Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix calls to out of order escrow #873

Merged
merged 2 commits into from
Oct 10, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions scripts/demo/basic/challenge.sh
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,9 @@ kli ends add --name cha2 --alias cha2 --eid BLskRTInXnMxWaGqcpSyMgo0nYbalW99cGZE
cha1_oobi="$(kli oobi generate --name cha1 --alias cha1 --role witness | sed -n '2 p')"
cha2_oobi="$(kli oobi generate --name cha2 --alias cha2 --role witness | sed -n '2 p')"

echo "${cha1_oobi}"
echo "${cha2_oobi}"

kli oobi resolve --name cha1 --oobi-alias cha2 --oobi "${cha2_oobi}"
kli oobi resolve --name cha2 --oobi-alias cha1 --oobi "${cha1_oobi}"

Expand Down
16 changes: 8 additions & 8 deletions src/keri/app/cli/commands/did/generate.py
Original file line number Diff line number Diff line change
Expand Up @@ -73,20 +73,20 @@ def generate(tymth, tock=0.0, **opts):
sys.exit(-1)

wit = random.choice(hab.kever.wits)
urls = hab.fetchUrls(eid=wit, scheme=kering.Schemes.http) or hab.fetchUrls(eid=wit, scheme=kering.Schemes.https)
urls = hab.fetchUrls(eid=wit, scheme=kering.Schemes.http) \
or hab.fetchUrls(eid=wit, scheme=kering.Schemes.https)
if not urls:
raise kering.ConfigurationError(f"unable to query witness {wit}, no http endpoint")

url = urls[kering.Schemes.http] if kering.Schemes.http in urls else urls[kering.Schemes.https]
up = urlparse(url)
enc = urllib.parse.quote_plus(f"{up.scheme}://{up.hostname}:{up.port}/oobi/{hab.pre}/witness")
url = urls[kering.Schemes.https] if kering.Schemes.https in urls else urls[kering.Schemes.http]
enc = urllib.parse.quote_plus(f"{url.rstrip("/")}/oobi/{hab.pre}/witness")
print(f"did:keri:{hab.pre}?oobi={enc}")
elif role in (kering.Roles.controller,):
urls = hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.http) or hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.https)
urls = hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.http) \
or hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.https)
if not urls:
print(f"{alias} identifier {hab.pre} does not have any controller endpoints")
return
url = urls[kering.Schemes.http] if kering.Schemes.http in urls else urls[kering.Schemes.https]
up = urlparse(url)
enc = urllib.parse.quote_plus(f"{up.scheme}://{up.hostname}:{up.port}/oobi/{hab.pre}/controller")
url = urls[kering.Schemes.https] if kering.Schemes.https in urls else urls[kering.Schemes.http]
enc = urllib.parse.quote_plus(f"{url.rstrip("/")}/oobi/{hab.pre}/controller")
print(f"did:keri:{hab.pre}?oobi={enc}")
4 changes: 2 additions & 2 deletions src/keri/app/cli/commands/ipex/grant.py
Original file line number Diff line number Diff line change
Expand Up @@ -111,8 +111,8 @@ def grantDo(self, tymth, tock=0.0):
iserder = serdering.SerderKERI(raw=bytes(iss))
seqner = coring.Seqner(sn=iserder.sn)

serder = self.hby.db.fetchAllSealingEventByEventSeal(creder.sad['i'],
seal=dict(i=iserder.pre, s=seqner.snh, d=iserder.said))
serder = self.hby.db.fetchLastSealingEventByEventSeal(creder.sad['i'],
seal=dict(i=iserder.pre, s=seqner.snh, d=iserder.said))
anc = self.hby.db.cloneEvtMsg(pre=serder.pre, fn=0, dig=serder.said)

exn, atc = protocoling.ipexGrantExn(hab=self.hab, recp=recp, message=self.message, acdc=acdc, iss=iss, anc=anc,
Expand Down
22 changes: 10 additions & 12 deletions src/keri/app/cli/commands/oobi/generate.py
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@

"""
import argparse
from urllib.parse import urlparse

import sys
from hio import help
Expand Down Expand Up @@ -66,21 +65,21 @@ def generate(tymth, tock=0.0, **opts):
sys.exit(-1)

for wit in hab.kever.wits:
urls = hab.fetchUrls(eid=wit, scheme=kering.Schemes.http) or hab.fetchUrls(eid=wit, scheme=kering.Schemes.https)
urls = hab.fetchUrls(eid=wit, scheme=kering.Schemes.http) \
or hab.fetchUrls(eid=wit, scheme=kering.Schemes.https)
if not urls:
raise kering.ConfigurationError(f"unable to query witness {wit}, no http endpoint")

url = urls[kering.Schemes.http] if kering.Schemes.http in urls else urls[kering.Schemes.https]
up = urlparse(url)
print(f"{up.scheme}://{up.hostname}:{up.port}/oobi/{hab.pre}/witness")
url = urls[kering.Schemes.https] if kering.Schemes.https in urls else urls[kering.Schemes.http]
print(f"{url.rstrip("/")}/oobi/{hab.pre}/witness")
elif role in (kering.Roles.controller,):
urls = hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.http) or hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.https)
urls = hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.http) \
or hab.fetchUrls(eid=hab.pre, scheme=kering.Schemes.https)
if not urls:
print(f"{alias} identifier {hab.pre} does not have any controller endpoints")
return
url = urls[kering.Schemes.http] if kering.Schemes.http in urls else urls[kering.Schemes.https]
up = urlparse(url)
print(f"{up.scheme}://{up.hostname}:{up.port}/oobi/{hab.pre}/controller")
url = urls[kering.Schemes.https] if kering.Schemes.https in urls else urls[kering.Schemes.http]
print(f"{url.rstrip("/")}/oobi/{hab.pre}/controller")
elif role in (kering.Roles.mailbox,):
for (_, _, eid), end in hab.db.ends.getItemIter(keys=(hab.pre, kering.Roles.mailbox, )):
if not (end.allowed and end.enabled is not False):
Expand All @@ -91,6 +90,5 @@ def generate(tymth, tock=0.0, **opts):
if not urls:
print(f"{alias} identifier {hab.pre} does not have any mailbox endpoints")
return
url = urls[kering.Schemes.http] if kering.Schemes.http in urls else urls[kering.Schemes.https]
up = urlparse(url)
print(f"{up.scheme}://{up.hostname}:{up.port}/oobi/{hab.pre}/mailbox/{eid}")
url = urls[kering.Schemes.https] if kering.Schemes.https in urls else urls[kering.Schemes.http]
print(f"{url.rstrip("/")}/oobi/{hab.pre}/mailbox/{eid}")
2 changes: 1 addition & 1 deletion src/keri/app/delegating.py
Original file line number Diff line number Diff line change
Expand Up @@ -138,7 +138,7 @@ def processUnanchoredEscrow(self):
dkever = self.hby.kevers[kever.delpre]

seal = dict(i=serder.pre, s=serder.snh, d=serder.said)
if dserder := self.hby.db.fetchAllSealingEventByEventSeal(dkever.prefixer.qb64, seal=seal):
if dserder := self.hby.db.fetchLastSealingEventByEventSeal(dkever.prefixer.qb64, seal=seal):
seqner = coring.Seqner(sn=dserder.sn)
couple = seqner.qb64b + dserder.saidb
dgkey = dbing.dgKey(kever.prefixer.qb64b, kever.serder.saidb)
Expand Down
4 changes: 2 additions & 2 deletions src/keri/app/grouping.py
Original file line number Diff line number Diff line change
Expand Up @@ -171,8 +171,8 @@ def processDelegateEscrow(self):
self.hby.db.cgms.put(keys=(pre, seqner.qb64), val=saider)

else: # Not witnesser, we need to look for the anchor and then wait for receipts
if serder := self.hby.db.fetchAllSealingEventByEventSeal(kever.delpre,
seal=anchor):
if serder := self.hby.db.fetchLastSealingEventByEventSeal(kever.delpre,
seal=anchor):
aseq = coring.Seqner(sn=serder.sn)
couple = aseq.qb64b + serder.saidb
dgkey = dbing.dgKey(pre, saider.qb64b)
Expand Down
11 changes: 5 additions & 6 deletions src/keri/app/oobiing.py
Original file line number Diff line number Diff line change
Expand Up @@ -115,15 +115,15 @@ def on_get_alias(self, req, rep, alias=None):
if role in (kering.Roles.witness,): # Fetch URL OOBIs for all witnesses
oobis = []
for wit in hab.kever.wits:
urls = hab.fetchUrls(eid=wit, scheme=kering.Schemes.http) or hab.fetchUrls(eid=wit, scheme=kering.Schemes.https)
urls = hab.fetchUrls(eid=wit, scheme=kering.Schemes.http) \
or hab.fetchUrls(eid=wit, scheme=kering.Schemes.https)
if not urls:
rep.status = falcon.HTTP_404
rep.text = f"unable to query witness {wit}, no http endpoint"
return

url = urls[kering.Schemes.http] if kering.Schemes.http in urls else urls[kering.Schemes.https]
up = urlparse(url)
oobis.append(f"{up.scheme}://{up.hostname}:{up.port}/oobi/{hab.pre}/witness/{wit}")
url = urls[kering.Schemes.https] if kering.Schemes.https in urls else urls[kering.Schemes.http]
oobis.append(f"{url.rstrip("/")}/oobi/{hab.pre}/witness/{wit}")
res["oobis"] = oobis
elif role in (kering.Roles.controller,): # Fetch any controller URL OOBIs
oobis = []
Expand All @@ -134,8 +134,7 @@ def on_get_alias(self, req, rep, alias=None):
rep.text = f"unable to query controller {hab.pre}, no http endpoint"
return
url = urls[kering.Schemes.http] if kering.Schemes.http in urls else urls[kering.Schemes.https]
up = urlparse(url)
oobis.append(f"{up.scheme}://{up.hostname}:{up.port}/oobi/{hab.pre}/controller")
oobis.append(f"{url.rstrip("/")}/oobi/{hab.pre}/controller")
res["oobis"] = oobis
else:
rep.status = falcon.HTTP_404
Expand Down
3 changes: 1 addition & 2 deletions src/keri/app/querying.py
Original file line number Diff line number Diff line change
Expand Up @@ -140,8 +140,7 @@ def recur(self, tyme, deeds=None):
if self.pre not in self.hab.kevers:
return False

kever = self.hab.kevers[self.pre]
if self.hby.db.fetchAllSealingEventByEventSeal(self.pre, seal=self.anchor):
if self.hby.db.fetchLastSealingEventByEventSeal(self.pre, seal=self.anchor):
self.remove([self.witq])
return True

Expand Down
18 changes: 9 additions & 9 deletions src/keri/core/eventing.py
Original file line number Diff line number Diff line change
Expand Up @@ -3020,22 +3020,22 @@ def fetchDelegatingEvent(self, delpre, serder, *, original=True, eager=False):
dserder = serdering.SerderKERI(raw=bytes(raw))
return dserder

elif eager: #missing aes but try to find seal by walking delegator's KEL
elif eager: # missing aes but try to find seal by walking delegator's KEL
seal = SealEvent(i=serder.pre, s=serder.snh, d=serder.said)._asdict
if original: # search all events in delegator's kel not just last
if not (dserder:=self.db.fetchAllSealingEventByEventSeal(pre=delpre,
seal=seal)):
if not (dserder := self.db.fetchLastSealingEventByEventSeal(pre=delpre,
seal=seal)):
# database broken this should never happen so do not validate
# since original must have been validated so it must have
# all its delegation chain.
raise ValidationError(f"Missing delegation source seal for {serder.ked}")
else: # only search last events in delegator's kel
if not (dserder:=self.db.fetchLastSealingEventByEventSeal(pre=delpre,
seal=seal)):
else: # only search last events in delegator's kel
if not (dserder := self.db.fetchLastSealingEventByEventSeal(pre=delpre,
seal=seal)):
# superseding delegation may not have happened yet so escrow
# ToDo XXXX need to cue up to get latest events in
# delegator's kel.
#raise ValidationError(f"Missing delegation source seal for {serder.ked}")
# raise ValidationError(f"Missing delegation source seal for {serder.ked}")
return None

# Only repair .aess when found delegation is for delegated event that
Expand Down Expand Up @@ -3788,7 +3788,7 @@ def processEvent(self, serder, sigers, *, wigers=None,

else: # not inception so can't verify sigs etc, add to out-of-order escrow
self.escrowOOEvent(serder=serder, sigers=sigers,
seqner=delseqner, saider=delsaider, wigers=wigers)
seqner=delseqner, saider=delsaider, wigers=wigers, local=local)
raise OutOfOrderError("Out-of-order event={}.".format(ked))

else: # already accepted inception event for pre so already first seen
Expand Down Expand Up @@ -3829,7 +3829,7 @@ def processEvent(self, serder, sigers, *, wigers=None,
if sn > sno: # sn later than sno so out of order escrow
# escrow out-of-order event
self.escrowOOEvent(serder=serder, sigers=sigers,
seqner=delseqner, saider=delsaider, wigers=wigers)
seqner=delseqner, saider=delsaider, wigers=wigers, local=local)
raise OutOfOrderError("Out-of-order event={}.".format(ked))

elif ((sn == sno) or # inorder event (ixn, rot, drt) or
Expand Down
1 change: 0 additions & 1 deletion src/keri/db/basing.py
Original file line number Diff line number Diff line change
Expand Up @@ -1700,7 +1700,6 @@ def fetchAllSealingEventByEventSeal(self, pre, seal, sn=0):
# use alias here until can change everywhere for backwards compatibility
findAnchoringSealEvent = fetchAllSealingEventByEventSeal # alias


def fetchLastSealingEventByEventSeal(self, pre, seal, sn=0):
"""
Search through a KEL for the last event at any sn but that contains a
Expand Down
Loading