mirror of
https://github.com/QuilibriumNetwork/ceremonyclient.git
synced 2026-02-21 10:27:26 +08:00
* wip: conversion of hotstuff from flow into Q-oriented model * bulk of tests * remaining non-integration tests * add integration test, adjust log interface, small tweaks * further adjustments, restore full pacemaker shape * add component lifecycle management+supervisor * further refinements * resolve timeout hanging * mostly finalized state for consensus * bulk of engine swap out * lifecycle-ify most types * wiring nearly complete, missing needed hooks for proposals * plugged in, vetting message validation paths * global consensus, plugged in and verified * app shard now wired in too * do not decode empty keys.yml (#456) * remove obsolete engine.maxFrames config parameter (#454) * default to Info log level unless debug is enabled (#453) * respect config's "logging" section params, remove obsolete single-file logging (#452) * Trivial code cleanup aiming to reduce Go compiler warnings (#451) * simplify range traversal * simplify channel read for single select case * delete rand.Seed() deprecated in Go 1.20 and no-op as of Go 1.24 * simplify range traversal * simplify channel read for single select case * remove redundant type from array * simplify range traversal * simplify channel read for single select case * RC slate * finalize 2.1.0.5 * Update comments in StrictMonotonicCounter Fix comment formatting and clarify description. --------- Co-authored-by: Black Swan <3999712+blacks1ne@users.noreply.github.com>
46 lines
2.3 KiB
Go
46 lines
2.3 KiB
Go
package consensus
|
|
|
|
import "source.quilibrium.com/quilibrium/monorepo/consensus/models"
|
|
|
|
// Verifier is the component responsible for the cryptographic integrity of
|
|
// votes, proposals and QC's against the state they are signing.
|
|
type Verifier[VoteT models.Unique] interface {
|
|
// VerifyVote checks the cryptographic validity of a vote's `SigData` w.r.t.
|
|
// the rank and stateID. It is the responsibility of the calling code to
|
|
// ensure that `voter` is authorized to vote.
|
|
// Return values:
|
|
// * nil if `sigData` is cryptographically valid
|
|
// * models.InvalidFormatError if the signature has an incompatible format.
|
|
// * models.ErrInvalidSignature is the signature is invalid
|
|
// * unexpected errors should be treated as symptoms of bugs or uncovered
|
|
// edge cases in the logic (i.e. as fatal)
|
|
VerifyVote(vote *VoteT) error
|
|
|
|
// VerifyQC checks the cryptographic validity of a QC's `SigData` w.r.t. the
|
|
// given rank and stateID. It is the responsibility of the calling code to
|
|
// ensure that all `signers` are authorized, without duplicates.
|
|
// Return values:
|
|
// * nil if `sigData` is cryptographically valid
|
|
// * models.InvalidFormatError if `sigData` has an incompatible format
|
|
// * models.InsufficientSignaturesError if `signers is empty.
|
|
// Depending on the order of checks in the higher-level logic this error
|
|
// might be an indicator of a external byzantine input or an internal bug.
|
|
// * models.ErrInvalidSignature if a signature is invalid
|
|
// * unexpected errors should be treated as symptoms of bugs or uncovered
|
|
// edge cases in the logic (i.e. as fatal)
|
|
VerifyQuorumCertificate(quorumCertificate models.QuorumCertificate) error
|
|
|
|
// VerifyTimeoutCertificate checks cryptographic validity of the TC's
|
|
// `sigData` w.r.t. the given rank. It is the responsibility of the calling
|
|
// code to ensure that all `signers` are authorized, without duplicates.
|
|
// Return values:
|
|
// * nil if `sigData` is cryptographically valid
|
|
// * models.InsufficientSignaturesError if `signers is empty.
|
|
// * models.InvalidFormatError if `signers`/`highQCRanks` have differing
|
|
// lengths
|
|
// * models.ErrInvalidSignature if a signature is invalid
|
|
// * unexpected errors should be treated as symptoms of bugs or uncovered
|
|
// edge cases in the logic (i.e. as fatal)
|
|
VerifyTimeoutCertificate(timeoutCertificate models.TimeoutCertificate) error
|
|
}
|