mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-28 14:17:17 +00:00
364 lines
12 KiB
Go
364 lines
12 KiB
Go
package beacon
|
|
|
|
import (
|
|
"context"
|
|
"strconv"
|
|
|
|
ptypes "github.com/gogo/protobuf/types"
|
|
ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/blocks"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/feed"
|
|
blockfeed "github.com/prysmaticlabs/prysm/beacon-chain/core/feed/block"
|
|
statefeed "github.com/prysmaticlabs/prysm/beacon-chain/core/feed/state"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/db/filters"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/cmd"
|
|
"github.com/prysmaticlabs/prysm/shared/pagination"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"google.golang.org/grpc/codes"
|
|
"google.golang.org/grpc/status"
|
|
)
|
|
|
|
// ListBlocks retrieves blocks by root, slot, or epoch.
|
|
//
|
|
// The server may return multiple blocks in the case that a slot or epoch is
|
|
// provided as the filter criteria. The server may return an empty list when
|
|
// no blocks in their database match the filter criteria. This RPC should
|
|
// not return NOT_FOUND. Only one filter criteria should be used.
|
|
func (bs *Server) ListBlocks(
|
|
ctx context.Context, req *ethpb.ListBlocksRequest,
|
|
) (*ethpb.ListBlocksResponse, error) {
|
|
if int(req.PageSize) > cmd.Get().MaxRPCPageSize {
|
|
return nil, status.Errorf(codes.InvalidArgument, "Requested page size %d can not be greater than max size %d",
|
|
req.PageSize, cmd.Get().MaxRPCPageSize)
|
|
}
|
|
|
|
switch q := req.QueryFilter.(type) {
|
|
case *ethpb.ListBlocksRequest_Epoch:
|
|
blks, err := bs.BeaconDB.Blocks(ctx, filters.NewFilter().SetStartEpoch(q.Epoch).SetEndEpoch(q.Epoch))
|
|
if err != nil {
|
|
return nil, status.Errorf(codes.Internal, "Failed to get blocks: %v", err)
|
|
}
|
|
|
|
numBlks := len(blks)
|
|
if numBlks == 0 {
|
|
return ðpb.ListBlocksResponse{
|
|
BlockContainers: make([]*ethpb.BeaconBlockContainer, 0),
|
|
TotalSize: 0,
|
|
NextPageToken: strconv.Itoa(0),
|
|
}, nil
|
|
}
|
|
|
|
start, end, nextPageToken, err := pagination.StartAndEndPage(req.PageToken, int(req.PageSize), numBlks)
|
|
if err != nil {
|
|
return nil, status.Errorf(codes.Internal, "Could not paginate blocks: %v", err)
|
|
}
|
|
|
|
returnedBlks := blks[start:end]
|
|
containers := make([]*ethpb.BeaconBlockContainer, len(returnedBlks))
|
|
for i, b := range returnedBlks {
|
|
root, err := b.Block.HashTreeRoot()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
containers[i] = ðpb.BeaconBlockContainer{
|
|
Block: b,
|
|
BlockRoot: root[:],
|
|
}
|
|
}
|
|
|
|
return ðpb.ListBlocksResponse{
|
|
BlockContainers: containers,
|
|
TotalSize: int32(numBlks),
|
|
NextPageToken: nextPageToken,
|
|
}, nil
|
|
case *ethpb.ListBlocksRequest_Root:
|
|
blk, err := bs.BeaconDB.Block(ctx, bytesutil.ToBytes32(q.Root))
|
|
if err != nil {
|
|
return nil, status.Errorf(codes.Internal, "Could not retrieve block: %v", err)
|
|
}
|
|
if blk == nil {
|
|
return ðpb.ListBlocksResponse{
|
|
BlockContainers: make([]*ethpb.BeaconBlockContainer, 0),
|
|
TotalSize: 0,
|
|
NextPageToken: strconv.Itoa(0),
|
|
}, nil
|
|
}
|
|
root, err := blk.Block.HashTreeRoot()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return ðpb.ListBlocksResponse{
|
|
BlockContainers: []*ethpb.BeaconBlockContainer{{
|
|
Block: blk,
|
|
BlockRoot: root[:]},
|
|
},
|
|
TotalSize: 1,
|
|
}, nil
|
|
|
|
case *ethpb.ListBlocksRequest_Slot:
|
|
blks, err := bs.BeaconDB.Blocks(ctx, filters.NewFilter().SetStartSlot(q.Slot).SetEndSlot(q.Slot))
|
|
if err != nil {
|
|
return nil, status.Errorf(codes.Internal, "Could not retrieve blocks for slot %d: %v", q.Slot, err)
|
|
}
|
|
|
|
numBlks := len(blks)
|
|
if numBlks == 0 {
|
|
return ðpb.ListBlocksResponse{
|
|
BlockContainers: make([]*ethpb.BeaconBlockContainer, 0),
|
|
TotalSize: 0,
|
|
NextPageToken: strconv.Itoa(0),
|
|
}, nil
|
|
}
|
|
|
|
start, end, nextPageToken, err := pagination.StartAndEndPage(req.PageToken, int(req.PageSize), numBlks)
|
|
if err != nil {
|
|
return nil, status.Errorf(codes.Internal, "Could not paginate blocks: %v", err)
|
|
}
|
|
|
|
returnedBlks := blks[start:end]
|
|
containers := make([]*ethpb.BeaconBlockContainer, len(returnedBlks))
|
|
for i, b := range returnedBlks {
|
|
root, err := b.Block.HashTreeRoot()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
containers[i] = ðpb.BeaconBlockContainer{
|
|
Block: b,
|
|
BlockRoot: root[:],
|
|
}
|
|
}
|
|
|
|
return ðpb.ListBlocksResponse{
|
|
BlockContainers: containers,
|
|
TotalSize: int32(numBlks),
|
|
NextPageToken: nextPageToken,
|
|
}, nil
|
|
case *ethpb.ListBlocksRequest_Genesis:
|
|
genBlk, err := bs.BeaconDB.GenesisBlock(ctx)
|
|
if err != nil {
|
|
return nil, status.Errorf(codes.Internal, "Could not retrieve blocks for genesis slot: %v", err)
|
|
}
|
|
if genBlk == nil {
|
|
return nil, status.Error(codes.Internal, "Could not find genesis block")
|
|
}
|
|
root, err := genBlk.Block.HashTreeRoot()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
containers := []*ethpb.BeaconBlockContainer{
|
|
{
|
|
Block: genBlk,
|
|
BlockRoot: root[:],
|
|
},
|
|
}
|
|
|
|
return ðpb.ListBlocksResponse{
|
|
BlockContainers: containers,
|
|
TotalSize: int32(1),
|
|
NextPageToken: strconv.Itoa(0),
|
|
}, nil
|
|
}
|
|
|
|
return nil, status.Error(codes.InvalidArgument, "Must specify a filter criteria for fetching blocks")
|
|
}
|
|
|
|
// GetChainHead retrieves information about the head of the beacon chain from
|
|
// the view of the beacon chain node.
|
|
//
|
|
// This includes the head block slot and root as well as information about
|
|
// the most recent finalized and justified slots.
|
|
func (bs *Server) GetChainHead(ctx context.Context, _ *ptypes.Empty) (*ethpb.ChainHead, error) {
|
|
return bs.chainHeadRetrieval(ctx)
|
|
}
|
|
|
|
// StreamBlocks to clients every single time a block is received by the beacon node.
|
|
func (bs *Server) StreamBlocks(_ *ptypes.Empty, stream ethpb.BeaconChain_StreamBlocksServer) error {
|
|
blocksChannel := make(chan *feed.Event, 1)
|
|
blockSub := bs.BlockNotifier.BlockFeed().Subscribe(blocksChannel)
|
|
defer blockSub.Unsubscribe()
|
|
for {
|
|
select {
|
|
case event := <-blocksChannel:
|
|
if event.Type == blockfeed.ReceivedBlock {
|
|
data, ok := event.Data.(*blockfeed.ReceivedBlockData)
|
|
if !ok {
|
|
// Got bad data over the stream.
|
|
continue
|
|
}
|
|
if data.SignedBlock == nil {
|
|
// One nil block shouldn't stop the stream.
|
|
continue
|
|
}
|
|
headState, err := bs.HeadFetcher.HeadState(bs.Ctx)
|
|
if err != nil {
|
|
log.WithError(err).WithField("blockSlot", data.SignedBlock.Block.Slot).Warn("Could not get head state to verify block signature")
|
|
continue
|
|
}
|
|
|
|
if err := blocks.VerifyBlockSignature(headState, data.SignedBlock); err != nil {
|
|
log.WithError(err).WithField("blockSlot", data.SignedBlock.Block.Slot).Warn("Could not verify block signature")
|
|
continue
|
|
}
|
|
if err := stream.Send(data.SignedBlock); err != nil {
|
|
return status.Errorf(codes.Unavailable, "Could not send over stream: %v", err)
|
|
}
|
|
}
|
|
case <-blockSub.Err():
|
|
return status.Error(codes.Aborted, "Subscriber closed, exiting goroutine")
|
|
case <-bs.Ctx.Done():
|
|
return status.Error(codes.Canceled, "Context canceled")
|
|
case <-stream.Context().Done():
|
|
return status.Error(codes.Canceled, "Context canceled")
|
|
}
|
|
}
|
|
}
|
|
|
|
// StreamChainHead to clients every single time the head block and state of the chain change.
|
|
func (bs *Server) StreamChainHead(_ *ptypes.Empty, stream ethpb.BeaconChain_StreamChainHeadServer) error {
|
|
stateChannel := make(chan *feed.Event, 1)
|
|
stateSub := bs.StateNotifier.StateFeed().Subscribe(stateChannel)
|
|
defer stateSub.Unsubscribe()
|
|
for {
|
|
select {
|
|
case event := <-stateChannel:
|
|
if event.Type == statefeed.BlockProcessed {
|
|
res, err := bs.chainHeadRetrieval(stream.Context())
|
|
if err != nil {
|
|
return status.Errorf(codes.Internal, "Could not retrieve chain head: %v", err)
|
|
}
|
|
if err := stream.Send(res); err != nil {
|
|
return status.Errorf(codes.Unavailable, "Could not send over stream: %v", err)
|
|
}
|
|
}
|
|
case <-stateSub.Err():
|
|
return status.Error(codes.Aborted, "Subscriber closed, exiting goroutine")
|
|
case <-bs.Ctx.Done():
|
|
return status.Error(codes.Canceled, "Context canceled")
|
|
case <-stream.Context().Done():
|
|
return status.Error(codes.Canceled, "Context canceled")
|
|
}
|
|
}
|
|
}
|
|
|
|
// Retrieve chain head information from the DB and the current beacon state.
|
|
func (bs *Server) chainHeadRetrieval(ctx context.Context) (*ethpb.ChainHead, error) {
|
|
headBlock, err := bs.HeadFetcher.HeadBlock(ctx)
|
|
if err != nil {
|
|
return nil, status.Error(codes.Internal, "Could not get head block")
|
|
}
|
|
if headBlock == nil || headBlock.Block == nil {
|
|
return nil, status.Error(codes.Internal, "Head block of chain was nil")
|
|
}
|
|
headBlockRoot, err := headBlock.Block.HashTreeRoot()
|
|
if err != nil {
|
|
return nil, status.Errorf(codes.Internal, "Could not get head block root: %v", err)
|
|
}
|
|
|
|
isGenesis := func(cp *ethpb.Checkpoint) bool {
|
|
return bytesutil.ToBytes32(cp.Root) == params.BeaconConfig().ZeroHash && cp.Epoch == 0
|
|
}
|
|
// Retrieve genesis block in the event we have genesis checkpoints.
|
|
genBlock, err := bs.BeaconDB.GenesisBlock(ctx)
|
|
if err != nil || genBlock == nil || genBlock.Block == nil {
|
|
return nil, status.Error(codes.Internal, "Could not get genesis block")
|
|
}
|
|
|
|
var b *ethpb.SignedBeaconBlock
|
|
|
|
finalizedCheckpoint := bs.FinalizationFetcher.FinalizedCheckpt()
|
|
if isGenesis(finalizedCheckpoint) {
|
|
b = genBlock
|
|
} else {
|
|
b, err = bs.BeaconDB.Block(ctx, bytesutil.ToBytes32(finalizedCheckpoint.Root))
|
|
if err != nil || b == nil || b.Block == nil {
|
|
return nil, status.Error(codes.Internal, "Could not get finalized block")
|
|
}
|
|
}
|
|
|
|
justifiedCheckpoint := bs.FinalizationFetcher.CurrentJustifiedCheckpt()
|
|
if isGenesis(justifiedCheckpoint) {
|
|
b = genBlock
|
|
} else {
|
|
b, err = bs.BeaconDB.Block(ctx, bytesutil.ToBytes32(justifiedCheckpoint.Root))
|
|
if err != nil || b == nil || b.Block == nil {
|
|
return nil, status.Error(codes.Internal, "Could not get justified block")
|
|
}
|
|
}
|
|
|
|
prevJustifiedCheckpoint := bs.FinalizationFetcher.PreviousJustifiedCheckpt()
|
|
if isGenesis(prevJustifiedCheckpoint) {
|
|
b = genBlock
|
|
} else {
|
|
b, err = bs.BeaconDB.Block(ctx, bytesutil.ToBytes32(prevJustifiedCheckpoint.Root))
|
|
if err != nil || b == nil || b.Block == nil {
|
|
return nil, status.Error(codes.Internal, "Could not get prev justified block")
|
|
}
|
|
}
|
|
|
|
fSlot, err := helpers.StartSlot(finalizedCheckpoint.Epoch)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
jSlot, err := helpers.StartSlot(justifiedCheckpoint.Epoch)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
pjSlot, err := helpers.StartSlot(prevJustifiedCheckpoint.Epoch)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return ðpb.ChainHead{
|
|
HeadSlot: headBlock.Block.Slot,
|
|
HeadEpoch: helpers.SlotToEpoch(headBlock.Block.Slot),
|
|
HeadBlockRoot: headBlockRoot[:],
|
|
FinalizedSlot: fSlot,
|
|
FinalizedEpoch: finalizedCheckpoint.Epoch,
|
|
FinalizedBlockRoot: finalizedCheckpoint.Root,
|
|
JustifiedSlot: jSlot,
|
|
JustifiedEpoch: justifiedCheckpoint.Epoch,
|
|
JustifiedBlockRoot: justifiedCheckpoint.Root,
|
|
PreviousJustifiedSlot: pjSlot,
|
|
PreviousJustifiedEpoch: prevJustifiedCheckpoint.Epoch,
|
|
PreviousJustifiedBlockRoot: prevJustifiedCheckpoint.Root,
|
|
}, nil
|
|
}
|
|
|
|
// GetWeakSubjectivityCheckpoint retrieves weak subjectivity state root, block root, and epoch.
|
|
func (bs *Server) GetWeakSubjectivityCheckpoint(ctx context.Context, _ *ptypes.Empty) (*ethpb.WeakSubjectivityCheckpoint, error) {
|
|
hs, err := bs.HeadFetcher.HeadState(ctx)
|
|
if err != nil {
|
|
return nil, status.Error(codes.Internal, "Could not get head state")
|
|
}
|
|
valCount := uint64(hs.NumValidators())
|
|
wsEpoch, err := helpers.WeakSubjectivityCheckptEpoch(valCount)
|
|
if err != nil {
|
|
return nil, status.Error(codes.Internal, "Could not get weak subjectivity epoch")
|
|
}
|
|
wsSlot, err := helpers.StartSlot(wsEpoch)
|
|
if err != nil {
|
|
return nil, status.Error(codes.Internal, "Could not get weak subjectivity slot")
|
|
}
|
|
|
|
wsState, err := bs.StateGen.StateBySlot(ctx, wsSlot)
|
|
if err != nil {
|
|
return nil, status.Error(codes.Internal, "Could not get weak subjectivity state")
|
|
}
|
|
stateRoot, err := wsState.HashTreeRoot(ctx)
|
|
if err != nil {
|
|
return nil, status.Error(codes.Internal, "Could not get weak subjectivity state root")
|
|
}
|
|
blkRoot, err := wsState.LatestBlockHeader().HashTreeRoot()
|
|
if err != nil {
|
|
return nil, status.Error(codes.Internal, "Could not get weak subjectivity block root")
|
|
}
|
|
|
|
return ðpb.WeakSubjectivityCheckpoint{
|
|
BlockRoot: blkRoot[:],
|
|
StateRoot: stateRoot[:],
|
|
Epoch: wsEpoch,
|
|
}, nil
|
|
}
|