hopr_protocol_hopr/codec/
encoder.rs1use hopr_api::chain::*;
2use hopr_crypto_packet::prelude::*;
3use hopr_crypto_types::{crypto_traits::Randomizable, prelude::*};
4use hopr_internal_types::prelude::*;
5use hopr_network_types::prelude::*;
6use hopr_primitive_types::prelude::*;
7use tracing::Instrument;
8
9use crate::{
10 HoprCodecConfig, OutgoingPacket, PacketEncoder, SurbStore, TicketCreationError, TicketTracker,
11 errors::HoprProtocolError,
12};
13
14pub const MAX_ACKNOWLEDGEMENTS_BATCH_SIZE: usize =
19 (HoprPacket::PAYLOAD_SIZE - size_of::<u16>()) / Acknowledgement::SIZE;
20
21pub struct HoprEncoder<Chain, S, T> {
23 chain_api: Chain,
24 surb_store: S,
25 tracker: T,
26 chain_key: ChainKeypair,
27 channels_dst: Hash,
28 cfg: HoprCodecConfig,
29}
30
31impl<Chain, S, T> HoprEncoder<Chain, S, T> {
32 pub fn new(
34 chain_key: ChainKeypair,
35 chain_api: Chain,
36 surb_store: S,
37 tracker: T,
38 channels_dst: Hash,
39 cfg: HoprCodecConfig,
40 ) -> Self {
41 Self {
42 chain_api,
43 surb_store,
44 tracker,
45 chain_key,
46 channels_dst,
47 cfg,
48 }
49 }
50}
51
52impl<Chain, S, T> HoprEncoder<Chain, S, T>
53where
54 Chain: ChainKeyOperations + ChainReadChannelOperations + ChainValues + Sync,
55 S: SurbStore,
56 T: TicketTracker + Sync,
57{
58 async fn encode_packet_internal<D: AsRef<[u8]> + Send + 'static, Sig: Into<PacketSignals> + Send + 'static>(
59 &self,
60 next_peer: OffchainPublicKey,
61 data: D,
62 num_hops: usize,
63 signals: Sig,
64 routing: PacketRouting<ValidatedPath>,
65 pseudonym: HoprPseudonym,
66 ) -> Result<OutgoingPacket, HoprProtocolError> {
67 let next_peer = self
68 .chain_api
69 .packet_key_to_chain_key(&next_peer)
70 .await
71 .map_err(|e| HoprProtocolError::ResolverError(e.into()))?
72 .ok_or(HoprProtocolError::KeyNotFound)?;
73
74 let next_ticket = if num_hops > 1 {
76 let channel = self
77 .chain_api
78 .channel_by_parties(self.chain_key.as_ref(), &next_peer)
79 .await
80 .map_err(|e| HoprProtocolError::ResolverError(e.into()))?
81 .ok_or_else(|| HoprProtocolError::ChannelNotFound(*self.chain_key.as_ref(), next_peer))?;
82
83 let (outgoing_ticket_win_prob, outgoing_ticket_price) = self
84 .chain_api
85 .outgoing_ticket_values(self.cfg.outgoing_win_prob, self.cfg.outgoing_ticket_price)
86 .await
87 .map_err(|e| HoprProtocolError::ResolverError(e.into()))?;
88
89 self.tracker
90 .create_multihop_ticket(
91 &channel,
92 num_hops as u8,
93 outgoing_ticket_win_prob,
94 outgoing_ticket_price,
95 )
96 .await
97 .map_err(|e| match e {
98 TicketCreationError::OutOfFunds(id, a) => HoprProtocolError::OutOfFunds(id, a),
99 e => HoprProtocolError::TicketTrackerError(e.into()),
100 })?
101 } else {
102 TicketBuilder::zero_hop().counterparty(next_peer)
103 };
104
105 let chain_key = self.chain_key.clone();
107 let mapper = self.chain_api.key_id_mapper_ref().clone();
108 let domain_separator = self.channels_dst;
109 let (packet, openers) = hopr_parallelize::cpu::spawn_fifo_blocking(move || {
110 HoprPacket::into_outgoing(
111 data.as_ref(),
112 &pseudonym,
113 routing,
114 &chain_key,
115 next_ticket,
116 &mapper,
117 &domain_separator,
118 signals,
119 )
120 })
121 .await?;
122
123 openers.into_iter().for_each(|(surb_id, opener)| {
126 self.surb_store
127 .insert_reply_opener(HoprSenderId::from_pseudonym_and_id(&pseudonym, surb_id), opener);
128 });
129
130 let out = packet.try_as_outgoing().ok_or(HoprProtocolError::InvalidState(
131 "cannot send out packet that is not outgoing",
132 ))?;
133
134 let mut transport_payload = Vec::with_capacity(HoprPacket::SIZE);
135 transport_payload.extend_from_slice(out.packet.as_ref());
136 transport_payload.extend_from_slice(&out.ticket.into_encoded());
137
138 Ok(OutgoingPacket {
139 next_hop: out.next_hop,
140 ack_challenge: out.ack_challenge,
141 data: transport_payload.into_boxed_slice(),
142 })
143 }
144}
145
146#[async_trait::async_trait]
147impl<Chain, S, T> PacketEncoder for HoprEncoder<Chain, S, T>
148where
149 Chain: ChainKeyOperations + ChainReadChannelOperations + ChainValues + Send + Sync,
150 S: SurbStore + Send + Sync,
151 T: TicketTracker + Send + Sync,
152{
153 type Error = HoprProtocolError;
154
155 #[tracing::instrument(skip_all, level = "trace")]
156 async fn encode_packet<D: AsRef<[u8]> + Send + 'static, Sig: Into<PacketSignals> + Send + 'static>(
157 &self,
158 data: D,
159 routing: ResolvedTransportRouting,
160 signals: Sig,
161 ) -> Result<OutgoingPacket, Self::Error> {
162 let (next_peer, num_hops, pseudonym, routing) = match routing {
164 ResolvedTransportRouting::Forward {
165 pseudonym,
166 forward_path,
167 return_paths,
168 } => (
169 forward_path[0],
170 forward_path.num_hops(),
171 pseudonym,
172 PacketRouting::ForwardPath {
173 forward_path,
174 return_paths,
175 },
176 ),
177 ResolvedTransportRouting::Return(sender_id, surb) => {
178 let next = self
179 .chain_api
180 .key_id_mapper_ref()
181 .map_id_to_public(&surb.first_relayer)
182 .ok_or(HoprProtocolError::KeyNotFound)?;
183
184 (
185 next,
186 surb.additional_data_receiver.proof_of_relay_values().chain_length() as usize,
187 sender_id.pseudonym(),
188 PacketRouting::Surb(sender_id.surb_id(), surb),
189 )
190 }
191 };
192
193 tracing::trace!(len = data.as_ref().len(), "encoding packet");
194 self.encode_packet_internal(next_peer, data, num_hops, signals, routing, pseudonym)
195 .in_current_span()
196 .await
197 }
198
199 #[tracing::instrument(skip_all, level = "trace", fields(destination = destination.to_peerid_str()))]
200 async fn encode_acknowledgements(
201 &self,
202 acks: &[VerifiedAcknowledgement],
203 destination: &OffchainPublicKey,
204 ) -> Result<OutgoingPacket, Self::Error> {
205 tracing::trace!(num_acks = acks.len(), "encoding acknowledgements");
206
207 let mut all_acks = Vec::<u8>::with_capacity(size_of::<u16>() + acks.len() * Acknowledgement::SIZE);
208 all_acks.extend((acks.len() as u16).to_be_bytes());
209 acks.iter().for_each(|ack| all_acks.extend(ack.leak().as_ref()));
210
211 self.encode_packet_internal(
212 *destination,
213 all_acks,
214 0,
215 None,
216 PacketRouting::NoAck(*destination),
217 HoprPseudonym::random(),
218 )
219 .in_current_span()
220 .await
221 }
222}