prysm-pulse/beacon-chain/rpc/validator_server.go
shayzluf 0732012459 Validator-multiple key (#2069)
* first version - broken

* working proto changes

* resolve review remarks

* fix goimport issues

* fix service issues

* first logic version-broken

* first running version - no new tests

* fix validator client test

* add wait group to goroutines

* remove unused var in function call

* fix review remarks and tests

* merge master changes and fix conflicts

* gazzele fix

* fix prestonvanloon requested changes

* merge and some of terenc3t remarks addressed

* _,pk bug fix in log

* fix account file name suffix and filter not active validator out

* merge with master and fix missing parameters

* run over all public keys in hasvalidators

* add test for error when no all the validators has index in the db and hasvalidators is called

* fix runner tests fail due to timing issues

* goimports

* smaller sleep time in proposer tests

* fix UpdateAssignments loging

* fix goimports

* added && false commented TestUpdateAssignments_DoesNothingWhenNotEpochStartAndAlreadyExistingAssignments

* hasvalidators without missing publickeys list

* fix some of prestone review remarks

* fixes for prestone comments

* review changes applied

* expect context call in TestWaitForActivation_ValidatorOriginallyExists

* changed hasvalidators to return true if one validator exists

* fix init problem to getkeys

* hasvalidators requiers all validators to be in db

* validator attest assignments update

* fix ap var name

* Change name to hasallvalidators

* fix tests

* update script, fix any vs all validator calls

* fix wait for activation

* filter validator

* reuse the reply block

* fix imports

* Remove dup

* better lookup of active validators

* better filter active vlaidators, still need to fix committee assignment tests

* lint

* use activated keys

* fix for postchainstart

* fix logging

* move state transitions

* hasanyvalidator and hasallvalidators

* fix tests with updatechainhead missing

* add tests

* fix TestCommitteeAssignment_OK

* fix test

* fix validator tests

* fix TestCommitteeAssignment_multipleKeys_OK and TestWaitForActivation_ValidatorOriginallyExists

* fix goimports

* removed unused param from assignment

* change string(pk) to hex.EncodeString(pk) fix change requests

* add inactive validator status to assignments

* fix logging mess due to multi validator setup

* set no assignment to debug level

* log assignments every epoch

* logging fixes

* fixed runtime by using the right assignments

* correct activation request

* fix the validator panic

* correct assignment

* fix test fail and waitforactivation

* performance log issue fix

* fix goimports

* add log message with truncated pk for attest

* add truncated pk to attest and propose logs

* Add comment to script, change 9 to 8

* Update assignment log

* Add comment, report number of assignments

* Use WithError, add validator as field, merge block proposal log

* Update validator_propose.go

* fix

* use entry.String()

* fix fmt
2019-04-18 12:23:38 -05:00

284 lines
9.9 KiB
Go

package rpc
import (
"context"
"encoding/hex"
"errors"
"fmt"
"time"
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
"github.com/prysmaticlabs/prysm/beacon-chain/core/state"
"github.com/prysmaticlabs/prysm/beacon-chain/db"
pbp2p "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1"
pb "github.com/prysmaticlabs/prysm/proto/beacon/rpc/v1"
"github.com/prysmaticlabs/prysm/shared/hashutil"
"github.com/prysmaticlabs/prysm/shared/params"
)
// ValidatorServer defines a server implementation of the gRPC Validator service,
// providing RPC endpoints for obtaining validator assignments per epoch, the slots
// and shards in which particular validators need to perform their responsibilities,
// and more.
type ValidatorServer struct {
ctx context.Context
beaconDB *db.BeaconDB
chainService chainService
canonicalStateChan chan *pbp2p.BeaconState
}
// WaitForActivation checks if a validator public key exists in the active validator registry of the current
// beacon state, if not, then it creates a stream which listens for canonical states which contain
// the validator with the public key as an active validator record.
func (vs *ValidatorServer) WaitForActivation(req *pb.ValidatorActivationRequest, stream pb.ValidatorService_WaitForActivationServer) error {
reply := func() error {
beaconState, err := vs.beaconDB.HeadState(stream.Context())
if err != nil {
return fmt.Errorf("could not retrieve beacon state: %v", err)
}
activeKeys := vs.filterActivePublicKeys(beaconState, req.PublicKeys)
res := &pb.ValidatorActivationResponse{
ActivatedPublicKeys: activeKeys,
}
return stream.Send(res)
}
if vs.beaconDB.HasAnyValidators(req.PublicKeys) {
return reply()
}
for {
select {
case <-time.After(3 * time.Second):
if !vs.beaconDB.HasAnyValidators(req.PublicKeys) {
continue
}
return reply()
case <-vs.ctx.Done():
return errors.New("rpc context closed, exiting goroutine")
}
}
}
// ValidatorIndex is called by a validator to get its index location that corresponds
// to the attestation bit fields.
func (vs *ValidatorServer) ValidatorIndex(ctx context.Context, req *pb.ValidatorIndexRequest) (*pb.ValidatorIndexResponse, error) {
index, err := vs.beaconDB.ValidatorIndex(req.PublicKey)
if err != nil {
return nil, fmt.Errorf("could not get validator index: %v", err)
}
return &pb.ValidatorIndexResponse{Index: uint64(index)}, nil
}
// ValidatorPerformance reports the validator's latest balance along with other important metrics on
// rewards and penalties throughout its lifecycle in the beacon chain.
func (vs *ValidatorServer) ValidatorPerformance(
ctx context.Context, req *pb.ValidatorPerformanceRequest,
) (*pb.ValidatorPerformanceResponse, error) {
index, err := vs.beaconDB.ValidatorIndex(req.PublicKey)
if err != nil {
return nil, fmt.Errorf("could not get validator index: %v", err)
}
beaconState, err := vs.beaconDB.HeadState(ctx)
if err != nil {
return nil, fmt.Errorf("could not retrieve beacon state: %v", err)
}
totalBalance := float32(0)
for _, val := range beaconState.ValidatorBalances {
totalBalance += float32(val)
}
avgBalance := totalBalance / float32(len(beaconState.ValidatorBalances))
balance := beaconState.ValidatorBalances[index]
activeIndices := helpers.ActiveValidatorIndices(beaconState.ValidatorRegistry, helpers.SlotToEpoch(req.Slot))
return &pb.ValidatorPerformanceResponse{
Balance: balance,
AverageValidatorBalance: avgBalance,
TotalValidators: uint64(len(beaconState.ValidatorRegistry)),
TotalActiveValidators: uint64(len(activeIndices)),
}, nil
}
// CommitteeAssignment returns the committee assignment response from a given validator public key.
// The committee assignment response contains the following fields for the current and previous epoch:
// 1.) The list of validators in the committee.
// 2.) The shard to which the committee is assigned.
// 3.) The slot at which the committee is assigned.
// 4.) The bool signalling if the validator is expected to propose a block at the assigned slot.
func (vs *ValidatorServer) CommitteeAssignment(
ctx context.Context,
req *pb.CommitteeAssignmentsRequest) (*pb.CommitteeAssignmentResponse, error) {
beaconState, err := vs.beaconDB.HeadState(ctx)
if err != nil {
return nil, fmt.Errorf("could not fetch beacon state: %v", err)
}
chainHead, err := vs.beaconDB.ChainHead()
if err != nil {
return nil, fmt.Errorf("could not get chain head: %v", err)
}
headRoot, err := hashutil.HashBeaconBlock(chainHead)
if err != nil {
return nil, fmt.Errorf("could not hash block: %v", err)
}
for beaconState.Slot < req.EpochStart {
beaconState, err = state.ExecuteStateTransition(
ctx, beaconState, nil /* block */, headRoot, state.DefaultConfig(),
)
if err != nil {
return nil, fmt.Errorf("could not execute head transition: %v", err)
}
}
var assignments []*pb.CommitteeAssignmentResponse_CommitteeAssignment
activeKeys := vs.filterActivePublicKeys(beaconState, req.PublicKeys)
for _, pk := range activeKeys {
a, err := vs.assignment(pk, beaconState, req.EpochStart)
if err != nil {
return nil, err
}
assignments = append(assignments, a)
}
assignments = vs.addNonActivePublicKeysAssignmentStatus(beaconState, req.PublicKeys, assignments)
return &pb.CommitteeAssignmentResponse{
Assignment: assignments,
}, nil
}
func (vs *ValidatorServer) assignment(
pubkey []byte,
beaconState *pbp2p.BeaconState,
epochStart uint64,
) (*pb.CommitteeAssignmentResponse_CommitteeAssignment, error) {
if len(pubkey) != params.BeaconConfig().BLSPubkeyLength {
return nil, fmt.Errorf(
"expected public key to have length %d, received %d",
params.BeaconConfig().BLSPubkeyLength,
len(pubkey),
)
}
idx, err := vs.beaconDB.ValidatorIndex(pubkey)
if err != nil {
return nil, fmt.Errorf("could not get active validator index: %v", err)
}
committee, shard, slot, isProposer, err :=
helpers.CommitteeAssignment(beaconState, epochStart, uint64(idx), false)
if err != nil {
return nil, err
}
status, err := vs.validatorStatus(pubkey, beaconState)
if err != nil {
return nil, err
}
return &pb.CommitteeAssignmentResponse_CommitteeAssignment{
Committee: committee,
Shard: shard,
Slot: slot,
IsProposer: isProposer,
PublicKey: pubkey,
Status: status,
}, nil
}
// ValidatorStatus returns the validator status of the current epoch.
// The status response can be one of the following:
// PENDING_ACTIVE - validator is waiting to get activated.
// ACTIVE - validator is active.
// INITIATED_EXIT - validator has initiated an an exit request.
// WITHDRAWABLE - validator's deposit can be withdrawn after lock up period.
// EXITED - validator has exited, means the deposit has been withdrawn.
// EXITED_SLASHED - validator was forcefully exited due to slashing.
func (vs *ValidatorServer) ValidatorStatus(
ctx context.Context,
req *pb.ValidatorIndexRequest) (*pb.ValidatorStatusResponse, error) {
beaconState, err := vs.beaconDB.HeadState(ctx)
if err != nil {
return nil, fmt.Errorf("could not fetch beacon state: %v", err)
}
status, err := vs.validatorStatus(req.PublicKey, beaconState)
if err != nil {
return nil, err
}
return &pb.ValidatorStatusResponse{
Status: status,
}, nil
}
func (vs *ValidatorServer) validatorStatus(pubkey []byte, beaconState *pbp2p.BeaconState) (pb.ValidatorStatus, error) {
idx, err := vs.beaconDB.ValidatorIndex(pubkey)
if err != nil {
return pb.ValidatorStatus_UNKNOWN_STATUS, fmt.Errorf("could not get active validator index: %v", err)
}
var status pb.ValidatorStatus
v := beaconState.ValidatorRegistry[idx]
farFutureEpoch := params.BeaconConfig().FarFutureEpoch
epoch := helpers.CurrentEpoch(beaconState)
if v.ActivationEpoch == farFutureEpoch {
status = pb.ValidatorStatus_PENDING_ACTIVE
} else if v.ActivationEpoch <= epoch && epoch < v.ExitEpoch {
status = pb.ValidatorStatus_ACTIVE
} else if v.StatusFlags == pbp2p.Validator_INITIATED_EXIT {
status = pb.ValidatorStatus_INITIATED_EXIT
} else if v.StatusFlags == pbp2p.Validator_WITHDRAWABLE {
status = pb.ValidatorStatus_WITHDRAWABLE
} else if epoch >= v.ExitEpoch && epoch >= v.SlashedEpoch {
status = pb.ValidatorStatus_EXITED_SLASHED
} else if epoch >= v.ExitEpoch {
status = pb.ValidatorStatus_EXITED
} else {
status = pb.ValidatorStatus_UNKNOWN_STATUS
}
return status, nil
}
// filterActivePublicKeys takes a list of validator public keys and returns
// the list of active public keys from the given state.
func (vs *ValidatorServer) filterActivePublicKeys(beaconState *pbp2p.BeaconState, pubkeys [][]byte) [][]byte {
// Generate a map for O(1) lookup of existence of pub keys in request.
pkMap := make(map[string]bool)
for _, pk := range pubkeys {
pkMap[hex.EncodeToString(pk)] = true
}
var activeKeys [][]byte
currentEpoch := helpers.SlotToEpoch(beaconState.Slot)
for _, v := range beaconState.ValidatorRegistry {
if pkMap[hex.EncodeToString(v.Pubkey)] && helpers.IsActiveValidator(v, currentEpoch) {
activeKeys = append(activeKeys, v.Pubkey)
}
}
return activeKeys
}
func (vs *ValidatorServer) addNonActivePublicKeysAssignmentStatus(beaconState *pbp2p.BeaconState, pubkeys [][]byte, assignments []*pb.CommitteeAssignmentResponse_CommitteeAssignment) []*pb.CommitteeAssignmentResponse_CommitteeAssignment {
// Generate a map for O(1) lookup of existence of pub keys in request.
validatorMap := make(map[string]*pbp2p.Validator)
for _, v := range beaconState.ValidatorRegistry {
validatorMap[hex.EncodeToString(v.Pubkey)] = v
}
currentEpoch := helpers.SlotToEpoch(beaconState.Slot)
for _, pk := range pubkeys {
hexPk := hex.EncodeToString(pk)
if _, ok := validatorMap[hexPk]; !ok || !helpers.IsActiveValidator(validatorMap[hexPk], currentEpoch) {
status, _ := vs.validatorStatus(pk, beaconState) //nolint:gosec
a := &pb.CommitteeAssignmentResponse_CommitteeAssignment{
PublicKey: pk,
Status: status,
}
assignments = append(assignments, a)
}
}
return assignments
}