openethereum/ethcore/src/ethereum/ethash.rs

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

1032 lines
36 KiB
Rust
Raw Normal View History

// Copyright 2015-2019 Parity Technologies (UK) Ltd.
// This file is part of Parity Ethereum.
2016-02-05 13:40:41 +01:00
// Parity Ethereum is free software: you can redistribute it and/or modify
2016-02-05 13:40:41 +01:00
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
// Parity Ethereum is distributed in the hope that it will be useful,
2016-02-05 13:40:41 +01:00
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// You should have received a copy of the GNU General Public License
// along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>.
2016-02-05 13:40:41 +01:00
use std::{cmp, collections::BTreeMap, path::Path, sync::Arc};
use ethereum_types::{H256, H64, U256};
use ethjson;
use hash::KECCAK_EMPTY_LIST_RLP;
use rlp::Rlp;
use types::{
header::{ExtendedHeader, Header},
BlockNumber,
};
use unexpected::{Mismatch, OutOfBounds};
use block::ExecutedBlock;
use engines::{
2020-08-05 06:08:03 +02:00
self,
block_reward::{self, BlockRewardContract, RewardKind},
Engine,
};
use error::{BlockError, Error};
use ethash::{self, quick_get_difficulty, slow_hash_block_number, EthashManager, OptimizeFor};
use machine::EthereumMachine;
2017-04-24 13:14:50 +02:00
/// Number of blocks in an ethash snapshot.
// make dependent on difficulty incrment divisor?
2017-08-22 11:24:56 +02:00
const SNAPSHOT_BLOCKS: u64 = 5000;
/// Maximum number of blocks allowed in an ethash snapshot.
const MAX_SNAPSHOT_BLOCKS: u64 = 30000;
/// Ethash specific seal
#[derive(Debug, PartialEq)]
pub struct Seal {
/// Ethash seal mix_hash
pub mix_hash: H256,
/// Ethash seal nonce
pub nonce: H64,
}
impl Seal {
/// Tries to parse rlp as ethash seal.
pub fn parse_seal<T: AsRef<[u8]>>(seal: &[T]) -> Result<Self, Error> {
if seal.len() != 2 {
return Err(BlockError::InvalidSealArity(Mismatch {
expected: 2,
found: seal.len(),
})
.into());
}
2020-08-05 06:08:03 +02:00
let mix_hash = Rlp::new(seal[0].as_ref()).as_val::<H256>()?;
let nonce = Rlp::new(seal[1].as_ref()).as_val::<H64>()?;
let seal = Seal { mix_hash, nonce };
2020-08-05 06:08:03 +02:00
Ok(seal)
}
}
/// Ethash params.
#[derive(Debug, PartialEq)]
pub struct EthashParams {
/// Minimum difficulty.
pub minimum_difficulty: U256,
/// Difficulty bound divisor.
pub difficulty_bound_divisor: U256,
/// Difficulty increment divisor.
pub difficulty_increment_divisor: u64,
/// Metropolis difficulty increment divisor.
pub metropolis_difficulty_increment_divisor: u64,
/// Block duration.
pub duration_limit: u64,
/// Homestead transition block number.
pub homestead_transition: u64,
/// Transition block for a change of difficulty params (currently just bound_divisor).
pub difficulty_hardfork_transition: u64,
/// Difficulty param after the difficulty transition.
pub difficulty_hardfork_bound_divisor: U256,
/// Block on which there is no additional difficulty from the exponential bomb.
pub bomb_defuse_transition: u64,
/// Number of first block where EIP-100 rules begin.
pub eip100b_transition: u64,
/// Total block number for one ECIP-1017 era.
pub ecip1017_era_rounds: u64,
/// Block reward in base units.
pub block_reward: BTreeMap<BlockNumber, U256>,
/// EXPIP-2 block height
pub expip2_transition: u64,
/// EXPIP-2 duration limit
pub expip2_duration_limit: u64,
/// Block reward contract transition block.
pub block_reward_contract_transition: u64,
/// Block reward contract.
pub block_reward_contract: Option<BlockRewardContract>,
/// Difficulty bomb delays.
pub difficulty_bomb_delays: BTreeMap<BlockNumber, BlockNumber>,
ethash: implement Progpow (#9762) * ethash: initial implementation of progpow * progpow: use wrapping arithmetic * progpow: cleanup comments * progpow: fix keccak_f800 * progpow: reorder definitions * progpow: general fixing * progpow: add basic tests from geth * progpow: generate c_dag and add test * progpow: fix progpow_init and progpow_loop * progpow: fix and add new test * progpow: tabify * progpow: add shared testvectors from geth and aleth * progpow: add benchmarks * progpow: don't read bytes from dag * ethash: use criterion for progpow benchmarks * progpow: dont borrow hash on fnv1a_hash * progpow: don't borrow operand on progpow merge * progpow: hardcode dag lookup function we only support light verification anyway * progpow: read double words directly from the dag * progpow: inline some small functions * progpow: remove some bounds checking from the main loop * progpow: remove unreachable match cases * progpow: remove bounds check in keccak_f800_round * progpow: fix ptr::swap * progpow: force loop unroll in keccak_f800_round * progpow: remove unnecessary branching in progpow_loop * progpow: force loop unroll in fill_mix * progpow: silence unused warning * progpow: dont run last keccak_f800_round out of the loop rustc generates the same assembly, it unrolls the loop * progpow: fix output of keccak_f800_short * ethcore: support progpow in ethash engine * ethash: fix typo * ethcore, ethash: fix tests * json: fix ethash spec tests * ethash: update quick_get_difficulty for progpow * ethash: drop light cache on progpow transition block * ethash: fix quick_get_difficulty tests * progpow: update to spec v0.9.0 * progpow: update to spec v0.9.1 * progpow: update to spec v0.9.2 * ethash: rename progpow benchmarks * fix Cargo.lock bad merge * ethash: only export modules for benchmarks * ethash: progpow: remove unsafe unchecked indexing * ethash: create enum for pow algorithm * ethash: box the progpow cdag * ethash: skip slow progpow test vectors on ci * ethash: don't skip progpow test vectors they don't take too long when running in release mode which is the case for CI. * ethash: progpow: update copyright date Co-Authored-By: andresilva <andre.beat@gmail.com> * ethcore: remove verification of ci-skip-tests on non-test builds
2019-02-20 10:05:11 +01:00
/// Block to transition to progpow
pub progpow_transition: u64,
}
impl From<ethjson::spec::EthashParams> for EthashParams {
fn from(p: ethjson::spec::EthashParams) -> Self {
EthashParams {
minimum_difficulty: p.minimum_difficulty.into(),
difficulty_bound_divisor: p.difficulty_bound_divisor.into(),
difficulty_increment_divisor: p.difficulty_increment_divisor.map_or(10, Into::into),
metropolis_difficulty_increment_divisor: p
.metropolis_difficulty_increment_divisor
.map_or(9, Into::into),
duration_limit: p.duration_limit.map_or(0, Into::into),
homestead_transition: p.homestead_transition.map_or(0, Into::into),
difficulty_hardfork_transition: p
.difficulty_hardfork_transition
.map_or(u64::max_value(), Into::into),
difficulty_hardfork_bound_divisor: p
.difficulty_hardfork_bound_divisor
.map_or(p.difficulty_bound_divisor.into(), Into::into),
bomb_defuse_transition: p
.bomb_defuse_transition
.map_or(u64::max_value(), Into::into),
eip100b_transition: p.eip100b_transition.map_or(u64::max_value(), Into::into),
ecip1017_era_rounds: p.ecip1017_era_rounds.map_or(u64::max_value(), Into::into),
block_reward: p.block_reward.map_or_else(
|| {
let mut ret = BTreeMap::new();
ret.insert(0, U256::zero());
ret
},
|reward| match reward {
ethjson::spec::BlockReward::Single(reward) => {
let mut ret = BTreeMap::new();
ret.insert(0, reward.into());
ret
}
ethjson::spec::BlockReward::Multi(multi) => multi
.into_iter()
.map(|(block, reward)| (block.into(), reward.into()))
.collect(),
},
),
expip2_transition: p.expip2_transition.map_or(u64::max_value(), Into::into),
expip2_duration_limit: p.expip2_duration_limit.map_or(30, Into::into),
ethash: implement Progpow (#9762) * ethash: initial implementation of progpow * progpow: use wrapping arithmetic * progpow: cleanup comments * progpow: fix keccak_f800 * progpow: reorder definitions * progpow: general fixing * progpow: add basic tests from geth * progpow: generate c_dag and add test * progpow: fix progpow_init and progpow_loop * progpow: fix and add new test * progpow: tabify * progpow: add shared testvectors from geth and aleth * progpow: add benchmarks * progpow: don't read bytes from dag * ethash: use criterion for progpow benchmarks * progpow: dont borrow hash on fnv1a_hash * progpow: don't borrow operand on progpow merge * progpow: hardcode dag lookup function we only support light verification anyway * progpow: read double words directly from the dag * progpow: inline some small functions * progpow: remove some bounds checking from the main loop * progpow: remove unreachable match cases * progpow: remove bounds check in keccak_f800_round * progpow: fix ptr::swap * progpow: force loop unroll in keccak_f800_round * progpow: remove unnecessary branching in progpow_loop * progpow: force loop unroll in fill_mix * progpow: silence unused warning * progpow: dont run last keccak_f800_round out of the loop rustc generates the same assembly, it unrolls the loop * progpow: fix output of keccak_f800_short * ethcore: support progpow in ethash engine * ethash: fix typo * ethcore, ethash: fix tests * json: fix ethash spec tests * ethash: update quick_get_difficulty for progpow * ethash: drop light cache on progpow transition block * ethash: fix quick_get_difficulty tests * progpow: update to spec v0.9.0 * progpow: update to spec v0.9.1 * progpow: update to spec v0.9.2 * ethash: rename progpow benchmarks * fix Cargo.lock bad merge * ethash: only export modules for benchmarks * ethash: progpow: remove unsafe unchecked indexing * ethash: create enum for pow algorithm * ethash: box the progpow cdag * ethash: skip slow progpow test vectors on ci * ethash: don't skip progpow test vectors they don't take too long when running in release mode which is the case for CI. * ethash: progpow: update copyright date Co-Authored-By: andresilva <andre.beat@gmail.com> * ethcore: remove verification of ci-skip-tests on non-test builds
2019-02-20 10:05:11 +01:00
progpow_transition: p.progpow_transition.map_or(u64::max_value(), Into::into),
block_reward_contract_transition: p
.block_reward_contract_transition
.map_or(0, Into::into),
block_reward_contract: match (
p.block_reward_contract_code,
p.block_reward_contract_address,
) {
(Some(code), _) => Some(BlockRewardContract::new_from_code(Arc::new(code.into()))),
(_, Some(address)) => Some(BlockRewardContract::new_from_address(address.into())),
(None, None) => None,
},
difficulty_bomb_delays: p
.difficulty_bomb_delays
.unwrap_or_default()
.into_iter()
.map(|(block, delay)| (block.into(), delay.into()))
.collect(),
}
}
}
2016-01-08 12:15:59 +01:00
/// Engine using Ethash proof-of-work consensus algorithm, suitable for Ethereum
/// mainnet chains in the Olympic, Frontier and Homestead eras.
pub struct Ethash {
ethash_params: EthashParams,
2016-01-17 12:00:34 +01:00
pow: EthashManager,
machine: EthereumMachine,
2016-01-08 12:15:59 +01:00
}
impl Ethash {
/// Create a new instance of Ethash engine
pub fn new<T: Into<Option<OptimizeFor>>>(
cache_dir: &Path,
ethash_params: EthashParams,
machine: EthereumMachine,
optimize_for: T,
) -> Arc<Self> {
ethash: implement Progpow (#9762) * ethash: initial implementation of progpow * progpow: use wrapping arithmetic * progpow: cleanup comments * progpow: fix keccak_f800 * progpow: reorder definitions * progpow: general fixing * progpow: add basic tests from geth * progpow: generate c_dag and add test * progpow: fix progpow_init and progpow_loop * progpow: fix and add new test * progpow: tabify * progpow: add shared testvectors from geth and aleth * progpow: add benchmarks * progpow: don't read bytes from dag * ethash: use criterion for progpow benchmarks * progpow: dont borrow hash on fnv1a_hash * progpow: don't borrow operand on progpow merge * progpow: hardcode dag lookup function we only support light verification anyway * progpow: read double words directly from the dag * progpow: inline some small functions * progpow: remove some bounds checking from the main loop * progpow: remove unreachable match cases * progpow: remove bounds check in keccak_f800_round * progpow: fix ptr::swap * progpow: force loop unroll in keccak_f800_round * progpow: remove unnecessary branching in progpow_loop * progpow: force loop unroll in fill_mix * progpow: silence unused warning * progpow: dont run last keccak_f800_round out of the loop rustc generates the same assembly, it unrolls the loop * progpow: fix output of keccak_f800_short * ethcore: support progpow in ethash engine * ethash: fix typo * ethcore, ethash: fix tests * json: fix ethash spec tests * ethash: update quick_get_difficulty for progpow * ethash: drop light cache on progpow transition block * ethash: fix quick_get_difficulty tests * progpow: update to spec v0.9.0 * progpow: update to spec v0.9.1 * progpow: update to spec v0.9.2 * ethash: rename progpow benchmarks * fix Cargo.lock bad merge * ethash: only export modules for benchmarks * ethash: progpow: remove unsafe unchecked indexing * ethash: create enum for pow algorithm * ethash: box the progpow cdag * ethash: skip slow progpow test vectors on ci * ethash: don't skip progpow test vectors they don't take too long when running in release mode which is the case for CI. * ethash: progpow: update copyright date Co-Authored-By: andresilva <andre.beat@gmail.com> * ethcore: remove verification of ci-skip-tests on non-test builds
2019-02-20 10:05:11 +01:00
let progpow_transition = ethash_params.progpow_transition;
2020-08-05 06:08:03 +02:00
Arc::new(Ethash {
ethash_params,
machine,
ethash: implement Progpow (#9762) * ethash: initial implementation of progpow * progpow: use wrapping arithmetic * progpow: cleanup comments * progpow: fix keccak_f800 * progpow: reorder definitions * progpow: general fixing * progpow: add basic tests from geth * progpow: generate c_dag and add test * progpow: fix progpow_init and progpow_loop * progpow: fix and add new test * progpow: tabify * progpow: add shared testvectors from geth and aleth * progpow: add benchmarks * progpow: don't read bytes from dag * ethash: use criterion for progpow benchmarks * progpow: dont borrow hash on fnv1a_hash * progpow: don't borrow operand on progpow merge * progpow: hardcode dag lookup function we only support light verification anyway * progpow: read double words directly from the dag * progpow: inline some small functions * progpow: remove some bounds checking from the main loop * progpow: remove unreachable match cases * progpow: remove bounds check in keccak_f800_round * progpow: fix ptr::swap * progpow: force loop unroll in keccak_f800_round * progpow: remove unnecessary branching in progpow_loop * progpow: force loop unroll in fill_mix * progpow: silence unused warning * progpow: dont run last keccak_f800_round out of the loop rustc generates the same assembly, it unrolls the loop * progpow: fix output of keccak_f800_short * ethcore: support progpow in ethash engine * ethash: fix typo * ethcore, ethash: fix tests * json: fix ethash spec tests * ethash: update quick_get_difficulty for progpow * ethash: drop light cache on progpow transition block * ethash: fix quick_get_difficulty tests * progpow: update to spec v0.9.0 * progpow: update to spec v0.9.1 * progpow: update to spec v0.9.2 * ethash: rename progpow benchmarks * fix Cargo.lock bad merge * ethash: only export modules for benchmarks * ethash: progpow: remove unsafe unchecked indexing * ethash: create enum for pow algorithm * ethash: box the progpow cdag * ethash: skip slow progpow test vectors on ci * ethash: don't skip progpow test vectors they don't take too long when running in release mode which is the case for CI. * ethash: progpow: update copyright date Co-Authored-By: andresilva <andre.beat@gmail.com> * ethcore: remove verification of ci-skip-tests on non-test builds
2019-02-20 10:05:11 +01:00
pow: EthashManager::new(cache_dir.as_ref(), optimize_for.into(), progpow_transition),
})
}
}
2017-04-18 14:19:10 +02:00
// TODO [rphmeier]
//
// for now, this is different than Ethash's own epochs, and signal
// "consensus epochs".
// in this sense, `Ethash` is epochless: the same `EpochVerifier` can be used
// for any block in the chain.
// in the future, we might move the Ethash epoch
// caching onto this mechanism as well.
impl engines::EpochVerifier<EthereumMachine> for Arc<Ethash> {
fn verify_light(&self, _header: &Header) -> Result<(), Error> {
Ok(())
}
fn verify_heavy(&self, header: &Header) -> Result<(), Error> {
self.verify_block_unordered(header)
2016-02-08 21:07:14 +01:00
}
2016-01-08 12:15:59 +01:00
}
impl Engine<EthereumMachine> for Arc<Ethash> {
2016-01-08 12:15:59 +01:00
fn name(&self) -> &str {
"Ethash"
}
fn machine(&self) -> &EthereumMachine {
&self.machine
2020-08-05 06:08:03 +02:00
}
// Two fields - nonce and mix.
Aura: Broadcast empty step messages instead of creating empty blocks (#7605) * aura: broadcast empty step message instead of sealing empty block * aura: add empty_step messages to seal * aura: include parent_hash in empty step message * aura: verify received empty step messages * aura: verify empty step messages in block * aura: fix dead lock on empty_steps * aura: fix EmptyStep Encodable * aura: take number of empty steps into account in chain score * aura: use empty step signers for finality * aura: add empty "empty step" messages to seal when reading from spec * aura: fix EmptyStep rlp encoding * aura: use Vec<u8> instead of Bytes * aura: fix block empty step verification * Update .gitlab-ci.yml fix lint * aura: fix accumulation of empty step signatures for finality * aura: include empty steps in seal signature * aura: configurable max number of empty steps * engine: pass block header to seal_fields method This is necessary to make the number of seal fields dynamic, e.g. activating a transition on a certain block number that changes the seal. * aura: add transition to enable empty step messages * aura: clear old empty step messages on verify_block_external * aura: ignore empty step messages from the future * aura: report skipped primaries when empty steps are not enabled * aura: fix tests * aura: report misbehavior * aura: add tests for rolling finality with multiple signatures * engine: fix validator set test In this test the block validation wasn't failing because the block was in the future (expected failure) but was instead failing because the author of the block isn't the expected authority. Since we added reporting of blocks produced by the wrong authority this test started failing. * aura: reward all the authors of empty step messages * aura: fix reward attribution for new blocks * aura: add tests for empty steps broadcasting and inclusion in blocks * aura: reduce size of empty step messages in seal * aura: add test for empty step inclusion in blocks * aura: add test for rewarding of empty steps * aura: add test for empty steps validation * aura: fix rlp encoding of sealed empty step * aura: fix grumbles
2018-02-15 01:39:29 +01:00
fn seal_fields(&self, _header: &Header) -> usize {
2
}
2020-08-05 06:08:03 +02:00
/// Additional engine-specific information for the user/developer concerning `header`.
fn extra_info(&self, header: &Header) -> BTreeMap<String, String> {
match Seal::parse_seal(header.seal()) {
Ok(seal) => map![
"nonce".to_owned() => format!("0x{:x}", seal.nonce),
"mixHash".to_owned() => format!("0x{:x}", seal.mix_hash)
],
_ => BTreeMap::default(),
}
}
2020-08-05 06:08:03 +02:00
fn maximum_uncle_count(&self, _block: BlockNumber) -> usize {
2
}
2020-08-05 06:08:03 +02:00
fn maximum_gas_limit(&self) -> Option<U256> {
Some(0x7fff_ffff_ffff_ffffu64.into())
2020-08-05 06:08:03 +02:00
}
fn populate_from_parent(&self, header: &mut Header, parent: &Header) {
let difficulty = self.calculate_difficulty(header, parent);
header.set_difficulty(difficulty);
}
2020-08-05 06:08:03 +02:00
2016-01-08 19:12:19 +01:00
/// Apply the block reward on finalisation of the block.
/// This assumes that all uncles are valid uncles (i.e. of at least one generation before the current).
fn on_close_block(&self, block: &mut ExecutedBlock) -> Result<(), Error> {
use std::ops::Shr;
2020-08-05 06:08:03 +02:00
let author = *block.header.author();
let number = block.header.number();
2020-08-05 06:08:03 +02:00
let rewards = match self.ethash_params.block_reward_contract {
Some(ref c) if number >= self.ethash_params.block_reward_contract_transition => {
let mut beneficiaries = Vec::new();
2020-08-05 06:08:03 +02:00
beneficiaries.push((author, RewardKind::Author));
for u in &block.uncles {
let uncle_author = u.author();
beneficiaries.push((*uncle_author, RewardKind::uncle(number, u.number())));
}
2020-08-05 06:08:03 +02:00
let mut call = engines::default_system_or_code_call(&self.machine, block);
2020-08-05 06:08:03 +02:00
let rewards = c.reward(&beneficiaries, &mut call)?;
rewards
.into_iter()
.map(|(author, amount)| (author, RewardKind::External, amount))
.collect()
}
_ => {
let mut rewards = Vec::new();
2020-08-05 06:08:03 +02:00
let (_, reward) = self.ethash_params.block_reward.iter()
.rev()
.find(|&(block, _)| *block <= number)
.expect("Current block's reward is not found; this indicates a chain config error; qed");
let reward = *reward;
2020-08-05 06:08:03 +02:00
// Applies ECIP-1017 eras.
let eras_rounds = self.ethash_params.ecip1017_era_rounds;
let (eras, reward) = ecip1017_eras_block_reward(eras_rounds, reward, number);
2020-08-05 06:08:03 +02:00
//let n_uncles = LiveBlock::uncles(&*block).len();
let n_uncles = block.uncles.len();
2020-08-05 06:08:03 +02:00
// Bestow block rewards.
2020-07-29 11:00:04 +02:00
let result_block_reward = reward + reward.shr(5) * U256::from(n_uncles);
2020-08-05 06:08:03 +02:00
rewards.push((author, RewardKind::Author, result_block_reward));
2020-08-05 06:08:03 +02:00
// Bestow uncle rewards.
for u in &block.uncles {
let uncle_author = u.author();
let result_uncle_reward = if eras == 0 {
(reward * U256::from(8 + u.number() - number)).shr(3)
} else {
reward.shr(5)
};
2020-08-05 06:08:03 +02:00
rewards.push((
*uncle_author,
RewardKind::uncle(number, u.number()),
result_uncle_reward,
));
}
2020-08-05 06:08:03 +02:00
rewards
}
};
2020-08-05 06:08:03 +02:00
block_reward::apply_block_rewards(&rewards, block, &self.machine)
}
2020-08-05 06:08:03 +02:00
#[cfg(not(feature = "miner-debug"))]
fn verify_local_seal(&self, header: &Header) -> Result<(), Error> {
self.verify_block_basic(header)
.and_then(|_| self.verify_block_unordered(header))
2016-01-08 19:12:19 +01:00
}
2020-08-05 06:08:03 +02:00
#[cfg(feature = "miner-debug")]
fn verify_local_seal(&self, _header: &Header) -> Result<(), Error> {
warn!("Skipping seal verification, running in miner testing mode.");
Ok(())
}
2020-08-05 06:08:03 +02:00
fn verify_block_basic(&self, header: &Header) -> Result<(), Error> {
2016-01-26 18:02:49 +01:00
// check the seal fields.
let seal = Seal::parse_seal(header.seal())?;
2020-08-05 06:08:03 +02:00
2016-02-03 12:18:12 +01:00
// TODO: consider removing these lines.
let min_difficulty = self.ethash_params.minimum_difficulty;
if header.difficulty() < &min_difficulty {
return Err(From::from(BlockError::DifficultyOutOfBounds(OutOfBounds {
min: Some(min_difficulty),
max: None,
found: header.difficulty().clone(),
})));
}
2020-08-05 06:08:03 +02:00
let difficulty = ethash::boundary_to_difficulty(&H256(quick_get_difficulty(
2016-11-05 10:39:15 +01:00
&header.bare_hash().0,
seal.nonce.low_u64(),
ethash: implement Progpow (#9762) * ethash: initial implementation of progpow * progpow: use wrapping arithmetic * progpow: cleanup comments * progpow: fix keccak_f800 * progpow: reorder definitions * progpow: general fixing * progpow: add basic tests from geth * progpow: generate c_dag and add test * progpow: fix progpow_init and progpow_loop * progpow: fix and add new test * progpow: tabify * progpow: add shared testvectors from geth and aleth * progpow: add benchmarks * progpow: don't read bytes from dag * ethash: use criterion for progpow benchmarks * progpow: dont borrow hash on fnv1a_hash * progpow: don't borrow operand on progpow merge * progpow: hardcode dag lookup function we only support light verification anyway * progpow: read double words directly from the dag * progpow: inline some small functions * progpow: remove some bounds checking from the main loop * progpow: remove unreachable match cases * progpow: remove bounds check in keccak_f800_round * progpow: fix ptr::swap * progpow: force loop unroll in keccak_f800_round * progpow: remove unnecessary branching in progpow_loop * progpow: force loop unroll in fill_mix * progpow: silence unused warning * progpow: dont run last keccak_f800_round out of the loop rustc generates the same assembly, it unrolls the loop * progpow: fix output of keccak_f800_short * ethcore: support progpow in ethash engine * ethash: fix typo * ethcore, ethash: fix tests * json: fix ethash spec tests * ethash: update quick_get_difficulty for progpow * ethash: drop light cache on progpow transition block * ethash: fix quick_get_difficulty tests * progpow: update to spec v0.9.0 * progpow: update to spec v0.9.1 * progpow: update to spec v0.9.2 * ethash: rename progpow benchmarks * fix Cargo.lock bad merge * ethash: only export modules for benchmarks * ethash: progpow: remove unsafe unchecked indexing * ethash: create enum for pow algorithm * ethash: box the progpow cdag * ethash: skip slow progpow test vectors on ci * ethash: don't skip progpow test vectors they don't take too long when running in release mode which is the case for CI. * ethash: progpow: update copyright date Co-Authored-By: andresilva <andre.beat@gmail.com> * ethcore: remove verification of ci-skip-tests on non-test builds
2019-02-20 10:05:11 +01:00
&seal.mix_hash.0,
header.number() >= self.ethash_params.progpow_transition,
2016-03-02 00:34:38 +01:00
)));
2020-08-05 06:08:03 +02:00
if &difficulty < header.difficulty() {
return Err(From::from(BlockError::InvalidProofOfWork(OutOfBounds {
min: Some(header.difficulty().clone()),
max: None,
found: difficulty,
})));
2016-01-17 12:00:34 +01:00
}
2020-08-05 06:08:03 +02:00
2016-01-09 19:10:05 +01:00
Ok(())
}
2020-08-05 06:08:03 +02:00
fn verify_block_unordered(&self, header: &Header) -> Result<(), Error> {
let seal = Seal::parse_seal(header.seal())?;
2020-08-05 06:08:03 +02:00
let result = self.pow.compute_light(
header.number() as u64,
&header.bare_hash().0,
seal.nonce.low_u64(),
);
2016-11-05 10:39:15 +01:00
let mix = H256(result.mix_hash);
let difficulty = ethash::boundary_to_difficulty(&H256(result.value));
trace!(target: "miner", "num: {num}, seed: {seed}, h: {h}, non: {non}, mix: {mix}, res: {res}",
num = header.number() as u64,
seed = H256(slow_hash_block_number(header.number() as u64)),
h = header.bare_hash(),
non = seal.nonce.low_u64(),
mix = H256(result.mix_hash),
res = H256(result.value));
if mix != seal.mix_hash {
return Err(From::from(BlockError::MismatchedH256SealElement(
Mismatch {
expected: mix,
found: seal.mix_hash,
},
)));
2016-01-17 12:00:34 +01:00
}
if &difficulty < header.difficulty() {
return Err(From::from(BlockError::InvalidProofOfWork(OutOfBounds {
min: Some(header.difficulty().clone()),
max: None,
found: difficulty,
})));
2016-01-17 12:00:34 +01:00
}
Ok(())
}
2020-08-05 06:08:03 +02:00
fn verify_block_family(&self, header: &Header, parent: &Header) -> Result<(), Error> {
// we should not calculate difficulty for genesis blocks
if header.number() == 0 {
return Err(From::from(BlockError::RidiculousNumber(OutOfBounds {
min: Some(1),
max: None,
found: header.number(),
})));
}
2020-08-05 06:08:03 +02:00
// Check difficulty is correct given the two timestamps.
let expected_difficulty = self.calculate_difficulty(header, parent);
if header.difficulty() != &expected_difficulty {
return Err(From::from(BlockError::InvalidDifficulty(Mismatch {
expected: expected_difficulty,
found: header.difficulty().clone(),
})));
}
2020-08-05 06:08:03 +02:00
2016-01-16 18:30:27 +01:00
Ok(())
}
2020-08-05 06:08:03 +02:00
fn epoch_verifier<'a>(
&self,
_header: &Header,
_proof: &'a [u8],
) -> engines::ConstructedVerifier<'a, EthereumMachine> {
engines::ConstructedVerifier::Trusted(Box::new(self.clone()))
}
2020-08-05 06:08:03 +02:00
2020-07-29 10:36:15 +02:00
fn snapshot_components(&self) -> Option<Box<dyn crate::snapshot::SnapshotComponents>> {
2017-08-22 11:24:56 +02:00
Some(Box::new(::snapshot::PowSnapshot::new(
SNAPSHOT_BLOCKS,
MAX_SNAPSHOT_BLOCKS,
)))
2017-04-19 20:31:53 +02:00
}
2020-08-05 06:08:03 +02:00
Fork choice and metadata framework for Engine (#8401) * Add light client TODO item * Move existing total-difficulty-based fork choice check to Engine * Abstract total difficulty and block provider as Machine::BlockMetadata and Machine::BlockProvider * Decouple "generate_metadata" logic to Engine * Use fixed BlockMetadata and BlockProvider type for null and instantseal In this way they can use total difficulty fork choice check * Extend blockdetails with metadatas and finalized info * Extra data update: mark_finalized and update_metadatas * Check finalized block in Blockchain * Fix a test constructor in verification mod * Add total difficulty trait * Fix type import * Db migration to V13 with metadata column * Address grumbles * metadatas -> metadata * Use generic type for update_metadata to avoid passing HashMap all around * Remove metadata in blockdetails * [WIP] Implement a generic metadata architecture * [WIP] Metadata insertion logic in BlockChain * typo: Value -> Self::Value * [WIP] Temporarily remove Engine::is_new_best interface So that we don't have too many type errors. * [WIP] Fix more type errors * [WIP] ExtendedHeader::PartialEq * [WIP] Change metadata type Option<Vec<u8>> to Vec<u8> * [WIP] Remove Metadata Error * [WIP] Clean up error conversion * [WIP] finalized -> is_finalized * [WIP] Mark all fields in ExtrasInsert as pub * [WIP] Remove unused import * [WIP] Keep only local metadata info * Mark metadata as optional * [WIP] Revert metadata db change in BlockChain * [WIP] Put finalization in unclosed state * Use metadata interface in BlockDetail * [WIP] Fix current build failures * [WIP] Remove unused blockmetadata struct * Remove DB migration info * [WIP] Typo * Use ExtendedHeader to implement fork choice check * Implement is_new_best using Ancestry iterator * Use expect instead of panic * [WIP] Add ancestry Engine support via on_new_block * Fix tests * Emission of ancestry actions * use_short_version should take account of metadata * Engine::is_new_best -> Engine::fork_choice * Use proper expect format as defined in #1026 * panic -> expect * ancestry_header -> ancestry_with_metadata * Boxed iterator -> &mut iterator * Fix tests * is_new_best -> primitive_fork_choice * Document how fork_choice works * Engine::fork_choice -> Engine::primitive_fork_choice * comment: clarify types of finalization where Engine::primitive_fork_choice works * Expose FinalizationInfo to Engine * Fix tests due to merging * Remove TotalDifficulty trait * Do not pass FinalizationInfo to Engine If there's finalized blocks in from route, choose the old branch without calling `Engine::fork_choice`. * Fix compile * Fix unused import * Remove is_to_route_finalized When no block reorg passes a finalized block, this variable is always false. * Address format grumbles * Fix docs: mark_finalized returns None if block hash is not found `blockchain` mod does not yet have an Error type, so we still temporarily use None here. * Fix inaccurate tree_route None expect description
2018-05-16 08:58:01 +02:00
fn fork_choice(&self, new: &ExtendedHeader, current: &ExtendedHeader) -> engines::ForkChoice {
engines::total_difficulty_fork_choice(new, current)
}
}
2016-01-09 19:10:05 +01:00
impl Ethash {
fn calculate_difficulty(&self, header: &Header, parent: &Header) -> U256 {
const EXP_DIFF_PERIOD: u64 = 100_000;
if header.number() == 0 {
2016-01-09 19:10:05 +01:00
panic!("Can't calculate genesis block difficulty");
}
2020-08-05 06:08:03 +02:00
let parent_has_uncles = parent.uncles_hash() != &KECCAK_EMPTY_LIST_RLP;
2020-08-05 06:08:03 +02:00
let min_difficulty = self.ethash_params.minimum_difficulty;
2020-08-05 06:08:03 +02:00
let difficulty_hardfork =
header.number() >= self.ethash_params.difficulty_hardfork_transition;
2017-07-03 16:49:06 +02:00
let difficulty_bound_divisor = if difficulty_hardfork {
self.ethash_params.difficulty_hardfork_bound_divisor
} else {
self.ethash_params.difficulty_bound_divisor
};
2020-08-05 06:08:03 +02:00
let expip2_hardfork = header.number() >= self.ethash_params.expip2_transition;
let duration_limit = if expip2_hardfork {
self.ethash_params.expip2_duration_limit
} else {
self.ethash_params.duration_limit
};
2020-08-05 06:08:03 +02:00
let frontier_limit = self.ethash_params.homestead_transition;
2020-08-05 06:08:03 +02:00
let mut target = if header.number() < frontier_limit {
if header.timestamp() >= parent.timestamp() + duration_limit {
*parent.difficulty() - (*parent.difficulty() / difficulty_bound_divisor)
2016-06-23 14:29:16 +02:00
} else {
*parent.difficulty() + (*parent.difficulty() / difficulty_bound_divisor)
2016-01-09 19:10:05 +01:00
}
} else {
trace!(target: "ethash", "Calculating difficulty parent.difficulty={}, header.timestamp={}, parent.timestamp={}", parent.difficulty(), header.timestamp(), parent.timestamp());
2016-01-28 20:34:06 +01:00
//block_diff = parent_diff + parent_diff // 2048 * max(1 - (block_timestamp - parent_timestamp) // 10, -99)
let (increment_divisor, threshold) =
if header.number() < self.ethash_params.eip100b_transition {
(self.ethash_params.difficulty_increment_divisor, 1)
} else if parent_has_uncles {
2020-08-05 06:08:03 +02:00
(
self.ethash_params.metropolis_difficulty_increment_divisor,
2,
)
2020-08-05 06:08:03 +02:00
} else {
(
self.ethash_params.metropolis_difficulty_increment_divisor,
1,
)
};
2020-08-05 06:08:03 +02:00
let diff_inc = (header.timestamp() - parent.timestamp()) / increment_divisor;
if diff_inc <= threshold {
*parent.difficulty()
+ *parent.difficulty() / difficulty_bound_divisor
* U256::from(threshold - diff_inc)
2016-01-28 20:46:33 +01:00
} else {
let multiplier: U256 = cmp::min(diff_inc - threshold, 99).into();
2017-07-03 16:49:06 +02:00
parent
.difficulty()
.saturating_sub(*parent.difficulty() / difficulty_bound_divisor * multiplier)
2016-01-09 19:10:05 +01:00
}
};
2017-07-29 17:12:07 +02:00
target = cmp::max(min_difficulty, target);
if header.number() < self.ethash_params.bomb_defuse_transition {
let mut number = header.number();
let original_number = number;
for (block, delay) in &self.ethash_params.difficulty_bomb_delays {
if original_number >= *block {
number = number.saturating_sub(*delay);
}
}
let period = (number / EXP_DIFF_PERIOD) as usize;
if period > 1 {
target = cmp::max(min_difficulty, target + (U256::from(1) << (period - 2)));
2016-01-09 19:10:05 +01:00
}
2020-08-05 06:08:03 +02:00
}
2016-01-09 19:10:05 +01:00
target
}
2016-01-17 12:00:34 +01:00
}
fn ecip1017_eras_block_reward(era_rounds: u64, mut reward: U256, block_number: u64) -> (u64, U256) {
let eras = if block_number != 0 && block_number % era_rounds == 0 {
block_number / era_rounds - 1
} else {
block_number / era_rounds
};
let mut divi = U256::from(1);
for _ in 0..eras {
reward = reward * U256::from(4);
divi = divi * U256::from(5);
}
reward = reward / divi;
(eras, reward)
2016-01-08 12:15:59 +01:00
}
2016-01-08 22:04:21 +01:00
2016-02-08 21:07:14 +01:00
#[cfg(test)]
mod tests {
use super::{
super::{new_homestead_test_machine, new_mcip3_test, new_morden},
ecip1017_eras_block_reward, Ethash, EthashParams,
2020-08-05 06:08:03 +02:00
};
2016-02-08 21:07:14 +01:00
use block::*;
use engines::Engine;
use error::{BlockError, Error, ErrorKind};
use ethereum_types::{Address, H256, H64, U256};
2016-09-01 14:29:59 +02:00
use rlp;
use spec::Spec;
use std::{collections::BTreeMap, str::FromStr, sync::Arc};
use tempdir::TempDir;
Private transactions integration pr (#6422) * Private transaction message added * Empty line removed * Private transactions logic removed from client into the separate module * Fixed compilation after merge with head * Signed private transaction message added as well * Comments after the review fixed * Private tx execution * Test update * Renamed some methods * Fixed some tests * Reverted submodules * Fixed build * Private transaction message added * Empty line removed * Private transactions logic removed from client into the separate module * Fixed compilation after merge with head * Signed private transaction message added as well * Comments after the review fixed * Encrypted private transaction message and signed reply added * Private tx execution * Test update * Main scenario completed * Merged with the latest head * Private transactions API * Comments after review fixed * Parameters for private transactions added to parity arguments * New files added * New API methods added * Do not process packets from unconfirmed peers * Merge with ptm_ss branch * Encryption and permissioning with key server added * Fixed compilation after merge * Version of Parity protocol incremented in order to support private transactions * Doc strings for constants added * Proper format for doc string added * fixed some encryptor.rs grumbles * Private transactions functionality moved to the separate crate * Refactoring in order to remove late initialisation * Tests fixed after moving to the separate crate * Fetch method removed * Sync test helpers refactored * Interaction with encryptor refactored * Contract address retrieving via substate removed * Sensible gas limit for private transactions implemented * New private contract with nonces added * Parsing of the response from key server fixed * Build fixed after the merge, native contracts removed * Crate renamed * Tests moved to the separate directory * Handling of errors reworked in order to use error chain * Encodable macro added, new constructor replaced with default * Native ethabi usage removed * Couple conversions optimized * Interactions with client reworked * Errors omitting removed * Fix after merge * Fix after the merge * private transactions improvements in progress * private_transactions -> ethcore/private-tx * making private transactions more idiomatic * private-tx encryptor uses shared FetchClient and is more idiomatic * removed redundant tests, moved integration tests to tests/ dir * fixed failing service test * reenable add_notify on private tx provider * removed private_tx tests from sync module * removed commented out code * Use plain password instead of unlocking account manager * remove dead code * Link to the contract changed * Transaction signature chain replay protection module created * Redundant type conversion removed * Contract address returned by private provider * Test fixed * Addressing grumbles in PrivateTransactions (#8249) * Tiny fixes part 1. * A bunch of additional comments and todos. * Fix ethsync tests. * resolved merge conflicts * final private tx pr (#8318) * added cli option that enables private transactions * fixed failing test * fixed failing test * fixed failing test * fixed failing test
2018-04-09 16:14:33 +02:00
use test_helpers::get_temp_state_db;
use types::header::Header;
2020-08-05 06:08:03 +02:00
fn test_spec() -> Spec {
let tempdir = TempDir::new("").unwrap();
new_morden(&tempdir.path())
}
2020-08-05 06:08:03 +02:00
2018-03-12 18:05:52 +01:00
fn get_default_ethash_params() -> EthashParams {
EthashParams {
minimum_difficulty: U256::from(131072),
difficulty_bound_divisor: U256::from(2048),
difficulty_increment_divisor: 10,
metropolis_difficulty_increment_divisor: 9,
homestead_transition: 1150000,
duration_limit: 13,
block_reward: {
let mut ret = BTreeMap::new();
ret.insert(0, 0.into());
ret
},
2018-03-12 18:05:52 +01:00
difficulty_hardfork_transition: u64::max_value(),
difficulty_hardfork_bound_divisor: U256::from(0),
bomb_defuse_transition: u64::max_value(),
eip100b_transition: u64::max_value(),
ecip1017_era_rounds: u64::max_value(),
expip2_transition: u64::max_value(),
expip2_duration_limit: 30,
block_reward_contract: None,
block_reward_contract_transition: 0,
difficulty_bomb_delays: BTreeMap::new(),
progpow_transition: u64::max_value(),
2020-08-05 06:08:03 +02:00
}
2018-03-12 18:05:52 +01:00
}
2020-08-05 06:08:03 +02:00
#[test]
2016-02-08 21:07:14 +01:00
fn on_close_block() {
let spec = test_spec();
let engine = &*spec.engine;
2016-02-08 21:07:14 +01:00
let genesis_header = spec.genesis_header();
let db = spec
.ensure_db_good(get_temp_state_db(), &Default::default())
.unwrap();
let last_hashes = Arc::new(vec![genesis_header.hash()]);
2017-04-06 19:26:17 +02:00
let b = OpenBlock::new(
2020-08-05 06:08:03 +02:00
engine,
2017-04-06 19:26:17 +02:00
Default::default(),
false,
db,
&genesis_header,
last_hashes,
Address::zero(),
(3141562.into(), 31415620.into()),
vec![],
false,
None,
2020-08-05 06:08:03 +02:00
)
.unwrap();
let b = b.close().unwrap();
assert_eq!(
b.state.balance(&Address::zero()).unwrap(),
U256::from_str("4563918244f40000").unwrap()
);
2016-02-08 21:07:14 +01:00
}
2020-08-05 06:08:03 +02:00
#[test]
fn has_valid_ecip1017_eras_block_reward() {
let eras_rounds = 5000000;
2020-08-05 06:08:03 +02:00
let start_reward: U256 = "4563918244F40000".parse().unwrap();
2020-08-05 06:08:03 +02:00
let block_number = 0;
let (eras, reward) = ecip1017_eras_block_reward(eras_rounds, start_reward, block_number);
assert_eq!(0, eras);
assert_eq!(U256::from_str("4563918244F40000").unwrap(), reward);
2020-08-05 06:08:03 +02:00
let block_number = 5000000;
let (eras, reward) = ecip1017_eras_block_reward(eras_rounds, start_reward, block_number);
assert_eq!(0, eras);
assert_eq!(U256::from_str("4563918244F40000").unwrap(), reward);
2020-08-05 06:08:03 +02:00
let block_number = 10000000;
let (eras, reward) = ecip1017_eras_block_reward(eras_rounds, start_reward, block_number);
assert_eq!(1, eras);
assert_eq!(U256::from_str("3782DACE9D900000").unwrap(), reward);
2020-08-05 06:08:03 +02:00
let block_number = 20000000;
let (eras, reward) = ecip1017_eras_block_reward(eras_rounds, start_reward, block_number);
assert_eq!(3, eras);
assert_eq!(U256::from_str("2386F26FC1000000").unwrap(), reward);
2020-08-05 06:08:03 +02:00
let block_number = 80000000;
let (eras, reward) = ecip1017_eras_block_reward(eras_rounds, start_reward, block_number);
assert_eq!(15, eras);
assert_eq!(U256::from_str("271000000000000").unwrap(), reward);
2020-08-05 06:08:03 +02:00
let block_number = 250000000;
let (eras, reward) = ecip1017_eras_block_reward(eras_rounds, start_reward, block_number);
assert_eq!(49, eras);
assert_eq!(U256::from_str("51212FFBAF0A").unwrap(), reward);
}
2020-08-05 06:08:03 +02:00
2016-02-08 21:07:14 +01:00
#[test]
fn on_close_block_with_uncle() {
let spec = test_spec();
let engine = &*spec.engine;
let genesis_header = spec.genesis_header();
let db = spec
2017-04-06 19:26:17 +02:00
.ensure_db_good(get_temp_state_db(), &Default::default())
.unwrap();
let last_hashes = Arc::new(vec![genesis_header.hash()]);
let mut b = OpenBlock::new(
engine,
Default::default(),
false,
db,
&genesis_header,
last_hashes,
Address::zero(),
(3141562.into(), 31415620.into()),
vec![],
false,
None,
2020-08-05 06:08:03 +02:00
)
.unwrap();
2016-02-08 21:07:14 +01:00
let mut uncle = Header::new();
2016-08-08 11:18:48 +02:00
let uncle_author: Address = "ef2d6d194084c2de36e0dabfce45d046b37d1106".into();
uncle.set_author(uncle_author);
2016-02-08 21:07:14 +01:00
b.push_uncle(uncle).unwrap();
2020-08-05 06:08:03 +02:00
let b = b.close().unwrap();
assert_eq!(
b.state.balance(&Address::zero()).unwrap(),
"478eae0e571ba000".into()
);
assert_eq!(
b.state.balance(&uncle_author).unwrap(),
"3cb71f51fc558000".into()
2020-08-05 06:08:03 +02:00
);
2016-02-08 21:07:14 +01:00
}
2020-08-05 06:08:03 +02:00
#[test]
fn has_valid_mcip3_era_block_rewards() {
let spec = new_mcip3_test();
let engine = &*spec.engine;
let genesis_header = spec.genesis_header();
let db = spec
.ensure_db_good(get_temp_state_db(), &Default::default())
.unwrap();
let last_hashes = Arc::new(vec![genesis_header.hash()]);
let b = OpenBlock::new(
engine,
Default::default(),
false,
db,
&genesis_header,
last_hashes,
Address::zero(),
(3141562.into(), 31415620.into()),
vec![],
false,
None,
2020-08-05 06:08:03 +02:00
)
.unwrap();
let b = b.close().unwrap();
2020-08-05 06:08:03 +02:00
let ubi_contract: Address = "00efdd5883ec628983e9063c7d969fe268bbf310".into();
let dev_contract: Address = "00756cf8159095948496617f5fb17ed95059f536".into();
assert_eq!(
b.state.balance(&Address::zero()).unwrap(),
U256::from_str("d8d726b7177a80000").unwrap()
2016-02-08 21:07:14 +01:00
);
assert_eq!(
b.state.balance(&ubi_contract).unwrap(),
U256::from_str("2b5e3af16b1880000").unwrap()
2020-08-05 06:08:03 +02:00
);
assert_eq!(
b.state.balance(&dev_contract).unwrap(),
U256::from_str("c249fdd327780000").unwrap()
2020-08-05 06:08:03 +02:00
);
}
2016-02-08 21:07:14 +01:00
#[test]
fn has_valid_metadata() {
let engine = test_spec().engine;
2016-02-08 21:07:14 +01:00
assert!(!engine.name().is_empty());
}
2020-08-05 06:08:03 +02:00
2016-02-08 21:07:14 +01:00
#[test]
2016-02-08 21:43:53 +01:00
fn can_return_schedule() {
let engine = test_spec().engine;
let schedule = engine.schedule(10000000);
2016-02-09 12:58:32 +01:00
assert!(schedule.stack_limit > 0);
2020-08-05 06:08:03 +02:00
2016-02-09 12:58:32 +01:00
let schedule = engine.schedule(100);
assert!(!schedule.have_delegate_call);
2016-02-08 21:43:53 +01:00
}
2020-08-05 06:08:03 +02:00
2016-02-08 21:43:53 +01:00
#[test]
fn can_do_seal_verification_fail() {
let engine = test_spec().engine;
2016-02-08 21:43:53 +01:00
let header: Header = Header::default();
2020-08-05 06:08:03 +02:00
let verify_result = engine.verify_block_basic(&header);
2020-08-05 06:08:03 +02:00
2016-02-08 21:43:53 +01:00
match verify_result {
Err(Error(ErrorKind::Block(BlockError::InvalidSealArity(_)), _)) => {}
2016-02-09 12:58:32 +01:00
Err(_) => {
panic!(
"should be block seal-arity mismatch error (got {:?})",
verify_result
);
}
_ => {
panic!("Should be error, got Ok");
2016-02-08 21:43:53 +01:00
}
2020-08-05 06:08:03 +02:00
}
2016-02-08 21:07:14 +01:00
}
2020-08-05 06:08:03 +02:00
#[test]
fn can_do_difficulty_verification_fail() {
let engine = test_spec().engine;
let mut header: Header = Header::default();
header.set_seal(vec![rlp::encode(&H256::zero()), rlp::encode(&H64::zero())]);
2020-08-05 06:08:03 +02:00
let verify_result = engine.verify_block_basic(&header);
2020-08-05 06:08:03 +02:00
match verify_result {
Err(Error(ErrorKind::Block(BlockError::DifficultyOutOfBounds(_)), _)) => {}
2016-02-09 12:58:32 +01:00
Err(_) => {
panic!("should be block difficulty error (got {:?})", verify_result);
}
_ => {
panic!("Should be error, got Ok");
2020-08-05 06:08:03 +02:00
}
2016-02-09 12:58:32 +01:00
}
}
2020-08-05 06:08:03 +02:00
2016-02-09 12:23:35 +01:00
#[test]
fn can_do_proof_of_work_verification_fail() {
let engine = test_spec().engine;
let mut header: Header = Header::default();
header.set_seal(vec![rlp::encode(&H256::zero()), rlp::encode(&H64::zero())]);
header.set_difficulty(
2016-02-09 12:58:32 +01:00
U256::from_str("ffffffffffffffffffffffffffffffffffffffffffffaaaaaaaaaaaaaaaaaaaa")
.unwrap(),
2020-08-05 06:08:03 +02:00
);
let verify_result = engine.verify_block_basic(&header);
2020-08-05 06:08:03 +02:00
2016-02-09 12:23:35 +01:00
match verify_result {
Err(Error(ErrorKind::Block(BlockError::InvalidProofOfWork(_)), _)) => {}
2016-02-09 12:58:32 +01:00
Err(_) => {
panic!(
"should be invalid proof of work error (got {:?})",
verify_result
);
}
_ => {
panic!("Should be error, got Ok");
2016-02-09 12:23:35 +01:00
}
2020-08-05 06:08:03 +02:00
}
}
#[test]
fn can_do_seal_unordered_verification_fail() {
let engine = test_spec().engine;
let header = Header::default();
2020-08-05 06:08:03 +02:00
let verify_result = engine.verify_block_unordered(&header);
2020-08-05 06:08:03 +02:00
2016-02-09 12:23:35 +01:00
match verify_result {
Err(Error(ErrorKind::Block(BlockError::InvalidSealArity(_)), _)) => {}
Err(_) => {
2020-08-05 06:08:03 +02:00
panic!(
"should be block seal-arity mismatch error (got {:?})",
2016-02-09 12:23:35 +01:00
verify_result
2020-08-05 06:08:03 +02:00
);
}
_ => {
panic!("Should be error, got Ok");
}
2020-08-05 06:08:03 +02:00
}
}
2016-02-09 12:23:35 +01:00
#[test]
fn can_do_seal_unordered_verification_fail2() {
let engine = test_spec().engine;
2016-02-09 12:23:35 +01:00
let mut header = Header::default();
header.set_seal(vec![vec![], vec![]]);
2020-08-05 06:08:03 +02:00
let verify_result = engine.verify_block_unordered(&header);
2016-02-09 12:58:32 +01:00
// rlp error, shouldn't panic
assert!(verify_result.is_err());
}
2020-08-05 06:08:03 +02:00
2016-02-09 12:58:32 +01:00
#[test]
fn can_do_seal256_verification_fail() {
let engine = test_spec().engine;
2016-02-09 12:58:32 +01:00
let mut header: Header = Header::default();
header.set_seal(vec![rlp::encode(&H256::zero()), rlp::encode(&H64::zero())]);
let verify_result = engine.verify_block_unordered(&header);
2020-08-05 06:08:03 +02:00
2016-02-09 12:58:32 +01:00
match verify_result {
Err(Error(ErrorKind::Block(BlockError::MismatchedH256SealElement(_)), _)) => {}
2016-02-09 12:58:32 +01:00
Err(_) => {
panic!(
"should be invalid 256-bit seal fail (got {:?})",
verify_result
);
}
_ => {
panic!("Should be error, got Ok");
}
2020-08-05 06:08:03 +02:00
}
}
#[test]
fn can_do_proof_of_work_unordered_verification_fail() {
let engine = test_spec().engine;
let mut header: Header = Header::default();
header.set_seal(vec![
rlp::encode(&H256::from(
"b251bd2e0283d0658f2cadfdc8ca619b5de94eca5742725e2e757dd13ed7503d",
2020-08-05 06:08:03 +02:00
)),
rlp::encode(&H64::zero()),
]);
header.set_difficulty(
U256::from_str("ffffffffffffffffffffffffffffffffffffffffffffaaaaaaaaaaaaaaaaaaaa")
.unwrap(),
2020-08-05 06:08:03 +02:00
);
let verify_result = engine.verify_block_unordered(&header);
2020-08-05 06:08:03 +02:00
match verify_result {
Err(Error(ErrorKind::Block(BlockError::InvalidProofOfWork(_)), _)) => {}
Err(_) => {
panic!(
"should be invalid proof-of-work fail (got {:?})",
verify_result
);
}
_ => {
panic!("Should be error, got Ok");
2020-08-05 06:08:03 +02:00
}
}
}
#[test]
fn can_verify_block_family_genesis_fail() {
let engine = test_spec().engine;
let header: Header = Header::default();
let parent_header: Header = Header::default();
2020-08-05 06:08:03 +02:00
let verify_result = engine.verify_block_family(&header, &parent_header);
2020-08-05 06:08:03 +02:00
match verify_result {
Err(Error(ErrorKind::Block(BlockError::RidiculousNumber(_)), _)) => {}
Err(_) => {
panic!(
"should be invalid block number fail (got {:?})",
verify_result
);
}
_ => {
panic!("Should be error, got Ok");
2020-08-05 06:08:03 +02:00
}
}
}
#[test]
fn can_verify_block_family_difficulty_fail() {
let engine = test_spec().engine;
let mut header: Header = Header::default();
header.set_number(2);
let mut parent_header: Header = Header::default();
parent_header.set_number(1);
2020-08-05 06:08:03 +02:00
let verify_result = engine.verify_block_family(&header, &parent_header);
2020-08-05 06:08:03 +02:00
match verify_result {
Err(Error(ErrorKind::Block(BlockError::InvalidDifficulty(_)), _)) => {}
Err(_) => {
2020-08-05 06:08:03 +02:00
panic!(
"should be invalid difficulty fail (got {:?})",
verify_result
);
2020-08-05 06:08:03 +02:00
}
_ => {
panic!("Should be error, got Ok");
2020-08-05 06:08:03 +02:00
}
}
}
#[test]
fn difficulty_frontier() {
let machine = new_homestead_test_machine();
let ethparams = get_default_ethash_params();
let tempdir = TempDir::new("").unwrap();
let ethash = Ethash::new(tempdir.path(), ethparams, machine, None);
2020-08-05 06:08:03 +02:00
let mut parent_header = Header::default();
parent_header.set_number(1000000);
parent_header.set_difficulty(U256::from_str("b69de81a22b").unwrap());
parent_header.set_timestamp(1455404053);
let mut header = Header::default();
header.set_number(parent_header.number() + 1);
header.set_timestamp(1455404058);
2020-08-05 06:08:03 +02:00
let difficulty = ethash.calculate_difficulty(&header, &parent_header);
assert_eq!(U256::from_str("b6b4bbd735f").unwrap(), difficulty);
}
2020-08-05 06:08:03 +02:00
#[test]
fn difficulty_homestead() {
let machine = new_homestead_test_machine();
let ethparams = get_default_ethash_params();
let tempdir = TempDir::new("").unwrap();
let ethash = Ethash::new(tempdir.path(), ethparams, machine, None);
2020-08-05 06:08:03 +02:00
let mut parent_header = Header::default();
parent_header.set_number(1500000);
parent_header.set_difficulty(U256::from_str("1fd0fd70792b").unwrap());
parent_header.set_timestamp(1463003133);
let mut header = Header::default();
header.set_number(parent_header.number() + 1);
header.set_timestamp(1463003177);
2020-08-05 06:08:03 +02:00
let difficulty = ethash.calculate_difficulty(&header, &parent_header);
assert_eq!(U256::from_str("1fc50f118efe").unwrap(), difficulty);
2020-08-05 06:08:03 +02:00
}
#[test]
fn difficulty_max_timestamp() {
let machine = new_homestead_test_machine();
let ethparams = get_default_ethash_params();
let tempdir = TempDir::new("").unwrap();
let ethash = Ethash::new(tempdir.path(), ethparams, machine, None);
2020-08-05 06:08:03 +02:00
let mut parent_header = Header::default();
parent_header.set_number(1000000);
parent_header.set_difficulty(U256::from_str("b69de81a22b").unwrap());
parent_header.set_timestamp(1455404053);
let mut header = Header::default();
header.set_number(parent_header.number() + 1);
header.set_timestamp(u64::max_value());
2020-08-05 06:08:03 +02:00
let difficulty = ethash.calculate_difficulty(&header, &parent_header);
assert_eq!(U256::from(12543204905719u64), difficulty);
}
2020-08-05 06:08:03 +02:00
#[test]
fn test_extra_info() {
let machine = new_homestead_test_machine();
let ethparams = get_default_ethash_params();
let tempdir = TempDir::new("").unwrap();
let ethash = Ethash::new(tempdir.path(), ethparams, machine, None);
let mut header = Header::default();
header.set_seal(vec![
rlp::encode(&H256::from(
"b251bd2e0283d0658f2cadfdc8ca619b5de94eca5742725e2e757dd13ed7503d",
)),
rlp::encode(&H64::zero()),
]);
let info = ethash.extra_info(&header);
assert_eq!(info["nonce"], "0x0000000000000000");
assert_eq!(
info["mixHash"],
"0xb251bd2e0283d0658f2cadfdc8ca619b5de94eca5742725e2e757dd13ed7503d"
);
}
}