amareleo_node_bft/helpers/
proposal_cache.rs1use crate::helpers::{Proposal, SignedProposals, ledger_files::proposal_cache_path};
17use amareleo_chain_tracing::TracingHandler;
18use snarkvm::{
19 console::{account::Address, network::Network, program::SUBDAG_CERTIFICATES_DEPTH},
20 ledger::narwhal::BatchCertificate,
21 prelude::{FromBytes, IoResult, Read, Result, ToBytes, Write, anyhow, bail, error},
22};
23
24use aleo_std::StorageMode;
25use indexmap::IndexSet;
26use std::fs;
27
28#[derive(Debug, PartialEq, Eq)]
30pub struct ProposalCache<N: Network> {
31 latest_round: u64,
33 proposal: Option<Proposal<N>>,
35 signed_proposals: SignedProposals<N>,
37 pending_certificates: IndexSet<BatchCertificate<N>>,
39}
40
41impl<N: Network> ProposalCache<N> {
42 pub fn new(
44 latest_round: u64,
45 proposal: Option<Proposal<N>>,
46 signed_proposals: SignedProposals<N>,
47 pending_certificates: IndexSet<BatchCertificate<N>>,
48 ) -> Self {
49 Self { latest_round, proposal, signed_proposals, pending_certificates }
50 }
51
52 pub fn is_valid(&self, expected_signer: Address<N>) -> bool {
54 self.proposal
55 .as_ref()
56 .map(|proposal| {
57 proposal.batch_header().author() == expected_signer && self.latest_round == proposal.round()
58 })
59 .unwrap_or(true)
60 && self.signed_proposals.is_valid(expected_signer)
61 }
62
63 pub fn exists(storage_mode: &StorageMode) -> bool {
65 proposal_cache_path(storage_mode).map_or(false, |path| path.exists())
66 }
67
68 pub fn load(
70 expected_signer: Address<N>,
71 storage_mode: &StorageMode,
72 tracing: Option<TracingHandler>,
73 ) -> Result<Self> {
74 let _guard = tracing.map(|trace_handle| trace_handle.subscribe_thread());
75 let path = proposal_cache_path(storage_mode)?;
76
77 let proposal_cache = match fs::read(&path) {
79 Ok(bytes) => match Self::from_bytes_le(&bytes) {
80 Ok(proposal_cache) => proposal_cache,
81 Err(_) => bail!("Couldn't deserialize the proposal stored at {}", path.display()),
82 },
83 Err(_) => bail!("Couldn't read the proposal stored at {}", path.display()),
84 };
85
86 if !proposal_cache.is_valid(expected_signer) {
88 bail!("The proposal cache is invalid for the given address {expected_signer}");
89 }
90
91 info!("Loaded the proposal cache from {} at round {}", path.display(), proposal_cache.latest_round);
92
93 Ok(proposal_cache)
94 }
95
96 pub fn store(&self, storage_mode: &StorageMode, tracing: Option<TracingHandler>) -> Result<()> {
98 let _guard = tracing.map(|trace_handle| trace_handle.subscribe_thread());
99 let path = proposal_cache_path(storage_mode)?;
100 info!("Storing the proposal cache to {}...", path.display());
101
102 let bytes = self.to_bytes_le()?;
104 fs::write(&path, bytes)
106 .map_err(|err| anyhow!("Couldn't write the proposal cache to {} - {err}", path.display()))?;
107
108 Ok(())
109 }
110
111 pub fn into(self) -> (u64, Option<Proposal<N>>, SignedProposals<N>, IndexSet<BatchCertificate<N>>) {
113 (self.latest_round, self.proposal, self.signed_proposals, self.pending_certificates)
114 }
115}
116
117impl<N: Network> ToBytes for ProposalCache<N> {
118 fn write_le<W: Write>(&self, mut writer: W) -> IoResult<()> {
119 self.latest_round.write_le(&mut writer)?;
121 self.proposal.is_some().write_le(&mut writer)?;
123 if let Some(proposal) = &self.proposal {
124 proposal.write_le(&mut writer)?;
125 }
126 self.signed_proposals.write_le(&mut writer)?;
128 u32::try_from(self.pending_certificates.len()).map_err(error)?.write_le(&mut writer)?;
130 for certificate in &self.pending_certificates {
132 certificate.write_le(&mut writer)?;
133 }
134
135 Ok(())
136 }
137}
138
139impl<N: Network> FromBytes for ProposalCache<N> {
140 fn read_le<R: Read>(mut reader: R) -> IoResult<Self> {
141 let latest_round = u64::read_le(&mut reader)?;
143 let has_proposal: bool = FromBytes::read_le(&mut reader)?;
145 let proposal = match has_proposal {
146 true => Some(Proposal::read_le(&mut reader)?),
147 false => None,
148 };
149 let signed_proposals = SignedProposals::read_le(&mut reader)?;
151 let num_certificates = u32::read_le(&mut reader)?;
153 if num_certificates > 2u32.saturating_pow(SUBDAG_CERTIFICATES_DEPTH as u32) {
155 return Err(error(format!(
156 "Number of certificates ({num_certificates}) exceeds the maximum ({})",
157 2u32.saturating_pow(SUBDAG_CERTIFICATES_DEPTH as u32)
158 )));
159 };
160 let pending_certificates =
162 (0..num_certificates).map(|_| BatchCertificate::read_le(&mut reader)).collect::<IoResult<IndexSet<_>>>()?;
163
164 Ok(Self::new(latest_round, proposal, signed_proposals, pending_certificates))
165 }
166}
167
168impl<N: Network> Default for ProposalCache<N> {
169 fn default() -> Self {
171 Self::new(0, None, Default::default(), Default::default())
172 }
173}
174
175#[cfg(test)]
176mod tests {
177 use super::*;
178 use crate::helpers::{proposal::tests::sample_proposal, signed_proposals::tests::sample_signed_proposals};
179 use snarkvm::{
180 console::{account::PrivateKey, network::MainnetV0},
181 ledger::narwhal::batch_certificate::test_helpers::sample_batch_certificates,
182 utilities::TestRng,
183 };
184
185 type CurrentNetwork = MainnetV0;
186
187 const ITERATIONS: usize = 100;
188
189 pub(crate) fn sample_proposal_cache(
190 signer: &PrivateKey<CurrentNetwork>,
191 rng: &mut TestRng,
192 ) -> ProposalCache<CurrentNetwork> {
193 let proposal = sample_proposal(rng);
194 let signed_proposals = sample_signed_proposals(signer, rng);
195 let round = proposal.round();
196 let pending_certificates = sample_batch_certificates(rng);
197
198 ProposalCache::new(round, Some(proposal), signed_proposals, pending_certificates)
199 }
200
201 #[test]
202 fn test_bytes() {
203 let rng = &mut TestRng::default();
204 let singer_private_key = PrivateKey::<CurrentNetwork>::new(rng).unwrap();
205
206 for _ in 0..ITERATIONS {
207 let expected = sample_proposal_cache(&singer_private_key, rng);
208 let expected_bytes = expected.to_bytes_le().unwrap();
210 assert_eq!(expected, ProposalCache::read_le(&expected_bytes[..]).unwrap());
211 }
212 }
213}