25.1 KB
Newer Older
// Copyright 2017 Parity Technologies (UK) Ltd.
// This file is part of Polkadot.

// Polkadot is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.

// Polkadot is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// GNU General Public License for more details.

// You should have received a copy of the GNU General Public License
// along with Polkadot.  If not, see <>.

//! Propagation and agreement of candidates.
//! Authorities are split into groups by parachain, and each authority might come
//! up its own candidate for their parachain. Within groups, authorities pass around
//! their candidates and produce statements of validity.
//! Any candidate that receives majority approval by the authorities in a group
//! may be subject to inclusion, unless any authorities flag that candidate as invalid.
//! Wrongly flagging as invalid should be strongly disincentivized, so that in the
//! equilibrium state it is not expected to happen. Likewise with the submission
//! of invalid blocks.
//! Groups themselves may be compromised by malicious authorities.

use std::collections::{HashMap, HashSet};
use std::sync::Arc;
use std::time::{self, Duration, Instant};
thiolliere's avatar
thiolliere committed
use client::{BlockchainEvents, BlockBody};
use client::blockchain::HeaderBackend;
use client::block_builder::api::BlockBuilder as BlockBuilderApi;
use parity_codec::Encode;
thiolliere's avatar
thiolliere committed
use consensus::SelectChain;
use extrinsic_store::Store as ExtrinsicStore;
use parking_lot::Mutex;
use polkadot_primitives::{Hash, Block, BlockId, BlockNumber, Header, SessionKey};
use polkadot_primitives::parachain::{
	Id as ParaId, Chain, DutyRoster, Extrinsic as ParachainExtrinsic, CandidateReceipt,
	ParachainHost, AttestedCandidate, Statement as PrimitiveStatement, Message, OutgoingMessage, CollatorSignature,
	Collation, PoVBlock,
use primitives::{Pair, ed25519};
use runtime_primitives::{traits::{ProvideRuntimeApi, Header as HeaderT}, ApplyError};
use tokio::runtime::TaskExecutor;
use tokio::timer::{Delay, Interval};
use transaction_pool::txpool::{Pool, ChainApi as PoolChainApi};
use consensus_authorities::AuthoritiesApi;
use attestation_service::ServiceHandle;
use futures::future::{self, Either};
use collation::CollationFetch;
use dynamic_inclusion::DynamicInclusion;
use inherents::InherentData;
use runtime_aura::timestamp::TimestampInherentData;
use log::{info, debug, warn, trace};
use error_chain::bail;
use ed25519::Public as AuthorityId;

pub use self::collation::{
	validate_collation, validate_incoming, message_queue_root, egress_roots, Collators,
pub use self::error::{ErrorKind, Error};
pub use self::shared_table::{
	SharedTable, ParachainWork, PrimedParachainWork, Validated, Statement, SignedStatement,
mod attestation_service;
mod dynamic_inclusion;
mod evaluation;
mod shared_table;
// block size limit.
const MAX_TRANSACTIONS_SIZE: usize = 4 * 1024 * 1024;

/// Incoming messages; a series of sorted (ParaId, Message) pairs.
pub type Incoming = Vec<(ParaId, Vec<Message>)>;

/// Outgoing messages from various candidates.
pub type Outgoing = Vec<MessagesFrom>;

/// Some messages from a parachain.
pub struct MessagesFrom {
	/// The parachain originating the messages.
	pub from: ParaId,
	/// The messages themselves.
	pub messages: ParachainExtrinsic,

impl MessagesFrom {
	/// Construct from the raw messages.
	pub fn from_messages(from: ParaId, messages: Vec<OutgoingMessage>) -> Self {
		MessagesFrom {
			messages: ParachainExtrinsic { outgoing_messages: messages },

/// A handle to a statement table router.
/// This is expected to be a lightweight, shared type like an `Arc`.
pub trait TableRouter: Clone {
	/// Errors when fetching data from the network.
	type Error: std::fmt::Debug;
	/// Future that resolves when candidate data is fetched.
	type FetchValidationProof: IntoFuture<Item=PoVBlock,Error=Self::Error>;
	/// Call with local candidate data. This will make the data available on the network,
	/// and sign, import, and broadcast a statement about the candidate.
	fn local_collation(&self, collation: Collation, extrinsic: ParachainExtrinsic);
	/// Fetch validation proof for a specific candidate.
	fn fetch_pov_block(&self, candidate: &CandidateReceipt) -> Self::FetchValidationProof;
/// A long-lived network which can create parachain statement and BFT message routing processes on demand.
	/// The error type of asynchronously building the table router.
	type Error: std::fmt::Debug;

	/// The table router type. This should handle importing of any statements,
	/// routing statements to peers, and driving completion of any `StatementProducers`.
	type TableRouter: TableRouter;
	/// The future used for asynchronously building the table router.
	/// This should not fail.
	type BuildTableRouter: IntoFuture<Item=Self::TableRouter,Error=Self::Error>;

	/// Instantiate a table router using the given shared table.
	/// Also pass through any outgoing messages to be broadcast to peers.
	fn communication_for(
		table: Arc<SharedTable>,
		authorities: &[SessionKey],
	) -> Self::BuildTableRouter;
/// Information about a specific group.
#[derive(Debug, Clone, Default)]
pub struct GroupInfo {
	/// Authorities meant to check validity of candidates.
	validity_guarantors: HashSet<SessionKey>,
	/// Number of votes needed for validity.

/// Sign a table statement against a parent hash.
/// The actual message signed is the encoded statement concatenated with the
/// parent hash.
pub fn sign_table_statement(statement: &Statement, key: &ed25519::Pair, parent_hash: &Hash) -> CollatorSignature {
	// we sign using the primitive statement type because that's what the runtime
	// expects. These types probably encode the same way so this clone could be optimized
	// out in the future.
	let mut encoded = PrimitiveStatement::from(statement.clone()).encode();
/// Check signature on table statement.
pub fn check_statement(statement: &Statement, signature: &CollatorSignature, signer: SessionKey, parent_hash: &Hash) -> bool {
	use runtime_primitives::traits::Verify;
	let mut encoded = PrimitiveStatement::from(statement.clone()).encode();
	signature.verify(&encoded[..], &signer.into())
/// Compute group info out of a duty roster and a local authority set.
pub fn make_group_info(
	roster: DutyRoster,
	authorities: &[AuthorityId],
	local_id: AuthorityId,
) -> Result<(HashMap<ParaId, GroupInfo>, LocalDuty), Error> {
	if roster.validator_duty.len() != authorities.len() {
		bail!(ErrorKind::InvalidDutyRosterLength(authorities.len(), roster.validator_duty.len()))

	let mut local_validation = None;
	let duty_iter = authorities.iter().zip(&roster.validator_duty);
	for (authority, v_duty) in duty_iter {
		if authority == &local_id {
			local_validation = Some(v_duty.clone());

		match *v_duty {
			Chain::Relay => {}, // does nothing for now.
			Chain::Parachain(ref id) => {

	for live_group in map.values_mut() {
		let validity_len = live_group.validity_guarantors.len();
		live_group.needed_validity = validity_len / 2 + validity_len % 2;

	match local_validation {
		Some(local_validation) => {
			let local_duty = LocalDuty {
				validation: local_validation,

			Ok((map, local_duty))
		None => bail!(ErrorKind::NotValidator(local_id)),

/// Constructs parachain-agreement instances.
struct ParachainValidation<C, N, P> {
	client: Arc<P>,
	/// The backing network handle.
	network: N,
	/// Parachain collators.
	collators: C,
	handle: TaskExecutor,
	/// Store for extrinsic data.
	extrinsic_store: ExtrinsicStore,
	/// Live agreements. Maps relay chain parent hashes to attestation
	/// instances.
	live_instances: Mutex<HashMap<Hash, Arc<AttestationTracker>>>,
impl<C, N, P> ParachainValidation<C, N, P> where
	C: Collators + Send + 'static,
	N: Network,
	P: ProvideRuntimeApi + HeaderBackend<Block> + BlockBody<Block> + Send + Sync + 'static,
	P::Api: ParachainHost<Block> + BlockBuilderApi<Block>,
	<C::Collation as IntoFuture>::Future: Send + 'static,
	N::TableRouter: Send + 'static,
	<N::BuildTableRouter as IntoFuture>::Future: Send + 'static,
	/// Get an attestation table for given parent hash.
	/// This starts a parachain agreement process on top of the parent hash if
	/// one has not already started.
	/// Additionally, this will trigger broadcast of data to the new block's duty
	/// roster.
	fn get_or_instantiate(
		parent_hash: Hash,
		grandparent_hash: Hash,
		sign_with: Arc<ed25519::Pair>,
		max_block_data_size: Option<u64>,
		-> Result<Arc<AttestationTracker>, Error>
		let mut live_instances = self.live_instances.lock();
		if let Some(tracker) = live_instances.get(&parent_hash) {
			return Ok(tracker.clone());
Arkadiy Paronyan's avatar
Arkadiy Paronyan committed
		let id = BlockId::hash(parent_hash);

		// compute the parent candidates, if we know of them.
		// this will allow us to circulate outgoing messages to other peers as necessary.
		let parent_candidates: Vec<_> = crate::attestation_service::fetch_candidates(&*self.client, &id)
			.and_then(|x| x)
			.map(|x| x.collect())

		// TODO:
		// We probably don't only want active validators to do this, or messages
		// will disappear when validators exit the set.
		let _outgoing: Vec<_> = {
			// extract all extrinsic data that we have and propagate to peers.
			live_instances.get(&grandparent_hash).map(|parent_validation| {
				parent_candidates.iter().filter_map(|c| {
					let para_id = c.parachain_index;
					let hash = c.hash();
					parent_validation.table.extrinsic_data(&hash).map(|ex| MessagesFrom {
						from: para_id,
						messages: ex,

		let duty_roster = self.client.runtime_api().duty_roster(&id)?;
		let (group_info, local_duty) = make_group_info(
		info!("Starting parachain attestation session on top of parent {:?}. Local parachain duty is {:?}",
		let active_parachains = self.client.runtime_api().active_parachains(&id)?;
		debug!(target: "validation", "Active parachains: {:?}", active_parachains);
		let table = Arc::new(SharedTable::new(
		let router =
		let drop_signal = match local_duty.validation {
			Chain::Parachain(id) => Some(self.launch_work(
		let tracker = Arc::new(AttestationTracker {
			started: Instant::now(),
			_drop_signal: drop_signal

		live_instances.insert(parent_hash, tracker.clone());


	/// Retain validation sessions matching predicate.
	fn retain<F: FnMut(&Hash) -> bool>(&self, mut pred: F) {
		self.live_instances.lock().retain(|k, _| pred(k))

	// launch parachain work asynchronously.
	fn launch_work(
		relay_parent: Hash,
		validation_para: ParaId,
		build_router: N::BuildTableRouter,
		max_block_data_size: Option<u64>,
	) -> exit_future::Signal {
		use extrinsic_store::Data;

		let (signal, exit) = exit_future::signal();
		let (collators, client) = (self.collators.clone(), self.client.clone());
		let extrinsic_store = self.extrinsic_store.clone();

		let with_router = move |router: N::TableRouter| {
			// fetch a local collation from connected collators.
			let collation_work = CollationFetch::new(
			collation_work.then(move |result| match result {
				Ok((collation, extrinsic)) => {
					let res = extrinsic_store.make_available(Data {
						parachain_id: collation.receipt.parachain_index,
						candidate_hash: collation.receipt.hash(),
						block_data: collation.pov.block_data.clone(),
						extrinsic: Some(extrinsic.clone()),

					match res {
						Ok(()) => {
							// TODO:
							// Erasure-code and provide merkle branches.
							router.local_collation(collation, extrinsic);
						Err(e) => warn!(
							target: "validation",
							"Failed to make collation data available: {:?}",
					warn!(target: "validation", "Failed to collate candidate: {:?}", e);
		let cancellable_work = build_router
			.map_err(|e| {
				warn!(target: "validation" , "Failed to build table router: {:?}", e);
			.then(|_| Ok(()));

		// spawn onto thread pool.
/// Parachain validation for a single block.
struct AttestationTracker {
	_drop_signal: Option<exit_future::Signal>,
	table: Arc<SharedTable>,
	started: Instant,

/// Polkadot proposer factory.
thiolliere's avatar
thiolliere committed
pub struct ProposerFactory<C, N, P, SC, TxApi: PoolChainApi> {
	parachain_validation: Arc<ParachainValidation<C, N, P>>,
	transaction_pool: Arc<Pool<TxApi>>,
	key: Arc<ed25519::Pair>,
	_service_handle: ServiceHandle,
	aura_slot_duration: SlotDuration,
thiolliere's avatar
thiolliere committed
	select_chain: SC,
	max_block_data_size: Option<u64>,
thiolliere's avatar
thiolliere committed
impl<C, N, P, SC, TxApi> ProposerFactory<C, N, P, SC, TxApi> where
	C: Collators + Send + Sync + 'static,
	<C::Collation as IntoFuture>::Future: Send + 'static,
thiolliere's avatar
thiolliere committed
	P: BlockchainEvents<Block> + BlockBody<Block>,
	P: ProvideRuntimeApi + HeaderBackend<Block> + Send + Sync + 'static,
	P::Api: ParachainHost<Block> + BlockBuilderApi<Block> + AuthoritiesApi<Block>,
	N: Network + Send + Sync + 'static,
	N::TableRouter: Send + 'static,
	<N::BuildTableRouter as IntoFuture>::Future: Send + 'static,
	TxApi: PoolChainApi,
thiolliere's avatar
thiolliere committed
	SC: SelectChain<Block> + 'static,
	/// Create a new proposer factory.
	pub fn new(
		client: Arc<P>,
thiolliere's avatar
thiolliere committed
		select_chain: SC,
		network: N,
		collators: C,
		transaction_pool: Arc<Pool<TxApi>>,
		thread_pool: TaskExecutor,
		key: Arc<ed25519::Pair>,
		extrinsic_store: ExtrinsicStore,
		aura_slot_duration: SlotDuration,
		max_block_data_size: Option<u64>,
	) -> Self {
		let parachain_validation = Arc::new(ParachainValidation {
			client: client.clone(),
			handle: thread_pool.clone(),
			extrinsic_store: extrinsic_store.clone(),
			live_instances: Mutex::new(HashMap::new()),

		let service_handle = crate::attestation_service::start(
thiolliere's avatar
thiolliere committed
		ProposerFactory {
			_service_handle: service_handle,
thiolliere's avatar
thiolliere committed
impl<C, N, P, SC, TxApi> consensus::Environment<Block> for ProposerFactory<C, N, P, SC, TxApi> where
	C: Collators + Send + 'static,
	N: Network,
	TxApi: PoolChainApi<Block=Block>,
	P: ProvideRuntimeApi + HeaderBackend<Block> + BlockBody<Block> + Send + Sync + 'static,
	P::Api: ParachainHost<Block> + BlockBuilderApi<Block>,
	<C::Collation as IntoFuture>::Future: Send + 'static,
	N::TableRouter: Send + 'static,
	<N::BuildTableRouter as IntoFuture>::Future: Send + 'static,
thiolliere's avatar
thiolliere committed
	SC: SelectChain<Block>,
	type Proposer = Proposer<P, TxApi>;
	type Error = Error;

	fn init(
		parent_header: &Header,
		authorities: &[AuthorityId],
	) -> Result<Self::Proposer, Error> {
		let parent_hash = parent_header.hash();
		let parent_id = BlockId::hash(parent_hash);
		let sign_with = self.key.clone();
		let tracker = self.parachain_validation.get_or_instantiate(

		Ok(Proposer {
			client: self.parachain_validation.client.clone(),
			parent_number: parent_header.number,
			transaction_pool: self.transaction_pool.clone(),
			slot_duration: self.aura_slot_duration.clone(),
/// The local duty of a validator.
pub struct LocalDuty {
	validation: Chain,

/// The Polkadot proposer logic.
pub struct Proposer<C: Send + Sync, TxApi: PoolChainApi> where
	C: ProvideRuntimeApi + HeaderBackend<Block>,
Gav Wood's avatar
Gav Wood committed
	parent_hash: Hash,
Arkadiy Paronyan's avatar
Arkadiy Paronyan committed
	parent_id: BlockId,
	parent_number: BlockNumber,
	tracker: Arc<AttestationTracker>,
	transaction_pool: Arc<Pool<TxApi>>,
	slot_duration: SlotDuration,
impl<C, TxApi> consensus::Proposer<Block> for Proposer<C, TxApi> where
	TxApi: PoolChainApi<Block=Block>,
	C: ProvideRuntimeApi + HeaderBackend<Block> + Send + Sync,
	C::Api: ParachainHost<Block> + BlockBuilderApi<Block>,
	type Create = Either<CreateProposal<C, TxApi>, future::FutureResult<Block, Error>>;
	fn propose(&self, inherent_data: InherentData, max_duration: Duration) -> Self::Create {
		const ATTEMPT_PROPOSE_EVERY: Duration = Duration::from_millis(100);
		const SLOT_DURATION_DENOMINATOR: u64 = 3; // wait up to 1/3 of the slot for candidates.
		let initial_included = self.tracker.table.includable_count();

		let dynamic_inclusion = DynamicInclusion::new(
			Duration::from_secs(self.slot_duration.get() / SLOT_DURATION_DENOMINATOR),

		let enough_candidates = dynamic_inclusion.acceptable_in(
		).unwrap_or_else(|| now + Duration::from_millis(1));
		let believed_timestamp = match inherent_data.timestamp_inherent_data() {
			Ok(timestamp) => timestamp,
			Err(e) => return Either::B(future::err(ErrorKind::InherentError(e).into())),

		// set up delay until next allowed timestamp.
		let current_timestamp = current_timestamp();
Gav Wood's avatar
Gav Wood committed
		let delay_future = if current_timestamp >= believed_timestamp {
		} else {
Gav Wood's avatar
Gav Wood committed
				Instant::now() + Duration::from_secs(current_timestamp - believed_timestamp)
			minimum: delay_future,
			attempt_propose: Interval::new(now + ATTEMPT_PROPOSE_EVERY, ATTEMPT_PROPOSE_EVERY),
			enough_candidates: Delay::new(enough_candidates),
		Either::A(CreateProposal {
			parent_hash: self.parent_hash.clone(),
			parent_number: self.parent_number.clone(),
			parent_id: self.parent_id.clone(),
			client: self.client.clone(),
			transaction_pool: self.transaction_pool.clone(),
			table: self.tracker.table.clone(),
			believed_minimum_timestamp: believed_timestamp,
			inherent_data: Some(inherent_data),
			// leave some time for the proposal finalisation
			deadline: Instant::now() + max_duration - max_duration / 3,
Gav Wood's avatar
Gav Wood committed
fn current_timestamp() -> u64 {
		.expect("now always later than unix epoch; qed")
struct ProposalTiming {
	minimum: Option<Delay>,
	attempt_propose: Interval,
	dynamic_inclusion: DynamicInclusion,
	last_included: usize,
impl ProposalTiming {
	// whether it's time to attempt a proposal.
	// shouldn't be called outside of the context of a task.
	fn poll(&mut self, included: usize) -> Poll<(), ErrorKind> {
		// first drain from the interval so when the minimum delay is up
		// we don't have any notifications built up.
		// this interval is just meant to produce periodic task wakeups
		// that lead to the `dynamic_inclusion` getting updated as necessary.
		while let Async::Ready(x) = self.attempt_propose.poll().map_err(ErrorKind::Timer)? {
			x.expect("timer still alive; intervals never end; qed");
		// wait until the minimum time has passed.
		if let Some(mut minimum) = self.minimum.take() {
			if let Async::NotReady = minimum.poll().map_err(ErrorKind::Timer)? {
				self.minimum = Some(minimum);
				return Ok(Async::NotReady);

		if included == self.last_included {
			return self.enough_candidates.poll().map_err(ErrorKind::Timer);

		// the amount of includable candidates has changed. schedule a wakeup
		// if it's not sufficient anymore.
		match self.dynamic_inclusion.acceptable_in(Instant::now(), included) {
			Some(instant) => {
				self.last_included = included;
/// Future which resolves upon the creation of a proposal.
pub struct CreateProposal<C: Send + Sync, TxApi: PoolChainApi> {
Gav Wood's avatar
Gav Wood committed
	parent_hash: Hash,
	parent_number: BlockNumber,
Arkadiy Paronyan's avatar
Arkadiy Paronyan committed
	parent_id: BlockId,
	transaction_pool: Arc<Pool<TxApi>>,
	table: Arc<SharedTable>,
	timing: ProposalTiming,
	believed_minimum_timestamp: u64,
	inherent_data: Option<InherentData>,
	deadline: Instant,
impl<C, TxApi> CreateProposal<C, TxApi> where
	TxApi: PoolChainApi<Block=Block>,
	C: ProvideRuntimeApi + HeaderBackend<Block> + Send + Sync,
	C::Api: ParachainHost<Block> + BlockBuilderApi<Block>,
	fn propose_with(&mut self, candidates: Vec<AttestedCandidate>) -> Result<Block, Error> {
		use client::block_builder::BlockBuilder;
		use runtime_primitives::traits::{Hash as HashT, BlakeTwo256};
		const MAX_TRANSACTIONS: usize = 40;

		let mut inherent_data = self.inherent_data
			.expect("CreateProposal is not polled after finishing; qed");
		inherent_data.put_data(polkadot_runtime::PARACHAIN_INHERENT_IDENTIFIER, &candidates).map_err(ErrorKind::InherentError)?;
		let runtime_api = self.client.runtime_api();

		let mut block_builder = BlockBuilder::at_block(&self.parent_id, &*self.client, false)?;
Gav Wood's avatar
Gav Wood committed
			let inherents = runtime_api.inherent_extrinsics(&self.parent_id, inherent_data)?;
			for inherent in inherents {

			let mut unqueue_invalid = Vec::new();
			let ready_iter = self.transaction_pool.ready();
			for ready in ready_iter.take(MAX_TRANSACTIONS) {
				let encoded_size =;
				if pending_size + encoded_size >= MAX_TRANSACTIONS_SIZE {
				if Instant::now() > self.deadline {
					debug!("Consensus deadline reached when pushing block transactions, proceeding with proposing.");

				match block_builder.push( {
					Ok(()) => {
						debug!("[{:?}] Pushed to the block.", ready.hash);
						pending_size += encoded_size;
					Err(client::error::Error::ApplyExtrinsicFailed(ApplyError::FullBlock)) => {
						debug!("Block is full, proceed with proposing.");
					Err(e) => {
						trace!(target: "transaction-pool", "Invalid transaction: {}", e);
		let new_block = block_builder.bake()?;
		info!("Prepared block for proposing at {} [hash: {:?}; parent_hash: {}; extrinsics: [{}]]",
Gav Wood's avatar
Gav Wood committed
				.map(|xt| format!("{}", BlakeTwo256::hash_of(xt)))
				.join(", ")

		// TODO: full re-evaluation (
		let active_parachains = runtime_api.active_parachains(&self.parent_id)?;
Gav Wood's avatar
Gav Wood committed
impl<C, TxApi> Future for CreateProposal<C, TxApi> where
	TxApi: PoolChainApi<Block=Block>,
	C: ProvideRuntimeApi + HeaderBackend<Block> + Send + Sync,
	C::Api: ParachainHost<Block> + BlockBuilderApi<Block>,
Gav Wood's avatar
Gav Wood committed
	type Item = Block;
Gav Wood's avatar
Gav Wood committed
	fn poll(&mut self) -> Poll<Block, Error> {
		// 1. try to propose if we have enough includable candidates and other
		// delays have concluded.
		let included = self.table.includable_count();
		let proposed_candidates = self.table.proposed_set();

	use substrate_keyring::AuthorityKeyring;

	fn sign_and_check_statement() {
		let statement: Statement = GenericStatement::Valid([1; 32].into());
		let parent_hash = [2; 32].into();

		let sig = sign_table_statement(&statement, &AuthorityKeyring::Alice.pair(), &parent_hash);
		assert!(check_statement(&statement, &sig, AuthorityKeyring::Alice.into(), &parent_hash));
		assert!(!check_statement(&statement, &sig, AuthorityKeyring::Alice.into(), &[0xff; 32].into()));
		assert!(!check_statement(&statement, &sig, AuthorityKeyring::Bob.into(), &parent_hash));