prysm-pulse/slasher/rpc/server.go
Preston Van Loon 7cc32c4dda
Various code inspection resolutions (#7438)
* remove unused code

* remove defer use in loop

* Remove unused methods and constants

* gofmt and gaz

* nilness check

* remove unused args

* Add TODO for refactoring subscribeWithBase to remove unused arg. It seems too involved to include in this sweeping PR. https://github.com/prysmaticlabs/prysm/issues/7437

* replace empty slice declaration

* Remove unnecessary type conversions

* remove redundant type declaration

* rename receivers to be consistent

* Remove bootnode query tool. It is now obsolete by discv5

* Remove relay node. It is no longer used or supported

* Revert "Remove relay node. It is no longer used or supported"

This reverts commit 4bd7717334dad85ef4766ed9bc4da711fb5fa810.

* Delete unused test directory

* Delete unsupported gcp startup script

* Delete old k8s script

* build fixes

* fix build

* go mod tidy

* revert slasher/db/kv/block_header.go

* fix build

* remove redundant nil check

* combine func args

Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
Co-authored-by: Victor Farazdagi <simple.square@gmail.com>
2020-10-12 08:11:05 +00:00

206 lines
6.8 KiB
Go

package rpc
import (
"context"
"sync"
"github.com/pkg/errors"
ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1"
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
slashpb "github.com/prysmaticlabs/prysm/proto/slashing"
"github.com/prysmaticlabs/prysm/shared/attestationutil"
"github.com/prysmaticlabs/prysm/shared/bls"
"github.com/prysmaticlabs/prysm/shared/p2putils"
"github.com/prysmaticlabs/prysm/shared/params"
"github.com/prysmaticlabs/prysm/slasher/beaconclient"
"github.com/prysmaticlabs/prysm/slasher/db"
"github.com/prysmaticlabs/prysm/slasher/detection"
"github.com/sirupsen/logrus"
"go.opencensus.io/trace"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/status"
)
// Server defines a server implementation of the gRPC Slasher service,
// providing RPC endpoints for retrieving slashing proofs for malicious validators.
type Server struct {
ctx context.Context
detector *detection.Service
slasherDB db.Database
beaconClient *beaconclient.Service
attestationLock sync.Mutex
proposeLock sync.Mutex
}
// IsSlashableAttestation returns an attester slashing if the attestation submitted
// is a slashable vote.
func (ss *Server) IsSlashableAttestation(ctx context.Context, req *ethpb.IndexedAttestation) (*slashpb.AttesterSlashingResponse, error) {
ctx, span := trace.StartSpan(ctx, "detection.IsSlashableAttestation")
defer span.End()
log.WithFields(logrus.Fields{
"slot": req.Data.Slot,
"indices": req.AttestingIndices,
}).Debug("Received attestation via RPC")
if req == nil {
return nil, status.Error(codes.InvalidArgument, "nil request provided")
}
if req.Data == nil {
return nil, status.Error(codes.InvalidArgument, "nil request data provided")
}
if req.Data.Target == nil {
return nil, status.Error(codes.InvalidArgument, "nil request data target provided")
}
if req.Data.Source == nil {
return nil, status.Error(codes.InvalidArgument, "nil request data source provided")
}
if req.Signature == nil {
return nil, status.Error(codes.InvalidArgument, "nil signature provided")
}
err := attestationutil.IsValidAttestationIndices(ctx, req)
if err != nil {
return nil, err
}
gvr, err := ss.beaconClient.GenesisValidatorsRoot(ctx)
if err != nil {
return nil, err
}
fork, err := p2putils.Fork(req.Data.Target.Epoch)
if err != nil {
return nil, err
}
domain, err := helpers.Domain(fork, req.Data.Target.Epoch, params.BeaconConfig().DomainBeaconAttester, gvr)
if err != nil {
return nil, err
}
indices := req.AttestingIndices
pkMap, err := ss.beaconClient.FindOrGetPublicKeys(ctx, indices)
if err != nil {
return nil, err
}
var pubkeys []bls.PublicKey
for _, pkBytes := range pkMap {
pk, err := bls.PublicKeyFromBytes(pkBytes)
if err != nil {
return nil, errors.Wrap(err, "could not deserialize validator public key")
}
pubkeys = append(pubkeys, pk)
}
err = attestationutil.VerifyIndexedAttestationSig(ctx, req, pubkeys, domain)
if err != nil {
log.WithError(err).Error("failed to verify indexed attestation signature")
return nil, status.Errorf(codes.Internal, "could not verify indexed attestation signature: %v: %v", req, err)
}
ss.attestationLock.Lock()
defer ss.attestationLock.Unlock()
slashings, err := ss.detector.DetectAttesterSlashings(ctx, req)
if err != nil {
return nil, status.Errorf(codes.Internal, "could not detect attester slashings for attestation: %v: %v", req, err)
}
if len(slashings) < 1 {
if err := ss.slasherDB.SaveIndexedAttestation(ctx, req); err != nil {
log.WithError(err).Error("Could not save indexed attestation")
return nil, status.Errorf(codes.Internal, "could not save indexed attestation: %v: %v", req, err)
}
if err := ss.detector.UpdateSpans(ctx, req); err != nil {
log.WithError(err).Error("could not update spans")
return nil, status.Errorf(codes.Internal, "failed to update spans: %v: %v", req, err)
}
}
return &slashpb.AttesterSlashingResponse{
AttesterSlashing: slashings,
}, nil
}
// IsSlashableBlock returns an proposer slashing if the block submitted
// is a double proposal.
func (ss *Server) IsSlashableBlock(ctx context.Context, req *ethpb.SignedBeaconBlockHeader) (*slashpb.ProposerSlashingResponse, error) {
ctx, span := trace.StartSpan(ctx, "detection.IsSlashableBlock")
defer span.End()
log.WithFields(logrus.Fields{
"slot": req.Header.Slot,
"proposer_index": req.Header.ProposerIndex,
}).Info("Received block via RPC")
if req == nil {
return nil, status.Error(codes.InvalidArgument, "nil request provided")
}
if req.Header == nil {
return nil, status.Error(codes.InvalidArgument, "nil header provided")
}
if req.Signature == nil {
return nil, status.Error(codes.InvalidArgument, "nil signature provided")
}
gvr, err := ss.beaconClient.GenesisValidatorsRoot(ctx)
if err != nil {
return nil, err
}
blockEpoch := helpers.SlotToEpoch(req.Header.Slot)
fork, err := p2putils.Fork(blockEpoch)
if err != nil {
return nil, err
}
domain, err := helpers.Domain(fork, blockEpoch, params.BeaconConfig().DomainBeaconProposer, gvr)
if err != nil {
return nil, err
}
pkMap, err := ss.beaconClient.FindOrGetPublicKeys(ctx, []uint64{req.Header.ProposerIndex})
if err != nil {
return nil, err
}
if err := helpers.VerifyBlockHeaderSigningRoot(
req.Header,
pkMap[req.Header.ProposerIndex],
req.Signature, domain); err != nil {
return nil, err
}
ss.proposeLock.Lock()
defer ss.proposeLock.Unlock()
slashing, err := ss.detector.DetectDoubleProposals(ctx, req)
if err != nil {
return nil, status.Errorf(codes.Internal, "could not detect proposer slashing for block: %v: %v", req, err)
}
psr := &slashpb.ProposerSlashingResponse{}
if slashing != nil {
psr = &slashpb.ProposerSlashingResponse{
ProposerSlashing: []*ethpb.ProposerSlashing{slashing},
}
}
return psr, nil
}
// IsSlashableAttestationNoUpdate returns true if the attestation submitted
// is a slashable vote (no db update is being done).
func (ss *Server) IsSlashableAttestationNoUpdate(ctx context.Context, req *ethpb.IndexedAttestation) (*slashpb.Slashable, error) {
sl := &slashpb.Slashable{}
slashings, err := ss.detector.DetectAttesterSlashings(ctx, req)
if err != nil {
return sl, status.Errorf(codes.Internal, "could not detect attester slashings for attestation: %v: %v", req, err)
}
if len(slashings) < 1 {
return sl, nil
}
sl.Slashable = true
return sl, nil
}
// IsSlashableBlockNoUpdate returns true if the block submitted
// is slashable (no db update is being done).
func (ss *Server) IsSlashableBlockNoUpdate(ctx context.Context, req *ethpb.BeaconBlockHeader) (*slashpb.Slashable, error) {
sl := &slashpb.Slashable{}
slash, err := ss.detector.DetectDoubleProposeNoUpdate(ctx, req)
if err != nil {
return sl, status.Errorf(codes.Internal, "could not detect proposer slashing for block: %v: %v", req, err)
}
sl.Slashable = slash
return sl, nil
}