Skip to main content

mithril_common/messages/
certificate.rs

1use std::fmt::{Debug, Formatter};
2
3use anyhow::Context;
4use serde::{Deserialize, Serialize};
5
6use crate::StdError;
7use crate::entities::{
8    Certificate, CertificateMetadata, CertificateSignature, Epoch, ProtocolMessage,
9    SignedEntityType,
10};
11use crate::messages::CertificateMetadataMessagePart;
12
13/// Message structure of a certificate
14#[derive(Clone, PartialEq, Serialize, Deserialize)]
15pub struct CertificateMessage {
16    /// Hash of the current certificate
17    /// Computed from the other fields of the certificate
18    /// aka H(Cp,n))
19    pub hash: String,
20
21    /// Hash of the previous certificate in the chain
22    /// This is either the hash of the first certificate of the epoch in the chain
23    /// Or the first certificate of the previous epoch in the chain (if the certificate is the first of its epoch)
24    /// aka H(FC(n))
25    pub previous_hash: String,
26
27    /// Epoch of the Cardano chain
28    pub epoch: Epoch,
29
30    /// The signed entity type of the message.
31    /// aka BEACON(p,n)
32    pub signed_entity_type: SignedEntityType,
33
34    /// Certificate metadata
35    /// aka METADATA(p,n)
36    pub metadata: CertificateMetadataMessagePart,
37
38    /// Structured message that is used to create the signed message
39    /// aka MSG(p,n) U AVK(n-1)
40    pub protocol_message: ProtocolMessage,
41
42    /// Message that is signed by the signers
43    /// aka H(MSG(p,n) || AVK(n-1))
44    pub signed_message: String,
45
46    /// Aggregate verification key for Concatenation
47    /// The AVK used to sign for Concatenation during the current epoch
48    /// aka AVK(n-2)
49    pub aggregate_verification_key: String,
50
51    /// Aggregate verification key for SNARK
52    /// The AVK used to sign for SNARK during the current epoch
53    /// aka AVKS(n-2)
54    #[cfg(feature = "future_snark")]
55    #[serde(skip_serializing_if = "Option::is_none", default)]
56    pub aggregate_verification_key_snark: Option<String>,
57
58    /// STM multi signature created from a quorum of single signatures from the signers
59    /// aka MULTI_SIG(H(MSG(p,n) || AVK(n-1)))
60    pub multi_signature: String,
61
62    /// Genesis signature created from the original stake distribution
63    /// aka GENESIS_SIG(AVK(-1))
64    pub genesis_signature: String,
65}
66
67impl CertificateMessage {
68    /// Check that the certificate signed message match the given protocol message.
69    pub fn match_message(&self, message: &ProtocolMessage) -> bool {
70        message.compute_hash() == self.signed_message
71    }
72}
73
74impl Debug for CertificateMessage {
75    fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result {
76        let should_be_exhaustive = f.alternate();
77        let mut debug = f.debug_struct("Certificate");
78        debug
79            .field("hash", &self.hash)
80            .field("previous_hash", &self.previous_hash)
81            .field("epoch", &format_args!("{:?}", self.epoch))
82            .field(
83                "signed_entity_type",
84                &format_args!("{:?}", self.signed_entity_type),
85            )
86            .field("metadata", &format_args!("{:?}", self.metadata))
87            .field(
88                "protocol_message",
89                &format_args!("{:?}", self.protocol_message),
90            )
91            .field("signed_message", &self.signed_message);
92
93        match should_be_exhaustive {
94            true => {
95                debug.field(
96                    "aggregate_verification_key",
97                    &self.aggregate_verification_key,
98                );
99                #[cfg(feature = "future_snark")]
100                debug.field(
101                    "aggregate_verification_key_snark",
102                    &self.aggregate_verification_key_snark,
103                );
104                debug
105                    .field("multi_signature", &self.multi_signature)
106                    .field("genesis_signature", &self.genesis_signature)
107                    .finish()
108            }
109            false => debug.finish_non_exhaustive(),
110        }
111    }
112}
113
114impl TryFrom<CertificateMessage> for Certificate {
115    type Error = StdError;
116
117    fn try_from(certificate_message: CertificateMessage) -> Result<Self, Self::Error> {
118        let metadata = CertificateMetadata {
119            network: certificate_message.metadata.network,
120            protocol_version: certificate_message.metadata.protocol_version,
121            protocol_parameters: certificate_message.metadata.protocol_parameters,
122            initiated_at: certificate_message.metadata.initiated_at,
123            sealed_at: certificate_message.metadata.sealed_at,
124            signers: certificate_message.metadata.signers,
125        };
126
127        let certificate = Certificate {
128            hash: certificate_message.hash,
129            previous_hash: certificate_message.previous_hash,
130            epoch: certificate_message.epoch,
131            metadata,
132            protocol_message: certificate_message.protocol_message,
133            signed_message: certificate_message.signed_message,
134            aggregate_verification_key: certificate_message
135                .aggregate_verification_key
136                .try_into()
137                .with_context(|| {
138                "Can not convert message to certificate: can not decode the aggregate verification key for Concatenation"
139            })?,
140            #[cfg(feature = "future_snark")]
141            aggregate_verification_key_snark: certificate_message
142                .aggregate_verification_key_snark
143                .map(|avk| avk.try_into())
144                .transpose()
145                .with_context(|| {
146                "Can not convert message to certificate: can not decode the aggregate verification key for SNARK"
147            })?,
148            signature: if certificate_message.genesis_signature.is_empty() {
149                CertificateSignature::MultiSignature(
150                    certificate_message.signed_entity_type,
151                    certificate_message
152                        .multi_signature
153                        .try_into()
154                        .with_context(|| {
155                            "Can not convert message to certificate: can not decode the multi-signature"
156                        })?,
157                )
158            } else {
159                CertificateSignature::GenesisSignature(
160                    certificate_message
161                        .genesis_signature
162                        .try_into()
163                        .with_context(|| {
164                            "Can not convert message to certificate: can not decode the genesis signature"
165                        })?,
166                )
167            },
168        };
169
170        Ok(certificate)
171    }
172}
173
174impl TryFrom<Certificate> for CertificateMessage {
175    type Error = StdError;
176
177    fn try_from(certificate: Certificate) -> Result<Self, Self::Error> {
178        let signed_entity_type = certificate.signed_entity_type();
179        let metadata = CertificateMetadataMessagePart {
180            network: certificate.metadata.network,
181            protocol_version: certificate.metadata.protocol_version,
182            protocol_parameters: certificate.metadata.protocol_parameters,
183            initiated_at: certificate.metadata.initiated_at,
184            sealed_at: certificate.metadata.sealed_at,
185            signers: certificate.metadata.signers,
186        };
187
188        let (multi_signature, genesis_signature) = match certificate.signature {
189            CertificateSignature::GenesisSignature(signature) => (
190                String::new(),
191                signature.to_bytes_hex().with_context(|| {
192                    "Can not convert certificate to message: can not encode the genesis signature"
193                })?,
194            ),
195            CertificateSignature::MultiSignature(_, signature) => (
196                signature.to_json_hex().with_context(|| {
197                    "Can not convert certificate to message: can not encode the multi-signature"
198                })?,
199                String::new(),
200            ),
201        };
202
203        let message = CertificateMessage {
204            hash: certificate.hash,
205            previous_hash: certificate.previous_hash,
206            epoch: certificate.epoch,
207            signed_entity_type,
208            metadata,
209            protocol_message: certificate.protocol_message,
210            signed_message: certificate.signed_message,
211            aggregate_verification_key: certificate
212                .aggregate_verification_key
213                .to_json_hex()
214                .with_context(|| {
215                    "Can not convert certificate to message: can not encode aggregate verification key for Concatenation"
216                })?,
217            #[cfg(feature = "future_snark")]
218            aggregate_verification_key_snark: certificate
219                .aggregate_verification_key_snark
220                .map(|avk| avk.to_bytes_hex())
221                .transpose()
222                .with_context(|| {
223                    "Can not convert certificate to message: can not encode aggregate verification key for SNARK"
224                })?,
225            multi_signature,
226            genesis_signature,
227        };
228
229        Ok(message)
230    }
231}
232
233#[cfg(test)]
234mod tests {
235    use chrono::{DateTime, Utc};
236
237    use crate::entities::{
238        CardanoDbBeacon, ProtocolMessagePartKey, ProtocolParameters, StakeDistributionParty,
239    };
240
241    use super::*;
242
243    fn golden_certificate_message() -> CertificateMessage {
244        CertificateMessage {
245            hash: "hash".to_string(),
246            previous_hash: "previous_hash".to_string(),
247            epoch: Epoch(10),
248            signed_entity_type: SignedEntityType::CardanoImmutableFilesFull(CardanoDbBeacon::new(
249                *Epoch(10),
250                1728,
251            )),
252            metadata: CertificateMetadataMessagePart {
253                network: "testnet".to_string(),
254                protocol_version: "0.1.0".to_string(),
255                protocol_parameters: ProtocolParameters::new(1000, 100, 0.123),
256                initiated_at: DateTime::parse_from_rfc3339("2024-02-12T13:11:47Z")
257                    .unwrap()
258                    .with_timezone(&Utc),
259                sealed_at: DateTime::parse_from_rfc3339("2024-02-12T13:12:57Z")
260                    .unwrap()
261                    .with_timezone(&Utc),
262                signers: vec![
263                    StakeDistributionParty {
264                        party_id: "1".to_string(),
265                        stake: 10,
266                    },
267                    StakeDistributionParty {
268                        party_id: "2".to_string(),
269                        stake: 20,
270                    },
271                ],
272            },
273            protocol_message: {
274                let mut protocol_message = ProtocolMessage::new();
275                protocol_message.set_message_part(
276                    ProtocolMessagePartKey::SnapshotDigest,
277                    "snapshot-digest-123".to_string(),
278                );
279                protocol_message.set_message_part(
280                    ProtocolMessagePartKey::NextAggregateVerificationKey,
281                    "next-avk-123".to_string(),
282                );
283
284                protocol_message
285            },
286            signed_message: "signed_message".to_string(),
287            aggregate_verification_key: "aggregate_verification_key".to_string(),
288            #[cfg(feature = "future_snark")]
289            aggregate_verification_key_snark: None,
290            multi_signature: "multi_signature".to_string(),
291            genesis_signature: "genesis_signature".to_string(),
292        }
293    }
294
295    mod golden_json_serialization {
296
297        use super::*;
298
299        const CURRENT_JSON: &str = r#"{
300            "hash": "hash",
301            "previous_hash": "previous_hash",
302            "epoch": 10,
303            "signed_entity_type": {
304                "CardanoImmutableFilesFull": {
305                    "epoch": 10,
306                    "immutable_file_number": 1728
307                }
308            },
309            "metadata": {
310                "network": "testnet",
311                "version": "0.1.0",
312                "parameters": {
313                    "k": 1000,
314                    "m": 100,
315                    "phi_f": 0.123
316                },
317            "initiated_at": "2024-02-12T13:11:47Z",
318            "sealed_at": "2024-02-12T13:12:57Z",
319                "signers": [
320                    {
321                        "party_id": "1",
322                        "verification_key": "7b22766b223a5b3134332c3136312c3235352c34382c37382c35372c3230342c3232302c32352c3232312c3136342c3235322c3234382c31342c35362c3132362c3138362c3133352c3232382c3138382c3134352c3138312c35322c3230302c39372c39392c3231332c34362c302c3139392c3139332c38392c3138372c38382c32392c3133352c3137332c3234342c38362c33362c38332c35342c36372c3136342c362c3133372c39342c37322c362c3130352c3132382c3132382c39332c34382c3137362c31312c342c3234362c3133382c34382c3138302c3133332c39302c3134322c3139322c32342c3139332c3131312c3134322c33312c37362c3131312c3131302c3233342c3135332c39302c3230382c3139322c33312c3132342c39352c3130322c34392c3135382c39392c35322c3232302c3136352c39342c3235312c36382c36392c3132312c31362c3232342c3139345d2c22706f70223a5b3136382c35302c3233332c3139332c31352c3133362c36352c37322c3132332c3134382c3132392c3137362c33382c3139382c3230392c34372c32382c3230342c3137362c3134342c35372c3235312c34322c32382c36362c37362c38392c39372c3135382c36332c35342c3139382c3139342c3137362c3133352c3232312c31342c3138352c3139372c3232352c3230322c39382c3234332c37342c3233332c3232352c3134332c3135312c3134372c3137372c3137302c3131372c36362c3136352c36362c36322c33332c3231362c3233322c37352c36382c3131342c3139352c32322c3130302c36352c34342c3139382c342c3136362c3130322c3233332c3235332c3234302c35392c3137352c36302c3131372c3134322c3131342c3134302c3132322c31372c38372c3131302c3138372c312c31372c31302c3139352c3135342c31332c3234392c38362c35342c3232365d7d",
323                        "stake": 10
324                    },
325                    {
326                        "party_id": "2",
327                        "verification_key": "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",
328                        "stake": 20
329                    }
330                ]
331            },
332            "protocol_message": {
333                "message_parts": {
334                    "snapshot_digest": "snapshot-digest-123",
335                    "next_aggregate_verification_key": "next-avk-123"
336                }
337            },
338            "signed_message": "signed_message",
339            "aggregate_verification_key": "aggregate_verification_key",
340            "multi_signature": "multi_signature",
341            "genesis_signature": "genesis_signature"
342        }"#;
343
344        fn golden_current_message() -> CertificateMessage {
345            golden_certificate_message()
346        }
347
348        #[test]
349        fn test_current_json_deserialized_into_current_message() {
350            let json = CURRENT_JSON;
351            let message: CertificateMessage = serde_json::from_str(json).unwrap();
352
353            assert_eq!(golden_current_message(), message);
354        }
355    }
356
357    mod golden_protocol_key_encodings {
358        use super::*;
359
360        mod standard_certificate {
361            use super::*;
362
363            fn golden_message_with_json_hex_encoding() -> CertificateMessage {
364                CertificateMessage {
365                    aggregate_verification_key: "7b226d745f636f6d6d69746d656e74223a7b22726f6f74223a5b3234312c3235352c35332c3133352c3231322c3134322c33372c3131342c3133302c3131372c3135342c3230382c34392c3134352c31362c3132382c3230392c37352c3137392c32392c35392c3136352c3134352c3235302c34372c332c3233312c3134302c3137382c35302c3231322c3131345d2c226e725f6c6561766573223a342c22686173686572223a6e756c6c7d2c22746f74616c5f7374616b65223a33303337393438363730323339327d".to_string(),
366                    multi_signature: "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".to_string(),
367                    genesis_signature: "".to_string(),
368                    ..golden_certificate_message()
369                }
370            }
371
372            fn golden_message_with_bytes_hex_encoding() -> CertificateMessage {
373                CertificateMessage {
374                    aggregate_verification_key: "00000000000000000404036cb79141a645faca33405ae82d67388a663fd1f55116781006608cccd2370000000000000006".to_string(),
375                    multi_signature: "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".to_string(),
376                    genesis_signature: "".to_string(),
377                    ..golden_certificate_message()
378                }
379            }
380
381            #[test]
382            fn restorations_from_json_hex_and_bytes_hex_give_same_certificate() {
383                let certificate_from_json_hex: Certificate =
384                    golden_message_with_json_hex_encoding().try_into().unwrap();
385                let certificate_from_bytes_hex: Certificate =
386                    golden_message_with_bytes_hex_encoding().try_into().unwrap();
387
388                assert_eq!(certificate_from_json_hex, certificate_from_bytes_hex);
389            }
390        }
391
392        mod genesis_certificate {
393            use super::*;
394
395            fn golden_message_with_bytes_hex_encoding() -> CertificateMessage {
396                CertificateMessage {
397                    aggregate_verification_key: "00000000000000000404036cb79141a645faca33405ae82d67388a663fd1f55116781006608cccd2370000000000000006".to_string(),
398                    multi_signature: "".to_string(),
399                    genesis_signature: "c21f77fb812a8111b547c2145d765f854ca224b17e883d6483b668a8c4d095fd893efd2a2ba1d41da9f49d82bf02d8ee603791998b64436000e49184c000170b".to_string(),
400                    ..golden_certificate_message()
401                }
402            }
403
404            #[test]
405            fn restorations_from_bytes_hex_succeeds() {
406                let _certificate_from_bytes_hex: Certificate =
407                    golden_message_with_bytes_hex_encoding().try_into().unwrap();
408            }
409        }
410
411        #[cfg(feature = "future_snark")]
412        mod certificate_with_snark_avk {
413            use super::*;
414
415            fn golden_message_with_snark_avk() -> CertificateMessage {
416                CertificateMessage {
417                    aggregate_verification_key: "00000000000000000404036cb79141a645faca33405ae82d67388a663fd1f55116781006608cccd2370000000000000006".to_string(),
418                    aggregate_verification_key_snark: Some("22184a6a150661134dc2a5f2aa241fce222cecabe3ec3a6aad67f5bbe187be670000000000000003".to_string()),
419                    multi_signature: "".to_string(),
420                    genesis_signature: "c21f77fb812a8111b547c2145d765f854ca224b17e883d6483b668a8c4d095fd893efd2a2ba1d41da9f49d82bf02d8ee603791998b64436000e49184c000170b".to_string(),
421                    ..golden_certificate_message()
422                }
423            }
424
425            #[test]
426            fn restorations_from_bytes_hex_succeeds_with_snark_avk() {
427                let _certificate: Certificate = golden_message_with_snark_avk().try_into().unwrap();
428            }
429
430            #[test]
431            fn json_round_trip_preserves_snark_avk() {
432                let message = golden_message_with_snark_avk();
433                let json = serde_json::to_string(&message).unwrap();
434                let deserialized: CertificateMessage = serde_json::from_str(&json).unwrap();
435
436                assert_eq!(message, deserialized);
437                assert!(
438                    json.contains("aggregate_verification_key_snark"),
439                    "JSON should contain the SNARK AVK field"
440                );
441            }
442
443            #[test]
444            fn json_without_snark_avk_deserializes_to_none() {
445                let mut message = golden_message_with_snark_avk();
446                message.aggregate_verification_key_snark = None;
447                let json = serde_json::to_string(&message).unwrap();
448
449                let deserialized: CertificateMessage = serde_json::from_str(&json).unwrap();
450
451                assert_eq!(deserialized.aggregate_verification_key_snark, None);
452            }
453        }
454    }
455}