-
Notifications
You must be signed in to change notification settings - Fork 178
/
engine.go
625 lines (531 loc) · 20.7 KB
/
engine.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
package match
import (
"context"
"errors"
"fmt"
"math/rand"
"time"
"github.com/opentracing/opentracing-go"
"github.com/rs/zerolog"
"github.com/onflow/flow-go/engine"
"github.com/onflow/flow-go/model/chunks"
"github.com/onflow/flow-go/model/flow"
"github.com/onflow/flow-go/model/messages"
"github.com/onflow/flow-go/model/verification"
"github.com/onflow/flow-go/module"
"github.com/onflow/flow-go/module/mempool"
"github.com/onflow/flow-go/module/trace"
"github.com/onflow/flow-go/network"
"github.com/onflow/flow-go/state"
"github.com/onflow/flow-go/state/protocol"
"github.com/onflow/flow-go/storage"
"github.com/onflow/flow-go/utils/logging"
)
// Engine takes processable execution results, finds the chunks the are assigned to me, fetches
// the chunk data pack from execution nodes, and passes verifiable chunks to Verifier engine
type Engine struct {
unit *engine.Unit
log zerolog.Logger
metrics module.VerificationMetrics
tracer module.Tracer
me module.Local
results mempool.ResultDataPacks // used to store all the execution results along with their senders
chunkIdsByResult mempool.IdentifierMap // used as a tracker to stratify assigned chunkId based on result id
verifier network.Engine // the verifier engine
assigner module.ChunkAssigner // used to determine chunks this node needs to verify
state protocol.State // used to verify the request origin
pendingChunks *Chunks // used to store all the pending chunks that assigned to this node
con network.Conduit // used to send the chunk data request
headers storage.Headers // used to fetch the block header when chunk data is ready to be verified
retryInterval time.Duration // determines time in milliseconds for retrying chunk data requests
maxAttempt int // max time of retries to fetch the chunk data pack for a chunk
}
func New(
log zerolog.Logger,
metrics module.VerificationMetrics,
tracer module.Tracer,
net module.Network,
me module.Local,
results mempool.ResultDataPacks,
chunkIdsByResult mempool.IdentifierMap,
verifier network.Engine,
assigner module.ChunkAssigner,
state protocol.State,
chunks *Chunks,
headers storage.Headers,
retryInterval time.Duration,
maxAttempt int,
) (*Engine, error) {
e := &Engine{
unit: engine.NewUnit(),
metrics: metrics,
tracer: tracer,
log: log.With().Str("engine", "match").Logger(),
me: me,
results: results,
chunkIdsByResult: chunkIdsByResult,
verifier: verifier,
assigner: assigner,
state: state,
pendingChunks: chunks,
headers: headers,
retryInterval: retryInterval,
maxAttempt: maxAttempt,
}
if maxAttempt == 0 {
return nil, fmt.Errorf("max retry can not be 0")
}
con, err := net.Register(engine.RequestChunks, e)
if err != nil {
return nil, fmt.Errorf("could not register chunk data pack provider engine: %w", err)
}
e.con = con
return e, nil
}
// Ready initializes the engine and returns a channel that is closed when the initialization is done
func (e *Engine) Ready() <-chan struct{} {
delay := time.Duration(0)
// run a periodic check to retry requesting chunk data packs for chunks that assigned to me.
// if onTimer takes longer than retryInterval, the next call will be blocked until the previous
// call has finished.
// That being said, there won't be two onTimer running in parallel. See test cases for LaunchPeriodically
e.unit.LaunchPeriodically(e.onTimer, e.retryInterval, delay)
return e.unit.Ready()
}
// Done terminates the engine and returns a channel that is closed when the termination is done
func (e *Engine) Done() <-chan struct{} {
return e.unit.Done()
}
// SubmitLocal submits an event originating on the local node.
func (e *Engine) SubmitLocal(event interface{}) {
e.Submit(e.me.NodeID(), event)
}
// Submit submits the given event from the node with the given origin ID
// for processing in a non-blocking manner. It returns instantly and logs
// a potential processing error internally when done.
func (e *Engine) Submit(originID flow.Identifier, event interface{}) {
e.unit.Launch(func() {
err := e.Process(originID, event)
if err != nil {
engine.LogError(e.log, err)
}
})
}
// ProcessLocal processes an event originating on the local node.
// Note: this method is required as an Engine implementation,
// however it should not be invoked as match engine requires origin ID of events
// it receives. Use Process method instead.
func (e *Engine) ProcessLocal(event interface{}) error {
return fmt.Errorf("should not invoke ProcessLocal of Match engine, use Process instead")
}
// Process processes the given event from the node with the given origin ID in
// a blocking manner. It returns the potential processing error when done.
func (e *Engine) Process(originID flow.Identifier, event interface{}) error {
return e.unit.Do(func() error {
return e.process(originID, event)
})
}
// process receives and submits an event to the engine for processing.
// It returns an error so the engine will not propagate an event unless
// it is successfully processed by the engine.
// The origin ID indicates the node which originally submitted the event to
// the peer-to-peer network.
func (e *Engine) process(originID flow.Identifier, event interface{}) error {
var err error
switch resource := event.(type) {
case *flow.ExecutionResult:
err = e.handleExecutionResult(originID, resource)
case *messages.ChunkDataResponse:
err = e.handleChunkDataPack(originID, &resource.ChunkDataPack, &resource.Collection)
default:
return fmt.Errorf("invalid event type (%T)", event)
}
if err != nil {
// logs the error instead of returning that.
// returning error would be projected at a higher level by network layer.
// however, this is an engine-level error, and not network layer error.
e.log.Debug().Err(err).Msg("engine could not process event successfully")
}
return nil
}
// handleExecutionResult takes a execution result and finds chunks that are assigned to this
// verification node and adds them to the pending chunk list to be processed.
// It stores the result in memory, in order to check if a chunk still needs to be processed.
// Note: it does not deduplicate the execution results as it assumes that the Finder engine passes each result only
// once to it.
func (e *Engine) handleExecutionResult(originID flow.Identifier, result *flow.ExecutionResult) error {
resultID := result.ID()
blockID := result.BlockID
// metrics
//
// traces running time
span := e.tracer.StartSpan(resultID, trace.VERProcessExecutionResult)
span.SetTag("execution_result_id", resultID)
ctx := opentracing.ContextWithSpan(context.Background(), span)
childSpan, ctx := e.tracer.StartSpanFromContext(ctx, trace.VERMatchHandleExecutionResult)
defer childSpan.Finish()
// monitoring: increases number of received execution results
e.metrics.OnExecutionResultReceived()
// if result has already been sealed, then not to verify this result, nor fetching chunk
// data pack for this block
lastSealed, err := e.state.Sealed().Head()
if err != nil {
return fmt.Errorf("could not get last sealed height: %w", err)
}
header, err := e.headers.ByBlockID(blockID)
if err != nil {
return fmt.Errorf("could not get block by height: %w", err)
}
isResultSealed := header.Height <= lastSealed.Height
// isResultSealed :=
log := e.log.With().
Hex("originID", logging.ID(originID)).
Hex("result_id", logging.ID(resultID)).
Hex("block_id", logging.ID(blockID)).
Int("total_chunks", len(result.Chunks)).
Uint64("height", header.Height).
Bool("sealed", isResultSealed).
Logger()
log.Info().Msg("execution result arrived")
if isResultSealed {
return nil
}
// different execution results can be chunked in parallel
// chunk assignment requires the randomness from the child block of the block that includes the result.
// we assume the block that includes the result has been finalized, so there is no ambiguity for randomness.
// for instance, when handling result `er_A`, we assume the receipt `er_A_1` included in `B` has been finalized,
// and the randomness will be from `C`. And the result in `er_A_2` belongs to a different fork, which never
// gets finalized
// A <- B (er_A_1) (finalized) <- C <- D <- E
// ^-- G (er_A_2)
chunks, err := e.myChunkAssignments(ctx, result)
if state.IsNoValidChildBlockError(err) {
// This is a special sentinel error that just means we need to wait for
// the child block
log.Debug().Msg(fmt.Sprintf("could not calculate chunk assignment: %v", err))
return nil
}
if err != nil {
return fmt.Errorf("could not find my chunk assignments: %w", err)
}
log.Info().
Int("total_assigned_chunks", len(chunks)).
Uints64("assigned_chunks_indices", chunks.Indices()).
Msg("chunk assignment done")
if len(chunks) == 0 {
// no chunk is assigned to this verification node
return nil
}
// stores the result as a result data pack in the mempool
// and only store it if there is at least one chunk assigned to me
rdp := &verification.ResultDataPack{
ExecutorID: originID,
ExecutionResult: result,
}
if ok := e.results.Add(rdp); !ok {
log.Debug().Msg("could not add result to results mempool")
return nil
}
// handles the assigned chunks
for _, chunk := range chunks {
e.handleChunk(chunk, resultID, originID)
}
log.Debug().
Int("total_assigned_chunks", len(chunks)).
Uint("total_pending_chunks", e.pendingChunks.Size()).
Msg("finish processing execution result")
return nil
}
// myChunkAssignments returns the list of chunks in the chunk list that this
// verification node is assigned to.
func (e *Engine) myChunkAssignments(ctx context.Context, result *flow.ExecutionResult) (flow.ChunkList, error) {
var span opentracing.Span
span, _ = e.tracer.StartSpanFromContext(ctx, trace.VERMatchMyChunkAssignments)
defer span.Finish()
// TODO: As a temporary shortcut, we can just use the block the Execution receipt is for, i.e. blockID = result.BlockID
// However, in the full protocol, blockID is the first block in its fork, which references an
// Execution Receipt with an Execution Result identical to result. (were blockID != result.BlockID)
assignment, err := e.assigner.Assign(result, result.BlockID)
if err != nil {
return nil, err
}
mine, err := myChunks(e.me.NodeID(), assignment, result.Chunks)
if err != nil {
return nil, fmt.Errorf("could not determine my assignments: %w", err)
}
return mine, nil
}
func myChunks(myID flow.Identifier, assignment *chunks.Assignment, chunks flow.ChunkList) (flow.ChunkList, error) {
// indices of chunks assigned to verifier
chunkIndices := assignment.ByNodeID(myID)
// chunks keeps the list of chunks assigned to the verifier
myChunks := make(flow.ChunkList, 0, len(chunkIndices))
for _, index := range chunkIndices {
chunk, ok := chunks.ByIndex(index)
if !ok {
return nil, fmt.Errorf("chunk out of range requested: %v", index)
}
myChunks = append(myChunks, chunk)
}
return myChunks, nil
}
// onTimer runs periodically, it goes through all pending chunks, and fetches
// its chunk data pack.
// it also retries the chunk data request if the data hasn't been received
// for a while.
func (e *Engine) onTimer() {
allChunks := e.pendingChunks.All()
now := time.Now()
e.log.Debug().Int("total", len(allChunks)).Msg("start processing all pending pendingChunks")
sealed, err := e.state.Sealed().Head()
if err != nil {
e.log.Error().Err(err).Msg("could not get sealed height when calling onTimer")
return
}
sealedHeight := sealed.Height
defer e.log.Debug().
Int("processed", len(allChunks)-int(e.pendingChunks.Size())).
Uint("left", e.pendingChunks.Size()).
Dur("duration", time.Since(now)).
Msg("finish processing all pending pendingChunks")
for _, chunk := range allChunks {
chunkID := chunk.ID()
log := e.log.With().
Hex("block_id", logging.ID(chunk.Chunk.BlockID)).
Hex("result_id", logging.ID(chunk.ExecutionResultID)).
Hex("chunk_id", logging.ID(chunkID)).
Uint64("chunk_index", chunk.Chunk.Index).
Logger()
header, err := e.headers.ByBlockID(chunk.Chunk.BlockID)
if err != nil {
log.Fatal().Err(err).Msgf("could not get header for block")
continue
}
// skips requesting chunks of already sealed blocks
isSealed := header.Height <= sealedHeight
if isSealed {
e.pendingChunks.Rem(chunkID)
e.chunkMetaDataCleanup(chunkID, chunk.ExecutionResultID)
log.Debug().Msg("block has been sealed")
continue
}
// check if has reached max try
if !CanTry(e.maxAttempt, chunk) {
log.Debug().
Int("max_attempt", e.maxAttempt).
Int("actual_attempts", chunk.Attempt).
Msg("max attempts reached, chunk is not longer retried")
continue
}
exists := e.results.Has(chunk.ExecutionResultID)
// if execution result has been removed, no need to request
// the chunk data any more.
if !exists {
e.pendingChunks.Rem(chunkID)
e.chunkMetaDataCleanup(chunkID, chunk.ExecutionResultID)
log.Debug().Msg("remove chunk since execution result no longer exists")
continue
}
err = e.requestChunkDataPack(chunk)
if err != nil {
log.Warn().Msg("could not request chunk data pack")
continue
}
exists = e.pendingChunks.IncrementAttempt(chunkID)
if !exists {
log.Debug().Msg("skip if chunk no longer exists")
continue
}
log.Info().Msg("chunk data requested")
}
}
// requestChunkDataPack request the chunk data pack from the original execution node that executed the chunk.
// the chunk data pack includes the collection and state commitments that
// needed to make a VerifiableChunk
func (e *Engine) requestChunkDataPack(c *ChunkStatus) error {
chunkID := c.ID()
// creates chunk data pack request event
req := &messages.ChunkDataRequest{
ChunkID: chunkID,
Nonce: rand.Uint64(), // prevent the request from being deduplicated by the receiver
}
// publishes the chunk data request to the network
err := e.con.Publish(req, c.ExecutorID)
if err != nil {
return fmt.Errorf("could not publish chunk data pack request for chunk (id=%s): %w", chunkID, err)
}
e.metrics.OnChunkDataPackRequested()
return nil
}
// handleChunk handles a chunk by creating a
// chunk status for the chunk and adds it to the pending chunks mempool to be processed by onTimer
func (e *Engine) handleChunk(chunk *flow.Chunk, resultID flow.Identifier, executorID flow.Identifier) {
chunkID := chunk.ID()
status := NewChunkStatus(chunk, resultID, executorID)
added := e.pendingChunks.Add(status)
log := e.log.With().
Hex("result_id", logging.ID(status.ExecutionResultID)).
Hex("chunk_id", logging.ID(chunkID)).
Uint64("chunk_index", chunk.Index).
Logger()
if !added {
log.Debug().Msg("could not add chunk status to pendingChunks mempool")
return
}
// attaches the chunk ID to its result ID for sake of memory cleanup tracking
err := e.chunkIdsByResult.Append(resultID, chunkID)
if err != nil {
log.Debug().Err(err).Msg("could not append chunk id to its result id")
return
}
e.log.Debug().Msg("chunk marked assigned to this verification node")
}
// handleChunkDataPack receives a chunk data pack, verifies its origin ID, pull other data to make a
// VerifiableChunk, and pass it to the verifier engine to verify
func (e *Engine) handleChunkDataPack(originID flow.Identifier,
chunkDataPack *flow.ChunkDataPack,
collection *flow.Collection) error {
start := time.Now()
chunkID := chunkDataPack.ChunkID
log := e.log.With().
Hex("executor_id", logging.ID(originID)).
Hex("chunk_data_pack_id", logging.Entity(chunkDataPack)).
Hex("collection_id", logging.ID(chunkDataPack.CollectionID)).
Hex("chunk_id", logging.ID(chunkID)).Logger()
log.Info().Msg("chunk data pack received")
// monitoring: increments number of received chunk data packs
e.metrics.OnChunkDataPackReceived()
// check origin is from a execution node
// TODO check the origin is a node that we requested before
sender, err := e.state.Final().Identity(originID)
if errors.Is(err, storage.ErrNotFound) {
return engine.NewInvalidInputErrorf("origin is unstaked: %v", originID)
}
if err != nil {
return fmt.Errorf("could not find identity for chunkID %v: %w", chunkID, err)
}
if sender.Role != flow.RoleExecution {
return engine.NewInvalidInputError("receives chunk data pack from a non-execution node")
}
status, exists := e.pendingChunks.ByID(chunkID)
if !exists {
return engine.NewInvalidInputErrorf("chunk does not exist, chunkID: %v", chunkID)
}
// TODO: verify the collection ID matches with the collection guarantee in the block payload
// remove first to ensure concurrency issue
removed := e.pendingChunks.Rem(chunkDataPack.ChunkID)
if !removed {
return engine.NewInvalidInputErrorf("chunk has not been removed, chunkID: %v", chunkID)
}
resultID := status.ExecutionResultID
if span, ok := e.tracer.GetSpan(resultID, trace.VERProcessExecutionResult); ok {
childSpan := e.tracer.StartSpanFromParent(span, trace.VERMatchHandleChunkDataPack, opentracing.StartTime(start))
defer childSpan.Finish()
}
result, exists := e.results.Get(resultID)
if !exists {
// result no longer exists
return engine.NewInvalidInputErrorf("execution result ID no longer exist: %v, for chunkID :%v", status.ExecutionResultID, chunkID)
}
// computes the end state of the chunk
var isSystemChunk bool
var endState flow.StateCommitment
if int(status.Chunk.Index) == len(result.ExecutionResult.Chunks)-1 {
// last chunk in a result is the system chunk and takes final state commitment
isSystemChunk = true
endState, err = result.ExecutionResult.FinalStateCommitment()
if err != nil {
return fmt.Errorf("could not get final state: %w", err)
}
} else {
// any chunk except last takes the subsequent chunk's start state
isSystemChunk = false
endState = result.ExecutionResult.Chunks[status.Chunk.Index+1].StartState
}
// matches the chunk as a non-system chunk
err = e.matchChunk(
isSystemChunk,
status.Chunk,
result.ExecutionResult,
collection,
chunkDataPack,
endState)
blockID := result.ExecutionResult.BlockID
if err != nil {
return fmt.Errorf("failed to match chunk %x from result %x: %w", chunkID, resultID, err)
}
// cleans up resources associated with the matched chunk
e.chunkMetaDataCleanup(chunkID, resultID)
log.Info().
Hex("block_id", logging.ID(blockID)).
Hex("result_id", logging.ID(resultID)).
Msg("chunk successfully matched")
return nil
}
// chunkMetaDataCleanup is an event handler that is invoked whenever match engine drops a chunk from
// its processing pipeline. A chunk is dropped from processing pipeline of match engine if it is either
// successfully matched, or reached its maximum retry.
// It cleans the resources related to the dropped chunk from the memory.
// If all assigned chunks of the corresponding result have been dropped, it also removes
// the result from the memory.
func (e *Engine) chunkMetaDataCleanup(chunkID, resultID flow.Identifier) {
log := e.log.With().
Hex("result_id", logging.ID(resultID)).
Hex("chunk_id", logging.ID(chunkID)).
Logger()
err := e.chunkIdsByResult.RemIdFromKey(resultID, chunkID)
if err != nil {
log.Debug().Err(err).Msg("could not dropped chunk")
return
}
if e.chunkIdsByResult.Has(resultID) {
// there are still un-matched chunks correspond to this result
// so the result should not be cleaned.
return
}
// no pending chunk is attached to this result, hence removes it
if ok := e.results.Rem(resultID); !ok {
log.Debug().Msg("could not remove result")
return
}
e.log.Info().Msg("result successfully removed")
}
// matchChunk performs the last step in matching pipeline for a chunk.
// It captures the chunk into a verifiable chunk and submits it to the
// verifier engine.
func (e *Engine) matchChunk(
isSystemChunk bool,
chunk *flow.Chunk,
result *flow.ExecutionResult,
collection *flow.Collection,
chunkDataPack *flow.ChunkDataPack,
endState flow.StateCommitment) error {
blockID := result.BlockID
// header must exist in storage
header, err := e.headers.ByBlockID(blockID)
if err != nil {
return fmt.Errorf("could not find block header: %w", err)
}
// creates a verifiable chunk for assigned chunk
vchunk := &verification.VerifiableChunkData{
IsSystemChunk: isSystemChunk,
Chunk: chunk,
Header: header,
Result: result,
Collection: collection,
ChunkDataPack: chunkDataPack,
EndState: endState,
}
err = e.verifier.ProcessLocal(vchunk)
if err != nil {
return fmt.Errorf("could not submit verifiable chunk to verifier engine: %w", err)
}
// metrics: increases number of verifiable chunks sent
e.metrics.OnVerifiableChunkSent()
return nil
}
// CanTry returns checks the history attempts and determine whether a chunk request
// can be tried again.
func CanTry(maxAttempt int, chunk *ChunkStatus) bool {
return chunk.Attempt < maxAttempt
}