coordinator/src/db.rs db macro implimentation (#431)

* coordinator/src/db.rs db macro implimentation

* fixed fmt errors

* converted txn functions to get/set counterparts

* use take_signed_transaction function

* fix for two fo the tests

* Misc tweaks

* Minor tweaks

---------

Co-authored-by: Luke Parker <lukeparker5132@gmail.com>
This commit is contained in:
econsta 2023-12-07 18:30:11 +04:00 committed by GitHub
parent c511a54d18
commit 91a024e119
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
4 changed files with 119 additions and 183 deletions

View file

@ -1,11 +1,9 @@
use core::marker::PhantomData;
use blake2::{ use blake2::{
digest::{consts::U32, Digest}, digest::{consts::U32, Digest},
Blake2b, Blake2b,
}; };
use scale::{Encode, Decode}; use scale::Encode;
use serai_client::{ use serai_client::{
primitives::NetworkId, primitives::NetworkId,
validator_sets::primitives::{Session, ValidatorSet}, validator_sets::primitives::{Session, ValidatorSet},
@ -17,31 +15,30 @@ pub use serai_db::*;
use ::tributary::ReadWrite; use ::tributary::ReadWrite;
use crate::tributary::{TributarySpec, Transaction, scanner::RecognizedIdType}; use crate::tributary::{TributarySpec, Transaction, scanner::RecognizedIdType};
#[derive(Debug)] create_db!(
pub struct MainDb<D: Db>(PhantomData<D>); MainDb {
impl<D: Db> MainDb<D> { HandledMessageDb: (network: NetworkId) -> u64,
fn main_key(dst: &'static [u8], key: impl AsRef<[u8]>) -> Vec<u8> { ActiveTributaryDb: () -> Vec<u8>,
D::key(b"coordinator_main", dst, key) RetiredTributaryDb: (set: ValidatorSet) -> (),
SignedTransactionDb: (order: &[u8], nonce: u32) -> Vec<u8>,
FirstPreprocessDb: (
network: NetworkId,
id_type: RecognizedIdType,
id: &[u8]
) -> Vec<Vec<u8>>,
LastReceivedBatchDb: (network: NetworkId) -> u32,
ExpectedBatchDb: (network: NetworkId, id: u32) -> [u8; 32],
BatchDb: (network: NetworkId, id: u32) -> SignedBatch,
LastVerifiedBatchDb: (network: NetworkId) -> u32,
HandoverBatchDb: (set: ValidatorSet) -> u32,
LookupHandoverBatchDb: (network: NetworkId, batch: u32) -> Session,
QueuedBatchesDb: (set: ValidatorSet) -> Vec<u8>
} }
);
fn handled_message_key(network: NetworkId, id: u64) -> Vec<u8> { impl ActiveTributaryDb {
Self::main_key(b"handled_message", (network, id).encode())
}
pub fn save_handled_message(txn: &mut D::Transaction<'_>, network: NetworkId, id: u64) {
txn.put(Self::handled_message_key(network, id), []);
}
pub fn handled_message<G: Get>(getter: &G, network: NetworkId, id: u64) -> bool {
getter.get(Self::handled_message_key(network, id)).is_some()
}
fn active_tributaries_key() -> Vec<u8> {
Self::main_key(b"active_tributaries", [])
}
fn retired_tributary_key(set: ValidatorSet) -> Vec<u8> {
Self::main_key(b"retired_tributary", set.encode())
}
pub fn active_tributaries<G: Get>(getter: &G) -> (Vec<u8>, Vec<TributarySpec>) { pub fn active_tributaries<G: Get>(getter: &G) -> (Vec<u8>, Vec<TributarySpec>) {
let bytes = getter.get(Self::active_tributaries_key()).unwrap_or(vec![]); let bytes = Self::get(getter).unwrap_or_default();
let mut bytes_ref: &[u8] = bytes.as_ref(); let mut bytes_ref: &[u8] = bytes.as_ref();
let mut tributaries = vec![]; let mut tributaries = vec![];
@ -51,9 +48,9 @@ impl<D: Db> MainDb<D> {
(bytes, tributaries) (bytes, tributaries)
} }
pub fn add_participating_in_tributary(txn: &mut D::Transaction<'_>, spec: &TributarySpec) {
let key = Self::active_tributaries_key(); pub fn add_participating_in_tributary(txn: &mut impl DbTxn, spec: &TributarySpec) {
let (mut existing_bytes, existing) = Self::active_tributaries(txn); let (mut existing_bytes, existing) = ActiveTributaryDb::active_tributaries(txn);
for tributary in &existing { for tributary in &existing {
if tributary == spec { if tributary == spec {
return; return;
@ -61,9 +58,10 @@ impl<D: Db> MainDb<D> {
} }
spec.write(&mut existing_bytes).unwrap(); spec.write(&mut existing_bytes).unwrap();
txn.put(key, existing_bytes); ActiveTributaryDb::set(txn, &existing_bytes);
} }
pub fn retire_tributary(txn: &mut D::Transaction<'_>, set: ValidatorSet) {
pub fn retire_tributary(txn: &mut impl DbTxn, set: ValidatorSet) {
let mut active = Self::active_tributaries(txn).1; let mut active = Self::active_tributaries(txn).1;
for i in 0 .. active.len() { for i in 0 .. active.len() {
if active[i].set() == set { if active[i].set() == set {
@ -76,142 +74,72 @@ impl<D: Db> MainDb<D> {
for active in active { for active in active {
active.write(&mut bytes).unwrap(); active.write(&mut bytes).unwrap();
} }
txn.put(Self::active_tributaries_key(), bytes); Self::set(txn, &bytes);
txn.put(Self::retired_tributary_key(set), []); RetiredTributaryDb::set(txn, set, &());
}
pub fn is_tributary_retired<G: Get>(getter: &G, set: ValidatorSet) -> bool {
getter.get(Self::retired_tributary_key(set)).is_some()
} }
}
fn signed_transaction_key(nonce: u32) -> Vec<u8> { impl SignedTransactionDb {
Self::main_key(b"signed_transaction", nonce.to_le_bytes()) pub fn take_signed_transaction(
} txn: &mut impl DbTxn,
pub fn save_signed_transaction(txn: &mut D::Transaction<'_>, nonce: u32, tx: Transaction) { order: &[u8],
txn.put(Self::signed_transaction_key(nonce), tx.serialize()); nonce: u32,
} ) -> Option<Transaction> {
pub fn take_signed_transaction(txn: &mut D::Transaction<'_>, nonce: u32) -> Option<Transaction> { let res = SignedTransactionDb::get(txn, order, nonce)
let key = Self::signed_transaction_key(nonce); .map(|bytes| Transaction::read(&mut bytes.as_slice()).unwrap());
let res = txn.get(&key).map(|bytes| Transaction::read(&mut bytes.as_slice()).unwrap());
if res.is_some() { if res.is_some() {
txn.del(&key); Self::del(txn, order, nonce);
} }
res res
} }
}
fn first_preprocess_key(network: NetworkId, id_type: RecognizedIdType, id: &[u8]) -> Vec<u8> { impl FirstPreprocessDb {
Self::main_key(b"first_preprocess", (network, id_type, id).encode())
}
pub fn save_first_preprocess( pub fn save_first_preprocess(
txn: &mut D::Transaction<'_>, txn: &mut impl DbTxn,
network: NetworkId, network: NetworkId,
id_type: RecognizedIdType, id_type: RecognizedIdType,
id: &[u8], id: &[u8],
preprocess: Vec<Vec<u8>>, preprocess: Vec<Vec<u8>>,
) { ) {
let preprocess = preprocess.encode(); if let Some(existing) = FirstPreprocessDb::get(txn, network, id_type, id) {
let key = Self::first_preprocess_key(network, id_type, id);
if let Some(existing) = txn.get(&key) {
assert_eq!(existing, preprocess, "saved a distinct first preprocess"); assert_eq!(existing, preprocess, "saved a distinct first preprocess");
return; return;
} }
txn.put(key, preprocess); FirstPreprocessDb::set(txn, network, id_type, id, &preprocess);
}
pub fn first_preprocess<G: Get>(
getter: &G,
network: NetworkId,
id_type: RecognizedIdType,
id: &[u8],
) -> Option<Vec<Vec<u8>>> {
getter
.get(Self::first_preprocess_key(network, id_type, id))
.map(|bytes| Vec::<_>::decode(&mut bytes.as_slice()).unwrap())
} }
}
fn last_received_batch_key(network: NetworkId) -> Vec<u8> { impl ExpectedBatchDb {
Self::main_key(b"last_received_batch", network.encode()) pub fn save_expected_batch(txn: &mut impl DbTxn, batch: &Batch) {
} LastReceivedBatchDb::set(txn, batch.network, &batch.id);
fn expected_batch_key(network: NetworkId, id: u32) -> Vec<u8> { Self::set(
Self::main_key(b"expected_batch", (network, id).encode()) txn,
} batch.network,
pub fn save_expected_batch(txn: &mut D::Transaction<'_>, batch: &Batch) { batch.id,
txn.put(Self::last_received_batch_key(batch.network), batch.id.to_le_bytes()); &Blake2b::<U32>::digest(batch.instructions.encode()).into(),
txn.put(
Self::expected_batch_key(batch.network, batch.id),
Blake2b::<U32>::digest(batch.instructions.encode()),
); );
} }
pub fn last_received_batch<G: Get>(getter: &G, network: NetworkId) -> Option<u32> { }
getter
.get(Self::last_received_batch_key(network)) impl HandoverBatchDb {
.map(|id| u32::from_le_bytes(id.try_into().unwrap())) pub fn set_handover_batch(txn: &mut impl DbTxn, set: ValidatorSet, batch: u32) {
Self::set(txn, set, &batch);
LookupHandoverBatchDb::set(txn, set.network, batch, &set.session);
} }
pub fn expected_batch<G: Get>(getter: &G, network: NetworkId, id: u32) -> Option<[u8; 32]> { }
getter.get(Self::expected_batch_key(network, id)).map(|batch| batch.try_into().unwrap()) impl QueuedBatchesDb {
pub fn queue(txn: &mut impl DbTxn, set: ValidatorSet, batch: Transaction) {
let mut batches = Self::get(txn, set).unwrap_or_default();
batch.write(&mut batches).unwrap();
Self::set(txn, set, &batches);
} }
fn batch_key(network: NetworkId, id: u32) -> Vec<u8> { pub fn take(txn: &mut impl DbTxn, set: ValidatorSet) -> Vec<Transaction> {
Self::main_key(b"batch", (network, id).encode()) let batches_vec = Self::get(txn, set).unwrap_or_default();
} txn.del(&Self::key(set));
pub fn save_batch(txn: &mut D::Transaction<'_>, batch: SignedBatch) {
txn.put(Self::batch_key(batch.batch.network, batch.batch.id), batch.encode());
}
pub fn batch<G: Get>(getter: &G, network: NetworkId, id: u32) -> Option<SignedBatch> {
getter
.get(Self::batch_key(network, id))
.map(|batch| SignedBatch::decode(&mut batch.as_ref()).unwrap())
}
fn last_verified_batch_key(network: NetworkId) -> Vec<u8> {
Self::main_key(b"last_verified_batch", network.encode())
}
pub fn save_last_verified_batch(txn: &mut D::Transaction<'_>, network: NetworkId, id: u32) {
txn.put(Self::last_verified_batch_key(network), id.to_le_bytes());
}
pub fn last_verified_batch<G: Get>(getter: &G, network: NetworkId) -> Option<u32> {
getter
.get(Self::last_verified_batch_key(network))
.map(|id| u32::from_le_bytes(id.try_into().unwrap()))
}
fn handover_batch_key(set: ValidatorSet) -> Vec<u8> {
Self::main_key(b"handover_batch", set.encode())
}
fn lookup_handover_batch_key(network: NetworkId, batch: u32) -> Vec<u8> {
Self::main_key(b"lookup_handover_batch", (network, batch).encode())
}
pub fn set_handover_batch(txn: &mut D::Transaction<'_>, set: ValidatorSet, batch: u32) {
txn.put(Self::handover_batch_key(set), batch.to_le_bytes());
txn.put(Self::lookup_handover_batch_key(set.network, batch), set.session.0.to_le_bytes());
}
pub fn handover_batch<G: Get>(getter: &G, set: ValidatorSet) -> Option<u32> {
getter.get(Self::handover_batch_key(set)).map(|id| u32::from_le_bytes(id.try_into().unwrap()))
}
pub fn is_handover_batch<G: Get>(
getter: &G,
network: NetworkId,
batch: u32,
) -> Option<ValidatorSet> {
getter.get(Self::lookup_handover_batch_key(network, batch)).map(|session| ValidatorSet {
network,
session: Session(u32::from_le_bytes(session.try_into().unwrap())),
})
}
fn queued_batches_key(set: ValidatorSet) -> Vec<u8> {
Self::main_key(b"queued_batches", set.encode())
}
pub fn queue_batch(txn: &mut D::Transaction<'_>, set: ValidatorSet, batch: Transaction) {
let key = Self::queued_batches_key(set);
let mut batches = txn.get(&key).unwrap_or(vec![]);
batches.extend(batch.serialize());
txn.put(&key, batches);
}
pub fn take_queued_batches(txn: &mut D::Transaction<'_>, set: ValidatorSet) -> Vec<Transaction> {
let key = Self::queued_batches_key(set);
let batches_vec = txn.get(&key).unwrap_or(vec![]);
txn.del(&key);
let mut batches: &[u8] = &batches_vec; let mut batches: &[u8] = &batches_vec;
let mut res = vec![]; let mut res = vec![];
while !batches.is_empty() { while !batches.is_empty() {
res.push(Transaction::read(&mut batches).unwrap()); res.push(Transaction::read(&mut batches).unwrap());

View file

@ -39,7 +39,7 @@ mod tributary;
use crate::tributary::{TributarySpec, SignData, Transaction, scanner::RecognizedIdType, PlanIds}; use crate::tributary::{TributarySpec, SignData, Transaction, scanner::RecognizedIdType, PlanIds};
mod db; mod db;
use db::MainDb; use db::*;
mod p2p; mod p2p;
pub use p2p::*; pub use p2p::*;
@ -83,7 +83,7 @@ async fn add_tributary<D: Db, Pro: Processors, P: P2p>(
tributaries: &broadcast::Sender<TributaryEvent<D, P>>, tributaries: &broadcast::Sender<TributaryEvent<D, P>>,
spec: TributarySpec, spec: TributarySpec,
) { ) {
if MainDb::<D>::is_tributary_retired(&db, spec.set()) { if RetiredTributaryDb::get(&db, spec.set()).is_some() {
log::info!("not adding tributary {:?} since it's been retired", spec.set()); log::info!("not adding tributary {:?} since it's been retired", spec.set());
} }
@ -138,7 +138,7 @@ async fn publish_signed_transaction<D: Db, P: P2p>(
// Safe as we should deterministically create transactions, meaning if this is already on-disk, // Safe as we should deterministically create transactions, meaning if this is already on-disk,
// it's what we're saving now // it's what we're saving now
MainDb::<D>::save_signed_transaction(txn, signed.nonce, tx); SignedTransactionDb::set(txn, &order, signed.nonce, &tx.serialize());
(order, signer) (order, signer)
} else { } else {
@ -147,8 +147,9 @@ async fn publish_signed_transaction<D: Db, P: P2p>(
// If we're trying to publish 5, when the last transaction published was 3, this will delay // If we're trying to publish 5, when the last transaction published was 3, this will delay
// publication until the point in time we publish 4 // publication until the point in time we publish 4
while let Some(tx) = MainDb::<D>::take_signed_transaction( while let Some(tx) = SignedTransactionDb::take_signed_transaction(
txn, txn,
&order,
tributary tributary
.next_nonce(&signer, &order) .next_nonce(&signer, &order)
.await .await
@ -181,8 +182,13 @@ async fn handle_processor_message<D: Db, P: P2p>(
network: NetworkId, network: NetworkId,
msg: &processors::Message, msg: &processors::Message,
) -> bool { ) -> bool {
if MainDb::<D>::handled_message(db, msg.network, msg.id) { #[allow(clippy::nonminimal_bool)]
return true; if let Some(already_handled) = HandledMessageDb::get(db, msg.network) {
assert!(!(already_handled > msg.id));
assert!((already_handled == msg.id) || (already_handled == msg.id - 1));
if already_handled == msg.id {
return true;
}
} }
let _hvq_lock = HANDOVER_VERIFY_QUEUE_LOCK.get_or_init(|| Mutex::new(())).lock().await; let _hvq_lock = HANDOVER_VERIFY_QUEUE_LOCK.get_or_init(|| Mutex::new(())).lock().await;
@ -219,7 +225,7 @@ async fn handle_processor_message<D: Db, P: P2p>(
.iter() .iter()
.map(|plan| plan.session) .map(|plan| plan.session)
.filter(|session| { .filter(|session| {
!MainDb::<D>::is_tributary_retired(&txn, ValidatorSet { network, session: *session }) RetiredTributaryDb::get(&txn, ValidatorSet { network, session: *session }).is_none()
}) })
.collect::<HashSet<_>>(); .collect::<HashSet<_>>();
@ -293,7 +299,7 @@ async fn handle_processor_message<D: Db, P: P2p>(
batch.network, msg.network, batch.network, msg.network,
"processor sent us a batch for a different network than it was for", "processor sent us a batch for a different network than it was for",
); );
MainDb::<D>::save_expected_batch(&mut txn, batch); ExpectedBatchDb::save_expected_batch(&mut txn, batch);
None None
} }
// If this is a new Batch, immediately publish it (if we can) // If this is a new Batch, immediately publish it (if we can)
@ -306,7 +312,7 @@ async fn handle_processor_message<D: Db, P: P2p>(
log::debug!("received batch {:?} {}", batch.batch.network, batch.batch.id); log::debug!("received batch {:?} {}", batch.batch.network, batch.batch.id);
// Save this batch to the disk // Save this batch to the disk
MainDb::<D>::save_batch(&mut txn, batch.clone()); BatchDb::set(&mut txn, batch.batch.network, batch.batch.id, &batch.clone());
// Get the next-to-execute batch ID // Get the next-to-execute batch ID
let mut next = substrate::get_expected_next_batch(serai, network).await; let mut next = substrate::get_expected_next_batch(serai, network).await;
@ -314,7 +320,7 @@ async fn handle_processor_message<D: Db, P: P2p>(
// Since we have a new batch, publish all batches yet to be published to Serai // Since we have a new batch, publish all batches yet to be published to Serai
// This handles the edge-case where batch n+1 is signed before batch n is // This handles the edge-case where batch n+1 is signed before batch n is
let mut batches = VecDeque::new(); let mut batches = VecDeque::new();
while let Some(batch) = MainDb::<D>::batch(&txn, network, next) { while let Some(batch) = BatchDb::get(&txn, network, next) {
batches.push_back(batch); batches.push_back(batch);
next += 1; next += 1;
} }
@ -359,10 +365,12 @@ async fn handle_processor_message<D: Db, P: P2p>(
// If we have a relevant Tributary, check it's actually still relevant and has yet to be retired // If we have a relevant Tributary, check it's actually still relevant and has yet to be retired
if let Some(relevant_tributary_value) = relevant_tributary { if let Some(relevant_tributary_value) = relevant_tributary {
if MainDb::<D>::is_tributary_retired( if RetiredTributaryDb::get(
&txn, &txn,
ValidatorSet { network: msg.network, session: relevant_tributary_value }, ValidatorSet { network: msg.network, session: relevant_tributary_value },
) { )
.is_some()
{
relevant_tributary = None; relevant_tributary = None;
} }
} }
@ -491,7 +499,7 @@ async fn handle_processor_message<D: Db, P: P2p>(
} }
sign::ProcessorMessage::Preprocess { id, preprocesses } => { sign::ProcessorMessage::Preprocess { id, preprocesses } => {
if id.attempt == 0 { if id.attempt == 0 {
MainDb::<D>::save_first_preprocess( FirstPreprocessDb::save_first_preprocess(
&mut txn, &mut txn,
network, network,
RecognizedIdType::Plan, RecognizedIdType::Plan,
@ -563,7 +571,7 @@ async fn handle_processor_message<D: Db, P: P2p>(
// If this is the first attempt instance, wait until we synchronize around the batch // If this is the first attempt instance, wait until we synchronize around the batch
// first // first
if id.attempt == 0 { if id.attempt == 0 {
MainDb::<D>::save_first_preprocess( FirstPreprocessDb::save_first_preprocess(
&mut txn, &mut txn,
spec.set().network, spec.set().network,
RecognizedIdType::Batch, RecognizedIdType::Batch,
@ -588,8 +596,8 @@ async fn handle_processor_message<D: Db, P: P2p>(
// all prior published `Batch`s // all prior published `Batch`s
// TODO: This assumes BatchPreprocess is immediately after Batch // TODO: This assumes BatchPreprocess is immediately after Batch
// Ensure that assumption // Ensure that assumption
let last_received = MainDb::<D>::last_received_batch(&txn, msg.network).unwrap(); let last_received = LastReceivedBatchDb::get(&txn, msg.network).unwrap();
let handover_batch = MainDb::<D>::handover_batch(&txn, spec.set()); let handover_batch = HandoverBatchDb::get(&txn, spec.set());
let mut queue = false; let mut queue = false;
if let Some(handover_batch) = handover_batch { if let Some(handover_batch) = handover_batch {
// There is a race condition here. We may verify all `Batch`s from the prior set, // There is a race condition here. We may verify all `Batch`s from the prior set,
@ -604,7 +612,7 @@ async fn handle_processor_message<D: Db, P: P2p>(
// To fix this, if this is after the handover `Batch` and we have yet to verify // To fix this, if this is after the handover `Batch` and we have yet to verify
// publication of the handover `Batch`, don't yet yield the provided. // publication of the handover `Batch`, don't yet yield the provided.
if last_received > handover_batch { if last_received > handover_batch {
if let Some(last_verified) = MainDb::<D>::last_verified_batch(&txn, msg.network) { if let Some(last_verified) = LastVerifiedBatchDb::get(&txn, msg.network) {
if last_verified < handover_batch { if last_verified < handover_batch {
queue = true; queue = true;
} }
@ -613,11 +621,11 @@ async fn handle_processor_message<D: Db, P: P2p>(
} }
} }
} else { } else {
MainDb::<D>::set_handover_batch(&mut txn, spec.set(), last_received); HandoverBatchDb::set_handover_batch(&mut txn, spec.set(), last_received);
// If this isn't the first batch, meaning we do have to verify all prior batches, and // If this isn't the first batch, meaning we do have to verify all prior batches, and
// the prior Batch hasn't been verified yet... // the prior Batch hasn't been verified yet...
if (last_received != 0) && if (last_received != 0) &&
MainDb::<D>::last_verified_batch(&txn, msg.network) LastVerifiedBatchDb::get(&txn, msg.network)
.map(|last_verified| last_verified < (last_received - 1)) .map(|last_verified| last_verified < (last_received - 1))
.unwrap_or(true) .unwrap_or(true)
{ {
@ -627,14 +635,14 @@ async fn handle_processor_message<D: Db, P: P2p>(
} }
if queue { if queue {
MainDb::<D>::queue_batch(&mut txn, spec.set(), intended); QueuedBatchesDb::queue(&mut txn, spec.set(), intended);
vec![] vec![]
} else { } else {
// Because this is post-verification of the handover batch, take all queued `Batch`s // Because this is post-verification of the handover batch, take all queued `Batch`s
// now to ensure we don't provide this before an already queued Batch // now to ensure we don't provide this before an already queued Batch
// This *may* be an unreachable case due to how last_verified_batch is set, yet it // This *may* be an unreachable case due to how last_verified_batch is set, yet it
// doesn't hurt to have as a defensive pattern // doesn't hurt to have as a defensive pattern
let mut res = MainDb::<D>::take_queued_batches(&mut txn, spec.set()); let mut res = QueuedBatchesDb::take(&mut txn, spec.set());
res.push(intended); res.push(intended);
res res
} }
@ -702,7 +710,7 @@ async fn handle_processor_message<D: Db, P: P2p>(
} }
} }
MainDb::<D>::save_handled_message(&mut txn, msg.network, msg.id); HandledMessageDb::set(&mut txn, msg.network, &msg.id);
txn.commit(); txn.commit();
true true
@ -828,7 +836,7 @@ async fn handle_cosigns_and_batch_publication<D: Db, P: P2p>(
let _hvq_lock = HANDOVER_VERIFY_QUEUE_LOCK.get_or_init(|| Mutex::new(())).lock().await; let _hvq_lock = HANDOVER_VERIFY_QUEUE_LOCK.get_or_init(|| Mutex::new(())).lock().await;
let mut txn = db.txn(); let mut txn = db.txn();
let mut to_publish = vec![]; let mut to_publish = vec![];
let start_id = MainDb::<D>::last_verified_batch(&txn, network) let start_id = LastVerifiedBatchDb::get(&txn, network)
.map(|already_verified| already_verified + 1) .map(|already_verified| already_verified + 1)
.unwrap_or(0); .unwrap_or(0);
if let Some(last_id) = if let Some(last_id) =
@ -838,9 +846,10 @@ async fn handle_cosigns_and_batch_publication<D: Db, P: P2p>(
// `Batch` // `Batch`
// If so, we need to publish queued provided `Batch` transactions // If so, we need to publish queued provided `Batch` transactions
for batch in start_id ..= last_id { for batch in start_id ..= last_id {
let is_pre_handover = MainDb::<D>::is_handover_batch(&txn, network, batch + 1); let is_pre_handover = LookupHandoverBatchDb::get(&txn, network, batch + 1);
if let Some(set) = is_pre_handover { if let Some(session) = is_pre_handover {
let mut queued = MainDb::<D>::take_queued_batches(&mut txn, set); let set = ValidatorSet { network, session };
let mut queued = QueuedBatchesDb::take(&mut txn, set);
// is_handover_batch is only set for handover `Batch`s we're participating in, making // is_handover_batch is only set for handover `Batch`s we're participating in, making
// this safe // this safe
if queued.is_empty() { if queued.is_empty() {
@ -851,14 +860,14 @@ async fn handle_cosigns_and_batch_publication<D: Db, P: P2p>(
to_publish.push((set.session, queued.remove(0))); to_publish.push((set.session, queued.remove(0)));
// Re-queue the remaining batches // Re-queue the remaining batches
for remaining in queued { for remaining in queued {
MainDb::<D>::queue_batch(&mut txn, set, remaining); QueuedBatchesDb::queue(&mut txn, set, remaining);
} }
} }
let is_handover = MainDb::<D>::is_handover_batch(&txn, network, batch); let is_handover = LookupHandoverBatchDb::get(&txn, network, batch);
if let Some(set) = is_handover { if let Some(session) = is_handover {
for queued in MainDb::<D>::take_queued_batches(&mut txn, set) { for queued in QueuedBatchesDb::take(&mut txn, ValidatorSet { network, session }) {
to_publish.push((set.session, queued)); to_publish.push((session, queued));
} }
} }
} }
@ -952,7 +961,7 @@ pub async fn run<D: Db, Pro: Processors, P: P2p>(
let (new_tributary_spec_send, mut new_tributary_spec_recv) = mpsc::unbounded_channel(); let (new_tributary_spec_send, mut new_tributary_spec_recv) = mpsc::unbounded_channel();
// Reload active tributaries from the database // Reload active tributaries from the database
for spec in MainDb::<D>::active_tributaries(&raw_db).1 { for spec in ActiveTributaryDb::active_tributaries(&raw_db).1 {
new_tributary_spec_send.send(spec).unwrap(); new_tributary_spec_send.send(spec).unwrap();
} }
@ -1058,8 +1067,7 @@ pub async fn run<D: Db, Pro: Processors, P: P2p>(
// This waits until the necessary preprocess is available 0, // This waits until the necessary preprocess is available 0,
let get_preprocess = |raw_db, id_type, id| async move { let get_preprocess = |raw_db, id_type, id| async move {
loop { loop {
let Some(preprocess) = MainDb::<D>::first_preprocess(raw_db, set.network, id_type, id) let Some(preprocess) = FirstPreprocessDb::get(raw_db, set.network, id_type, id) else {
else {
log::warn!("waiting for preprocess for recognized ID"); log::warn!("waiting for preprocess for recognized ID");
sleep(Duration::from_millis(100)).await; sleep(Duration::from_millis(100)).await;
continue; continue;
@ -1096,7 +1104,7 @@ pub async fn run<D: Db, Pro: Processors, P: P2p>(
let tributaries = tributaries.read().await; let tributaries = tributaries.read().await;
let Some(tributary) = tributaries.get(&genesis) else { let Some(tributary) = tributaries.get(&genesis) else {
// If we don't have this Tributary because it's retired, break and move on // If we don't have this Tributary because it's retired, break and move on
if MainDb::<D>::is_tributary_retired(&raw_db, set) { if RetiredTributaryDb::get(&raw_db, set).is_some() {
break; break;
} }

View file

@ -105,7 +105,7 @@ async fn handle_new_set<D: Db>(
// If this txn doesn't finish, this will be re-fired // If this txn doesn't finish, this will be re-fired
// If we waited to save to the DB, this txn may be finished, preventing re-firing, yet the // If we waited to save to the DB, this txn may be finished, preventing re-firing, yet the
// prior fired event may have not been received yet // prior fired event may have not been received yet
crate::MainDb::<D>::add_participating_in_tributary(txn, &spec); crate::ActiveTributaryDb::add_participating_in_tributary(txn, &spec);
new_tributary_spec.send(spec).unwrap(); new_tributary_spec.send(spec).unwrap();
} else { } else {
@ -306,7 +306,7 @@ async fn handle_block<D: Db, Pro: Processors>(
if !SubstrateDb::<D>::handled_event(&db.0, hash, event_id) { if !SubstrateDb::<D>::handled_event(&db.0, hash, event_id) {
log::info!("found fresh set retired event {:?}", retired_set); log::info!("found fresh set retired event {:?}", retired_set);
let mut txn = db.0.txn(); let mut txn = db.0.txn();
crate::MainDb::<D>::retire_tributary(&mut txn, set); crate::ActiveTributaryDb::retire_tributary(&mut txn, set);
tributary_retired.send(set).unwrap(); tributary_retired.send(set).unwrap();
SubstrateDb::<D>::handle_event(&mut txn, hash, event_id); SubstrateDb::<D>::handle_event(&mut txn, hash, event_id);
txn.commit(); txn.commit();
@ -678,12 +678,12 @@ pub(crate) async fn verify_published_batches<D: Db>(
optimistic_up_to: u32, optimistic_up_to: u32,
) -> Option<u32> { ) -> Option<u32> {
// TODO: Localize from MainDb to SubstrateDb // TODO: Localize from MainDb to SubstrateDb
let last = crate::MainDb::<D>::last_verified_batch(txn, network); let last = crate::LastVerifiedBatchDb::get(txn, network);
for id in last.map(|last| last + 1).unwrap_or(0) ..= optimistic_up_to { for id in last.map(|last| last + 1).unwrap_or(0) ..= optimistic_up_to {
let Some(on_chain) = SubstrateDb::<D>::batch_instructions_hash(txn, network, id) else { let Some(on_chain) = SubstrateDb::<D>::batch_instructions_hash(txn, network, id) else {
break; break;
}; };
let off_chain = crate::MainDb::<D>::expected_batch(txn, network, id).unwrap(); let off_chain = crate::ExpectedBatchDb::get(txn, network, id).unwrap();
if on_chain != off_chain { if on_chain != off_chain {
// Halt operations on this network and spin, as this is a critical fault // Halt operations on this network and spin, as this is a critical fault
loop { loop {
@ -698,8 +698,8 @@ pub(crate) async fn verify_published_batches<D: Db>(
sleep(Duration::from_secs(60)).await; sleep(Duration::from_secs(60)).await;
} }
} }
crate::MainDb::<D>::save_last_verified_batch(txn, network, id); crate::LastVerifiedBatchDb::set(txn, network, &id);
} }
crate::MainDb::<D>::last_verified_batch(txn, network) crate::LastVerifiedBatchDb::get(txn, network)
} }

View file

@ -232,7 +232,7 @@ pub(crate) async fn scan_tributaries_task<
let mut tributary_db = raw_db.clone(); let mut tributary_db = raw_db.clone();
loop { loop {
// Check if the set was retired, and if so, don't further operate // Check if the set was retired, and if so, don't further operate
if crate::MainDb::<D>::is_tributary_retired(&raw_db, spec.set()) { if crate::db::RetiredTributaryDb::get(&raw_db, spec.set()).is_some() {
break; break;
} }