hashiverse_lib/protocol/rpc/
rpc_request.rs1use crate::protocol::payload::payload::PayloadRequestKind;
21use crate::tools::parallel_pow_generator::ParallelPowGenerator;
22use crate::tools::server_id::ServerId;
23use crate::tools::time::{TimeMillis, TimeMillisBytes, TIME_MILLIS_BYTES};
24use crate::tools::time_provider::time_provider::TimeProvider;
25use crate::tools::types::{Hash, Id, PQCommitmentBytes, Pow, Salt, VerificationKeyBytes, HASH_BYTES, ID_BYTES, SALT_BYTES};
26use crate::tools::{compression, config, hashing};
27use bitflags::bitflags;
28use bytes::{Buf, BufMut, Bytes, BytesMut};
29
30bitflags! {
31 pub struct RpcRequestPacketTxFlags: u8 {
32 const COMPRESSED = 1 << 0;
33 const SERVER_KNOWN = 1 << 1;
34 }
35}
36
37pub struct RpcRequestPacketTx {
50 pub pow_content_hash: Hash,
51 pub bytes: Bytes,
52}
53impl RpcRequestPacketTx {
54 pub async fn encode(
55 time_provider: &dyn TimeProvider,
56 pow_minimum_per_rpc: Pow,
57 flags: RpcRequestPacketTxFlags,
58 payload_request_kind: PayloadRequestKind,
59 pow_sponsor_id: &Id,
60 destination_verification_key_bytes: &VerificationKeyBytes,
61 destination_pq_commitment_bytes: &PQCommitmentBytes,
62 payload_uncompressed: Bytes,
63 pow_generator: &dyn ParallelPowGenerator,
64 ) -> anyhow::Result<Self> {
65 let payload_compressed = match flags.contains(RpcRequestPacketTxFlags::COMPRESSED) {
67 true => compression::compress_for_speed(payload_uncompressed.as_ref())?.to_bytes(),
68 false => payload_uncompressed,
69 };
70
71 if payload_compressed.len() > config::PROTOCOL_MAX_BLOB_SIZE_REQUEST {
73 anyhow::bail!("request payload size exceeds maximum allowed size: {} > {}", payload_compressed.len(), config::PROTOCOL_MAX_BLOB_SIZE_REQUEST);
74 }
75
76 let pow_content_hash: Hash = hashing::hash(payload_compressed.as_ref());
78
79 let pow_label = format!("rpc:{}", payload_request_kind);
81 let (pow_timestamp, pow_salt, _, _) = ServerId::pow_generate(&pow_label, time_provider, pow_minimum_per_rpc, pow_sponsor_id, destination_verification_key_bytes, destination_pq_commitment_bytes, &pow_content_hash, pow_generator).await?;
82
83 let mut bytes_mut = BytesMut::with_capacity(size_of::<u8>() + size_of::<u8>() + size_of::<u16>() + ID_BYTES + TIME_MILLIS_BYTES + HASH_BYTES + SALT_BYTES + size_of::<u32>() + payload_compressed.len());
85 bytes_mut.put_u8(1);
86 bytes_mut.put_u8(flags.bits());
87 bytes_mut.put_u16_le(payload_request_kind as u16);
88 bytes_mut.put_slice(pow_sponsor_id.as_ref());
89 bytes_mut.put_slice(pow_timestamp.encode_be().as_ref());
90 bytes_mut.put_slice(pow_content_hash.as_ref());
91 bytes_mut.put_slice(pow_salt.as_ref());
92 bytes_mut.put_u32_le(payload_compressed.len() as u32);
93 bytes_mut.put_slice(&payload_compressed);
94
95 let bytes = bytes_mut.freeze();
96
97 Ok(Self { pow_content_hash, bytes })
98 }
99}
100
101#[derive(Debug)]
111pub struct RpcRequestPacketRx {
112 pub payload_request_kind: PayloadRequestKind,
113 pub pow_sponsor_id: Id,
114 pub pow_server_known: bool,
115 pub pow: Pow,
116 pub pow_timestamp: TimeMillis,
117 pub pow_content_hash: Hash,
118 pub pow_salt: Salt,
119 pub bytes: Bytes,
120}
121impl RpcRequestPacketRx {
122 pub fn decode(current_time_millis: &TimeMillis, verification_key_bytes: &VerificationKeyBytes, pq_commitment_bytes: &PQCommitmentBytes, mut response_bytes: Bytes) -> anyhow::Result<Self> {
123 if response_bytes.len() < size_of::<u8>() + size_of::<u8>() + size_of::<u16>() + ID_BYTES + TIME_MILLIS_BYTES + HASH_BYTES + SALT_BYTES + size_of::<u32>() {
125 anyhow::bail!("RpcRequestPacket is too short for header");
126 }
127
128 let version = response_bytes.get_u8();
129 if 1 != version {
130 anyhow::bail!("Unsupported RpcRequestPacket version: {}", version);
131 }
132
133 let flags = RpcRequestPacketTxFlags::from_bits(response_bytes.get_u8()).ok_or_else(|| anyhow::anyhow!("Invalid RpcRequestPacket flags"))?;
134 let payload_request_kind = PayloadRequestKind::from_u16(response_bytes.get_u16_le())?;
135 let pow_sponsor_id = Id::from_slice(response_bytes.slice(..ID_BYTES).as_ref())?;
136 response_bytes.advance(ID_BYTES);
137 let pow_timestamp_bytes: TimeMillisBytes = TimeMillisBytes::from_bytes(response_bytes.slice(..TIME_MILLIS_BYTES).as_ref())?;
138 response_bytes.advance(TIME_MILLIS_BYTES);
139 let pow_content_hash: Hash = Hash::from_slice(response_bytes.slice(..HASH_BYTES).as_ref())?;
140 response_bytes.advance(HASH_BYTES);
141 let pow_salt = Salt::from_slice(response_bytes.slice(..SALT_BYTES).as_ref())?;
142 response_bytes.advance(SALT_BYTES);
143
144 let pow_timestamp = TimeMillis::timestamp_decode_be(&pow_timestamp_bytes);
146 {
147 let delta_millis = (*current_time_millis - pow_timestamp).abs();
148 if delta_millis.0 > config::POW_MAX_CLOCK_DRIFT_MILLIS.0 {
149 anyhow::bail!("Client pow clock drift too large: us={} them={}", current_time_millis, pow_timestamp);
150 }
151 }
152
153 let (pow, pow_server_known) = match flags.contains(RpcRequestPacketTxFlags::SERVER_KNOWN) {
155 true => {
156 let (pow, _) = ServerId::pow_measure(&pow_sponsor_id, verification_key_bytes, pq_commitment_bytes, &pow_timestamp_bytes, &pow_content_hash, &pow_salt)?;
157 if pow < config::POW_MINIMUM_PER_RPC_SERVER_KNOWN {
158 anyhow::bail!("Client has not done enough known pow: {} < {}", pow, config::POW_MINIMUM_PER_RPC_SERVER_KNOWN);
159 }
160 (pow, true)
161 }
162 false => {
163 let (pow, _) = ServerId::pow_measure(&pow_sponsor_id, &VerificationKeyBytes::zero(), &PQCommitmentBytes::zero(), &pow_timestamp_bytes, &pow_content_hash, &pow_salt)?;
164 if pow < config::POW_MINIMUM_PER_RPC_SERVER_UNKNOWN {
165 anyhow::bail!("Client has not done enough unknown pow: {} < {}", pow, config::POW_MINIMUM_PER_RPC_SERVER_UNKNOWN);
166 }
167 (pow, false)
168 }
169 };
170
171 let request_payload_len = response_bytes.get_u32_le() as usize;
172
173 if request_payload_len > config::PROTOCOL_MAX_BLOB_SIZE_REQUEST {
174 anyhow::bail!("RpcRequestPacket payload too large: {} > {}", request_payload_len, config::PROTOCOL_MAX_BLOB_SIZE_REQUEST);
175 }
176
177 if response_bytes.len() < request_payload_len {
179 anyhow::bail!("RpcRequestPacket is too short for payload");
180 }
181
182 let response_payload = response_bytes.slice(..request_payload_len);
183 response_bytes.advance(request_payload_len);
184
185 if !response_bytes.is_empty() {
187 anyhow::bail!("RpcRequestPacket is too long");
188 }
189
190 let response_payload_decompressed = match flags.contains(RpcRequestPacketTxFlags::COMPRESSED) {
192 true => compression::decompress(response_payload.as_ref())?.to_bytes(),
193 false => response_payload,
194 };
195
196 let selfie = Self {
197 payload_request_kind,
198 pow_sponsor_id,
199 pow_server_known,
200 pow,
201 pow_timestamp,
202 pow_content_hash,
203 pow_salt,
204 bytes: response_payload_decompressed,
205 };
206 Ok(selfie)
209 }
210}
211