mirror of
https://github.com/hl-archive-node/nanoreth.git
synced 2025-12-06 10:59:55 +00:00
2268 lines
89 KiB
Rust
2268 lines
89 KiB
Rust
//! Transaction types.
|
|
|
|
use alloc::vec::Vec;
|
|
use alloy_consensus::{
|
|
transaction::RlpEcdsaTx, SignableTransaction, Signed, Transaction as _, TxEip1559, TxEip2930,
|
|
TxEip4844, TxEip4844Variant, TxEip7702, TxLegacy, TypedTransaction,
|
|
};
|
|
use alloy_eips::{
|
|
eip2718::{Decodable2718, Eip2718Error, Eip2718Result, Encodable2718},
|
|
eip2930::AccessList,
|
|
eip7702::SignedAuthorization,
|
|
};
|
|
use alloy_primitives::{
|
|
keccak256, Address, Bytes, ChainId, PrimitiveSignature as Signature, TxHash, TxKind, B256, U256,
|
|
};
|
|
use alloy_rlp::{Decodable, Encodable, Error as RlpError, Header};
|
|
use core::hash::{Hash, Hasher};
|
|
use derive_more::{AsRef, Deref};
|
|
use once_cell as _;
|
|
#[cfg(not(feature = "std"))]
|
|
use once_cell::sync::{Lazy as LazyLock, OnceCell as OnceLock};
|
|
#[cfg(feature = "optimism")]
|
|
use op_alloy_consensus::DepositTransaction;
|
|
#[cfg(feature = "optimism")]
|
|
use op_alloy_consensus::TxDeposit;
|
|
use rayon::prelude::{IntoParallelIterator, ParallelIterator};
|
|
use reth_primitives_traits::{InMemorySize, SignedTransaction};
|
|
use revm_primitives::{AuthorizationList, TxEnv};
|
|
use serde::{Deserialize, Serialize};
|
|
use signature::decode_with_eip155_chain_id;
|
|
#[cfg(feature = "std")]
|
|
use std::sync::{LazyLock, OnceLock};
|
|
|
|
pub use compat::FillTxEnv;
|
|
pub use error::{
|
|
InvalidTransactionError, TransactionConversionError, TryFromRecoveredTransactionError,
|
|
};
|
|
pub use meta::TransactionMeta;
|
|
pub use pooled::{PooledTransactionsElement, PooledTransactionsElementEcRecovered};
|
|
pub use reth_primitives_traits::WithEncoded;
|
|
pub use sidecar::BlobTransaction;
|
|
pub use signature::{recover_signer, recover_signer_unchecked};
|
|
pub use tx_type::TxType;
|
|
|
|
/// Handling transaction signature operations, including signature recovery,
|
|
/// applying chain IDs, and EIP-2 validation.
|
|
pub mod signature;
|
|
pub mod util;
|
|
|
|
pub(crate) mod access_list;
|
|
mod compat;
|
|
mod error;
|
|
mod meta;
|
|
mod pooled;
|
|
mod sidecar;
|
|
mod tx_type;
|
|
|
|
#[cfg(any(test, feature = "reth-codec"))]
|
|
pub use tx_type::{
|
|
COMPACT_EXTENDED_IDENTIFIER_FLAG, COMPACT_IDENTIFIER_EIP1559, COMPACT_IDENTIFIER_EIP2930,
|
|
COMPACT_IDENTIFIER_LEGACY,
|
|
};
|
|
|
|
/// Expected number of transactions where we can expect a speed-up by recovering the senders in
|
|
/// parallel.
|
|
pub static PARALLEL_SENDER_RECOVERY_THRESHOLD: LazyLock<usize> =
|
|
LazyLock::new(|| match rayon::current_num_threads() {
|
|
0..=1 => usize::MAX,
|
|
2..=8 => 10,
|
|
_ => 5,
|
|
});
|
|
|
|
/// A raw transaction.
|
|
///
|
|
/// Transaction types were introduced in [EIP-2718](https://eips.ethereum.org/EIPS/eip-2718).
|
|
#[derive(Debug, Clone, PartialEq, Eq, Hash, Serialize, Deserialize, derive_more::From)]
|
|
#[cfg_attr(any(test, feature = "reth-codec"), reth_codecs::add_arbitrary_tests(compact))]
|
|
pub enum Transaction {
|
|
/// Legacy transaction (type `0x0`).
|
|
///
|
|
/// Traditional Ethereum transactions, containing parameters `nonce`, `gasPrice`, `gasLimit`,
|
|
/// `to`, `value`, `data`, `v`, `r`, and `s`.
|
|
///
|
|
/// These transactions do not utilize access lists nor do they incorporate EIP-1559 fee market
|
|
/// changes.
|
|
Legacy(TxLegacy),
|
|
/// Transaction with an [`AccessList`] ([EIP-2930](https://eips.ethereum.org/EIPS/eip-2930)), type `0x1`.
|
|
///
|
|
/// The `accessList` specifies an array of addresses and storage keys that the transaction
|
|
/// plans to access, enabling gas savings on cross-contract calls by pre-declaring the accessed
|
|
/// contract and storage slots.
|
|
Eip2930(TxEip2930),
|
|
/// A transaction with a priority fee ([EIP-1559](https://eips.ethereum.org/EIPS/eip-1559)), type `0x2`.
|
|
///
|
|
/// Unlike traditional transactions, EIP-1559 transactions use an in-protocol, dynamically
|
|
/// changing base fee per gas, adjusted at each block to manage network congestion.
|
|
///
|
|
/// - `maxPriorityFeePerGas`, specifying the maximum fee above the base fee the sender is
|
|
/// willing to pay
|
|
/// - `maxFeePerGas`, setting the maximum total fee the sender is willing to pay.
|
|
///
|
|
/// The base fee is burned, while the priority fee is paid to the miner who includes the
|
|
/// transaction, incentivizing miners to include transactions with higher priority fees per
|
|
/// gas.
|
|
Eip1559(TxEip1559),
|
|
/// Shard Blob Transactions ([EIP-4844](https://eips.ethereum.org/EIPS/eip-4844)), type `0x3`.
|
|
///
|
|
/// Shard Blob Transactions introduce a new transaction type called a blob-carrying transaction
|
|
/// to reduce gas costs. These transactions are similar to regular Ethereum transactions but
|
|
/// include additional data called a blob.
|
|
///
|
|
/// Blobs are larger (~125 kB) and cheaper than the current calldata, providing an immutable
|
|
/// and read-only memory for storing transaction data.
|
|
///
|
|
/// EIP-4844, also known as proto-danksharding, implements the framework and logic of
|
|
/// danksharding, introducing new transaction formats and verification rules.
|
|
Eip4844(TxEip4844),
|
|
/// EOA Set Code Transactions ([EIP-7702](https://eips.ethereum.org/EIPS/eip-7702)), type `0x4`.
|
|
///
|
|
/// EOA Set Code Transactions give the ability to temporarily set contract code for an
|
|
/// EOA for a single transaction. This allows for temporarily adding smart contract
|
|
/// functionality to the EOA.
|
|
Eip7702(TxEip7702),
|
|
/// Optimism deposit transaction.
|
|
#[cfg(feature = "optimism")]
|
|
Deposit(TxDeposit),
|
|
}
|
|
|
|
#[cfg(feature = "optimism")]
|
|
impl DepositTransaction for Transaction {
|
|
fn source_hash(&self) -> Option<B256> {
|
|
match self {
|
|
Self::Deposit(tx) => tx.source_hash(),
|
|
_ => None,
|
|
}
|
|
}
|
|
fn mint(&self) -> Option<u128> {
|
|
match self {
|
|
Self::Deposit(tx) => tx.mint(),
|
|
_ => None,
|
|
}
|
|
}
|
|
fn is_system_transaction(&self) -> bool {
|
|
match self {
|
|
Self::Deposit(tx) => tx.is_system_transaction(),
|
|
_ => false,
|
|
}
|
|
}
|
|
fn is_deposit(&self) -> bool {
|
|
matches!(self, Self::Deposit(_))
|
|
}
|
|
}
|
|
|
|
#[cfg(any(test, feature = "arbitrary"))]
|
|
impl<'a> arbitrary::Arbitrary<'a> for Transaction {
|
|
fn arbitrary(u: &mut arbitrary::Unstructured<'a>) -> arbitrary::Result<Self> {
|
|
let mut tx = match TxType::arbitrary(u)? {
|
|
TxType::Legacy => {
|
|
let tx = TxLegacy::arbitrary(u)?;
|
|
Self::Legacy(tx)
|
|
}
|
|
TxType::Eip2930 => {
|
|
let tx = TxEip2930::arbitrary(u)?;
|
|
Self::Eip2930(tx)
|
|
}
|
|
TxType::Eip1559 => {
|
|
let tx = TxEip1559::arbitrary(u)?;
|
|
Self::Eip1559(tx)
|
|
}
|
|
TxType::Eip4844 => {
|
|
let tx = TxEip4844::arbitrary(u)?;
|
|
Self::Eip4844(tx)
|
|
}
|
|
|
|
TxType::Eip7702 => {
|
|
let tx = TxEip7702::arbitrary(u)?;
|
|
Self::Eip7702(tx)
|
|
}
|
|
#[cfg(feature = "optimism")]
|
|
TxType::Deposit => {
|
|
let tx = TxDeposit::arbitrary(u)?;
|
|
Self::Deposit(tx)
|
|
}
|
|
};
|
|
|
|
// Otherwise we might overflow when calculating `v` on `recalculate_hash`
|
|
if let Some(chain_id) = tx.chain_id() {
|
|
tx.set_chain_id(chain_id % (u64::MAX / 2 - 36));
|
|
}
|
|
|
|
Ok(tx)
|
|
}
|
|
}
|
|
|
|
// === impl Transaction ===
|
|
|
|
impl Transaction {
|
|
/// Heavy operation that return signature hash over rlp encoded transaction.
|
|
/// It is only for signature signing or signer recovery.
|
|
pub fn signature_hash(&self) -> B256 {
|
|
match self {
|
|
Self::Legacy(tx) => tx.signature_hash(),
|
|
Self::Eip2930(tx) => tx.signature_hash(),
|
|
Self::Eip1559(tx) => tx.signature_hash(),
|
|
Self::Eip4844(tx) => tx.signature_hash(),
|
|
Self::Eip7702(tx) => tx.signature_hash(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(_) => B256::ZERO,
|
|
}
|
|
}
|
|
|
|
/// Sets the transaction's chain id to the provided value.
|
|
pub fn set_chain_id(&mut self, chain_id: u64) {
|
|
match self {
|
|
Self::Legacy(TxLegacy { chain_id: ref mut c, .. }) => *c = Some(chain_id),
|
|
Self::Eip2930(TxEip2930 { chain_id: ref mut c, .. }) |
|
|
Self::Eip1559(TxEip1559 { chain_id: ref mut c, .. }) |
|
|
Self::Eip4844(TxEip4844 { chain_id: ref mut c, .. }) |
|
|
Self::Eip7702(TxEip7702 { chain_id: ref mut c, .. }) => *c = chain_id,
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(_) => { /* noop */ }
|
|
}
|
|
}
|
|
|
|
/// Get the transaction's type
|
|
pub const fn tx_type(&self) -> TxType {
|
|
match self {
|
|
Self::Legacy(_) => TxType::Legacy,
|
|
Self::Eip2930(_) => TxType::Eip2930,
|
|
Self::Eip1559(_) => TxType::Eip1559,
|
|
Self::Eip4844(_) => TxType::Eip4844,
|
|
Self::Eip7702(_) => TxType::Eip7702,
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(_) => TxType::Deposit,
|
|
}
|
|
}
|
|
|
|
/// Returns the blob gas used for all blobs of the EIP-4844 transaction if it is an EIP-4844
|
|
/// transaction.
|
|
///
|
|
/// This is the number of blobs times the
|
|
/// [`DATA_GAS_PER_BLOB`](alloy_eips::eip4844::DATA_GAS_PER_BLOB) a single blob consumes.
|
|
pub fn blob_gas_used(&self) -> Option<u64> {
|
|
self.as_eip4844().map(TxEip4844::blob_gas)
|
|
}
|
|
|
|
/// Returns the effective miner gas tip cap (`gasTipCap`) for the given base fee:
|
|
/// `min(maxFeePerGas - baseFee, maxPriorityFeePerGas)`
|
|
///
|
|
/// If the base fee is `None`, the `max_priority_fee_per_gas`, or gas price for non-EIP1559
|
|
/// transactions is returned.
|
|
///
|
|
/// Returns `None` if the basefee is higher than the [`Transaction::max_fee_per_gas`].
|
|
pub fn effective_tip_per_gas(&self, base_fee: Option<u64>) -> Option<u128> {
|
|
let base_fee = match base_fee {
|
|
Some(base_fee) => base_fee as u128,
|
|
None => return Some(self.priority_fee_or_price()),
|
|
};
|
|
|
|
let max_fee_per_gas = self.max_fee_per_gas();
|
|
|
|
// Check if max_fee_per_gas is less than base_fee
|
|
if max_fee_per_gas < base_fee {
|
|
return None
|
|
}
|
|
|
|
// Calculate the difference between max_fee_per_gas and base_fee
|
|
let fee = max_fee_per_gas - base_fee;
|
|
|
|
// Compare the fee with max_priority_fee_per_gas (or gas price for non-EIP1559 transactions)
|
|
if let Some(priority_fee) = self.max_priority_fee_per_gas() {
|
|
Some(fee.min(priority_fee))
|
|
} else {
|
|
Some(fee)
|
|
}
|
|
}
|
|
|
|
/// This encodes the transaction _without_ the signature, and is only suitable for creating a
|
|
/// hash intended for signing.
|
|
pub fn encode_for_signing(&self, out: &mut dyn bytes::BufMut) {
|
|
match self {
|
|
Self::Legacy(tx) => tx.encode_for_signing(out),
|
|
Self::Eip2930(tx) => tx.encode_for_signing(out),
|
|
Self::Eip1559(tx) => tx.encode_for_signing(out),
|
|
Self::Eip4844(tx) => tx.encode_for_signing(out),
|
|
Self::Eip7702(tx) => tx.encode_for_signing(out),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(_) => {}
|
|
}
|
|
}
|
|
|
|
/// Produces EIP-2718 encoding of the transaction
|
|
pub fn eip2718_encode(&self, signature: &Signature, out: &mut dyn bytes::BufMut) {
|
|
match self {
|
|
Self::Legacy(legacy_tx) => {
|
|
// do nothing w/ with_header
|
|
legacy_tx.eip2718_encode(signature, out);
|
|
}
|
|
Self::Eip2930(access_list_tx) => {
|
|
access_list_tx.eip2718_encode(signature, out);
|
|
}
|
|
Self::Eip1559(dynamic_fee_tx) => {
|
|
dynamic_fee_tx.eip2718_encode(signature, out);
|
|
}
|
|
Self::Eip4844(blob_tx) => blob_tx.eip2718_encode(signature, out),
|
|
Self::Eip7702(set_code_tx) => {
|
|
set_code_tx.eip2718_encode(signature, out);
|
|
}
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(deposit_tx) => deposit_tx.encode_2718(out),
|
|
}
|
|
}
|
|
|
|
/// This sets the transaction's gas limit.
|
|
pub fn set_gas_limit(&mut self, gas_limit: u64) {
|
|
match self {
|
|
Self::Legacy(tx) => tx.gas_limit = gas_limit,
|
|
Self::Eip2930(tx) => tx.gas_limit = gas_limit,
|
|
Self::Eip1559(tx) => tx.gas_limit = gas_limit,
|
|
Self::Eip4844(tx) => tx.gas_limit = gas_limit,
|
|
Self::Eip7702(tx) => tx.gas_limit = gas_limit,
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.gas_limit = gas_limit,
|
|
}
|
|
}
|
|
|
|
/// This sets the transaction's nonce.
|
|
pub fn set_nonce(&mut self, nonce: u64) {
|
|
match self {
|
|
Self::Legacy(tx) => tx.nonce = nonce,
|
|
Self::Eip2930(tx) => tx.nonce = nonce,
|
|
Self::Eip1559(tx) => tx.nonce = nonce,
|
|
Self::Eip4844(tx) => tx.nonce = nonce,
|
|
Self::Eip7702(tx) => tx.nonce = nonce,
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(_) => { /* noop */ }
|
|
}
|
|
}
|
|
|
|
/// This sets the transaction's value.
|
|
pub fn set_value(&mut self, value: U256) {
|
|
match self {
|
|
Self::Legacy(tx) => tx.value = value,
|
|
Self::Eip2930(tx) => tx.value = value,
|
|
Self::Eip1559(tx) => tx.value = value,
|
|
Self::Eip4844(tx) => tx.value = value,
|
|
Self::Eip7702(tx) => tx.value = value,
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.value = value,
|
|
}
|
|
}
|
|
|
|
/// This sets the transaction's input field.
|
|
pub fn set_input(&mut self, input: Bytes) {
|
|
match self {
|
|
Self::Legacy(tx) => tx.input = input,
|
|
Self::Eip2930(tx) => tx.input = input,
|
|
Self::Eip1559(tx) => tx.input = input,
|
|
Self::Eip4844(tx) => tx.input = input,
|
|
Self::Eip7702(tx) => tx.input = input,
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.input = input,
|
|
}
|
|
}
|
|
|
|
/// Returns true if the transaction is a legacy transaction.
|
|
#[inline]
|
|
pub const fn is_legacy(&self) -> bool {
|
|
matches!(self, Self::Legacy(_))
|
|
}
|
|
|
|
/// Returns true if the transaction is an EIP-2930 transaction.
|
|
#[inline]
|
|
pub const fn is_eip2930(&self) -> bool {
|
|
matches!(self, Self::Eip2930(_))
|
|
}
|
|
|
|
/// Returns true if the transaction is an EIP-1559 transaction.
|
|
#[inline]
|
|
pub const fn is_eip1559(&self) -> bool {
|
|
matches!(self, Self::Eip1559(_))
|
|
}
|
|
|
|
/// Returns true if the transaction is an EIP-4844 transaction.
|
|
#[inline]
|
|
pub const fn is_eip4844(&self) -> bool {
|
|
matches!(self, Self::Eip4844(_))
|
|
}
|
|
|
|
/// Returns true if the transaction is an EIP-7702 transaction.
|
|
#[inline]
|
|
pub const fn is_eip7702(&self) -> bool {
|
|
matches!(self, Self::Eip7702(_))
|
|
}
|
|
|
|
/// Returns the [`TxLegacy`] variant if the transaction is a legacy transaction.
|
|
pub const fn as_legacy(&self) -> Option<&TxLegacy> {
|
|
match self {
|
|
Self::Legacy(tx) => Some(tx),
|
|
_ => None,
|
|
}
|
|
}
|
|
|
|
/// Returns the [`TxEip2930`] variant if the transaction is an EIP-2930 transaction.
|
|
pub const fn as_eip2930(&self) -> Option<&TxEip2930> {
|
|
match self {
|
|
Self::Eip2930(tx) => Some(tx),
|
|
_ => None,
|
|
}
|
|
}
|
|
|
|
/// Returns the [`TxEip1559`] variant if the transaction is an EIP-1559 transaction.
|
|
pub const fn as_eip1559(&self) -> Option<&TxEip1559> {
|
|
match self {
|
|
Self::Eip1559(tx) => Some(tx),
|
|
_ => None,
|
|
}
|
|
}
|
|
|
|
/// Returns the [`TxEip4844`] variant if the transaction is an EIP-4844 transaction.
|
|
pub const fn as_eip4844(&self) -> Option<&TxEip4844> {
|
|
match self {
|
|
Self::Eip4844(tx) => Some(tx),
|
|
_ => None,
|
|
}
|
|
}
|
|
|
|
/// Returns the [`TxEip7702`] variant if the transaction is an EIP-7702 transaction.
|
|
pub const fn as_eip7702(&self) -> Option<&TxEip7702> {
|
|
match self {
|
|
Self::Eip7702(tx) => Some(tx),
|
|
_ => None,
|
|
}
|
|
}
|
|
}
|
|
|
|
impl InMemorySize for Transaction {
|
|
/// Calculates a heuristic for the in-memory size of the [Transaction].
|
|
#[inline]
|
|
fn size(&self) -> usize {
|
|
match self {
|
|
Self::Legacy(tx) => tx.size(),
|
|
Self::Eip2930(tx) => tx.size(),
|
|
Self::Eip1559(tx) => tx.size(),
|
|
Self::Eip4844(tx) => tx.size(),
|
|
Self::Eip7702(tx) => tx.size(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.size(),
|
|
}
|
|
}
|
|
}
|
|
|
|
#[cfg(any(test, feature = "reth-codec"))]
|
|
impl reth_codecs::Compact for Transaction {
|
|
// Serializes the TxType to the buffer if necessary, returning 2 bits of the type as an
|
|
// identifier instead of the length.
|
|
fn to_compact<B>(&self, buf: &mut B) -> usize
|
|
where
|
|
B: bytes::BufMut + AsMut<[u8]>,
|
|
{
|
|
let identifier = self.tx_type().to_compact(buf);
|
|
match self {
|
|
Self::Legacy(tx) => {
|
|
tx.to_compact(buf);
|
|
}
|
|
Self::Eip2930(tx) => {
|
|
tx.to_compact(buf);
|
|
}
|
|
Self::Eip1559(tx) => {
|
|
tx.to_compact(buf);
|
|
}
|
|
Self::Eip4844(tx) => {
|
|
tx.to_compact(buf);
|
|
}
|
|
Self::Eip7702(tx) => {
|
|
tx.to_compact(buf);
|
|
}
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => {
|
|
tx.to_compact(buf);
|
|
}
|
|
}
|
|
identifier
|
|
}
|
|
|
|
// For backwards compatibility purposes, only 2 bits of the type are encoded in the identifier
|
|
// parameter. In the case of a [`COMPACT_EXTENDED_IDENTIFIER_FLAG`], the full transaction type
|
|
// is read from the buffer as a single byte.
|
|
//
|
|
// # Panics
|
|
//
|
|
// A panic will be triggered if an identifier larger than 3 is passed from the database. For
|
|
// optimism a identifier with value [`DEPOSIT_TX_TYPE_ID`] is allowed.
|
|
fn from_compact(mut buf: &[u8], identifier: usize) -> (Self, &[u8]) {
|
|
use bytes::Buf;
|
|
|
|
match identifier {
|
|
reth_codecs::txtype::COMPACT_IDENTIFIER_LEGACY => {
|
|
let (tx, buf) = TxLegacy::from_compact(buf, buf.len());
|
|
(Self::Legacy(tx), buf)
|
|
}
|
|
reth_codecs::txtype::COMPACT_IDENTIFIER_EIP2930 => {
|
|
let (tx, buf) = TxEip2930::from_compact(buf, buf.len());
|
|
(Self::Eip2930(tx), buf)
|
|
}
|
|
reth_codecs::txtype::COMPACT_IDENTIFIER_EIP1559 => {
|
|
let (tx, buf) = TxEip1559::from_compact(buf, buf.len());
|
|
(Self::Eip1559(tx), buf)
|
|
}
|
|
reth_codecs::txtype::COMPACT_EXTENDED_IDENTIFIER_FLAG => {
|
|
// An identifier of 3 indicates that the transaction type did not fit into
|
|
// the backwards compatible 2 bit identifier, their transaction types are
|
|
// larger than 2 bits (eg. 4844 and Deposit Transactions). In this case,
|
|
// we need to read the concrete transaction type from the buffer by
|
|
// reading the full 8 bits (single byte) and match on this transaction type.
|
|
let identifier = buf.get_u8();
|
|
match identifier {
|
|
alloy_consensus::constants::EIP4844_TX_TYPE_ID => {
|
|
let (tx, buf) = TxEip4844::from_compact(buf, buf.len());
|
|
(Self::Eip4844(tx), buf)
|
|
}
|
|
alloy_consensus::constants::EIP7702_TX_TYPE_ID => {
|
|
let (tx, buf) = TxEip7702::from_compact(buf, buf.len());
|
|
(Self::Eip7702(tx), buf)
|
|
}
|
|
#[cfg(feature = "optimism")]
|
|
op_alloy_consensus::DEPOSIT_TX_TYPE_ID => {
|
|
let (tx, buf) = TxDeposit::from_compact(buf, buf.len());
|
|
(Self::Deposit(tx), buf)
|
|
}
|
|
_ => unreachable!(
|
|
"Junk data in database: unknown Transaction variant: {identifier}"
|
|
),
|
|
}
|
|
}
|
|
_ => unreachable!("Junk data in database: unknown Transaction variant: {identifier}"),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl Default for Transaction {
|
|
fn default() -> Self {
|
|
Self::Legacy(TxLegacy::default())
|
|
}
|
|
}
|
|
|
|
impl alloy_consensus::Transaction for Transaction {
|
|
fn chain_id(&self) -> Option<ChainId> {
|
|
match self {
|
|
Self::Legacy(tx) => tx.chain_id(),
|
|
Self::Eip2930(tx) => tx.chain_id(),
|
|
Self::Eip1559(tx) => tx.chain_id(),
|
|
Self::Eip4844(tx) => tx.chain_id(),
|
|
Self::Eip7702(tx) => tx.chain_id(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.chain_id(),
|
|
}
|
|
}
|
|
|
|
fn nonce(&self) -> u64 {
|
|
match self {
|
|
Self::Legacy(tx) => tx.nonce(),
|
|
Self::Eip2930(tx) => tx.nonce(),
|
|
Self::Eip1559(tx) => tx.nonce(),
|
|
Self::Eip4844(tx) => tx.nonce(),
|
|
Self::Eip7702(tx) => tx.nonce(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.nonce(),
|
|
}
|
|
}
|
|
|
|
fn gas_limit(&self) -> u64 {
|
|
match self {
|
|
Self::Legacy(tx) => tx.gas_limit(),
|
|
Self::Eip2930(tx) => tx.gas_limit(),
|
|
Self::Eip1559(tx) => tx.gas_limit(),
|
|
Self::Eip4844(tx) => tx.gas_limit(),
|
|
Self::Eip7702(tx) => tx.gas_limit(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.gas_limit(),
|
|
}
|
|
}
|
|
|
|
fn gas_price(&self) -> Option<u128> {
|
|
match self {
|
|
Self::Legacy(tx) => tx.gas_price(),
|
|
Self::Eip2930(tx) => tx.gas_price(),
|
|
Self::Eip1559(tx) => tx.gas_price(),
|
|
Self::Eip4844(tx) => tx.gas_price(),
|
|
Self::Eip7702(tx) => tx.gas_price(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.gas_price(),
|
|
}
|
|
}
|
|
|
|
fn max_fee_per_gas(&self) -> u128 {
|
|
match self {
|
|
Self::Legacy(tx) => tx.max_fee_per_gas(),
|
|
Self::Eip2930(tx) => tx.max_fee_per_gas(),
|
|
Self::Eip1559(tx) => tx.max_fee_per_gas(),
|
|
Self::Eip4844(tx) => tx.max_fee_per_gas(),
|
|
Self::Eip7702(tx) => tx.max_fee_per_gas(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.max_fee_per_gas(),
|
|
}
|
|
}
|
|
|
|
fn max_priority_fee_per_gas(&self) -> Option<u128> {
|
|
match self {
|
|
Self::Legacy(tx) => tx.max_priority_fee_per_gas(),
|
|
Self::Eip2930(tx) => tx.max_priority_fee_per_gas(),
|
|
Self::Eip1559(tx) => tx.max_priority_fee_per_gas(),
|
|
Self::Eip4844(tx) => tx.max_priority_fee_per_gas(),
|
|
Self::Eip7702(tx) => tx.max_priority_fee_per_gas(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.max_priority_fee_per_gas(),
|
|
}
|
|
}
|
|
|
|
fn max_fee_per_blob_gas(&self) -> Option<u128> {
|
|
match self {
|
|
Self::Legacy(tx) => tx.max_fee_per_blob_gas(),
|
|
Self::Eip2930(tx) => tx.max_fee_per_blob_gas(),
|
|
Self::Eip1559(tx) => tx.max_fee_per_blob_gas(),
|
|
Self::Eip4844(tx) => tx.max_fee_per_blob_gas(),
|
|
Self::Eip7702(tx) => tx.max_fee_per_blob_gas(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.max_fee_per_blob_gas(),
|
|
}
|
|
}
|
|
|
|
fn priority_fee_or_price(&self) -> u128 {
|
|
match self {
|
|
Self::Legacy(tx) => tx.priority_fee_or_price(),
|
|
Self::Eip2930(tx) => tx.priority_fee_or_price(),
|
|
Self::Eip1559(tx) => tx.priority_fee_or_price(),
|
|
Self::Eip4844(tx) => tx.priority_fee_or_price(),
|
|
Self::Eip7702(tx) => tx.priority_fee_or_price(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.priority_fee_or_price(),
|
|
}
|
|
}
|
|
|
|
fn effective_gas_price(&self, base_fee: Option<u64>) -> u128 {
|
|
match self {
|
|
Self::Legacy(tx) => tx.effective_gas_price(base_fee),
|
|
Self::Eip2930(tx) => tx.effective_gas_price(base_fee),
|
|
Self::Eip1559(tx) => tx.effective_gas_price(base_fee),
|
|
Self::Eip4844(tx) => tx.effective_gas_price(base_fee),
|
|
Self::Eip7702(tx) => tx.effective_gas_price(base_fee),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.effective_gas_price(base_fee),
|
|
}
|
|
}
|
|
|
|
fn is_dynamic_fee(&self) -> bool {
|
|
match self {
|
|
Self::Legacy(_) | Self::Eip2930(_) => false,
|
|
Self::Eip1559(_) | Self::Eip4844(_) | Self::Eip7702(_) => true,
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(_) => false,
|
|
}
|
|
}
|
|
|
|
fn kind(&self) -> TxKind {
|
|
match self {
|
|
Self::Legacy(tx) => tx.kind(),
|
|
Self::Eip2930(tx) => tx.kind(),
|
|
Self::Eip1559(tx) => tx.kind(),
|
|
Self::Eip4844(tx) => tx.kind(),
|
|
Self::Eip7702(tx) => tx.kind(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.kind(),
|
|
}
|
|
}
|
|
|
|
fn is_create(&self) -> bool {
|
|
match self {
|
|
Self::Legacy(tx) => tx.is_create(),
|
|
Self::Eip2930(tx) => tx.is_create(),
|
|
Self::Eip1559(tx) => tx.is_create(),
|
|
Self::Eip4844(tx) => tx.is_create(),
|
|
Self::Eip7702(tx) => tx.is_create(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.is_create(),
|
|
}
|
|
}
|
|
|
|
fn value(&self) -> U256 {
|
|
match self {
|
|
Self::Legacy(tx) => tx.value(),
|
|
Self::Eip2930(tx) => tx.value(),
|
|
Self::Eip1559(tx) => tx.value(),
|
|
Self::Eip4844(tx) => tx.value(),
|
|
Self::Eip7702(tx) => tx.value(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.value(),
|
|
}
|
|
}
|
|
|
|
fn input(&self) -> &Bytes {
|
|
match self {
|
|
Self::Legacy(tx) => tx.input(),
|
|
Self::Eip2930(tx) => tx.input(),
|
|
Self::Eip1559(tx) => tx.input(),
|
|
Self::Eip4844(tx) => tx.input(),
|
|
Self::Eip7702(tx) => tx.input(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.input(),
|
|
}
|
|
}
|
|
|
|
fn ty(&self) -> u8 {
|
|
match self {
|
|
Self::Legacy(tx) => tx.ty(),
|
|
Self::Eip2930(tx) => tx.ty(),
|
|
Self::Eip1559(tx) => tx.ty(),
|
|
Self::Eip4844(tx) => tx.ty(),
|
|
Self::Eip7702(tx) => tx.ty(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.ty(),
|
|
}
|
|
}
|
|
|
|
fn access_list(&self) -> Option<&AccessList> {
|
|
match self {
|
|
Self::Legacy(tx) => tx.access_list(),
|
|
Self::Eip2930(tx) => tx.access_list(),
|
|
Self::Eip1559(tx) => tx.access_list(),
|
|
Self::Eip4844(tx) => tx.access_list(),
|
|
Self::Eip7702(tx) => tx.access_list(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.access_list(),
|
|
}
|
|
}
|
|
|
|
fn blob_versioned_hashes(&self) -> Option<&[B256]> {
|
|
match self {
|
|
Self::Legacy(tx) => tx.blob_versioned_hashes(),
|
|
Self::Eip2930(tx) => tx.blob_versioned_hashes(),
|
|
Self::Eip1559(tx) => tx.blob_versioned_hashes(),
|
|
Self::Eip4844(tx) => tx.blob_versioned_hashes(),
|
|
Self::Eip7702(tx) => tx.blob_versioned_hashes(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.blob_versioned_hashes(),
|
|
}
|
|
}
|
|
|
|
fn authorization_list(&self) -> Option<&[SignedAuthorization]> {
|
|
match self {
|
|
Self::Legacy(tx) => tx.authorization_list(),
|
|
Self::Eip2930(tx) => tx.authorization_list(),
|
|
Self::Eip1559(tx) => tx.authorization_list(),
|
|
Self::Eip4844(tx) => tx.authorization_list(),
|
|
Self::Eip7702(tx) => tx.authorization_list(),
|
|
#[cfg(feature = "optimism")]
|
|
Self::Deposit(tx) => tx.authorization_list(),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl From<TxEip4844Variant> for Transaction {
|
|
fn from(value: TxEip4844Variant) -> Self {
|
|
match value {
|
|
TxEip4844Variant::TxEip4844(tx) => tx.into(),
|
|
TxEip4844Variant::TxEip4844WithSidecar(tx) => tx.tx.into(),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl From<TypedTransaction> for Transaction {
|
|
fn from(value: TypedTransaction) -> Self {
|
|
match value {
|
|
TypedTransaction::Legacy(tx) => tx.into(),
|
|
TypedTransaction::Eip2930(tx) => tx.into(),
|
|
TypedTransaction::Eip1559(tx) => tx.into(),
|
|
TypedTransaction::Eip4844(tx) => tx.into(),
|
|
TypedTransaction::Eip7702(tx) => tx.into(),
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Signed transaction.
|
|
#[cfg_attr(any(test, feature = "reth-codec"), reth_codecs::add_arbitrary_tests(rlp))]
|
|
#[derive(Debug, Clone, Eq, AsRef, Deref, Serialize, Deserialize)]
|
|
pub struct TransactionSigned {
|
|
/// Transaction hash
|
|
#[serde(skip)]
|
|
pub hash: OnceLock<TxHash>,
|
|
/// The transaction signature values
|
|
pub signature: Signature,
|
|
/// Raw transaction info
|
|
#[deref]
|
|
#[as_ref]
|
|
pub transaction: Transaction,
|
|
}
|
|
|
|
impl Default for TransactionSigned {
|
|
fn default() -> Self {
|
|
Self {
|
|
hash: Default::default(),
|
|
signature: Signature::test_signature(),
|
|
transaction: Default::default(),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl AsRef<Self> for TransactionSigned {
|
|
fn as_ref(&self) -> &Self {
|
|
self
|
|
}
|
|
}
|
|
|
|
impl Hash for TransactionSigned {
|
|
fn hash<H: Hasher>(&self, state: &mut H) {
|
|
self.signature.hash(state);
|
|
self.transaction.hash(state);
|
|
}
|
|
}
|
|
|
|
impl PartialEq for TransactionSigned {
|
|
fn eq(&self, other: &Self) -> bool {
|
|
self.signature == other.signature &&
|
|
self.transaction == other.transaction &&
|
|
self.tx_hash() == other.tx_hash()
|
|
}
|
|
}
|
|
|
|
// === impl TransactionSigned ===
|
|
|
|
impl TransactionSigned {
|
|
/// Creates a new signed transaction from the given parts.
|
|
pub fn new(transaction: Transaction, signature: Signature, hash: B256) -> Self {
|
|
Self { hash: hash.into(), signature, transaction }
|
|
}
|
|
|
|
/// Creates a new signed transaction from the given transaction and signature without the hash.
|
|
///
|
|
/// Note: this only calculates the hash on the first [`TransactionSigned::hash`] call.
|
|
pub fn new_unhashed(transaction: Transaction, signature: Signature) -> Self {
|
|
Self { hash: Default::default(), signature, transaction }
|
|
}
|
|
|
|
/// Transaction
|
|
pub const fn transaction(&self) -> &Transaction {
|
|
&self.transaction
|
|
}
|
|
|
|
/// Tries to convert a [`TransactionSigned`] into a [`PooledTransactionsElement`].
|
|
///
|
|
/// This function used as a helper to convert from a decoded p2p broadcast message to
|
|
/// [`PooledTransactionsElement`]. Since [`BlobTransaction`] is disallowed to be broadcasted on
|
|
/// p2p, return an err if `tx` is [`Transaction::Eip4844`].
|
|
pub fn try_into_pooled(self) -> Result<PooledTransactionsElement, Self> {
|
|
let hash = self.hash();
|
|
match self {
|
|
Self { transaction: Transaction::Legacy(tx), signature, .. } => {
|
|
Ok(PooledTransactionsElement::Legacy(Signed::new_unchecked(tx, signature, hash)))
|
|
}
|
|
Self { transaction: Transaction::Eip2930(tx), signature, .. } => {
|
|
Ok(PooledTransactionsElement::Eip2930(Signed::new_unchecked(tx, signature, hash)))
|
|
}
|
|
Self { transaction: Transaction::Eip1559(tx), signature, .. } => {
|
|
Ok(PooledTransactionsElement::Eip1559(Signed::new_unchecked(tx, signature, hash)))
|
|
}
|
|
Self { transaction: Transaction::Eip7702(tx), signature, .. } => {
|
|
Ok(PooledTransactionsElement::Eip7702(Signed::new_unchecked(tx, signature, hash)))
|
|
}
|
|
// Not supported because missing blob sidecar
|
|
tx @ Self { transaction: Transaction::Eip4844(_), .. } => Err(tx),
|
|
#[cfg(feature = "optimism")]
|
|
// Not supported because deposit transactions are never pooled
|
|
tx @ Self { transaction: Transaction::Deposit(_), .. } => Err(tx),
|
|
}
|
|
}
|
|
|
|
/// Transaction hash. Used to identify transaction.
|
|
pub fn hash(&self) -> TxHash {
|
|
*self.tx_hash()
|
|
}
|
|
|
|
/// Recovers a list of signers from a transaction list iterator.
|
|
///
|
|
/// Returns `None`, if some transaction's signature is invalid, see also
|
|
/// [`Self::recover_signer`].
|
|
pub fn recover_signers<'a, T>(txes: T, num_txes: usize) -> Option<Vec<Address>>
|
|
where
|
|
T: IntoParallelIterator<Item = &'a Self> + IntoIterator<Item = &'a Self> + Send,
|
|
{
|
|
if num_txes < *PARALLEL_SENDER_RECOVERY_THRESHOLD {
|
|
txes.into_iter().map(|tx| tx.recover_signer()).collect()
|
|
} else {
|
|
txes.into_par_iter().map(|tx| tx.recover_signer()).collect()
|
|
}
|
|
}
|
|
|
|
/// Recovers a list of signers from a transaction list iterator _without ensuring that the
|
|
/// signature has a low `s` value_.
|
|
///
|
|
/// Returns `None`, if some transaction's signature is invalid, see also
|
|
/// [`Self::recover_signer_unchecked`].
|
|
pub fn recover_signers_unchecked<'a, T>(txes: T, num_txes: usize) -> Option<Vec<Address>>
|
|
where
|
|
T: IntoParallelIterator<Item = &'a Self> + IntoIterator<Item = &'a Self>,
|
|
{
|
|
if num_txes < *PARALLEL_SENDER_RECOVERY_THRESHOLD {
|
|
txes.into_iter().map(|tx| tx.recover_signer_unchecked()).collect()
|
|
} else {
|
|
txes.into_par_iter().map(|tx| tx.recover_signer_unchecked()).collect()
|
|
}
|
|
}
|
|
|
|
/// Returns the [`RecoveredTx`] transaction with the given sender.
|
|
#[inline]
|
|
pub const fn with_signer(self, signer: Address) -> RecoveredTx {
|
|
RecoveredTx::from_signed_transaction(self, signer)
|
|
}
|
|
|
|
/// Consumes the type, recover signer and return [`RecoveredTx`]
|
|
///
|
|
/// Returns `None` if the transaction's signature is invalid, see also [`Self::recover_signer`].
|
|
pub fn into_ecrecovered(self) -> Option<RecoveredTx> {
|
|
let signer = self.recover_signer()?;
|
|
Some(RecoveredTx { signed_transaction: self, signer })
|
|
}
|
|
|
|
/// Consumes the type, recover signer and return [`RecoveredTx`] _without
|
|
/// ensuring that the signature has a low `s` value_ (EIP-2).
|
|
///
|
|
/// Returns `None` if the transaction's signature is invalid, see also
|
|
/// [`Self::recover_signer_unchecked`].
|
|
pub fn into_ecrecovered_unchecked(self) -> Option<RecoveredTx> {
|
|
let signer = self.recover_signer_unchecked()?;
|
|
Some(RecoveredTx { signed_transaction: self, signer })
|
|
}
|
|
|
|
/// Tries to recover signer and return [`RecoveredTx`]. _without ensuring that
|
|
/// the signature has a low `s` value_ (EIP-2).
|
|
///
|
|
/// Returns `Err(Self)` if the transaction's signature is invalid, see also
|
|
/// [`Self::recover_signer_unchecked`].
|
|
pub fn try_into_ecrecovered_unchecked(self) -> Result<RecoveredTx, Self> {
|
|
match self.recover_signer_unchecked() {
|
|
None => Err(self),
|
|
Some(signer) => Ok(RecoveredTx { signed_transaction: self, signer }),
|
|
}
|
|
}
|
|
|
|
/// Calculate transaction hash, eip2728 transaction does not contain rlp header and start with
|
|
/// tx type.
|
|
pub fn recalculate_hash(&self) -> B256 {
|
|
keccak256(self.encoded_2718())
|
|
}
|
|
|
|
/// Splits the transaction into parts.
|
|
pub fn into_parts(self) -> (Transaction, Signature, B256) {
|
|
let hash = self.hash();
|
|
(self.transaction, self.signature, hash)
|
|
}
|
|
|
|
/// Decodes legacy transaction from the data buffer into a tuple.
|
|
///
|
|
/// This expects `rlp(legacy_tx)`
|
|
///
|
|
/// Refer to the docs for [`Self::decode_rlp_legacy_transaction`] for details on the exact
|
|
/// format expected.
|
|
pub fn decode_rlp_legacy_transaction_tuple(
|
|
data: &mut &[u8],
|
|
) -> alloy_rlp::Result<(TxLegacy, TxHash, Signature)> {
|
|
// keep this around, so we can use it to calculate the hash
|
|
let original_encoding = *data;
|
|
|
|
let header = Header::decode(data)?;
|
|
let remaining_len = data.len();
|
|
|
|
let transaction_payload_len = header.payload_length;
|
|
|
|
if transaction_payload_len > remaining_len {
|
|
return Err(RlpError::InputTooShort)
|
|
}
|
|
|
|
let mut transaction = TxLegacy {
|
|
nonce: Decodable::decode(data)?,
|
|
gas_price: Decodable::decode(data)?,
|
|
gas_limit: Decodable::decode(data)?,
|
|
to: Decodable::decode(data)?,
|
|
value: Decodable::decode(data)?,
|
|
input: Decodable::decode(data)?,
|
|
chain_id: None,
|
|
};
|
|
let (signature, extracted_id) = decode_with_eip155_chain_id(data)?;
|
|
transaction.chain_id = extracted_id;
|
|
|
|
// check the new length, compared to the original length and the header length
|
|
let decoded = remaining_len - data.len();
|
|
if decoded != transaction_payload_len {
|
|
return Err(RlpError::UnexpectedLength)
|
|
}
|
|
|
|
let tx_length = header.payload_length + header.length();
|
|
let hash = keccak256(&original_encoding[..tx_length]);
|
|
Ok((transaction, hash, signature))
|
|
}
|
|
|
|
/// Decodes legacy transaction from the data buffer.
|
|
///
|
|
/// This should be used _only_ be used in general transaction decoding methods, which have
|
|
/// already ensured that the input is a legacy transaction with the following format:
|
|
/// `rlp(legacy_tx)`
|
|
///
|
|
/// Legacy transactions are encoded as lists, so the input should start with a RLP list header.
|
|
///
|
|
/// This expects `rlp(legacy_tx)`
|
|
// TODO: make buf advancement semantics consistent with `decode_enveloped_typed_transaction`,
|
|
// so decoding methods do not need to manually advance the buffer
|
|
pub fn decode_rlp_legacy_transaction(data: &mut &[u8]) -> alloy_rlp::Result<Self> {
|
|
let (transaction, hash, signature) = Self::decode_rlp_legacy_transaction_tuple(data)?;
|
|
let signed =
|
|
Self { transaction: Transaction::Legacy(transaction), hash: hash.into(), signature };
|
|
Ok(signed)
|
|
}
|
|
}
|
|
|
|
impl SignedTransaction for TransactionSigned {
|
|
type Type = TxType;
|
|
|
|
fn tx_hash(&self) -> &TxHash {
|
|
self.hash.get_or_init(|| self.recalculate_hash())
|
|
}
|
|
|
|
fn signature(&self) -> &Signature {
|
|
&self.signature
|
|
}
|
|
|
|
fn recover_signer(&self) -> Option<Address> {
|
|
// Optimism's Deposit transaction does not have a signature. Directly return the
|
|
// `from` address.
|
|
#[cfg(feature = "optimism")]
|
|
if let Transaction::Deposit(TxDeposit { from, .. }) = self.transaction {
|
|
return Some(from)
|
|
}
|
|
let signature_hash = self.signature_hash();
|
|
recover_signer(&self.signature, signature_hash)
|
|
}
|
|
|
|
fn recover_signer_unchecked_with_buf(&self, buf: &mut Vec<u8>) -> Option<Address> {
|
|
// Optimism's Deposit transaction does not have a signature. Directly return the
|
|
// `from` address.
|
|
#[cfg(feature = "optimism")]
|
|
if let Transaction::Deposit(TxDeposit { from, .. }) = self.transaction {
|
|
return Some(from)
|
|
}
|
|
self.encode_for_signing(buf);
|
|
let signature_hash = keccak256(buf);
|
|
recover_signer_unchecked(&self.signature, signature_hash)
|
|
}
|
|
}
|
|
|
|
impl reth_primitives_traits::FillTxEnv for TransactionSigned {
|
|
fn fill_tx_env(&self, tx_env: &mut TxEnv, sender: Address) {
|
|
tx_env.caller = sender;
|
|
match self.as_ref() {
|
|
Transaction::Legacy(tx) => {
|
|
tx_env.gas_limit = tx.gas_limit;
|
|
tx_env.gas_price = U256::from(tx.gas_price);
|
|
tx_env.gas_priority_fee = None;
|
|
tx_env.transact_to = tx.to;
|
|
tx_env.value = tx.value;
|
|
tx_env.data = tx.input.clone();
|
|
tx_env.chain_id = tx.chain_id;
|
|
tx_env.nonce = Some(tx.nonce);
|
|
tx_env.access_list.clear();
|
|
tx_env.blob_hashes.clear();
|
|
tx_env.max_fee_per_blob_gas.take();
|
|
tx_env.authorization_list = None;
|
|
}
|
|
Transaction::Eip2930(tx) => {
|
|
tx_env.gas_limit = tx.gas_limit;
|
|
tx_env.gas_price = U256::from(tx.gas_price);
|
|
tx_env.gas_priority_fee = None;
|
|
tx_env.transact_to = tx.to;
|
|
tx_env.value = tx.value;
|
|
tx_env.data = tx.input.clone();
|
|
tx_env.chain_id = Some(tx.chain_id);
|
|
tx_env.nonce = Some(tx.nonce);
|
|
tx_env.access_list.clone_from(&tx.access_list.0);
|
|
tx_env.blob_hashes.clear();
|
|
tx_env.max_fee_per_blob_gas.take();
|
|
tx_env.authorization_list = None;
|
|
}
|
|
Transaction::Eip1559(tx) => {
|
|
tx_env.gas_limit = tx.gas_limit;
|
|
tx_env.gas_price = U256::from(tx.max_fee_per_gas);
|
|
tx_env.gas_priority_fee = Some(U256::from(tx.max_priority_fee_per_gas));
|
|
tx_env.transact_to = tx.to;
|
|
tx_env.value = tx.value;
|
|
tx_env.data = tx.input.clone();
|
|
tx_env.chain_id = Some(tx.chain_id);
|
|
tx_env.nonce = Some(tx.nonce);
|
|
tx_env.access_list.clone_from(&tx.access_list.0);
|
|
tx_env.blob_hashes.clear();
|
|
tx_env.max_fee_per_blob_gas.take();
|
|
tx_env.authorization_list = None;
|
|
}
|
|
Transaction::Eip4844(tx) => {
|
|
tx_env.gas_limit = tx.gas_limit;
|
|
tx_env.gas_price = U256::from(tx.max_fee_per_gas);
|
|
tx_env.gas_priority_fee = Some(U256::from(tx.max_priority_fee_per_gas));
|
|
tx_env.transact_to = TxKind::Call(tx.to);
|
|
tx_env.value = tx.value;
|
|
tx_env.data = tx.input.clone();
|
|
tx_env.chain_id = Some(tx.chain_id);
|
|
tx_env.nonce = Some(tx.nonce);
|
|
tx_env.access_list.clone_from(&tx.access_list.0);
|
|
tx_env.blob_hashes.clone_from(&tx.blob_versioned_hashes);
|
|
tx_env.max_fee_per_blob_gas = Some(U256::from(tx.max_fee_per_blob_gas));
|
|
tx_env.authorization_list = None;
|
|
}
|
|
Transaction::Eip7702(tx) => {
|
|
tx_env.gas_limit = tx.gas_limit;
|
|
tx_env.gas_price = U256::from(tx.max_fee_per_gas);
|
|
tx_env.gas_priority_fee = Some(U256::from(tx.max_priority_fee_per_gas));
|
|
tx_env.transact_to = tx.to.into();
|
|
tx_env.value = tx.value;
|
|
tx_env.data = tx.input.clone();
|
|
tx_env.chain_id = Some(tx.chain_id);
|
|
tx_env.nonce = Some(tx.nonce);
|
|
tx_env.access_list.clone_from(&tx.access_list.0);
|
|
tx_env.blob_hashes.clear();
|
|
tx_env.max_fee_per_blob_gas.take();
|
|
tx_env.authorization_list =
|
|
Some(AuthorizationList::Signed(tx.authorization_list.clone()));
|
|
}
|
|
#[cfg(feature = "optimism")]
|
|
Transaction::Deposit(_) => {}
|
|
}
|
|
}
|
|
}
|
|
|
|
impl InMemorySize for TransactionSigned {
|
|
/// Calculate a heuristic for the in-memory size of the [`TransactionSigned`].
|
|
#[inline]
|
|
fn size(&self) -> usize {
|
|
self.hash().size() + self.transaction.size() + self.signature().size()
|
|
}
|
|
}
|
|
|
|
impl alloy_consensus::Transaction for TransactionSigned {
|
|
fn chain_id(&self) -> Option<ChainId> {
|
|
self.deref().chain_id()
|
|
}
|
|
|
|
fn nonce(&self) -> u64 {
|
|
self.deref().nonce()
|
|
}
|
|
|
|
fn gas_limit(&self) -> u64 {
|
|
self.deref().gas_limit()
|
|
}
|
|
|
|
fn gas_price(&self) -> Option<u128> {
|
|
self.deref().gas_price()
|
|
}
|
|
|
|
fn max_fee_per_gas(&self) -> u128 {
|
|
self.deref().max_fee_per_gas()
|
|
}
|
|
|
|
fn max_priority_fee_per_gas(&self) -> Option<u128> {
|
|
self.deref().max_priority_fee_per_gas()
|
|
}
|
|
|
|
fn max_fee_per_blob_gas(&self) -> Option<u128> {
|
|
self.deref().max_fee_per_blob_gas()
|
|
}
|
|
|
|
fn priority_fee_or_price(&self) -> u128 {
|
|
self.deref().priority_fee_or_price()
|
|
}
|
|
|
|
fn effective_gas_price(&self, base_fee: Option<u64>) -> u128 {
|
|
self.deref().effective_gas_price(base_fee)
|
|
}
|
|
|
|
fn is_dynamic_fee(&self) -> bool {
|
|
self.deref().is_dynamic_fee()
|
|
}
|
|
|
|
fn kind(&self) -> TxKind {
|
|
self.deref().kind()
|
|
}
|
|
|
|
fn is_create(&self) -> bool {
|
|
self.deref().is_create()
|
|
}
|
|
|
|
fn value(&self) -> U256 {
|
|
self.deref().value()
|
|
}
|
|
|
|
fn input(&self) -> &Bytes {
|
|
self.deref().input()
|
|
}
|
|
|
|
fn ty(&self) -> u8 {
|
|
self.deref().ty()
|
|
}
|
|
|
|
fn access_list(&self) -> Option<&AccessList> {
|
|
self.deref().access_list()
|
|
}
|
|
|
|
fn blob_versioned_hashes(&self) -> Option<&[B256]> {
|
|
alloy_consensus::Transaction::blob_versioned_hashes(self.deref())
|
|
}
|
|
|
|
fn authorization_list(&self) -> Option<&[SignedAuthorization]> {
|
|
self.deref().authorization_list()
|
|
}
|
|
}
|
|
|
|
impl From<RecoveredTx> for TransactionSigned {
|
|
fn from(recovered: RecoveredTx) -> Self {
|
|
recovered.signed_transaction
|
|
}
|
|
}
|
|
|
|
impl Encodable for TransactionSigned {
|
|
/// This encodes the transaction _with_ the signature, and an rlp header.
|
|
///
|
|
/// For legacy transactions, it encodes the transaction data:
|
|
/// `rlp(tx-data)`
|
|
///
|
|
/// For EIP-2718 typed transactions, it encodes the transaction type followed by the rlp of the
|
|
/// transaction:
|
|
/// `rlp(tx-type || rlp(tx-data))`
|
|
fn encode(&self, out: &mut dyn bytes::BufMut) {
|
|
self.network_encode(out);
|
|
}
|
|
|
|
fn length(&self) -> usize {
|
|
let mut payload_length = self.encode_2718_len();
|
|
if !self.is_legacy() {
|
|
payload_length += Header { list: false, payload_length }.length();
|
|
}
|
|
|
|
payload_length
|
|
}
|
|
}
|
|
|
|
impl Decodable for TransactionSigned {
|
|
/// This `Decodable` implementation only supports decoding rlp encoded transactions as it's used
|
|
/// by p2p.
|
|
///
|
|
/// The p2p encoding format always includes an RLP header, although the type RLP header depends
|
|
/// on whether or not the transaction is a legacy transaction.
|
|
///
|
|
/// If the transaction is a legacy transaction, it is just encoded as a RLP list:
|
|
/// `rlp(tx-data)`.
|
|
///
|
|
/// If the transaction is a typed transaction, it is encoded as a RLP string:
|
|
/// `rlp(tx-type || rlp(tx-data))`
|
|
///
|
|
/// This can be used for decoding all signed transactions in p2p `BlockBodies` responses.
|
|
///
|
|
/// This cannot be used for decoding EIP-4844 transactions in p2p `PooledTransactions`, since
|
|
/// the EIP-4844 variant of [`TransactionSigned`] does not include the blob sidecar.
|
|
///
|
|
/// For a method suitable for decoding pooled transactions, see [`PooledTransactionsElement`].
|
|
///
|
|
/// CAUTION: Due to a quirk in [`Header::decode`], this method will succeed even if a typed
|
|
/// transaction is encoded in this format, and does not start with a RLP header:
|
|
/// `tx-type || rlp(tx-data)`.
|
|
///
|
|
/// This is because [`Header::decode`] does not advance the buffer, and returns a length-1
|
|
/// string header if the first byte is less than `0xf7`.
|
|
fn decode(buf: &mut &[u8]) -> alloy_rlp::Result<Self> {
|
|
Self::network_decode(buf).map_err(Into::into)
|
|
}
|
|
}
|
|
|
|
impl Encodable2718 for TransactionSigned {
|
|
fn type_flag(&self) -> Option<u8> {
|
|
match self.transaction.tx_type() {
|
|
TxType::Legacy => None,
|
|
tx_type => Some(tx_type as u8),
|
|
}
|
|
}
|
|
|
|
fn encode_2718_len(&self) -> usize {
|
|
match &self.transaction {
|
|
Transaction::Legacy(legacy_tx) => legacy_tx.eip2718_encoded_length(&self.signature),
|
|
Transaction::Eip2930(access_list_tx) => {
|
|
access_list_tx.eip2718_encoded_length(&self.signature)
|
|
}
|
|
Transaction::Eip1559(dynamic_fee_tx) => {
|
|
dynamic_fee_tx.eip2718_encoded_length(&self.signature)
|
|
}
|
|
Transaction::Eip4844(blob_tx) => blob_tx.eip2718_encoded_length(&self.signature),
|
|
Transaction::Eip7702(set_code_tx) => {
|
|
set_code_tx.eip2718_encoded_length(&self.signature)
|
|
}
|
|
#[cfg(feature = "optimism")]
|
|
Transaction::Deposit(deposit_tx) => deposit_tx.eip2718_encoded_length(),
|
|
}
|
|
}
|
|
|
|
fn encode_2718(&self, out: &mut dyn alloy_rlp::BufMut) {
|
|
self.transaction.eip2718_encode(&self.signature, out)
|
|
}
|
|
|
|
fn trie_hash(&self) -> B256 {
|
|
self.hash()
|
|
}
|
|
}
|
|
|
|
impl Decodable2718 for TransactionSigned {
|
|
fn typed_decode(ty: u8, buf: &mut &[u8]) -> Eip2718Result<Self> {
|
|
match ty.try_into().map_err(|_| Eip2718Error::UnexpectedType(ty))? {
|
|
TxType::Legacy => Err(Eip2718Error::UnexpectedType(0)),
|
|
TxType::Eip2930 => {
|
|
let (tx, signature, hash) = TxEip2930::rlp_decode_signed(buf)?.into_parts();
|
|
Ok(Self { transaction: Transaction::Eip2930(tx), signature, hash: hash.into() })
|
|
}
|
|
TxType::Eip1559 => {
|
|
let (tx, signature, hash) = TxEip1559::rlp_decode_signed(buf)?.into_parts();
|
|
Ok(Self { transaction: Transaction::Eip1559(tx), signature, hash: hash.into() })
|
|
}
|
|
TxType::Eip7702 => {
|
|
let (tx, signature, hash) = TxEip7702::rlp_decode_signed(buf)?.into_parts();
|
|
Ok(Self { transaction: Transaction::Eip7702(tx), signature, hash: hash.into() })
|
|
}
|
|
TxType::Eip4844 => {
|
|
let (tx, signature, hash) = TxEip4844::rlp_decode_signed(buf)?.into_parts();
|
|
Ok(Self { transaction: Transaction::Eip4844(tx), signature, hash: hash.into() })
|
|
}
|
|
#[cfg(feature = "optimism")]
|
|
TxType::Deposit => Ok(Self::new_unhashed(
|
|
Transaction::Deposit(TxDeposit::rlp_decode(buf)?),
|
|
TxDeposit::signature(),
|
|
)),
|
|
}
|
|
}
|
|
|
|
fn fallback_decode(buf: &mut &[u8]) -> Eip2718Result<Self> {
|
|
Ok(Self::decode_rlp_legacy_transaction(buf)?)
|
|
}
|
|
}
|
|
|
|
#[cfg(any(test, feature = "reth-codec"))]
|
|
impl reth_codecs::Compact for TransactionSigned {
|
|
fn to_compact<B>(&self, buf: &mut B) -> usize
|
|
where
|
|
B: bytes::BufMut + AsMut<[u8]>,
|
|
{
|
|
let start = buf.as_mut().len();
|
|
|
|
// Placeholder for bitflags.
|
|
// The first byte uses 4 bits as flags: IsCompressed[1bit], TxType[2bits], Signature[1bit]
|
|
buf.put_u8(0);
|
|
|
|
let sig_bit = self.signature.to_compact(buf) as u8;
|
|
let zstd_bit = self.transaction.input().len() >= 32;
|
|
|
|
let tx_bits = if zstd_bit {
|
|
let mut tmp = Vec::with_capacity(256);
|
|
if cfg!(feature = "std") {
|
|
reth_zstd_compressors::TRANSACTION_COMPRESSOR.with(|compressor| {
|
|
let mut compressor = compressor.borrow_mut();
|
|
let tx_bits = self.transaction.to_compact(&mut tmp);
|
|
buf.put_slice(&compressor.compress(&tmp).expect("Failed to compress"));
|
|
tx_bits as u8
|
|
})
|
|
} else {
|
|
let mut compressor = reth_zstd_compressors::create_tx_compressor();
|
|
let tx_bits = self.transaction.to_compact(&mut tmp);
|
|
buf.put_slice(&compressor.compress(&tmp).expect("Failed to compress"));
|
|
tx_bits as u8
|
|
}
|
|
} else {
|
|
self.transaction.to_compact(buf) as u8
|
|
};
|
|
|
|
// Replace bitflags with the actual values
|
|
buf.as_mut()[start] = sig_bit | (tx_bits << 1) | ((zstd_bit as u8) << 3);
|
|
|
|
buf.as_mut().len() - start
|
|
}
|
|
|
|
fn from_compact(mut buf: &[u8], _len: usize) -> (Self, &[u8]) {
|
|
use bytes::Buf;
|
|
|
|
// The first byte uses 4 bits as flags: IsCompressed[1], TxType[2], Signature[1]
|
|
let bitflags = buf.get_u8() as usize;
|
|
|
|
let sig_bit = bitflags & 1;
|
|
let (signature, buf) = Signature::from_compact(buf, sig_bit);
|
|
|
|
let zstd_bit = bitflags >> 3;
|
|
let (transaction, buf) = if zstd_bit != 0 {
|
|
if cfg!(feature = "std") {
|
|
reth_zstd_compressors::TRANSACTION_DECOMPRESSOR.with(|decompressor| {
|
|
let mut decompressor = decompressor.borrow_mut();
|
|
|
|
// TODO: enforce that zstd is only present at a "top" level type
|
|
|
|
let transaction_type = (bitflags & 0b110) >> 1;
|
|
let (transaction, _) =
|
|
Transaction::from_compact(decompressor.decompress(buf), transaction_type);
|
|
|
|
(transaction, buf)
|
|
})
|
|
} else {
|
|
let mut decompressor = reth_zstd_compressors::create_tx_decompressor();
|
|
let transaction_type = (bitflags & 0b110) >> 1;
|
|
let (transaction, _) =
|
|
Transaction::from_compact(decompressor.decompress(buf), transaction_type);
|
|
|
|
(transaction, buf)
|
|
}
|
|
} else {
|
|
let transaction_type = bitflags >> 1;
|
|
Transaction::from_compact(buf, transaction_type)
|
|
};
|
|
|
|
(Self { signature, transaction, hash: Default::default() }, buf)
|
|
}
|
|
}
|
|
|
|
macro_rules! impl_from_signed {
|
|
($($tx:ident),*) => {
|
|
$(
|
|
impl From<Signed<$tx>> for TransactionSigned {
|
|
fn from(value: Signed<$tx>) -> Self {
|
|
let(tx,sig,hash) = value.into_parts();
|
|
Self::new(tx.into(), sig, hash)
|
|
}
|
|
}
|
|
)*
|
|
};
|
|
}
|
|
|
|
impl_from_signed!(TxLegacy, TxEip2930, TxEip1559, TxEip7702, TxEip4844, TypedTransaction);
|
|
|
|
impl From<Signed<Transaction>> for TransactionSigned {
|
|
fn from(value: Signed<Transaction>) -> Self {
|
|
let (tx, sig, hash) = value.into_parts();
|
|
Self::new(tx, sig, hash)
|
|
}
|
|
}
|
|
|
|
impl From<TransactionSigned> for Signed<Transaction> {
|
|
fn from(value: TransactionSigned) -> Self {
|
|
let (tx, sig, hash) = value.into_parts();
|
|
Self::new_unchecked(tx, sig, hash)
|
|
}
|
|
}
|
|
|
|
#[cfg(any(test, feature = "arbitrary"))]
|
|
impl<'a> arbitrary::Arbitrary<'a> for TransactionSigned {
|
|
fn arbitrary(u: &mut arbitrary::Unstructured<'a>) -> arbitrary::Result<Self> {
|
|
#[allow(unused_mut)]
|
|
let mut transaction = Transaction::arbitrary(u)?;
|
|
|
|
let secp = secp256k1::Secp256k1::new();
|
|
let key_pair = secp256k1::Keypair::new(&secp, &mut rand::thread_rng());
|
|
let signature = crate::sign_message(
|
|
B256::from_slice(&key_pair.secret_bytes()[..]),
|
|
transaction.signature_hash(),
|
|
)
|
|
.unwrap();
|
|
|
|
#[cfg(feature = "optimism")]
|
|
// Both `Some(0)` and `None` values are encoded as empty string byte. This introduces
|
|
// ambiguity in roundtrip tests. Patch the mint value of deposit transaction here, so that
|
|
// it's `None` if zero.
|
|
if let Transaction::Deposit(ref mut tx_deposit) = transaction {
|
|
if tx_deposit.mint == Some(0) {
|
|
tx_deposit.mint = None;
|
|
}
|
|
}
|
|
|
|
#[cfg(feature = "optimism")]
|
|
let signature = if transaction.is_deposit() { TxDeposit::signature() } else { signature };
|
|
Ok(Self::new_unhashed(transaction, signature))
|
|
}
|
|
}
|
|
|
|
/// Type alias kept for backward compatibility.
|
|
pub type TransactionSignedEcRecovered<T = TransactionSigned> = RecoveredTx<T>;
|
|
|
|
/// Signed transaction with recovered signer.
|
|
#[derive(Debug, Clone, PartialEq, Hash, Eq, AsRef, Deref)]
|
|
pub struct RecoveredTx<T = TransactionSigned> {
|
|
/// Signer of the transaction
|
|
signer: Address,
|
|
/// Signed transaction
|
|
#[deref]
|
|
#[as_ref]
|
|
signed_transaction: T,
|
|
}
|
|
|
|
// === impl RecoveredTx ===
|
|
|
|
impl<T> RecoveredTx<T> {
|
|
/// Signer of transaction recovered from signature
|
|
pub const fn signer(&self) -> Address {
|
|
self.signer
|
|
}
|
|
|
|
/// Reference to the signer of transaction recovered from signature
|
|
pub const fn signer_ref(&self) -> &Address {
|
|
&self.signer
|
|
}
|
|
|
|
/// Returns a reference to [`TransactionSigned`]
|
|
pub const fn as_signed(&self) -> &T {
|
|
&self.signed_transaction
|
|
}
|
|
|
|
/// Transform back to [`TransactionSigned`]
|
|
pub fn into_signed(self) -> T {
|
|
self.signed_transaction
|
|
}
|
|
|
|
/// Dissolve Self to its component
|
|
pub fn to_components(self) -> (T, Address) {
|
|
(self.signed_transaction, self.signer)
|
|
}
|
|
|
|
/// Create [`RecoveredTx`] from [`TransactionSigned`] and [`Address`] of the
|
|
/// signer.
|
|
#[inline]
|
|
pub const fn from_signed_transaction(signed_transaction: T, signer: Address) -> Self {
|
|
Self { signed_transaction, signer }
|
|
}
|
|
|
|
/// Applies the given closure to the inner transactions.
|
|
pub fn map_transaction<Tx>(self, f: impl FnOnce(T) -> Tx) -> RecoveredTx<Tx> {
|
|
RecoveredTx::from_signed_transaction(f(self.signed_transaction), self.signer)
|
|
}
|
|
}
|
|
|
|
impl<T: Encodable> Encodable for RecoveredTx<T> {
|
|
/// This encodes the transaction _with_ the signature, and an rlp header.
|
|
///
|
|
/// Refer to docs for [`TransactionSigned::encode`] for details on the exact format.
|
|
fn encode(&self, out: &mut dyn bytes::BufMut) {
|
|
self.signed_transaction.encode(out)
|
|
}
|
|
|
|
fn length(&self) -> usize {
|
|
self.signed_transaction.length()
|
|
}
|
|
}
|
|
|
|
impl<T: SignedTransaction> Decodable for RecoveredTx<T> {
|
|
fn decode(buf: &mut &[u8]) -> alloy_rlp::Result<Self> {
|
|
let signed_transaction = T::decode(buf)?;
|
|
let signer = signed_transaction
|
|
.recover_signer()
|
|
.ok_or(RlpError::Custom("Unable to recover decoded transaction signer."))?;
|
|
Ok(Self { signer, signed_transaction })
|
|
}
|
|
}
|
|
|
|
impl<T: Encodable2718> Encodable2718 for RecoveredTx<T> {
|
|
fn type_flag(&self) -> Option<u8> {
|
|
self.signed_transaction.type_flag()
|
|
}
|
|
|
|
fn encode_2718_len(&self) -> usize {
|
|
self.signed_transaction.encode_2718_len()
|
|
}
|
|
|
|
fn encode_2718(&self, out: &mut dyn alloy_rlp::BufMut) {
|
|
self.signed_transaction.encode_2718(out)
|
|
}
|
|
|
|
fn trie_hash(&self) -> B256 {
|
|
self.signed_transaction.trie_hash()
|
|
}
|
|
}
|
|
|
|
/// Extension trait for [`SignedTransaction`] to convert it into [`RecoveredTx`].
|
|
pub trait SignedTransactionIntoRecoveredExt: SignedTransaction {
|
|
/// Tries to recover signer and return [`RecoveredTx`] by cloning the type.
|
|
fn try_ecrecovered(&self) -> Option<RecoveredTx<Self>> {
|
|
let signer = self.recover_signer()?;
|
|
Some(RecoveredTx { signed_transaction: self.clone(), signer })
|
|
}
|
|
|
|
/// Tries to recover signer and return [`RecoveredTx`].
|
|
///
|
|
/// Returns `Err(Self)` if the transaction's signature is invalid, see also
|
|
/// [`SignedTransaction::recover_signer`].
|
|
fn try_into_ecrecovered(self) -> Result<RecoveredTx<Self>, Self> {
|
|
match self.recover_signer() {
|
|
None => Err(self),
|
|
Some(signer) => Ok(RecoveredTx { signed_transaction: self, signer }),
|
|
}
|
|
}
|
|
|
|
/// Consumes the type, recover signer and return [`RecoveredTx`] _without
|
|
/// ensuring that the signature has a low `s` value_ (EIP-2).
|
|
///
|
|
/// Returns `None` if the transaction's signature is invalid.
|
|
fn into_ecrecovered_unchecked(self) -> Option<RecoveredTx<Self>> {
|
|
let signer = self.recover_signer_unchecked()?;
|
|
Some(RecoveredTx::from_signed_transaction(self, signer))
|
|
}
|
|
|
|
/// Returns the [`RecoveredTx`] transaction with the given sender.
|
|
fn with_signer(self, signer: Address) -> RecoveredTx<Self> {
|
|
RecoveredTx::from_signed_transaction(self, signer)
|
|
}
|
|
}
|
|
|
|
impl<T> SignedTransactionIntoRecoveredExt for T where T: SignedTransaction {}
|
|
|
|
/// Bincode-compatible transaction type serde implementations.
|
|
#[cfg(feature = "serde-bincode-compat")]
|
|
pub mod serde_bincode_compat {
|
|
use alloc::borrow::Cow;
|
|
use alloy_consensus::{
|
|
transaction::serde_bincode_compat::{TxEip1559, TxEip2930, TxEip7702, TxLegacy},
|
|
TxEip4844,
|
|
};
|
|
use alloy_primitives::{PrimitiveSignature as Signature, TxHash};
|
|
use serde::{Deserialize, Deserializer, Serialize, Serializer};
|
|
use serde_with::{DeserializeAs, SerializeAs};
|
|
|
|
/// Bincode-compatible [`super::Transaction`] serde implementation.
|
|
///
|
|
/// Intended to use with the [`serde_with::serde_as`] macro in the following way:
|
|
/// ```rust
|
|
/// use reth_primitives::{serde_bincode_compat, Transaction};
|
|
/// use serde::{Deserialize, Serialize};
|
|
/// use serde_with::serde_as;
|
|
///
|
|
/// #[serde_as]
|
|
/// #[derive(Serialize, Deserialize)]
|
|
/// struct Data {
|
|
/// #[serde_as(as = "serde_bincode_compat::transaction::Transaction")]
|
|
/// transaction: Transaction,
|
|
/// }
|
|
/// ```
|
|
#[derive(Debug, Serialize, Deserialize)]
|
|
#[allow(missing_docs)]
|
|
pub enum Transaction<'a> {
|
|
Legacy(TxLegacy<'a>),
|
|
Eip2930(TxEip2930<'a>),
|
|
Eip1559(TxEip1559<'a>),
|
|
Eip4844(Cow<'a, TxEip4844>),
|
|
Eip7702(TxEip7702<'a>),
|
|
#[cfg(feature = "optimism")]
|
|
Deposit(op_alloy_consensus::serde_bincode_compat::TxDeposit<'a>),
|
|
}
|
|
|
|
impl<'a> From<&'a super::Transaction> for Transaction<'a> {
|
|
fn from(value: &'a super::Transaction) -> Self {
|
|
match value {
|
|
super::Transaction::Legacy(tx) => Self::Legacy(TxLegacy::from(tx)),
|
|
super::Transaction::Eip2930(tx) => Self::Eip2930(TxEip2930::from(tx)),
|
|
super::Transaction::Eip1559(tx) => Self::Eip1559(TxEip1559::from(tx)),
|
|
super::Transaction::Eip4844(tx) => Self::Eip4844(Cow::Borrowed(tx)),
|
|
super::Transaction::Eip7702(tx) => Self::Eip7702(TxEip7702::from(tx)),
|
|
#[cfg(feature = "optimism")]
|
|
super::Transaction::Deposit(tx) => {
|
|
Self::Deposit(op_alloy_consensus::serde_bincode_compat::TxDeposit::from(tx))
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
impl<'a> From<Transaction<'a>> for super::Transaction {
|
|
fn from(value: Transaction<'a>) -> Self {
|
|
match value {
|
|
Transaction::Legacy(tx) => Self::Legacy(tx.into()),
|
|
Transaction::Eip2930(tx) => Self::Eip2930(tx.into()),
|
|
Transaction::Eip1559(tx) => Self::Eip1559(tx.into()),
|
|
Transaction::Eip4844(tx) => Self::Eip4844(tx.into_owned()),
|
|
Transaction::Eip7702(tx) => Self::Eip7702(tx.into()),
|
|
#[cfg(feature = "optimism")]
|
|
Transaction::Deposit(tx) => Self::Deposit(tx.into()),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl SerializeAs<super::Transaction> for Transaction<'_> {
|
|
fn serialize_as<S>(source: &super::Transaction, serializer: S) -> Result<S::Ok, S::Error>
|
|
where
|
|
S: Serializer,
|
|
{
|
|
Transaction::from(source).serialize(serializer)
|
|
}
|
|
}
|
|
|
|
impl<'de> DeserializeAs<'de, super::Transaction> for Transaction<'de> {
|
|
fn deserialize_as<D>(deserializer: D) -> Result<super::Transaction, D::Error>
|
|
where
|
|
D: Deserializer<'de>,
|
|
{
|
|
Transaction::deserialize(deserializer).map(Into::into)
|
|
}
|
|
}
|
|
|
|
/// Bincode-compatible [`super::TransactionSigned`] serde implementation.
|
|
///
|
|
/// Intended to use with the [`serde_with::serde_as`] macro in the following way:
|
|
/// ```rust
|
|
/// use reth_primitives::{serde_bincode_compat, TransactionSigned};
|
|
/// use serde::{Deserialize, Serialize};
|
|
/// use serde_with::serde_as;
|
|
///
|
|
/// #[serde_as]
|
|
/// #[derive(Serialize, Deserialize)]
|
|
/// struct Data {
|
|
/// #[serde_as(as = "serde_bincode_compat::transaction::TransactionSigned")]
|
|
/// transaction: TransactionSigned,
|
|
/// }
|
|
/// ```
|
|
#[derive(Debug, Serialize, Deserialize)]
|
|
pub struct TransactionSigned<'a> {
|
|
hash: TxHash,
|
|
signature: Signature,
|
|
transaction: Transaction<'a>,
|
|
}
|
|
|
|
impl<'a> From<&'a super::TransactionSigned> for TransactionSigned<'a> {
|
|
fn from(value: &'a super::TransactionSigned) -> Self {
|
|
Self {
|
|
hash: value.hash(),
|
|
signature: value.signature,
|
|
transaction: Transaction::from(&value.transaction),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl<'a> From<TransactionSigned<'a>> for super::TransactionSigned {
|
|
fn from(value: TransactionSigned<'a>) -> Self {
|
|
Self {
|
|
hash: value.hash.into(),
|
|
signature: value.signature,
|
|
transaction: value.transaction.into(),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl SerializeAs<super::TransactionSigned> for TransactionSigned<'_> {
|
|
fn serialize_as<S>(
|
|
source: &super::TransactionSigned,
|
|
serializer: S,
|
|
) -> Result<S::Ok, S::Error>
|
|
where
|
|
S: Serializer,
|
|
{
|
|
TransactionSigned::from(source).serialize(serializer)
|
|
}
|
|
}
|
|
|
|
impl<'de> DeserializeAs<'de, super::TransactionSigned> for TransactionSigned<'de> {
|
|
fn deserialize_as<D>(deserializer: D) -> Result<super::TransactionSigned, D::Error>
|
|
where
|
|
D: Deserializer<'de>,
|
|
{
|
|
TransactionSigned::deserialize(deserializer).map(Into::into)
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::super::{serde_bincode_compat, Transaction, TransactionSigned};
|
|
use arbitrary::Arbitrary;
|
|
use rand::Rng;
|
|
use reth_testing_utils::generators;
|
|
use serde::{Deserialize, Serialize};
|
|
use serde_with::serde_as;
|
|
|
|
#[test]
|
|
fn test_transaction_bincode_roundtrip() {
|
|
#[serde_as]
|
|
#[derive(Debug, PartialEq, Eq, Serialize, Deserialize)]
|
|
struct Data {
|
|
#[serde_as(as = "serde_bincode_compat::Transaction")]
|
|
transaction: Transaction,
|
|
}
|
|
|
|
let mut bytes = [0u8; 1024];
|
|
generators::rng().fill(bytes.as_mut_slice());
|
|
let data = Data {
|
|
transaction: Transaction::arbitrary(&mut arbitrary::Unstructured::new(&bytes))
|
|
.unwrap(),
|
|
};
|
|
|
|
let encoded = bincode::serialize(&data).unwrap();
|
|
let decoded: Data = bincode::deserialize(&encoded).unwrap();
|
|
assert_eq!(decoded, data);
|
|
}
|
|
|
|
#[test]
|
|
fn test_transaction_signed_bincode_roundtrip() {
|
|
#[serde_as]
|
|
#[derive(Debug, PartialEq, Eq, Serialize, Deserialize)]
|
|
struct Data {
|
|
#[serde_as(as = "serde_bincode_compat::TransactionSigned")]
|
|
transaction: TransactionSigned,
|
|
}
|
|
|
|
let mut bytes = [0u8; 1024];
|
|
generators::rng().fill(bytes.as_mut_slice());
|
|
let data = Data {
|
|
transaction: TransactionSigned::arbitrary(&mut arbitrary::Unstructured::new(
|
|
&bytes,
|
|
))
|
|
.unwrap(),
|
|
};
|
|
|
|
let encoded = bincode::serialize(&data).unwrap();
|
|
let decoded: Data = bincode::deserialize(&encoded).unwrap();
|
|
assert_eq!(decoded, data);
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Recovers a list of signers from a transaction list iterator.
|
|
///
|
|
/// Returns `None`, if some transaction's signature is invalid
|
|
pub fn recover_signers<'a, I, T>(txes: I, num_txes: usize) -> Option<Vec<Address>>
|
|
where
|
|
T: SignedTransaction,
|
|
I: IntoParallelIterator<Item = &'a T> + IntoIterator<Item = &'a T> + Send,
|
|
{
|
|
if num_txes < *PARALLEL_SENDER_RECOVERY_THRESHOLD {
|
|
txes.into_iter().map(|tx| tx.recover_signer()).collect()
|
|
} else {
|
|
txes.into_par_iter().map(|tx| tx.recover_signer()).collect()
|
|
}
|
|
}
|
|
|
|
/// Recovers a list of signers from a transaction list iterator _without ensuring that the
|
|
/// signature has a low `s` value_.
|
|
///
|
|
/// Returns `None`, if some transaction's signature is invalid.
|
|
pub fn recover_signers_unchecked<'a, I, T>(txes: I, num_txes: usize) -> Option<Vec<Address>>
|
|
where
|
|
T: SignedTransaction,
|
|
I: IntoParallelIterator<Item = &'a T> + IntoIterator<Item = &'a T> + Send,
|
|
{
|
|
if num_txes < *PARALLEL_SENDER_RECOVERY_THRESHOLD {
|
|
txes.into_iter().map(|tx| tx.recover_signer_unchecked()).collect()
|
|
} else {
|
|
txes.into_par_iter().map(|tx| tx.recover_signer_unchecked()).collect()
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use crate::{
|
|
transaction::{TxEip1559, TxKind, TxLegacy},
|
|
RecoveredTx, Transaction, TransactionSigned,
|
|
};
|
|
use alloy_consensus::Transaction as _;
|
|
use alloy_eips::eip2718::{Decodable2718, Encodable2718};
|
|
use alloy_primitives::{
|
|
address, b256, bytes, hex, Address, Bytes, PrimitiveSignature as Signature, B256, U256,
|
|
};
|
|
use alloy_rlp::{Decodable, Encodable, Error as RlpError};
|
|
use reth_chainspec::MIN_TRANSACTION_GAS;
|
|
use reth_codecs::Compact;
|
|
use reth_primitives_traits::SignedTransaction;
|
|
use std::str::FromStr;
|
|
|
|
#[test]
|
|
fn test_decode_empty_typed_tx() {
|
|
let input = [0x80u8];
|
|
let res = TransactionSigned::decode(&mut &input[..]).unwrap_err();
|
|
assert_eq!(RlpError::InputTooShort, res);
|
|
}
|
|
|
|
#[test]
|
|
fn raw_kind_encoding_sanity() {
|
|
// check the 0x80 encoding for Create
|
|
let mut buf = Vec::new();
|
|
TxKind::Create.encode(&mut buf);
|
|
assert_eq!(buf, vec![0x80]);
|
|
|
|
// check decoding
|
|
let buf = [0x80];
|
|
let decoded = TxKind::decode(&mut &buf[..]).unwrap();
|
|
assert_eq!(decoded, TxKind::Create);
|
|
}
|
|
|
|
#[test]
|
|
fn test_decode_create_goerli() {
|
|
// test that an example create tx from goerli decodes properly
|
|
let tx_bytes = hex!("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");
|
|
|
|
let decoded = TransactionSigned::decode(&mut &tx_bytes[..]).unwrap();
|
|
assert_eq!(tx_bytes.len(), decoded.length());
|
|
assert_eq!(tx_bytes, &alloy_rlp::encode(decoded)[..]);
|
|
}
|
|
|
|
#[test]
|
|
fn test_decode_recover_mainnet_tx() {
|
|
// random mainnet tx <https://etherscan.io/tx/0x86718885c4b4218c6af87d3d0b0d83e3cc465df2a05c048aa4db9f1a6f9de91f>
|
|
let tx_bytes = hex!("02f872018307910d808507204d2cb1827d0094388c818ca8b9251b393131c08a736a67ccb19297880320d04823e2701c80c001a0cf024f4815304df2867a1a74e9d2707b6abda0337d2d54a4438d453f4160f190a07ac0e6b3bc9395b5b9c8b9e6d77204a236577a5b18467b9175c01de4faa208d9");
|
|
|
|
let decoded = TransactionSigned::decode_2718(&mut &tx_bytes[..]).unwrap();
|
|
assert_eq!(
|
|
decoded.recover_signer(),
|
|
Some(Address::from_str("0x95222290DD7278Aa3Ddd389Cc1E1d165CC4BAfe5").unwrap())
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
// Test vector from https://sepolia.etherscan.io/tx/0x9a22ccb0029bc8b0ddd073be1a1d923b7ae2b2ea52100bae0db4424f9107e9c0
|
|
// Blobscan: https://sepolia.blobscan.com/tx/0x9a22ccb0029bc8b0ddd073be1a1d923b7ae2b2ea52100bae0db4424f9107e9c0
|
|
fn test_decode_recover_sepolia_4844_tx() {
|
|
use crate::TxType;
|
|
use alloy_primitives::{address, b256};
|
|
|
|
// https://sepolia.etherscan.io/getRawTx?tx=0x9a22ccb0029bc8b0ddd073be1a1d923b7ae2b2ea52100bae0db4424f9107e9c0
|
|
let raw_tx = alloy_primitives::hex::decode("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").unwrap();
|
|
let decoded = TransactionSigned::decode_2718(&mut raw_tx.as_slice()).unwrap();
|
|
assert_eq!(decoded.tx_type(), TxType::Eip4844);
|
|
|
|
let from = decoded.recover_signer();
|
|
assert_eq!(from, Some(address!("A83C816D4f9b2783761a22BA6FADB0eB0606D7B2")));
|
|
|
|
let tx = decoded.transaction;
|
|
|
|
assert_eq!(tx.to(), Some(address!("11E9CA82A3a762b4B5bd264d4173a242e7a77064")));
|
|
|
|
assert_eq!(
|
|
tx.blob_versioned_hashes(),
|
|
Some(
|
|
&[
|
|
b256!("012ec3d6f66766bedb002a190126b3549fce0047de0d4c25cffce0dc1c57921a"),
|
|
b256!("0152d8e24762ff22b1cfd9f8c0683786a7ca63ba49973818b3d1e9512cd2cec4"),
|
|
b256!("013b98c6c83e066d5b14af2b85199e3d4fc7d1e778dd53130d180f5077e2d1c7"),
|
|
b256!("01148b495d6e859114e670ca54fb6e2657f0cbae5b08063605093a4b3dc9f8f1"),
|
|
b256!("011ac212f13c5dff2b2c6b600a79635103d6f580a4221079951181b25c7e6549"),
|
|
][..]
|
|
)
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn decode_transaction_consumes_buffer() {
|
|
let bytes = &mut &hex!("b87502f872041a8459682f008459682f0d8252089461815774383099e24810ab832a5b2a5425c154d58829a2241af62c000080c001a059e6b67f48fb32e7e570dfb11e042b5ad2e55e3ce3ce9cd989c7e06e07feeafda0016b83f4f980694ed2eee4d10667242b1f40dc406901b34125b008d334d47469")[..];
|
|
let _transaction_res = TransactionSigned::decode(bytes).unwrap();
|
|
assert_eq!(
|
|
bytes.len(),
|
|
0,
|
|
"did not consume all bytes in the buffer, {:?} remaining",
|
|
bytes.len()
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn decode_multiple_network_txs() {
|
|
let bytes = hex!("f86b02843b9aca00830186a094d3e8763675e4c425df46cc3b5c0f6cbdac39604687038d7ea4c68000802ba00eb96ca19e8a77102767a41fc85a36afd5c61ccb09911cec5d3e86e193d9c5aea03a456401896b1b6055311536bf00a718568c744d8c1f9df59879e8350220ca18");
|
|
let transaction = Transaction::Legacy(TxLegacy {
|
|
chain_id: Some(4u64),
|
|
nonce: 2,
|
|
gas_price: 1000000000,
|
|
gas_limit: 100000,
|
|
to: Address::from_str("d3e8763675e4c425df46cc3b5c0f6cbdac396046").unwrap().into(),
|
|
value: U256::from(1000000000000000u64),
|
|
input: Bytes::default(),
|
|
});
|
|
let signature = Signature::new(
|
|
U256::from_str("0xeb96ca19e8a77102767a41fc85a36afd5c61ccb09911cec5d3e86e193d9c5ae")
|
|
.unwrap(),
|
|
U256::from_str("0x3a456401896b1b6055311536bf00a718568c744d8c1f9df59879e8350220ca18")
|
|
.unwrap(),
|
|
false,
|
|
);
|
|
let hash = b256!("a517b206d2223278f860ea017d3626cacad4f52ff51030dc9a96b432f17f8d34");
|
|
test_decode_and_encode(&bytes, transaction, signature, Some(hash));
|
|
|
|
let bytes = hex!("f86b01843b9aca00830186a094d3e8763675e4c425df46cc3b5c0f6cbdac3960468702769bb01b2a00802ba0e24d8bd32ad906d6f8b8d7741e08d1959df021698b19ee232feba15361587d0aa05406ad177223213df262cb66ccbb2f46bfdccfdfbbb5ffdda9e2c02d977631da");
|
|
let transaction = Transaction::Legacy(TxLegacy {
|
|
chain_id: Some(4),
|
|
nonce: 1u64,
|
|
gas_price: 1000000000,
|
|
gas_limit: 100000,
|
|
to: Address::from_slice(&hex!("d3e8763675e4c425df46cc3b5c0f6cbdac396046")[..]).into(),
|
|
value: U256::from(693361000000000u64),
|
|
input: Default::default(),
|
|
});
|
|
let signature = Signature::new(
|
|
U256::from_str("0xe24d8bd32ad906d6f8b8d7741e08d1959df021698b19ee232feba15361587d0a")
|
|
.unwrap(),
|
|
U256::from_str("0x5406ad177223213df262cb66ccbb2f46bfdccfdfbbb5ffdda9e2c02d977631da")
|
|
.unwrap(),
|
|
false,
|
|
);
|
|
test_decode_and_encode(&bytes, transaction, signature, None);
|
|
|
|
let bytes = hex!("f86b0384773594008398968094d3e8763675e4c425df46cc3b5c0f6cbdac39604687038d7ea4c68000802ba0ce6834447c0a4193c40382e6c57ae33b241379c5418caac9cdc18d786fd12071a03ca3ae86580e94550d7c071e3a02eadb5a77830947c9225165cf9100901bee88");
|
|
let transaction = Transaction::Legacy(TxLegacy {
|
|
chain_id: Some(4),
|
|
nonce: 3,
|
|
gas_price: 2000000000,
|
|
gas_limit: 10000000,
|
|
to: Address::from_slice(&hex!("d3e8763675e4c425df46cc3b5c0f6cbdac396046")[..]).into(),
|
|
value: U256::from(1000000000000000u64),
|
|
input: Bytes::default(),
|
|
});
|
|
let signature = Signature::new(
|
|
U256::from_str("0xce6834447c0a4193c40382e6c57ae33b241379c5418caac9cdc18d786fd12071")
|
|
.unwrap(),
|
|
U256::from_str("0x3ca3ae86580e94550d7c071e3a02eadb5a77830947c9225165cf9100901bee88")
|
|
.unwrap(),
|
|
false,
|
|
);
|
|
test_decode_and_encode(&bytes, transaction, signature, None);
|
|
|
|
let bytes = hex!("b87502f872041a8459682f008459682f0d8252089461815774383099e24810ab832a5b2a5425c154d58829a2241af62c000080c001a059e6b67f48fb32e7e570dfb11e042b5ad2e55e3ce3ce9cd989c7e06e07feeafda0016b83f4f980694ed2eee4d10667242b1f40dc406901b34125b008d334d47469");
|
|
let transaction = Transaction::Eip1559(TxEip1559 {
|
|
chain_id: 4,
|
|
nonce: 26,
|
|
max_priority_fee_per_gas: 1500000000,
|
|
max_fee_per_gas: 1500000013,
|
|
gas_limit: MIN_TRANSACTION_GAS,
|
|
to: Address::from_slice(&hex!("61815774383099e24810ab832a5b2a5425c154d5")[..]).into(),
|
|
value: U256::from(3000000000000000000u64),
|
|
input: Default::default(),
|
|
access_list: Default::default(),
|
|
});
|
|
let signature = Signature::new(
|
|
U256::from_str("0x59e6b67f48fb32e7e570dfb11e042b5ad2e55e3ce3ce9cd989c7e06e07feeafd")
|
|
.unwrap(),
|
|
U256::from_str("0x016b83f4f980694ed2eee4d10667242b1f40dc406901b34125b008d334d47469")
|
|
.unwrap(),
|
|
true,
|
|
);
|
|
test_decode_and_encode(&bytes, transaction, signature, None);
|
|
|
|
let bytes = hex!("f8650f84832156008287fb94cf7f9e66af820a19257a2108375b180b0ec491678204d2802ca035b7bfeb9ad9ece2cbafaaf8e202e706b4cfaeb233f46198f00b44d4a566a981a0612638fb29427ca33b9a3be2a0a561beecfe0269655be160d35e72d366a6a860");
|
|
let transaction = Transaction::Legacy(TxLegacy {
|
|
chain_id: Some(4),
|
|
nonce: 15,
|
|
gas_price: 2200000000,
|
|
gas_limit: 34811,
|
|
to: Address::from_slice(&hex!("cf7f9e66af820a19257a2108375b180b0ec49167")[..]).into(),
|
|
value: U256::from(1234),
|
|
input: Bytes::default(),
|
|
});
|
|
let signature = Signature::new(
|
|
U256::from_str("0x35b7bfeb9ad9ece2cbafaaf8e202e706b4cfaeb233f46198f00b44d4a566a981")
|
|
.unwrap(),
|
|
U256::from_str("0x612638fb29427ca33b9a3be2a0a561beecfe0269655be160d35e72d366a6a860")
|
|
.unwrap(),
|
|
true,
|
|
);
|
|
test_decode_and_encode(&bytes, transaction, signature, None);
|
|
}
|
|
|
|
fn test_decode_and_encode(
|
|
bytes: &[u8],
|
|
transaction: Transaction,
|
|
signature: Signature,
|
|
hash: Option<B256>,
|
|
) {
|
|
let expected = TransactionSigned::new_unhashed(transaction, signature);
|
|
if let Some(hash) = hash {
|
|
assert_eq!(hash, expected.hash());
|
|
}
|
|
assert_eq!(bytes.len(), expected.length());
|
|
|
|
let decoded = TransactionSigned::decode(&mut &bytes[..]).unwrap();
|
|
assert_eq!(expected, decoded);
|
|
assert_eq!(bytes, &alloy_rlp::encode(expected));
|
|
}
|
|
|
|
#[test]
|
|
fn decode_raw_tx_and_recover_signer() {
|
|
use alloy_primitives::hex_literal::hex;
|
|
// transaction is from ropsten
|
|
|
|
let hash: B256 =
|
|
hex!("559fb34c4a7f115db26cbf8505389475caaab3df45f5c7a0faa4abfa3835306c").into();
|
|
let signer: Address = hex!("641c5d790f862a58ec7abcfd644c0442e9c201b3").into();
|
|
let raw = hex!("f88b8212b085028fa6ae00830f424094aad593da0c8116ef7d2d594dd6a63241bccfc26c80a48318b64b000000000000000000000000641c5d790f862a58ec7abcfd644c0442e9c201b32aa0a6ef9e170bca5ffb7ac05433b13b7043de667fbb0b4a5e45d3b54fb2d6efcc63a0037ec2c05c3d60c5f5f78244ce0a3859e3a18a36c61efb061b383507d3ce19d2");
|
|
|
|
let mut pointer = raw.as_ref();
|
|
let tx = TransactionSigned::decode(&mut pointer).unwrap();
|
|
assert_eq!(tx.hash(), hash, "Expected same hash");
|
|
assert_eq!(tx.recover_signer(), Some(signer), "Recovering signer should pass.");
|
|
}
|
|
|
|
#[test]
|
|
fn test_envelop_encode() {
|
|
// random tx: <https://etherscan.io/getRawTx?tx=0x9448608d36e721ef403c53b00546068a6474d6cbab6816c3926de449898e7bce>
|
|
let input = hex!("02f871018302a90f808504890aef60826b6c94ddf4c5025d1a5742cf12f74eec246d4432c295e487e09c3bbcc12b2b80c080a0f21a4eacd0bf8fea9c5105c543be5a1d8c796516875710fafafdf16d16d8ee23a001280915021bb446d1973501a67f93d2b38894a514b976e7b46dc2fe54598d76");
|
|
let decoded = TransactionSigned::decode(&mut &input[..]).unwrap();
|
|
|
|
let encoded = decoded.encoded_2718();
|
|
assert_eq!(encoded[..], input);
|
|
}
|
|
|
|
#[test]
|
|
fn test_envelop_decode() {
|
|
// random tx: <https://etherscan.io/getRawTx?tx=0x9448608d36e721ef403c53b00546068a6474d6cbab6816c3926de449898e7bce>
|
|
let input = bytes!("02f871018302a90f808504890aef60826b6c94ddf4c5025d1a5742cf12f74eec246d4432c295e487e09c3bbcc12b2b80c080a0f21a4eacd0bf8fea9c5105c543be5a1d8c796516875710fafafdf16d16d8ee23a001280915021bb446d1973501a67f93d2b38894a514b976e7b46dc2fe54598d76");
|
|
let decoded = TransactionSigned::decode_2718(&mut input.as_ref()).unwrap();
|
|
|
|
let encoded = decoded.encoded_2718();
|
|
assert_eq!(encoded, input);
|
|
}
|
|
|
|
#[test]
|
|
fn test_decode_signed_ec_recovered_transaction() {
|
|
// random tx: <https://etherscan.io/getRawTx?tx=0x9448608d36e721ef403c53b00546068a6474d6cbab6816c3926de449898e7bce>
|
|
let input = hex!("02f871018302a90f808504890aef60826b6c94ddf4c5025d1a5742cf12f74eec246d4432c295e487e09c3bbcc12b2b80c080a0f21a4eacd0bf8fea9c5105c543be5a1d8c796516875710fafafdf16d16d8ee23a001280915021bb446d1973501a67f93d2b38894a514b976e7b46dc2fe54598d76");
|
|
let tx = TransactionSigned::decode(&mut &input[..]).unwrap();
|
|
let recovered = tx.into_ecrecovered().unwrap();
|
|
|
|
let decoded = RecoveredTx::decode(&mut &alloy_rlp::encode(&recovered)[..]).unwrap();
|
|
assert_eq!(recovered, decoded)
|
|
}
|
|
|
|
#[test]
|
|
fn test_decode_tx() {
|
|
// some random transactions pulled from hive tests
|
|
let data = hex!("b86f02f86c0705843b9aca008506fc23ac00830124f89400000000000000000000000000000000000003160180c001a00293c713e2f1eab91c366621ff2f867e05ad7e99d4aa5d069aafeb9e1e8c9b6aa05ec6c0605ff20b57c90a6484ec3b0509e5923733d06f9b69bee9a2dabe4f1352");
|
|
let tx = TransactionSigned::decode(&mut data.as_slice()).unwrap();
|
|
let mut b = Vec::with_capacity(data.len());
|
|
tx.encode(&mut b);
|
|
assert_eq!(data.as_slice(), b.as_slice());
|
|
|
|
let data = hex!("f865048506fc23ac00830124f8940000000000000000000000000000000000000316018032a06b8fdfdcb84790816b7af85b19305f493665fe8b4e7c51ffdd7cc144cd776a60a028a09ab55def7b8d6602ba1c97a0ebbafe64ffc9c8e89520cec97a8edfb2ebe9");
|
|
let tx = TransactionSigned::decode(&mut data.as_slice()).unwrap();
|
|
let mut b = Vec::with_capacity(data.len());
|
|
tx.encode(&mut b);
|
|
assert_eq!(data.as_slice(), b.as_slice());
|
|
}
|
|
|
|
#[cfg(feature = "secp256k1")]
|
|
proptest::proptest! {
|
|
#![proptest_config(proptest::prelude::ProptestConfig::with_cases(1))]
|
|
|
|
#[test]
|
|
fn test_parallel_recovery_order(txes in proptest::collection::vec(
|
|
proptest_arbitrary_interop::arb::<Transaction>(),
|
|
*crate::transaction::PARALLEL_SENDER_RECOVERY_THRESHOLD * 5
|
|
)) {
|
|
let mut rng =rand::thread_rng();
|
|
let secp = secp256k1::Secp256k1::new();
|
|
let txes: Vec<TransactionSigned> = txes.into_iter().map(|mut tx| {
|
|
if let Some(chain_id) = tx.chain_id() {
|
|
// Otherwise we might overflow when calculating `v` on `recalculate_hash`
|
|
tx.set_chain_id(chain_id % (u64::MAX / 2 - 36));
|
|
}
|
|
|
|
let key_pair = secp256k1::Keypair::new(&secp, &mut rng);
|
|
|
|
let signature =
|
|
crate::sign_message(B256::from_slice(&key_pair.secret_bytes()[..]), tx.signature_hash()).unwrap();
|
|
|
|
TransactionSigned::new_unhashed(tx, signature)
|
|
}).collect();
|
|
|
|
let parallel_senders = TransactionSigned::recover_signers(&txes, txes.len()).unwrap();
|
|
let seq_senders = txes.iter().map(|tx| tx.recover_signer()).collect::<Option<Vec<_>>>().unwrap();
|
|
|
|
assert_eq!(parallel_senders, seq_senders);
|
|
}
|
|
}
|
|
|
|
// <https://etherscan.io/tx/0x280cde7cdefe4b188750e76c888f13bd05ce9a4d7767730feefe8a0e50ca6fc4>
|
|
#[test]
|
|
fn recover_legacy_singer() {
|
|
let data = hex!("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");
|
|
let tx = TransactionSigned::decode_rlp_legacy_transaction(&mut data.as_slice()).unwrap();
|
|
assert!(tx.is_legacy());
|
|
let sender = tx.recover_signer().unwrap();
|
|
assert_eq!(sender, address!("a12e1462d0ceD572f396F58B6E2D03894cD7C8a4"));
|
|
}
|
|
|
|
// <https://github.com/alloy-rs/alloy/issues/141>
|
|
// <https://etherscan.io/tx/0xce4dc6d7a7549a98ee3b071b67e970879ff51b5b95d1c340bacd80fa1e1aab31>
|
|
#[test]
|
|
fn recover_enveloped() {
|
|
let data = hex!("02f86f0102843b9aca0085029e7822d68298f094d9e1459a7a482635700cbc20bbaf52d495ab9c9680841b55ba3ac080a0c199674fcb29f353693dd779c017823b954b3c69dffa3cd6b2a6ff7888798039a028ca912de909e7e6cdef9cdcaf24c54dd8c1032946dfa1d85c206b32a9064fe8");
|
|
let tx = TransactionSigned::decode_2718(&mut data.as_slice()).unwrap();
|
|
let sender = tx.recover_signer().unwrap();
|
|
assert_eq!(sender, address!("001e2b7dE757bA469a57bF6b23d982458a07eFcE"));
|
|
assert_eq!(tx.to(), Some(address!("D9e1459A7A482635700cBc20BBAF52D495Ab9C96")));
|
|
assert_eq!(tx.input().as_ref(), hex!("1b55ba3a"));
|
|
let encoded = tx.encoded_2718();
|
|
assert_eq!(encoded.as_ref(), data.to_vec());
|
|
}
|
|
|
|
// <https://github.com/paradigmxyz/reth/issues/7750>
|
|
// <https://etherscan.io/tx/0x2084b8144eea4031c2fa7dfe343498c5e665ca85ed17825f2925f0b5b01c36ac>
|
|
#[test]
|
|
fn recover_pre_eip2() {
|
|
let data = hex!("f8ea0c850ba43b7400832dc6c0942935aa0a2d2fbb791622c29eb1c117b65b7a908580b884590528a9000000000000000000000001878ace42092b7f1ae1f28d16c1272b1aa80ca4670000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000d02ab486cedc0000000000000000000000000000000000000000000000000000557fe293cabc08cf1ca05bfaf3fda0a56b49cc78b22125feb5ae6a99d2b4781f00507d8b02c173771c85a0b5da0dbe6c5bc53740d0071fc83eb17ba0f709e49e9ae7df60dee625ef51afc5");
|
|
let tx = TransactionSigned::decode_2718(&mut data.as_slice()).unwrap();
|
|
let sender = tx.recover_signer();
|
|
assert!(sender.is_none());
|
|
let sender = tx.recover_signer_unchecked().unwrap();
|
|
|
|
assert_eq!(sender, address!("7e9e359edf0dbacf96a9952fa63092d919b0842b"));
|
|
}
|
|
|
|
#[test]
|
|
fn transaction_signed_no_hash_zstd_codec() {
|
|
// will use same signature everywhere.
|
|
// We don't need signature to match tx, just decoded to the same signature
|
|
let signature = Signature::new(
|
|
U256::from_str("0xeb96ca19e8a77102767a41fc85a36afd5c61ccb09911cec5d3e86e193d9c5ae")
|
|
.unwrap(),
|
|
U256::from_str("0x3a456401896b1b6055311536bf00a718568c744d8c1f9df59879e8350220ca18")
|
|
.unwrap(),
|
|
false,
|
|
);
|
|
|
|
let inputs: Vec<Vec<u8>> = vec![
|
|
vec![],
|
|
vec![0],
|
|
vec![255],
|
|
vec![1u8; 31],
|
|
vec![255u8; 31],
|
|
vec![1u8; 32],
|
|
vec![255u8; 32],
|
|
vec![1u8; 64],
|
|
vec![255u8; 64],
|
|
];
|
|
|
|
for input in inputs {
|
|
let transaction = Transaction::Legacy(TxLegacy {
|
|
chain_id: Some(4u64),
|
|
nonce: 2,
|
|
gas_price: 1000000000,
|
|
gas_limit: 100000,
|
|
to: Address::from_str("d3e8763675e4c425df46cc3b5c0f6cbdac396046").unwrap().into(),
|
|
value: U256::from(1000000000000000u64),
|
|
input: Bytes::from(input),
|
|
});
|
|
|
|
let tx = TransactionSigned::new_unhashed(transaction, signature);
|
|
test_transaction_signed_to_from_compact(tx);
|
|
}
|
|
}
|
|
|
|
fn test_transaction_signed_to_from_compact(tx: TransactionSigned) {
|
|
// zstd aware `to_compact`
|
|
let mut buff: Vec<u8> = Vec::new();
|
|
let written_bytes = tx.to_compact(&mut buff);
|
|
let (decoded, _) = TransactionSigned::from_compact(&buff, written_bytes);
|
|
assert_eq!(tx, decoded);
|
|
}
|
|
|
|
#[test]
|
|
fn create_txs_disallowed_for_eip4844() {
|
|
let data =
|
|
[3, 208, 128, 128, 123, 128, 120, 128, 129, 129, 128, 192, 129, 129, 192, 128, 128, 9];
|
|
let res = TransactionSigned::decode_2718(&mut &data[..]);
|
|
|
|
assert!(res.is_err());
|
|
}
|
|
}
|