2016-11-08 19:01:56 -06:00
|
|
|
// Copyright 2016 The go-ethereum Authors
|
2016-10-13 22:51:29 -05:00
|
|
|
// This file is part of the go-ethereum library.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
package les
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/binary"
|
2017-03-03 03:41:52 -06:00
|
|
|
"errors"
|
2017-02-22 06:10:07 -06:00
|
|
|
"fmt"
|
2016-10-13 22:51:29 -05:00
|
|
|
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
2018-05-07 06:35:06 -05:00
|
|
|
"github.com/ethereum/go-ethereum/core/rawdb"
|
2016-10-13 22:51:29 -05:00
|
|
|
"github.com/ethereum/go-ethereum/core/types"
|
|
|
|
"github.com/ethereum/go-ethereum/crypto"
|
|
|
|
"github.com/ethereum/go-ethereum/ethdb"
|
|
|
|
"github.com/ethereum/go-ethereum/light"
|
2017-02-22 06:10:07 -06:00
|
|
|
"github.com/ethereum/go-ethereum/log"
|
2016-10-13 22:51:29 -05:00
|
|
|
"github.com/ethereum/go-ethereum/rlp"
|
|
|
|
"github.com/ethereum/go-ethereum/trie"
|
|
|
|
)
|
|
|
|
|
2017-03-03 03:41:52 -06:00
|
|
|
var (
|
|
|
|
errInvalidMessageType = errors.New("invalid message type")
|
2017-10-24 08:19:09 -05:00
|
|
|
errInvalidEntryCount = errors.New("invalid number of response entries")
|
2017-03-03 03:41:52 -06:00
|
|
|
errHeaderUnavailable = errors.New("header unavailable")
|
|
|
|
errTxHashMismatch = errors.New("transaction hash mismatch")
|
|
|
|
errUncleHashMismatch = errors.New("uncle hash mismatch")
|
|
|
|
errReceiptHashMismatch = errors.New("receipt hash mismatch")
|
|
|
|
errDataHashMismatch = errors.New("data hash mismatch")
|
|
|
|
errCHTHashMismatch = errors.New("cht hash mismatch")
|
2017-10-24 08:19:09 -05:00
|
|
|
errCHTNumberMismatch = errors.New("cht number mismatch")
|
|
|
|
errUselessNodes = errors.New("useless nodes in merkle proof nodeset")
|
2017-03-03 03:41:52 -06:00
|
|
|
)
|
|
|
|
|
2016-10-13 22:51:29 -05:00
|
|
|
type LesOdrRequest interface {
|
2020-02-26 03:41:24 -06:00
|
|
|
GetCost(*serverPeer) uint64
|
|
|
|
CanSend(*serverPeer) bool
|
|
|
|
Request(uint64, *serverPeer) error
|
2017-03-22 14:44:22 -05:00
|
|
|
Validate(ethdb.Database, *Msg) error
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
func LesRequest(req light.OdrRequest) LesOdrRequest {
|
|
|
|
switch r := req.(type) {
|
|
|
|
case *light.BlockRequest:
|
|
|
|
return (*BlockRequest)(r)
|
|
|
|
case *light.ReceiptsRequest:
|
|
|
|
return (*ReceiptsRequest)(r)
|
|
|
|
case *light.TrieRequest:
|
|
|
|
return (*TrieRequest)(r)
|
|
|
|
case *light.CodeRequest:
|
|
|
|
return (*CodeRequest)(r)
|
|
|
|
case *light.ChtRequest:
|
|
|
|
return (*ChtRequest)(r)
|
2017-10-24 08:19:09 -05:00
|
|
|
case *light.BloomRequest:
|
|
|
|
return (*BloomRequest)(r)
|
2019-05-13 06:41:10 -05:00
|
|
|
case *light.TxStatusRequest:
|
|
|
|
return (*TxStatusRequest)(r)
|
2016-10-13 22:51:29 -05:00
|
|
|
default:
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// BlockRequest is the ODR request type for block bodies
|
|
|
|
type BlockRequest light.BlockRequest
|
|
|
|
|
|
|
|
// GetCost returns the cost of the given ODR request according to the serving
|
|
|
|
// peer's cost table (implementation of LesOdrRequest)
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *BlockRequest) GetCost(peer *serverPeer) uint64 {
|
|
|
|
return peer.getRequestCost(GetBlockBodiesMsg, 1)
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
2016-12-09 23:50:36 -06:00
|
|
|
// CanSend tells if a certain peer is suitable for serving the given request
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *BlockRequest) CanSend(peer *serverPeer) bool {
|
2018-10-01 08:14:53 -05:00
|
|
|
return peer.HasBlock(r.Hash, r.Number, false)
|
2016-12-09 23:50:36 -06:00
|
|
|
}
|
|
|
|
|
2016-10-13 22:51:29 -05:00
|
|
|
// Request sends an ODR request to the LES network (implementation of LesOdrRequest)
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *BlockRequest) Request(reqID uint64, peer *serverPeer) error {
|
2017-03-03 03:41:52 -06:00
|
|
|
peer.Log().Debug("Requesting block body", "hash", r.Hash)
|
2020-02-26 03:41:24 -06:00
|
|
|
return peer.requestBodies(reqID, []common.Hash{r.Hash})
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Valid processes an ODR request reply message from the LES network
|
|
|
|
// returns true and stores results in memory if the message was a valid reply
|
|
|
|
// to the request (implementation of LesOdrRequest)
|
2017-03-22 14:44:22 -05:00
|
|
|
func (r *BlockRequest) Validate(db ethdb.Database, msg *Msg) error {
|
2017-03-03 03:41:52 -06:00
|
|
|
log.Debug("Validating block body", "hash", r.Hash)
|
|
|
|
|
|
|
|
// Ensure we have a correct message with a single block body
|
2016-10-13 22:51:29 -05:00
|
|
|
if msg.MsgType != MsgBlockBodies {
|
2017-03-03 03:41:52 -06:00
|
|
|
return errInvalidMessageType
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
bodies := msg.Obj.([]*types.Body)
|
|
|
|
if len(bodies) != 1 {
|
2017-10-24 08:19:09 -05:00
|
|
|
return errInvalidEntryCount
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
body := bodies[0]
|
2017-03-03 03:41:52 -06:00
|
|
|
|
|
|
|
// Retrieve our stored header and validate block content against it
|
2020-07-13 04:02:54 -05:00
|
|
|
if r.Header == nil {
|
|
|
|
r.Header = rawdb.ReadHeader(db, r.Hash, r.Number)
|
|
|
|
}
|
|
|
|
if r.Header == nil {
|
2017-03-03 03:41:52 -06:00
|
|
|
return errHeaderUnavailable
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2020-07-13 04:02:54 -05:00
|
|
|
if r.Header.TxHash != types.DeriveSha(types.Transactions(body.Transactions)) {
|
2017-03-03 03:41:52 -06:00
|
|
|
return errTxHashMismatch
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2020-07-13 04:02:54 -05:00
|
|
|
if r.Header.UncleHash != types.CalcUncleHash(body.Uncles) {
|
2017-03-03 03:41:52 -06:00
|
|
|
return errUncleHashMismatch
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2017-03-03 03:41:52 -06:00
|
|
|
// Validations passed, encode and store RLP
|
2016-10-13 22:51:29 -05:00
|
|
|
data, err := rlp.EncodeToBytes(body)
|
|
|
|
if err != nil {
|
2017-03-03 03:41:52 -06:00
|
|
|
return err
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2017-03-03 03:41:52 -06:00
|
|
|
r.Rlp = data
|
|
|
|
return nil
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// ReceiptsRequest is the ODR request type for block receipts by block hash
|
|
|
|
type ReceiptsRequest light.ReceiptsRequest
|
|
|
|
|
|
|
|
// GetCost returns the cost of the given ODR request according to the serving
|
|
|
|
// peer's cost table (implementation of LesOdrRequest)
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *ReceiptsRequest) GetCost(peer *serverPeer) uint64 {
|
|
|
|
return peer.getRequestCost(GetReceiptsMsg, 1)
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
2016-12-09 23:50:36 -06:00
|
|
|
// CanSend tells if a certain peer is suitable for serving the given request
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *ReceiptsRequest) CanSend(peer *serverPeer) bool {
|
2018-10-01 08:14:53 -05:00
|
|
|
return peer.HasBlock(r.Hash, r.Number, false)
|
2016-12-09 23:50:36 -06:00
|
|
|
}
|
|
|
|
|
2016-10-13 22:51:29 -05:00
|
|
|
// Request sends an ODR request to the LES network (implementation of LesOdrRequest)
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *ReceiptsRequest) Request(reqID uint64, peer *serverPeer) error {
|
2017-03-03 03:41:52 -06:00
|
|
|
peer.Log().Debug("Requesting block receipts", "hash", r.Hash)
|
2020-02-26 03:41:24 -06:00
|
|
|
return peer.requestReceipts(reqID, []common.Hash{r.Hash})
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Valid processes an ODR request reply message from the LES network
|
|
|
|
// returns true and stores results in memory if the message was a valid reply
|
|
|
|
// to the request (implementation of LesOdrRequest)
|
2017-03-22 14:44:22 -05:00
|
|
|
func (r *ReceiptsRequest) Validate(db ethdb.Database, msg *Msg) error {
|
2017-03-03 03:41:52 -06:00
|
|
|
log.Debug("Validating block receipts", "hash", r.Hash)
|
|
|
|
|
|
|
|
// Ensure we have a correct message with a single block receipt
|
2016-10-13 22:51:29 -05:00
|
|
|
if msg.MsgType != MsgReceipts {
|
2017-03-03 03:41:52 -06:00
|
|
|
return errInvalidMessageType
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
receipts := msg.Obj.([]types.Receipts)
|
|
|
|
if len(receipts) != 1 {
|
2017-10-24 08:19:09 -05:00
|
|
|
return errInvalidEntryCount
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2017-03-03 03:41:52 -06:00
|
|
|
receipt := receipts[0]
|
|
|
|
|
|
|
|
// Retrieve our stored header and validate receipt content against it
|
all: on-chain oracle checkpoint syncing (#19543)
* all: implement simple checkpoint syncing
cmd, les, node: remove callback mechanism
cmd, node: remove callback definition
les: simplify the registrar
les: expose checkpoint rpc services in the light client
les, light: don't store untrusted receipt
cmd, contracts, les: discard stale checkpoint
cmd, contracts/registrar: loose restriction of registeration
cmd, contracts: add replay-protection
all: off-chain multi-signature contract
params: deploy checkpoint contract for rinkeby
cmd/registrar: add raw signing mode for registrar
cmd/registrar, contracts/registrar, les: fixed messages
* cmd/registrar, contracts/registrar: fix lints
* accounts/abi/bind, les: address comments
* cmd, contracts, les, light, params: minor checkpoint sync cleanups
* cmd, eth, les, light: move checkpoint config to config file
* cmd, eth, les, params: address comments
* eth, les, params: address comments
* cmd: polish up the checkpoint admin CLI
* cmd, contracts, params: deploy new version contract
* cmd/checkpoint-admin: add another flag for clef mode signing
* cmd, contracts, les: rename and regen checkpoint oracle with abigen
2019-06-28 02:34:02 -05:00
|
|
|
if r.Header == nil {
|
|
|
|
r.Header = rawdb.ReadHeader(db, r.Hash, r.Number)
|
|
|
|
}
|
|
|
|
if r.Header == nil {
|
2017-03-03 03:41:52 -06:00
|
|
|
return errHeaderUnavailable
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
all: on-chain oracle checkpoint syncing (#19543)
* all: implement simple checkpoint syncing
cmd, les, node: remove callback mechanism
cmd, node: remove callback definition
les: simplify the registrar
les: expose checkpoint rpc services in the light client
les, light: don't store untrusted receipt
cmd, contracts, les: discard stale checkpoint
cmd, contracts/registrar: loose restriction of registeration
cmd, contracts: add replay-protection
all: off-chain multi-signature contract
params: deploy checkpoint contract for rinkeby
cmd/registrar: add raw signing mode for registrar
cmd/registrar, contracts/registrar, les: fixed messages
* cmd/registrar, contracts/registrar: fix lints
* accounts/abi/bind, les: address comments
* cmd, contracts, les, light, params: minor checkpoint sync cleanups
* cmd, eth, les, light: move checkpoint config to config file
* cmd, eth, les, params: address comments
* eth, les, params: address comments
* cmd: polish up the checkpoint admin CLI
* cmd, contracts, params: deploy new version contract
* cmd/checkpoint-admin: add another flag for clef mode signing
* cmd, contracts, les: rename and regen checkpoint oracle with abigen
2019-06-28 02:34:02 -05:00
|
|
|
if r.Header.ReceiptHash != types.DeriveSha(receipt) {
|
2017-03-03 03:41:52 -06:00
|
|
|
return errReceiptHashMismatch
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2017-03-03 03:41:52 -06:00
|
|
|
// Validations passed, store and return
|
|
|
|
r.Receipts = receipt
|
|
|
|
return nil
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
type ProofReq struct {
|
|
|
|
BHash common.Hash
|
|
|
|
AccKey, Key []byte
|
|
|
|
FromLevel uint
|
|
|
|
}
|
|
|
|
|
|
|
|
// ODR request type for state/storage trie entries, see LesOdrRequest interface
|
|
|
|
type TrieRequest light.TrieRequest
|
|
|
|
|
|
|
|
// GetCost returns the cost of the given ODR request according to the serving
|
|
|
|
// peer's cost table (implementation of LesOdrRequest)
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *TrieRequest) GetCost(peer *serverPeer) uint64 {
|
|
|
|
return peer.getRequestCost(GetProofsV2Msg, 1)
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
2016-12-09 23:50:36 -06:00
|
|
|
// CanSend tells if a certain peer is suitable for serving the given request
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *TrieRequest) CanSend(peer *serverPeer) bool {
|
2018-10-01 08:14:53 -05:00
|
|
|
return peer.HasBlock(r.Id.BlockHash, r.Id.BlockNumber, true)
|
2016-12-09 23:50:36 -06:00
|
|
|
}
|
|
|
|
|
2016-10-13 22:51:29 -05:00
|
|
|
// Request sends an ODR request to the LES network (implementation of LesOdrRequest)
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *TrieRequest) Request(reqID uint64, peer *serverPeer) error {
|
2017-03-03 03:41:52 -06:00
|
|
|
peer.Log().Debug("Requesting trie proof", "root", r.Id.Root, "key", r.Key)
|
2017-10-24 08:19:09 -05:00
|
|
|
req := ProofReq{
|
2017-03-03 03:41:52 -06:00
|
|
|
BHash: r.Id.BlockHash,
|
|
|
|
AccKey: r.Id.AccKey,
|
|
|
|
Key: r.Key,
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2020-02-26 03:41:24 -06:00
|
|
|
return peer.requestProofs(reqID, []ProofReq{req})
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Valid processes an ODR request reply message from the LES network
|
|
|
|
// returns true and stores results in memory if the message was a valid reply
|
|
|
|
// to the request (implementation of LesOdrRequest)
|
2017-03-22 14:44:22 -05:00
|
|
|
func (r *TrieRequest) Validate(db ethdb.Database, msg *Msg) error {
|
2017-03-03 03:41:52 -06:00
|
|
|
log.Debug("Validating trie proof", "root", r.Id.Root, "key", r.Key)
|
2016-10-13 22:51:29 -05:00
|
|
|
|
2019-04-05 10:01:51 -05:00
|
|
|
if msg.MsgType != MsgProofsV2 {
|
2017-03-03 03:41:52 -06:00
|
|
|
return errInvalidMessageType
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2019-04-05 10:01:51 -05:00
|
|
|
proofs := msg.Obj.(light.NodeList)
|
|
|
|
// Verify the proof and store if checks out
|
|
|
|
nodeSet := proofs.NodeSet()
|
|
|
|
reads := &readTraceDB{db: nodeSet}
|
2020-04-24 06:37:56 -05:00
|
|
|
if _, err := trie.VerifyProof(r.Id.Root, r.Key, reads); err != nil {
|
2019-04-05 10:01:51 -05:00
|
|
|
return fmt.Errorf("merkle proof verification failed: %v", err)
|
|
|
|
}
|
|
|
|
// check if all nodes have been read by VerifyProof
|
|
|
|
if len(reads.reads) != nodeSet.KeyCount() {
|
|
|
|
return errUselessNodes
|
|
|
|
}
|
|
|
|
r.Proof = nodeSet
|
|
|
|
return nil
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
type CodeReq struct {
|
|
|
|
BHash common.Hash
|
|
|
|
AccKey []byte
|
|
|
|
}
|
|
|
|
|
|
|
|
// ODR request type for node data (used for retrieving contract code), see LesOdrRequest interface
|
|
|
|
type CodeRequest light.CodeRequest
|
|
|
|
|
|
|
|
// GetCost returns the cost of the given ODR request according to the serving
|
|
|
|
// peer's cost table (implementation of LesOdrRequest)
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *CodeRequest) GetCost(peer *serverPeer) uint64 {
|
|
|
|
return peer.getRequestCost(GetCodeMsg, 1)
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
2016-12-09 23:50:36 -06:00
|
|
|
// CanSend tells if a certain peer is suitable for serving the given request
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *CodeRequest) CanSend(peer *serverPeer) bool {
|
2018-10-01 08:14:53 -05:00
|
|
|
return peer.HasBlock(r.Id.BlockHash, r.Id.BlockNumber, true)
|
2016-12-09 23:50:36 -06:00
|
|
|
}
|
|
|
|
|
2016-10-13 22:51:29 -05:00
|
|
|
// Request sends an ODR request to the LES network (implementation of LesOdrRequest)
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *CodeRequest) Request(reqID uint64, peer *serverPeer) error {
|
2017-03-03 03:41:52 -06:00
|
|
|
peer.Log().Debug("Requesting code data", "hash", r.Hash)
|
2017-10-24 08:19:09 -05:00
|
|
|
req := CodeReq{
|
2017-03-03 03:41:52 -06:00
|
|
|
BHash: r.Id.BlockHash,
|
|
|
|
AccKey: r.Id.AccKey,
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2020-02-26 03:41:24 -06:00
|
|
|
return peer.requestCode(reqID, []CodeReq{req})
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Valid processes an ODR request reply message from the LES network
|
|
|
|
// returns true and stores results in memory if the message was a valid reply
|
|
|
|
// to the request (implementation of LesOdrRequest)
|
2017-03-22 14:44:22 -05:00
|
|
|
func (r *CodeRequest) Validate(db ethdb.Database, msg *Msg) error {
|
2017-03-03 03:41:52 -06:00
|
|
|
log.Debug("Validating code data", "hash", r.Hash)
|
|
|
|
|
|
|
|
// Ensure we have a correct message with a single code element
|
2016-10-13 22:51:29 -05:00
|
|
|
if msg.MsgType != MsgCode {
|
2017-03-03 03:41:52 -06:00
|
|
|
return errInvalidMessageType
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
reply := msg.Obj.([][]byte)
|
|
|
|
if len(reply) != 1 {
|
2017-10-24 08:19:09 -05:00
|
|
|
return errInvalidEntryCount
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
data := reply[0]
|
2017-03-03 03:41:52 -06:00
|
|
|
|
|
|
|
// Verify the data and store if checks out
|
|
|
|
if hash := crypto.Keccak256Hash(data); r.Hash != hash {
|
|
|
|
return errDataHashMismatch
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2017-03-03 03:41:52 -06:00
|
|
|
r.Data = data
|
|
|
|
return nil
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
2017-10-24 08:19:09 -05:00
|
|
|
const (
|
|
|
|
// helper trie type constants
|
|
|
|
htCanonical = iota // Canonical hash trie
|
|
|
|
htBloomBits // BloomBits trie
|
|
|
|
|
|
|
|
// applicable for all helper trie requests
|
|
|
|
auxRoot = 1
|
|
|
|
// applicable for htCanonical
|
|
|
|
auxHeader = 2
|
|
|
|
)
|
|
|
|
|
|
|
|
type HelperTrieReq struct {
|
2018-02-11 06:57:46 -06:00
|
|
|
Type uint
|
2017-10-24 08:19:09 -05:00
|
|
|
TrieIdx uint64
|
|
|
|
Key []byte
|
|
|
|
FromLevel, AuxReq uint
|
|
|
|
}
|
|
|
|
|
|
|
|
type HelperTrieResps struct { // describes all responses, not just a single one
|
|
|
|
Proofs light.NodeList
|
|
|
|
AuxData [][]byte
|
|
|
|
}
|
|
|
|
|
2016-10-13 22:51:29 -05:00
|
|
|
// ODR request type for requesting headers by Canonical Hash Trie, see LesOdrRequest interface
|
|
|
|
type ChtRequest light.ChtRequest
|
|
|
|
|
|
|
|
// GetCost returns the cost of the given ODR request according to the serving
|
|
|
|
// peer's cost table (implementation of LesOdrRequest)
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *ChtRequest) GetCost(peer *serverPeer) uint64 {
|
|
|
|
return peer.getRequestCost(GetHelperTrieProofsMsg, 1)
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
2016-12-09 23:50:36 -06:00
|
|
|
// CanSend tells if a certain peer is suitable for serving the given request
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *ChtRequest) CanSend(peer *serverPeer) bool {
|
2016-12-09 23:50:36 -06:00
|
|
|
peer.lock.RLock()
|
|
|
|
defer peer.lock.RUnlock()
|
|
|
|
|
all: on-chain oracle checkpoint syncing (#19543)
* all: implement simple checkpoint syncing
cmd, les, node: remove callback mechanism
cmd, node: remove callback definition
les: simplify the registrar
les: expose checkpoint rpc services in the light client
les, light: don't store untrusted receipt
cmd, contracts, les: discard stale checkpoint
cmd, contracts/registrar: loose restriction of registeration
cmd, contracts: add replay-protection
all: off-chain multi-signature contract
params: deploy checkpoint contract for rinkeby
cmd/registrar: add raw signing mode for registrar
cmd/registrar, contracts/registrar, les: fixed messages
* cmd/registrar, contracts/registrar: fix lints
* accounts/abi/bind, les: address comments
* cmd, contracts, les, light, params: minor checkpoint sync cleanups
* cmd, eth, les, light: move checkpoint config to config file
* cmd, eth, les, params: address comments
* eth, les, params: address comments
* cmd: polish up the checkpoint admin CLI
* cmd, contracts, params: deploy new version contract
* cmd/checkpoint-admin: add another flag for clef mode signing
* cmd, contracts, les: rename and regen checkpoint oracle with abigen
2019-06-28 02:34:02 -05:00
|
|
|
if r.Untrusted {
|
|
|
|
return peer.headInfo.Number >= r.BlockNum && peer.id == r.PeerId
|
|
|
|
} else {
|
|
|
|
return peer.headInfo.Number >= r.Config.ChtConfirms && r.ChtNum <= (peer.headInfo.Number-r.Config.ChtConfirms)/r.Config.ChtSize
|
|
|
|
}
|
2016-12-09 23:50:36 -06:00
|
|
|
}
|
|
|
|
|
2016-10-13 22:51:29 -05:00
|
|
|
// Request sends an ODR request to the LES network (implementation of LesOdrRequest)
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *ChtRequest) Request(reqID uint64, peer *serverPeer) error {
|
2017-03-03 03:41:52 -06:00
|
|
|
peer.Log().Debug("Requesting CHT", "cht", r.ChtNum, "block", r.BlockNum)
|
2017-10-24 08:19:09 -05:00
|
|
|
var encNum [8]byte
|
|
|
|
binary.BigEndian.PutUint64(encNum[:], r.BlockNum)
|
|
|
|
req := HelperTrieReq{
|
2018-02-11 06:57:46 -06:00
|
|
|
Type: htCanonical,
|
|
|
|
TrieIdx: r.ChtNum,
|
|
|
|
Key: encNum[:],
|
|
|
|
AuxReq: auxHeader,
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2020-02-26 03:41:24 -06:00
|
|
|
return peer.requestHelperTrieProofs(reqID, []HelperTrieReq{req})
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Valid processes an ODR request reply message from the LES network
|
|
|
|
// returns true and stores results in memory if the message was a valid reply
|
|
|
|
// to the request (implementation of LesOdrRequest)
|
2017-03-22 14:44:22 -05:00
|
|
|
func (r *ChtRequest) Validate(db ethdb.Database, msg *Msg) error {
|
2017-03-03 03:41:52 -06:00
|
|
|
log.Debug("Validating CHT", "cht", r.ChtNum, "block", r.BlockNum)
|
2016-10-13 22:51:29 -05:00
|
|
|
|
2019-04-05 10:01:51 -05:00
|
|
|
if msg.MsgType != MsgHelperTrieProofs {
|
2017-03-03 03:41:52 -06:00
|
|
|
return errInvalidMessageType
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2019-04-05 10:01:51 -05:00
|
|
|
resp := msg.Obj.(HelperTrieResps)
|
|
|
|
if len(resp.AuxData) != 1 {
|
|
|
|
return errInvalidEntryCount
|
|
|
|
}
|
|
|
|
nodeSet := resp.Proofs.NodeSet()
|
|
|
|
headerEnc := resp.AuxData[0]
|
|
|
|
if len(headerEnc) == 0 {
|
|
|
|
return errHeaderUnavailable
|
|
|
|
}
|
|
|
|
header := new(types.Header)
|
|
|
|
if err := rlp.DecodeBytes(headerEnc, header); err != nil {
|
|
|
|
return errHeaderUnavailable
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the CHT
|
all: on-chain oracle checkpoint syncing (#19543)
* all: implement simple checkpoint syncing
cmd, les, node: remove callback mechanism
cmd, node: remove callback definition
les: simplify the registrar
les: expose checkpoint rpc services in the light client
les, light: don't store untrusted receipt
cmd, contracts, les: discard stale checkpoint
cmd, contracts/registrar: loose restriction of registeration
cmd, contracts: add replay-protection
all: off-chain multi-signature contract
params: deploy checkpoint contract for rinkeby
cmd/registrar: add raw signing mode for registrar
cmd/registrar, contracts/registrar, les: fixed messages
* cmd/registrar, contracts/registrar: fix lints
* accounts/abi/bind, les: address comments
* cmd, contracts, les, light, params: minor checkpoint sync cleanups
* cmd, eth, les, light: move checkpoint config to config file
* cmd, eth, les, params: address comments
* eth, les, params: address comments
* cmd: polish up the checkpoint admin CLI
* cmd, contracts, params: deploy new version contract
* cmd/checkpoint-admin: add another flag for clef mode signing
* cmd, contracts, les: rename and regen checkpoint oracle with abigen
2019-06-28 02:34:02 -05:00
|
|
|
// Note: For untrusted CHT request, there is no proof response but
|
|
|
|
// header data.
|
2019-04-05 10:01:51 -05:00
|
|
|
var node light.ChtNode
|
all: on-chain oracle checkpoint syncing (#19543)
* all: implement simple checkpoint syncing
cmd, les, node: remove callback mechanism
cmd, node: remove callback definition
les: simplify the registrar
les: expose checkpoint rpc services in the light client
les, light: don't store untrusted receipt
cmd, contracts, les: discard stale checkpoint
cmd, contracts/registrar: loose restriction of registeration
cmd, contracts: add replay-protection
all: off-chain multi-signature contract
params: deploy checkpoint contract for rinkeby
cmd/registrar: add raw signing mode for registrar
cmd/registrar, contracts/registrar, les: fixed messages
* cmd/registrar, contracts/registrar: fix lints
* accounts/abi/bind, les: address comments
* cmd, contracts, les, light, params: minor checkpoint sync cleanups
* cmd, eth, les, light: move checkpoint config to config file
* cmd, eth, les, params: address comments
* eth, les, params: address comments
* cmd: polish up the checkpoint admin CLI
* cmd, contracts, params: deploy new version contract
* cmd/checkpoint-admin: add another flag for clef mode signing
* cmd, contracts, les: rename and regen checkpoint oracle with abigen
2019-06-28 02:34:02 -05:00
|
|
|
if !r.Untrusted {
|
|
|
|
var encNumber [8]byte
|
|
|
|
binary.BigEndian.PutUint64(encNumber[:], r.BlockNum)
|
|
|
|
|
|
|
|
reads := &readTraceDB{db: nodeSet}
|
2020-04-24 06:37:56 -05:00
|
|
|
value, err := trie.VerifyProof(r.ChtRoot, encNumber[:], reads)
|
all: on-chain oracle checkpoint syncing (#19543)
* all: implement simple checkpoint syncing
cmd, les, node: remove callback mechanism
cmd, node: remove callback definition
les: simplify the registrar
les: expose checkpoint rpc services in the light client
les, light: don't store untrusted receipt
cmd, contracts, les: discard stale checkpoint
cmd, contracts/registrar: loose restriction of registeration
cmd, contracts: add replay-protection
all: off-chain multi-signature contract
params: deploy checkpoint contract for rinkeby
cmd/registrar: add raw signing mode for registrar
cmd/registrar, contracts/registrar, les: fixed messages
* cmd/registrar, contracts/registrar: fix lints
* accounts/abi/bind, les: address comments
* cmd, contracts, les, light, params: minor checkpoint sync cleanups
* cmd, eth, les, light: move checkpoint config to config file
* cmd, eth, les, params: address comments
* eth, les, params: address comments
* cmd: polish up the checkpoint admin CLI
* cmd, contracts, params: deploy new version contract
* cmd/checkpoint-admin: add another flag for clef mode signing
* cmd, contracts, les: rename and regen checkpoint oracle with abigen
2019-06-28 02:34:02 -05:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("merkle proof verification failed: %v", err)
|
|
|
|
}
|
|
|
|
if len(reads.reads) != nodeSet.KeyCount() {
|
|
|
|
return errUselessNodes
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := rlp.DecodeBytes(value, &node); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if node.Hash != header.Hash() {
|
|
|
|
return errCHTHashMismatch
|
|
|
|
}
|
|
|
|
if r.BlockNum != header.Number.Uint64() {
|
|
|
|
return errCHTNumberMismatch
|
|
|
|
}
|
2019-04-05 10:01:51 -05:00
|
|
|
}
|
|
|
|
// Verifications passed, store and return
|
|
|
|
r.Header = header
|
|
|
|
r.Proof = nodeSet
|
all: on-chain oracle checkpoint syncing (#19543)
* all: implement simple checkpoint syncing
cmd, les, node: remove callback mechanism
cmd, node: remove callback definition
les: simplify the registrar
les: expose checkpoint rpc services in the light client
les, light: don't store untrusted receipt
cmd, contracts, les: discard stale checkpoint
cmd, contracts/registrar: loose restriction of registeration
cmd, contracts: add replay-protection
all: off-chain multi-signature contract
params: deploy checkpoint contract for rinkeby
cmd/registrar: add raw signing mode for registrar
cmd/registrar, contracts/registrar, les: fixed messages
* cmd/registrar, contracts/registrar: fix lints
* accounts/abi/bind, les: address comments
* cmd, contracts, les, light, params: minor checkpoint sync cleanups
* cmd, eth, les, light: move checkpoint config to config file
* cmd, eth, les, params: address comments
* eth, les, params: address comments
* cmd: polish up the checkpoint admin CLI
* cmd, contracts, params: deploy new version contract
* cmd/checkpoint-admin: add another flag for clef mode signing
* cmd, contracts, les: rename and regen checkpoint oracle with abigen
2019-06-28 02:34:02 -05:00
|
|
|
r.Td = node.Td // For untrusted request, td here is nil, todo improve the les/2 protocol
|
|
|
|
|
2017-10-24 08:19:09 -05:00
|
|
|
return nil
|
|
|
|
}
|
2017-03-03 03:41:52 -06:00
|
|
|
|
2017-10-24 08:19:09 -05:00
|
|
|
type BloomReq struct {
|
2018-09-20 06:11:14 -05:00
|
|
|
BloomTrieNum, BitIdx, SectionIndex, FromLevel uint64
|
2017-10-24 08:19:09 -05:00
|
|
|
}
|
2017-03-03 03:41:52 -06:00
|
|
|
|
2017-10-24 08:19:09 -05:00
|
|
|
// ODR request type for requesting headers by Canonical Hash Trie, see LesOdrRequest interface
|
|
|
|
type BloomRequest light.BloomRequest
|
|
|
|
|
|
|
|
// GetCost returns the cost of the given ODR request according to the serving
|
|
|
|
// peer's cost table (implementation of LesOdrRequest)
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *BloomRequest) GetCost(peer *serverPeer) uint64 {
|
|
|
|
return peer.getRequestCost(GetHelperTrieProofsMsg, len(r.SectionIndexList))
|
2017-10-24 08:19:09 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// CanSend tells if a certain peer is suitable for serving the given request
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *BloomRequest) CanSend(peer *serverPeer) bool {
|
2017-10-24 08:19:09 -05:00
|
|
|
peer.lock.RLock()
|
|
|
|
defer peer.lock.RUnlock()
|
|
|
|
|
|
|
|
if peer.version < lpv2 {
|
|
|
|
return false
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2018-08-28 02:08:16 -05:00
|
|
|
return peer.headInfo.Number >= r.Config.BloomTrieConfirms && r.BloomTrieNum <= (peer.headInfo.Number-r.Config.BloomTrieConfirms)/r.Config.BloomTrieSize
|
2017-10-24 08:19:09 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Request sends an ODR request to the LES network (implementation of LesOdrRequest)
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *BloomRequest) Request(reqID uint64, peer *serverPeer) error {
|
2018-09-20 06:11:14 -05:00
|
|
|
peer.Log().Debug("Requesting BloomBits", "bloomTrie", r.BloomTrieNum, "bitIdx", r.BitIdx, "sections", r.SectionIndexList)
|
|
|
|
reqs := make([]HelperTrieReq, len(r.SectionIndexList))
|
2017-10-24 08:19:09 -05:00
|
|
|
|
|
|
|
var encNumber [10]byte
|
2018-02-11 06:57:46 -06:00
|
|
|
binary.BigEndian.PutUint16(encNumber[:2], uint16(r.BitIdx))
|
2017-10-24 08:19:09 -05:00
|
|
|
|
2018-09-20 06:11:14 -05:00
|
|
|
for i, sectionIdx := range r.SectionIndexList {
|
2018-02-11 06:57:46 -06:00
|
|
|
binary.BigEndian.PutUint64(encNumber[2:], sectionIdx)
|
2017-10-24 08:19:09 -05:00
|
|
|
reqs[i] = HelperTrieReq{
|
2018-02-11 06:57:46 -06:00
|
|
|
Type: htBloomBits,
|
|
|
|
TrieIdx: r.BloomTrieNum,
|
|
|
|
Key: common.CopyBytes(encNumber[:]),
|
2017-10-24 08:19:09 -05:00
|
|
|
}
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2020-02-26 03:41:24 -06:00
|
|
|
return peer.requestHelperTrieProofs(reqID, reqs)
|
2017-10-24 08:19:09 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Valid processes an ODR request reply message from the LES network
|
|
|
|
// returns true and stores results in memory if the message was a valid reply
|
|
|
|
// to the request (implementation of LesOdrRequest)
|
|
|
|
func (r *BloomRequest) Validate(db ethdb.Database, msg *Msg) error {
|
2018-09-20 06:11:14 -05:00
|
|
|
log.Debug("Validating BloomBits", "bloomTrie", r.BloomTrieNum, "bitIdx", r.BitIdx, "sections", r.SectionIndexList)
|
2017-10-24 08:19:09 -05:00
|
|
|
|
|
|
|
// Ensure we have a correct message with a single proof element
|
|
|
|
if msg.MsgType != MsgHelperTrieProofs {
|
|
|
|
return errInvalidMessageType
|
|
|
|
}
|
|
|
|
resps := msg.Obj.(HelperTrieResps)
|
|
|
|
proofs := resps.Proofs
|
|
|
|
nodeSet := proofs.NodeSet()
|
|
|
|
reads := &readTraceDB{db: nodeSet}
|
|
|
|
|
2018-09-20 06:11:14 -05:00
|
|
|
r.BloomBits = make([][]byte, len(r.SectionIndexList))
|
2017-10-24 08:19:09 -05:00
|
|
|
|
|
|
|
// Verify the proofs
|
|
|
|
var encNumber [10]byte
|
2018-02-11 06:57:46 -06:00
|
|
|
binary.BigEndian.PutUint16(encNumber[:2], uint16(r.BitIdx))
|
2017-10-24 08:19:09 -05:00
|
|
|
|
2018-09-20 06:11:14 -05:00
|
|
|
for i, idx := range r.SectionIndexList {
|
2018-02-11 06:57:46 -06:00
|
|
|
binary.BigEndian.PutUint64(encNumber[2:], idx)
|
2020-04-24 06:37:56 -05:00
|
|
|
value, err := trie.VerifyProof(r.BloomTrieRoot, encNumber[:], reads)
|
2017-10-24 08:19:09 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
r.BloomBits[i] = value
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
|
|
|
|
2017-10-24 08:19:09 -05:00
|
|
|
if len(reads.reads) != nodeSet.KeyCount() {
|
|
|
|
return errUselessNodes
|
|
|
|
}
|
|
|
|
r.Proofs = nodeSet
|
2017-03-03 03:41:52 -06:00
|
|
|
return nil
|
2016-10-13 22:51:29 -05:00
|
|
|
}
|
2017-10-24 08:19:09 -05:00
|
|
|
|
2019-05-13 06:41:10 -05:00
|
|
|
// TxStatusRequest is the ODR request type for transaction status
|
|
|
|
type TxStatusRequest light.TxStatusRequest
|
|
|
|
|
|
|
|
// GetCost returns the cost of the given ODR request according to the serving
|
|
|
|
// peer's cost table (implementation of LesOdrRequest)
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *TxStatusRequest) GetCost(peer *serverPeer) uint64 {
|
|
|
|
return peer.getRequestCost(GetTxStatusMsg, len(r.Hashes))
|
2019-05-13 06:41:10 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// CanSend tells if a certain peer is suitable for serving the given request
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *TxStatusRequest) CanSend(peer *serverPeer) bool {
|
2019-05-13 06:41:10 -05:00
|
|
|
return peer.version >= lpv2
|
|
|
|
}
|
|
|
|
|
|
|
|
// Request sends an ODR request to the LES network (implementation of LesOdrRequest)
|
2020-02-26 03:41:24 -06:00
|
|
|
func (r *TxStatusRequest) Request(reqID uint64, peer *serverPeer) error {
|
2019-05-13 06:41:10 -05:00
|
|
|
peer.Log().Debug("Requesting transaction status", "count", len(r.Hashes))
|
2020-02-26 03:41:24 -06:00
|
|
|
return peer.requestTxStatus(reqID, r.Hashes)
|
2019-05-13 06:41:10 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Valid processes an ODR request reply message from the LES network
|
|
|
|
// returns true and stores results in memory if the message was a valid reply
|
|
|
|
// to the request (implementation of LesOdrRequest)
|
|
|
|
func (r *TxStatusRequest) Validate(db ethdb.Database, msg *Msg) error {
|
|
|
|
log.Debug("Validating transaction status", "count", len(r.Hashes))
|
|
|
|
|
|
|
|
// Ensure we have a correct message with a single block body
|
|
|
|
if msg.MsgType != MsgTxStatus {
|
|
|
|
return errInvalidMessageType
|
|
|
|
}
|
|
|
|
status := msg.Obj.([]light.TxStatus)
|
|
|
|
if len(status) != len(r.Hashes) {
|
|
|
|
return errInvalidEntryCount
|
|
|
|
}
|
|
|
|
r.Status = status
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-10-24 08:19:09 -05:00
|
|
|
// readTraceDB stores the keys of database reads. We use this to check that received node
|
|
|
|
// sets contain only the trie nodes necessary to make proofs pass.
|
|
|
|
type readTraceDB struct {
|
all: integrate the freezer with fast sync
* all: freezer style syncing
core, eth, les, light: clean up freezer relative APIs
core, eth, les, trie, ethdb, light: clean a bit
core, eth, les, light: add unit tests
core, light: rewrite setHead function
core, eth: fix downloader unit tests
core: add receipt chain insertion test
core: use constant instead of hardcoding table name
core: fix rollback
core: fix setHead
core/rawdb: remove canonical block first and then iterate side chain
core/rawdb, ethdb: add hasAncient interface
eth/downloader: calculate ancient limit via cht first
core, eth, ethdb: lots of fixes
* eth/downloader: print ancient disable log only for fast sync
2019-04-25 09:59:48 -05:00
|
|
|
db ethdb.KeyValueReader
|
2017-10-24 08:19:09 -05:00
|
|
|
reads map[string]struct{}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get returns a stored node
|
|
|
|
func (db *readTraceDB) Get(k []byte) ([]byte, error) {
|
|
|
|
if db.reads == nil {
|
|
|
|
db.reads = make(map[string]struct{})
|
|
|
|
}
|
|
|
|
db.reads[string(k)] = struct{}{}
|
|
|
|
return db.db.Get(k)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Has returns true if the node set contains the given key
|
|
|
|
func (db *readTraceDB) Has(key []byte) (bool, error) {
|
|
|
|
_, err := db.Get(key)
|
|
|
|
return err == nil, nil
|
|
|
|
}
|