257 lines
6.8 KiB
Go
257 lines
6.8 KiB
Go
package types
|
|
|
|
import (
|
|
"bytes"
|
|
"errors"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"sync"
|
|
|
|
. "github.com/tendermint/go-common"
|
|
"github.com/tendermint/go-crypto"
|
|
"github.com/tendermint/go-wire"
|
|
|
|
"github.com/tendermint/ed25519"
|
|
)
|
|
|
|
const (
|
|
stepNone = 0 // Used to distinguish the initial state
|
|
stepPropose = 1
|
|
stepPrevote = 2
|
|
stepPrecommit = 3
|
|
)
|
|
|
|
func voteToStep(vote *Vote) int8 {
|
|
switch vote.Type {
|
|
case VoteTypePrevote:
|
|
return stepPrevote
|
|
case VoteTypePrecommit:
|
|
return stepPrecommit
|
|
default:
|
|
PanicSanity("Unknown vote type")
|
|
return 0
|
|
}
|
|
}
|
|
|
|
type PrivValidator struct {
|
|
Address []byte `json:"address"`
|
|
PubKey crypto.PubKey `json:"pub_key"`
|
|
LastHeight int `json:"last_height"`
|
|
LastRound int `json:"last_round"`
|
|
LastStep int8 `json:"last_step"`
|
|
LastSignature crypto.Signature `json:"last_signature"` // so we dont lose signatures
|
|
LastSignBytes []byte `json:"last_signbytes"` // so we dont lose signatures
|
|
|
|
// PrivKey should be empty if a Signer other than the default is being used.
|
|
PrivKey crypto.PrivKey `json:"priv_key"`
|
|
Signer `json:"-"`
|
|
|
|
// For persistence.
|
|
// Overloaded for testing.
|
|
filePath string
|
|
mtx sync.Mutex
|
|
}
|
|
|
|
// This is used to sign votes.
|
|
// It is the caller's duty to verify the msg before calling Sign,
|
|
// eg. to avoid double signing.
|
|
// Currently, the only callers are SignVote and SignProposal
|
|
type Signer interface {
|
|
Sign(msg []byte) crypto.Signature
|
|
}
|
|
|
|
// Implements Signer
|
|
type DefaultSigner struct {
|
|
priv crypto.PrivKey
|
|
}
|
|
|
|
func NewDefaultSigner(priv crypto.PrivKey) *DefaultSigner {
|
|
return &DefaultSigner{priv: priv}
|
|
}
|
|
|
|
// Implements Signer
|
|
func (ds *DefaultSigner) Sign(msg []byte) crypto.Signature {
|
|
return ds.priv.Sign(msg)
|
|
}
|
|
|
|
func (privVal *PrivValidator) SetSigner(s Signer) {
|
|
privVal.Signer = s
|
|
}
|
|
|
|
// Generates a new validator with private key.
|
|
func GenPrivValidator() *PrivValidator {
|
|
privKeyBytes := new([64]byte)
|
|
copy(privKeyBytes[:32], crypto.CRandBytes(32))
|
|
pubKeyBytes := ed25519.MakePublicKey(privKeyBytes)
|
|
pubKey := crypto.PubKeyEd25519(*pubKeyBytes)
|
|
privKey := crypto.PrivKeyEd25519(*privKeyBytes)
|
|
return &PrivValidator{
|
|
Address: pubKey.Address(),
|
|
PubKey: pubKey,
|
|
PrivKey: privKey,
|
|
LastHeight: 0,
|
|
LastRound: 0,
|
|
LastStep: stepNone,
|
|
LastSignature: nil,
|
|
LastSignBytes: nil,
|
|
filePath: "",
|
|
Signer: NewDefaultSigner(privKey),
|
|
}
|
|
}
|
|
|
|
func LoadPrivValidator(filePath string) *PrivValidator {
|
|
privValJSONBytes, err := ioutil.ReadFile(filePath)
|
|
if err != nil {
|
|
Exit(err.Error())
|
|
}
|
|
privVal := wire.ReadJSON(&PrivValidator{}, privValJSONBytes, &err).(*PrivValidator)
|
|
if err != nil {
|
|
Exit(Fmt("Error reading PrivValidator from %v: %v\n", filePath, err))
|
|
}
|
|
privVal.filePath = filePath
|
|
privVal.Signer = NewDefaultSigner(privVal.PrivKey)
|
|
return privVal
|
|
}
|
|
|
|
func LoadOrGenPrivValidator(filePath string) *PrivValidator {
|
|
var privValidator *PrivValidator
|
|
if _, err := os.Stat(filePath); err == nil {
|
|
privValidator = LoadPrivValidator(filePath)
|
|
log.Notice("Loaded PrivValidator",
|
|
"file", filePath, "privValidator", privValidator)
|
|
} else {
|
|
privValidator = GenPrivValidator()
|
|
privValidator.SetFile(filePath)
|
|
privValidator.Save()
|
|
log.Notice("Generated PrivValidator", "file", filePath)
|
|
}
|
|
return privValidator
|
|
}
|
|
|
|
func (privVal *PrivValidator) SetFile(filePath string) {
|
|
privVal.mtx.Lock()
|
|
defer privVal.mtx.Unlock()
|
|
privVal.filePath = filePath
|
|
}
|
|
|
|
func (privVal *PrivValidator) Save() {
|
|
privVal.mtx.Lock()
|
|
defer privVal.mtx.Unlock()
|
|
privVal.save()
|
|
}
|
|
|
|
func (privVal *PrivValidator) save() {
|
|
if privVal.filePath == "" {
|
|
PanicSanity("Cannot save PrivValidator: filePath not set")
|
|
}
|
|
jsonBytes := wire.JSONBytesPretty(privVal)
|
|
err := WriteFileAtomic(privVal.filePath, jsonBytes, 0600)
|
|
if err != nil {
|
|
// `@; BOOM!!!
|
|
PanicCrisis(err)
|
|
}
|
|
}
|
|
|
|
// NOTE: Unsafe!
|
|
func (privVal *PrivValidator) Reset() {
|
|
privVal.LastHeight = 0
|
|
privVal.LastRound = 0
|
|
privVal.LastStep = 0
|
|
privVal.LastSignature = nil
|
|
privVal.LastSignBytes = nil
|
|
privVal.Save()
|
|
}
|
|
|
|
func (privVal *PrivValidator) SignVote(chainID string, vote *Vote) error {
|
|
privVal.mtx.Lock()
|
|
defer privVal.mtx.Unlock()
|
|
signature, err := privVal.signBytesHRS(vote.Height, vote.Round, voteToStep(vote), SignBytes(chainID, vote))
|
|
if err != nil {
|
|
return errors.New(Fmt("Error signing vote: %v", err))
|
|
}
|
|
vote.Signature = signature.(crypto.SignatureEd25519)
|
|
return nil
|
|
}
|
|
|
|
func (privVal *PrivValidator) SignProposal(chainID string, proposal *Proposal) error {
|
|
privVal.mtx.Lock()
|
|
defer privVal.mtx.Unlock()
|
|
signature, err := privVal.signBytesHRS(proposal.Height, proposal.Round, stepPropose, SignBytes(chainID, proposal))
|
|
if err != nil {
|
|
return errors.New(Fmt("Error signing proposal: %v", err))
|
|
}
|
|
proposal.Signature = signature.(crypto.SignatureEd25519)
|
|
return nil
|
|
}
|
|
|
|
// check if there's a regression. Else sign and write the hrs+signature to disk
|
|
func (privVal *PrivValidator) signBytesHRS(height, round int, step int8, signBytes []byte) (crypto.Signature, error) {
|
|
// If height regression, err
|
|
if privVal.LastHeight > height {
|
|
return nil, errors.New("Height regression")
|
|
}
|
|
// More cases for when the height matches
|
|
if privVal.LastHeight == height {
|
|
// If round regression, err
|
|
if privVal.LastRound > round {
|
|
return nil, errors.New("Round regression")
|
|
}
|
|
// If step regression, err
|
|
if privVal.LastRound == round {
|
|
if privVal.LastStep > step {
|
|
return nil, errors.New("Step regression")
|
|
} else if privVal.LastStep == step {
|
|
if privVal.LastSignBytes != nil {
|
|
if privVal.LastSignature == nil {
|
|
PanicSanity("privVal: LastSignature is nil but LastSignBytes is not!")
|
|
}
|
|
// so we dont sign a conflicting vote or proposal
|
|
// NOTE: proposals are non-deterministic (include time),
|
|
// so we can actually lose them, but will still never sign conflicting ones
|
|
if bytes.Equal(privVal.LastSignBytes, signBytes) {
|
|
log.Notice("Using privVal.LastSignature", "sig", privVal.LastSignature)
|
|
return privVal.LastSignature, nil
|
|
}
|
|
}
|
|
return nil, errors.New("Step regression")
|
|
}
|
|
}
|
|
}
|
|
|
|
// Sign
|
|
signature := privVal.Sign(signBytes)
|
|
|
|
// Persist height/round/step
|
|
privVal.LastHeight = height
|
|
privVal.LastRound = round
|
|
privVal.LastStep = step
|
|
privVal.LastSignature = signature
|
|
privVal.LastSignBytes = signBytes
|
|
privVal.save()
|
|
|
|
return signature, nil
|
|
}
|
|
|
|
func (privVal *PrivValidator) String() string {
|
|
return fmt.Sprintf("PrivValidator{%X LH:%v, LR:%v, LS:%v}", privVal.Address, privVal.LastHeight, privVal.LastRound, privVal.LastStep)
|
|
}
|
|
|
|
//-------------------------------------
|
|
|
|
type PrivValidatorsByAddress []*PrivValidator
|
|
|
|
func (pvs PrivValidatorsByAddress) Len() int {
|
|
return len(pvs)
|
|
}
|
|
|
|
func (pvs PrivValidatorsByAddress) Less(i, j int) bool {
|
|
return bytes.Compare(pvs[i].Address, pvs[j].Address) == -1
|
|
}
|
|
|
|
func (pvs PrivValidatorsByAddress) Swap(i, j int) {
|
|
it := pvs[i]
|
|
pvs[i] = pvs[j]
|
|
pvs[j] = it
|
|
}
|