mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-28 01:38:04 +00:00
b91d2dfdc1
* primitives/beefy: move Payload to its own file * primitives/beefy: add Payload tests * primitives/beefy: add MmrRootProvider as custom BEEFY payload provider * client/beefy: use generic BEEFY 'PayloadProvider' * primitives/beefy: rename Payload::new to Payload::from_single_entry for clarity * fix visibility * fix cargo doc
189 lines
7.1 KiB
Rust
189 lines
7.1 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) 2021-2022 Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: GPL-3.0-or-later WITH Classpath-exception-2.0
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
use crate::keystore::BeefyKeystore;
|
|
use beefy_primitives::{
|
|
crypto::{AuthorityId, Signature},
|
|
ValidatorSet, VersionedFinalityProof,
|
|
};
|
|
use codec::{Decode, Encode};
|
|
use sp_consensus::Error as ConsensusError;
|
|
use sp_runtime::traits::{Block as BlockT, NumberFor};
|
|
|
|
/// A finality proof with matching BEEFY authorities' signatures.
|
|
pub type BeefyVersionedFinalityProof<Block> =
|
|
beefy_primitives::VersionedFinalityProof<NumberFor<Block>, Signature>;
|
|
|
|
/// Decode and verify a Beefy FinalityProof.
|
|
pub(crate) fn decode_and_verify_finality_proof<Block: BlockT>(
|
|
encoded: &[u8],
|
|
target_number: NumberFor<Block>,
|
|
validator_set: &ValidatorSet<AuthorityId>,
|
|
) -> Result<BeefyVersionedFinalityProof<Block>, ConsensusError> {
|
|
let proof = <BeefyVersionedFinalityProof<Block>>::decode(&mut &*encoded)
|
|
.map_err(|_| ConsensusError::InvalidJustification)?;
|
|
verify_with_validator_set::<Block>(target_number, validator_set, &proof).map(|_| proof)
|
|
}
|
|
|
|
/// Verify the Beefy finality proof against the validator set at the block it was generated.
|
|
fn verify_with_validator_set<Block: BlockT>(
|
|
target_number: NumberFor<Block>,
|
|
validator_set: &ValidatorSet<AuthorityId>,
|
|
proof: &BeefyVersionedFinalityProof<Block>,
|
|
) -> Result<(), ConsensusError> {
|
|
match proof {
|
|
VersionedFinalityProof::V1(signed_commitment) => {
|
|
if signed_commitment.signatures.len() != validator_set.len() ||
|
|
signed_commitment.commitment.validator_set_id != validator_set.id() ||
|
|
signed_commitment.commitment.block_number != target_number
|
|
{
|
|
return Err(ConsensusError::InvalidJustification)
|
|
}
|
|
|
|
// Arrangement of signatures in the commitment should be in the same order
|
|
// as validators for that set.
|
|
let message = signed_commitment.commitment.encode();
|
|
let valid_signatures = validator_set
|
|
.validators()
|
|
.into_iter()
|
|
.zip(signed_commitment.signatures.iter())
|
|
.filter(|(id, signature)| {
|
|
signature
|
|
.as_ref()
|
|
.map(|sig| BeefyKeystore::verify(id, sig, &message[..]))
|
|
.unwrap_or(false)
|
|
})
|
|
.count();
|
|
if valid_signatures >= crate::round::threshold(validator_set.len()) {
|
|
Ok(())
|
|
} else {
|
|
Err(ConsensusError::InvalidJustification)
|
|
}
|
|
},
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
pub(crate) mod tests {
|
|
use beefy_primitives::{
|
|
known_payloads, Commitment, Payload, SignedCommitment, VersionedFinalityProof,
|
|
};
|
|
use substrate_test_runtime_client::runtime::Block;
|
|
|
|
use super::*;
|
|
use crate::{keystore::tests::Keyring, tests::make_beefy_ids};
|
|
|
|
pub(crate) fn new_finality_proof(
|
|
block_num: NumberFor<Block>,
|
|
validator_set: &ValidatorSet<AuthorityId>,
|
|
keys: &[Keyring],
|
|
) -> BeefyVersionedFinalityProof<Block> {
|
|
let commitment = Commitment {
|
|
payload: Payload::from_single_entry(known_payloads::MMR_ROOT_ID, vec![]),
|
|
block_number: block_num,
|
|
validator_set_id: validator_set.id(),
|
|
};
|
|
let message = commitment.encode();
|
|
let signatures = keys.iter().map(|key| Some(key.sign(&message))).collect();
|
|
VersionedFinalityProof::V1(SignedCommitment { commitment, signatures })
|
|
}
|
|
|
|
#[test]
|
|
fn should_verify_with_validator_set() {
|
|
let keys = &[Keyring::Alice, Keyring::Bob, Keyring::Charlie];
|
|
let validator_set = ValidatorSet::new(make_beefy_ids(keys), 0).unwrap();
|
|
|
|
// build valid justification
|
|
let block_num = 42;
|
|
let proof = new_finality_proof(block_num, &validator_set, keys);
|
|
|
|
let good_proof = proof.clone().into();
|
|
// should verify successfully
|
|
verify_with_validator_set::<Block>(block_num, &validator_set, &good_proof).unwrap();
|
|
|
|
// wrong block number -> should fail verification
|
|
let good_proof = proof.clone().into();
|
|
match verify_with_validator_set::<Block>(block_num + 1, &validator_set, &good_proof) {
|
|
Err(ConsensusError::InvalidJustification) => (),
|
|
_ => assert!(false, "Expected Err(ConsensusError::InvalidJustification)"),
|
|
};
|
|
|
|
// wrong validator set id -> should fail verification
|
|
let good_proof = proof.clone().into();
|
|
let other = ValidatorSet::new(make_beefy_ids(keys), 1).unwrap();
|
|
match verify_with_validator_set::<Block>(block_num, &other, &good_proof) {
|
|
Err(ConsensusError::InvalidJustification) => (),
|
|
_ => assert!(false, "Expected Err(ConsensusError::InvalidJustification)"),
|
|
};
|
|
|
|
// wrong signatures length -> should fail verification
|
|
let mut bad_proof = proof.clone();
|
|
// change length of signatures
|
|
let bad_signed_commitment = match bad_proof {
|
|
VersionedFinalityProof::V1(ref mut sc) => sc,
|
|
};
|
|
bad_signed_commitment.signatures.pop().flatten().unwrap();
|
|
match verify_with_validator_set::<Block>(block_num + 1, &validator_set, &bad_proof.into()) {
|
|
Err(ConsensusError::InvalidJustification) => (),
|
|
_ => assert!(false, "Expected Err(ConsensusError::InvalidJustification)"),
|
|
};
|
|
|
|
// not enough signatures -> should fail verification
|
|
let mut bad_proof = proof.clone();
|
|
let bad_signed_commitment = match bad_proof {
|
|
VersionedFinalityProof::V1(ref mut sc) => sc,
|
|
};
|
|
// remove a signature (but same length)
|
|
*bad_signed_commitment.signatures.first_mut().unwrap() = None;
|
|
match verify_with_validator_set::<Block>(block_num + 1, &validator_set, &bad_proof.into()) {
|
|
Err(ConsensusError::InvalidJustification) => (),
|
|
_ => assert!(false, "Expected Err(ConsensusError::InvalidJustification)"),
|
|
};
|
|
|
|
// not enough _correct_ signatures -> should fail verification
|
|
let mut bad_proof = proof.clone();
|
|
let bad_signed_commitment = match bad_proof {
|
|
VersionedFinalityProof::V1(ref mut sc) => sc,
|
|
};
|
|
// change a signature to a different key
|
|
*bad_signed_commitment.signatures.first_mut().unwrap() =
|
|
Some(Keyring::Dave.sign(&bad_signed_commitment.commitment.encode()));
|
|
match verify_with_validator_set::<Block>(block_num + 1, &validator_set, &bad_proof.into()) {
|
|
Err(ConsensusError::InvalidJustification) => (),
|
|
_ => assert!(false, "Expected Err(ConsensusError::InvalidJustification)"),
|
|
};
|
|
}
|
|
|
|
#[test]
|
|
fn should_decode_and_verify_finality_proof() {
|
|
let keys = &[Keyring::Alice, Keyring::Bob];
|
|
let validator_set = ValidatorSet::new(make_beefy_ids(keys), 0).unwrap();
|
|
let block_num = 1;
|
|
|
|
// build valid justification
|
|
let proof = new_finality_proof(block_num, &validator_set, keys);
|
|
let versioned_proof: BeefyVersionedFinalityProof<Block> = proof.into();
|
|
let encoded = versioned_proof.encode();
|
|
|
|
// should successfully decode and verify
|
|
let verified =
|
|
decode_and_verify_finality_proof::<Block>(&encoded, block_num, &validator_set).unwrap();
|
|
assert_eq!(verified, versioned_proof);
|
|
}
|
|
}
|