mirror of
https://github.com/logos-blockchain/lssa.git
synced 2026-04-08 20:23:47 +00:00
443 lines
16 KiB
Rust
443 lines
16 KiB
Rust
use std::{
|
|
collections::{HashMap, HashSet, VecDeque},
|
|
hash::Hash,
|
|
};
|
|
|
|
use log::debug;
|
|
use nssa_core::{
|
|
BlockId, Commitment, Nullifier, PrivacyPreservingCircuitOutput, Timestamp,
|
|
account::{Account, AccountId, AccountWithMetadata},
|
|
program::{
|
|
ChainedCall, Claim, DEFAULT_PROGRAM_ID, compute_authorized_pdas, validate_execution,
|
|
},
|
|
};
|
|
|
|
use crate::{
|
|
V03State, ensure,
|
|
error::NssaError,
|
|
privacy_preserving_transaction::{
|
|
PrivacyPreservingTransaction, circuit::Proof, message::Message,
|
|
},
|
|
program::Program,
|
|
program_deployment_transaction::ProgramDeploymentTransaction,
|
|
public_transaction::PublicTransaction,
|
|
state::MAX_NUMBER_CHAINED_CALLS,
|
|
};
|
|
|
|
pub struct StateDiff {
|
|
pub signer_account_ids: Vec<AccountId>,
|
|
pub public_diff: HashMap<AccountId, Account>,
|
|
pub new_commitments: Vec<Commitment>,
|
|
pub new_nullifiers: Vec<Nullifier>,
|
|
pub program: Option<Program>,
|
|
}
|
|
|
|
/// The validated output of executing or verifying a transaction, ready to be applied to the state.
|
|
///
|
|
/// Can only be constructed by the transaction validation functions inside this crate, ensuring the
|
|
/// diff has been checked before any state mutation occurs.
|
|
pub struct ValidatedStateDiff(StateDiff);
|
|
|
|
impl ValidatedStateDiff {
|
|
pub fn from_public_transaction(
|
|
tx: &PublicTransaction,
|
|
state: &V03State,
|
|
block_id: BlockId,
|
|
timestamp: Timestamp,
|
|
) -> Result<Self, NssaError> {
|
|
let message = tx.message();
|
|
let witness_set = tx.witness_set();
|
|
|
|
// All account_ids must be different
|
|
ensure!(
|
|
message.account_ids.iter().collect::<HashSet<_>>().len() == message.account_ids.len(),
|
|
NssaError::InvalidInput("Duplicate account_ids found in message".into(),)
|
|
);
|
|
|
|
// Check exactly one nonce is provided for each signature
|
|
ensure!(
|
|
message.nonces.len() == witness_set.signatures_and_public_keys.len(),
|
|
NssaError::InvalidInput(
|
|
"Mismatch between number of nonces and signatures/public keys".into(),
|
|
)
|
|
);
|
|
|
|
// Check the signatures are valid
|
|
ensure!(
|
|
witness_set.is_valid_for(message),
|
|
NssaError::InvalidInput("Invalid signature for given message and public key".into())
|
|
);
|
|
|
|
let signer_account_ids = tx.signer_account_ids();
|
|
// Check nonces corresponds to the current nonces on the public state.
|
|
for (account_id, nonce) in signer_account_ids.iter().zip(&message.nonces) {
|
|
let current_nonce = state.get_account_by_id(*account_id).nonce;
|
|
ensure!(
|
|
current_nonce == *nonce,
|
|
NssaError::InvalidInput("Nonce mismatch".into())
|
|
);
|
|
}
|
|
|
|
// Build pre_states for execution
|
|
let input_pre_states: Vec<_> = message
|
|
.account_ids
|
|
.iter()
|
|
.map(|account_id| {
|
|
AccountWithMetadata::new(
|
|
state.get_account_by_id(*account_id),
|
|
signer_account_ids.contains(account_id),
|
|
*account_id,
|
|
)
|
|
})
|
|
.collect();
|
|
|
|
let mut state_diff: HashMap<AccountId, Account> = HashMap::new();
|
|
|
|
let initial_call = ChainedCall {
|
|
program_id: message.program_id,
|
|
instruction_data: message.instruction_data.clone(),
|
|
pre_states: input_pre_states,
|
|
pda_seeds: vec![],
|
|
};
|
|
|
|
let mut chained_calls = VecDeque::from_iter([(initial_call, None)]);
|
|
let mut chain_calls_counter = 0;
|
|
|
|
while let Some((chained_call, caller_program_id)) = chained_calls.pop_front() {
|
|
ensure!(
|
|
chain_calls_counter <= MAX_NUMBER_CHAINED_CALLS,
|
|
NssaError::MaxChainedCallsDepthExceeded
|
|
);
|
|
|
|
// Check that the `program_id` corresponds to a deployed program
|
|
let Some(program) = state.programs().get(&chained_call.program_id) else {
|
|
return Err(NssaError::InvalidInput("Unknown program".into()));
|
|
};
|
|
|
|
debug!(
|
|
"Program {:?} pre_states: {:?}, instruction_data: {:?}",
|
|
chained_call.program_id, chained_call.pre_states, chained_call.instruction_data
|
|
);
|
|
let mut program_output = program.execute(
|
|
caller_program_id,
|
|
&chained_call.pre_states,
|
|
&chained_call.instruction_data,
|
|
)?;
|
|
debug!(
|
|
"Program {:?} output: {:?}",
|
|
chained_call.program_id, program_output
|
|
);
|
|
|
|
let authorized_pdas =
|
|
compute_authorized_pdas(caller_program_id, &chained_call.pda_seeds);
|
|
|
|
let is_authorized = |account_id: &AccountId| {
|
|
signer_account_ids.contains(account_id) || authorized_pdas.contains(account_id)
|
|
};
|
|
|
|
for pre in &program_output.pre_states {
|
|
let account_id = pre.account_id;
|
|
// Check that the program output pre_states coincide with the values in the public
|
|
// state or with any modifications to those values during the chain of calls.
|
|
let expected_pre = state_diff
|
|
.get(&account_id)
|
|
.cloned()
|
|
.unwrap_or_else(|| state.get_account_by_id(account_id));
|
|
ensure!(
|
|
pre.account == expected_pre,
|
|
NssaError::InvalidProgramBehavior
|
|
);
|
|
|
|
// Check that authorization flags are consistent with the provided ones or
|
|
// authorized by program through the PDA mechanism
|
|
ensure!(
|
|
pre.is_authorized == is_authorized(&account_id),
|
|
NssaError::InvalidProgramBehavior
|
|
);
|
|
}
|
|
|
|
// Verify that the program output's self_program_id matches the expected program ID.
|
|
ensure!(
|
|
program_output.self_program_id == chained_call.program_id,
|
|
NssaError::InvalidProgramBehavior
|
|
);
|
|
|
|
// Verify that the program output's caller_program_id matches the actual caller.
|
|
ensure!(
|
|
program_output.caller_program_id == caller_program_id,
|
|
NssaError::InvalidProgramBehavior
|
|
);
|
|
|
|
// Verify execution corresponds to a well-behaved program.
|
|
// See the # Programs section for the definition of the `validate_execution` method.
|
|
ensure!(
|
|
validate_execution(
|
|
&program_output.pre_states,
|
|
&program_output.post_states,
|
|
chained_call.program_id,
|
|
),
|
|
NssaError::InvalidProgramBehavior
|
|
);
|
|
|
|
// Verify validity window
|
|
ensure!(
|
|
program_output.block_validity_window.is_valid_for(block_id)
|
|
&& program_output
|
|
.timestamp_validity_window
|
|
.is_valid_for(timestamp),
|
|
NssaError::OutOfValidityWindow
|
|
);
|
|
|
|
for (i, post) in program_output.post_states.iter_mut().enumerate() {
|
|
let Some(claim) = post.required_claim() else {
|
|
continue;
|
|
};
|
|
// The invoked program can only claim accounts with default program id.
|
|
ensure!(
|
|
post.account().program_owner == DEFAULT_PROGRAM_ID,
|
|
NssaError::InvalidProgramBehavior
|
|
);
|
|
|
|
let account_id = program_output.pre_states[i].account_id;
|
|
|
|
match claim {
|
|
Claim::Authorized => {
|
|
// The program can only claim accounts that were authorized by the signer.
|
|
ensure!(
|
|
is_authorized(&account_id),
|
|
NssaError::InvalidProgramBehavior
|
|
);
|
|
}
|
|
Claim::Pda(seed) => {
|
|
// The program can only claim accounts that correspond to the PDAs it is
|
|
// authorized to claim.
|
|
let pda = AccountId::from((&chained_call.program_id, &seed));
|
|
ensure!(account_id == pda, NssaError::InvalidProgramBehavior);
|
|
}
|
|
}
|
|
|
|
post.account_mut().program_owner = chained_call.program_id;
|
|
}
|
|
|
|
// Update the state diff
|
|
for (pre, post) in program_output
|
|
.pre_states
|
|
.iter()
|
|
.zip(program_output.post_states.iter())
|
|
{
|
|
state_diff.insert(pre.account_id, post.account().clone());
|
|
}
|
|
|
|
for new_call in program_output.chained_calls.into_iter().rev() {
|
|
chained_calls.push_front((new_call, Some(chained_call.program_id)));
|
|
}
|
|
|
|
chain_calls_counter = chain_calls_counter
|
|
.checked_add(1)
|
|
.expect("we check the max depth at the beginning of the loop");
|
|
}
|
|
|
|
// Check that all modified uninitialized accounts where claimed
|
|
for post in state_diff.iter().filter_map(|(account_id, post)| {
|
|
let pre = state.get_account_by_id(*account_id);
|
|
if pre.program_owner != DEFAULT_PROGRAM_ID {
|
|
return None;
|
|
}
|
|
if pre == *post {
|
|
return None;
|
|
}
|
|
Some(post)
|
|
}) {
|
|
ensure!(
|
|
post.program_owner != DEFAULT_PROGRAM_ID,
|
|
NssaError::InvalidProgramBehavior
|
|
);
|
|
}
|
|
|
|
Ok(Self(StateDiff {
|
|
signer_account_ids,
|
|
public_diff: state_diff,
|
|
new_commitments: vec![],
|
|
new_nullifiers: vec![],
|
|
program: None,
|
|
}))
|
|
}
|
|
|
|
pub fn from_privacy_preserving_transaction(
|
|
tx: &PrivacyPreservingTransaction,
|
|
state: &V03State,
|
|
block_id: BlockId,
|
|
timestamp: Timestamp,
|
|
) -> Result<Self, NssaError> {
|
|
let message = &tx.message;
|
|
let witness_set = &tx.witness_set;
|
|
|
|
// 1. Commitments or nullifiers are non empty
|
|
if message.new_commitments.is_empty() && message.new_nullifiers.is_empty() {
|
|
return Err(NssaError::InvalidInput(
|
|
"Empty commitments and empty nullifiers found in message".into(),
|
|
));
|
|
}
|
|
|
|
// 2. Check there are no duplicate account_ids in the public_account_ids list.
|
|
if n_unique(&message.public_account_ids) != message.public_account_ids.len() {
|
|
return Err(NssaError::InvalidInput(
|
|
"Duplicate account_ids found in message".into(),
|
|
));
|
|
}
|
|
|
|
// Check there are no duplicate nullifiers in the new_nullifiers list
|
|
if n_unique(&message.new_nullifiers) != message.new_nullifiers.len() {
|
|
return Err(NssaError::InvalidInput(
|
|
"Duplicate nullifiers found in message".into(),
|
|
));
|
|
}
|
|
|
|
// Check there are no duplicate commitments in the new_commitments list
|
|
if n_unique(&message.new_commitments) != message.new_commitments.len() {
|
|
return Err(NssaError::InvalidInput(
|
|
"Duplicate commitments found in message".into(),
|
|
));
|
|
}
|
|
|
|
// 3. Nonce checks and Valid signatures
|
|
// Check exactly one nonce is provided for each signature
|
|
if message.nonces.len() != witness_set.signatures_and_public_keys.len() {
|
|
return Err(NssaError::InvalidInput(
|
|
"Mismatch between number of nonces and signatures/public keys".into(),
|
|
));
|
|
}
|
|
|
|
// Check the signatures are valid
|
|
if !witness_set.signatures_are_valid_for(message) {
|
|
return Err(NssaError::InvalidInput(
|
|
"Invalid signature for given message and public key".into(),
|
|
));
|
|
}
|
|
|
|
let signer_account_ids = tx.signer_account_ids();
|
|
// Check nonces corresponds to the current nonces on the public state.
|
|
for (account_id, nonce) in signer_account_ids.iter().zip(&message.nonces) {
|
|
let current_nonce = state.get_account_by_id(*account_id).nonce;
|
|
if current_nonce != *nonce {
|
|
return Err(NssaError::InvalidInput("Nonce mismatch".into()));
|
|
}
|
|
}
|
|
|
|
// Verify validity window
|
|
if !message.block_validity_window.is_valid_for(block_id)
|
|
|| !message.timestamp_validity_window.is_valid_for(timestamp)
|
|
{
|
|
return Err(NssaError::OutOfValidityWindow);
|
|
}
|
|
|
|
// Build pre_states for proof verification
|
|
let public_pre_states: Vec<_> = message
|
|
.public_account_ids
|
|
.iter()
|
|
.map(|account_id| {
|
|
AccountWithMetadata::new(
|
|
state.get_account_by_id(*account_id),
|
|
signer_account_ids.contains(account_id),
|
|
*account_id,
|
|
)
|
|
})
|
|
.collect();
|
|
|
|
// 4. Proof verification
|
|
check_privacy_preserving_circuit_proof_is_valid(
|
|
&witness_set.proof,
|
|
&public_pre_states,
|
|
message,
|
|
)?;
|
|
|
|
// 5. Commitment freshness
|
|
state.check_commitments_are_new(&message.new_commitments)?;
|
|
|
|
// 6. Nullifier uniqueness
|
|
state.check_nullifiers_are_valid(&message.new_nullifiers)?;
|
|
|
|
let public_diff = message
|
|
.public_account_ids
|
|
.iter()
|
|
.copied()
|
|
.zip(message.public_post_states.clone())
|
|
.collect();
|
|
let new_nullifiers = message
|
|
.new_nullifiers
|
|
.iter()
|
|
.copied()
|
|
.map(|(nullifier, _)| nullifier)
|
|
.collect();
|
|
|
|
Ok(Self(StateDiff {
|
|
signer_account_ids,
|
|
public_diff,
|
|
new_commitments: message.new_commitments.clone(),
|
|
new_nullifiers,
|
|
program: None,
|
|
}))
|
|
}
|
|
|
|
pub fn from_program_deployment_transaction(
|
|
tx: &ProgramDeploymentTransaction,
|
|
state: &V03State,
|
|
) -> Result<Self, NssaError> {
|
|
// TODO: remove clone
|
|
let program = Program::new(tx.message.bytecode.clone())?;
|
|
if state.programs().contains_key(&program.id()) {
|
|
return Err(NssaError::ProgramAlreadyExists);
|
|
}
|
|
Ok(Self(StateDiff {
|
|
signer_account_ids: vec![],
|
|
public_diff: HashMap::new(),
|
|
new_commitments: vec![],
|
|
new_nullifiers: vec![],
|
|
program: Some(program),
|
|
}))
|
|
}
|
|
|
|
/// Returns the public account changes produced by this transaction.
|
|
///
|
|
/// Used by callers (e.g. the sequencer) to inspect the diff before committing it, for example
|
|
/// to enforce that system accounts are not modified by user transactions.
|
|
#[must_use]
|
|
pub fn public_diff(&self) -> HashMap<AccountId, Account> {
|
|
self.0.public_diff.clone()
|
|
}
|
|
|
|
pub(crate) fn into_state_diff(self) -> StateDiff {
|
|
self.0
|
|
}
|
|
}
|
|
|
|
fn check_privacy_preserving_circuit_proof_is_valid(
|
|
proof: &Proof,
|
|
public_pre_states: &[AccountWithMetadata],
|
|
message: &Message,
|
|
) -> Result<(), NssaError> {
|
|
let output = PrivacyPreservingCircuitOutput {
|
|
public_pre_states: public_pre_states.to_vec(),
|
|
public_post_states: message.public_post_states.clone(),
|
|
ciphertexts: message
|
|
.encrypted_private_post_states
|
|
.iter()
|
|
.cloned()
|
|
.map(|value| value.ciphertext)
|
|
.collect(),
|
|
new_commitments: message.new_commitments.clone(),
|
|
new_nullifiers: message.new_nullifiers.clone(),
|
|
block_validity_window: message.block_validity_window,
|
|
timestamp_validity_window: message.timestamp_validity_window,
|
|
};
|
|
proof
|
|
.is_valid_for(&output)
|
|
.then_some(())
|
|
.ok_or(NssaError::InvalidPrivacyPreservingProof)
|
|
}
|
|
|
|
fn n_unique<T: Eq + Hash>(data: &[T]) -> usize {
|
|
let set: HashSet<&T> = data.iter().collect();
|
|
set.len()
|
|
}
|