package handlers import ( "fmt" "math/big" sdk "github.com/cosmos/cosmos-sdk/types" "github.com/cosmos/cosmos-sdk/x/auth" "github.com/cosmos/ethermint/types" ethcmn "github.com/ethereum/go-ethereum/common" ) const ( // TODO: Ported from the SDK and may have a different context/value for // Ethermint. verifySigCost = 100 ) // internalAnteHandler reflects a function signature an internal ante handler // must implementing. Internal ante handlers will be dependant upon the // transaction type. type internalAnteHandler func( sdkCtx sdk.Context, tx sdk.Tx, accMapper auth.AccountMapper, ) (newCtx sdk.Context, res sdk.Result, abort bool) // AnteHandler is responsible for attempting to route an Ethereum or SDK // transaction to an internal ante handler for performing transaction-level // processing (e.g. fee payment, signature verification) before being passed // onto it's respective handler. func AnteHandler(accMapper auth.AccountMapper, _ auth.FeeCollectionKeeper) sdk.AnteHandler { return func(sdkCtx sdk.Context, tx sdk.Tx) (newCtx sdk.Context, res sdk.Result, abort bool) { var ( handler internalAnteHandler gasLimit int64 ) switch tx := tx.(type) { case types.Transaction: gasLimit = int64(tx.Data().GasLimit) handler = handleEthTx case auth.StdTx: gasLimit = tx.Fee.Gas handler = handleEmbeddedTx default: return sdkCtx, sdk.ErrInternal(fmt.Sprintf("invalid transaction: %T", tx)).Result(), true } newCtx = sdkCtx.WithGasMeter(sdk.NewGasMeter(gasLimit)) // AnteHandlers must have their own defer/recover in order for the // BaseApp to know how much gas was used! This is because the GasMeter // is created in the AnteHandler, but if it panics the context won't be // set properly in runTx's recover. defer func() { if r := recover(); r != nil { switch rType := r.(type) { case sdk.ErrorOutOfGas: log := fmt.Sprintf("out of gas in location: %v", rType.Descriptor) res = sdk.ErrOutOfGas(log).Result() res.GasWanted = gasLimit res.GasUsed = newCtx.GasMeter().GasConsumed() abort = true default: panic(r) } } }() return handler(newCtx, tx, accMapper) } } // handleEthTx implements an ante handler for an Ethereum transaction. It // validates the signature and if valid returns an OK result. // // TODO: Do we need to do any further validation or account manipulation // (e.g. increment nonce)? func handleEthTx(sdkCtx sdk.Context, tx sdk.Tx, accMapper auth.AccountMapper) (sdk.Context, sdk.Result, bool) { ethTx, ok := tx.(types.Transaction) if !ok { return sdkCtx, sdk.ErrInternal(fmt.Sprintf("invalid transaction: %T", tx)).Result(), true } // the SDK chainID is a string representation of integer chainID, ok := new(big.Int).SetString(sdkCtx.ChainID(), 10) if !ok { // TODO: ErrInternal may not be correct error to throw here? return sdkCtx, sdk.ErrInternal(fmt.Sprintf("invalid chainID: %s", sdkCtx.ChainID())).Result(), true } sdkCtx.GasMeter().ConsumeGas(verifySigCost, "ante: verify Ethereum signature") addr, err := ethTx.VerifySig(chainID) if err != nil { return sdkCtx, sdk.ErrUnauthorized("signature verification failed").Result(), true } acc := accMapper.GetAccount(sdkCtx, addr.Bytes()) // validate the account nonce (referred to as sequence in the AccountMapper) seq := acc.GetSequence() if ethTx.Data().AccountNonce != uint64(seq) { return sdkCtx, sdk.ErrInvalidSequence(fmt.Sprintf("invalid account nonce; expected: %d", seq)).Result(), true } err = acc.SetSequence(seq + 1) if err != nil { return sdkCtx, sdk.ErrInternal(err.Error()).Result(), true } accMapper.SetAccount(sdkCtx, acc) return sdkCtx, sdk.Result{GasWanted: int64(ethTx.Data().GasLimit)}, false } // handleEmbeddedTx implements an ante handler for an SDK transaction. It // validates the signature and if valid returns an OK result. func handleEmbeddedTx(sdkCtx sdk.Context, tx sdk.Tx, accMapper auth.AccountMapper) (sdk.Context, sdk.Result, bool) { stdTx, ok := tx.(auth.StdTx) if !ok { return sdkCtx, sdk.ErrInternal(fmt.Sprintf("invalid transaction: %T", tx)).Result(), true } if err := validateStdTxBasic(stdTx); err != nil { return sdkCtx, err.Result(), true } signerAddrs := stdTx.GetSigners() signerAccs := make([]auth.Account, len(signerAddrs)) // validate signatures for i, sig := range stdTx.Signatures { signer := ethcmn.BytesToAddress(signerAddrs[i].Bytes()) acc, err := validateSignature(sdkCtx, stdTx, signer, sig, accMapper) // err.Code() != sdk.CodeOK if err != nil { return sdkCtx, err.Result(), true } // TODO: Fees! accMapper.SetAccount(sdkCtx, acc) signerAccs[i] = acc } newCtx := auth.WithSigners(sdkCtx, signerAccs) return newCtx, sdk.Result{GasWanted: stdTx.Fee.Gas}, false } // validateStdTxBasic validates an auth.StdTx based on parameters that do not // depend on the context. func validateStdTxBasic(stdTx auth.StdTx) (err sdk.Error) { sigs := stdTx.Signatures if len(sigs) == 0 { return sdk.ErrUnauthorized("transaction missing signatures") } signerAddrs := stdTx.GetSigners() if len(sigs) != len(signerAddrs) { return sdk.ErrUnauthorized("invalid number of transaction signers") } return nil } func validateSignature( sdkCtx sdk.Context, stdTx auth.StdTx, signer ethcmn.Address, sig auth.StdSignature, accMapper auth.AccountMapper, ) (acc auth.Account, sdkErr sdk.Error) { chainID := sdkCtx.ChainID() acc = accMapper.GetAccount(sdkCtx, signer.Bytes()) if acc == nil { return nil, sdk.ErrUnknownAddress(fmt.Sprintf("no account with address %s found", signer)) } accNum := acc.GetAccountNumber() if accNum != sig.AccountNumber { return nil, sdk.ErrInvalidSequence( fmt.Sprintf("invalid account number; got %d, expected %d", sig.AccountNumber, accNum)) } accSeq := acc.GetSequence() if accSeq != sig.Sequence { return nil, sdk.ErrInvalidSequence( fmt.Sprintf("invalid account sequence; got %d, expected %d", sig.Sequence, accSeq)) } err := acc.SetSequence(accSeq + 1) if err != nil { return nil, sdk.ErrInternal(err.Error()) } signBytes := types.GetStdTxSignBytes(chainID, accNum, accSeq, stdTx.Fee, stdTx.GetMsgs(), stdTx.Memo) // consume gas for signature verification sdkCtx.GasMeter().ConsumeGas(verifySigCost, "ante signature verification") if err := types.ValidateSigner(signBytes, sig.Signature, signer); err != nil { return nil, sdk.ErrUnauthorized(err.Error()) } return }