-
Notifications
You must be signed in to change notification settings - Fork 105
/
msg_server.go
155 lines (117 loc) · 4.84 KB
/
msg_server.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
package keeper
import (
"context"
"fmt"
sdk "github.com/cosmos/cosmos-sdk/types"
sdkerrors "github.com/cosmos/cosmos-sdk/types/errors"
"github.com/axelarnetwork/axelar-core/utils/events"
"github.com/axelarnetwork/axelar-core/x/multisig/types"
)
var _ types.MsgServiceServer = msgServer{}
type msgServer struct {
Keeper
snapshotter Snapshotter
staker types.Staker
nexus types.Nexus
}
// NewMsgServer returns an implementation of the MsgServiceServer interface
// for the provided Keeper.
func NewMsgServer(keeper Keeper, snapshotter Snapshotter, staker types.Staker, nexus types.Nexus) types.MsgServiceServer {
return msgServer{
Keeper: keeper,
snapshotter: snapshotter,
staker: staker,
nexus: nexus,
}
}
func (s msgServer) StartKeygen(c context.Context, req *types.StartKeygenRequest) (*types.StartKeygenResponse, error) {
ctx := sdk.UnwrapSDKContext(c)
snap, err := s.snapshotter.CreateSnapshot(ctx, s.GetParams(ctx).KeygenThreshold)
if err != nil {
return nil, sdkerrors.Wrap(err, "unable to create snapshot for keygen")
}
err = s.createKeygenSession(ctx, req.KeyID, snap)
if err != nil {
return nil, sdkerrors.Wrap(err, "unable to start keygen")
}
return &types.StartKeygenResponse{}, nil
}
func (s msgServer) SubmitPubKey(c context.Context, req *types.SubmitPubKeyRequest) (*types.SubmitPubKeyResponse, error) {
ctx := sdk.UnwrapSDKContext(c)
keygenSession, ok := s.getKeygenSession(ctx, req.KeyID)
if !ok {
return nil, fmt.Errorf("keygen session %s not found", req.KeyID)
}
participant := s.snapshotter.GetOperator(ctx, req.Sender)
if participant.Empty() {
return nil, fmt.Errorf("sender %s is not a registered proxy", req.Sender.String())
}
err := keygenSession.AddKey(ctx.BlockHeight(), participant, req.PubKey)
if err != nil {
return nil, sdkerrors.Wrap(err, "unable to add public key for keygen")
}
s.setKeygenSession(ctx, keygenSession)
s.Logger(ctx).Debug("new public key submitted",
"key_id", keygenSession.GetKeyID(),
"participant", participant.String(),
"participants_weight", keygenSession.Key.GetParticipantsWeight().String(),
"bonded_weight", keygenSession.Key.Snapshot.BondedWeight.String(),
"keygen_threshold", keygenSession.KeygenThreshold.String(),
"expires_at", keygenSession.ExpiresAt,
)
events.Emit(ctx, types.NewPubKeySubmitted(req.KeyID, participant, req.PubKey))
return &types.SubmitPubKeyResponse{}, nil
}
func (s msgServer) SubmitSignature(c context.Context, req *types.SubmitSignatureRequest) (*types.SubmitSignatureResponse, error) {
ctx := sdk.UnwrapSDKContext(c)
signingSession, ok := s.getSigningSession(ctx, req.SigID)
if !ok {
return nil, fmt.Errorf("signing session %d not found", req.SigID)
}
participant := s.snapshotter.GetOperator(ctx, req.Sender)
if participant.Empty() {
return nil, fmt.Errorf("sender %s is not a registered proxy", req.Sender.String())
}
if err := signingSession.AddSig(ctx.BlockHeight(), participant, req.Signature); err != nil {
return nil, sdkerrors.Wrap(err, "unable to add signature for signing")
}
s.setSigningSession(ctx, signingSession)
s.Logger(ctx).Debug("new signature submitted",
"sig_id", signingSession.GetID(),
"participant", participant.String(),
"participants_weight", signingSession.GetParticipantsWeight().String(),
"bonded_weight", signingSession.Key.Snapshot.BondedWeight.String(),
"signing_threshold", signingSession.Key.SigningThreshold.String(),
"expires_at", signingSession.ExpiresAt,
)
events.Emit(ctx, types.NewSignatureSubmitted(req.SigID, participant, req.Signature))
return &types.SubmitSignatureResponse{}, nil
}
func (s msgServer) RotateKey(c context.Context, req *types.RotateKeyRequest) (*types.RotateKeyResponse, error) {
ctx := sdk.UnwrapSDKContext(c)
if _, ok := s.nexus.GetChain(ctx, req.Chain); !ok {
return nil, fmt.Errorf("unknown chain")
}
if _, ok := s.GetCurrentKeyID(ctx, req.Chain); ok {
return nil, fmt.Errorf("manual key rotation is only allowed when no key is active")
}
if err := s.AssignKey(ctx, req.Chain, req.KeyID); err != nil {
return nil, sdkerrors.Wrap(err, "failed to assign the next key")
}
if err := s.Keeper.RotateKey(ctx, req.Chain); err != nil {
return nil, sdkerrors.Wrap(err, "failed to rotate the next key")
}
return &types.RotateKeyResponse{}, nil
}
func (s msgServer) KeygenOptOut(c context.Context, req *types.KeygenOptOutRequest) (*types.KeygenOptOutResponse, error) {
ctx := sdk.UnwrapSDKContext(c)
s.Keeper.KeygenOptOut(ctx, req.Sender)
events.Emit(ctx, &types.KeygenOptOut{Participant: req.Sender})
return &types.KeygenOptOutResponse{}, nil
}
func (s msgServer) KeygenOptIn(c context.Context, req *types.KeygenOptInRequest) (*types.KeygenOptInResponse, error) {
ctx := sdk.UnwrapSDKContext(c)
s.Keeper.KeygenOptIn(ctx, req.Sender)
events.Emit(ctx, &types.KeygenOptIn{Participant: req.Sender})
return &types.KeygenOptInResponse{}, nil
}