package consensus
import (
"bytes"
"encoding/hex"
"errors"
"github.com/ethereum/go-ethereum/rlp"
"strconv"
"time"
"github.com/harmony-one/harmony/core/types"
"github.com/harmony-one/harmony/p2p/host"
"github.com/harmony-one/harmony/services/explorer"
consensus_proto "github.com/harmony-one/harmony/api/consensus"
"github.com/harmony-one/harmony/profiler"
"github.com/dedis/kyber"
"github.com/dedis/kyber/sign/schnorr"
"github.com/harmony-one/harmony/crypto"
"github.com/harmony-one/harmony/log"
"github.com/harmony-one/harmony/p2p"
proto_consensus "github.com/harmony-one/harmony/proto/consensus"
)
const (
waitForEnoughValidators = 1000
)
var (
startTime time . Time
)
// WaitForNewBlock waits for the next new block to run consensus on
func ( consensus * Consensus ) WaitForNewBlock ( blockChannel chan * types . Block ) {
consensus . Log . Debug ( "Waiting for block" , "consensus" , consensus )
for { // keep waiting for new blocks
newBlock := <- blockChannel
// TODO: think about potential race condition
c := consensus . RemovePeers ( consensus . OfflinePeerList )
if c > 0 {
consensus . Log . Debug ( "WaitForNewBlock" , "removed peers" , c )
}
for ! consensus . HasEnoughValidators ( ) {
consensus . Log . Debug ( "Not enough validators" , "# Validators" , len ( consensus . PublicKeys ) )
time . Sleep ( waitForEnoughValidators * time . Millisecond )
}
startTime = time . Now ( )
consensus . Log . Debug ( "STARTING CONSENSUS" , "numTxs" , len ( newBlock . Transactions ( ) ) , "consensus" , consensus , "startTime" , startTime , "publicKeys" , len ( consensus . PublicKeys ) )
for consensus . state == Finished {
// time.Sleep(500 * time.Millisecond)
consensus . ResetState ( )
consensus . startConsensus ( newBlock )
break
}
}
}
// ProcessMessageLeader dispatches consensus message for the leader.
func ( consensus * Consensus ) ProcessMessageLeader ( message [ ] byte ) {
msgType , err := proto_consensus . GetConsensusMessageType ( message )
if err != nil {
consensus . Log . Error ( "Failed to get consensus message type." , "err" , err , "consensus" , consensus )
}
payload , err := proto_consensus . GetConsensusMessagePayload ( message )
if err != nil {
consensus . Log . Error ( "Failed to get consensus message payload." , "err" , err , "consensus" , consensus )
}
switch msgType {
case proto_consensus . Commit :
consensus . processCommitMessage ( payload , ChallengeDone )
case proto_consensus . Response :
consensus . processResponseMessage ( payload , CollectiveSigDone )
case proto_consensus . FinalCommit :
consensus . processCommitMessage ( payload , FinalChallengeDone )
case proto_consensus . FinalResponse :
consensus . processResponseMessage ( payload , Finished )
default :
consensus . Log . Error ( "Unexpected message type" , "msgType" , msgType , "consensus" , consensus )
}
}
// startConsensus starts a new consensus for a block by broadcast a announce message to the validators
func ( consensus * Consensus ) startConsensus ( newBlock * types . Block ) {
// Copy over block hash and block header data
blockHash := newBlock . Hash ( )
copy ( consensus . blockHash [ : ] , blockHash [ : ] )
consensus . Log . Debug ( "Start encoding block" )
// prepare message and broadcast to validators
encodedBlock , err := rlp . EncodeToBytes ( newBlock )
if err != nil {
consensus . Log . Debug ( "Failed encoding block" )
return
}
consensus . blockHeader = encodedBlock
consensus . Log . Debug ( "Stop encoding block" )
msgToSend := consensus . constructAnnounceMessage ( )
// Set state to AnnounceDone
consensus . state = AnnounceDone
consensus . commitByLeader ( true )
host . BroadcastMessageFromLeader ( consensus . host , consensus . GetValidatorPeers ( ) , msgToSend , consensus . OfflinePeers )
}
// commitByLeader commits to the message itself before receiving others commits
func ( consensus * Consensus ) commitByLeader ( firstRound bool ) {
// Generate leader's own commitment
secret , commitment := crypto . Commit ( crypto . Ed25519Curve )
consensus . secret [ consensus . consensusID ] = secret
if firstRound {
consensus . mutex . Lock ( )
defer consensus . mutex . Unlock ( )
( * consensus . commitments ) [ consensus . nodeID ] = commitment
consensus . bitmap . SetKey ( consensus . pubKey , true )
} else {
( * consensus . finalCommitments ) [ consensus . nodeID ] = commitment
consensus . finalBitmap . SetKey ( consensus . pubKey , true )
}
}
// processCommitMessage processes the commit message sent from validators
func ( consensus * Consensus ) processCommitMessage ( payload [ ] byte , targetState State ) {
message := consensus_proto . Message { }
message . XXX_Unmarshal ( payload )
consensusID := message . ConsensusId
blockHash := message . BlockHash
validatorID := message . SenderId
commitment := message . Payload
signature := message . Signature
// Verify signature
v , ok := consensus . validators . Load ( validatorID )
if ! ok {
consensus . Log . Warn ( "Received message from unrecognized validator" , "validatorID" , validatorID , "consensus" , consensus )
return
}
value , ok := v . ( p2p . Peer )
if ! ok {
consensus . Log . Warn ( "Invalid validator" , "validatorID" , validatorID , "consensus" , consensus )
return
}
message . Signature = nil
messageBytes , err := message . XXX_Marshal ( [ ] byte { } , true )
if err != nil {
consensus . Log . Warn ( "Failed to marshal the announce message" , "error" , err )
}
if schnorr . Verify ( crypto . Ed25519Curve , value . PubKey , messageBytes , signature ) != nil {
consensus . Log . Warn ( "Received message with invalid signature" , "validatorKey" , consensus . leader . PubKey , "consensus" , consensus )
return
}
// check consensus Id
consensus . mutex . Lock ( )
defer consensus . mutex . Unlock ( )
if consensusID != consensus . consensusID {
consensus . Log . Warn ( "Received Commit with wrong consensus Id" , "myConsensusId" , consensus . consensusID , "theirConsensusId" , consensusID , "consensus" , consensus )
return
}
if ! bytes . Equal ( blockHash , consensus . blockHash [ : ] ) {
consensus . Log . Warn ( "Received Commit with wrong blockHash" , "myConsensusId" , consensus . consensusID , "theirConsensusId" , consensusID , "consensus" , consensus )
return
}
commitments := consensus . commitments // targetState == ChallengeDone
bitmap := consensus . bitmap
if targetState == FinalChallengeDone {
commitments = consensus . finalCommitments
bitmap = consensus . finalBitmap
}
// proceed only when the message is not received before
_ , ok = ( * commitments ) [ validatorID ]
shouldProcess := ! ok
if len ( ( * commitments ) ) >= ( ( len ( consensus . PublicKeys ) * 2 ) / 3 + 1 ) {
shouldProcess = false
}
if shouldProcess {
point := crypto . Ed25519Curve . Point ( )
point . UnmarshalBinary ( commitment )
( * commitments ) [ validatorID ] = point
consensus . Log . Debug ( "Received new commit message" , "num" , len ( * commitments ) , "validatorID" , validatorID , "PublicKeys" , len ( consensus . PublicKeys ) )
// Set the bitmap indicate this validate signed. TODO: figure out how to resolve the inconsistency of validators from commit and response messages
bitmap . SetKey ( value . PubKey , true )
}
if ! shouldProcess {
consensus . Log . Debug ( "Received additional new commit message" , "validatorID" , validatorID )
return
}
if len ( ( * commitments ) ) >= ( ( len ( consensus . PublicKeys ) * 2 ) / 3 + 1 ) && consensus . state < targetState {
consensus . Log . Debug ( "Enough commitments received with signatures" , "num" , len ( * commitments ) , "state" , consensus . state )
// Broadcast challenge
msgTypeToSend := proto_consensus . Challenge // targetState == ChallengeDone
if targetState == FinalChallengeDone {
msgTypeToSend = proto_consensus . FinalChallenge
}
msgToSend , challengeScalar , aggCommitment := consensus . constructChallengeMessage ( msgTypeToSend )
bytes , err := challengeScalar . MarshalBinary ( )
if err != nil {
log . Error ( "Failed to serialize challenge" )
}
if msgTypeToSend == proto_consensus . Challenge {
copy ( consensus . challenge [ : ] , bytes )
consensus . aggregatedCommitment = aggCommitment
} else if msgTypeToSend == proto_consensus . FinalChallenge {
copy ( consensus . finalChallenge [ : ] , bytes )
consensus . aggregatedFinalCommitment = aggCommitment
}
// Add leader's response
consensus . responseByLeader ( challengeScalar , targetState == ChallengeDone )
// Broadcast challenge message
host . BroadcastMessageFromLeader ( consensus . host , consensus . GetValidatorPeers ( ) , msgToSend , consensus . OfflinePeers )
// Set state to targetState (ChallengeDone or FinalChallengeDone)
consensus . state = targetState
}
}
// Leader commit to the message itself before receiving others commits
func ( consensus * Consensus ) responseByLeader ( challenge kyber . Scalar , firstRound bool ) {
// Generate leader's own commitment
response , err := crypto . Response ( crypto . Ed25519Curve , consensus . priKey , consensus . secret [ consensus . consensusID ] , challenge )
if err == nil {
if firstRound {
( * consensus . responses ) [ consensus . nodeID ] = response
consensus . bitmap . SetKey ( consensus . pubKey , true )
} else {
( * consensus . finalResponses ) [ consensus . nodeID ] = response
consensus . finalBitmap . SetKey ( consensus . pubKey , true )
}
} else {
log . Warn ( "leader failed to generate response" , "err" , err )
}
}
// Processes the response message sent from validators
func ( consensus * Consensus ) processResponseMessage ( payload [ ] byte , targetState State ) {
message := consensus_proto . Message { }
message . XXX_Unmarshal ( payload )
consensusID := message . ConsensusId
blockHash := message . BlockHash
validatorID := message . SenderId
response := message . Payload
signature := message . Signature
shouldProcess := true
consensus . mutex . Lock ( )
defer consensus . mutex . Unlock ( )
// check consensus Id
if consensusID != consensus . consensusID {
shouldProcess = false
consensus . Log . Warn ( "Received Response with wrong consensus Id" , "myConsensusId" , consensus . consensusID , "theirConsensusId" , consensusID , "consensus" , consensus )
}
if ! bytes . Equal ( blockHash , consensus . blockHash [ : ] ) {
consensus . Log . Warn ( "Received Response with wrong blockHash" , "myConsensusId" , consensus . consensusID , "theirConsensusId" , consensusID , "consensus" , consensus )
return
}
// Verify signature
v , ok := consensus . validators . Load ( validatorID )
if ! ok {
consensus . Log . Warn ( "Received message from unrecognized validator" , "validatorID" , validatorID , "consensus" , consensus )
return
}
value , ok := v . ( p2p . Peer )
if ! ok {
consensus . Log . Warn ( "Invalid validator" , "validatorID" , validatorID , "consensus" , consensus )
return
}
message . Signature = nil
messageBytes , err := message . XXX_Marshal ( [ ] byte { } , true )
if err != nil {
consensus . Log . Warn ( "Failed to marshal the announce message" , "error" , err )
}
if schnorr . Verify ( crypto . Ed25519Curve , value . PubKey , messageBytes , signature ) != nil {
consensus . Log . Warn ( "Received message with invalid signature" , "validatorKey" , consensus . leader . PubKey , "consensus" , consensus )
return
}
commitments := consensus . commitments // targetState == CollectiveSigDone
responses := consensus . responses
bitmap := consensus . bitmap
if targetState == Finished {
commitments = consensus . finalCommitments
responses = consensus . finalResponses
bitmap = consensus . finalBitmap
}
// proceed only when the message is not received before
_ , ok = ( * responses ) [ validatorID ]
shouldProcess = shouldProcess && ! ok
if len ( ( * responses ) ) >= ( ( len ( consensus . PublicKeys ) * 2 ) / 3 + 1 ) {
shouldProcess = false
}
if shouldProcess {
// verify the response matches the received commit
responseScalar := crypto . Ed25519Curve . Scalar ( )
responseScalar . UnmarshalBinary ( response )
err := consensus . verifyResponse ( commitments , responseScalar , validatorID )
if err != nil {
consensus . Log . Warn ( "leader failed to verify the response" , "error" , err , "VID" , strconv . Itoa ( int ( validatorID ) ) )
shouldProcess = false
} else {
( * responses ) [ validatorID ] = responseScalar
consensus . Log . Debug ( "Received new response message" , "num" , len ( * responses ) , "validatorID" , strconv . Itoa ( int ( validatorID ) ) )
// Set the bitmap indicate this validate signed. TODO: figure out how to resolve the inconsistency of validators from commit and response messages
bitmap . SetKey ( value . PubKey , true )
}
}
if ! shouldProcess {
consensus . Log . Debug ( "Received new response message" , "validatorID" , strconv . Itoa ( int ( validatorID ) ) )
return
}
threshold := 2
if targetState == Finished {
threshold = 1
}
if len ( * responses ) >= ( ( len ( consensus . PublicKeys ) * threshold ) / 3 + 1 ) && consensus . state != targetState {
if len ( * responses ) >= ( ( len ( consensus . PublicKeys ) * threshold ) / 3 + 1 ) && consensus . state != targetState {
consensus . Log . Debug ( "Enough responses received with signatures" , "num" , len ( * responses ) , "state" , consensus . state )
// Aggregate responses
responseScalars := [ ] kyber . Scalar { }
for _ , val := range * responses {
responseScalars = append ( responseScalars , val )
}
aggregatedResponse , err := crypto . AggregateResponses ( crypto . Ed25519Curve , responseScalars )
if err != nil {
log . Error ( "Failed to aggregate responses" )
return
}
aggregatedCommitment := consensus . aggregatedCommitment
if targetState == Finished {
aggregatedCommitment = consensus . aggregatedFinalCommitment
}
collectiveSigAndBitmap , err := crypto . Sign ( crypto . Ed25519Curve , aggregatedCommitment , aggregatedResponse , bitmap )
if err != nil {
log . Error ( "Failed to create collective signature" )
return
}
log . Info ( "CollectiveSig and Bitmap created." , "size" , len ( collectiveSigAndBitmap ) )
collectiveSig := [ 64 ] byte { }
copy ( collectiveSig [ : ] , collectiveSigAndBitmap [ : 64 ] )
bitmap := collectiveSigAndBitmap [ 64 : ]
// Set state to CollectiveSigDone or Finished
consensus . state = targetState
if consensus . state != Finished {
// Start the second round of Cosi
msgToSend := consensus . constructCollectiveSigMessage ( collectiveSig , bitmap )
host . BroadcastMessageFromLeader ( consensus . host , consensus . GetValidatorPeers ( ) , msgToSend , consensus . OfflinePeers )
consensus . commitByLeader ( false )
} else {
// TODO: reconstruct the whole block from header and transactions
// For now, we used the stored whole block already stored in consensus.blockHeader
var blockHeaderObj types . Block
err = rlp . DecodeBytes ( consensus . blockHeader , & blockHeaderObj )
if err != nil {
consensus . Log . Debug ( "failed to construct the new block after consensus" )
}
// Sign the block
copy ( blockHeaderObj . Header ( ) . Signature [ : ] , collectiveSig [ : ] )
copy ( blockHeaderObj . Header ( ) . Bitmap [ : ] , bitmap )
consensus . OnConsensusDone ( & blockHeaderObj )
consensus . reportMetrics ( blockHeaderObj )
// Dump new block into level db.
explorer . GetStorageInstance ( consensus . leader . IP , consensus . leader . Port , true ) . Dump ( & blockHeaderObj , consensus . consensusID )
// Claim new consensus reached.
consensus . Log . Debug ( "Consensus reached with signatures." , "numOfSignatures" , len ( * responses ) )
// Reset state to Finished, and clear other data.
consensus . ResetState ( )
consensus . consensusID ++
consensus . Log . Debug ( "HOORAY!!! CONSENSUS REACHED!!!" , "consensusID" , consensus . consensusID )
time . Sleep ( 500 * time . Millisecond )
// Send signal to Node so the new block can be added and new round of consensus can be triggered
consensus . ReadySignal <- struct { } { }
}
}
}
}
func ( consensus * Consensus ) verifyResponse ( commitments * map [ uint32 ] kyber . Point , response kyber . Scalar , validatorID uint32 ) error {
if response . Equal ( crypto . Ed25519Curve . Scalar ( ) ) {
return errors . New ( "response is zero valued" )
}
_ , ok := ( * commitments ) [ validatorID ]
if ! ok {
return errors . New ( "no commit is received for the validator" )
}
// TODO(RJ): enable the actual check
//challenge := crypto.Ed25519Curve.Scalar()
//challenge.UnmarshalBinary(consensus.challenge[:])
//
//// compute Q = sG + r*pubKey
//sG := crypto.Ed25519Curve.Point().Mul(response, nil)
//r_pubKey := crypto.Ed25519Curve.Point().Mul(challenge, consensus.validators[validatorID].PubKey)
//Q := crypto.Ed25519Curve.Point().Add(sG, r_pubKey)
//
//if !Q.Equal(commit) {
// return errors.New("recreated commit doesn't match the received one")
//}
return nil
}
func ( consensus * Consensus ) reportMetrics ( block types . Block ) {
endTime := time . Now ( )
timeElapsed := endTime . Sub ( startTime )
numOfTxs := len ( block . Transactions ( ) )
tps := float64 ( numOfTxs ) / timeElapsed . Seconds ( )
consensus . Log . Info ( "TPS Report" ,
"numOfTXs" , numOfTxs ,
"startTime" , startTime ,
"endTime" , endTime ,
"timeElapsed" , timeElapsed ,
"TPS" , tps ,
"consensus" , consensus )
// Post metrics
profiler := profiler . GetProfiler ( )
if profiler . MetricsReportURL == "" {
return
}
txHashes := [ ] string { }
for i , end := 0 , len ( block . Transactions ( ) ) ; i < 3 && i < end ; i ++ {
txHash := block . Transactions ( ) [ end - 1 - i ] . Hash ( )
txHashes = append ( txHashes , hex . EncodeToString ( txHash [ : ] ) )
}
metrics := map [ string ] interface { } {
"key" : consensus . pubKey . String ( ) ,
"tps" : tps ,
"txCount" : numOfTxs ,
"nodeCount" : len ( consensus . PublicKeys ) + 1 ,
"latestBlockHash" : hex . EncodeToString ( consensus . blockHash [ : ] ) ,
"latestTxHashes" : txHashes ,
"blockLatency" : int ( timeElapsed / time . Millisecond ) ,
}
profiler . LogMetrics ( metrics )
}
// HasEnoughValidators checks the number of publicKeys to determine
// if the shard has enough validators
// FIXME (HAR-82): we need epoch support or a better way to determine
// when to initiate the consensus
func ( consensus * Consensus ) HasEnoughValidators ( ) bool {
if len ( consensus . PublicKeys ) < consensus . MinPeers {
return false
}
return true
}