236 lines
7.1 KiB
Go
236 lines
7.1 KiB
Go
package client
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
abci "github.com/tendermint/tendermint/abci/types"
|
|
"github.com/tendermint/tendermint/crypto/merkle"
|
|
tmbytes "github.com/tendermint/tendermint/libs/bytes"
|
|
tmliteErr "github.com/tendermint/tendermint/lite/errors"
|
|
tmliteProxy "github.com/tendermint/tendermint/lite/proxy"
|
|
rpcclient "github.com/tendermint/tendermint/rpc/client"
|
|
tmtypes "github.com/tendermint/tendermint/types"
|
|
|
|
"github.com/cosmos/cosmos-sdk/store/rootmulti"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
)
|
|
|
|
// GetNode returns an RPC client. If the context's client is not defined, an
|
|
// error is returned.
|
|
func (ctx Context) GetNode() (rpcclient.Client, error) {
|
|
if ctx.Client == nil {
|
|
return nil, errors.New("no RPC client is defined in offline mode")
|
|
}
|
|
|
|
return ctx.Client, nil
|
|
}
|
|
|
|
// Query performs a query to a Tendermint node with the provided path.
|
|
// It returns the result and height of the query upon success or an error if
|
|
// the query fails.
|
|
func (ctx Context) Query(path string) ([]byte, int64, error) {
|
|
return ctx.query(path, nil)
|
|
}
|
|
|
|
// QueryWithData performs a query to a Tendermint node with the provided path
|
|
// and a data payload. It returns the result and height of the query upon success
|
|
// or an error if the query fails.
|
|
func (ctx Context) QueryWithData(path string, data []byte) ([]byte, int64, error) {
|
|
return ctx.query(path, data)
|
|
}
|
|
|
|
// QueryStore performs a query to a Tendermint node with the provided key and
|
|
// store name. It returns the result and height of the query upon success
|
|
// or an error if the query fails.
|
|
func (ctx Context) QueryStore(key tmbytes.HexBytes, storeName string) ([]byte, int64, error) {
|
|
return ctx.queryStore(key, storeName, "key")
|
|
}
|
|
|
|
// QueryABCI performs a query to a Tendermint node with the provide RequestQuery.
|
|
// It returns the ResultQuery obtained from the query.
|
|
func (ctx Context) QueryABCI(req abci.RequestQuery) (abci.ResponseQuery, error) {
|
|
return ctx.queryABCI(req)
|
|
}
|
|
|
|
// QuerySubspace performs a query to a Tendermint node with the provided
|
|
// store name and subspace. It returns key value pair and height of the query
|
|
// upon success or an error if the query fails.
|
|
func (ctx Context) QuerySubspace(subspace []byte, storeName string) (res []sdk.KVPair, height int64, err error) {
|
|
resRaw, height, err := ctx.queryStore(subspace, storeName, "subspace")
|
|
if err != nil {
|
|
return res, height, err
|
|
}
|
|
|
|
ctx.Codec.MustUnmarshalBinaryBare(resRaw, &res)
|
|
return
|
|
}
|
|
|
|
// GetFromAddress returns the from address from the context's name.
|
|
func (ctx Context) GetFromAddress() sdk.AccAddress {
|
|
return ctx.FromAddress
|
|
}
|
|
|
|
// GetFromName returns the key name for the current context.
|
|
func (ctx Context) GetFromName() string {
|
|
return ctx.FromName
|
|
}
|
|
|
|
func (ctx Context) queryABCI(req abci.RequestQuery) (abci.ResponseQuery, error) {
|
|
node, err := ctx.GetNode()
|
|
if err != nil {
|
|
return abci.ResponseQuery{}, err
|
|
}
|
|
|
|
opts := rpcclient.ABCIQueryOptions{
|
|
Height: ctx.Height,
|
|
Prove: req.Prove || !ctx.TrustNode,
|
|
}
|
|
|
|
result, err := node.ABCIQueryWithOptions(req.Path, req.Data, opts)
|
|
if err != nil {
|
|
return abci.ResponseQuery{}, err
|
|
}
|
|
|
|
if !result.Response.IsOK() {
|
|
return abci.ResponseQuery{}, errors.New(result.Response.Log)
|
|
}
|
|
|
|
// data from trusted node or subspace query doesn't need verification
|
|
if ctx.TrustNode || !isQueryStoreWithProof(req.Path) {
|
|
return result.Response, nil
|
|
}
|
|
|
|
if err = ctx.verifyProof(req.Path, result.Response); err != nil {
|
|
return abci.ResponseQuery{}, err
|
|
}
|
|
|
|
return result.Response, nil
|
|
}
|
|
|
|
// query performs a query to a Tendermint node with the provided store name
|
|
// and path. It returns the result and height of the query upon success
|
|
// or an error if the query fails. In addition, it will verify the returned
|
|
// proof if TrustNode is disabled. If proof verification fails or the query
|
|
// height is invalid, an error will be returned.
|
|
func (ctx Context) query(path string, key tmbytes.HexBytes) ([]byte, int64, error) {
|
|
resp, err := ctx.queryABCI(abci.RequestQuery{
|
|
Path: path,
|
|
Data: key,
|
|
})
|
|
if err != nil {
|
|
return nil, 0, err
|
|
}
|
|
|
|
return resp.Value, resp.Height, nil
|
|
}
|
|
|
|
// Verify verifies the consensus proof at given height.
|
|
func (ctx Context) Verify(height int64) (tmtypes.SignedHeader, error) {
|
|
if ctx.Verifier == nil {
|
|
return tmtypes.SignedHeader{}, fmt.Errorf("missing valid certifier to verify data from distrusted node")
|
|
}
|
|
|
|
check, err := tmliteProxy.GetCertifiedCommit(height, ctx.Client, ctx.Verifier)
|
|
|
|
switch {
|
|
case tmliteErr.IsErrCommitNotFound(err):
|
|
return tmtypes.SignedHeader{}, ErrVerifyCommit(height)
|
|
case err != nil:
|
|
return tmtypes.SignedHeader{}, err
|
|
}
|
|
|
|
return check, nil
|
|
}
|
|
|
|
// verifyProof perform response proof verification.
|
|
func (ctx Context) verifyProof(queryPath string, resp abci.ResponseQuery) error {
|
|
if ctx.Verifier == nil {
|
|
return fmt.Errorf("missing valid certifier to verify data from distrusted node")
|
|
}
|
|
|
|
// the AppHash for height H is in header H+1
|
|
commit, err := ctx.Verify(resp.Height + 1)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// TODO: Instead of reconstructing, stash on Context field?
|
|
prt := rootmulti.DefaultProofRuntime()
|
|
|
|
// TODO: Better convention for path?
|
|
storeName, err := parseQueryStorePath(queryPath)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
kp := merkle.KeyPath{}
|
|
kp = kp.AppendKey([]byte(storeName), merkle.KeyEncodingURL)
|
|
kp = kp.AppendKey(resp.Key, merkle.KeyEncodingURL)
|
|
|
|
if resp.Value == nil {
|
|
err = prt.VerifyAbsence(resp.Proof, commit.Header.AppHash, kp.String())
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to prove merkle proof")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
if err := prt.VerifyValue(resp.Proof, commit.Header.AppHash, kp.String(), resp.Value); err != nil {
|
|
return errors.Wrap(err, "failed to prove merkle proof")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// queryStore performs a query to a Tendermint node with the provided a store
|
|
// name and path. It returns the result and height of the query upon success
|
|
// or an error if the query fails.
|
|
func (ctx Context) queryStore(key tmbytes.HexBytes, storeName, endPath string) ([]byte, int64, error) {
|
|
path := fmt.Sprintf("/store/%s/%s", storeName, endPath)
|
|
return ctx.query(path, key)
|
|
}
|
|
|
|
// isQueryStoreWithProof expects a format like /<queryType>/<storeName>/<subpath>
|
|
// queryType must be "store" and subpath must be "key" to require a proof.
|
|
func isQueryStoreWithProof(path string) bool {
|
|
if !strings.HasPrefix(path, "/") {
|
|
return false
|
|
}
|
|
|
|
paths := strings.SplitN(path[1:], "/", 3)
|
|
|
|
switch {
|
|
case len(paths) != 3:
|
|
return false
|
|
case paths[0] != "store":
|
|
return false
|
|
case rootmulti.RequireProof("/" + paths[2]):
|
|
return true
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
// parseQueryStorePath expects a format like /store/<storeName>/key.
|
|
func parseQueryStorePath(path string) (storeName string, err error) {
|
|
if !strings.HasPrefix(path, "/") {
|
|
return "", errors.New("expected path to start with /")
|
|
}
|
|
|
|
paths := strings.SplitN(path[1:], "/", 3)
|
|
|
|
switch {
|
|
case len(paths) != 3:
|
|
return "", errors.New("expected format like /store/<storeName>/key")
|
|
case paths[0] != "store":
|
|
return "", errors.New("expected format like /store/<storeName>/key")
|
|
case paths[2] != "key":
|
|
return "", errors.New("expected format like /store/<storeName>/key")
|
|
}
|
|
|
|
return paths[1], nil
|
|
}
|