use std::{
collections::hash_map::DefaultHasher,
fmt::{Debug, Formatter},
hash::{Hash, Hasher},
sync::Arc,
time::{SystemTime, UNIX_EPOCH},
};
use byteorder::{BigEndian, ReadBytesExt};
use fastcrypto::{error::FastCryptoResult, groups::bls12381};
use fastcrypto_tbls::{dkg, dkg_v1};
use fastcrypto_zkp::bn254::zk_login::{JWK, JwkId};
use schemars::JsonSchema;
use serde::{Deserialize, Serialize};
use crate::{
base_types::{
AuthorityName, ConciseableName, ObjectID, ObjectRef, SequenceNumber, TransactionDigest,
},
digests::ConsensusCommitDigest,
messages_checkpoint::{
CheckpointSequenceNumber, CheckpointSignatureMessage, CheckpointTimestamp,
},
supported_protocol_versions::{
Chain, SupportedProtocolVersions, SupportedProtocolVersionsWithHashes,
},
transaction::CertifiedTransaction,
};
#[derive(Debug, PartialEq, Eq, Hash, Clone, Serialize, Deserialize, JsonSchema)]
pub enum ConsensusDeterminedVersionAssignments {
CancelledTransactions(Vec<(TransactionDigest, Vec<(ObjectID, SequenceNumber)>)>),
}
#[derive(Debug, PartialEq, Eq, Hash, Clone, Serialize, Deserialize)]
pub struct ConsensusCommitPrologueV1 {
pub epoch: u64,
pub round: u64,
pub sub_dag_index: Option<u64>,
pub commit_timestamp_ms: CheckpointTimestamp,
pub consensus_commit_digest: ConsensusCommitDigest,
pub consensus_determined_version_assignments: ConsensusDeterminedVersionAssignments,
}
static MAX_TOTAL_JWK_SIZE: usize = 4096;
pub fn check_total_jwk_size(id: &JwkId, jwk: &JWK) -> bool {
id.iss.len() + id.kid.len() + jwk.kty.len() + jwk.alg.len() + jwk.e.len() + jwk.n.len()
<= MAX_TOTAL_JWK_SIZE
}
#[derive(Serialize, Deserialize, Clone, Debug)]
pub struct ConsensusTransaction {
pub tracking_id: [u8; 8],
pub kind: ConsensusTransactionKind,
}
#[derive(Serialize, Deserialize, Clone, Hash, PartialEq, Eq, Ord, PartialOrd)]
pub enum ConsensusTransactionKey {
Certificate(TransactionDigest),
CheckpointSignature(AuthorityName, CheckpointSequenceNumber),
EndOfPublish(AuthorityName),
CapabilityNotification(AuthorityName, u64 ),
NewJWKFetched(Box<(AuthorityName, JwkId, JWK)>),
RandomnessDkgMessage(AuthorityName),
RandomnessDkgConfirmation(AuthorityName),
}
impl Debug for ConsensusTransactionKey {
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
match self {
Self::Certificate(digest) => write!(f, "Certificate({:?})", digest),
Self::CheckpointSignature(name, seq) => {
write!(f, "CheckpointSignature({:?}, {:?})", name.concise(), seq)
}
Self::EndOfPublish(name) => write!(f, "EndOfPublish({:?})", name.concise()),
Self::CapabilityNotification(name, generation) => write!(
f,
"CapabilityNotification({:?}, {:?})",
name.concise(),
generation
),
Self::NewJWKFetched(key) => {
let (authority, id, jwk) = &**key;
write!(
f,
"NewJWKFetched({:?}, {:?}, {:?})",
authority.concise(),
id,
jwk
)
}
Self::RandomnessDkgMessage(name) => {
write!(f, "RandomnessDkgMessage({:?})", name.concise())
}
Self::RandomnessDkgConfirmation(name) => {
write!(f, "RandomnessDkgConfirmation({:?})", name.concise())
}
}
}
}
#[derive(Serialize, Deserialize, Clone, Hash)]
pub struct AuthorityCapabilitiesV1 {
pub authority: AuthorityName,
pub generation: u64,
pub supported_protocol_versions: SupportedProtocolVersionsWithHashes,
pub available_system_packages: Vec<ObjectRef>,
}
impl Debug for AuthorityCapabilitiesV1 {
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
f.debug_struct("AuthorityCapabilities")
.field("authority", &self.authority.concise())
.field("generation", &self.generation)
.field(
"supported_protocol_versions",
&self.supported_protocol_versions,
)
.field("available_system_packages", &self.available_system_packages)
.finish()
}
}
impl AuthorityCapabilitiesV1 {
pub fn new(
authority: AuthorityName,
chain: Chain,
supported_protocol_versions: SupportedProtocolVersions,
available_system_packages: Vec<ObjectRef>,
) -> Self {
let generation = SystemTime::now()
.duration_since(UNIX_EPOCH)
.expect("Iota did not exist prior to 1970")
.as_millis()
.try_into()
.expect("This build of iota is not supported in the year 500,000,000");
Self {
authority,
generation,
supported_protocol_versions:
SupportedProtocolVersionsWithHashes::from_supported_versions(
supported_protocol_versions,
chain,
),
available_system_packages,
}
}
}
#[derive(Serialize, Deserialize, Clone, Debug)]
pub enum ConsensusTransactionKind {
UserTransaction(Box<CertifiedTransaction>),
CheckpointSignature(Box<CheckpointSignatureMessage>),
EndOfPublish(AuthorityName),
CapabilityNotificationV1(AuthorityCapabilitiesV1),
NewJWKFetched(AuthorityName, JwkId, JWK),
RandomnessDkgMessage(AuthorityName, Vec<u8>),
RandomnessDkgConfirmation(AuthorityName, Vec<u8>),
}
impl ConsensusTransactionKind {
pub fn is_dkg(&self) -> bool {
matches!(
self,
ConsensusTransactionKind::RandomnessDkgMessage(_, _)
| ConsensusTransactionKind::RandomnessDkgConfirmation(_, _)
)
}
}
#[derive(Clone, PartialEq, Eq, Serialize, Deserialize)]
pub enum VersionedDkgMessage {
V1(dkg_v1::Message<bls12381::G2Element, bls12381::G2Element>),
}
#[derive(Clone, Debug, PartialEq, Eq, Serialize, Deserialize)]
pub enum VersionedDkgConfirmation {
V1(dkg::Confirmation<bls12381::G2Element>),
}
impl Debug for VersionedDkgMessage {
fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
match self {
VersionedDkgMessage::V1(msg) => write!(
f,
"DKG V1 Message with sender={}, vss_pk.degree={}, encrypted_shares.len()={}",
msg.sender,
msg.vss_pk.degree(),
msg.encrypted_shares.len(),
),
}
}
}
impl VersionedDkgMessage {
pub fn sender(&self) -> u16 {
match self {
VersionedDkgMessage::V1(msg) => msg.sender,
}
}
pub fn create(
dkg_version: u64,
party: Arc<dkg::Party<bls12381::G2Element, bls12381::G2Element>>,
) -> FastCryptoResult<VersionedDkgMessage> {
assert_eq!(dkg_version, 1, "BUG: invalid DKG version");
let msg = party.create_message_v1(&mut rand::thread_rng())?;
Ok(VersionedDkgMessage::V1(msg))
}
pub fn unwrap_v1(self) -> dkg_v1::Message<bls12381::G2Element, bls12381::G2Element> {
match self {
VersionedDkgMessage::V1(msg) => msg,
}
}
pub fn is_valid_version(&self, dkg_version: u64) -> bool {
matches!((self, dkg_version), (VersionedDkgMessage::V1(_), 1))
}
}
impl VersionedDkgConfirmation {
pub fn sender(&self) -> u16 {
match self {
VersionedDkgConfirmation::V1(msg) => msg.sender,
}
}
pub fn num_of_complaints(&self) -> usize {
match self {
VersionedDkgConfirmation::V1(msg) => msg.complaints.len(),
}
}
pub fn unwrap_v1(&self) -> &dkg::Confirmation<bls12381::G2Element> {
match self {
VersionedDkgConfirmation::V1(msg) => msg,
}
}
pub fn is_valid_version(&self, dkg_version: u64) -> bool {
matches!((self, dkg_version), (VersionedDkgConfirmation::V1(_), 1))
}
}
impl ConsensusTransaction {
pub fn new_certificate_message(
authority: &AuthorityName,
certificate: CertifiedTransaction,
) -> Self {
let mut hasher = DefaultHasher::new();
let tx_digest = certificate.digest();
tx_digest.hash(&mut hasher);
authority.hash(&mut hasher);
let tracking_id = hasher.finish().to_le_bytes();
Self {
tracking_id,
kind: ConsensusTransactionKind::UserTransaction(Box::new(certificate)),
}
}
pub fn new_checkpoint_signature_message(data: CheckpointSignatureMessage) -> Self {
let mut hasher = DefaultHasher::new();
data.summary.auth_sig().signature.hash(&mut hasher);
let tracking_id = hasher.finish().to_le_bytes();
Self {
tracking_id,
kind: ConsensusTransactionKind::CheckpointSignature(Box::new(data)),
}
}
pub fn new_end_of_publish(authority: AuthorityName) -> Self {
let mut hasher = DefaultHasher::new();
authority.hash(&mut hasher);
let tracking_id = hasher.finish().to_le_bytes();
Self {
tracking_id,
kind: ConsensusTransactionKind::EndOfPublish(authority),
}
}
pub fn new_capability_notification_v1(capabilities: AuthorityCapabilitiesV1) -> Self {
let mut hasher = DefaultHasher::new();
capabilities.hash(&mut hasher);
let tracking_id = hasher.finish().to_le_bytes();
Self {
tracking_id,
kind: ConsensusTransactionKind::CapabilityNotificationV1(capabilities),
}
}
pub fn new_mysticeti_certificate(
round: u64,
offset: u64,
certificate: CertifiedTransaction,
) -> Self {
let mut hasher = DefaultHasher::new();
let tx_digest = certificate.digest();
tx_digest.hash(&mut hasher);
round.hash(&mut hasher);
offset.hash(&mut hasher);
let tracking_id = hasher.finish().to_le_bytes();
Self {
tracking_id,
kind: ConsensusTransactionKind::UserTransaction(Box::new(certificate)),
}
}
pub fn new_jwk_fetched(authority: AuthorityName, id: JwkId, jwk: JWK) -> Self {
let mut hasher = DefaultHasher::new();
id.hash(&mut hasher);
let tracking_id = hasher.finish().to_le_bytes();
Self {
tracking_id,
kind: ConsensusTransactionKind::NewJWKFetched(authority, id, jwk),
}
}
pub fn new_randomness_dkg_message(
authority: AuthorityName,
versioned_message: &VersionedDkgMessage,
) -> Self {
let message =
bcs::to_bytes(versioned_message).expect("message serialization should not fail");
let mut hasher = DefaultHasher::new();
message.hash(&mut hasher);
let tracking_id = hasher.finish().to_le_bytes();
Self {
tracking_id,
kind: ConsensusTransactionKind::RandomnessDkgMessage(authority, message),
}
}
pub fn new_randomness_dkg_confirmation(
authority: AuthorityName,
versioned_confirmation: &VersionedDkgConfirmation,
) -> Self {
let confirmation =
bcs::to_bytes(versioned_confirmation).expect("message serialization should not fail");
let mut hasher = DefaultHasher::new();
confirmation.hash(&mut hasher);
let tracking_id = hasher.finish().to_le_bytes();
Self {
tracking_id,
kind: ConsensusTransactionKind::RandomnessDkgConfirmation(authority, confirmation),
}
}
pub fn get_tracking_id(&self) -> u64 {
(&self.tracking_id[..])
.read_u64::<BigEndian>()
.unwrap_or_default()
}
pub fn key(&self) -> ConsensusTransactionKey {
match &self.kind {
ConsensusTransactionKind::UserTransaction(cert) => {
ConsensusTransactionKey::Certificate(*cert.digest())
}
ConsensusTransactionKind::CheckpointSignature(data) => {
ConsensusTransactionKey::CheckpointSignature(
data.summary.auth_sig().authority,
data.summary.sequence_number,
)
}
ConsensusTransactionKind::EndOfPublish(authority) => {
ConsensusTransactionKey::EndOfPublish(*authority)
}
ConsensusTransactionKind::CapabilityNotificationV1(cap) => {
ConsensusTransactionKey::CapabilityNotification(cap.authority, cap.generation)
}
ConsensusTransactionKind::NewJWKFetched(authority, id, key) => {
ConsensusTransactionKey::NewJWKFetched(Box::new((
*authority,
id.clone(),
key.clone(),
)))
}
ConsensusTransactionKind::RandomnessDkgMessage(authority, _) => {
ConsensusTransactionKey::RandomnessDkgMessage(*authority)
}
ConsensusTransactionKind::RandomnessDkgConfirmation(authority, _) => {
ConsensusTransactionKey::RandomnessDkgConfirmation(*authority)
}
}
}
pub fn is_user_certificate(&self) -> bool {
matches!(self.kind, ConsensusTransactionKind::UserTransaction(_))
}
pub fn is_end_of_publish(&self) -> bool {
matches!(self.kind, ConsensusTransactionKind::EndOfPublish(_))
}
}
#[test]
fn test_jwk_compatibility() {
let jwk = JWK {
kty: "a".to_string(),
e: "b".to_string(),
n: "c".to_string(),
alg: "d".to_string(),
};
let expected_jwk_bytes = vec![1, 97, 1, 98, 1, 99, 1, 100];
let jwk_bcs = bcs::to_bytes(&jwk).unwrap();
assert_eq!(jwk_bcs, expected_jwk_bytes);
let id = JwkId {
iss: "abc".to_string(),
kid: "def".to_string(),
};
let expected_id_bytes = vec![3, 97, 98, 99, 3, 100, 101, 102];
let id_bcs = bcs::to_bytes(&id).unwrap();
assert_eq!(id_bcs, expected_id_bytes);
}