You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

682 lines
21 KiB

cleanup: Reduce and normalize import path aliasing. (#6975) The code in the Tendermint repository makes heavy use of import aliasing. This is made necessary by our extensive reuse of common base package names, and by repetition of similar names across different subdirectories. Unfortunately we have not been very consistent about which packages we alias in various circumstances, and the aliases we use vary. In the spirit of the advice in the style guide and https://github.com/golang/go/wiki/CodeReviewComments#imports, his change makes an effort to clean up and normalize import aliasing. This change makes no API or behavioral changes. It is a pure cleanup intended o help make the code more readable to developers (including myself) trying to understand what is being imported where. Only unexported names have been modified, and the changes were generated and applied mechanically with gofmt -r and comby, respecting the lexical and syntactic rules of Go. Even so, I did not fix every inconsistency. Where the changes would be too disruptive, I left it alone. The principles I followed in this cleanup are: - Remove aliases that restate the package name. - Remove aliases where the base package name is unambiguous. - Move overly-terse abbreviations from the import to the usage site. - Fix lexical issues (remove underscores, remove capitalization). - Fix import groupings to more closely match the style guide. - Group blank (side-effecting) imports and ensure they are commented. - Add aliases to multiple imports with the same base package name.
3 years ago
cleanup: Reduce and normalize import path aliasing. (#6975) The code in the Tendermint repository makes heavy use of import aliasing. This is made necessary by our extensive reuse of common base package names, and by repetition of similar names across different subdirectories. Unfortunately we have not been very consistent about which packages we alias in various circumstances, and the aliases we use vary. In the spirit of the advice in the style guide and https://github.com/golang/go/wiki/CodeReviewComments#imports, his change makes an effort to clean up and normalize import aliasing. This change makes no API or behavioral changes. It is a pure cleanup intended o help make the code more readable to developers (including myself) trying to understand what is being imported where. Only unexported names have been modified, and the changes were generated and applied mechanically with gofmt -r and comby, respecting the lexical and syntactic rules of Go. Even so, I did not fix every inconsistency. Where the changes would be too disruptive, I left it alone. The principles I followed in this cleanup are: - Remove aliases that restate the package name. - Remove aliases where the base package name is unambiguous. - Move overly-terse abbreviations from the import to the usage site. - Fix lexical issues (remove underscores, remove capitalization). - Fix import groupings to more closely match the style guide. - Group blank (side-effecting) imports and ensure they are commented. - Add aliases to multiple imports with the same base package name.
3 years ago
cleanup: Reduce and normalize import path aliasing. (#6975) The code in the Tendermint repository makes heavy use of import aliasing. This is made necessary by our extensive reuse of common base package names, and by repetition of similar names across different subdirectories. Unfortunately we have not been very consistent about which packages we alias in various circumstances, and the aliases we use vary. In the spirit of the advice in the style guide and https://github.com/golang/go/wiki/CodeReviewComments#imports, his change makes an effort to clean up and normalize import aliasing. This change makes no API or behavioral changes. It is a pure cleanup intended o help make the code more readable to developers (including myself) trying to understand what is being imported where. Only unexported names have been modified, and the changes were generated and applied mechanically with gofmt -r and comby, respecting the lexical and syntactic rules of Go. Even so, I did not fix every inconsistency. Where the changes would be too disruptive, I left it alone. The principles I followed in this cleanup are: - Remove aliases that restate the package name. - Remove aliases where the base package name is unambiguous. - Move overly-terse abbreviations from the import to the usage site. - Fix lexical issues (remove underscores, remove capitalization). - Fix import groupings to more closely match the style guide. - Group blank (side-effecting) imports and ensure they are commented. - Add aliases to multiple imports with the same base package name.
3 years ago
cleanup: Reduce and normalize import path aliasing. (#6975) The code in the Tendermint repository makes heavy use of import aliasing. This is made necessary by our extensive reuse of common base package names, and by repetition of similar names across different subdirectories. Unfortunately we have not been very consistent about which packages we alias in various circumstances, and the aliases we use vary. In the spirit of the advice in the style guide and https://github.com/golang/go/wiki/CodeReviewComments#imports, his change makes an effort to clean up and normalize import aliasing. This change makes no API or behavioral changes. It is a pure cleanup intended o help make the code more readable to developers (including myself) trying to understand what is being imported where. Only unexported names have been modified, and the changes were generated and applied mechanically with gofmt -r and comby, respecting the lexical and syntactic rules of Go. Even so, I did not fix every inconsistency. Where the changes would be too disruptive, I left it alone. The principles I followed in this cleanup are: - Remove aliases that restate the package name. - Remove aliases where the base package name is unambiguous. - Move overly-terse abbreviations from the import to the usage site. - Fix lexical issues (remove underscores, remove capitalization). - Fix import groupings to more closely match the style guide. - Group blank (side-effecting) imports and ensure they are commented. - Add aliases to multiple imports with the same base package name.
3 years ago
cleanup: Reduce and normalize import path aliasing. (#6975) The code in the Tendermint repository makes heavy use of import aliasing. This is made necessary by our extensive reuse of common base package names, and by repetition of similar names across different subdirectories. Unfortunately we have not been very consistent about which packages we alias in various circumstances, and the aliases we use vary. In the spirit of the advice in the style guide and https://github.com/golang/go/wiki/CodeReviewComments#imports, his change makes an effort to clean up and normalize import aliasing. This change makes no API or behavioral changes. It is a pure cleanup intended o help make the code more readable to developers (including myself) trying to understand what is being imported where. Only unexported names have been modified, and the changes were generated and applied mechanically with gofmt -r and comby, respecting the lexical and syntactic rules of Go. Even so, I did not fix every inconsistency. Where the changes would be too disruptive, I left it alone. The principles I followed in this cleanup are: - Remove aliases that restate the package name. - Remove aliases where the base package name is unambiguous. - Move overly-terse abbreviations from the import to the usage site. - Fix lexical issues (remove underscores, remove capitalization). - Fix import groupings to more closely match the style guide. - Group blank (side-effecting) imports and ensure they are commented. - Add aliases to multiple imports with the same base package name.
3 years ago
cs/replay: execCommitBlock should not read from state.lastValidators (#3067) * execCommitBlock should not read from state.lastValidators * fix height 1 * fix blockchain/reactor_test * fix consensus/mempool_test * fix consensus/reactor_test * fix consensus/replay_test * add CHANGELOG * fix consensus/reactor_test * fix consensus/replay_test * add a test for replay validators change * fix mem_pool test * fix byzantine test * remove a redundant code * reduce validator change blocks to 6 * fix * return peer0 config * seperate testName * seperate testName 1 * seperate testName 2 * seperate app db path * seperate app db path 1 * add a lock before startNet * move the lock to reactor_test * simulate just once * try to find problem * handshake only saveState when app version changed * update gometalinter to 3.0.0 (#3233) in the attempt to fix https://circleci.com/gh/tendermint/tendermint/43165 also code is simplified by running gofmt -s . remove unused vars enable linters we're currently passing remove deprecated linters (cherry picked from commit d47094550315c094512a242445e0dde24b5a03f5) * gofmt code * goimport code * change the bool name to testValidatorsChange * adjust receive kvstore.ProtocolVersion * adjust receive kvstore.ProtocolVersion 1 * adjust receive kvstore.ProtocolVersion 3 * fix merge execution.go * fix merge develop * fix merge develop 1 * fix run cleanupFunc * adjust code according to reviewers' opinion * modify the func name match the convention * simplify simulate a chain containing some validator change txs 1 * test CI error * Merge remote-tracking branch 'upstream/develop' into fixReplay 1 * fix pubsub_test * subscribeUnbuffered vote channel
6 years ago
7 years ago
add support for block pruning via ABCI Commit response (#4588) * Added BlockStore.DeleteBlock() * Added initial block pruner prototype * wip * Added BlockStore.PruneBlocks() * Added consensus setting for block pruning * Added BlockStore base * Error on replay if base does not have blocks * Handle missing blocks when sending VoteSetMaj23Message * Error message tweak * Properly update blockstore state * Error message fix again * blockchain: ignore peer missing blocks * Added FIXME * Added test for block replay with truncated history * Handle peer base in blockchain reactor * Improved replay error handling * Added tests for Store.PruneBlocks() * Fix non-RPC handling of truncated block history * Panic on missing block meta in needProofBlock() * Updated changelog * Handle truncated block history in RPC layer * Added info about earliest block in /status RPC * Reorder height and base in blockchain reactor messages * Updated changelog * Fix tests * Appease linter * Minor review fixes * Non-empty BlockStores should always have base > 0 * Update code to assume base > 0 invariant * Added blockstore tests for pruning to 0 * Make sure we don't prune below the current base * Added BlockStore.Size() * config: added retain_blocks recommendations * Update v1 blockchain reactor to handle blockstore base * Added state database pruning * Propagate errors on missing validator sets * Comment tweaks * Improved error message Co-Authored-By: Anton Kaliaev <anton.kalyaev@gmail.com> * use ABCI field ResponseCommit.retain_height instead of retain-blocks config option * remove State.RetainHeight, return value instead * fix minor issues * rename pruneHeights() to pruneBlocks() * noop to fix GitHub borkage Co-authored-by: Anton Kaliaev <anton.kalyaev@gmail.com>
5 years ago
add support for block pruning via ABCI Commit response (#4588) * Added BlockStore.DeleteBlock() * Added initial block pruner prototype * wip * Added BlockStore.PruneBlocks() * Added consensus setting for block pruning * Added BlockStore base * Error on replay if base does not have blocks * Handle missing blocks when sending VoteSetMaj23Message * Error message tweak * Properly update blockstore state * Error message fix again * blockchain: ignore peer missing blocks * Added FIXME * Added test for block replay with truncated history * Handle peer base in blockchain reactor * Improved replay error handling * Added tests for Store.PruneBlocks() * Fix non-RPC handling of truncated block history * Panic on missing block meta in needProofBlock() * Updated changelog * Handle truncated block history in RPC layer * Added info about earliest block in /status RPC * Reorder height and base in blockchain reactor messages * Updated changelog * Fix tests * Appease linter * Minor review fixes * Non-empty BlockStores should always have base > 0 * Update code to assume base > 0 invariant * Added blockstore tests for pruning to 0 * Make sure we don't prune below the current base * Added BlockStore.Size() * config: added retain_blocks recommendations * Update v1 blockchain reactor to handle blockstore base * Added state database pruning * Propagate errors on missing validator sets * Comment tweaks * Improved error message Co-Authored-By: Anton Kaliaev <anton.kalyaev@gmail.com> * use ABCI field ResponseCommit.retain_height instead of retain-blocks config option * remove State.RetainHeight, return value instead * fix minor issues * rename pruneHeights() to pruneBlocks() * noop to fix GitHub borkage Co-authored-by: Anton Kaliaev <anton.kalyaev@gmail.com>
5 years ago
add support for block pruning via ABCI Commit response (#4588) * Added BlockStore.DeleteBlock() * Added initial block pruner prototype * wip * Added BlockStore.PruneBlocks() * Added consensus setting for block pruning * Added BlockStore base * Error on replay if base does not have blocks * Handle missing blocks when sending VoteSetMaj23Message * Error message tweak * Properly update blockstore state * Error message fix again * blockchain: ignore peer missing blocks * Added FIXME * Added test for block replay with truncated history * Handle peer base in blockchain reactor * Improved replay error handling * Added tests for Store.PruneBlocks() * Fix non-RPC handling of truncated block history * Panic on missing block meta in needProofBlock() * Updated changelog * Handle truncated block history in RPC layer * Added info about earliest block in /status RPC * Reorder height and base in blockchain reactor messages * Updated changelog * Fix tests * Appease linter * Minor review fixes * Non-empty BlockStores should always have base > 0 * Update code to assume base > 0 invariant * Added blockstore tests for pruning to 0 * Make sure we don't prune below the current base * Added BlockStore.Size() * config: added retain_blocks recommendations * Update v1 blockchain reactor to handle blockstore base * Added state database pruning * Propagate errors on missing validator sets * Comment tweaks * Improved error message Co-Authored-By: Anton Kaliaev <anton.kalyaev@gmail.com> * use ABCI field ResponseCommit.retain_height instead of retain-blocks config option * remove State.RetainHeight, return value instead * fix minor issues * rename pruneHeights() to pruneBlocks() * noop to fix GitHub borkage Co-authored-by: Anton Kaliaev <anton.kalyaev@gmail.com>
5 years ago
add support for block pruning via ABCI Commit response (#4588) * Added BlockStore.DeleteBlock() * Added initial block pruner prototype * wip * Added BlockStore.PruneBlocks() * Added consensus setting for block pruning * Added BlockStore base * Error on replay if base does not have blocks * Handle missing blocks when sending VoteSetMaj23Message * Error message tweak * Properly update blockstore state * Error message fix again * blockchain: ignore peer missing blocks * Added FIXME * Added test for block replay with truncated history * Handle peer base in blockchain reactor * Improved replay error handling * Added tests for Store.PruneBlocks() * Fix non-RPC handling of truncated block history * Panic on missing block meta in needProofBlock() * Updated changelog * Handle truncated block history in RPC layer * Added info about earliest block in /status RPC * Reorder height and base in blockchain reactor messages * Updated changelog * Fix tests * Appease linter * Minor review fixes * Non-empty BlockStores should always have base > 0 * Update code to assume base > 0 invariant * Added blockstore tests for pruning to 0 * Make sure we don't prune below the current base * Added BlockStore.Size() * config: added retain_blocks recommendations * Update v1 blockchain reactor to handle blockstore base * Added state database pruning * Propagate errors on missing validator sets * Comment tweaks * Improved error message Co-Authored-By: Anton Kaliaev <anton.kalyaev@gmail.com> * use ABCI field ResponseCommit.retain_height instead of retain-blocks config option * remove State.RetainHeight, return value instead * fix minor issues * rename pruneHeights() to pruneBlocks() * noop to fix GitHub borkage Co-authored-by: Anton Kaliaev <anton.kalyaev@gmail.com>
5 years ago
add support for block pruning via ABCI Commit response (#4588) * Added BlockStore.DeleteBlock() * Added initial block pruner prototype * wip * Added BlockStore.PruneBlocks() * Added consensus setting for block pruning * Added BlockStore base * Error on replay if base does not have blocks * Handle missing blocks when sending VoteSetMaj23Message * Error message tweak * Properly update blockstore state * Error message fix again * blockchain: ignore peer missing blocks * Added FIXME * Added test for block replay with truncated history * Handle peer base in blockchain reactor * Improved replay error handling * Added tests for Store.PruneBlocks() * Fix non-RPC handling of truncated block history * Panic on missing block meta in needProofBlock() * Updated changelog * Handle truncated block history in RPC layer * Added info about earliest block in /status RPC * Reorder height and base in blockchain reactor messages * Updated changelog * Fix tests * Appease linter * Minor review fixes * Non-empty BlockStores should always have base > 0 * Update code to assume base > 0 invariant * Added blockstore tests for pruning to 0 * Make sure we don't prune below the current base * Added BlockStore.Size() * config: added retain_blocks recommendations * Update v1 blockchain reactor to handle blockstore base * Added state database pruning * Propagate errors on missing validator sets * Comment tweaks * Improved error message Co-Authored-By: Anton Kaliaev <anton.kalyaev@gmail.com> * use ABCI field ResponseCommit.retain_height instead of retain-blocks config option * remove State.RetainHeight, return value instead * fix minor issues * rename pruneHeights() to pruneBlocks() * noop to fix GitHub borkage Co-authored-by: Anton Kaliaev <anton.kalyaev@gmail.com>
5 years ago
8 years ago
8 years ago
cs/replay: execCommitBlock should not read from state.lastValidators (#3067) * execCommitBlock should not read from state.lastValidators * fix height 1 * fix blockchain/reactor_test * fix consensus/mempool_test * fix consensus/reactor_test * fix consensus/replay_test * add CHANGELOG * fix consensus/reactor_test * fix consensus/replay_test * add a test for replay validators change * fix mem_pool test * fix byzantine test * remove a redundant code * reduce validator change blocks to 6 * fix * return peer0 config * seperate testName * seperate testName 1 * seperate testName 2 * seperate app db path * seperate app db path 1 * add a lock before startNet * move the lock to reactor_test * simulate just once * try to find problem * handshake only saveState when app version changed * update gometalinter to 3.0.0 (#3233) in the attempt to fix https://circleci.com/gh/tendermint/tendermint/43165 also code is simplified by running gofmt -s . remove unused vars enable linters we're currently passing remove deprecated linters (cherry picked from commit d47094550315c094512a242445e0dde24b5a03f5) * gofmt code * goimport code * change the bool name to testValidatorsChange * adjust receive kvstore.ProtocolVersion * adjust receive kvstore.ProtocolVersion 1 * adjust receive kvstore.ProtocolVersion 3 * fix merge execution.go * fix merge develop * fix merge develop 1 * fix run cleanupFunc * adjust code according to reviewers' opinion * modify the func name match the convention * simplify simulate a chain containing some validator change txs 1 * test CI error * Merge remote-tracking branch 'upstream/develop' into fixReplay 1 * fix pubsub_test * subscribeUnbuffered vote channel
6 years ago
cleanup: Reduce and normalize import path aliasing. (#6975) The code in the Tendermint repository makes heavy use of import aliasing. This is made necessary by our extensive reuse of common base package names, and by repetition of similar names across different subdirectories. Unfortunately we have not been very consistent about which packages we alias in various circumstances, and the aliases we use vary. In the spirit of the advice in the style guide and https://github.com/golang/go/wiki/CodeReviewComments#imports, his change makes an effort to clean up and normalize import aliasing. This change makes no API or behavioral changes. It is a pure cleanup intended o help make the code more readable to developers (including myself) trying to understand what is being imported where. Only unexported names have been modified, and the changes were generated and applied mechanically with gofmt -r and comby, respecting the lexical and syntactic rules of Go. Even so, I did not fix every inconsistency. Where the changes would be too disruptive, I left it alone. The principles I followed in this cleanup are: - Remove aliases that restate the package name. - Remove aliases where the base package name is unambiguous. - Move overly-terse abbreviations from the import to the usage site. - Fix lexical issues (remove underscores, remove capitalization). - Fix import groupings to more closely match the style guide. - Group blank (side-effecting) imports and ensure they are commented. - Add aliases to multiple imports with the same base package name.
3 years ago
8 years ago
7 years ago
8 years ago
  1. package state
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "time"
  7. abci "github.com/tendermint/tendermint/abci/types"
  8. "github.com/tendermint/tendermint/crypto/encoding"
  9. "github.com/tendermint/tendermint/internal/eventbus"
  10. "github.com/tendermint/tendermint/internal/mempool"
  11. "github.com/tendermint/tendermint/internal/proxy"
  12. "github.com/tendermint/tendermint/libs/log"
  13. tmstate "github.com/tendermint/tendermint/proto/tendermint/state"
  14. "github.com/tendermint/tendermint/types"
  15. )
  16. //-----------------------------------------------------------------------------
  17. // BlockExecutor handles block execution and state updates.
  18. // It exposes ApplyBlock(), which validates & executes the block, updates state w/ ABCI responses,
  19. // then commits and updates the mempool atomically, then saves state.
  20. // BlockExecutor provides the context and accessories for properly executing a block.
  21. type BlockExecutor struct {
  22. // save state, validators, consensus params, abci responses here
  23. store Store
  24. // use blockstore for the pruning functions.
  25. blockStore BlockStore
  26. // execute the app against this
  27. proxyApp proxy.AppConnConsensus
  28. // events
  29. eventBus types.BlockEventPublisher
  30. // manage the mempool lock during commit
  31. // and update both with block results after commit.
  32. mempool mempool.Mempool
  33. evpool EvidencePool
  34. logger log.Logger
  35. metrics *Metrics
  36. // cache the verification results over a single height
  37. cache map[string]struct{}
  38. }
  39. type BlockExecutorOption func(executor *BlockExecutor)
  40. func BlockExecutorWithMetrics(metrics *Metrics) BlockExecutorOption {
  41. return func(blockExec *BlockExecutor) {
  42. blockExec.metrics = metrics
  43. }
  44. }
  45. // NewBlockExecutor returns a new BlockExecutor with a NopEventBus.
  46. // Call SetEventBus to provide one.
  47. func NewBlockExecutor(
  48. stateStore Store,
  49. logger log.Logger,
  50. proxyApp proxy.AppConnConsensus,
  51. pool mempool.Mempool,
  52. evpool EvidencePool,
  53. blockStore BlockStore,
  54. options ...BlockExecutorOption,
  55. ) *BlockExecutor {
  56. res := &BlockExecutor{
  57. store: stateStore,
  58. proxyApp: proxyApp,
  59. eventBus: eventbus.NopEventBus{},
  60. mempool: pool,
  61. evpool: evpool,
  62. logger: logger,
  63. metrics: NopMetrics(),
  64. cache: make(map[string]struct{}),
  65. blockStore: blockStore,
  66. }
  67. for _, option := range options {
  68. option(res)
  69. }
  70. return res
  71. }
  72. func (blockExec *BlockExecutor) Store() Store {
  73. return blockExec.store
  74. }
  75. // SetEventBus - sets the event bus for publishing block related events.
  76. // If not called, it defaults to types.NopEventBus.
  77. func (blockExec *BlockExecutor) SetEventBus(eventBus types.BlockEventPublisher) {
  78. blockExec.eventBus = eventBus
  79. }
  80. // CreateProposalBlock calls state.MakeBlock with evidence from the evpool
  81. // and txs from the mempool. The max bytes must be big enough to fit the commit.
  82. // Up to 1/10th of the block space is allcoated for maximum sized evidence.
  83. // The rest is given to txs, up to the max gas.
  84. //
  85. // Contract: application will not return more bytes than are sent over the wire.
  86. func (blockExec *BlockExecutor) CreateProposalBlock(
  87. ctx context.Context,
  88. height int64,
  89. state State, commit *types.Commit,
  90. proposerAddr []byte,
  91. votes []*types.Vote,
  92. ) (*types.Block, *types.PartSet, error) {
  93. maxBytes := state.ConsensusParams.Block.MaxBytes
  94. maxGas := state.ConsensusParams.Block.MaxGas
  95. evidence, evSize := blockExec.evpool.PendingEvidence(state.ConsensusParams.Evidence.MaxBytes)
  96. // Fetch a limited amount of valid txs
  97. maxDataBytes := types.MaxDataBytes(maxBytes, evSize, state.Validators.Size())
  98. txs := blockExec.mempool.ReapMaxBytesMaxGas(maxDataBytes, maxGas)
  99. preparedProposal, err := blockExec.proxyApp.PrepareProposal(
  100. ctx,
  101. abci.RequestPrepareProposal{
  102. BlockData: txs.ToSliceOfBytes(),
  103. BlockDataSize: maxDataBytes,
  104. Votes: types.VotesToProto(votes),
  105. },
  106. )
  107. if err != nil {
  108. // The App MUST ensure that only valid (and hence 'processable') transactions
  109. // enter the mempool. Hence, at this point, we can't have any non-processable
  110. // transaction causing an error.
  111. //
  112. // Also, the App can simply skip any transaction that could cause any kind of trouble.
  113. // Either way, we can not recover in a meaningful way, unless we skip proposing
  114. // this block, repair what caused the error and try again. Hence, we panic on
  115. // purpose for now.
  116. panic(err)
  117. }
  118. newTxs := preparedProposal.GetBlockData()
  119. var txSize int
  120. for _, tx := range newTxs {
  121. txSize += len(tx)
  122. if maxDataBytes < int64(txSize) {
  123. panic("block data exceeds max amount of allowed bytes")
  124. }
  125. }
  126. modifiedTxs := types.ToTxs(preparedProposal.GetBlockData())
  127. return state.MakeBlock(height, modifiedTxs, commit, evidence, proposerAddr)
  128. }
  129. func (blockExec *BlockExecutor) ProcessProposal(
  130. ctx context.Context,
  131. block *types.Block,
  132. state State,
  133. ) (bool, error) {
  134. req := abci.RequestProcessProposal{
  135. Hash: block.Header.Hash(),
  136. Header: *block.Header.ToProto(),
  137. Txs: block.Data.Txs.ToSliceOfBytes(),
  138. LastCommitInfo: buildLastCommitInfo(block, blockExec.store, state.InitialHeight),
  139. ByzantineValidators: block.Evidence.ToABCI(),
  140. }
  141. resp, err := blockExec.proxyApp.ProcessProposal(ctx, req)
  142. if err != nil {
  143. return false, ErrInvalidBlock(err)
  144. }
  145. return resp.Accept, nil
  146. }
  147. // ValidateBlock validates the given block against the given state.
  148. // If the block is invalid, it returns an error.
  149. // Validation does not mutate state, but does require historical information from the stateDB,
  150. // ie. to verify evidence from a validator at an old height.
  151. func (blockExec *BlockExecutor) ValidateBlock(ctx context.Context, state State, block *types.Block) error {
  152. hash := block.Hash()
  153. if _, ok := blockExec.cache[hash.String()]; ok {
  154. return nil
  155. }
  156. err := validateBlock(state, block)
  157. if err != nil {
  158. return err
  159. }
  160. err = blockExec.evpool.CheckEvidence(ctx, block.Evidence)
  161. if err != nil {
  162. return err
  163. }
  164. blockExec.cache[hash.String()] = struct{}{}
  165. return nil
  166. }
  167. // ApplyBlock validates the block against the state, executes it against the app,
  168. // fires the relevant events, commits the app, and saves the new state and responses.
  169. // It returns the new state.
  170. // It's the only function that needs to be called
  171. // from outside this package to process and commit an entire block.
  172. // It takes a blockID to avoid recomputing the parts hash.
  173. func (blockExec *BlockExecutor) ApplyBlock(
  174. ctx context.Context,
  175. state State,
  176. blockID types.BlockID,
  177. block *types.Block,
  178. ) (State, error) {
  179. // validate the block if we haven't already
  180. if err := blockExec.ValidateBlock(ctx, state, block); err != nil {
  181. return state, ErrInvalidBlock(err)
  182. }
  183. startTime := time.Now().UnixNano()
  184. abciResponses, err := execBlockOnProxyApp(ctx,
  185. blockExec.logger, blockExec.proxyApp, block, blockExec.store, state.InitialHeight,
  186. )
  187. endTime := time.Now().UnixNano()
  188. blockExec.metrics.BlockProcessingTime.Observe(float64(endTime-startTime) / 1000000)
  189. if err != nil {
  190. return state, ErrProxyAppConn(err)
  191. }
  192. // Save the results before we commit.
  193. if err := blockExec.store.SaveABCIResponses(block.Height, abciResponses); err != nil {
  194. return state, err
  195. }
  196. // validate the validator updates and convert to tendermint types
  197. abciValUpdates := abciResponses.FinalizeBlock.ValidatorUpdates
  198. err = validateValidatorUpdates(abciValUpdates, state.ConsensusParams.Validator)
  199. if err != nil {
  200. return state, fmt.Errorf("error in validator updates: %w", err)
  201. }
  202. validatorUpdates, err := types.PB2TM.ValidatorUpdates(abciValUpdates)
  203. if err != nil {
  204. return state, err
  205. }
  206. if len(validatorUpdates) > 0 {
  207. blockExec.logger.Debug("updates to validators", "updates", types.ValidatorListString(validatorUpdates))
  208. }
  209. // Update the state with the block and responses.
  210. state, err = updateState(state, blockID, &block.Header, abciResponses, validatorUpdates)
  211. if err != nil {
  212. return state, fmt.Errorf("commit failed for application: %w", err)
  213. }
  214. // Lock mempool, commit app state, update mempoool.
  215. appHash, retainHeight, err := blockExec.Commit(ctx, state, block, abciResponses.FinalizeBlock.Txs)
  216. if err != nil {
  217. return state, fmt.Errorf("commit failed for application: %w", err)
  218. }
  219. // Update evpool with the latest state.
  220. blockExec.evpool.Update(ctx, state, block.Evidence)
  221. // Update the app hash and save the state.
  222. state.AppHash = appHash
  223. if err := blockExec.store.Save(state); err != nil {
  224. return state, err
  225. }
  226. // Prune old heights, if requested by ABCI app.
  227. if retainHeight > 0 {
  228. pruned, err := blockExec.pruneBlocks(retainHeight)
  229. if err != nil {
  230. blockExec.logger.Error("failed to prune blocks", "retain_height", retainHeight, "err", err)
  231. } else {
  232. blockExec.logger.Debug("pruned blocks", "pruned", pruned, "retain_height", retainHeight)
  233. }
  234. }
  235. // reset the verification cache
  236. blockExec.cache = make(map[string]struct{})
  237. // Events are fired after everything else.
  238. // NOTE: if we crash between Commit and Save, events wont be fired during replay
  239. fireEvents(ctx, blockExec.logger, blockExec.eventBus, block, blockID, abciResponses, validatorUpdates)
  240. return state, nil
  241. }
  242. func (blockExec *BlockExecutor) ExtendVote(ctx context.Context, vote *types.Vote) (types.VoteExtension, error) {
  243. req := abci.RequestExtendVote{
  244. Vote: vote.ToProto(),
  245. }
  246. resp, err := blockExec.proxyApp.ExtendVote(ctx, req)
  247. if err != nil {
  248. return types.VoteExtension{}, err
  249. }
  250. return types.VoteExtensionFromProto(resp.VoteExtension), nil
  251. }
  252. func (blockExec *BlockExecutor) VerifyVoteExtension(ctx context.Context, vote *types.Vote) error {
  253. req := abci.RequestVerifyVoteExtension{
  254. Vote: vote.ToProto(),
  255. }
  256. resp, err := blockExec.proxyApp.VerifyVoteExtension(ctx, req)
  257. if err != nil {
  258. return err
  259. }
  260. if resp.IsErr() {
  261. return types.ErrVoteInvalidExtension
  262. }
  263. return nil
  264. }
  265. // Commit locks the mempool, runs the ABCI Commit message, and updates the
  266. // mempool.
  267. // It returns the result of calling abci.Commit (the AppHash) and the height to retain (if any).
  268. // The Mempool must be locked during commit and update because state is
  269. // typically reset on Commit and old txs must be replayed against committed
  270. // state before new txs are run in the mempool, lest they be invalid.
  271. func (blockExec *BlockExecutor) Commit(
  272. ctx context.Context,
  273. state State,
  274. block *types.Block,
  275. deliverTxResponses []*abci.ResponseDeliverTx,
  276. ) ([]byte, int64, error) {
  277. blockExec.mempool.Lock()
  278. defer blockExec.mempool.Unlock()
  279. // while mempool is Locked, flush to ensure all async requests have completed
  280. // in the ABCI app before Commit.
  281. err := blockExec.mempool.FlushAppConn(ctx)
  282. if err != nil {
  283. blockExec.logger.Error("client error during mempool.FlushAppConn", "err", err)
  284. return nil, 0, err
  285. }
  286. // Commit block, get hash back
  287. res, err := blockExec.proxyApp.Commit(ctx)
  288. if err != nil {
  289. blockExec.logger.Error("client error during proxyAppConn.Commit", "err", err)
  290. return nil, 0, err
  291. }
  292. // ResponseCommit has no error code - just data
  293. blockExec.logger.Info(
  294. "committed state",
  295. "height", block.Height,
  296. "num_txs", len(block.Txs),
  297. "app_hash", fmt.Sprintf("%X", res.Data),
  298. )
  299. // Update mempool.
  300. err = blockExec.mempool.Update(
  301. ctx,
  302. block.Height,
  303. block.Txs,
  304. deliverTxResponses,
  305. TxPreCheck(state),
  306. TxPostCheck(state),
  307. )
  308. return res.Data, res.RetainHeight, err
  309. }
  310. //---------------------------------------------------------
  311. // Helper functions for executing blocks and updating state
  312. // Executes block's transactions on proxyAppConn.
  313. // Returns a list of transaction results and updates to the validator set
  314. func execBlockOnProxyApp(
  315. ctx context.Context,
  316. logger log.Logger,
  317. proxyAppConn proxy.AppConnConsensus,
  318. block *types.Block,
  319. store Store,
  320. initialHeight int64,
  321. ) (*tmstate.ABCIResponses, error) {
  322. abciResponses := new(tmstate.ABCIResponses)
  323. abciResponses.FinalizeBlock = &abci.ResponseFinalizeBlock{}
  324. dtxs := make([]*abci.ResponseDeliverTx, len(block.Txs))
  325. abciResponses.FinalizeBlock.Txs = dtxs
  326. // Begin block
  327. var err error
  328. pbh := block.Header.ToProto()
  329. if pbh == nil {
  330. return nil, errors.New("nil header")
  331. }
  332. abciResponses.FinalizeBlock, err = proxyAppConn.FinalizeBlock(
  333. ctx,
  334. abci.RequestFinalizeBlock{
  335. Txs: block.Txs.ToSliceOfBytes(),
  336. Hash: block.Hash(),
  337. Header: *pbh,
  338. Height: block.Height,
  339. LastCommitInfo: buildLastCommitInfo(block, store, initialHeight),
  340. ByzantineValidators: block.Evidence.ToABCI(),
  341. },
  342. )
  343. if err != nil {
  344. logger.Error("error in proxyAppConn.FinalizeBlock", "err", err)
  345. return nil, err
  346. }
  347. logger.Info("executed block", "height", block.Height)
  348. return abciResponses, nil
  349. }
  350. func buildLastCommitInfo(block *types.Block, store Store, initialHeight int64) abci.LastCommitInfo {
  351. if block.Height == initialHeight {
  352. // there is no last commmit for the initial height.
  353. // return an empty value.
  354. return abci.LastCommitInfo{}
  355. }
  356. lastValSet, err := store.LoadValidators(block.Height - 1)
  357. if err != nil {
  358. panic(err)
  359. }
  360. var (
  361. commitSize = block.LastCommit.Size()
  362. valSetLen = len(lastValSet.Validators)
  363. )
  364. // ensure that the size of the validator set in the last commit matches
  365. // the size of the validator set in the state store.
  366. if commitSize != valSetLen {
  367. panic(fmt.Sprintf(
  368. "commit size (%d) doesn't match validator set length (%d) at height %d\n\n%v\n\n%v",
  369. commitSize, valSetLen, block.Height, block.LastCommit.Signatures, lastValSet.Validators,
  370. ))
  371. }
  372. votes := make([]abci.VoteInfo, block.LastCommit.Size())
  373. for i, val := range lastValSet.Validators {
  374. commitSig := block.LastCommit.Signatures[i]
  375. votes[i] = abci.VoteInfo{
  376. Validator: types.TM2PB.Validator(val),
  377. SignedLastBlock: !commitSig.Absent(),
  378. }
  379. }
  380. return abci.LastCommitInfo{
  381. Round: block.LastCommit.Round,
  382. Votes: votes,
  383. }
  384. }
  385. func validateValidatorUpdates(abciUpdates []abci.ValidatorUpdate,
  386. params types.ValidatorParams) error {
  387. for _, valUpdate := range abciUpdates {
  388. if valUpdate.GetPower() < 0 {
  389. return fmt.Errorf("voting power can't be negative %v", valUpdate)
  390. } else if valUpdate.GetPower() == 0 {
  391. // continue, since this is deleting the validator, and thus there is no
  392. // pubkey to check
  393. continue
  394. }
  395. // Check if validator's pubkey matches an ABCI type in the consensus params
  396. pk, err := encoding.PubKeyFromProto(valUpdate.PubKey)
  397. if err != nil {
  398. return err
  399. }
  400. if !params.IsValidPubkeyType(pk.Type()) {
  401. return fmt.Errorf("validator %v is using pubkey %s, which is unsupported for consensus",
  402. valUpdate, pk.Type())
  403. }
  404. }
  405. return nil
  406. }
  407. // updateState returns a new State updated according to the header and responses.
  408. func updateState(
  409. state State,
  410. blockID types.BlockID,
  411. header *types.Header,
  412. abciResponses *tmstate.ABCIResponses,
  413. validatorUpdates []*types.Validator,
  414. ) (State, error) {
  415. // Copy the valset so we can apply changes from EndBlock
  416. // and update s.LastValidators and s.Validators.
  417. nValSet := state.NextValidators.Copy()
  418. // Update the validator set with the latest abciResponses.
  419. lastHeightValsChanged := state.LastHeightValidatorsChanged
  420. if len(validatorUpdates) > 0 {
  421. err := nValSet.UpdateWithChangeSet(validatorUpdates)
  422. if err != nil {
  423. return state, fmt.Errorf("error changing validator set: %w", err)
  424. }
  425. // Change results from this height but only applies to the next next height.
  426. lastHeightValsChanged = header.Height + 1 + 1
  427. }
  428. // Update validator proposer priority and set state variables.
  429. nValSet.IncrementProposerPriority(1)
  430. // Update the params with the latest abciResponses.
  431. nextParams := state.ConsensusParams
  432. lastHeightParamsChanged := state.LastHeightConsensusParamsChanged
  433. if abciResponses.FinalizeBlock.ConsensusParamUpdates != nil {
  434. // NOTE: must not mutate s.ConsensusParams
  435. nextParams = state.ConsensusParams.UpdateConsensusParams(abciResponses.FinalizeBlock.ConsensusParamUpdates)
  436. err := nextParams.ValidateConsensusParams()
  437. if err != nil {
  438. return state, fmt.Errorf("error updating consensus params: %w", err)
  439. }
  440. state.Version.Consensus.App = nextParams.Version.AppVersion
  441. // Change results from this height but only applies to the next height.
  442. lastHeightParamsChanged = header.Height + 1
  443. }
  444. nextVersion := state.Version
  445. // NOTE: the AppHash and the VoteExtension has not been populated.
  446. // It will be filled on state.Save.
  447. return State{
  448. Version: nextVersion,
  449. ChainID: state.ChainID,
  450. InitialHeight: state.InitialHeight,
  451. LastBlockHeight: header.Height,
  452. LastBlockID: blockID,
  453. LastBlockTime: header.Time,
  454. NextValidators: nValSet,
  455. Validators: state.NextValidators.Copy(),
  456. LastValidators: state.Validators.Copy(),
  457. LastHeightValidatorsChanged: lastHeightValsChanged,
  458. ConsensusParams: nextParams,
  459. LastHeightConsensusParamsChanged: lastHeightParamsChanged,
  460. LastResultsHash: ABCIResponsesResultsHash(abciResponses),
  461. AppHash: nil,
  462. }, nil
  463. }
  464. // Fire NewBlock, NewBlockHeader.
  465. // Fire TxEvent for every tx.
  466. // NOTE: if Tendermint crashes before commit, some or all of these events may be published again.
  467. func fireEvents(
  468. ctx context.Context,
  469. logger log.Logger,
  470. eventBus types.BlockEventPublisher,
  471. block *types.Block,
  472. blockID types.BlockID,
  473. abciResponses *tmstate.ABCIResponses,
  474. validatorUpdates []*types.Validator,
  475. ) {
  476. if err := eventBus.PublishEventNewBlock(ctx, types.EventDataNewBlock{
  477. Block: block,
  478. BlockID: blockID,
  479. ResultFinalizeBlock: *abciResponses.FinalizeBlock,
  480. }); err != nil {
  481. logger.Error("failed publishing new block", "err", err)
  482. }
  483. if err := eventBus.PublishEventNewBlockHeader(ctx, types.EventDataNewBlockHeader{
  484. Header: block.Header,
  485. NumTxs: int64(len(block.Txs)),
  486. ResultFinalizeBlock: *abciResponses.FinalizeBlock,
  487. }); err != nil {
  488. logger.Error("failed publishing new block header", "err", err)
  489. }
  490. if len(block.Evidence) != 0 {
  491. for _, ev := range block.Evidence {
  492. if err := eventBus.PublishEventNewEvidence(ctx, types.EventDataNewEvidence{
  493. Evidence: ev,
  494. Height: block.Height,
  495. }); err != nil {
  496. logger.Error("failed publishing new evidence", "err", err)
  497. }
  498. }
  499. }
  500. // sanity check
  501. if len(abciResponses.FinalizeBlock.Txs) != len(block.Data.Txs) {
  502. panic(fmt.Sprintf("number of TXs (%d) and ABCI TX responses (%d) do not match",
  503. len(block.Data.Txs), len(abciResponses.FinalizeBlock.Txs)))
  504. }
  505. for i, tx := range block.Data.Txs {
  506. if err := eventBus.PublishEventTx(ctx, types.EventDataTx{
  507. TxResult: abci.TxResult{
  508. Height: block.Height,
  509. Index: uint32(i),
  510. Tx: tx,
  511. Result: *(abciResponses.FinalizeBlock.Txs[i]),
  512. },
  513. }); err != nil {
  514. logger.Error("failed publishing event TX", "err", err)
  515. }
  516. }
  517. if len(validatorUpdates) > 0 {
  518. if err := eventBus.PublishEventValidatorSetUpdates(ctx,
  519. types.EventDataValidatorSetUpdates{ValidatorUpdates: validatorUpdates}); err != nil {
  520. logger.Error("failed publishing event", "err", err)
  521. }
  522. }
  523. }
  524. //----------------------------------------------------------------------------------------------------
  525. // Execute block without state. TODO: eliminate
  526. // ExecCommitBlock executes and commits a block on the proxyApp without validating or mutating the state.
  527. // It returns the application root hash (result of abci.Commit).
  528. func ExecCommitBlock(
  529. ctx context.Context,
  530. be *BlockExecutor,
  531. appConnConsensus proxy.AppConnConsensus,
  532. block *types.Block,
  533. logger log.Logger,
  534. store Store,
  535. initialHeight int64,
  536. s State,
  537. ) ([]byte, error) {
  538. abciResponses, err := execBlockOnProxyApp(ctx, logger, appConnConsensus, block, store, initialHeight)
  539. if err != nil {
  540. logger.Error("failed executing block on proxy app", "height", block.Height, "err", err)
  541. return nil, err
  542. }
  543. // the BlockExecutor condition is using for the final block replay process.
  544. if be != nil {
  545. abciValUpdates := abciResponses.FinalizeBlock.ValidatorUpdates
  546. err = validateValidatorUpdates(abciValUpdates, s.ConsensusParams.Validator)
  547. if err != nil {
  548. logger.Error("err", err)
  549. return nil, err
  550. }
  551. validatorUpdates, err := types.PB2TM.ValidatorUpdates(abciValUpdates)
  552. if err != nil {
  553. logger.Error("err", err)
  554. return nil, err
  555. }
  556. bps, err := block.MakePartSet(types.BlockPartSizeBytes)
  557. if err != nil {
  558. return nil, err
  559. }
  560. blockID := types.BlockID{Hash: block.Hash(), PartSetHeader: bps.Header()}
  561. fireEvents(ctx, be.logger, be.eventBus, block, blockID, abciResponses, validatorUpdates)
  562. }
  563. // Commit block, get hash back
  564. res, err := appConnConsensus.Commit(ctx)
  565. if err != nil {
  566. logger.Error("client error during proxyAppConn.Commit", "err", res)
  567. return nil, err
  568. }
  569. // ResponseCommit has no error or log, just data
  570. return res.Data, nil
  571. }
  572. func (blockExec *BlockExecutor) pruneBlocks(retainHeight int64) (uint64, error) {
  573. base := blockExec.blockStore.Base()
  574. if retainHeight <= base {
  575. return 0, nil
  576. }
  577. pruned, err := blockExec.blockStore.PruneBlocks(retainHeight)
  578. if err != nil {
  579. return 0, fmt.Errorf("failed to prune block store: %w", err)
  580. }
  581. err = blockExec.Store().PruneStates(retainHeight)
  582. if err != nil {
  583. return 0, fmt.Errorf("failed to prune state store: %w", err)
  584. }
  585. return pruned, nil
  586. }