mirror of
https://github.com/status-im/status-go.git
synced 2025-02-09 05:16:35 +00:00
author shashankshampi <shashank.sanket1995@gmail.com> 1729780155 +0530 committer shashankshampi <shashank.sanket1995@gmail.com> 1730274350 +0530 test: Code Migration from status-cli-tests fix_: functional tests (#5979) * fix_: generate on test-functional * chore(test)_: fix functional test assertion --------- Co-authored-by: Siddarth Kumar <siddarthkay@gmail.com> feat(accounts)_: cherry-pick Persist acceptance of Terms of Use & Privacy policy (#5766) (#5977) * feat(accounts)_: Persist acceptance of Terms of Use & Privacy policy (#5766) The original GH issue https://github.com/status-im/status-mobile/issues/21113 came from a request from the Legal team. We must show to Status v1 users the new terms (Terms of Use & Privacy Policy) right after they upgrade to Status v2 from the stores. The solution we use is to create a flag in the accounts table, named hasAcceptedTerms. The flag will be set to true on the first account ever created in v2 and we provide a native call in mobile/status.go#AcceptTerms, which allows the client to persist the user's choice in case they are upgrading (from v1 -> v2, or from a v2 older than this PR). This solution is not the best because we should store the setting in a separate table, not in the accounts table. Related Mobile PR https://github.com/status-im/status-mobile/pull/21124 * fix(test)_: Compare addresses using uppercased strings --------- Co-authored-by: Icaro Motta <icaro.ldm@gmail.com> test_: restore account (#5960) feat_: `LogOnPanic` linter (#5969) * feat_: LogOnPanic linter * fix_: add missing defer LogOnPanic * chore_: make vendor * fix_: tests, address pr comments * fix_: address pr comments fix(ci)_: remove workspace and tmp dir This ensures we do not encounter weird errors like: ``` + ln -s /home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907 /home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907@tmp/go/src/github.com/status-im/status-go ln: failed to create symbolic link '/home/jenkins/workspace/go_prs_linux_x86_64_main_PR-5907@tmp/go/src/github.com/status-im/status-go': File exists script returned exit code 1 ``` Signed-off-by: Jakub Sokołowski <jakub@status.im> chore_: enable windows and macos CI build (#5840) - Added support for Windows and macOS in CI pipelines - Added missing dependencies for Windows and x86-64-darwin - Resolved macOS SDK version compatibility for darwin-x86_64 The `mkShell` override was necessary to ensure compatibility with the newer macOS SDK (version 11.0) for x86_64. The default SDK (10.12) was causing build failures because of the missing libs and frameworks. OverrideSDK creates a mapping from the default SDK in all package categories to the requested SDK (11.0). fix(contacts)_: fix trust status not being saved to cache when changed (#5965) Fixes https://github.com/status-im/status-desktop/issues/16392 cleanup added logger and cleanup review comments changes fix_: functional tests (#5979) * fix_: generate on test-functional * chore(test)_: fix functional test assertion --------- Co-authored-by: Siddarth Kumar <siddarthkay@gmail.com> feat(accounts)_: cherry-pick Persist acceptance of Terms of Use & Privacy policy (#5766) (#5977) * feat(accounts)_: Persist acceptance of Terms of Use & Privacy policy (#5766) The original GH issue https://github.com/status-im/status-mobile/issues/21113 came from a request from the Legal team. We must show to Status v1 users the new terms (Terms of Use & Privacy Policy) right after they upgrade to Status v2 from the stores. The solution we use is to create a flag in the accounts table, named hasAcceptedTerms. The flag will be set to true on the first account ever created in v2 and we provide a native call in mobile/status.go#AcceptTerms, which allows the client to persist the user's choice in case they are upgrading (from v1 -> v2, or from a v2 older than this PR). This solution is not the best because we should store the setting in a separate table, not in the accounts table. Related Mobile PR https://github.com/status-im/status-mobile/pull/21124 * fix(test)_: Compare addresses using uppercased strings --------- Co-authored-by: Icaro Motta <icaro.ldm@gmail.com> test_: restore account (#5960) feat_: `LogOnPanic` linter (#5969) * feat_: LogOnPanic linter * fix_: add missing defer LogOnPanic * chore_: make vendor * fix_: tests, address pr comments * fix_: address pr comments chore_: enable windows and macos CI build (#5840) - Added support for Windows and macOS in CI pipelines - Added missing dependencies for Windows and x86-64-darwin - Resolved macOS SDK version compatibility for darwin-x86_64 The `mkShell` override was necessary to ensure compatibility with the newer macOS SDK (version 11.0) for x86_64. The default SDK (10.12) was causing build failures because of the missing libs and frameworks. OverrideSDK creates a mapping from the default SDK in all package categories to the requested SDK (11.0). fix(contacts)_: fix trust status not being saved to cache when changed (#5965) Fixes https://github.com/status-im/status-desktop/issues/16392 test_: remove port bind chore(wallet)_: move route execution code to separate module chore_: replace geth logger with zap logger (#5962) closes: #6002 feat(telemetry)_: add metrics for message reliability (#5899) * feat(telemetry)_: track message reliability Add metrics for dial errors, missed messages, missed relevant messages, and confirmed delivery. * fix_: handle error from json marshal chore_: use zap logger as request logger iterates: status-im/status-desktop#16536 test_: unique project per run test_: use docker compose v2, more concrete project name fix(codecov)_: ignore folders without tests Otherwise Codecov reports incorrect numbers when making changes. https://docs.codecov.com/docs/ignoring-paths Signed-off-by: Jakub Sokołowski <jakub@status.im> test_: verify schema of signals during init; fix schema verification warnings (#5947) fix_: update defaultGorushURL (#6011) fix(tests)_: use non-standard port to avoid conflicts We have observed `nimbus-eth2` build failures reporting this port: ```json { "lvl": "NTC", "ts": "2024-10-28 13:51:32.308+00:00", "msg": "REST HTTP server could not be started", "topics": "beacnde", "address": "127.0.0.1:5432", "reason": "(98) Address already in use" } ``` https://ci.status.im/job/nimbus-eth2/job/platforms/job/linux/job/x86_64/job/main/job/PR-6683/3/ Signed-off-by: Jakub Sokołowski <jakub@status.im> fix_: create request logger ad-hoc in tests Fixes `TestCall` failing when run concurrently. chore_: configure codecov (#6005) * chore_: configure codecov * fix_: after_n_builds
325 lines
10 KiB
Go
325 lines
10 KiB
Go
package balancefetcher
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"math/big"
|
|
"sync"
|
|
"time"
|
|
|
|
"go.uber.org/zap"
|
|
|
|
"github.com/ethereum/go-ethereum/accounts/abi/bind"
|
|
"github.com/ethereum/go-ethereum/common"
|
|
"github.com/ethereum/go-ethereum/common/hexutil"
|
|
"github.com/status-im/status-go/contracts"
|
|
"github.com/status-im/status-go/contracts/ethscan"
|
|
"github.com/status-im/status-go/contracts/ierc20"
|
|
"github.com/status-im/status-go/logutils"
|
|
"github.com/status-im/status-go/rpc/chain"
|
|
"github.com/status-im/status-go/services/wallet/async"
|
|
)
|
|
|
|
var NativeChainAddress = common.HexToAddress("0x")
|
|
var requestTimeout = 20 * time.Second
|
|
|
|
const (
|
|
tokenChunkSize = 500
|
|
)
|
|
|
|
type BalanceFetcher interface {
|
|
GetTokenBalanceAt(ctx context.Context, client chain.ClientInterface, account common.Address, token common.Address, blockNumber *big.Int) (*big.Int, error)
|
|
GetBalancesAtByChain(parent context.Context, clients map[uint64]chain.ClientInterface, accounts, tokens []common.Address, atBlocks map[uint64]*big.Int) (map[uint64]map[common.Address]map[common.Address]*hexutil.Big, error)
|
|
GetBalancesByChain(parent context.Context, clients map[uint64]chain.ClientInterface, accounts, tokens []common.Address) (map[uint64]map[common.Address]map[common.Address]*hexutil.Big, error)
|
|
GetBalance(ctx context.Context, client chain.ClientInterface, account common.Address, token common.Address) (*big.Int, error)
|
|
GetChainBalance(ctx context.Context, client chain.ClientInterface, account common.Address) (*big.Int, error)
|
|
}
|
|
|
|
type DefaultBalanceFetcher struct {
|
|
contractMaker contracts.ContractMakerIface
|
|
}
|
|
|
|
func NewDefaultBalanceFetcher(contractMaker contracts.ContractMakerIface) *DefaultBalanceFetcher {
|
|
return &DefaultBalanceFetcher{
|
|
contractMaker: contractMaker,
|
|
}
|
|
}
|
|
|
|
func (bf *DefaultBalanceFetcher) fetchBalancesForChain(parent context.Context, client chain.ClientInterface, accounts, tokens []common.Address, atBlock *big.Int) (map[common.Address]map[common.Address]*hexutil.Big, error) {
|
|
var (
|
|
group = async.NewAtomicGroup(parent)
|
|
mu sync.Mutex
|
|
)
|
|
|
|
balances := make(map[common.Address]map[common.Address]*hexutil.Big)
|
|
updateBalance := func(accTokenBalance map[common.Address]map[common.Address]*hexutil.Big) {
|
|
mu.Lock()
|
|
defer mu.Unlock()
|
|
|
|
for account, tokenBalance := range accTokenBalance {
|
|
if _, ok := balances[account]; !ok {
|
|
balances[account] = make(map[common.Address]*hexutil.Big)
|
|
}
|
|
|
|
for token, balance := range tokenBalance {
|
|
balances[account][token] = balance
|
|
}
|
|
}
|
|
}
|
|
|
|
ethScanContract, availableAtBlock, err := bf.contractMaker.NewEthScan(client.NetworkID())
|
|
if err != nil {
|
|
logutils.ZapLogger().Error("error scanning contract", zap.Error(err))
|
|
return nil, err
|
|
}
|
|
|
|
fetchChainBalance := false
|
|
|
|
for _, token := range tokens {
|
|
if token == NativeChainAddress {
|
|
fetchChainBalance = true
|
|
}
|
|
}
|
|
if fetchChainBalance {
|
|
group.Add(func(parent context.Context) error {
|
|
balances, err := bf.FetchChainBalances(parent, accounts, ethScanContract, atBlock)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
updateBalance(balances)
|
|
return nil
|
|
})
|
|
}
|
|
|
|
tokenChunks := splitTokensToChunks(tokens, tokenChunkSize)
|
|
for accountIdx := range accounts {
|
|
// Keep the reference to the account. DO NOT USE A LOOP, the account will be overridden in the coroutine
|
|
account := accounts[accountIdx]
|
|
for idx := range tokenChunks {
|
|
// Keep the reference to the chunk. DO NOT USE A LOOP, the chunk will be overridden in the coroutine
|
|
chunk := tokenChunks[idx]
|
|
|
|
group.Add(func(parent context.Context) error {
|
|
ctx, cancel := context.WithTimeout(parent, requestTimeout)
|
|
defer cancel()
|
|
|
|
var accTokenBalance map[common.Address]map[common.Address]*hexutil.Big
|
|
var err error
|
|
if atBlock == nil || big.NewInt(int64(availableAtBlock)).Cmp(atBlock) < 0 {
|
|
accTokenBalance, err = bf.FetchTokenBalancesWithScanContract(ctx, ethScanContract, account, chunk, atBlock)
|
|
} else {
|
|
accTokenBalance, err = bf.fetchTokenBalancesWithTokenContracts(ctx, client, account, chunk, atBlock)
|
|
}
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
updateBalance(accTokenBalance)
|
|
return nil
|
|
})
|
|
}
|
|
}
|
|
|
|
select {
|
|
case <-group.WaitAsync():
|
|
case <-parent.Done():
|
|
return nil, parent.Err()
|
|
}
|
|
return balances, group.Error()
|
|
}
|
|
|
|
func (bf *DefaultBalanceFetcher) FetchChainBalances(parent context.Context, accounts []common.Address, ethScanContract ethscan.BalanceScannerIface, atBlock *big.Int) (map[common.Address]map[common.Address]*hexutil.Big, error) {
|
|
accTokenBalance := make(map[common.Address]map[common.Address]*hexutil.Big)
|
|
|
|
ctx, cancel := context.WithTimeout(parent, requestTimeout)
|
|
defer cancel()
|
|
|
|
res, err := ethScanContract.EtherBalances(&bind.CallOpts{
|
|
Context: ctx,
|
|
BlockNumber: atBlock,
|
|
}, accounts)
|
|
if err != nil {
|
|
logutils.ZapLogger().Error("can't fetch chain balance 5", zap.Error(err))
|
|
return nil, err
|
|
}
|
|
for idx, account := range accounts {
|
|
balance := new(big.Int)
|
|
balance.SetBytes(res[idx].Data)
|
|
|
|
if _, ok := accTokenBalance[account]; !ok {
|
|
accTokenBalance[account] = make(map[common.Address]*hexutil.Big)
|
|
}
|
|
|
|
accTokenBalance[account][NativeChainAddress] = (*hexutil.Big)(balance)
|
|
}
|
|
|
|
return accTokenBalance, nil
|
|
}
|
|
|
|
func (bf *DefaultBalanceFetcher) FetchTokenBalancesWithScanContract(ctx context.Context, ethScanContract ethscan.BalanceScannerIface, account common.Address, chunk []common.Address, atBlock *big.Int) (map[common.Address]map[common.Address]*hexutil.Big, error) {
|
|
accTokenBalance := make(map[common.Address]map[common.Address]*hexutil.Big)
|
|
res, err := ethScanContract.TokensBalance(&bind.CallOpts{
|
|
Context: ctx,
|
|
BlockNumber: atBlock,
|
|
}, account, chunk)
|
|
if err != nil {
|
|
logutils.ZapLogger().Error("can't fetch erc20 token balance 6", zap.Stringer("account", account), zap.Error(err))
|
|
return nil, err
|
|
}
|
|
|
|
if len(res) != len(chunk) {
|
|
logutils.ZapLogger().Error("can't fetch erc20 token balance 7",
|
|
zap.Stringer("account", account),
|
|
zap.Error(errors.New("response not complete")),
|
|
zap.Int("expected", len(chunk)),
|
|
zap.Int("got", len(res)),
|
|
)
|
|
return nil, errors.New("response not complete")
|
|
}
|
|
|
|
for idx, token := range chunk {
|
|
if !res[idx].Success {
|
|
continue
|
|
}
|
|
balance := new(big.Int)
|
|
balance.SetBytes(res[idx].Data)
|
|
|
|
if _, ok := accTokenBalance[account]; !ok {
|
|
accTokenBalance[account] = make(map[common.Address]*hexutil.Big)
|
|
}
|
|
|
|
accTokenBalance[account][token] = (*hexutil.Big)(balance)
|
|
}
|
|
return accTokenBalance, nil
|
|
}
|
|
|
|
func (bf *DefaultBalanceFetcher) fetchTokenBalancesWithTokenContracts(ctx context.Context, client chain.ClientInterface, account common.Address, chunk []common.Address, atBlock *big.Int) (map[common.Address]map[common.Address]*hexutil.Big, error) {
|
|
accTokenBalance := make(map[common.Address]map[common.Address]*hexutil.Big)
|
|
for _, token := range chunk {
|
|
balance, err := bf.GetTokenBalanceAt(ctx, client, account, token, atBlock)
|
|
if err != nil {
|
|
if err != bind.ErrNoCode {
|
|
logutils.ZapLogger().Error("can't fetch erc20 token balance 8",
|
|
zap.Stringer("account", account),
|
|
zap.Stringer("token", token),
|
|
zap.Error(errors.New("on fetching token balance")),
|
|
)
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
if _, ok := accTokenBalance[account]; !ok {
|
|
accTokenBalance[account] = make(map[common.Address]*hexutil.Big)
|
|
}
|
|
|
|
accTokenBalance[account][token] = (*hexutil.Big)(balance)
|
|
}
|
|
|
|
return accTokenBalance, nil
|
|
}
|
|
|
|
func (bf *DefaultBalanceFetcher) GetTokenBalanceAt(ctx context.Context, client chain.ClientInterface, account common.Address, token common.Address, blockNumber *big.Int) (*big.Int, error) {
|
|
caller, err := bf.contractMaker.NewERC20Caller(client.NetworkID(), token)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
balance, err := caller.BalanceOf(&bind.CallOpts{
|
|
Context: ctx,
|
|
BlockNumber: blockNumber,
|
|
}, account)
|
|
|
|
if err != nil {
|
|
if err != bind.ErrNoCode {
|
|
return nil, err
|
|
}
|
|
balance = big.NewInt(0)
|
|
}
|
|
|
|
return balance, nil
|
|
}
|
|
|
|
func splitTokensToChunks(tokens []common.Address, chunkSize int) [][]common.Address {
|
|
tokenChunks := make([][]common.Address, 0)
|
|
for i := 0; i < len(tokens); i += chunkSize {
|
|
end := i + chunkSize
|
|
if end > len(tokens) {
|
|
end = len(tokens)
|
|
}
|
|
|
|
tokenChunks = append(tokenChunks, tokens[i:end])
|
|
}
|
|
|
|
return tokenChunks
|
|
}
|
|
|
|
func (tm *DefaultBalanceFetcher) GetTokenBalance(ctx context.Context, client chain.ClientInterface, account common.Address, token common.Address) (*big.Int, error) {
|
|
caller, err := ierc20.NewIERC20Caller(token, client)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return caller.BalanceOf(&bind.CallOpts{
|
|
Context: ctx,
|
|
}, account)
|
|
}
|
|
|
|
func (bf *DefaultBalanceFetcher) GetChainBalance(ctx context.Context, client chain.ClientInterface, account common.Address) (*big.Int, error) {
|
|
return client.BalanceAt(ctx, account, nil)
|
|
}
|
|
|
|
func (bf *DefaultBalanceFetcher) GetBalance(ctx context.Context, client chain.ClientInterface, account common.Address, token common.Address) (*big.Int, error) {
|
|
if token == NativeChainAddress {
|
|
return bf.GetChainBalance(ctx, client, account)
|
|
}
|
|
|
|
return bf.GetTokenBalance(ctx, client, account, token)
|
|
}
|
|
|
|
func (bf *DefaultBalanceFetcher) GetBalancesByChain(parent context.Context, clients map[uint64]chain.ClientInterface, accounts, tokens []common.Address) (map[uint64]map[common.Address]map[common.Address]*hexutil.Big, error) {
|
|
return bf.GetBalancesAtByChain(parent, clients, accounts, tokens, nil)
|
|
}
|
|
|
|
func (bf *DefaultBalanceFetcher) GetBalancesAtByChain(parent context.Context, clients map[uint64]chain.ClientInterface, accounts, tokens []common.Address, atBlocks map[uint64]*big.Int) (map[uint64]map[common.Address]map[common.Address]*hexutil.Big, error) {
|
|
var (
|
|
group = async.NewAtomicGroup(parent)
|
|
mu sync.Mutex
|
|
response = map[uint64]map[common.Address]map[common.Address]*hexutil.Big{}
|
|
)
|
|
|
|
updateBalance := func(chainID uint64, accTokenBalance map[common.Address]map[common.Address]*hexutil.Big) {
|
|
mu.Lock()
|
|
defer mu.Unlock()
|
|
|
|
if _, ok := response[chainID]; !ok {
|
|
response[chainID] = map[common.Address]map[common.Address]*hexutil.Big{}
|
|
}
|
|
|
|
for account, tokenBalance := range accTokenBalance {
|
|
response[chainID][account] = tokenBalance
|
|
}
|
|
}
|
|
|
|
for clientIdx := range clients {
|
|
// Keep the reference to the client. DO NOT USE A LOOP, the client will be overridden in the coroutine
|
|
client := clients[clientIdx]
|
|
|
|
group.Add(func(parent context.Context) error {
|
|
balances, err := bf.fetchBalancesForChain(parent, client, accounts, tokens, atBlocks[client.NetworkID()])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
updateBalance(client.NetworkID(), balances)
|
|
return nil
|
|
})
|
|
}
|
|
select {
|
|
case <-group.WaitAsync():
|
|
case <-parent.Done():
|
|
return nil, parent.Err()
|
|
}
|
|
return response, nil
|
|
}
|