update tests, helper methods, etc for changed interfaces linted and some tests updated... statediff tests failing on filesystem call locally undo changes to go.mod from rebase changed ref and repo to try old stack-orch with miner.etherbase arg turn off new tests yml for old tests with hack for old stack-orchestrator cicd cleanup to trigger PR and testing (#324) publish step using broken tests switched (#325) Publish with old tests and no vulcanize publish (#326) * publish step using broken tests switched * rebase inserted old vulcanize publish steps run tests in Jenkins CICD (#327) * run race tests in CICD * set HOME env for .ethereum mkdir permission denied * use same homeDir method as other places in code * unused variable in test removed * do NOT run race tests Unit test inconsistencies (#330) * run race tests in CICD * set HOME env for .ethereum mkdir permission denied * use same homeDir method as other places in code * unused variable in test removed * do NOT run race tests * add statediffing test to Jenkinsfile Add COPY support for inserting multiple rows in a single operation. (#328) * Add COPY support for inserting multiple rows in a single command. Fix CI tests by using specific version of Foundry (#333) * Fix CI tests by using specific version of Foundry --------- Co-authored-by: Michael Shaw <michael@abastionofsanity.com> Add timers/counters for LevelDB Get, Put, Has, and Delete. (#332) * Add timers/counters for LevelDB Get, Put, Has, and Delete. * Test for null metrics (the unit tests don't initialize them). Add timer and counter for batched write operations. (#337) * Add timer and counter for batched write operations. * Tweak comment
935 lines
37 KiB
Go
935 lines
37 KiB
Go
// Copyright 2019 The go-ethereum Authors
|
|
// This file is part of the go-ethereum library.
|
|
//
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
// Contains a batch of utility type declarations used by the tests. As the node
|
|
// operates on unique types, a lot of them are needed to check various features.
|
|
|
|
package statediff
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
"time"
|
|
|
|
metrics2 "github.com/ethereum/go-ethereum/statediff/indexer/database/metrics"
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
"github.com/ethereum/go-ethereum/core/state"
|
|
"github.com/ethereum/go-ethereum/core/types"
|
|
"github.com/ethereum/go-ethereum/crypto"
|
|
"github.com/ethereum/go-ethereum/log"
|
|
"github.com/ethereum/go-ethereum/rlp"
|
|
"github.com/ethereum/go-ethereum/statediff/trie_helpers"
|
|
types2 "github.com/ethereum/go-ethereum/statediff/types"
|
|
"github.com/ethereum/go-ethereum/trie"
|
|
)
|
|
|
|
var (
|
|
nullHashBytes = common.Hex2Bytes("0000000000000000000000000000000000000000000000000000000000000000")
|
|
emptyNode, _ = rlp.EncodeToBytes(&[]byte{})
|
|
emptyContractRoot = crypto.Keccak256Hash(emptyNode)
|
|
nullCodeHash = crypto.Keccak256Hash([]byte{}).Bytes()
|
|
)
|
|
|
|
// Builder interface exposes the method for building a state diff between two blocks
|
|
type Builder interface {
|
|
BuildStateDiffObject(args Args, params Params) (types2.StateObject, error)
|
|
BuildStateTrieObject(current *types.Block) (types2.StateObject, error)
|
|
WriteStateDiffObject(args Args, params Params, output types2.StateNodeSink, codeOutput types2.CodeSink) error
|
|
}
|
|
|
|
type StateDiffBuilder struct {
|
|
StateCache state.Database
|
|
}
|
|
|
|
type IterPair struct {
|
|
Older, Newer trie.NodeIterator
|
|
}
|
|
|
|
// convenience
|
|
func StateNodeAppender(nodes *[]types2.StateNode) types2.StateNodeSink {
|
|
return func(node types2.StateNode) error {
|
|
*nodes = append(*nodes, node)
|
|
return nil
|
|
}
|
|
}
|
|
func StorageNodeAppender(nodes *[]types2.StorageNode) types2.StorageNodeSink {
|
|
return func(node types2.StorageNode) error {
|
|
*nodes = append(*nodes, node)
|
|
return nil
|
|
}
|
|
}
|
|
func CodeMappingAppender(codeAndCodeHashes *[]types2.CodeAndCodeHash) types2.CodeSink {
|
|
return func(c types2.CodeAndCodeHash) error {
|
|
*codeAndCodeHashes = append(*codeAndCodeHashes, c)
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// NewBuilder is used to create a statediff builder
|
|
func NewBuilder(stateCache state.Database) Builder {
|
|
return &StateDiffBuilder{
|
|
StateCache: stateCache, // state cache is safe for concurrent reads
|
|
}
|
|
}
|
|
|
|
// BuildStateTrieObject builds a state trie object from the provided block
|
|
func (sdb *StateDiffBuilder) BuildStateTrieObject(current *types.Block) (types2.StateObject, error) {
|
|
defer metrics2.UpdateDuration(time.Now(), metrics2.IndexerMetrics.BuildStateTrieObjectTimer)
|
|
currentTrie, err := sdb.StateCache.OpenTrie(current.Root())
|
|
if err != nil {
|
|
return types2.StateObject{}, fmt.Errorf("error creating trie for block %d: %v", current.Number(), err)
|
|
}
|
|
it := currentTrie.NodeIterator([]byte{})
|
|
stateNodes, codeAndCodeHashes, err := sdb.buildStateTrie(it)
|
|
if err != nil {
|
|
return types2.StateObject{}, fmt.Errorf("error collecting state nodes for block %d: %v", current.Number(), err)
|
|
}
|
|
return types2.StateObject{
|
|
BlockNumber: current.Number(),
|
|
BlockHash: current.Hash(),
|
|
Nodes: stateNodes,
|
|
CodeAndCodeHashes: codeAndCodeHashes,
|
|
}, nil
|
|
}
|
|
|
|
func (sdb *StateDiffBuilder) buildStateTrie(it trie.NodeIterator) ([]types2.StateNode, []types2.CodeAndCodeHash, error) {
|
|
defer metrics2.UpdateDuration(time.Now(), metrics2.IndexerMetrics.BuildStateTrieTimer)
|
|
stateNodes := make([]types2.StateNode, 0)
|
|
codeAndCodeHashes := make([]types2.CodeAndCodeHash, 0)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.StateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
switch node.NodeType {
|
|
case types2.Leaf:
|
|
var account types.StateAccount
|
|
if err := rlp.DecodeBytes(nodeElements[1].([]byte), &account); err != nil {
|
|
return nil, nil, fmt.Errorf("error decoding account for leaf node at path %x nerror: %v", node.Path, err)
|
|
}
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
node.LeafKey = leafKey
|
|
if !bytes.Equal(account.CodeHash, nullCodeHash) {
|
|
var storageNodes []types2.StorageNode
|
|
err := sdb.buildStorageNodesEventual(account.Root, true, StorageNodeAppender(&storageNodes))
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("failed building eventual storage diffs for account %+v\r\nerror: %v", account, err)
|
|
}
|
|
node.StorageNodes = storageNodes
|
|
// emit codehash => code mappings for cod
|
|
codeHash := common.BytesToHash(account.CodeHash)
|
|
code, err := sdb.StateCache.ContractCode(common.Hash{}, codeHash)
|
|
if err != nil {
|
|
return nil, nil, fmt.Errorf("failed to retrieve code for codehash %s\r\n error: %v", codeHash.String(), err)
|
|
}
|
|
codeAndCodeHashes = append(codeAndCodeHashes, types2.CodeAndCodeHash{
|
|
Hash: codeHash,
|
|
Code: code,
|
|
})
|
|
}
|
|
stateNodes = append(stateNodes, node)
|
|
case types2.Extension, types2.Branch:
|
|
stateNodes = append(stateNodes, node)
|
|
default:
|
|
return nil, nil, fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
}
|
|
return stateNodes, codeAndCodeHashes, it.Error()
|
|
}
|
|
|
|
// BuildStateDiffObject builds a statediff object from two blocks and the provided parameters
|
|
func (sdb *StateDiffBuilder) BuildStateDiffObject(args Args, params Params) (types2.StateObject, error) {
|
|
defer metrics2.UpdateDuration(time.Now(), metrics2.IndexerMetrics.BuildStateDiffObjectTimer)
|
|
var stateNodes []types2.StateNode
|
|
var codeAndCodeHashes []types2.CodeAndCodeHash
|
|
err := sdb.WriteStateDiffObject(args, params, StateNodeAppender(&stateNodes), CodeMappingAppender(&codeAndCodeHashes))
|
|
if err != nil {
|
|
return types2.StateObject{}, err
|
|
}
|
|
return types2.StateObject{
|
|
BlockHash: args.BlockHash,
|
|
BlockNumber: args.BlockNumber,
|
|
Nodes: stateNodes,
|
|
CodeAndCodeHashes: codeAndCodeHashes,
|
|
}, nil
|
|
}
|
|
|
|
// WriteStateDiffObject writes a statediff object to output callback
|
|
func (sdb *StateDiffBuilder) WriteStateDiffObject(args Args, params Params, output types2.StateNodeSink, codeOutput types2.CodeSink) error {
|
|
defer metrics2.UpdateDuration(time.Now(), metrics2.IndexerMetrics.WriteStateDiffObjectTimer)
|
|
// Load tries for old and new states
|
|
oldTrie, err := sdb.StateCache.OpenTrie(args.OldStateRoot)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating trie for oldStateRoot: %v", err)
|
|
}
|
|
newTrie, err := sdb.StateCache.OpenTrie(args.NewStateRoot)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating trie for newStateRoot: %v", err)
|
|
}
|
|
|
|
// we do two state trie iterations:
|
|
// one for new/updated nodes,
|
|
// one for deleted/updated nodes;
|
|
// prepare 2 iterator instances for each task
|
|
iterPairs := []IterPair{
|
|
{
|
|
Older: oldTrie.NodeIterator([]byte{}),
|
|
Newer: newTrie.NodeIterator([]byte{}),
|
|
},
|
|
{
|
|
Older: oldTrie.NodeIterator([]byte{}),
|
|
Newer: newTrie.NodeIterator([]byte{}),
|
|
},
|
|
}
|
|
|
|
logger := log.New("hash", args.BlockHash.Hex(), "number", args.BlockNumber)
|
|
if !params.IntermediateStateNodes {
|
|
return sdb.BuildStateDiffWithoutIntermediateStateNodes(iterPairs, params, output, codeOutput, logger)
|
|
} else {
|
|
return sdb.BuildStateDiffWithIntermediateStateNodes(iterPairs, params, output, codeOutput, logger)
|
|
}
|
|
}
|
|
|
|
func (sdb *StateDiffBuilder) BuildStateDiffWithIntermediateStateNodes(iterPairs []IterPair, params Params, output types2.StateNodeSink, codeOutput types2.CodeSink, logger log.Logger) error {
|
|
logger.Debug("statediff BEGIN BuildStateDiffWithIntermediateStateNodes")
|
|
defer metrics2.ReportAndUpdateDuration("statediff END BuildStateDiffWithIntermediateStateNodes", time.Now(), logger, metrics2.IndexerMetrics.BuildStateDiffWithIntermediateStateNodesTimer)
|
|
// collect a slice of all the nodes that were touched and exist at B (B-A)
|
|
// a map of their leafkey to all the accounts that were touched and exist at B
|
|
// and a slice of all the paths for the nodes in both of the above sets
|
|
diffAccountsAtB, diffPathsAtB, err := sdb.createdAndUpdatedStateWithIntermediateNodes(
|
|
iterPairs[0].Older, iterPairs[0].Newer, params.watchedAddressesLeafPaths, output, logger)
|
|
if err != nil {
|
|
return fmt.Errorf("error collecting createdAndUpdatedNodes: %v", err)
|
|
}
|
|
|
|
// collect a slice of all the nodes that existed at a path in A that doesn't exist in B
|
|
// a map of their leafkey to all the accounts that were touched and exist at A
|
|
diffAccountsAtA, err := sdb.deletedOrUpdatedState(
|
|
iterPairs[1].Older, iterPairs[1].Newer,
|
|
diffAccountsAtB, diffPathsAtB, params.watchedAddressesLeafPaths,
|
|
params.IntermediateStateNodes, params.IntermediateStorageNodes, output, logger)
|
|
if err != nil {
|
|
return fmt.Errorf("error collecting deletedOrUpdatedNodes: %v", err)
|
|
}
|
|
|
|
// collect and sort the leafkey keys for both account mappings into a slice
|
|
t := time.Now()
|
|
createKeys := trie_helpers.SortKeys(diffAccountsAtB)
|
|
deleteKeys := trie_helpers.SortKeys(diffAccountsAtA)
|
|
logger.Debug(fmt.Sprintf("statediff BuildStateDiffWithIntermediateStateNodes sort duration=%dms", time.Since(t).Milliseconds()))
|
|
|
|
// and then find the intersection of these keys
|
|
// these are the leafkeys for the accounts which exist at both A and B but are different
|
|
// this also mutates the passed in createKeys and deleteKeys, removing the intersection keys
|
|
// and leaving the truly created or deleted keys in place
|
|
t = time.Now()
|
|
updatedKeys := trie_helpers.FindIntersection(createKeys, deleteKeys)
|
|
logger.Debug(fmt.Sprintf("statediff BuildStateDiffWithIntermediateStateNodes intersection count=%d duration=%dms",
|
|
len(updatedKeys),
|
|
time.Since(t).Milliseconds()))
|
|
|
|
// build the diff nodes for the updated accounts using the mappings at both A and B as directed by the keys found as the intersection of the two
|
|
err = sdb.buildAccountUpdates(
|
|
diffAccountsAtB, diffAccountsAtA, updatedKeys,
|
|
params.IntermediateStorageNodes, output, logger)
|
|
if err != nil {
|
|
return fmt.Errorf("error building diff for updated accounts: %v", err)
|
|
}
|
|
// build the diff nodes for created accounts
|
|
err = sdb.buildAccountCreations(diffAccountsAtB, params.IntermediateStorageNodes, output, codeOutput, logger)
|
|
if err != nil {
|
|
return fmt.Errorf("error building diff for created accounts: %v", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (sdb *StateDiffBuilder) BuildStateDiffWithoutIntermediateStateNodes(iterPairs []IterPair, params Params, output types2.StateNodeSink, codeOutput types2.CodeSink, logger log.Logger) error {
|
|
logger.Debug("statediff BEGIN BuildStateDiffWithoutIntermediateStateNodes")
|
|
defer metrics2.ReportAndUpdateDuration("statediff END BuildStateDiffWithoutIntermediateStateNodes", time.Now(), logger, metrics2.IndexerMetrics.BuildStateDiffWithoutIntermediateStateNodesTimer)
|
|
// collect a map of their leafkey to all the accounts that were touched and exist at B
|
|
// and a slice of all the paths for the nodes in both of the above sets
|
|
diffAccountsAtB, diffPathsAtB, err := sdb.createdAndUpdatedState(
|
|
iterPairs[0].Older, iterPairs[0].Newer,
|
|
params.watchedAddressesLeafPaths, logger)
|
|
if err != nil {
|
|
return fmt.Errorf("error collecting createdAndUpdatedNodes: %v", err)
|
|
}
|
|
|
|
// collect a slice of all the nodes that existed at a path in A that doesn't exist in B
|
|
// a map of their leafkey to all the accounts that were touched and exist at A
|
|
diffAccountsAtA, err := sdb.deletedOrUpdatedState(
|
|
iterPairs[1].Older, iterPairs[1].Newer,
|
|
diffAccountsAtB, diffPathsAtB, params.watchedAddressesLeafPaths,
|
|
params.IntermediateStateNodes, params.IntermediateStorageNodes, output, logger)
|
|
if err != nil {
|
|
return fmt.Errorf("error collecting deletedOrUpdatedNodes: %v", err)
|
|
}
|
|
|
|
// collect and sort the leafkeys for both account mappings into a slice
|
|
t := time.Now()
|
|
createKeys := trie_helpers.SortKeys(diffAccountsAtB)
|
|
deleteKeys := trie_helpers.SortKeys(diffAccountsAtA)
|
|
logger.Debug(fmt.Sprintf("statediff BuildStateDiffWithoutIntermediateStateNodessort sort duration=%dms", time.Since(t).Milliseconds()))
|
|
|
|
// and then find the intersection of these keys
|
|
// these are the leafkeys for the accounts which exist at both A and B but are different
|
|
// this also mutates the passed in createKeys and deleteKeys, removing in intersection keys
|
|
// and leaving the truly created or deleted keys in place
|
|
t = time.Now()
|
|
updatedKeys := trie_helpers.FindIntersection(createKeys, deleteKeys)
|
|
logger.Debug(fmt.Sprintf("statediff BuildStateDiffWithoutIntermediateStateNodes intersection count=%d duration=%dms",
|
|
len(updatedKeys),
|
|
time.Since(t).Milliseconds()))
|
|
|
|
// build the diff nodes for the updated accounts using the mappings at both A and B as directed by the keys found as the intersection of the two
|
|
err = sdb.buildAccountUpdates(
|
|
diffAccountsAtB, diffAccountsAtA, updatedKeys,
|
|
params.IntermediateStorageNodes, output, logger)
|
|
if err != nil {
|
|
return fmt.Errorf("error building diff for updated accounts: %v", err)
|
|
}
|
|
// build the diff nodes for created accounts
|
|
err = sdb.buildAccountCreations(diffAccountsAtB, params.IntermediateStorageNodes, output, codeOutput, logger)
|
|
if err != nil {
|
|
return fmt.Errorf("error building diff for created accounts: %v", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// createdAndUpdatedState returns
|
|
// a mapping of their leafkeys to all the accounts that exist in a different state at B than A
|
|
// and a slice of the paths for all of the nodes included in both
|
|
func (sdb *StateDiffBuilder) createdAndUpdatedState(a, b trie.NodeIterator, watchedAddressesLeafPaths [][]byte, logger log.Logger) (types2.AccountMap, map[string]bool, error) {
|
|
logger.Debug("statediff BEGIN createdAndUpdatedState")
|
|
defer metrics2.ReportAndUpdateDuration("statediff END createdAndUpdatedState", time.Now(), logger, metrics2.IndexerMetrics.CreatedAndUpdatedStateTimer)
|
|
diffPathsAtB := make(map[string]bool)
|
|
diffAccountsAtB := make(types2.AccountMap)
|
|
watchingAddresses := len(watchedAddressesLeafPaths) > 0
|
|
|
|
it, _ := trie.NewDifferenceIterator(a, b)
|
|
for it.Next(true) {
|
|
// ignore node if it is not along paths of interest
|
|
if watchingAddresses && !isValidPrefixPath(watchedAddressesLeafPaths, it.Path()) {
|
|
continue
|
|
}
|
|
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.StateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
if node.NodeType == types2.Leaf {
|
|
// created vs updated is important for leaf nodes since we need to diff their storage
|
|
// so we need to map all changed accounts at B to their leafkey, since account can change pathes but not leafkey
|
|
var account types.StateAccount
|
|
if err := rlp.DecodeBytes(nodeElements[1].([]byte), &account); err != nil {
|
|
return nil, nil, fmt.Errorf("error decoding account for leaf node at path %x nerror: %v", node.Path, err)
|
|
}
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
|
|
// ignore leaf node if it is not a watched address
|
|
if !isWatchedAddress(watchedAddressesLeafPaths, valueNodePath) {
|
|
continue
|
|
}
|
|
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
diffAccountsAtB[common.Bytes2Hex(leafKey)] = types2.AccountWrapper{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
Account: &account,
|
|
}
|
|
}
|
|
// add both intermediate and leaf node paths to the list of diffPathsAtB
|
|
diffPathsAtB[common.Bytes2Hex(node.Path)] = true
|
|
}
|
|
return diffAccountsAtB, diffPathsAtB, it.Error()
|
|
}
|
|
|
|
// createdAndUpdatedStateWithIntermediateNodes returns
|
|
// a slice of all the intermediate nodes that exist in a different state at B than A
|
|
// a mapping of their leafkeys to all the accounts that exist in a different state at B than A
|
|
// and a slice of the paths for all of the nodes included in both
|
|
func (sdb *StateDiffBuilder) createdAndUpdatedStateWithIntermediateNodes(a, b trie.NodeIterator, watchedAddressesLeafPaths [][]byte, output types2.StateNodeSink, logger log.Logger) (types2.AccountMap, map[string]bool, error) {
|
|
logger.Debug("statediff BEGIN createdAndUpdatedStateWithIntermediateNodes")
|
|
defer metrics2.ReportAndUpdateDuration("statediff END createdAndUpdatedStateWithIntermediateNodes", time.Now(), logger, metrics2.IndexerMetrics.CreatedAndUpdatedStateWithIntermediateNodesTimer)
|
|
diffPathsAtB := make(map[string]bool)
|
|
diffAccountsAtB := make(types2.AccountMap)
|
|
watchingAddresses := len(watchedAddressesLeafPaths) > 0
|
|
|
|
it, itCount := trie.NewDifferenceIterator(a, b)
|
|
for it.Next(true) {
|
|
// ignore node if it is not along paths of interest
|
|
if watchingAddresses && !isValidPrefixPath(watchedAddressesLeafPaths, it.Path()) {
|
|
continue
|
|
}
|
|
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.StateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
switch node.NodeType {
|
|
case types2.Leaf:
|
|
// created vs updated is important for leaf nodes since we need to diff their storage
|
|
// so we need to map all changed accounts at B to their leafkey, since account can change paths but not leafkey
|
|
var account types.StateAccount
|
|
if err := rlp.DecodeBytes(nodeElements[1].([]byte), &account); err != nil {
|
|
return nil, nil, fmt.Errorf("error decoding account for leaf node at path %x nerror: %v", node.Path, err)
|
|
}
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
|
|
// ignore leaf node if it is not a watched address
|
|
if !isWatchedAddress(watchedAddressesLeafPaths, valueNodePath) {
|
|
continue
|
|
}
|
|
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
diffAccountsAtB[common.Bytes2Hex(leafKey)] = types2.AccountWrapper{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
Account: &account,
|
|
}
|
|
case types2.Extension, types2.Branch:
|
|
// create a diff for any intermediate node that has changed at b
|
|
// created vs updated makes no difference for intermediate nodes since we do not need to diff storage
|
|
if err := output(types2.StateNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
}); err != nil {
|
|
return nil, nil, err
|
|
}
|
|
default:
|
|
return nil, nil, fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
// add both intermediate and leaf node paths to the list of diffPathsAtB
|
|
diffPathsAtB[common.Bytes2Hex(node.Path)] = true
|
|
}
|
|
logger.Debug("statediff COUNTS createdAndUpdatedStateWithIntermediateNodes", "it", itCount, "diffAccountsAtB", len(diffAccountsAtB), "diffPathsAtB", len(diffPathsAtB))
|
|
metrics2.IndexerMetrics.DifferenceIteratorCounter.Inc(int64(*itCount))
|
|
return diffAccountsAtB, diffPathsAtB, it.Error()
|
|
}
|
|
|
|
// deletedOrUpdatedState returns a slice of all the pathes that are emptied at B
|
|
// and a mapping of their leafkeys to all the accounts that exist in a different state at A than B
|
|
func (sdb *StateDiffBuilder) deletedOrUpdatedState(a, b trie.NodeIterator, diffAccountsAtB types2.AccountMap, diffPathsAtB map[string]bool, watchedAddressesLeafPaths [][]byte, intermediateStateNodes, intermediateStorageNodes bool, output types2.StateNodeSink, logger log.Logger) (types2.AccountMap, error) {
|
|
logger.Debug("statediff BEGIN deletedOrUpdatedState")
|
|
defer metrics2.ReportAndUpdateDuration("statediff END deletedOrUpdatedState", time.Now(), logger, metrics2.IndexerMetrics.DeletedOrUpdatedStateTimer)
|
|
diffAccountAtA := make(types2.AccountMap)
|
|
watchingAddresses := len(watchedAddressesLeafPaths) > 0
|
|
|
|
it, _ := trie.NewDifferenceIterator(b, a)
|
|
for it.Next(true) {
|
|
// ignore node if it is not along paths of interest
|
|
if watchingAddresses && !isValidPrefixPath(watchedAddressesLeafPaths, it.Path()) {
|
|
continue
|
|
}
|
|
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.StateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
switch node.NodeType {
|
|
case types2.Leaf:
|
|
// map all different accounts at A to their leafkey
|
|
var account types.StateAccount
|
|
if err := rlp.DecodeBytes(nodeElements[1].([]byte), &account); err != nil {
|
|
return nil, fmt.Errorf("error decoding account for leaf node at path %x nerror: %v", node.Path, err)
|
|
}
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
|
|
// ignore leaf node if it is not a watched address
|
|
if !isWatchedAddress(watchedAddressesLeafPaths, valueNodePath) {
|
|
continue
|
|
}
|
|
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
diffAccountAtA[common.Bytes2Hex(leafKey)] = types2.AccountWrapper{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
Account: &account,
|
|
}
|
|
// if this node's path did not show up in diffPathsAtB
|
|
// that means the node at this path was deleted (or moved) in B
|
|
if _, ok := diffPathsAtB[common.Bytes2Hex(node.Path)]; !ok {
|
|
var diff types2.StateNode
|
|
// if this node's leaf key also did not show up in diffAccountsAtB
|
|
// that means the node was deleted
|
|
// in that case, emit an empty "removed" diff state node
|
|
// include empty "removed" diff storage nodes for all the storage slots
|
|
if _, ok := diffAccountsAtB[common.Bytes2Hex(leafKey)]; !ok {
|
|
diff = types2.StateNode{
|
|
NodeType: types2.Removed,
|
|
Path: node.Path,
|
|
LeafKey: leafKey,
|
|
NodeValue: []byte{},
|
|
}
|
|
|
|
var storageDiffs []types2.StorageNode
|
|
err := sdb.buildRemovedAccountStorageNodes(account.Root, intermediateStorageNodes, StorageNodeAppender(&storageDiffs))
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed building storage diffs for removed node %x\r\nerror: %v", node.Path, err)
|
|
}
|
|
diff.StorageNodes = storageDiffs
|
|
} else {
|
|
// emit an empty "removed" diff with empty leaf key if the account was moved
|
|
diff = types2.StateNode{
|
|
NodeType: types2.Removed,
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
}
|
|
}
|
|
|
|
if err := output(diff); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
case types2.Extension, types2.Branch:
|
|
// if this node's path did not show up in diffPathsAtB
|
|
// that means the node at this path was deleted (or moved) in B
|
|
// emit an empty "removed" diff to signify as such
|
|
if intermediateStateNodes {
|
|
if _, ok := diffPathsAtB[common.Bytes2Hex(node.Path)]; !ok {
|
|
if err := output(types2.StateNode{
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
NodeType: types2.Removed,
|
|
}); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
}
|
|
// fall through, we did everything we need to do with these node types
|
|
default:
|
|
return nil, fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
}
|
|
return diffAccountAtA, it.Error()
|
|
}
|
|
|
|
// buildAccountUpdates uses the account diffs maps for A => B and B => A and the known intersection of their leafkeys
|
|
// to generate the statediff node objects for all of the accounts that existed at both A and B but in different states
|
|
// needs to be called before building account creations and deletions as this mutates
|
|
// those account maps to remove the accounts which were updated
|
|
func (sdb *StateDiffBuilder) buildAccountUpdates(creations, deletions types2.AccountMap, updatedKeys []string, intermediateStorageNodes bool, output types2.StateNodeSink, logger log.Logger) error {
|
|
logger.Debug("statediff BEGIN buildAccountUpdates", "creations", len(creations), "deletions", len(deletions), "updatedKeys", len(updatedKeys))
|
|
defer metrics2.ReportAndUpdateDuration("statediff END buildAccountUpdates ", time.Now(), logger, metrics2.IndexerMetrics.BuildAccountUpdatesTimer)
|
|
var err error
|
|
for _, key := range updatedKeys {
|
|
createdAcc := creations[key]
|
|
deletedAcc := deletions[key]
|
|
var storageDiffs []types2.StorageNode
|
|
if deletedAcc.Account != nil && createdAcc.Account != nil {
|
|
oldSR := deletedAcc.Account.Root
|
|
newSR := createdAcc.Account.Root
|
|
err = sdb.buildStorageNodesIncremental(
|
|
oldSR, newSR, intermediateStorageNodes,
|
|
StorageNodeAppender(&storageDiffs))
|
|
if err != nil {
|
|
return fmt.Errorf("failed building incremental storage diffs for account with leafkey %s\r\nerror: %v", key, err)
|
|
}
|
|
}
|
|
if err = output(types2.StateNode{
|
|
NodeType: createdAcc.NodeType,
|
|
Path: createdAcc.Path,
|
|
NodeValue: createdAcc.NodeValue,
|
|
LeafKey: createdAcc.LeafKey,
|
|
StorageNodes: storageDiffs,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
delete(creations, key)
|
|
delete(deletions, key)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// buildAccountCreations returns the statediff node objects for all the accounts that exist at B but not at A
|
|
// it also returns the code and codehash for created contract accounts
|
|
func (sdb *StateDiffBuilder) buildAccountCreations(accounts types2.AccountMap, intermediateStorageNodes bool, output types2.StateNodeSink, codeOutput types2.CodeSink, logger log.Logger) error {
|
|
logger.Debug("statediff BEGIN buildAccountCreations")
|
|
defer metrics2.ReportAndUpdateDuration("statediff END buildAccountCreations", time.Now(), logger, metrics2.IndexerMetrics.BuildAccountCreationsTimer)
|
|
for _, val := range accounts {
|
|
diff := types2.StateNode{
|
|
NodeType: val.NodeType,
|
|
Path: val.Path,
|
|
LeafKey: val.LeafKey,
|
|
NodeValue: val.NodeValue,
|
|
}
|
|
if !bytes.Equal(val.Account.CodeHash, nullCodeHash) {
|
|
// For contract creations, any storage node contained is a diff
|
|
var storageDiffs []types2.StorageNode
|
|
err := sdb.buildStorageNodesEventual(val.Account.Root, intermediateStorageNodes, StorageNodeAppender(&storageDiffs))
|
|
if err != nil {
|
|
return fmt.Errorf("failed building eventual storage diffs for node %x\r\nerror: %v", val.Path, err)
|
|
}
|
|
diff.StorageNodes = storageDiffs
|
|
// emit codehash => code mappings for cod
|
|
codeHash := common.BytesToHash(val.Account.CodeHash)
|
|
code, err := sdb.StateCache.ContractCode(common.Hash{}, codeHash)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to retrieve code for codehash %s\r\n error: %v", codeHash.String(), err)
|
|
}
|
|
if err := codeOutput(types2.CodeAndCodeHash{
|
|
Hash: codeHash,
|
|
Code: code,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if err := output(diff); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// buildStorageNodesEventual builds the storage diff node objects for a created account
|
|
// i.e. it returns all the storage nodes at this state, since there is no previous state
|
|
func (sdb *StateDiffBuilder) buildStorageNodesEventual(sr common.Hash, intermediateNodes bool, output types2.StorageNodeSink) error {
|
|
defer metrics2.UpdateDuration(time.Now(), metrics2.IndexerMetrics.BuildStorageNodesEventualTimer)
|
|
if bytes.Equal(sr.Bytes(), emptyContractRoot.Bytes()) {
|
|
return nil
|
|
}
|
|
log.Debug("Storage Root For Eventual Diff", "root", sr.Hex())
|
|
sTrie, err := sdb.StateCache.OpenTrie(sr)
|
|
if err != nil {
|
|
log.Info("error in build storage diff eventual", "error", err)
|
|
return err
|
|
}
|
|
it := sTrie.NodeIterator(make([]byte, 0))
|
|
err = sdb.buildStorageNodesFromTrie(it, intermediateNodes, output)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// buildStorageNodesFromTrie returns all the storage diff node objects in the provided node interator
|
|
// including intermediate nodes can be turned on or off
|
|
func (sdb *StateDiffBuilder) buildStorageNodesFromTrie(it trie.NodeIterator, intermediateNodes bool, output types2.StorageNodeSink) error {
|
|
defer metrics2.UpdateDuration(time.Now(), metrics2.IndexerMetrics.BuildStorageNodesFromTrieTimer)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.StateCache.TrieDB())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
switch node.NodeType {
|
|
case types2.Leaf:
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
if err := output(types2.StorageNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
case types2.Extension, types2.Branch:
|
|
if intermediateNodes {
|
|
if err := output(types2.StorageNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
default:
|
|
return fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
}
|
|
return it.Error()
|
|
}
|
|
|
|
// buildRemovedAccountStorageNodes builds the "removed" diffs for all the storage nodes for a destroyed account
|
|
func (sdb *StateDiffBuilder) buildRemovedAccountStorageNodes(sr common.Hash, intermediateNodes bool, output types2.StorageNodeSink) error {
|
|
defer metrics2.UpdateDuration(time.Now(), metrics2.IndexerMetrics.BuildRemovedAccountStorageNodesTimer)
|
|
if bytes.Equal(sr.Bytes(), emptyContractRoot.Bytes()) {
|
|
return nil
|
|
}
|
|
log.Debug("Storage Root For Removed Diffs", "root", sr.Hex())
|
|
sTrie, err := sdb.StateCache.OpenTrie(sr)
|
|
if err != nil {
|
|
log.Info("error in build removed account storage diffs", "error", err)
|
|
return err
|
|
}
|
|
it := sTrie.NodeIterator(make([]byte, 0))
|
|
err = sdb.buildRemovedStorageNodesFromTrie(it, intermediateNodes, output)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// buildRemovedStorageNodesFromTrie returns diffs for all the storage nodes in the provided node interator
|
|
// including intermediate nodes can be turned on or off
|
|
func (sdb *StateDiffBuilder) buildRemovedStorageNodesFromTrie(it trie.NodeIterator, intermediateNodes bool, output types2.StorageNodeSink) error {
|
|
defer metrics2.UpdateDuration(time.Now(), metrics2.IndexerMetrics.BuildRemovedStorageNodesFromTrieTimer)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.StateCache.TrieDB())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
switch node.NodeType {
|
|
case types2.Leaf:
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
if err := output(types2.StorageNode{
|
|
NodeType: types2.Removed,
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
LeafKey: leafKey,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
case types2.Extension, types2.Branch:
|
|
if intermediateNodes {
|
|
if err := output(types2.StorageNode{
|
|
NodeType: types2.Removed,
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
default:
|
|
return fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
}
|
|
return it.Error()
|
|
}
|
|
|
|
// buildStorageNodesIncremental builds the storage diff node objects for all nodes that exist in a different state at B than A
|
|
func (sdb *StateDiffBuilder) buildStorageNodesIncremental(oldSR common.Hash, newSR common.Hash, intermediateNodes bool, output types2.StorageNodeSink) error {
|
|
defer metrics2.UpdateDuration(time.Now(), metrics2.IndexerMetrics.BuildStorageNodesIncrementalTimer)
|
|
if bytes.Equal(newSR.Bytes(), oldSR.Bytes()) {
|
|
return nil
|
|
}
|
|
log.Trace("Storage Roots for Incremental Diff", "old", oldSR.Hex(), "new", newSR.Hex())
|
|
oldTrie, err := sdb.StateCache.OpenTrie(oldSR)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
newTrie, err := sdb.StateCache.OpenTrie(newSR)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
diffSlotsAtB, diffPathsAtB, err := sdb.createdAndUpdatedStorage(
|
|
oldTrie.NodeIterator([]byte{}), newTrie.NodeIterator([]byte{}),
|
|
intermediateNodes, output)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = sdb.deletedOrUpdatedStorage(oldTrie.NodeIterator([]byte{}), newTrie.NodeIterator([]byte{}),
|
|
diffSlotsAtB, diffPathsAtB, intermediateNodes, output)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (sdb *StateDiffBuilder) createdAndUpdatedStorage(a, b trie.NodeIterator, intermediateNodes bool, output types2.StorageNodeSink) (map[string]bool, map[string]bool, error) {
|
|
defer metrics2.UpdateDuration(time.Now(), metrics2.IndexerMetrics.CreatedAndUpdatedStorageTimer)
|
|
diffPathsAtB := make(map[string]bool)
|
|
diffSlotsAtB := make(map[string]bool)
|
|
it, _ := trie.NewDifferenceIterator(a, b)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.StateCache.TrieDB())
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
switch node.NodeType {
|
|
case types2.Leaf:
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
diffSlotsAtB[common.Bytes2Hex(leafKey)] = true
|
|
if err := output(types2.StorageNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
LeafKey: leafKey,
|
|
}); err != nil {
|
|
return nil, nil, err
|
|
}
|
|
case types2.Extension, types2.Branch:
|
|
if intermediateNodes {
|
|
if err := output(types2.StorageNode{
|
|
NodeType: node.NodeType,
|
|
Path: node.Path,
|
|
NodeValue: node.NodeValue,
|
|
}); err != nil {
|
|
return nil, nil, err
|
|
}
|
|
}
|
|
default:
|
|
return nil, nil, fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
diffPathsAtB[common.Bytes2Hex(node.Path)] = true
|
|
}
|
|
return diffSlotsAtB, diffPathsAtB, it.Error()
|
|
}
|
|
|
|
func (sdb *StateDiffBuilder) deletedOrUpdatedStorage(a, b trie.NodeIterator, diffSlotsAtB, diffPathsAtB map[string]bool, intermediateNodes bool, output types2.StorageNodeSink) error {
|
|
defer metrics2.UpdateDuration(time.Now(), metrics2.IndexerMetrics.DeletedOrUpdatedStorageTimer)
|
|
it, _ := trie.NewDifferenceIterator(b, a)
|
|
for it.Next(true) {
|
|
// skip value nodes
|
|
if it.Leaf() || bytes.Equal(nullHashBytes, it.Hash().Bytes()) {
|
|
continue
|
|
}
|
|
node, nodeElements, err := trie_helpers.ResolveNode(it, sdb.StateCache.TrieDB())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
switch node.NodeType {
|
|
case types2.Leaf:
|
|
partialPath := trie.CompactToHex(nodeElements[0].([]byte))
|
|
valueNodePath := append(node.Path, partialPath...)
|
|
encodedPath := trie.HexToCompact(valueNodePath)
|
|
leafKey := encodedPath[1:]
|
|
|
|
// if this node's path did not show up in diffPathsAtB
|
|
// that means the node at this path was deleted (or moved) in B
|
|
if _, ok := diffPathsAtB[common.Bytes2Hex(node.Path)]; !ok {
|
|
// if this node's leaf key also did not show up in diffSlotsAtB
|
|
// that means the node was deleted
|
|
// in that case, emit an empty "removed" diff storage node
|
|
if _, ok := diffSlotsAtB[common.Bytes2Hex(leafKey)]; !ok {
|
|
if err := output(types2.StorageNode{
|
|
NodeType: types2.Removed,
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
LeafKey: leafKey,
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
// emit an empty "removed" diff with empty leaf key if the account was moved
|
|
if err := output(types2.StorageNode{
|
|
NodeType: types2.Removed,
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
case types2.Extension, types2.Branch:
|
|
// if this node's path did not show up in diffPathsAtB
|
|
// that means the node at this path was deleted in B
|
|
// in that case, emit an empty "removed" diff storage node
|
|
if _, ok := diffPathsAtB[common.Bytes2Hex(node.Path)]; !ok {
|
|
if intermediateNodes {
|
|
if err := output(types2.StorageNode{
|
|
NodeType: types2.Removed,
|
|
Path: node.Path,
|
|
NodeValue: []byte{},
|
|
}); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
default:
|
|
return fmt.Errorf("unexpected node type %s", node.NodeType)
|
|
}
|
|
}
|
|
return it.Error()
|
|
}
|
|
|
|
// isValidPrefixPath is used to check if a node at currentPath is a parent | ancestor to one of the addresses the builder is configured to watch
|
|
func isValidPrefixPath(watchedAddressesLeafPaths [][]byte, currentPath []byte) bool {
|
|
for _, watchedAddressPath := range watchedAddressesLeafPaths {
|
|
if bytes.HasPrefix(watchedAddressPath, currentPath) {
|
|
return true
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// isWatchedAddress is used to check if a state account corresponds to one of the addresses the builder is configured to watch
|
|
func isWatchedAddress(watchedAddressesLeafPaths [][]byte, valueNodePath []byte) bool {
|
|
defer metrics2.UpdateDuration(time.Now(), metrics2.IndexerMetrics.IsWatchedAddressTimer)
|
|
// If we aren't watching any specific addresses, we are watching everything
|
|
if len(watchedAddressesLeafPaths) == 0 {
|
|
return true
|
|
}
|
|
|
|
for _, watchedAddressPath := range watchedAddressesLeafPaths {
|
|
if bytes.Equal(watchedAddressPath, valueNodePath) {
|
|
return true
|
|
}
|
|
}
|
|
|
|
return false
|
|
}
|