* Write state diff to CSV (#2) * port statediff from9b7fd9af80/statediff/statediff.go
; minor fixes * integrating state diff extracting, building, and persisting into geth processes * work towards persisting created statediffs in ipfs; based off github.com/vulcanize/eth-block-extractor * Add a state diff service * Remove diff extractor from blockchain * Update imports * Move statediff on/off check to geth cmd config * Update starting state diff service * Add debugging logs for creating diff * Add statediff extractor and builder tests and small refactoring * Start to write statediff to a CSV * Restructure statediff directory * Pull CSV publishing methods into their own file * Reformatting due to go fmt * Add gomega to vendor dir * Remove testing focuses * Update statediff tests to use golang test pkg instead of ginkgo - builder_test - extractor_test - publisher_test * Use hexutil.Encode instead of deprecated common.ToHex * Remove OldValue from DiffBigInt and DiffUint64 fields * Update builder test * Remove old storage value from updated accounts * Remove old values from created/deleted accounts * Update publisher to account for only storing current account values * Update service loop and fetching previous block * Update testing - remove statediff ginkgo test suite file - move mocks to their own dir * Updates per go fmt * Updates to tests * Pass statediff mode and path in through cli * Return filename from publisher * Remove some duplication in builder * Remove code field from state diff output this is the contract byte code, and it can still be obtained by querying the db by the codeHash * Consolidate acct diff structs for updated & updated/deleted accts * Include block number in csv filename * Clean up error logging * Cleanup formatting, spelling, etc * Address PR comments * Add contract address and storage value to csv * Refactor accumulating account row in csv publisher * Add DiffStorage struct * Add storage key to csv * Address PR comments * Fix publisher to include rows for accounts that don't have store updates * Update builder test after merging in release/1.8 * Update test contract to include storage on contract intialization - so that we're able to test that storage diffing works for created and deleted accounts (not just updated accounts). * Factor out a common trie iterator method in builder * Apply goimports to statediff * Apply gosimple changes to statediff * Gracefully exit geth command(#4) * Statediff for full node (#6) * Open a trie from the in-memory database * Use a node's LeafKey as an identifier instead of the address It was proving difficult to find look the address up from a given path with a full node (sometimes the value wouldn't exist in the disk db). So, instead, for now we are using the node's LeafKey with is a Keccak256 hash of the address, so if we know the address we can figure out which LeafKey it matches up to. * Make sure that statediff has been processed before pruning * Use blockchain stateCache.OpenTrie for storage diffs * Clean up log lines and remove unnecessary fields from builder * Apply go fmt changes * Add a sleep to the blockchain test * refactoring/reorganizing packages * refactoring statediff builder and types and adjusted to relay proofs and paths (still need to make this optional) * refactoring state diff service and adding api which allows for streaming state diff payloads over an rpc websocket subscription * make proofs and paths optional + compress service loop into single for loop (may be missing something here) * option to process intermediate nodes * make state diff rlp serializable * cli parameter to limit statediffing to select account addresses + test * review fixes and fixes for issues ran into in integration * review fixes; proper method signature for api; adjust service so that statediff processing is halted/paused until there is at least one subscriber listening for the results * adjust buffering to improve stability; doc.go; fix notifier err handling * relay receipts with the rest of the data + review fixes/changes * rpc method to get statediff at specific block; requires archival node or the block be within the pruning range * fix linter issues * include total difficulty to the payload * fix state diff builder: emit actual leaf nodes instead of value nodes; diff on the leaf not on the value; emit correct path for intermediate nodes * adjust statediff builder tests to changes and extend to test intermediate nodes; golint * add genesis block to test; handle block 0 in StateDiffAt * rlp files for mainnet blocks 0-3, for tests * builder test on mainnet blocks * common.BytesToHash(path) => crypto.Keaccak256(hash) in builder; BytesToHash produces same hash for e.g. []byte{} and []byte{\x00} - prefix \x00 steps are inconsequential to the hash result * complete tests for early mainnet blocks * diff type for representing deleted accounts * fix builder so that we handle account deletions properly and properly diff storage when an account is moved to a new path; update params * remove cli params; moving them to subscriber defined * remove unneeded bc methods * update service and api; statediffing params are now defined by user through api rather than by service provider by cli * update top level tests * add ability to watch specific storage slots (leaf keys) only * comments; explain logic * update mainnet blocks test * update api_test.go * storage leafkey filter test * cleanup chain maker * adjust chain maker for tests to add an empty account in block1 and switch to EIP-158 afterwards (now we just need to generate enough accounts until one causes the empty account to be touched and removed post-EIP-158 so we can simulate and test that process...); also added 2 new blocks where more contract storage is set and old slots are set to zero so they are removed so we can test that * found an account whose creation causes the empty account to be moved to a new path; this should count as 'touching; the empty account and cause it to be removed according to eip-158... but it doesn't * use new contract in unit tests that has self-destruct ability, so we can test eip-158 since simply moving an account to new path doesn't count as 'touchin' it * handle storage deletions * tests for eip-158 account removal and storage value deletions; there is one edge case left to test where we remove 1 account when only two exist such that the remaining account is moved up and replaces the root branch node * finish testing known edge cases * add endpoint to fetch all state and storage nodes at a given blockheight; useful for generating a recent atate cache/snapshot that we can diff forward from rather than needing to collect all diffs from genesis * test for state trie builder * if statediffing is on, lock tries in triedb until the statediffing service signals they are done using them * fix mock blockchain; golint; bump patch * increase maxRequestContentLength; bump patch * log the sizes of the state objects we are sending * CI build (#20) * CI: run build on PR and on push to master * CI: debug building geth * CI: fix coping file * CI: fix coping file v2 * CI: temporary upload file to release asset * CI: get release upload_url by tag, upload asset to current relase * CI: fix tag name * fix ci build on statediff_at_anyblock-1.9.11 branch * fix publishing assets in release * use context deadline for timeout in eth_call * collect and emit codehash=>code mappings for state objects * subscription endpoint for retrieving all the codehash=>code mappings that exist at provided height * Implement WriteStateDiffAt * Writes state diffs directly to postgres * Adds CLI flags to configure PG * Refactors builder output with callbacks * Copies refactored postgres handling code from ipld-eth-indexer * rename PostgresCIDWriter.{index->upsert}* * rm unused * output code & codehash iteratively * had to rf some types for this * prometheus metrics output * duplicate recent eth-indexer changes * migrations and metrics... * [wip] prom.Init() here? another CLI flag? * tidy & DRY * statediff WriteLoop service + CLI flag * [wip] update test mocks * todo - do something meaningful to test write loop * logging * use geth log * port tests to go testing * drop ginkgo/gomega * fix and cleanup tests * fail before defer statement * delete vendor/ dir * fixes after rebase onto 1.9.23 * fix API registration * use golang 1.15.5 version (#34) * bump version meta; add 0.0.11 branch to actions * bump version meta; update github actions workflows * statediff: refactor metrics * Remove redundant statediff/indexer/prom tooling and use existing prometheus integration. * "indexer" namespace for metrics * add reporting loop for db metrics * doc * metrics for statediff stats * metrics namespace/subsystem = statediff/{indexer,service} * statediff: use a worker pool (for direct writes) * fix test * fix chain event subscription * log tweaks * func name * unused import * intermediate chain event channel for metrics * update github actions; linting * add poststate and status to receipt ipld indexes * stateDiffFor endpoints for fetching or writing statediff object by blockhash; bump statediff version * fixes after rebase on to v1.10.1 * update github actions and version meta; go fmt * add leaf key to removed 'nodes' * include Postgres migrations and schema * service documentation * touching up * update github actions after rebase * fix connection leak (misplaced defer) and perform proper rollback on errs * improve error logging; handle PushBlock internal err * build docker image and publish it to Docker Hub on release * add access list tx to unit tests * MarshalBinary and UnmarshalBinary methods for receipt * fix error caused by 2718 by using MarshalBinary instead of EncodeRLP methods * ipld encoding/decoding tests * update TxModel; add AccessListElementModel * index tx type and access lists * add access list metrics * unit tests for tx_type and access list table * unit tests for receipt marshal/unmarshal binary methods * improve documentation of the encoding methods * fix issue identified in linting * update github actions and version meta after rebase * unit test that fails undeterministically on eip2930 txs, giving same error we are seeing in prod * Include genesis block state diff. * documentation on versioning, rebasing, releasing; bump version meta * Add geth and statediff unit test to CI. * Set pgpassword in env. * Added comments. * Add new major branch to github action. * Add support for Dynamic txn(EIP-1559). * Update version meta to 0.0.24 * Verify block base fee in test. * Fix base_fee type and add backward compatible test. * Remove type definition for AccessListElementModel * Change basefee to int64/bigint. * block and uncle reward in PoA network = 0 (#87) * in PoA networks there is no block and uncle rewards * bump meta version * (cherry picked from commitb64ca14689
) * Use Ropsten to test block reward. * Add Makefile target to build static linux binaries. * Strip symbol tables from static binaries. * Fix block_fee to support NULL values. * bump version meta. * Add new major branch to github action. * rename doc.go to README.md * Create a seperate table for storing logs * Bump statediff version to 0.0.26. * add btree index to state/storage_cids.node_type; updated schema * Dedup receipt data. * Fix linter errors. * Address comments. * Bump statediff version to 0.0.27. * new cli flag for initializing db first time service is ran * only write Removed node ipld block (on db init) and reuse constant cid and mhkey * test new handling of Removed nodes; don't require init flag * log metrics * Add new major branch to github action. * Fix build. * Update golang version in CI. * Use ipld-eth-db in testing. * Remove migration from repo. * Add new major branch to github action. *Use `GetTd` instead of `GetTdByHash`6289137827
* Add new major branch to github action. * Report DB metrics * batch inserts to public.blocks * v2 => v3 major refactor * fixes and cli integration for new options * update example command in readme * ashwin's fix for failing pgx unit test * update to use new schema; fix pgx driver * indexer that writes sql stmts out to a file * cli integration * fix unit tests * use node_id as PK/FK * misc fixes/adjustments * update README * cleanup; more unit tests * basefee is big.Int, it won't always fit in int64 * adjust for schema updates * finish unit tests * test harnest for arbitrary mainnet blocks and receipts * cache problematic block locally for quicker testing/easier CI testing * fix issue with log/logTrie processing * remove some unecessary hashing operations * handle edge case * add more 'bad blocks' to mainnet_tests * increase file write buffer size * increase buffer further * fix rct trie multicodec type * extend testing * log trie fk fix * bump statediff meta version; use db v0.3.0 in compose * skip file writing tests in CI, for now * prevent parallel execution of tests in different pkgs (suspect this is what causes our deadlock to show up only in CI test env) adjust write buffering * fix rct unit tests * fix README formatting * port retry on deadlock detection feature * new workflow on-'master' targets * update version meta * improve test coverage for logs * fix possible race condition * fix CI * check tx pool state at end of unit tests * better logging of rollbacks and dead lock retries
748 lines
29 KiB
Go
748 lines
29 KiB
Go
// Copyright 2019 The go-ethereum Authors
|
|
// This file is part of the go-ethereum library.
|
|
//
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
// Contains a batch of utility type declarations used by the tests. As the node
|
|
// operates on unique types, a lot of them are needed to check various features.
|
|
|
|
package statediff
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
"github.com/ethereum/go-ethereum/core/state"
|
|
"github.com/ethereum/go-ethereum/core/types"
|
|
"github.com/ethereum/go-ethereum/crypto"
|
|
"github.com/ethereum/go-ethereum/log"
|
|
"github.com/ethereum/go-ethereum/rlp"
|
|
"github.com/ethereum/go-ethereum/statediff/trie_helpers"
|
|
types2 "github.com/ethereum/go-ethereum/statediff/types"
|
|
"github.com/ethereum/go-ethereum/trie"
|
|
)
|
|
|
|
var (
|
|
nullHashBytes = common.Hex2Bytes("0000000000000000000000000000000000000000000000000000000000000000")
|
|
emptyNode, _ = rlp.EncodeToBytes([]byte{})
|
|
emptyContractRoot = crypto.Keccak256Hash(emptyNode)
|
|
nullCodeHash = crypto.Keccak256Hash([]byte{}).Bytes()
|
|
)
|
|
|
|
// Builder interface exposes the method for building a state diff between two blocks
|
|
type Builder interface {
|
|
BuildStateDiffObject(args Args, params Params) (types2.StateObject, error)
|
|
BuildStateTrieObject(current *types.Block) (types2.StateObject, error)
|
|
WriteStateDiffObject(args types2.StateRoots, params Params, output types2.StateNodeSink, codeOutput types2.CodeSink) error
|
|
}
|
|
|
|
type builder struct {
|
|
stateCache state.Database
|
|
}
|
|
|
|
// convenience
|
|
func stateNodeAppender(nodes *[]types2.StateNode) types2.StateNodeSink {
|
|
return func(node types2.StateNode) error {
|
|
*nodes = append(*nodes, node)
|
|
return nil
|
|
}
|
|
}
|
|
func storageNodeAppender(nodes *[]types2.StorageNode) types2.StorageNodeSink {
|
|
return func(node types2.StorageNode) error {
|
|
*nodes = append(*nodes, node)
|
|
return nil
|
|
}
|
|
}
|
|
func codeMappingAppender(codeAndCodeHashes *[]types2.CodeAndCodeHash) types2.CodeSink {
|
|
return func(c types2.CodeAndCodeHash) error {
|
|
*codeAndCodeHashes = append(*codeAndCodeHashes, c)
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// NewBuilder is used to create a statediff builder
|
|
func NewBuilder(stateCache state.Database) Builder {
|
|
return &builder{
|
|
stateCache: stateCache, // state cache is safe for concurrent reads
|
|
}
|
|
}
|
|
|
|
// BuildStateTrieObject builds a state trie object from the provided block
|
|
func (sdb *builder) BuildStateTrieObject(current *types.Block) (types2.StateObject, error) {
|
|
currentTrie, err := sdb.stateCache.OpenTrie(current.Root())
|
|
if err != nil {
|
|
return types2.StateObject{}, fmt.Errorf("error creating trie for block %d: %v", current.Number(), err)
|
|
}
|
|
it := currentTrie.NodeIterator([]byte{})
|
|
stateNodes, codeAndCodeHashes, err := sdb.buildStateTrie(it)
|
|
if err != nil {
|
|
return types2.StateObject{}, fmt.Errorf("error collecting state nodes for block %d: %v", current.Number(), err)
|
|
}
|
|
return types2.StateObject{
|
|
BlockNumber: current.Number(),
|
|
BlockHash: current.Hash(),
|
|
Nodes: stateNodes,
|
|
CodeAndCodeHashes: codeAndCodeHashes,
|
|
}, nil
|
|
}
|
|
|
|
func (sdb *builder) buildStateTrie(it trie.NodeIterator) ([]types2.StateNode, []types2.CodeAndCodeHash, error) {
|
|
stateNodes := make([]types2.StateNode, 0)
|
|
codeAndCodeHashes := make([]types2.CodeAndCodeHash, 0)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.stateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
switch node.NodeType {
|
|
case types2.Leaf:
|
|
var account types.StateAccount
|
|
if err := rlp.DecodeBytes(nodeElements[1].([]byte), &account); err != nil {
|
|
return nil, nil, fmt.Errorf("error decoding account for leaf node at path %x nerror: %v", node.Path, err)
|
|
}
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
node.LeafKey = leafKey
|
|
if !bytes.Equal(account.CodeHash, nullCodeHash) {
|
|
var storageNodes []types2.StorageNode
|
|
err := sdb.buildStorageNodesEventual(account.Root, nil, true, storageNodeAppender(&storageNodes))
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("failed building eventual storage diffs for account %+v\r\nerror: %v", account, err)
|
|
}
|
|
node.StorageNodes = storageNodes
|
|
// emit codehash => code mappings for cod
|
|
codeHash := common.BytesToHash(account.CodeHash)
|
|
code, err := sdb.stateCache.ContractCode(common.Hash{}, codeHash)
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("failed to retrieve code for codehash %s\r\n error: %v", codeHash.String(), err)
|
|
}
|
|
codeAndCodeHashes = append(codeAndCodeHashes, types2.CodeAndCodeHash{
|
|
Hash: codeHash,
|
|
Code: code,
|
|
})
|
|
}
|
|
stateNodes = append(stateNodes, node)
|
|
case types2.Extension, types2.Branch:
|
|
stateNodes = append(stateNodes, node)
|
|
default:
|
|
return nil, nil, fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
}
|
|
return stateNodes, codeAndCodeHashes, it.Error()
|
|
}
|
|
|
|
// BuildStateDiffObject builds a statediff object from two blocks and the provided parameters
|
|
func (sdb *builder) BuildStateDiffObject(args Args, params Params) (types2.StateObject, error) {
|
|
var stateNodes []types2.StateNode
|
|
var codeAndCodeHashes []types2.CodeAndCodeHash
|
|
err := sdb.WriteStateDiffObject(
|
|
types2.StateRoots{OldStateRoot: args.OldStateRoot, NewStateRoot: args.NewStateRoot},
|
|
params, stateNodeAppender(&stateNodes), codeMappingAppender(&codeAndCodeHashes))
|
|
if err != nil {
|
|
return types2.StateObject{}, err
|
|
}
|
|
return types2.StateObject{
|
|
BlockHash: args.BlockHash,
|
|
BlockNumber: args.BlockNumber,
|
|
Nodes: stateNodes,
|
|
CodeAndCodeHashes: codeAndCodeHashes,
|
|
}, nil
|
|
}
|
|
|
|
// WriteStateDiffObject writes a statediff object to output callback
|
|
func (sdb *builder) WriteStateDiffObject(args types2.StateRoots, params Params, output types2.StateNodeSink, codeOutput types2.CodeSink) error {
|
|
if !params.IntermediateStateNodes || len(params.WatchedAddresses) > 0 {
|
|
// if we are watching only specific accounts then we are only diffing leaf nodes
|
|
return sdb.buildStateDiffWithoutIntermediateStateNodes(args, params, output, codeOutput)
|
|
} else {
|
|
return sdb.buildStateDiffWithIntermediateStateNodes(args, params, output, codeOutput)
|
|
}
|
|
}
|
|
|
|
func (sdb *builder) buildStateDiffWithIntermediateStateNodes(args types2.StateRoots, params Params, output types2.StateNodeSink, codeOutput types2.CodeSink) error {
|
|
// Load tries for old and new states
|
|
oldTrie, err := sdb.stateCache.OpenTrie(args.OldStateRoot)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating trie for oldStateRoot: %v", err)
|
|
}
|
|
newTrie, err := sdb.stateCache.OpenTrie(args.NewStateRoot)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating trie for newStateRoot: %v", err)
|
|
}
|
|
|
|
// collect a slice of all the intermediate nodes that were touched and exist at B
|
|
// a map of their leafkey to all the accounts that were touched and exist at B
|
|
// and a slice of all the paths for the nodes in both of the above sets
|
|
diffAccountsAtB, diffPathsAtB, err := sdb.createdAndUpdatedStateWithIntermediateNodes(
|
|
oldTrie.NodeIterator([]byte{}), newTrie.NodeIterator([]byte{}),
|
|
output)
|
|
if err != nil {
|
|
return fmt.Errorf("error collecting createdAndUpdatedNodes: %v", err)
|
|
}
|
|
|
|
// collect a slice of all the nodes that existed at a path in A that doesn't exist in B
|
|
// a map of their leafkey to all the accounts that were touched and exist at A
|
|
diffAccountsAtA, err := sdb.deletedOrUpdatedState(
|
|
oldTrie.NodeIterator([]byte{}), newTrie.NodeIterator([]byte{}),
|
|
diffPathsAtB, output)
|
|
if err != nil {
|
|
return fmt.Errorf("error collecting deletedOrUpdatedNodes: %v", err)
|
|
}
|
|
|
|
// collect and sort the leafkey keys for both account mappings into a slice
|
|
createKeys := trie_helpers.SortKeys(diffAccountsAtB)
|
|
deleteKeys := trie_helpers.SortKeys(diffAccountsAtA)
|
|
|
|
// and then find the intersection of these keys
|
|
// these are the leafkeys for the accounts which exist at both A and B but are different
|
|
// this also mutates the passed in createKeys and deleteKeys, removing the intersection keys
|
|
// and leaving the truly created or deleted keys in place
|
|
updatedKeys := trie_helpers.FindIntersection(createKeys, deleteKeys)
|
|
|
|
// build the diff nodes for the updated accounts using the mappings at both A and B as directed by the keys found as the intersection of the two
|
|
err = sdb.buildAccountUpdates(
|
|
diffAccountsAtB, diffAccountsAtA, updatedKeys,
|
|
params.WatchedStorageSlots, params.IntermediateStorageNodes, output)
|
|
if err != nil {
|
|
return fmt.Errorf("error building diff for updated accounts: %v", err)
|
|
}
|
|
// build the diff nodes for created accounts
|
|
err = sdb.buildAccountCreations(diffAccountsAtB, params.WatchedStorageSlots, params.IntermediateStorageNodes, output, codeOutput)
|
|
if err != nil {
|
|
return fmt.Errorf("error building diff for created accounts: %v", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (sdb *builder) buildStateDiffWithoutIntermediateStateNodes(args types2.StateRoots, params Params, output types2.StateNodeSink, codeOutput types2.CodeSink) error {
|
|
// Load tries for old (A) and new (B) states
|
|
oldTrie, err := sdb.stateCache.OpenTrie(args.OldStateRoot)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating trie for oldStateRoot: %v", err)
|
|
}
|
|
newTrie, err := sdb.stateCache.OpenTrie(args.NewStateRoot)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating trie for newStateRoot: %v", err)
|
|
}
|
|
|
|
// collect a map of their leafkey to all the accounts that were touched and exist at B
|
|
// and a slice of all the paths for the nodes in both of the above sets
|
|
diffAccountsAtB, diffPathsAtB, err := sdb.createdAndUpdatedState(
|
|
oldTrie.NodeIterator([]byte{}), newTrie.NodeIterator([]byte{}),
|
|
params.WatchedAddresses)
|
|
if err != nil {
|
|
return fmt.Errorf("error collecting createdAndUpdatedNodes: %v", err)
|
|
}
|
|
|
|
// collect a slice of all the nodes that existed at a path in A that doesn't exist in B
|
|
// a map of their leafkey to all the accounts that were touched and exist at A
|
|
diffAccountsAtA, err := sdb.deletedOrUpdatedState(
|
|
oldTrie.NodeIterator([]byte{}), newTrie.NodeIterator([]byte{}),
|
|
diffPathsAtB, output)
|
|
if err != nil {
|
|
return fmt.Errorf("error collecting deletedOrUpdatedNodes: %v", err)
|
|
}
|
|
|
|
// collect and sort the leafkeys for both account mappings into a slice
|
|
createKeys := trie_helpers.SortKeys(diffAccountsAtB)
|
|
deleteKeys := trie_helpers.SortKeys(diffAccountsAtA)
|
|
|
|
// and then find the intersection of these keys
|
|
// these are the leafkeys for the accounts which exist at both A and B but are different
|
|
// this also mutates the passed in createKeys and deleteKeys, removing in intersection keys
|
|
// and leaving the truly created or deleted keys in place
|
|
updatedKeys := trie_helpers.FindIntersection(createKeys, deleteKeys)
|
|
|
|
// build the diff nodes for the updated accounts using the mappings at both A and B as directed by the keys found as the intersection of the two
|
|
err = sdb.buildAccountUpdates(
|
|
diffAccountsAtB, diffAccountsAtA, updatedKeys,
|
|
params.WatchedStorageSlots, params.IntermediateStorageNodes, output)
|
|
if err != nil {
|
|
return fmt.Errorf("error building diff for updated accounts: %v", err)
|
|
}
|
|
// build the diff nodes for created accounts
|
|
err = sdb.buildAccountCreations(diffAccountsAtB, params.WatchedStorageSlots, params.IntermediateStorageNodes, output, codeOutput)
|
|
if err != nil {
|
|
return fmt.Errorf("error building diff for created accounts: %v", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// createdAndUpdatedState returns
|
|
// a mapping of their leafkeys to all the accounts that exist in a different state at B than A
|
|
// and a slice of the paths for all of the nodes included in both
|
|
func (sdb *builder) createdAndUpdatedState(a, b trie.NodeIterator, watchedAddresses []common.Address) (types2.AccountMap, map[string]bool, error) {
|
|
diffPathsAtB := make(map[string]bool)
|
|
diffAcountsAtB := make(types2.AccountMap)
|
|
it, _ := trie.NewDifferenceIterator(a, b)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.stateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
if node.NodeType == types2.Leaf {
|
|
// created vs updated is important for leaf nodes since we need to diff their storage
|
|
// so we need to map all changed accounts at B to their leafkey, since account can change pathes but not leafkey
|
|
var account types.StateAccount
|
|
if err := rlp.DecodeBytes(nodeElements[1].([]byte), &account); err != nil {
|
|
return nil, nil, fmt.Errorf("error decoding account for leaf node at path %x nerror: %v", node.Path, err)
|
|
}
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
if isWatchedAddress(watchedAddresses, leafKey) {
|
|
diffAcountsAtB[common.Bytes2Hex(leafKey)] = types2.AccountWrapper{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
Account: &account,
|
|
}
|
|
}
|
|
}
|
|
// add both intermediate and leaf node paths to the list of diffPathsAtB
|
|
diffPathsAtB[common.Bytes2Hex(node.Path)] = true
|
|
}
|
|
return diffAcountsAtB, diffPathsAtB, it.Error()
|
|
}
|
|
|
|
// createdAndUpdatedStateWithIntermediateNodes returns
|
|
// a slice of all the intermediate nodes that exist in a different state at B than A
|
|
// a mapping of their leafkeys to all the accounts that exist in a different state at B than A
|
|
// and a slice of the paths for all of the nodes included in both
|
|
func (sdb *builder) createdAndUpdatedStateWithIntermediateNodes(a, b trie.NodeIterator, output types2.StateNodeSink) (types2.AccountMap, map[string]bool, error) {
|
|
diffPathsAtB := make(map[string]bool)
|
|
diffAcountsAtB := make(types2.AccountMap)
|
|
it, _ := trie.NewDifferenceIterator(a, b)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.stateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
switch node.NodeType {
|
|
case types2.Leaf:
|
|
// created vs updated is important for leaf nodes since we need to diff their storage
|
|
// so we need to map all changed accounts at B to their leafkey, since account can change paths but not leafkey
|
|
var account types.StateAccount
|
|
if err := rlp.DecodeBytes(nodeElements[1].([]byte), &account); err != nil {
|
|
return nil, nil, fmt.Errorf("error decoding account for leaf node at path %x nerror: %v", node.Path, err)
|
|
}
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
diffAcountsAtB[common.Bytes2Hex(leafKey)] = types2.AccountWrapper{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
Account: &account,
|
|
}
|
|
case types2.Extension, types2.Branch:
|
|
// create a diff for any intermediate node that has changed at b
|
|
// created vs updated makes no difference for intermediate nodes since we do not need to diff storage
|
|
if err := output(types2.StateNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
}); err != nil {
|
|
return nil, nil, err
|
|
}
|
|
default:
|
|
return nil, nil, fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
// add both intermediate and leaf node paths to the list of diffPathsAtB
|
|
diffPathsAtB[common.Bytes2Hex(node.Path)] = true
|
|
}
|
|
return diffAcountsAtB, diffPathsAtB, it.Error()
|
|
}
|
|
|
|
// deletedOrUpdatedState returns a slice of all the pathes that are emptied at B
|
|
// and a mapping of their leafkeys to all the accounts that exist in a different state at A than B
|
|
func (sdb *builder) deletedOrUpdatedState(a, b trie.NodeIterator, diffPathsAtB map[string]bool, output types2.StateNodeSink) (types2.AccountMap, error) {
|
|
diffAccountAtA := make(types2.AccountMap)
|
|
it, _ := trie.NewDifferenceIterator(b, a)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.stateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
switch node.NodeType {
|
|
case types2.Leaf:
|
|
// map all different accounts at A to their leafkey
|
|
var account types.StateAccount
|
|
if err := rlp.DecodeBytes(nodeElements[1].([]byte), &account); err != nil {
|
|
return nil, fmt.Errorf("error decoding account for leaf node at path %x nerror: %v", node.Path, err)
|
|
}
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
diffAccountAtA[common.Bytes2Hex(leafKey)] = types2.AccountWrapper{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
Account: &account,
|
|
}
|
|
// if this node's path did not show up in diffPathsAtB
|
|
// that means the node at this path was deleted (or moved) in B
|
|
// emit an empty "removed" diff to signify as such
|
|
if _, ok := diffPathsAtB[common.Bytes2Hex(node.Path)]; !ok {
|
|
if err := output(types2.StateNode{
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
NodeType: types2.Removed,
|
|
LeafKey: leafKey,
|
|
}); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
case types2.Extension, types2.Branch:
|
|
// if this node's path did not show up in diffPathsAtB
|
|
// that means the node at this path was deleted (or moved) in B
|
|
// emit an empty "removed" diff to signify as such
|
|
if _, ok := diffPathsAtB[common.Bytes2Hex(node.Path)]; !ok {
|
|
if err := output(types2.StateNode{
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
NodeType: types2.Removed,
|
|
}); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
// fall through, we did everything we need to do with these node types
|
|
default:
|
|
return nil, fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
}
|
|
return diffAccountAtA, it.Error()
|
|
}
|
|
|
|
// buildAccountUpdates uses the account diffs maps for A => B and B => A and the known intersection of their leafkeys
|
|
// to generate the statediff node objects for all of the accounts that existed at both A and B but in different states
|
|
// needs to be called before building account creations and deletions as this mutates
|
|
// those account maps to remove the accounts which were updated
|
|
func (sdb *builder) buildAccountUpdates(creations, deletions types2.AccountMap, updatedKeys []string,
|
|
watchedStorageKeys []common.Hash, intermediateStorageNodes bool, output types2.StateNodeSink) error {
|
|
var err error
|
|
for _, key := range updatedKeys {
|
|
createdAcc := creations[key]
|
|
deletedAcc := deletions[key]
|
|
var storageDiffs []types2.StorageNode
|
|
if deletedAcc.Account != nil && createdAcc.Account != nil {
|
|
oldSR := deletedAcc.Account.Root
|
|
newSR := createdAcc.Account.Root
|
|
err = sdb.buildStorageNodesIncremental(
|
|
oldSR, newSR, watchedStorageKeys, intermediateStorageNodes,
|
|
storageNodeAppender(&storageDiffs))
|
|
if err != nil {
|
|
return fmt.Errorf("failed building incremental storage diffs for account with leafkey %s\r\nerror: %v", key, err)
|
|
}
|
|
}
|
|
if err = output(types2.StateNode{
|
|
NodeType: createdAcc.NodeType,
|
|
Path: createdAcc.Path,
|
|
NodeValue: createdAcc.NodeValue,
|
|
LeafKey: createdAcc.LeafKey,
|
|
StorageNodes: storageDiffs,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
delete(creations, key)
|
|
delete(deletions, key)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// buildAccountCreations returns the statediff node objects for all the accounts that exist at B but not at A
|
|
// it also returns the code and codehash for created contract accounts
|
|
func (sdb *builder) buildAccountCreations(accounts types2.AccountMap, watchedStorageKeys []common.Hash, intermediateStorageNodes bool, output types2.StateNodeSink, codeOutput types2.CodeSink) error {
|
|
for _, val := range accounts {
|
|
diff := types2.StateNode{
|
|
NodeType: val.NodeType,
|
|
Path: val.Path,
|
|
LeafKey: val.LeafKey,
|
|
NodeValue: val.NodeValue,
|
|
}
|
|
if !bytes.Equal(val.Account.CodeHash, nullCodeHash) {
|
|
// For contract creations, any storage node contained is a diff
|
|
var storageDiffs []types2.StorageNode
|
|
err := sdb.buildStorageNodesEventual(val.Account.Root, watchedStorageKeys, intermediateStorageNodes, storageNodeAppender(&storageDiffs))
|
|
if err != nil {
|
|
return fmt.Errorf("failed building eventual storage diffs for node %x\r\nerror: %v", val.Path, err)
|
|
}
|
|
diff.StorageNodes = storageDiffs
|
|
// emit codehash => code mappings for cod
|
|
codeHash := common.BytesToHash(val.Account.CodeHash)
|
|
code, err := sdb.stateCache.ContractCode(common.Hash{}, codeHash)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to retrieve code for codehash %s\r\n error: %v", codeHash.String(), err)
|
|
}
|
|
if err := codeOutput(types2.CodeAndCodeHash{
|
|
Hash: codeHash,
|
|
Code: code,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if err := output(diff); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// buildStorageNodesEventual builds the storage diff node objects for a created account
|
|
// i.e. it returns all the storage nodes at this state, since there is no previous state
|
|
func (sdb *builder) buildStorageNodesEventual(sr common.Hash, watchedStorageKeys []common.Hash, intermediateNodes bool, output types2.StorageNodeSink) error {
|
|
if bytes.Equal(sr.Bytes(), emptyContractRoot.Bytes()) {
|
|
return nil
|
|
}
|
|
log.Debug("Storage Root For Eventual Diff", "root", sr.Hex())
|
|
sTrie, err := sdb.stateCache.OpenTrie(sr)
|
|
if err != nil {
|
|
log.Info("error in build storage diff eventual", "error", err)
|
|
return err
|
|
}
|
|
it := sTrie.NodeIterator(make([]byte, 0))
|
|
err = sdb.buildStorageNodesFromTrie(it, watchedStorageKeys, intermediateNodes, output)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// buildStorageNodesFromTrie returns all the storage diff node objects in the provided node interator
|
|
// if any storage keys are provided it will only return those leaf nodes
|
|
// including intermediate nodes can be turned on or off
|
|
func (sdb *builder) buildStorageNodesFromTrie(it trie.NodeIterator, watchedStorageKeys []common.Hash, intermediateNodes bool, output types2.StorageNodeSink) error {
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.stateCache.TrieDB())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
switch node.NodeType {
|
|
case types2.Leaf:
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
if isWatchedStorageKey(watchedStorageKeys, leafKey) {
|
|
if err := output(types2.StorageNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
case types2.Extension, types2.Branch:
|
|
if intermediateNodes {
|
|
if err := output(types2.StorageNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
default:
|
|
return fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
}
|
|
return it.Error()
|
|
}
|
|
|
|
// buildStorageNodesIncremental builds the storage diff node objects for all nodes that exist in a different state at B than A
|
|
func (sdb *builder) buildStorageNodesIncremental(oldSR common.Hash, newSR common.Hash, watchedStorageKeys []common.Hash, intermediateNodes bool, output types2.StorageNodeSink) error {
|
|
if bytes.Equal(newSR.Bytes(), oldSR.Bytes()) {
|
|
return nil
|
|
}
|
|
log.Debug("Storage Roots for Incremental Diff", "old", oldSR.Hex(), "new", newSR.Hex())
|
|
oldTrie, err := sdb.stateCache.OpenTrie(oldSR)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
newTrie, err := sdb.stateCache.OpenTrie(newSR)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
diffPathsAtB, err := sdb.createdAndUpdatedStorage(
|
|
oldTrie.NodeIterator([]byte{}), newTrie.NodeIterator([]byte{}),
|
|
watchedStorageKeys, intermediateNodes, output)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = sdb.deletedOrUpdatedStorage(oldTrie.NodeIterator([]byte{}), newTrie.NodeIterator([]byte{}),
|
|
diffPathsAtB, watchedStorageKeys, intermediateNodes, output)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (sdb *builder) createdAndUpdatedStorage(a, b trie.NodeIterator, watchedKeys []common.Hash, intermediateNodes bool, output types2.StorageNodeSink) (map[string]bool, error) {
|
|
diffPathsAtB := make(map[string]bool)
|
|
it, _ := trie.NewDifferenceIterator(a, b)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.stateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
switch node.NodeType {
|
|
case types2.Leaf:
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
if isWatchedStorageKey(watchedKeys, leafKey) {
|
|
if err := output(types2.StorageNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
}); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
case types2.Extension, types2.Branch:
|
|
if intermediateNodes {
|
|
if err := output(types2.StorageNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
}); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
default:
|
|
return nil, fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
diffPathsAtB[common.Bytes2Hex(node.Path)] = true
|
|
}
|
|
return diffPathsAtB, it.Error()
|
|
}
|
|
|
|
func (sdb *builder) deletedOrUpdatedStorage(a, b trie.NodeIterator, diffPathsAtB map[string]bool, watchedKeys []common.Hash, intermediateNodes bool, output types2.StorageNodeSink) error {
|
|
it, _ := trie.NewDifferenceIterator(b, a)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.stateCache.TrieDB())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
// if this node path showed up in diffPathsAtB
|
|
// that means this node was updated at B and we already have the updated diff for it
|
|
// otherwise that means this node was deleted in B and we need to add a "removed" diff to represent that event
|
|
if _, ok := diffPathsAtB[common.Bytes2Hex(node.Path)]; ok {
|
|
continue
|
|
}
|
|
switch node.NodeType {
|
|
case types2.Leaf:
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
if isWatchedStorageKey(watchedKeys, leafKey) {
|
|
if err := output(types2.StorageNode{
|
|
NodeType: types2.Removed,
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
LeafKey: leafKey,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
case types2.Extension, types2.Branch:
|
|
if intermediateNodes {
|
|
if err := output(types2.StorageNode{
|
|
NodeType: types2.Removed,
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
default:
|
|
return fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
}
|
|
return it.Error()
|
|
}
|
|
|
|
// isWatchedAddress is used to check if a state account corresponds to one of the addresses the builder is configured to watch
|
|
func isWatchedAddress(watchedAddresses []common.Address, stateLeafKey []byte) bool {
|
|
// If we aren't watching any specific addresses, we are watching everything
|
|
if len(watchedAddresses) == 0 {
|
|
return true
|
|
}
|
|
for _, addr := range watchedAddresses {
|
|
addrHashKey := crypto.Keccak256(addr.Bytes())
|
|
if bytes.Equal(addrHashKey, stateLeafKey) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// isWatchedStorageKey is used to check if a storage leaf corresponds to one of the storage slots the builder is configured to watch
|
|
func isWatchedStorageKey(watchedKeys []common.Hash, storageLeafKey []byte) bool {
|
|
// If we aren't watching any specific addresses, we are watching everything
|
|
if len(watchedKeys) == 0 {
|
|
return true
|
|
}
|
|
for _, hashKey := range watchedKeys {
|
|
if bytes.Equal(hashKey.Bytes(), storageLeafKey) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|