-
Notifications
You must be signed in to change notification settings - Fork 188
/
Copy pathvalidity.go
260 lines (238 loc) · 14 KB
/
validity.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
package protocol
import (
"fmt"
"github.com/onflow/flow-go/model/flow"
"github.com/onflow/flow-go/model/flow/factory"
"github.com/onflow/flow-go/model/flow/filter"
"github.com/onflow/flow-go/module/signature"
)
// IsValidExtendingEpochSetup checks whether an EpochSetup service event being added to the state is valid.
// In addition to intrinsic validity, we also check that it is valid w.r.t. the previous epoch setup event,
// and the current epoch status.
// CAUTION: This function assumes that all inputs besides extendingCommit are already validated.
// Expected errors during normal operations:
// * protocol.InvalidServiceEventError if the input service event is invalid to extend the currently active epoch status
// This is a side-effect-free function. This function only returns protocol.InvalidServiceEventError as errors.
func IsValidExtendingEpochSetup(extendingSetup *flow.EpochSetup, epochState *flow.EpochStateEntry) error {
// Enforce EpochSetup is valid w.r.t to current epoch state
if epochState.NextEpoch != nil { // We should only have a single epoch setup event per epoch.
// true iff EpochSetup event for NEXT epoch was already included before
return NewInvalidServiceEventErrorf("duplicate epoch setup service event: %x", epochState.NextEpoch.SetupID)
}
if extendingSetup.Counter != epochState.EpochCounter()+1 { // The setup event should have the counter increased by one.
return NewInvalidServiceEventErrorf("next epoch setup has invalid counter (%d => %d)", epochState.EpochCounter(), extendingSetup.Counter)
}
if extendingSetup.FirstView != epochState.CurrentEpochFinalView()+1 { // The first view needs to be exactly one greater than the current epoch final view
return NewInvalidServiceEventErrorf(
"next epoch first view must be exactly 1 more than current epoch final view (%d != %d+1)",
extendingSetup.FirstView,
epochState.CurrentEpochFinalView(),
)
}
// Enforce the EpochSetup event is syntactically correct
err := IsValidEpochSetup(extendingSetup, true)
if err != nil {
return NewInvalidServiceEventErrorf("invalid epoch setup: %w", err)
}
return nil
}
// IsValidEpochSetup checks whether an `EpochSetup` event is syntactically correct. The boolean parameter `verifyNetworkAddress`
// controls, whether we want to permit nodes to share a networking address.
// This is a side-effect-free function. Any error return indicates that the EpochSetup event is not compliant with protocol rules.
func IsValidEpochSetup(setup *flow.EpochSetup, verifyNetworkAddress bool) error {
// 1. CHECK: Enforce protocol compliance of Epoch parameters:
// - RandomSource of entropy in Epoch Setup event should the protocol-prescribed length
// - first view must be before final view
if len(setup.RandomSource) != flow.EpochSetupRandomSourceLength {
return fmt.Errorf("seed has incorrect length (%d != %d)", len(setup.RandomSource), flow.EpochSetupRandomSourceLength)
}
if setup.FirstView >= setup.FinalView {
return fmt.Errorf("first view (%d) must be before final view (%d)", setup.FirstView, setup.FinalView)
}
// 2. CHECK: Enforce protocol compliance active participants:
// (a) each has a unique node ID,
// (b) each has a unique network address (if `verifyNetworkAddress` is true),
// (c) participants are sorted in canonical order.
// Note that the system smart contracts manage the identity table as an unordered set! For the protocol state, we desire a fixed
// ordering to simplify various implementation details, like the DKG. Therefore, we order identities in `flow.EpochSetup` during
// conversion from cadence to Go in the function `convert.ServiceEvent(flow.ChainID, flow.Event)` in package `model/convert`
identLookup := make(map[flow.Identifier]struct{})
for _, participant := range setup.Participants { // (a) enforce uniqueness of NodeIDs
_, ok := identLookup[participant.NodeID]
if ok {
return fmt.Errorf("duplicate node identifier (%x)", participant.NodeID)
}
identLookup[participant.NodeID] = struct{}{}
}
if verifyNetworkAddress { // (b) enforce uniqueness of networking address
addrLookup := make(map[string]struct{})
for _, participant := range setup.Participants {
_, ok := addrLookup[participant.Address]
if ok {
return fmt.Errorf("duplicate node address (%x)", participant.Address)
}
addrLookup[participant.Address] = struct{}{}
}
}
if !setup.Participants.Sorted(flow.Canonical[flow.IdentitySkeleton]) { // (c) enforce canonical ordering
return fmt.Errorf("participants are not canonically ordered")
}
// 3. CHECK: Enforce sufficient number of nodes for each role
// IMPORTANT: here we remove all nodes with zero weight, as they are allowed to partake in communication but not in respective node functions
activeParticipants := setup.Participants.Filter(filter.HasInitialWeight[flow.IdentitySkeleton](true))
activeNodeCountByRole := make(map[flow.Role]uint)
for _, participant := range activeParticipants {
activeNodeCountByRole[participant.Role]++
}
if activeNodeCountByRole[flow.RoleConsensus] < 1 {
return fmt.Errorf("need at least one consensus node")
}
if activeNodeCountByRole[flow.RoleCollection] < 1 {
return fmt.Errorf("need at least one collection node")
}
if activeNodeCountByRole[flow.RoleExecution] < 1 {
return fmt.Errorf("need at least one execution node")
}
if activeNodeCountByRole[flow.RoleVerification] < 1 {
return fmt.Errorf("need at least one verification node")
}
// 4. CHECK: Enforce protocol compliance of collector cluster assignment
// (0) there is at least one collector cluster
// (a) assignment only contains nodes with collector role and positive weight
// (b) collectors have unique node IDs
// (c) each collector is assigned exactly to one cluster and is only listed once within that cluster
// (d) cluster contains at least one collector (i.e. is not empty)
// (e) cluster is composed of known nodes
// (f) cluster assignment lists the nodes in canonical ordering
if len(setup.Assignments) == 0 { // enforce (0): at least one cluster
return fmt.Errorf("need at least one collection cluster")
}
// Unpacking the cluster assignments (NodeIDs → IdentitySkeletons) enforces (a) - (f)
_, err := factory.NewClusterList(setup.Assignments, activeParticipants.Filter(filter.HasRole[flow.IdentitySkeleton](flow.RoleCollection)))
if err != nil {
return fmt.Errorf("invalid cluster assignments: %w", err)
}
return nil
}
// IsValidExtendingEpochCommit checks whether an EpochCommit service event being added to the state is valid.
// In addition to intrinsic validity, we also check that it is valid w.r.t. the previous epoch setup event, and
// the current epoch status.
// CAUTION: This function assumes that all inputs besides extendingCommit are already validated.
// Expected errors during normal operations:
// * protocol.InvalidServiceEventError if the input service event is invalid to extend the currently active epoch
// This is a side-effect-free function. This function only returns protocol.InvalidServiceEventError as errors.
func IsValidExtendingEpochCommit(extendingCommit *flow.EpochCommit, epochState *flow.MinEpochStateEntry, nextEpochSetupEvent *flow.EpochSetup) error {
// The epoch setup event needs to happen before the commit.
if epochState.NextEpoch == nil {
return NewInvalidServiceEventErrorf("missing epoch setup for epoch commit")
}
// Enforce EpochSetup is valid w.r.t to current epoch state
if epochState.NextEpoch.CommitID != flow.ZeroID { // We should only have a single epoch commit event per epoch.
return NewInvalidServiceEventErrorf("duplicate epoch commit service event: %x", epochState.NextEpoch.CommitID)
}
// Enforce the EpochSetup event is syntactically correct and compatible with the respective EpochSetup
err := IsValidEpochCommit(extendingCommit, nextEpochSetupEvent)
if err != nil {
return NewInvalidServiceEventErrorf("invalid epoch commit: %s", err)
}
return nil
}
// IsValidEpochCommit implements a wrapper around the actual validation function to allow for backward-compatible validation
// depending on the version of the [flow.EpochCommit] event. The version of the [flow.EpochCommit] is determined by the presence
// of the [flow.DKGIndexMap] field.
// TODO(EFM, #6794): Replace this with the body of `isValidEpochCommit` once we complete the network upgrade.
func IsValidEpochCommit(commit *flow.EpochCommit, setup *flow.EpochSetup) error {
if commit.DKGIndexMap == nil {
return isValidEpochCommitV0(commit, setup)
} else {
return isValidEpochCommit(commit, setup)
}
}
// IsValidEpochCommit checks whether an epoch commit service event is intrinsically valid.
// Assumes the input flow.EpochSetup event has already been validated.
// Expected errors during normal operations:
// * protocol.InvalidServiceEventError if the EpochCommit is invalid.
// This is a side-effect-free function. This function only returns protocol.InvalidServiceEventError as errors.
func isValidEpochCommit(commit *flow.EpochCommit, setup *flow.EpochSetup) error {
if len(setup.Assignments) != len(commit.ClusterQCs) {
return NewInvalidServiceEventErrorf("number of clusters (%d) does not number of QCs (%d)", len(setup.Assignments), len(commit.ClusterQCs))
}
if commit.Counter != setup.Counter {
return NewInvalidServiceEventErrorf("inconsistent epoch counter between commit (%d) and setup (%d) events in same epoch", commit.Counter, setup.Counter)
}
// make sure we have a Random Beacon group key:
if commit.DKGGroupKey == nil {
return NewInvalidServiceEventErrorf("missing DKG public group key")
}
// enforce invariant: len(DKGParticipantKeys) == len(DKGIndexMap)
n := len(commit.DKGIndexMap) // size of the DKG committee
if len(commit.DKGParticipantKeys) != n {
return NewInvalidServiceEventErrorf("number of %d Random Beacon key shares is inconsistent with number of DKG participatns (len=%d)", len(commit.DKGParticipantKeys), len(commit.DKGIndexMap))
}
// enforce invariant: DKGIndexMap values form the set {0, 1, ..., n-1} where n=len(DKGParticipantKeys)
encounteredIndex := make([]bool, n)
for _, index := range commit.DKGIndexMap {
if index < 0 || index >= n {
return NewInvalidServiceEventErrorf("index %d is outside allowed range [0,n-1] for a DKG committee of size n=%d", index, n)
}
if encounteredIndex[index] {
return NewInvalidServiceEventErrorf("duplicated DKG index %d", index)
}
encounteredIndex[index] = true
}
// conclusion: there are n unique values in `DKGIndexMap`, each in the interval [0,n-1]. Hence, the values in DKGIndexMap form set {0, 1, ..., n-1}.
numberOfRandomBeaconParticipants := uint(0)
for _, identity := range setup.Participants.Filter(filter.IsConsensusCommitteeMember) {
if _, found := commit.DKGIndexMap[identity.NodeID]; found {
numberOfRandomBeaconParticipants++
}
}
// Important SANITY CHECK: reject configurations where too few consensus nodes have valid random beacon key shares to
// reliably reach the required threshold of signers. Specifically, we enforce RandomBeaconSafetyThreshold ≤ |𝒞 ∩ 𝒟|.
// - 𝒞 is the set of all consensus committee members
// - 𝒟 is the set of all DKG participants
// - ℛ is the subset of the consensus committee (ℛ ⊆ 𝒞): it contains consensus nodes (and only those) with a
// private Random Beacon key share matching the respective public key share in the `EpochCommit` event.
//
// This is only a sanity check: on the protocol level, we only know which nodes (set 𝒟) could participate in the DKG,
// but not which consensus nodes obtained a *valid* random beacon key share. In other words, we only have access to the
// superset 𝒟 ∩ 𝒞 ⊇ ℛ here. If 𝒟 ∩ 𝒞 is already too small, we are certain that too few consensus nodes have valid random
// beacon keys (RandomBeaconSafetyThreshold > |𝒞 ∩ 𝒟| entails RandomBeaconSafetyThreshold > |ℛ|) and we reject the
// Epoch configuration. However, enough nodes in the superset |𝒞 ∩ 𝒟| does not guarantee that |ℛ| is above the critical
// threshold (e.g. too many nodes |𝒞 ∩ 𝒟| could have failed the DKG and therefore not be in ℛ).
//
// This is different than the check in the DKG smart contract, where the value of |ℛ| is known and compared
// to the threshold. Unlike the DKG contract, the protocol state does not have access to the value of |ℛ| from a past
// key generation (decentralized or not).
//
// [2] https://www.notion.so/flowfoundation/DKG-contract-success-threshold-86c6bf2b92034855b3c185d7616eb6f1?pvs=4
if RandomBeaconSafetyThreshold(uint(n)) > numberOfRandomBeaconParticipants {
return NewInvalidServiceEventErrorf("not enough random beacon participants required %d, got %d",
signature.RandomBeaconThreshold(n), numberOfRandomBeaconParticipants)
}
return nil
}
// isValidEpochCommitV0 checks whether an epoch commit service event is intrinsically valid.
// Assumes the input flow.EpochSetup event has already been validated.
// Expected errors during normal operations:
// * protocol.InvalidServiceEventError if the EpochCommit is invalid.
// This is a side-effect-free function. This function only returns protocol.InvalidServiceEventError as errors.
// TODO(EFM, #6794): This function is introduced to implement a backward-compatible validation of [flow.EpochCommit].
// Remove this once we complete the network upgrade.
func isValidEpochCommitV0(commit *flow.EpochCommit, setup *flow.EpochSetup) error {
if len(setup.Assignments) != len(commit.ClusterQCs) {
return NewInvalidServiceEventErrorf("number of clusters (%d) does not number of QCs (%d)", len(setup.Assignments), len(commit.ClusterQCs))
}
if commit.Counter != setup.Counter {
return NewInvalidServiceEventErrorf("inconsistent epoch counter between commit (%d) and setup (%d) events in same epoch", commit.Counter, setup.Counter)
}
// make sure we have a valid DKG public key
if commit.DKGGroupKey == nil {
return NewInvalidServiceEventErrorf("missing DKG public group key")
}
participants := setup.Participants.Filter(filter.IsConsensusCommitteeMember)
if len(participants) != len(commit.DKGParticipantKeys) {
return NewInvalidServiceEventErrorf("participant list (len=%d) does not match dkg key list (len=%d)", len(participants), len(commit.DKGParticipantKeys))
}
return nil
}