mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-26 15:47:58 +00:00
0dbdfef95e
* Remove signature verification in backing. `SignedFullStatement` now signals that the signature has already been checked. * Remove unused check_payload function. * Introduced unchecked signed variants. * Fix inclusion to use unchecked variant. * More unchecked variants. * Use unchecked variants in protocols. * Start fixing statement-distribution. * Fixup statement distribution. * Fix inclusion. * Fix warning. * Fix backing properly. * Fix bitfield distribution. * Make crypto store optional for `RuntimeInfo`. * Factor out utility functions. * get_group_rotation_info * WIP: Collator cleanup + check signatures. * Convenience signature checking functions. * Check signature on collator-side. * Fix warnings. * Fix collator side tests. * Get rid of warnings. * Better Signed/UncheckedSigned implementation. Also get rid of Encode/Decode for Signed! *party* * Get rid of dead code. * Move Signed in its own module. * into_checked -> try_into_checked * Fix merge.
287 lines
8.5 KiB
Rust
287 lines
8.5 KiB
Rust
// Copyright 2021 Parity Technologies (UK) Ltd.
|
|
// This file is part of Polkadot.
|
|
|
|
// Polkadot is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Polkadot is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Polkadot. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
//! Convenient interface to runtime information.
|
|
|
|
use lru::LruCache;
|
|
|
|
use parity_scale_codec::Encode;
|
|
use sp_application_crypto::AppKey;
|
|
use sp_core::crypto::Public;
|
|
use sp_keystore::{CryptoStore, SyncCryptoStorePtr};
|
|
|
|
use polkadot_primitives::v1::{CoreState, EncodeAs, GroupIndex, GroupRotationInfo, Hash, OccupiedCore, SessionIndex, SessionInfo, Signed, SigningContext, UncheckedSigned, ValidatorId, ValidatorIndex};
|
|
use polkadot_node_subsystem::SubsystemContext;
|
|
|
|
use crate::{
|
|
request_session_index_for_child, request_session_info,
|
|
request_availability_cores,
|
|
request_validator_groups,
|
|
};
|
|
|
|
/// Errors that can happen on runtime fetches.
|
|
mod error;
|
|
|
|
use error::{recv_runtime, Result};
|
|
pub use error::{Error, NonFatal, Fatal};
|
|
|
|
/// Caching of session info.
|
|
///
|
|
/// It should be ensured that a cached session stays live in the cache as long as we might need it.
|
|
pub struct RuntimeInfo {
|
|
/// Get the session index for a given relay parent.
|
|
///
|
|
/// We query this up to a 100 times per block, so caching it here without roundtrips over the
|
|
/// overseer seems sensible.
|
|
session_index_cache: LruCache<Hash, SessionIndex>,
|
|
|
|
/// Look up cached sessions by SessionIndex.
|
|
session_info_cache: LruCache<SessionIndex, ExtendedSessionInfo>,
|
|
|
|
/// Key store for determining whether we are a validator and what `ValidatorIndex` we have.
|
|
keystore: Option<SyncCryptoStorePtr>,
|
|
}
|
|
|
|
/// SessionInfo with additional useful data for validator nodes.
|
|
pub struct ExtendedSessionInfo {
|
|
/// Actual session info as fetched from the runtime.
|
|
pub session_info: SessionInfo,
|
|
/// Contains useful information about ourselves, in case this node is a validator.
|
|
pub validator_info: ValidatorInfo,
|
|
}
|
|
|
|
/// Information about ourself, in case we are an `Authority`.
|
|
///
|
|
/// This data is derived from the `SessionInfo` and our key as found in the keystore.
|
|
pub struct ValidatorInfo {
|
|
/// The index this very validator has in `SessionInfo` vectors, if any.
|
|
pub our_index: Option<ValidatorIndex>,
|
|
/// The group we belong to, if any.
|
|
pub our_group: Option<GroupIndex>,
|
|
}
|
|
|
|
impl RuntimeInfo {
|
|
/// Create a new `RuntimeInfo` for convenient runtime fetches.
|
|
pub fn new(keystore: Option<SyncCryptoStorePtr>) -> Self {
|
|
Self {
|
|
// Adjust, depending on how many forks we want to support.
|
|
session_index_cache: LruCache::new(10),
|
|
// We need to cache the current and the last session the most:
|
|
session_info_cache: LruCache::new(2),
|
|
keystore,
|
|
}
|
|
}
|
|
|
|
/// Retrieve the current session index.
|
|
pub async fn get_session_index<Context>(
|
|
&mut self,
|
|
ctx: &mut Context,
|
|
parent: Hash,
|
|
) -> Result<SessionIndex>
|
|
where
|
|
Context: SubsystemContext,
|
|
{
|
|
match self.session_index_cache.get(&parent) {
|
|
Some(index) => Ok(*index),
|
|
None => {
|
|
let index =
|
|
recv_runtime(request_session_index_for_child(parent, ctx.sender()).await)
|
|
.await?;
|
|
self.session_index_cache.put(parent, index);
|
|
Ok(index)
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Get `ExtendedSessionInfo` by relay parent hash.
|
|
pub async fn get_session_info<'a, Context>(
|
|
&'a mut self,
|
|
ctx: &mut Context,
|
|
parent: Hash,
|
|
) -> Result<&'a ExtendedSessionInfo>
|
|
where
|
|
Context: SubsystemContext,
|
|
{
|
|
let session_index = self.get_session_index(ctx, parent).await?;
|
|
|
|
self.get_session_info_by_index(ctx, parent, session_index).await
|
|
}
|
|
|
|
/// Get `ExtendedSessionInfo` by session index.
|
|
///
|
|
/// `request_session_info` still requires the parent to be passed in, so we take the parent
|
|
/// in addition to the `SessionIndex`.
|
|
pub async fn get_session_info_by_index<'a, Context>(
|
|
&'a mut self,
|
|
ctx: &mut Context,
|
|
parent: Hash,
|
|
session_index: SessionIndex,
|
|
) -> Result<&'a ExtendedSessionInfo>
|
|
where
|
|
Context: SubsystemContext,
|
|
{
|
|
if !self.session_info_cache.contains(&session_index) {
|
|
let session_info =
|
|
recv_runtime(request_session_info(parent, session_index, ctx.sender()).await)
|
|
.await?
|
|
.ok_or(NonFatal::NoSuchSession(session_index))?;
|
|
let validator_info = self.get_validator_info(&session_info).await?;
|
|
|
|
let full_info = ExtendedSessionInfo {
|
|
session_info,
|
|
validator_info,
|
|
};
|
|
|
|
self.session_info_cache.put(session_index, full_info);
|
|
}
|
|
Ok(
|
|
self.session_info_cache.get(&session_index)
|
|
.expect("We just put the value there. qed.")
|
|
)
|
|
}
|
|
|
|
/// Convenience function for checking the signature of something signed.
|
|
pub async fn check_signature<Context, Payload, RealPayload>(
|
|
&mut self,
|
|
ctx: &mut Context,
|
|
parent: Hash,
|
|
signed: UncheckedSigned<Payload, RealPayload>,
|
|
) -> Result<std::result::Result<Signed<Payload, RealPayload>, UncheckedSigned<Payload, RealPayload>>>
|
|
where
|
|
Context: SubsystemContext,
|
|
Payload: EncodeAs<RealPayload> + Clone,
|
|
RealPayload: Encode + Clone,
|
|
{
|
|
let session_index = self.get_session_index(ctx, parent).await?;
|
|
let info = self.get_session_info_by_index(ctx, parent, session_index).await?;
|
|
Ok(check_signature(session_index, &info.session_info, parent, signed))
|
|
}
|
|
|
|
/// Build `ValidatorInfo` for the current session.
|
|
///
|
|
///
|
|
/// Returns: `None` if not a validator.
|
|
async fn get_validator_info(
|
|
&self,
|
|
session_info: &SessionInfo,
|
|
) -> Result<ValidatorInfo>
|
|
{
|
|
if let Some(our_index) = self.get_our_index(&session_info.validators).await {
|
|
// Get our group index:
|
|
let our_group = session_info.validator_groups
|
|
.iter()
|
|
.enumerate()
|
|
.find_map(|(i, g)| {
|
|
g.iter().find_map(|v| {
|
|
if *v == our_index {
|
|
Some(GroupIndex(i as u32))
|
|
} else {
|
|
None
|
|
}
|
|
})
|
|
}
|
|
);
|
|
let info = ValidatorInfo {
|
|
our_index: Some(our_index),
|
|
our_group,
|
|
};
|
|
return Ok(info)
|
|
}
|
|
return Ok(ValidatorInfo { our_index: None, our_group: None })
|
|
}
|
|
|
|
/// Get our `ValidatorIndex`.
|
|
///
|
|
/// Returns: None if we are not a validator.
|
|
async fn get_our_index(&self, validators: &[ValidatorId]) -> Option<ValidatorIndex> {
|
|
let keystore = self.keystore.as_ref()?;
|
|
for (i, v) in validators.iter().enumerate() {
|
|
if CryptoStore::has_keys(&**keystore, &[(v.to_raw_vec(), ValidatorId::ID)])
|
|
.await
|
|
{
|
|
return Some(ValidatorIndex(i as u32));
|
|
}
|
|
}
|
|
None
|
|
}
|
|
}
|
|
|
|
/// Convenience function for quickly checking the signature on signed data.
|
|
pub fn check_signature<Payload, RealPayload>(
|
|
session_index: SessionIndex,
|
|
session_info: &SessionInfo,
|
|
relay_parent: Hash,
|
|
signed: UncheckedSigned<Payload, RealPayload>,
|
|
) -> std::result::Result<Signed<Payload, RealPayload>, UncheckedSigned<Payload, RealPayload>>
|
|
where
|
|
Payload: EncodeAs<RealPayload> + Clone,
|
|
RealPayload: Encode + Clone,
|
|
{
|
|
let signing_context = SigningContext {
|
|
session_index,
|
|
parent_hash: relay_parent,
|
|
};
|
|
|
|
session_info.validators
|
|
.get(signed.unchecked_validator_index().0 as usize)
|
|
.ok_or_else(|| signed.clone())
|
|
.and_then(|v| signed.try_into_checked(&signing_context, v))
|
|
}
|
|
|
|
/// Request availability cores from the runtime.
|
|
pub async fn get_availability_cores<Context>(ctx: &mut Context, relay_parent: Hash)
|
|
-> Result<Vec<CoreState>>
|
|
where
|
|
Context: SubsystemContext,
|
|
{
|
|
recv_runtime(request_availability_cores(relay_parent, ctx.sender()).await).await
|
|
}
|
|
|
|
/// Variant of `request_availability_cores` that only returns occupied ones.
|
|
pub async fn get_occupied_cores<Context>(
|
|
ctx: &mut Context,
|
|
relay_parent: Hash,
|
|
) -> Result<Vec<OccupiedCore>>
|
|
where
|
|
Context: SubsystemContext,
|
|
{
|
|
let cores = get_availability_cores(ctx, relay_parent).await?;
|
|
|
|
Ok(cores
|
|
.into_iter()
|
|
.filter_map(|core_state| {
|
|
if let CoreState::Occupied(occupied) = core_state {
|
|
Some(occupied)
|
|
} else {
|
|
None
|
|
}
|
|
})
|
|
.collect()
|
|
)
|
|
}
|
|
|
|
/// Get group rotation info based on the given relay_parent.
|
|
pub async fn get_group_rotation_info<Context>(ctx: &mut Context, relay_parent: Hash)
|
|
-> Result<GroupRotationInfo>
|
|
where
|
|
Context: SubsystemContext
|
|
{
|
|
// We drop `groups` here as we don't need them, because of `RuntimeInfo`. Ideally we would not
|
|
// fetch them in the first place.
|
|
let (_, info) = recv_runtime(request_validator_groups(relay_parent, ctx.sender()).await).await?;
|
|
Ok(info)
|
|
}
|