forked from TrueCloudLab/neoneo-go
28908aa3cf
Signed-off-by: Elizaveta Chichindaeva <elizaveta@nspcc.ru>
141 lines
3.2 KiB
Go
141 lines
3.2 KiB
Go
package stateroot
|
|
|
|
import (
|
|
"time"
|
|
|
|
"github.com/nspcc-dev/neo-go/pkg/core/state"
|
|
"github.com/nspcc-dev/neo-go/pkg/core/transaction"
|
|
"github.com/nspcc-dev/neo-go/pkg/io"
|
|
"github.com/nspcc-dev/neo-go/pkg/network/payload"
|
|
"github.com/nspcc-dev/neo-go/pkg/vm/emit"
|
|
"github.com/nspcc-dev/neo-go/pkg/wallet"
|
|
"go.uber.org/zap"
|
|
)
|
|
|
|
const (
|
|
voteValidEndInc = 10
|
|
firstVoteResendDelay = 3 * time.Second
|
|
)
|
|
|
|
// Name returns service name.
|
|
func (s *service) Name() string {
|
|
return "stateroot"
|
|
}
|
|
|
|
// Start runs service instance in a separate goroutine.
|
|
func (s *service) Start() {
|
|
s.log.Info("starting state validation service")
|
|
s.chain.SubscribeForBlocks(s.blockCh)
|
|
go s.run()
|
|
}
|
|
|
|
func (s *service) run() {
|
|
runloop:
|
|
for {
|
|
select {
|
|
case b := <-s.blockCh:
|
|
r, err := s.GetStateRoot(b.Index)
|
|
if err != nil {
|
|
s.log.Error("can't get state root for new block", zap.Error(err))
|
|
} else if err := s.signAndSend(r); err != nil {
|
|
s.log.Error("can't sign or send state root", zap.Error(err))
|
|
}
|
|
s.srMtx.Lock()
|
|
delete(s.incompleteRoots, b.Index-voteValidEndInc)
|
|
s.srMtx.Unlock()
|
|
case <-s.done:
|
|
break runloop
|
|
}
|
|
}
|
|
drainloop:
|
|
for {
|
|
select {
|
|
case <-s.blockCh:
|
|
default:
|
|
break drainloop
|
|
}
|
|
}
|
|
}
|
|
|
|
// Shutdown stops the service.
|
|
func (s *service) Shutdown() {
|
|
s.chain.UnsubscribeFromBlocks(s.blockCh)
|
|
close(s.done)
|
|
}
|
|
|
|
func (s *service) signAndSend(r *state.MPTRoot) error {
|
|
if !s.MainCfg.Enabled {
|
|
return nil
|
|
}
|
|
|
|
myIndex, acc := s.getAccount()
|
|
if acc == nil {
|
|
return nil
|
|
}
|
|
|
|
sig := acc.PrivateKey().SignHashable(uint32(s.Network), r)
|
|
incRoot := s.getIncompleteRoot(r.Index, myIndex)
|
|
incRoot.Lock()
|
|
defer incRoot.Unlock()
|
|
incRoot.root = r
|
|
incRoot.addSignature(acc.PrivateKey().PublicKey(), sig)
|
|
incRoot.reverify(s.Network)
|
|
s.trySendRoot(incRoot, acc)
|
|
|
|
msg := NewMessage(VoteT, &Vote{
|
|
ValidatorIndex: int32(myIndex),
|
|
Height: r.Index,
|
|
Signature: sig,
|
|
})
|
|
|
|
w := io.NewBufBinWriter()
|
|
msg.EncodeBinary(w.BinWriter)
|
|
if w.Err != nil {
|
|
return w.Err
|
|
}
|
|
e := &payload.Extensible{
|
|
Category: Category,
|
|
ValidBlockStart: r.Index,
|
|
ValidBlockEnd: r.Index + voteValidEndInc,
|
|
Sender: acc.PrivateKey().GetScriptHash(),
|
|
Data: w.Bytes(),
|
|
Witness: transaction.Witness{
|
|
VerificationScript: acc.GetVerificationScript(),
|
|
},
|
|
}
|
|
sig = acc.PrivateKey().SignHashable(uint32(s.Network), e)
|
|
buf := io.NewBufBinWriter()
|
|
emit.Bytes(buf.BinWriter, sig)
|
|
e.Witness.InvocationScript = buf.Bytes()
|
|
incRoot.myVote = e
|
|
incRoot.retries = -1
|
|
s.sendVote(incRoot)
|
|
return nil
|
|
}
|
|
|
|
// sendVote attempts to send a vote if it's still valid and if stateroot message
|
|
// has not been sent yet. It must be called with the ir locked.
|
|
func (s *service) sendVote(ir *incompleteRoot) {
|
|
if ir.isSent || ir.retries >= s.maxRetries ||
|
|
s.chain.HeaderHeight() >= ir.myVote.ValidBlockEnd {
|
|
return
|
|
}
|
|
s.relayExtensible(ir.myVote)
|
|
delay := firstVoteResendDelay
|
|
if ir.retries > 0 {
|
|
delay = s.timePerBlock << ir.retries
|
|
}
|
|
_ = time.AfterFunc(delay, func() {
|
|
ir.Lock()
|
|
s.sendVote(ir)
|
|
ir.Unlock()
|
|
})
|
|
ir.retries++
|
|
}
|
|
|
|
// getAccount returns the current index and account for the node running this service.
|
|
func (s *service) getAccount() (byte, *wallet.Account) {
|
|
s.accMtx.RLock()
|
|
defer s.accMtx.RUnlock()
|
|
return s.myIndex, s.acc
|
|
}
|