mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-28 14:17:17 +00:00
62b617fa9a
* Add method to fetch account statuses * Add status command * gofmt * Add comment about sorting * Close conneciton when finished * Fix error * Refactor FetchAccountStatuses * Add status_test.go * Move sorting out of FetchAccountStatuses * Remove unnecessary casting * Expect ValidatorStatus to be called * Wrap long comment * Comment out sorting * Add all necessary dial options * Close connection before evaluating error from fetch * Small changes * Fix lint issues * Merge branch 'master' into validator-client-account-statuses * Update dependencies for docker images * Rename multipleValidatorStatus to activationStatus * Merge branch 'master' of https://github.com/prysmaticlabs/prysm into validator-client-account-statuses * Update commit hash for ethereumapis * Implement MultipleValidatorStatus * Tests for MultipleValidatorStatus * Fix bugs * Merge branch 'master' of https://github.com/prysmaticlabs/prysm into validator-client-account-statuses * Add export comment for MultipleValidatorStatus * Run `go fmt` in prysm (#5815) * go fmt * Add fix for nil state in InitializeFromProto (#5817) * Add nil check and tests * Add unsafe test * Update tools/genesis-state-gen/main.go * Undo genesis state gen changes * Merge branch 'proto-fuzz-fix' of github.com:prysmaticlabs/prysm into proto-fuzz-fix * gaz * Fix * Add export comment for MultipleValidatorStatus * Clean up comments * Update mock files for beacon_node_validator_service * Merge branch 'validator-client-account-statuses' of https://github.com/michaelhly/prysm into validator-client-account-statuses * Run gazelle * Fix mock issues * Fetch statuses in batches * Simplify public key generation for status_test * Sort validator statuses by status type * Format validator statuses and print to console * Fix lint issues * Delimit with commas * Merge branch 'master' of https://github.com/prysmaticlabs/prysm into validator-client-account-statuses * Rename otheropts to extraopts * Merge branch 'master' into validator-client-account-statuses * Merge branch 'validator-client-account-statuses' of https://github.com/michaelhly/prysm into validator-client-account-statuses * Merge branch 'master' of https://github.com/prysmaticlabs/prysm into validator-client-account-statuses * Clean up MultipleValidatorStatus tests * Add sync checker to MultipleValidatorStatus * Update formatting * Prepend 0x to validator keys * Check number of status blocks recieved in status_test * Move sorting to goroutine * Capitalize constants * Fix typo * Use mock reponses in sort test * Remove byteutils * Fix ugly format * Add comment on MultipleValidatorStatus test * Merge branch 'master' of https://github.com/prysmaticlabs/prysm into validator-client-account-statuses * Create entrypoint to run status command, and make unexported functions internal * Move merge step into FetchAccountStatuses * Revert service.go * Remove responseToSortedMetadata * Simplify mergeTwo * Replace fmt output with logrus * Fix typo * Merge branch 'master' into validator-client-account-statuses * Update comment * Merge branch 'validator-client-account-statuses' of https://github.com/michaelhly/prysm into validator-client-account-statuses * Return error on bad credentials * Merge branch 'master' into validator-client-account-statuses * Merge branch 'master' into validator-client-account-statuses * Merge branch 'master' of https://github.com/prysmaticlabs/prysm into validator-client-account-statuses * Skip merge step on error * Fix conflicts * Fix mock paths * Add comments * Convert some sprintfs to wrapfs * Merge branch 'master' of https://github.com/prysmaticlabs/prysm into validator-client-account-statuses * Rename ExtractPublicKeys to ExtractPublicKeysFromKeyStore and move to account.go * Add support for keymanager * Add supported flags to flags list * Log warning on intermediary errors * Update output * Merge branch 'master' of https://github.com/prysmaticlabs/prysm into validator-client-account-statuses * Merge branch 'master' into validator-client-account-statuses * Fix conflicts * Merge branch 'master' of https://github.com/prysmaticlabs/prysm into validator-client-account-statuses * Merge branch 'validator-client-account-statuses' of https://github.com/michaelhly/prysm into validator-client-account-statuses * Set context timeout for FetchAccountStatuses * Remove deprecated grpc.WithTimeout * gofmt * Remove getters * Remove parallel stuff * Move grpc dialing out of status.go * Update logging based on feedback * Update validator/accounts/status.go
255 lines
8.7 KiB
Go
255 lines
8.7 KiB
Go
package validator
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"math/big"
|
|
"time"
|
|
|
|
ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
stateTrie "github.com/prysmaticlabs/prysm/beacon-chain/state"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"github.com/prysmaticlabs/prysm/shared/traceutil"
|
|
"go.opencensus.io/trace"
|
|
"google.golang.org/grpc/codes"
|
|
"google.golang.org/grpc/status"
|
|
)
|
|
|
|
var errPubkeyDoesNotExist = errors.New("pubkey does not exist")
|
|
|
|
// ValidatorStatus returns the validator status of the current epoch.
|
|
// The status response can be one of the following:
|
|
// DEPOSITED - validator's deposit has been recognized by Ethereum 1, not yet recognized by Ethereum 2.
|
|
// PENDING - validator is in Ethereum 2's activation queue.
|
|
// ACTIVE - validator is active.
|
|
// EXITING - validator has initiated an an exit request, or has dropped below the ejection balance and is being kicked out.
|
|
// EXITED - validator is no longer validating.
|
|
// SLASHING - validator has been kicked out due to meeting a slashing condition.
|
|
// UNKNOWN_STATUS - validator does not have a known status in the network.
|
|
func (vs *Server) ValidatorStatus(
|
|
ctx context.Context,
|
|
req *ethpb.ValidatorStatusRequest) (*ethpb.ValidatorStatusResponse, error) {
|
|
headState, err := vs.HeadFetcher.HeadState(ctx)
|
|
if err != nil {
|
|
return nil, status.Error(codes.Internal, "Could not get head state")
|
|
}
|
|
return vs.validatorStatus(ctx, req.PublicKey, headState), nil
|
|
}
|
|
|
|
// MultipleValidatorStatus is the same as ValidatorStatus. Supports retrieval of multiple
|
|
// validator statuses. Takes a list of public keys or a list of validator indices.
|
|
func (vs *Server) MultipleValidatorStatus(
|
|
ctx context.Context,
|
|
req *ethpb.MultipleValidatorStatusRequest) (*ethpb.MultipleValidatorStatusResponse, error) {
|
|
if vs.SyncChecker.Syncing() {
|
|
return nil, status.Errorf(codes.Unavailable, "Syncing to latest head, not ready to respond")
|
|
}
|
|
headState, err := vs.HeadFetcher.HeadState(ctx)
|
|
if err != nil {
|
|
return nil, status.Error(codes.Internal, "Could not get head state")
|
|
}
|
|
responseCap := len(req.PublicKeys) + len(req.Indices)
|
|
pubkeys := make([][]byte, 0, responseCap)
|
|
filtered := make(map[[48]byte]bool)
|
|
filtered[[48]byte{}] = true // Filter out keys with all zeros.
|
|
// Filter out duplicate public keys.
|
|
for _, pubKey := range req.PublicKeys {
|
|
pubkeyBytes := bytesutil.ToBytes48(pubKey)
|
|
if !filtered[pubkeyBytes] {
|
|
pubkeys = append(pubkeys, pubKey)
|
|
filtered[pubkeyBytes] = true
|
|
}
|
|
}
|
|
// Convert indices to public keys.
|
|
for _, idx := range req.Indices {
|
|
pubkeyBytes := headState.PubkeyAtIndex(uint64(idx))
|
|
if !filtered[pubkeyBytes] {
|
|
pubkeys = append(pubkeys, pubkeyBytes[:])
|
|
filtered[pubkeyBytes] = true
|
|
}
|
|
}
|
|
// Fetch statuses from beacon state.
|
|
statuses := make([]*ethpb.ValidatorStatusResponse, len(pubkeys))
|
|
for i, pubKey := range pubkeys {
|
|
statuses[i] = vs.validatorStatus(ctx, pubKey, headState)
|
|
}
|
|
|
|
return ðpb.MultipleValidatorStatusResponse{
|
|
PublicKeys: pubkeys,
|
|
Statuses: statuses,
|
|
}, nil
|
|
}
|
|
|
|
// activationStatus returns the validator status response for the set of validators
|
|
// requested by their pub keys.
|
|
func (vs *Server) activationStatus(
|
|
ctx context.Context,
|
|
pubkeys [][]byte,
|
|
) (bool, []*ethpb.ValidatorActivationResponse_Status, error) {
|
|
headState, err := vs.HeadFetcher.HeadState(ctx)
|
|
if err != nil {
|
|
return false, nil, err
|
|
}
|
|
activeValidatorExists := false
|
|
statusResponses := make([]*ethpb.ValidatorActivationResponse_Status, len(pubkeys))
|
|
for i, key := range pubkeys {
|
|
if ctx.Err() != nil {
|
|
return false, nil, ctx.Err()
|
|
}
|
|
status := vs.validatorStatus(ctx, key, headState)
|
|
if status == nil {
|
|
continue
|
|
}
|
|
resp := ðpb.ValidatorActivationResponse_Status{
|
|
Status: status,
|
|
PublicKey: key,
|
|
}
|
|
statusResponses[i] = resp
|
|
if status.Status == ethpb.ValidatorStatus_ACTIVE {
|
|
activeValidatorExists = true
|
|
}
|
|
}
|
|
|
|
return activeValidatorExists, statusResponses, nil
|
|
}
|
|
|
|
func (vs *Server) validatorStatus(ctx context.Context, pubKey []byte, headState *stateTrie.BeaconState) *ethpb.ValidatorStatusResponse {
|
|
ctx, span := trace.StartSpan(ctx, "validatorServer.validatorStatus")
|
|
defer span.End()
|
|
|
|
resp := ðpb.ValidatorStatusResponse{
|
|
Status: ethpb.ValidatorStatus_UNKNOWN_STATUS,
|
|
ActivationEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
}
|
|
vStatus, idx, err := vs.retrieveStatusFromState(ctx, pubKey, headState)
|
|
if err != nil && err != errPubkeyDoesNotExist {
|
|
traceutil.AnnotateError(span, err)
|
|
return resp
|
|
}
|
|
resp.Status = vStatus
|
|
if err != errPubkeyDoesNotExist {
|
|
val, err := headState.ValidatorAtIndexReadOnly(idx)
|
|
if err != nil {
|
|
traceutil.AnnotateError(span, err)
|
|
return resp
|
|
}
|
|
resp.ActivationEpoch = val.ActivationEpoch()
|
|
}
|
|
|
|
switch resp.Status {
|
|
// Unknown status means the validator has not been put into the state yet.
|
|
case ethpb.ValidatorStatus_UNKNOWN_STATUS:
|
|
// If no connection to ETH1, the deposit block number or position in queue cannot be determined.
|
|
if !vs.Eth1InfoFetcher.IsConnectedToETH1() {
|
|
log.Warn("Not connected to ETH1. Cannot determine validator ETH1 deposit block number")
|
|
return resp
|
|
}
|
|
_, eth1BlockNumBigInt := vs.DepositFetcher.DepositByPubkey(ctx, pubKey)
|
|
if eth1BlockNumBigInt == nil { // No deposit found in ETH1.
|
|
return resp
|
|
}
|
|
|
|
// Mark a validator as DEPOSITED if their deposit is visible.
|
|
resp.Status = ethpb.ValidatorStatus_DEPOSITED
|
|
|
|
resp.Eth1DepositBlockNumber = eth1BlockNumBigInt.Uint64()
|
|
|
|
depositBlockSlot, err := vs.depositBlockSlot(ctx, eth1BlockNumBigInt, headState)
|
|
if err != nil {
|
|
return resp
|
|
}
|
|
resp.DepositInclusionSlot = depositBlockSlot
|
|
// Deposited and Pending mean the validator has been put into the state.
|
|
case ethpb.ValidatorStatus_DEPOSITED, ethpb.ValidatorStatus_PENDING:
|
|
var lastActivatedValidatorIdx uint64
|
|
for j := headState.NumValidators() - 1; j >= 0; j-- {
|
|
val, err := headState.ValidatorAtIndexReadOnly(uint64(j))
|
|
if err != nil {
|
|
return resp
|
|
}
|
|
if helpers.IsActiveValidatorUsingTrie(val, helpers.CurrentEpoch(headState)) {
|
|
lastActivatedValidatorIdx = uint64(j)
|
|
break
|
|
}
|
|
}
|
|
// Our position in the activation queue is the above index - our validator index.
|
|
if lastActivatedValidatorIdx < idx {
|
|
resp.PositionInActivationQueue = idx - lastActivatedValidatorIdx
|
|
}
|
|
default:
|
|
return resp
|
|
}
|
|
|
|
return resp
|
|
}
|
|
|
|
func (vs *Server) retrieveStatusFromState(
|
|
ctx context.Context,
|
|
pubKey []byte,
|
|
headState *stateTrie.BeaconState,
|
|
) (ethpb.ValidatorStatus, uint64, error) {
|
|
if headState == nil {
|
|
return ethpb.ValidatorStatus_UNKNOWN_STATUS, 0, errors.New("head state does not exist")
|
|
}
|
|
idx, ok := headState.ValidatorIndexByPubkey(bytesutil.ToBytes48(pubKey))
|
|
if !ok || int(idx) >= headState.NumValidators() {
|
|
return ethpb.ValidatorStatus_UNKNOWN_STATUS, 0, errPubkeyDoesNotExist
|
|
}
|
|
return vs.assignmentStatus(idx, headState), idx, nil
|
|
}
|
|
|
|
func (vs *Server) assignmentStatus(validatorIdx uint64, beaconState *stateTrie.BeaconState) ethpb.ValidatorStatus {
|
|
validator, err := beaconState.ValidatorAtIndexReadOnly(validatorIdx)
|
|
if err != nil {
|
|
return ethpb.ValidatorStatus_UNKNOWN_STATUS
|
|
}
|
|
currentEpoch := helpers.CurrentEpoch(beaconState)
|
|
farFutureEpoch := params.BeaconConfig().FarFutureEpoch
|
|
|
|
if validator == nil {
|
|
return ethpb.ValidatorStatus_UNKNOWN_STATUS
|
|
}
|
|
if currentEpoch < validator.ActivationEligibilityEpoch() {
|
|
return ethpb.ValidatorStatus_DEPOSITED
|
|
}
|
|
if currentEpoch < validator.ActivationEpoch() {
|
|
return ethpb.ValidatorStatus_PENDING
|
|
}
|
|
if validator.ExitEpoch() == farFutureEpoch {
|
|
return ethpb.ValidatorStatus_ACTIVE
|
|
}
|
|
if currentEpoch < validator.ExitEpoch() {
|
|
if validator.Slashed() {
|
|
return ethpb.ValidatorStatus_SLASHING
|
|
}
|
|
return ethpb.ValidatorStatus_EXITING
|
|
}
|
|
return ethpb.ValidatorStatus_EXITED
|
|
}
|
|
|
|
func (vs *Server) depositBlockSlot(ctx context.Context, eth1BlockNumBigInt *big.Int, beaconState *stateTrie.BeaconState) (uint64, error) {
|
|
var depositBlockSlot uint64
|
|
blockTimeStamp, err := vs.BlockFetcher.BlockTimeByHeight(ctx, eth1BlockNumBigInt)
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
followTime := time.Duration(params.BeaconConfig().Eth1FollowDistance*params.BeaconConfig().GoerliBlockTime) * time.Second
|
|
eth1UnixTime := time.Unix(int64(blockTimeStamp), 0).Add(followTime)
|
|
period := params.BeaconConfig().SlotsPerEpoch * params.BeaconConfig().EpochsPerEth1VotingPeriod
|
|
votingPeriod := time.Duration(period*params.BeaconConfig().SecondsPerSlot) * time.Second
|
|
timeToInclusion := eth1UnixTime.Add(votingPeriod)
|
|
|
|
eth2Genesis := time.Unix(int64(beaconState.GenesisTime()), 0)
|
|
|
|
if eth2Genesis.After(timeToInclusion) {
|
|
depositBlockSlot = 0
|
|
} else {
|
|
eth2TimeDifference := timeToInclusion.Sub(eth2Genesis).Seconds()
|
|
depositBlockSlot = uint64(eth2TimeDifference) / params.BeaconConfig().SecondsPerSlot
|
|
}
|
|
|
|
return depositBlockSlot, nil
|
|
}
|