prysm-pulse/beacon-chain/slasher/process_slashings.go
terencechain d17996f8b0
Update to V4 🚀 (#12134)
* Update V3 from V4

* Fix build v3 -> v4

* Update ssz

* Update beacon_chain.pb.go

* Fix formatter import

* Update update-mockgen.sh comment to v4

* Fix conflicts. Pass build and tests

* Fix test
2023-03-17 18:52:56 +00:00

96 lines
3.2 KiB
Go

package slasher
import (
"context"
"github.com/prysmaticlabs/prysm/v4/beacon-chain/core/blocks"
"github.com/prysmaticlabs/prysm/v4/beacon-chain/state"
"github.com/prysmaticlabs/prysm/v4/encoding/bytesutil"
ethpb "github.com/prysmaticlabs/prysm/v4/proto/prysm/v1alpha1"
)
// Verifies attester slashings, logs them, and submits them to the slashing operations pool
// in the beacon node if they pass validation.
func (s *Service) processAttesterSlashings(ctx context.Context, slashings []*ethpb.AttesterSlashing) error {
var beaconState state.BeaconState
var err error
if len(slashings) > 0 {
beaconState, err = s.serviceCfg.HeadStateFetcher.HeadState(ctx)
if err != nil {
return err
}
}
for _, sl := range slashings {
if err := s.verifyAttSignature(ctx, sl.Attestation_1); err != nil {
log.WithError(err).WithField("a", sl.Attestation_1).Warn(
"Invalid signature for attestation in detected slashing offense",
)
continue
}
if err := s.verifyAttSignature(ctx, sl.Attestation_2); err != nil {
log.WithError(err).WithField("b", sl.Attestation_2).Warn(
"Invalid signature for attestation in detected slashing offense",
)
continue
}
// Log the slashing event and insert into the beacon node's operations pool.
logAttesterSlashing(sl)
if err := s.serviceCfg.SlashingPoolInserter.InsertAttesterSlashing(
ctx, beaconState, sl,
); err != nil {
log.WithError(err).Error("Could not insert attester slashing into operations pool")
}
}
return nil
}
// Verifies proposer slashings, logs them, and submits them to the slashing operations pool
// in the beacon node if they pass validation.
func (s *Service) processProposerSlashings(ctx context.Context, slashings []*ethpb.ProposerSlashing) error {
var beaconState state.BeaconState
var err error
if len(slashings) > 0 {
beaconState, err = s.serviceCfg.HeadStateFetcher.HeadState(ctx)
if err != nil {
return err
}
}
for _, sl := range slashings {
if err := s.verifyBlockSignature(ctx, sl.Header_1); err != nil {
log.WithError(err).WithField("a", sl.Header_1).Warn(
"Invalid signature for block header in detected slashing offense",
)
continue
}
if err := s.verifyBlockSignature(ctx, sl.Header_2); err != nil {
log.WithError(err).WithField("b", sl.Header_2).Warn(
"Invalid signature for block header in detected slashing offense",
)
continue
}
// Log the slashing event and insert into the beacon node's operations pool.
logProposerSlashing(sl)
if err := s.serviceCfg.SlashingPoolInserter.InsertProposerSlashing(ctx, beaconState, sl); err != nil {
log.WithError(err).Error("Could not insert proposer slashing into operations pool")
}
}
return nil
}
func (s *Service) verifyBlockSignature(ctx context.Context, header *ethpb.SignedBeaconBlockHeader) error {
parentState, err := s.serviceCfg.StateGen.StateByRoot(ctx, bytesutil.ToBytes32(header.Header.ParentRoot))
if err != nil {
return err
}
return blocks.VerifyBlockHeaderSignature(parentState, header)
}
func (s *Service) verifyAttSignature(ctx context.Context, att *ethpb.IndexedAttestation) error {
preState, err := s.serviceCfg.AttestationStateFetcher.AttestationTargetState(ctx, att.Data.Target)
if err != nil {
return err
}
return blocks.VerifyIndexedAttestation(ctx, preState, att)
}