mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 04:47:18 +00:00
ee5d75732d
* Add pkg crypto * Update go.yml Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
97 lines
4.6 KiB
Go
97 lines
4.6 KiB
Go
package p2p
|
|
|
|
import (
|
|
pubsub_pb "github.com/libp2p/go-libp2p-pubsub/pb"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/p2p/encoder"
|
|
"github.com/prysmaticlabs/prysm/crypto/hash"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/p2putils"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
)
|
|
|
|
// MsgID is a content addressable ID function.
|
|
//
|
|
// Ethereum Beacon Chain spec defines the message ID as:
|
|
// The `message-id` of a gossipsub message MUST be the following 20 byte value computed from the message data:
|
|
// If `message.data` has a valid snappy decompression, set `message-id` to the first 20 bytes of the `SHA256` hash of
|
|
// the concatenation of `MESSAGE_DOMAIN_VALID_SNAPPY` with the snappy decompressed message data,
|
|
// i.e. `SHA256(MESSAGE_DOMAIN_VALID_SNAPPY + snappy_decompress(message.data))[:20]`.
|
|
//
|
|
// Otherwise, set `message-id` to the first 20 bytes of the `SHA256` hash of
|
|
// the concatenation of `MESSAGE_DOMAIN_INVALID_SNAPPY` with the raw message data,
|
|
// i.e. `SHA256(MESSAGE_DOMAIN_INVALID_SNAPPY + message.data)[:20]`.
|
|
func MsgID(genesisValidatorsRoot []byte, pmsg *pubsub_pb.Message) string {
|
|
if pmsg == nil || pmsg.Data == nil || pmsg.Topic == nil {
|
|
// Impossible condition that should
|
|
// never be hit.
|
|
msg := make([]byte, 20)
|
|
copy(msg, "invalid")
|
|
return string(msg)
|
|
}
|
|
digest, err := ExtractGossipDigest(*pmsg.Topic)
|
|
if err != nil {
|
|
// Impossible condition that should
|
|
// never be hit.
|
|
msg := make([]byte, 20)
|
|
copy(msg, "invalid")
|
|
return string(msg)
|
|
}
|
|
_, fEpoch, err := p2putils.RetrieveForkDataFromDigest(digest, genesisValidatorsRoot)
|
|
if err != nil {
|
|
// Impossible condition that should
|
|
// never be hit.
|
|
msg := make([]byte, 20)
|
|
copy(msg, "invalid")
|
|
return string(msg)
|
|
}
|
|
if fEpoch >= params.BeaconConfig().AltairForkEpoch {
|
|
return altairMsgID(pmsg)
|
|
}
|
|
decodedData, err := encoder.DecodeSnappy(pmsg.Data, params.BeaconNetworkConfig().GossipMaxSize)
|
|
if err != nil {
|
|
combinedData := append(params.BeaconNetworkConfig().MessageDomainInvalidSnappy[:], pmsg.Data...)
|
|
h := hash.Hash(combinedData)
|
|
return string(h[:20])
|
|
}
|
|
combinedData := append(params.BeaconNetworkConfig().MessageDomainValidSnappy[:], decodedData...)
|
|
h := hash.Hash(combinedData)
|
|
return string(h[:20])
|
|
}
|
|
|
|
// Spec:
|
|
// The derivation of the message-id has changed starting with Altair to incorporate the message topic along with the message data.
|
|
// These are fields of the Message Protobuf, and interpreted as empty byte strings if missing. The message-id MUST be the following
|
|
// 20 byte value computed from the message:
|
|
//
|
|
// If message.data has a valid snappy decompression, set message-id to the first 20 bytes of the SHA256 hash of the concatenation of
|
|
// the following data: MESSAGE_DOMAIN_VALID_SNAPPY, the length of the topic byte string (encoded as little-endian uint64), the topic
|
|
// byte string, and the snappy decompressed message data: i.e. SHA256(MESSAGE_DOMAIN_VALID_SNAPPY + uint_to_bytes(uint64(len(message.topic)))
|
|
// + message.topic + snappy_decompress(message.data))[:20]. Otherwise, set message-id to the first 20 bytes of the SHA256 hash of the concatenation
|
|
// of the following data: MESSAGE_DOMAIN_INVALID_SNAPPY, the length of the topic byte string (encoded as little-endian uint64),
|
|
// the topic byte string, and the raw message data: i.e. SHA256(MESSAGE_DOMAIN_INVALID_SNAPPY + uint_to_bytes(uint64(len(message.topic))) + message.topic + message.data)[:20].
|
|
func altairMsgID(pmsg *pubsub_pb.Message) string {
|
|
topic := *pmsg.Topic
|
|
topicLen := uint64(len(topic))
|
|
topicLenBytes := bytesutil.Uint64ToBytesLittleEndian(topicLen)
|
|
|
|
decodedData, err := encoder.DecodeSnappy(pmsg.Data, params.BeaconNetworkConfig().GossipMaxSize)
|
|
if err != nil {
|
|
totalLength := len(params.BeaconNetworkConfig().MessageDomainInvalidSnappy) + len(topicLenBytes) + int(topicLen) + len(pmsg.Data)
|
|
combinedData := make([]byte, 0, totalLength)
|
|
combinedData = append(combinedData, params.BeaconNetworkConfig().MessageDomainInvalidSnappy[:]...)
|
|
combinedData = append(combinedData, topicLenBytes...)
|
|
combinedData = append(combinedData, topic...)
|
|
combinedData = append(combinedData, pmsg.Data...)
|
|
h := hash.Hash(combinedData)
|
|
return string(h[:20])
|
|
}
|
|
totalLength := len(params.BeaconNetworkConfig().MessageDomainValidSnappy) + len(topicLenBytes) + int(topicLen) + len(decodedData)
|
|
combinedData := make([]byte, 0, totalLength)
|
|
combinedData = append(combinedData, params.BeaconNetworkConfig().MessageDomainValidSnappy[:]...)
|
|
combinedData = append(combinedData, topicLenBytes...)
|
|
combinedData = append(combinedData, topic...)
|
|
combinedData = append(combinedData, decodedData...)
|
|
h := hash.Hash(combinedData)
|
|
return string(h[:20])
|
|
}
|