mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-28 14:27:57 +00:00
3fef703e30
* Merged BEEFY primitives with generic signature and keyset commitment support from old pull to current code * - Add bls-experimental feature to application-crypto and beefy primitives - Fix remaining crypto -> ecdsa_crypto - code build but not tests * Make beefy primitive tests compile * move bls related beefy primitives code and test behind bls-experimental flag * Make BEEFY clients complies with BEEFY API depending on AuthorityId * - Rename `BeefyAuthoritySet.root` → `BeefyAuthoritySet.keyset_commitment`. - Remove apk proof keyset_commitment from `BeefyAuthoritySet`. - Fix failing signed commitment and signature to witness test. - Make client compatible with BeefyAPI generic on AuthorityId. - `crypto` → `ecdsa_crypto` in BEEFY client and frame. * Commit Cargo lock remove ark-serialize from BEEFY primitives * Use Codec instead of Encode + Decode in primitives/consensus/beefy/src/lib.rs Co-authored-by: Davide Galassi <davxy@datawok.net> * - Make `BeefyApi` generic over Signature type. - Make new `BeeyApi` functinos also generic over AuthorityId and Signature * Unmake BeefyAPI generic over Signature. Recover Signature type from AuthId. * - dont use hex or hex-literal use array-bytes instead in beefy primitives and bls crypto. - CamelCase ECDSA and BLS everywhere. * Move the definition of BEEFY key type from `primitives/beefy` to `crypto.rs` according to new convention. * - Add bls377_generate_new to `sp-io` and `application_crypto::bls`. - Add `bls-experimental` to `sp-io` Does not compile because PassByCodec can not derive PassBy using customly implemented PassByIner. * Implement PassBy for `bls::Public` manually * fix Beefy `KEY_TYPE` in `frame/beefy` tests to come from `sp-core::key_types` enum * specify both generic for `hex2array_unchecked` in `sp-core/bls.rs` * Rename `crypto`→`ecdsa_crypto` in `primitives/consensus/beefy/src/test_utils.rs` docs * remove commented-out code in `primitives/consensus/beefy/src/commitment.rs` Co-authored-by: Davide Galassi <davxy@datawok.net> * Fix inconsistency in panic message in `primitives/io/src/lib.rs` Co-authored-by: Davide Galassi <davxy@datawok.net> * Remove redundant feature activation in `primitives/io/Cargo.toml` Co-authored-by: Davide Galassi <davxy@datawok.net> * - make `w3f-bls` a dev-dependancy only for beefy primitives. - clean up comments. Co-authored-by: Davide Galassi <davxy@datawok.net> * export BEEFY KEY_TYPE from primitives/consensus/beefy make `frame/consensus/beefy` in dependent of sp_crypto_app use consistent naming in the beefy primitive tests. * - implement `BeefyAuthorityId` for `bls_crypto::AuthorityId`. - implement `bls_verify_works` test for BEEFY `bls_crypto`. * Remove BEEFY `ecdsa_n_bls_crypto` for now for later re-introduction * Make commitment and witness BEEFY tests not use Keystore. * put `bls_beefy_verify_works` test under `bls-experimental` flag. * bump up Runtime `BeefyAPI` to version 3 due to introducing generic AuthorityId. * reuse code and encapsulate w3f-bls backend in sp-core as most as possible Co-authored-by: Davide Galassi <davxy@datawok.net> * Make comments in primities BEEFY `commitment.rs` and `witness.rs``tests convention conforming * Use master dep versions * Trivial change. Mostly to trigger CI * Apply suggestions from code review Co-authored-by: André Silva <123550+andresilva@users.noreply.github.com> * Fix Cargo.toml * Trigger CI with cumulus companion * Trigger CI after polkadot companion change --------- Co-authored-by: Davide Galassi <davxy@datawok.net> Co-authored-by: André Silva <123550+andresilva@users.noreply.github.com>
201 lines
7.4 KiB
Rust
201 lines
7.4 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: GPL-3.0-or-later WITH Classpath-exception-2.0
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
use crate::keystore::BeefyKeystore;
|
|
use codec::{DecodeAll, Encode};
|
|
use sp_consensus::Error as ConsensusError;
|
|
use sp_consensus_beefy::{
|
|
ecdsa_crypto::{AuthorityId, Signature},
|
|
ValidatorSet, ValidatorSetId, VersionedFinalityProof,
|
|
};
|
|
use sp_runtime::traits::{Block as BlockT, NumberFor};
|
|
|
|
/// A finality proof with matching BEEFY authorities' signatures.
|
|
pub type BeefyVersionedFinalityProof<Block> = VersionedFinalityProof<NumberFor<Block>, Signature>;
|
|
|
|
pub(crate) fn proof_block_num_and_set_id<Block: BlockT>(
|
|
proof: &BeefyVersionedFinalityProof<Block>,
|
|
) -> (NumberFor<Block>, ValidatorSetId) {
|
|
match proof {
|
|
VersionedFinalityProof::V1(sc) =>
|
|
(sc.commitment.block_number, sc.commitment.validator_set_id),
|
|
}
|
|
}
|
|
|
|
/// Decode and verify a Beefy FinalityProof.
|
|
pub(crate) fn decode_and_verify_finality_proof<Block: BlockT>(
|
|
encoded: &[u8],
|
|
target_number: NumberFor<Block>,
|
|
validator_set: &ValidatorSet<AuthorityId>,
|
|
) -> Result<BeefyVersionedFinalityProof<Block>, (ConsensusError, u32)> {
|
|
let proof = <BeefyVersionedFinalityProof<Block>>::decode_all(&mut &*encoded)
|
|
.map_err(|_| (ConsensusError::InvalidJustification, 0))?;
|
|
verify_with_validator_set::<Block>(target_number, validator_set, &proof).map(|_| proof)
|
|
}
|
|
|
|
/// Verify the Beefy finality proof against the validator set at the block it was generated.
|
|
pub(crate) fn verify_with_validator_set<Block: BlockT>(
|
|
target_number: NumberFor<Block>,
|
|
validator_set: &ValidatorSet<AuthorityId>,
|
|
proof: &BeefyVersionedFinalityProof<Block>,
|
|
) -> Result<(), (ConsensusError, u32)> {
|
|
let mut signatures_checked = 0u32;
|
|
match proof {
|
|
VersionedFinalityProof::V1(signed_commitment) => {
|
|
if signed_commitment.signatures.len() != validator_set.len() ||
|
|
signed_commitment.commitment.validator_set_id != validator_set.id() ||
|
|
signed_commitment.commitment.block_number != target_number
|
|
{
|
|
return Err((ConsensusError::InvalidJustification, 0))
|
|
}
|
|
|
|
// Arrangement of signatures in the commitment should be in the same order
|
|
// as validators for that set.
|
|
let message = signed_commitment.commitment.encode();
|
|
let valid_signatures = validator_set
|
|
.validators()
|
|
.into_iter()
|
|
.zip(signed_commitment.signatures.iter())
|
|
.filter(|(id, signature)| {
|
|
signature
|
|
.as_ref()
|
|
.map(|sig| {
|
|
signatures_checked += 1;
|
|
BeefyKeystore::verify(id, sig, &message[..])
|
|
})
|
|
.unwrap_or(false)
|
|
})
|
|
.count();
|
|
if valid_signatures >= crate::round::threshold(validator_set.len()) {
|
|
Ok(())
|
|
} else {
|
|
Err((ConsensusError::InvalidJustification, signatures_checked))
|
|
}
|
|
},
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
pub(crate) mod tests {
|
|
use sp_consensus_beefy::{
|
|
known_payloads, Commitment, Keyring, Payload, SignedCommitment, VersionedFinalityProof,
|
|
};
|
|
use substrate_test_runtime_client::runtime::Block;
|
|
|
|
use super::*;
|
|
use crate::tests::make_beefy_ids;
|
|
|
|
pub(crate) fn new_finality_proof(
|
|
block_num: NumberFor<Block>,
|
|
validator_set: &ValidatorSet<AuthorityId>,
|
|
keys: &[Keyring],
|
|
) -> BeefyVersionedFinalityProof<Block> {
|
|
let commitment = Commitment {
|
|
payload: Payload::from_single_entry(known_payloads::MMR_ROOT_ID, vec![]),
|
|
block_number: block_num,
|
|
validator_set_id: validator_set.id(),
|
|
};
|
|
let message = commitment.encode();
|
|
let signatures = keys.iter().map(|key| Some(key.sign(&message))).collect();
|
|
VersionedFinalityProof::V1(SignedCommitment { commitment, signatures })
|
|
}
|
|
|
|
#[test]
|
|
fn should_verify_with_validator_set() {
|
|
let keys = &[Keyring::Alice, Keyring::Bob, Keyring::Charlie];
|
|
let validator_set = ValidatorSet::new(make_beefy_ids(keys), 0).unwrap();
|
|
|
|
// build valid justification
|
|
let block_num = 42;
|
|
let proof = new_finality_proof(block_num, &validator_set, keys);
|
|
|
|
let good_proof = proof.clone().into();
|
|
// should verify successfully
|
|
verify_with_validator_set::<Block>(block_num, &validator_set, &good_proof).unwrap();
|
|
|
|
// wrong block number -> should fail verification
|
|
let good_proof = proof.clone().into();
|
|
match verify_with_validator_set::<Block>(block_num + 1, &validator_set, &good_proof) {
|
|
Err((ConsensusError::InvalidJustification, 0)) => (),
|
|
e => assert!(false, "Got unexpected {:?}", e),
|
|
};
|
|
|
|
// wrong validator set id -> should fail verification
|
|
let good_proof = proof.clone().into();
|
|
let other = ValidatorSet::new(make_beefy_ids(keys), 1).unwrap();
|
|
match verify_with_validator_set::<Block>(block_num, &other, &good_proof) {
|
|
Err((ConsensusError::InvalidJustification, 0)) => (),
|
|
e => assert!(false, "Got unexpected {:?}", e),
|
|
};
|
|
|
|
// wrong signatures length -> should fail verification
|
|
let mut bad_proof = proof.clone();
|
|
// change length of signatures
|
|
let bad_signed_commitment = match bad_proof {
|
|
VersionedFinalityProof::V1(ref mut sc) => sc,
|
|
};
|
|
bad_signed_commitment.signatures.pop().flatten().unwrap();
|
|
match verify_with_validator_set::<Block>(block_num + 1, &validator_set, &bad_proof.into()) {
|
|
Err((ConsensusError::InvalidJustification, 0)) => (),
|
|
e => assert!(false, "Got unexpected {:?}", e),
|
|
};
|
|
|
|
// not enough signatures -> should fail verification
|
|
let mut bad_proof = proof.clone();
|
|
let bad_signed_commitment = match bad_proof {
|
|
VersionedFinalityProof::V1(ref mut sc) => sc,
|
|
};
|
|
// remove a signature (but same length)
|
|
*bad_signed_commitment.signatures.first_mut().unwrap() = None;
|
|
match verify_with_validator_set::<Block>(block_num, &validator_set, &bad_proof.into()) {
|
|
Err((ConsensusError::InvalidJustification, 2)) => (),
|
|
e => assert!(false, "Got unexpected {:?}", e),
|
|
};
|
|
|
|
// not enough _correct_ signatures -> should fail verification
|
|
let mut bad_proof = proof.clone();
|
|
let bad_signed_commitment = match bad_proof {
|
|
VersionedFinalityProof::V1(ref mut sc) => sc,
|
|
};
|
|
// change a signature to a different key
|
|
*bad_signed_commitment.signatures.first_mut().unwrap() =
|
|
Some(Keyring::Dave.sign(&bad_signed_commitment.commitment.encode()));
|
|
match verify_with_validator_set::<Block>(block_num, &validator_set, &bad_proof.into()) {
|
|
Err((ConsensusError::InvalidJustification, 3)) => (),
|
|
e => assert!(false, "Got unexpected {:?}", e),
|
|
};
|
|
}
|
|
|
|
#[test]
|
|
fn should_decode_and_verify_finality_proof() {
|
|
let keys = &[Keyring::Alice, Keyring::Bob];
|
|
let validator_set = ValidatorSet::new(make_beefy_ids(keys), 0).unwrap();
|
|
let block_num = 1;
|
|
|
|
// build valid justification
|
|
let proof = new_finality_proof(block_num, &validator_set, keys);
|
|
let versioned_proof: BeefyVersionedFinalityProof<Block> = proof.into();
|
|
let encoded = versioned_proof.encode();
|
|
|
|
// should successfully decode and verify
|
|
let verified =
|
|
decode_and_verify_finality_proof::<Block>(&encoded, block_num, &validator_set).unwrap();
|
|
assert_eq!(verified, versioned_proof);
|
|
}
|
|
}
|