889 lines
28 KiB
Go
889 lines
28 KiB
Go
package baseapp
|
|
|
|
import (
|
|
"crypto/sha256"
|
|
"errors"
|
|
"fmt"
|
|
"os"
|
|
"sort"
|
|
"strings"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/gogo/protobuf/proto"
|
|
abci "github.com/tendermint/tendermint/abci/types"
|
|
tmproto "github.com/tendermint/tendermint/proto/tendermint/types"
|
|
"google.golang.org/grpc/codes"
|
|
grpcstatus "google.golang.org/grpc/status"
|
|
|
|
"github.com/cosmos/cosmos-sdk/codec"
|
|
snapshottypes "github.com/cosmos/cosmos-sdk/snapshots/types"
|
|
"github.com/cosmos/cosmos-sdk/telemetry"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
sdkerrors "github.com/cosmos/cosmos-sdk/types/errors"
|
|
)
|
|
|
|
// InitChain implements the ABCI interface. It runs the initialization logic
|
|
// directly on the CommitMultiStore.
|
|
func (app *BaseApp) InitChain(req abci.RequestInitChain) (res abci.ResponseInitChain) {
|
|
// On a new chain, we consider the init chain block height as 0, even though
|
|
// req.InitialHeight is 1 by default.
|
|
initHeader := tmproto.Header{ChainID: req.ChainId, Time: req.Time}
|
|
|
|
// If req.InitialHeight is > 1, then we set the initial version in the
|
|
// stores.
|
|
if req.InitialHeight > 1 {
|
|
app.initialHeight = req.InitialHeight
|
|
initHeader = tmproto.Header{ChainID: req.ChainId, Height: req.InitialHeight, Time: req.Time}
|
|
err := app.cms.SetInitialVersion(req.InitialHeight)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
|
|
// initialize the deliver state and check state with a correct header
|
|
app.setDeliverState(initHeader)
|
|
app.setCheckState(initHeader)
|
|
|
|
// Store the consensus params in the BaseApp's paramstore. Note, this must be
|
|
// done after the deliver state and context have been set as it's persisted
|
|
// to state.
|
|
if req.ConsensusParams != nil {
|
|
app.StoreConsensusParams(app.deliverState.ctx, req.ConsensusParams)
|
|
}
|
|
|
|
if app.initChainer == nil {
|
|
return
|
|
}
|
|
|
|
// add block gas meter for any genesis transactions (allow infinite gas)
|
|
app.deliverState.ctx = app.deliverState.ctx.WithBlockGasMeter(sdk.NewInfiniteGasMeter())
|
|
|
|
res = app.initChainer(app.deliverState.ctx, req)
|
|
|
|
// sanity check
|
|
if len(req.Validators) > 0 {
|
|
if len(req.Validators) != len(res.Validators) {
|
|
panic(
|
|
fmt.Errorf(
|
|
"len(RequestInitChain.Validators) != len(GenesisValidators) (%d != %d)",
|
|
len(req.Validators), len(res.Validators),
|
|
),
|
|
)
|
|
}
|
|
|
|
sort.Sort(abci.ValidatorUpdates(req.Validators))
|
|
sort.Sort(abci.ValidatorUpdates(res.Validators))
|
|
|
|
for i := range res.Validators {
|
|
if !proto.Equal(&res.Validators[i], &req.Validators[i]) {
|
|
panic(fmt.Errorf("genesisValidators[%d] != req.Validators[%d] ", i, i))
|
|
}
|
|
}
|
|
}
|
|
|
|
// In the case of a new chain, AppHash will be the hash of an empty string.
|
|
// During an upgrade, it'll be the hash of the last committed block.
|
|
var appHash []byte
|
|
if !app.LastCommitID().IsZero() {
|
|
appHash = app.LastCommitID().Hash
|
|
} else {
|
|
// $ echo -n '' | sha256sum
|
|
// e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
|
|
emptyHash := sha256.Sum256([]byte{})
|
|
appHash = emptyHash[:]
|
|
}
|
|
|
|
// NOTE: We don't commit, but BeginBlock for block `initial_height` starts from this
|
|
// deliverState.
|
|
return abci.ResponseInitChain{
|
|
ConsensusParams: res.ConsensusParams,
|
|
Validators: res.Validators,
|
|
AppHash: appHash,
|
|
}
|
|
}
|
|
|
|
// Info implements the ABCI interface.
|
|
func (app *BaseApp) Info(req abci.RequestInfo) abci.ResponseInfo {
|
|
lastCommitID := app.cms.LastCommitID()
|
|
|
|
return abci.ResponseInfo{
|
|
Data: app.name,
|
|
Version: app.version,
|
|
AppVersion: app.appVersion,
|
|
LastBlockHeight: lastCommitID.Version,
|
|
LastBlockAppHash: lastCommitID.Hash,
|
|
}
|
|
}
|
|
|
|
// SetOption implements the ABCI interface.
|
|
func (app *BaseApp) SetOption(req abci.RequestSetOption) (res abci.ResponseSetOption) {
|
|
// TODO: Implement!
|
|
return
|
|
}
|
|
|
|
// FilterPeerByAddrPort filters peers by address/port.
|
|
func (app *BaseApp) FilterPeerByAddrPort(info string) abci.ResponseQuery {
|
|
if app.addrPeerFilter != nil {
|
|
return app.addrPeerFilter(info)
|
|
}
|
|
|
|
return abci.ResponseQuery{}
|
|
}
|
|
|
|
// FilterPeerByID filters peers by node ID.
|
|
func (app *BaseApp) FilterPeerByID(info string) abci.ResponseQuery {
|
|
if app.idPeerFilter != nil {
|
|
return app.idPeerFilter(info)
|
|
}
|
|
|
|
return abci.ResponseQuery{}
|
|
}
|
|
|
|
// BeginBlock implements the ABCI application interface.
|
|
func (app *BaseApp) BeginBlock(req abci.RequestBeginBlock) (res abci.ResponseBeginBlock) {
|
|
defer telemetry.MeasureSince(time.Now(), "abci", "begin_block")
|
|
|
|
if app.cms.TracingEnabled() {
|
|
app.cms.SetTracingContext(sdk.TraceContext(
|
|
map[string]interface{}{"blockHeight": req.Header.Height},
|
|
))
|
|
}
|
|
|
|
if err := app.validateHeight(req); err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
// Initialize the DeliverTx state. If this is the first block, it should
|
|
// already be initialized in InitChain. Otherwise app.deliverState will be
|
|
// nil, since it is reset on Commit.
|
|
if app.deliverState == nil {
|
|
app.setDeliverState(req.Header)
|
|
} else {
|
|
// In the first block, app.deliverState.ctx will already be initialized
|
|
// by InitChain. Context is now updated with Header information.
|
|
app.deliverState.ctx = app.deliverState.ctx.
|
|
WithBlockHeader(req.Header).
|
|
WithBlockHeight(req.Header.Height)
|
|
}
|
|
|
|
// add block gas meter
|
|
var gasMeter sdk.GasMeter
|
|
if maxGas := app.getMaximumBlockGas(app.deliverState.ctx); maxGas > 0 {
|
|
gasMeter = sdk.NewGasMeter(maxGas)
|
|
} else {
|
|
gasMeter = sdk.NewInfiniteGasMeter()
|
|
}
|
|
|
|
// NOTE: header hash is not set in NewContext, so we manually set it here
|
|
|
|
app.deliverState.ctx = app.deliverState.ctx.
|
|
WithBlockGasMeter(gasMeter).
|
|
WithHeaderHash(req.Hash)
|
|
|
|
// we also set block gas meter to checkState in case the application needs to
|
|
// verify gas consumption during (Re)CheckTx
|
|
if app.checkState != nil {
|
|
app.checkState.ctx = app.checkState.ctx.
|
|
WithBlockGasMeter(gasMeter).
|
|
WithHeaderHash(req.Hash)
|
|
}
|
|
|
|
if app.beginBlocker != nil {
|
|
res = app.beginBlocker(app.deliverState.ctx, req)
|
|
res.Events = sdk.MarkEventsToIndex(res.Events, app.indexEvents)
|
|
}
|
|
// set the signed validators for addition to context in deliverTx
|
|
app.voteInfos = req.LastCommitInfo.GetVotes()
|
|
return res
|
|
}
|
|
|
|
// EndBlock implements the ABCI interface.
|
|
func (app *BaseApp) EndBlock(req abci.RequestEndBlock) (res abci.ResponseEndBlock) {
|
|
defer telemetry.MeasureSince(time.Now(), "abci", "end_block")
|
|
|
|
if app.deliverState.ms.TracingEnabled() {
|
|
app.deliverState.ms = app.deliverState.ms.SetTracingContext(nil).(sdk.CacheMultiStore)
|
|
}
|
|
|
|
if app.endBlocker != nil {
|
|
res = app.endBlocker(app.deliverState.ctx, req)
|
|
res.Events = sdk.MarkEventsToIndex(res.Events, app.indexEvents)
|
|
}
|
|
|
|
if cp := app.GetConsensusParams(app.deliverState.ctx); cp != nil {
|
|
res.ConsensusParamUpdates = cp
|
|
}
|
|
|
|
return res
|
|
}
|
|
|
|
// CheckTx implements the ABCI interface and executes a tx in CheckTx mode. In
|
|
// CheckTx mode, messages are not executed. This means messages are only validated
|
|
// and only the AnteHandler is executed. State is persisted to the BaseApp's
|
|
// internal CheckTx state if the AnteHandler passes. Otherwise, the ResponseCheckTx
|
|
// will contain releveant error information. Regardless of tx execution outcome,
|
|
// the ResponseCheckTx will contain relevant gas execution context.
|
|
func (app *BaseApp) CheckTx(req abci.RequestCheckTx) abci.ResponseCheckTx {
|
|
defer telemetry.MeasureSince(time.Now(), "abci", "check_tx")
|
|
|
|
var mode runTxMode
|
|
|
|
switch {
|
|
case req.Type == abci.CheckTxType_New:
|
|
mode = runTxModeCheck
|
|
|
|
case req.Type == abci.CheckTxType_Recheck:
|
|
mode = runTxModeReCheck
|
|
|
|
default:
|
|
panic(fmt.Sprintf("unknown RequestCheckTx type: %s", req.Type))
|
|
}
|
|
|
|
gInfo, result, err := app.runTx(mode, req.Tx)
|
|
if err != nil {
|
|
return sdkerrors.ResponseCheckTx(err, gInfo.GasWanted, gInfo.GasUsed, app.trace)
|
|
}
|
|
|
|
return abci.ResponseCheckTx{
|
|
GasWanted: int64(gInfo.GasWanted), // TODO: Should type accept unsigned ints?
|
|
GasUsed: int64(gInfo.GasUsed), // TODO: Should type accept unsigned ints?
|
|
Log: result.Log,
|
|
Data: result.Data,
|
|
Events: sdk.MarkEventsToIndex(result.Events, app.indexEvents),
|
|
}
|
|
}
|
|
|
|
// DeliverTx implements the ABCI interface and executes a tx in DeliverTx mode.
|
|
// State only gets persisted if all messages are valid and get executed successfully.
|
|
// Otherwise, the ResponseDeliverTx will contain releveant error information.
|
|
// Regardless of tx execution outcome, the ResponseDeliverTx will contain relevant
|
|
// gas execution context.
|
|
func (app *BaseApp) DeliverTx(req abci.RequestDeliverTx) abci.ResponseDeliverTx {
|
|
defer telemetry.MeasureSince(time.Now(), "abci", "deliver_tx")
|
|
|
|
gInfo := sdk.GasInfo{}
|
|
resultStr := "successful"
|
|
|
|
defer func() {
|
|
telemetry.IncrCounter(1, "tx", "count")
|
|
telemetry.IncrCounter(1, "tx", resultStr)
|
|
telemetry.SetGauge(float32(gInfo.GasUsed), "tx", "gas", "used")
|
|
telemetry.SetGauge(float32(gInfo.GasWanted), "tx", "gas", "wanted")
|
|
}()
|
|
|
|
gInfo, result, err := app.runTx(runTxModeDeliver, req.Tx)
|
|
if err != nil {
|
|
resultStr = "failed"
|
|
return sdkerrors.ResponseDeliverTx(err, gInfo.GasWanted, gInfo.GasUsed, app.trace)
|
|
}
|
|
|
|
return abci.ResponseDeliverTx{
|
|
GasWanted: int64(gInfo.GasWanted), // TODO: Should type accept unsigned ints?
|
|
GasUsed: int64(gInfo.GasUsed), // TODO: Should type accept unsigned ints?
|
|
Log: result.Log,
|
|
Data: result.Data,
|
|
Events: sdk.MarkEventsToIndex(result.Events, app.indexEvents),
|
|
}
|
|
}
|
|
|
|
// Commit implements the ABCI interface. It will commit all state that exists in
|
|
// the deliver state's multi-store and includes the resulting commit ID in the
|
|
// returned abci.ResponseCommit. Commit will set the check state based on the
|
|
// latest header and reset the deliver state. Also, if a non-zero halt height is
|
|
// defined in config, Commit will execute a deferred function call to check
|
|
// against that height and gracefully halt if it matches the latest committed
|
|
// height.
|
|
func (app *BaseApp) Commit() (res abci.ResponseCommit) {
|
|
defer telemetry.MeasureSince(time.Now(), "abci", "commit")
|
|
|
|
header := app.deliverState.ctx.BlockHeader()
|
|
retainHeight := app.GetBlockRetentionHeight(header.Height)
|
|
|
|
// Write the DeliverTx state into branched storage and commit the MultiStore.
|
|
// The write to the DeliverTx state writes all state transitions to the root
|
|
// MultiStore (app.cms) so when Commit() is called is persists those values.
|
|
app.deliverState.ms.Write()
|
|
commitID := app.cms.Commit()
|
|
app.logger.Info("commit synced", "commit", fmt.Sprintf("%X", commitID))
|
|
|
|
// Reset the Check state to the latest committed.
|
|
//
|
|
// NOTE: This is safe because Tendermint holds a lock on the mempool for
|
|
// Commit. Use the header from this latest block.
|
|
app.setCheckState(header)
|
|
|
|
// empty/reset the deliver state
|
|
app.deliverState = nil
|
|
|
|
var halt bool
|
|
|
|
switch {
|
|
case app.haltHeight > 0 && uint64(header.Height) >= app.haltHeight:
|
|
halt = true
|
|
|
|
case app.haltTime > 0 && header.Time.Unix() >= int64(app.haltTime):
|
|
halt = true
|
|
}
|
|
|
|
if halt {
|
|
// Halt the binary and allow Tendermint to receive the ResponseCommit
|
|
// response with the commit ID hash. This will allow the node to successfully
|
|
// restart and process blocks assuming the halt configuration has been
|
|
// reset or moved to a more distant value.
|
|
app.halt()
|
|
}
|
|
|
|
if app.snapshotInterval > 0 && uint64(header.Height)%app.snapshotInterval == 0 {
|
|
go app.snapshot(header.Height)
|
|
}
|
|
|
|
return abci.ResponseCommit{
|
|
Data: commitID.Hash,
|
|
RetainHeight: retainHeight,
|
|
}
|
|
}
|
|
|
|
// halt attempts to gracefully shutdown the node via SIGINT and SIGTERM falling
|
|
// back on os.Exit if both fail.
|
|
func (app *BaseApp) halt() {
|
|
app.logger.Info("halting node per configuration", "height", app.haltHeight, "time", app.haltTime)
|
|
|
|
p, err := os.FindProcess(os.Getpid())
|
|
if err == nil {
|
|
// attempt cascading signals in case SIGINT fails (os dependent)
|
|
sigIntErr := p.Signal(syscall.SIGINT)
|
|
sigTermErr := p.Signal(syscall.SIGTERM)
|
|
|
|
if sigIntErr == nil || sigTermErr == nil {
|
|
return
|
|
}
|
|
}
|
|
|
|
// Resort to exiting immediately if the process could not be found or killed
|
|
// via SIGINT/SIGTERM signals.
|
|
app.logger.Info("failed to send SIGINT/SIGTERM; exiting...")
|
|
os.Exit(0)
|
|
}
|
|
|
|
// snapshot takes a snapshot of the current state and prunes any old snapshottypes.
|
|
func (app *BaseApp) snapshot(height int64) {
|
|
if app.snapshotManager == nil {
|
|
app.logger.Info("snapshot manager not configured")
|
|
return
|
|
}
|
|
|
|
app.logger.Info("creating state snapshot", "height", height)
|
|
|
|
snapshot, err := app.snapshotManager.Create(uint64(height))
|
|
if err != nil {
|
|
app.logger.Error("failed to create state snapshot", "height", height, "err", err)
|
|
return
|
|
}
|
|
|
|
app.logger.Info("completed state snapshot", "height", height, "format", snapshot.Format)
|
|
|
|
if app.snapshotKeepRecent > 0 {
|
|
app.logger.Debug("pruning state snapshots")
|
|
|
|
pruned, err := app.snapshotManager.Prune(app.snapshotKeepRecent)
|
|
if err != nil {
|
|
app.logger.Error("Failed to prune state snapshots", "err", err)
|
|
return
|
|
}
|
|
|
|
app.logger.Debug("pruned state snapshots", "pruned", pruned)
|
|
}
|
|
}
|
|
|
|
// Query implements the ABCI interface. It delegates to CommitMultiStore if it
|
|
// implements Queryable.
|
|
func (app *BaseApp) Query(req abci.RequestQuery) (res abci.ResponseQuery) {
|
|
defer telemetry.MeasureSince(time.Now(), "abci", "query")
|
|
|
|
// Add panic recovery for all queries.
|
|
// ref: https://github.com/cosmos/cosmos-sdk/pull/8039
|
|
defer func() {
|
|
if r := recover(); r != nil {
|
|
res = sdkerrors.QueryResult(sdkerrors.Wrapf(sdkerrors.ErrPanic, "%v", r), app.trace)
|
|
}
|
|
}()
|
|
|
|
// when a client did not provide a query height, manually inject the latest
|
|
if req.Height == 0 {
|
|
req.Height = app.LastBlockHeight()
|
|
}
|
|
|
|
// handle gRPC routes first rather than calling splitPath because '/' characters
|
|
// are used as part of gRPC paths
|
|
if grpcHandler := app.grpcQueryRouter.Route(req.Path); grpcHandler != nil {
|
|
return app.handleQueryGRPC(grpcHandler, req)
|
|
}
|
|
|
|
path := splitPath(req.Path)
|
|
if len(path) == 0 {
|
|
sdkerrors.QueryResult(sdkerrors.Wrap(sdkerrors.ErrUnknownRequest, "no query path provided"), app.trace)
|
|
}
|
|
|
|
switch path[0] {
|
|
// "/app" prefix for special application queries
|
|
case "app":
|
|
return handleQueryApp(app, path, req)
|
|
|
|
case "store":
|
|
return handleQueryStore(app, path, req)
|
|
|
|
case "p2p":
|
|
return handleQueryP2P(app, path)
|
|
|
|
case "custom":
|
|
return handleQueryCustom(app, path, req)
|
|
}
|
|
|
|
return sdkerrors.QueryResult(sdkerrors.Wrap(sdkerrors.ErrUnknownRequest, "unknown query path"), app.trace)
|
|
}
|
|
|
|
// ListSnapshots implements the ABCI interface. It delegates to app.snapshotManager if set.
|
|
func (app *BaseApp) ListSnapshots(req abci.RequestListSnapshots) abci.ResponseListSnapshots {
|
|
resp := abci.ResponseListSnapshots{Snapshots: []*abci.Snapshot{}}
|
|
if app.snapshotManager == nil {
|
|
return resp
|
|
}
|
|
|
|
snapshots, err := app.snapshotManager.List()
|
|
if err != nil {
|
|
app.logger.Error("failed to list snapshots", "err", err)
|
|
return resp
|
|
}
|
|
|
|
for _, snapshot := range snapshots {
|
|
abciSnapshot, err := snapshot.ToABCI()
|
|
if err != nil {
|
|
app.logger.Error("failed to list snapshots", "err", err)
|
|
return resp
|
|
}
|
|
resp.Snapshots = append(resp.Snapshots, &abciSnapshot)
|
|
}
|
|
|
|
return resp
|
|
}
|
|
|
|
// LoadSnapshotChunk implements the ABCI interface. It delegates to app.snapshotManager if set.
|
|
func (app *BaseApp) LoadSnapshotChunk(req abci.RequestLoadSnapshotChunk) abci.ResponseLoadSnapshotChunk {
|
|
if app.snapshotManager == nil {
|
|
return abci.ResponseLoadSnapshotChunk{}
|
|
}
|
|
chunk, err := app.snapshotManager.LoadChunk(req.Height, req.Format, req.Chunk)
|
|
if err != nil {
|
|
app.logger.Error(
|
|
"failed to load snapshot chunk",
|
|
"height", req.Height,
|
|
"format", req.Format,
|
|
"chunk", req.Chunk,
|
|
"err", err,
|
|
)
|
|
return abci.ResponseLoadSnapshotChunk{}
|
|
}
|
|
return abci.ResponseLoadSnapshotChunk{Chunk: chunk}
|
|
}
|
|
|
|
// OfferSnapshot implements the ABCI interface. It delegates to app.snapshotManager if set.
|
|
func (app *BaseApp) OfferSnapshot(req abci.RequestOfferSnapshot) abci.ResponseOfferSnapshot {
|
|
if app.snapshotManager == nil {
|
|
app.logger.Error("snapshot manager not configured")
|
|
return abci.ResponseOfferSnapshot{Result: abci.ResponseOfferSnapshot_ABORT}
|
|
}
|
|
|
|
if req.Snapshot == nil {
|
|
app.logger.Error("received nil snapshot")
|
|
return abci.ResponseOfferSnapshot{Result: abci.ResponseOfferSnapshot_REJECT}
|
|
}
|
|
|
|
snapshot, err := snapshottypes.SnapshotFromABCI(req.Snapshot)
|
|
if err != nil {
|
|
app.logger.Error("failed to decode snapshot metadata", "err", err)
|
|
return abci.ResponseOfferSnapshot{Result: abci.ResponseOfferSnapshot_REJECT}
|
|
}
|
|
|
|
err = app.snapshotManager.Restore(snapshot)
|
|
switch {
|
|
case err == nil:
|
|
return abci.ResponseOfferSnapshot{Result: abci.ResponseOfferSnapshot_ACCEPT}
|
|
|
|
case errors.Is(err, snapshottypes.ErrUnknownFormat):
|
|
return abci.ResponseOfferSnapshot{Result: abci.ResponseOfferSnapshot_REJECT_FORMAT}
|
|
|
|
case errors.Is(err, snapshottypes.ErrInvalidMetadata):
|
|
app.logger.Error(
|
|
"rejecting invalid snapshot",
|
|
"height", req.Snapshot.Height,
|
|
"format", req.Snapshot.Format,
|
|
"err", err,
|
|
)
|
|
return abci.ResponseOfferSnapshot{Result: abci.ResponseOfferSnapshot_REJECT}
|
|
|
|
default:
|
|
app.logger.Error(
|
|
"failed to restore snapshot",
|
|
"height", req.Snapshot.Height,
|
|
"format", req.Snapshot.Format,
|
|
"err", err,
|
|
)
|
|
|
|
// We currently don't support resetting the IAVL stores and retrying a different snapshot,
|
|
// so we ask Tendermint to abort all snapshot restoration.
|
|
return abci.ResponseOfferSnapshot{Result: abci.ResponseOfferSnapshot_ABORT}
|
|
}
|
|
}
|
|
|
|
// ApplySnapshotChunk implements the ABCI interface. It delegates to app.snapshotManager if set.
|
|
func (app *BaseApp) ApplySnapshotChunk(req abci.RequestApplySnapshotChunk) abci.ResponseApplySnapshotChunk {
|
|
if app.snapshotManager == nil {
|
|
app.logger.Error("snapshot manager not configured")
|
|
return abci.ResponseApplySnapshotChunk{Result: abci.ResponseApplySnapshotChunk_ABORT}
|
|
}
|
|
|
|
_, err := app.snapshotManager.RestoreChunk(req.Chunk)
|
|
switch {
|
|
case err == nil:
|
|
return abci.ResponseApplySnapshotChunk{Result: abci.ResponseApplySnapshotChunk_ACCEPT}
|
|
|
|
case errors.Is(err, snapshottypes.ErrChunkHashMismatch):
|
|
app.logger.Error(
|
|
"chunk checksum mismatch; rejecting sender and requesting refetch",
|
|
"chunk", req.Index,
|
|
"sender", req.Sender,
|
|
"err", err,
|
|
)
|
|
return abci.ResponseApplySnapshotChunk{
|
|
Result: abci.ResponseApplySnapshotChunk_RETRY,
|
|
RefetchChunks: []uint32{req.Index},
|
|
RejectSenders: []string{req.Sender},
|
|
}
|
|
|
|
default:
|
|
app.logger.Error("failed to restore snapshot", "err", err)
|
|
return abci.ResponseApplySnapshotChunk{Result: abci.ResponseApplySnapshotChunk_ABORT}
|
|
}
|
|
}
|
|
|
|
func (app *BaseApp) handleQueryGRPC(handler GRPCQueryHandler, req abci.RequestQuery) abci.ResponseQuery {
|
|
ctx, err := app.createQueryContext(req.Height, req.Prove)
|
|
if err != nil {
|
|
return sdkerrors.QueryResult(err, app.trace)
|
|
}
|
|
|
|
res, err := handler(ctx, req)
|
|
if err != nil {
|
|
res = sdkerrors.QueryResult(gRPCErrorToSDKError(err), app.trace)
|
|
res.Height = req.Height
|
|
return res
|
|
}
|
|
|
|
return res
|
|
}
|
|
|
|
func gRPCErrorToSDKError(err error) error {
|
|
status, ok := grpcstatus.FromError(err)
|
|
if !ok {
|
|
return sdkerrors.Wrap(sdkerrors.ErrInvalidRequest, err.Error())
|
|
}
|
|
|
|
switch status.Code() {
|
|
case codes.NotFound:
|
|
return sdkerrors.Wrap(sdkerrors.ErrKeyNotFound, err.Error())
|
|
case codes.InvalidArgument:
|
|
return sdkerrors.Wrap(sdkerrors.ErrInvalidRequest, err.Error())
|
|
case codes.FailedPrecondition:
|
|
return sdkerrors.Wrap(sdkerrors.ErrInvalidRequest, err.Error())
|
|
case codes.Unauthenticated:
|
|
return sdkerrors.Wrap(sdkerrors.ErrUnauthorized, err.Error())
|
|
default:
|
|
return sdkerrors.Wrap(sdkerrors.ErrUnknownRequest, err.Error())
|
|
}
|
|
}
|
|
|
|
func checkNegativeHeight(height int64) error {
|
|
if height < 0 {
|
|
// Reject invalid heights.
|
|
return sdkerrors.Wrap(
|
|
sdkerrors.ErrInvalidRequest,
|
|
"cannot query with height < 0; please provide a valid height",
|
|
)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// createQueryContext creates a new sdk.Context for a query, taking as args
|
|
// the block height and whether the query needs a proof or not.
|
|
func (app *BaseApp) createQueryContext(height int64, prove bool) (sdk.Context, error) {
|
|
if err := checkNegativeHeight(height); err != nil {
|
|
return sdk.Context{}, err
|
|
}
|
|
|
|
// when a client did not provide a query height, manually inject the latest
|
|
if height == 0 {
|
|
height = app.LastBlockHeight()
|
|
}
|
|
|
|
if height <= 1 && prove {
|
|
return sdk.Context{},
|
|
sdkerrors.Wrap(
|
|
sdkerrors.ErrInvalidRequest,
|
|
"cannot query with proof when height <= 1; please provide a valid height",
|
|
)
|
|
}
|
|
|
|
cacheMS, err := app.cms.CacheMultiStoreWithVersion(height)
|
|
if err != nil {
|
|
return sdk.Context{},
|
|
sdkerrors.Wrapf(
|
|
sdkerrors.ErrInvalidRequest,
|
|
"failed to load state at height %d; %s (latest height: %d)", height, err, app.LastBlockHeight(),
|
|
)
|
|
}
|
|
|
|
// branch the commit-multistore for safety
|
|
ctx := sdk.NewContext(
|
|
cacheMS, app.checkState.ctx.BlockHeader(), true, app.logger,
|
|
).WithMinGasPrices(app.minGasPrices)
|
|
|
|
return ctx, nil
|
|
}
|
|
|
|
// GetBlockRetentionHeight returns the height for which all blocks below this height
|
|
// are pruned from Tendermint. Given a commitment height and a non-zero local
|
|
// minRetainBlocks configuration, the retentionHeight is the smallest height that
|
|
// satisfies:
|
|
//
|
|
// - Unbonding (safety threshold) time: The block interval in which validators
|
|
// can be economically punished for misbehavior. Blocks in this interval must be
|
|
// auditable e.g. by the light client.
|
|
//
|
|
// - Logical store snapshot interval: The block interval at which the underlying
|
|
// logical store database is persisted to disk, e.g. every 10000 heights. Blocks
|
|
// since the last IAVL snapshot must be available for replay on application restart.
|
|
//
|
|
// - State sync snapshots: Blocks since the oldest available snapshot must be
|
|
// available for state sync nodes to catch up (oldest because a node may be
|
|
// restoring an old snapshot while a new snapshot was taken).
|
|
//
|
|
// - Local (minRetainBlocks) config: Archive nodes may want to retain more or
|
|
// all blocks, e.g. via a local config option min-retain-blocks. There may also
|
|
// be a need to vary retention for other nodes, e.g. sentry nodes which do not
|
|
// need historical blocks.
|
|
func (app *BaseApp) GetBlockRetentionHeight(commitHeight int64) int64 {
|
|
// pruning is disabled if minRetainBlocks is zero
|
|
if app.minRetainBlocks == 0 {
|
|
return 0
|
|
}
|
|
|
|
minNonZero := func(x, y int64) int64 {
|
|
switch {
|
|
case x == 0:
|
|
return y
|
|
case y == 0:
|
|
return x
|
|
case x < y:
|
|
return x
|
|
default:
|
|
return y
|
|
}
|
|
}
|
|
|
|
// Define retentionHeight as the minimum value that satisfies all non-zero
|
|
// constraints. All blocks below (commitHeight-retentionHeight) are pruned
|
|
// from Tendermint.
|
|
var retentionHeight int64
|
|
|
|
// Define the number of blocks needed to protect against misbehaving validators
|
|
// which allows light clients to operate safely. Note, we piggy back of the
|
|
// evidence parameters instead of computing an estimated nubmer of blocks based
|
|
// on the unbonding period and block commitment time as the two should be
|
|
// equivalent.
|
|
cp := app.GetConsensusParams(app.deliverState.ctx)
|
|
if cp != nil && cp.Evidence != nil && cp.Evidence.MaxAgeNumBlocks > 0 {
|
|
retentionHeight = commitHeight - cp.Evidence.MaxAgeNumBlocks
|
|
}
|
|
|
|
// Define the state pruning offset, i.e. the block offset at which the
|
|
// underlying logical database is persisted to disk.
|
|
statePruningOffset := int64(app.cms.GetPruning().KeepEvery)
|
|
if statePruningOffset > 0 {
|
|
if commitHeight > statePruningOffset {
|
|
v := commitHeight - (commitHeight % statePruningOffset)
|
|
retentionHeight = minNonZero(retentionHeight, v)
|
|
} else {
|
|
// Hitting this case means we have persisting enabled but have yet to reach
|
|
// a height in which we persist state, so we return zero regardless of other
|
|
// conditions. Otherwise, we could end up pruning blocks without having
|
|
// any state committed to disk.
|
|
return 0
|
|
}
|
|
}
|
|
|
|
if app.snapshotInterval > 0 && app.snapshotKeepRecent > 0 {
|
|
v := commitHeight - int64((app.snapshotInterval * uint64(app.snapshotKeepRecent)))
|
|
retentionHeight = minNonZero(retentionHeight, v)
|
|
}
|
|
|
|
v := commitHeight - int64(app.minRetainBlocks)
|
|
retentionHeight = minNonZero(retentionHeight, v)
|
|
|
|
if retentionHeight <= 0 {
|
|
// prune nothing in the case of a non-positive height
|
|
return 0
|
|
}
|
|
|
|
return retentionHeight
|
|
}
|
|
|
|
func handleQueryApp(app *BaseApp, path []string, req abci.RequestQuery) abci.ResponseQuery {
|
|
if len(path) >= 2 {
|
|
switch path[1] {
|
|
case "simulate":
|
|
txBytes := req.Data
|
|
|
|
gInfo, res, err := app.Simulate(txBytes)
|
|
if err != nil {
|
|
return sdkerrors.QueryResult(sdkerrors.Wrap(err, "failed to simulate tx"), app.trace)
|
|
}
|
|
|
|
simRes := &sdk.SimulationResponse{
|
|
GasInfo: gInfo,
|
|
Result: res,
|
|
}
|
|
|
|
bz, err := codec.ProtoMarshalJSON(simRes, app.interfaceRegistry)
|
|
if err != nil {
|
|
return sdkerrors.QueryResult(sdkerrors.Wrap(err, "failed to JSON encode simulation response"), app.trace)
|
|
}
|
|
|
|
return abci.ResponseQuery{
|
|
Codespace: sdkerrors.RootCodespace,
|
|
Height: req.Height,
|
|
Value: bz,
|
|
}
|
|
|
|
case "version":
|
|
return abci.ResponseQuery{
|
|
Codespace: sdkerrors.RootCodespace,
|
|
Height: req.Height,
|
|
Value: []byte(app.version),
|
|
}
|
|
|
|
default:
|
|
return sdkerrors.QueryResult(sdkerrors.Wrapf(sdkerrors.ErrUnknownRequest, "unknown query: %s", path), app.trace)
|
|
}
|
|
}
|
|
|
|
return sdkerrors.QueryResult(
|
|
sdkerrors.Wrap(
|
|
sdkerrors.ErrUnknownRequest,
|
|
"expected second parameter to be either 'simulate' or 'version', neither was present",
|
|
), app.trace)
|
|
}
|
|
|
|
func handleQueryStore(app *BaseApp, path []string, req abci.RequestQuery) abci.ResponseQuery {
|
|
// "/store" prefix for store queries
|
|
queryable, ok := app.cms.(sdk.Queryable)
|
|
if !ok {
|
|
return sdkerrors.QueryResult(sdkerrors.Wrap(sdkerrors.ErrUnknownRequest, "multistore doesn't support queries"), app.trace)
|
|
}
|
|
|
|
req.Path = "/" + strings.Join(path[1:], "/")
|
|
|
|
if req.Height <= 1 && req.Prove {
|
|
return sdkerrors.QueryResult(
|
|
sdkerrors.Wrap(
|
|
sdkerrors.ErrInvalidRequest,
|
|
"cannot query with proof when height <= 1; please provide a valid height",
|
|
), app.trace)
|
|
}
|
|
|
|
resp := queryable.Query(req)
|
|
resp.Height = req.Height
|
|
|
|
return resp
|
|
}
|
|
|
|
func handleQueryP2P(app *BaseApp, path []string) abci.ResponseQuery {
|
|
// "/p2p" prefix for p2p queries
|
|
if len(path) < 4 {
|
|
return sdkerrors.QueryResult(
|
|
sdkerrors.Wrap(
|
|
sdkerrors.ErrUnknownRequest, "path should be p2p filter <addr|id> <parameter>",
|
|
), app.trace)
|
|
}
|
|
|
|
var resp abci.ResponseQuery
|
|
|
|
cmd, typ, arg := path[1], path[2], path[3]
|
|
switch cmd {
|
|
case "filter":
|
|
switch typ {
|
|
case "addr":
|
|
resp = app.FilterPeerByAddrPort(arg)
|
|
|
|
case "id":
|
|
resp = app.FilterPeerByID(arg)
|
|
}
|
|
|
|
default:
|
|
resp = sdkerrors.QueryResult(sdkerrors.Wrap(sdkerrors.ErrUnknownRequest, "expected second parameter to be 'filter'"), app.trace)
|
|
}
|
|
|
|
return resp
|
|
}
|
|
|
|
func handleQueryCustom(app *BaseApp, path []string, req abci.RequestQuery) abci.ResponseQuery {
|
|
// path[0] should be "custom" because "/custom" prefix is required for keeper
|
|
// queries.
|
|
//
|
|
// The QueryRouter routes using path[1]. For example, in the path
|
|
// "custom/gov/proposal", QueryRouter routes using "gov".
|
|
if len(path) < 2 || path[1] == "" {
|
|
return sdkerrors.QueryResult(sdkerrors.Wrap(sdkerrors.ErrUnknownRequest, "no route for custom query specified"), app.trace)
|
|
}
|
|
|
|
querier := app.queryRouter.Route(path[1])
|
|
if querier == nil {
|
|
return sdkerrors.QueryResult(sdkerrors.Wrapf(sdkerrors.ErrUnknownRequest, "no custom querier found for route %s", path[1]), app.trace)
|
|
}
|
|
|
|
ctx, err := app.createQueryContext(req.Height, req.Prove)
|
|
if err != nil {
|
|
return sdkerrors.QueryResult(err, app.trace)
|
|
}
|
|
|
|
// Passes the rest of the path as an argument to the querier.
|
|
//
|
|
// For example, in the path "custom/gov/proposal/test", the gov querier gets
|
|
// []string{"proposal", "test"} as the path.
|
|
resBytes, err := querier(ctx, path[2:], req)
|
|
if err != nil {
|
|
res := sdkerrors.QueryResult(err, app.trace)
|
|
res.Height = req.Height
|
|
return res
|
|
}
|
|
|
|
return abci.ResponseQuery{
|
|
Height: req.Height,
|
|
Value: resBytes,
|
|
}
|
|
}
|
|
|
|
// splitPath splits a string path using the delimiter '/'.
|
|
//
|
|
// e.g. "this/is/funny" becomes []string{"this", "is", "funny"}
|
|
func splitPath(requestPath string) (path []string) {
|
|
path = strings.Split(requestPath, "/")
|
|
|
|
// first element is empty string
|
|
if len(path) > 0 && path[0] == "" {
|
|
path = path[1:]
|
|
}
|
|
|
|
return path
|
|
}
|