Files
aitbc/apps/blockchain-node/src/aitbc_chain/sync.py
aitbc1 e0b0f901ef
Some checks failed
AITBC CI/CD Pipeline / lint-and-test (3.11) (pull_request) Has been cancelled
AITBC CI/CD Pipeline / lint-and-test (3.12) (pull_request) Has been cancelled
AITBC CI/CD Pipeline / lint-and-test (3.13) (pull_request) Has been cancelled
AITBC CLI Level 1 Commands Test / test-cli-level1 (3.11) (pull_request) Has been cancelled
AITBC CLI Level 1 Commands Test / test-cli-level1 (3.12) (pull_request) Has been cancelled
AITBC CLI Level 1 Commands Test / test-cli-level1 (3.13) (pull_request) Has been cancelled
Security Scanning / Bandit Security Scan (apps/coordinator-api/src) (pull_request) Has been cancelled
Security Scanning / Bandit Security Scan (cli/aitbc_cli) (pull_request) Has been cancelled
Security Scanning / Bandit Security Scan (packages/py/aitbc-core/src) (pull_request) Has been cancelled
Security Scanning / Bandit Security Scan (packages/py/aitbc-crypto/src) (pull_request) Has been cancelled
Security Scanning / Bandit Security Scan (packages/py/aitbc-sdk/src) (pull_request) Has been cancelled
Security Scanning / Bandit Security Scan (tests) (pull_request) Has been cancelled
Security Scanning / CodeQL Security Analysis (javascript) (pull_request) Has been cancelled
Security Scanning / CodeQL Security Analysis (python) (pull_request) Has been cancelled
Security Scanning / Dependency Security Scan (pull_request) Has been cancelled
Security Scanning / Container Security Scan (pull_request) Has been cancelled
Security Scanning / OSSF Scorecard (pull_request) Has been cancelled
AITBC CI/CD Pipeline / test-cli (pull_request) Has been cancelled
AITBC CI/CD Pipeline / test-services (pull_request) Has been cancelled
AITBC CI/CD Pipeline / test-production-services (pull_request) Has been cancelled
AITBC CI/CD Pipeline / security-scan (pull_request) Has been cancelled
AITBC CI/CD Pipeline / build (pull_request) Has been cancelled
AITBC CI/CD Pipeline / deploy-staging (pull_request) Has been cancelled
AITBC CI/CD Pipeline / deploy-production (pull_request) Has been cancelled
AITBC CI/CD Pipeline / performance-test (pull_request) Has been cancelled
AITBC CI/CD Pipeline / docs (pull_request) Has been cancelled
AITBC CI/CD Pipeline / release (pull_request) Has been cancelled
AITBC CI/CD Pipeline / notify (pull_request) Has been cancelled
AITBC CLI Level 1 Commands Test / test-summary (pull_request) Has been cancelled
Security Scanning / Security Summary Report (pull_request) Has been cancelled
refactor: simplify .env.example and add bulk sync capabilities
- Simplify .env.example to show actual config values instead of instructions
- Add blockchain core, coordinator API, and marketplace web example sections
- Add bulk import functionality to ChainSync for faster catchup
- Add fetch_blocks_range and bulk_import_from methods with batching
- Add init-production command to genesis CLI for production chain setup
- Add HTTP client management with configurable batch size and poll interval
2026-03-20 12:17:30 +01:00

409 lines
17 KiB
Python
Executable File

"""Chain synchronization with conflict resolution, signature validation, and metrics."""
from __future__ import annotations
import asyncio
import hashlib
import hmac
import time
from dataclasses import dataclass
from datetime import datetime
from typing import Any, Dict, List, Optional, Tuple
import httpx
from sqlmodel import Session, select
from .config import settings
from .logger import get_logger
from .metrics import metrics_registry
from .models import Block, Transaction
logger = get_logger(__name__)
@dataclass
class ImportResult:
accepted: bool
height: int
block_hash: str
reason: str
reorged: bool = False
reorg_depth: int = 0
class ProposerSignatureValidator:
"""Validates proposer signatures on imported blocks."""
def __init__(self, trusted_proposers: Optional[List[str]] = None) -> None:
self._trusted = set(trusted_proposers or [])
@property
def trusted_proposers(self) -> set:
return self._trusted
def add_trusted(self, proposer_id: str) -> None:
self._trusted.add(proposer_id)
def remove_trusted(self, proposer_id: str) -> None:
self._trusted.discard(proposer_id)
def validate_block_signature(self, block_data: Dict[str, Any]) -> Tuple[bool, str]:
"""Validate that a block was produced by a trusted proposer.
Returns (is_valid, reason).
"""
proposer = block_data.get("proposer", "")
block_hash = block_data.get("hash", "")
height = block_data.get("height", -1)
if not proposer:
return False, "Missing proposer field"
if not block_hash or not block_hash.startswith("0x"):
return False, f"Invalid block hash format: {block_hash}"
# If trusted list is configured, enforce it
if self._trusted and proposer not in self._trusted:
metrics_registry.increment("sync_signature_rejected_total")
return False, f"Proposer '{proposer}' not in trusted set"
# Verify block hash integrity
expected_fields = ["height", "parent_hash", "timestamp"]
for field in expected_fields:
if field not in block_data:
return False, f"Missing required field: {field}"
# Verify hash is a valid sha256 hex
hash_hex = block_hash[2:] # strip 0x
if len(hash_hex) != 64:
return False, f"Invalid hash length: {len(hash_hex)}"
try:
int(hash_hex, 16)
except ValueError:
return False, f"Invalid hex in hash: {hash_hex}"
metrics_registry.increment("sync_signature_validated_total")
return True, "Valid"
class ChainSync:
"""Handles block import with conflict resolution for divergent chains."""
def __init__(
self,
session_factory,
*,
chain_id: str = "",
max_reorg_depth: int = 10,
validator: Optional[ProposerSignatureValidator] = None,
validate_signatures: bool = True,
batch_size: int = 50,
poll_interval: float = 0.5,
) -> None:
self._session_factory = session_factory
self._chain_id = chain_id or settings.chain_id
self._max_reorg_depth = max_reorg_depth
self._validator = validator or ProposerSignatureValidator()
self._validate_signatures = validate_signatures
self._batch_size = batch_size
self._poll_interval = poll_interval
self._client = httpx.AsyncClient(timeout=10.0)
async def close(self) -> None:
"""Close HTTP client."""
await self._client.aclose()
async def fetch_blocks_range(self, start: int, end: int, source_url: str) -> List[Dict[str, Any]]:
"""Fetch a range of blocks from a source RPC."""
try:
resp = await self._client.get(f"{source_url}/rpc/blocks-range", params={"start": start, "end": end})
resp.raise_for_status()
data = resp.json()
if isinstance(data, list):
return data
elif isinstance(data, dict) and "blocks" in data:
return data["blocks"]
else:
logger.error("Unexpected blocks-range response", extra={"data": data})
return []
except Exception as e:
logger.error("Failed to fetch blocks range", extra={"start": start, "end": end, "error": str(e)})
return []
async def bulk_import_from(self, source_url: str, import_url: Optional[str] = None) -> int:
"""Bulk import missing blocks from source to catch up quickly."""
if import_url is None:
import_url = "http://127.0.0.1:8006" # default local RPC
# Get local head
with self._session_factory() as session:
local_head = session.exec(
select(Block).where(Block.chain_id == self._chain_id).order_by(Block.height.desc()).limit(1)
).first()
local_height = local_head.height if local_head else -1
# Get remote head
try:
resp = await self._client.get(f"{source_url}/rpc/head")
resp.raise_for_status()
remote_head = resp.json()
remote_height = remote_head.get("height", -1)
except Exception as e:
logger.error("Failed to fetch remote head", extra={"source_url": source_url, "error": str(e)})
return 0
if remote_height <= local_height:
logger.info("Already up to date", extra={"local_height": local_height, "remote_height": remote_height})
return 0
logger.info("Starting bulk import", extra={"local_height": local_height, "remote_height": remote_height, "batch_size": self._batch_size})
imported = 0
start_height = local_height + 1
while start_height <= remote_height:
end_height = min(start_height + self._batch_size - 1, remote_height)
batch = await self.fetch_blocks_range(start_height, end_height, source_url)
if not batch:
logger.warning("No blocks returned for range", extra={"start": start_height, "end": end_height})
break
# Import blocks in order
for block_data in batch:
result = self.import_block(block_data)
if result.accepted:
imported += 1
else:
logger.warning("Block import failed during bulk", extra={"height": block_data.get("height"), "reason": result.reason})
# Stop on first failure to avoid gaps
break
start_height = end_height + 1
# Brief pause to avoid overwhelming the DB
await asyncio.sleep(self._poll_interval)
logger.info("Bulk import completed", extra={"imported": imported, "final_height": remote_height})
return imported
def import_block(self, block_data: Dict[str, Any], transactions: Optional[List[Dict[str, Any]]] = None) -> ImportResult:
"""Import a block from a remote peer.
Handles:
- Normal append (block extends our chain)
- Fork resolution (block is on a longer chain)
- Duplicate detection
- Signature validation
"""
start = time.perf_counter()
height = block_data.get("height", -1)
block_hash = block_data.get("hash", "")
parent_hash = block_data.get("parent_hash", "")
proposer = block_data.get("proposer", "")
metrics_registry.increment("sync_blocks_received_total")
# Validate signature
if self._validate_signatures:
valid, reason = self._validator.validate_block_signature(block_data)
if not valid:
metrics_registry.increment("sync_blocks_rejected_total")
logger.warning("Block rejected: signature validation failed",
extra={"height": height, "reason": reason})
return ImportResult(accepted=False, height=height, block_hash=block_hash, reason=reason)
with self._session_factory() as session:
# Check for duplicate
existing = session.exec(
select(Block).where(Block.hash == block_hash)
).first()
if existing:
metrics_registry.increment("sync_blocks_duplicate_total")
return ImportResult(accepted=False, height=height, block_hash=block_hash,
reason="Block already exists")
# Get our chain head
our_head = session.exec(
select(Block).where(Block.chain_id == self._chain_id).order_by(Block.height.desc()).limit(1)
).first()
our_height = our_head.height if our_head else -1
# Case 1: Block extends our chain directly
if height == our_height + 1:
parent_exists = session.exec(
select(Block).where(Block.chain_id == self._chain_id).where(Block.hash == parent_hash)
).first()
if parent_exists or (height == 0 and parent_hash == "0x00"):
result = self._append_block(session, block_data, transactions)
duration = time.perf_counter() - start
metrics_registry.observe("sync_import_duration_seconds", duration)
return result
# Case 2: Block is behind our head — ignore
if height <= our_height:
# Check if it's a fork at a previous height
existing_at_height = session.exec(
select(Block).where(Block.chain_id == self._chain_id).where(Block.height == height)
).first()
if existing_at_height and existing_at_height.hash != block_hash:
# Fork detected — resolve by longest chain rule
return self._resolve_fork(session, block_data, transactions, our_head)
metrics_registry.increment("sync_blocks_stale_total")
return ImportResult(accepted=False, height=height, block_hash=block_hash,
reason=f"Stale block (our height: {our_height})")
# Case 3: Block is ahead — we're behind, need to catch up
if height > our_height + 1:
metrics_registry.increment("sync_blocks_gap_total")
return ImportResult(accepted=False, height=height, block_hash=block_hash,
reason=f"Gap detected (our height: {our_height}, received: {height})")
return ImportResult(accepted=False, height=height, block_hash=block_hash,
reason="Unhandled import case")
def _append_block(self, session: Session, block_data: Dict[str, Any],
transactions: Optional[List[Dict[str, Any]]] = None) -> ImportResult:
"""Append a block to the chain tip."""
timestamp_str = block_data.get("timestamp", "")
try:
timestamp = datetime.fromisoformat(timestamp_str) if timestamp_str else datetime.utcnow()
except (ValueError, TypeError):
timestamp = datetime.utcnow()
tx_count = block_data.get("tx_count", 0)
if transactions:
tx_count = len(transactions)
block = Block(
chain_id=self._chain_id,
height=block_data["height"],
hash=block_data["hash"],
parent_hash=block_data["parent_hash"],
proposer=block_data.get("proposer", "unknown"),
timestamp=timestamp,
tx_count=tx_count,
state_root=block_data.get("state_root"),
)
session.add(block)
# Import transactions if provided
if transactions:
for tx_data in transactions:
tx = Transaction(
chain_id=self._chain_id,
tx_hash=tx_data.get("tx_hash", ""),
block_height=block_data["height"],
sender=tx_data.get("sender", ""),
recipient=tx_data.get("recipient", ""),
payload=tx_data,
)
session.add(tx)
session.commit()
metrics_registry.increment("sync_blocks_accepted_total")
metrics_registry.set_gauge("sync_chain_height", float(block_data["height"]))
logger.info("Imported block", extra={
"height": block_data["height"],
"hash": block_data["hash"],
"proposer": block_data.get("proposer"),
"tx_count": tx_count,
})
return ImportResult(
accepted=True, height=block_data["height"],
block_hash=block_data["hash"], reason="Appended to chain"
)
def _resolve_fork(self, session: Session, block_data: Dict[str, Any],
transactions: Optional[List[Dict[str, Any]]],
our_head: Block) -> ImportResult:
"""Resolve a fork using longest-chain rule.
For PoA, we use a simple rule: if the incoming block's height is at or below
our head and the parent chain is longer, we reorg. Otherwise, we keep our chain.
Since we only receive one block at a time, we can only detect the fork — actual
reorg requires the full competing chain. For now, we log the fork and reject
unless the block has a strictly higher height.
"""
fork_height = block_data.get("height", -1)
our_height = our_head.height
metrics_registry.increment("sync_forks_detected_total")
logger.warning("Fork detected", extra={
"fork_height": fork_height,
"our_height": our_height,
"fork_hash": block_data.get("hash"),
"our_hash": our_head.hash,
})
# Simple longest-chain: only reorg if incoming chain is strictly longer
# and within max reorg depth
if fork_height <= our_height:
return ImportResult(
accepted=False, height=fork_height,
block_hash=block_data.get("hash", ""),
reason=f"Fork rejected: our chain is longer or equal ({our_height} >= {fork_height})"
)
reorg_depth = our_height - fork_height + 1
if reorg_depth > self._max_reorg_depth:
metrics_registry.increment("sync_reorg_rejected_total")
return ImportResult(
accepted=False, height=fork_height,
block_hash=block_data.get("hash", ""),
reason=f"Reorg depth {reorg_depth} exceeds max {self._max_reorg_depth}"
)
# Perform reorg: remove blocks from fork_height onwards, then append
blocks_to_remove = session.exec(
select(Block).where(Block.chain_id == self._chain_id).where(Block.height >= fork_height).order_by(Block.height.desc())
).all()
removed_count = 0
for old_block in blocks_to_remove:
# Remove transactions in the block
old_txs = session.exec(
select(Transaction).where(Transaction.chain_id == self._chain_id).where(Transaction.block_height == old_block.height)
).all()
for tx in old_txs:
session.delete(tx)
session.delete(old_block)
removed_count += 1
session.commit()
metrics_registry.increment("sync_reorgs_total")
metrics_registry.observe("sync_reorg_depth", float(removed_count))
logger.warning("Chain reorg performed", extra={
"removed_blocks": removed_count,
"new_height": fork_height,
})
# Now append the new block
result = self._append_block(session, block_data, transactions)
result.reorged = True
result.reorg_depth = removed_count
return result
def get_sync_status(self) -> Dict[str, Any]:
"""Get current sync status and metrics."""
with self._session_factory() as session:
head = session.exec(
select(Block).where(Block.chain_id == self._chain_id).order_by(Block.height.desc()).limit(1)
).first()
total_blocks = session.exec(select(Block).where(Block.chain_id == self._chain_id)).all()
total_txs = session.exec(select(Transaction).where(Transaction.chain_id == self._chain_id)).all()
return {
"chain_id": self._chain_id,
"head_height": head.height if head else -1,
"head_hash": head.hash if head else None,
"head_proposer": head.proposer if head else None,
"head_timestamp": head.timestamp.isoformat() if head else None,
"total_blocks": len(total_blocks),
"total_transactions": len(total_txs),
"validate_signatures": self._validate_signatures,
"trusted_proposers": list(self._validator.trusted_proposers),
"max_reorg_depth": self._max_reorg_depth,
}