2023-04-16 03:16:53 -04:00
|
|
|
use core::{time::Duration, ops::Deref};
|
2023-04-16 00:51:56 -04:00
|
|
|
use std::collections::HashMap;
|
2023-04-15 17:38:47 -04:00
|
|
|
|
2023-04-16 00:51:56 -04:00
|
|
|
use zeroize::Zeroizing;
|
|
|
|
|
|
|
|
|
|
use transcript::{Transcript, RecommendedTranscript};
|
2023-04-16 03:16:53 -04:00
|
|
|
use ciphersuite::{group::GroupEncoding, Ciphersuite, Ristretto};
|
|
|
|
|
use frost::{Participant, ThresholdParams};
|
2023-04-16 00:51:56 -04:00
|
|
|
|
2023-04-16 03:16:53 -04:00
|
|
|
use tokio::time::sleep;
|
|
|
|
|
|
|
|
|
|
use serai_client::{
|
|
|
|
|
SeraiError, Block, Serai,
|
|
|
|
|
primitives::BlockHash,
|
|
|
|
|
validator_sets::{
|
|
|
|
|
primitives::{Session, ValidatorSet, ValidatorSetData},
|
|
|
|
|
ValidatorSetsEvent,
|
|
|
|
|
},
|
|
|
|
|
in_instructions::InInstructionsEvent,
|
|
|
|
|
tokens::{primitives::OutInstructionWithBalance, TokensEvent},
|
|
|
|
|
};
|
2023-04-16 00:51:56 -04:00
|
|
|
|
|
|
|
|
use tributary::Tributary;
|
|
|
|
|
|
2023-04-16 03:16:53 -04:00
|
|
|
use processor_messages::{SubstrateContext, key_gen::KeyGenId};
|
|
|
|
|
|
2023-04-16 00:51:56 -04:00
|
|
|
use crate::{Db, MainDb, TributaryTransaction, P2p};
|
|
|
|
|
|
2023-04-16 03:16:53 -04:00
|
|
|
async fn get_set(serai: &Serai, set: ValidatorSet) -> ValidatorSetData {
|
|
|
|
|
loop {
|
|
|
|
|
match serai.get_validator_set(set).await {
|
|
|
|
|
Ok(data) => return data.unwrap(),
|
|
|
|
|
Err(e) => {
|
|
|
|
|
log::error!("couldn't get validator set data: {e}");
|
|
|
|
|
sleep(Duration::from_secs(5)).await;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
async fn get_coin_keys(serai: &Serai, set: ValidatorSet) -> Vec<u8> {
|
|
|
|
|
loop {
|
|
|
|
|
match serai.get_keys(set).await {
|
|
|
|
|
Ok(data) => return data.unwrap().1.into_inner(),
|
|
|
|
|
Err(e) => {
|
|
|
|
|
log::error!("couldn't get validator set's keys: {e}");
|
|
|
|
|
sleep(Duration::from_secs(5)).await;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
async fn in_set(
|
|
|
|
|
key: &Zeroizing<<Ristretto as Ciphersuite>::F>,
|
|
|
|
|
serai: &Serai,
|
|
|
|
|
set: ValidatorSet,
|
|
|
|
|
) -> bool {
|
|
|
|
|
let data = get_set(serai, set).await;
|
|
|
|
|
let key = Ristretto::generator() * key.deref();
|
|
|
|
|
data.participants.iter().any(|(participant, _)| participant.0 == key.to_bytes())
|
|
|
|
|
}
|
|
|
|
|
|
2023-04-16 00:51:56 -04:00
|
|
|
async fn handle_block<D: Db, P: P2p>(
|
|
|
|
|
db: &mut MainDb<D>,
|
2023-04-16 03:16:53 -04:00
|
|
|
key: &Zeroizing<<Ristretto as Ciphersuite>::F>,
|
2023-04-16 00:51:56 -04:00
|
|
|
p2p: &P,
|
|
|
|
|
serai: &Serai,
|
|
|
|
|
block: Block,
|
|
|
|
|
) -> Result<(), SeraiError> {
|
2023-04-15 17:38:47 -04:00
|
|
|
let hash = block.hash();
|
2023-04-16 00:51:56 -04:00
|
|
|
|
|
|
|
|
let mut event_id = 0;
|
2023-04-15 17:38:47 -04:00
|
|
|
|
|
|
|
|
// If a new validator set was activated, create tributary/inform processor to do a DKG
|
|
|
|
|
for new_set in serai.get_new_set_events(hash).await? {
|
2023-04-16 00:51:56 -04:00
|
|
|
if !db.handled_event(hash, event_id) {
|
|
|
|
|
if let ValidatorSetsEvent::NewSet { set } = new_set {
|
|
|
|
|
let set_data = serai.get_validator_set(set).await?.unwrap();
|
|
|
|
|
|
2023-04-16 03:16:53 -04:00
|
|
|
let mut i = None;
|
2023-04-16 00:51:56 -04:00
|
|
|
let mut validators = HashMap::new();
|
2023-04-16 03:16:53 -04:00
|
|
|
for (l, (participant, amount)) in set_data.participants.iter().enumerate() {
|
|
|
|
|
// TODO2: Ensure an invalid public key can't be a validator
|
|
|
|
|
let participant =
|
|
|
|
|
<Ristretto as Ciphersuite>::read_G::<&[u8]>(&mut participant.0.as_ref()).unwrap();
|
|
|
|
|
if participant == (Ristretto::generator() * key.deref()) {
|
|
|
|
|
i = Some(Participant::new((l + 1).try_into().unwrap()).unwrap());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Give one weight on Tributary per bond instance
|
|
|
|
|
validators.insert(participant, amount.0 / set_data.bond.0);
|
2023-04-16 00:51:56 -04:00
|
|
|
}
|
|
|
|
|
|
2023-04-16 03:16:53 -04:00
|
|
|
if let Some(i) = i {
|
|
|
|
|
let n = u16::try_from(set_data.participants.len()).unwrap();
|
|
|
|
|
let t = (2 * (n / 3)) + 1;
|
|
|
|
|
|
|
|
|
|
let mut genesis = RecommendedTranscript::new(b"Serai Tributary Genesis");
|
|
|
|
|
genesis.append_message(b"serai_block", hash);
|
|
|
|
|
genesis.append_message(b"session", set.session.0.to_le_bytes());
|
|
|
|
|
genesis.append_message(b"network", set.network.0.to_le_bytes());
|
|
|
|
|
let genesis = genesis.challenge(b"genesis");
|
|
|
|
|
let genesis_ref: &[u8] = genesis.as_ref();
|
|
|
|
|
let genesis = genesis_ref[.. 32].try_into().unwrap();
|
|
|
|
|
|
|
|
|
|
// TODO: Do something with this
|
|
|
|
|
let tributary = Tributary::<_, TributaryTransaction, _>::new(
|
|
|
|
|
// TODO2: Use a DB on a dedicated volume
|
|
|
|
|
db.0.clone(),
|
|
|
|
|
genesis,
|
|
|
|
|
block.time().unwrap(),
|
|
|
|
|
key.clone(),
|
|
|
|
|
validators,
|
|
|
|
|
p2p.clone(),
|
|
|
|
|
)
|
|
|
|
|
.await
|
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
|
|
// Trigger a DKG
|
|
|
|
|
// TODO: Send this to processor. Check how it handles it being fired multiple times
|
|
|
|
|
let msg = processor_messages::key_gen::CoordinatorMessage::GenerateKey {
|
|
|
|
|
id: KeyGenId { set, attempt: 0 },
|
|
|
|
|
params: ThresholdParams::new(t, n, i).unwrap(),
|
|
|
|
|
};
|
|
|
|
|
}
|
2023-04-16 00:51:56 -04:00
|
|
|
} else {
|
|
|
|
|
panic!("NewSet event wasn't NewSet: {new_set:?}");
|
|
|
|
|
}
|
|
|
|
|
db.handle_event(hash, event_id);
|
|
|
|
|
}
|
|
|
|
|
event_id += 1;
|
2023-04-15 17:38:47 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// If a key pair was confirmed, inform the processor
|
|
|
|
|
for key_gen in serai.get_key_gen_events(hash).await? {
|
2023-04-16 00:51:56 -04:00
|
|
|
if !db.handled_event(hash, event_id) {
|
2023-04-16 03:16:53 -04:00
|
|
|
if let ValidatorSetsEvent::KeyGen { set, key_pair } = key_gen {
|
|
|
|
|
if in_set(key, serai, set).await {
|
|
|
|
|
// TODO: Send this to processor. Check how it handles it being fired multiple times
|
|
|
|
|
let msg = processor_messages::key_gen::CoordinatorMessage::ConfirmKeyPair {
|
|
|
|
|
context: SubstrateContext {
|
|
|
|
|
coin_latest_finalized_block: serai
|
|
|
|
|
.get_latest_block_for_network(hash, set.network)
|
|
|
|
|
.await?
|
|
|
|
|
.unwrap_or(BlockHash([0; 32])), // TODO: Have the processor override this
|
|
|
|
|
},
|
|
|
|
|
id: KeyGenId { set, attempt: todo!() },
|
|
|
|
|
};
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
panic!("KeyGen event wasn't KeyGen: {key_gen:?}");
|
|
|
|
|
}
|
2023-04-16 00:51:56 -04:00
|
|
|
db.handle_event(hash, event_id);
|
|
|
|
|
}
|
|
|
|
|
event_id += 1;
|
2023-04-15 17:38:47 -04:00
|
|
|
}
|
|
|
|
|
|
2023-04-16 03:16:53 -04:00
|
|
|
if !db.handled_event(hash, event_id) {
|
|
|
|
|
// Finally, tell the processor of acknowledged blocks/burns
|
|
|
|
|
let mut coins_with_event = vec![];
|
|
|
|
|
let mut batch_block = HashMap::new();
|
|
|
|
|
let mut burns = HashMap::new();
|
|
|
|
|
|
|
|
|
|
for batch in serai.get_batch_events(hash).await? {
|
|
|
|
|
if let InInstructionsEvent::Batch { network, id: _, block: coin_block } = batch {
|
|
|
|
|
// Don't insert this multiple times, yet use a Vec to maintain the insertion order
|
|
|
|
|
if !coins_with_event.contains(&network) {
|
|
|
|
|
coins_with_event.push(network);
|
|
|
|
|
burns.insert(network, vec![]);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Use the last specified block
|
|
|
|
|
batch_block.insert(network, coin_block);
|
|
|
|
|
|
|
|
|
|
// TODO: Send this to processor. Check how it handles it being fired multiple times
|
|
|
|
|
let msg = processor_messages::coordinator::CoordinatorMessage::BatchSigned {
|
|
|
|
|
key: get_coin_keys(serai, ValidatorSet { network, session: Session(0) }).await, // TODO2
|
|
|
|
|
block: coin_block,
|
|
|
|
|
};
|
|
|
|
|
} else {
|
|
|
|
|
panic!("Batch event wasn't Batch: {batch:?}");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for burn in serai.get_burn_events(hash).await? {
|
|
|
|
|
if let TokensEvent::Burn { address: _, balance, instruction } = burn {
|
|
|
|
|
let network = {
|
|
|
|
|
use serai_client::primitives::*;
|
|
|
|
|
match balance.coin {
|
|
|
|
|
BITCOIN => BITCOIN_NET_ID,
|
|
|
|
|
ETHER => ETHEREUM_NET_ID,
|
|
|
|
|
DAI => ETHEREUM_NET_ID,
|
|
|
|
|
MONERO => MONERO_NET_ID,
|
|
|
|
|
invalid => panic!("burn from unrecognized coin: {invalid:?}"),
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
if !coins_with_event.contains(&network) {
|
|
|
|
|
coins_with_event.push(network);
|
|
|
|
|
burns.insert(network, vec![]);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
let mut burns_so_far = burns.remove(&network).unwrap_or(vec![]);
|
|
|
|
|
burns_so_far.push(OutInstructionWithBalance { balance, instruction });
|
|
|
|
|
burns.insert(network, burns_so_far);
|
|
|
|
|
} else {
|
|
|
|
|
panic!("Burn event wasn't Burn: {burn:?}");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for network in coins_with_event {
|
|
|
|
|
let coin_latest_finalized_block = if let Some(block) = batch_block.remove(&network) {
|
|
|
|
|
block
|
|
|
|
|
} else {
|
|
|
|
|
// If it's had a batch or a burn, it must have had a block acknowledged
|
|
|
|
|
serai.get_latest_block_for_network(hash, network).await?.unwrap()
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
// TODO: Send this to processor. Check how it handles it being fired multiple times
|
|
|
|
|
let msg = processor_messages::substrate::CoordinatorMessage::SubstrateBlock {
|
|
|
|
|
context: SubstrateContext { coin_latest_finalized_block },
|
|
|
|
|
key: get_coin_keys(serai, ValidatorSet { network, session: Session(0) }).await, // TODO2
|
|
|
|
|
// Use remove not only to avoid a clone, yet so if network is present twice somehow, this
|
|
|
|
|
// isn't fired multiple times
|
|
|
|
|
burns: burns.remove(&network).unwrap(),
|
|
|
|
|
};
|
2023-04-16 00:51:56 -04:00
|
|
|
}
|
2023-04-15 17:38:47 -04:00
|
|
|
}
|
2023-04-16 03:16:53 -04:00
|
|
|
db.handle_event(hash, event_id);
|
2023-04-15 17:38:47 -04:00
|
|
|
|
2023-04-16 00:51:56 -04:00
|
|
|
Ok(())
|
2023-04-15 17:38:47 -04:00
|
|
|
}
|
|
|
|
|
|
2023-04-16 00:51:56 -04:00
|
|
|
pub async fn handle_new_blocks<D: Db, P: P2p>(
|
|
|
|
|
db: &mut MainDb<D>,
|
2023-04-16 03:16:53 -04:00
|
|
|
key: &Zeroizing<<Ristretto as Ciphersuite>::F>,
|
2023-04-16 00:51:56 -04:00
|
|
|
p2p: &P,
|
2023-04-15 17:38:47 -04:00
|
|
|
serai: &Serai,
|
|
|
|
|
last_substrate_block: &mut u64,
|
|
|
|
|
) -> Result<(), SeraiError> {
|
|
|
|
|
// Check if there's been a new Substrate block
|
|
|
|
|
let latest = serai.get_latest_block().await?;
|
|
|
|
|
let latest_number = latest.number();
|
|
|
|
|
if latest_number == *last_substrate_block {
|
|
|
|
|
return Ok(());
|
|
|
|
|
}
|
|
|
|
|
let mut latest = Some(latest);
|
|
|
|
|
|
|
|
|
|
for b in (*last_substrate_block + 1) ..= latest_number {
|
2023-04-16 00:51:56 -04:00
|
|
|
handle_block(
|
|
|
|
|
db,
|
2023-04-16 03:16:53 -04:00
|
|
|
key,
|
2023-04-16 00:51:56 -04:00
|
|
|
p2p,
|
2023-04-15 17:38:47 -04:00
|
|
|
serai,
|
|
|
|
|
if b == latest_number {
|
|
|
|
|
latest.take().unwrap()
|
|
|
|
|
} else {
|
|
|
|
|
serai.get_block_by_number(b).await?.unwrap()
|
|
|
|
|
},
|
|
|
|
|
)
|
|
|
|
|
.await?;
|
|
|
|
|
*last_substrate_block += 1;
|
2023-04-16 03:16:53 -04:00
|
|
|
db.set_last_substrate_block(*last_substrate_block);
|
2023-04-15 17:38:47 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
|
}
|