[beta] Backports (#6163)
* Light client improvements (#6156) * no seal checking * import command and --no-seal-check for light client * fix eth_call * tweak registry dapps lookup * ignore failed requests to non-server peers * Fix connecting to wildcard addresses. (#6167) * Don't display an overlay in case the time sync check fails. (#6164) * Small improvements to time estimation. * Temporarily disable NTP time check by default.
This commit is contained in:
parent
a554b81f32
commit
65e4bad3dd
@ -100,6 +100,10 @@ impl SimpleNtp {
|
|||||||
impl Ntp for SimpleNtp {
|
impl Ntp for SimpleNtp {
|
||||||
fn drift(&self) -> BoxFuture<Duration, Error> {
|
fn drift(&self) -> BoxFuture<Duration, Error> {
|
||||||
let address = self.address.clone();
|
let address = self.address.clone();
|
||||||
|
if &*address == "none" {
|
||||||
|
return futures::future::err(Error::Ntp("NTP server is not provided.".into())).boxed();
|
||||||
|
}
|
||||||
|
|
||||||
self.pool.spawn_fn(move || {
|
self.pool.spawn_fn(move || {
|
||||||
let packet = ntp::request(&*address)?;
|
let packet = ntp::request(&*address)?;
|
||||||
let dest_time = ::time::now_utc().to_timespec();
|
let dest_time = ::time::now_utc().to_timespec();
|
||||||
@ -114,7 +118,9 @@ impl Ntp for SimpleNtp {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
const MAX_RESULTS: usize = 4;
|
// NOTE In a positive scenario first results will be seen after:
|
||||||
|
// MAX_RESULTS * UPDATE_TIMEOUT_OK_SECS seconds.
|
||||||
|
const MAX_RESULTS: usize = 7;
|
||||||
const UPDATE_TIMEOUT_OK_SECS: u64 = 30;
|
const UPDATE_TIMEOUT_OK_SECS: u64 = 30;
|
||||||
const UPDATE_TIMEOUT_ERR_SECS: u64 = 2;
|
const UPDATE_TIMEOUT_ERR_SECS: u64 = 2;
|
||||||
|
|
||||||
@ -225,7 +231,7 @@ mod tests {
|
|||||||
|
|
||||||
fn time_checker() -> TimeChecker<FakeNtp> {
|
fn time_checker() -> TimeChecker<FakeNtp> {
|
||||||
let last_result = Arc::new(RwLock::new(
|
let last_result = Arc::new(RwLock::new(
|
||||||
(Instant::now(), vec![Err(Error::Ntp("NTP server unavailable.".into()))].into())
|
(Instant::now(), vec![Err(Error::Ntp("NTP server unavailable".into()))].into())
|
||||||
));
|
));
|
||||||
|
|
||||||
TimeChecker {
|
TimeChecker {
|
||||||
|
@ -58,6 +58,8 @@ pub struct Config {
|
|||||||
pub db_wal: bool,
|
pub db_wal: bool,
|
||||||
/// Should it do full verification of blocks?
|
/// Should it do full verification of blocks?
|
||||||
pub verify_full: bool,
|
pub verify_full: bool,
|
||||||
|
/// Should it check the seal of blocks?
|
||||||
|
pub check_seal: bool,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Default for Config {
|
impl Default for Config {
|
||||||
@ -69,6 +71,7 @@ impl Default for Config {
|
|||||||
db_compaction: CompactionProfile::default(),
|
db_compaction: CompactionProfile::default(),
|
||||||
db_wal: true,
|
db_wal: true,
|
||||||
verify_full: true,
|
verify_full: true,
|
||||||
|
check_seal: true,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -168,7 +171,7 @@ impl Client {
|
|||||||
let gh = ::rlp::encode(&spec.genesis_header());
|
let gh = ::rlp::encode(&spec.genesis_header());
|
||||||
|
|
||||||
Ok(Client {
|
Ok(Client {
|
||||||
queue: HeaderQueue::new(config.queue, spec.engine.clone(), io_channel, true),
|
queue: HeaderQueue::new(config.queue, spec.engine.clone(), io_channel, config.check_seal),
|
||||||
engine: spec.engine.clone(),
|
engine: spec.engine.clone(),
|
||||||
chain: HeaderChain::new(db.clone(), chain_col, &gh, cache)?,
|
chain: HeaderChain::new(db.clone(), chain_col, &gh, cache)?,
|
||||||
report: RwLock::new(ClientReport::default()),
|
report: RwLock::new(ClientReport::default()),
|
||||||
|
@ -54,13 +54,21 @@ struct Peer {
|
|||||||
}
|
}
|
||||||
|
|
||||||
impl Peer {
|
impl Peer {
|
||||||
// whether this peer can fulfill the
|
// whether this peer can fulfill the necessary capabilities for the given
|
||||||
fn can_fulfill(&self, c: &Capabilities) -> bool {
|
// request.
|
||||||
let caps = &self.capabilities;
|
fn can_fulfill(&self, request: &Capabilities) -> bool {
|
||||||
|
let local_caps = &self.capabilities;
|
||||||
|
let can_serve_since = |req, local| {
|
||||||
|
match (req, local) {
|
||||||
|
(Some(request_block), Some(serve_since)) => request_block >= serve_since,
|
||||||
|
(Some(_), None) => false,
|
||||||
|
(None, _) => true,
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
caps.serve_headers == c.serve_headers &&
|
local_caps.serve_headers >= request.serve_headers &&
|
||||||
caps.serve_chain_since >= c.serve_chain_since &&
|
can_serve_since(request.serve_chain_since, local_caps.serve_chain_since) &&
|
||||||
caps.serve_state_since >= c.serve_chain_since
|
can_serve_since(request.serve_state_since, local_caps.serve_state_since)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -244,7 +252,7 @@ impl OnDemand {
|
|||||||
peers: RwLock::new(HashMap::new()),
|
peers: RwLock::new(HashMap::new()),
|
||||||
in_transit: RwLock::new(HashMap::new()),
|
in_transit: RwLock::new(HashMap::new()),
|
||||||
cache: cache,
|
cache: cache,
|
||||||
no_immediate_dispatch: true,
|
no_immediate_dispatch: false,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -266,7 +274,6 @@ impl OnDemand {
|
|||||||
-> Result<Receiver<Vec<Response>>, basic_request::NoSuchOutput>
|
-> Result<Receiver<Vec<Response>>, basic_request::NoSuchOutput>
|
||||||
{
|
{
|
||||||
let (sender, receiver) = oneshot::channel();
|
let (sender, receiver) = oneshot::channel();
|
||||||
|
|
||||||
if requests.is_empty() {
|
if requests.is_empty() {
|
||||||
assert!(sender.send(Vec::new()).is_ok(), "receiver still in scope; qed");
|
assert!(sender.send(Vec::new()).is_ok(), "receiver still in scope; qed");
|
||||||
return Ok(receiver);
|
return Ok(receiver);
|
||||||
@ -335,6 +342,7 @@ impl OnDemand {
|
|||||||
// dispatch pending requests, and discard those for which the corresponding
|
// dispatch pending requests, and discard those for which the corresponding
|
||||||
// receiver has been dropped.
|
// receiver has been dropped.
|
||||||
fn dispatch_pending(&self, ctx: &BasicContext) {
|
fn dispatch_pending(&self, ctx: &BasicContext) {
|
||||||
|
|
||||||
// wrapper future for calling `poll_cancel` on our `Senders` to preserve
|
// wrapper future for calling `poll_cancel` on our `Senders` to preserve
|
||||||
// the invariant that it's always within a task.
|
// the invariant that it's always within a task.
|
||||||
struct CheckHangup<'a, T: 'a>(&'a mut Sender<T>);
|
struct CheckHangup<'a, T: 'a>(&'a mut Sender<T>);
|
||||||
@ -360,6 +368,8 @@ impl OnDemand {
|
|||||||
if self.pending.read().is_empty() { return }
|
if self.pending.read().is_empty() { return }
|
||||||
let mut pending = self.pending.write();
|
let mut pending = self.pending.write();
|
||||||
|
|
||||||
|
debug!(target: "on_demand", "Attempting to dispatch {} pending requests", pending.len());
|
||||||
|
|
||||||
// iterate over all pending requests, and check them for hang-up.
|
// iterate over all pending requests, and check them for hang-up.
|
||||||
// then, try and find a peer who can serve it.
|
// then, try and find a peer who can serve it.
|
||||||
let peers = self.peers.read();
|
let peers = self.peers.read();
|
||||||
@ -378,16 +388,21 @@ impl OnDemand {
|
|||||||
|
|
||||||
match ctx.request_from(*peer_id, pending.net_requests.clone()) {
|
match ctx.request_from(*peer_id, pending.net_requests.clone()) {
|
||||||
Ok(req_id) => {
|
Ok(req_id) => {
|
||||||
|
trace!(target: "on_demand", "Dispatched request {} to peer {}", req_id, peer_id);
|
||||||
self.in_transit.write().insert(req_id, pending);
|
self.in_transit.write().insert(req_id, pending);
|
||||||
return None
|
return None
|
||||||
}
|
}
|
||||||
Err(net::Error::NoCredits) => {}
|
Err(net::Error::NoCredits) | Err(net::Error::NotServer) => {}
|
||||||
Err(e) => debug!(target: "on_demand", "Error dispatching request to peer: {}", e),
|
Err(e) => debug!(target: "on_demand", "Error dispatching request to peer: {}", e),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// TODO: maximum number of failures _when we have peers_.
|
||||||
Some(pending)
|
Some(pending)
|
||||||
})
|
})
|
||||||
.collect(); // `pending` now contains all requests we couldn't dispatch.
|
.collect(); // `pending` now contains all requests we couldn't dispatch.
|
||||||
|
|
||||||
|
debug!(target: "on_demand", "Was unable to dispatch {} requests.", pending.len());
|
||||||
}
|
}
|
||||||
|
|
||||||
// submit a pending request set. attempts to answer from cache before
|
// submit a pending request set. attempts to answer from cache before
|
||||||
@ -395,6 +410,7 @@ impl OnDemand {
|
|||||||
fn submit_pending(&self, ctx: &BasicContext, mut pending: Pending) {
|
fn submit_pending(&self, ctx: &BasicContext, mut pending: Pending) {
|
||||||
// answer as many requests from cache as we can, and schedule for dispatch
|
// answer as many requests from cache as we can, and schedule for dispatch
|
||||||
// if incomplete.
|
// if incomplete.
|
||||||
|
|
||||||
pending.answer_from_cache(&*self.cache);
|
pending.answer_from_cache(&*self.cache);
|
||||||
if let Some(mut pending) = pending.try_complete() {
|
if let Some(mut pending) = pending.try_complete() {
|
||||||
pending.update_net_requests();
|
pending.update_net_requests();
|
||||||
|
@ -228,9 +228,10 @@ export default class Status {
|
|||||||
|
|
||||||
_overallStatus = (health) => {
|
_overallStatus = (health) => {
|
||||||
const all = [health.peers, health.sync, health.time].filter(x => x);
|
const all = [health.peers, health.sync, health.time].filter(x => x);
|
||||||
|
const allNoTime = [health.peers, health.sync].filter(x => x);
|
||||||
const statuses = all.map(x => x.status);
|
const statuses = all.map(x => x.status);
|
||||||
const bad = statuses.find(x => x === STATUS_BAD);
|
const bad = statuses.find(x => x === STATUS_BAD);
|
||||||
const needsAttention = statuses.find(x => x === STATUS_WARN);
|
const needsAttention = allNoTime.map(x => x.status).find(x => x === STATUS_WARN);
|
||||||
const message = all.map(x => x.message).filter(x => x);
|
const message = all.map(x => x.message).filter(x => x);
|
||||||
|
|
||||||
if (all.length) {
|
if (all.length) {
|
||||||
|
@ -35,7 +35,7 @@ const initialState = {
|
|||||||
status: DEFAULT_STATUS
|
status: DEFAULT_STATUS
|
||||||
},
|
},
|
||||||
overall: {
|
overall: {
|
||||||
isReady: false,
|
isNotReady: true,
|
||||||
status: DEFAULT_STATUS,
|
status: DEFAULT_STATUS,
|
||||||
message: []
|
message: []
|
||||||
}
|
}
|
||||||
|
@ -101,13 +101,7 @@ export default class SecureApi extends Api {
|
|||||||
return 'dapps.parity';
|
return 'dapps.parity';
|
||||||
}
|
}
|
||||||
|
|
||||||
const { host } = this._dappsAddress;
|
return this._dappsAddress.host;
|
||||||
|
|
||||||
if (!host || host === '0.0.0.0') {
|
|
||||||
return window.location.hostname;
|
|
||||||
}
|
|
||||||
|
|
||||||
return host;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
get isConnecting () {
|
get isConnecting () {
|
||||||
@ -173,6 +167,25 @@ export default class SecureApi extends Api {
|
|||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Resolves a wildcard address to `window.location.hostname`;
|
||||||
|
*/
|
||||||
|
_resolveHost (url) {
|
||||||
|
const parts = url ? url.split(':') : [];
|
||||||
|
const port = parts[1];
|
||||||
|
let host = parts[0];
|
||||||
|
|
||||||
|
if (!host) {
|
||||||
|
return host;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (host === '0.0.0.0') {
|
||||||
|
host = window.location.hostname;
|
||||||
|
}
|
||||||
|
|
||||||
|
return port ? `${host}:${port}` : host;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns a Promise that gets resolved with
|
* Returns a Promise that gets resolved with
|
||||||
* a boolean: `true` if the node is up, `false`
|
* a boolean: `true` if the node is up, `false`
|
||||||
@ -316,8 +329,8 @@ export default class SecureApi extends Api {
|
|||||||
this._uiApi.parity.wsUrl()
|
this._uiApi.parity.wsUrl()
|
||||||
])
|
])
|
||||||
.then(([dappsUrl, wsUrl]) => {
|
.then(([dappsUrl, wsUrl]) => {
|
||||||
this._dappsUrl = dappsUrl;
|
this._dappsUrl = this._resolveHost(dappsUrl);
|
||||||
this._wsUrl = wsUrl;
|
this._wsUrl = this._resolveHost(wsUrl);
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -116,7 +116,7 @@ class SyncWarning extends Component {
|
|||||||
|
|
||||||
function mapStateToProps (state) {
|
function mapStateToProps (state) {
|
||||||
const { health } = state.nodeStatus;
|
const { health } = state.nodeStatus;
|
||||||
const isNotAvailableYet = health.overall.isReady;
|
const isNotAvailableYet = health.overall.isNotReady;
|
||||||
const isOk = isNotAvailableYet || health.overall.status === 'ok';
|
const isOk = isNotAvailableYet || health.overall.status === 'ok';
|
||||||
|
|
||||||
return {
|
return {
|
||||||
|
@ -93,6 +93,7 @@ pub struct ImportBlockchain {
|
|||||||
pub check_seal: bool,
|
pub check_seal: bool,
|
||||||
pub with_color: bool,
|
pub with_color: bool,
|
||||||
pub verifier_settings: VerifierSettings,
|
pub verifier_settings: VerifierSettings,
|
||||||
|
pub light: bool,
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Debug, PartialEq)]
|
#[derive(Debug, PartialEq)]
|
||||||
@ -138,12 +139,165 @@ pub struct ExportState {
|
|||||||
pub fn execute(cmd: BlockchainCmd) -> Result<(), String> {
|
pub fn execute(cmd: BlockchainCmd) -> Result<(), String> {
|
||||||
match cmd {
|
match cmd {
|
||||||
BlockchainCmd::Kill(kill_cmd) => kill_db(kill_cmd),
|
BlockchainCmd::Kill(kill_cmd) => kill_db(kill_cmd),
|
||||||
BlockchainCmd::Import(import_cmd) => execute_import(import_cmd),
|
BlockchainCmd::Import(import_cmd) => {
|
||||||
|
if import_cmd.light {
|
||||||
|
execute_import_light(import_cmd)
|
||||||
|
} else {
|
||||||
|
execute_import(import_cmd)
|
||||||
|
}
|
||||||
|
}
|
||||||
BlockchainCmd::Export(export_cmd) => execute_export(export_cmd),
|
BlockchainCmd::Export(export_cmd) => execute_export(export_cmd),
|
||||||
BlockchainCmd::ExportState(export_cmd) => execute_export_state(export_cmd),
|
BlockchainCmd::ExportState(export_cmd) => execute_export_state(export_cmd),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fn execute_import_light(cmd: ImportBlockchain) -> Result<(), String> {
|
||||||
|
use light::client::{Service as LightClientService, Config as LightClientConfig};
|
||||||
|
use light::cache::Cache as LightDataCache;
|
||||||
|
|
||||||
|
let timer = Instant::now();
|
||||||
|
|
||||||
|
// load spec file
|
||||||
|
let spec = cmd.spec.spec(&cmd.dirs.cache)?;
|
||||||
|
|
||||||
|
// load genesis hash
|
||||||
|
let genesis_hash = spec.genesis_header().hash();
|
||||||
|
|
||||||
|
// database paths
|
||||||
|
let db_dirs = cmd.dirs.database(genesis_hash, None, spec.data_dir.clone());
|
||||||
|
|
||||||
|
// user defaults path
|
||||||
|
let user_defaults_path = db_dirs.user_defaults_path();
|
||||||
|
|
||||||
|
// load user defaults
|
||||||
|
let user_defaults = UserDefaults::load(&user_defaults_path)?;
|
||||||
|
|
||||||
|
fdlimit::raise_fd_limit();
|
||||||
|
|
||||||
|
// select pruning algorithm
|
||||||
|
let algorithm = cmd.pruning.to_algorithm(&user_defaults);
|
||||||
|
|
||||||
|
// prepare client and snapshot paths.
|
||||||
|
let client_path = db_dirs.client_path(algorithm);
|
||||||
|
|
||||||
|
// execute upgrades
|
||||||
|
let compaction = cmd.compaction.compaction_profile(db_dirs.db_root_path().as_path());
|
||||||
|
execute_upgrades(&cmd.dirs.base, &db_dirs, algorithm, compaction)?;
|
||||||
|
|
||||||
|
// create dirs used by parity
|
||||||
|
cmd.dirs.create_dirs(false, false, false)?;
|
||||||
|
|
||||||
|
let cache = Arc::new(::util::Mutex::new(
|
||||||
|
LightDataCache::new(Default::default(), ::time::Duration::seconds(0))
|
||||||
|
));
|
||||||
|
|
||||||
|
let mut config = LightClientConfig {
|
||||||
|
queue: Default::default(),
|
||||||
|
chain_column: ::ethcore::db::COL_LIGHT_CHAIN,
|
||||||
|
db_cache_size: Some(cmd.cache_config.blockchain() as usize * 1024 * 1024),
|
||||||
|
db_compaction: compaction,
|
||||||
|
db_wal: cmd.wal,
|
||||||
|
verify_full: true,
|
||||||
|
check_seal: cmd.check_seal,
|
||||||
|
};
|
||||||
|
|
||||||
|
config.queue.max_mem_use = cmd.cache_config.queue() as usize * 1024 * 1024;
|
||||||
|
config.queue.verifier_settings = cmd.verifier_settings;
|
||||||
|
|
||||||
|
let service = LightClientService::start(config, &spec, &client_path, cache)
|
||||||
|
.map_err(|e| format!("Failed to start client: {}", e))?;
|
||||||
|
|
||||||
|
// free up the spec in memory.
|
||||||
|
drop(spec);
|
||||||
|
|
||||||
|
let client = service.client();
|
||||||
|
|
||||||
|
let mut instream: Box<io::Read> = match cmd.file_path {
|
||||||
|
Some(f) => Box::new(fs::File::open(&f).map_err(|_| format!("Cannot open given file: {}", f))?),
|
||||||
|
None => Box::new(io::stdin()),
|
||||||
|
};
|
||||||
|
|
||||||
|
const READAHEAD_BYTES: usize = 8;
|
||||||
|
|
||||||
|
let mut first_bytes: Vec<u8> = vec![0; READAHEAD_BYTES];
|
||||||
|
let mut first_read = 0;
|
||||||
|
|
||||||
|
let format = match cmd.format {
|
||||||
|
Some(format) => format,
|
||||||
|
None => {
|
||||||
|
first_read = instream.read(&mut first_bytes).map_err(|_| "Error reading from the file/stream.")?;
|
||||||
|
match first_bytes[0] {
|
||||||
|
0xf9 => DataFormat::Binary,
|
||||||
|
_ => DataFormat::Hex,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
let do_import = |bytes: Vec<u8>| {
|
||||||
|
while client.queue_info().is_full() { sleep(Duration::from_secs(1)); }
|
||||||
|
|
||||||
|
let header: ::ethcore::header::Header = ::rlp::UntrustedRlp::new(&bytes).val_at(0)
|
||||||
|
.map_err(|e| format!("Bad block: {}", e))?;
|
||||||
|
|
||||||
|
if client.best_block_header().number() >= header.number() { return Ok(()) }
|
||||||
|
|
||||||
|
if header.number() % 10000 == 0 {
|
||||||
|
info!("#{}", header.number());
|
||||||
|
}
|
||||||
|
|
||||||
|
match client.import_header(header) {
|
||||||
|
Err(BlockImportError::Import(ImportError::AlreadyInChain)) => {
|
||||||
|
trace!("Skipping block already in chain.");
|
||||||
|
}
|
||||||
|
Err(e) => {
|
||||||
|
return Err(format!("Cannot import block: {:?}", e));
|
||||||
|
},
|
||||||
|
Ok(_) => {},
|
||||||
|
}
|
||||||
|
Ok(())
|
||||||
|
};
|
||||||
|
|
||||||
|
match format {
|
||||||
|
DataFormat::Binary => {
|
||||||
|
loop {
|
||||||
|
let mut bytes = if first_read > 0 {first_bytes.clone()} else {vec![0; READAHEAD_BYTES]};
|
||||||
|
let n = if first_read > 0 {
|
||||||
|
first_read
|
||||||
|
} else {
|
||||||
|
instream.read(&mut bytes).map_err(|_| "Error reading from the file/stream.")?
|
||||||
|
};
|
||||||
|
if n == 0 { break; }
|
||||||
|
first_read = 0;
|
||||||
|
let s = PayloadInfo::from(&bytes).map_err(|e| format!("Invalid RLP in the file/stream: {:?}", e))?.total();
|
||||||
|
bytes.resize(s, 0);
|
||||||
|
instream.read_exact(&mut bytes[n..]).map_err(|_| "Error reading from the file/stream.")?;
|
||||||
|
do_import(bytes)?;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
DataFormat::Hex => {
|
||||||
|
for line in BufReader::new(instream).lines() {
|
||||||
|
let s = line.map_err(|_| "Error reading from the file/stream.")?;
|
||||||
|
let s = if first_read > 0 {from_utf8(&first_bytes).unwrap().to_owned() + &(s[..])} else {s};
|
||||||
|
first_read = 0;
|
||||||
|
let bytes = s.from_hex().map_err(|_| "Invalid hex in file/stream.")?;
|
||||||
|
do_import(bytes)?;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
client.flush_queue();
|
||||||
|
|
||||||
|
let ms = timer.elapsed().as_milliseconds();
|
||||||
|
let report = client.report();
|
||||||
|
|
||||||
|
info!("Import completed in {} seconds, {} headers, {} hdr/s",
|
||||||
|
ms / 1000,
|
||||||
|
report.blocks_imported,
|
||||||
|
(report.blocks_imported * 1000) as u64 / ms,
|
||||||
|
);
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
fn execute_import(cmd: ImportBlockchain) -> Result<(), String> {
|
fn execute_import(cmd: ImportBlockchain) -> Result<(), String> {
|
||||||
let timer = Instant::now();
|
let timer = Instant::now();
|
||||||
|
|
||||||
|
@ -356,7 +356,7 @@ usage! {
|
|||||||
or |c: &Config| otry!(c.vm).jit.clone(),
|
or |c: &Config| otry!(c.vm).jit.clone(),
|
||||||
|
|
||||||
// -- Miscellaneous Options
|
// -- Miscellaneous Options
|
||||||
flag_ntp_server: String = "pool.ntp.org:123",
|
flag_ntp_server: String = "none",
|
||||||
or |c: &Config| otry!(c.misc).ntp_server.clone(),
|
or |c: &Config| otry!(c.misc).ntp_server.clone(),
|
||||||
flag_logging: Option<String> = None,
|
flag_logging: Option<String> = None,
|
||||||
or |c: &Config| otry!(c.misc).logging.clone().map(Some),
|
or |c: &Config| otry!(c.misc).logging.clone().map(Some),
|
||||||
@ -897,7 +897,7 @@ mod tests {
|
|||||||
flag_dapps_apis_all: None,
|
flag_dapps_apis_all: None,
|
||||||
|
|
||||||
// -- Miscellaneous Options
|
// -- Miscellaneous Options
|
||||||
flag_ntp_server: "pool.ntp.org:123".into(),
|
flag_ntp_server: "none".into(),
|
||||||
flag_version: false,
|
flag_version: false,
|
||||||
flag_logging: Some("own_tx=trace".into()),
|
flag_logging: Some("own_tx=trace".into()),
|
||||||
flag_log_file: Some("/var/log/parity.log".into()),
|
flag_log_file: Some("/var/log/parity.log".into()),
|
||||||
|
@ -243,6 +243,7 @@ impl Configuration {
|
|||||||
check_seal: !self.args.flag_no_seal_check,
|
check_seal: !self.args.flag_no_seal_check,
|
||||||
with_color: logger_config.color,
|
with_color: logger_config.color,
|
||||||
verifier_settings: self.verifier_settings(),
|
verifier_settings: self.verifier_settings(),
|
||||||
|
light: self.args.flag_light,
|
||||||
};
|
};
|
||||||
Cmd::Blockchain(BlockchainCmd::Import(import_cmd))
|
Cmd::Blockchain(BlockchainCmd::Import(import_cmd))
|
||||||
} else if self.args.cmd_export {
|
} else if self.args.cmd_export {
|
||||||
@ -1179,6 +1180,7 @@ mod tests {
|
|||||||
check_seal: true,
|
check_seal: true,
|
||||||
with_color: !cfg!(windows),
|
with_color: !cfg!(windows),
|
||||||
verifier_settings: Default::default(),
|
verifier_settings: Default::default(),
|
||||||
|
light: false,
|
||||||
})));
|
})));
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1270,7 +1272,7 @@ mod tests {
|
|||||||
support_token_api: true
|
support_token_api: true
|
||||||
}, UiConfiguration {
|
}, UiConfiguration {
|
||||||
enabled: true,
|
enabled: true,
|
||||||
ntp_server: "pool.ntp.org:123".into(),
|
ntp_server: "none".into(),
|
||||||
interface: "127.0.0.1".into(),
|
interface: "127.0.0.1".into(),
|
||||||
port: 8180,
|
port: 8180,
|
||||||
hosts: Some(vec![]),
|
hosts: Some(vec![]),
|
||||||
@ -1511,7 +1513,7 @@ mod tests {
|
|||||||
assert_eq!(conf0.directories().signer, "signer".to_owned());
|
assert_eq!(conf0.directories().signer, "signer".to_owned());
|
||||||
assert_eq!(conf0.ui_config(), UiConfiguration {
|
assert_eq!(conf0.ui_config(), UiConfiguration {
|
||||||
enabled: true,
|
enabled: true,
|
||||||
ntp_server: "pool.ntp.org:123".into(),
|
ntp_server: "none".into(),
|
||||||
interface: "127.0.0.1".into(),
|
interface: "127.0.0.1".into(),
|
||||||
port: 8180,
|
port: 8180,
|
||||||
hosts: Some(vec![]),
|
hosts: Some(vec![]),
|
||||||
@ -1520,7 +1522,7 @@ mod tests {
|
|||||||
assert_eq!(conf1.directories().signer, "signer".to_owned());
|
assert_eq!(conf1.directories().signer, "signer".to_owned());
|
||||||
assert_eq!(conf1.ui_config(), UiConfiguration {
|
assert_eq!(conf1.ui_config(), UiConfiguration {
|
||||||
enabled: true,
|
enabled: true,
|
||||||
ntp_server: "pool.ntp.org:123".into(),
|
ntp_server: "none".into(),
|
||||||
interface: "127.0.0.1".into(),
|
interface: "127.0.0.1".into(),
|
||||||
port: 8180,
|
port: 8180,
|
||||||
hosts: Some(vec![]),
|
hosts: Some(vec![]),
|
||||||
@ -1530,7 +1532,7 @@ mod tests {
|
|||||||
assert_eq!(conf2.directories().signer, "signer".to_owned());
|
assert_eq!(conf2.directories().signer, "signer".to_owned());
|
||||||
assert_eq!(conf2.ui_config(), UiConfiguration {
|
assert_eq!(conf2.ui_config(), UiConfiguration {
|
||||||
enabled: true,
|
enabled: true,
|
||||||
ntp_server: "pool.ntp.org:123".into(),
|
ntp_server: "none".into(),
|
||||||
interface: "127.0.0.1".into(),
|
interface: "127.0.0.1".into(),
|
||||||
port: 3123,
|
port: 3123,
|
||||||
hosts: Some(vec![]),
|
hosts: Some(vec![]),
|
||||||
@ -1539,7 +1541,7 @@ mod tests {
|
|||||||
assert_eq!(conf3.directories().signer, "signer".to_owned());
|
assert_eq!(conf3.directories().signer, "signer".to_owned());
|
||||||
assert_eq!(conf3.ui_config(), UiConfiguration {
|
assert_eq!(conf3.ui_config(), UiConfiguration {
|
||||||
enabled: true,
|
enabled: true,
|
||||||
ntp_server: "pool.ntp.org:123".into(),
|
ntp_server: "none".into(),
|
||||||
interface: "test".into(),
|
interface: "test".into(),
|
||||||
port: 8180,
|
port: 8180,
|
||||||
hosts: Some(vec![]),
|
hosts: Some(vec![]),
|
||||||
|
@ -47,7 +47,7 @@ impl Default for Configuration {
|
|||||||
let data_dir = default_data_path();
|
let data_dir = default_data_path();
|
||||||
Configuration {
|
Configuration {
|
||||||
enabled: true,
|
enabled: true,
|
||||||
ntp_server: "pool.ntp.org:123".into(),
|
ntp_server: "none".into(),
|
||||||
dapps_path: replace_home(&data_dir, "$BASE/dapps").into(),
|
dapps_path: replace_home(&data_dir, "$BASE/dapps").into(),
|
||||||
extra_dapps: vec![],
|
extra_dapps: vec![],
|
||||||
extra_embed_on: vec![],
|
extra_embed_on: vec![],
|
||||||
@ -114,7 +114,7 @@ impl ContractClient for LightRegistrar {
|
|||||||
tx: Transaction {
|
tx: Transaction {
|
||||||
nonce: self.client.engine().account_start_nonce(header.number()),
|
nonce: self.client.engine().account_start_nonce(header.number()),
|
||||||
action: Action::Call(address),
|
action: Action::Call(address),
|
||||||
gas: 50_000_000.into(),
|
gas: 50_000.into(), // should be enough for all registry lookups. TODO: exponential backoff
|
||||||
gas_price: 0.into(),
|
gas_price: 0.into(),
|
||||||
value: 0.into(),
|
value: 0.into(),
|
||||||
data: data,
|
data: data,
|
||||||
|
@ -108,7 +108,7 @@ impl Default for UiConfiguration {
|
|||||||
fn default() -> Self {
|
fn default() -> Self {
|
||||||
UiConfiguration {
|
UiConfiguration {
|
||||||
enabled: true && cfg!(feature = "ui-enabled"),
|
enabled: true && cfg!(feature = "ui-enabled"),
|
||||||
ntp_server: "pool.ntp.org:123".into(),
|
ntp_server: "none".into(),
|
||||||
port: 8180,
|
port: 8180,
|
||||||
interface: "127.0.0.1".into(),
|
interface: "127.0.0.1".into(),
|
||||||
hosts: Some(vec![]),
|
hosts: Some(vec![]),
|
||||||
|
@ -210,6 +210,7 @@ fn execute_light(cmd: RunCmd, can_restart: bool, logger: Arc<RotatingLogger>) ->
|
|||||||
db_compaction: compaction,
|
db_compaction: compaction,
|
||||||
db_wal: cmd.wal,
|
db_wal: cmd.wal,
|
||||||
verify_full: true,
|
verify_full: true,
|
||||||
|
check_seal: cmd.check_seal,
|
||||||
};
|
};
|
||||||
|
|
||||||
config.queue.max_mem_use = cmd.cache_config.queue() as usize * 1024 * 1024;
|
config.queue.max_mem_use = cmd.cache_config.queue() as usize * 1024 * 1024;
|
||||||
|
@ -177,7 +177,7 @@ pub fn fetch_gas_price_corpus(
|
|||||||
) -> BoxFuture<Corpus<U256>, Error> {
|
) -> BoxFuture<Corpus<U256>, Error> {
|
||||||
const GAS_PRICE_SAMPLE_SIZE: usize = 100;
|
const GAS_PRICE_SAMPLE_SIZE: usize = 100;
|
||||||
|
|
||||||
if let Some(cached) = cache.lock().gas_price_corpus() {
|
if let Some(cached) = { cache.lock().gas_price_corpus() } {
|
||||||
return future::ok(cached).boxed()
|
return future::ok(cached).boxed()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -26,6 +26,7 @@ use ethcore::filter::Filter as EthcoreFilter;
|
|||||||
use ethcore::transaction::{Action, Transaction as EthTransaction};
|
use ethcore::transaction::{Action, Transaction as EthTransaction};
|
||||||
|
|
||||||
use futures::{future, Future, BoxFuture};
|
use futures::{future, Future, BoxFuture};
|
||||||
|
use futures::future::Either;
|
||||||
use jsonrpc_core::Error;
|
use jsonrpc_core::Error;
|
||||||
use jsonrpc_macros::Trailing;
|
use jsonrpc_macros::Trailing;
|
||||||
|
|
||||||
@ -159,7 +160,9 @@ impl LightFetch {
|
|||||||
|
|
||||||
/// helper for getting proved execution.
|
/// helper for getting proved execution.
|
||||||
pub fn proved_execution(&self, req: CallRequest, num: Trailing<BlockNumber>) -> BoxFuture<ExecutionResult, Error> {
|
pub fn proved_execution(&self, req: CallRequest, num: Trailing<BlockNumber>) -> BoxFuture<ExecutionResult, Error> {
|
||||||
const DEFAULT_GAS_PRICE: U256 = U256([0, 0, 0, 21_000_000]);
|
const DEFAULT_GAS_PRICE: u64 = 21_000;
|
||||||
|
// starting gas when gas not provided.
|
||||||
|
const START_GAS: u64 = 50_000;
|
||||||
|
|
||||||
let (sync, on_demand, client) = (self.sync.clone(), self.on_demand.clone(), self.client.clone());
|
let (sync, on_demand, client) = (self.sync.clone(), self.on_demand.clone(), self.client.clone());
|
||||||
let req: CallRequestHelper = req.into();
|
let req: CallRequestHelper = req.into();
|
||||||
@ -167,21 +170,21 @@ impl LightFetch {
|
|||||||
|
|
||||||
let from = req.from.unwrap_or(Address::zero());
|
let from = req.from.unwrap_or(Address::zero());
|
||||||
let nonce_fut = match req.nonce {
|
let nonce_fut = match req.nonce {
|
||||||
Some(nonce) => future::ok(Some(nonce)).boxed(),
|
Some(nonce) => Either::A(future::ok(Some(nonce))),
|
||||||
None => self.account(from, id).map(|acc| acc.map(|a| a.nonce)).boxed(),
|
None => Either::B(self.account(from, id).map(|acc| acc.map(|a| a.nonce))),
|
||||||
};
|
};
|
||||||
|
|
||||||
let gas_price_fut = match req.gas_price {
|
let gas_price_fut = match req.gas_price {
|
||||||
Some(price) => future::ok(price).boxed(),
|
Some(price) => Either::A(future::ok(price)),
|
||||||
None => dispatch::fetch_gas_price_corpus(
|
None => Either::B(dispatch::fetch_gas_price_corpus(
|
||||||
self.sync.clone(),
|
self.sync.clone(),
|
||||||
self.client.clone(),
|
self.client.clone(),
|
||||||
self.on_demand.clone(),
|
self.on_demand.clone(),
|
||||||
self.cache.clone(),
|
self.cache.clone(),
|
||||||
).map(|corp| match corp.median() {
|
).map(|corp| match corp.median() {
|
||||||
Some(median) => *median,
|
Some(median) => *median,
|
||||||
None => DEFAULT_GAS_PRICE,
|
None => DEFAULT_GAS_PRICE.into(),
|
||||||
}).boxed()
|
}))
|
||||||
};
|
};
|
||||||
|
|
||||||
// if nonce resolves, this should too since it'll be in the LRU-cache.
|
// if nonce resolves, this should too since it'll be in the LRU-cache.
|
||||||
@ -190,22 +193,29 @@ impl LightFetch {
|
|||||||
// fetch missing transaction fields from the network.
|
// fetch missing transaction fields from the network.
|
||||||
nonce_fut.join(gas_price_fut).and_then(move |(nonce, gas_price)| {
|
nonce_fut.join(gas_price_fut).and_then(move |(nonce, gas_price)| {
|
||||||
let action = req.to.map_or(Action::Create, Action::Call);
|
let action = req.to.map_or(Action::Create, Action::Call);
|
||||||
let gas = req.gas.unwrap_or(U256::from(10_000_000)); // better gas amount?
|
|
||||||
let value = req.value.unwrap_or_else(U256::zero);
|
let value = req.value.unwrap_or_else(U256::zero);
|
||||||
let data = req.data.unwrap_or_default();
|
let data = req.data.unwrap_or_default();
|
||||||
|
|
||||||
future::done(match nonce {
|
future::done(match (nonce, req.gas) {
|
||||||
Some(n) => Ok(EthTransaction {
|
(Some(n), Some(gas)) => Ok((true, EthTransaction {
|
||||||
nonce: n,
|
nonce: n,
|
||||||
action: action,
|
action: action,
|
||||||
gas: gas,
|
gas: gas,
|
||||||
gas_price: gas_price,
|
gas_price: gas_price,
|
||||||
value: value,
|
value: value,
|
||||||
data: data,
|
data: data,
|
||||||
}.fake_sign(from)),
|
})),
|
||||||
None => Err(errors::unknown_block()),
|
(Some(n), None) => Ok((false, EthTransaction {
|
||||||
|
nonce: n,
|
||||||
|
action: action,
|
||||||
|
gas: START_GAS.into(),
|
||||||
|
gas_price: gas_price,
|
||||||
|
value: value,
|
||||||
|
data: data,
|
||||||
|
})),
|
||||||
|
(None, _) => Err(errors::unknown_block()),
|
||||||
})
|
})
|
||||||
}).join(header_fut).and_then(move |(tx, hdr)| {
|
}).join(header_fut).and_then(move |((gas_known, tx), hdr)| {
|
||||||
// then request proved execution.
|
// then request proved execution.
|
||||||
// TODO: get last-hashes from network.
|
// TODO: get last-hashes from network.
|
||||||
let env_info = match client.env_info(id) {
|
let env_info = match client.env_info(id) {
|
||||||
@ -213,24 +223,15 @@ impl LightFetch {
|
|||||||
_ => return future::err(errors::unknown_block()).boxed(),
|
_ => return future::err(errors::unknown_block()).boxed(),
|
||||||
};
|
};
|
||||||
|
|
||||||
let request = request::TransactionProof {
|
execute_tx(gas_known, ExecuteParams {
|
||||||
|
from: from,
|
||||||
tx: tx,
|
tx: tx,
|
||||||
header: hdr.into(),
|
hdr: hdr,
|
||||||
env_info: env_info,
|
env_info: env_info,
|
||||||
engine: client.engine().clone(),
|
engine: client.engine().clone(),
|
||||||
};
|
on_demand: on_demand,
|
||||||
|
sync: sync,
|
||||||
let proved_future = sync.with_context(move |ctx| {
|
})
|
||||||
on_demand
|
|
||||||
.request(ctx, request)
|
|
||||||
.expect("no back-references; therefore all back-refs valid; qed")
|
|
||||||
.map_err(errors::on_demand_cancel).boxed()
|
|
||||||
});
|
|
||||||
|
|
||||||
match proved_future {
|
|
||||||
Some(fut) => fut.boxed(),
|
|
||||||
None => future::err(errors::network_disabled()).boxed(),
|
|
||||||
}
|
|
||||||
}).boxed()
|
}).boxed()
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -320,3 +321,66 @@ impl LightFetch {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[derive(Clone)]
|
||||||
|
struct ExecuteParams {
|
||||||
|
from: Address,
|
||||||
|
tx: EthTransaction,
|
||||||
|
hdr: encoded::Header,
|
||||||
|
env_info: ::evm::env_info::EnvInfo,
|
||||||
|
engine: Arc<::ethcore::engines::Engine>,
|
||||||
|
on_demand: Arc<OnDemand>,
|
||||||
|
sync: Arc<LightSync>,
|
||||||
|
}
|
||||||
|
|
||||||
|
// has a peer execute the transaction with given params. If `gas_known` is false,
|
||||||
|
// this will double the gas on each `OutOfGas` error.
|
||||||
|
fn execute_tx(gas_known: bool, params: ExecuteParams) -> BoxFuture<ExecutionResult, Error> {
|
||||||
|
if !gas_known {
|
||||||
|
future::loop_fn(params, |mut params| {
|
||||||
|
execute_tx(true, params.clone()).and_then(move |res| {
|
||||||
|
match res {
|
||||||
|
Ok(executed) => {
|
||||||
|
// TODO: how to distinguish between actual OOG and
|
||||||
|
// exception?
|
||||||
|
if executed.exception.is_some() {
|
||||||
|
let old_gas = params.tx.gas;
|
||||||
|
params.tx.gas = params.tx.gas * 2.into();
|
||||||
|
if params.tx.gas > params.hdr.gas_limit() {
|
||||||
|
params.tx.gas = old_gas;
|
||||||
|
} else {
|
||||||
|
return Ok(future::Loop::Continue(params))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(future::Loop::Break(Ok(executed)))
|
||||||
|
}
|
||||||
|
failed => Ok(future::Loop::Break(failed)),
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}).boxed()
|
||||||
|
} else {
|
||||||
|
trace!(target: "light_fetch", "Placing execution request for {} gas in on_demand",
|
||||||
|
params.tx.gas);
|
||||||
|
|
||||||
|
let request = request::TransactionProof {
|
||||||
|
tx: params.tx.fake_sign(params.from),
|
||||||
|
header: params.hdr.into(),
|
||||||
|
env_info: params.env_info,
|
||||||
|
engine: params.engine,
|
||||||
|
};
|
||||||
|
|
||||||
|
let on_demand = params.on_demand;
|
||||||
|
let proved_future = params.sync.with_context(move |ctx| {
|
||||||
|
on_demand
|
||||||
|
.request(ctx, request)
|
||||||
|
.expect("no back-references; therefore all back-refs valid; qed")
|
||||||
|
.map_err(errors::on_demand_cancel)
|
||||||
|
});
|
||||||
|
|
||||||
|
match proved_future {
|
||||||
|
Some(fut) => fut.boxed(),
|
||||||
|
None => future::err(errors::network_disabled()).boxed(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user