mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-22 03:30:35 +00:00
5a66807989
* First take at updating everything to v5 * Patch gRPC gateway to use prysm v5 Fix patch * Update go ssz --------- Co-authored-by: Preston Van Loon <pvanloon@offchainlabs.com>
311 lines
9.4 KiB
Go
311 lines
9.4 KiB
Go
package util
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"math"
|
|
|
|
"github.com/prysmaticlabs/go-bitfield"
|
|
"github.com/prysmaticlabs/prysm/v5/beacon-chain/core/helpers"
|
|
"github.com/prysmaticlabs/prysm/v5/beacon-chain/core/signing"
|
|
"github.com/prysmaticlabs/prysm/v5/beacon-chain/core/transition"
|
|
"github.com/prysmaticlabs/prysm/v5/beacon-chain/state"
|
|
state_native "github.com/prysmaticlabs/prysm/v5/beacon-chain/state/state-native"
|
|
fieldparams "github.com/prysmaticlabs/prysm/v5/config/fieldparams"
|
|
"github.com/prysmaticlabs/prysm/v5/config/params"
|
|
"github.com/prysmaticlabs/prysm/v5/consensus-types/primitives"
|
|
"github.com/prysmaticlabs/prysm/v5/crypto/bls"
|
|
"github.com/prysmaticlabs/prysm/v5/crypto/rand"
|
|
attv1 "github.com/prysmaticlabs/prysm/v5/proto/eth/v1"
|
|
ethpb "github.com/prysmaticlabs/prysm/v5/proto/prysm/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/v5/runtime/version"
|
|
"github.com/prysmaticlabs/prysm/v5/time/slots"
|
|
log "github.com/sirupsen/logrus"
|
|
)
|
|
|
|
// NewAttestation creates an attestation block with minimum marshalable fields.
|
|
func NewAttestation() *ethpb.Attestation {
|
|
return ðpb.Attestation{
|
|
AggregationBits: bitfield.Bitlist{0b1101},
|
|
Data: ðpb.AttestationData{
|
|
BeaconBlockRoot: make([]byte, fieldparams.RootLength),
|
|
Source: ðpb.Checkpoint{
|
|
Root: make([]byte, fieldparams.RootLength),
|
|
},
|
|
Target: ðpb.Checkpoint{
|
|
Root: make([]byte, fieldparams.RootLength),
|
|
},
|
|
},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
}
|
|
|
|
// GenerateAttestations creates attestations that are entirely valid, for all
|
|
// the committees of the current state slot. This function expects attestations
|
|
// requested to be cleanly divisible by committees per slot. If there is 1 committee
|
|
// in the slot, and numToGen is set to 4, then it will return 4 attestations
|
|
// for the same data with their aggregation bits split uniformly.
|
|
//
|
|
// If you request 4 attestations, but there are 8 committees, you will get 4 fully aggregated attestations.
|
|
func GenerateAttestations(
|
|
bState state.BeaconState, privs []bls.SecretKey, numToGen uint64, slot primitives.Slot, randomRoot bool,
|
|
) ([]*ethpb.Attestation, error) {
|
|
var attestations []*ethpb.Attestation
|
|
generateHeadState := false
|
|
bState = bState.Copy()
|
|
if slot > bState.Slot() {
|
|
// Going back a slot here so there's no inclusion delay issues.
|
|
slot--
|
|
generateHeadState = true
|
|
}
|
|
currentEpoch := slots.ToEpoch(slot)
|
|
|
|
targetRoot := make([]byte, fieldparams.RootLength)
|
|
var headRoot []byte
|
|
var err error
|
|
// Only calculate head state if its an attestation for the current slot or future slot.
|
|
if generateHeadState || slot == bState.Slot() {
|
|
var headState state.BeaconState
|
|
switch bState.Version() {
|
|
case version.Phase0:
|
|
pbState, err := state_native.ProtobufBeaconStatePhase0(bState.ToProto())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
genState, err := state_native.InitializeFromProtoUnsafePhase0(pbState)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
headState = genState
|
|
case version.Altair:
|
|
pbState, err := state_native.ProtobufBeaconStateAltair(bState.ToProto())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
genState, err := state_native.InitializeFromProtoUnsafeAltair(pbState)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
headState = genState
|
|
case version.Bellatrix:
|
|
pbState, err := state_native.ProtobufBeaconStateBellatrix(bState.ToProto())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
genState, err := state_native.InitializeFromProtoUnsafeBellatrix(pbState)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
headState = genState
|
|
case version.Capella:
|
|
pbState, err := state_native.ProtobufBeaconStateCapella(bState.ToProto())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
genState, err := state_native.InitializeFromProtoUnsafeCapella(pbState)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
headState = genState
|
|
default:
|
|
return nil, errors.New("state type isn't supported")
|
|
}
|
|
|
|
headState, err = transition.ProcessSlots(context.Background(), headState, slot+1)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
headRoot, err = helpers.BlockRootAtSlot(headState, slot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
targetRoot, err = helpers.BlockRoot(headState, currentEpoch)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
} else {
|
|
headRoot, err = helpers.BlockRootAtSlot(bState, slot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
if randomRoot {
|
|
randGen := rand.NewDeterministicGenerator()
|
|
b := make([]byte, fieldparams.RootLength)
|
|
_, err := randGen.Read(b)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
headRoot = b
|
|
}
|
|
|
|
activeValidatorCount, err := helpers.ActiveValidatorCount(context.Background(), bState, currentEpoch)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
committeesPerSlot := helpers.SlotCommitteeCount(activeValidatorCount)
|
|
|
|
if numToGen < committeesPerSlot {
|
|
log.Printf(
|
|
"Warning: %d attestations requested is less than %d committees in current slot, not all validators will be attesting.",
|
|
numToGen,
|
|
committeesPerSlot,
|
|
)
|
|
} else if numToGen > committeesPerSlot {
|
|
log.Printf(
|
|
"Warning: %d attestations requested are more than %d committees in current slot, attestations will not be perfectly efficient.",
|
|
numToGen,
|
|
committeesPerSlot,
|
|
)
|
|
}
|
|
|
|
attsPerCommittee := math.Max(float64(numToGen/committeesPerSlot), 1)
|
|
if math.Trunc(attsPerCommittee) != attsPerCommittee {
|
|
return nil, fmt.Errorf(
|
|
"requested attestations %d must be easily divisible by committees in slot %d, calculated %f",
|
|
numToGen,
|
|
committeesPerSlot,
|
|
attsPerCommittee,
|
|
)
|
|
}
|
|
|
|
domain, err := signing.Domain(bState.Fork(), currentEpoch, params.BeaconConfig().DomainBeaconAttester, bState.GenesisValidatorsRoot())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
for c := primitives.CommitteeIndex(0); uint64(c) < committeesPerSlot && uint64(c) < numToGen; c++ {
|
|
committee, err := helpers.BeaconCommitteeFromState(context.Background(), bState, slot, c)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
attData := ðpb.AttestationData{
|
|
Slot: slot,
|
|
CommitteeIndex: c,
|
|
BeaconBlockRoot: headRoot,
|
|
Source: bState.CurrentJustifiedCheckpoint(),
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: currentEpoch,
|
|
Root: targetRoot,
|
|
},
|
|
}
|
|
|
|
dataRoot, err := signing.ComputeSigningRoot(attData, domain)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
committeeSize := uint64(len(committee))
|
|
bitsPerAtt := committeeSize / uint64(attsPerCommittee)
|
|
for i := uint64(0); i < committeeSize; i += bitsPerAtt {
|
|
aggregationBits := bitfield.NewBitlist(committeeSize)
|
|
var sigs []bls.Signature
|
|
for b := i; b < i+bitsPerAtt; b++ {
|
|
aggregationBits.SetBitAt(b, true)
|
|
sigs = append(sigs, privs[committee[b]].Sign(dataRoot[:]))
|
|
}
|
|
|
|
// bls.AggregateSignatures will return nil if sigs is 0.
|
|
if len(sigs) == 0 {
|
|
continue
|
|
}
|
|
|
|
att := ðpb.Attestation{
|
|
Data: attData,
|
|
AggregationBits: aggregationBits,
|
|
Signature: bls.AggregateSignatures(sigs).Marshal(),
|
|
}
|
|
attestations = append(attestations, att)
|
|
}
|
|
}
|
|
return attestations, nil
|
|
}
|
|
|
|
// HydrateAttestation hydrates an attestation object with correct field length sizes
|
|
// to comply with fssz marshalling and unmarshalling rules.
|
|
func HydrateAttestation(a *ethpb.Attestation) *ethpb.Attestation {
|
|
if a.Signature == nil {
|
|
a.Signature = make([]byte, 96)
|
|
}
|
|
if a.AggregationBits == nil {
|
|
a.AggregationBits = make([]byte, 1)
|
|
}
|
|
if a.Data == nil {
|
|
a.Data = ðpb.AttestationData{}
|
|
}
|
|
a.Data = HydrateAttestationData(a.Data)
|
|
return a
|
|
}
|
|
|
|
// HydrateV1Attestation hydrates a v1 attestation object with correct field length sizes
|
|
// to comply with fssz marshalling and unmarshalling rules.
|
|
func HydrateV1Attestation(a *attv1.Attestation) *attv1.Attestation {
|
|
if a.Signature == nil {
|
|
a.Signature = make([]byte, 96)
|
|
}
|
|
if a.AggregationBits == nil {
|
|
a.AggregationBits = make([]byte, 1)
|
|
}
|
|
if a.Data == nil {
|
|
a.Data = &attv1.AttestationData{}
|
|
}
|
|
a.Data = HydrateV1AttestationData(a.Data)
|
|
return a
|
|
}
|
|
|
|
// HydrateAttestationData hydrates an attestation data object with correct field length sizes
|
|
// to comply with fssz marshalling and unmarshalling rules.
|
|
func HydrateAttestationData(d *ethpb.AttestationData) *ethpb.AttestationData {
|
|
if d.BeaconBlockRoot == nil {
|
|
d.BeaconBlockRoot = make([]byte, fieldparams.RootLength)
|
|
}
|
|
if d.Target == nil {
|
|
d.Target = ðpb.Checkpoint{}
|
|
}
|
|
if d.Target.Root == nil {
|
|
d.Target.Root = make([]byte, fieldparams.RootLength)
|
|
}
|
|
if d.Source == nil {
|
|
d.Source = ðpb.Checkpoint{}
|
|
}
|
|
if d.Source.Root == nil {
|
|
d.Source.Root = make([]byte, fieldparams.RootLength)
|
|
}
|
|
return d
|
|
}
|
|
|
|
// HydrateV1AttestationData hydrates a v1 attestation data object with correct field length sizes
|
|
// to comply with fssz marshalling and unmarshalling rules.
|
|
func HydrateV1AttestationData(d *attv1.AttestationData) *attv1.AttestationData {
|
|
if d.BeaconBlockRoot == nil {
|
|
d.BeaconBlockRoot = make([]byte, fieldparams.RootLength)
|
|
}
|
|
if d.Target == nil {
|
|
d.Target = &attv1.Checkpoint{}
|
|
}
|
|
if d.Target.Root == nil {
|
|
d.Target.Root = make([]byte, fieldparams.RootLength)
|
|
}
|
|
if d.Source == nil {
|
|
d.Source = &attv1.Checkpoint{}
|
|
}
|
|
if d.Source.Root == nil {
|
|
d.Source.Root = make([]byte, fieldparams.RootLength)
|
|
}
|
|
return d
|
|
}
|
|
|
|
// HydrateIndexedAttestation hydrates an indexed attestation with correct field length sizes
|
|
// to comply with fssz marshalling and unmarshalling rules.
|
|
func HydrateIndexedAttestation(a *ethpb.IndexedAttestation) *ethpb.IndexedAttestation {
|
|
if a.Signature == nil {
|
|
a.Signature = make([]byte, 96)
|
|
}
|
|
if a.Data == nil {
|
|
a.Data = ðpb.AttestationData{}
|
|
}
|
|
a.Data = HydrateAttestationData(a.Data)
|
|
return a
|
|
}
|