mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-27 11:38:01 +00:00
Ensure relay chain parent is the relay chain head (#103)
This commit is contained in:
+40
-11
@@ -18,15 +18,18 @@
|
||||
//!
|
||||
//! Contains message send between collators and logic to process them.
|
||||
|
||||
#[cfg(test)]
|
||||
mod tests;
|
||||
|
||||
use sp_api::ProvideRuntimeApi;
|
||||
use sp_blockchain::Error as ClientError;
|
||||
use sp_blockchain::{Error as ClientError, HeaderBackend};
|
||||
use sp_consensus::block_validation::{BlockAnnounceValidator, Validation};
|
||||
use sp_runtime::{generic::BlockId, traits::Block as BlockT};
|
||||
|
||||
use polkadot_collator::Network as CollatorNetwork;
|
||||
use polkadot_network::legacy::gossip::{GossipMessage, GossipStatement};
|
||||
use polkadot_primitives::{
|
||||
parachain::{ParachainHost, ValidatorId},
|
||||
parachain::ParachainHost,
|
||||
Block as PBlock, Hash as PHash,
|
||||
};
|
||||
use polkadot_statement_table::{SignedStatement, Statement};
|
||||
@@ -49,15 +52,13 @@ use parking_lot::Mutex;
|
||||
///
|
||||
/// Note: if no justification is provided the annouce is considered valid.
|
||||
pub struct JustifiedBlockAnnounceValidator<B, P> {
|
||||
authorities: Vec<ValidatorId>,
|
||||
phantom: PhantomData<B>,
|
||||
polkadot_client: Arc<P>,
|
||||
}
|
||||
|
||||
impl<B, P> JustifiedBlockAnnounceValidator<B, P> {
|
||||
pub fn new(authorities: Vec<ValidatorId>, polkadot_client: Arc<P>) -> Self {
|
||||
pub fn new(polkadot_client: Arc<P>) -> Self {
|
||||
Self {
|
||||
authorities,
|
||||
phantom: Default::default(),
|
||||
polkadot_client,
|
||||
}
|
||||
@@ -66,7 +67,7 @@ impl<B, P> JustifiedBlockAnnounceValidator<B, P> {
|
||||
|
||||
impl<B: BlockT, P> BlockAnnounceValidator<B> for JustifiedBlockAnnounceValidator<B, P>
|
||||
where
|
||||
P: ProvideRuntimeApi<PBlock>,
|
||||
P: ProvideRuntimeApi<PBlock> + HeaderBackend<PBlock>,
|
||||
P::Api: ParachainHost<PBlock>,
|
||||
{
|
||||
fn validate(
|
||||
@@ -106,14 +107,42 @@ where
|
||||
},
|
||||
} = gossip_statement;
|
||||
|
||||
let signing_context = self
|
||||
.polkadot_client
|
||||
.runtime_api()
|
||||
.signing_context(&BlockId::Hash(relay_chain_leaf))
|
||||
// Check that the relay chain parent of the block is the relay chain head
|
||||
let best_number = self.polkadot_client.info().best_number;
|
||||
|
||||
match self.polkadot_client.number(relay_chain_leaf) {
|
||||
Err(err) => {
|
||||
return Err(Box::new(ClientError::Backend(format!(
|
||||
"could not find block number for {}: {}",
|
||||
relay_chain_leaf, err,
|
||||
))));
|
||||
},
|
||||
Ok(Some(x)) if x == best_number => {},
|
||||
Ok(None) => {
|
||||
return Err(Box::new(ClientError::UnknownBlock(relay_chain_leaf.to_string())));
|
||||
},
|
||||
Ok(Some(_)) => {
|
||||
trace!(
|
||||
target: "cumulus-network",
|
||||
"validation failed because the relay chain parent ({}) is not the relay chain \
|
||||
head ({})",
|
||||
relay_chain_leaf, best_number,
|
||||
);
|
||||
|
||||
return Ok(Validation::Failure);
|
||||
},
|
||||
}
|
||||
|
||||
let runtime_api = self.polkadot_client.runtime_api();
|
||||
let runtime_api_block_id = BlockId::Hash(relay_chain_leaf);
|
||||
let signing_context = runtime_api
|
||||
.signing_context(&runtime_api_block_id)
|
||||
.map_err(|e| Box::new(ClientError::Msg(format!("{:?}", e))) as Box<_>)?;
|
||||
|
||||
// Check that the signer is a legit validator.
|
||||
let signer = self.authorities.get(sender as usize).ok_or_else(|| {
|
||||
let authorities = runtime_api.validators(&runtime_api_block_id)
|
||||
.map_err(|e| Box::new(ClientError::Msg(format!("{:?}", e))) as Box<_>)?;
|
||||
let signer = authorities.get(sender as usize).ok_or_else(|| {
|
||||
Box::new(ClientError::BadJustification(
|
||||
"block accounced justification signer is a validator index out of bound"
|
||||
.to_string(),
|
||||
|
||||
@@ -0,0 +1,468 @@
|
||||
// Copyright 2020 Parity Technologies (UK) Ltd.
|
||||
// This file is part of Polkadot.
|
||||
|
||||
// Polkadot is free software: you can redistribute it and/or modify
|
||||
// it under the terms of the GNU General Public License as published by
|
||||
// the Free Software Foundation, either version 3 of the License, or
|
||||
// (at your option) any later version.
|
||||
|
||||
// Polkadot is distributed in the hope that it will be useful,
|
||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
// GNU General Public License for more details.
|
||||
|
||||
// You should have received a copy of the GNU General Public License
|
||||
// along with Polkadot. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
use super::*;
|
||||
use cumulus_test_runtime::{Block, Header};
|
||||
use polkadot_primitives::{
|
||||
parachain::{
|
||||
AbridgedCandidateReceipt, Chain, CollatorId, DutyRoster, GlobalValidationSchedule,
|
||||
Id as ParaId, LocalValidationData, ParachainHost, Retriable, SigningContext,
|
||||
ValidationCode, ValidatorId,
|
||||
},
|
||||
Block as PBlock, Hash as PHash, Header as PHeader,
|
||||
};
|
||||
use polkadot_test_runtime_client::{
|
||||
DefaultTestClientBuilderExt, TestClient, TestClientBuilder, TestClientBuilderExt,
|
||||
};
|
||||
use polkadot_validation::{sign_table_statement, Statement};
|
||||
use sp_api::{ApiRef, ProvideRuntimeApi};
|
||||
use sp_blockchain::{Error as ClientError, HeaderBackend};
|
||||
use sp_consensus::block_validation::BlockAnnounceValidator;
|
||||
use sp_core::H256;
|
||||
use sp_keyring::Sr25519Keyring;
|
||||
use sp_runtime::traits::{Block as BlockT, NumberFor, Zero};
|
||||
|
||||
fn make_validator() -> JustifiedBlockAnnounceValidator<Block, TestApi> {
|
||||
let (validator, _client) = make_validator_and_client();
|
||||
|
||||
validator
|
||||
}
|
||||
|
||||
fn make_validator_and_client() -> (
|
||||
JustifiedBlockAnnounceValidator<Block, TestApi>,
|
||||
Arc<TestApi>,
|
||||
) {
|
||||
let builder = TestClientBuilder::new();
|
||||
let client = Arc::new(TestApi::new(Arc::new(builder.build())));
|
||||
|
||||
(JustifiedBlockAnnounceValidator::new(client.clone()), client)
|
||||
}
|
||||
|
||||
fn default_header() -> Header {
|
||||
Header {
|
||||
number: Default::default(),
|
||||
digest: Default::default(),
|
||||
extrinsics_root: Default::default(),
|
||||
parent_hash: Default::default(),
|
||||
state_root: Default::default(),
|
||||
}
|
||||
}
|
||||
|
||||
fn make_gossip_message_and_header(
|
||||
client: Arc<TestApi>,
|
||||
relay_chain_leaf: H256,
|
||||
) -> (GossipMessage, Header) {
|
||||
let key = Sr25519Keyring::Alice.pair().into();
|
||||
let signing_context = client
|
||||
.runtime_api()
|
||||
.signing_context(&BlockId::Hash(relay_chain_leaf))
|
||||
.unwrap();
|
||||
let header = default_header();
|
||||
let candidate_receipt = AbridgedCandidateReceipt {
|
||||
head_data: header.encode().into(),
|
||||
..AbridgedCandidateReceipt::default()
|
||||
};
|
||||
let statement = Statement::Candidate(candidate_receipt);
|
||||
let signature = sign_table_statement(&statement, &key, &signing_context);
|
||||
let sender = 0;
|
||||
let gossip_statement = GossipStatement {
|
||||
relay_chain_leaf,
|
||||
signed_statement: SignedStatement {
|
||||
statement,
|
||||
signature,
|
||||
sender,
|
||||
},
|
||||
};
|
||||
|
||||
(GossipMessage::Statement(gossip_statement), header)
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn valid_if_no_data() {
|
||||
let mut validator = make_validator();
|
||||
let header = default_header();
|
||||
|
||||
assert!(
|
||||
matches!(validator.validate(&header, &[]), Ok(Validation::Success)),
|
||||
"validating without data is always a success",
|
||||
);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn check_gossip_message_is_valid() {
|
||||
let mut validator = make_validator();
|
||||
let header = default_header();
|
||||
let res = validator.validate(&header, &[0x42]).err();
|
||||
|
||||
assert!(
|
||||
res.is_some(),
|
||||
"only data that are gossip message are allowed"
|
||||
);
|
||||
assert!(matches!(
|
||||
*res.unwrap().downcast::<ClientError>().unwrap(),
|
||||
ClientError::BadJustification(x) if x.contains("must be a gossip message")
|
||||
));
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn check_relay_parent_is_head() {
|
||||
let (mut validator, client) = make_validator_and_client();
|
||||
let relay_chain_leaf = H256::zero();
|
||||
let (gossip_message, header) = make_gossip_message_and_header(client, relay_chain_leaf);
|
||||
let data = gossip_message.encode();
|
||||
let res = validator.validate(&header, data.as_slice());
|
||||
|
||||
assert_eq!(
|
||||
res.unwrap(),
|
||||
Validation::Failure,
|
||||
"validation fails if the relay chain parent is not the relay chain head",
|
||||
);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn check_relay_parent_actually_exists() {
|
||||
let (mut validator, client) = make_validator_and_client();
|
||||
let relay_chain_leaf = H256::from_low_u64_be(42);
|
||||
let (gossip_message, header) = make_gossip_message_and_header(client, relay_chain_leaf);
|
||||
let data = gossip_message.encode();
|
||||
let res = validator.validate(&header, data.as_slice()).err();
|
||||
|
||||
assert!(
|
||||
res.is_some(),
|
||||
"validation should fail if the relay chain leaf does not exist"
|
||||
);
|
||||
assert!(matches!(
|
||||
*res.unwrap().downcast::<ClientError>().unwrap(),
|
||||
ClientError::UnknownBlock(_)
|
||||
));
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn check_relay_parent_fails_if_cannot_retrieve_number() {
|
||||
let (mut validator, client) = make_validator_and_client();
|
||||
let relay_chain_leaf = H256::from_low_u64_be(0xdead);
|
||||
let (gossip_message, header) = make_gossip_message_and_header(client, relay_chain_leaf);
|
||||
let data = gossip_message.encode();
|
||||
let res = validator.validate(&header, data.as_slice()).err();
|
||||
|
||||
assert!(
|
||||
res.is_some(),
|
||||
"validation should fail if the relay chain leaf does not exist"
|
||||
);
|
||||
assert!(matches!(
|
||||
*res.unwrap().downcast::<ClientError>().unwrap(),
|
||||
ClientError::Backend(_)
|
||||
));
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn check_signer_is_legit_validator() {
|
||||
let (mut validator, client) = make_validator_and_client();
|
||||
let relay_chain_leaf = H256::from_low_u64_be(1);
|
||||
|
||||
let key = Sr25519Keyring::Alice.pair().into();
|
||||
let signing_context = client
|
||||
.runtime_api()
|
||||
.signing_context(&BlockId::Hash(relay_chain_leaf))
|
||||
.unwrap();
|
||||
let header = default_header();
|
||||
let candidate_receipt = AbridgedCandidateReceipt {
|
||||
head_data: header.encode().into(),
|
||||
..AbridgedCandidateReceipt::default()
|
||||
};
|
||||
let statement = Statement::Candidate(candidate_receipt);
|
||||
let signature = sign_table_statement(&statement, &key, &signing_context);
|
||||
let sender = 1;
|
||||
let gossip_statement = GossipStatement {
|
||||
relay_chain_leaf,
|
||||
signed_statement: SignedStatement {
|
||||
statement,
|
||||
signature,
|
||||
sender,
|
||||
},
|
||||
};
|
||||
let gossip_message = GossipMessage::Statement(gossip_statement);
|
||||
|
||||
let data = gossip_message.encode();
|
||||
let res = validator.validate(&header, data.as_slice()).err();
|
||||
|
||||
assert!(
|
||||
res.is_some(),
|
||||
"validation should fail if the signer is not a legit validator"
|
||||
);
|
||||
assert!(matches!(
|
||||
*res.unwrap().downcast::<ClientError>().unwrap(),
|
||||
ClientError::BadJustification(x) if x.contains("signer is a validator")
|
||||
));
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn check_statement_is_correctly_signed() {
|
||||
let (mut validator, client) = make_validator_and_client();
|
||||
let header = default_header();
|
||||
let relay_chain_leaf = H256::from_low_u64_be(1);
|
||||
|
||||
let key = Sr25519Keyring::Alice.pair().into();
|
||||
let signing_context = client
|
||||
.runtime_api()
|
||||
.signing_context(&BlockId::Hash(relay_chain_leaf))
|
||||
.unwrap();
|
||||
let mut candidate_receipt = AbridgedCandidateReceipt::default();
|
||||
let statement = Statement::Candidate(candidate_receipt.clone());
|
||||
let signature = sign_table_statement(&statement, &key, &signing_context);
|
||||
|
||||
// alterate statement so the signature doesn't match anymore
|
||||
candidate_receipt = AbridgedCandidateReceipt {
|
||||
parachain_index: candidate_receipt.parachain_index + 1,
|
||||
..candidate_receipt
|
||||
};
|
||||
let statement = Statement::Candidate(candidate_receipt);
|
||||
|
||||
let sender = 0;
|
||||
let gossip_statement = GossipStatement {
|
||||
relay_chain_leaf,
|
||||
signed_statement: SignedStatement {
|
||||
statement,
|
||||
signature,
|
||||
sender,
|
||||
},
|
||||
};
|
||||
let gossip_message = GossipMessage::Statement(gossip_statement);
|
||||
|
||||
let data = gossip_message.encode();
|
||||
let res = validator.validate(&header, data.as_slice()).err();
|
||||
|
||||
assert!(
|
||||
res.is_some(),
|
||||
"validation should fail if the statement is not correctly signed"
|
||||
);
|
||||
assert!(matches!(
|
||||
*res.unwrap().downcast::<ClientError>().unwrap(),
|
||||
ClientError::BadJustification(x) if x.contains("signature is invalid")
|
||||
));
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn check_statement_is_a_candidate_message() {
|
||||
let (mut validator, client) = make_validator_and_client();
|
||||
let header = default_header();
|
||||
let relay_chain_leaf = H256::from_low_u64_be(1);
|
||||
|
||||
let key = Sr25519Keyring::Alice.pair().into();
|
||||
let signing_context = client
|
||||
.runtime_api()
|
||||
.signing_context(&BlockId::Hash(relay_chain_leaf))
|
||||
.unwrap();
|
||||
let statement = Statement::Valid(H256::zero());
|
||||
let signature = sign_table_statement(&statement, &key, &signing_context);
|
||||
let sender = 0;
|
||||
let gossip_statement = GossipStatement {
|
||||
relay_chain_leaf,
|
||||
signed_statement: SignedStatement {
|
||||
statement,
|
||||
signature,
|
||||
sender,
|
||||
},
|
||||
};
|
||||
let gossip_message = GossipMessage::Statement(gossip_statement);
|
||||
|
||||
let data = gossip_message.encode();
|
||||
let res = validator.validate(&header, data.as_slice()).err();
|
||||
|
||||
assert!(
|
||||
res.is_some(),
|
||||
"validation should fail if the statement is not a candidate message"
|
||||
);
|
||||
assert!(matches!(
|
||||
*res.unwrap().downcast::<ClientError>().unwrap(),
|
||||
ClientError::BadJustification(x) if x.contains("must be a candidate statement")
|
||||
));
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn check_header_match_candidate_receipt_header() {
|
||||
let (mut validator, client) = make_validator_and_client();
|
||||
let relay_chain_leaf = H256::from_low_u64_be(1);
|
||||
|
||||
let key = Sr25519Keyring::Alice.pair().into();
|
||||
let signing_context = client
|
||||
.runtime_api()
|
||||
.signing_context(&BlockId::Hash(relay_chain_leaf))
|
||||
.unwrap();
|
||||
let header = default_header();
|
||||
let candidate_receipt = AbridgedCandidateReceipt::default();
|
||||
let statement = Statement::Candidate(candidate_receipt);
|
||||
let signature = sign_table_statement(&statement, &key, &signing_context);
|
||||
let sender = 0;
|
||||
let gossip_statement = GossipStatement {
|
||||
relay_chain_leaf,
|
||||
signed_statement: SignedStatement {
|
||||
statement,
|
||||
signature,
|
||||
sender,
|
||||
},
|
||||
};
|
||||
let gossip_message = GossipMessage::Statement(gossip_statement);
|
||||
|
||||
let data = gossip_message.encode();
|
||||
let res = validator.validate(&header, data.as_slice()).err();
|
||||
|
||||
assert!(
|
||||
res.is_some(),
|
||||
"validation should fail if the header in the candidate_receipt doesn't \
|
||||
match the header provided"
|
||||
);
|
||||
assert!(matches!(
|
||||
*res.unwrap().downcast::<ClientError>().unwrap(),
|
||||
ClientError::BadJustification(x) if x.contains("header does not match")
|
||||
));
|
||||
}
|
||||
|
||||
#[derive(Default)]
|
||||
struct ApiData {
|
||||
validators: Vec<ValidatorId>,
|
||||
duties: Vec<Chain>,
|
||||
active_parachains: Vec<(ParaId, Option<(CollatorId, Retriable)>)>,
|
||||
}
|
||||
|
||||
#[derive(Clone)]
|
||||
struct TestApi {
|
||||
data: Arc<Mutex<ApiData>>,
|
||||
client: Arc<TestClient>,
|
||||
}
|
||||
|
||||
impl TestApi {
|
||||
fn new(client: Arc<TestClient>) -> Self {
|
||||
Self {
|
||||
client,
|
||||
data: Arc::new(Mutex::new(ApiData {
|
||||
validators: vec![Sr25519Keyring::Alice.public().into()],
|
||||
..Default::default()
|
||||
})),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Default)]
|
||||
struct RuntimeApi {
|
||||
data: Arc<Mutex<ApiData>>,
|
||||
}
|
||||
|
||||
impl ProvideRuntimeApi<PBlock> for TestApi {
|
||||
type Api = RuntimeApi;
|
||||
|
||||
fn runtime_api<'a>(&'a self) -> ApiRef<'a, Self::Api> {
|
||||
RuntimeApi {
|
||||
data: self.data.clone(),
|
||||
}
|
||||
.into()
|
||||
}
|
||||
}
|
||||
|
||||
sp_api::mock_impl_runtime_apis! {
|
||||
impl ParachainHost<PBlock> for RuntimeApi {
|
||||
type Error = sp_blockchain::Error;
|
||||
|
||||
fn validators(&self) -> Vec<ValidatorId> {
|
||||
self.data.lock().validators.clone()
|
||||
}
|
||||
|
||||
fn duty_roster(&self) -> DutyRoster {
|
||||
DutyRoster {
|
||||
validator_duty: self.data.lock().duties.clone(),
|
||||
}
|
||||
}
|
||||
|
||||
fn active_parachains(&self) -> Vec<(ParaId, Option<(CollatorId, Retriable)>)> {
|
||||
self.data.lock().active_parachains.clone()
|
||||
}
|
||||
|
||||
fn parachain_code(_: ParaId) -> Option<ValidationCode> {
|
||||
Some(ValidationCode(Vec::new()))
|
||||
}
|
||||
|
||||
fn global_validation_schedule() -> GlobalValidationSchedule {
|
||||
Default::default()
|
||||
}
|
||||
|
||||
fn local_validation_data(_: ParaId) -> Option<LocalValidationData> {
|
||||
Some(Default::default())
|
||||
}
|
||||
|
||||
fn get_heads(_: Vec<<PBlock as BlockT>::Extrinsic>) -> Option<Vec<AbridgedCandidateReceipt>> {
|
||||
Some(Vec::new())
|
||||
}
|
||||
|
||||
fn signing_context() -> SigningContext {
|
||||
SigningContext {
|
||||
session_index: Default::default(),
|
||||
parent_hash: Default::default(),
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/// Blockchain database header backend. Does not perform any validation.
|
||||
impl HeaderBackend<PBlock> for TestApi {
|
||||
fn header(
|
||||
&self,
|
||||
_id: BlockId<PBlock>,
|
||||
) -> std::result::Result<Option<PHeader>, sp_blockchain::Error> {
|
||||
Ok(None)
|
||||
}
|
||||
|
||||
fn info(&self) -> sc_client_api::blockchain::Info<PBlock> {
|
||||
let best_hash = H256::from_low_u64_be(1);
|
||||
|
||||
sc_client_api::blockchain::Info {
|
||||
best_hash,
|
||||
best_number: 1,
|
||||
finalized_hash: Default::default(),
|
||||
finalized_number: Zero::zero(),
|
||||
genesis_hash: Default::default(),
|
||||
number_leaves: Default::default(),
|
||||
}
|
||||
}
|
||||
|
||||
fn status(
|
||||
&self,
|
||||
_id: BlockId<PBlock>,
|
||||
) -> std::result::Result<sc_client_api::blockchain::BlockStatus, sp_blockchain::Error> {
|
||||
Ok(sc_client_api::blockchain::BlockStatus::Unknown)
|
||||
}
|
||||
|
||||
fn number(
|
||||
&self,
|
||||
hash: PHash,
|
||||
) -> std::result::Result<Option<NumberFor<PBlock>>, sp_blockchain::Error> {
|
||||
if hash == H256::zero() {
|
||||
Ok(Some(0))
|
||||
} else if hash == H256::from_low_u64_be(1) {
|
||||
Ok(Some(1))
|
||||
} else if hash == H256::from_low_u64_be(0xdead) {
|
||||
Err(sp_blockchain::Error::Backend("dead".to_string()))
|
||||
} else {
|
||||
Ok(None)
|
||||
}
|
||||
}
|
||||
|
||||
fn hash(
|
||||
&self,
|
||||
_number: NumberFor<PBlock>,
|
||||
) -> std::result::Result<Option<PHash>, sp_blockchain::Error> {
|
||||
Ok(None)
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user