2016-09-08 12:12:24 +02:00
// Copyright 2015, 2016 Ethcore (UK) Ltd.
// This file is part of Parity.
// Parity is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
// Parity is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// You should have received a copy of the GNU General Public License
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
2016-11-02 18:42:56 +01:00
//! A blockchain engine that supports a non-instant BFT proof-of-authority.
2016-09-08 12:12:24 +02:00
2016-11-14 14:35:45 +01:00
use std ::sync ::atomic ::{ AtomicUsize , AtomicBool , Ordering as AtomicOrdering } ;
2016-09-08 12:12:24 +02:00
use std ::sync ::Weak ;
2016-10-15 14:55:10 +02:00
use std ::time ::{ UNIX_EPOCH , Duration } ;
2016-10-26 18:50:04 +02:00
use util ::* ;
2016-11-02 18:42:56 +01:00
use ethkey ::{ verify_address , Signature } ;
2016-12-05 18:08:16 +01:00
use rlp ::{ UntrustedRlp , View , encode } ;
2016-09-08 12:12:24 +02:00
use account_provider ::AccountProvider ;
use block ::* ;
use spec ::CommonParams ;
use engines ::Engine ;
2016-10-26 18:50:04 +02:00
use header ::Header ;
use error ::{ Error , BlockError } ;
2016-12-05 18:08:16 +01:00
use blockchain ::extras ::BlockDetails ;
use views ::HeaderView ;
2016-09-08 12:12:24 +02:00
use evm ::Schedule ;
use ethjson ;
2016-09-27 12:12:18 +02:00
use io ::{ IoContext , IoHandler , TimerToken , IoService , IoChannel } ;
use service ::ClientIoMessage ;
2016-10-26 18:50:04 +02:00
use transaction ::SignedTransaction ;
use env_info ::EnvInfo ;
use builtin ::Builtin ;
2016-09-08 12:12:24 +02:00
/// `AuthorityRound` params.
#[ derive(Debug, PartialEq) ]
pub struct AuthorityRoundParams {
/// Gas limit divisor.
pub gas_limit_bound_divisor : U256 ,
/// Time to wait before next block or authority switching.
2016-10-15 14:55:10 +02:00
pub step_duration : Duration ,
2016-09-08 12:12:24 +02:00
/// Valid authorities.
pub authorities : Vec < Address > ,
/// Number of authorities.
pub authority_n : usize ,
}
impl From < ethjson ::spec ::AuthorityRoundParams > for AuthorityRoundParams {
fn from ( p : ethjson ::spec ::AuthorityRoundParams ) -> Self {
AuthorityRoundParams {
gas_limit_bound_divisor : p . gas_limit_bound_divisor . into ( ) ,
2016-10-15 14:55:10 +02:00
step_duration : Duration ::from_secs ( p . step_duration . into ( ) ) ,
2016-09-08 12:12:24 +02:00
authority_n : p . authorities . len ( ) ,
authorities : p . authorities . into_iter ( ) . map ( Into ::into ) . collect ::< Vec < _ > > ( ) ,
}
}
}
/// Engine using `AuthorityRound` proof-of-work consensus algorithm, suitable for Ethereum
/// mainnet chains in the Olympic, Frontier and Homestead eras.
pub struct AuthorityRound {
params : CommonParams ,
our_params : AuthorityRoundParams ,
builtins : BTreeMap < Address , Builtin > ,
2016-11-15 14:02:46 +01:00
transition_service : IoService < BlockArrived > ,
2016-09-27 12:12:18 +02:00
message_channel : Mutex < Option < IoChannel < ClientIoMessage > > > ,
2016-11-14 14:35:45 +01:00
step : AtomicUsize ,
proposed : AtomicBool ,
2016-12-05 18:08:16 +01:00
account_provider : Mutex < Option < Arc < AccountProvider > > > ,
2016-10-15 14:55:10 +02:00
}
2016-11-14 18:42:56 +01:00
fn header_step ( header : & Header ) -> Result < usize , ::rlp ::DecoderError > {
UntrustedRlp ::new ( & header . seal ( ) [ 0 ] ) . as_val ( )
2016-11-02 18:42:56 +01:00
}
2016-11-14 18:42:56 +01:00
fn header_signature ( header : & Header ) -> Result < Signature , ::rlp ::DecoderError > {
2016-11-15 14:02:46 +01:00
UntrustedRlp ::new ( & header . seal ( ) [ 1 ] ) . as_val ::< H520 > ( ) . map ( Into ::into )
2016-11-14 16:56:19 +01:00
}
2016-11-02 18:42:56 +01:00
2016-10-15 14:55:10 +02:00
trait AsMillis {
fn as_millis ( & self ) -> u64 ;
}
impl AsMillis for Duration {
fn as_millis ( & self ) -> u64 {
self . as_secs ( ) * 1_000 + ( self . subsec_nanos ( ) / 1_000_000 ) as u64
}
2016-09-08 12:12:24 +02:00
}
impl AuthorityRound {
2016-10-15 14:55:10 +02:00
/// Create a new instance of AuthorityRound engine.
2016-11-14 18:42:56 +01:00
pub fn new ( params : CommonParams , our_params : AuthorityRoundParams , builtins : BTreeMap < Address , Builtin > ) -> Result < Arc < Self > , Error > {
2016-10-15 14:55:10 +02:00
let initial_step = ( unix_now ( ) . as_secs ( ) / our_params . step_duration . as_secs ( ) ) as usize ;
2016-09-08 12:12:24 +02:00
let engine = Arc ::new (
AuthorityRound {
params : params ,
our_params : our_params ,
builtins : builtins ,
2016-11-15 14:02:46 +01:00
transition_service : try ! ( IoService ::< BlockArrived > ::start ( ) ) ,
2016-09-27 12:12:18 +02:00
message_channel : Mutex ::new ( None ) ,
2016-10-15 14:55:10 +02:00
step : AtomicUsize ::new ( initial_step ) ,
2016-12-05 18:08:16 +01:00
proposed : AtomicBool ::new ( false ) ,
account_provider : Mutex ::new ( None ) ,
2016-09-08 12:12:24 +02:00
} ) ;
let handler = TransitionHandler { engine : Arc ::downgrade ( & engine ) } ;
2016-11-15 14:02:46 +01:00
try ! ( engine . transition_service . register_handler ( Arc ::new ( handler ) ) ) ;
2016-11-14 18:42:56 +01:00
Ok ( engine )
2016-09-08 12:12:24 +02:00
}
2016-09-19 18:00:39 +02:00
fn step ( & self ) -> usize {
self . step . load ( AtomicOrdering ::SeqCst )
}
2016-11-02 13:13:47 +01:00
fn remaining_step_duration ( & self ) -> Duration {
2016-11-14 15:15:31 +01:00
let now = unix_now ( ) ;
let step_end = self . our_params . step_duration * ( self . step ( ) as u32 + 1 ) ;
if step_end > now {
step_end - now
} else {
Duration ::from_secs ( 0 )
}
2016-10-15 14:55:10 +02:00
}
2016-09-19 18:00:39 +02:00
fn step_proposer ( & self , step : usize ) -> & Address {
2016-11-28 13:20:49 +01:00
let p = & self . our_params ;
2016-11-14 16:56:19 +01:00
p . authorities . get ( step % p . authority_n ) . expect ( " There are authority_n authorities; taking number modulo authority_n gives number in authority_n range; qed " )
2016-09-08 12:12:24 +02:00
}
2016-09-19 18:00:39 +02:00
fn is_step_proposer ( & self , step : usize , address : & Address ) -> bool {
self . step_proposer ( step ) = = address
2016-09-08 12:12:24 +02:00
}
}
2016-10-15 14:55:10 +02:00
fn unix_now ( ) -> Duration {
UNIX_EPOCH . elapsed ( ) . expect ( " Valid time has to be set in your system. " )
}
2016-09-08 12:12:24 +02:00
struct TransitionHandler {
engine : Weak < AuthorityRound > ,
}
#[ derive(Clone) ]
struct BlockArrived ;
2016-11-01 19:12:06 +01:00
const ENGINE_TIMEOUT_TOKEN : TimerToken = 23 ;
2016-09-08 12:12:24 +02:00
impl IoHandler < BlockArrived > for TransitionHandler {
fn initialize ( & self , io : & IoContext < BlockArrived > ) {
if let Some ( engine ) = self . engine . upgrade ( ) {
2016-11-14 18:42:56 +01:00
io . register_timer_once ( ENGINE_TIMEOUT_TOKEN , engine . remaining_step_duration ( ) . as_millis ( ) )
. unwrap_or_else ( | e | warn! ( target : " poa " , " Failed to start consensus step timer: {}. " , e ) )
2016-09-08 12:12:24 +02:00
}
}
fn timeout ( & self , io : & IoContext < BlockArrived > , timer : TimerToken ) {
if timer = = ENGINE_TIMEOUT_TOKEN {
if let Some ( engine ) = self . engine . upgrade ( ) {
2016-09-19 18:00:39 +02:00
engine . step . fetch_add ( 1 , AtomicOrdering ::SeqCst ) ;
2016-11-14 14:35:45 +01:00
engine . proposed . store ( false , AtomicOrdering ::SeqCst ) ;
2016-11-14 18:42:56 +01:00
if let Some ( ref channel ) = * engine . message_channel . lock ( ) {
2016-09-27 16:50:16 +02:00
match channel . send ( ClientIoMessage ::UpdateSealing ) {
2016-11-01 19:12:06 +01:00
Ok ( _ ) = > trace! ( target : " poa " , " timeout: UpdateSealing message sent for step {}. " , engine . step . load ( AtomicOrdering ::Relaxed ) ) ,
Err ( err ) = > trace! ( target : " poa " , " timeout: Could not send a sealing message {} for step {}. " , err , engine . step . load ( AtomicOrdering ::Relaxed ) ) ,
2016-09-27 16:50:16 +02:00
}
2016-09-27 12:12:18 +02:00
}
2016-11-14 18:42:56 +01:00
io . register_timer_once ( ENGINE_TIMEOUT_TOKEN , engine . remaining_step_duration ( ) . as_millis ( ) )
. unwrap_or_else ( | e | warn! ( target : " poa " , " Failed to restart consensus step timer: {}. " , e ) )
2016-09-08 12:12:24 +02:00
}
}
}
}
impl Engine for AuthorityRound {
fn name ( & self ) -> & str { " AuthorityRound " }
fn version ( & self ) -> SemanticVersion { SemanticVersion ::new ( 1 , 0 , 0 ) }
2016-10-15 14:55:10 +02:00
/// Two fields - consensus step and the corresponding proposer signature.
2016-09-19 18:00:39 +02:00
fn seal_fields ( & self ) -> usize { 2 }
2016-09-08 12:12:24 +02:00
fn params ( & self ) -> & CommonParams { & self . params }
fn builtins ( & self ) -> & BTreeMap < Address , Builtin > { & self . builtins }
/// Additional engine-specific information for the user/developer concerning `header`.
2016-11-15 12:10:32 +01:00
fn extra_info ( & self , header : & Header ) -> BTreeMap < String , String > {
map! [
" step " . into ( ) = > header_step ( header ) . as_ref ( ) . map ( ToString ::to_string ) . unwrap_or ( " " . into ( ) ) ,
" signature " . into ( ) = > header_signature ( header ) . as_ref ( ) . map ( ToString ::to_string ) . unwrap_or ( " " . into ( ) )
]
}
2016-09-08 12:12:24 +02:00
fn schedule ( & self , _env_info : & EnvInfo ) -> Schedule {
2016-11-16 08:47:50 +01:00
Schedule ::new_post_eip150 ( usize ::max_value ( ) , true , true , true )
2016-09-08 12:12:24 +02:00
}
fn populate_from_parent ( & self , header : & mut Header , parent : & Header , gas_floor_target : U256 , _gas_ceil_target : U256 ) {
header . set_gas_limit ( {
let gas_limit = parent . gas_limit ( ) . clone ( ) ;
let bound_divisor = self . our_params . gas_limit_bound_divisor ;
if gas_limit < gas_floor_target {
min ( gas_floor_target , gas_limit + gas_limit / bound_divisor - 1. into ( ) )
} else {
max ( gas_floor_target , gas_limit - gas_limit / bound_divisor + 1. into ( ) )
}
} ) ;
}
2016-09-14 17:28:15 +02:00
fn is_sealer ( & self , author : & Address ) -> Option < bool > {
2016-11-28 13:20:49 +01:00
let p = & self . our_params ;
2016-09-19 14:33:11 +02:00
Some ( p . authorities . contains ( author ) )
2016-09-14 17:28:15 +02:00
}
2016-09-08 12:12:24 +02:00
/// Attempt to seal the block internally.
///
/// This operation is synchronous and may (quite reasonably) not be available, in which `false` will
/// be returned.
2016-12-05 18:08:16 +01:00
fn generate_seal ( & self , block : & ExecutedBlock ) -> Option < Vec < Bytes > > {
2016-11-14 14:35:45 +01:00
if self . proposed . load ( AtomicOrdering ::SeqCst ) { return None ; }
2016-09-08 16:27:54 +02:00
let header = block . header ( ) ;
2016-09-19 18:00:39 +02:00
let step = self . step ( ) ;
if self . is_step_proposer ( step , header . author ( ) ) {
2016-12-05 18:08:16 +01:00
if let Some ( ref ap ) = * self . account_provider . lock ( ) {
2016-09-08 16:27:54 +02:00
// Account should be permanently unlocked, otherwise sealing will fail.
2016-10-24 16:32:30 +02:00
if let Ok ( signature ) = ap . sign ( * header . author ( ) , None , header . bare_hash ( ) ) {
2016-11-02 18:42:56 +01:00
trace! ( target : " poa " , " generate_seal: Issuing a block for step {}. " , step ) ;
2016-11-14 14:35:45 +01:00
self . proposed . store ( true , AtomicOrdering ::SeqCst ) ;
2016-09-19 18:00:39 +02:00
return Some ( vec! [ encode ( & step ) . to_vec ( ) , encode ( & ( & * signature as & [ u8 ] ) ) . to_vec ( ) ] ) ;
2016-09-08 12:12:24 +02:00
} else {
2016-11-15 14:02:46 +01:00
warn! ( target : " poa " , " generate_seal: FAIL: Accounts secret key unavailable. " ) ;
2016-09-08 12:12:24 +02:00
}
} else {
2016-11-15 14:02:46 +01:00
warn! ( target : " poa " , " generate_seal: FAIL: Accounts not provided. " ) ;
2016-09-08 12:12:24 +02:00
}
}
None
}
/// Check the number of seal fields.
2016-09-08 16:27:54 +02:00
fn verify_block_basic ( & self , header : & Header , _block : Option < & [ u8 ] > ) -> Result < ( ) , Error > {
2016-09-08 12:12:24 +02:00
if header . seal ( ) . len ( ) ! = self . seal_fields ( ) {
2016-11-01 19:12:06 +01:00
trace! ( target : " poa " , " verify_block_basic: wrong number of seal fields " ) ;
2016-09-19 18:00:39 +02:00
Err ( From ::from ( BlockError ::InvalidSealArity (
2016-09-08 12:12:24 +02:00
Mismatch { expected : self . seal_fields ( ) , found : header . seal ( ) . len ( ) }
2016-09-19 18:00:39 +02:00
) ) )
} else {
Ok ( ( ) )
2016-09-08 12:12:24 +02:00
}
}
/// Check if the signature belongs to the correct proposer.
2016-09-08 16:27:54 +02:00
fn verify_block_unordered ( & self , header : & Header , _block : Option < & [ u8 ] > ) -> Result < ( ) , Error > {
2016-11-21 13:06:14 +01:00
let header_step = try ! ( header_step ( header ) ) ;
2016-11-21 13:07:43 +01:00
// Give one step slack if step is lagging, double vote is still not possible.
2016-11-02 18:42:56 +01:00
if header_step < = self . step ( ) + 1 {
2016-11-14 18:42:56 +01:00
let proposer_signature = try ! ( header_signature ( header ) ) ;
let ok_sig = try ! ( verify_address ( self . step_proposer ( header_step ) , & proposer_signature , & header . bare_hash ( ) ) ) ;
2016-09-19 18:00:39 +02:00
if ok_sig {
Ok ( ( ) )
} else {
2016-11-01 19:12:06 +01:00
trace! ( target : " poa " , " verify_block_unordered: invalid seal signature " ) ;
2016-09-19 18:00:39 +02:00
try ! ( Err ( BlockError ::InvalidSeal ) )
}
2016-09-08 12:12:24 +02:00
} else {
2016-11-01 19:12:06 +01:00
trace! ( target : " poa " , " verify_block_unordered: block from the future " ) ;
2016-09-08 12:12:24 +02:00
try ! ( Err ( BlockError ::InvalidSeal ) )
}
}
2016-09-08 16:27:54 +02:00
fn verify_block_family ( & self , header : & Header , parent : & Header , _block : Option < & [ u8 ] > ) -> Result < ( ) , Error > {
2016-09-08 12:12:24 +02:00
if header . number ( ) = = 0 {
return Err ( From ::from ( BlockError ::RidiculousNumber ( OutOfBounds { min : Some ( 1 ) , max : None , found : header . number ( ) } ) ) ) ;
}
2016-11-14 18:42:56 +01:00
let step = try ! ( header_step ( header ) ) ;
2016-11-01 19:12:06 +01:00
// Check if parent is from a previous step.
2016-11-28 13:20:49 +01:00
if step = = try ! ( header_step ( parent ) ) {
2016-11-14 14:35:45 +01:00
trace! ( target : " poa " , " Multiple blocks proposed for step {}. " , step ) ;
2016-11-01 19:12:06 +01:00
try ! ( Err ( BlockError ::DoubleVote ( header . author ( ) . clone ( ) ) ) ) ;
}
2016-09-08 12:12:24 +02:00
let gas_limit_divisor = self . our_params . gas_limit_bound_divisor ;
let min_gas = parent . gas_limit ( ) . clone ( ) - parent . gas_limit ( ) . clone ( ) / gas_limit_divisor ;
let max_gas = parent . gas_limit ( ) . clone ( ) + parent . gas_limit ( ) . clone ( ) / gas_limit_divisor ;
if header . gas_limit ( ) < = & min_gas | | header . gas_limit ( ) > = & max_gas {
return Err ( From ::from ( BlockError ::InvalidGasLimit ( OutOfBounds { min : Some ( min_gas ) , max : Some ( max_gas ) , found : header . gas_limit ( ) . clone ( ) } ) ) ) ;
}
Ok ( ( ) )
}
2016-09-08 16:27:54 +02:00
fn verify_transaction_basic ( & self , t : & SignedTransaction , _header : & Header ) -> Result < ( ) , Error > {
2016-09-08 12:12:24 +02:00
try ! ( t . check_low_s ( ) ) ;
Ok ( ( ) )
}
fn verify_transaction ( & self , t : & SignedTransaction , _header : & Header ) -> Result < ( ) , Error > {
t . sender ( ) . map ( | _ | ( ) ) // Perform EC recovery and cache sender
}
2016-09-27 12:12:18 +02:00
2016-12-05 18:08:16 +01:00
fn is_new_best_block ( & self , _best_total_difficulty : U256 , best_header : HeaderView , _parent_details : & BlockDetails , new_header : & HeaderView ) -> bool {
new_header . number ( ) > best_header . number ( )
}
2016-09-27 12:12:18 +02:00
fn register_message_channel ( & self , message_channel : IoChannel < ClientIoMessage > ) {
2016-12-05 18:08:16 +01:00
* self . message_channel . lock ( ) = Some ( message_channel ) ;
2016-09-27 12:12:18 +02:00
}
2016-12-05 16:20:32 +01:00
2016-12-05 18:08:16 +01:00
fn register_account_provider ( & self , account_provider : Arc < AccountProvider > ) {
* self . account_provider . lock ( ) = Some ( account_provider ) ;
2016-12-05 16:20:32 +01:00
}
2016-09-08 12:12:24 +02:00
}
#[ cfg(test) ]
mod tests {
2016-11-14 12:09:57 +01:00
use util ::* ;
2016-11-27 18:16:43 +01:00
use util ::trie ::TrieSpec ;
2016-11-14 12:09:57 +01:00
use env_info ::EnvInfo ;
use header ::Header ;
use error ::{ Error , BlockError } ;
2016-09-08 12:28:59 +02:00
use rlp ::encode ;
2016-09-08 12:12:24 +02:00
use block ::* ;
use tests ::helpers ::* ;
use account_provider ::AccountProvider ;
use spec ::Spec ;
2016-11-14 12:34:54 +01:00
use std ::time ::UNIX_EPOCH ;
2016-09-08 12:12:24 +02:00
#[ test ]
fn has_valid_metadata ( ) {
2016-09-14 11:20:22 +02:00
let engine = Spec ::new_test_round ( ) . engine ;
2016-09-08 12:12:24 +02:00
assert! ( ! engine . name ( ) . is_empty ( ) ) ;
assert! ( engine . version ( ) . major > = 1 ) ;
}
#[ test ]
fn can_return_schedule ( ) {
2016-09-14 11:20:22 +02:00
let engine = Spec ::new_test_round ( ) . engine ;
2016-09-08 12:12:24 +02:00
let schedule = engine . schedule ( & EnvInfo {
number : 10000000 ,
author : 0. into ( ) ,
timestamp : 0 ,
difficulty : 0. into ( ) ,
last_hashes : Arc ::new ( vec! [ ] ) ,
gas_used : 0. into ( ) ,
gas_limit : 0. into ( ) ,
} ) ;
assert! ( schedule . stack_limit > 0 ) ;
}
#[ test ]
2016-09-08 16:27:54 +02:00
fn verification_fails_on_short_seal ( ) {
2016-09-14 11:20:22 +02:00
let engine = Spec ::new_test_round ( ) . engine ;
2016-09-08 12:12:24 +02:00
let header : Header = Header ::default ( ) ;
let verify_result = engine . verify_block_basic ( & header , None ) ;
match verify_result {
Err ( Error ::Block ( BlockError ::InvalidSealArity ( _ ) ) ) = > { } ,
Err ( _ ) = > { panic! ( " should be block seal-arity mismatch error (got {:?} ) " , verify_result ) ; } ,
_ = > { panic! ( " Should be error, got Ok " ) ; } ,
}
}
#[ test ]
fn can_do_signature_verification_fail ( ) {
2016-09-14 11:20:22 +02:00
let engine = Spec ::new_test_round ( ) . engine ;
2016-09-08 12:12:24 +02:00
let mut header : Header = Header ::default ( ) ;
header . set_seal ( vec! [ encode ( & H520 ::default ( ) ) . to_vec ( ) ] ) ;
let verify_result = engine . verify_block_unordered ( & header , None ) ;
assert! ( verify_result . is_err ( ) ) ;
}
#[ test ]
2016-11-14 15:15:31 +01:00
fn generates_seal_and_does_not_double_propose ( ) {
2016-09-08 12:12:24 +02:00
let tap = AccountProvider ::transient_provider ( ) ;
2016-11-14 20:03:02 +01:00
let addr1 = tap . insert_account ( " 1 " . sha3 ( ) , " 1 " ) . unwrap ( ) ;
tap . unlock_account_permanently ( addr1 , " 1 " . into ( ) ) . unwrap ( ) ;
let addr2 = tap . insert_account ( " 2 " . sha3 ( ) , " 2 " ) . unwrap ( ) ;
tap . unlock_account_permanently ( addr2 , " 2 " . into ( ) ) . unwrap ( ) ;
2016-09-08 12:12:24 +02:00
2016-09-14 11:20:22 +02:00
let spec = Spec ::new_test_round ( ) ;
2016-09-08 12:12:24 +02:00
let engine = & * spec . engine ;
2016-12-05 18:08:16 +01:00
engine . register_account_provider ( Arc ::new ( tap ) ) ;
2016-09-08 12:12:24 +02:00
let genesis_header = spec . genesis_header ( ) ;
2016-11-14 20:03:02 +01:00
let mut db1 = get_temp_state_db ( ) . take ( ) ;
2016-11-27 18:16:43 +01:00
spec . ensure_db_good ( & mut db1 , & TrieFactory ::new ( TrieSpec ::Secure ) ) . unwrap ( ) ;
2016-11-14 20:03:02 +01:00
let mut db2 = get_temp_state_db ( ) . take ( ) ;
2016-11-27 18:16:43 +01:00
spec . ensure_db_good ( & mut db2 , & TrieFactory ::new ( TrieSpec ::Secure ) ) . unwrap ( ) ;
2016-09-08 12:12:24 +02:00
let last_hashes = Arc ::new ( vec! [ genesis_header . hash ( ) ] ) ;
2016-11-14 20:03:02 +01:00
let b1 = OpenBlock ::new ( engine , Default ::default ( ) , false , db1 , & genesis_header , last_hashes . clone ( ) , addr1 , ( 3141562. into ( ) , 31415620. into ( ) ) , vec! [ ] ) . unwrap ( ) ;
let b1 = b1 . close_and_lock ( ) ;
let b2 = OpenBlock ::new ( engine , Default ::default ( ) , false , db2 , & genesis_header , last_hashes , addr2 , ( 3141562. into ( ) , 31415620. into ( ) ) , vec! [ ] ) . unwrap ( ) ;
let b2 = b2 . close_and_lock ( ) ;
2016-12-05 18:08:16 +01:00
if let Some ( seal ) = engine . generate_seal ( b1 . block ( ) ) {
2016-11-14 20:03:02 +01:00
assert! ( b1 . clone ( ) . try_seal ( engine , seal ) . is_ok ( ) ) ;
// Second proposal is forbidden.
2016-12-05 18:08:16 +01:00
assert! ( engine . generate_seal ( b1 . block ( ) ) . is_none ( ) ) ;
2016-11-14 20:03:02 +01:00
}
2016-12-05 18:08:16 +01:00
if let Some ( seal ) = engine . generate_seal ( b2 . block ( ) ) {
2016-11-14 20:03:02 +01:00
assert! ( b2 . clone ( ) . try_seal ( engine , seal ) . is_ok ( ) ) ;
// Second proposal is forbidden.
2016-12-05 18:08:16 +01:00
assert! ( engine . generate_seal ( b2 . block ( ) ) . is_none ( ) ) ;
2016-11-14 20:03:02 +01:00
}
2016-09-08 12:12:24 +02:00
}
2016-09-08 16:27:54 +02:00
#[ test ]
fn proposer_switching ( ) {
let mut header : Header = Header ::default ( ) ;
let tap = AccountProvider ::transient_provider ( ) ;
let addr = tap . insert_account ( " 0 " . sha3 ( ) , " 0 " ) . unwrap ( ) ;
header . set_author ( addr ) ;
2016-09-19 18:00:39 +02:00
let engine = Spec ::new_test_round ( ) . engine ;
2016-09-08 16:27:54 +02:00
2016-11-14 12:34:54 +01:00
let signature = tap . sign ( addr , Some ( " 0 " . into ( ) ) , header . bare_hash ( ) ) . unwrap ( ) ;
2016-11-21 13:06:14 +01:00
let time = UNIX_EPOCH . elapsed ( ) . unwrap ( ) . as_secs ( ) ;
// Two authorities.
let mut step = time - time % 2 ;
2016-11-14 12:34:54 +01:00
header . set_seal ( vec! [ encode ( & step ) . to_vec ( ) , encode ( & ( & * signature as & [ u8 ] ) ) . to_vec ( ) ] ) ;
2016-11-21 13:06:14 +01:00
assert! ( engine . verify_block_seal ( & header ) . is_err ( ) ) ;
2016-11-14 12:34:54 +01:00
step = step + 1 ;
header . set_seal ( vec! [ encode ( & step ) . to_vec ( ) , encode ( & ( & * signature as & [ u8 ] ) ) . to_vec ( ) ] ) ;
2016-11-21 13:06:14 +01:00
assert! ( engine . verify_block_seal ( & header ) . is_ok ( ) ) ;
2016-09-08 16:27:54 +02:00
}
2016-09-08 12:12:24 +02:00
}