dagger-contracts/contracts/Proofs.sol

187 lines
5.9 KiB
Solidity

// SPDX-License-Identifier: MIT
pragma solidity ^0.8.8;
import "./Requests.sol";
contract Proofs {
uint256 private immutable period;
uint256 private immutable timeout;
uint8 private immutable downtime;
constructor(uint256 __period, uint256 __timeout, uint8 __downtime) {
require(block.number > 256, "Insufficient block height");
period = __period;
timeout = __timeout;
downtime = __downtime;
}
mapping(SlotId => bool) private slotIds;
mapping(SlotId => uint256) private starts;
mapping(RequestId => uint256) private ends;
mapping(SlotId => RequestId) private requestForSlot;
mapping(SlotId => uint256) private probabilities;
mapping(SlotId => uint256) private markers;
mapping(SlotId => uint256) private missed;
mapping(SlotId => mapping(uint256 => bool)) private received;
mapping(SlotId => mapping(uint256 => bool)) private missing;
function _period() internal view returns (uint256) {
return period;
}
function _timeout() internal view returns (uint256) {
return timeout;
}
function _end(RequestId requestId) internal view returns (uint256) {
uint256 end = ends[requestId];
require(end > 0, "Proof ending doesn't exist");
return end;
}
function _requestId(SlotId id) internal view returns (RequestId) {
RequestId requestId = requestForSlot[id];
require(RequestId.unwrap(requestId) > 0, "request for slot doesn't exist");
return requestId;
}
function _end(SlotId id) internal view returns (uint256) {
return _end(_requestId(id));
}
function missingProofs(SlotId slotId) public view returns (uint256) {
return missed[slotId];
}
function periodOf(uint256 timestamp) private view returns (uint256) {
return timestamp / period;
}
function currentPeriod() private view returns (uint256) {
return periodOf(block.timestamp);
}
/// @notice Informs the contract that proofs should be expected for id
/// @dev Requires that the id is not already in use
/// @param id identifies the proof expectation, typically a slot id
/// @param probability The probability that a proof should be expected
function _expectProofs(
SlotId id, // typically slot id
RequestId request, // typically request id, used so that the ending is global for all slots
uint256 probability
) internal {
require(!slotIds[id], "Slot id already in use");
slotIds[id] = true;
starts[id] = block.timestamp;
probabilities[id] = probability;
markers[id] = uint256(blockhash(block.number - 1)) % period;
requestForSlot[id] = request;
}
function _unexpectProofs(SlotId id) internal {
require(slotIds[id], "Proof id not in use");
slotIds[id] = false;
}
function _getPointer(
SlotId id,
uint256 proofPeriod
) internal view returns (uint8) {
uint256 blockNumber = block.number % 256;
uint256 periodNumber = proofPeriod % 256;
uint256 idOffset = uint256(SlotId.unwrap(id)) % 256;
uint256 pointer = (blockNumber + periodNumber + idOffset) % 256;
return uint8(pointer);
}
function _getPointer(SlotId id) internal view returns (uint8) {
return _getPointer(id, currentPeriod());
}
function _getChallenge(uint8 pointer) internal view returns (bytes32) {
bytes32 hash = blockhash(block.number - 1 - pointer);
assert(uint256(hash) != 0);
return keccak256(abi.encode(hash));
}
function _getChallenge(
SlotId id,
uint256 proofPeriod
) internal view returns (bytes32) {
return _getChallenge(_getPointer(id, proofPeriod));
}
function _getChallenge(SlotId id) internal view returns (bytes32) {
return _getChallenge(id, currentPeriod());
}
function _getProofRequirement(
SlotId id,
uint256 proofPeriod
) internal view returns (bool isRequired, uint8 pointer) {
if (proofPeriod <= periodOf(starts[id])) {
return (false, 0);
}
uint256 end = _end(id);
if (proofPeriod >= periodOf(end)) {
return (false, 0);
}
pointer = _getPointer(id, proofPeriod);
bytes32 challenge = _getChallenge(pointer);
uint256 probability = (probabilities[id] * (256 - downtime)) / 256;
isRequired = slotIds[id] && uint256(challenge) % probability == 0;
}
function _isProofRequired(
SlotId id,
uint256 proofPeriod
) internal view returns (bool) {
bool isRequired;
uint8 pointer;
(isRequired, pointer) = _getProofRequirement(id, proofPeriod);
return isRequired && pointer >= downtime;
}
function _isProofRequired(SlotId id) internal view returns (bool) {
return _isProofRequired(id, currentPeriod());
}
function _willProofBeRequired(SlotId id) internal view returns (bool) {
bool isRequired;
uint8 pointer;
(isRequired, pointer) = _getProofRequirement(id, currentPeriod());
return isRequired && pointer < downtime;
}
function submitProof(SlotId id, bytes calldata proof) public {
require(proof.length > 0, "Invalid proof"); // TODO: replace by actual check
require(!received[id][currentPeriod()], "Proof already submitted");
received[id][currentPeriod()] = true;
emit ProofSubmitted(id, proof);
}
function _markProofAsMissing(SlotId id, uint256 missedPeriod) internal {
uint256 periodEnd = (missedPeriod + 1) * period;
require(periodEnd < block.timestamp, "Period has not ended yet");
require(block.timestamp < periodEnd + timeout, "Validation timed out");
require(!received[id][missedPeriod], "Proof was submitted, not missing");
require(_isProofRequired(id, missedPeriod), "Proof was not required");
require(!missing[id][missedPeriod], "Proof already marked as missing");
missing[id][missedPeriod] = true;
missed[id] += 1;
}
/// @notice Sets the proof end time
/// @dev Can only be set once
/// @param ending the new end time (in seconds)
function _setProofEnd(RequestId request, uint256 ending) internal {
require(
ends[request] == 0 || ending < block.timestamp,
"End exists or must be past"
);
ends[request] = ending;
}
event ProofSubmitted(SlotId id, bytes proof);
}