-
Notifications
You must be signed in to change notification settings - Fork 671
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Signed-off-by: Joshua Kim <20001595+joshua-kim@users.noreply.github.com>
- Loading branch information
1 parent
e7648e5
commit 17f3d66
Showing
5 changed files
with
583 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,231 @@ | ||
// Copyright (C) 2019-2024, Ava Labs, Inc. All rights reserved. | ||
// See the file LICENSE for licensing terms. | ||
|
||
package acp118 | ||
|
||
import ( | ||
"context" | ||
"errors" | ||
"fmt" | ||
"sync" | ||
|
||
"go.uber.org/zap" | ||
"golang.org/x/sync/semaphore" | ||
"google.golang.org/protobuf/proto" | ||
|
||
"github.com/ava-labs/avalanchego/codec" | ||
"github.com/ava-labs/avalanchego/ids" | ||
"github.com/ava-labs/avalanchego/network/p2p" | ||
"github.com/ava-labs/avalanchego/proto/pb/sdk" | ||
"github.com/ava-labs/avalanchego/utils/crypto/bls" | ||
"github.com/ava-labs/avalanchego/utils/logging" | ||
"github.com/ava-labs/avalanchego/utils/set" | ||
"github.com/ava-labs/avalanchego/vms/platformvm/warp" | ||
) | ||
|
||
var ( | ||
ErrDuplicateValidator = errors.New("duplicate validator") | ||
ErrInsufficientSignatures = errors.New("failed to aggregate sufficient stake weight of signatures") | ||
) | ||
|
||
type result struct { | ||
message *warp.Message | ||
err error | ||
} | ||
|
||
type Validator struct { | ||
NodeID ids.NodeID | ||
PublicKey *bls.PublicKey | ||
Weight uint64 | ||
} | ||
|
||
type indexedValidator struct { | ||
Validator | ||
I int | ||
} | ||
|
||
// NewSignatureAggregator returns an instance of SignatureAggregator | ||
func NewSignatureAggregator( | ||
log logging.Logger, | ||
client *p2p.Client, | ||
maxPending int, | ||
) *SignatureAggregator { | ||
return &SignatureAggregator{ | ||
log: log, | ||
client: client, | ||
maxPending: int64(maxPending), | ||
} | ||
} | ||
|
||
// SignatureAggregator aggregates validator signatures for warp messages | ||
type SignatureAggregator struct { | ||
log logging.Logger | ||
client *p2p.Client | ||
codec codec.Codec | ||
maxPending int64 | ||
} | ||
|
||
// AggregateSignatures blocks until stakeWeightThreshold of validators signs the | ||
// provided message. Validators are issued requests in the caller-specified | ||
// order. | ||
func (s *SignatureAggregator) AggregateSignatures( | ||
parentCtx context.Context, | ||
message *warp.UnsignedMessage, | ||
justification []byte, | ||
validators []Validator, | ||
stakeWeightThreshold uint64, | ||
) (*warp.Message, error) { | ||
ctx, cancel := context.WithCancel(parentCtx) | ||
defer cancel() | ||
|
||
request := &sdk.SignatureRequest{ | ||
Message: message.Bytes(), | ||
Justification: justification, | ||
} | ||
|
||
requestBytes, err := proto.Marshal(request) | ||
if err != nil { | ||
return nil, fmt.Errorf("failed to marshal signature request: %w", err) | ||
} | ||
|
||
done := make(chan result) | ||
pendingRequests := semaphore.NewWeighted(s.maxPending) | ||
lock := &sync.Mutex{} | ||
aggregatedStakeWeight := uint64(0) | ||
attemptedStakeWeight := uint64(0) | ||
totalStakeWeight := uint64(0) | ||
signatures := make([]*bls.Signature, 0) | ||
signerBitSet := set.NewBits() | ||
|
||
nodeIDsToValidator := make(map[ids.NodeID]indexedValidator) | ||
for i, v := range validators { | ||
totalStakeWeight += v.Weight | ||
|
||
// Sanity check the validator set provided by the caller | ||
if _, ok := nodeIDsToValidator[v.NodeID]; ok { | ||
return nil, fmt.Errorf("%w: %s", ErrDuplicateValidator, v.NodeID) | ||
} | ||
|
||
nodeIDsToValidator[v.NodeID] = indexedValidator{ | ||
I: i, | ||
Validator: v, | ||
} | ||
} | ||
|
||
onResponse := func( | ||
ctx context.Context, | ||
Check failure on line 116 in network/acp118/aggregator.go GitHub Actions / Lint
|
||
nodeID ids.NodeID, | ||
responseBytes []byte, | ||
err error, | ||
) { | ||
// We are guaranteed a response from a node in the validator set | ||
validator := nodeIDsToValidator[nodeID] | ||
|
||
defer func() { | ||
lock.Lock() | ||
attemptedStakeWeight += validator.Weight | ||
remainingStakeWeight := totalStakeWeight - attemptedStakeWeight | ||
failed := remainingStakeWeight < stakeWeightThreshold | ||
lock.Unlock() | ||
|
||
if failed { | ||
done <- result{err: ErrInsufficientSignatures} | ||
} | ||
|
||
pendingRequests.Release(1) | ||
}() | ||
|
||
if err != nil { | ||
s.log.Debug( | ||
"dropping response", | ||
zap.Stringer("nodeID", nodeID), | ||
zap.Error(err), | ||
) | ||
return | ||
} | ||
|
||
response := &sdk.SignatureResponse{} | ||
if err := proto.Unmarshal(responseBytes, response); err != nil { | ||
s.log.Debug( | ||
"dropping response", | ||
zap.Stringer("nodeID", nodeID), | ||
zap.Error(err), | ||
) | ||
return | ||
} | ||
|
||
signature, err := bls.SignatureFromBytes(response.Signature) | ||
if err != nil { | ||
s.log.Debug( | ||
"dropping response", | ||
zap.Stringer("nodeID", nodeID), | ||
zap.String("reason", "invalid signature"), | ||
zap.Error(err), | ||
) | ||
return | ||
} | ||
|
||
if !bls.Verify(validator.PublicKey, signature, message.Bytes()) { | ||
s.log.Debug( | ||
"dropping response", | ||
zap.Stringer("nodeID", nodeID), | ||
zap.String("reason", "public key failed verification"), | ||
) | ||
return | ||
} | ||
|
||
lock.Lock() | ||
signerBitSet.Add(validator.I) | ||
signatures = append(signatures, signature) | ||
aggregatedStakeWeight += validator.Weight | ||
|
||
if aggregatedStakeWeight >= stakeWeightThreshold { | ||
aggregateSignature, err := bls.AggregateSignatures(signatures) | ||
if err != nil { | ||
done <- result{err: err} | ||
lock.Unlock() | ||
return | ||
} | ||
|
||
bitSetSignature := &warp.BitSetSignature{ | ||
Signers: signerBitSet.Bytes(), | ||
Signature: [bls.SignatureLen]byte{}, | ||
} | ||
|
||
copy(bitSetSignature.Signature[:], bls.SignatureToBytes(aggregateSignature)) | ||
signedMessage, err := warp.NewMessage(message, bitSetSignature) | ||
done <- result{message: signedMessage, err: err} | ||
lock.Unlock() | ||
return | ||
} | ||
|
||
lock.Unlock() | ||
} | ||
|
||
for _, validator := range validators { | ||
if err := pendingRequests.Acquire(ctx, 1); err != nil { | ||
return nil, err | ||
} | ||
|
||
// Avoid loop shadowing in goroutine | ||
validatorCopy := validator | ||
go func() { | ||
if err := s.client.AppRequest( | ||
ctx, | ||
set.Of(validatorCopy.NodeID), | ||
requestBytes, | ||
onResponse, | ||
); err != nil { | ||
done <- result{err: err} | ||
return | ||
} | ||
}() | ||
} | ||
|
||
select { | ||
case <-ctx.Done(): | ||
return nil, ctx.Err() | ||
case r := <-done: | ||
return r.message, r.err | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,123 @@ | ||
// Copyright (C) 2019-2024, Ava Labs, Inc. All rights reserved. | ||
// See the file LICENSE for licensing terms. | ||
|
||
package acp118 | ||
|
||
import ( | ||
"context" | ||
"errors" | ||
"testing" | ||
|
||
"github.com/stretchr/testify/require" | ||
|
||
"github.com/ava-labs/avalanchego/ids" | ||
"github.com/ava-labs/avalanchego/network/p2p" | ||
"github.com/ava-labs/avalanchego/network/p2p/p2ptest" | ||
"github.com/ava-labs/avalanchego/utils/crypto/bls" | ||
"github.com/ava-labs/avalanchego/utils/logging" | ||
"github.com/ava-labs/avalanchego/vms/platformvm/warp" | ||
) | ||
|
||
func TestVerifier_Verify(t *testing.T) { | ||
nodeID0 := ids.GenerateTestNodeID() | ||
sk0, err := bls.NewSecretKey() | ||
require.NoError(t, err) | ||
pk0 := bls.PublicFromSecretKey(sk0) | ||
networkID := uint32(123) | ||
chainID := ids.GenerateTestID() | ||
signer := warp.NewSigner(sk0, networkID, chainID) | ||
|
||
tests := []struct { | ||
name string | ||
|
||
ctx context.Context | ||
validators []Validator | ||
threshold uint64 | ||
|
||
handler p2p.Handler | ||
|
||
wantErr error | ||
}{ | ||
{ | ||
name: "passes verification", | ||
ctx: context.Background(), | ||
validators: []Validator{ | ||
{ | ||
NodeID: nodeID0, | ||
PublicKey: pk0, | ||
Weight: 1, | ||
}, | ||
}, | ||
threshold: 1, | ||
handler: NewHandler(&testAttestor{}, signer, networkID, chainID), | ||
}, | ||
{ | ||
name: "fails verification", | ||
ctx: context.Background(), | ||
validators: []Validator{ | ||
{ | ||
NodeID: nodeID0, | ||
PublicKey: pk0, | ||
Weight: 1, | ||
}, | ||
}, | ||
threshold: 1, | ||
handler: NewHandler( | ||
&testAttestor{Err: errors.New("foobar")}, | ||
signer, | ||
networkID, | ||
chainID, | ||
), | ||
wantErr: ErrInsufficientSignatures, | ||
}, | ||
{ | ||
name: "invalid validator set", | ||
ctx: context.Background(), | ||
validators: []Validator{ | ||
{ | ||
NodeID: nodeID0, | ||
PublicKey: pk0, | ||
Weight: 1, | ||
}, | ||
{ | ||
NodeID: nodeID0, | ||
PublicKey: pk0, | ||
Weight: 1, | ||
}, | ||
}, | ||
wantErr: ErrDuplicateValidator, | ||
}, | ||
{ | ||
name: "context canceled", | ||
ctx: func() context.Context { | ||
ctx, cancel := context.WithCancel(context.Background()) | ||
cancel() | ||
|
||
return ctx | ||
}(), | ||
threshold: 1, | ||
wantErr: context.Canceled, | ||
}, | ||
} | ||
|
||
for _, tt := range tests { | ||
t.Run(tt.name, func(t *testing.T) { | ||
require := require.New(t) | ||
|
||
ctx := context.Background() | ||
message, err := warp.NewUnsignedMessage(networkID, chainID, []byte("payload")) | ||
require.NoError(err) | ||
client := p2ptest.NewClient(t, ctx, tt.handler, ids.GenerateTestNodeID(), nodeID0) | ||
verifier := NewSignatureAggregator(logging.NoLog{}, client, 1) | ||
|
||
_, err = verifier.AggregateSignatures( | ||
tt.ctx, | ||
message, | ||
[]byte("justification"), | ||
tt.validators, | ||
tt.threshold, | ||
) | ||
require.ErrorIs(err, tt.wantErr) | ||
}) | ||
} | ||
} |
Oops, something went wrong.