Skip to content

Commit

Permalink
fix: Remove tss encryption key from node-related protos (#16512)
Browse files Browse the repository at this point in the history
Signed-off-by: Matt Hess <[email protected]>
  • Loading branch information
mhess-swl authored Nov 8, 2024
1 parent ad90f11 commit 0b5326a
Show file tree
Hide file tree
Showing 6 changed files with 12 additions and 94 deletions.
23 changes: 0 additions & 23 deletions hapi/hedera-protobufs/services/node_create.proto
Original file line number Diff line number Diff line change
Expand Up @@ -137,27 +137,4 @@ message NodeCreateTransactionBody {
* This field is REQUIRED and MUST NOT be set to an empty `KeyList`.
*/
proto.Key admin_key = 7;

/**
* An ALT_BN128 elliptic curve public encryption key.<br/>
* This is controlled by the node operator and specific to this
* node's TSS operations.
* <p>
* The elliptic curve type MAY change in the future. For example,
* if the Ethereum ecosystem creates precompiles for BLS12_381,
* we may switch to that curve.<br/>
* This value SHALL be specified according to EIP-196 and EIP-197 standards.
* See [EIP-196](https://eips.ethereum.org/EIPS/eip-196#encoding) and
* (EIP-197](https://eips.ethereum.org/EIPS/eip-197#encoding)<br/>
* This field is OPTIONAL (that is, it can initially be null),
* but once set, it MUST NOT be null.<br/>
* If this field is set:
* <ul>
* <li>This field MUST contain the bytes of a standard ALT_BN128 key value.</li>
* <li>This key MUST only be used for node TSS operations.</li>
* <li>This key MUST be unique in all future rosters.</li>
* <li>This key MUST be used to encrypt all of this node's future TSS messages.</li>
* </ul>
*/
bytes tss_encryption_key = 8;
}
23 changes: 0 additions & 23 deletions hapi/hedera-protobufs/services/node_update.proto
Original file line number Diff line number Diff line change
Expand Up @@ -161,27 +161,4 @@ message NodeUpdateTransactionBody {
* If set, this field MUST NOT be set to an empty `KeyList`.
*/
proto.Key admin_key = 8;

/**
* An ALT_BN128 elliptic curve public encryption key.<br/>
* This is controlled by the node operator and specific to this
* node's TSS operations.
* <p>
* The elliptic curve type MAY change in the future. For example,
* if the Ethereum ecosystem creates precompiles for BLS12_381,
* we may switch to that curve.<br/>
* This value SHALL be specified according to EIP-196 and EIP-197 standards.
* See [EIP-196](https://eips.ethereum.org/EIPS/eip-196#encoding) and
* (EIP-197](https://eips.ethereum.org/EIPS/eip-197#encoding)<br/>
* This field is OPTIONAL (that is, it can initially be null),
* but once set, it MUST NOT be null.<br/>
* If this field is set:
* <ul>
* <li>This field MUST contain the bytes of a standard ALT_BN128 key value.</li>
* <li>This key MUST only be used for node TSS operations.</li>
* <li>This key MUST be unique in all future rosters.</li>
* <li>This key MUST be used to encrypt all of this node's future TSS messages.</li>
* </ul>
*/
bytes tss_encryption_key = 9;
}
23 changes: 0 additions & 23 deletions hapi/hedera-protobufs/services/state/addressbook/node.proto
Original file line number Diff line number Diff line change
Expand Up @@ -146,27 +146,4 @@ message Node {
* This field is REQUIRED and MUST NOT be set to an empty `KeyList`.
*/
proto.Key admin_key = 10;

/**
* An ALT_BN128 elliptic curve public encryption key.<br/>
* This is controlled by the node operator and specific to this
* node's TSS operations.
* <p>
* The elliptic curve type MAY change in the future. For example,
* if the Ethereum ecosystem creates precompiles for BLS12_381,
* we may switch to that curve.<br/>
* This value SHALL be specified according to EIP-196 and EIP-197 standards.
* See [EIP-196](https://eips.ethereum.org/EIPS/eip-196#encoding) and
* (EIP-197](https://eips.ethereum.org/EIPS/eip-197#encoding)<br/>
* This field is OPTIONAL (that is, it can initially be null),
* but once set, it MUST NOT be null.<br/>
* If this field is set:
* <ul>
* <li>This field MUST contain the bytes of a standard ALT_BN128 key value.</li>
* <li>This key MUST only be used for node TSS operations.</li>
* <li>This key MUST be unique in all future rosters.</li>
* <li>This key MUST be used to encrypt all of this node's future TSS messages.</li>
* </ul>
*/
bytes tss_encryption_key = 11;
}
Original file line number Diff line number Diff line change
Expand Up @@ -98,7 +98,8 @@ private Roster constructFromNodesState(@NonNull final ReadableKVState<EntityNumb
.weight(node.weight())
.gossipCaCertificate(node.gossipCaCertificate())
.gossipEndpoint(node.gossipEndpoint())
.tssEncryptionKey(node.tssEncryptionKey())
// (TSS-FUTURE) Enable node's TSS encryption key
// .tssEncryptionKey(node.tssEncryptionKey())
.build();
rosterEntries.add(entry);
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -144,8 +144,6 @@ public class AddressBookTestBase {
private final byte[] invalidIPBytes = {49, 46, 48, 46, 48, 46, 48};
protected final ServiceEndpoint endpoint10 = new ServiceEndpoint(Bytes.wrap(invalidIPBytes), 1234, null);

private static final Bytes TSS_KEY = Bytes.wrap(new byte[] {1, 2, 3});

protected Node node;

@Mock
Expand Down Expand Up @@ -249,8 +247,7 @@ protected void givenValidNode(boolean deleted) {
Bytes.wrap(grpcCertificateHash),
0,
deleted,
key,
TSS_KEY);
key);
}

protected void givenValidNodeWithAdminKey(Key adminKey) {
Expand All @@ -264,8 +261,7 @@ protected void givenValidNodeWithAdminKey(Key adminKey) {
Bytes.wrap(grpcCertificateHash),
0,
false,
adminKey,
TSS_KEY);
adminKey);
}

protected Node createNode() {
Expand All @@ -279,7 +275,6 @@ protected Node createNode() {
.grpcCertificateHash(Bytes.wrap(grpcCertificateHash))
.weight(0)
.adminKey(key)
.tssEncryptionKey(TSS_KEY)
.build();
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,6 @@ class ReadableFreezeUpgradeActionsTest {
KEY_BUILDER.apply(B_NAME).build(),
A_THRESHOLD_KEY)))
.build();
private static final Bytes TSS_KEY = Bytes.wrap(new byte[] {1, 2, 3});

private Path noiseFileLoc;
private Path noiseSubFileLoc;
Expand Down Expand Up @@ -429,8 +428,7 @@ private void setupNodes() throws CertificateException, IOException {
Bytes.wrap("grpc1CertificateHash"),
2,
false,
A_COMPLEX_KEY,
TSS_KEY);
A_COMPLEX_KEY);
final var node2 = new Node(
2,
asAccount(4),
Expand All @@ -443,8 +441,7 @@ private void setupNodes() throws CertificateException, IOException {
Bytes.wrap("grpc2CertificateHash"),
4,
false,
A_COMPLEX_KEY,
TSS_KEY);
A_COMPLEX_KEY);
final var node3 = new Node(
3,
asAccount(6),
Expand All @@ -457,8 +454,7 @@ private void setupNodes() throws CertificateException, IOException {
Bytes.wrap("grpc3CertificateHash"),
1,
true,
A_COMPLEX_KEY,
TSS_KEY);
A_COMPLEX_KEY);
final var node4 = new Node(
4,
asAccount(8),
Expand All @@ -472,8 +468,7 @@ private void setupNodes() throws CertificateException, IOException {
Bytes.wrap("grpc5CertificateHash"),
8,
false,
A_COMPLEX_KEY,
TSS_KEY);
A_COMPLEX_KEY);
final var readableNodeState = MapReadableKVState.<EntityNumber, Node>builder(NODES_KEY)
.value(new EntityNumber(4), node4)
.value(new EntityNumber(2), node2)
Expand Down Expand Up @@ -557,8 +552,7 @@ private void setupNodes2() throws CertificateException, IOException {
Bytes.wrap("grpc1CertificateHash"),
2,
false,
A_COMPLEX_KEY,
TSS_KEY);
A_COMPLEX_KEY);
final var node2 = new Node(
1,
asAccount(4),
Expand All @@ -571,8 +565,7 @@ private void setupNodes2() throws CertificateException, IOException {
Bytes.wrap("grpc2CertificateHash"),
4,
false,
A_COMPLEX_KEY,
TSS_KEY);
A_COMPLEX_KEY);
final var node3 = new Node(
2,
asAccount(6),
Expand All @@ -585,8 +578,7 @@ private void setupNodes2() throws CertificateException, IOException {
Bytes.wrap("grpc3CertificateHash"),
1,
false,
A_COMPLEX_KEY,
TSS_KEY);
A_COMPLEX_KEY);
final var node4 = new Node(
3,
asAccount(8),
Expand All @@ -600,8 +592,7 @@ private void setupNodes2() throws CertificateException, IOException {
Bytes.wrap("grpc5CertificateHash"),
8,
true,
A_COMPLEX_KEY,
TSS_KEY);
A_COMPLEX_KEY);
final var readableNodeState = MapReadableKVState.<EntityNumber, Node>builder(NODES_KEY)
.value(new EntityNumber(3), node4)
.value(new EntityNumber(1), node2)
Expand Down

0 comments on commit 0b5326a

Please sign in to comment.