, i.e no
|
|
// previous commit. The height we're expecting is the initial height.
|
|
expectedHeight = app.initialHeight
|
|
} else {
|
|
// This case can mean two things:
|
|
//
|
|
// - Either there was already a previous commit in the store, in which
|
|
// case we increment the version from there.
|
|
// - Or there was no previous commit, in which case we start at version 1.
|
|
expectedHeight = lastBlockHeight + 1
|
|
}
|
|
|
|
if req.Height != expectedHeight {
|
|
return fmt.Errorf("invalid height: %d; expected: %d", req.Height, expectedHeight)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// validateBasicTxMsgs executes basic validator calls for messages.
|
|
func validateBasicTxMsgs(msgs []sdk.Msg) error {
|
|
if len(msgs) == 0 {
|
|
return errorsmod.Wrap(sdkerrors.ErrInvalidRequest, "must contain at least one message")
|
|
}
|
|
|
|
for _, msg := range msgs {
|
|
m, ok := msg.(sdk.HasValidateBasic)
|
|
if !ok {
|
|
continue
|
|
}
|
|
|
|
if err := m.ValidateBasic(); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (app *BaseApp) getBlockGasMeter(ctx sdk.Context) storetypes.GasMeter {
|
|
if app.disableBlockGasMeter {
|
|
return noopGasMeter{}
|
|
}
|
|
|
|
if maxGas := app.GetMaximumBlockGas(ctx); maxGas > 0 {
|
|
return storetypes.NewGasMeter(maxGas)
|
|
}
|
|
|
|
return storetypes.NewInfiniteGasMeter()
|
|
}
|
|
|
|
func (app *BaseApp) getContextForTx(mode sdk.ExecMode, txBytes []byte, txIndex int) sdk.Context {
|
|
app.mu.Lock()
|
|
defer app.mu.Unlock()
|
|
|
|
modeState := app.stateManager.GetState(mode)
|
|
if modeState == nil {
|
|
panic(fmt.Sprintf("state is nil for mode %v", mode))
|
|
}
|
|
ctx := modeState.Context().
|
|
WithTxBytes(txBytes).
|
|
WithTxIndex(txIndex).
|
|
WithGasMeter(storetypes.NewInfiniteGasMeter())
|
|
// WithVoteInfos(app.voteInfos) // TODO: identify if this is needed
|
|
|
|
ctx = ctx.WithIsSigverifyTx(app.sigverifyTx)
|
|
|
|
ctx = ctx.WithConsensusParams(app.GetConsensusParams(ctx))
|
|
|
|
if mode == execModeReCheck {
|
|
ctx = ctx.WithIsReCheckTx(true)
|
|
}
|
|
|
|
if mode == execModeSimulate {
|
|
ctx, _ = ctx.CacheContext()
|
|
ctx = ctx.WithExecMode(execModeSimulate)
|
|
}
|
|
|
|
return ctx
|
|
}
|
|
|
|
// cacheTxContext returns a new context based off of the provided context with
|
|
// a branched multi-store.
|
|
func (app *BaseApp) cacheTxContext(ctx sdk.Context, txBytes []byte) (sdk.Context, storetypes.CacheMultiStore) {
|
|
ms := ctx.MultiStore()
|
|
msCache := ms.CacheMultiStore()
|
|
if msCache.TracingEnabled() {
|
|
msCache = msCache.SetTracingContext(
|
|
map[string]any{
|
|
"txHash": fmt.Sprintf("%X", tmhash.Sum(txBytes)),
|
|
},
|
|
).(storetypes.CacheMultiStore)
|
|
}
|
|
|
|
return ctx.WithMultiStore(msCache), msCache
|
|
}
|
|
|
|
func (app *BaseApp) preBlock(req *abci.RequestFinalizeBlock) ([]abci.Event, error) {
|
|
var events []abci.Event
|
|
if app.abciHandlers.PreBlocker != nil {
|
|
finalizeState := app.stateManager.GetState(execModeFinalize)
|
|
ctx := finalizeState.Context().WithEventManager(sdk.NewEventManager())
|
|
ctx, span := ctx.StartSpan(tracer, "preBlock")
|
|
defer span.End()
|
|
rsp, err := app.abciHandlers.PreBlocker(ctx, req)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
// rsp.ConsensusParamsChanged is true from preBlocker means ConsensusParams in store get changed
|
|
// write the consensus parameters in store to context
|
|
if rsp.ConsensusParamsChanged {
|
|
ctx = ctx.WithConsensusParams(app.GetConsensusParams(ctx))
|
|
// GasMeter must be set after we get a context with updated consensus params.
|
|
gasMeter := app.getBlockGasMeter(ctx)
|
|
ctx = ctx.WithBlockGasMeter(gasMeter)
|
|
finalizeState.SetContext(ctx)
|
|
}
|
|
events = ctx.EventManager().ABCIEvents()
|
|
events = sdk.MarkEventsToIndex(events, app.indexEvents)
|
|
}
|
|
return events, nil
|
|
}
|
|
|
|
func (app *BaseApp) beginBlock(_ *abci.RequestFinalizeBlock) (sdk.BeginBlock, error) {
|
|
var (
|
|
resp sdk.BeginBlock
|
|
err error
|
|
)
|
|
|
|
if app.abciHandlers.BeginBlocker != nil {
|
|
ctx := app.stateManager.GetState(execModeFinalize).Context()
|
|
ctx, span := ctx.StartSpan(tracer, "beginBlock")
|
|
defer span.End()
|
|
resp, err = app.abciHandlers.BeginBlocker(ctx)
|
|
if err != nil {
|
|
return resp, err
|
|
}
|
|
|
|
// append BeginBlock attributes to all events in the EndBlock response
|
|
for i, event := range resp.Events {
|
|
resp.Events[i].Attributes = append(
|
|
event.Attributes,
|
|
abci.EventAttribute{Key: "mode", Value: "BeginBlock"},
|
|
)
|
|
}
|
|
|
|
resp.Events = sdk.MarkEventsToIndex(resp.Events, app.indexEvents)
|
|
}
|
|
|
|
return resp, nil
|
|
}
|
|
|
|
func (app *BaseApp) deliverTx(tx []byte, txMultiStore storetypes.MultiStore, txIndex int, incarnationCache map[string]any) *abci.ExecTxResult {
|
|
gInfo := sdk.GasInfo{}
|
|
resultStr := "successful"
|
|
|
|
var resp *abci.ExecTxResult
|
|
|
|
defer func() {
|
|
telemetry.IncrCounter(1, "tx", "count") //nolint:staticcheck // TODO: switch to OpenTelemetry
|
|
telemetry.IncrCounter(1, "tx", resultStr) //nolint:staticcheck // TODO: switch to OpenTelemetry
|
|
telemetry.SetGauge(float32(gInfo.GasUsed), "tx", "gas", "used") //nolint:staticcheck // TODO: switch to OpenTelemetry
|
|
telemetry.SetGauge(float32(gInfo.GasWanted), "tx", "gas", "wanted") //nolint:staticcheck // TODO: switch to OpenTelemetry
|
|
}()
|
|
|
|
gInfo, result, anteEvents, err := app.RunTx(execModeFinalize, tx, nil, txIndex, txMultiStore, incarnationCache)
|
|
if err != nil {
|
|
resultStr = "failed"
|
|
resp = sdkerrors.ResponseExecTxResultWithEvents(
|
|
err,
|
|
gInfo.GasWanted,
|
|
gInfo.GasUsed,
|
|
sdk.MarkEventsToIndex(anteEvents, app.indexEvents),
|
|
app.trace,
|
|
)
|
|
return resp
|
|
}
|
|
|
|
resp = &abci.ExecTxResult{
|
|
GasWanted: int64(gInfo.GasWanted),
|
|
GasUsed: int64(gInfo.GasUsed),
|
|
Log: result.Log,
|
|
Data: result.Data,
|
|
Events: sdk.MarkEventsToIndex(result.Events, app.indexEvents),
|
|
}
|
|
|
|
return resp
|
|
}
|
|
|
|
// endBlock is an application-defined function that is called after transactions
|
|
// have been processed in FinalizeBlock.
|
|
func (app *BaseApp) endBlock() (sdk.EndBlock, error) {
|
|
var endblock sdk.EndBlock
|
|
|
|
if app.abciHandlers.EndBlocker != nil {
|
|
ctx := app.stateManager.GetState(execModeFinalize).Context()
|
|
ctx, span := ctx.StartSpan(tracer, "endBlock")
|
|
defer span.End()
|
|
eb, err := app.abciHandlers.EndBlocker(ctx)
|
|
if err != nil {
|
|
return endblock, err
|
|
}
|
|
|
|
// append EndBlock attributes to all events in the EndBlock response
|
|
for i, event := range eb.Events {
|
|
eb.Events[i].Attributes = append(
|
|
event.Attributes,
|
|
abci.EventAttribute{Key: "mode", Value: "EndBlock"},
|
|
)
|
|
}
|
|
|
|
eb.Events = sdk.MarkEventsToIndex(eb.Events, app.indexEvents)
|
|
endblock = eb
|
|
}
|
|
|
|
return endblock, nil
|
|
}
|
|
|
|
// RunTx processes a transaction within a given execution mode, encoded transaction
|
|
// bytes, and the decoded transaction itself. All state transitions occur through
|
|
// a cached Context depending on the mode provided. State only gets persisted
|
|
// if all messages get executed successfully and the execution mode is DeliverTx.
|
|
// Note, gas execution info is always returned. A reference to a Result is
|
|
// returned if the tx does not run out of gas and if all the messages are valid
|
|
// and execute successfully. An error is returned otherwise.
|
|
// both txbytes and the decoded tx are passed to runTx to avoid the state machine encoding the tx and decoding the transaction twice
|
|
// passing the decoded tx to runTX is optional, it will be decoded if the tx is nil
|
|
func (app *BaseApp) RunTx(mode sdk.ExecMode, txBytes []byte, tx sdk.Tx, txIndex int, txMultiStore storetypes.MultiStore, incarnationCache map[string]any) (gInfo sdk.GasInfo, result *sdk.Result, anteEvents []abci.Event, err error) {
|
|
ctx := app.getContextForTx(mode, txBytes, txIndex)
|
|
ctx, span := ctx.StartSpan(tracer, "runTx")
|
|
defer span.End()
|
|
|
|
// NOTE: GasWanted should be returned by the AnteHandler. GasUsed is
|
|
// determined by the GasMeter. We need access to the context to get the gas
|
|
// meter, so we initialize upfront.
|
|
var gasWanted uint64
|
|
|
|
if incarnationCache != nil {
|
|
ctx = ctx.WithIncarnationCache(incarnationCache)
|
|
}
|
|
if txMultiStore != nil {
|
|
ctx = ctx.WithMultiStore(txMultiStore)
|
|
}
|
|
ms := ctx.MultiStore()
|
|
|
|
// only run the tx if there is block gas remaining
|
|
if mode == sdk.ExecModeFinalize && ctx.BlockGasMeter().IsOutOfGas() {
|
|
return gInfo, nil, nil, errorsmod.Wrap(sdkerrors.ErrOutOfGas, "no block gas left to run tx")
|
|
}
|
|
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
recoveryMW := newOutOfGasRecoveryMiddleware(gasWanted, ctx, app.runTxRecoveryMiddleware)
|
|
err, result = processRecovery(r, recoveryMW), nil
|
|
ctx.Logger().Error("panic recovered in runTx", "err", err)
|
|
}
|
|
|
|
gInfo = sdk.GasInfo{GasWanted: gasWanted, GasUsed: ctx.GasMeter().GasConsumed()}
|
|
}()
|
|
|
|
blockGasConsumed := false
|
|
|
|
// consumeBlockGas makes sure block gas is consumed at most once. It must
|
|
// happen after tx processing, and must be executed even if tx processing
|
|
// fails. Hence, it's execution is deferred.
|
|
consumeBlockGas := func() {
|
|
if !blockGasConsumed {
|
|
blockGasConsumed = true
|
|
ctx.BlockGasMeter().ConsumeGas(
|
|
ctx.GasMeter().GasConsumedToLimit(), "block gas meter",
|
|
)
|
|
}
|
|
}
|
|
|
|
// If BlockGasMeter() panics it will be caught by the above recover and will
|
|
// return an error - in any case BlockGasMeter will consume gas past the limit.
|
|
//
|
|
// NOTE: consumeBlockGas must exist in a separate defer function from the
|
|
// general deferred recovery function to recover from consumeBlockGas as it'll
|
|
// be executed first (deferred statements are executed as stack).
|
|
if mode == execModeFinalize {
|
|
defer consumeBlockGas()
|
|
}
|
|
|
|
// if the transaction is not decoded, decode it here
|
|
if tx == nil {
|
|
tx, err = app.txDecoder(txBytes)
|
|
if err != nil {
|
|
return sdk.GasInfo{GasUsed: 0, GasWanted: 0}, nil, nil, sdkerrors.ErrTxDecode.Wrap(err.Error())
|
|
}
|
|
}
|
|
|
|
msgs := tx.GetMsgs()
|
|
if err := validateBasicTxMsgs(msgs); err != nil {
|
|
return sdk.GasInfo{}, nil, nil, err
|
|
}
|
|
|
|
for _, msg := range msgs {
|
|
handler := app.msgServiceRouter.Handler(msg)
|
|
if handler == nil {
|
|
return sdk.GasInfo{}, nil, nil, errorsmod.Wrapf(sdkerrors.ErrUnknownRequest, "no message handler found for %T", msg)
|
|
}
|
|
}
|
|
|
|
if app.anteHandler != nil {
|
|
var (
|
|
anteCtx sdk.Context
|
|
msCache storetypes.CacheMultiStore
|
|
)
|
|
|
|
// Branch context before AnteHandler call in case it aborts.
|
|
// This is required for both CheckTx and DeliverTx.
|
|
// Ref: https://github.com/cosmos/cosmos-sdk/issues/2772
|
|
//
|
|
// NOTE: Alternatively, we could require that AnteHandler ensures that
|
|
// writes do not happen if aborted/failed. This may have some
|
|
// performance benefits, but it'll be more difficult to get right.
|
|
anteCtx, msCache = app.cacheTxContext(ctx, txBytes)
|
|
anteCtx = anteCtx.WithEventManager(sdk.NewEventManager())
|
|
anteCtx, anteSpan := anteCtx.StartSpan(tracer, "anteHandler")
|
|
newCtx, err := app.anteHandler(anteCtx, tx, mode == execModeSimulate)
|
|
anteSpan.End()
|
|
|
|
if !newCtx.IsZero() {
|
|
// At this point, newCtx.MultiStore() is a store branch, or something else
|
|
// replaced by the AnteHandler. We want the original multistore.
|
|
//
|
|
// Also, in the case of the tx aborting, we need to track gas consumed via
|
|
// the instantiated gas meter in the AnteHandler, so we update the context
|
|
// prior to returning.
|
|
ctx = newCtx.WithMultiStore(ms)
|
|
}
|
|
|
|
events := ctx.EventManager().Events()
|
|
|
|
// GasMeter expected to be set in AnteHandler
|
|
gasWanted = ctx.GasMeter().Limit()
|
|
|
|
if err != nil {
|
|
if mode == execModeReCheck {
|
|
// if the ante handler fails on recheck, we want to remove the tx from the mempool
|
|
if mempoolErr := app.mempool.Remove(tx); mempoolErr != nil {
|
|
return gInfo, nil, anteEvents, errors.Join(err, mempoolErr)
|
|
}
|
|
}
|
|
return gInfo, nil, nil, err
|
|
}
|
|
|
|
msCache.Write()
|
|
anteEvents = events.ToABCIEvents()
|
|
}
|
|
|
|
switch mode {
|
|
case execModeCheck:
|
|
err = app.mempool.Insert(ctx, tx)
|
|
if err != nil {
|
|
return gInfo, nil, anteEvents, err
|
|
}
|
|
case execModeFinalize:
|
|
err = app.mempool.Remove(tx)
|
|
if err != nil && !errors.Is(err, mempool.ErrTxNotFound) {
|
|
return gInfo, nil, anteEvents,
|
|
fmt.Errorf("failed to remove tx from mempool: %w", err)
|
|
}
|
|
}
|
|
|
|
// Create a new Context based off of the existing Context with a MultiStore branch
|
|
// in case message processing fails. At this point, the MultiStore
|
|
// is a branch of a branch.
|
|
runMsgCtx, msCache := app.cacheTxContext(ctx, txBytes)
|
|
|
|
// Attempt to execute all messages and only update state if all messages pass
|
|
// and we're in DeliverTx. Note, runMsgs will never return a reference to a
|
|
// Result if any single message fails or does not have a registered Handler.
|
|
msgsV2, err := tx.GetMsgsV2()
|
|
if err == nil {
|
|
result, err = app.runMsgs(runMsgCtx, msgs, msgsV2, mode)
|
|
}
|
|
|
|
// Run optional postHandlers (should run regardless of the execution result).
|
|
//
|
|
// Note: If the postHandler fails, we also revert the runMsgs state.
|
|
if app.postHandler != nil {
|
|
// The runMsgCtx context currently contains events emitted by the ante handler.
|
|
// We clear this to correctly order events without duplicates.
|
|
// Note that the state is still preserved.
|
|
postCtx := runMsgCtx.WithEventManager(sdk.NewEventManager())
|
|
|
|
newCtx, errPostHandler := app.postHandler(postCtx, tx, mode == execModeSimulate, err == nil)
|
|
if errPostHandler != nil {
|
|
if err == nil {
|
|
// when the msg was handled successfully, return the post handler error only
|
|
return gInfo, nil, anteEvents, errPostHandler
|
|
}
|
|
// otherwise append to the msg error so that we keep the original error code for better user experience
|
|
return gInfo, nil, anteEvents, errorsmod.Wrapf(err, "postHandler: %s", errPostHandler)
|
|
}
|
|
|
|
// we don't want runTx to panic if runMsgs has failed earlier
|
|
if result == nil {
|
|
result = &sdk.Result{}
|
|
}
|
|
result.Events = append(result.Events, newCtx.EventManager().ABCIEvents()...)
|
|
}
|
|
|
|
if err == nil {
|
|
if mode == execModeFinalize {
|
|
// When block gas exceeds, it'll panic and won't commit the cached store.
|
|
consumeBlockGas()
|
|
|
|
msCache.Write()
|
|
|
|
txCounter.Add(ctx, 1)
|
|
}
|
|
|
|
if len(anteEvents) > 0 && (mode == execModeFinalize || mode == execModeSimulate) {
|
|
// append the events in the order of occurrence
|
|
result.Events = append(anteEvents, result.Events...)
|
|
}
|
|
}
|
|
|
|
return gInfo, result, anteEvents, err
|
|
}
|
|
|
|
// runMsgs iterates through a list of messages and executes them with the provided
|
|
// Context and execution mode. Messages will only be executed during simulation
|
|
// and DeliverTx. An error is returned if any single message fails or if a
|
|
// Handler does not exist for a given message route. Otherwise, a reference to a
|
|
// Result is returned. The caller must not commit state if an error is returned.
|
|
func (app *BaseApp) runMsgs(ctx sdk.Context, msgs []sdk.Msg, msgsV2 []protov2.Message, mode sdk.ExecMode) (*sdk.Result, error) {
|
|
ctx, span := ctx.StartSpan(tracer, "runMsgs")
|
|
defer span.End()
|
|
|
|
events := sdk.EmptyEvents()
|
|
var msgResponses []*codectypes.Any
|
|
|
|
// NOTE: GasWanted is determined by the AnteHandler and GasUsed by the GasMeter.
|
|
for i, msg := range msgs {
|
|
if mode != execModeFinalize && mode != execModeSimulate {
|
|
break
|
|
}
|
|
|
|
ctx = ctx.WithMsgIndex(i)
|
|
|
|
handler := app.msgServiceRouter.Handler(msg)
|
|
if handler == nil {
|
|
return nil, errorsmod.Wrapf(sdkerrors.ErrUnknownRequest, "no message handler found for %T", msg)
|
|
}
|
|
|
|
ctx, msgSpan := ctx.StartSpan(tracer, "msgHandler",
|
|
trace.WithAttributes(
|
|
attribute.String("msg_type", sdk.MsgTypeURL(msg)),
|
|
attribute.Int("msg_index", i),
|
|
),
|
|
)
|
|
// ADR 031 request type routing
|
|
msgResult, err := handler(ctx, msg)
|
|
if err != nil {
|
|
return nil, errorsmod.Wrapf(err, "failed to execute message; message index: %d", i)
|
|
}
|
|
msgSpan.End()
|
|
|
|
// create message events
|
|
msgEvents, err := createEvents(app.cdc, msgResult.GetEvents(), msg, msgsV2[i])
|
|
if err != nil {
|
|
return nil, errorsmod.Wrapf(err, "failed to create message events; message index: %d", i)
|
|
}
|
|
|
|
// append message events and data
|
|
//
|
|
// Note: Each message result's data must be length-prefixed in order to
|
|
// separate each result.
|
|
for j, event := range msgEvents {
|
|
// append message index to all events
|
|
msgEvents[j] = event.AppendAttributes(sdk.NewAttribute("msg_index", strconv.Itoa(i)))
|
|
}
|
|
|
|
events = events.AppendEvents(msgEvents)
|
|
|
|
// Each individual sdk.Result that went through the MsgServiceRouter
|
|
// (which should represent 99% of the Msgs now, since everyone should
|
|
// be using protobuf Msgs) has exactly one Msg response, set inside
|
|
// `WrapServiceResult`. We take that Msg response, and aggregate it
|
|
// into an array.
|
|
if len(msgResult.MsgResponses) > 0 {
|
|
msgResponse := msgResult.MsgResponses[0]
|
|
if msgResponse == nil {
|
|
return nil, sdkerrors.ErrLogic.Wrapf("got nil Msg response at index %d for msg %s", i, sdk.MsgTypeURL(msg))
|
|
}
|
|
msgResponses = append(msgResponses, msgResponse)
|
|
}
|
|
|
|
}
|
|
|
|
data, err := makeABCIData(msgResponses)
|
|
if err != nil {
|
|
return nil, errorsmod.Wrap(err, "failed to marshal tx data")
|
|
}
|
|
|
|
return &sdk.Result{
|
|
Data: data,
|
|
Events: events.ToABCIEvents(),
|
|
MsgResponses: msgResponses,
|
|
}, nil
|
|
}
|
|
|
|
// makeABCIData generates the Data field to be sent to ABCI Check/DeliverTx.
|
|
func makeABCIData(msgResponses []*codectypes.Any) ([]byte, error) {
|
|
return proto.Marshal(&sdk.TxMsgData{MsgResponses: msgResponses})
|
|
}
|
|
|
|
func createEvents(cdc codec.Codec, events sdk.Events, msg sdk.Msg, msgV2 protov2.Message) (sdk.Events, error) {
|
|
eventMsgName := sdk.MsgTypeURL(msg)
|
|
msgEvent := sdk.NewEvent(sdk.EventTypeMessage, sdk.NewAttribute(sdk.AttributeKeyAction, eventMsgName))
|
|
|
|
// we set the signer attribute as the sender
|
|
signers, err := cdc.GetMsgV2Signers(msgV2)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if len(signers) > 0 && signers[0] != nil {
|
|
addrStr, err := cdc.InterfaceRegistry().SigningContext().AddressCodec().BytesToString(signers[0])
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
msgEvent = msgEvent.AppendAttributes(sdk.NewAttribute(sdk.AttributeKeySender, addrStr))
|
|
}
|
|
|
|
// verify that events have no module attribute set
|
|
if _, found := events.GetAttributes(sdk.AttributeKeyModule); !found {
|
|
if moduleName := sdk.GetModuleNameFromTypeURL(eventMsgName); moduleName != "" {
|
|
msgEvent = msgEvent.AppendAttributes(sdk.NewAttribute(sdk.AttributeKeyModule, moduleName))
|
|
}
|
|
}
|
|
|
|
return sdk.Events{msgEvent}.AppendEvents(events), nil
|
|
}
|
|
|
|
// PrepareProposalVerifyTx performs transaction verification when a proposer is
|
|
// creating a block proposal during PrepareProposal. Any state committed to the
|
|
// PrepareProposal state internally will be discarded. <nil, err> will be
|
|
// returned if the transaction cannot be encoded. <bz, nil> will be returned if
|
|
// the transaction is valid, otherwise <bz, err> will be returned.
|
|
func (app *BaseApp) PrepareProposalVerifyTx(tx sdk.Tx) ([]byte, error) {
|
|
bz, err := app.txEncoder(tx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
_, _, _, err = app.RunTx(execModePrepareProposal, bz, tx, -1, nil, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return bz, nil
|
|
}
|
|
|
|
// ProcessProposalVerifyTx performs transaction verification when receiving a
|
|
// block proposal during ProcessProposal. Any state committed to the
|
|
// ProcessProposal state internally will be discarded. <nil, err> will be
|
|
// returned if the transaction cannot be decoded. <Tx, nil> will be returned if
|
|
// the transaction is valid, otherwise <Tx, err> will be returned.
|
|
func (app *BaseApp) ProcessProposalVerifyTx(txBz []byte) (sdk.Tx, error) {
|
|
tx, err := app.txDecoder(txBz)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
_, _, _, err = app.RunTx(execModeProcessProposal, txBz, tx, -1, nil, nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return tx, nil
|
|
}
|
|
|
|
func (app *BaseApp) TxDecode(txBytes []byte) (sdk.Tx, error) {
|
|
return app.txDecoder(txBytes)
|
|
}
|
|
|
|
func (app *BaseApp) TxEncode(tx sdk.Tx) ([]byte, error) {
|
|
return app.txEncoder(tx)
|
|
}
|
|
|
|
func (app *BaseApp) StreamingManager() storetypes.StreamingManager {
|
|
return app.streamingManager
|
|
}
|
|
|
|
// Close is called in start cmd to gracefully cleanup resources.
|
|
func (app *BaseApp) Close() error {
|
|
var errs []error
|
|
|
|
// Close app.db (opened by cosmos-sdk/server/start.go call to openDB)
|
|
if app.db != nil {
|
|
app.logger.Info("Closing application.db")
|
|
if err := app.db.Close(); err != nil {
|
|
errs = append(errs, err)
|
|
}
|
|
}
|
|
|
|
// Close app.snapshotManager
|
|
// - opened when app chains use cosmos-sdk/server/util.go/DefaultBaseappOptions (boilerplate)
|
|
// - which calls cosmos-sdk/server/util.go/GetSnapshotStore
|
|
// - which is passed to baseapp/options.go/SetSnapshot
|
|
// - to set app.snapshotManager = snapshots.NewManager
|
|
if app.snapshotManager != nil {
|
|
app.logger.Info("Closing snapshots/metadata.db")
|
|
if err := app.snapshotManager.Close(); err != nil {
|
|
errs = append(errs, err)
|
|
}
|
|
}
|
|
|
|
return errors.Join(errs...)
|
|
}
|
|
|
|
// GetBaseApp returns the pointer to itself.
|
|
func (app *BaseApp) GetBaseApp() *BaseApp {
|
|
return app
|
|
}
|