2022-07-05 21:28:34 +00:00
|
|
|
package rln
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"context"
|
2023-04-04 18:01:44 +00:00
|
|
|
"encoding/hex"
|
2022-07-05 21:28:34 +00:00
|
|
|
"errors"
|
|
|
|
"math"
|
2022-10-09 15:54:20 +00:00
|
|
|
"sync"
|
2022-07-05 21:28:34 +00:00
|
|
|
"time"
|
|
|
|
|
2023-04-03 21:45:19 +00:00
|
|
|
"github.com/ethereum/go-ethereum/log"
|
2022-07-05 21:28:34 +00:00
|
|
|
pubsub "github.com/libp2p/go-libp2p-pubsub"
|
2022-10-19 19:39:32 +00:00
|
|
|
"github.com/libp2p/go-libp2p/core/peer"
|
2023-08-22 19:30:04 +00:00
|
|
|
"github.com/prometheus/client_golang/prometheus"
|
|
|
|
"github.com/waku-org/go-waku/logging"
|
2022-11-09 19:53:01 +00:00
|
|
|
"github.com/waku-org/go-waku/waku/v2/protocol/pb"
|
2023-04-04 15:44:28 +00:00
|
|
|
"github.com/waku-org/go-waku/waku/v2/protocol/rln/group_manager"
|
2022-12-09 03:08:04 +00:00
|
|
|
"github.com/waku-org/go-waku/waku/v2/timesource"
|
2023-04-04 15:44:28 +00:00
|
|
|
"github.com/waku-org/go-zerokit-rln/rln"
|
2022-07-05 21:28:34 +00:00
|
|
|
"go.uber.org/zap"
|
2023-02-06 22:16:20 +00:00
|
|
|
proto "google.golang.org/protobuf/proto"
|
2022-07-05 21:28:34 +00:00
|
|
|
)
|
|
|
|
|
2023-04-03 21:45:19 +00:00
|
|
|
type GroupManager interface {
|
2023-04-04 15:44:28 +00:00
|
|
|
Start(ctx context.Context, rln *rln.RLN, rootTracker *group_manager.MerkleRootTracker) error
|
|
|
|
IdentityCredentials() (rln.IdentityCredential, error)
|
2023-08-24 18:42:50 +00:00
|
|
|
MembershipIndex() rln.MembershipIndex
|
2023-08-18 13:59:37 +00:00
|
|
|
Stop() error
|
2023-04-03 21:45:19 +00:00
|
|
|
}
|
2022-10-21 19:49:55 +00:00
|
|
|
|
2022-07-05 21:28:34 +00:00
|
|
|
type WakuRLNRelay struct {
|
2022-12-09 03:08:04 +00:00
|
|
|
timesource timesource.Timesource
|
2023-08-22 19:30:04 +00:00
|
|
|
metrics Metrics
|
2022-07-28 14:04:33 +00:00
|
|
|
|
2023-04-03 21:45:19 +00:00
|
|
|
groupManager GroupManager
|
2023-04-04 15:44:28 +00:00
|
|
|
rootTracker *group_manager.MerkleRootTracker
|
2022-07-05 21:28:34 +00:00
|
|
|
|
2023-04-04 15:44:28 +00:00
|
|
|
RLN *rln.RLN
|
2022-10-21 19:49:55 +00:00
|
|
|
|
2022-07-05 21:28:34 +00:00
|
|
|
// the log of nullifiers and Shamir shares of the past messages grouped per epoch
|
2022-10-09 15:54:20 +00:00
|
|
|
nullifierLogLock sync.RWMutex
|
2023-04-04 15:44:28 +00:00
|
|
|
nullifierLog map[rln.Nullifier][]rln.ProofMetadata
|
2022-07-05 21:28:34 +00:00
|
|
|
|
2023-04-03 21:45:19 +00:00
|
|
|
log *zap.Logger
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
|
|
|
|
2023-08-18 13:59:37 +00:00
|
|
|
const rlnDefaultTreePath = "./rln_tree.db"
|
|
|
|
|
2023-04-03 21:45:19 +00:00
|
|
|
func New(
|
|
|
|
groupManager GroupManager,
|
2023-08-18 13:59:37 +00:00
|
|
|
treePath string,
|
2023-04-03 21:45:19 +00:00
|
|
|
timesource timesource.Timesource,
|
2023-08-22 19:30:04 +00:00
|
|
|
reg prometheus.Registerer,
|
2023-04-03 21:45:19 +00:00
|
|
|
log *zap.Logger) (*WakuRLNRelay, error) {
|
2023-08-18 13:59:37 +00:00
|
|
|
|
|
|
|
if treePath == "" {
|
|
|
|
treePath = rlnDefaultTreePath
|
|
|
|
}
|
|
|
|
|
2023-08-22 19:30:04 +00:00
|
|
|
metrics := newMetrics(reg)
|
|
|
|
|
|
|
|
start := time.Now()
|
2023-08-18 13:59:37 +00:00
|
|
|
rlnInstance, err := rln.NewWithConfig(rln.DefaultTreeDepth, &rln.TreeConfig{
|
|
|
|
CacheCapacity: 15000,
|
|
|
|
Mode: rln.HighThroughput,
|
|
|
|
Compression: false,
|
2023-08-23 15:29:29 +00:00
|
|
|
FlushInterval: 500 * time.Millisecond,
|
2023-08-18 13:59:37 +00:00
|
|
|
Path: treePath,
|
|
|
|
})
|
2023-04-03 21:45:19 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2022-08-18 16:27:10 +00:00
|
|
|
}
|
2023-08-22 19:30:04 +00:00
|
|
|
metrics.RecordInstanceCreation(time.Since(start))
|
2022-08-18 16:27:10 +00:00
|
|
|
|
2023-07-19 16:25:35 +00:00
|
|
|
rootTracker, err := group_manager.NewMerkleRootTracker(acceptableRootWindowSize, rlnInstance)
|
2023-04-12 21:53:23 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-04-03 21:45:19 +00:00
|
|
|
// create the WakuRLNRelay
|
|
|
|
rlnPeer := &WakuRLNRelay{
|
|
|
|
RLN: rlnInstance,
|
|
|
|
groupManager: groupManager,
|
2023-04-12 21:53:23 +00:00
|
|
|
rootTracker: rootTracker,
|
2023-08-22 19:30:04 +00:00
|
|
|
metrics: metrics,
|
2023-04-03 21:45:19 +00:00
|
|
|
log: log,
|
|
|
|
timesource: timesource,
|
2023-04-04 15:44:28 +00:00
|
|
|
nullifierLog: make(map[rln.MerkleNode][]rln.ProofMetadata),
|
2023-04-03 21:45:19 +00:00
|
|
|
}
|
2022-07-05 21:28:34 +00:00
|
|
|
|
2023-04-03 21:45:19 +00:00
|
|
|
return rlnPeer, nil
|
|
|
|
}
|
|
|
|
|
2023-04-04 15:44:28 +00:00
|
|
|
func (rlnRelay *WakuRLNRelay) Start(ctx context.Context) error {
|
|
|
|
err := rlnRelay.groupManager.Start(ctx, rlnRelay.RLN, rlnRelay.rootTracker)
|
2022-07-05 21:28:34 +00:00
|
|
|
if err != nil {
|
2023-04-03 21:45:19 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-08-21 20:54:13 +00:00
|
|
|
log.Info("rln relay topic validator mounted")
|
2022-07-05 21:28:34 +00:00
|
|
|
|
2023-04-03 21:45:19 +00:00
|
|
|
return nil
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
|
|
|
|
2023-08-18 13:59:37 +00:00
|
|
|
// Stop will stop any operation or goroutine started while using WakuRLNRelay
|
|
|
|
func (rlnRelay *WakuRLNRelay) Stop() error {
|
|
|
|
return rlnRelay.groupManager.Stop()
|
2023-04-03 21:45:19 +00:00
|
|
|
}
|
|
|
|
|
2023-04-04 15:44:28 +00:00
|
|
|
func (rlnRelay *WakuRLNRelay) HasDuplicate(proofMD rln.ProofMetadata) (bool, error) {
|
2022-07-05 21:28:34 +00:00
|
|
|
// returns true if there is another message in the `nullifierLog` of the `rlnPeer` with the same
|
|
|
|
// epoch and nullifier as `msg`'s epoch and nullifier but different Shamir secret shares
|
|
|
|
// otherwise, returns false
|
|
|
|
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.nullifierLogLock.RLock()
|
|
|
|
proofs, ok := rlnRelay.nullifierLog[proofMD.ExternalNullifier]
|
|
|
|
rlnRelay.nullifierLogLock.RUnlock()
|
2022-07-05 21:28:34 +00:00
|
|
|
|
|
|
|
// check if the epoch exists
|
|
|
|
if !ok {
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, p := range proofs {
|
|
|
|
if p.Equals(proofMD) {
|
|
|
|
// there is an identical record, ignore rhe mag
|
2023-07-26 20:00:09 +00:00
|
|
|
return true, nil
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// check for a message with the same nullifier but different secret shares
|
|
|
|
matched := false
|
|
|
|
for _, it := range proofs {
|
|
|
|
if bytes.Equal(it.Nullifier[:], proofMD.Nullifier[:]) && (!bytes.Equal(it.ShareX[:], proofMD.ShareX[:]) || !bytes.Equal(it.ShareY[:], proofMD.ShareY[:])) {
|
|
|
|
matched = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return matched, nil
|
|
|
|
}
|
|
|
|
|
2023-04-04 15:44:28 +00:00
|
|
|
func (rlnRelay *WakuRLNRelay) updateLog(proofMD rln.ProofMetadata) (bool, error) {
|
|
|
|
rlnRelay.nullifierLogLock.Lock()
|
|
|
|
defer rlnRelay.nullifierLogLock.Unlock()
|
|
|
|
proofs, ok := rlnRelay.nullifierLog[proofMD.ExternalNullifier]
|
2022-07-05 21:28:34 +00:00
|
|
|
|
|
|
|
// check if the epoch exists
|
|
|
|
if !ok {
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.nullifierLog[proofMD.ExternalNullifier] = []rln.ProofMetadata{proofMD}
|
2022-07-05 21:28:34 +00:00
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// check if an identical record exists
|
|
|
|
for _, p := range proofs {
|
|
|
|
if p.Equals(proofMD) {
|
2023-04-03 21:45:19 +00:00
|
|
|
// TODO: slashing logic
|
2022-07-05 21:28:34 +00:00
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// add proofMD to the log
|
|
|
|
proofs = append(proofs, proofMD)
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.nullifierLog[proofMD.ExternalNullifier] = proofs
|
2022-07-05 21:28:34 +00:00
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
|
2023-07-19 16:25:35 +00:00
|
|
|
// ValidateMessage validates the supplied message based on the waku-rln-relay routing protocol i.e.,
|
|
|
|
// the message's epoch is within `maxEpochGap` of the current epoch
|
|
|
|
// the message's has valid rate limit proof
|
|
|
|
// the message's does not violate the rate limit
|
|
|
|
// if `optionalTime` is supplied, then the current epoch is calculated based on that, otherwise the current time will be used
|
|
|
|
func (rlnRelay *WakuRLNRelay) ValidateMessage(msg *pb.WakuMessage, optionalTime *time.Time) (messageValidationResult, error) {
|
|
|
|
//
|
2022-07-05 21:28:34 +00:00
|
|
|
if msg == nil {
|
2023-07-19 16:25:35 +00:00
|
|
|
return validationError, errors.New("nil message")
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// checks if the `msg`'s epoch is far from the current epoch
|
|
|
|
// it corresponds to the validation of rln external nullifier
|
2023-04-04 15:44:28 +00:00
|
|
|
var epoch rln.Epoch
|
2022-07-05 21:28:34 +00:00
|
|
|
if optionalTime != nil {
|
2023-04-04 15:44:28 +00:00
|
|
|
epoch = rln.CalcEpoch(*optionalTime)
|
2022-07-05 21:28:34 +00:00
|
|
|
} else {
|
|
|
|
// get current rln epoch
|
2023-04-04 15:44:28 +00:00
|
|
|
epoch = rln.CalcEpoch(rlnRelay.timesource.Now())
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
|
|
|
|
2023-04-04 15:44:28 +00:00
|
|
|
msgProof := toRateLimitProof(msg)
|
2022-07-06 16:59:38 +00:00
|
|
|
if msgProof == nil {
|
|
|
|
// message does not contain a proof
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("invalid message: message does not contain a proof")
|
2023-08-22 19:30:04 +00:00
|
|
|
rlnRelay.metrics.RecordInvalidMessage(invalidNoProof)
|
2023-07-19 16:25:35 +00:00
|
|
|
return invalidMessage, nil
|
2022-07-06 16:59:38 +00:00
|
|
|
}
|
2022-07-05 21:28:34 +00:00
|
|
|
|
2023-04-04 18:01:44 +00:00
|
|
|
proofMD, err := rlnRelay.RLN.ExtractMetadata(*msgProof)
|
2023-04-03 21:45:19 +00:00
|
|
|
if err != nil {
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("could not extract metadata", zap.Error(err))
|
2023-08-22 19:30:04 +00:00
|
|
|
rlnRelay.metrics.RecordError(proofMetadataExtractionErr)
|
2023-07-19 16:25:35 +00:00
|
|
|
return invalidMessage, nil
|
2023-04-03 21:45:19 +00:00
|
|
|
}
|
|
|
|
|
2022-07-06 16:59:38 +00:00
|
|
|
// calculate the gaps and validate the epoch
|
2023-04-04 15:44:28 +00:00
|
|
|
gap := rln.Diff(epoch, msgProof.Epoch)
|
2023-07-19 16:25:35 +00:00
|
|
|
if int64(math.Abs(float64(gap))) > maxEpochGap {
|
2022-07-05 21:28:34 +00:00
|
|
|
// message's epoch is too old or too ahead
|
|
|
|
// accept messages whose epoch is within +-MAX_EPOCH_GAP from the current epoch
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("invalid message: epoch gap exceeds a threshold", zap.Int64("gap", gap))
|
2023-08-22 19:30:04 +00:00
|
|
|
rlnRelay.metrics.RecordInvalidMessage(invalidEpoch)
|
|
|
|
|
|
|
|
return invalidMessage, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if !(rlnRelay.rootTracker.ContainsRoot(msgProof.MerkleRoot)) {
|
|
|
|
rlnRelay.log.Debug("invalid message: unexpected root", logging.HexBytes("msgRoot", msg.RateLimitProof.MerkleRoot))
|
|
|
|
rlnRelay.metrics.RecordInvalidMessage(invalidRoot)
|
2023-07-19 16:25:35 +00:00
|
|
|
return invalidMessage, nil
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
|
|
|
|
2023-08-22 19:30:04 +00:00
|
|
|
start := time.Now()
|
2023-04-04 15:44:28 +00:00
|
|
|
valid, err := rlnRelay.verifyProof(msg, msgProof)
|
2022-10-07 22:58:16 +00:00
|
|
|
if err != nil {
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("could not verify proof", zap.Error(err))
|
2023-08-22 19:30:04 +00:00
|
|
|
rlnRelay.metrics.RecordError(proofVerificationErr)
|
2023-07-19 16:25:35 +00:00
|
|
|
return invalidMessage, nil
|
2022-10-07 22:58:16 +00:00
|
|
|
}
|
2023-08-22 19:30:04 +00:00
|
|
|
rlnRelay.metrics.RecordProofVerification(time.Since(start))
|
2022-10-07 22:58:16 +00:00
|
|
|
|
|
|
|
if !valid {
|
2022-07-05 21:28:34 +00:00
|
|
|
// invalid proof
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("Invalid proof")
|
2023-08-22 19:30:04 +00:00
|
|
|
rlnRelay.metrics.RecordInvalidMessage(invalidProof)
|
2023-07-19 16:25:35 +00:00
|
|
|
return invalidMessage, nil
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// check if double messaging has happened
|
2023-04-04 15:44:28 +00:00
|
|
|
hasDup, err := rlnRelay.HasDuplicate(proofMD)
|
2022-07-05 21:28:34 +00:00
|
|
|
if err != nil {
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("validation error", zap.Error(err))
|
2023-08-22 19:30:04 +00:00
|
|
|
rlnRelay.metrics.RecordError(duplicateCheckErr)
|
2023-07-19 16:25:35 +00:00
|
|
|
return validationError, err
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if hasDup {
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("spam received")
|
2023-07-19 16:25:35 +00:00
|
|
|
return spamMessage, nil
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// insert the message to the log
|
|
|
|
// the result of `updateLog` is discarded because message insertion is guaranteed by the implementation i.e.,
|
|
|
|
// it will never error out
|
2023-04-04 15:44:28 +00:00
|
|
|
_, err = rlnRelay.updateLog(proofMD)
|
2022-07-05 21:28:34 +00:00
|
|
|
if err != nil {
|
2023-08-22 19:30:04 +00:00
|
|
|
rlnRelay.log.Debug("could not insert proof into log")
|
|
|
|
rlnRelay.metrics.RecordError(logInsertionErr)
|
2023-07-19 16:25:35 +00:00
|
|
|
return validationError, err
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
|
|
|
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("message is valid")
|
2023-08-22 19:30:04 +00:00
|
|
|
|
|
|
|
rootIndex := rlnRelay.rootTracker.IndexOf(msgProof.MerkleRoot)
|
|
|
|
rlnRelay.metrics.RecordValidMessages(rootIndex)
|
|
|
|
|
2023-07-19 16:25:35 +00:00
|
|
|
return validMessage, nil
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
|
|
|
|
2023-04-04 15:44:28 +00:00
|
|
|
func (rlnRelay *WakuRLNRelay) verifyProof(msg *pb.WakuMessage, proof *rln.RateLimitProof) (bool, error) {
|
|
|
|
contentTopicBytes := []byte(msg.ContentTopic)
|
|
|
|
input := append(msg.Payload, contentTopicBytes...)
|
|
|
|
return rlnRelay.RLN.Verify(input, *proof, rlnRelay.rootTracker.Roots()...)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (rlnRelay *WakuRLNRelay) AppendRLNProof(msg *pb.WakuMessage, senderEpochTime time.Time) error {
|
2022-07-05 21:28:34 +00:00
|
|
|
// returns error if it could not create and append a `RateLimitProof` to the supplied `msg`
|
|
|
|
// `senderEpochTime` indicates the number of seconds passed since Unix epoch. The fractional part holds sub-seconds.
|
|
|
|
// The `epoch` field of `RateLimitProof` is derived from the provided `senderEpochTime` (using `calcEpoch()`)
|
|
|
|
|
|
|
|
if msg == nil {
|
|
|
|
return errors.New("nil message")
|
|
|
|
}
|
|
|
|
|
|
|
|
input := toRLNSignal(msg)
|
|
|
|
|
2023-08-22 19:30:04 +00:00
|
|
|
start := time.Now()
|
2023-04-04 15:44:28 +00:00
|
|
|
proof, err := rlnRelay.generateProof(input, rln.CalcEpoch(senderEpochTime))
|
2022-07-05 21:28:34 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-08-22 19:30:04 +00:00
|
|
|
rlnRelay.metrics.RecordProofGeneration(time.Since(start))
|
2022-07-05 21:28:34 +00:00
|
|
|
|
2023-04-04 15:44:28 +00:00
|
|
|
msg.RateLimitProof = proof
|
2022-07-05 21:28:34 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-08-21 20:54:13 +00:00
|
|
|
// Validator returns a validator for the waku messages.
|
|
|
|
// The message validation logic is according to https://rfc.vac.dev/spec/17/
|
|
|
|
func (rlnRelay *WakuRLNRelay) Validator(
|
|
|
|
spamHandler SpamHandler) func(ctx context.Context, peerID peer.ID, message *pubsub.Message) bool {
|
|
|
|
return func(ctx context.Context, peerID peer.ID, message *pubsub.Message) bool {
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("rln-relay topic validator called")
|
2022-07-05 21:28:34 +00:00
|
|
|
|
2023-08-22 19:30:04 +00:00
|
|
|
rlnRelay.metrics.RecordMessage()
|
|
|
|
|
2022-07-05 21:28:34 +00:00
|
|
|
wakuMessage := &pb.WakuMessage{}
|
|
|
|
if err := proto.Unmarshal(message.Data, wakuMessage); err != nil {
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("could not unmarshal message")
|
2022-07-05 21:28:34 +00:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// validate the message
|
2023-04-04 15:44:28 +00:00
|
|
|
validationRes, err := rlnRelay.ValidateMessage(wakuMessage, nil)
|
2022-07-05 21:28:34 +00:00
|
|
|
if err != nil {
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("validating message", zap.Error(err))
|
2022-07-05 21:28:34 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
switch validationRes {
|
2023-07-19 16:25:35 +00:00
|
|
|
case validMessage:
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("message verified",
|
2023-08-21 20:54:13 +00:00
|
|
|
zap.String("id", hex.EncodeToString([]byte(message.ID))),
|
2022-07-05 21:28:34 +00:00
|
|
|
)
|
|
|
|
return true
|
2023-07-19 16:25:35 +00:00
|
|
|
case invalidMessage:
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("message could not be verified",
|
2023-08-21 20:54:13 +00:00
|
|
|
zap.String("id", hex.EncodeToString([]byte(message.ID))),
|
2022-07-05 21:28:34 +00:00
|
|
|
)
|
2022-10-04 23:15:39 +00:00
|
|
|
return false
|
2023-07-19 16:25:35 +00:00
|
|
|
case spamMessage:
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("spam message found",
|
2023-08-21 20:54:13 +00:00
|
|
|
zap.String("id", hex.EncodeToString([]byte(message.ID))),
|
2022-07-05 21:28:34 +00:00
|
|
|
)
|
|
|
|
|
2023-08-22 19:30:04 +00:00
|
|
|
rlnRelay.metrics.RecordSpam(wakuMessage.ContentTopic)
|
|
|
|
|
2022-07-05 21:28:34 +00:00
|
|
|
if spamHandler != nil {
|
|
|
|
if err := spamHandler(wakuMessage); err != nil {
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Error("executing spam handler", zap.Error(err))
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
default:
|
2023-04-04 15:44:28 +00:00
|
|
|
rlnRelay.log.Debug("unhandled validation result", zap.Int("validationResult", int(validationRes)))
|
2022-07-05 21:28:34 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-04-04 15:44:28 +00:00
|
|
|
func (rlnRelay *WakuRLNRelay) generateProof(input []byte, epoch rln.Epoch) (*pb.RateLimitProof, error) {
|
|
|
|
identityCredentials, err := rlnRelay.groupManager.IdentityCredentials()
|
2023-04-04 18:01:44 +00:00
|
|
|
if err != nil {
|
2023-04-04 15:44:28 +00:00
|
|
|
return nil, err
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
|
|
|
|
2023-08-24 18:42:50 +00:00
|
|
|
membershipIndex := rlnRelay.groupManager.MembershipIndex()
|
2022-07-05 21:28:34 +00:00
|
|
|
|
2023-04-04 15:44:28 +00:00
|
|
|
proof, err := rlnRelay.RLN.GenerateProof(input, identityCredentials, membershipIndex, epoch)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
|
|
|
|
2023-04-04 15:44:28 +00:00
|
|
|
return &pb.RateLimitProof{
|
|
|
|
Proof: proof.Proof[:],
|
|
|
|
MerkleRoot: proof.MerkleRoot[:],
|
|
|
|
Epoch: proof.Epoch[:],
|
|
|
|
ShareX: proof.ShareX[:],
|
|
|
|
ShareY: proof.ShareY[:],
|
|
|
|
Nullifier: proof.Nullifier[:],
|
|
|
|
RlnIdentifier: proof.RLNIdentifier[:],
|
|
|
|
}, nil
|
2022-07-05 21:28:34 +00:00
|
|
|
}
|
2023-04-10 15:20:07 +00:00
|
|
|
|
|
|
|
func (rlnRelay *WakuRLNRelay) IdentityCredential() (rln.IdentityCredential, error) {
|
|
|
|
return rlnRelay.groupManager.IdentityCredentials()
|
|
|
|
}
|
|
|
|
|
2023-08-24 18:42:50 +00:00
|
|
|
func (rlnRelay *WakuRLNRelay) MembershipIndex() uint {
|
2023-04-10 15:20:07 +00:00
|
|
|
return rlnRelay.groupManager.MembershipIndex()
|
|
|
|
}
|