mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-27 10:27:59 +00:00
3fef703e30
* Merged BEEFY primitives with generic signature and keyset commitment support from old pull to current code * - Add bls-experimental feature to application-crypto and beefy primitives - Fix remaining crypto -> ecdsa_crypto - code build but not tests * Make beefy primitive tests compile * move bls related beefy primitives code and test behind bls-experimental flag * Make BEEFY clients complies with BEEFY API depending on AuthorityId * - Rename `BeefyAuthoritySet.root` → `BeefyAuthoritySet.keyset_commitment`. - Remove apk proof keyset_commitment from `BeefyAuthoritySet`. - Fix failing signed commitment and signature to witness test. - Make client compatible with BeefyAPI generic on AuthorityId. - `crypto` → `ecdsa_crypto` in BEEFY client and frame. * Commit Cargo lock remove ark-serialize from BEEFY primitives * Use Codec instead of Encode + Decode in primitives/consensus/beefy/src/lib.rs Co-authored-by: Davide Galassi <davxy@datawok.net> * - Make `BeefyApi` generic over Signature type. - Make new `BeeyApi` functinos also generic over AuthorityId and Signature * Unmake BeefyAPI generic over Signature. Recover Signature type from AuthId. * - dont use hex or hex-literal use array-bytes instead in beefy primitives and bls crypto. - CamelCase ECDSA and BLS everywhere. * Move the definition of BEEFY key type from `primitives/beefy` to `crypto.rs` according to new convention. * - Add bls377_generate_new to `sp-io` and `application_crypto::bls`. - Add `bls-experimental` to `sp-io` Does not compile because PassByCodec can not derive PassBy using customly implemented PassByIner. * Implement PassBy for `bls::Public` manually * fix Beefy `KEY_TYPE` in `frame/beefy` tests to come from `sp-core::key_types` enum * specify both generic for `hex2array_unchecked` in `sp-core/bls.rs` * Rename `crypto`→`ecdsa_crypto` in `primitives/consensus/beefy/src/test_utils.rs` docs * remove commented-out code in `primitives/consensus/beefy/src/commitment.rs` Co-authored-by: Davide Galassi <davxy@datawok.net> * Fix inconsistency in panic message in `primitives/io/src/lib.rs` Co-authored-by: Davide Galassi <davxy@datawok.net> * Remove redundant feature activation in `primitives/io/Cargo.toml` Co-authored-by: Davide Galassi <davxy@datawok.net> * - make `w3f-bls` a dev-dependancy only for beefy primitives. - clean up comments. Co-authored-by: Davide Galassi <davxy@datawok.net> * export BEEFY KEY_TYPE from primitives/consensus/beefy make `frame/consensus/beefy` in dependent of sp_crypto_app use consistent naming in the beefy primitive tests. * - implement `BeefyAuthorityId` for `bls_crypto::AuthorityId`. - implement `bls_verify_works` test for BEEFY `bls_crypto`. * Remove BEEFY `ecdsa_n_bls_crypto` for now for later re-introduction * Make commitment and witness BEEFY tests not use Keystore. * put `bls_beefy_verify_works` test under `bls-experimental` flag. * bump up Runtime `BeefyAPI` to version 3 due to introducing generic AuthorityId. * reuse code and encapsulate w3f-bls backend in sp-core as most as possible Co-authored-by: Davide Galassi <davxy@datawok.net> * Make comments in primities BEEFY `commitment.rs` and `witness.rs``tests convention conforming * Use master dep versions * Trivial change. Mostly to trigger CI * Apply suggestions from code review Co-authored-by: André Silva <123550+andresilva@users.noreply.github.com> * Fix Cargo.toml * Trigger CI with cumulus companion * Trigger CI after polkadot companion change --------- Co-authored-by: Davide Galassi <davxy@datawok.net> Co-authored-by: André Silva <123550+andresilva@users.noreply.github.com>
111 lines
3.2 KiB
Rust
111 lines
3.2 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
#![cfg(feature = "std")]
|
|
|
|
use crate::{ecdsa_crypto, Commitment, EquivocationProof, Payload, ValidatorSetId, VoteMessage};
|
|
use codec::Encode;
|
|
use sp_core::{ecdsa, keccak_256, Pair};
|
|
use std::collections::HashMap;
|
|
use strum::IntoEnumIterator;
|
|
|
|
/// Set of test accounts using [`crate::ecdsa_crypto`] types.
|
|
#[allow(missing_docs)]
|
|
#[derive(Debug, Clone, Copy, PartialEq, Eq, Hash, strum::Display, strum::EnumIter)]
|
|
pub enum Keyring {
|
|
Alice,
|
|
Bob,
|
|
Charlie,
|
|
Dave,
|
|
Eve,
|
|
Ferdie,
|
|
One,
|
|
Two,
|
|
}
|
|
|
|
impl Keyring {
|
|
/// Sign `msg`.
|
|
pub fn sign(self, msg: &[u8]) -> ecdsa_crypto::Signature {
|
|
// todo: use custom signature hashing type
|
|
let msg = keccak_256(msg);
|
|
ecdsa::Pair::from(self).sign_prehashed(&msg).into()
|
|
}
|
|
|
|
/// Return key pair.
|
|
pub fn pair(self) -> ecdsa_crypto::Pair {
|
|
ecdsa::Pair::from_string(self.to_seed().as_str(), None).unwrap().into()
|
|
}
|
|
|
|
/// Return public key.
|
|
pub fn public(self) -> ecdsa_crypto::Public {
|
|
self.pair().public()
|
|
}
|
|
|
|
/// Return seed string.
|
|
pub fn to_seed(self) -> String {
|
|
format!("//{}", self)
|
|
}
|
|
|
|
/// Get Keyring from public key.
|
|
pub fn from_public(who: &ecdsa_crypto::Public) -> Option<Keyring> {
|
|
Self::iter().find(|&k| &ecdsa_crypto::Public::from(k) == who)
|
|
}
|
|
}
|
|
|
|
lazy_static::lazy_static! {
|
|
static ref PRIVATE_KEYS: HashMap<Keyring, ecdsa_crypto::Pair> =
|
|
Keyring::iter().map(|i| (i, i.pair())).collect();
|
|
static ref PUBLIC_KEYS: HashMap<Keyring, ecdsa_crypto::Public> =
|
|
PRIVATE_KEYS.iter().map(|(&name, pair)| (name, pair.public())).collect();
|
|
}
|
|
|
|
impl From<Keyring> for ecdsa_crypto::Pair {
|
|
fn from(k: Keyring) -> Self {
|
|
k.pair()
|
|
}
|
|
}
|
|
|
|
impl From<Keyring> for ecdsa::Pair {
|
|
fn from(k: Keyring) -> Self {
|
|
k.pair().into()
|
|
}
|
|
}
|
|
|
|
impl From<Keyring> for ecdsa_crypto::Public {
|
|
fn from(k: Keyring) -> Self {
|
|
(*PUBLIC_KEYS).get(&k).cloned().unwrap()
|
|
}
|
|
}
|
|
|
|
/// Create a new `EquivocationProof` based on given arguments.
|
|
pub fn generate_equivocation_proof(
|
|
vote1: (u64, Payload, ValidatorSetId, &Keyring),
|
|
vote2: (u64, Payload, ValidatorSetId, &Keyring),
|
|
) -> EquivocationProof<u64, ecdsa_crypto::Public, ecdsa_crypto::Signature> {
|
|
let signed_vote = |block_number: u64,
|
|
payload: Payload,
|
|
validator_set_id: ValidatorSetId,
|
|
keyring: &Keyring| {
|
|
let commitment = Commitment { validator_set_id, block_number, payload };
|
|
let signature = keyring.sign(&commitment.encode());
|
|
VoteMessage { commitment, id: keyring.public(), signature }
|
|
};
|
|
let first = signed_vote(vote1.0, vote1.1, vote1.2, vote1.3);
|
|
let second = signed_vote(vote2.0, vote2.1, vote2.2, vote2.3);
|
|
EquivocationProof { first, second }
|
|
}
|