mirror of
https://github.com/QuilibriumNetwork/ceremonyclient.git
synced 2026-02-25 04:17:25 +08:00
* v2.1.0.2 * restore tweaks to simlibp2p * fix: nil ref on size calc * fix: panic should induce shutdown from event_distributor * fix: friendlier initialization that requires less manual kickstarting for test/devnets * fix: fewer available shards than provers should choose shard length * fix: update stored worker registry, improve logging for debug mode * fix: shut the fuck up, peer log * qol: log value should be snake cased * fix:non-archive snap sync issues * fix: separate X448/Decaf448 signed keys, add onion key to registry * fix: overflow arithmetic on frame number comparison * fix: worker registration should be idempotent if inputs are same, otherwise permit updated records * fix: remove global prover state from size calculation * fix: divide by zero case * fix: eager prover * fix: broadcast listener default * qol: diagnostic data for peer authenticator * fix: master/worker connectivity issue in sparse networks tight coupling of peer and workers can sometimes interfere if mesh is sparse, so give workers a pseudoidentity but publish messages with the proper peer key * fix: reorder steps of join creation * fix: join verify frame source + ensure domain is properly padded (unnecessary but good for consistency) * fix: add delegate to protobuf <-> reified join conversion * fix: preempt prover from planning with no workers * fix: use the unallocated workers to generate a proof * qol: underflow causes join fail in first ten frames on test/devnets * qol: small logging tweaks for easier log correlation in debug mode * qol: use fisher-yates shuffle to ensure prover allocations are evenly distributed when scores are equal * qol: separate decisional logic on post-enrollment confirmation into consensus engine, proposer, and worker manager where relevant, refactor out scoring * reuse shard descriptors for both join planning and confirm/reject decisions * fix: add missing interface method and amend test blossomsub to use new peer id basis * fix: only check allocations if they exist * fix: pomw mint proof data needs to be hierarchically under global intrinsic domain * staging temporary state under diagnostics * fix: first phase of distributed lock refactoring * fix: compute intrinsic locking * fix: hypergraph intrinsic locking * fix: token intrinsic locking * fix: update execution engines to support new locking model * fix: adjust tests with new execution shape * fix: weave in lock/unlock semantics to liveness provider * fix lock fallthrough, add missing allocation update * qol: additional logging for diagnostics, also testnet/devnet handling for confirmations * fix: establish grace period on halt scenario to permit recovery * fix: support test/devnet defaults for coverage scenarios * fix: nil ref on consensus halts for non-archive nodes * fix: remove unnecessary prefix from prover ref * add test coverage for fork choice behaviors and replay – once passing, blocker (2) is resolved * fix: no fork replay on repeat for non-archive nodes, snap now behaves correctly * rollup of pre-liveness check lock interactions * ahead of tests, get the protobuf/metrics-related changes out so teams can prepare * add test coverage for distributed lock behaviors – once passing, blocker (3) is resolved * fix: blocker (3) * Dev docs improvements (#445) * Make install deps script more robust * Improve testing instructions * Worker node should stop upon OS SIGINT/SIGTERM signal (#447) * move pebble close to Stop() * move deferred Stop() to Start() * add core id to worker stop log message * create done os signal channel and stop worker upon message to it --------- Co-authored-by: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com> --------- Co-authored-by: Daz <daz_the_corgi@proton.me> Co-authored-by: Black Swan <3999712+blacks1ne@users.noreply.github.com>
339 lines
8.8 KiB
Go
339 lines
8.8 KiB
Go
package global
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"math/big"
|
|
"slices"
|
|
|
|
"github.com/iden3/go-iden3-crypto/poseidon"
|
|
"github.com/pkg/errors"
|
|
"go.uber.org/zap"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/codes"
|
|
"google.golang.org/grpc/status"
|
|
qgrpc "source.quilibrium.com/quilibrium/monorepo/node/internal/grpc"
|
|
"source.quilibrium.com/quilibrium/monorepo/node/rpc"
|
|
"source.quilibrium.com/quilibrium/monorepo/protobufs"
|
|
"source.quilibrium.com/quilibrium/monorepo/types/store"
|
|
)
|
|
|
|
func (e *GlobalConsensusEngine) GetGlobalFrame(
|
|
ctx context.Context,
|
|
request *protobufs.GetGlobalFrameRequest,
|
|
) (*protobufs.GlobalFrameResponse, error) {
|
|
peerID, ok := qgrpc.PeerIDFromContext(ctx)
|
|
if !ok {
|
|
return nil, status.Error(codes.Internal, "remote peer ID not found")
|
|
}
|
|
|
|
if !bytes.Equal(e.pubsub.GetPeerID(), []byte(peerID)) {
|
|
registry, err := e.keyStore.GetKeyRegistry(
|
|
[]byte(peerID),
|
|
)
|
|
if err != nil {
|
|
return nil, status.Error(
|
|
codes.PermissionDenied,
|
|
"could not identify peer",
|
|
)
|
|
}
|
|
|
|
if registry.ProverKey == nil || registry.ProverKey.KeyValue == nil {
|
|
return nil, status.Error(
|
|
codes.PermissionDenied,
|
|
"could not identify peer (no prover)",
|
|
)
|
|
}
|
|
|
|
addrBI, err := poseidon.HashBytes(registry.ProverKey.KeyValue)
|
|
if err != nil {
|
|
return nil, status.Error(
|
|
codes.PermissionDenied,
|
|
"could not identify peer (invalid address)",
|
|
)
|
|
}
|
|
|
|
addr := addrBI.FillBytes(make([]byte, 32))
|
|
info, err := e.proverRegistry.GetActiveProvers(nil)
|
|
if err != nil {
|
|
return nil, status.Error(
|
|
codes.PermissionDenied,
|
|
"could not identify peer (no prover registry)",
|
|
)
|
|
}
|
|
|
|
found := false
|
|
for _, prover := range info {
|
|
if bytes.Equal(prover.Address, addr) {
|
|
found = true
|
|
break
|
|
}
|
|
}
|
|
|
|
if !found {
|
|
return nil, status.Error(
|
|
codes.PermissionDenied,
|
|
"invalid peer",
|
|
)
|
|
}
|
|
}
|
|
|
|
e.logger.Debug(
|
|
"received frame request",
|
|
zap.Uint64("frame_number", request.FrameNumber),
|
|
zap.String("peer_id", peerID.String()),
|
|
)
|
|
var frame *protobufs.GlobalFrame
|
|
var err error
|
|
if request.FrameNumber == 0 {
|
|
frame, err = e.globalTimeReel.GetHead()
|
|
if frame.Header.FrameNumber == 0 {
|
|
return nil, errors.Wrap(
|
|
errors.New("not currently syncable"),
|
|
"get global frame",
|
|
)
|
|
}
|
|
} else {
|
|
frame, err = e.clockStore.GetGlobalClockFrame(request.FrameNumber)
|
|
}
|
|
|
|
if err != nil {
|
|
e.logger.Debug(
|
|
"received error while fetching time reel head",
|
|
zap.String("peer_id", peerID.String()),
|
|
zap.Uint64("frame_number", request.FrameNumber),
|
|
zap.Error(err),
|
|
)
|
|
return nil, errors.Wrap(err, "get data frame")
|
|
}
|
|
|
|
return &protobufs.GlobalFrameResponse{
|
|
Frame: frame,
|
|
}, nil
|
|
}
|
|
|
|
func (e *GlobalConsensusEngine) GetAppShards(
|
|
ctx context.Context,
|
|
req *protobufs.GetAppShardsRequest,
|
|
) (*protobufs.GetAppShardsResponse, error) {
|
|
peerID, ok := qgrpc.PeerIDFromContext(ctx)
|
|
if !ok {
|
|
return nil, status.Error(codes.Internal, "remote peer ID not found")
|
|
}
|
|
|
|
if !bytes.Equal(e.pubsub.GetPeerID(), []byte(peerID)) {
|
|
if len(req.ShardKey) != 35 {
|
|
return nil, errors.Wrap(errors.New("invalid shard key"), "get app shards")
|
|
}
|
|
}
|
|
|
|
var shards []store.ShardInfo
|
|
var err error
|
|
if len(req.ShardKey) != 35 {
|
|
shards, err = e.shardsStore.RangeAppShards()
|
|
} else {
|
|
shards, err = e.shardsStore.GetAppShards(req.ShardKey, req.Prefix)
|
|
}
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "get app shards")
|
|
}
|
|
|
|
response := &protobufs.GetAppShardsResponse{
|
|
Info: []*protobufs.AppShardInfo{},
|
|
}
|
|
|
|
for _, shard := range shards {
|
|
size := big.NewInt(0)
|
|
commitment := [][]byte{}
|
|
dataShards := uint64(0)
|
|
for _, ps := range []protobufs.HypergraphPhaseSet{0, 1, 2, 3} {
|
|
c, err := e.hypergraph.GetChildrenForPath(
|
|
ctx,
|
|
&protobufs.GetChildrenForPathRequest{
|
|
ShardKey: req.ShardKey,
|
|
Path: shard.Path,
|
|
PhaseSet: protobufs.HypergraphPhaseSet(ps),
|
|
},
|
|
)
|
|
if err != nil {
|
|
commitment = append(commitment, make([]byte, 64))
|
|
continue
|
|
}
|
|
|
|
if len(c.PathSegments) == 0 {
|
|
commitment = append(commitment, make([]byte, 64))
|
|
continue
|
|
}
|
|
|
|
s := c.PathSegments[len(c.PathSegments)-1]
|
|
if len(s.Segments) > 1 {
|
|
return nil, errors.Wrap(errors.New("no shard found"), "get app shards")
|
|
}
|
|
|
|
switch t := s.Segments[0].Segment.(type) {
|
|
case *protobufs.TreePathSegment_Branch:
|
|
size = size.Add(size, new(big.Int).SetBytes(t.Branch.Size))
|
|
commitment = append(commitment, t.Branch.Commitment)
|
|
dataShards += t.Branch.LeafCount
|
|
case *protobufs.TreePathSegment_Leaf:
|
|
size = size.Add(size, new(big.Int).SetBytes(t.Leaf.Size))
|
|
commitment = append(commitment, t.Leaf.Commitment)
|
|
dataShards += 1
|
|
}
|
|
}
|
|
|
|
shardKey := []byte{}
|
|
if len(req.ShardKey) != 35 {
|
|
shardKey = slices.Concat(shard.L1, shard.L2)
|
|
}
|
|
|
|
response.Info = append(response.Info, &protobufs.AppShardInfo{
|
|
Prefix: shard.Path,
|
|
Size: size.Bytes(),
|
|
Commitment: commitment,
|
|
DataShards: dataShards,
|
|
ShardKey: shardKey,
|
|
})
|
|
}
|
|
|
|
return response, nil
|
|
}
|
|
|
|
func (e *GlobalConsensusEngine) GetGlobalShards(
|
|
ctx context.Context,
|
|
req *protobufs.GetGlobalShardsRequest,
|
|
) (*protobufs.GetGlobalShardsResponse, error) {
|
|
if len(req.L1) != 3 || len(req.L2) != 32 {
|
|
return nil, errors.Wrap(
|
|
errors.New("invalid shard key"),
|
|
"get global shards",
|
|
)
|
|
}
|
|
|
|
size := big.NewInt(0)
|
|
commitment := [][]byte{}
|
|
dataShards := uint64(0)
|
|
for _, ps := range []protobufs.HypergraphPhaseSet{0, 1, 2, 3} {
|
|
c, err := e.hypergraph.GetChildrenForPath(
|
|
ctx,
|
|
&protobufs.GetChildrenForPathRequest{
|
|
ShardKey: slices.Concat(req.L1, req.L2),
|
|
Path: []uint32{},
|
|
PhaseSet: protobufs.HypergraphPhaseSet(ps),
|
|
},
|
|
)
|
|
if err != nil {
|
|
commitment = append(commitment, make([]byte, 64))
|
|
continue
|
|
}
|
|
|
|
if len(c.PathSegments) == 0 {
|
|
commitment = append(commitment, make([]byte, 64))
|
|
continue
|
|
}
|
|
|
|
s := c.PathSegments[0]
|
|
if len(s.Segments) != 1 {
|
|
commitment = append(commitment, make([]byte, 64))
|
|
continue
|
|
}
|
|
|
|
switch t := s.Segments[0].Segment.(type) {
|
|
case *protobufs.TreePathSegment_Branch:
|
|
size = size.Add(size, new(big.Int).SetBytes(t.Branch.Size))
|
|
commitment = append(commitment, t.Branch.Commitment)
|
|
dataShards += t.Branch.LeafCount
|
|
case *protobufs.TreePathSegment_Leaf:
|
|
size = size.Add(size, new(big.Int).SetBytes(t.Leaf.Size))
|
|
commitment = append(commitment, t.Leaf.Commitment)
|
|
dataShards += 1
|
|
}
|
|
}
|
|
|
|
return &protobufs.GetGlobalShardsResponse{
|
|
Size: size.Bytes(),
|
|
Commitment: commitment,
|
|
}, nil
|
|
}
|
|
|
|
func (e *GlobalConsensusEngine) GetLockedAddresses(
|
|
ctx context.Context,
|
|
req *protobufs.GetLockedAddressesRequest,
|
|
) (*protobufs.GetLockedAddressesResponse, error) {
|
|
e.txLockMu.RLock()
|
|
defer e.txLockMu.RUnlock()
|
|
if _, ok := e.txLockMap[req.FrameNumber]; !ok {
|
|
return &protobufs.GetLockedAddressesResponse{}, nil
|
|
}
|
|
|
|
locks := e.txLockMap[req.FrameNumber]
|
|
if _, ok := locks[string(req.ShardAddress)]; !ok {
|
|
return &protobufs.GetLockedAddressesResponse{}, nil
|
|
}
|
|
|
|
transactions := []*protobufs.LockedTransaction{}
|
|
for _, tx := range locks[string(req.ShardAddress)] {
|
|
transactions = append(transactions, &protobufs.LockedTransaction{
|
|
TransactionHash: tx.TransactionHash,
|
|
ShardAddresses: tx.ShardAddresses,
|
|
Committed: tx.Committed,
|
|
Filled: tx.Filled,
|
|
})
|
|
}
|
|
|
|
return &protobufs.GetLockedAddressesResponse{
|
|
Transactions: transactions,
|
|
}, nil
|
|
}
|
|
|
|
func (e *GlobalConsensusEngine) GetWorkerInfo(
|
|
ctx context.Context,
|
|
req *protobufs.GlobalGetWorkerInfoRequest,
|
|
) (*protobufs.GlobalGetWorkerInfoResponse, error) {
|
|
peerID, ok := qgrpc.PeerIDFromContext(ctx)
|
|
if !ok {
|
|
return nil, status.Error(codes.Internal, "remote peer ID not found")
|
|
}
|
|
|
|
if !bytes.Equal(e.pubsub.GetPeerID(), []byte(peerID)) {
|
|
return nil, status.Error(codes.Internal, "remote peer ID not found")
|
|
}
|
|
|
|
workers, err := e.workerManager.RangeWorkers()
|
|
if err != nil {
|
|
return nil, status.Error(codes.Internal, err.Error())
|
|
}
|
|
|
|
resp := &protobufs.GlobalGetWorkerInfoResponse{
|
|
Workers: []*protobufs.GlobalGetWorkerInfoResponseItem{},
|
|
}
|
|
|
|
for _, w := range workers {
|
|
resp.Workers = append(
|
|
resp.Workers,
|
|
&protobufs.GlobalGetWorkerInfoResponseItem{
|
|
CoreId: uint32(w.CoreId),
|
|
ListenMultiaddr: w.ListenMultiaddr,
|
|
StreamListenMultiaddr: w.StreamListenMultiaddr,
|
|
Filter: w.Filter,
|
|
TotalStorage: uint64(w.TotalStorage),
|
|
Allocated: w.Allocated,
|
|
},
|
|
)
|
|
}
|
|
|
|
return resp, nil
|
|
}
|
|
|
|
func (e *GlobalConsensusEngine) RegisterServices(server *grpc.Server) {
|
|
protobufs.RegisterGlobalServiceServer(server, e)
|
|
protobufs.RegisterDispatchServiceServer(server, e.dispatchService)
|
|
protobufs.RegisterHypergraphComparisonServiceServer(server, e.hyperSync)
|
|
protobufs.RegisterOnionServiceServer(server, e.onionService)
|
|
|
|
if e.config.Engine.EnableMasterProxy {
|
|
proxyServer := rpc.NewPubSubProxyServer(e.pubsub, e.logger)
|
|
protobufs.RegisterPubSubProxyServer(server, proxyServer)
|
|
}
|
|
}
|