mirror of
https://github.com/status-im/nimbus-eth1.git
synced 2025-01-29 05:25:34 +00:00
dbe3393f5c
* Fix eth/common & web3 related deprecation warnings for fluffy This commit uses the new types in the new eth/common/ structure to remove deprecation warnings. It is however more than just a mass replace as also all places where eth/common or eth/common/eth_types or eth/common/eth_types_rlp got imported have been revised and adjusted to a better per submodule based import. There are still a bunch of toMDigest deprecation warnings but that convertor is not needed for fluffy code anymore so in theory it should not be used (bug?). It seems to still get imported via export leaks ffrom imported nimbus code I think. * Address review comments * Remove two more unused eth/common imports
185 lines
5.9 KiB
Nim
185 lines
5.9 KiB
Nim
# Fluffy
|
|
# Copyright (c) 2024 Status Research & Development GmbH
|
|
# Licensed and distributed under either of
|
|
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
|
|
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
{.push raises: [].}
|
|
|
|
import results, eth/rlp, eth/common/hashes, ./state_content, ./state_utils
|
|
|
|
export results, state_content, hashes
|
|
|
|
from eth/common/eth_types_rlp import rlpHash
|
|
|
|
proc hashEquals(value: TrieNode | Bytecode, expectedHash: Hash32): bool {.inline.} =
|
|
keccak256(value.asSeq()) == expectedHash
|
|
|
|
proc isValidNextNode(
|
|
thisNodeRlp: Rlp, rlpIdx: int, nextNode: TrieNode
|
|
): bool {.raises: RlpError.} =
|
|
let hashOrShortRlp = thisNodeRlp.listElem(rlpIdx)
|
|
if hashOrShortRlp.isEmpty():
|
|
return false
|
|
|
|
let nextHash =
|
|
if hashOrShortRlp.isList():
|
|
# is a short node
|
|
rlpHash(hashOrShortRlp)
|
|
else:
|
|
let hash = hashOrShortRlp.toBytes()
|
|
if hash.len() != 32:
|
|
return false
|
|
Hash32.fromBytes(hash)
|
|
|
|
nextNode.hashEquals(nextHash)
|
|
|
|
# TODO: Refactor this function to improve maintainability
|
|
proc validateTrieProof*(
|
|
expectedRootHash: Opt[Hash32],
|
|
path: Nibbles,
|
|
proof: TrieProof,
|
|
allowKeyEndInPathForLeafs = false,
|
|
): Result[void, string] =
|
|
if proof.len() == 0:
|
|
return err("proof is empty")
|
|
|
|
# TODO: Remove this once the hive tests support passing in state roots from the history network
|
|
if expectedRootHash.isSome():
|
|
if not proof[0].hashEquals(expectedRootHash.get()):
|
|
return err("hash of proof root node doesn't match the expected root hash")
|
|
|
|
let nibbles = path.unpackNibbles()
|
|
if nibbles.len() == 0:
|
|
if proof.len() == 1:
|
|
return ok() # root node case, already validated above
|
|
else:
|
|
return err("empty path, only one node expected in proof")
|
|
|
|
var nibbleIdx = 0
|
|
for proofIdx, p in proof:
|
|
let
|
|
thisNodeRlp = rlpFromBytes(p.asSeq())
|
|
remainingNibbles = nibbles.len() - nibbleIdx
|
|
isLastNode = proofIdx == proof.high
|
|
|
|
if remainingNibbles == 0:
|
|
if isLastNode:
|
|
break
|
|
else:
|
|
return err("proof has more nodes then expected for given path")
|
|
|
|
try:
|
|
case thisNodeRlp.listLen()
|
|
of 2:
|
|
let nodePrefixRlp = thisNodeRlp.listElem(0)
|
|
if nodePrefixRlp.isEmpty():
|
|
return err("node prefix is empty")
|
|
|
|
let (prefix, isLeaf, prefixNibbles) = decodePrefix(nodePrefixRlp)
|
|
if prefix >= 4:
|
|
return err("invalid prefix in node")
|
|
|
|
if not isLastNode or (isLeaf and allowKeyEndInPathForLeafs):
|
|
let unpackedPrefix = prefixNibbles.unpackNibbles()
|
|
if remainingNibbles < unpackedPrefix.len():
|
|
return err("not enough nibbles to validate node prefix")
|
|
|
|
let nibbleEndIdx = nibbleIdx + unpackedPrefix.len()
|
|
if nibbles[nibbleIdx ..< nibbleEndIdx] != unpackedPrefix:
|
|
return err("nibbles don't match node prefix")
|
|
nibbleIdx += unpackedPrefix.len()
|
|
|
|
if not isLastNode:
|
|
if isLeaf:
|
|
return err("leaf node must be last node in the proof")
|
|
else: # is extension node
|
|
if not isValidNextNode(thisNodeRlp, 1, proof[proofIdx + 1]):
|
|
return
|
|
err("hash of next node doesn't match the expected extension node hash")
|
|
of 17:
|
|
if not isLastNode:
|
|
let nextNibble = nibbles[nibbleIdx]
|
|
if nextNibble >= 16:
|
|
return err("invalid next nibble for branch node")
|
|
|
|
if not isValidNextNode(thisNodeRlp, nextNibble.int, proof[proofIdx + 1]):
|
|
return err("hash of next node doesn't match the expected branch node hash")
|
|
|
|
inc nibbleIdx
|
|
else:
|
|
return err("invalid rlp node, expected 2 or 17 elements")
|
|
except RlpError as e:
|
|
return err(e.msg)
|
|
|
|
if nibbleIdx < nibbles.len():
|
|
err("path contains more nibbles than expected for proof")
|
|
else:
|
|
ok()
|
|
|
|
proc validateRetrieval*(
|
|
key: AccountTrieNodeKey, value: AccountTrieNodeRetrieval
|
|
): Result[void, string] =
|
|
if value.node.hashEquals(key.nodeHash):
|
|
ok()
|
|
else:
|
|
err("hash of account trie node doesn't match the expected node hash")
|
|
|
|
proc validateRetrieval*(
|
|
key: ContractTrieNodeKey, value: ContractTrieNodeRetrieval
|
|
): Result[void, string] =
|
|
if value.node.hashEquals(key.nodeHash):
|
|
ok()
|
|
else:
|
|
err("hash of contract trie node doesn't match the expected node hash")
|
|
|
|
proc validateRetrieval*(
|
|
key: ContractCodeKey, value: ContractCodeRetrieval
|
|
): Result[void, string] =
|
|
if value.code.hashEquals(key.codeHash):
|
|
ok()
|
|
else:
|
|
err("hash of bytecode doesn't match the expected code hash")
|
|
|
|
proc validateOffer*(
|
|
trustedStateRoot: Opt[Hash32], key: AccountTrieNodeKey, offer: AccountTrieNodeOffer
|
|
): Result[void, string] =
|
|
?validateTrieProof(trustedStateRoot, key.path, offer.proof)
|
|
|
|
validateRetrieval(key, offer.toRetrievalValue())
|
|
|
|
proc validateOffer*(
|
|
trustedStateRoot: Opt[Hash32],
|
|
key: ContractTrieNodeKey,
|
|
offer: ContractTrieNodeOffer,
|
|
): Result[void, string] =
|
|
?validateTrieProof(
|
|
trustedStateRoot,
|
|
key.addressHash.toPath(),
|
|
offer.accountProof,
|
|
allowKeyEndInPathForLeafs = true,
|
|
)
|
|
|
|
let account = ?offer.accountProof.toAccount()
|
|
|
|
?validateTrieProof(Opt.some(account.storageRoot), key.path, offer.storageProof)
|
|
|
|
validateRetrieval(key, offer.toRetrievalValue())
|
|
|
|
proc validateOffer*(
|
|
trustedStateRoot: Opt[Hash32], key: ContractCodeKey, offer: ContractCodeOffer
|
|
): Result[void, string] =
|
|
?validateTrieProof(
|
|
trustedStateRoot,
|
|
key.addressHash.toPath(),
|
|
offer.accountProof,
|
|
allowKeyEndInPathForLeafs = true,
|
|
)
|
|
|
|
let account = ?offer.accountProof.toAccount()
|
|
if not offer.code.hashEquals(account.codeHash):
|
|
return err("hash of bytecode doesn't match the code hash in the account proof")
|
|
|
|
validateRetrieval(key, offer.toRetrievalValue())
|