referrerpolicy=no-referrer-when-downgrade

bp_header_chain/
lib.rs

1// Copyright (C) Parity Technologies (UK) Ltd.
2// This file is part of Parity Bridges Common.
3
4// Parity Bridges Common is free software: you can redistribute it and/or modify
5// it under the terms of the GNU General Public License as published by
6// the Free Software Foundation, either version 3 of the License, or
7// (at your option) any later version.
8
9// Parity Bridges Common is distributed in the hope that it will be useful,
10// but WITHOUT ANY WARRANTY; without even the implied warranty of
11// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12// GNU General Public License for more details.
13
14// You should have received a copy of the GNU General Public License
15// along with Parity Bridges Common.  If not, see <http://www.gnu.org/licenses/>.
16
17//! Defines traits which represent a common interface for Substrate pallets which want to
18//! incorporate bridge functionality.
19
20#![warn(missing_docs)]
21#![cfg_attr(not(feature = "std"), no_std)]
22
23use crate::justification::{
24	GrandpaJustification, JustificationVerificationContext, JustificationVerificationError,
25};
26use bp_runtime::{
27	BasicOperatingMode, BlockNumberOf, Chain, HashOf, HasherOf, HeaderOf, RawStorageProof,
28	StorageProofChecker, StorageProofError, UnderlyingChainProvider,
29};
30use codec::{Codec, Decode, DecodeWithMemTracking, Encode, EncodeLike, MaxEncodedLen};
31use core::{clone::Clone, cmp::Eq, default::Default, fmt::Debug};
32use frame_support::PalletError;
33use scale_info::TypeInfo;
34use serde::{Deserialize, Serialize};
35use sp_consensus_grandpa::{
36	AuthorityList, ConsensusLog, ScheduledChange, SetId, GRANDPA_ENGINE_ID,
37};
38use sp_runtime::{traits::Header as HeaderT, Digest, SaturatedConversion};
39use sp_std::{boxed::Box, vec::Vec};
40
41pub use call_info::{BridgeGrandpaCall, BridgeGrandpaCallOf, SubmitFinalityProofInfo};
42
43mod call_info;
44
45pub mod justification;
46pub mod storage_keys;
47
48/// Header chain error.
49#[derive(
50	Clone, Decode, DecodeWithMemTracking, Encode, Eq, PartialEq, PalletError, Debug, TypeInfo,
51)]
52pub enum HeaderChainError {
53	/// Header with given hash is missing from the chain.
54	UnknownHeader,
55	/// Error generated by the `storage_proof` module.
56	StorageProof(StorageProofError),
57}
58
59/// Header data that we're storing on-chain.
60///
61/// Even though we may store full header, our applications (XCM) only use couple of header
62/// fields. Extracting those values makes on-chain storage and PoV smaller, which is good.
63#[derive(Clone, Decode, Encode, Eq, MaxEncodedLen, PartialEq, Debug, TypeInfo)]
64pub struct StoredHeaderData<Number, Hash> {
65	/// Header number.
66	pub number: Number,
67	/// Header state root.
68	pub state_root: Hash,
69}
70
71/// Stored header data builder.
72pub trait StoredHeaderDataBuilder<Number, Hash> {
73	/// Build header data from self.
74	fn build(&self) -> StoredHeaderData<Number, Hash>;
75}
76
77impl<H: HeaderT> StoredHeaderDataBuilder<H::Number, H::Hash> for H {
78	fn build(&self) -> StoredHeaderData<H::Number, H::Hash> {
79		StoredHeaderData { number: *self.number(), state_root: *self.state_root() }
80	}
81}
82
83/// Substrate header chain, abstracted from the way it is stored.
84pub trait HeaderChain<C: Chain> {
85	/// Returns state (storage) root of given finalized header.
86	fn finalized_header_state_root(header_hash: HashOf<C>) -> Option<HashOf<C>>;
87
88	/// Get storage proof checker using finalized header.
89	fn verify_storage_proof(
90		header_hash: HashOf<C>,
91		storage_proof: RawStorageProof,
92	) -> Result<StorageProofChecker<HasherOf<C>>, HeaderChainError> {
93		let state_root = Self::finalized_header_state_root(header_hash)
94			.ok_or(HeaderChainError::UnknownHeader)?;
95		StorageProofChecker::new(state_root, storage_proof).map_err(HeaderChainError::StorageProof)
96	}
97}
98
99/// A type that can be used as a parameter in a dispatchable function.
100///
101/// When using `decl_module` all arguments for call functions must implement this trait.
102pub trait Parameter: Codec + EncodeLike + Clone + Eq + Debug + TypeInfo {}
103impl<T> Parameter for T where T: Codec + EncodeLike + Clone + Eq + Debug + TypeInfo {}
104
105/// A GRANDPA Authority List and ID.
106#[derive(Default, Encode, Eq, Decode, DecodeWithMemTracking, Debug, PartialEq, Clone, TypeInfo)]
107#[cfg_attr(feature = "std", derive(Serialize, Deserialize))]
108pub struct AuthoritySet {
109	/// List of GRANDPA authorities for the current round.
110	pub authorities: AuthorityList,
111	/// Monotonic identifier of the current GRANDPA authority set.
112	pub set_id: SetId,
113}
114
115impl AuthoritySet {
116	/// Create a new GRANDPA Authority Set.
117	pub fn new(authorities: AuthorityList, set_id: SetId) -> Self {
118		Self { authorities, set_id }
119	}
120}
121
122/// Data required for initializing the GRANDPA bridge pallet.
123///
124/// The bridge needs to know where to start its sync from, and this provides that initial context.
125#[derive(
126	Default,
127	Encode,
128	Decode,
129	DecodeWithMemTracking,
130	Debug,
131	PartialEq,
132	Eq,
133	Clone,
134	TypeInfo,
135	Serialize,
136	Deserialize,
137)]
138pub struct InitializationData<H: HeaderT> {
139	/// The header from which we should start syncing.
140	pub header: Box<H>,
141	/// The initial authorities of the pallet.
142	pub authority_list: AuthorityList,
143	/// The ID of the initial authority set.
144	pub set_id: SetId,
145	/// Pallet operating mode.
146	pub operating_mode: BasicOperatingMode,
147}
148
149/// Abstract finality proof that is justifying block finality.
150pub trait FinalityProof<Hash, Number>: Clone + Send + Sync + Debug {
151	/// Return hash of header that this proof is generated for.
152	fn target_header_hash(&self) -> Hash;
153
154	/// Return number of header that this proof is generated for.
155	fn target_header_number(&self) -> Number;
156}
157
158/// A trait that provides helper methods for querying the consensus log.
159pub trait ConsensusLogReader {
160	/// Returns true if digest contains item that schedules authorities set change.
161	fn schedules_authorities_change(digest: &Digest) -> bool;
162}
163
164/// A struct that provides helper methods for querying the GRANDPA consensus log.
165pub struct GrandpaConsensusLogReader<Number>(sp_std::marker::PhantomData<Number>);
166
167impl<Number: Codec> GrandpaConsensusLogReader<Number> {
168	/// Find and return scheduled (regular) change digest item.
169	pub fn find_scheduled_change(digest: &Digest) -> Option<ScheduledChange<Number>> {
170		use sp_runtime::generic::OpaqueDigestItemId;
171		let id = OpaqueDigestItemId::Consensus(&GRANDPA_ENGINE_ID);
172
173		let filter_log = |log: ConsensusLog<Number>| match log {
174			ConsensusLog::ScheduledChange(change) => Some(change),
175			_ => None,
176		};
177
178		// find the first consensus digest with the right ID which converts to
179		// the right kind of consensus log.
180		digest.convert_first(|l| l.try_to(id).and_then(filter_log))
181	}
182
183	/// Find and return forced change digest item. Or light client can't do anything
184	/// with forced changes, so we can't accept header with the forced change digest.
185	pub fn find_forced_change(digest: &Digest) -> Option<(Number, ScheduledChange<Number>)> {
186		// find the first consensus digest with the right ID which converts to
187		// the right kind of consensus log.
188		digest
189			.convert_first(|log| log.consensus_try_to(&GRANDPA_ENGINE_ID))
190			.and_then(|log| match log {
191				ConsensusLog::ForcedChange(delay, change) => Some((delay, change)),
192				_ => None,
193			})
194	}
195}
196
197impl<Number: Codec> ConsensusLogReader for GrandpaConsensusLogReader<Number> {
198	fn schedules_authorities_change(digest: &Digest) -> bool {
199		GrandpaConsensusLogReader::<Number>::find_scheduled_change(digest).is_some()
200	}
201}
202
203/// The finality-related info associated to a header.
204#[derive(Encode, Decode, DecodeWithMemTracking, Debug, PartialEq, Clone, TypeInfo)]
205pub struct HeaderFinalityInfo<FinalityProof, FinalityVerificationContext> {
206	/// The header finality proof.
207	pub finality_proof: FinalityProof,
208	/// The new verification context introduced by the header.
209	pub new_verification_context: Option<FinalityVerificationContext>,
210}
211
212/// Grandpa-related info associated to a header. This info can be saved to events.
213pub type StoredHeaderGrandpaInfo<Header> =
214	HeaderFinalityInfo<GrandpaJustification<Header>, AuthoritySet>;
215
216/// Processed Grandpa-related info associated to a header.
217pub type HeaderGrandpaInfo<Header> =
218	HeaderFinalityInfo<GrandpaJustification<Header>, JustificationVerificationContext>;
219
220impl<Header: HeaderT> TryFrom<StoredHeaderGrandpaInfo<Header>> for HeaderGrandpaInfo<Header> {
221	type Error = JustificationVerificationError;
222
223	fn try_from(grandpa_info: StoredHeaderGrandpaInfo<Header>) -> Result<Self, Self::Error> {
224		Ok(Self {
225			finality_proof: grandpa_info.finality_proof,
226			new_verification_context: match grandpa_info.new_verification_context {
227				Some(authority_set) => Some(authority_set.try_into()?),
228				None => None,
229			},
230		})
231	}
232}
233
234/// Helper trait for finding equivocations in finality proofs.
235pub trait FindEquivocations<FinalityProof, FinalityVerificationContext, EquivocationProof> {
236	/// The type returned when encountering an error while looking for equivocations.
237	type Error: Debug;
238
239	/// Find equivocations.
240	fn find_equivocations(
241		verification_context: &FinalityVerificationContext,
242		synced_proof: &FinalityProof,
243		source_proofs: &[FinalityProof],
244	) -> Result<Vec<EquivocationProof>, Self::Error>;
245}
246
247/// Substrate-based chain that is using direct GRANDPA finality.
248///
249/// Keep in mind that parachains are relying on relay chain GRANDPA, so they should not implement
250/// this trait.
251pub trait ChainWithGrandpa: Chain {
252	/// Name of the bridge GRANDPA pallet (used in `construct_runtime` macro call) that is deployed
253	/// at some other chain to bridge with this `ChainWithGrandpa`.
254	///
255	/// We assume that all chains that are bridging with this `ChainWithGrandpa` are using
256	/// the same name.
257	const WITH_CHAIN_GRANDPA_PALLET_NAME: &'static str;
258
259	/// Max number of GRANDPA authorities at the chain.
260	///
261	/// This is a strict constant. If bridged chain will have more authorities than that,
262	/// the GRANDPA bridge pallet may halt.
263	const MAX_AUTHORITIES_COUNT: u32;
264
265	/// Max reasonable number of headers in `votes_ancestries` vector of the GRANDPA justification.
266	///
267	/// This isn't a strict limit. The relay may submit justifications with more headers in its
268	/// ancestry and the pallet will accept such justification. The limit is only used to compute
269	/// maximal refund amount and submitting justifications which exceed the limit, may be costly
270	/// to submitter.
271	const REASONABLE_HEADERS_IN_JUSTIFICATION_ANCESTRY: u32;
272
273	/// Maximal size of the mandatory chain header. Mandatory header is the header that enacts new
274	/// GRANDPA authorities set (so it has large digest inside).
275	///
276	/// This isn't a strict limit. The relay may submit larger headers and the pallet will accept
277	/// the call. The limit is only used to compute maximal refund amount and doing calls which
278	/// exceed the limit, may be costly to submitter.
279	const MAX_MANDATORY_HEADER_SIZE: u32;
280
281	/// Average size of the chain header. We don't expect to see there headers that change GRANDPA
282	/// authorities set (GRANDPA will probably be able to finalize at least one additional header
283	/// per session on non test chains), so this is average size of headers that aren't changing the
284	/// set.
285	///
286	/// This isn't a strict limit. The relay may submit justifications with larger headers and the
287	/// pallet will accept the call. However, if the total size of all `submit_finality_proof`
288	/// arguments exceeds the maximal size, computed using this average size, relayer will only get
289	/// partial refund.
290	///
291	/// We expect some headers on production chains that are above this size. But they are rare and
292	/// if rellayer cares about its profitability, we expect it'll select other headers for
293	/// submission.
294	const AVERAGE_HEADER_SIZE: u32;
295}
296
297impl<T> ChainWithGrandpa for T
298where
299	T: Chain + UnderlyingChainProvider,
300	T::Chain: ChainWithGrandpa,
301{
302	const WITH_CHAIN_GRANDPA_PALLET_NAME: &'static str =
303		<T::Chain as ChainWithGrandpa>::WITH_CHAIN_GRANDPA_PALLET_NAME;
304	const MAX_AUTHORITIES_COUNT: u32 = <T::Chain as ChainWithGrandpa>::MAX_AUTHORITIES_COUNT;
305	const REASONABLE_HEADERS_IN_JUSTIFICATION_ANCESTRY: u32 =
306		<T::Chain as ChainWithGrandpa>::REASONABLE_HEADERS_IN_JUSTIFICATION_ANCESTRY;
307	const MAX_MANDATORY_HEADER_SIZE: u32 =
308		<T::Chain as ChainWithGrandpa>::MAX_MANDATORY_HEADER_SIZE;
309	const AVERAGE_HEADER_SIZE: u32 = <T::Chain as ChainWithGrandpa>::AVERAGE_HEADER_SIZE;
310}
311
312/// Result of checking maximal expected submit finality proof call weight and size.
313#[derive(Debug)]
314pub struct SubmitFinalityProofCallExtras {
315	/// If true, the call weight is larger than what we have assumed.
316	///
317	/// We have some assumptions about headers and justifications of the bridged chain.
318	/// We know that if our assumptions are correct, then the call must not have the
319	/// weight above some limit. The fee paid for weight above that limit, is never refunded.
320	pub is_weight_limit_exceeded: bool,
321	/// Extra size (in bytes) that we assume are included in the call.
322	///
323	/// We have some assumptions about headers and justifications of the bridged chain.
324	/// We know that if our assumptions are correct, then the call must not have the
325	/// weight above some limit. The fee paid for bytes above that limit, is never refunded.
326	pub extra_size: u32,
327	/// A flag that is true if the header is the mandatory header that enacts new
328	/// authorities set.
329	pub is_mandatory_finality_target: bool,
330}
331
332/// Checks whether the given `header` and its finality `proof` fit the maximal expected
333/// call limits (size and weight). The submission may be refunded sometimes (see pallet
334/// configuration for details), but it should fit some limits. If the call has some extra
335/// weight and/or size included, though, we won't refund it or refund will be partial.
336pub fn submit_finality_proof_limits_extras<C: ChainWithGrandpa>(
337	header: &C::Header,
338	proof: &justification::GrandpaJustification<C::Header>,
339) -> SubmitFinalityProofCallExtras {
340	// the `submit_finality_proof` call will reject justifications with invalid, duplicate,
341	// unknown and extra signatures. It'll also reject justifications with less than necessary
342	// signatures. So we do not care about extra weight because of additional signatures here.
343	let precommits_len = proof.commit.precommits.len().saturated_into();
344	let required_precommits = precommits_len;
345
346	// the weight check is simple - we assume that there are no more than the `limit`
347	// headers in the ancestry proof
348	let votes_ancestries_len: u32 = proof.votes_ancestries.len().saturated_into();
349	let is_weight_limit_exceeded =
350		votes_ancestries_len > C::REASONABLE_HEADERS_IN_JUSTIFICATION_ANCESTRY;
351
352	// check if the `finality_target` is a mandatory header. If so, we are ready to refund larger
353	// size
354	let is_mandatory_finality_target =
355		GrandpaConsensusLogReader::<BlockNumberOf<C>>::find_scheduled_change(header.digest())
356			.is_some();
357
358	// we can estimate extra call size easily, without any additional significant overhead
359	let actual_call_size: u32 =
360		header.encoded_size().saturating_add(proof.encoded_size()).saturated_into();
361	let max_expected_call_size = max_expected_submit_finality_proof_arguments_size::<C>(
362		is_mandatory_finality_target,
363		required_precommits,
364	);
365	let extra_size = actual_call_size.saturating_sub(max_expected_call_size);
366
367	SubmitFinalityProofCallExtras {
368		is_weight_limit_exceeded,
369		extra_size,
370		is_mandatory_finality_target,
371	}
372}
373
374/// Returns maximal expected size of `submit_finality_proof` call arguments.
375pub fn max_expected_submit_finality_proof_arguments_size<C: ChainWithGrandpa>(
376	is_mandatory_finality_target: bool,
377	precommits: u32,
378) -> u32 {
379	let max_expected_justification_size =
380		GrandpaJustification::<HeaderOf<C>>::max_reasonable_size::<C>(precommits);
381
382	// call arguments are header and justification
383	let max_expected_finality_target_size = if is_mandatory_finality_target {
384		C::MAX_MANDATORY_HEADER_SIZE
385	} else {
386		C::AVERAGE_HEADER_SIZE
387	};
388	max_expected_finality_target_size.saturating_add(max_expected_justification_size)
389}
390
391#[cfg(test)]
392mod tests {
393	use super::*;
394	use bp_runtime::ChainId;
395	use frame_support::weights::Weight;
396	use sp_runtime::{
397		testing::H256, traits::BlakeTwo256, DigestItem, MultiSignature, StateVersion,
398	};
399
400	struct TestChain;
401
402	impl Chain for TestChain {
403		const ID: ChainId = *b"test";
404
405		type BlockNumber = u32;
406		type Hash = H256;
407		type Hasher = BlakeTwo256;
408		type Header = sp_runtime::generic::Header<u32, BlakeTwo256>;
409		type AccountId = u64;
410		type Balance = u64;
411		type Nonce = u64;
412		type Signature = MultiSignature;
413
414		const STATE_VERSION: StateVersion = StateVersion::V1;
415
416		fn max_extrinsic_size() -> u32 {
417			0
418		}
419		fn max_extrinsic_weight() -> Weight {
420			Weight::zero()
421		}
422	}
423
424	impl ChainWithGrandpa for TestChain {
425		const WITH_CHAIN_GRANDPA_PALLET_NAME: &'static str = "Test";
426		const MAX_AUTHORITIES_COUNT: u32 = 128;
427		const REASONABLE_HEADERS_IN_JUSTIFICATION_ANCESTRY: u32 = 2;
428		const MAX_MANDATORY_HEADER_SIZE: u32 = 100_000;
429		const AVERAGE_HEADER_SIZE: u32 = 1_024;
430	}
431
432	#[test]
433	fn max_expected_submit_finality_proof_arguments_size_respects_mandatory_argument() {
434		assert!(
435			max_expected_submit_finality_proof_arguments_size::<TestChain>(true, 100) >
436				max_expected_submit_finality_proof_arguments_size::<TestChain>(false, 100),
437		);
438	}
439
440	#[test]
441	fn find_scheduled_change_works() {
442		let scheduled_change = ScheduledChange { next_authorities: vec![], delay: 0 };
443
444		// first
445		let mut digest = Digest::default();
446		digest.push(DigestItem::Consensus(
447			GRANDPA_ENGINE_ID,
448			ConsensusLog::ScheduledChange(scheduled_change.clone()).encode(),
449		));
450		assert_eq!(
451			GrandpaConsensusLogReader::find_scheduled_change(&digest),
452			Some(scheduled_change.clone())
453		);
454
455		// not first
456		let mut digest = Digest::default();
457		digest.push(DigestItem::Consensus(
458			GRANDPA_ENGINE_ID,
459			ConsensusLog::<u64>::OnDisabled(0).encode(),
460		));
461		digest.push(DigestItem::Consensus(
462			GRANDPA_ENGINE_ID,
463			ConsensusLog::ScheduledChange(scheduled_change.clone()).encode(),
464		));
465		assert_eq!(
466			GrandpaConsensusLogReader::find_scheduled_change(&digest),
467			Some(scheduled_change.clone())
468		);
469	}
470}