package event import ( "bytes" "encoding/binary" "errors" "fmt" "github.com/nspcc-dev/neo-go/pkg/core/interop/interopnames" "github.com/nspcc-dev/neo-go/pkg/core/transaction" "github.com/nspcc-dev/neo-go/pkg/crypto/hash" "github.com/nspcc-dev/neo-go/pkg/crypto/keys" "github.com/nspcc-dev/neo-go/pkg/network/payload" "github.com/nspcc-dev/neo-go/pkg/smartcontract" "github.com/nspcc-dev/neo-go/pkg/util" "github.com/nspcc-dev/neo-go/pkg/vm" "github.com/nspcc-dev/neo-go/pkg/vm/opcode" "github.com/nspcc-dev/neofs-node/pkg/morph/client" ) var ( errNotContractCall = errors.New("received main tx is not a contract call") errUnexpectedWitnessAmount = errors.New("received main tx has unexpected amount of witnesses") errUnexpectedCosignersAmount = errors.New("received main tx has unexpected amount of cosigners") errIncorrectAlphabetSigner = errors.New("received main tx has incorrect Alphabet signer") errIncorrectProxyWitnesses = errors.New("received main tx has non-empty Proxy witnesses") errIncorrectAlphabet = errors.New("received main tx has incorrect Alphabet verification") errIncorrectNotaryPlaceholder = errors.New("received main tx has incorrect Notary contract placeholder") errIncorrectAttributesAmount = errors.New("received main tx has incorrect attributes amount") errIncorrectAttribute = errors.New("received main tx has incorrect attribute") errUnexpectedOpcode = errors.New("received main tx has unexpected(not PUSHDATA) NeoVM opcodes") errIncorrectFBAttributesAmount = errors.New("received fallback tx has incorrect attributes amount") errIncorrectFBAttributes = errors.New("received fallback tx has incorrect attributes") // ErrTXAlreadyHandled is returned if received TX has already been signed. ErrTXAlreadyHandled = errors.New("received main tx has already been handled") // ErrMainTXExpired is returned if received fallback TX is already valid. ErrMainTXExpired = errors.New("received main tx has expired") ) // BlockCounter must return block count of the network // from which notary requests are received. type BlockCounter interface { BlockCount() (res uint32, err error) } // PreparatorPrm groups the required parameters of the Preparator constructor. type PreparatorPrm struct { AlphaKeys client.AlphabetKeys // BlockCount must return block count of the network // from which notary requests are received. BlockCounter BlockCounter } // Preparator implements NotaryPreparator interface. type Preparator struct { // contractSysCall contract call in NeoVM contractSysCall []byte // dummyInvocationScript is invocation script from TX that is not signed. dummyInvocationScript []byte alphaKeys client.AlphabetKeys blockCounter BlockCounter } // notaryPreparator inits and returns NotaryPreparator. // // Considered to be used for preparing notary request // for parsing it by event.Listener. func notaryPreparator(prm PreparatorPrm) NotaryPreparator { switch { case prm.AlphaKeys == nil: panic("alphabet keys source must not be nil") case prm.BlockCounter == nil: panic("block counter must not be nil") } contractSysCall := make([]byte, 4) binary.LittleEndian.PutUint32(contractSysCall, interopnames.ToID([]byte(interopnames.SystemContractCall))) dummyInvocationScript := append([]byte{byte(opcode.PUSHDATA1), 64}, make([]byte, 64)...) return Preparator{ contractSysCall: contractSysCall, dummyInvocationScript: dummyInvocationScript, alphaKeys: prm.AlphaKeys, blockCounter: prm.BlockCounter, } } // Prepare converts raw notary requests to NotaryEvent. // // Returns ErrTXAlreadyHandled if transaction shouldn't be // parsed and handled. It is not "error case". Every handled // transaction is expected to be received one more time // from the Notary service but already signed. This happens // since every notary call is a new notary request in fact. func (p Preparator) Prepare(nr *payload.P2PNotaryRequest) (NotaryEvent, error) { // notary request's main tx is expected to have // exactly three witnesses: one for proxy contract, // one for notary's invoker and one is for notary // contract if len(nr.MainTransaction.Scripts) != 3 { return nil, errUnexpectedWitnessAmount } // alphabet node should handle only notary requests // that have been sent unsigned(by storage nodes) => // such main TXs should have dummy scripts as an // invocation script // // this check prevents notary flow recursion if !bytes.Equal(nr.MainTransaction.Scripts[1].InvocationScript, p.dummyInvocationScript) { return nil, ErrTXAlreadyHandled } currentAlphabet, err := p.alphaKeys() if err != nil { return nil, fmt.Errorf("could not fetch Alphabet public keys: %w", err) } err = p.validateCosigners(nr.MainTransaction.Signers, currentAlphabet) if err != nil { return nil, err } // validate main TX's notary attribute err = p.validateAttributes(nr.MainTransaction.Attributes, currentAlphabet) if err != nil { return nil, err } // validate main TX's witnesses err = p.validateWitnesses(nr.MainTransaction.Scripts, currentAlphabet) if err != nil { return nil, err } // validate main TX expiration err = p.validateExpiration(nr.FallbackTransaction) if err != nil { return nil, err } var ( opCode opcode.Opcode param []byte ) ctx := vm.NewContext(nr.MainTransaction.Script) ops := make([]Op, 0, 16) // 16 is maximum num of opcodes for calling contracts with 4 args(no arrays of arrays) for { opCode, param, err = ctx.Next() if err != nil { return nil, fmt.Errorf("could not get next opcode in script: %w", err) } if opCode == opcode.RET { break } ops = append(ops, Op{code: opCode, param: param}) } opsLen := len(ops) // check if it is tx with contract call if !bytes.Equal(ops[opsLen-1].param, p.contractSysCall) { return nil, errNotContractCall } // retrieve contract's script hash contractHash, err := util.Uint160DecodeBytesBE(ops[opsLen-2].param) if err != nil { return nil, fmt.Errorf("could not decode contract hash: %w", err) } // retrieve contract's method contractMethod := string(ops[opsLen-3].param) err = p.validateParameterOpcodes(ops[:opsLen-3]) if err != nil { return nil, err } return parsedNotaryEvent{ hash: contractHash, notaryType: NotaryTypeFromString(contractMethod), params: ops[:opsLen-3], raw: nr, }, nil } func (p Preparator) validateParameterOpcodes(oo []Op) error { // check for unexpected NeoVM opcodes for _, o := range oo { switch { // only PUSH(and PACK for arrays) codes are allowed; // number of params and their content must be checked // in a notary parser and a notary handler of a // particular contract case o.code <= opcode.PUSH16 || o.code == opcode.PACK: default: return errUnexpectedOpcode } } return nil } func (p Preparator) validateExpiration(fbTX *transaction.Transaction) error { if len(fbTX.Attributes) != 3 { return errIncorrectFBAttributesAmount } nvbAttrs := fbTX.GetAttributes(transaction.NotValidBeforeT) if len(nvbAttrs) != 1 { return errIncorrectFBAttributes } nvb, ok := nvbAttrs[0].Value.(*transaction.NotValidBefore) if !ok { return errIncorrectFBAttributes } currBlock, err := p.blockCounter.BlockCount() if err != nil { return fmt.Errorf("could not fetch current chain height: %w", err) } if currBlock >= nvb.Height { return ErrMainTXExpired } return nil } func (p Preparator) validateCosigners(s []transaction.Signer, alphaKeys keys.PublicKeys) error { if len(s) != 3 { return errUnexpectedCosignersAmount } alphaVerificationScript, err := smartcontract.CreateMultiSigRedeemScript(len(alphaKeys)*2/3+1, alphaKeys) if err != nil { return fmt.Errorf("could not get Alphabet verification script: %w", err) } if !s[1].Account.Equals(hash.Hash160(alphaVerificationScript)) { return errIncorrectAlphabetSigner } return nil } func (p Preparator) validateWitnesses(w []transaction.Witness, alphaKeys keys.PublicKeys) error { // the first one(proxy contract) must have empty // witnesses if len(w[0].VerificationScript)+len(w[0].InvocationScript) != 0 { return errIncorrectProxyWitnesses } alphaVerificationScript, err := smartcontract.CreateMultiSigRedeemScript(len(alphaKeys)*2/3+1, alphaKeys) if err != nil { return fmt.Errorf("could not get Alphabet verification script: %w", err) } // the second one must be witness of the current // alphabet multiaccount if !bytes.Equal(w[1].VerificationScript, alphaVerificationScript) { return errIncorrectAlphabet } // the third one must be a placeholder for notary // contract witness if !bytes.Equal(w[2].InvocationScript, p.dummyInvocationScript) || len(w[2].VerificationScript) != 0 { return errIncorrectNotaryPlaceholder } return nil } func (p Preparator) validateAttributes(aa []transaction.Attribute, alphaKeys keys.PublicKeys) error { // main tx must have exactly one attribute if len(aa) != 1 { return errIncorrectAttributesAmount } val, ok := aa[0].Value.(*transaction.NotaryAssisted) if !ok || val.NKeys != uint8(len(alphaKeys)) { return errIncorrectAttribute } return nil } type parsedNotaryEvent struct { hash util.Uint160 notaryType NotaryType params []Op raw *payload.P2PNotaryRequest } func (p parsedNotaryEvent) ScriptHash() util.Uint160 { return p.hash } func (p parsedNotaryEvent) Type() NotaryType { return p.notaryType } func (p parsedNotaryEvent) Params() []Op { return p.params } func (p parsedNotaryEvent) Raw() *payload.P2PNotaryRequest { return p.raw }