prysm-pulse/beacon-chain/sync/validate_voluntary_exit.go
Mohamed Zahoor a103dd91c0
cherry picked PR for #10274 (#10300)
* ignore topic messages (except block topic) during optimistic sync

* address review comments

* nit pick fix

Co-authored-by: Nishant Das <nishdas93@gmail.com>
2022-03-06 08:09:12 +00:00

107 lines
3.3 KiB
Go

package sync
import (
"context"
"errors"
"github.com/libp2p/go-libp2p-core/peer"
pubsub "github.com/libp2p/go-libp2p-pubsub"
types "github.com/prysmaticlabs/eth2-types"
"github.com/prysmaticlabs/prysm/beacon-chain/core/blocks"
"github.com/prysmaticlabs/prysm/beacon-chain/core/feed"
opfeed "github.com/prysmaticlabs/prysm/beacon-chain/core/feed/operation"
"github.com/prysmaticlabs/prysm/monitoring/tracing"
ethpb "github.com/prysmaticlabs/prysm/proto/prysm/v1alpha1"
"go.opencensus.io/trace"
)
// Clients who receive a voluntary exit on this topic MUST validate the conditions within process_voluntary_exit before
// forwarding it across the network.
func (s *Service) validateVoluntaryExit(ctx context.Context, pid peer.ID, msg *pubsub.Message) (pubsub.ValidationResult, error) {
// Validation runs on publish (not just subscriptions), so we should approve any message from
// ourselves.
if pid == s.cfg.p2p.PeerID() {
return pubsub.ValidationAccept, nil
}
// The head state will be too far away to validate any voluntary exit.
if s.cfg.initialSync.Syncing() {
return pubsub.ValidationIgnore, nil
}
// We should not attempt to process this message if the node is running in optimistic mode.
// We just ignore in p2p so that the peer is not penalized.
optimistic, err := s.cfg.chain.IsOptimistic(ctx)
if err != nil {
return pubsub.ValidationReject, err
}
if optimistic {
return pubsub.ValidationIgnore, nil
}
ctx, span := trace.StartSpan(ctx, "sync.validateVoluntaryExit")
defer span.End()
m, err := s.decodePubsubMessage(msg)
if err != nil {
tracing.AnnotateError(span, err)
return pubsub.ValidationReject, err
}
exit, ok := m.(*ethpb.SignedVoluntaryExit)
if !ok {
return pubsub.ValidationReject, errWrongMessage
}
if exit.Exit == nil {
return pubsub.ValidationReject, errNilMessage
}
if s.hasSeenExitIndex(exit.Exit.ValidatorIndex) {
return pubsub.ValidationIgnore, nil
}
headState, err := s.cfg.chain.HeadState(ctx)
if err != nil {
return pubsub.ValidationIgnore, err
}
if uint64(exit.Exit.ValidatorIndex) >= uint64(headState.NumValidators()) {
return pubsub.ValidationReject, errors.New("validator index is invalid")
}
val, err := headState.ValidatorAtIndexReadOnly(exit.Exit.ValidatorIndex)
if err != nil {
return pubsub.ValidationIgnore, err
}
if err := blocks.VerifyExitAndSignature(val, headState.Slot(), headState.Fork(), exit, headState.GenesisValidatorsRoot()); err != nil {
return pubsub.ValidationReject, err
}
msg.ValidatorData = exit // Used in downstream subscriber
// Broadcast the voluntary exit on a feed to notify other services in the beacon node
// of a received voluntary exit.
s.cfg.operationNotifier.OperationFeed().Send(&feed.Event{
Type: opfeed.ExitReceived,
Data: &opfeed.ExitReceivedData{
Exit: exit,
},
})
return pubsub.ValidationAccept, nil
}
// Returns true if the node has already received a valid exit request for the validator with index `i`.
func (s *Service) hasSeenExitIndex(i types.ValidatorIndex) bool {
s.seenExitLock.RLock()
defer s.seenExitLock.RUnlock()
_, seen := s.seenExitCache.Get(i)
return seen
}
// Set exit request index `i` in seen exit request cache.
func (s *Service) setExitIndexSeen(i types.ValidatorIndex) {
s.seenExitLock.Lock()
defer s.seenExitLock.Unlock()
s.seenExitCache.Add(i, true)
}