mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-28 22:27:17 +00:00
15f052c48d
* Starting * Fixed all the tests
72 lines
2.2 KiB
Go
72 lines
2.2 KiB
Go
package sync
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/gogo/protobuf/proto"
|
|
"github.com/karlseguin/ccache"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/blocks"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/state"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/p2p"
|
|
ethpb "github.com/prysmaticlabs/prysm/proto/eth/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/shared/hashutil"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
)
|
|
|
|
// seenAttesterSlashings represents a cache of all the seen slashings
|
|
var seenAttesterSlashings = ccache.New(ccache.Configure())
|
|
|
|
func attSlashingCacheKey(slashing *ethpb.AttesterSlashing) (string, error) {
|
|
hash, err := hashutil.HashProto(slashing)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return string(hash[:]), nil
|
|
}
|
|
|
|
// Clients who receive an attester slashing on this topic MUST validate the conditions within VerifyAttesterSlashing before
|
|
// forwarding it across the network.
|
|
func (r *RegularSync) validateAttesterSlashing(ctx context.Context, msg proto.Message, p p2p.Broadcaster) bool {
|
|
slashing, ok := msg.(*ethpb.AttesterSlashing)
|
|
if !ok {
|
|
return false
|
|
}
|
|
cacheKey, err := attSlashingCacheKey(slashing)
|
|
if err != nil {
|
|
log.WithError(err).Warn("could not hash attester slashing")
|
|
return false
|
|
}
|
|
|
|
invalidKey := invalid + cacheKey
|
|
if seenAttesterSlashings.Get(invalidKey) != nil {
|
|
return false
|
|
}
|
|
if seenAttesterSlashings.Get(cacheKey) != nil {
|
|
return false
|
|
}
|
|
|
|
// Retrieve head state, advance state to the epoch slot used specified in slashing message.
|
|
s := r.chain.HeadState()
|
|
slashSlot := slashing.Attestation_1.Data.Target.Epoch * params.BeaconConfig().SlotsPerEpoch
|
|
if s.Slot < slashSlot {
|
|
var err error
|
|
s, err = state.ProcessSlots(ctx, s, slashSlot)
|
|
if err != nil {
|
|
log.WithError(err).Errorf("Failed to advance state to slot %d", slashSlot)
|
|
return false
|
|
}
|
|
}
|
|
|
|
if err := blocks.VerifyAttesterSlashing(s, slashing); err != nil {
|
|
log.WithError(err).Warn("Received invalid attester slashing")
|
|
seenAttesterSlashings.Set(invalidKey, true /*value*/, oneYear /*TTL*/)
|
|
return false
|
|
}
|
|
seenAttesterSlashings.Set(cacheKey, true /*value*/, oneYear /*TTL*/)
|
|
|
|
if err := p.Broadcast(ctx, slashing); err != nil {
|
|
log.WithError(err).Error("Failed to propagate attester slashing")
|
|
}
|
|
return true
|
|
}
|