polkadot_node_subsystem_types/messages.rs
1// Copyright (C) Parity Technologies (UK) Ltd.
2// This file is part of Polkadot.
3
4// Polkadot is free software: you can redistribute it and/or modify
5// it under the terms of the GNU General Public License as published by
6// the Free Software Foundation, either version 3 of the License, or
7// (at your option) any later version.
8
9// Polkadot is distributed in the hope that it will be useful,
10// but WITHOUT ANY WARRANTY; without even the implied warranty of
11// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12// GNU General Public License for more details.
13
14// You should have received a copy of the GNU General Public License
15// along with Polkadot. If not, see <http://www.gnu.org/licenses/>.
16
17//! Message types for the overseer and subsystems.
18//!
19//! These messages are intended to define the protocol by which different subsystems communicate
20//! with each other and signals that they receive from an overseer to coordinate their work.
21//! This is intended for use with the `polkadot-overseer` crate.
22//!
23//! Subsystems' APIs are defined separately from their implementation, leading to easier mocking.
24
25use futures::channel::oneshot;
26use sc_network::{Multiaddr, ReputationChange};
27use thiserror::Error;
28
29pub use sc_network::IfDisconnected;
30
31use polkadot_node_network_protocol::{
32 self as net_protocol, peer_set::PeerSet, request_response::Requests, PeerId,
33};
34use polkadot_node_primitives::{
35 approval::{
36 v1::{BlockApprovalMeta, DelayTranche},
37 v2::{CandidateBitfield, IndirectAssignmentCertV2, IndirectSignedApprovalVoteV2},
38 },
39 AvailableData, BabeEpoch, BlockWeight, CandidateVotes, CollationGenerationConfig,
40 CollationSecondedSignal, DisputeMessage, DisputeStatus, ErasureChunk, PoV,
41 SignedDisputeStatement, SignedFullStatement, SignedFullStatementWithPVD, SubmitCollationParams,
42 ValidationResult,
43};
44use polkadot_primitives::{
45 self,
46 async_backing::{self, Constraints},
47 slashing, ApprovalVotingParams, AuthorityDiscoveryId, BackedCandidate, BlockNumber,
48 CandidateCommitments, CandidateEvent, CandidateHash, CandidateIndex,
49 CandidateReceiptV2 as CandidateReceipt,
50 CommittedCandidateReceiptV2 as CommittedCandidateReceipt, CoreIndex, CoreState, DisputeState,
51 ExecutorParams, GroupIndex, GroupRotationInfo, Hash, HeadData, Header as BlockHeader,
52 Id as ParaId, InboundDownwardMessage, InboundHrmpMessage, MultiDisputeStatementSet,
53 NodeFeatures, OccupiedCoreAssumption, PersistedValidationData, PvfCheckStatement,
54 PvfExecKind as RuntimePvfExecKind, SessionIndex, SessionInfo, SignedAvailabilityBitfield,
55 SignedAvailabilityBitfields, ValidationCode, ValidationCodeHash, ValidatorId, ValidatorIndex,
56 ValidatorSignature,
57};
58use polkadot_statement_table::v2::Misbehavior;
59use std::{
60 collections::{BTreeMap, HashMap, HashSet, VecDeque},
61 sync::Arc,
62};
63
64/// Network events as transmitted to other subsystems, wrapped in their message types.
65pub mod network_bridge_event;
66pub use network_bridge_event::NetworkBridgeEvent;
67
68/// A request to the candidate backing subsystem to check whether
69/// we can second this candidate.
70#[derive(Debug, Copy, Clone)]
71pub struct CanSecondRequest {
72 /// Para id of the candidate.
73 pub candidate_para_id: ParaId,
74 /// The relay-parent of the candidate.
75 pub candidate_relay_parent: Hash,
76 /// Hash of the candidate.
77 pub candidate_hash: CandidateHash,
78 /// Parent head data hash.
79 pub parent_head_data_hash: Hash,
80}
81
82/// Messages received by the Candidate Backing subsystem.
83#[derive(Debug)]
84pub enum CandidateBackingMessage {
85 /// Requests a set of backable candidates attested by the subsystem.
86 ///
87 /// The order of candidates of the same para must be preserved in the response.
88 /// If a backed candidate of a para cannot be retrieved, the response should not contain any
89 /// candidates of the same para that follow it in the input vector. In other words, assuming
90 /// candidates are supplied in dependency order, we must ensure that this dependency order is
91 /// preserved.
92 GetBackableCandidates(
93 HashMap<ParaId, Vec<(CandidateHash, Hash)>>,
94 oneshot::Sender<HashMap<ParaId, Vec<BackedCandidate>>>,
95 ),
96 /// Request the subsystem to check whether it's allowed to second given candidate.
97 /// The rule is to only fetch collations that can either be directly chained to any
98 /// FragmentChain in the view or there is at least one FragmentChain where this candidate is a
99 /// potentially unconnected candidate (we predict that it may become connected to a
100 /// FragmentChain in the future).
101 ///
102 /// Always responds with `false` if async backing is disabled for candidate's relay
103 /// parent.
104 CanSecond(CanSecondRequest, oneshot::Sender<bool>),
105 /// Note that the Candidate Backing subsystem should second the given candidate in the context
106 /// of the given relay-parent (ref. by hash). This candidate must be validated.
107 Second(Hash, CandidateReceipt, PersistedValidationData, PoV),
108 /// Note a validator's statement about a particular candidate in the context of the given
109 /// relay-parent. Disagreements about validity must be escalated to a broader check by the
110 /// Disputes Subsystem, though that escalation is deferred until the approval voting stage to
111 /// guarantee availability. Agreements are simply tallied until a quorum is reached.
112 Statement(Hash, SignedFullStatementWithPVD),
113}
114
115/// Blanket error for validation failing for internal reasons.
116#[derive(Debug, Error)]
117#[error("Validation failed with {0:?}")]
118pub struct ValidationFailed(pub String);
119
120/// The outcome of the candidate-validation's PVF pre-check request.
121#[derive(Debug, PartialEq)]
122pub enum PreCheckOutcome {
123 /// The PVF has been compiled successfully within the given constraints.
124 Valid,
125 /// The PVF could not be compiled. This variant is used when the candidate-validation subsystem
126 /// can be sure that the PVF is invalid. To give a couple of examples: a PVF that cannot be
127 /// decompressed or that does not represent a structurally valid WebAssembly file.
128 Invalid,
129 /// This variant is used when the PVF cannot be compiled but for other reasons that are not
130 /// included into [`PreCheckOutcome::Invalid`]. This variant can indicate that the PVF in
131 /// question is invalid, however it is not necessary that PVF that received this judgement
132 /// is invalid.
133 ///
134 /// For example, if during compilation the preparation worker was killed we cannot be sure why
135 /// it happened: because the PVF was malicious made the worker to use too much memory or its
136 /// because the host machine is under severe memory pressure and it decided to kill the worker.
137 Failed,
138}
139
140/// Messages received by the Validation subsystem.
141///
142/// ## Validation Requests
143///
144/// Validation requests made to the subsystem should return an error only on internal error.
145/// Otherwise, they should return either `Ok(ValidationResult::Valid(_))`
146/// or `Ok(ValidationResult::Invalid)`.
147#[derive(Debug)]
148pub enum CandidateValidationMessage {
149 /// Validate a candidate with provided, exhaustive parameters for validation.
150 ///
151 /// Explicitly provide the `PersistedValidationData` and `ValidationCode` so this can do full
152 /// validation without needing to access the state of the relay-chain.
153 ///
154 /// This request doesn't involve acceptance criteria checking, therefore only useful for the
155 /// cases where the validity of the candidate is established. This is the case for the typical
156 /// use-case: secondary checkers would use this request relying on the full prior checks
157 /// performed by the relay-chain.
158 ValidateFromExhaustive {
159 /// Persisted validation data
160 validation_data: PersistedValidationData,
161 /// Validation code
162 validation_code: ValidationCode,
163 /// The candidate receipt
164 candidate_receipt: CandidateReceipt,
165 /// The proof-of-validity
166 pov: Arc<PoV>,
167 /// Session's executor parameters
168 executor_params: ExecutorParams,
169 /// Execution kind, used for timeouts and retries (backing/approvals)
170 exec_kind: PvfExecKind,
171 /// The sending side of the response channel
172 response_sender: oneshot::Sender<Result<ValidationResult, ValidationFailed>>,
173 },
174 /// Try to compile the given validation code and send back
175 /// the outcome.
176 ///
177 /// The validation code is specified by the hash and will be queried from the runtime API at
178 /// the given relay-parent.
179 PreCheck {
180 /// Relay-parent
181 relay_parent: Hash,
182 /// Validation code hash
183 validation_code_hash: ValidationCodeHash,
184 /// The sending side of the response channel
185 response_sender: oneshot::Sender<PreCheckOutcome>,
186 },
187}
188
189/// Extends primitives::PvfExecKind, which is a runtime parameter we don't want to change,
190/// to separate and prioritize execution jobs by request type.
191#[derive(Debug, Clone, Copy, PartialEq, Eq)]
192pub enum PvfExecKind {
193 /// For dispute requests
194 Dispute,
195 /// For approval requests
196 Approval,
197 /// For backing requests from system parachains. With relay parent hash
198 BackingSystemParas(Hash),
199 /// For backing requests. With relay parent hash
200 Backing(Hash),
201}
202
203impl PvfExecKind {
204 /// Converts priority level to &str
205 pub fn as_str(&self) -> &str {
206 match *self {
207 Self::Dispute => "dispute",
208 Self::Approval => "approval",
209 Self::BackingSystemParas(_) => "backing_system_paras",
210 Self::Backing(_) => "backing",
211 }
212 }
213}
214
215impl From<PvfExecKind> for RuntimePvfExecKind {
216 fn from(exec: PvfExecKind) -> Self {
217 match exec {
218 PvfExecKind::Dispute => RuntimePvfExecKind::Approval,
219 PvfExecKind::Approval => RuntimePvfExecKind::Approval,
220 PvfExecKind::BackingSystemParas(_) => RuntimePvfExecKind::Backing,
221 PvfExecKind::Backing(_) => RuntimePvfExecKind::Backing,
222 }
223 }
224}
225
226/// Messages received by the Collator Protocol subsystem.
227#[derive(Debug, derive_more::From)]
228pub enum CollatorProtocolMessage {
229 /// Signal to the collator protocol that it should connect to validators with the expectation
230 /// of collating on the given para. This is only expected to be called once, early on, if at
231 /// all, and only by the Collation Generation subsystem. As such, it will overwrite the value
232 /// of the previous signal.
233 ///
234 /// This should be sent before any `DistributeCollation` message.
235 CollateOn(ParaId),
236 /// Provide a collation to distribute to validators with an optional result sender.
237 DistributeCollation {
238 /// The receipt of the candidate.
239 candidate_receipt: CandidateReceipt,
240 /// The hash of the parent head-data.
241 /// Here to avoid computing the hash of the parent head data twice.
242 parent_head_data_hash: Hash,
243 /// Proof of validity.
244 pov: PoV,
245 /// This parent head-data is needed for elastic scaling.
246 parent_head_data: HeadData,
247 /// The result sender should be informed when at least one parachain validator seconded the
248 /// collation. It is also completely okay to just drop the sender.
249 result_sender: Option<oneshot::Sender<CollationSecondedSignal>>,
250 /// The core index where the candidate should be backed.
251 core_index: CoreIndex,
252 },
253 /// Get a network bridge update.
254 #[from]
255 NetworkBridgeUpdate(NetworkBridgeEvent<net_protocol::CollatorProtocolMessage>),
256 /// We recommended a particular candidate to be seconded, but it was invalid; penalize the
257 /// collator.
258 ///
259 /// The hash is the relay parent.
260 Invalid(Hash, CandidateReceipt),
261 /// The candidate we recommended to be seconded was validated successfully.
262 ///
263 /// The hash is the relay parent.
264 Seconded(Hash, SignedFullStatement),
265 /// A message sent by Cumulus consensus engine to the collator protocol to
266 /// pre-connect to backing groups at all allowed relay parents.
267 ConnectToBackingGroups,
268 /// A message sent by Cumulus consensus engine to the collator protocol to
269 /// disconnect from backing groups.
270 DisconnectFromBackingGroups,
271}
272
273impl Default for CollatorProtocolMessage {
274 fn default() -> Self {
275 Self::CollateOn(Default::default())
276 }
277}
278
279/// Messages received by the dispute coordinator subsystem.
280///
281/// NOTE: Any response oneshots might get cancelled if the `DisputeCoordinator` was not yet
282/// properly initialized for some reason.
283#[derive(Debug)]
284pub enum DisputeCoordinatorMessage {
285 /// Import statements by validators about a candidate.
286 ///
287 /// The subsystem will silently discard ancient statements or sets of only dispute-specific
288 /// statements for candidates that are previously unknown to the subsystem. The former is
289 /// simply because ancient data is not relevant and the latter is as a DoS prevention
290 /// mechanism. Both backing and approval statements already undergo anti-DoS procedures in
291 /// their respective subsystems, but statements cast specifically for disputes are not
292 /// necessarily relevant to any candidate the system is already aware of and thus present a DoS
293 /// vector. Our expectation is that nodes will notify each other of disputes over the network
294 /// by providing (at least) 2 conflicting statements, of which one is either a backing or
295 /// validation statement.
296 ///
297 /// This does not do any checking of the message signature.
298 ImportStatements {
299 /// The candidate receipt itself.
300 candidate_receipt: CandidateReceipt,
301 /// The session the candidate appears in.
302 session: SessionIndex,
303 /// Statements, with signatures checked, by validators participating in disputes.
304 ///
305 /// The validator index passed alongside each statement should correspond to the index
306 /// of the validator in the set.
307 statements: Vec<(SignedDisputeStatement, ValidatorIndex)>,
308 /// Inform the requester once we finished importing (if a sender was provided).
309 ///
310 /// This is:
311 /// - we discarded the votes because
312 /// - they were ancient or otherwise invalid (result: `InvalidImport`)
313 /// - or we were not able to recover availability for an unknown candidate (result:
314 /// `InvalidImport`)
315 /// - or were known already (in that case the result will still be `ValidImport`)
316 /// - or we recorded them because (`ValidImport`)
317 /// - we cast our own vote already on that dispute
318 /// - or we have approval votes on that candidate
319 /// - or other explicit votes on that candidate already recorded
320 /// - or recovered availability for the candidate
321 /// - or the imported statements are backing/approval votes, which are always accepted.
322 pending_confirmation: Option<oneshot::Sender<ImportStatementsResult>>,
323 },
324 /// Fetch a list of all recent disputes the coordinator is aware of.
325 /// These are disputes which have occurred any time in recent sessions,
326 /// and which may have already concluded.
327 RecentDisputes(oneshot::Sender<BTreeMap<(SessionIndex, CandidateHash), DisputeStatus>>),
328 /// Fetch a list of all active disputes that the coordinator is aware of.
329 /// These disputes are either not yet concluded or recently concluded.
330 ActiveDisputes(oneshot::Sender<BTreeMap<(SessionIndex, CandidateHash), DisputeStatus>>),
331 /// Get candidate votes for a candidate.
332 QueryCandidateVotes(
333 Vec<(SessionIndex, CandidateHash)>,
334 oneshot::Sender<Vec<(SessionIndex, CandidateHash, CandidateVotes)>>,
335 ),
336 /// Sign and issue local dispute votes. A value of `true` indicates validity, and `false`
337 /// invalidity.
338 IssueLocalStatement(SessionIndex, CandidateHash, CandidateReceipt, bool),
339 /// Determine the highest undisputed block within the given chain, based on where candidates
340 /// were included. If even the base block should not be finalized due to a dispute,
341 /// then `None` should be returned on the channel.
342 ///
343 /// The block descriptions begin counting upwards from the block after the given `base_number`.
344 /// The `base_number` is typically the number of the last finalized block but may be slightly
345 /// higher. This block is inevitably going to be finalized so it is not accounted for by this
346 /// function.
347 DetermineUndisputedChain {
348 /// The lowest possible block to vote on.
349 base: (BlockNumber, Hash),
350 /// Descriptions of all the blocks counting upwards from the block after the base number
351 block_descriptions: Vec<BlockDescription>,
352 /// The block to vote on, might be base in case there is no better.
353 tx: oneshot::Sender<(BlockNumber, Hash)>,
354 },
355}
356
357/// The result of `DisputeCoordinatorMessage::ImportStatements`.
358#[derive(Copy, Clone, Debug, PartialEq, Eq)]
359pub enum ImportStatementsResult {
360 /// Import was invalid (candidate was not available) and the sending peer should get banned.
361 InvalidImport,
362 /// Import was valid and can be confirmed to peer.
363 ValidImport,
364}
365
366/// Messages going to the dispute distribution subsystem.
367#[derive(Debug)]
368pub enum DisputeDistributionMessage {
369 /// Tell dispute distribution to distribute an explicit dispute statement to
370 /// validators.
371 SendDispute(DisputeMessage),
372}
373
374/// Messages received from other subsystems.
375#[derive(Debug)]
376pub enum NetworkBridgeRxMessage {
377 /// Inform the distribution subsystems about the new
378 /// gossip network topology formed.
379 ///
380 /// The only reason to have this here, is the availability of the
381 /// authority discovery service, otherwise, the `GossipSupport`
382 /// subsystem would make more sense.
383 NewGossipTopology {
384 /// The session info this gossip topology is concerned with.
385 session: SessionIndex,
386 /// Our validator index in the session, if any.
387 local_index: Option<ValidatorIndex>,
388 /// The canonical shuffling of validators for the session.
389 canonical_shuffling: Vec<(AuthorityDiscoveryId, ValidatorIndex)>,
390 /// The reverse mapping of `canonical_shuffling`: from validator index
391 /// to the index in `canonical_shuffling`
392 shuffled_indices: Vec<usize>,
393 },
394 /// Inform the distribution subsystems about `AuthorityDiscoveryId` key rotations.
395 UpdatedAuthorityIds {
396 /// The `PeerId` of the peer that updated its `AuthorityDiscoveryId`s.
397 peer_id: PeerId,
398 /// The updated authority discovery keys of the peer.
399 authority_ids: HashSet<AuthorityDiscoveryId>,
400 },
401}
402
403/// Type of peer reporting
404#[derive(Debug)]
405pub enum ReportPeerMessage {
406 /// Single peer report about malicious actions which should be sent right away
407 Single(PeerId, ReputationChange),
408 /// Delayed report for other actions.
409 Batch(HashMap<PeerId, i32>),
410}
411
412/// Messages received from other subsystems by the network bridge subsystem.
413#[derive(Debug)]
414pub enum NetworkBridgeTxMessage {
415 /// Report a peer for their actions.
416 ReportPeer(ReportPeerMessage),
417
418 /// Disconnect peers from the given peer-set without affecting their reputation.
419 DisconnectPeers(Vec<PeerId>, PeerSet),
420
421 /// Send a message to one or more peers on the validation peer-set.
422 SendValidationMessage(Vec<PeerId>, net_protocol::VersionedValidationProtocol),
423
424 /// Send a message to one or more peers on the collation peer-set.
425 SendCollationMessage(Vec<PeerId>, net_protocol::VersionedCollationProtocol),
426
427 /// Send a batch of validation messages.
428 ///
429 /// NOTE: Messages will be processed in order (at least statement distribution relies on this).
430 SendValidationMessages(Vec<(Vec<PeerId>, net_protocol::VersionedValidationProtocol)>),
431
432 /// Send a batch of collation messages.
433 ///
434 /// NOTE: Messages will be processed in order.
435 SendCollationMessages(Vec<(Vec<PeerId>, net_protocol::VersionedCollationProtocol)>),
436
437 /// Send requests via substrate request/response.
438 /// Second parameter, tells what to do if we are not yet connected to the peer.
439 SendRequests(Vec<Requests>, IfDisconnected),
440
441 /// Connect to peers who represent the given `validator_ids`.
442 ///
443 /// Also ask the network to stay connected to these peers at least
444 /// until a new request is issued.
445 ///
446 /// Because it overrides the previous request, it must be ensured
447 /// that `validator_ids` include all peers the subsystems
448 /// are interested in (per `PeerSet`).
449 ///
450 /// A caller can learn about validator connections by listening to the
451 /// `PeerConnected` events from the network bridge.
452 ConnectToValidators {
453 /// Ids of the validators to connect to.
454 validator_ids: Vec<AuthorityDiscoveryId>,
455 /// The underlying protocol to use for this request.
456 peer_set: PeerSet,
457 /// Sends back the number of `AuthorityDiscoveryId`s which
458 /// authority discovery has failed to resolve.
459 failed: oneshot::Sender<usize>,
460 },
461 /// Alternative to `ConnectToValidators` in case you already know the `Multiaddrs` you want to
462 /// be connected to.
463 ConnectToResolvedValidators {
464 /// Each entry corresponds to the addresses of an already resolved validator.
465 validator_addrs: Vec<HashSet<Multiaddr>>,
466 /// The peer set we want the connection on.
467 peer_set: PeerSet,
468 },
469
470 /// Extends the known validators set with new peers we already know the `Multiaddrs`, this is
471 /// usually needed for validators that change their address mid-session. It is usually called
472 /// after a ConnectToResolvedValidators at the beginning of the session.
473 AddToResolvedValidators {
474 /// Each entry corresponds to the addresses of an already resolved validator.
475 validator_addrs: Vec<HashSet<Multiaddr>>,
476 /// The peer set we want the connection on.
477 peer_set: PeerSet,
478 },
479}
480
481/// Availability Distribution Message.
482#[derive(Debug)]
483pub enum AvailabilityDistributionMessage {
484 /// Instruct availability distribution to fetch a remote PoV.
485 ///
486 /// NOTE: The result of this fetch is not yet locally validated and could be bogus.
487 FetchPoV {
488 /// The relay parent giving the necessary context.
489 relay_parent: Hash,
490 /// Validator to fetch the PoV from.
491 from_validator: ValidatorIndex,
492 /// The id of the parachain that produced this PoV.
493 /// This field is only used to provide more context when logging errors
494 /// from the `AvailabilityDistribution` subsystem.
495 para_id: ParaId,
496 /// Candidate hash to fetch the PoV for.
497 candidate_hash: CandidateHash,
498 /// Expected hash of the PoV, a PoV not matching this hash will be rejected.
499 pov_hash: Hash,
500 /// Sender for getting back the result of this fetch.
501 ///
502 /// The sender will be canceled if the fetching failed for some reason.
503 tx: oneshot::Sender<PoV>,
504 },
505}
506
507/// Availability Recovery Message.
508#[derive(Debug, derive_more::From)]
509pub enum AvailabilityRecoveryMessage {
510 /// Recover available data from validators on the network.
511 RecoverAvailableData(
512 CandidateReceipt,
513 SessionIndex,
514 Option<GroupIndex>, // Optional backing group to request from first.
515 Option<CoreIndex>, /* A `CoreIndex` needs to be specified for the recovery process to
516 * prefer systematic chunk recovery. */
517 oneshot::Sender<Result<AvailableData, crate::errors::RecoveryError>>,
518 ),
519}
520
521/// Bitfield distribution message.
522#[derive(Debug, derive_more::From)]
523pub enum BitfieldDistributionMessage {
524 /// Distribute a bitfield via gossip to other validators.
525 DistributeBitfield(Hash, SignedAvailabilityBitfield),
526
527 /// Event from the network bridge.
528 #[from]
529 NetworkBridgeUpdate(NetworkBridgeEvent<net_protocol::BitfieldDistributionMessage>),
530}
531
532/// Availability store subsystem message.
533#[derive(Debug)]
534pub enum AvailabilityStoreMessage {
535 /// Query a `AvailableData` from the AV store.
536 QueryAvailableData(CandidateHash, oneshot::Sender<Option<AvailableData>>),
537
538 /// Query whether a `AvailableData` exists within the AV Store.
539 ///
540 /// This is useful in cases when existence
541 /// matters, but we don't want to necessarily pass around multiple
542 /// megabytes of data to get a single bit of information.
543 QueryDataAvailability(CandidateHash, oneshot::Sender<bool>),
544
545 /// Query an `ErasureChunk` from the AV store by the candidate hash and validator index.
546 QueryChunk(CandidateHash, ValidatorIndex, oneshot::Sender<Option<ErasureChunk>>),
547
548 /// Get the size of an `ErasureChunk` from the AV store by the candidate hash.
549 QueryChunkSize(CandidateHash, oneshot::Sender<Option<usize>>),
550
551 /// Query all chunks that we have for the given candidate hash.
552 QueryAllChunks(CandidateHash, oneshot::Sender<Vec<(ValidatorIndex, ErasureChunk)>>),
553
554 /// Query whether an `ErasureChunk` exists within the AV Store.
555 ///
556 /// This is useful in cases like bitfield signing, when existence
557 /// matters, but we don't want to necessarily pass around large
558 /// quantities of data to get a single bit of information.
559 QueryChunkAvailability(CandidateHash, ValidatorIndex, oneshot::Sender<bool>),
560
561 /// Store an `ErasureChunk` in the AV store.
562 ///
563 /// Return `Ok(())` if the store operation succeeded, `Err(())` if it failed.
564 StoreChunk {
565 /// A hash of the candidate this chunk belongs to.
566 candidate_hash: CandidateHash,
567 /// Validator index. May not be equal to the chunk index.
568 validator_index: ValidatorIndex,
569 /// The chunk itself.
570 chunk: ErasureChunk,
571 /// Sending side of the channel to send result to.
572 tx: oneshot::Sender<Result<(), ()>>,
573 },
574
575 /// Computes and checks the erasure root of `AvailableData` before storing all of its chunks in
576 /// the AV store.
577 ///
578 /// Return `Ok(())` if the store operation succeeded, `Err(StoreAvailableData)` if it failed.
579 StoreAvailableData {
580 /// A hash of the candidate this `available_data` belongs to.
581 candidate_hash: CandidateHash,
582 /// The number of validators in the session.
583 n_validators: u32,
584 /// The `AvailableData` itself.
585 available_data: AvailableData,
586 /// Erasure root we expect to get after chunking.
587 expected_erasure_root: Hash,
588 /// Core index where the candidate was backed.
589 core_index: CoreIndex,
590 /// Node features at the candidate relay parent. Used for computing the validator->chunk
591 /// mapping.
592 node_features: NodeFeatures,
593 /// Sending side of the channel to send result to.
594 tx: oneshot::Sender<Result<(), StoreAvailableDataError>>,
595 },
596}
597
598/// The error result type of a [`AvailabilityStoreMessage::StoreAvailableData`] request.
599#[derive(Error, Debug, Clone, PartialEq, Eq)]
600#[allow(missing_docs)]
601pub enum StoreAvailableDataError {
602 #[error("The computed erasure root did not match expected one")]
603 InvalidErasureRoot,
604}
605
606/// A response channel for the result of a chain API request.
607pub type ChainApiResponseChannel<T> = oneshot::Sender<Result<T, crate::errors::ChainApiError>>;
608
609/// Chain API request subsystem message.
610#[derive(Debug)]
611pub enum ChainApiMessage {
612 /// Request the block number by hash.
613 /// Returns `None` if a block with the given hash is not present in the db.
614 BlockNumber(Hash, ChainApiResponseChannel<Option<BlockNumber>>),
615 /// Request the block header by hash.
616 /// Returns `None` if a block with the given hash is not present in the db.
617 BlockHeader(Hash, ChainApiResponseChannel<Option<BlockHeader>>),
618 /// Get the cumulative weight of the given block, by hash.
619 /// If the block or weight is unknown, this returns `None`.
620 ///
621 /// Note: this is the weight within the low-level fork-choice rule,
622 /// not the high-level one implemented in the chain-selection subsystem.
623 ///
624 /// Weight is used for comparing blocks in a fork-choice rule.
625 BlockWeight(Hash, ChainApiResponseChannel<Option<BlockWeight>>),
626 /// Request the finalized block hash by number.
627 /// Returns `None` if a block with the given number is not present in the db.
628 /// Note: the caller must ensure the block is finalized.
629 FinalizedBlockHash(BlockNumber, ChainApiResponseChannel<Option<Hash>>),
630 /// Request the last finalized block number.
631 /// This request always succeeds.
632 FinalizedBlockNumber(ChainApiResponseChannel<BlockNumber>),
633 /// Request the `k` ancestor block hashes of a block with the given hash.
634 /// The response channel may return a `Vec` of size up to `k`
635 /// filled with ancestors hashes with the following order:
636 /// `parent`, `grandparent`, ... up to the hash of genesis block
637 /// with number 0, including it.
638 Ancestors {
639 /// The hash of the block in question.
640 hash: Hash,
641 /// The number of ancestors to request.
642 k: usize,
643 /// The response channel.
644 response_channel: ChainApiResponseChannel<Vec<Hash>>,
645 },
646}
647
648/// Chain selection subsystem messages
649#[derive(Debug)]
650pub enum ChainSelectionMessage {
651 /// Signal to the chain selection subsystem that a specific block has been approved.
652 Approved(Hash),
653 /// Request the leaves in descending order by score.
654 Leaves(oneshot::Sender<Vec<Hash>>),
655 /// Request the best leaf containing the given block in its ancestry. Return `None` if
656 /// there is no such leaf.
657 BestLeafContaining(Hash, oneshot::Sender<Option<Hash>>),
658 /// The passed blocks must be marked as reverted, and their children must be marked
659 /// as non-viable.
660 RevertBlocks(Vec<(BlockNumber, Hash)>),
661}
662
663/// A sender for the result of a runtime API request.
664pub type RuntimeApiSender<T> = oneshot::Sender<Result<T, crate::errors::RuntimeApiError>>;
665
666/// A request to the Runtime API subsystem.
667#[derive(Debug)]
668pub enum RuntimeApiRequest {
669 /// Get the version of the runtime API, if any.
670 Version(RuntimeApiSender<u32>),
671 /// Get the next, current and some previous authority discovery set deduplicated.
672 Authorities(RuntimeApiSender<Vec<AuthorityDiscoveryId>>),
673 /// Get the current validator set.
674 Validators(RuntimeApiSender<Vec<ValidatorId>>),
675 /// Get the validator groups and group rotation info.
676 ValidatorGroups(RuntimeApiSender<(Vec<Vec<ValidatorIndex>>, GroupRotationInfo)>),
677 /// Get information on all availability cores.
678 AvailabilityCores(RuntimeApiSender<Vec<CoreState>>),
679 /// Get the persisted validation data for a particular para, taking the given
680 /// `OccupiedCoreAssumption`, which will inform on how the validation data should be computed
681 /// if the para currently occupies a core.
682 PersistedValidationData(
683 ParaId,
684 OccupiedCoreAssumption,
685 RuntimeApiSender<Option<PersistedValidationData>>,
686 ),
687 /// Get the persisted validation data for a particular para along with the current validation
688 /// code hash, matching the data hash against an expected one.
689 AssumedValidationData(
690 ParaId,
691 Hash,
692 RuntimeApiSender<Option<(PersistedValidationData, ValidationCodeHash)>>,
693 ),
694 /// Sends back `true` if the validation outputs pass all acceptance criteria checks.
695 CheckValidationOutputs(
696 ParaId,
697 polkadot_primitives::CandidateCommitments,
698 RuntimeApiSender<bool>,
699 ),
700 /// Get the session index that a child of the block will have.
701 SessionIndexForChild(RuntimeApiSender<SessionIndex>),
702 /// Get the validation code for a para, taking the given `OccupiedCoreAssumption`, which
703 /// will inform on how the validation data should be computed if the para currently
704 /// occupies a core.
705 ValidationCode(ParaId, OccupiedCoreAssumption, RuntimeApiSender<Option<ValidationCode>>),
706 /// Get validation code by its hash, either past, current or future code can be returned, as
707 /// long as state is still available.
708 ValidationCodeByHash(ValidationCodeHash, RuntimeApiSender<Option<ValidationCode>>),
709 /// Get the candidate pending availability for a particular parachain by parachain / core
710 /// index
711 CandidatePendingAvailability(ParaId, RuntimeApiSender<Option<CommittedCandidateReceipt>>),
712 /// Get all events concerning candidates (backing, inclusion, time-out) in the parent of
713 /// the block in whose state this request is executed.
714 CandidateEvents(RuntimeApiSender<Vec<CandidateEvent>>),
715 /// Get the execution environment parameter set by session index
716 SessionExecutorParams(SessionIndex, RuntimeApiSender<Option<ExecutorParams>>),
717 /// Get the session info for the given session, if stored.
718 SessionInfo(SessionIndex, RuntimeApiSender<Option<SessionInfo>>),
719 /// Get all the pending inbound messages in the downward message queue for a para.
720 DmqContents(ParaId, RuntimeApiSender<Vec<InboundDownwardMessage<BlockNumber>>>),
721 /// Get the contents of all channels addressed to the given recipient. Channels that have no
722 /// messages in them are also included.
723 InboundHrmpChannelsContents(
724 ParaId,
725 RuntimeApiSender<BTreeMap<ParaId, Vec<InboundHrmpMessage<BlockNumber>>>>,
726 ),
727 /// Get information about the BABE epoch the block was included in.
728 CurrentBabeEpoch(RuntimeApiSender<BabeEpoch>),
729 /// Get all disputes in relation to a relay parent.
730 FetchOnChainVotes(RuntimeApiSender<Option<polkadot_primitives::ScrapedOnChainVotes>>),
731 /// Submits a PVF pre-checking statement into the transaction pool.
732 SubmitPvfCheckStatement(PvfCheckStatement, ValidatorSignature, RuntimeApiSender<()>),
733 /// Returns code hashes of PVFs that require pre-checking by validators in the active set.
734 PvfsRequirePrecheck(RuntimeApiSender<Vec<ValidationCodeHash>>),
735 /// Get the validation code used by the specified para, taking the given
736 /// `OccupiedCoreAssumption`, which will inform on how the validation data should be computed
737 /// if the para currently occupies a core.
738 ValidationCodeHash(
739 ParaId,
740 OccupiedCoreAssumption,
741 RuntimeApiSender<Option<ValidationCodeHash>>,
742 ),
743 /// Returns all on-chain disputes at given block number. Available in `v3`.
744 Disputes(RuntimeApiSender<Vec<(SessionIndex, CandidateHash, DisputeState<BlockNumber>)>>),
745 /// Returns a list of validators that lost a past session dispute and need to be slashed.
746 /// `V5`
747 UnappliedSlashes(
748 RuntimeApiSender<Vec<(SessionIndex, CandidateHash, slashing::LegacyPendingSlashes)>>,
749 ),
750 /// Returns a merkle proof of a validator session key.
751 /// `V5`
752 KeyOwnershipProof(ValidatorId, RuntimeApiSender<Option<slashing::OpaqueKeyOwnershipProof>>),
753 /// Submits an unsigned extrinsic to slash validator who lost a past session dispute.
754 /// `V5`
755 SubmitReportDisputeLost(
756 slashing::DisputeProof,
757 slashing::OpaqueKeyOwnershipProof,
758 RuntimeApiSender<Option<()>>,
759 ),
760 /// Get the minimum required backing votes.
761 MinimumBackingVotes(SessionIndex, RuntimeApiSender<u32>),
762 /// Returns all disabled validators at a given block height.
763 DisabledValidators(RuntimeApiSender<Vec<ValidatorIndex>>),
764 /// Get the backing state of the given para.
765 ParaBackingState(ParaId, RuntimeApiSender<Option<async_backing::BackingState>>),
766 /// Get candidate's acceptance limitations for asynchronous backing for a relay parent.
767 ///
768 /// If it's not supported by the Runtime, the async backing is said to be disabled.
769 AsyncBackingParams(RuntimeApiSender<async_backing::AsyncBackingParams>),
770 /// Get the node features.
771 NodeFeatures(SessionIndex, RuntimeApiSender<NodeFeatures>),
772 /// Approval voting params
773 /// `V10`
774 ApprovalVotingParams(SessionIndex, RuntimeApiSender<ApprovalVotingParams>),
775 /// Fetch the `ClaimQueue` from scheduler pallet
776 /// `V11`
777 ClaimQueue(RuntimeApiSender<BTreeMap<CoreIndex, VecDeque<ParaId>>>),
778 /// Get the candidates pending availability for a particular parachain
779 /// `V11`
780 CandidatesPendingAvailability(ParaId, RuntimeApiSender<Vec<CommittedCandidateReceipt>>),
781 /// Get the backing constraints for a particular parachain.
782 /// `V12`
783 BackingConstraints(ParaId, RuntimeApiSender<Option<Constraints>>),
784 /// Get the lookahead from the scheduler params.
785 /// `V12`
786 SchedulingLookahead(SessionIndex, RuntimeApiSender<u32>),
787 /// Get the maximum uncompressed code size.
788 /// `V12`
789 ValidationCodeBombLimit(SessionIndex, RuntimeApiSender<u32>),
790 /// Get the paraids at the relay parent.
791 /// `V14`
792 ParaIds(SessionIndex, RuntimeApiSender<Vec<ParaId>>),
793 /// Returns a list of validators that lost a past session dispute and need to be slashed (v2).
794 /// `V15`
795 UnappliedSlashesV2(
796 RuntimeApiSender<Vec<(SessionIndex, CandidateHash, slashing::PendingSlashes)>>,
797 ),
798}
799
800impl RuntimeApiRequest {
801 /// Runtime version requirements for each message
802
803 /// `Disputes`
804 pub const DISPUTES_RUNTIME_REQUIREMENT: u32 = 3;
805
806 /// `ExecutorParams`
807 pub const EXECUTOR_PARAMS_RUNTIME_REQUIREMENT: u32 = 4;
808
809 /// `UnappliedSlashes`
810 pub const UNAPPLIED_SLASHES_RUNTIME_REQUIREMENT: u32 = 5;
811
812 /// `KeyOwnershipProof`
813 pub const KEY_OWNERSHIP_PROOF_RUNTIME_REQUIREMENT: u32 = 5;
814
815 /// `SubmitReportDisputeLost`
816 pub const SUBMIT_REPORT_DISPUTE_LOST_RUNTIME_REQUIREMENT: u32 = 5;
817
818 /// `MinimumBackingVotes`
819 pub const MINIMUM_BACKING_VOTES_RUNTIME_REQUIREMENT: u32 = 6;
820
821 /// Minimum version to enable asynchronous backing: `AsyncBackingParams` and `ParaBackingState`.
822 pub const ASYNC_BACKING_STATE_RUNTIME_REQUIREMENT: u32 = 7;
823
824 /// `DisabledValidators`
825 pub const DISABLED_VALIDATORS_RUNTIME_REQUIREMENT: u32 = 8;
826
827 /// `Node features`
828 pub const NODE_FEATURES_RUNTIME_REQUIREMENT: u32 = 9;
829
830 /// `approval_voting_params`
831 pub const APPROVAL_VOTING_PARAMS_REQUIREMENT: u32 = 10;
832
833 /// `ClaimQueue`
834 pub const CLAIM_QUEUE_RUNTIME_REQUIREMENT: u32 = 11;
835
836 /// `candidates_pending_availability`
837 pub const CANDIDATES_PENDING_AVAILABILITY_RUNTIME_REQUIREMENT: u32 = 11;
838
839 /// `ValidationCodeBombLimit`
840 pub const VALIDATION_CODE_BOMB_LIMIT_RUNTIME_REQUIREMENT: u32 = 12;
841
842 /// `backing_constraints`
843 pub const CONSTRAINTS_RUNTIME_REQUIREMENT: u32 = 13;
844
845 /// `SchedulingLookahead`
846 pub const SCHEDULING_LOOKAHEAD_RUNTIME_REQUIREMENT: u32 = 13;
847
848 /// `ParaIds`
849 pub const PARAIDS_RUNTIME_REQUIREMENT: u32 = 14;
850
851 /// `UnappliedSlashesV2`
852 pub const UNAPPLIED_SLASHES_V2_RUNTIME_REQUIREMENT: u32 = 15;
853}
854
855/// A message to the Runtime API subsystem.
856#[derive(Debug)]
857pub enum RuntimeApiMessage {
858 /// Make a request of the runtime API against the post-state of the given relay-parent.
859 Request(Hash, RuntimeApiRequest),
860}
861
862/// Statement distribution message.
863#[derive(Debug, derive_more::From)]
864pub enum StatementDistributionMessage {
865 /// We have originated a signed statement in the context of
866 /// given relay-parent hash and it should be distributed to other validators.
867 Share(Hash, SignedFullStatementWithPVD),
868 /// The candidate received enough validity votes from the backing group.
869 ///
870 /// If the candidate is backed as a result of a local statement, this message MUST
871 /// be preceded by a `Share` message for that statement. This ensures that Statement
872 /// Distribution is always aware of full candidates prior to receiving the `Backed`
873 /// notification, even when the group size is 1 and the candidate is seconded locally.
874 Backed(CandidateHash),
875 /// Event from the network bridge.
876 #[from]
877 NetworkBridgeUpdate(NetworkBridgeEvent<net_protocol::StatementDistributionMessage>),
878}
879
880/// This data becomes intrinsics or extrinsics which should be included in a future relay chain
881/// block.
882// It needs to be clonable because multiple potential block authors can request copies.
883#[derive(Debug, Clone)]
884pub enum ProvisionableData {
885 /// This bitfield indicates the availability of various candidate blocks.
886 Bitfield(Hash, SignedAvailabilityBitfield),
887 /// Misbehavior reports are self-contained proofs of validator misbehavior.
888 MisbehaviorReport(Hash, ValidatorIndex, Misbehavior),
889 /// Disputes trigger a broad dispute resolution process.
890 Dispute(Hash, ValidatorSignature),
891}
892
893/// Inherent data returned by the provisioner
894#[derive(Debug, Clone)]
895pub struct ProvisionerInherentData {
896 /// Signed bitfields.
897 pub bitfields: SignedAvailabilityBitfields,
898 /// Backed candidates.
899 pub backed_candidates: Vec<BackedCandidate>,
900 /// Dispute statement sets.
901 pub disputes: MultiDisputeStatementSet,
902}
903
904/// Message to the Provisioner.
905///
906/// In all cases, the Hash is that of the relay parent.
907#[derive(Debug)]
908pub enum ProvisionerMessage {
909 /// This message allows external subsystems to request the set of bitfields and backed
910 /// candidates associated with a particular potential block hash.
911 ///
912 /// This is expected to be used by a proposer, to inject that information into the
913 /// `InherentData` where it can be assembled into the `ParaInherent`.
914 RequestInherentData(Hash, oneshot::Sender<ProvisionerInherentData>),
915 /// This data should become part of a relay chain block
916 ProvisionableData(Hash, ProvisionableData),
917}
918
919/// Message to the Collation Generation subsystem.
920#[derive(Debug)]
921pub enum CollationGenerationMessage {
922 /// Initialize the collation generation subsystem.
923 Initialize(CollationGenerationConfig),
924 /// Reinitialize the collation generation subsystem, overriding the existing config.
925 Reinitialize(CollationGenerationConfig),
926 /// Submit a collation to the subsystem. This will package it into a signed
927 /// [`CommittedCandidateReceipt`] and distribute along the network to validators.
928 ///
929 /// If sent before `Initialize`, this will be ignored.
930 SubmitCollation(SubmitCollationParams),
931}
932
933/// The result type of [`ApprovalVotingMessage::ImportAssignment`] request.
934#[derive(Debug, Clone, PartialEq, Eq)]
935pub enum AssignmentCheckResult {
936 /// The vote was accepted and should be propagated onwards.
937 Accepted,
938 /// The vote was valid but duplicate and should not be propagated onwards.
939 AcceptedDuplicate,
940 /// The vote was valid but too far in the future to accept right now.
941 TooFarInFuture,
942 /// The vote was bad and should be ignored, reporting the peer who propagated it.
943 Bad(AssignmentCheckError),
944}
945
946/// The error result type of [`ApprovalVotingMessage::ImportAssignment`] request.
947#[derive(Error, Debug, Clone, PartialEq, Eq)]
948#[allow(missing_docs)]
949pub enum AssignmentCheckError {
950 #[error("Unknown block: {0:?}")]
951 UnknownBlock(Hash),
952 #[error("Unknown session index: {0}")]
953 UnknownSessionIndex(SessionIndex),
954 #[error("Invalid candidate index: {0}")]
955 InvalidCandidateIndex(CandidateIndex),
956 #[error("Invalid candidate {0}: {1:?}")]
957 InvalidCandidate(CandidateIndex, CandidateHash),
958 #[error("Invalid cert: {0:?}, reason: {1}")]
959 InvalidCert(ValidatorIndex, String),
960 #[error("Internal state mismatch: {0:?}, {1:?}")]
961 Internal(Hash, CandidateHash),
962 #[error("Oversized candidate or core bitfield >= {0}")]
963 InvalidBitfield(usize),
964}
965
966/// The result type of [`ApprovalVotingMessage::ImportApproval`] request.
967#[derive(Debug, Clone, PartialEq, Eq)]
968pub enum ApprovalCheckResult {
969 /// The vote was accepted and should be propagated onwards.
970 Accepted,
971 /// The vote was bad and should be ignored, reporting the peer who propagated it.
972 Bad(ApprovalCheckError),
973}
974
975/// The error result type of [`ApprovalVotingMessage::ImportApproval`] request.
976#[derive(Error, Debug, Clone, PartialEq, Eq)]
977#[allow(missing_docs)]
978pub enum ApprovalCheckError {
979 #[error("Unknown block: {0:?}")]
980 UnknownBlock(Hash),
981 #[error("Unknown session index: {0}")]
982 UnknownSessionIndex(SessionIndex),
983 #[error("Invalid candidate index: {0}")]
984 InvalidCandidateIndex(CandidateIndex),
985 #[error("Invalid validator index: {0:?}")]
986 InvalidValidatorIndex(ValidatorIndex),
987 #[error("Invalid candidate {0}: {1:?}")]
988 InvalidCandidate(CandidateIndex, CandidateHash),
989 #[error("Invalid signature: {0:?}")]
990 InvalidSignature(ValidatorIndex),
991 #[error("No assignment for {0:?}")]
992 NoAssignment(ValidatorIndex),
993 #[error("Internal state mismatch: {0:?}, {1:?}")]
994 Internal(Hash, CandidateHash),
995}
996
997/// Describes a relay-chain block by the para-chain candidates
998/// it includes.
999#[derive(Clone, Debug)]
1000pub struct BlockDescription {
1001 /// The relay-chain block hash.
1002 pub block_hash: Hash,
1003 /// The session index of this block.
1004 pub session: SessionIndex,
1005 /// The set of para-chain candidates.
1006 pub candidates: Vec<CandidateHash>,
1007}
1008
1009/// Message to the approval voting parallel subsystem running both approval-distribution and
1010/// approval-voting logic in parallel. This is a combination of all the messages ApprovalVoting and
1011/// ApprovalDistribution subsystems can receive.
1012///
1013/// The reason this exists is, so that we can keep both modes of running in the same polkadot
1014/// binary, based on the value of `--approval-voting-parallel-enabled`, we decide if we run with two
1015/// different subsystems for approval-distribution and approval-voting or run the approval-voting
1016/// parallel which has several parallel workers for the approval-distribution and a worker for
1017/// approval-voting.
1018///
1019/// This is meant to be a temporary state until we can safely remove running the two subsystems
1020/// individually.
1021#[derive(Debug, derive_more::From)]
1022pub enum ApprovalVotingParallelMessage {
1023 /// Gets mapped into `ApprovalVotingMessage::ApprovedAncestor`
1024 ApprovedAncestor(Hash, BlockNumber, oneshot::Sender<Option<HighestApprovedAncestorBlock>>),
1025
1026 /// Gets mapped into `ApprovalVotingMessage::GetApprovalSignaturesForCandidate`
1027 GetApprovalSignaturesForCandidate(
1028 CandidateHash,
1029 oneshot::Sender<HashMap<ValidatorIndex, (Vec<CandidateHash>, ValidatorSignature)>>,
1030 ),
1031 /// Gets mapped into `ApprovalDistributionMessage::NewBlocks`
1032 NewBlocks(Vec<BlockApprovalMeta>),
1033 /// Gets mapped into `ApprovalDistributionMessage::DistributeAssignment`
1034 DistributeAssignment(IndirectAssignmentCertV2, CandidateBitfield),
1035 /// Gets mapped into `ApprovalDistributionMessage::DistributeApproval`
1036 DistributeApproval(IndirectSignedApprovalVoteV2),
1037 /// An update from the network bridge, gets mapped into
1038 /// `ApprovalDistributionMessage::NetworkBridgeUpdate`
1039 #[from]
1040 NetworkBridgeUpdate(NetworkBridgeEvent<net_protocol::ApprovalDistributionMessage>),
1041
1042 /// Gets mapped into `ApprovalDistributionMessage::GetApprovalSignatures`
1043 GetApprovalSignatures(
1044 HashSet<(Hash, CandidateIndex)>,
1045 oneshot::Sender<HashMap<ValidatorIndex, (Hash, Vec<CandidateIndex>, ValidatorSignature)>>,
1046 ),
1047 /// Gets mapped into `ApprovalDistributionMessage::ApprovalCheckingLagUpdate`
1048 ApprovalCheckingLagUpdate(BlockNumber),
1049}
1050
1051impl TryFrom<ApprovalVotingParallelMessage> for ApprovalVotingMessage {
1052 type Error = ();
1053
1054 fn try_from(msg: ApprovalVotingParallelMessage) -> Result<Self, Self::Error> {
1055 match msg {
1056 ApprovalVotingParallelMessage::ApprovedAncestor(hash, number, tx) =>
1057 Ok(ApprovalVotingMessage::ApprovedAncestor(hash, number, tx)),
1058 ApprovalVotingParallelMessage::GetApprovalSignaturesForCandidate(candidate, tx) =>
1059 Ok(ApprovalVotingMessage::GetApprovalSignaturesForCandidate(candidate, tx)),
1060 _ => Err(()),
1061 }
1062 }
1063}
1064
1065impl TryFrom<ApprovalVotingParallelMessage> for ApprovalDistributionMessage {
1066 type Error = ();
1067
1068 fn try_from(msg: ApprovalVotingParallelMessage) -> Result<Self, Self::Error> {
1069 match msg {
1070 ApprovalVotingParallelMessage::NewBlocks(blocks) =>
1071 Ok(ApprovalDistributionMessage::NewBlocks(blocks)),
1072 ApprovalVotingParallelMessage::DistributeAssignment(assignment, claimed_cores) =>
1073 Ok(ApprovalDistributionMessage::DistributeAssignment(assignment, claimed_cores)),
1074 ApprovalVotingParallelMessage::DistributeApproval(vote) =>
1075 Ok(ApprovalDistributionMessage::DistributeApproval(vote)),
1076 ApprovalVotingParallelMessage::NetworkBridgeUpdate(msg) =>
1077 Ok(ApprovalDistributionMessage::NetworkBridgeUpdate(msg)),
1078 ApprovalVotingParallelMessage::GetApprovalSignatures(candidate_indicies, tx) =>
1079 Ok(ApprovalDistributionMessage::GetApprovalSignatures(candidate_indicies, tx)),
1080 ApprovalVotingParallelMessage::ApprovalCheckingLagUpdate(lag) =>
1081 Ok(ApprovalDistributionMessage::ApprovalCheckingLagUpdate(lag)),
1082 _ => Err(()),
1083 }
1084 }
1085}
1086
1087impl From<ApprovalDistributionMessage> for ApprovalVotingParallelMessage {
1088 fn from(msg: ApprovalDistributionMessage) -> Self {
1089 match msg {
1090 ApprovalDistributionMessage::NewBlocks(blocks) =>
1091 ApprovalVotingParallelMessage::NewBlocks(blocks),
1092 ApprovalDistributionMessage::DistributeAssignment(cert, bitfield) =>
1093 ApprovalVotingParallelMessage::DistributeAssignment(cert, bitfield),
1094 ApprovalDistributionMessage::DistributeApproval(vote) =>
1095 ApprovalVotingParallelMessage::DistributeApproval(vote),
1096 ApprovalDistributionMessage::NetworkBridgeUpdate(msg) =>
1097 ApprovalVotingParallelMessage::NetworkBridgeUpdate(msg),
1098 ApprovalDistributionMessage::GetApprovalSignatures(candidate_indicies, tx) =>
1099 ApprovalVotingParallelMessage::GetApprovalSignatures(candidate_indicies, tx),
1100 ApprovalDistributionMessage::ApprovalCheckingLagUpdate(lag) =>
1101 ApprovalVotingParallelMessage::ApprovalCheckingLagUpdate(lag),
1102 }
1103 }
1104}
1105
1106/// Response type to `ApprovalVotingMessage::ApprovedAncestor`.
1107#[derive(Clone, Debug)]
1108pub struct HighestApprovedAncestorBlock {
1109 /// The block hash of the highest viable ancestor.
1110 pub hash: Hash,
1111 /// The block number of the highest viable ancestor.
1112 pub number: BlockNumber,
1113 /// Block descriptions in the direct path between the
1114 /// initially provided hash and the highest viable ancestor.
1115 /// Primarily for use with `DetermineUndisputedChain`.
1116 /// Must be sorted from lowest to highest block number.
1117 pub descriptions: Vec<BlockDescription>,
1118}
1119
1120/// A checked indirect assignment, the crypto for the cert has been validated
1121/// and the `candidate_bitfield` is correctly claimed at `delay_tranche`.
1122#[derive(Debug)]
1123pub struct CheckedIndirectAssignment {
1124 assignment: IndirectAssignmentCertV2,
1125 candidate_indices: CandidateBitfield,
1126 tranche: DelayTranche,
1127}
1128
1129impl CheckedIndirectAssignment {
1130 /// Builds a checked assignment from an assignment that was checked to be valid for the
1131 /// `claimed_candidate_indices` at the give tranche
1132 pub fn from_checked(
1133 assignment: IndirectAssignmentCertV2,
1134 claimed_candidate_indices: CandidateBitfield,
1135 tranche: DelayTranche,
1136 ) -> Self {
1137 Self { assignment, candidate_indices: claimed_candidate_indices, tranche }
1138 }
1139
1140 /// Returns the indirect assignment.
1141 pub fn assignment(&self) -> &IndirectAssignmentCertV2 {
1142 &self.assignment
1143 }
1144
1145 /// Returns the candidate bitfield claimed by the assignment.
1146 pub fn candidate_indices(&self) -> &CandidateBitfield {
1147 &self.candidate_indices
1148 }
1149
1150 /// Returns the tranche this assignment is claimed at.
1151 pub fn tranche(&self) -> DelayTranche {
1152 self.tranche
1153 }
1154}
1155
1156/// A checked indirect signed approval vote.
1157///
1158/// The crypto for the vote has been validated and the signature can be trusted as being valid and
1159/// to correspond to the `validator_index` inside the structure.
1160#[derive(Debug, derive_more::Deref, derive_more::Into)]
1161pub struct CheckedIndirectSignedApprovalVote(IndirectSignedApprovalVoteV2);
1162
1163impl CheckedIndirectSignedApprovalVote {
1164 /// Builds a checked vote from a vote that was checked to be valid and correctly signed.
1165 pub fn from_checked(vote: IndirectSignedApprovalVoteV2) -> Self {
1166 Self(vote)
1167 }
1168}
1169
1170/// Message to the Approval Voting subsystem.
1171#[derive(Debug)]
1172pub enum ApprovalVotingMessage {
1173 /// Import an assignment into the approval-voting database.
1174 ///
1175 /// Should not be sent unless the block hash is known and the VRF assignment checks out.
1176 ImportAssignment(CheckedIndirectAssignment, Option<oneshot::Sender<AssignmentCheckResult>>),
1177 /// Import an approval vote into approval-voting database
1178 ///
1179 /// Should not be sent unless the block hash within the indirect vote is known, vote is
1180 /// correctly signed and we had a previous assignment for the candidate.
1181 ImportApproval(CheckedIndirectSignedApprovalVote, Option<oneshot::Sender<ApprovalCheckResult>>),
1182 /// Returns the highest possible ancestor hash of the provided block hash which is
1183 /// acceptable to vote on finality for.
1184 /// The `BlockNumber` provided is the number of the block's ancestor which is the
1185 /// earliest possible vote.
1186 ///
1187 /// It can also return the same block hash, if that is acceptable to vote upon.
1188 /// Return `None` if the input hash is unrecognized.
1189 ApprovedAncestor(Hash, BlockNumber, oneshot::Sender<Option<HighestApprovedAncestorBlock>>),
1190
1191 /// Retrieve all available approval signatures for a candidate from approval-voting.
1192 ///
1193 /// This message involves a linear search for candidates on each relay chain fork and also
1194 /// requires calling into `approval-distribution`: Calls should be infrequent and bounded.
1195 GetApprovalSignaturesForCandidate(
1196 CandidateHash,
1197 oneshot::Sender<HashMap<ValidatorIndex, (Vec<CandidateHash>, ValidatorSignature)>>,
1198 ),
1199}
1200
1201/// Message to the Approval Distribution subsystem.
1202#[derive(Debug, derive_more::From)]
1203pub enum ApprovalDistributionMessage {
1204 /// Notify the `ApprovalDistribution` subsystem about new blocks
1205 /// and the candidates contained within them.
1206 NewBlocks(Vec<BlockApprovalMeta>),
1207 /// Distribute an assignment cert from the local validator. The cert is assumed
1208 /// to be valid, relevant, and for the given relay-parent and validator index.
1209 DistributeAssignment(IndirectAssignmentCertV2, CandidateBitfield),
1210 /// Distribute an approval vote for the local validator. The approval vote is assumed to be
1211 /// valid, relevant, and the corresponding approval already issued.
1212 /// If not, the subsystem is free to drop the message.
1213 DistributeApproval(IndirectSignedApprovalVoteV2),
1214 /// An update from the network bridge.
1215 #[from]
1216 NetworkBridgeUpdate(NetworkBridgeEvent<net_protocol::ApprovalDistributionMessage>),
1217
1218 /// Get all approval signatures for all chains a candidate appeared in.
1219 GetApprovalSignatures(
1220 HashSet<(Hash, CandidateIndex)>,
1221 oneshot::Sender<HashMap<ValidatorIndex, (Hash, Vec<CandidateIndex>, ValidatorSignature)>>,
1222 ),
1223 /// Approval checking lag update measured in blocks.
1224 ApprovalCheckingLagUpdate(BlockNumber),
1225}
1226
1227/// Message to the Gossip Support subsystem.
1228#[derive(Debug, derive_more::From)]
1229pub enum GossipSupportMessage {
1230 /// Dummy constructor, so we can receive networking events.
1231 #[from]
1232 NetworkBridgeUpdate(NetworkBridgeEvent<net_protocol::GossipSupportNetworkMessage>),
1233}
1234
1235/// Request introduction of a seconded candidate into the prospective parachains subsystem.
1236#[derive(Debug, PartialEq, Eq, Clone)]
1237pub struct IntroduceSecondedCandidateRequest {
1238 /// The para-id of the candidate.
1239 pub candidate_para: ParaId,
1240 /// The candidate receipt itself.
1241 pub candidate_receipt: CommittedCandidateReceipt,
1242 /// The persisted validation data of the candidate.
1243 pub persisted_validation_data: PersistedValidationData,
1244}
1245
1246/// A hypothetical candidate to be evaluated for potential/actual membership
1247/// in the prospective parachains subsystem.
1248///
1249/// Hypothetical candidates are either complete or incomplete.
1250/// Complete candidates have already had their (potentially heavy)
1251/// candidate receipt fetched, while incomplete candidates are simply
1252/// claims about properties that a fetched candidate would have.
1253///
1254/// Complete candidates can be evaluated more strictly than incomplete candidates.
1255#[derive(Debug, PartialEq, Eq, Clone)]
1256pub enum HypotheticalCandidate {
1257 /// A complete candidate.
1258 Complete {
1259 /// The hash of the candidate.
1260 candidate_hash: CandidateHash,
1261 /// The receipt of the candidate.
1262 receipt: Arc<CommittedCandidateReceipt>,
1263 /// The persisted validation data of the candidate.
1264 persisted_validation_data: PersistedValidationData,
1265 },
1266 /// An incomplete candidate.
1267 Incomplete {
1268 /// The claimed hash of the candidate.
1269 candidate_hash: CandidateHash,
1270 /// The claimed para-ID of the candidate.
1271 candidate_para: ParaId,
1272 /// The claimed head-data hash of the candidate.
1273 parent_head_data_hash: Hash,
1274 /// The claimed relay parent of the candidate.
1275 candidate_relay_parent: Hash,
1276 },
1277}
1278
1279impl HypotheticalCandidate {
1280 /// Get the `CandidateHash` of the hypothetical candidate.
1281 pub fn candidate_hash(&self) -> CandidateHash {
1282 match *self {
1283 HypotheticalCandidate::Complete { candidate_hash, .. } => candidate_hash,
1284 HypotheticalCandidate::Incomplete { candidate_hash, .. } => candidate_hash,
1285 }
1286 }
1287
1288 /// Get the `ParaId` of the hypothetical candidate.
1289 pub fn candidate_para(&self) -> ParaId {
1290 match *self {
1291 HypotheticalCandidate::Complete { ref receipt, .. } => receipt.descriptor.para_id(),
1292 HypotheticalCandidate::Incomplete { candidate_para, .. } => candidate_para,
1293 }
1294 }
1295
1296 /// Get parent head data hash of the hypothetical candidate.
1297 pub fn parent_head_data_hash(&self) -> Hash {
1298 match *self {
1299 HypotheticalCandidate::Complete { ref persisted_validation_data, .. } =>
1300 persisted_validation_data.parent_head.hash(),
1301 HypotheticalCandidate::Incomplete { parent_head_data_hash, .. } =>
1302 parent_head_data_hash,
1303 }
1304 }
1305
1306 /// Get candidate's relay parent.
1307 pub fn relay_parent(&self) -> Hash {
1308 match *self {
1309 HypotheticalCandidate::Complete { ref receipt, .. } =>
1310 receipt.descriptor.relay_parent(),
1311 HypotheticalCandidate::Incomplete { candidate_relay_parent, .. } =>
1312 candidate_relay_parent,
1313 }
1314 }
1315
1316 /// Get the output head data hash, if the candidate is complete.
1317 pub fn output_head_data_hash(&self) -> Option<Hash> {
1318 match *self {
1319 HypotheticalCandidate::Complete { ref receipt, .. } =>
1320 Some(receipt.descriptor.para_head()),
1321 HypotheticalCandidate::Incomplete { .. } => None,
1322 }
1323 }
1324
1325 /// Get the candidate commitments, if the candidate is complete.
1326 pub fn commitments(&self) -> Option<&CandidateCommitments> {
1327 match *self {
1328 HypotheticalCandidate::Complete { ref receipt, .. } => Some(&receipt.commitments),
1329 HypotheticalCandidate::Incomplete { .. } => None,
1330 }
1331 }
1332
1333 /// Get the persisted validation data, if the candidate is complete.
1334 pub fn persisted_validation_data(&self) -> Option<&PersistedValidationData> {
1335 match *self {
1336 HypotheticalCandidate::Complete { ref persisted_validation_data, .. } =>
1337 Some(persisted_validation_data),
1338 HypotheticalCandidate::Incomplete { .. } => None,
1339 }
1340 }
1341
1342 /// Get the validation code hash, if the candidate is complete.
1343 pub fn validation_code_hash(&self) -> Option<ValidationCodeHash> {
1344 match *self {
1345 HypotheticalCandidate::Complete { ref receipt, .. } =>
1346 Some(receipt.descriptor.validation_code_hash()),
1347 HypotheticalCandidate::Incomplete { .. } => None,
1348 }
1349 }
1350}
1351
1352/// Request specifying which candidates are either already included
1353/// or might become included in fragment chain under a given active leaf (or any active leaf if
1354/// `fragment_chain_relay_parent` is `None`).
1355#[derive(Debug, PartialEq, Eq, Clone)]
1356pub struct HypotheticalMembershipRequest {
1357 /// Candidates, in arbitrary order, which should be checked for
1358 /// hypothetical/actual membership in fragment chains.
1359 pub candidates: Vec<HypotheticalCandidate>,
1360 /// Either a specific fragment chain to check, otherwise all.
1361 pub fragment_chain_relay_parent: Option<Hash>,
1362}
1363
1364/// A request for the persisted validation data stored in the prospective
1365/// parachains subsystem.
1366#[derive(Debug)]
1367pub struct ProspectiveValidationDataRequest {
1368 /// The para-id of the candidate.
1369 pub para_id: ParaId,
1370 /// The relay-parent of the candidate.
1371 pub candidate_relay_parent: Hash,
1372 /// The parent head-data.
1373 pub parent_head_data: ParentHeadData,
1374}
1375
1376/// The parent head-data hash with optional data itself.
1377#[derive(Debug, Clone)]
1378pub enum ParentHeadData {
1379 /// Parent head-data hash.
1380 OnlyHash(Hash),
1381 /// Parent head-data along with its hash.
1382 WithData {
1383 /// This will be provided for collations with elastic scaling enabled.
1384 head_data: HeadData,
1385 /// Parent head-data hash.
1386 hash: Hash,
1387 },
1388}
1389
1390impl ParentHeadData {
1391 /// Return the hash of the parent head-data.
1392 pub fn hash(&self) -> Hash {
1393 match self {
1394 ParentHeadData::OnlyHash(hash) => *hash,
1395 ParentHeadData::WithData { hash, .. } => *hash,
1396 }
1397 }
1398}
1399
1400/// Indicates the relay-parents whose fragment chain a candidate
1401/// is present in or can be added in (right now or in the future).
1402pub type HypotheticalMembership = Vec<Hash>;
1403
1404/// A collection of ancestor candidates of a parachain.
1405pub type Ancestors = HashSet<CandidateHash>;
1406
1407/// Messages sent to the Prospective Parachains subsystem.
1408#[derive(Debug)]
1409pub enum ProspectiveParachainsMessage {
1410 /// Inform the Prospective Parachains Subsystem of a new seconded candidate.
1411 ///
1412 /// The response sender returns false if the candidate was rejected by prospective parachains,
1413 /// true otherwise (if it was accepted or already present)
1414 IntroduceSecondedCandidate(IntroduceSecondedCandidateRequest, oneshot::Sender<bool>),
1415 /// Inform the Prospective Parachains Subsystem that a previously introduced candidate
1416 /// has been backed. This requires that the candidate was successfully introduced in
1417 /// the past.
1418 CandidateBacked(ParaId, CandidateHash),
1419 /// Try getting N backable candidate hashes along with their relay parents for the given
1420 /// parachain, under the given relay-parent hash, which is a descendant of the given ancestors.
1421 /// Timed out ancestors should not be included in the collection.
1422 /// N should represent the number of scheduled cores of this ParaId.
1423 /// A timed out ancestor frees the cores of all of its descendants, so if there's a hole in the
1424 /// supplied ancestor path, we'll get candidates that backfill those timed out slots first. It
1425 /// may also return less/no candidates, if there aren't enough backable candidates recorded.
1426 GetBackableCandidates(
1427 Hash,
1428 ParaId,
1429 u32,
1430 Ancestors,
1431 oneshot::Sender<Vec<(CandidateHash, Hash)>>,
1432 ),
1433 /// Get the hypothetical or actual membership of candidates with the given properties
1434 /// under the specified active leave's fragment chain.
1435 ///
1436 /// For each candidate, we return a vector of leaves where the candidate is present or could be
1437 /// added. "Could be added" either means that the candidate can be added to the chain right now
1438 /// or could be added in the future (we may not have its ancestors yet).
1439 /// Note that even if we think it could be added in the future, we may find out that it was
1440 /// invalid, as time passes.
1441 /// If an active leaf is not in the vector, it means that there's no
1442 /// chance this candidate will become valid under that leaf in the future.
1443 ///
1444 /// If `fragment_chain_relay_parent` in the request is `Some()`, the return vector can only
1445 /// contain this relay parent (or none).
1446 GetHypotheticalMembership(
1447 HypotheticalMembershipRequest,
1448 oneshot::Sender<Vec<(HypotheticalCandidate, HypotheticalMembership)>>,
1449 ),
1450 /// Get the minimum accepted relay-parent number for each para in the fragment chain
1451 /// for the given relay-chain block hash.
1452 ///
1453 /// That is, if the block hash is known and is an active leaf, this returns the
1454 /// minimum relay-parent block number in the same branch of the relay chain which
1455 /// is accepted in the fragment chain for each para-id.
1456 ///
1457 /// If the block hash is not an active leaf, this will return an empty vector.
1458 ///
1459 /// Para-IDs which are omitted from this list can be assumed to have no
1460 /// valid candidate relay-parents under the given relay-chain block hash.
1461 ///
1462 /// Para-IDs are returned in no particular order.
1463 GetMinimumRelayParents(Hash, oneshot::Sender<Vec<(ParaId, BlockNumber)>>),
1464 /// Get the validation data of some prospective candidate. The candidate doesn't need
1465 /// to be part of any fragment chain, but this only succeeds if the parent head-data and
1466 /// relay-parent are part of the `CandidateStorage` (meaning that it's a candidate which is
1467 /// part of some fragment chain or which prospective-parachains predicted will become part of
1468 /// some fragment chain).
1469 GetProspectiveValidationData(
1470 ProspectiveValidationDataRequest,
1471 oneshot::Sender<Option<PersistedValidationData>>,
1472 ),
1473}