mirror of
https://github.com/QuilibriumNetwork/ceremonyclient.git
synced 2026-02-21 18:37:26 +08:00
* v2.1.0.2 * restore tweaks to simlibp2p * fix: nil ref on size calc * fix: panic should induce shutdown from event_distributor * fix: friendlier initialization that requires less manual kickstarting for test/devnets * fix: fewer available shards than provers should choose shard length * fix: update stored worker registry, improve logging for debug mode * fix: shut the fuck up, peer log * qol: log value should be snake cased * fix:non-archive snap sync issues * fix: separate X448/Decaf448 signed keys, add onion key to registry * fix: overflow arithmetic on frame number comparison * fix: worker registration should be idempotent if inputs are same, otherwise permit updated records * fix: remove global prover state from size calculation * fix: divide by zero case * fix: eager prover * fix: broadcast listener default * qol: diagnostic data for peer authenticator * fix: master/worker connectivity issue in sparse networks tight coupling of peer and workers can sometimes interfere if mesh is sparse, so give workers a pseudoidentity but publish messages with the proper peer key * fix: reorder steps of join creation * fix: join verify frame source + ensure domain is properly padded (unnecessary but good for consistency) * fix: add delegate to protobuf <-> reified join conversion * fix: preempt prover from planning with no workers * fix: use the unallocated workers to generate a proof * qol: underflow causes join fail in first ten frames on test/devnets * qol: small logging tweaks for easier log correlation in debug mode * qol: use fisher-yates shuffle to ensure prover allocations are evenly distributed when scores are equal * qol: separate decisional logic on post-enrollment confirmation into consensus engine, proposer, and worker manager where relevant, refactor out scoring * reuse shard descriptors for both join planning and confirm/reject decisions * fix: add missing interface method and amend test blossomsub to use new peer id basis * fix: only check allocations if they exist * fix: pomw mint proof data needs to be hierarchically under global intrinsic domain * staging temporary state under diagnostics * fix: first phase of distributed lock refactoring * fix: compute intrinsic locking * fix: hypergraph intrinsic locking * fix: token intrinsic locking * fix: update execution engines to support new locking model * fix: adjust tests with new execution shape * fix: weave in lock/unlock semantics to liveness provider * fix lock fallthrough, add missing allocation update * qol: additional logging for diagnostics, also testnet/devnet handling for confirmations * fix: establish grace period on halt scenario to permit recovery * fix: support test/devnet defaults for coverage scenarios * fix: nil ref on consensus halts for non-archive nodes * fix: remove unnecessary prefix from prover ref * add test coverage for fork choice behaviors and replay – once passing, blocker (2) is resolved * fix: no fork replay on repeat for non-archive nodes, snap now behaves correctly * rollup of pre-liveness check lock interactions * ahead of tests, get the protobuf/metrics-related changes out so teams can prepare * add test coverage for distributed lock behaviors – once passing, blocker (3) is resolved * fix: blocker (3) * Dev docs improvements (#445) * Make install deps script more robust * Improve testing instructions * Worker node should stop upon OS SIGINT/SIGTERM signal (#447) * move pebble close to Stop() * move deferred Stop() to Start() * add core id to worker stop log message * create done os signal channel and stop worker upon message to it --------- Co-authored-by: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com> --------- Co-authored-by: Daz <daz_the_corgi@proton.me> Co-authored-by: Black Swan <3999712+blacks1ne@users.noreply.github.com>
158 lines
3.6 KiB
Go
158 lines
3.6 KiB
Go
package hypergraph
|
|
|
|
import (
|
|
"bytes"
|
|
"math/big"
|
|
"slices"
|
|
|
|
"github.com/pkg/errors"
|
|
hgstate "source.quilibrium.com/quilibrium/monorepo/node/execution/state/hypergraph"
|
|
qcrypto "source.quilibrium.com/quilibrium/monorepo/types/crypto"
|
|
"source.quilibrium.com/quilibrium/monorepo/types/execution/intrinsics"
|
|
"source.quilibrium.com/quilibrium/monorepo/types/execution/state"
|
|
"source.quilibrium.com/quilibrium/monorepo/types/hypergraph"
|
|
"source.quilibrium.com/quilibrium/monorepo/types/keys"
|
|
)
|
|
|
|
type HyperedgeRemove struct {
|
|
Domain [32]byte
|
|
Value hypergraph.Hyperedge
|
|
Signature []byte // Ed448 signature for write authorization
|
|
keyManager keys.KeyManager
|
|
signer qcrypto.Signer
|
|
config *HypergraphIntrinsicConfiguration
|
|
}
|
|
|
|
func NewHyperedgeRemove(
|
|
domain [32]byte,
|
|
value hypergraph.Hyperedge,
|
|
signer qcrypto.Signer,
|
|
) *HyperedgeRemove {
|
|
return &HyperedgeRemove{
|
|
Domain: domain,
|
|
Value: value,
|
|
signer: signer,
|
|
}
|
|
}
|
|
|
|
// GetCost implements intrinsics.IntrinsicOperation.
|
|
func (h *HyperedgeRemove) GetCost() (*big.Int, error) {
|
|
return big.NewInt(64), nil
|
|
}
|
|
|
|
// Materialize implements intrinsics.IntrinsicOperation.
|
|
func (h *HyperedgeRemove) Materialize(
|
|
frameNumber uint64,
|
|
state state.State,
|
|
) (state.State, error) {
|
|
hypergraph, ok := state.(*hgstate.HypergraphState)
|
|
if !ok {
|
|
return nil, errors.Wrap(errors.New("invalid state"), "materialize")
|
|
}
|
|
|
|
// Get the hyperedge ID to use as the address
|
|
hyperedgeID := h.Value.GetID()
|
|
|
|
// Set the state
|
|
err := hypergraph.Delete(
|
|
h.Domain[:],
|
|
hyperedgeID[32:],
|
|
hgstate.HyperedgeRemovesDiscriminator,
|
|
frameNumber,
|
|
)
|
|
|
|
return hypergraph, errors.Wrap(err, "materialize")
|
|
}
|
|
|
|
// Prove implements intrinsics.IntrinsicOperation.
|
|
func (h *HyperedgeRemove) Prove(frameNumber uint64) error {
|
|
// For hyperedge removal, ensure the hyperedge value is valid
|
|
if h.Value == nil {
|
|
return errors.Wrap(errors.New("missing hyperedge value"), "prove")
|
|
}
|
|
|
|
hyperedgeID := h.Value.GetID()
|
|
if len(hyperedgeID) != 64 {
|
|
return errors.Wrap(errors.New("invalid hyperedge id length"), "prove")
|
|
}
|
|
|
|
message := make([]byte, 0, 64)
|
|
message = append(message, hyperedgeID[:]...)
|
|
|
|
sig, err := h.signer.SignWithDomain(
|
|
message,
|
|
slices.Concat(h.Domain[:], []byte("HYPEREDGE_REMOVE")),
|
|
)
|
|
if err != nil {
|
|
return errors.Wrap(err, "prove")
|
|
}
|
|
|
|
h.Signature = sig
|
|
|
|
return nil
|
|
}
|
|
|
|
func (h *HyperedgeRemove) GetReadAddresses(
|
|
frameNumber uint64,
|
|
) ([][]byte, error) {
|
|
return nil, nil
|
|
}
|
|
|
|
func (h *HyperedgeRemove) GetWriteAddresses(
|
|
frameNumber uint64,
|
|
) ([][]byte, error) {
|
|
hyperedgeID := h.Value.GetID()
|
|
|
|
return [][]byte{
|
|
slices.Concat(
|
|
h.Domain[:],
|
|
hyperedgeID[32:],
|
|
),
|
|
}, nil
|
|
}
|
|
|
|
// Verify implements intrinsics.IntrinsicOperation.
|
|
func (h *HyperedgeRemove) Verify(frameNumber uint64) (bool, error) {
|
|
// Verify that the hyperedge is valid
|
|
if h.Value == nil {
|
|
return false, errors.Wrap(errors.New("missing hyperedge value"), "verify")
|
|
}
|
|
|
|
hyperedgeID := h.Value.GetID()
|
|
if len(hyperedgeID) != 64 {
|
|
return false, errors.Wrap(
|
|
errors.New("invalid hyperedge id length"),
|
|
"verify",
|
|
)
|
|
}
|
|
|
|
if !bytes.Equal(hyperedgeID[:32], h.Domain[:]) {
|
|
return false, errors.Wrap(
|
|
errors.New("hyperedge domain mismatch"),
|
|
"verify",
|
|
)
|
|
}
|
|
|
|
message := make([]byte, 0, 64)
|
|
message = append(message, hyperedgeID[:]...)
|
|
|
|
valid, err := h.keyManager.ValidateSignature(
|
|
qcrypto.KeyTypeEd448,
|
|
h.config.WritePublicKey,
|
|
message,
|
|
h.Signature,
|
|
slices.Concat(h.Domain[:], []byte("HYPEREDGE_REMOVE")),
|
|
)
|
|
if err != nil {
|
|
return false, errors.Wrap(err, "verify")
|
|
}
|
|
|
|
if !valid {
|
|
return false, errors.Wrap(errors.New("invalid signature"), "verify")
|
|
}
|
|
|
|
return true, nil
|
|
}
|
|
|
|
var _ intrinsics.IntrinsicOperation = (*HyperedgeRemove)(nil)
|