package blockchain import ( "context" "fmt" "github.com/pkg/errors" ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1" "github.com/prysmaticlabs/prysm/beacon-chain/core/blocks" "github.com/prysmaticlabs/prysm/beacon-chain/core/feed" "github.com/prysmaticlabs/prysm/beacon-chain/core/helpers" "github.com/prysmaticlabs/prysm/beacon-chain/state" pb "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1" "github.com/prysmaticlabs/prysm/shared/bytesutil" "github.com/prysmaticlabs/prysm/shared/featureconfig" "github.com/prysmaticlabs/prysm/shared/params" "github.com/prysmaticlabs/prysm/shared/slotutil" "github.com/prysmaticlabs/prysm/shared/timeutils" "github.com/sirupsen/logrus" "go.opencensus.io/trace" ) // AttestationReceiver interface defines the methods of chain service receive and processing new attestations. type AttestationReceiver interface { ReceiveAttestationNoPubsub(ctx context.Context, att *ethpb.Attestation) error IsValidAttestation(ctx context.Context, att *ethpb.Attestation) bool AttestationPreState(ctx context.Context, att *ethpb.Attestation) (*state.BeaconState, error) AttestationCheckPtInfo(ctx context.Context, att *ethpb.Attestation) (*pb.CheckPtInfo, error) VerifyLmdFfgConsistency(ctx context.Context, att *ethpb.Attestation) error } // ReceiveAttestationNoPubsub is a function that defines the operations that are performed on // attestation that is received from regular sync. The operations consist of: // 1. Validate attestation, update validator's latest vote // 2. Apply fork choice to the processed attestation // 3. Save latest head info func (s *Service) ReceiveAttestationNoPubsub(ctx context.Context, att *ethpb.Attestation) error { ctx, span := trace.StartSpan(ctx, "beacon-chain.blockchain.ReceiveAttestationNoPubsub") defer span.End() _, err := s.onAttestation(ctx, att) if err != nil { return errors.Wrap(err, "could not process attestation") } if !featureconfig.Get().DisableUpdateHeadPerAttestation { // This updates fork choice head, if a new head could not be updated due to // long range or intermediate forking. It simply logs a warning and returns nil // as that's more appropriate than returning errors. if err := s.updateHead(ctx, s.getJustifiedBalances()); err != nil { log.Warnf("Resolving fork due to new attestation: %v", err) return nil } } return nil } // IsValidAttestation returns true if the attestation can be verified against its pre-state. func (s *Service) IsValidAttestation(ctx context.Context, att *ethpb.Attestation) bool { baseState, err := s.AttestationPreState(ctx, att) if err != nil { log.WithError(err).Error("Failed to get attestation pre state") return false } if err := blocks.VerifyAttestationSignature(ctx, baseState, att); err != nil { log.WithError(err).Error("Failed to validate attestation") return false } return true } // AttestationPreState returns the pre state of attestation. func (s *Service) AttestationPreState(ctx context.Context, att *ethpb.Attestation) (*state.BeaconState, error) { ss, err := helpers.StartSlot(att.Data.Target.Epoch) if err != nil { return nil, err } if err := helpers.ValidateSlotClock(ss, uint64(s.genesisTime.Unix())); err != nil { return nil, err } return s.getAttPreState(ctx, att.Data.Target) } // AttestationCheckPtInfo returns the check point info of attestation that can be used to verify the attestation // contents and signatures. func (s *Service) AttestationCheckPtInfo(ctx context.Context, att *ethpb.Attestation) (*pb.CheckPtInfo, error) { ss, err := helpers.StartSlot(att.Data.Target.Epoch) if err != nil { return nil, err } if err := helpers.ValidateSlotClock(ss, uint64(s.genesisTime.Unix())); err != nil { return nil, err } return s.getAttCheckPtInfo(ctx, att.Data.Target, helpers.SlotToEpoch(att.Data.Slot)) } // VerifyLmdFfgConsistency verifies that attestation's LMD and FFG votes are consistency to each other. func (s *Service) VerifyLmdFfgConsistency(ctx context.Context, a *ethpb.Attestation) error { return s.verifyLMDFFGConsistent(ctx, a.Data.Target.Epoch, a.Data.Target.Root, a.Data.BeaconBlockRoot) } // This processes attestations from the attestation pool to account for validator votes and fork choice. func (s *Service) processAttestation(subscribedToStateEvents chan struct{}) { // Wait for state to be initialized. stateChannel := make(chan *feed.Event, 1) stateSub := s.stateNotifier.StateFeed().Subscribe(stateChannel) subscribedToStateEvents <- struct{}{} <-stateChannel stateSub.Unsubscribe() st := slotutil.GetSlotTicker(s.genesisTime, params.BeaconConfig().SecondsPerSlot) for { select { case <-s.ctx.Done(): return case <-st.C(): ctx := s.ctx atts := s.attPool.ForkchoiceAttestations() for _, a := range atts { // Based on the spec, don't process the attestation until the subsequent slot. // This delays consideration in the fork choice until their slot is in the past. // https://github.com/ethereum/eth2.0-specs/blob/dev/specs/phase0/fork-choice.md#validate_on_attestation nextSlot := a.Data.Slot + 1 if err := helpers.VerifySlotTime(uint64(s.genesisTime.Unix()), nextSlot, params.BeaconNetworkConfig().MaximumGossipClockDisparity); err != nil { continue } hasState := s.stateGen.StateSummaryExists(ctx, bytesutil.ToBytes32(a.Data.BeaconBlockRoot)) hasBlock := s.hasBlock(ctx, bytesutil.ToBytes32(a.Data.BeaconBlockRoot)) if !(hasState && hasBlock) { continue } if err := s.attPool.DeleteForkchoiceAttestation(a); err != nil { log.WithError(err).Error("Could not delete fork choice attestation in pool") } if !s.verifyCheckpointEpoch(a.Data.Target) { continue } if err := s.ReceiveAttestationNoPubsub(ctx, a); err != nil { log.WithFields(logrus.Fields{ "slot": a.Data.Slot, "committeeIndex": a.Data.CommitteeIndex, "beaconBlockRoot": fmt.Sprintf("%#x", bytesutil.Trunc(a.Data.BeaconBlockRoot)), "targetRoot": fmt.Sprintf("%#x", bytesutil.Trunc(a.Data.Target.Root)), "aggregationCount": a.AggregationBits.Count(), }).WithError(err).Warn("Could not receive attestation in chain service") } } } } } // This verifies the epoch of input checkpoint is within current epoch and previous epoch // with respect to current time. Returns true if it's within, false if it's not. func (s *Service) verifyCheckpointEpoch(c *ethpb.Checkpoint) bool { now := uint64(timeutils.Now().Unix()) genesisTime := uint64(s.genesisTime.Unix()) currentSlot := (now - genesisTime) / params.BeaconConfig().SecondsPerSlot currentEpoch := helpers.SlotToEpoch(currentSlot) var prevEpoch uint64 if currentEpoch > 1 { prevEpoch = currentEpoch - 1 } if c.Epoch != prevEpoch && c.Epoch != currentEpoch { return false } return true }