Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Subgraph Logic Fixes Post 21M Diff #38

Merged
merged 5 commits into from
Jan 21, 2025
Merged

Conversation

shrugs
Copy link
Contributor

@shrugs shrugs commented Jan 20, 2025

closes #36

@shrugs shrugs marked this pull request as ready for review January 20, 2025 23:29
@@ -156,6 +156,9 @@ export const makeNameWrapperHandlers = (ownedName: `${string}eth`) => {
// NOTE: subgraph does an implicit ignore if no WrappedDomain record.
// we will be more explicit and update logic if necessary
await context.db.update(schema.wrappedDomain, { id: node }).set({ fuses });

// materialize the domain's expiryDate
await materializeDomainExpiryDate(context, node);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

Comment on lines +21 to +22
// So here we use the labelhash fn to determine whether ponder modified our `name` argument,
// in which case we know that it used to have null bytes in it, and we should ignore it.
Copy link
Contributor

@tk-o tk-o Jan 21, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does that mean we don't at all index names that include null bytes, or we do it somewhere else?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My understanding is that we will still index names with labels that include null bytes, but the way we index them will to represent these labels as "unknown labels", rather than as label literals.

@shrugs Could you please confirm? Thanks

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it means that we ignore events that have names with null bytes

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Noted. I've created an issue to track an enhancement opportunity: #45

offset += len;
len = buf[offset++];
}
return [firstLabel, list.join("")];
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@lightwalker-eth this one looks like something you'd be the best person to review :) I can only suggest creating unit tests for. But I'm also aware I have to first integrate a testing suite into this project as per

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@tk-o Agreed 👍 I shared a comment for us to follow up on this opportunity in a separate future PR here: #15 (comment)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we're copying and pasting subgraph code, testing the function is lower priority than adding tests to ensjs for this case, imo

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is definitely a lower priority goal at the moment, but as I understand there's still value for us to define our own unit tests for decodeDNSPacketBytes under the assumption that ensjs defines bytesToPacket but not decodeDNSPacketBytes.

If my assumptions are off there please let me know. Cheers 👍

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

those are intended to be the same function, although we do need to inject the subgraph-specific character checks (isLabelIndexable) into their logic as well (their util should probably handle that case tbh). but yeah some tests here are ok, i was cautioning against trying to exhaustively understand and test this function when its guaranteed to do what we desire for the moment (because it comes from subgraph and we're aiming for subgraph 1:1)

Copy link
Member

@lightwalker-eth lightwalker-eth left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@shrugs Looks good 🚀 Shared 1 comment seeking your confirmation.

offset += len;
len = buf[offset++];
}
return [firstLabel, list.join("")];
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@tk-o Agreed 👍 I shared a comment for us to follow up on this opportunity in a separate future PR here: #15 (comment)

Comment on lines +21 to +22
// So here we use the labelhash fn to determine whether ponder modified our `name` argument,
// in which case we know that it used to have null bytes in it, and we should ignore it.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My understanding is that we will still index names with labels that include null bytes, but the way we index them will to represent these labels as "unknown labels", rather than as label literals.

@shrugs Could you please confirm? Thanks

* TODO: replace this function with ensjs#bytesToPacket when it correctly handles these cases. See
* commit hash bace0ab55077d9f5cd37bd9d6638c4acb16334a8 for an example implementation.
*
*/
export function decodeDNSPacketBytes(buf: Uint8Array): [string | null, string | null] {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Noted a follow up opportunity that we can action in a separate future PR: #41 (comment)

@shrugs
Copy link
Contributor Author

shrugs commented Jan 21, 2025

subgraph excludes events that contain null byte names, we are doing the same. it specifically only excludes them when setting 'preimage' (whatever that is) for the name registered by controller and name renewed by controller events. this implementation does the same. only addition here is correctly identifying when ponder has already removed the null bytes that we were trying to detect with isLabelIndexable

Copy link
Contributor

@tk-o tk-o left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me 🚀

Copy link
Member

@lightwalker-eth lightwalker-eth left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@shrugs Hey looks good 👍 Thanks!

Comment on lines +21 to +22
// So here we use the labelhash fn to determine whether ponder modified our `name` argument,
// in which case we know that it used to have null bytes in it, and we should ignore it.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Noted. I've created an issue to track an enhancement opportunity: #45

offset += len;
len = buf[offset++];
}
return [firstLabel, list.join("")];
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is definitely a lower priority goal at the moment, but as I understand there's still value for us to define our own unit tests for decodeDNSPacketBytes under the assumption that ensjs defines bytesToPacket but not decodeDNSPacketBytes.

If my assumptions are off there please let me know. Cheers 👍

@shrugs shrugs merged commit be5087d into main Jan 21, 2025
1 check passed
@shrugs shrugs deleted the fix/indexing-bugs-from-diff branch January 21, 2025 18:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

issues surfaced by diff tool at block 21M
3 participants