|
|
|
package consensus
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"sync"
|
|
|
|
|
|
|
|
mapset "github.com/deckarep/golang-set"
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
|
|
"github.com/harmony-one/bls/ffi/go/bls"
|
|
|
|
msg_pb "github.com/harmony-one/harmony/api/proto/message"
|
|
|
|
"github.com/harmony-one/harmony/core/types"
|
|
|
|
bls_cosi "github.com/harmony-one/harmony/crypto/bls"
|
|
|
|
"github.com/harmony-one/harmony/internal/utils"
|
|
|
|
)
|
|
|
|
|
|
|
|
// FBFTLog represents the log stored by a node during FBFT process
|
|
|
|
type FBFTLog struct {
|
|
|
|
blocks mapset.Set //store blocks received in FBFT
|
|
|
|
messages mapset.Set // store messages received in FBFT
|
|
|
|
maxLogSize uint32
|
|
|
|
mutex sync.Mutex
|
|
|
|
}
|
|
|
|
|
|
|
|
// FBFTMessage is the record of pbft messages received by a node during FBFT process
|
|
|
|
type FBFTMessage struct {
|
|
|
|
MessageType msg_pb.MessageType
|
|
|
|
ViewID uint64
|
|
|
|
BlockNum uint64
|
|
|
|
BlockHash common.Hash
|
|
|
|
Block []byte
|
|
|
|
SenderPubkey *bls.PublicKey
|
|
|
|
LeaderPubkey *bls.PublicKey
|
|
|
|
Payload []byte
|
|
|
|
ViewchangeSig *bls.Sign
|
|
|
|
ViewidSig *bls.Sign
|
|
|
|
M2AggSig *bls.Sign
|
|
|
|
M2Bitmap *bls_cosi.Mask
|
|
|
|
M3AggSig *bls.Sign
|
|
|
|
M3Bitmap *bls_cosi.Mask
|
|
|
|
}
|
|
|
|
|
[double-sign] Provide proof of double sign in slash record sent to beaconchain (#2253)
* [double-sign] Commit changes in consensus needed for double-sign
* [double-sign] Leader captures when valdator double signs, broadcasts to beaconchain
* [slash] Add quick iteration tool for testing double-signing
* [slash] Add webhook example
* [slash] Add http server for hook to trigger double sign behavior
* [double-sign] Use bin/trigger-double-sign to cause a double-sign
* [double-sign] Full feedback loop working
* [slash] Thread through the slash records in the block proposal step
* [slash] Compute the slashing rate
* [double-sign] Generalize yaml malicious for many keys
* [double-sign][slash] Modify data structures, verify via webhook handler
* [slash][double-sign] Find one address of bls public key signer, seemingly settle on data structures
* [slash] Apply to state slashing for double signing
* [slash][double-sign] Checkpoint for working code that slashes on beaconchain
* [slash] Keep track of the total slash and total reporters reward
* [slash] Dump account state before and after the slash
* [slash] Satisfy Travis
* [slash][state] Apply slash to the snapshot at beginning of epoch, now need to capture also the new delegates
* [slash] Capture the unique new delegations since snapshot as well
* [slash] Filter undelegation by epoch of double sign
* [slash] Add TODO of correctness needed in slash needs on off-chain data
* [rpc] Fix closure issue on shardID
* [slash] Add delegator to double-sign testing script
* [slash] Expand crt-validator.sh with commenting printfs and make delegation
* [slash] Finish track payment of leftover slash debt after undelegation runs out
* [slash] Now be explicit about error wrt delegatorSlashApply
* [slash] Capture specific sanity check on slash paidoff
* [slash] Track slash from undelegation piecemeal
* [slash][delegation] Named slice types, .String()
* [slash] Do no RLP encode twice, once is enough
* [slash] Remove special case of validators own delegation
* [slash] Refactor approach to slash state application
* [slash] Begin expanding out Verify
* [slash] Slash on snapshot delegations, not current
* [slash] Fix Epoch Cmp
* [slash] Third iteration on slash logic
* [slash] Use full slash amount
* [slash] More log, whitespace
* [slash] Remove Println, add log
* [slash] Remove debug Println
* [slash] Add record in unit test
* [slash] Build Validator snapshot, current. Fill out slash record
* [slash] Need to get RLP dump of a header to use in test
* [slash] Factor out double sign test constants
* [slash] Factor out common for validator, stub out slash application, finish out deserialization setup
* [slash] Factor out data structure creation because of var lexical scoping
* [slash] Seem to have pipeline of unit test e2e executing
* [slash] Add expected snitch, slash amounts
* [slash] Checkpoint
* [slash] Unit test correctly checks case of validator own stake which could drop below 1 ONE in slashing
* [config] add double-sign testnet config (#1)
Signed-off-by: Leo Chen <leo@harmony.one>
* [slash] Commit for as is code & data of current dump.json
* [slash] Order of state operation not correct in test, hence bad results, thank you dlv
* [slash] Add snapshot state dump
* [slash] Pay off slash of validator own delegation correctly
* [slash] Pay off slash debt with special case for min-self
* [slash] Pass first scenario conclusively
* [slash] 2% slash passes unit test for own delegation and external
* [slash] Parameterize unit test to easily test .02 vs .80 slash
* [slash] Handle own delegation correctly at 80% slash
* [slash] Have 80% slash working with external delegator
* [slash] Remove debug code from slash
* [slash] Adjust Apply signature, test again for 2% slash
* [slash] Factor out scenario in testing so can test 2% and 80% at same time
* [slash] Correct balance deduction on plan delegation
* [slash] Mock out ChainReader for TestVerify
* [slash] Small surface area interface, now feedback loop for verify
* [slash] Remove development json
* [slash] trigger-double-sign consumes yaml
* [slash] Remove dead code
* [slash][test] Factor ValidatorWrapper into scenario
* [slash][test] Add example from local-testing dump - caution might be off
* [slash] Factor out mutation of slashDebt
* [slash][test] Factor out tests so can easily load test-case from bytes
* [slash] Fix payment mistake in validator own delegation wrt min-self-delgation respected
* [slash] Satisfy Travis
* [slash] Begin cleanup of PR
* [slash] Apply slash from header to Finalize via state processor
* [slash] Productionize code, Println => logs; adjust slash picked in newblock
* [slash] Need pointer for rlp.Decode
* [slash] ValidatorInformation use full wrapper
* Fix median stake
* [staking] Adjust MarshalJSON for Validator, Wrapper
* Refactor offchain data commit; Make block onchain/offchain commit atomic (#2279)
* Refactor offchain data; Add epoch to ValidatorSnapshot
* Make block onchain/offchain data commit atomically
* [slash][committee] Set .Active to false on double sign, do not consider banned or inactive for committee assignment
* [effective] VC eligible.go
* [consensus] Redundant field in printf
* [docker] import-ks for a dev account
* [slash] Create BLS key for dockerfile and crt-validator.sh
* [slash][docker] Easy deployment of double-sign testing
* [docker] Have slash work as single docker command
* [rpc] Fix median-stake RPC
* [slash] Update webhook with default docker BLS key
* [docker][slash] Fresh yaml copy for docker build, remove dev code in main.go
* [slash] Remove helper binary, commented out code, change to local config
* [params] Factor out test genesis value
* Add shard checking to Tx-Pool & correct blacklist (#2301)
* [core] Fix blacklist & add shardID check
* [staking + node + cmd] Fix blacklist & add shardID check
* [slash] Adjust to PR comments part 1
* [docker] Use different throw away funded account
* [docker] Create easier testing for delegation with private keys
* [docker] Update yaml
* [slash] Remove special case for slashing validator own delegation wrt min-self-delegate
* [docker] Install nano as well
* [slash] Early error if banned
* [quorum] Expose earning account in decider marshal json
* Revert "Refactor offchain data commit; Make block onchain/offchain commit atomic (#2279)"
This reverts commit 9ffbf682c075b49188923c65a0bbf39ac188be00.
* [slash] Add non-sanity check way to update validator
* [reward] Increase percision on percentage in schedule
* [slash] Adjust logs
* [committee] Check eligibility of validator before doing sanity check
* [slash] Update docker
* [slash] Move create validator script to test
* [slash] More log
* [param] Make things faster
* [slash][off-chain] Clear out slashes from pending in writeblockwithstate
* [cross-link] Log is not error, just info
* [blockchain] Not necessary to guard DeletePendingSlashingCandidates
* [slash][consensus] Use plain []byte for signature b/c bls.Sign has private impl fields, rlp does not encode that
* [slash][test] Use faucet as sender, assume user imported
* [slash] Test setup
* [slash] reserve error for real error in logs
* [slash][availability] Apply availability correct, bump signing count each block
* [slash][staking] Consider banned field in sanity check, pay snitch only half of what was actually slashed
* [slash] Pay as much as can
* [slash] use right nowAmt
* [slash] Take away from rewards as well
* [slash] iterate faster
* [slash] Remove dev based timing
* [slash] Add more log, sanity check incoming slash records, only count external for slash rate
* [availability][state] Adjust signature of ValidatorWrapper wrt state, filter out for staked validators, correct availaibility measure on running counters
* [availability] More log
* [slash] Simply pre slash erra slashing
* [slash] Remove development code
* [slash] Use height from recvMsg, todo on epoch
* [staking] Not necessary to touch LastEpochInCommittee in staking_verifier
* [slash] Undo ds in endpoint pattern config
* [slash] Add TODO and log when delegation becomes 0 b/c slash debt payment
* [slash] Abstract staked validators from shard.State into type, set slash rate based BLSKey count
Co-authored-by: Leo Chen <leo@harmony.one>
Co-authored-by: flicker-harmony <52401354+flicker-harmony@users.noreply.github.com>
Co-authored-by: Rongjian Lan <rongjian@harmony.one>
Co-authored-by: Daniel Van Der Maden <daniel@harmony.one>
5 years ago
|
|
|
// String ..
|
|
|
|
func (m *FBFTMessage) String() string {
|
|
|
|
return fmt.Sprintf(
|
|
|
|
"[Type:%s ViewID:%d Num:%d BlockHash:%s Sender:%s Leader:%s]",
|
|
|
|
m.MessageType.String(),
|
|
|
|
m.ViewID,
|
|
|
|
m.BlockNum,
|
|
|
|
m.BlockHash.Hex(),
|
|
|
|
m.SenderPubkey.SerializeToHexStr(),
|
|
|
|
m.LeaderPubkey.SerializeToHexStr(),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewFBFTLog returns new instance of FBFTLog
|
|
|
|
func NewFBFTLog() *FBFTLog {
|
|
|
|
blocks := mapset.NewSet()
|
|
|
|
messages := mapset.NewSet()
|
|
|
|
logSize := maxLogSize
|
|
|
|
pbftLog := FBFTLog{blocks: blocks, messages: messages, maxLogSize: logSize}
|
|
|
|
return &pbftLog
|
|
|
|
}
|
|
|
|
|
|
|
|
// Blocks return the blocks stored in the log
|
|
|
|
func (log *FBFTLog) Blocks() mapset.Set {
|
|
|
|
return log.blocks
|
|
|
|
}
|
|
|
|
|
|
|
|
// Messages return the messages stored in the log
|
|
|
|
func (log *FBFTLog) Messages() mapset.Set {
|
|
|
|
return log.messages
|
|
|
|
}
|
|
|
|
|
|
|
|
// AddBlock add a new block into the log
|
|
|
|
func (log *FBFTLog) AddBlock(block *types.Block) {
|
|
|
|
log.blocks.Add(block)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetBlockByHash returns the block matches the given block hash
|
|
|
|
func (log *FBFTLog) GetBlockByHash(hash common.Hash) *types.Block {
|
|
|
|
var found *types.Block
|
|
|
|
it := log.Blocks().Iterator()
|
|
|
|
for block := range it.C {
|
|
|
|
if block.(*types.Block).Header().Hash() == hash {
|
|
|
|
found = block.(*types.Block)
|
|
|
|
it.Stop()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return found
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetBlocksByNumber returns the blocks match the given block number
|
|
|
|
func (log *FBFTLog) GetBlocksByNumber(number uint64) []*types.Block {
|
|
|
|
found := []*types.Block{}
|
|
|
|
it := log.Blocks().Iterator()
|
|
|
|
for block := range it.C {
|
|
|
|
if block.(*types.Block).NumberU64() == number {
|
|
|
|
found = append(found, block.(*types.Block))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return found
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeleteBlocksLessThan deletes blocks less than given block number
|
|
|
|
func (log *FBFTLog) DeleteBlocksLessThan(number uint64) {
|
|
|
|
found := mapset.NewSet()
|
|
|
|
it := log.Blocks().Iterator()
|
|
|
|
for block := range it.C {
|
|
|
|
if block.(*types.Block).NumberU64() < number {
|
|
|
|
found.Add(block)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
log.blocks = log.blocks.Difference(found)
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeleteBlockByNumber deletes block of specific number
|
|
|
|
func (log *FBFTLog) DeleteBlockByNumber(number uint64) {
|
|
|
|
found := mapset.NewSet()
|
|
|
|
it := log.Blocks().Iterator()
|
|
|
|
for block := range it.C {
|
|
|
|
if block.(*types.Block).NumberU64() == number {
|
|
|
|
found.Add(block)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
log.blocks = log.blocks.Difference(found)
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeleteMessagesLessThan deletes messages less than given block number
|
|
|
|
func (log *FBFTLog) DeleteMessagesLessThan(number uint64) {
|
|
|
|
found := mapset.NewSet()
|
|
|
|
it := log.Messages().Iterator()
|
|
|
|
for msg := range it.C {
|
|
|
|
if msg.(*FBFTMessage).BlockNum < number {
|
|
|
|
found.Add(msg)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
log.messages = log.messages.Difference(found)
|
|
|
|
}
|
|
|
|
|
|
|
|
// AddMessage adds a pbft message into the log
|
|
|
|
func (log *FBFTLog) AddMessage(msg *FBFTMessage) {
|
|
|
|
log.messages.Add(msg)
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetMessagesByTypeSeqViewHash returns pbft messages with matching type, blockNum, viewID and blockHash
|
|
|
|
func (log *FBFTLog) GetMessagesByTypeSeqViewHash(typ msg_pb.MessageType, blockNum uint64, viewID uint64, blockHash common.Hash) []*FBFTMessage {
|
|
|
|
found := []*FBFTMessage{}
|
|
|
|
it := log.Messages().Iterator()
|
|
|
|
for msg := range it.C {
|
|
|
|
if msg.(*FBFTMessage).MessageType == typ && msg.(*FBFTMessage).BlockNum == blockNum && msg.(*FBFTMessage).ViewID == viewID && msg.(*FBFTMessage).BlockHash == blockHash {
|
|
|
|
found = append(found, msg.(*FBFTMessage))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return found
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetMessagesByTypeSeq returns pbft messages with matching type, blockNum
|
|
|
|
func (log *FBFTLog) GetMessagesByTypeSeq(typ msg_pb.MessageType, blockNum uint64) []*FBFTMessage {
|
|
|
|
found := []*FBFTMessage{}
|
|
|
|
it := log.Messages().Iterator()
|
|
|
|
for msg := range it.C {
|
|
|
|
if msg.(*FBFTMessage).MessageType == typ && msg.(*FBFTMessage).BlockNum == blockNum {
|
|
|
|
found = append(found, msg.(*FBFTMessage))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return found
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetMessagesByTypeSeqHash returns pbft messages with matching type, blockNum
|
|
|
|
func (log *FBFTLog) GetMessagesByTypeSeqHash(typ msg_pb.MessageType, blockNum uint64, blockHash common.Hash) []*FBFTMessage {
|
|
|
|
found := []*FBFTMessage{}
|
|
|
|
it := log.Messages().Iterator()
|
|
|
|
for msg := range it.C {
|
|
|
|
if msg.(*FBFTMessage).MessageType == typ && msg.(*FBFTMessage).BlockNum == blockNum && msg.(*FBFTMessage).BlockHash == blockHash {
|
|
|
|
found = append(found, msg.(*FBFTMessage))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return found
|
|
|
|
}
|
|
|
|
|
|
|
|
// HasMatchingAnnounce returns whether the log contains announce type message with given blockNum, blockHash
|
|
|
|
func (log *FBFTLog) HasMatchingAnnounce(blockNum uint64, blockHash common.Hash) bool {
|
|
|
|
found := log.GetMessagesByTypeSeqHash(msg_pb.MessageType_ANNOUNCE, blockNum, blockHash)
|
|
|
|
return len(found) >= 1
|
|
|
|
}
|
|
|
|
|
|
|
|
// HasMatchingViewAnnounce returns whether the log contains announce type message with given blockNum, viewID and blockHash
|
|
|
|
func (log *FBFTLog) HasMatchingViewAnnounce(blockNum uint64, viewID uint64, blockHash common.Hash) bool {
|
|
|
|
found := log.GetMessagesByTypeSeqViewHash(msg_pb.MessageType_ANNOUNCE, blockNum, viewID, blockHash)
|
|
|
|
return len(found) >= 1
|
|
|
|
}
|
|
|
|
|
|
|
|
// HasMatchingPrepared returns whether the log contains prepared message with given blockNum, viewID and blockHash
|
|
|
|
func (log *FBFTLog) HasMatchingPrepared(blockNum uint64, blockHash common.Hash) bool {
|
|
|
|
found := log.GetMessagesByTypeSeqHash(msg_pb.MessageType_PREPARED, blockNum, blockHash)
|
|
|
|
return len(found) >= 1
|
|
|
|
}
|
|
|
|
|
|
|
|
// HasMatchingViewPrepared returns whether the log contains prepared message with given blockNum, viewID and blockHash
|
|
|
|
func (log *FBFTLog) HasMatchingViewPrepared(blockNum uint64, viewID uint64, blockHash common.Hash) bool {
|
|
|
|
found := log.GetMessagesByTypeSeqViewHash(msg_pb.MessageType_PREPARED, blockNum, viewID, blockHash)
|
|
|
|
return len(found) >= 1
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetMessagesByTypeSeqView returns pbft messages with matching type, blockNum and viewID
|
|
|
|
func (log *FBFTLog) GetMessagesByTypeSeqView(typ msg_pb.MessageType, blockNum uint64, viewID uint64) []*FBFTMessage {
|
|
|
|
found := []*FBFTMessage{}
|
|
|
|
it := log.Messages().Iterator()
|
|
|
|
for msg := range it.C {
|
|
|
|
if msg.(*FBFTMessage).MessageType != typ || msg.(*FBFTMessage).BlockNum != blockNum || msg.(*FBFTMessage).ViewID != viewID {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
found = append(found, msg.(*FBFTMessage))
|
|
|
|
}
|
|
|
|
return found
|
|
|
|
}
|
|
|
|
|
|
|
|
// FindMessageByMaxViewID returns the message that has maximum ViewID
|
|
|
|
func (log *FBFTLog) FindMessageByMaxViewID(msgs []*FBFTMessage) *FBFTMessage {
|
|
|
|
if len(msgs) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
maxIdx := -1
|
|
|
|
maxViewID := uint64(0)
|
|
|
|
for k, v := range msgs {
|
|
|
|
if v.ViewID >= maxViewID {
|
|
|
|
maxIdx = k
|
|
|
|
maxViewID = v.ViewID
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return msgs[maxIdx]
|
|
|
|
}
|
|
|
|
|
|
|
|
// ParseFBFTMessage parses FBFT message into FBFTMessage structure
|
|
|
|
func ParseFBFTMessage(msg *msg_pb.Message) (*FBFTMessage, error) {
|
[double-sign] Provide proof of double sign in slash record sent to beaconchain (#2253)
* [double-sign] Commit changes in consensus needed for double-sign
* [double-sign] Leader captures when valdator double signs, broadcasts to beaconchain
* [slash] Add quick iteration tool for testing double-signing
* [slash] Add webhook example
* [slash] Add http server for hook to trigger double sign behavior
* [double-sign] Use bin/trigger-double-sign to cause a double-sign
* [double-sign] Full feedback loop working
* [slash] Thread through the slash records in the block proposal step
* [slash] Compute the slashing rate
* [double-sign] Generalize yaml malicious for many keys
* [double-sign][slash] Modify data structures, verify via webhook handler
* [slash][double-sign] Find one address of bls public key signer, seemingly settle on data structures
* [slash] Apply to state slashing for double signing
* [slash][double-sign] Checkpoint for working code that slashes on beaconchain
* [slash] Keep track of the total slash and total reporters reward
* [slash] Dump account state before and after the slash
* [slash] Satisfy Travis
* [slash][state] Apply slash to the snapshot at beginning of epoch, now need to capture also the new delegates
* [slash] Capture the unique new delegations since snapshot as well
* [slash] Filter undelegation by epoch of double sign
* [slash] Add TODO of correctness needed in slash needs on off-chain data
* [rpc] Fix closure issue on shardID
* [slash] Add delegator to double-sign testing script
* [slash] Expand crt-validator.sh with commenting printfs and make delegation
* [slash] Finish track payment of leftover slash debt after undelegation runs out
* [slash] Now be explicit about error wrt delegatorSlashApply
* [slash] Capture specific sanity check on slash paidoff
* [slash] Track slash from undelegation piecemeal
* [slash][delegation] Named slice types, .String()
* [slash] Do no RLP encode twice, once is enough
* [slash] Remove special case of validators own delegation
* [slash] Refactor approach to slash state application
* [slash] Begin expanding out Verify
* [slash] Slash on snapshot delegations, not current
* [slash] Fix Epoch Cmp
* [slash] Third iteration on slash logic
* [slash] Use full slash amount
* [slash] More log, whitespace
* [slash] Remove Println, add log
* [slash] Remove debug Println
* [slash] Add record in unit test
* [slash] Build Validator snapshot, current. Fill out slash record
* [slash] Need to get RLP dump of a header to use in test
* [slash] Factor out double sign test constants
* [slash] Factor out common for validator, stub out slash application, finish out deserialization setup
* [slash] Factor out data structure creation because of var lexical scoping
* [slash] Seem to have pipeline of unit test e2e executing
* [slash] Add expected snitch, slash amounts
* [slash] Checkpoint
* [slash] Unit test correctly checks case of validator own stake which could drop below 1 ONE in slashing
* [config] add double-sign testnet config (#1)
Signed-off-by: Leo Chen <leo@harmony.one>
* [slash] Commit for as is code & data of current dump.json
* [slash] Order of state operation not correct in test, hence bad results, thank you dlv
* [slash] Add snapshot state dump
* [slash] Pay off slash of validator own delegation correctly
* [slash] Pay off slash debt with special case for min-self
* [slash] Pass first scenario conclusively
* [slash] 2% slash passes unit test for own delegation and external
* [slash] Parameterize unit test to easily test .02 vs .80 slash
* [slash] Handle own delegation correctly at 80% slash
* [slash] Have 80% slash working with external delegator
* [slash] Remove debug code from slash
* [slash] Adjust Apply signature, test again for 2% slash
* [slash] Factor out scenario in testing so can test 2% and 80% at same time
* [slash] Correct balance deduction on plan delegation
* [slash] Mock out ChainReader for TestVerify
* [slash] Small surface area interface, now feedback loop for verify
* [slash] Remove development json
* [slash] trigger-double-sign consumes yaml
* [slash] Remove dead code
* [slash][test] Factor ValidatorWrapper into scenario
* [slash][test] Add example from local-testing dump - caution might be off
* [slash] Factor out mutation of slashDebt
* [slash][test] Factor out tests so can easily load test-case from bytes
* [slash] Fix payment mistake in validator own delegation wrt min-self-delgation respected
* [slash] Satisfy Travis
* [slash] Begin cleanup of PR
* [slash] Apply slash from header to Finalize via state processor
* [slash] Productionize code, Println => logs; adjust slash picked in newblock
* [slash] Need pointer for rlp.Decode
* [slash] ValidatorInformation use full wrapper
* Fix median stake
* [staking] Adjust MarshalJSON for Validator, Wrapper
* Refactor offchain data commit; Make block onchain/offchain commit atomic (#2279)
* Refactor offchain data; Add epoch to ValidatorSnapshot
* Make block onchain/offchain data commit atomically
* [slash][committee] Set .Active to false on double sign, do not consider banned or inactive for committee assignment
* [effective] VC eligible.go
* [consensus] Redundant field in printf
* [docker] import-ks for a dev account
* [slash] Create BLS key for dockerfile and crt-validator.sh
* [slash][docker] Easy deployment of double-sign testing
* [docker] Have slash work as single docker command
* [rpc] Fix median-stake RPC
* [slash] Update webhook with default docker BLS key
* [docker][slash] Fresh yaml copy for docker build, remove dev code in main.go
* [slash] Remove helper binary, commented out code, change to local config
* [params] Factor out test genesis value
* Add shard checking to Tx-Pool & correct blacklist (#2301)
* [core] Fix blacklist & add shardID check
* [staking + node + cmd] Fix blacklist & add shardID check
* [slash] Adjust to PR comments part 1
* [docker] Use different throw away funded account
* [docker] Create easier testing for delegation with private keys
* [docker] Update yaml
* [slash] Remove special case for slashing validator own delegation wrt min-self-delegate
* [docker] Install nano as well
* [slash] Early error if banned
* [quorum] Expose earning account in decider marshal json
* Revert "Refactor offchain data commit; Make block onchain/offchain commit atomic (#2279)"
This reverts commit 9ffbf682c075b49188923c65a0bbf39ac188be00.
* [slash] Add non-sanity check way to update validator
* [reward] Increase percision on percentage in schedule
* [slash] Adjust logs
* [committee] Check eligibility of validator before doing sanity check
* [slash] Update docker
* [slash] Move create validator script to test
* [slash] More log
* [param] Make things faster
* [slash][off-chain] Clear out slashes from pending in writeblockwithstate
* [cross-link] Log is not error, just info
* [blockchain] Not necessary to guard DeletePendingSlashingCandidates
* [slash][consensus] Use plain []byte for signature b/c bls.Sign has private impl fields, rlp does not encode that
* [slash][test] Use faucet as sender, assume user imported
* [slash] Test setup
* [slash] reserve error for real error in logs
* [slash][availability] Apply availability correct, bump signing count each block
* [slash][staking] Consider banned field in sanity check, pay snitch only half of what was actually slashed
* [slash] Pay as much as can
* [slash] use right nowAmt
* [slash] Take away from rewards as well
* [slash] iterate faster
* [slash] Remove dev based timing
* [slash] Add more log, sanity check incoming slash records, only count external for slash rate
* [availability][state] Adjust signature of ValidatorWrapper wrt state, filter out for staked validators, correct availaibility measure on running counters
* [availability] More log
* [slash] Simply pre slash erra slashing
* [slash] Remove development code
* [slash] Use height from recvMsg, todo on epoch
* [staking] Not necessary to touch LastEpochInCommittee in staking_verifier
* [slash] Undo ds in endpoint pattern config
* [slash] Add TODO and log when delegation becomes 0 b/c slash debt payment
* [slash] Abstract staked validators from shard.State into type, set slash rate based BLSKey count
Co-authored-by: Leo Chen <leo@harmony.one>
Co-authored-by: flicker-harmony <52401354+flicker-harmony@users.noreply.github.com>
Co-authored-by: Rongjian Lan <rongjian@harmony.one>
Co-authored-by: Daniel Van Der Maden <daniel@harmony.one>
5 years ago
|
|
|
// TODO Have this do sanity checks on the message please
|
|
|
|
pbftMsg := FBFTMessage{}
|
|
|
|
pbftMsg.MessageType = msg.GetType()
|
|
|
|
consensusMsg := msg.GetConsensus()
|
|
|
|
pbftMsg.ViewID = consensusMsg.ViewId
|
|
|
|
pbftMsg.BlockNum = consensusMsg.BlockNum
|
|
|
|
copy(pbftMsg.BlockHash[:], consensusMsg.BlockHash[:])
|
|
|
|
pbftMsg.Payload = make([]byte, len(consensusMsg.Payload))
|
|
|
|
copy(pbftMsg.Payload[:], consensusMsg.Payload[:])
|
|
|
|
pbftMsg.Block = make([]byte, len(consensusMsg.Block))
|
|
|
|
copy(pbftMsg.Block[:], consensusMsg.Block[:])
|
|
|
|
pubKey, err := bls_cosi.BytesToBLSPublicKey(consensusMsg.SenderPubkey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
pbftMsg.SenderPubkey = pubKey
|
|
|
|
return &pbftMsg, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ParseViewChangeMessage parses view change message into FBFTMessage structure
|
|
|
|
func ParseViewChangeMessage(msg *msg_pb.Message) (*FBFTMessage, error) {
|
|
|
|
pbftMsg := FBFTMessage{}
|
|
|
|
pbftMsg.MessageType = msg.GetType()
|
|
|
|
if pbftMsg.MessageType != msg_pb.MessageType_VIEWCHANGE {
|
|
|
|
return nil, fmt.Errorf("ParseViewChangeMessage: incorrect message type %s", pbftMsg.MessageType)
|
|
|
|
}
|
|
|
|
|
|
|
|
vcMsg := msg.GetViewchange()
|
|
|
|
pbftMsg.ViewID = vcMsg.ViewId
|
|
|
|
pbftMsg.BlockNum = vcMsg.BlockNum
|
|
|
|
pbftMsg.Payload = make([]byte, len(vcMsg.Payload))
|
|
|
|
copy(pbftMsg.Payload[:], vcMsg.Payload[:])
|
|
|
|
|
|
|
|
pubKey, err := bls_cosi.BytesToBLSPublicKey(vcMsg.SenderPubkey)
|
|
|
|
if err != nil {
|
|
|
|
utils.Logger().Warn().Err(err).Msg("ParseViewChangeMessage failed to parse senderpubkey")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
leaderKey, err := bls_cosi.BytesToBLSPublicKey(vcMsg.LeaderPubkey)
|
|
|
|
if err != nil {
|
|
|
|
utils.Logger().Warn().Err(err).Msg("ParseViewChangeMessage failed to parse leaderpubkey")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
vcSig := bls.Sign{}
|
|
|
|
err = vcSig.Deserialize(vcMsg.ViewchangeSig)
|
|
|
|
if err != nil {
|
|
|
|
utils.Logger().Warn().Err(err).Msg("ParseViewChangeMessage failed to deserialize the viewchange signature")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
vcSig1 := bls.Sign{}
|
|
|
|
err = vcSig1.Deserialize(vcMsg.ViewidSig)
|
|
|
|
if err != nil {
|
|
|
|
utils.Logger().Warn().Err(err).Msg("ParseViewChangeMessage failed to deserialize the viewid signature")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
pbftMsg.SenderPubkey = pubKey
|
|
|
|
pbftMsg.LeaderPubkey = leaderKey
|
|
|
|
pbftMsg.ViewchangeSig = &vcSig
|
|
|
|
pbftMsg.ViewidSig = &vcSig1
|
|
|
|
return &pbftMsg, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ParseNewViewMessage parses new view message into FBFTMessage structure
|
|
|
|
func (consensus *Consensus) ParseNewViewMessage(msg *msg_pb.Message) (*FBFTMessage, error) {
|
|
|
|
FBFTMsg := FBFTMessage{}
|
|
|
|
FBFTMsg.MessageType = msg.GetType()
|
|
|
|
|
|
|
|
if FBFTMsg.MessageType != msg_pb.MessageType_NEWVIEW {
|
|
|
|
return nil, fmt.Errorf("ParseNewViewMessage: incorrect message type %s", FBFTMsg.MessageType)
|
|
|
|
}
|
|
|
|
|
|
|
|
vcMsg := msg.GetViewchange()
|
|
|
|
FBFTMsg.ViewID = vcMsg.ViewId
|
|
|
|
FBFTMsg.BlockNum = vcMsg.BlockNum
|
|
|
|
FBFTMsg.Payload = make([]byte, len(vcMsg.Payload))
|
|
|
|
copy(FBFTMsg.Payload[:], vcMsg.Payload[:])
|
|
|
|
|
|
|
|
pubKey, err := bls_cosi.BytesToBLSPublicKey(vcMsg.SenderPubkey)
|
|
|
|
if err != nil {
|
|
|
|
utils.Logger().Warn().Err(err).Msg("ParseViewChangeMessage failed to parse senderpubkey")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
FBFTMsg.SenderPubkey = pubKey
|
|
|
|
|
|
|
|
if len(vcMsg.M3Aggsigs) > 0 {
|
|
|
|
m3Sig := bls.Sign{}
|
|
|
|
err = m3Sig.Deserialize(vcMsg.M3Aggsigs)
|
|
|
|
if err != nil {
|
|
|
|
utils.Logger().Warn().Err(err).Msg("ParseViewChangeMessage failed to deserialize the multi signature for M3 viewID signature")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
m3mask, err := bls_cosi.NewMask(consensus.Decider.Participants(), nil)
|
|
|
|
if err != nil {
|
|
|
|
utils.Logger().Warn().Err(err).Msg("ParseViewChangeMessage failed to create mask for multi signature")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
m3mask.SetMask(vcMsg.M3Bitmap)
|
|
|
|
FBFTMsg.M3AggSig = &m3Sig
|
|
|
|
FBFTMsg.M3Bitmap = m3mask
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(vcMsg.M2Aggsigs) > 0 {
|
|
|
|
m2Sig := bls.Sign{}
|
|
|
|
err = m2Sig.Deserialize(vcMsg.M2Aggsigs)
|
|
|
|
if err != nil {
|
|
|
|
utils.Logger().Warn().Err(err).Msg("ParseViewChangeMessage failed to deserialize the multi signature for M2 aggregated signature")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
m2mask, err := bls_cosi.NewMask(consensus.Decider.Participants(), nil)
|
|
|
|
if err != nil {
|
|
|
|
utils.Logger().Warn().Err(err).Msg("ParseViewChangeMessage failed to create mask for multi signature")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
m2mask.SetMask(vcMsg.M2Bitmap)
|
|
|
|
FBFTMsg.M2AggSig = &m2Sig
|
|
|
|
FBFTMsg.M2Bitmap = m2mask
|
|
|
|
}
|
|
|
|
|
|
|
|
return &FBFTMsg, nil
|
|
|
|
}
|