Update processor message flow around the new SignedBatch flow

This commit is contained in:
Luke Parker 2023-04-10 02:51:15 -04:00
parent ccec529cee
commit b9f38fb354
No known key found for this signature in database
10 changed files with 213 additions and 98 deletions

1
Cargo.lock generated
View file

@ -6593,6 +6593,7 @@ dependencies = [
"serai-client", "serai-client",
"serde", "serde",
"serde_json", "serde_json",
"sp-application-crypto",
"thiserror", "thiserror",
"tokio", "tokio",
"zeroize", "zeroize",

View file

@ -37,6 +37,9 @@ group = "0.13"
transcript = { package = "flexible-transcript", path = "../crypto/transcript" } transcript = { package = "flexible-transcript", path = "../crypto/transcript" }
frost = { package = "modular-frost", path = "../crypto/frost", features = ["ristretto"] } frost = { package = "modular-frost", path = "../crypto/frost", features = ["ristretto"] }
# Substrate
sp-application-crypto = { git = "https://github.com/serai-dex/substrate", default-features = false }
# Bitcoin # Bitcoin
secp256k1 = { version = "0.27", features = ["global-context", "rand-std"], optional = true } secp256k1 = { version = "0.27", features = ["global-context", "rand-std"], optional = true }
k256 = { version = "0.13", features = ["arithmetic"], optional = true } k256 = { version = "0.13", features = ["arithmetic"], optional = true }
@ -50,7 +53,7 @@ monero-serai = { path = "../coins/monero", features = ["multisig"], optional = t
log = "0.4" log = "0.4"
tokio = { version = "1", features = ["full"] } tokio = { version = "1", features = ["full"] }
serai-client = { path = "../substrate//client", default-features = false } serai-client = { path = "../substrate/client", default-features = false }
messages = { package = "processor-messages", path = "./messages" } messages = { package = "processor-messages", path = "./messages" }

View file

@ -10,14 +10,15 @@ use serde::{Serialize, Deserialize};
use dkg::{Participant, ThresholdParams}; use dkg::{Participant, ThresholdParams};
use in_instructions_primitives::InInstructionWithBalance; use serai_primitives::BlockHash;
use in_instructions_primitives::SignedBatch;
use tokens_primitives::OutInstructionWithBalance; use tokens_primitives::OutInstructionWithBalance;
use validator_sets_primitives::ValidatorSet; use validator_sets_primitives::ValidatorSet;
#[derive(Clone, Copy, PartialEq, Eq, Debug, Zeroize, Serialize, Deserialize)] #[derive(Clone, Copy, PartialEq, Eq, Debug, Zeroize, Serialize, Deserialize)]
pub struct SubstrateContext { pub struct SubstrateContext {
pub time: u64, pub time: u64,
pub coin_latest_block_number: u64, pub coin_latest_finalized_block: BlockHash,
} }
pub mod key_gen { pub mod key_gen {
@ -41,6 +42,16 @@ pub mod key_gen {
ConfirmKeyPair { context: SubstrateContext, id: KeyGenId }, ConfirmKeyPair { context: SubstrateContext, id: KeyGenId },
} }
impl CoordinatorMessage {
pub fn required_block(&self) -> Option<BlockHash> {
if let CoordinatorMessage::ConfirmKeyPair { context, .. } = self {
Some(context.coin_latest_finalized_block)
} else {
None
}
}
}
#[derive(Clone, PartialEq, Eq, Debug, Serialize, Deserialize)] #[derive(Clone, PartialEq, Eq, Debug, Serialize, Deserialize)]
pub enum ProcessorMessage { pub enum ProcessorMessage {
// Created commitments for the specified key generation protocol. // Created commitments for the specified key generation protocol.
@ -95,6 +106,12 @@ pub mod sign {
Completed { key: Vec<u8>, id: [u8; 32], tx: Vec<u8> }, Completed { key: Vec<u8>, id: [u8; 32], tx: Vec<u8> },
} }
impl CoordinatorMessage {
pub fn required_block(&self) -> Option<BlockHash> {
None
}
}
#[derive(Clone, PartialEq, Eq, Debug, Zeroize, Serialize, Deserialize)] #[derive(Clone, PartialEq, Eq, Debug, Zeroize, Serialize, Deserialize)]
pub enum ProcessorMessage { pub enum ProcessorMessage {
// Created preprocess for the specified signing protocol. // Created preprocess for the specified signing protocol.
@ -116,18 +133,72 @@ pub mod sign {
} }
} }
pub mod coordinator {
use super::*;
#[derive(Clone, PartialEq, Eq, Debug, Serialize, Deserialize)]
pub enum CoordinatorMessage {
// The validators have off-chain agreeance on this block being finalized. That means it should
// be signed and published to Substrate.
BlockFinalized { key: Vec<u8>, block: BlockHash },
// Uses Vec<u8> instead of [u8; 64] since serde Deserialize isn't implemented for [u8; 64]
BlockPreprocesses { key: Vec<u8>, block: BlockHash, preprocesses: HashMap<Participant, Vec<u8>> },
BlockShares { key: Vec<u8>, block: BlockHash, shares: HashMap<Participant, [u8; 32]> },
// Needed so a client which didn't participate in signing can still realize signing completed
BlockSigned { key: Vec<u8>, block: BlockHash, signature: Vec<u8> },
}
impl CoordinatorMessage {
pub fn required_block(&self) -> Option<BlockHash> {
Some(match self {
CoordinatorMessage::BlockFinalized { block, .. } => *block,
CoordinatorMessage::BlockPreprocesses { block, .. } => *block,
CoordinatorMessage::BlockShares { block, .. } => *block,
CoordinatorMessage::BlockSigned { block, .. } => *block,
})
}
}
#[derive(Clone, PartialEq, Eq, Debug, Zeroize, Serialize, Deserialize)]
pub enum ProcessorMessage {
// This should become an inherent transaction by the block producer.
// As an inherent, this should be ~41 bytes per update.
// Ideally, we don't need to put finalized_block on chain though.
Block { key: Vec<u8>, latest_number: u64, finalized_block: BlockHash },
BlockPreprocess { key: Vec<u8>, block: BlockHash, preprocess: Vec<u8> },
BlockSign { key: Vec<u8>, block: BlockHash, share: [u8; 32] },
}
}
pub mod substrate { pub mod substrate {
use super::*; use super::*;
#[derive(Clone, PartialEq, Eq, Debug, Zeroize, Serialize, Deserialize)] #[derive(Clone, PartialEq, Eq, Debug, Zeroize, Serialize, Deserialize)]
pub enum CoordinatorMessage { pub enum CoordinatorMessage {
BlockAcknowledged { context: SubstrateContext, key: Vec<u8>, block: Vec<u8> }, // Substrate acknwoledged the block, meaning it should be acted upon.
//
// This still needs to come from Substrate, not from the validator-chain, due to it mutating
// the scheduler, which the Substrate chain primarily does. To have two causes of mutation
// requires a definitive ordering, which isn't achievable when we have distinct consensus.
BlockAcknowledged { context: SubstrateContext, key: Vec<u8>, block: BlockHash },
Burns { context: SubstrateContext, burns: Vec<OutInstructionWithBalance> }, Burns { context: SubstrateContext, burns: Vec<OutInstructionWithBalance> },
} }
impl CoordinatorMessage {
pub fn required_block(&self) -> Option<BlockHash> {
let context = match self {
CoordinatorMessage::BlockAcknowledged { context, .. } => context,
CoordinatorMessage::Burns { context, .. } => context,
};
Some(context.coin_latest_finalized_block)
}
}
#[derive(Clone, PartialEq, Eq, Debug, Zeroize, Serialize, Deserialize)] #[derive(Clone, PartialEq, Eq, Debug, Zeroize, Serialize, Deserialize)]
pub enum ProcessorMessage { pub enum ProcessorMessage {
Update { key: Vec<u8>, block: Vec<u8>, instructions: Vec<InInstructionWithBalance> }, Update { key: Vec<u8>, batch: SignedBatch },
} }
} }
@ -135,12 +206,25 @@ pub mod substrate {
pub enum CoordinatorMessage { pub enum CoordinatorMessage {
KeyGen(key_gen::CoordinatorMessage), KeyGen(key_gen::CoordinatorMessage),
Sign(sign::CoordinatorMessage), Sign(sign::CoordinatorMessage),
Coordinator(coordinator::CoordinatorMessage),
Substrate(substrate::CoordinatorMessage), Substrate(substrate::CoordinatorMessage),
} }
impl CoordinatorMessage {
pub fn required_block(&self) -> Option<BlockHash> {
match self {
CoordinatorMessage::KeyGen(msg) => msg.required_block(),
CoordinatorMessage::Sign(msg) => msg.required_block(),
CoordinatorMessage::Coordinator(msg) => msg.required_block(),
CoordinatorMessage::Substrate(msg) => msg.required_block(),
}
}
}
#[derive(Clone, PartialEq, Eq, Debug, Serialize, Deserialize)] #[derive(Clone, PartialEq, Eq, Debug, Serialize, Deserialize)]
pub enum ProcessorMessage { pub enum ProcessorMessage {
KeyGen(key_gen::ProcessorMessage), KeyGen(key_gen::ProcessorMessage),
Sign(sign::ProcessorMessage), Sign(sign::ProcessorMessage),
Coordinator(coordinator::ProcessorMessage),
Substrate(substrate::ProcessorMessage), Substrate(substrate::ProcessorMessage),
} }

View file

@ -37,7 +37,7 @@ use bitcoin_serai::bitcoin::{
}; };
use serai_client::{ use serai_client::{
primitives::{MAX_DATA_LEN, BITCOIN, Amount, Balance}, primitives::{MAX_DATA_LEN, BITCOIN, BITCOIN_NET_ID, NetworkId, Amount, Balance},
coins::bitcoin::Address, coins::bitcoin::Address,
}; };
@ -286,6 +286,7 @@ impl Coin for Bitcoin {
type Address = Address; type Address = Address;
const NETWORK: NetworkId = BITCOIN_NET_ID;
const ID: &'static str = "Bitcoin"; const ID: &'static str = "Bitcoin";
const CONFIRMATIONS: usize = 3; const CONFIRMATIONS: usize = 3;

View file

@ -10,7 +10,7 @@ use frost::{
sign::PreprocessMachine, sign::PreprocessMachine,
}; };
use serai_client::primitives::Balance; use serai_client::primitives::{NetworkId, Balance};
#[cfg(feature = "bitcoin")] #[cfg(feature = "bitcoin")]
pub mod bitcoin; pub mod bitcoin;
@ -157,6 +157,7 @@ impl<E: Eventuality> Default for EventualitiesTracker<E> {
} }
pub trait Block<C: Coin>: Send + Sync + Sized + Clone + Debug { pub trait Block<C: Coin>: Send + Sync + Sized + Clone + Debug {
// This is currently bounded to being 32-bytes.
type Id: 'static + Id; type Id: 'static + Id;
fn id(&self) -> Self::Id; fn id(&self) -> Self::Id;
fn median_fee(&self) -> C::Fee; fn median_fee(&self) -> C::Fee;
@ -249,6 +250,8 @@ pub trait Coin: 'static + Send + Sync + Clone + PartialEq + Eq + Debug {
+ TryInto<Vec<u8>> + TryInto<Vec<u8>>
+ TryFrom<Vec<u8>>; + TryFrom<Vec<u8>>;
/// Network ID for this coin.
const NETWORK: NetworkId;
/// String ID for this coin. /// String ID for this coin.
const ID: &'static str; const ID: &'static str;
/// The amount of confirmations required to consider a block 'final'. /// The amount of confirmations required to consider a block 'final'.

View file

@ -26,7 +26,7 @@ use monero_serai::{
use tokio::time::sleep; use tokio::time::sleep;
pub use serai_client::{ pub use serai_client::{
primitives::{MAX_DATA_LEN, MONERO, Amount, Balance}, primitives::{MAX_DATA_LEN, MONERO, MONERO_NET_ID, NetworkId, Amount, Balance},
coins::monero::Address, coins::monero::Address,
}; };
@ -217,6 +217,7 @@ impl Coin for Monero {
type Address = Address; type Address = Address;
const NETWORK: NetworkId = MONERO_NET_ID;
const ID: &'static str = "Monero"; const ID: &'static str = "Monero";
const CONFIRMATIONS: usize = 10; const CONFIRMATIONS: usize = 10;

View file

@ -15,7 +15,7 @@ use frost::{
use log::info; use log::info;
use serai_client::validator_sets::primitives::ValidatorSet; use serai_client::{primitives::BlockHash, validator_sets::primitives::ValidatorSet};
use messages::key_gen::*; use messages::key_gen::*;
use crate::{DbTxn, Db, coins::Coin}; use crate::{DbTxn, Db, coins::Coin};
@ -23,7 +23,7 @@ use crate::{DbTxn, Db, coins::Coin};
#[derive(Debug)] #[derive(Debug)]
pub enum KeyGenEvent<C: Ciphersuite> { pub enum KeyGenEvent<C: Ciphersuite> {
KeyConfirmed { KeyConfirmed {
activation_number: usize, activation_block: BlockHash,
substrate_keys: ThresholdKeys<Ristretto>, substrate_keys: ThresholdKeys<Ristretto>,
coin_keys: ThresholdKeys<C>, coin_keys: ThresholdKeys<C>,
}, },
@ -374,7 +374,7 @@ impl<C: Coin, D: Db> KeyGen<C, D> {
); );
KeyGenEvent::KeyConfirmed { KeyGenEvent::KeyConfirmed {
activation_number: context.coin_latest_block_number.try_into().unwrap(), activation_block: context.coin_latest_finalized_block,
substrate_keys, substrate_keys,
coin_keys, coin_keys,
} }

View file

@ -19,12 +19,14 @@ use tokio::time::sleep;
use scale::Decode; use scale::Decode;
use serai_client::{ use serai_client::{
primitives::MAX_DATA_LEN, primitives::{MAX_DATA_LEN, BlockHash},
tokens::primitives::{OutInstruction, OutInstructionWithBalance}, tokens::primitives::{OutInstruction, OutInstructionWithBalance},
in_instructions::primitives::{Shorthand, RefundableInInstruction, InInstructionWithBalance}, in_instructions::primitives::{
Shorthand, RefundableInInstruction, InInstructionWithBalance, Batch, SignedBatch,
},
}; };
use messages::{SubstrateContext, sign, substrate, CoordinatorMessage, ProcessorMessage}; use messages::{SubstrateContext, CoordinatorMessage, ProcessorMessage};
mod plan; mod plan;
pub use plan::*; pub use plan::*;
@ -135,8 +137,15 @@ async fn sign_plans<C: Coin, D: Db>(
plans: Vec<Plan<C>>, plans: Vec<Plan<C>>,
) { ) {
let mut plans = VecDeque::from(plans); let mut plans = VecDeque::from(plans);
let start = SystemTime::UNIX_EPOCH.checked_add(Duration::from_secs(context.time)).unwrap(); let start = SystemTime::UNIX_EPOCH.checked_add(Duration::from_secs(context.time)).unwrap();
let block_number = context.coin_latest_block_number.try_into().unwrap();
let mut block_hash = <C::Block as Block<C>>::Id::default();
block_hash.as_mut().copy_from_slice(&context.coin_latest_finalized_block.0);
let block_number = scanner
.block_number(&block_hash)
.await
.expect("told to sign_plans on a context we're not synced to");
let fee = get_fee(coin, block_number).await; let fee = get_fee(coin, block_number).await;
@ -145,7 +154,7 @@ async fn sign_plans<C: Coin, D: Db>(
info!("preparing plan {}: {:?}", hex::encode(id), plan); info!("preparing plan {}: {:?}", hex::encode(id), plan);
let key = plan.key.to_bytes(); let key = plan.key.to_bytes();
db.save_signing(key.as_ref(), context.coin_latest_block_number, context.time, &plan); db.save_signing(key.as_ref(), block_number.try_into().unwrap(), context.time, &plan);
let (tx, branches) = prepare_send(coin, &signers[key.as_ref()], block_number, fee, plan).await; let (tx, branches) = prepare_send(coin, &signers[key.as_ref()], block_number, fee, plan).await;
// TODO: If we reboot mid-sign_plans, for a DB-backed scheduler, these may be partially // TODO: If we reboot mid-sign_plans, for a DB-backed scheduler, these may be partially
@ -253,45 +262,34 @@ async fn run<C: Coin, D: Db, Co: Coordinator>(raw_db: D, coin: C, mut coordinato
// If this message expects a higher block number than we have, halt until synced // If this message expects a higher block number than we have, halt until synced
async fn wait<C: Coin, D: Db>( async fn wait<C: Coin, D: Db>(
coin: &C,
scanner: &ScannerHandle<C, D>, scanner: &ScannerHandle<C, D>,
context: &SubstrateContext block_hash: &BlockHash
) { ) {
let needed = usize::try_from(context.coin_latest_block_number).unwrap(); let mut needed_hash = <C::Block as Block<C>>::Id::default();
needed_hash.as_mut().copy_from_slice(&block_hash.0);
let block_number;
loop { loop {
let Ok(actual) = coin.get_latest_block_number().await else { // Ensure our scanner has scanned this block, which means our daemon has this block at
error!("couldn't get the latest block number"); // a sufficient depth
// Sleep for a minute as node errors should be incredibly uncommon yet take multiple let Some(block_number_inner) = scanner.block_number(&needed_hash).await else {
// seconds to resolve warn!(
sleep(Duration::from_secs(60)).await; "node is desynced. we haven't scanned {} which should happen after {} confirms",
hex::encode(&needed_hash),
C::CONFIRMATIONS,
);
sleep(Duration::from_secs(10)).await;
continue; continue;
}; };
block_number = block_number_inner;
// Check our daemon has this block break;
// CONFIRMATIONS - 1 since any block's TXs have one confirmation (the block itself)
let confirmed = actual.saturating_sub(C::CONFIRMATIONS - 1);
if needed > confirmed {
// This may occur within some natural latency window
warn!(
"node is desynced. need block {}, have {}",
// Print the block needed for the needed block to be confirmed
needed + (C::CONFIRMATIONS - 1),
actual,
);
// Sleep for one second per needed block
// If the node is disconnected from the network, this will be faster than it should
// be, yet presumably it just neeeds a moment to sync up
sleep(Duration::from_secs((needed - confirmed).try_into().unwrap())).await;
} }
// Check our scanner has scanned it // While the scanner has cemented this block, that doesn't mean it's been scanned for all
// This check does void the need for the last one, yet it provides a bit better // keys
// debugging // ram_scanned will return the lowest scanned block number out of all keys
let ram_scanned = scanner.ram_scanned().await; while scanner.ram_scanned().await < block_number {
if ram_scanned < needed { sleep(Duration::from_secs(1)).await;
warn!("scanner is behind. need block {}, scanned up to {}", needed, ram_scanned);
sleep(Duration::from_secs((needed - ram_scanned).try_into().unwrap())).await;
} }
// TODO: Sanity check we got an AckBlock (or this is the AckBlock) for the block in // TODO: Sanity check we got an AckBlock (or this is the AckBlock) for the block in
@ -312,33 +310,28 @@ async fn run<C: Coin, D: Db, Co: Coordinator>(raw_db: D, coin: C, mut coordinato
Ok(()) Ok(())
}; };
*/ */
break;
}
} }
match &msg.msg { if let Some(required) = msg.msg.required_block() {
CoordinatorMessage::KeyGen(_) => {}, wait(&scanner, &required).await;
CoordinatorMessage::Sign(_) => {},
CoordinatorMessage::Substrate(msg) => {
match msg {
substrate::CoordinatorMessage::BlockAcknowledged { context, .. } => {
wait(&coin, &scanner, context).await;
},
substrate::CoordinatorMessage::Burns { context, .. } => {
wait(&coin, &scanner, context).await;
},
}
},
} }
match msg.msg.clone() { match msg.msg.clone() {
CoordinatorMessage::KeyGen(msg) => { CoordinatorMessage::KeyGen(msg) => {
match key_gen.handle(msg).await { match key_gen.handle(msg).await {
// TODO: Handle substrate_keys // TODO: Handle substrate_keys
KeyGenEvent::KeyConfirmed { activation_number, substrate_keys: _, coin_keys } => { KeyGenEvent::KeyConfirmed { activation_block, substrate_keys: _, coin_keys } => {
let keys = coin_keys; let keys = coin_keys;
let key = keys.group_key(); let key = keys.group_key();
let mut activation_block_hash = <C::Block as Block<C>>::Id::default();
activation_block_hash.as_mut().copy_from_slice(&activation_block.0);
let activation_number =
scanner
.block_number(&activation_block_hash)
.await
.expect("KeyConfirmed from context we haven't synced");
scanner.rotate_key(activation_number, key).await; scanner.rotate_key(activation_number, key).await;
schedulers.insert(key.to_bytes().as_ref().to_vec(), Scheduler::<C>::new(key)); schedulers.insert(key.to_bytes().as_ref().to_vec(), Scheduler::<C>::new(key));
signers.insert( signers.insert(
@ -358,13 +351,19 @@ async fn run<C: Coin, D: Db, Co: Coordinator>(raw_db: D, coin: C, mut coordinato
signers[msg.key()].handle(msg).await; signers[msg.key()].handle(msg).await;
} }
CoordinatorMessage::Coordinator(_) => todo!(),
CoordinatorMessage::Substrate(msg) => { CoordinatorMessage::Substrate(msg) => {
match msg { match msg {
substrate::CoordinatorMessage::BlockAcknowledged { context, key: key_vec, block } => { messages::substrate::CoordinatorMessage::BlockAcknowledged {
context,
key: key_vec,
block
} => {
let key = let key =
<C::Curve as Ciphersuite>::read_G::<&[u8]>(&mut key_vec.as_ref()).unwrap(); <C::Curve as Ciphersuite>::read_G::<&[u8]>(&mut key_vec.as_ref()).unwrap();
let mut block_id = <C::Block as Block<C>>::Id::default(); let mut block_id = <C::Block as Block<C>>::Id::default();
block_id.as_mut().copy_from_slice(&block); block_id.as_mut().copy_from_slice(&block.0);
let plans = schedulers let plans = schedulers
.get_mut(&key_vec) .get_mut(&key_vec)
@ -381,7 +380,7 @@ async fn run<C: Coin, D: Db, Co: Coordinator>(raw_db: D, coin: C, mut coordinato
).await; ).await;
} }
substrate::CoordinatorMessage::Burns { context, burns } => { messages::substrate::CoordinatorMessage::Burns { context, burns } => {
// TODO2: Rewrite rotation documentation // TODO2: Rewrite rotation documentation
let schedule_key = active_keys.last().expect("burn event despite no keys"); let schedule_key = active_keys.last().expect("burn event despite no keys");
let scheduler = schedulers.get_mut(schedule_key.to_bytes().as_ref()).unwrap(); let scheduler = schedulers.get_mut(schedule_key.to_bytes().as_ref()).unwrap();
@ -424,9 +423,18 @@ async fn run<C: Coin, D: Db, Co: Coordinator>(raw_db: D, coin: C, mut coordinato
// TODO // TODO
match msg.unwrap() { match msg.unwrap() {
ScannerEvent::Outputs(key, block, outputs) => { ScannerEvent::Outputs(key, block, outputs) => {
coordinator.send(ProcessorMessage::Substrate(substrate::ProcessorMessage::Update { let key = key.to_bytes().as_ref().to_vec();
key: key.to_bytes().as_ref().to_vec(),
block: block.as_ref().to_vec(), let mut block_hash = [0; 32];
block_hash.copy_from_slice(block.as_ref());
// TODO
let id = 0;
let batch = Batch {
network: C::NETWORK,
id,
block: BlockHash(block_hash),
instructions: outputs.iter().filter_map(|output| { instructions: outputs.iter().filter_map(|output| {
// If these aren't externally received funds, don't handle it as an instruction // If these aren't externally received funds, don't handle it as an instruction
if output.kind() != OutputType::External { if output.kind() != OutputType::External {
@ -451,8 +459,18 @@ async fn run<C: Coin, D: Db, Co: Coordinator>(raw_db: D, coin: C, mut coordinato
instruction: instruction.instruction, instruction: instruction.instruction,
balance: output.balance(), balance: output.balance(),
}) })
}).collect(), }).collect()
})).await; };
coordinator.send(ProcessorMessage::Substrate(
messages::substrate::ProcessorMessage::Update {
key,
batch: SignedBatch {
batch,
signature: sp_application_crypto::sr25519::Signature([0; 64]),
},
}
)).await;
}, },
} }
}, },
@ -462,7 +480,7 @@ async fn run<C: Coin, D: Db, Co: Coordinator>(raw_db: D, coin: C, mut coordinato
SignerEvent::SignedTransaction { id, tx } => { SignerEvent::SignedTransaction { id, tx } => {
main_db.finish_signing(&key, id); main_db.finish_signing(&key, id);
coordinator coordinator
.send(ProcessorMessage::Sign(sign::ProcessorMessage::Completed { .send(ProcessorMessage::Sign(messages::sign::ProcessorMessage::Completed {
key, key,
id, id,
tx: tx.as_ref().to_vec() tx: tx.as_ref().to_vec()

View file

@ -232,6 +232,10 @@ impl<C: Coin, D: Db> ScannerHandle<C, D> {
scanner.keys.push(key); scanner.keys.push(key);
} }
pub async fn block_number(&self, id: &<C::Block as Block<C>>::Id) -> Option<usize> {
self.scanner.read().await.db.block_number(id)
}
/// Acknowledge having handled a block for a key. /// Acknowledge having handled a block for a key.
pub async fn ack_block( pub async fn ack_block(
&self, &self,
@ -341,7 +345,7 @@ impl<C: Coin, D: Db> Scanner<C, D> {
if let Some(id) = scanner.db.block(i) { if let Some(id) = scanner.db.block(i) {
// TODO2: Also check this block builds off the previous block // TODO2: Also check this block builds off the previous block
if id != block.id() { if id != block_id {
panic!("{} reorg'd from {id:?} to {:?}", C::ID, hex::encode(block_id)); panic!("{} reorg'd from {id:?} to {:?}", C::ID, hex::encode(block_id));
} }
} else { } else {

View file

@ -8,7 +8,7 @@ use group::GroupEncoding;
use frost::{Participant, ThresholdParams, tests::clone_without}; use frost::{Participant, ThresholdParams, tests::clone_without};
use serai_client::{ use serai_client::{
primitives::MONERO_NET_ID, primitives::{MONERO_NET_ID, BlockHash},
validator_sets::primitives::{Session, ValidatorSet}, validator_sets::primitives::{Session, ValidatorSet},
}; };
@ -119,14 +119,14 @@ pub async fn test_key_gen<C: Coin>() {
for i in 1 ..= 5 { for i in 1 ..= 5 {
let key_gen = key_gens.get_mut(&i).unwrap(); let key_gen = key_gens.get_mut(&i).unwrap();
if let KeyGenEvent::KeyConfirmed { activation_number, substrate_keys, coin_keys } = key_gen if let KeyGenEvent::KeyConfirmed { activation_block, substrate_keys, coin_keys } = key_gen
.handle(CoordinatorMessage::ConfirmKeyPair { .handle(CoordinatorMessage::ConfirmKeyPair {
context: SubstrateContext { time: 0, coin_latest_block_number: 111 }, context: SubstrateContext { time: 0, coin_latest_finalized_block: BlockHash([0x11; 32]) },
id: ID, id: ID,
}) })
.await .await
{ {
assert_eq!(activation_number, 111); assert_eq!(activation_block, BlockHash([0x11; 32]));
let params = let params =
ThresholdParams::new(3, 5, Participant::new(u16::try_from(i).unwrap()).unwrap()).unwrap(); ThresholdParams::new(3, 5, Participant::new(u16::try_from(i).unwrap()).unwrap()).unwrap();
assert_eq!(substrate_keys.params(), params); assert_eq!(substrate_keys.params(), params);