-
Notifications
You must be signed in to change notification settings - Fork 211
/
malfeasance.go
96 lines (82 loc) · 2.59 KB
/
malfeasance.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
package hare3
import (
"context"
"errors"
"fmt"
"github.com/prometheus/client_golang/prometheus"
"go.uber.org/zap"
"github.com/spacemeshos/go-spacemesh/common/types"
"github.com/spacemeshos/go-spacemesh/log"
"github.com/spacemeshos/go-spacemesh/malfeasance/wire"
"github.com/spacemeshos/go-spacemesh/signing"
"github.com/spacemeshos/go-spacemesh/sql"
"github.com/spacemeshos/go-spacemesh/sql/atxs"
)
const (
hareEquivocate = "hare_eq"
)
type MalfeasanceHandler struct {
logger *zap.Logger
db sql.Executor
edVerifier *signing.EdVerifier
}
type MalfeasanceOpt func(*MalfeasanceHandler)
func WithMalfeasanceLogger(logger *zap.Logger) MalfeasanceOpt {
return func(mh *MalfeasanceHandler) {
mh.logger = logger
}
}
func NewMalfeasanceHandler(
db sql.Executor,
edVerifier *signing.EdVerifier,
opt ...MalfeasanceOpt,
) *MalfeasanceHandler {
mh := &MalfeasanceHandler{
logger: zap.NewNop(),
db: db,
edVerifier: edVerifier,
}
for _, o := range opt {
o(mh)
}
return mh
}
func (mh *MalfeasanceHandler) Validate(ctx context.Context, data wire.ProofData) (types.NodeID, error) {
hp, ok := data.(*wire.HareProof)
if !ok {
return types.EmptyNodeID, errors.New("wrong message type for hare equivocation")
}
for _, msg := range hp.Messages {
if !mh.edVerifier.Verify(signing.HARE, msg.SmesherID, msg.SignedBytes(), msg.Signature) {
return types.EmptyNodeID, errors.New("invalid signature")
}
}
msg1, msg2 := hp.Messages[0], hp.Messages[1]
ok, err := atxs.IdentityExists(mh.db, msg1.SmesherID)
if err != nil {
return types.EmptyNodeID, fmt.Errorf("check identity in hare malfeasance %v: %w", msg1.SmesherID, err)
}
if !ok {
return types.EmptyNodeID, fmt.Errorf("identity does not exist: %v", msg1.SmesherID)
}
if msg1.SmesherID == msg2.SmesherID &&
msg1.InnerMsg.Layer == msg2.InnerMsg.Layer &&
msg1.InnerMsg.Round == msg2.InnerMsg.Round &&
msg1.InnerMsg.MsgHash != msg2.InnerMsg.MsgHash {
return msg1.SmesherID, nil
}
mh.logger.Warn("received invalid hare malfeasance proof",
log.ZContext(ctx),
zap.Stringer("first_smesher", hp.Messages[0].SmesherID),
zap.Object("first_proof", &hp.Messages[0].InnerMsg),
zap.Stringer("second_smesher", hp.Messages[1].SmesherID),
zap.Object("second_proof", &hp.Messages[1].InnerMsg),
)
return types.EmptyNodeID, errors.New("invalid hare malfeasance proof")
}
func (mh *MalfeasanceHandler) ReportProof(numProofs *prometheus.CounterVec) {
numProofs.WithLabelValues(hareEquivocate).Inc()
}
func (mh *MalfeasanceHandler) ReportInvalidProof(numInvalidProofs *prometheus.CounterVec) {
numInvalidProofs.WithLabelValues(hareEquivocate).Inc()
}