prysm-pulse/beacon-chain/sync/validate_proposer_slashing.go
Nishant Das 667466020e Change All Caches To Ristretto (#4208)
* new caches
* goimports, gaz
* fix all tests
* Merge branch 'swapP2PCaches' of https://github.com/prysmaticlabs/geth-sharding into swapP2PCaches
* remove from bls
* remove ccache
* fix handshake
* Merge branch 'master' into swapP2PCaches
* gofmt
* Merge branch 'master' into swapP2PCaches
2019-12-06 20:06:37 +00:00

96 lines
2.9 KiB
Go

package sync
import (
"context"
"github.com/dgraph-io/ristretto"
"github.com/gogo/protobuf/proto"
"github.com/pkg/errors"
ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1"
"github.com/prysmaticlabs/prysm/beacon-chain/core/blocks"
"github.com/prysmaticlabs/prysm/beacon-chain/core/state"
"github.com/prysmaticlabs/prysm/beacon-chain/p2p"
"github.com/prysmaticlabs/prysm/shared/hashutil"
"go.opencensus.io/trace"
)
var seenProposerSlashingCacheSize = int64(1 << 10)
// seenProposerSlashings represents a cache of all the seen slashings
var seenProposerSlashings, _ = ristretto.NewCache(&ristretto.Config{
NumCounters: seenProposerSlashingCacheSize,
MaxCost: seenProposerSlashingCacheSize,
BufferItems: 64,
})
func propSlashingCacheKey(slashing *ethpb.ProposerSlashing) (string, error) {
hash, err := hashutil.HashProto(slashing)
if err != nil {
return "", err
}
return string(hash[:]), nil
}
// Clients who receive a proposer slashing on this topic MUST validate the conditions within VerifyProposerSlashing before
// forwarding it across the network.
func (r *RegularSync) validateProposerSlashing(ctx context.Context, msg proto.Message, p p2p.Broadcaster, fromSelf bool) (bool, error) {
// The head state will be too far away to validate any slashing.
if r.initialSync.Syncing() {
return false, nil
}
ctx, span := trace.StartSpan(ctx, "sync.validateProposerSlashing")
defer span.End()
slashing, ok := msg.(*ethpb.ProposerSlashing)
if !ok {
return false, nil
}
cacheKey, err := propSlashingCacheKey(slashing)
if err != nil {
return false, errors.Wrapf(err, "could not hash proposer slashing")
}
invalidKey := invalid + cacheKey
if _, ok := seenProposerSlashings.Get(invalidKey); ok {
return false, errors.New("previously seen invalid proposer slashing received")
}
if _, ok := seenProposerSlashings.Get(cacheKey); ok {
return false, nil
}
// Retrieve head state, advance state to the epoch slot used specified in slashing message.
s, err := r.chain.HeadState(ctx)
if err != nil {
return false, errors.Wrap(err, "Could not get head state")
}
slashSlot := slashing.Header_1.Slot
if s.Slot < slashSlot {
if ctx.Err() != nil {
return false, errors.Wrapf(ctx.Err(),
"Failed to advance state to slot %d to process proposer slashing", slashSlot)
}
var err error
s, err = state.ProcessSlots(ctx, s, slashSlot)
if err != nil {
return false, errors.Wrapf(err, "Failed to advance state to slot %d", slashSlot)
}
}
if err := blocks.VerifyProposerSlashing(s, slashing); err != nil {
seenProposerSlashings.Set(invalidKey, true /*value*/, 1 /*cost*/)
return false, errors.Wrap(err, "Received invalid proposer slashing")
}
seenProposerSlashings.Set(cacheKey, true /*value*/, 1 /*cost*/)
if fromSelf {
return false, nil
}
if err := p.Broadcast(ctx, slashing); err != nil {
log.WithError(err).Error("Failed to propagate proposer slashing")
}
return true, nil
}