zebra/zebra-state/src/service.rs

234 lines
7.8 KiB
Rust
Raw Normal View History

use std::{
future::Future,
pin::Pin,
sync::Arc,
task::{Context, Poll},
};
use futures::future::{FutureExt, TryFutureExt};
use memory_state::{NonFinalizedState, QueuedBlocks};
use tokio::sync::broadcast;
use tower::{buffer::Buffer, util::BoxService, Service};
use tracing::instrument;
use zebra_chain::{
block::{self, Block},
parameters::Network,
};
use crate::{
BoxError, CloneError, CommitBlockError, Config, FinalizedState, Request, Response,
ValidateContextError,
};
mod memory_state;
// todo: put this somewhere
#[derive(Debug)]
pub struct QueuedBlock {
pub block: Arc<Block>,
// TODO: add these parameters when we can compute anchors.
// sprout_anchor: sprout::tree::Root,
// sapling_anchor: sapling::tree::Root,
pub rsp_tx: broadcast::Sender<Result<block::Hash, CloneError>>,
}
struct StateService {
/// Holds data relating to finalized chain state.
sled: FinalizedState,
/// Holds data relating to non-finalized chain state.
mem: NonFinalizedState,
/// Blocks awaiting their parent blocks for contextual verification.
queued_blocks: QueuedBlocks,
}
impl StateService {
pub fn new(config: Config, network: Network) -> Self {
let sled = FinalizedState::new(&config, network);
let mem = NonFinalizedState::default();
let queued_blocks = QueuedBlocks::default();
Self {
sled,
mem,
queued_blocks,
}
}
/// Queue a non finalized block for verification and check if any queued
/// blocks are ready to be verified and committed to the state.
///
/// This function encodes the logic for [committing non-finalized blocks][1]
/// in RFC0005.
///
/// [1]: https://zebra.zfnd.org/dev/rfcs/0005-state-updates.html#committing-non-finalized-blocks
#[instrument(skip(self, new))]
fn queue_and_commit_non_finalized_blocks(&mut self, new: QueuedBlock) {
let parent_hash = new.block.header.previous_block_hash;
self.queued_blocks.queue(new);
if !self.can_fork_chain_at(&parent_hash) {
return;
}
self.process_queued(parent_hash);
while self.mem.best_chain_len() > crate::constants::MAX_BLOCK_REORG_HEIGHT {
let finalized = self.mem.finalize();
self.sled
.commit_finalized_direct(finalized)
.expect("expected that sled errors would not occur");
}
self.queued_blocks
.prune_by_height(self.sled.finalized_tip_height().expect(
"Finalized state must have at least one block before committing non-finalized state",
));
}
/// Run contextual validation on `block` and add it to the non-finalized
/// state if it is contextually valid.
fn validate_and_commit(&mut self, block: Arc<Block>) -> Result<(), CommitBlockError> {
self.check_contextual_validity(&block)?;
let parent_hash = block.header.previous_block_hash;
if self.sled.finalized_tip_hash() == parent_hash {
self.mem.commit_new_chain(block);
} else {
self.mem.commit_block(block);
}
Ok(())
}
/// Returns `true` if `hash` is a valid previous block hash for new non-finalized blocks.
fn can_fork_chain_at(&self, hash: &block::Hash) -> bool {
self.mem.any_chain_contains(hash) || &self.sled.finalized_tip_hash() == hash
}
/// Attempt to validate and commit all queued blocks whose parents have
/// recently arrived starting from `new_parent`, in breadth-first ordering.
#[instrument(skip(self))]
fn process_queued(&mut self, new_parent: block::Hash) {
let mut new_parents = vec![new_parent];
while let Some(parent) = new_parents.pop() {
let queued_children = self.queued_blocks.dequeue_children(parent);
for QueuedBlock { block, rsp_tx } in queued_children {
let hash = block.hash();
let result = self
.validate_and_commit(block)
.map(|()| hash)
.map_err(CloneError::from);
let _ = rsp_tx.send(result);
new_parents.push(hash);
}
}
}
/// Check that `block` is contextually valid based on the committed finalized
/// and non-finalized state.
fn check_contextual_validity(&mut self, block: &Block) -> Result<(), ValidateContextError> {
use ValidateContextError::*;
if block
.coinbase_height()
.expect("valid blocks have a coinbase height")
<= self.sled.finalized_tip_height().expect(
"finalized state must contain at least one block to use the non-finalized state",
)
{
Err(OrphanedBlock)?;
}
// TODO: contextual validation design and implementation
Ok(())
}
}
impl Service<Request> for StateService {
type Response = Response;
type Error = BoxError;
type Future =
Pin<Box<dyn Future<Output = Result<Self::Response, Self::Error>> + Send + 'static>>;
fn poll_ready(&mut self, _: &mut Context<'_>) -> Poll<Result<(), Self::Error>> {
Poll::Ready(Ok(()))
}
fn call(&mut self, req: Request) -> Self::Future {
match req {
Request::CommitBlock { block } => {
let (rsp_tx, mut rsp_rx) = broadcast::channel(1);
self.queue_and_commit_non_finalized_blocks(QueuedBlock { block, rsp_tx });
async move {
rsp_rx
.recv()
.await
.expect("sender is not dropped")
.map(Response::Committed)
.map_err(Into::into)
}
.boxed()
}
Request::CommitFinalizedBlock { block } => {
let (rsp_tx, mut rsp_rx) = broadcast::channel(1);
self.sled
.queue_and_commit_finalized_blocks(QueuedBlock { block, rsp_tx });
async move {
rsp_rx
.recv()
.await
.expect("sender is not dropped")
2020-09-10 10:52:51 -07:00
.map(Response::Committed)
.map_err(Into::into)
}
.boxed()
}
Request::Depth(hash) => {
// todo: handle in memory and sled
2020-09-10 10:52:51 -07:00
self.sled.depth(hash).map_ok(Response::Depth).boxed()
}
Request::Tip => {
// todo: handle in memory and sled
2020-09-10 10:52:51 -07:00
self.sled.tip().map_ok(Response::Tip).boxed()
}
Request::BlockLocator => {
// todo: handle in memory and sled
self.sled
.block_locator()
2020-09-10 10:52:51 -07:00
.map_ok(Response::BlockLocator)
.boxed()
}
2020-09-10 10:25:39 -07:00
Request::Transaction(_) => unimplemented!(),
Request::Block(hash_or_height) => {
//todo: handle in memory and sled
self.sled
.block(hash_or_height)
2020-09-10 10:52:51 -07:00
.map_ok(Response::Block)
.boxed()
}
}
}
}
2020-09-09 17:51:08 -07:00
/// Initialize a state service from the provided [`Config`].
///
/// Each `network` has its own separate sled database.
///
/// The resulting service is clonable, to provide shared access to a common chain
/// state. It's possible to construct multiple state services in the same
/// application (as long as they, e.g., use different storage locations), but
/// doing so is probably not what you want.
pub fn init(
config: Config,
network: Network,
) -> Buffer<BoxService<Request, Response, BoxError>, Request> {
Buffer::new(BoxService::new(StateService::new(config, network)), 3)
}