mirror of
https://github.com/status-im/status-go.git
synced 2025-03-01 07:00:49 +00:00
author shashankshampi <shashank.sanket1995@gmail.com> 1729780155 +0530 committer shashankshampi <shashank.sanket1995@gmail.com> 1730274350 +0530 test: Code Migration from status-cli-tests fix_: functional tests (#5979) * fix_: generate on test-functional * chore(test)_: fix functional test assertion --------- Co-authored-by: Siddarth Kumar <siddarthkay@gmail.com> feat(accounts)_: cherry-pick Persist acceptance of Terms of Use & Privacy policy (#5766) (#5977) * feat(accounts)_: Persist acceptance of Terms of Use & Privacy policy (#5766) The original GH issue https://github.com/status-im/status-mobile/issues/21113 came from a request from the Legal team. We must show to Status v1 users the new terms (Terms of Use & Privacy Policy) right after they upgrade to Status v2 from the stores. The solution we use is to create a flag in the accounts table, named hasAcceptedTerms. The flag will be set to true on the first account ever created in v2 and we provide a native call in mobile/status.go#AcceptTerms, which allows the client to persist the user's choice in case they are upgrading (from v1 -> v2, or from a v2 older than this PR). This solution is not the best because we should store the setting in a separate table, not in the accounts table. Related Mobile PR https://github.com/status-im/status-mobile/pull/21124 * fix(test)_: Compare addresses using uppercased strings --------- Co-authored-by: Icaro Motta <icaro.ldm@gmail.com> test_: restore account (#5960) feat_: `LogOnPanic` linter (#5969) * feat_: LogOnPanic linter * fix_: add missing defer LogOnPanic * chore_: make vendor * fix_: tests, address pr comments * fix_: address pr comments fix(ci)_: remove workspace and tmp dir This ensures we do not encounter weird errors like: ``` + ln -s /home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907 /home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907@tmp/go/src/github.com/status-im/status-go ln: failed to create symbolic link '/home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907@tmp/go/src/github.com/status-im/status-go': File exists script returned exit code 1 ``` Signed-off-by: Jakub Sokołowski <jakub@status.im> chore_: enable windows and macos CI build (#5840) - Added support for Windows and macOS in CI pipelines - Added missing dependencies for Windows and x86-64-darwin - Resolved macOS SDK version compatibility for darwin-x86_64 The `mkShell` override was necessary to ensure compatibility with the newer macOS SDK (version 11.0) for x86_64. The default SDK (10.12) was causing build failures because of the missing libs and frameworks. OverrideSDK creates a mapping from the default SDK in all package categories to the requested SDK (11.0). fix(contacts)_: fix trust status not being saved to cache when changed (#5965) Fixes https://github.com/status-im/status-desktop/issues/16392 cleanup added logger and cleanup review comments changes fix_: functional tests (#5979) * fix_: generate on test-functional * chore(test)_: fix functional test assertion --------- Co-authored-by: Siddarth Kumar <siddarthkay@gmail.com> feat(accounts)_: cherry-pick Persist acceptance of Terms of Use & Privacy policy (#5766) (#5977) * feat(accounts)_: Persist acceptance of Terms of Use & Privacy policy (#5766) The original GH issue https://github.com/status-im/status-mobile/issues/21113 came from a request from the Legal team. We must show to Status v1 users the new terms (Terms of Use & Privacy Policy) right after they upgrade to Status v2 from the stores. The solution we use is to create a flag in the accounts table, named hasAcceptedTerms. The flag will be set to true on the first account ever created in v2 and we provide a native call in mobile/status.go#AcceptTerms, which allows the client to persist the user's choice in case they are upgrading (from v1 -> v2, or from a v2 older than this PR). This solution is not the best because we should store the setting in a separate table, not in the accounts table. Related Mobile PR https://github.com/status-im/status-mobile/pull/21124 * fix(test)_: Compare addresses using uppercased strings --------- Co-authored-by: Icaro Motta <icaro.ldm@gmail.com> test_: restore account (#5960) feat_: `LogOnPanic` linter (#5969) * feat_: LogOnPanic linter * fix_: add missing defer LogOnPanic * chore_: make vendor * fix_: tests, address pr comments * fix_: address pr comments chore_: enable windows and macos CI build (#5840) - Added support for Windows and macOS in CI pipelines - Added missing dependencies for Windows and x86-64-darwin - Resolved macOS SDK version compatibility for darwin-x86_64 The `mkShell` override was necessary to ensure compatibility with the newer macOS SDK (version 11.0) for x86_64. The default SDK (10.12) was causing build failures because of the missing libs and frameworks. OverrideSDK creates a mapping from the default SDK in all package categories to the requested SDK (11.0). fix(contacts)_: fix trust status not being saved to cache when changed (#5965) Fixes https://github.com/status-im/status-desktop/issues/16392 test_: remove port bind chore(wallet)_: move route execution code to separate module chore_: replace geth logger with zap logger (#5962) closes: #6002 feat(telemetry)_: add metrics for message reliability (#5899) * feat(telemetry)_: track message reliability Add metrics for dial errors, missed messages, missed relevant messages, and confirmed delivery. * fix_: handle error from json marshal chore_: use zap logger as request logger iterates: status-im/status-desktop#16536 test_: unique project per run test_: use docker compose v2, more concrete project name fix(codecov)_: ignore folders without tests Otherwise Codecov reports incorrect numbers when making changes. https://docs.codecov.com/docs/ignoring-paths Signed-off-by: Jakub Sokołowski <jakub@status.im> test_: verify schema of signals during init; fix schema verification warnings (#5947) fix_: update defaultGorushURL (#6011) fix(tests)_: use non-standard port to avoid conflicts We have observed `nimbus-eth2` build failures reporting this port: ```json { "lvl": "NTC", "ts": "2024-10-28 13:51:32.308+00:00", "msg": "REST HTTP server could not be started", "topics": "beacnde", "address": "127.0.0.1:5432", "reason": "(98) Address already in use" } ``` https://ci.status.im/job/nimbus-eth2/job/platforms/job/linux/job/x86_64/job/main/job/PR-6683/3/ Signed-off-by: Jakub Sokołowski <jakub@status.im> fix_: create request logger ad-hoc in tests Fixes `TestCall` failing when run concurrently. chore_: configure codecov (#6005) * chore_: configure codecov * fix_: after_n_builds
428 lines
12 KiB
Go
428 lines
12 KiB
Go
package collectibles
|
|
|
|
import (
|
|
"context"
|
|
"database/sql"
|
|
"errors"
|
|
"sync"
|
|
"time"
|
|
|
|
"go.uber.org/zap"
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
"github.com/ethereum/go-ethereum/event"
|
|
"github.com/status-im/status-go/logutils"
|
|
"github.com/status-im/status-go/multiaccounts/accounts"
|
|
"github.com/status-im/status-go/multiaccounts/settings"
|
|
"github.com/status-im/status-go/rpc/network"
|
|
"github.com/status-im/status-go/services/accounts/accountsevent"
|
|
"github.com/status-im/status-go/services/accounts/settingsevent"
|
|
"github.com/status-im/status-go/services/wallet/async"
|
|
walletCommon "github.com/status-im/status-go/services/wallet/common"
|
|
"github.com/status-im/status-go/services/wallet/transfer"
|
|
"github.com/status-im/status-go/services/wallet/walletevent"
|
|
)
|
|
|
|
const (
|
|
activityRefetchMarginSeconds = 30 * 60 // Trigger a fetch if activity is detected this many seconds before the last fetch
|
|
)
|
|
|
|
type commandPerChainID = map[walletCommon.ChainID]*periodicRefreshOwnedCollectiblesCommand
|
|
type commandPerAddressAndChainID = map[common.Address]commandPerChainID
|
|
|
|
type timerPerChainID = map[walletCommon.ChainID]*time.Timer
|
|
type timerPerAddressAndChainID = map[common.Address]timerPerChainID
|
|
|
|
type Controller struct {
|
|
manager *Manager
|
|
ownershipDB *OwnershipDB
|
|
walletFeed *event.Feed
|
|
accountsDB *accounts.Database
|
|
accountsFeed *event.Feed
|
|
settingsFeed *event.Feed
|
|
|
|
networkManager *network.Manager
|
|
cancelFn context.CancelFunc
|
|
|
|
commands commandPerAddressAndChainID
|
|
timers timerPerAddressAndChainID
|
|
group *async.Group
|
|
accountsWatcher *accountsevent.Watcher
|
|
walletEventsWatcher *walletevent.Watcher
|
|
settingsWatcher *settingsevent.Watcher
|
|
|
|
ownedCollectiblesChangeCb OwnedCollectiblesChangeCb
|
|
collectiblesTransferCb TransferCb
|
|
|
|
commandsLock sync.RWMutex
|
|
}
|
|
|
|
func NewController(
|
|
db *sql.DB,
|
|
walletFeed *event.Feed,
|
|
accountsDB *accounts.Database,
|
|
accountsFeed *event.Feed,
|
|
settingsFeed *event.Feed,
|
|
networkManager *network.Manager,
|
|
manager *Manager) *Controller {
|
|
return &Controller{
|
|
manager: manager,
|
|
ownershipDB: NewOwnershipDB(db),
|
|
walletFeed: walletFeed,
|
|
accountsDB: accountsDB,
|
|
accountsFeed: accountsFeed,
|
|
settingsFeed: settingsFeed,
|
|
networkManager: networkManager,
|
|
commands: make(commandPerAddressAndChainID),
|
|
timers: make(timerPerAddressAndChainID),
|
|
}
|
|
}
|
|
|
|
func (c *Controller) SetOwnedCollectiblesChangeCb(cb OwnedCollectiblesChangeCb) {
|
|
c.ownedCollectiblesChangeCb = cb
|
|
}
|
|
|
|
func (c *Controller) SetCollectiblesTransferCb(cb TransferCb) {
|
|
c.collectiblesTransferCb = cb
|
|
}
|
|
|
|
func (c *Controller) Start() {
|
|
// Setup periodical collectibles refresh
|
|
_ = c.startPeriodicalOwnershipFetch()
|
|
|
|
// Setup collectibles fetch when a new account gets added
|
|
c.startAccountsWatcher()
|
|
|
|
// Setup collectibles fetch when relevant activity is detected
|
|
c.startWalletEventsWatcher()
|
|
|
|
// Setup collectibles fetch when chain-related settings change
|
|
c.startSettingsWatcher()
|
|
}
|
|
|
|
func (c *Controller) Stop() {
|
|
c.stopSettingsWatcher()
|
|
|
|
c.stopWalletEventsWatcher()
|
|
|
|
c.stopAccountsWatcher()
|
|
|
|
c.stopPeriodicalOwnershipFetch()
|
|
}
|
|
|
|
func (c *Controller) RefetchOwnedCollectibles() {
|
|
c.stopPeriodicalOwnershipFetch()
|
|
c.manager.ResetConnectionStatus()
|
|
_ = c.startPeriodicalOwnershipFetch()
|
|
}
|
|
|
|
func (c *Controller) GetCommandState(chainID walletCommon.ChainID, address common.Address) OwnershipState {
|
|
c.commandsLock.RLock()
|
|
defer c.commandsLock.RUnlock()
|
|
|
|
state := OwnershipStateIdle
|
|
if c.commands[address] != nil && c.commands[address][chainID] != nil {
|
|
state = c.commands[address][chainID].GetState()
|
|
}
|
|
|
|
return state
|
|
}
|
|
|
|
func (c *Controller) isPeriodicalOwnershipFetchRunning() bool {
|
|
return c.group != nil
|
|
}
|
|
|
|
// Starts periodical fetching for the all wallet addresses and all chains
|
|
func (c *Controller) startPeriodicalOwnershipFetch() error {
|
|
c.commandsLock.Lock()
|
|
defer c.commandsLock.Unlock()
|
|
|
|
if c.isPeriodicalOwnershipFetchRunning() {
|
|
return nil
|
|
}
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
c.cancelFn = cancel
|
|
|
|
c.group = async.NewGroup(ctx)
|
|
|
|
addresses, err := c.accountsDB.GetWalletAddresses()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, addr := range addresses {
|
|
err := c.startPeriodicalOwnershipFetchForAccount(common.Address(addr))
|
|
if err != nil {
|
|
logutils.ZapLogger().Error("Error starting periodical collectibles fetch for accpunt", zap.Stringer("address", addr), zap.Error(err))
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *Controller) stopPeriodicalOwnershipFetch() {
|
|
c.commandsLock.Lock()
|
|
defer c.commandsLock.Unlock()
|
|
|
|
if !c.isPeriodicalOwnershipFetchRunning() {
|
|
return
|
|
}
|
|
|
|
if c.cancelFn != nil {
|
|
c.cancelFn()
|
|
c.cancelFn = nil
|
|
}
|
|
if c.group != nil {
|
|
c.group.Stop()
|
|
c.group.Wait()
|
|
c.group = nil
|
|
c.commands = make(commandPerAddressAndChainID)
|
|
}
|
|
}
|
|
|
|
// Starts (or restarts) periodical fetching for the given account address for all chains
|
|
func (c *Controller) startPeriodicalOwnershipFetchForAccount(address common.Address) error {
|
|
logutils.ZapLogger().Debug("wallet.api.collectibles.Controller Start periodical fetching", zap.Stringer("address", address))
|
|
|
|
networks, err := c.networkManager.Get(false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
areTestNetworksEnabled, err := c.accountsDB.GetTestNetworksEnabled()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, network := range networks {
|
|
if network.IsTest != areTestNetworksEnabled {
|
|
continue
|
|
}
|
|
chainID := walletCommon.ChainID(network.ChainID)
|
|
|
|
err := c.startPeriodicalOwnershipFetchForAccountAndChainID(address, chainID, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Starts (or restarts) periodical fetching for the given account address for all chains
|
|
func (c *Controller) startPeriodicalOwnershipFetchForAccountAndChainID(address common.Address, chainID walletCommon.ChainID, delayed bool) error {
|
|
logutils.ZapLogger().Debug("wallet.api.collectibles.Controller Start periodical fetching",
|
|
zap.Stringer("address", address),
|
|
zap.Stringer("chainID", chainID),
|
|
zap.Bool("delayed", delayed),
|
|
)
|
|
|
|
if !c.isPeriodicalOwnershipFetchRunning() {
|
|
return errors.New("periodical fetch not initialized")
|
|
}
|
|
|
|
err := c.stopPeriodicalOwnershipFetchForAccountAndChainID(address, chainID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if _, ok := c.commands[address]; !ok {
|
|
c.commands[address] = make(commandPerChainID)
|
|
}
|
|
|
|
command := newPeriodicRefreshOwnedCollectiblesCommand(
|
|
c.manager,
|
|
c.ownershipDB,
|
|
c.walletFeed,
|
|
chainID,
|
|
address,
|
|
c.ownedCollectiblesChangeCb,
|
|
)
|
|
|
|
c.commands[address][chainID] = command
|
|
if delayed {
|
|
c.group.Add(command.DelayedCommand())
|
|
} else {
|
|
c.group.Add(command.Command())
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Stop periodical fetching for the given account address for all chains
|
|
func (c *Controller) stopPeriodicalOwnershipFetchForAccount(address common.Address) error {
|
|
logutils.ZapLogger().Debug("wallet.api.collectibles.Controller Stop periodical fetching", zap.Stringer("address", address))
|
|
|
|
if !c.isPeriodicalOwnershipFetchRunning() {
|
|
return errors.New("periodical fetch not initialized")
|
|
}
|
|
|
|
if _, ok := c.commands[address]; ok {
|
|
for chainID := range c.commands[address] {
|
|
err := c.stopPeriodicalOwnershipFetchForAccountAndChainID(address, chainID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *Controller) stopPeriodicalOwnershipFetchForAccountAndChainID(address common.Address, chainID walletCommon.ChainID) error {
|
|
logutils.ZapLogger().Debug("wallet.api.collectibles.Controller Stop periodical fetching",
|
|
zap.Stringer("address", address),
|
|
zap.Stringer("chainID", chainID),
|
|
)
|
|
|
|
if !c.isPeriodicalOwnershipFetchRunning() {
|
|
return errors.New("periodical fetch not initialized")
|
|
}
|
|
|
|
if _, ok := c.commands[address]; ok {
|
|
if _, ok := c.commands[address][chainID]; ok {
|
|
c.commands[address][chainID].Stop()
|
|
delete(c.commands[address], chainID)
|
|
}
|
|
// If it was the last chain, delete the address as well
|
|
if len(c.commands[address]) == 0 {
|
|
delete(c.commands, address)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *Controller) startAccountsWatcher() {
|
|
if c.accountsWatcher != nil {
|
|
return
|
|
}
|
|
|
|
accountChangeCb := func(changedAddresses []common.Address, eventType accountsevent.EventType, currentAddresses []common.Address) {
|
|
c.commandsLock.Lock()
|
|
defer c.commandsLock.Unlock()
|
|
// Whenever an account gets added, start fetching
|
|
if eventType == accountsevent.EventTypeAdded {
|
|
for _, address := range changedAddresses {
|
|
err := c.startPeriodicalOwnershipFetchForAccount(address)
|
|
if err != nil {
|
|
logutils.ZapLogger().Error("Error starting periodical collectibles fetch", zap.Stringer("address", address), zap.Error(err))
|
|
}
|
|
}
|
|
} else if eventType == accountsevent.EventTypeRemoved {
|
|
for _, address := range changedAddresses {
|
|
err := c.stopPeriodicalOwnershipFetchForAccount(address)
|
|
if err != nil {
|
|
logutils.ZapLogger().Error("Error starting periodical collectibles fetch", zap.Stringer("address", address), zap.Error(err))
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
c.accountsWatcher = accountsevent.NewWatcher(c.accountsDB, c.accountsFeed, accountChangeCb)
|
|
|
|
c.accountsWatcher.Start()
|
|
}
|
|
|
|
func (c *Controller) stopAccountsWatcher() {
|
|
if c.accountsWatcher != nil {
|
|
c.accountsWatcher.Stop()
|
|
c.accountsWatcher = nil
|
|
}
|
|
}
|
|
|
|
func (c *Controller) startWalletEventsWatcher() {
|
|
if c.walletEventsWatcher != nil {
|
|
return
|
|
}
|
|
|
|
walletEventCb := func(event walletevent.Event) {
|
|
// EventRecentHistoryReady ?
|
|
if event.Type != transfer.EventInternalERC721TransferDetected &&
|
|
event.Type != transfer.EventInternalERC1155TransferDetected {
|
|
return
|
|
}
|
|
|
|
chainID := walletCommon.ChainID(event.ChainID)
|
|
for _, account := range event.Accounts {
|
|
// Call external callback
|
|
if c.collectiblesTransferCb != nil {
|
|
c.collectiblesTransferCb(account, chainID, event.EventParams.([]transfer.Transfer))
|
|
}
|
|
|
|
c.refetchOwnershipIfRecentTransfer(account, chainID, event.At)
|
|
}
|
|
}
|
|
|
|
c.walletEventsWatcher = walletevent.NewWatcher(c.walletFeed, walletEventCb)
|
|
|
|
c.walletEventsWatcher.Start()
|
|
}
|
|
|
|
func (c *Controller) stopWalletEventsWatcher() {
|
|
if c.walletEventsWatcher != nil {
|
|
c.walletEventsWatcher.Stop()
|
|
c.walletEventsWatcher = nil
|
|
}
|
|
}
|
|
|
|
func (c *Controller) startSettingsWatcher() {
|
|
if c.settingsWatcher != nil {
|
|
return
|
|
}
|
|
|
|
settingChangeCb := func(setting settings.SettingField, value interface{}) {
|
|
if setting.Equals(settings.TestNetworksEnabled) {
|
|
c.stopPeriodicalOwnershipFetch()
|
|
err := c.startPeriodicalOwnershipFetch()
|
|
if err != nil {
|
|
logutils.ZapLogger().Error("Error starting periodical collectibles fetch", zap.Error(err))
|
|
}
|
|
}
|
|
}
|
|
|
|
c.settingsWatcher = settingsevent.NewWatcher(c.settingsFeed, settingChangeCb)
|
|
|
|
c.settingsWatcher.Start()
|
|
}
|
|
|
|
func (c *Controller) stopSettingsWatcher() {
|
|
if c.settingsWatcher != nil {
|
|
c.settingsWatcher.Stop()
|
|
c.settingsWatcher = nil
|
|
}
|
|
}
|
|
|
|
func (c *Controller) refetchOwnershipIfRecentTransfer(account common.Address, chainID walletCommon.ChainID, latestTxTimestamp int64) {
|
|
|
|
// Check last ownership update timestamp
|
|
timestamp, err := c.ownershipDB.GetOwnershipUpdateTimestamp(account, chainID)
|
|
|
|
if err != nil {
|
|
logutils.ZapLogger().Error("Error getting ownership update timestamp", zap.Error(err))
|
|
return
|
|
}
|
|
if timestamp == InvalidTimestamp {
|
|
// Ownership was never fetched for this account
|
|
return
|
|
}
|
|
|
|
timeCheck := timestamp - activityRefetchMarginSeconds
|
|
if timeCheck < 0 {
|
|
timeCheck = 0
|
|
}
|
|
|
|
if latestTxTimestamp > timeCheck {
|
|
// Restart fetching for account + chainID
|
|
c.commandsLock.Lock()
|
|
err := c.startPeriodicalOwnershipFetchForAccountAndChainID(account, chainID, true)
|
|
c.commandsLock.Unlock()
|
|
if err != nil {
|
|
logutils.ZapLogger().Error("Error starting periodical collectibles fetch", zap.Stringer("address", account), zap.Error(err))
|
|
}
|
|
}
|
|
}
|