veriblock-pop-cpp
C++11 Libraries for leveraging VeriBlock Proof-Of-Proof blockchain technology.
blockchain_util.hpp
1// Copyright (c) 2019-2022 Xenios SEZC
2// https://www.veriblock.org
3// Distributed under the MIT software license, see the accompanying
4// file LICENSE or http://www.opensource.org/licenses/mit-license.php.
5
6#ifndef ALT_INTEGRATION_INCLUDE_VERIBLOCK_BLOCKCHAIN_BLOCKCHAIN_UTIL_HPP_
7#define ALT_INTEGRATION_INCLUDE_VERIBLOCK_BLOCKCHAIN_BLOCKCHAIN_UTIL_HPP_
8
9#include <veriblock/pop/validation_state.hpp>
10
11#include "block_index.hpp"
12#include "chain.hpp"
13#include "command_group.hpp"
14
15namespace altintegration {
16
18template <typename Block>
19void determineBestChain(Chain<Block>& currentBest, BlockIndex<Block>& indexNew);
20
22template <typename Block, typename ChainParams>
23uint32_t getNextWorkRequired(const BlockIndex<Block>& prevBlock,
24 const Block& block,
25 const ChainParams& params);
26
28template <typename Block>
29ArithUint256 getBlockProof(const Block& block);
30
32template <typename Block>
33int64_t getMedianTimePast(const BlockIndex<Block>& prev);
34
36template <typename Block, typename ChainParams>
37bool checkBlockTime(const BlockIndex<Block>& prev,
38 const Block& block,
39 ValidationState& state,
40 const ChainParams& param);
41
43template <typename Block, typename ChainParams>
44bool contextuallyCheckBlock(const BlockIndex<Block>& prev,
45 const Block& block,
46 ValidationState& state,
47 const ChainParams& params,
48 bool shouldVerifyNextWork = true);
49
51template <typename ProtectedBlockTree>
52bool recoverEndorsements(ProtectedBlockTree& ed_,
53 typename ProtectedBlockTree::index_t& toRecover,
54 Chain<typename ProtectedBlockTree::index_t>& chain,
55 ValidationState& state) {
56 std::vector<std::function<void()>> actions;
57 auto& containingEndorsements = toRecover.getContainingEndorsements();
58 actions.reserve(containingEndorsements.size());
59 auto& ing = ed_.getComparator().getProtectingBlockTree();
60
61 for (const auto& p : containingEndorsements) {
62 auto& id = p.first;
63 auto& e = *p.second;
64
65 if (id != e.id) {
66 return state.Invalid("bad-id",
67 format("Key={}, Id={}", HexStr(id), HexStr(e.id)));
68 }
69
70 auto* endorsed = ed_.getBlockIndex(e.endorsedHash);
71 if (endorsed == nullptr) {
72 return state.Invalid(
73 "no-endorsed",
74 format("Can not find endorsed block in {}", e.toPrettyString()));
75 }
76
77 if (chain[endorsed->getHeight()] == nullptr ||
78 chain[endorsed->getHeight()]->getHash() != e.endorsedHash ||
79 endorsed->getHash() != e.endorsedHash) {
80 return state.Invalid(
81 "bad-endorsed",
82 format("Endorsed block does not match {}", e.toPrettyString()));
83 }
84
85 if (e.containingHash != toRecover.getHash()) {
86 return state.Invalid(
87 "bad-containing",
88 format("Containing block does not match {}", e.toPrettyString()));
89 }
90
91 auto* blockOfProof = as_mut(ing).getBlockIndex(e.blockOfProof);
92 // TODO: disable validation for testing
93 if (blockOfProof == nullptr) {
94 return state.Invalid(
95 "bad-blockofproof",
96 format("Block Of Proof {} does not exist in SP chain",
97 HexStr(e.blockOfProof)));
98 }
99
100 // make sure it is accessible in lambda
101 const auto* endorsement = &e;
102
103 // delay execution. this ensures atomic changes - if any of endorsemens fail
104 // validation, no 'action' is actually executed.
105 actions.push_back([endorsed, blockOfProof, endorsement] {
106 auto& by = endorsed->getEndorsedBy();
107 VBK_ASSERT_MSG(std::find(by.begin(), by.end(), endorsement) == by.end(),
108 "same endorsement is added to endorsedBy second time");
109 bool isDirty = endorsed->isDirty();
110 endorsed->insertEndorsedBy(endorsement);
111 // keep dirty flag since recoverEndorsements is used when loading blocks
112 // from storage and should not affect dirtyness of the blocks
113 if (!isDirty) {
114 endorsed->unsetDirty();
115 }
116
117 const auto& bop = blockOfProof->getBlockOfProofEndorsement();
118 VBK_ASSERT_MSG(
119 std::find(bop.begin(), bop.end(), endorsement) == bop.end(),
120 "same endorsement is added to blockOfProof second time");
121 isDirty = blockOfProof->isDirty();
122 blockOfProof->insertBlockOfProofEndorsement(endorsement);
123 // keep dirty flag
124 if (!isDirty) {
125 blockOfProof->unsetDirty();
126 }
127 });
128 }
129
130 // all actions have been validated
131 // commit changes
132 for (auto& f : actions) {
133 f();
134 }
135
136 return true;
137}
138
140template <typename ProtectedBlockTree>
141void recoverEndorsementsFast(ProtectedBlockTree& ed_,
142 typename ProtectedBlockTree::index_t& toRecover) {
143 std::vector<std::function<void()>> actions;
144 auto& containingEndorsements = toRecover.getContainingEndorsements();
145 actions.reserve(containingEndorsements.size());
146 auto& ing = ed_.getComparator().getProtectingBlockTree();
147
148 for (const auto& p : containingEndorsements) {
149 auto& e = *p.second;
150
151 auto* endorsed = ed_.getBlockIndex(e.endorsedHash);
152 auto* blockOfProof = as_mut(ing).getBlockIndex(e.blockOfProof);
153
154 // make sure it is accessible in lambda
155 const auto* endorsement = &e;
156
157 // delay execution. this ensures atomic changes - if any of endorsemens fail
158 // validation, no 'action' is actually executed.
159 actions.push_back([endorsed, blockOfProof, endorsement] {
160 auto& by = endorsed->getEndorsedBy();
161 VBK_ASSERT_MSG(std::find(by.begin(), by.end(), endorsement) == by.end(),
162 "same endorsement is added to endorsedBy second time");
163 bool isDirty = endorsed->isDirty();
164 endorsed->insertEndorsedBy(endorsement);
165 // keep dirty flag since recoverEndorsements is used when loading blocks
166 // from storage and should not affect dirtyness of the blocks
167 if (!isDirty) {
168 endorsed->unsetDirty();
169 }
170
171 const auto& bop = blockOfProof->getBlockOfProofEndorsement();
172 VBK_ASSERT_MSG(
173 std::find(bop.begin(), bop.end(), endorsement) == bop.end(),
174 "same endorsement is added to blockOfProof second time");
175 isDirty = blockOfProof->isDirty();
176 blockOfProof->insertBlockOfProofEndorsement(endorsement);
177 // keep dirty flag
178 if (!isDirty) {
179 blockOfProof->unsetDirty();
180 }
181 });
182 }
183
184 // all actions have been validated
185 // commit changes
186 for (auto& f : actions) {
187 f();
188 }
189}
190
192template <typename Block>
193void assertBlockCanBeRemoved(const Block& block);
194
196template <typename Block>
197void assertBlockSanity(const Block& block) {
198 VBK_ASSERT_MSG(block.getHash() != block.getPreviousBlock(),
199 "Previous block hash should NOT be equal to the current block "
200 "hash: %s. A collision in altchain hash?",
201 HexStr(block.getHash()));
202}
203
205template <typename Tree, typename Pop>
206void payloadToCommands(Tree& tree,
207 const Pop& pop,
208 const std::vector<uint8_t>& containingHash,
209 std::vector<CommandPtr>& cmds);
210
211struct PopData;
212
214template <typename Tree, typename Payload>
215void payloadToCommandGroup(Tree& tree,
216 const Payload& payload,
217 const std::vector<uint8_t>& containingHash,
218 CommandGroup& cg) {
219 // NOTE: disabled to remove the overhead of querying the unimplemented
220 // validity map; uncomment if implemented
221
222 // cg.valid = tree.getPayloadsIndex().getValidity(containingHash, cg.id);
223
224 cg.payload_type_name = &Payload::name();
225 cg.id = payload.getId().asVector();
226
227 payloadToCommands(tree, payload, containingHash, cg.commands);
228}
229
231template <typename Tree, typename PayloadsT>
232std::vector<CommandGroup> payloadsToCommandGroups(
233 Tree& tree,
234 const PayloadsT& pop,
235 const std::vector<uint8_t>& containinghash);
236
238template <typename Tree, typename Pop>
239void vectorPopToCommandGroup(Tree& tree,
240 const std::vector<Pop>& pop,
241 const std::vector<uint8_t>& containingHash,
242 std::vector<CommandGroup>& cgs) {
243 for (const auto& b : pop) {
244 CommandGroup cg;
245 cg.payload_type_name = &Pop::name();
246 cg.id = b.getId().asVector();
247 payloadToCommands(tree, b, containingHash, cg.commands);
248
249 cgs.push_back(std::move(cg));
250 }
251}
252
254template <typename BlockTree>
255bool areOnSameChain(const typename BlockTree::block_t& blk1,
256 const typename BlockTree::block_t& blk2,
257 const BlockTree& tree) {
258 auto* blk_index1 = tree.getBlockIndex(blk1.getHash());
259 auto* blk_index2 = tree.getBlockIndex(blk2.getHash());
260
261 VBK_ASSERT_MSG(blk_index1, "unknown block %s", blk1.toPrettyString());
262 VBK_ASSERT_MSG(blk_index2, "unknown block %s", blk2.toPrettyString());
263
264 if (blk_index1->getHeight() > blk_index2->getHeight()) {
265 return blk_index1->getAncestor(blk_index2->getHeight()) == blk_index2;
266 } else {
267 return blk_index2->getAncestor(blk_index1->getHeight()) == blk_index1;
268 }
269}
270
271} // namespace altintegration
272
273#endif // ALT_INTEGRATION_INCLUDE_VERIBLOCK_BLOCKCHAIN_BLOCKCHAIN_UTIL_HPP_
Defines logging helpers.
Definition: block.hpp:14
std::string HexStr(const T itbegin, const T itend)
Convert bytes to hex.
Definition: strutil.hpp:44