prysm-pulse/beacon-chain/sync/validate_proposer_slashing.go
terence tsao 3edfa8cb88
Use Custom Type ValidatorIndex Across Prysm (#8478)
* Use ValidtorIndex across Prysm. Build ok

* First take at fixing tests

* Clean up e2e, fuzz... etc

* Fix new lines

* Update beacon-chain/cache/proposer_indices_test.go

Co-authored-by: Raul Jordan <raul@prysmaticlabs.com>

* Update beacon-chain/core/helpers/rewards_penalties.go

Co-authored-by: Raul Jordan <raul@prysmaticlabs.com>

* Update beacon-chain/core/helpers/shuffle.go

Co-authored-by: Raul Jordan <raul@prysmaticlabs.com>

* Update validator/graffiti/parse_graffiti_test.go

Co-authored-by: Raul Jordan <raul@prysmaticlabs.com>

* Raul's feedback

* Fix downcast int -> uint64

* Victor's feedback

Co-authored-by: Raul Jordan <raul@prysmaticlabs.com>
Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
2021-02-23 00:14:50 +00:00

77 lines
2.4 KiB
Go

package sync
import (
"context"
"github.com/libp2p/go-libp2p-core/peer"
pubsub "github.com/libp2p/go-libp2p-pubsub"
types "github.com/prysmaticlabs/eth2-types"
ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1"
"github.com/prysmaticlabs/prysm/beacon-chain/core/blocks"
"github.com/prysmaticlabs/prysm/shared/traceutil"
"go.opencensus.io/trace"
)
// Clients who receive a proposer slashing on this topic MUST validate the conditions within VerifyProposerSlashing before
// forwarding it across the network.
func (s *Service) validateProposerSlashing(ctx context.Context, pid peer.ID, msg *pubsub.Message) pubsub.ValidationResult {
// Validation runs on publish (not just subscriptions), so we should approve any message from
// ourselves.
if pid == s.p2p.PeerID() {
return pubsub.ValidationAccept
}
// The head state will be too far away to validate any slashing.
if s.initialSync.Syncing() {
return pubsub.ValidationIgnore
}
ctx, span := trace.StartSpan(ctx, "sync.validateProposerSlashing")
defer span.End()
m, err := s.decodePubsubMessage(msg)
if err != nil {
log.WithError(err).Debug("Could not decode message")
traceutil.AnnotateError(span, err)
return pubsub.ValidationReject
}
slashing, ok := m.(*ethpb.ProposerSlashing)
if !ok {
return pubsub.ValidationReject
}
if slashing.Header_1 == nil || slashing.Header_1.Header == nil {
return pubsub.ValidationReject
}
if s.hasSeenProposerSlashingIndex(slashing.Header_1.Header.ProposerIndex) {
return pubsub.ValidationIgnore
}
headState, err := s.chain.HeadState(ctx)
if err != nil {
return pubsub.ValidationIgnore
}
if err := blocks.VerifyProposerSlashing(headState, slashing); err != nil {
return pubsub.ValidationReject
}
msg.ValidatorData = slashing // Used in downstream subscriber
return pubsub.ValidationAccept
}
// Returns true if the node has already received a valid proposer slashing received for the proposer with index
func (s *Service) hasSeenProposerSlashingIndex(i types.ValidatorIndex) bool {
s.seenProposerSlashingLock.RLock()
defer s.seenProposerSlashingLock.RUnlock()
_, seen := s.seenProposerSlashingCache.Get(i)
return seen
}
// Set proposer slashing index in proposer slashing cache.
func (s *Service) setProposerSlashingIndexSeen(i types.ValidatorIndex) {
s.seenProposerSlashingLock.Lock()
defer s.seenProposerSlashingLock.Unlock()
s.seenProposerSlashingCache.Add(i, true)
}