Skip to content
This repository was archived by the owner on Nov 15, 2023. It is now read-only.
Draft
Show file tree
Hide file tree
Changes from 1 commit
Commits
Show all changes
79 commits
Select commit Hold shift + click to select a range
387c6ed
Sassafras consensus - Prototype 1 (#11678)
davxy Jul 21, 2022
b8cea2f
Sassafras consensus - Prototype 2.1 (#11889)
davxy Aug 23, 2022
098af4c
Merge branch 'master' into davxy-sassafras-protocol
davxy Aug 23, 2022
a7fa940
Fix obsolete dependencies
davxy Aug 23, 2022
38035f6
Merge branch 'master' into davxy-sassafras-protocol
davxy Sep 2, 2022
b0a218c
Fix slot to epoch index conversion
davxy Sep 2, 2022
2d55cc0
Further refactory
davxy Sep 2, 2022
fcf1ffe
Merge branch 'master' into davxy-sassafras-protocol
davxy Sep 24, 2022
ac2fc9c
Fix after merge
davxy Sep 24, 2022
8f43727
Pick some runtime cleanup from Prototype 2.2
davxy Sep 24, 2022
2b51690
Sassafras Prototype 2.2 (#12314)
davxy Oct 29, 2022
e690654
Merge branch 'master' into davxy-sassafras-protocol
davxy Oct 29, 2022
fa72e51
Fixes after master merge
davxy Oct 29, 2022
7d8f5c3
Fixes in the sassafras demo after master merge
davxy Oct 29, 2022
1be8a84
TEMPORARY
davxy Nov 3, 2022
0fc4a98
Refactory of block-import method
davxy Nov 15, 2022
6389416
Merge branch 'master' into davxy-sassafras-protocol
davxy Nov 15, 2022
a02143c
Fixes after master merge
davxy Nov 15, 2022
924c51a
Bump Sassafras crates versions to 0.3.0
davxy Nov 15, 2022
5b21f45
Sassafras Iteration 3.1 (#12713)
davxy Jan 24, 2023
086630c
Introduce TicketEnvelope
davxy Jan 24, 2023
baf8736
Merge branch 'master' into davxy-sassafras-protocol
davxy Jan 24, 2023
a358c9f
Fix after master merge
davxy Jan 24, 2023
60410fb
Pick warp sync fix from babe
davxy Jan 24, 2023
95ba593
Fix sassafras node binary after master merge
davxy Jan 24, 2023
dc29ddf
Merge branch 'master' into davxy-sassafras-protocol
davxy Feb 22, 2023
7f224ff
Fix after master merge
davxy Feb 22, 2023
7c80f85
Merge branch 'master' into davxy-sassafras-protocol
davxy Mar 27, 2023
be6974b
Fix after master merge
davxy Mar 27, 2023
356f3d0
Small refactory
davxy Mar 27, 2023
8d9b228
Define log target
davxy Mar 28, 2023
913e652
Merge branch 'master' into davxy-sassafras-protocol
davxy May 1, 2023
fff4224
Introduce better ticket related structures
davxy May 3, 2023
80bb0a4
Frame tests overhaul
davxy May 8, 2023
20fe451
Fix client tests
davxy May 10, 2023
cb4c30e
Merge branch 'master' into davxy-sassafras-protocol
davxy May 11, 2023
bc05e9f
Fix after master merge
davxy May 11, 2023
1906ce9
Seal should be removed
davxy May 12, 2023
9354204
Isolate ticketing structs and functions in separate module
davxy May 12, 2023
8aa8eaf
Use 'make_bytes' to generate randomness and ticket-id
davxy May 12, 2023
9bb209e
Merge branch 'master' into davxy-sassafras-protocol
davxy May 15, 2023
5e7d6c5
Sassafras Protocol v0.3.2 (#14139)
davxy May 18, 2023
f7bb072
rustfmt
davxy May 19, 2023
fb4a841
Fix bench releated stuff
davxy May 19, 2023
f8003bd
Bump ring-vrf related crates versions
davxy Jun 12, 2023
8c51487
Merge branch 'master' into davxy-sassafras-protocol
davxy Jun 12, 2023
afe252e
Fix after master merge
davxy Jun 12, 2023
dec7fd4
Sassafras key is SW format can't be used as AccountId32
davxy Jun 13, 2023
5e360f9
Set ring-vrf related refs to a working repo and branch
davxy Jun 13, 2023
23e150e
Clippy fix
davxy Jun 13, 2023
1ae6d37
Removed try-runtime option from node-sassafras bin
davxy Jun 13, 2023
fdb746e
Fix one more clippy error
davxy Jun 13, 2023
1074d37
Fix cargo doc
davxy Jun 13, 2023
0f148d7
Sassafras protocol v0.3.3 (#14362)
davxy Jun 16, 2023
695fa7e
Dummy implementations for RuntimePublic
davxy Jun 18, 2023
b92c080
Merge branch 'master' into davxy-sassafras-protocol
davxy Jun 22, 2023
1bc33af
Use upstream ring-vrf
davxy Jun 22, 2023
6f48ec1
Merge branch 'master' into davxy-sassafras-protocol
davxy Aug 9, 2023
68222f7
Fixed sassafras primitives after master merge
davxy Aug 9, 2023
060e401
Improve sassafras pallet logic and cleanup stale data
davxy Aug 11, 2023
677a095
Begin fix of client
davxy Aug 11, 2023
049ac84
Substrate fix test utils
davxy Aug 11, 2023
50ab0d0
Fix sassafras node
davxy Aug 12, 2023
2aec295
Improve pallet test wrt body equality assertions
davxy Aug 12, 2023
15002c1
Build ring context in pallet genesis build
davxy Aug 12, 2023
3245310
Added transaction pool factory to submit tickets
davxy Aug 12, 2023
064dff0
Fix. Native vs wasm usize lengths
davxy Aug 12, 2023
998db32
Bump sassafras version to 0.3.4
davxy Aug 12, 2023
6e23f68
Sassafras structures overhaul
davxy Aug 14, 2023
9329314
Tickets were not saved
davxy Aug 14, 2023
f9cdfc1
Small note
davxy Aug 14, 2023
85a89da
Move sassafras inherents to client. Not reason to have it as a primitive
davxy Aug 14, 2023
3eb0d42
Improve ticket claiming mechanism
davxy Aug 16, 2023
6c8b3d2
Merge branch 'master' into davxy-sassafras-protocol
davxy Aug 18, 2023
4ff7164
Fix after master merge
davxy Aug 18, 2023
fb501eb
Nitpicks
davxy Aug 18, 2023
ab5a31a
Improvements to the digest log management
davxy Aug 24, 2023
cd8b681
Merge branch 'davxy-sassafras-protocol' of github.com:paritytech/subs…
davxy Aug 24, 2023
b700fa4
Merge branch 'master' into davxy-sassafras-protocol
davxy Aug 24, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
Sassafras structures overhaul
  • Loading branch information
davxy committed Aug 14, 2023
commit 6e23f68b7839aa6a6196a02f0d62d6224b8201d2
2 changes: 0 additions & 2 deletions Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

6 changes: 4 additions & 2 deletions bin/node-sassafras/node/src/chain_spec.rs
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,9 @@ use node_sassafras_runtime::{
use node_sassafras_runtime::{SessionConfig, SessionKeys};
use sc_service::ChainType;
use sp_consensus_grandpa::AuthorityId as GrandpaId;
use sp_consensus_sassafras::{AuthorityId as SassafrasId, SassafrasEpochConfiguration};
use sp_consensus_sassafras::{
AuthorityId as SassafrasId, EpochConfiguration as SassafrasEpochConfig,
};
use sp_core::{sr25519, Pair, Public};
use sp_runtime::traits::{IdentifyAccount, Verify};

Expand Down Expand Up @@ -131,7 +133,7 @@ fn testnet_genesis(
authorities: Vec::new(),
#[cfg(not(feature = "use-session-pallet"))]
authorities: initial_authorities.iter().map(|x| x.1.clone()).collect(),
epoch_config: SassafrasEpochConfiguration {
epoch_config: SassafrasEpochConfig {
attempts_number: SASSAFRAS_TICKETS_MAX_ATTEMPTS_NUMBER,
redundancy_factor: SASSAFRAS_TICKETS_REDUNDANCY_FACTOR,
},
Expand Down
11 changes: 3 additions & 8 deletions bin/node-sassafras/node/src/service.rs
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ pub fn new_partial(
client.clone(),
)?;

let slot_duration = sassafras_link.genesis_config().slot_duration();
let slot_duration = sassafras_link.genesis_config().slot_duration;

let import_queue = sc_consensus_sassafras::import_queue(
sassafras_link.clone(),
Expand Down Expand Up @@ -252,7 +252,7 @@ pub fn new_full(config: Configuration) -> Result<TaskManager, ServiceError> {
telemetry.as_ref().map(|x| x.handle()),
);

let slot_duration = sassafras_link.genesis_config().slot_duration();
let slot_duration = sassafras_link.genesis_config().slot_duration;

let sassafras_params = sc_consensus_sassafras::SassafrasWorkerParams {
client: client.clone(),
Expand All @@ -266,12 +266,7 @@ pub fn new_full(config: Configuration) -> Result<TaskManager, ServiceError> {
force_authoring,
create_inherent_data_providers: move |_, _| async move {
let timestamp = sp_timestamp::InherentDataProvider::from_system_time();

let slot =
sp_consensus_sassafras::inherents::InherentDataProvider::from_timestamp_and_slot_duration(
*timestamp,
slot_duration,
);
let slot = sp_consensus_sassafras::inherents::InherentDataProvider::from_timestamp_and_slot_duration(*timestamp, slot_duration);
Ok((slot, timestamp))
},
offchain_tx_pool_factory: OffchainTransactionPoolFactory::new(transaction_pool.clone()),
Expand Down
1 change: 1 addition & 0 deletions client/consensus/sassafras/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ homepage = "https://substrate.io"
repository = "https://github.com/paritytech/substrate/"
documentation = "https://docs.rs/sc-consensus-sassafras"
readme = "README.md"
publish = false

[package.metadata.docs.rs]
targets = ["x86_64-unknown-linux-gnu"]
Expand Down
95 changes: 42 additions & 53 deletions client/consensus/sassafras/src/authorship.rs
Original file line number Diff line number Diff line change
Expand Up @@ -25,16 +25,15 @@ use sp_consensus_sassafras::{
digests::PreDigest, slot_claim_sign_data, ticket_id, ticket_id_threshold, AuthorityId, Slot,
TicketBody, TicketClaim, TicketEnvelope, TicketId,
};
use sp_core::{bandersnatch::ring_vrf::RingContext, ed25519, twox_64, ByteArray};
use sp_core::{
bandersnatch::ring_vrf::RingContext, ed25519::Pair as EphemeralPair, twox_64, ByteArray,
};
use std::pin::Pin;

/// Get secondary authority index for the given epoch and slot.
pub(crate) fn secondary_authority_index(
slot: Slot,
config: &SassafrasConfiguration,
) -> AuthorityIndex {
u64::from_le_bytes((config.randomness, slot).using_encoded(twox_64)) as AuthorityIndex %
config.authorities.len() as AuthorityIndex
pub(crate) fn secondary_authority_index(slot: Slot, epoch: &Epoch) -> AuthorityIndex {
u64::from_le_bytes((epoch.randomness, slot).using_encoded(twox_64)) as AuthorityIndex %
epoch.authorities.len() as AuthorityIndex
}

/// Try to claim an epoch slot.
Expand All @@ -45,18 +44,16 @@ pub(crate) fn claim_slot(
maybe_ticket: Option<(TicketId, TicketBody)>,
keystore: &KeystorePtr,
) -> Option<(PreDigest, AuthorityId)> {
let config = &epoch.config;

if config.authorities.is_empty() {
if epoch.authorities.is_empty() {
return None
}

let mut vrf_sign_data = slot_claim_sign_data(&config.randomness, slot, epoch.epoch_idx);
let mut vrf_sign_data = slot_claim_sign_data(&epoch.randomness, slot, epoch.epoch_idx);

let (authority_idx, ticket_claim) = match maybe_ticket {
Some((ticket_id, ticket_data)) => {
log::debug!(target: LOG_TARGET, "[TRY PRIMARY (slot {slot}, tkt = {ticket_id:016x})]");
let (authority_idx, ticket_secret) = epoch.tickets_aux.remove(&ticket_id)?.clone();
let (authority_idx, ticket_secret) = epoch.tickets_aux.remove(&ticket_id)?;
log::debug!(
target: LOG_TARGET,
" got ticket: auth: {}, attempt: {}",
Expand All @@ -67,19 +64,19 @@ pub(crate) fn claim_slot(
vrf_sign_data.push_transcript_data(&ticket_data.encode());

let data = vrf_sign_data.challenge::<32>();
let erased_pair = ed25519::Pair::from_seed(&ticket_secret.erased_secret);
let erased_signature = *erased_pair.sign(&data).as_ref();
let erased_pair = EphemeralPair::from_seed(&ticket_secret.seed);
let erased_signature = erased_pair.sign(&data);

let claim = TicketClaim { erased_signature };
(authority_idx, Some(claim))
},
None => {
log::debug!(target: LOG_TARGET, "[TRY SECONDARY (slot {slot})]");
(secondary_authority_index(slot, config), None)
(secondary_authority_index(slot, epoch), None)
},
};

let authority_id = config.authorities.get(authority_idx as usize)?;
let authority_id = epoch.authorities.get(authority_idx as usize)?;

let vrf_signature = keystore
.bandersnatch_vrf_sign(AuthorityId::ID, authority_id.as_ref(), &vrf_sign_data)
Expand All @@ -100,25 +97,24 @@ fn generate_epoch_tickets(
keystore: &KeystorePtr,
ring_ctx: &RingContext,
) -> Vec<TicketEnvelope> {
let config = &epoch.config;
let max_attempts = config.threshold_params.attempts_number;
let redundancy_factor = config.threshold_params.redundancy_factor;
let mut tickets = Vec::new();

let threshold = ticket_id_threshold(
redundancy_factor,
config.epoch_duration as u32,
max_attempts,
config.authorities.len() as u32,
epoch.config.redundancy_factor,
epoch.epoch_duration as u32,
epoch.config.attempts_number,
epoch.authorities.len() as u32,
);
// TODO-SASS-P4 remove me
log::debug!(target: LOG_TARGET, "Generating tickets for epoch {} @ slot {}", epoch.epoch_idx, epoch.start_slot);
log::debug!(target: LOG_TARGET, " threshold: {threshold:016x}");

// We need a list of raw unwrapped keys
let pks: Vec<_> = config.authorities.iter().map(|a| *a.as_ref()).collect();
let pks: Vec<_> = epoch.authorities.iter().map(|a| *a.as_ref()).collect();

let mut tickets_aux = Vec::new();

for (authority_idx, authority_id) in config.authorities.iter().enumerate() {
for (authority_idx, authority_id) in epoch.authorities.iter().enumerate() {
if !keystore.has_keys(&[(authority_id.to_raw_vec(), AuthorityId::ID)]) {
continue
}
Expand All @@ -128,7 +124,7 @@ fn generate_epoch_tickets(
debug!(target: LOG_TARGET, ">>> ...done");

let make_ticket = |attempt_idx| {
let vrf_input = ticket_id_vrf_input(&config.randomness, attempt_idx, epoch.epoch_idx);
let vrf_input = ticket_id_vrf_input(&epoch.randomness, attempt_idx, epoch.epoch_idx);

let vrf_preout = keystore
.bandersnatch_vrf_output(AuthorityId::ID, authority_id.as_ref(), &vrf_input)
Expand All @@ -139,16 +135,18 @@ fn generate_epoch_tickets(
return None
}

let (erased_pair, erased_seed) = ed25519::Pair::generate();
// @davxy TODO: why not generate from seed.
// Seed computed as f(pair.seed || ticket_id)
let (erased_pair, erased_seed) = EphemeralPair::generate();

let erased_public: [u8; 32] = *erased_pair.public().as_ref();
let ticket_body = TicketBody { attempt_idx, erased_public };
let erased_public = erased_pair.public();
let body = TicketBody { attempt_idx, erased_public };

debug!(target: LOG_TARGET, ">>> Creating ring proof for attempt {}", attempt_idx);
let mut sign_data = ticket_body_sign_data(&ticket_body);
let mut sign_data = ticket_body_sign_data(&body);
sign_data.push_vrf_input(vrf_input).expect("Can't fail");

let ring_signature = keystore
let signature = keystore
.bandersnatch_ring_vrf_sign(
AuthorityId::ID,
authority_id.as_ref(),
Expand All @@ -158,23 +156,25 @@ fn generate_epoch_tickets(
.ok()??;
debug!(target: LOG_TARGET, ">>> ...done");

let ticket_envelope = TicketEnvelope { body: ticket_body, ring_signature };
let ticket_envelope = TicketEnvelope { body, signature };

let ticket_secret = TicketSecret { attempt_idx, erased_secret: erased_seed };
let ticket_secret = TicketSecret { attempt_idx, seed: erased_seed };

Some((ticket_id, ticket_envelope, ticket_secret))
};

for attempt in 0..max_attempts {
for attempt in 0..epoch.config.attempts_number {
if let Some((ticket_id, ticket_envelope, ticket_secret)) = make_ticket(attempt) {
log::debug!(target: LOG_TARGET, " → {ticket_id:016x}");
epoch
.tickets_aux
.insert(ticket_id, (authority_idx as AuthorityIndex, ticket_secret));
tickets.push(ticket_envelope);
tickets_aux.push((ticket_id, authority_idx as u32, ticket_secret));
}
}
}

tickets_aux.into_iter().for_each(|(ticket_id, authority_idx, ticket_secret)| {
epoch.tickets_aux.insert(ticket_id, (authority_idx, ticket_secret));
});
tickets
}

Expand All @@ -188,7 +188,7 @@ struct SlotWorker<B: BlockT, C, E, I, SO, L> {
keystore: KeystorePtr,
epoch_changes: SharedEpochChanges<B, Epoch>,
slot_notification_sinks: SlotNotificationSinks<B>,
genesis_config: SassafrasConfiguration,
genesis_config: Epoch,
}

#[async_trait::async_trait]
Expand Down Expand Up @@ -239,7 +239,7 @@ where
self.epoch_changes
.shared_data()
.viable_epoch(epoch_descriptor, |slot| Epoch::genesis(&self.genesis_config, slot))
.map(|epoch| epoch.as_ref().config.authorities.len())
.map(|epoch| epoch.as_ref().authorities.len())
}

async fn claim_slot(
Expand Down Expand Up @@ -475,19 +475,8 @@ async fn start_tickets_worker<B, C, SC>(
_ => None,
};

match err {
None => {
// Cache tickets in the epoch changes tree
epoch_changes
.shared_data()
.epoch_mut(&epoch_identifier)
.map(|target_epoch| target_epoch.tickets_aux = epoch.tickets_aux);
// TODO-SASS-P4: currently we don't persist the tickets proofs
// Thus on reboot/crash we are loosing them.
},
Some(err) => {
error!(target: LOG_TARGET, "Unable to submit tickets: {}", err);
},
if let Some(err) = err {
error!(target: LOG_TARGET, "Unable to submit tickets: {}", err);
}
}
}
Expand Down Expand Up @@ -611,7 +600,7 @@ where
};

let slot_worker = sc_consensus_slots::start_slot_worker(
sassafras_link.genesis_config.slot_duration(),
sassafras_link.genesis_config.slot_duration,
select_chain.clone(),
sc_consensus_slots::SimpleSlotWorkerToSlotWorker(slot_worker),
sync_oracle,
Expand Down
2 changes: 1 addition & 1 deletion client/consensus/sassafras/src/aux_schema.rs
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ where
}
}

/// Update the epoch changes on disk after a change.
/// Update the epoch changes to persist after a change.
pub fn write_epoch_changes<Block: BlockT, F, R>(
epoch_changes: &EpochChangesFor<Block, Epoch>,
write_aux: F,
Expand Down
14 changes: 6 additions & 8 deletions client/consensus/sassafras/src/block_import.rs
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ pub struct SassafrasBlockImport<B: BlockT, C, I> {
inner: I,
client: Arc<C>,
epoch_changes: SharedEpochChanges<B, Epoch>,
genesis_config: SassafrasConfiguration,
genesis_config: Epoch,
}

impl<Block: BlockT, I: Clone, Client> Clone for SassafrasBlockImport<Block, Client, I> {
Expand Down Expand Up @@ -72,7 +72,7 @@ where
inner: I,
client: Arc<C>,
epoch_changes: SharedEpochChanges<B, Epoch>,
genesis_config: SassafrasConfiguration,
genesis_config: Epoch,
) -> Self {
let client_weak = Arc::downgrade(&client);
let on_finality = move |notification: &FinalityNotification<B>| {
Expand Down Expand Up @@ -155,8 +155,7 @@ where
// current epoch. We will figure out which is the first skipped epoch and we
// will partially re-use its data for this "recovery" epoch.
let epoch_data = viable_epoch.as_mut();
let skipped_epochs =
(*slot - *epoch_data.start_slot) / epoch_data.config.epoch_duration;
let skipped_epochs = (*slot - *epoch_data.start_slot) / epoch_data.epoch_duration;
let original_epoch_idx = epoch_data.epoch_idx;

// NOTE: notice that we are only updating a local copy of the `Epoch`, this
Expand All @@ -169,9 +168,8 @@ where
// predicate `epoch.start_slot <= slot` which will still match correctly without
// requiring to update `start_slot` to the correct value.
epoch_data.epoch_idx += skipped_epochs;
epoch_data.start_slot = Slot::from(
*epoch_data.start_slot + skipped_epochs * epoch_data.config.epoch_duration,
);
epoch_data.start_slot =
Slot::from(*epoch_data.start_slot + skipped_epochs * epoch_data.epoch_duration);
log::warn!(
target: LOG_TARGET,
"Epoch(s) skipped from {} to {}",
Expand Down Expand Up @@ -506,7 +504,7 @@ where
/// Also returns a link object used to correctly instantiate the import queue
/// and authoring worker.
pub fn block_import<C, B: BlockT, I>(
genesis_config: SassafrasConfiguration,
genesis_config: Epoch,
inner_block_import: I,
client: Arc<C>,
) -> ClientResult<(SassafrasBlockImport<B, C, I>, SassafrasLink<B>)>
Expand Down
Loading