From d01d6d9672cdfe7732b74d00979c731a8ae2096c Mon Sep 17 00:00:00 2001 From: Daniel Knopik <107140945+dknopik@users.noreply.github.com> Date: Mon, 17 Feb 2025 16:37:00 +0100 Subject: [PATCH 1/3] deduplicate types and redundant impls (#144) --- Cargo.lock | 126 ++--- anchor/common/qbft/src/lib.rs | 10 +- anchor/common/qbft/src/tests.rs | 47 +- anchor/common/ssv_types/src/cluster.rs | 47 +- anchor/common/ssv_types/src/consensus.rs | 94 +--- anchor/common/ssv_types/src/message.rs | 168 ++---- anchor/common/ssv_types/src/msgid.rs | 91 +++- anchor/common/ssv_types/src/operator.rs | 6 +- anchor/network/Cargo.toml | 6 +- anchor/network/src/lib.rs | 1 - anchor/network/src/network.rs | 2 +- anchor/network/src/types.rs | 2 - anchor/network/src/types/gossip_kind.rs | 3 - anchor/network/src/types/ssv_message.rs | 634 ----------------------- anchor/qbft_manager/src/lib.rs | 2 +- anchor/qbft_manager/src/tests.rs | 3 +- 16 files changed, 184 insertions(+), 1058 deletions(-) delete mode 100644 anchor/network/src/types.rs delete mode 100644 anchor/network/src/types/gossip_kind.rs delete mode 100644 anchor/network/src/types/ssv_message.rs diff --git a/Cargo.lock b/Cargo.lock index 6f45067a..a560cdae 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -735,7 +735,7 @@ dependencies = [ "beacon_node_fallback", "dashmap", "database", - "ethereum_ssz 0.7.1", + "ethereum_ssz", "futures", "hex", "openssl", @@ -1516,13 +1516,13 @@ dependencies = [ "blst", "ethereum_hashing", "ethereum_serde_utils", - "ethereum_ssz 0.7.1", + "ethereum_ssz", "fixed_bytes", "hex", "rand", "safe_arith", "serde", - "tree_hash 0.8.0", + "tree_hash", "zeroize", ] @@ -1783,7 +1783,7 @@ dependencies = [ "clap", "dirs 3.0.2", "eth2_network_config", - "ethereum_ssz 0.7.1", + "ethereum_ssz", "hex", "serde", "serde_json", @@ -2737,8 +2737,8 @@ dependencies = [ "enr", "eth2_keystore", "ethereum_serde_utils", - "ethereum_ssz 0.7.1", - "ethereum_ssz_derive 0.7.1", + "ethereum_ssz", + "ethereum_ssz_derive", "futures", "futures-util", "libp2p-identity", @@ -2752,7 +2752,7 @@ dependencies = [ "serde", "serde_json", "slashing_protection", - "ssz_types 0.8.0", + "ssz_types", "types", "zeroize", ] @@ -2869,21 +2869,6 @@ dependencies = [ "smallvec", ] -[[package]] -name = "ethereum_ssz" -version = "0.8.2" -source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "862e41ea8eea7508f70cfd8cd560f0c34bb0af37c719a8e06c2672f0f031d8e5" -dependencies = [ - "alloy-primitives", - "ethereum_serde_utils", - "itertools 0.13.0", - "serde", - "serde_derive", - "smallvec", - "typenum", -] - [[package]] name = "ethereum_ssz_derive" version = "0.7.1" @@ -2896,18 +2881,6 @@ dependencies = [ "syn 2.0.98", ] -[[package]] -name = "ethereum_ssz_derive" -version = "0.8.2" -source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "d31ecf6640112f61dc34b4d8359c081102969af0edd18381fed2052f6db6a410" -dependencies = [ - "darling 0.20.10", - "proc-macro2", - "quote", - "syn 2.0.98", -] - [[package]] name = "event-listener" version = "2.5.3" @@ -4297,13 +4270,13 @@ dependencies = [ "derivative", "ethereum_hashing", "ethereum_serde_utils", - "ethereum_ssz 0.7.1", - "ethereum_ssz_derive 0.7.1", + "ethereum_ssz", + "ethereum_ssz_derive", "hex", "rust_eth_kzg", "serde", "serde_json", - "tree_hash 0.8.0", + "tree_hash", ] [[package]] @@ -4899,8 +4872,8 @@ dependencies = [ "discv5", "either", "eth2", - "ethereum_ssz 0.7.1", - "ethereum_ssz_derive 0.7.1", + "ethereum_ssz", + "ethereum_ssz_derive", "fnv", "futures", "gossipsub", @@ -4921,7 +4894,7 @@ dependencies = [ "slog", "smallvec", "snap", - "ssz_types 0.8.0", + "ssz_types", "strum 0.24.1", "superstruct", "task_executor", @@ -5153,14 +5126,14 @@ dependencies = [ "arbitrary", "derivative", "ethereum_hashing", - "ethereum_ssz 0.7.1", - "ethereum_ssz_derive 0.7.1", + "ethereum_ssz", + "ethereum_ssz_derive", "itertools 0.13.0", "parking_lot", "rayon", "serde", "smallvec", - "tree_hash 0.8.0", + "tree_hash", "triomphe", "typenum", "vec_map", @@ -5361,8 +5334,8 @@ dependencies = [ "async-trait", "dirs 6.0.0", "discv5", - "ethereum_ssz 0.8.2", - "ethereum_ssz_derive 0.8.2", + "ethereum_ssz", + "ethereum_ssz_derive", "futures", "hex", "libp2p", @@ -5373,7 +5346,7 @@ dependencies = [ "serde", "serde_json", "ssv_types", - "ssz_types 0.10.0", + "ssz_types", "subnet_tracker", "task_executor", "thiserror 1.0.69", @@ -6125,8 +6098,8 @@ name = "proto_array" version = "0.2.0" source = "git+https://github.com/sigp/lighthouse?rev=1a77f7a0#1a77f7a0609fc96d1cc2eb74da7fe90aef046352" dependencies = [ - "ethereum_ssz 0.7.1", - "ethereum_ssz_derive 0.7.1", + "ethereum_ssz", + "ethereum_ssz_derive", "safe_arith", "serde", "serde_yaml", @@ -6164,8 +6137,8 @@ name = "qbft" version = "0.1.0" dependencies = [ "derive_more 1.0.0", - "ethereum_ssz 0.7.1", - "ethereum_ssz_derive 0.7.1", + "ethereum_ssz", + "ethereum_ssz_derive", "indexmap", "sha2 0.10.8", "ssv_types", @@ -6180,8 +6153,8 @@ version = "0.1.0" dependencies = [ "async-channel 1.9.0", "dashmap", - "ethereum_ssz 0.7.1", - "ethereum_ssz_derive 0.7.1", + "ethereum_ssz", + "ethereum_ssz_derive", "futures", "openssl", "processor", @@ -7469,14 +7442,14 @@ version = "0.1.0" dependencies = [ "base64 0.22.1", "derive_more 1.0.0", - "ethereum_ssz 0.7.1", - "ethereum_ssz_derive 0.7.1", + "ethereum_ssz", + "ethereum_ssz_derive", "hex", "indexmap", "openssl", "rusqlite", "sha2 0.10.8", - "tree_hash 0.8.0", + "tree_hash", "tree_hash_derive", "types", ] @@ -7490,28 +7463,12 @@ dependencies = [ "arbitrary", "derivative", "ethereum_serde_utils", - "ethereum_ssz 0.7.1", + "ethereum_ssz", "itertools 0.13.0", "serde", "serde_derive", "smallvec", - "tree_hash 0.8.0", - "typenum", -] - -[[package]] -name = "ssz_types" -version = "0.10.0" -source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "22bc24c8a61256950632fb6b68ea09f6b5c988070924c6292eb5933635202e00" -dependencies = [ - "ethereum_serde_utils", - "ethereum_ssz 0.8.2", - "itertools 0.13.0", - "serde", - "serde_derive", - "smallvec", - "tree_hash 0.9.0", + "tree_hash", "typenum", ] @@ -8215,19 +8172,6 @@ dependencies = [ "smallvec", ] -[[package]] -name = "tree_hash" -version = "0.9.0" -source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "3cc60ae4c4236ee721305d0f0b5aa3e8ef5b66f3fa61d17072430bc246d6694a" -dependencies = [ - "alloy-primitives", - "ethereum_hashing", - "ethereum_ssz 0.8.2", - "smallvec", - "typenum", -] - [[package]] name = "tree_hash_derive" version = "0.8.0" @@ -8297,8 +8241,8 @@ dependencies = [ "eth2_interop_keypairs", "ethereum_hashing", "ethereum_serde_utils", - "ethereum_ssz 0.7.1", - "ethereum_ssz_derive 0.7.1", + "ethereum_ssz", + "ethereum_ssz_derive", "fixed_bytes", "hex", "int_to_bytes", @@ -8322,12 +8266,12 @@ dependencies = [ "serde_yaml", "slog", "smallvec", - "ssz_types 0.8.0", + "ssz_types", "superstruct", "swap_or_not_shuffle", "tempfile", "test_random_derive", - "tree_hash 0.8.0", + "tree_hash", "tree_hash_derive", ] @@ -8524,7 +8468,7 @@ dependencies = [ "task_executor", "tokio", "tracing", - "tree_hash 0.8.0", + "tree_hash", "types", "validator_metrics", "validator_store", diff --git a/anchor/common/qbft/src/lib.rs b/anchor/common/qbft/src/lib.rs index 525d72d5..49547699 100644 --- a/anchor/common/qbft/src/lib.rs +++ b/anchor/common/qbft/src/lib.rs @@ -1,9 +1,11 @@ use crate::msg_container::MessageContainer; use ssv_types::consensus::{QbftData, QbftMessage, QbftMessageType, UnsignedSSVMessage}; -use ssv_types::message::{MessageID, MsgType, SSVMessage, SignedSSVMessage}; +use ssv_types::message::{MsgType, SSVMessage, SignedSSVMessage}; +use ssv_types::msgid::MessageId; use ssv_types::OperatorId; use ssz::{Decode, Encode}; use std::collections::HashMap; +use std::ops::Deref; use std::sync::Arc; use tracing::{debug, error, warn}; use types::Hash256; @@ -75,7 +77,7 @@ where /// The initial configuration used to establish this instance of QBFT. config: Config, /// The identification of this QBFT instance - identifier: MessageID, + identifier: MessageId, /// The instance height acts as an ID for the current instance and helps distinguish it from /// other instances. instance_height: InstanceHeight, @@ -134,7 +136,7 @@ where let mut qbft = Qbft { config, - identifier: MessageID::new([0; 56]), + identifier: MessageId::from([0; 56]), instance_height, start_data_hash, @@ -233,7 +235,7 @@ where } // Make sure there is only one signer and the signer is in our committee - let signer = if let [signer] = wrapped_msg.signed_message.operator_ids().as_slice() { + let signer = if let &[signer] = wrapped_msg.signed_message.operator_ids().deref() { if !self.check_committee(&OperatorId::from(*signer)) { warn!("Signer is not part of committee"); return None; diff --git a/anchor/common/qbft/src/tests.rs b/anchor/common/qbft/src/tests.rs index 7ffde55e..2afe3ee4 100644 --- a/anchor/common/qbft/src/tests.rs +++ b/anchor/common/qbft/src/tests.rs @@ -8,7 +8,7 @@ use sha2::{Digest, Sha256}; use ssv_types::consensus::UnsignedSSVMessage; use ssv_types::message::SignedSSVMessage; use ssv_types::OperatorId; -use ssz::{Decode, DecodeError, Encode}; +use ssz_derive::{Decode, Encode}; use std::cell::RefCell; use std::collections::{HashSet, VecDeque}; use std::rc::Rc; @@ -21,49 +21,10 @@ use types::Hash256; const ENABLE_TEST_LOGGING: bool = true; /// Test data structure that implements the Data trait -#[derive(Debug, Clone, Default)] +#[derive(Debug, Clone, Default, Encode, Decode)] +#[ssz(struct_behaviour = "transparent")] struct TestData(u64); -impl Encode for TestData { - fn is_ssz_fixed_len() -> bool { - true - } - - fn ssz_append(&self, buf: &mut Vec) { - let value = self.0; - buf.extend_from_slice(&value.to_le_bytes()); - } - - fn ssz_fixed_len() -> usize { - 8 // u64 size - } - - fn ssz_bytes_len(&self) -> usize { - 8 // u64 size - } -} - -impl Decode for TestData { - fn is_ssz_fixed_len() -> bool { - true - } - - fn ssz_fixed_len() -> usize { - 8 // u64 size - } - - fn from_ssz_bytes(bytes: &[u8]) -> Result { - if bytes.len() != 8 { - return Err(DecodeError::InvalidByteLength { - len: bytes.len(), - expected: 8, - }); - } - let value = u64::from_le_bytes(bytes.try_into().unwrap()); - Ok(TestData(value)) - } -} - impl QbftData for TestData { type Hash = Hash256; @@ -86,7 +47,7 @@ fn convert_unsigned_to_wrapped( // Create a signed message containing just this operator let signed_message = SignedSSVMessage::new( vec![vec![0; 96]], // Test signature of 96 bytes - vec![*operator_id], + vec![OperatorId(*operator_id)], msg.ssv_message.clone(), msg.full_data, ) diff --git a/anchor/common/ssv_types/src/cluster.rs b/anchor/common/ssv_types/src/cluster.rs index 66fff044..403e51b0 100644 --- a/anchor/common/ssv_types/src/cluster.rs +++ b/anchor/common/ssv_types/src/cluster.rs @@ -1,7 +1,7 @@ use crate::OperatorId; use derive_more::{Deref, From}; use indexmap::IndexSet; -use ssz::{Decode, DecodeError, Encode}; +use ssz_derive::{Decode, Encode}; use types::{Address, Graffiti, PublicKeyBytes}; /// Unique identifier for a cluster @@ -49,51 +49,10 @@ pub struct ClusterMember { } /// Index of the validator in the validator registry. -#[derive(Clone, Copy, Debug, Default, Eq, PartialEq, Hash, From, Deref)] +#[derive(Clone, Copy, Debug, Default, Eq, PartialEq, Hash, From, Deref, Encode, Decode)] +#[ssz(struct_behaviour = "transparent")] pub struct ValidatorIndex(pub usize); -impl Encode for ValidatorIndex { - fn is_ssz_fixed_len() -> bool { - true - } - - fn ssz_append(&self, buf: &mut Vec) { - // Convert usize to u64 for consistent encoding across platforms - let value = self.0 as u64; - buf.extend_from_slice(&value.to_le_bytes()); - } - - fn ssz_fixed_len() -> usize { - 8 // Size of u64 in bytes - } - - fn ssz_bytes_len(&self) -> usize { - 8 // Size of u64 in bytes - } -} - -impl Decode for ValidatorIndex { - fn is_ssz_fixed_len() -> bool { - true - } - - fn ssz_fixed_len() -> usize { - 8 // Size of u64 in bytes - } - - fn from_ssz_bytes(bytes: &[u8]) -> Result { - if bytes.len() != 8 { - return Err(DecodeError::InvalidByteLength { - len: bytes.len(), - expected: 8, - }); - } - - let value = u64::from_le_bytes(bytes.try_into().unwrap()); - Ok(ValidatorIndex(value as usize)) - } -} - /// General Metadata about a Validator #[derive(Debug, Clone)] pub struct ValidatorMetadata { diff --git a/anchor/common/ssv_types/src/consensus.rs b/anchor/common/ssv_types/src/consensus.rs index 0fb1afe8..d20f9085 100644 --- a/anchor/common/ssv_types/src/consensus.rs +++ b/anchor/common/ssv_types/src/consensus.rs @@ -1,4 +1,5 @@ use crate::message::*; +use crate::msgid::MessageId; use crate::{OperatorId, ValidatorIndex}; use sha2::{Digest, Sha256}; use ssz::{Decode, DecodeError, Encode}; @@ -51,7 +52,7 @@ pub struct QbftMessage { pub qbft_message_type: QbftMessageType, pub height: u64, pub round: u64, - pub identifier: MessageID, + pub identifier: MessageId, pub root: Hash256, pub data_round: u64, pub round_change_justification: Vec, // always without full_data @@ -190,51 +191,10 @@ pub struct ValidatorDuty { pub validator_sync_committee_indices: VariableList, } -#[derive(Clone, Debug, PartialEq)] +#[derive(Clone, Debug, PartialEq, Encode, Decode)] +#[ssz(struct_behaviour = "transparent")] pub struct BeaconRole(u64); -// BeaconRole SSZ implementation -impl Encode for BeaconRole { - fn is_ssz_fixed_len() -> bool { - true - } - - fn ssz_append(&self, buf: &mut Vec) { - buf.extend_from_slice(&self.0.to_le_bytes()); - } - - fn ssz_fixed_len() -> usize { - 8 - } - - fn ssz_bytes_len(&self) -> usize { - 8 - } -} - -impl Decode for BeaconRole { - fn is_ssz_fixed_len() -> bool { - true - } - - fn ssz_fixed_len() -> usize { - 8 - } - - fn from_ssz_bytes(bytes: &[u8]) -> Result { - if bytes.len() != 8 { - return Err(DecodeError::InvalidByteLength { - len: bytes.len(), - expected: 8, - }); - } - - let mut array = [0u8; 8]; - array.copy_from_slice(bytes); - Ok(BeaconRole(u64::from_le_bytes(array))) - } -} - pub const BEACON_ROLE_ATTESTER: BeaconRole = BeaconRole(0); pub const BEACON_ROLE_AGGREGATOR: BeaconRole = BeaconRole(1); pub const BEACON_ROLE_PROPOSER: BeaconRole = BeaconRole(2); @@ -262,52 +222,10 @@ impl TreeHash for BeaconRole { } } -#[derive(Clone, Debug, PartialEq)] +#[derive(Clone, Debug, PartialEq, Decode, Encode)] +#[ssz(struct_behaviour = "transparent")] pub struct DataVersion(u64); -// DataVersion SSZ implementation -impl Encode for DataVersion { - fn is_ssz_fixed_len() -> bool { - true - } - - fn ssz_append(&self, buf: &mut Vec) { - // DataVersion is represented as u64 internally - buf.extend_from_slice(&self.0.to_le_bytes()); - } - - fn ssz_fixed_len() -> usize { - 8 // u64 size - } - - fn ssz_bytes_len(&self) -> usize { - 8 - } -} - -impl Decode for DataVersion { - fn is_ssz_fixed_len() -> bool { - true - } - - fn ssz_fixed_len() -> usize { - 8 // u64 size - } - - fn from_ssz_bytes(bytes: &[u8]) -> Result { - if bytes.len() != 8 { - return Err(DecodeError::InvalidByteLength { - len: bytes.len(), - expected: 8, - }); - } - - let mut array = [0u8; 8]; - array.copy_from_slice(bytes); - Ok(DataVersion(u64::from_le_bytes(array))) - } -} - pub const DATA_VERSION_UNKNOWN: DataVersion = DataVersion(0); pub const DATA_VERSION_PHASE0: DataVersion = DataVersion(1); pub const DATA_VERSION_ALTAIR: DataVersion = DataVersion(2); diff --git a/anchor/common/ssv_types/src/message.rs b/anchor/common/ssv_types/src/message.rs index 11db3252..e2a4d299 100644 --- a/anchor/common/ssv_types/src/message.rs +++ b/anchor/common/ssv_types/src/message.rs @@ -1,86 +1,10 @@ +use crate::msgid::MessageId; +use crate::OperatorId; use ssz::{Decode, DecodeError, Encode}; use ssz_derive::{Decode, Encode}; use std::collections::HashSet; use std::fmt; use std::fmt::Debug; -use std::hash::Hash; - -const MESSAGE_ID_LEN: usize = 56; - -/// Represents a unique Message ID consisting of 56 bytes. -#[derive(Debug, Clone, PartialEq, Eq, Hash)] -pub struct MessageID([u8; MESSAGE_ID_LEN]); - -impl MessageID { - /// Creates a new `MessageID` if the provided array is exactly 56 bytes. - /// - /// # Arguments - /// - /// * `id` - A 56-byte array representing the message ID. - /// - /// # Examples - /// - /// ``` - /// use network::types::ssv_message::MessageID; - /// let id = [0u8; 56]; - /// let message_id = MessageID::new(id); - /// ``` - pub fn new(id: [u8; MESSAGE_ID_LEN]) -> Self { - MessageID(id) - } - - /// Returns a reference to the underlying 56-byte array. - pub fn as_bytes(&self) -> &[u8; MESSAGE_ID_LEN] { - &self.0 - } -} - -impl Encode for MessageID { - fn is_ssz_fixed_len() -> bool { - true - } - - fn ssz_append(&self, buf: &mut Vec) { - buf.extend_from_slice(&self.0); - } - - fn ssz_fixed_len() -> usize { - MESSAGE_ID_LEN - } - - fn ssz_bytes_len(&self) -> usize { - MESSAGE_ID_LEN - } -} - -impl Decode for MessageID { - fn is_ssz_fixed_len() -> bool { - true - } - - fn ssz_fixed_len() -> usize { - MESSAGE_ID_LEN - } - - fn from_ssz_bytes(bytes: &[u8]) -> Result { - if bytes.len() != MESSAGE_ID_LEN { - return Err(DecodeError::InvalidByteLength { - len: bytes.len(), - expected: MESSAGE_ID_LEN, - }); - } - let mut id = [0u8; MESSAGE_ID_LEN]; - id.copy_from_slice(bytes); - Ok(MessageID(id)) - } -} - -impl fmt::Display for MessageID { - fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { - let hex_str = hex::encode(self.0); - write!(f, "MessageID({})", hex_str) - } -} /// Defines the types of messages with explicit discriminant values. #[derive(Debug, Clone, PartialEq, Eq)] @@ -147,14 +71,11 @@ impl Decode for MsgType { } } -/// Represents an Operator ID as a 64-bit unsigned integer. -pub type OperatorID = u64; - /// Represents an SSV Message with type, ID, and data. #[derive(Encode, Decode, Debug, Clone, PartialEq, Eq)] pub struct SSVMessage { msg_type: MsgType, - msg_id: MessageID, // Fixed-size [u8; 56] + msg_id: MessageId, // Fixed-size [u8; 56] data: Vec, // Variable-length byte array } @@ -164,17 +85,17 @@ impl SSVMessage { /// # Arguments /// /// * `msg_type` - The type of the message. - /// * `msg_id` - The unique message ID. + /// * `msg_id` - The message ID, showing which duty and validator/committee this belongs to. /// * `data` - The message data. /// /// # Examples /// /// ``` - /// use network::types::ssv_message::{SSVMessage, MsgType, MessageID}; - /// let message_id = MessageID::new([0u8; 56]); + /// use ssv_types::message::{MessageId, MsgType, SSVMessage}; + /// let message_id = MessageId::new([0u8; 56]); /// let msg = SSVMessage::new(MsgType::SSVConsensusMsgType, message_id, vec![1, 2, 3]); /// ``` - pub fn new(msg_type: MsgType, msg_id: MessageID, data: Vec) -> Self { + pub fn new(msg_type: MsgType, msg_id: MessageId, data: Vec) -> Self { SSVMessage { msg_type, msg_id, @@ -188,7 +109,7 @@ impl SSVMessage { } /// Returns a reference to the message ID. - pub fn msg_id(&self) -> &MessageID { + pub fn msg_id(&self) -> &MessageId { &self.msg_id } @@ -202,7 +123,7 @@ impl SSVMessage { #[derive(Encode, Decode, Debug, Clone, PartialEq, Eq)] pub struct SignedSSVMessage { signatures: Vec>, // Vec of Vec, max 13 elements, each up to 256 bytes - operator_ids: Vec, // Vec of OperatorID (u64), max 13 elements + operator_ids: Vec, // Vec of OperatorID (u64), max 13 elements ssv_message: SSVMessage, // SSVMessage: Required field full_data: Vec, // Variable-length byte array, max 4,194,532 bytes } @@ -231,13 +152,14 @@ impl SignedSSVMessage { /// # Examples /// /// ``` - /// use network::types::ssv_message::{SignedSSVMessage, SSVMessage, MsgType, MessageID}; - /// let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, MessageID::new([0u8; 56]), vec![1,2,3]); - /// let signed_msg = SignedSSVMessage::new(vec![vec![0; 256]], vec![1], ssv_msg, vec![4,5,6]).unwrap(); + /// use ssv_types::message::{MessageId, MsgType, SSVMessage, SignedSSVMessage}; + /// use ssv_types::OperatorId; + /// let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, MessageId::new([0u8; 56]), vec![1,2,3]); + /// let signed_msg = SignedSSVMessage::new(vec![vec![0; 256]], vec![OperatorId(1)], ssv_msg, vec![4,5,6]).unwrap(); /// ``` pub fn new( signatures: Vec>, - operator_ids: Vec, + operator_ids: Vec, ssv_message: SSVMessage, full_data: Vec, ) -> Result { @@ -286,7 +208,7 @@ impl SignedSSVMessage { } /// Returns a reference to the operator IDs. - pub fn operator_ids(&self) -> &Vec { + pub fn operator_ids(&self) -> &Vec { &self.operator_ids } @@ -336,7 +258,7 @@ impl SignedSSVMessage { // Note: Len Signers & Operators will only be > 1 after commit aggregation // Any OperatorID must not be 0 - if self.operator_ids.iter().any(|&id| id == 0) { + if self.operator_ids.iter().any(|&id| *id == 0) { return false; } @@ -418,32 +340,24 @@ mod tests { #[test] fn test_message_id_creation() { let id = [1u8; 56]; - let message_id = MessageID::new(id); - assert_eq!(message_id.as_bytes(), &id); - } - - #[test] - fn test_message_id_display() { - let id = [0xABu8; 56]; - let message_id = MessageID::new(id); - let display = format!("{}", message_id); - assert_eq!(display, format!("MessageID({})", "ab".repeat(56))); + let message_id = MessageId::from(id); + assert_eq!(message_id.as_ref(), &id); } #[test] fn test_message_id_encode_decode() { let id = [42u8; 56]; - let message_id = MessageID::new(id); + let message_id = MessageId::from(id); let encoded = message_id.as_ssz_bytes(); assert_eq!(encoded.len(), 56); - let decoded = MessageID::from_ssz_bytes(&encoded).unwrap(); + let decoded = MessageId::from_ssz_bytes(&encoded).unwrap(); assert_eq!(decoded, message_id); } #[test] fn test_message_id_decode_invalid_length() { let bytes = vec![0u8; 55]; // One byte short - let result = MessageID::from_ssz_bytes(&bytes); + let result = MessageId::from_ssz_bytes(&bytes); assert!(matches!( result, Err(DecodeError::InvalidByteLength { @@ -476,7 +390,7 @@ mod tests { #[test] fn test_ssv_message_encode_decode() { - let message_id = MessageID::new([7u8; 56]); + let message_id = MessageId::from([7u8; 56]); let ssv_msg = SSVMessage::new( MsgType::SSVConsensusMsgType, message_id.clone(), @@ -489,7 +403,7 @@ mod tests { #[test] fn test_signed_ssv_message_creation_valid() { - let message_id = MessageID::new([0u8; 56]); + let message_id = MessageId::from([0u8; 56]); let ssv_msg = SSVMessage::new( MsgType::SSVPartialSignatureMsgType, message_id, @@ -497,7 +411,7 @@ mod tests { ); let signatures = vec![vec![0u8; 256], vec![1u8; 100]]; - let operator_ids = vec![1, 2]; + let operator_ids = vec![OperatorId(1), OperatorId(2)]; let full_data = vec![255u8; 4_194_532]; let signed_msg = SignedSSVMessage::new( @@ -510,19 +424,19 @@ mod tests { assert!(signed_msg.is_ok()); let signed_msg = signed_msg.unwrap(); - assert_eq!(signed_msg.signatures(), &signatures); - assert_eq!(signed_msg.operator_ids(), &operator_ids); + assert_eq!(*signed_msg.signatures(), signatures); + assert_eq!(**signed_msg.operator_ids(), operator_ids); assert_eq!(signed_msg.ssv_message(), &ssv_msg); assert_eq!(signed_msg.full_data(), &full_data); } #[test] fn test_signed_ssv_message_creation_too_many_signatures() { - let message_id = MessageID::new([0u8; 56]); + let message_id = MessageId::from([0u8; 56]); let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, message_id, vec![]); let signatures = vec![vec![0u8; 256]; 14]; // Exceeds max of 13 - let operator_ids = vec![1; 13]; + let operator_ids = vec![OperatorId(1); 13]; let full_data = vec![]; let signed_msg = SignedSSVMessage::new(signatures, operator_ids, ssv_msg, full_data); @@ -538,13 +452,13 @@ mod tests { #[test] fn test_signed_ssv_message_creation_signature_too_long() { - let message_id = MessageID::new([0u8; 56]); + let message_id = MessageId::from([0u8; 56]); let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, message_id, vec![]); let mut signatures = vec![vec![0u8; 256]]; signatures.push(vec![1u8; 257]); // Exceeds max length - let operator_ids = vec![1, 2]; + let operator_ids = vec![OperatorId(1), OperatorId(2)]; let full_data = vec![]; let signed_msg = SignedSSVMessage::new(signatures, operator_ids, ssv_msg, full_data); @@ -561,11 +475,11 @@ mod tests { #[test] fn test_signed_ssv_message_creation_too_many_operator_ids() { - let message_id = MessageID::new([0u8; 56]); + let message_id = MessageId::from([0u8; 56]); let ssv_msg = SSVMessage::new(MsgType::SSVPartialSignatureMsgType, message_id, vec![]); let signatures = vec![vec![0u8; 256]; 5]; - let operator_ids = vec![1u64; 14]; // Exceeds max of 13 + let operator_ids = vec![OperatorId(1); 14]; // Exceeds max of 13 let full_data = vec![]; let signed_msg = SignedSSVMessage::new(signatures, operator_ids, ssv_msg, full_data); @@ -581,11 +495,11 @@ mod tests { #[test] fn test_signed_ssv_message_creation_full_data_too_long() { - let message_id = MessageID::new([0u8; 56]); + let message_id = MessageId::from([0u8; 56]); let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, message_id, vec![]); let signatures = vec![vec![0u8; 256]]; - let operator_ids = vec![1]; + let operator_ids = vec![OperatorId(1)]; let full_data = vec![0u8; 4_194_533]; // Exceeds max let signed_msg = SignedSSVMessage::new(signatures, operator_ids, ssv_msg, full_data); @@ -601,7 +515,7 @@ mod tests { #[test] fn test_signed_ssv_message_encode_decode() { - let message_id = MessageID::new([9u8; 56]); + let message_id = MessageId::from([9u8; 56]); let ssv_msg = SSVMessage::new( MsgType::SSVConsensusMsgType, message_id.clone(), @@ -609,7 +523,7 @@ mod tests { ); let signatures = vec![vec![10u8; 256], vec![20u8; 100]]; - let operator_ids = vec![1, 2]; + let operator_ids = vec![OperatorId(1), OperatorId(2)]; let full_data = vec![200u8; 1024]; let signed_msg = SignedSSVMessage::new( @@ -628,7 +542,7 @@ mod tests { #[test] fn test_ssvmessage_encode_decode_empty_data() { - let message_id = MessageID::new([0u8; 56]); + let message_id = MessageId::from([0u8; 56]); let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, message_id.clone(), vec![]); let encoded = ssv_msg.as_ssz_bytes(); @@ -660,10 +574,10 @@ mod tests { #[test] fn test_full_data_max_length() { let full_data = vec![0u8; SignedSSVMessage::MAX_FULL_DATA_LENGTH]; - let message_id = MessageID::new([0u8; 56]); + let message_id = MessageId::from([0u8; 56]); let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, message_id, vec![]); let signatures = vec![vec![0u8; 256]]; - let operator_ids = vec![1]; + let operator_ids = vec![OperatorId(1)]; let signed_msg = SignedSSVMessage::new(signatures, operator_ids, ssv_msg, full_data.clone()); @@ -677,10 +591,10 @@ mod tests { #[test] fn test_full_data_exceeds_max_length() { let full_data = vec![0u8; SignedSSVMessage::MAX_FULL_DATA_LENGTH + 1]; - let message_id = MessageID::new([0u8; 56]); + let message_id = MessageId::from([0u8; 56]); let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, message_id, vec![]); let signatures = vec![vec![0u8; 256]]; - let operator_ids = vec![1]; + let operator_ids = vec![OperatorId(1)]; let signed_msg = SignedSSVMessage::new(signatures, operator_ids, ssv_msg, full_data); diff --git a/anchor/common/ssv_types/src/msgid.rs b/anchor/common/ssv_types/src/msgid.rs index 5a9e3c83..0f974260 100644 --- a/anchor/common/ssv_types/src/msgid.rs +++ b/anchor/common/ssv_types/src/msgid.rs @@ -1,8 +1,7 @@ -// todo probably move that to its own thing -#[derive(Debug, Copy, Clone, Hash, Eq, PartialEq)] -pub struct Domain([u8; 4]); -pub const MAINNET_DOMAIN: Domain = Domain([0, 0, 0, 1]); -pub const HOLESKY_DOMAIN: Domain = Domain([0, 0, 5, 2]); +use crate::domain_type::DomainType; +use ssz::{Decode, DecodeError, Encode}; + +const MESSAGE_ID_LEN: usize = 56; #[derive(Debug, Copy, Clone, Hash, Eq, PartialEq)] pub enum Role { @@ -12,9 +11,9 @@ pub enum Role { SyncCommittee, } -impl Role { - fn into_message_id_bytes(self) -> [u8; 4] { - match self { +impl From for [u8; 4] { + fn from(value: Role) -> Self { + match value { Role::Committee => [0, 0, 0, 0], Role::Aggregator => [1, 0, 0, 0], Role::Proposer => [2, 0, 0, 0], @@ -23,6 +22,20 @@ impl Role { } } +impl TryFrom<&[u8]> for Role { + type Error = (); + + fn try_from(value: &[u8]) -> Result { + match value { + [0, 0, 0, 0] => Ok(Role::Committee), + [1, 0, 0, 0] => Ok(Role::Aggregator), + [2, 0, 0, 0] => Ok(Role::Proposer), + [3, 0, 0, 0] => Ok(Role::SyncCommittee), + _ => Err(()), + } + } +} + #[derive(Debug, Clone, Hash, Eq, PartialEq)] pub enum Executor { Committee([u8; 32]), @@ -30,18 +43,70 @@ pub enum Executor { } #[derive(Debug, Clone, Hash, Eq, PartialEq)] -pub struct MsgId([u8; 56]); +pub struct MessageId([u8; 56]); -impl MsgId { - pub fn new(domain: &Domain, role: Role, duty_executor: &Executor) -> Self { +impl MessageId { + pub fn new(domain: &DomainType, role: Role, duty_executor: &Executor) -> Self { let mut id = [0; 56]; id[0..4].copy_from_slice(&domain.0); - id[4..8].copy_from_slice(&role.into_message_id_bytes()); + id[4..8].copy_from_slice(&<[u8; 4]>::from(role)); match duty_executor { Executor::Committee(slice) => id[24..].copy_from_slice(slice), Executor::Validator(slice) => id[8..].copy_from_slice(slice), } - MsgId(id) + MessageId(id) + } +} + +impl AsRef<[u8]> for MessageId { + fn as_ref(&self) -> &[u8] { + self.0.as_ref() + } +} + +impl From<[u8; MESSAGE_ID_LEN]> for MessageId { + fn from(value: [u8; MESSAGE_ID_LEN]) -> Self { + MessageId(value) + } +} + +impl Encode for MessageId { + fn is_ssz_fixed_len() -> bool { + true + } + + fn ssz_append(&self, buf: &mut Vec) { + buf.extend_from_slice(&self.0); + } + + fn ssz_fixed_len() -> usize { + MESSAGE_ID_LEN + } + + fn ssz_bytes_len(&self) -> usize { + MESSAGE_ID_LEN + } +} + +impl Decode for MessageId { + fn is_ssz_fixed_len() -> bool { + true + } + + fn ssz_fixed_len() -> usize { + MESSAGE_ID_LEN + } + + fn from_ssz_bytes(bytes: &[u8]) -> Result { + if bytes.len() != MESSAGE_ID_LEN { + return Err(DecodeError::InvalidByteLength { + len: bytes.len(), + expected: MESSAGE_ID_LEN, + }); + } + let mut id = [0u8; MESSAGE_ID_LEN]; + id.copy_from_slice(bytes); + Ok(MessageId(id)) } } diff --git a/anchor/common/ssv_types/src/operator.rs b/anchor/common/ssv_types/src/operator.rs index ce7f1cf5..b8780076 100644 --- a/anchor/common/ssv_types/src/operator.rs +++ b/anchor/common/ssv_types/src/operator.rs @@ -2,13 +2,17 @@ use crate::util::parse_rsa; use derive_more::{Deref, From}; use openssl::pkey::Public; use openssl::rsa::Rsa; +use ssz_derive::{Decode, Encode}; use std::cmp::Eq; use std::fmt::Debug; use std::hash::Hash; use types::Address; /// Unique identifier for an Operator. -#[derive(Clone, Copy, Debug, Default, Eq, PartialEq, Hash, From, Deref)] +#[derive( + Clone, Copy, Debug, Default, Eq, PartialEq, Hash, From, Deref, Encode, Decode, Ord, PartialOrd, +)] +#[ssz(struct_behaviour = "transparent")] pub struct OperatorId(pub u64); /// Client responsible for maintaining the overall health of the network. diff --git a/anchor/network/Cargo.toml b/anchor/network/Cargo.toml index ed2ebe98..cbde2bc3 100644 --- a/anchor/network/Cargo.toml +++ b/anchor/network/Cargo.toml @@ -8,8 +8,8 @@ authors = ["Sigma Prime "] async-trait = "0.1.85" dirs = { workspace = true } discv5 = { workspace = true } -ethereum_ssz = "0.8.1" -ethereum_ssz_derive = "0.8.1" +ethereum_ssz = { workspace = true } +ethereum_ssz_derive = { workspace = true } futures = { workspace = true } hex = "0.4.3" libp2p = { version = "0.54", default-features = false, features = [ @@ -30,7 +30,7 @@ quick-protobuf = "0.8.1" serde = { workspace = true } serde_json = "1.0.137" ssv_types = { workspace = true } -ssz_types = "0.10" +ssz_types = "0.8" subnet_tracker = { workspace = true } task_executor = { workspace = true } thiserror = "1.0.69" diff --git a/anchor/network/src/lib.rs b/anchor/network/src/lib.rs index 44b096aa..ef95b0fa 100644 --- a/anchor/network/src/lib.rs +++ b/anchor/network/src/lib.rs @@ -7,7 +7,6 @@ mod handshake; mod keypair_utils; mod network; mod transport; -pub mod types; pub use config::Config; pub use lighthouse_network::{ListenAddr, ListenAddress}; pub use network::Network; diff --git a/anchor/network/src/network.rs b/anchor/network/src/network.rs index 72228de7..0b4259b4 100644 --- a/anchor/network/src/network.rs +++ b/anchor/network/src/network.rs @@ -14,6 +14,7 @@ use libp2p::{futures, gossipsub, identify, ping, PeerId, Swarm, SwarmBuilder}; use lighthouse_network::discovery::DiscoveredPeers; use lighthouse_network::discv5::enr::k256::sha2::{Digest, Sha256}; use lighthouse_network::EnrExt; +use ssv_types::message::SignedSSVMessage; use ssz::Decode; use subnet_tracker::{SubnetEvent, SubnetId}; use task_executor::TaskExecutor; @@ -26,7 +27,6 @@ use crate::discovery::{Discovery, FIND_NODE_QUERY_CLOSEST_PEERS}; use crate::handshake::node_info::{NodeInfo, NodeMetadata}; use crate::keypair_utils::load_private_key; use crate::transport::build_transport; -use crate::types::ssv_message::SignedSSVMessage; use crate::{handshake, Config}; pub struct Network { diff --git a/anchor/network/src/types.rs b/anchor/network/src/types.rs deleted file mode 100644 index f4bf5939..00000000 --- a/anchor/network/src/types.rs +++ /dev/null @@ -1,2 +0,0 @@ -mod gossip_kind; -pub mod ssv_message; diff --git a/anchor/network/src/types/gossip_kind.rs b/anchor/network/src/types/gossip_kind.rs deleted file mode 100644 index 381c8332..00000000 --- a/anchor/network/src/types/gossip_kind.rs +++ /dev/null @@ -1,3 +0,0 @@ -pub enum GossipKind { - SsvTopic, -} diff --git a/anchor/network/src/types/ssv_message.rs b/anchor/network/src/types/ssv_message.rs deleted file mode 100644 index 45fa49ff..00000000 --- a/anchor/network/src/types/ssv_message.rs +++ /dev/null @@ -1,634 +0,0 @@ -use ssz::{Decode, DecodeError, Encode}; -use ssz_derive::{Decode, Encode}; -use std::fmt; - -const MESSAGE_ID_LEN: usize = 56; - -/// Represents a unique Message ID consisting of 56 bytes. -#[derive(Debug, Clone, PartialEq, Eq, Hash)] -pub struct MessageID([u8; MESSAGE_ID_LEN]); - -impl MessageID { - /// Creates a new `MessageID` if the provided array is exactly 56 bytes. - /// - /// # Arguments - /// - /// * `id` - A 56-byte array representing the message ID. - /// - /// # Examples - /// - /// ``` - /// use network::types::ssv_message::MessageID; - /// let id = [0u8; 56]; - /// let message_id = MessageID::new(id); - /// ``` - pub fn new(id: [u8; MESSAGE_ID_LEN]) -> Self { - MessageID(id) - } - - /// Returns a reference to the underlying 56-byte array. - pub fn as_bytes(&self) -> &[u8; MESSAGE_ID_LEN] { - &self.0 - } -} - -impl Encode for MessageID { - fn is_ssz_fixed_len() -> bool { - true - } - - fn ssz_append(&self, buf: &mut Vec) { - buf.extend_from_slice(&self.0); - } - - fn ssz_fixed_len() -> usize { - MESSAGE_ID_LEN - } - - fn ssz_bytes_len(&self) -> usize { - MESSAGE_ID_LEN - } -} - -impl Decode for MessageID { - fn is_ssz_fixed_len() -> bool { - true - } - - fn ssz_fixed_len() -> usize { - MESSAGE_ID_LEN - } - - fn from_ssz_bytes(bytes: &[u8]) -> Result { - if bytes.len() != MESSAGE_ID_LEN { - return Err(DecodeError::InvalidByteLength { - len: bytes.len(), - expected: MESSAGE_ID_LEN, - }); - } - let mut id = [0u8; MESSAGE_ID_LEN]; - id.copy_from_slice(bytes); - Ok(MessageID(id)) - } -} - -impl fmt::Display for MessageID { - fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { - let hex_str = hex::encode(self.0); - write!(f, "MessageID({})", hex_str) - } -} - -/// Defines the types of messages with explicit discriminant values. -#[derive(Debug, Clone, PartialEq, Eq)] -#[repr(u64)] -pub enum MsgType { - SSVConsensusMsgType = 0, - SSVPartialSignatureMsgType = 1, -} - -impl TryFrom for MsgType { - type Error = DecodeError; - - fn try_from(value: u64) -> Result { - match value { - 0 => Ok(MsgType::SSVConsensusMsgType), - 1 => Ok(MsgType::SSVPartialSignatureMsgType), - _ => Err(DecodeError::NoMatchingVariant), - } - } -} - -const U64_SIZE: usize = 8; // u64 is 8 bytes - -impl Encode for MsgType { - fn is_ssz_fixed_len() -> bool { - true - } - - fn ssz_append(&self, buf: &mut Vec) { - let value: u64 = match self { - MsgType::SSVConsensusMsgType => 0, - MsgType::SSVPartialSignatureMsgType => 1, - }; - buf.extend_from_slice(&value.to_le_bytes()); - } - - fn ssz_fixed_len() -> usize { - U64_SIZE - } - - fn ssz_bytes_len(&self) -> usize { - U64_SIZE - } -} - -impl Decode for MsgType { - fn is_ssz_fixed_len() -> bool { - true - } - - fn ssz_fixed_len() -> usize { - U64_SIZE - } - - fn from_ssz_bytes(bytes: &[u8]) -> Result { - if bytes.len() != U64_SIZE { - return Err(DecodeError::InvalidByteLength { - len: bytes.len(), - expected: U64_SIZE, - }); - } - let value = u64::from_le_bytes(bytes.try_into().unwrap()); - value.try_into() - } -} - -/// Represents an Operator ID as a 64-bit unsigned integer. -pub type OperatorID = u64; - -/// Represents an SSV Message with type, ID, and data. -#[derive(Encode, Decode, Debug, Clone, PartialEq, Eq)] -pub struct SSVMessage { - msg_type: MsgType, - msg_id: MessageID, // Fixed-size [u8; 56] - data: Vec, // Variable-length byte array -} - -impl SSVMessage { - /// Creates a new `SSVMessage`. - /// - /// # Arguments - /// - /// * `msg_type` - The type of the message. - /// * `msg_id` - The unique message ID. - /// * `data` - The message data. - /// - /// # Examples - /// - /// ``` - /// use network::types::ssv_message::{SSVMessage, MsgType, MessageID}; - /// let message_id = MessageID::new([0u8; 56]); - /// let msg = SSVMessage::new(MsgType::SSVConsensusMsgType, message_id, vec![1, 2, 3]); - /// ``` - pub fn new(msg_type: MsgType, msg_id: MessageID, data: Vec) -> Self { - SSVMessage { - msg_type, - msg_id, - data, - } - } - - /// Returns a reference to the message type. - pub fn msg_type(&self) -> &MsgType { - &self.msg_type - } - - /// Returns a reference to the message ID. - pub fn msg_id(&self) -> &MessageID { - &self.msg_id - } - - /// Returns a reference to the message data. - pub fn data(&self) -> &[u8] { - &self.data - } -} - -/// Represents a signed SSV Message with signatures, operator IDs, the message itself, and full data. -#[derive(Encode, Decode, Debug, Clone, PartialEq, Eq)] -pub struct SignedSSVMessage { - signatures: Vec>, // Vec of Vec, max 13 elements, each up to 256 bytes - operator_ids: Vec, // Vec of OperatorID (u64), max 13 elements - ssv_message: SSVMessage, // SSVMessage: Required field - full_data: Vec, // Variable-length byte array, max 4,194,532 bytes -} - -impl SignedSSVMessage { - /// Maximum allowed number of signatures and operator IDs. - pub const MAX_SIGNATURES: usize = 13; - /// Maximum allowed length for each signature in bytes. - pub const MAX_SIGNATURE_LENGTH: usize = 256; - /// Maximum allowed length for `full_data` in bytes. - pub const MAX_FULL_DATA_LENGTH: usize = 4_194_532; - - /// Creates a new `SignedSSVMessage` after validating constraints. - /// - /// # Arguments - /// - /// * `signatures` - A vector of signatures, each up to 256 bytes. - /// * `operator_ids` - A vector of operator IDs, maximum 13 elements. - /// * `ssv_message` - The SSV message. - /// * `full_data` - Full data, up to 4,194,532 bytes. - /// - /// # Errors - /// - /// Returns an `SSVMessageError` if any constraints are violated. - /// - /// # Examples - /// - /// ``` - /// use network::types::ssv_message::{SignedSSVMessage, SSVMessage, MsgType, MessageID}; - /// let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, MessageID::new([0u8; 56]), vec![1,2,3]); - /// let signed_msg = SignedSSVMessage::new(vec![vec![0; 256]], vec![1], ssv_msg, vec![4,5,6]).unwrap(); - /// ``` - pub fn new( - signatures: Vec>, - operator_ids: Vec, - ssv_message: SSVMessage, - full_data: Vec, - ) -> Result { - if signatures.len() > Self::MAX_SIGNATURES { - return Err(SSVMessageError::TooManySignatures { - provided: signatures.len(), - max: Self::MAX_SIGNATURES, - }); - } - - for (i, sig) in signatures.iter().enumerate() { - if sig.len() > Self::MAX_SIGNATURE_LENGTH { - return Err(SSVMessageError::SignatureTooLong { - index: i, - length: sig.len(), - max: Self::MAX_SIGNATURE_LENGTH, - }); - } - } - - if operator_ids.len() > Self::MAX_SIGNATURES { - return Err(SSVMessageError::TooManyOperatorIDs { - provided: operator_ids.len(), - max: Self::MAX_SIGNATURES, - }); - } - - if full_data.len() > Self::MAX_FULL_DATA_LENGTH { - return Err(SSVMessageError::FullDataTooLong { - length: full_data.len(), - max: Self::MAX_FULL_DATA_LENGTH, - }); - } - - Ok(SignedSSVMessage { - signatures, - operator_ids, - ssv_message, - full_data, - }) - } - - /// Returns a reference to the signatures. - pub fn signatures(&self) -> &Vec> { - &self.signatures - } - - /// Returns a reference to the operator IDs. - pub fn operator_ids(&self) -> &Vec { - &self.operator_ids - } - - /// Returns a reference to the SSV message. - pub fn ssv_message(&self) -> &SSVMessage { - &self.ssv_message - } - - /// Returns a reference to the full data. - pub fn full_data(&self) -> &[u8] { - &self.full_data - } -} - -/// Represents errors that can occur while creating or processing `SignedSSVMessage`. -#[derive(Debug, Clone, PartialEq, Eq)] -pub enum SSVMessageError { - /// Exceeded the maximum number of signatures. - TooManySignatures { provided: usize, max: usize }, - /// A signature exceeds the maximum allowed length. - SignatureTooLong { - index: usize, - length: usize, - max: usize, - }, - /// Exceeded the maximum number of operator IDs. - TooManyOperatorIDs { provided: usize, max: usize }, - /// `full_data` exceeds the maximum allowed length. - FullDataTooLong { length: usize, max: usize }, -} - -impl fmt::Display for SSVMessageError { - fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { - match self { - SSVMessageError::TooManySignatures { provided, max } => { - write!( - f, - "Too many signatures: provided {}, maximum allowed is {}.", - provided, max - ) - } - SSVMessageError::SignatureTooLong { index, length, max } => { - write!( - f, - "Signature at index {} is too long: {} bytes, maximum allowed is {} bytes.", - index, length, max - ) - } - SSVMessageError::TooManyOperatorIDs { provided, max } => { - write!( - f, - "Too many operator IDs: provided {}, maximum allowed is {}.", - provided, max - ) - } - SSVMessageError::FullDataTooLong { length, max } => { - write!( - f, - "Full data is too long: {} bytes, maximum allowed is {} bytes.", - length, max - ) - } - } - } -} - -impl std::error::Error for SSVMessageError {} - -#[cfg(test)] -mod tests { - use super::*; - use ssz::{Decode, Encode}; - - #[test] - fn test_message_id_creation() { - let id = [1u8; 56]; - let message_id = MessageID::new(id); - assert_eq!(message_id.as_bytes(), &id); - } - - #[test] - fn test_message_id_display() { - let id = [0xABu8; 56]; - let message_id = MessageID::new(id); - let display = format!("{}", message_id); - assert_eq!(display, format!("MessageID({})", "ab".repeat(56))); - } - - #[test] - fn test_message_id_encode_decode() { - let id = [42u8; 56]; - let message_id = MessageID::new(id); - let encoded = message_id.as_ssz_bytes(); - assert_eq!(encoded.len(), 56); - let decoded = MessageID::from_ssz_bytes(&encoded).unwrap(); - assert_eq!(decoded, message_id); - } - - #[test] - fn test_message_id_decode_invalid_length() { - let bytes = vec![0u8; 55]; // One byte short - let result = MessageID::from_ssz_bytes(&bytes); - assert!(matches!( - result, - Err(DecodeError::InvalidByteLength { - len: 55, - expected: 56 - }) - )); - } - - #[test] - fn test_msgtype_encode_decode() { - let msg_type = MsgType::SSVConsensusMsgType; - let encoded = msg_type.as_ssz_bytes(); - assert_eq!(encoded.len(), U64_SIZE); - let decoded = MsgType::from_ssz_bytes(&encoded).unwrap(); - assert_eq!(decoded, msg_type); - - let msg_type = MsgType::SSVPartialSignatureMsgType; - let encoded = msg_type.as_ssz_bytes(); - let decoded = MsgType::from_ssz_bytes(&encoded).unwrap(); - assert_eq!(decoded, msg_type); - } - - #[test] - fn test_msgtype_decode_invalid_variant() { - let invalid_value = 2u64.to_le_bytes(); - let result = MsgType::from_ssz_bytes(&invalid_value); - assert!(matches!(result, Err(DecodeError::NoMatchingVariant))); - } - - #[test] - fn test_ssv_message_encode_decode() { - let message_id = MessageID::new([7u8; 56]); - let ssv_msg = SSVMessage::new( - MsgType::SSVConsensusMsgType, - message_id.clone(), - vec![10, 20, 30], - ); - let encoded = ssv_msg.as_ssz_bytes(); - let decoded = SSVMessage::from_ssz_bytes(&encoded).unwrap(); - assert_eq!(decoded, ssv_msg); - } - - #[test] - fn test_signed_ssv_message_creation_valid() { - let message_id = MessageID::new([0u8; 56]); - let ssv_msg = SSVMessage::new( - MsgType::SSVPartialSignatureMsgType, - message_id, - vec![1, 2, 3], - ); - - let signatures = vec![vec![0u8; 256], vec![1u8; 100]]; - let operator_ids = vec![1, 2]; - let full_data = vec![255u8; 4_194_532]; - - let signed_msg = SignedSSVMessage::new( - signatures.clone(), - operator_ids.clone(), - ssv_msg.clone(), - full_data.clone(), - ); - - assert!(signed_msg.is_ok()); - - let signed_msg = signed_msg.unwrap(); - assert_eq!(signed_msg.signatures(), &signatures); - assert_eq!(signed_msg.operator_ids(), &operator_ids); - assert_eq!(signed_msg.ssv_message(), &ssv_msg); - assert_eq!(signed_msg.full_data(), &full_data); - } - - #[test] - fn test_signed_ssv_message_creation_too_many_signatures() { - let message_id = MessageID::new([0u8; 56]); - let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, message_id, vec![]); - - let signatures = vec![vec![0u8; 256]; 14]; // Exceeds max of 13 - let operator_ids = vec![1; 13]; - let full_data = vec![]; - - let signed_msg = SignedSSVMessage::new(signatures, operator_ids, ssv_msg, full_data); - - assert!(matches!( - signed_msg, - Err(SSVMessageError::TooManySignatures { - provided: 14, - max: 13 - }) - )); - } - - #[test] - fn test_signed_ssv_message_creation_signature_too_long() { - let message_id = MessageID::new([0u8; 56]); - let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, message_id, vec![]); - - let mut signatures = vec![vec![0u8; 256]]; - signatures.push(vec![1u8; 257]); // Exceeds max length - - let operator_ids = vec![1, 2]; - let full_data = vec![]; - - let signed_msg = SignedSSVMessage::new(signatures, operator_ids, ssv_msg, full_data); - - assert!(matches!( - signed_msg, - Err(SSVMessageError::SignatureTooLong { - index: 1, - length: 257, - max: 256 - }) - )); - } - - #[test] - fn test_signed_ssv_message_creation_too_many_operator_ids() { - let message_id = MessageID::new([0u8; 56]); - let ssv_msg = SSVMessage::new(MsgType::SSVPartialSignatureMsgType, message_id, vec![]); - - let signatures = vec![vec![0u8; 256]; 5]; - let operator_ids = vec![1u64; 14]; // Exceeds max of 13 - let full_data = vec![]; - - let signed_msg = SignedSSVMessage::new(signatures, operator_ids, ssv_msg, full_data); - - assert!(matches!( - signed_msg, - Err(SSVMessageError::TooManyOperatorIDs { - provided: 14, - max: 13 - }) - )); - } - - #[test] - fn test_signed_ssv_message_creation_full_data_too_long() { - let message_id = MessageID::new([0u8; 56]); - let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, message_id, vec![]); - - let signatures = vec![vec![0u8; 256]]; - let operator_ids = vec![1]; - let full_data = vec![0u8; 4_194_533]; // Exceeds max - - let signed_msg = SignedSSVMessage::new(signatures, operator_ids, ssv_msg, full_data); - - assert!(matches!( - signed_msg, - Err(SSVMessageError::FullDataTooLong { - length: 4_194_533, - max: 4_194_532 - }) - )); - } - - #[test] - fn test_signed_ssv_message_encode_decode() { - let message_id = MessageID::new([9u8; 56]); - let ssv_msg = SSVMessage::new( - MsgType::SSVConsensusMsgType, - message_id.clone(), - vec![100, 101, 102], - ); - - let signatures = vec![vec![10u8; 256], vec![20u8; 100]]; - let operator_ids = vec![1, 2]; - let full_data = vec![200u8; 1024]; - - let signed_msg = SignedSSVMessage::new( - signatures.clone(), - operator_ids.clone(), - ssv_msg.clone(), - full_data.clone(), - ) - .unwrap(); - - let encoded = signed_msg.as_ssz_bytes(); - let decoded = SignedSSVMessage::from_ssz_bytes(&encoded).unwrap(); - - assert_eq!(decoded, signed_msg); - } - - #[test] - fn test_ssvmessage_encode_decode_empty_data() { - let message_id = MessageID::new([0u8; 56]); - let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, message_id.clone(), vec![]); - - let encoded = ssv_msg.as_ssz_bytes(); - let decoded = SSVMessage::from_ssz_bytes(&encoded).unwrap(); - - assert_eq!(decoded, ssv_msg); - } - - #[test] - fn test_ssvmessage_decode_invalid_length() { - let bytes = vec![0u8; 56 + 8 + 3 - 1]; // Missing one byte in data - let result = SSVMessage::from_ssz_bytes(&bytes); - assert!(result.is_err()); - } - - #[test] - fn test_msgtype_invalid_bytes_length() { - let bytes = vec![0u8; U64_SIZE - 1]; // One byte short - let result = MsgType::from_ssz_bytes(&bytes); - assert!(matches!( - result, - Err(DecodeError::InvalidByteLength { - len: 7, - expected: 8 - }) - )); - } - - #[test] - fn test_full_data_max_length() { - let full_data = vec![0u8; SignedSSVMessage::MAX_FULL_DATA_LENGTH]; - let message_id = MessageID::new([0u8; 56]); - let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, message_id, vec![]); - let signatures = vec![vec![0u8; 256]]; - let operator_ids = vec![1]; - - let signed_msg = - SignedSSVMessage::new(signatures, operator_ids, ssv_msg, full_data.clone()); - - assert!(signed_msg.is_ok()); - - let signed_msg = signed_msg.unwrap(); - assert_eq!(signed_msg.full_data(), &full_data); - } - - #[test] - fn test_full_data_exceeds_max_length() { - let full_data = vec![0u8; SignedSSVMessage::MAX_FULL_DATA_LENGTH + 1]; - let message_id = MessageID::new([0u8; 56]); - let ssv_msg = SSVMessage::new(MsgType::SSVConsensusMsgType, message_id, vec![]); - let signatures = vec![vec![0u8; 256]]; - let operator_ids = vec![1]; - - let signed_msg = SignedSSVMessage::new(signatures, operator_ids, ssv_msg, full_data); - - assert!(matches!( - signed_msg, - Err(SSVMessageError::FullDataTooLong { length: _, max: _ }) - )); - } -} diff --git a/anchor/qbft_manager/src/lib.rs b/anchor/qbft_manager/src/lib.rs index 817f5bf7..3250c12f 100644 --- a/anchor/qbft_manager/src/lib.rs +++ b/anchor/qbft_manager/src/lib.rs @@ -473,7 +473,7 @@ fn sign_and_send_message( // Build the signed ssv message, then serialize it and send to the network let signed = SignedSSVMessage::new( vec![sig], - vec![*id], + vec![id], unsigned.ssv_message, unsigned.full_data, )?; diff --git a/anchor/qbft_manager/src/tests.rs b/anchor/qbft_manager/src/tests.rs index 44907b73..4e304fd8 100644 --- a/anchor/qbft_manager/src/tests.rs +++ b/anchor/qbft_manager/src/tests.rs @@ -442,7 +442,6 @@ where .operator_ids() .first() .expect("One signer"); - let sender_operator_id = OperatorId::from(*sender_operator_id); // If this is a decided message, want to record it in the consensus results. // We know this is an aggregated commit if the number of signatures is > 1 @@ -463,7 +462,7 @@ where .expect("Value exists"); // Check the sender behavior - let sender_behavior = self.get_behavior(&sender_operator_id); + let sender_behavior = self.get_behavior(sender_operator_id); let sender_read = sender_behavior.read().expect("Exists"); if sender_read.is_offline() { return; From fff476e0a87089a0c673112487b78c7f7f67924f Mon Sep 17 00:00:00 2001 From: Daniel Knopik <107140945+dknopik@users.noreply.github.com> Date: Tue, 18 Feb 2025 15:52:06 +0100 Subject: [PATCH 2/3] Make QBFT and signature collection managers nongeneric (#146) --- anchor/qbft_manager/src/lib.rs | 39 ++++++++++++--------------- anchor/qbft_manager/src/tests.rs | 10 +++---- anchor/signature_collector/src/lib.rs | 27 ++++++++++--------- anchor/validator_store/src/lib.rs | 8 +++--- 4 files changed, 40 insertions(+), 44 deletions(-) diff --git a/anchor/qbft_manager/src/lib.rs b/anchor/qbft_manager/src/lib.rs index 3250c12f..aeea3f5e 100644 --- a/anchor/qbft_manager/src/lib.rs +++ b/anchor/qbft_manager/src/lib.rs @@ -92,13 +92,11 @@ type Qbft = qbft::Qbft; type Map = DashMap>>; // Top level QBFTManager structure -pub struct QbftManager { +pub struct QbftManager { // Senders to send work off to the central processor processor: Senders, // OperatorID operator_id: QbftOperatorId, - // The slot clock for timing - slot_clock: T, // All of the QBFT instances that are voting on validator consensus data validator_consensus_data_instances: Map, // All of the QBFT instances that are voting on beacon data @@ -109,12 +107,12 @@ pub struct QbftManager { network_tx: mpsc::UnboundedSender, } -impl QbftManager { +impl QbftManager { // Construct a new QBFT Manager pub fn new( processor: Senders, operator_id: OperatorId, - slot_clock: T, + slot_clock: impl SlotClock + 'static, key: Rsa, network_tx: mpsc::UnboundedSender, ) -> Result, QbftError> { @@ -123,7 +121,6 @@ impl QbftManager { let manager = Arc::new(QbftManager { processor, operator_id, - slot_clock, validator_consensus_data_instances: DashMap::new(), beacon_vote_instances: DashMap::new(), pkey, @@ -134,13 +131,13 @@ impl QbftManager { manager .processor .permitless - .send_async(Arc::clone(&manager).cleaner(), QBFT_CLEANER_NAME)?; + .send_async(Arc::clone(&manager).cleaner(slot_clock), QBFT_CLEANER_NAME)?; Ok(manager) } // Decide a brand new qbft instance - pub async fn decide_instance>( + pub async fn decide_instance( &self, id: D::Id, initial: D, @@ -182,7 +179,7 @@ impl QbftManager { } /// Send a new network message to the instance - pub fn receive_data>( + pub fn receive_data( &self, id: D::Id, data: WrappedQbftMessage, @@ -201,15 +198,15 @@ impl QbftManager { } // Long running cleaner that will remove instances that are no longer relevant - async fn cleaner(self: Arc) { + async fn cleaner(self: Arc, slot_clock: impl SlotClock) { while !self.processor.permitless.is_closed() { sleep( - self.slot_clock + slot_clock .duration_to_next_slot() - .unwrap_or(self.slot_clock.slot_duration()), + .unwrap_or(slot_clock.slot_duration()), ) .await; - let Some(slot) = self.slot_clock.now() else { + let Some(slot) = slot_clock.now() else { continue; }; let cutoff = slot.saturating_sub(QBFT_RETAIN_SLOTS); @@ -220,15 +217,13 @@ impl QbftManager { } // Trait that describes any data that is able to be decided upon during a qbft instance -pub trait QbftDecidable: - QbftData + Send + Sync + 'static -{ +pub trait QbftDecidable: QbftData + Send + Sync + 'static { type Id: Hash + Eq + Send; - fn get_map(manager: &QbftManager) -> &Map; + fn get_map(manager: &QbftManager) -> &Map; fn get_or_spawn_instance( - manager: &QbftManager, + manager: &QbftManager, id: Self::Id, ) -> UnboundedSender> { let map = Self::get_map(manager); @@ -257,9 +252,9 @@ pub trait QbftDecidable: fn instance_height(&self, id: &Self::Id) -> InstanceHeight; } -impl QbftDecidable for ValidatorConsensusData { +impl QbftDecidable for ValidatorConsensusData { type Id = ValidatorInstanceId; - fn get_map(manager: &QbftManager) -> &Map { + fn get_map(manager: &QbftManager) -> &Map { &manager.validator_consensus_data_instances } @@ -268,9 +263,9 @@ impl QbftDecidable for ValidatorConsensusData { } } -impl QbftDecidable for BeaconVote { +impl QbftDecidable for BeaconVote { type Id = CommitteeInstanceId; - fn get_map(manager: &QbftManager) -> &Map { + fn get_map(manager: &QbftManager) -> &Map { &manager.beacon_vote_instances } diff --git a/anchor/qbft_manager/src/tests.rs b/anchor/qbft_manager/src/tests.rs index 4e304fd8..5bcb783c 100644 --- a/anchor/qbft_manager/src/tests.rs +++ b/anchor/qbft_manager/src/tests.rs @@ -27,7 +27,7 @@ static TRACING: LazyLock<()> = LazyLock::new(|| { // Top level Testing Context to provide clean wrapper around testing framework pub struct TestContext where - D: QbftDecidable, + D: QbftDecidable, D::Id: Send + Sync + Clone, { pub tester: Arc>, @@ -36,7 +36,7 @@ where impl TestContext where - D: QbftDecidable, + D: QbftDecidable, D::Id: Send + Sync + Clone, { // Create a new test context with default setup @@ -131,13 +131,13 @@ impl CommitteeSize { /// The main test coordinator that manages multiple QBFT instances pub struct QbftTester where - D: QbftDecidable, + D: QbftDecidable, D::Id: Send + Sync + Clone, { // Senders to the processor senders: Senders, // Track mapping from operator id to the respective manager - managers: HashMap>>, + managers: HashMap>, // The size of the committee pub size: CommitteeSize, // Mapping of the data hash to the data identifier. This is to send data to the proper instance @@ -211,7 +211,7 @@ impl OperatorBehavior { impl QbftTester where - D: QbftDecidable + 'static, + D: QbftDecidable + 'static, D::Id: Send + Sync + Clone, { /// Create a new QBFT tester instance diff --git a/anchor/signature_collector/src/lib.rs b/anchor/signature_collector/src/lib.rs index f98d38fe..c4ce1b07 100644 --- a/anchor/signature_collector/src/lib.rs +++ b/anchor/signature_collector/src/lib.rs @@ -27,24 +27,25 @@ struct SignatureCollector { for_slot: Slot, } -pub struct SignatureCollectorManager { +pub struct SignatureCollectorManager { processor: Senders, - slot_clock: T, signature_collectors: DashMap, } -impl SignatureCollectorManager { - pub fn new(processor: Senders, slot_clock: T) -> Result, CollectionError> { +impl SignatureCollectorManager { + pub fn new(processor: Senders, slot_clock: T) -> Result, CollectionError> + where + T: SlotClock + 'static, + { let manager = Arc::new(Self { processor, - slot_clock, signature_collectors: DashMap::new(), }); - manager - .processor - .permitless - .send_async(Arc::clone(&manager).cleaner(), COLLECTOR_CLEANER_NAME)?; + manager.processor.permitless.send_async( + Arc::clone(&manager).cleaner(slot_clock), + COLLECTOR_CLEANER_NAME, + )?; Ok(manager) } @@ -132,15 +133,15 @@ impl SignatureCollectorManager { } } - async fn cleaner(self: Arc) { + async fn cleaner(self: Arc, slot_clock: impl SlotClock) { while !self.processor.permitless.is_closed() { sleep( - self.slot_clock + slot_clock .duration_to_next_slot() - .unwrap_or(self.slot_clock.slot_duration()), + .unwrap_or(slot_clock.slot_duration()), ) .await; - let Some(slot) = self.slot_clock.now() else { + let Some(slot) = slot_clock.now() else { continue; }; let cutoff = slot.saturating_sub(SIGNATURE_COLLECTOR_RETAIN_SLOTS); diff --git a/anchor/validator_store/src/lib.rs b/anchor/validator_store/src/lib.rs index 36bf4034..81fe0147 100644 --- a/anchor/validator_store/src/lib.rs +++ b/anchor/validator_store/src/lib.rs @@ -73,8 +73,8 @@ struct InitializedValidator { pub struct AnchorValidatorStore { validators: DashMap, - signature_collector: Arc>, - qbft_manager: Arc>, + signature_collector: Arc, + qbft_manager: Arc, slashing_protection: SlashingDatabase, slashing_protection_last_prune: Mutex, slot_clock: T, @@ -89,8 +89,8 @@ impl AnchorValidatorStore { #[allow(clippy::too_many_arguments)] pub fn new( database_state: Receiver, - signature_collector: Arc>, - qbft_manager: Arc>, + signature_collector: Arc, + qbft_manager: Arc, slashing_protection: SlashingDatabase, slot_clock: T, spec: Arc, From cca70761d552ec2887328af899659660d47c077c Mon Sep 17 00:00:00 2001 From: diegomrsantos Date: Tue, 18 Feb 2025 16:38:08 +0100 Subject: [PATCH 3/3] Fix handshake network mismatch (#145) --- anchor/network/src/handshake/node_info.rs | 29 +++++++++++++++-------- 1 file changed, 19 insertions(+), 10 deletions(-) diff --git a/anchor/network/src/handshake/node_info.rs b/anchor/network/src/handshake/node_info.rs index 87e84e98..e35f3725 100644 --- a/anchor/network/src/handshake/node_info.rs +++ b/anchor/network/src/handshake/node_info.rs @@ -57,8 +57,8 @@ impl NodeInfo { /// Serialize `NodeInfo` to JSON bytes. fn marshal(&self) -> Result, Error> { let mut entries = vec![ - "".to_string(), // formerly forkVersion, now deprecated - self.network_id.clone(), // network id + "".to_string(), // formerly forkVersion, now deprecated + format!("0x{}", self.network_id.clone()), // network id ]; if let Some(meta) = &self.metadata { @@ -78,7 +78,12 @@ impl NodeInfo { return Err(Validation("node info must have at least 2 entries".into())); } // skip ser.entries[0]: old forkVersion - let network_id = ser.entries[1].clone(); + let network_id = ser.entries[1] + .clone() + .strip_prefix("0x") + .ok_or_else(|| Validation("network id must be prefixed with 0x".into()))? + .to_string(); + let metadata = if ser.entries.len() >= 3 { let meta = serde_json::from_slice(ser.entries[2].as_bytes())?; Some(meta) @@ -119,11 +124,14 @@ mod tests { use crate::handshake::node_info::{NodeInfo, NodeMetadata}; use libp2p::identity::Keypair; + const HOLESKY_WITH_PREFIX: &str = "0x00000502"; + const HOLESKY: &str = "00000502"; + #[test] fn test_node_info_seal_consume() { // Create a sample NodeInfo instance let node_info = NodeInfo::new( - "holesky".to_string(), + HOLESKY_WITH_PREFIX.to_string(), Some(NodeMetadata { node_version: "geth/x".to_string(), execution_node: "geth/x".to_string(), @@ -146,9 +154,7 @@ mod tests { assert_eq!(node_info, parsed_node_info); let encoded= - hex::decode("0a250802122102ba6a707dcec6c60ba2793d52123d34b22556964fc798d4aa88ffc41\ - a00e42407120c7373762f6e6f6465696e666f1aa5017b22456e7472696573223a5b22222c22686f6c65736b7\ - 9222c227b5c224e6f646556657273696f6e5c223a5c22676574682f785c222c5c22457865637574696f6e4e6f64655c223a5c22676574682f785c222c5c22436f6e73656e7375734e6f64655c223a5c22707279736d2f785c222c5c225375626e6574735c223a5c2230303030303030303030303030303030303030303030303030303030303030305c227d225d7d2a473045022100b8a2a668113330369e74b86ec818a87009e2a351f7ee4c0e431e1f659dd1bc3f02202b1ebf418efa7fb0541f77703bea8563234a1b70b8391d43daa40b6e7c3fcc84").unwrap(); + hex::decode("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").unwrap(); let parsed_env = Envelope::parse_and_verify(&encoded).expect("Consume failed"); let parsed_node_info = @@ -161,11 +167,14 @@ mod tests { fn test_node_info_marshal_unmarshal() { // The old serialized data from the Go code // (note the "Subnets":"ffffffffffffffffffffffffffffffff") - let old_serialized_data = br#"{"Entries":["", "testnet", "{\"NodeVersion\":\"v0.1.12\",\"ExecutionNode\":\"geth/x\",\"ConsensusNode\":\"prysm/x\",\"Subnets\":\"ffffffffffffffffffffffffffffffff\"}"]}"#; + let old_serialized_data = format!( + r#"{{"Entries":["", "{}", "{{\"NodeVersion\":\"v0.1.12\",\"ExecutionNode\":\"geth/x\",\"ConsensusNode\":\"prysm/x\",\"Subnets\":\"ffffffffffffffffffffffffffffffff\"}}"]}}"#, + HOLESKY_WITH_PREFIX + ).into_bytes(); // The "current" NodeInfo data let current_data = NodeInfo { - network_id: "testnet".to_string(), + network_id: HOLESKY.to_string(), metadata: Some(NodeMetadata { node_version: "v0.1.12".into(), execution_node: "geth/x".into(), @@ -184,7 +193,7 @@ mod tests { // 3) Now unmarshal the old format data into the same struct let old_format = - NodeInfo::unmarshal(old_serialized_data).expect("unmarshal old data should succeed"); + NodeInfo::unmarshal(&old_serialized_data).expect("unmarshal old data should succeed"); // 4) Compare // The Go test checks reflect.DeepEqual(currentSerializedData, parsedRec)