235bc6a2cb
* Write state diff to CSV (#2) * port statediff from9b7fd9af80/statediff/statediff.go
; minor fixes * integrating state diff extracting, building, and persisting into geth processes * work towards persisting created statediffs in ipfs; based off github.com/vulcanize/eth-block-extractor * Add a state diff service * Remove diff extractor from blockchain * Update imports * Move statediff on/off check to geth cmd config * Update starting state diff service * Add debugging logs for creating diff * Add statediff extractor and builder tests and small refactoring * Start to write statediff to a CSV * Restructure statediff directory * Pull CSV publishing methods into their own file * Reformatting due to go fmt * Add gomega to vendor dir * Remove testing focuses * Update statediff tests to use golang test pkg instead of ginkgo - builder_test - extractor_test - publisher_test * Use hexutil.Encode instead of deprecated common.ToHex * Remove OldValue from DiffBigInt and DiffUint64 fields * Update builder test * Remove old storage value from updated accounts * Remove old values from created/deleted accounts * Update publisher to account for only storing current account values * Update service loop and fetching previous block * Update testing - remove statediff ginkgo test suite file - move mocks to their own dir * Updates per go fmt * Updates to tests * Pass statediff mode and path in through cli * Return filename from publisher * Remove some duplication in builder * Remove code field from state diff output this is the contract byte code, and it can still be obtained by querying the db by the codeHash * Consolidate acct diff structs for updated & updated/deleted accts * Include block number in csv filename * Clean up error logging * Cleanup formatting, spelling, etc * Address PR comments * Add contract address and storage value to csv * Refactor accumulating account row in csv publisher * Add DiffStorage struct * Add storage key to csv * Address PR comments * Fix publisher to include rows for accounts that don't have store updates * Update builder test after merging in release/1.8 * Update test contract to include storage on contract intialization - so that we're able to test that storage diffing works for created and deleted accounts (not just updated accounts). * Factor out a common trie iterator method in builder * Apply goimports to statediff * Apply gosimple changes to statediff * Gracefully exit geth command(#4) * Statediff for full node (#6) * Open a trie from the in-memory database * Use a node's LeafKey as an identifier instead of the address It was proving difficult to find look the address up from a given path with a full node (sometimes the value wouldn't exist in the disk db). So, instead, for now we are using the node's LeafKey with is a Keccak256 hash of the address, so if we know the address we can figure out which LeafKey it matches up to. * Make sure that statediff has been processed before pruning * Use blockchain stateCache.OpenTrie for storage diffs * Clean up log lines and remove unnecessary fields from builder * Apply go fmt changes * Add a sleep to the blockchain test * refactoring/reorganizing packages * refactoring statediff builder and types and adjusted to relay proofs and paths (still need to make this optional) * refactoring state diff service and adding api which allows for streaming state diff payloads over an rpc websocket subscription * make proofs and paths optional + compress service loop into single for loop (may be missing something here) * option to process intermediate nodes * make state diff rlp serializable * cli parameter to limit statediffing to select account addresses + test * review fixes and fixes for issues ran into in integration * review fixes; proper method signature for api; adjust service so that statediff processing is halted/paused until there is at least one subscriber listening for the results * adjust buffering to improve stability; doc.go; fix notifier err handling * relay receipts with the rest of the data + review fixes/changes * rpc method to get statediff at specific block; requires archival node or the block be within the pruning range * fix linter issues * include total difficulty to the payload * fix state diff builder: emit actual leaf nodes instead of value nodes; diff on the leaf not on the value; emit correct path for intermediate nodes * adjust statediff builder tests to changes and extend to test intermediate nodes; golint * add genesis block to test; handle block 0 in StateDiffAt * rlp files for mainnet blocks 0-3, for tests * builder test on mainnet blocks * common.BytesToHash(path) => crypto.Keaccak256(hash) in builder; BytesToHash produces same hash for e.g. []byte{} and []byte{\x00} - prefix \x00 steps are inconsequential to the hash result * complete tests for early mainnet blocks * diff type for representing deleted accounts * fix builder so that we handle account deletions properly and properly diff storage when an account is moved to a new path; update params * remove cli params; moving them to subscriber defined * remove unneeded bc methods * update service and api; statediffing params are now defined by user through api rather than by service provider by cli * update top level tests * add ability to watch specific storage slots (leaf keys) only * comments; explain logic * update mainnet blocks test * update api_test.go * storage leafkey filter test * cleanup chain maker * adjust chain maker for tests to add an empty account in block1 and switch to EIP-158 afterwards (now we just need to generate enough accounts until one causes the empty account to be touched and removed post-EIP-158 so we can simulate and test that process...); also added 2 new blocks where more contract storage is set and old slots are set to zero so they are removed so we can test that * found an account whose creation causes the empty account to be moved to a new path; this should count as 'touching; the empty account and cause it to be removed according to eip-158... but it doesn't * use new contract in unit tests that has self-destruct ability, so we can test eip-158 since simply moving an account to new path doesn't count as 'touchin' it * handle storage deletions * tests for eip-158 account removal and storage value deletions; there is one edge case left to test where we remove 1 account when only two exist such that the remaining account is moved up and replaces the root branch node * finish testing known edge cases * add endpoint to fetch all state and storage nodes at a given blockheight; useful for generating a recent atate cache/snapshot that we can diff forward from rather than needing to collect all diffs from genesis * test for state trie builder * if statediffing is on, lock tries in triedb until the statediffing service signals they are done using them * fix mock blockchain; golint; bump patch * increase maxRequestContentLength; bump patch * log the sizes of the state objects we are sending * CI build (#20) * CI: run build on PR and on push to master * CI: debug building geth * CI: fix coping file * CI: fix coping file v2 * CI: temporary upload file to release asset * CI: get release upload_url by tag, upload asset to current relase * CI: fix tag name * fix ci build on statediff_at_anyblock-1.9.11 branch * fix publishing assets in release * use context deadline for timeout in eth_call * collect and emit codehash=>code mappings for state objects * subscription endpoint for retrieving all the codehash=>code mappings that exist at provided height * Implement WriteStateDiffAt * Writes state diffs directly to postgres * Adds CLI flags to configure PG * Refactors builder output with callbacks * Copies refactored postgres handling code from ipld-eth-indexer * rename PostgresCIDWriter.{index->upsert}* * go.mod update * rm unused * cleanup * output code & codehash iteratively * had to rf some types for this * prometheus metrics output * duplicate recent eth-indexer changes * migrations and metrics... * [wip] prom.Init() here? another CLI flag? * tidy & DRY * statediff WriteLoop service + CLI flag * [wip] update test mocks * todo - do something meaningful to test write loop * logging * use geth log * port tests to go testing * drop ginkgo/gomega * fix and cleanup tests * fail before defer statement * delete vendor/ dir * fixes after rebase onto 1.9.23 * fix API registration * use golang 1.15.5 version (#34) * bump version meta; add 0.0.11 branch to actions * bump version meta; update github actions workflows * statediff: refactor metrics * Remove redundant statediff/indexer/prom tooling and use existing prometheus integration. * "indexer" namespace for metrics * add reporting loop for db metrics * doc * metrics for statediff stats * metrics namespace/subsystem = statediff/{indexer,service} * statediff: use a worker pool (for direct writes) * fix test * fix chain event subscription * log tweaks * func name * unused import * intermediate chain event channel for metrics * update github actions; linting * add poststate and status to receipt ipld indexes * stateDiffFor endpoints for fetching or writing statediff object by blockhash; bump statediff version * fixes after rebase on to v1.10.1 * update github actions and version meta; go fmt * add leaf key to removed 'nodes' * include Postgres migrations and schema * service documentation * touching up update github actions after rebase fix connection leak (misplaced defer) and perform proper rollback on errs improve error logging; handle PushBlock internal err * build docker image and publish it to Docker Hub on release * add access list tx to unit tests * MarshalBinary and UnmarshalBinary methods for receipt * fix error caused by 2718 by using MarshalBinary instead of EncodeRLP methods * ipld encoding/decoding tests * update TxModel; add AccessListElementModel * index tx type and access lists * add access list metrics * unit tests for tx_type and access list table * unit tests for receipt marshal/unmarshal binary methods * improve documentation of the encoding methods * fix issue identified in linting update github actions and version meta after rebase unit test that fails undeterministically on eip2930 txs, giving same error we are seeing in prod fix bug Include genesis block state diff. Fix linting issue. documentation on versioning, rebasing, releasing; bump version meta Add geth and statediff unit test to CI. Set pgpassword in env. Added comments. Add new major branch to github action. Fix failing test. Fix lint errors. Add support for Dynamic txn(EIP-1559). Update version meta to 0.0.24 Verify block base fee in test. Fix base_fee type and add backward compatible test. Remove type definition for AccessListElementModel Change basefee to int64/bigint. block and uncle reward in PoA network = 0 (#87) * in PoA networks there is no block and uncle rewards * bump meta version (cherry picked from commitb64ca14689
) Use Ropsten to test block reward. Add Makefile target to build static linux binaries. Strip symbol tables from static binaries. Fix block_fee to support NULL values. bump version meta. Add new major branch to github action. Add new major branch to github action. Add new major branch to github action. Add new major branch to github action. rename doc.go to README.md Create a seperate table for storing logs Self review Bump statediff version to 0.0.26. add btree index to state/storage_cids.node_type; updated schema Dedup receipt data. Fix linter errors. Address comments. Bump statediff version to 0.0.27. new cli flag for initializing db first time service is ran only write Removed node ipld block (on db init) and reuse constant cid and mhkey linting test new handling of Removed nodes; don't require init flag log metrics Add new major branch to github action. Fix build. Update golang version in CI. Use ipld-eth-db in testing. Remove migration from repo. Add new major branch to github action. Use `GetTd` instead of `GetTdByHash`6289137827
748 lines
28 KiB
Go
748 lines
28 KiB
Go
// Copyright 2019 The go-ethereum Authors
|
|
// This file is part of the go-ethereum library.
|
|
//
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
// Contains a batch of utility type declarations used by the tests. As the node
|
|
// operates on unique types, a lot of them are needed to check various features.
|
|
|
|
package statediff
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
"github.com/ethereum/go-ethereum/core/state"
|
|
"github.com/ethereum/go-ethereum/core/types"
|
|
"github.com/ethereum/go-ethereum/crypto"
|
|
"github.com/ethereum/go-ethereum/log"
|
|
"github.com/ethereum/go-ethereum/rlp"
|
|
sdtrie "github.com/ethereum/go-ethereum/statediff/trie"
|
|
. "github.com/ethereum/go-ethereum/statediff/types"
|
|
"github.com/ethereum/go-ethereum/trie"
|
|
)
|
|
|
|
var (
|
|
nullHashBytes = common.Hex2Bytes("0000000000000000000000000000000000000000000000000000000000000000")
|
|
emptyNode, _ = rlp.EncodeToBytes([]byte{})
|
|
emptyContractRoot = crypto.Keccak256Hash(emptyNode)
|
|
nullCodeHash = crypto.Keccak256Hash([]byte{}).Bytes()
|
|
)
|
|
|
|
// Builder interface exposes the method for building a state diff between two blocks
|
|
type Builder interface {
|
|
BuildStateDiffObject(args Args, params Params) (StateObject, error)
|
|
BuildStateTrieObject(current *types.Block) (StateObject, error)
|
|
WriteStateDiffObject(args StateRoots, params Params, output StateNodeSink, codeOutput CodeSink) error
|
|
}
|
|
|
|
type builder struct {
|
|
stateCache state.Database
|
|
}
|
|
|
|
// convenience
|
|
func stateNodeAppender(nodes *[]StateNode) StateNodeSink {
|
|
return func(node StateNode) error {
|
|
*nodes = append(*nodes, node)
|
|
return nil
|
|
}
|
|
}
|
|
func storageNodeAppender(nodes *[]StorageNode) StorageNodeSink {
|
|
return func(node StorageNode) error {
|
|
*nodes = append(*nodes, node)
|
|
return nil
|
|
}
|
|
}
|
|
func codeMappingAppender(codeAndCodeHashes *[]CodeAndCodeHash) CodeSink {
|
|
return func(c CodeAndCodeHash) error {
|
|
*codeAndCodeHashes = append(*codeAndCodeHashes, c)
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// NewBuilder is used to create a statediff builder
|
|
func NewBuilder(stateCache state.Database) Builder {
|
|
return &builder{
|
|
stateCache: stateCache, // state cache is safe for concurrent reads
|
|
}
|
|
}
|
|
|
|
// BuildStateTrieObject builds a state trie object from the provided block
|
|
func (sdb *builder) BuildStateTrieObject(current *types.Block) (StateObject, error) {
|
|
currentTrie, err := sdb.stateCache.OpenTrie(current.Root())
|
|
if err != nil {
|
|
return StateObject{}, fmt.Errorf("error creating trie for block %d: %v", current.Number(), err)
|
|
}
|
|
it := currentTrie.NodeIterator([]byte{})
|
|
stateNodes, codeAndCodeHashes, err := sdb.buildStateTrie(it)
|
|
if err != nil {
|
|
return StateObject{}, fmt.Errorf("error collecting state nodes for block %d: %v", current.Number(), err)
|
|
}
|
|
return StateObject{
|
|
BlockNumber: current.Number(),
|
|
BlockHash: current.Hash(),
|
|
Nodes: stateNodes,
|
|
CodeAndCodeHashes: codeAndCodeHashes,
|
|
}, nil
|
|
}
|
|
|
|
func (sdb *builder) buildStateTrie(it trie.NodeIterator) ([]StateNode, []CodeAndCodeHash, error) {
|
|
stateNodes := make([]StateNode, 0)
|
|
codeAndCodeHashes := make([]CodeAndCodeHash, 0)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := sdtrie.ResolveNode(it, sdb.stateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
switch node.NodeType {
|
|
case Leaf:
|
|
var account types.StateAccount
|
|
if err := rlp.DecodeBytes(nodeElements[1].([]byte), &account); err != nil {
|
|
return nil, nil, fmt.Errorf("error decoding account for leaf node at path %x nerror: %v", node.Path, err)
|
|
}
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
node.LeafKey = leafKey
|
|
if !bytes.Equal(account.CodeHash, nullCodeHash) {
|
|
var storageNodes []StorageNode
|
|
err := sdb.buildStorageNodesEventual(account.Root, nil, true, storageNodeAppender(&storageNodes))
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("failed building eventual storage diffs for account %+v\r\nerror: %v", account, err)
|
|
}
|
|
node.StorageNodes = storageNodes
|
|
// emit codehash => code mappings for cod
|
|
codeHash := common.BytesToHash(account.CodeHash)
|
|
code, err := sdb.stateCache.ContractCode(common.Hash{}, codeHash)
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("failed to retrieve code for codehash %s\r\n error: %v", codeHash.String(), err)
|
|
}
|
|
codeAndCodeHashes = append(codeAndCodeHashes, CodeAndCodeHash{
|
|
Hash: codeHash,
|
|
Code: code,
|
|
})
|
|
}
|
|
stateNodes = append(stateNodes, node)
|
|
case Extension, Branch:
|
|
stateNodes = append(stateNodes, node)
|
|
default:
|
|
return nil, nil, fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
}
|
|
return stateNodes, codeAndCodeHashes, it.Error()
|
|
}
|
|
|
|
// BuildStateDiffObject builds a statediff object from two blocks and the provided parameters
|
|
func (sdb *builder) BuildStateDiffObject(args Args, params Params) (StateObject, error) {
|
|
var stateNodes []StateNode
|
|
var codeAndCodeHashes []CodeAndCodeHash
|
|
err := sdb.WriteStateDiffObject(
|
|
StateRoots{OldStateRoot: args.OldStateRoot, NewStateRoot: args.NewStateRoot},
|
|
params, stateNodeAppender(&stateNodes), codeMappingAppender(&codeAndCodeHashes))
|
|
if err != nil {
|
|
return StateObject{}, err
|
|
}
|
|
return StateObject{
|
|
BlockHash: args.BlockHash,
|
|
BlockNumber: args.BlockNumber,
|
|
Nodes: stateNodes,
|
|
CodeAndCodeHashes: codeAndCodeHashes,
|
|
}, nil
|
|
}
|
|
|
|
// Writes a statediff object to output callback
|
|
func (sdb *builder) WriteStateDiffObject(args StateRoots, params Params, output StateNodeSink, codeOutput CodeSink) error {
|
|
if !params.IntermediateStateNodes || len(params.WatchedAddresses) > 0 {
|
|
// if we are watching only specific accounts then we are only diffing leaf nodes
|
|
return sdb.buildStateDiffWithoutIntermediateStateNodes(args, params, output, codeOutput)
|
|
} else {
|
|
return sdb.buildStateDiffWithIntermediateStateNodes(args, params, output, codeOutput)
|
|
}
|
|
}
|
|
|
|
func (sdb *builder) buildStateDiffWithIntermediateStateNodes(args StateRoots, params Params, output StateNodeSink, codeOutput CodeSink) error {
|
|
// Load tries for old and new states
|
|
oldTrie, err := sdb.stateCache.OpenTrie(args.OldStateRoot)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating trie for oldStateRoot: %v", err)
|
|
}
|
|
newTrie, err := sdb.stateCache.OpenTrie(args.NewStateRoot)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating trie for newStateRoot: %v", err)
|
|
}
|
|
|
|
// collect a slice of all the intermediate nodes that were touched and exist at B
|
|
// a map of their leafkey to all the accounts that were touched and exist at B
|
|
// and a slice of all the paths for the nodes in both of the above sets
|
|
diffAccountsAtB, diffPathsAtB, err := sdb.createdAndUpdatedStateWithIntermediateNodes(
|
|
oldTrie.NodeIterator([]byte{}), newTrie.NodeIterator([]byte{}),
|
|
output)
|
|
if err != nil {
|
|
return fmt.Errorf("error collecting createdAndUpdatedNodes: %v", err)
|
|
}
|
|
|
|
// collect a slice of all the nodes that existed at a path in A that doesn't exist in B
|
|
// a map of their leafkey to all the accounts that were touched and exist at A
|
|
diffAccountsAtA, err := sdb.deletedOrUpdatedState(
|
|
oldTrie.NodeIterator([]byte{}), newTrie.NodeIterator([]byte{}),
|
|
diffPathsAtB, output)
|
|
if err != nil {
|
|
return fmt.Errorf("error collecting deletedOrUpdatedNodes: %v", err)
|
|
}
|
|
|
|
// collect and sort the leafkey keys for both account mappings into a slice
|
|
createKeys := sortKeys(diffAccountsAtB)
|
|
deleteKeys := sortKeys(diffAccountsAtA)
|
|
|
|
// and then find the intersection of these keys
|
|
// these are the leafkeys for the accounts which exist at both A and B but are different
|
|
// this also mutates the passed in createKeys and deleteKeys, removing the intersection keys
|
|
// and leaving the truly created or deleted keys in place
|
|
updatedKeys := findIntersection(createKeys, deleteKeys)
|
|
|
|
// build the diff nodes for the updated accounts using the mappings at both A and B as directed by the keys found as the intersection of the two
|
|
err = sdb.buildAccountUpdates(
|
|
diffAccountsAtB, diffAccountsAtA, updatedKeys,
|
|
params.WatchedStorageSlots, params.IntermediateStorageNodes, output)
|
|
if err != nil {
|
|
return fmt.Errorf("error building diff for updated accounts: %v", err)
|
|
}
|
|
// build the diff nodes for created accounts
|
|
err = sdb.buildAccountCreations(diffAccountsAtB, params.WatchedStorageSlots, params.IntermediateStorageNodes, output, codeOutput)
|
|
if err != nil {
|
|
return fmt.Errorf("error building diff for created accounts: %v", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (sdb *builder) buildStateDiffWithoutIntermediateStateNodes(args StateRoots, params Params, output StateNodeSink, codeOutput CodeSink) error {
|
|
// Load tries for old (A) and new (B) states
|
|
oldTrie, err := sdb.stateCache.OpenTrie(args.OldStateRoot)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating trie for oldStateRoot: %v", err)
|
|
}
|
|
newTrie, err := sdb.stateCache.OpenTrie(args.NewStateRoot)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating trie for newStateRoot: %v", err)
|
|
}
|
|
|
|
// collect a map of their leafkey to all the accounts that were touched and exist at B
|
|
// and a slice of all the paths for the nodes in both of the above sets
|
|
diffAccountsAtB, diffPathsAtB, err := sdb.createdAndUpdatedState(
|
|
oldTrie.NodeIterator([]byte{}), newTrie.NodeIterator([]byte{}),
|
|
params.WatchedAddresses)
|
|
if err != nil {
|
|
return fmt.Errorf("error collecting createdAndUpdatedNodes: %v", err)
|
|
}
|
|
|
|
// collect a slice of all the nodes that existed at a path in A that doesn't exist in B
|
|
// a map of their leafkey to all the accounts that were touched and exist at A
|
|
diffAccountsAtA, err := sdb.deletedOrUpdatedState(
|
|
oldTrie.NodeIterator([]byte{}), newTrie.NodeIterator([]byte{}),
|
|
diffPathsAtB, output)
|
|
if err != nil {
|
|
return fmt.Errorf("error collecting deletedOrUpdatedNodes: %v", err)
|
|
}
|
|
|
|
// collect and sort the leafkeys for both account mappings into a slice
|
|
createKeys := sortKeys(diffAccountsAtB)
|
|
deleteKeys := sortKeys(diffAccountsAtA)
|
|
|
|
// and then find the intersection of these keys
|
|
// these are the leafkeys for the accounts which exist at both A and B but are different
|
|
// this also mutates the passed in createKeys and deleteKeys, removing in intersection keys
|
|
// and leaving the truly created or deleted keys in place
|
|
updatedKeys := findIntersection(createKeys, deleteKeys)
|
|
|
|
// build the diff nodes for the updated accounts using the mappings at both A and B as directed by the keys found as the intersection of the two
|
|
err = sdb.buildAccountUpdates(
|
|
diffAccountsAtB, diffAccountsAtA, updatedKeys,
|
|
params.WatchedStorageSlots, params.IntermediateStorageNodes, output)
|
|
if err != nil {
|
|
return fmt.Errorf("error building diff for updated accounts: %v", err)
|
|
}
|
|
// build the diff nodes for created accounts
|
|
err = sdb.buildAccountCreations(diffAccountsAtB, params.WatchedStorageSlots, params.IntermediateStorageNodes, output, codeOutput)
|
|
if err != nil {
|
|
return fmt.Errorf("error building diff for created accounts: %v", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// createdAndUpdatedState returns
|
|
// a mapping of their leafkeys to all the accounts that exist in a different state at B than A
|
|
// and a slice of the paths for all of the nodes included in both
|
|
func (sdb *builder) createdAndUpdatedState(a, b trie.NodeIterator, watchedAddresses []common.Address) (AccountMap, map[string]bool, error) {
|
|
diffPathsAtB := make(map[string]bool)
|
|
diffAcountsAtB := make(AccountMap)
|
|
it, _ := trie.NewDifferenceIterator(a, b)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := sdtrie.ResolveNode(it, sdb.stateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
if node.NodeType == Leaf {
|
|
// created vs updated is important for leaf nodes since we need to diff their storage
|
|
// so we need to map all changed accounts at B to their leafkey, since account can change pathes but not leafkey
|
|
var account types.StateAccount
|
|
if err := rlp.DecodeBytes(nodeElements[1].([]byte), &account); err != nil {
|
|
return nil, nil, fmt.Errorf("error decoding account for leaf node at path %x nerror: %v", node.Path, err)
|
|
}
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
if isWatchedAddress(watchedAddresses, leafKey) {
|
|
diffAcountsAtB[common.Bytes2Hex(leafKey)] = accountWrapper{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
Account: &account,
|
|
}
|
|
}
|
|
}
|
|
// add both intermediate and leaf node paths to the list of diffPathsAtB
|
|
diffPathsAtB[common.Bytes2Hex(node.Path)] = true
|
|
}
|
|
return diffAcountsAtB, diffPathsAtB, it.Error()
|
|
}
|
|
|
|
// createdAndUpdatedStateWithIntermediateNodes returns
|
|
// a slice of all the intermediate nodes that exist in a different state at B than A
|
|
// a mapping of their leafkeys to all the accounts that exist in a different state at B than A
|
|
// and a slice of the paths for all of the nodes included in both
|
|
func (sdb *builder) createdAndUpdatedStateWithIntermediateNodes(a, b trie.NodeIterator, output StateNodeSink) (AccountMap, map[string]bool, error) {
|
|
diffPathsAtB := make(map[string]bool)
|
|
diffAcountsAtB := make(AccountMap)
|
|
it, _ := trie.NewDifferenceIterator(a, b)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := sdtrie.ResolveNode(it, sdb.stateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
switch node.NodeType {
|
|
case Leaf:
|
|
// created vs updated is important for leaf nodes since we need to diff their storage
|
|
// so we need to map all changed accounts at B to their leafkey, since account can change paths but not leafkey
|
|
var account types.StateAccount
|
|
if err := rlp.DecodeBytes(nodeElements[1].([]byte), &account); err != nil {
|
|
return nil, nil, fmt.Errorf("error decoding account for leaf node at path %x nerror: %v", node.Path, err)
|
|
}
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
diffAcountsAtB[common.Bytes2Hex(leafKey)] = accountWrapper{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
Account: &account,
|
|
}
|
|
case Extension, Branch:
|
|
// create a diff for any intermediate node that has changed at b
|
|
// created vs updated makes no difference for intermediate nodes since we do not need to diff storage
|
|
if err := output(StateNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
}); err != nil {
|
|
return nil, nil, err
|
|
}
|
|
default:
|
|
return nil, nil, fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
// add both intermediate and leaf node paths to the list of diffPathsAtB
|
|
diffPathsAtB[common.Bytes2Hex(node.Path)] = true
|
|
}
|
|
return diffAcountsAtB, diffPathsAtB, it.Error()
|
|
}
|
|
|
|
// deletedOrUpdatedState returns a slice of all the pathes that are emptied at B
|
|
// and a mapping of their leafkeys to all the accounts that exist in a different state at A than B
|
|
func (sdb *builder) deletedOrUpdatedState(a, b trie.NodeIterator, diffPathsAtB map[string]bool, output StateNodeSink) (AccountMap, error) {
|
|
diffAccountAtA := make(AccountMap)
|
|
it, _ := trie.NewDifferenceIterator(b, a)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := sdtrie.ResolveNode(it, sdb.stateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
switch node.NodeType {
|
|
case Leaf:
|
|
// map all different accounts at A to their leafkey
|
|
var account types.StateAccount
|
|
if err := rlp.DecodeBytes(nodeElements[1].([]byte), &account); err != nil {
|
|
return nil, fmt.Errorf("error decoding account for leaf node at path %x nerror: %v", node.Path, err)
|
|
}
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
diffAccountAtA[common.Bytes2Hex(leafKey)] = accountWrapper{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
Account: &account,
|
|
}
|
|
// if this node's path did not show up in diffPathsAtB
|
|
// that means the node at this path was deleted (or moved) in B
|
|
// emit an empty "removed" diff to signify as such
|
|
if _, ok := diffPathsAtB[common.Bytes2Hex(node.Path)]; !ok {
|
|
if err := output(StateNode{
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
NodeType: Removed,
|
|
LeafKey: leafKey,
|
|
}); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
case Extension, Branch:
|
|
// if this node's path did not show up in diffPathsAtB
|
|
// that means the node at this path was deleted (or moved) in B
|
|
// emit an empty "removed" diff to signify as such
|
|
if _, ok := diffPathsAtB[common.Bytes2Hex(node.Path)]; !ok {
|
|
if err := output(StateNode{
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
NodeType: Removed,
|
|
}); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
// fall through, we did everything we need to do with these node types
|
|
default:
|
|
return nil, fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
}
|
|
return diffAccountAtA, it.Error()
|
|
}
|
|
|
|
// buildAccountUpdates uses the account diffs maps for A => B and B => A and the known intersection of their leafkeys
|
|
// to generate the statediff node objects for all of the accounts that existed at both A and B but in different states
|
|
// needs to be called before building account creations and deletions as this mutates
|
|
// those account maps to remove the accounts which were updated
|
|
func (sdb *builder) buildAccountUpdates(creations, deletions AccountMap, updatedKeys []string,
|
|
watchedStorageKeys []common.Hash, intermediateStorageNodes bool, output StateNodeSink) error {
|
|
var err error
|
|
for _, key := range updatedKeys {
|
|
createdAcc := creations[key]
|
|
deletedAcc := deletions[key]
|
|
var storageDiffs []StorageNode
|
|
if deletedAcc.Account != nil && createdAcc.Account != nil {
|
|
oldSR := deletedAcc.Account.Root
|
|
newSR := createdAcc.Account.Root
|
|
err = sdb.buildStorageNodesIncremental(
|
|
oldSR, newSR, watchedStorageKeys, intermediateStorageNodes,
|
|
storageNodeAppender(&storageDiffs))
|
|
if err != nil {
|
|
return fmt.Errorf("failed building incremental storage diffs for account with leafkey %s\r\nerror: %v", key, err)
|
|
}
|
|
}
|
|
if err = output(StateNode{
|
|
NodeType: createdAcc.NodeType,
|
|
Path: createdAcc.Path,
|
|
NodeValue: createdAcc.NodeValue,
|
|
LeafKey: createdAcc.LeafKey,
|
|
StorageNodes: storageDiffs,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
delete(creations, key)
|
|
delete(deletions, key)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// buildAccountCreations returns the statediff node objects for all the accounts that exist at B but not at A
|
|
// it also returns the code and codehash for created contract accounts
|
|
func (sdb *builder) buildAccountCreations(accounts AccountMap, watchedStorageKeys []common.Hash, intermediateStorageNodes bool, output StateNodeSink, codeOutput CodeSink) error {
|
|
for _, val := range accounts {
|
|
diff := StateNode{
|
|
NodeType: val.NodeType,
|
|
Path: val.Path,
|
|
LeafKey: val.LeafKey,
|
|
NodeValue: val.NodeValue,
|
|
}
|
|
if !bytes.Equal(val.Account.CodeHash, nullCodeHash) {
|
|
// For contract creations, any storage node contained is a diff
|
|
var storageDiffs []StorageNode
|
|
err := sdb.buildStorageNodesEventual(val.Account.Root, watchedStorageKeys, intermediateStorageNodes, storageNodeAppender(&storageDiffs))
|
|
if err != nil {
|
|
return fmt.Errorf("failed building eventual storage diffs for node %x\r\nerror: %v", val.Path, err)
|
|
}
|
|
diff.StorageNodes = storageDiffs
|
|
// emit codehash => code mappings for cod
|
|
codeHash := common.BytesToHash(val.Account.CodeHash)
|
|
code, err := sdb.stateCache.ContractCode(common.Hash{}, codeHash)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to retrieve code for codehash %s\r\n error: %v", codeHash.String(), err)
|
|
}
|
|
if err := codeOutput(CodeAndCodeHash{
|
|
Hash: codeHash,
|
|
Code: code,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if err := output(diff); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// buildStorageNodesEventual builds the storage diff node objects for a created account
|
|
// i.e. it returns all the storage nodes at this state, since there is no previous state
|
|
func (sdb *builder) buildStorageNodesEventual(sr common.Hash, watchedStorageKeys []common.Hash, intermediateNodes bool, output StorageNodeSink) error {
|
|
if bytes.Equal(sr.Bytes(), emptyContractRoot.Bytes()) {
|
|
return nil
|
|
}
|
|
log.Debug("Storage Root For Eventual Diff", "root", sr.Hex())
|
|
sTrie, err := sdb.stateCache.OpenTrie(sr)
|
|
if err != nil {
|
|
log.Info("error in build storage diff eventual", "error", err)
|
|
return err
|
|
}
|
|
it := sTrie.NodeIterator(make([]byte, 0))
|
|
err = sdb.buildStorageNodesFromTrie(it, watchedStorageKeys, intermediateNodes, output)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// buildStorageNodesFromTrie returns all the storage diff node objects in the provided node interator
|
|
// if any storage keys are provided it will only return those leaf nodes
|
|
// including intermediate nodes can be turned on or off
|
|
func (sdb *builder) buildStorageNodesFromTrie(it trie.NodeIterator, watchedStorageKeys []common.Hash, intermediateNodes bool, output StorageNodeSink) error {
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := sdtrie.ResolveNode(it, sdb.stateCache.TrieDB())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
switch node.NodeType {
|
|
case Leaf:
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
if isWatchedStorageKey(watchedStorageKeys, leafKey) {
|
|
if err := output(StorageNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
case Extension, Branch:
|
|
if intermediateNodes {
|
|
if err := output(StorageNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
default:
|
|
return fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
}
|
|
return it.Error()
|
|
}
|
|
|
|
// buildStorageNodesIncremental builds the storage diff node objects for all nodes that exist in a different state at B than A
|
|
func (sdb *builder) buildStorageNodesIncremental(oldSR common.Hash, newSR common.Hash, watchedStorageKeys []common.Hash, intermediateNodes bool, output StorageNodeSink) error {
|
|
if bytes.Equal(newSR.Bytes(), oldSR.Bytes()) {
|
|
return nil
|
|
}
|
|
log.Debug("Storage Roots for Incremental Diff", "old", oldSR.Hex(), "new", newSR.Hex())
|
|
oldTrie, err := sdb.stateCache.OpenTrie(oldSR)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
newTrie, err := sdb.stateCache.OpenTrie(newSR)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
diffPathsAtB, err := sdb.createdAndUpdatedStorage(
|
|
oldTrie.NodeIterator([]byte{}), newTrie.NodeIterator([]byte{}),
|
|
watchedStorageKeys, intermediateNodes, output)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = sdb.deletedOrUpdatedStorage(oldTrie.NodeIterator([]byte{}), newTrie.NodeIterator([]byte{}),
|
|
diffPathsAtB, watchedStorageKeys, intermediateNodes, output)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (sdb *builder) createdAndUpdatedStorage(a, b trie.NodeIterator, watchedKeys []common.Hash, intermediateNodes bool, output StorageNodeSink) (map[string]bool, error) {
|
|
diffPathsAtB := make(map[string]bool)
|
|
it, _ := trie.NewDifferenceIterator(a, b)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := sdtrie.ResolveNode(it, sdb.stateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
switch node.NodeType {
|
|
case Leaf:
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
if isWatchedStorageKey(watchedKeys, leafKey) {
|
|
if err := output(StorageNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
}); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
case Extension, Branch:
|
|
if intermediateNodes {
|
|
if err := output(StorageNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
}); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
default:
|
|
return nil, fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
diffPathsAtB[common.Bytes2Hex(node.Path)] = true
|
|
}
|
|
return diffPathsAtB, it.Error()
|
|
}
|
|
|
|
func (sdb *builder) deletedOrUpdatedStorage(a, b trie.NodeIterator, diffPathsAtB map[string]bool, watchedKeys []common.Hash, intermediateNodes bool, output StorageNodeSink) error {
|
|
it, _ := trie.NewDifferenceIterator(b, a)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := sdtrie.ResolveNode(it, sdb.stateCache.TrieDB())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
// if this node path showed up in diffPathsAtB
|
|
// that means this node was updated at B and we already have the updated diff for it
|
|
// otherwise that means this node was deleted in B and we need to add a "removed" diff to represent that event
|
|
if _, ok := diffPathsAtB[common.Bytes2Hex(node.Path)]; ok {
|
|
continue
|
|
}
|
|
switch node.NodeType {
|
|
case Leaf:
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
if isWatchedStorageKey(watchedKeys, leafKey) {
|
|
if err := output(StorageNode{
|
|
NodeType: Removed,
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
LeafKey: leafKey,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
case Extension, Branch:
|
|
if intermediateNodes {
|
|
if err := output(StorageNode{
|
|
NodeType: Removed,
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
default:
|
|
return fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
}
|
|
return it.Error()
|
|
}
|
|
|
|
// isWatchedAddress is used to check if a state account corresponds to one of the addresses the builder is configured to watch
|
|
func isWatchedAddress(watchedAddresses []common.Address, stateLeafKey []byte) bool {
|
|
// If we aren't watching any specific addresses, we are watching everything
|
|
if len(watchedAddresses) == 0 {
|
|
return true
|
|
}
|
|
for _, addr := range watchedAddresses {
|
|
addrHashKey := crypto.Keccak256(addr.Bytes())
|
|
if bytes.Equal(addrHashKey, stateLeafKey) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// isWatchedStorageKey is used to check if a storage leaf corresponds to one of the storage slots the builder is configured to watch
|
|
func isWatchedStorageKey(watchedKeys []common.Hash, storageLeafKey []byte) bool {
|
|
// If we aren't watching any specific addresses, we are watching everything
|
|
if len(watchedKeys) == 0 {
|
|
return true
|
|
}
|
|
for _, hashKey := range watchedKeys {
|
|
if bytes.Equal(hashKey.Bytes(), storageLeafKey) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|