ceremonyclient/protobufs/keys.proto
Cassandra Heart 53f7c2b5c9
v2.1.0.2 (#442)
* v2.1.0.2

* restore tweaks to simlibp2p

* fix: nil ref on size calc

* fix: panic should induce shutdown from event_distributor

* fix: friendlier initialization that requires less manual kickstarting for test/devnets

* fix: fewer available shards than provers should choose shard length

* fix: update stored worker registry, improve logging for debug mode

* fix: shut the fuck up, peer log

* qol: log value should be snake cased

* fix:non-archive snap sync issues

* fix: separate X448/Decaf448 signed keys, add onion key to registry

* fix: overflow arithmetic on frame number comparison

* fix: worker registration should be idempotent if inputs are same, otherwise permit updated records

* fix: remove global prover state from size calculation

* fix: divide by zero case

* fix: eager prover

* fix: broadcast listener default

* qol: diagnostic data for peer authenticator

* fix: master/worker connectivity issue in sparse networks

tight coupling of peer and workers can sometimes interfere if mesh is sparse, so give workers a pseudoidentity but publish messages with the proper peer key

* fix: reorder steps of join creation

* fix: join verify frame source + ensure domain is properly padded (unnecessary but good for consistency)

* fix: add delegate to protobuf <-> reified join conversion

* fix: preempt prover from planning with no workers

* fix: use the unallocated workers to generate a proof

* qol: underflow causes join fail in first ten frames on test/devnets

* qol: small logging tweaks for easier log correlation in debug mode

* qol: use fisher-yates shuffle to ensure prover allocations are evenly distributed when scores are equal

* qol: separate decisional logic on post-enrollment confirmation into consensus engine, proposer, and worker manager where relevant, refactor out scoring

* reuse shard descriptors for both join planning and confirm/reject decisions

* fix: add missing interface method and amend test blossomsub to use new peer id basis

* fix: only check allocations if they exist

* fix: pomw mint proof data needs to be hierarchically under global intrinsic domain

* staging temporary state under diagnostics

* fix: first phase of distributed lock refactoring

* fix: compute intrinsic locking

* fix: hypergraph intrinsic locking

* fix: token intrinsic locking

* fix: update execution engines to support new locking model

* fix: adjust tests with new execution shape

* fix: weave in lock/unlock semantics to liveness provider

* fix lock fallthrough, add missing allocation update

* qol: additional logging for diagnostics, also testnet/devnet handling for confirmations

* fix: establish grace period on halt scenario to permit recovery

* fix: support test/devnet defaults for coverage scenarios

* fix: nil ref on consensus halts for non-archive nodes

* fix: remove unnecessary prefix from prover ref

* add test coverage for fork choice behaviors and replay – once passing, blocker (2) is resolved

* fix: no fork replay on repeat for non-archive nodes, snap now behaves correctly

* rollup of pre-liveness check lock interactions

* ahead of tests, get the protobuf/metrics-related changes out so teams can prepare

* add test coverage for distributed lock behaviors – once passing, blocker (3) is resolved

* fix: blocker (3)

* Dev docs improvements (#445)

* Make install deps script more robust

* Improve testing instructions

* Worker node should stop upon OS SIGINT/SIGTERM signal (#447)

* move pebble close to Stop()

* move deferred Stop() to Start()

* add core id to worker stop log message

* create done os signal channel and stop worker upon message to it

---------

Co-authored-by: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com>

---------

Co-authored-by: Daz <daz_the_corgi@proton.me>
Co-authored-by: Black Swan <3999712+blacks1ne@users.noreply.github.com>
2025-10-23 01:03:06 -05:00

189 lines
4.3 KiB
Protocol Buffer
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

syntax = "proto3";
package quilibrium.node.keys.pb;
option go_package = "source.quilibrium.com/quilibrium/monorepo/node/protobufs";
// Describes a raw Ed448 public key
message Ed448PublicKey {
// 57 byte value
bytes key_value = 1;
}
// Describes a raw Ed448 private key notably this is post-derivation,
// not the seed.
message Ed448PrivateKey {
// 57 byte value
bytes key_value = 1;
Ed448PublicKey public_key = 2;
}
// Describes a raw Ed448 signature
message Ed448Signature {
// 114 byte value
bytes signature = 1;
Ed448PublicKey public_key = 2;
}
// Describes a raw X448 public key
message X448PublicKey {
// 57 byte value
bytes key_value = 1;
}
// Describes a raw X448 private key notably this is post-derivation,
// not the seed.
message X448PrivateKey {
// 57 byte value
bytes key_value = 1;
X448PublicKey public_key = 2;
}
// Describes a raw PCAS public key
message PCASPublicKey {
// 256 kilobyte value
bytes key_value = 1;
}
// Describes a raw PCAS private key
message PCASPrivateKey {
// 256 byte value
bytes key_value = 1;
PCASPublicKey public_key = 2;
}
// Describes a raw compressed BLS48-581 G2 public key
message BLS48581G2PublicKey {
// 585 byte value
bytes key_value = 1;
}
// Describes a raw BLS48-581 private key, with corresponding G2 public key
message BLS48581G2PrivateKey {
// 73 byte value
bytes key_value = 1;
BLS48581G2PublicKey public_key = 2;
}
// Describes a raw BLS48-581 signature, minimal signature size variant
message BLS48581Signature {
// 74 byte value
bytes signature = 1;
BLS48581G2PublicKey public_key = 2;
}
// Describes a raw BLS48-581 signature, minimal signature size variant
message BLS48581SignatureWithProofOfPossession {
// 74 byte value
bytes signature = 1;
// 585 byte value
BLS48581G2PublicKey public_key = 2;
// 74 byte value
bytes pop_signature = 3;
}
// Describes a raw BLS48-581 signature, minimal signature size variant
message BLS48581AddressedSignature {
// 74 byte value
bytes signature = 1;
// 32 byte value
bytes address = 2;
}
// Describes an aggregated BLS48-581 signature, minimal signature size variant
message BLS48581AggregateSignature {
// 74 byte value
bytes signature = 1;
// 585 byte value
BLS48581G2PublicKey public_key = 2;
bytes bitmask = 3;
}
// Describes a raw Decaf448 public key
message Decaf448PublicKey {
// 56 byte value
bytes key_value = 1;
}
// Describes a raw Decaf448 private key
message Decaf448PrivateKey {
// 56 byte value
bytes key_value = 1;
Decaf448PublicKey public_key = 2;
}
// Describes a Schnorr signature over Decaf448
message Decaf448Signature {
// 112 byte value (56 bytes R + 56 bytes S)
bytes signature = 1;
Decaf448PublicKey public_key = 2;
}
// Individual signed key with metadata
message SignedX448Key {
X448PublicKey key = 1;
// The parent key that signed this
bytes parent_key_address = 2;
// Signature by the parent
oneof signature {
Ed448Signature ed448_signature = 3;
BLS48581Signature bls_signature = 4;
Decaf448Signature decaf_signature = 5;
}
// Metadata
uint64 created_at = 6;
// 0 means no expiry
uint64 expires_at = 7;
// "view", "spend", "inbox", "device", "pre"
string key_purpose = 8;
}
// Individual signed key with metadata
message SignedDecaf448Key {
Decaf448PublicKey key = 1;
// The parent key that signed this
bytes parent_key_address = 2;
// Signature by the parent
oneof signature {
Ed448Signature ed448_signature = 3;
BLS48581Signature bls_signature = 4;
Decaf448Signature decaf_signature = 5;
}
// Metadata
uint64 created_at = 6;
// 0 means no expiry
uint64 expires_at = 7;
// "view", "spend", "inbox", "device", "pre"
string key_purpose = 8;
}
// A collection of keys for a specific purpose
message KeyCollection {
// "view", "spend", "inbox", "device", "pre"
string key_purpose = 1;
repeated SignedX448Key x448_keys = 2;
repeated SignedDecaf448Key decaf448_keys = 3;
}
// Complete key registry (for querying all keys)
message KeyRegistry {
// Primary keys
Ed448PublicKey identity_key = 1;
BLS48581G2PublicKey prover_key = 2;
// Cross signatures
Ed448Signature identity_to_prover = 3;
BLS48581Signature prover_to_identity = 4;
// All signed keys by purpose
map<string, KeyCollection> keys_by_purpose = 5;
// Metadata
uint64 last_updated = 6;
}