neoneo-go/pkg/services/oracle/transaction.go

119 lines
3.1 KiB
Go
Raw Permalink Normal View History

2020-09-25 14:39:11 +00:00
package oracle
import (
"sync"
2020-10-09 07:44:31 +00:00
"time"
2020-09-25 14:39:11 +00:00
"github.com/nspcc-dev/neo-go/pkg/config/netmode"
2020-10-09 07:44:31 +00:00
"github.com/nspcc-dev/neo-go/pkg/core/state"
2020-09-25 14:39:11 +00:00
"github.com/nspcc-dev/neo-go/pkg/core/transaction"
"github.com/nspcc-dev/neo-go/pkg/crypto/hash"
2020-09-25 14:39:11 +00:00
"github.com/nspcc-dev/neo-go/pkg/crypto/keys"
"github.com/nspcc-dev/neo-go/pkg/io"
"github.com/nspcc-dev/neo-go/pkg/smartcontract"
"github.com/nspcc-dev/neo-go/pkg/vm/emit"
)
type (
incompleteTx struct {
sync.RWMutex
// isSent is true if tx has been already broadcasted.
isSent bool
// attempts is how many times the request was processed.
2020-10-09 07:44:31 +00:00
attempts int
// time is the time when the request was last processed.
2020-10-09 07:44:31 +00:00
time time.Time
// request is an oracle request.
2020-10-09 07:44:31 +00:00
request *state.OracleRequest
// tx is an oracle response transaction.
2020-09-25 14:39:11 +00:00
tx *transaction.Transaction
// sigs contains a signature from every oracle node.
2020-09-25 14:39:11 +00:00
sigs map[string]*txSignature
// backupTx is a backup transaction.
2020-09-25 14:39:11 +00:00
backupTx *transaction.Transaction
// backupSigs contains signatures of backup tx.
backupSigs map[string]*txSignature
}
txSignature struct {
// pub is a cached public key.
2020-09-25 14:39:11 +00:00
pub *keys.PublicKey
// ok is true if the signature was verified.
2020-09-25 14:39:11 +00:00
ok bool
// sig is tx signature.
sig []byte
}
)
func newIncompleteTx() *incompleteTx {
return &incompleteTx{
sigs: make(map[string]*txSignature),
backupSigs: make(map[string]*txSignature),
}
}
func (t *incompleteTx) reverifyTx(net netmode.Magic) {
txHash := hash.NetSha256(uint32(net), t.tx)
backupHash := hash.NetSha256(uint32(net), t.backupTx)
2020-09-25 14:39:11 +00:00
for pub, sig := range t.sigs {
if !sig.ok {
sig.ok = sig.pub.Verify(sig.sig, txHash.BytesBE())
if !sig.ok && sig.pub.Verify(sig.sig, backupHash.BytesBE()) {
t.backupSigs[pub] = &txSignature{
pub: sig.pub,
ok: true,
sig: sig.sig,
}
}
}
}
}
func (t *incompleteTx) addResponse(pub *keys.PublicKey, sig []byte, isBackup bool) {
tx, sigs := t.tx, t.sigs
if isBackup {
tx, sigs = t.backupTx, t.backupSigs
}
sigs[string(pub.Bytes())] = &txSignature{
pub: pub,
ok: tx != nil,
sig: sig,
}
}
// finalize checks if either main or backup tx has sufficient number of signatures and returns
2020-09-25 14:39:11 +00:00
// tx and bool value indicating if it is ready to be broadcasted.
2020-10-09 07:44:31 +00:00
func (t *incompleteTx) finalize(oracleNodes keys.PublicKeys, backupOnly bool) (*transaction.Transaction, bool) {
if !backupOnly && finalizeTx(oracleNodes, t.tx, t.sigs) {
2020-09-25 14:39:11 +00:00
return t.tx, true
}
return t.backupTx, finalizeTx(oracleNodes, t.backupTx, t.backupSigs)
}
func finalizeTx(oracleNodes keys.PublicKeys, tx *transaction.Transaction, txSigs map[string]*txSignature) bool {
if tx == nil {
return false
}
m := smartcontract.GetDefaultHonestNodeCount(len(oracleNodes))
sigs := make([][]byte, 0, m)
for _, pub := range oracleNodes {
sig, ok := txSigs[string(pub.Bytes())]
if ok && sig.ok {
sigs = append(sigs, sig.sig)
if len(sigs) == m {
break
}
}
}
if len(sigs) != m {
return false
}
w := io.NewBufBinWriter()
for i := range sigs {
emit.Bytes(w.BinWriter, sigs[i])
}
tx.Scripts[1].InvocationScript = w.Bytes()
return true
}