blob: e8e48f7d9f8928031788fb6d52fafff8244c1bc5 (
plain) (
tree)
|
|
// (c) 2019-2020, Ava Labs, Inc. All rights reserved.
// See the file LICENSE for licensing terms.
package evm
import (
"fmt"
"github.com/ava-labs/gecko/database"
"github.com/ava-labs/gecko/ids"
"github.com/ava-labs/gecko/utils/crypto"
"github.com/ava-labs/gecko/utils/hashing"
"github.com/ava-labs/gecko/vms/components/verify"
"github.com/ava-labs/gecko/vms/secp256k1fx"
)
// UnsignedAtomicTx ...
type UnsignedAtomicTx interface {
initialize(vm *VM, bytes []byte) error
ID() ids.ID
// UTXOs this tx consumes
InputUTXOs() ids.Set
// Attempts to verify this transaction with the provided state.
SemanticVerify(db database.Database, creds []verify.Verifiable) TxError
Accept(database.Batch) error
}
// AtomicTx is an operation that can be decided without being proposed, but must
// have special control over database commitment
type AtomicTx struct {
UnsignedAtomicTx `serialize:"true"`
// Credentials that authorize the inputs to be spent
Credentials []verify.Verifiable `serialize:"true" json:"credentials"`
}
func (vm *VM) signAtomicTx(tx *AtomicTx, signers [][]*crypto.PrivateKeySECP256K1R) error {
unsignedBytes, err := vm.codec.Marshal(tx.UnsignedAtomicTx)
if err != nil {
return fmt.Errorf("couldn't marshal UnsignedAtomicTx: %w", err)
}
// Attach credentials
hash := hashing.ComputeHash256(unsignedBytes)
tx.Credentials = make([]verify.Verifiable, len(signers))
for i, credKeys := range signers {
cred := &secp256k1fx.Credential{
Sigs: make([][crypto.SECP256K1RSigLen]byte, len(credKeys)),
}
for j, key := range credKeys {
sig, err := key.SignHash(hash) // Sign hash
if err != nil {
return fmt.Errorf("problem generating credential: %w", err)
}
copy(cred.Sigs[j][:], sig)
}
tx.Credentials[i] = cred // Attach credential
}
txBytes, err := vm.codec.Marshal(tx)
if err != nil {
return fmt.Errorf("couldn't marshal AtomicTx: %w", err)
}
return tx.initialize(vm, txBytes)
}
|