Newer
Older
// Copyright 2017 Monax Industries Limited
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
import (
"time"
acm "github.com/hyperledger/burrow/account"
"github.com/hyperledger/burrow/account/state"
"github.com/hyperledger/burrow/event"
"github.com/hyperledger/burrow/execution/events"
"github.com/hyperledger/burrow/execution/names"
"github.com/hyperledger/burrow/permission"
ptypes "github.com/hyperledger/burrow/permission/types"
"github.com/tendermint/iavl"
const (
defaultCacheCapacity = 1024
// Age of state versions in blocks before we remove them. This has us keeping a little over an hour's worth of blocks
// in principle we could manage with 2. Ideally we would lift this limit altogether but IAVL leaks memory on access
// to previous tree versions since it lazy loads values (nice) but gives no ability to unload them (see SaveBranch)
defaultVersionExpiry = 2048
// Version by state hash
versionPrefix = "v/"
// Prefix of keys in state tree
accountsPrefix = "a/"
storagePrefix = "s/"
nameRegPrefix = "n/"
var (
accountsStart, accountsEnd []byte = prefixKeyRange(accountsPrefix)
storageStart, storageEnd []byte = prefixKeyRange(storagePrefix)
nameRegStart, nameRegEnd []byte = prefixKeyRange(nameRegPrefix)
)
var _ state.IterableReader = &State{}
var _ names.IterableReader = &State{}
var _ Updatable = &writeState{}
type Updatable interface {
state.Writer
names.Writer
event.Publisher
}
// Wraps state to give access to writer methods
type writeState struct {
state *State
}
// Writers to state are responsible for calling State.Lock() before calling
writeState *writeState
db dbm.DB
tree *iavl.VersionedTree
logger *logging.Logger
// Values may be reassigned (mutex protected)
// Previous version of IAVL tree for concurrent read-only access
readTree *iavl.Tree
// High water mark for height/index - make sure we do not overwrite events - should only increase
eventKeyHighWatermark events.Key
// Last state hash
hash []byte
}
// Create a new State object
func NewState(db dbm.DB) *State {
tree: iavl.NewVersionedTree(db, defaultCacheCapacity),
}
s.writeState = &writeState{state: s}
return s
}
// Make genesis state from GenesisDoc and save to DB
func MakeGenesisState(db dbm.DB, genesisDoc *genesis.GenesisDoc) (*State, error) {
if len(genesisDoc.Validators) == 0 {
return nil, fmt.Errorf("the genesis file has no validators")
if genesisDoc.GenesisTime.IsZero() {
// NOTE: [ben] change GenesisTime to requirement on v0.17
// GenesisTime needs to be deterministic across the chain
// and should be required in the genesis file;
// the requirement is not yet enforced when lacking set
// time to 11/18/2016 @ 4:09am (UTC)
genesisDoc.GenesisTime = time.Unix(1479442162, 0)
for _, genAcc := range genesisDoc.Accounts {
perm := genAcc.Permissions
acc := &acm.ConcreteAccount{
Address: genAcc.Address,
Balance: genAcc.Amount,
Permissions: perm,
}
err := s.writeState.UpdateAccount(acc.Account())
if err != nil {
return nil, err
}
}
// global permissions are saved as the 0 address
// so they are included in the accounts tree
globalPerms := permission.DefaultAccountPermissions
globalPerms = genesisDoc.GlobalPermissions
// XXX: make sure the set bits are all true
// Without it the HasPermission() functions will fail
globalPerms.Base.SetBit = ptypes.AllPermFlags
permsAcc := &acm.ConcreteAccount{
Address: acm.GlobalPermissionsAddress,
err := s.writeState.UpdateAccount(permsAcc.Account())
if err != nil {
return nil, err
}
// We need to save at least once so that readTree points at a non-working-state tree
_, err = s.writeState.save()
if err != nil {
return nil, err
}
// Tries to load the execution state from DB, returns nil with no error if no state found
func LoadState(db dbm.DB, hash []byte) (*State, error) {
// Get the version associated with this state hash
version, err := s.writeState.GetVersion(hash)
if err != nil {
return nil, err
}
if version <= 0 {
return nil, fmt.Errorf("trying to load state from non-positive version: version %v, hash: %X", version, hash)
}
// Load previous version for readTree
treeVersion, err := s.tree.LoadVersion(version - 1)
if err != nil {
return nil, fmt.Errorf("could not load previous version of state tree: %v", version-1)
}
// Set readTree
s.readTree = s.tree.Tree()
// Load previous version for readTree
treeVersion, err = s.tree.LoadVersion(version)
if err != nil {
return nil, fmt.Errorf("could not load current version of state tree: version %v, hash: %X", version, hash)
}
if treeVersion != version {
return nil, fmt.Errorf("tried to load state version %v for state hash %X but loaded version %v",
version, hash, treeVersion)
}
// Perform updates to state whilst holding the write lock, allows a commit to hold the write lock across multiple
// operations while preventing interlaced reads and writes
func (s *State) Update(updater func(up Updatable) error) ([]byte, error) {
updater(s.writeState)
return s.writeState.save()
func (ws *writeState) save() ([]byte, error) {
// Grab the current orphaning tree and save it for reads against committed state. Note that this tree will lazy
// load nodes from database (in-memory nodes are cleared when a version is saved - see SaveBranch in IAVL), however
// they are not cleared unless SaveBranch is called - and only LoadVersion/SaveVersion could do that which is a hack
ws.state.readTree = ws.state.tree.Tree()
// save state at a new version may still be orphaned before we save the version against the hash
hash, treeVersion, err := ws.state.tree.SaveVersion()
if err != nil {
}
// Provide a reference to load this version in the future from the state hash
ws.SetVersion(hash, treeVersion)
ws.state.hash = hash
return hash, err
}
// Get a previously saved tree version stored by state hash
func (ws *writeState) GetVersion(hash []byte) (int64, error) {
versionBytes := ws.state.db.Get(prefixedKey(versionPrefix, hash))
if versionBytes == nil {
return -1, fmt.Errorf("could not retrieve version corresponding to state hash '%X' in database", hash)
}
return binary.GetInt64BE(versionBytes), nil
}
// Set the tree version associated with a particular hash
func (ws *writeState) SetVersion(hash []byte, version int64) {
versionBytes := make([]byte, 8)
binary.PutInt64BE(versionBytes, version)
ws.state.db.SetSync(prefixedKey(versionPrefix, hash), versionBytes)
}
// Returns nil if account does not exist with given address.
func (s *State) GetAccount(address crypto.Address) (acm.Account, error) {
_, accBytes := s.readTree.Get(prefixedKey(accountsPrefix, address.Bytes()))
if accBytes == nil {
func (ws *writeState) UpdateAccount(account acm.Account) error {
if account == nil {
return fmt.Errorf("UpdateAccount passed nil account in execution.State")
}
// TODO: find a way to implement something equivalent to this so we can set the account StorageRoot
//storageRoot := s.tree.SubTreeHash(prefixedKey(storagePrefix, account.Address().Bytes()))
// Alternatively just abandon and
accountWithStorageRoot := acm.AsMutableAccount(account).SetStorageRoot(nil)
encodedAccount, err := accountWithStorageRoot.Encode()
if err != nil {
return err
}
ws.state.tree.Set(prefixedKey(accountsPrefix, account.Address().Bytes()), encodedAccount)
func (ws *writeState) RemoveAccount(address crypto.Address) error {
ws.state.tree.Remove(prefixedKey(accountsPrefix, address.Bytes()))
func (s *State) IterateAccounts(consumer func(acm.Account) (stop bool)) (stopped bool, err error) {
stopped = s.readTree.IterateRange(accountsStart, accountsEnd, true, func(key, value []byte) bool {
var account acm.Account
account, err = acm.Decode(value)
if err != nil {
return true
}
return consumer(account)
})
return
func (s *State) GetStorage(address crypto.Address, key binary.Word256) (binary.Word256, error) {
_, value := s.readTree.Get(prefixedKey(storagePrefix, address.Bytes(), key.Bytes()))
func (ws *writeState) SetStorage(address crypto.Address, key, value binary.Word256) error {
if value == binary.Zero256 {
ws.state.tree.Remove(key.Bytes())
ws.state.tree.Set(prefixedKey(storagePrefix, address.Bytes(), key.Bytes()), value.Bytes())
func (s *State) IterateStorage(address crypto.Address,
consumer func(key, value binary.Word256) (stop bool)) (stopped bool, err error) {
stopped = s.readTree.IterateRange(storageStart, storageEnd, true, func(key []byte, value []byte) (stop bool) {
// Note: no left padding should occur unless there is a bug and non-words have been writte to this storage tree
if len(key) != binary.Word256Length {
err = fmt.Errorf("key '%X' stored for account %s is not a %v-byte word",
key, address, binary.Word256Length)
return true
}
if len(value) != binary.Word256Length {
err = fmt.Errorf("value '%X' stored for account %s is not a %v-byte word",
key, address, binary.Word256Length)
return true
}
return consumer(binary.LeftPadWord256(key), binary.LeftPadWord256(value))
})
return
}
// State.storage
//-------------------------------------
// Execution events
func (ws *writeState) Publish(ctx context.Context, msg interface{}, tags event.Tags) error {
if exeEvent, ok := msg.(*events.Event); ok {
key := exeEvent.Header.Key()
if !key.IsSuccessorOf(ws.state.eventKeyHighWatermark) {
return fmt.Errorf("received event with non-increasing key compared with current high watermark %v: %v",
ws.state.eventKeyHighWatermark, exeEvent)
ws.state.eventKeyHighWatermark = key
if exeEvent.Tx != nil {
// Don't serialise the tx (for now) we should normalise and store against tx hash
exeEvent = exeEvent.Copy()
// The header still contains the tx hash
exeEvent.Tx.Tx = nil
}
bs, err := exeEvent.Encode()
if err != nil {
return err
}
ws.state.tree.Set(eventKey(key), bs)
}
return nil
}
func (s *State) GetEvents(startKey, endKey events.Key, consumer func(ev *events.Event) (stop bool)) (stopped bool, err error) {
return s.tree.IterateRange(eventKey(startKey), eventKey(endKey), true,
func(_, value []byte) bool {
var exeEvent *events.Event
exeEvent, err = events.DecodeEvent(value)
if err != nil {
err = fmt.Errorf("error unmarshalling ExecutionEvent in GetEvents: %v", err)
// stop iteration on error
return true
}
return consumer(exeEvent)
}), err
}
func (s *State) Hash() []byte {
s.RLock()
defer s.RUnlock()
return s.hash
}
func (s *State) LatestEventKey() events.Key {
s.RLock()
defer s.RUnlock()
return s.eventKeyHighWatermark
}
// Events
//-------------------------------------
// State.nameReg
var _ names.IterableReader = &State{}
func (s *State) GetNameEntry(name string) (*names.Entry, error) {
_, entryBytes := s.readTree.Get(prefixedKey(nameRegPrefix, []byte(name)))
return nil, nil
return names.DecodeEntry(entryBytes)
func (s *State) IterateNameEntries(consumer func(*names.Entry) (stop bool)) (stopped bool, err error) {
return s.readTree.IterateRange(nameRegStart, nameRegEnd, true, func(key []byte, value []byte) (stop bool) {
var entry *names.Entry
entry, err = names.DecodeEntry(value)
if err != nil {
return true
}
return consumer(entry)
}), err
func (ws *writeState) UpdateNameEntry(entry *names.Entry) error {
if err != nil {
return err
}
ws.state.tree.Set(prefixedKey(nameRegPrefix, []byte(entry.Name)), bs)
return nil
func (ws *writeState) RemoveNameEntry(name string) error {
ws.state.tree.Remove(prefixedKey(nameRegPrefix, []byte(name)))
return nil
// Creates a copy of the database to the supplied db
func (s *State) Copy(db dbm.DB) (*State, error) {
stateCopy := NewState(db)
s.tree.Iterate(func(key []byte, value []byte) bool {
stateCopy.tree.Set(key, value)
_, err := stateCopy.writeState.save()
if err != nil {
return nil, err
}
return stateCopy, nil
func eventKey(key events.Key) []byte {
return prefixedKey(eventPrefix, key)
}
func prefixedKey(prefix string, suffices ...[]byte) []byte {
key := []byte(prefix)
for _, suffix := range suffices {
key = append(key, suffix...)
}
return key
}
// Returns the start key equal to the bytes of prefix and the end key which lexicographically above any key beginning
// with prefix
func prefixKeyRange(prefix string) (start, end []byte) {
start = []byte(prefix)
for i := len(start) - 1; i >= 0; i-- {
c := start[i]
if c < 0xff {
end = make([]byte, i+1)
copy(end, start)
end[i]++
return
}
}
return
}