mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-26 05:17:22 +00:00
ade61717a4
* first version * cli context * fix service * starting change to ccache * ristretto cache * added test * test on evict * remove evict test * test onevict * comment for exported flag * update all span maps on load * fix setup db * span cache added to help flags * start save cache on exit * save cache to db before close * comment fix * fix flags * setup db new * data update from archive node * gaz * slashing detection on old attestations * un-export * rename * nishant feedback * workspace cr * lint fix * fix calls * start db * fix test * Update slasher/db/db.go Co-Authored-By: Nishant Das <nishdas93@gmail.com> * add flag * fix fail to start beacon client * mock beacon service * fix imports * gaz * goimports * add clear db flag * print finalized epoch * better msg * Update slasher/db/attester_slashings.go Co-Authored-By: Raul Jordan <raul@prysmaticlabs.com> * raul feedback * raul feedback * raul feedback * raul feedback * raul feedback * add detection in runtime * fix tests * raul feedbacks * raul feedback * raul feedback * goimports * Update beacon-chain/blockchain/process_attestation_helpers.go * Update beacon-chain/blockchain/receive_block.go * Update beacon-chain/core/blocks/block_operations_test.go * Update beacon-chain/core/blocks/block_operations.go * Update beacon-chain/core/epoch/epoch_processing.go * Update beacon-chain/sync/validate_aggregate_proof_test.go * Update shared/testutil/block.go * Update slasher/service/data_update.go * Update tools/blocktree/main.go * Update slasher/service/service.go * Update beacon-chain/core/epoch/precompute/attestation_test.go * Update beacon-chain/core/helpers/committee_test.go * Update beacon-chain/core/state/transition_test.go * Update beacon-chain/rpc/aggregator/server_test.go * Update beacon-chain/sync/validate_aggregate_proof.go * Update beacon-chain/rpc/validator/proposer_test.go * Update beacon-chain/blockchain/forkchoice/process_attestation.go Co-Authored-By: terence tsao <terence@prysmaticlabs.com> * Update slasher/db/indexed_attestations.go Co-Authored-By: terence tsao <terence@prysmaticlabs.com> * Update slasher/service/data_update.go Co-Authored-By: terence tsao <terence@prysmaticlabs.com> * terence feedback * terence feedback * goimports Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com> Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> Co-authored-by: Nishant Das <nish1993@hotmail.com> Co-authored-by: terence tsao <terence@prysmaticlabs.com>
392 lines
14 KiB
Go
392 lines
14 KiB
Go
package blockchain
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/hex"
|
|
|
|
"github.com/gogo/protobuf/proto"
|
|
"github.com/pkg/errors"
|
|
ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1"
|
|
"github.com/prysmaticlabs/go-ssz"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/epoch/precompute"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/feed"
|
|
statefeed "github.com/prysmaticlabs/prysm/beacon-chain/core/feed/state"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
pb "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1"
|
|
"github.com/prysmaticlabs/prysm/shared/attestationutil"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/featureconfig"
|
|
"github.com/prysmaticlabs/prysm/shared/traceutil"
|
|
"github.com/sirupsen/logrus"
|
|
"go.opencensus.io/trace"
|
|
)
|
|
|
|
// BlockReceiver interface defines the methods of chain service receive and processing new blocks.
|
|
type BlockReceiver interface {
|
|
ReceiveBlock(ctx context.Context, block *ethpb.SignedBeaconBlock) error
|
|
ReceiveBlockNoPubsub(ctx context.Context, block *ethpb.SignedBeaconBlock) error
|
|
ReceiveBlockNoPubsubForkchoice(ctx context.Context, block *ethpb.SignedBeaconBlock) error
|
|
ReceiveBlockNoVerify(ctx context.Context, block *ethpb.SignedBeaconBlock) error
|
|
}
|
|
|
|
// ReceiveBlock is a function that defines the operations that are preformed on
|
|
// blocks that is received from rpc service. The operations consists of:
|
|
// 1. Gossip block to other peers
|
|
// 2. Validate block, apply state transition and update check points
|
|
// 3. Apply fork choice to the processed block
|
|
// 4. Save latest head info
|
|
func (s *Service) ReceiveBlock(ctx context.Context, block *ethpb.SignedBeaconBlock) error {
|
|
ctx, span := trace.StartSpan(ctx, "beacon-chain.blockchain.ReceiveBlock")
|
|
defer span.End()
|
|
|
|
root, err := ssz.HashTreeRoot(block.Block)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not get signing root on received block")
|
|
}
|
|
|
|
// Broadcast the new block to the network.
|
|
if err := s.p2p.Broadcast(ctx, block); err != nil {
|
|
return errors.Wrap(err, "could not broadcast block")
|
|
}
|
|
log.WithFields(logrus.Fields{
|
|
"blockRoot": hex.EncodeToString(root[:]),
|
|
}).Debug("Broadcasting block")
|
|
|
|
if err := s.ReceiveBlockNoPubsub(ctx, block); err != nil {
|
|
return err
|
|
}
|
|
|
|
processedBlk.Inc()
|
|
return nil
|
|
}
|
|
|
|
// ReceiveBlockNoPubsub is a function that defines the the operations (minus pubsub)
|
|
// that are preformed on blocks that is received from regular sync service. The operations consists of:
|
|
// 1. Validate block, apply state transition and update check points
|
|
// 2. Apply fork choice to the processed block
|
|
// 3. Save latest head info
|
|
func (s *Service) ReceiveBlockNoPubsub(ctx context.Context, block *ethpb.SignedBeaconBlock) error {
|
|
ctx, span := trace.StartSpan(ctx, "beacon-chain.blockchain.ReceiveBlockNoPubsub")
|
|
defer span.End()
|
|
blockCopy := proto.Clone(block).(*ethpb.SignedBeaconBlock)
|
|
|
|
// Apply state transition on the new block.
|
|
var postState *pb.BeaconState
|
|
var err error
|
|
if featureconfig.Get().ProtoArrayForkChoice {
|
|
postState, err = s.onBlock(ctx, blockCopy)
|
|
if err != nil {
|
|
err := errors.Wrap(err, "could not process block")
|
|
traceutil.AnnotateError(span, err)
|
|
return err
|
|
}
|
|
} else {
|
|
postState, err = s.forkChoiceStoreOld.OnBlockCacheFilteredTree(ctx, blockCopy)
|
|
if err != nil {
|
|
err := errors.Wrap(err, "could not process block from fork choice service")
|
|
traceutil.AnnotateError(span, err)
|
|
return err
|
|
}
|
|
}
|
|
|
|
root, err := ssz.HashTreeRoot(blockCopy.Block)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not get signing root on received block")
|
|
}
|
|
|
|
// Send notification of the processed block to the state feed.
|
|
s.stateNotifier.StateFeed().Send(&feed.Event{
|
|
Type: statefeed.BlockProcessed,
|
|
Data: &statefeed.BlockProcessedData{
|
|
BlockRoot: root,
|
|
Verified: true,
|
|
},
|
|
})
|
|
|
|
// Add attestations from the block to the pool for fork choice.
|
|
if err := s.attPool.SaveBlockAttestations(blockCopy.Block.Body.Attestations); err != nil {
|
|
log.Errorf("Could not save attestation for fork choice: %v", err)
|
|
return nil
|
|
}
|
|
for _, exit := range block.Block.Body.VoluntaryExits {
|
|
s.exitPool.MarkIncluded(exit)
|
|
}
|
|
|
|
// Reports on block and fork choice metrics.
|
|
s.reportSlotMetrics(blockCopy.Block.Slot)
|
|
|
|
// Log state transition data.
|
|
logStateTransitionData(blockCopy.Block)
|
|
|
|
s.epochParticipationLock.Lock()
|
|
defer s.epochParticipationLock.Unlock()
|
|
s.epochParticipation[helpers.SlotToEpoch(blockCopy.Block.Slot)] = precompute.Balances
|
|
|
|
processedBlkNoPubsub.Inc()
|
|
|
|
if featureconfig.Get().DisableForkChoice {
|
|
if err := s.saveHead(ctx, blockCopy, root); err != nil {
|
|
return errors.Wrap(err, "could not save head")
|
|
}
|
|
} else {
|
|
headRoot := make([]byte, 0)
|
|
if featureconfig.Get().ProtoArrayForkChoice {
|
|
if err := s.forkChoiceStore.ProcessBlock(ctx, blockCopy.Block.Slot, root, bytesutil.ToBytes32(blockCopy.Block.ParentRoot), postState.CurrentJustifiedCheckpoint.Epoch, postState.FinalizedCheckpoint.Epoch); err != nil {
|
|
return errors.Wrap(err, "could not process block for proto array fork choice")
|
|
}
|
|
|
|
for _, a := range blockCopy.Block.Body.Attestations {
|
|
committee, err := helpers.BeaconCommitteeFromState(postState, a.Data.Slot, a.Data.CommitteeIndex)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
indices, err := attestationutil.AttestingIndices(a.AggregationBits, committee)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
s.forkChoiceStore.ProcessAttestation(ctx, indices, bytesutil.ToBytes32(a.Data.BeaconBlockRoot), a.Data.Target.Epoch)
|
|
}
|
|
|
|
f := s.finalizedCheckpt
|
|
j := s.justifiedCheckpt
|
|
headRootProtoArray, err := s.forkChoiceStore.Head(
|
|
ctx,
|
|
f.Epoch,
|
|
bytesutil.ToBytes32(j.Root),
|
|
postState.Balances,
|
|
j.Epoch)
|
|
if err != nil {
|
|
log.Warnf("Skip head update for slot %d: %v", block.Block.Slot, err)
|
|
return nil
|
|
}
|
|
|
|
if postState.FinalizedCheckpoint.Epoch > f.Epoch {
|
|
if err := s.forkChoiceStore.Prune(ctx, bytesutil.ToBytes32(postState.FinalizedCheckpoint.Root)); err != nil {
|
|
return errors.Wrap(err, "could not prune proto array fork choice")
|
|
}
|
|
}
|
|
|
|
headRoot = headRootProtoArray[:]
|
|
} else {
|
|
headRoot, err = s.forkChoiceStoreOld.Head(ctx)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not get head from fork choice service")
|
|
}
|
|
}
|
|
// Only save head if it's different than the current head.
|
|
cachedHeadRoot, err := s.HeadRoot(ctx)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not get head root from cache")
|
|
}
|
|
if !bytes.Equal(headRoot, cachedHeadRoot) {
|
|
signedHeadBlock, err := s.beaconDB.Block(ctx, bytesutil.ToBytes32(headRoot))
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not compute state from block head")
|
|
}
|
|
if signedHeadBlock == nil || signedHeadBlock.Block == nil {
|
|
return errors.New("nil head block")
|
|
}
|
|
if err := s.saveHead(ctx, signedHeadBlock, bytesutil.ToBytes32(headRoot)); err != nil {
|
|
return errors.Wrap(err, "could not save head")
|
|
}
|
|
isCompetingBlock(root[:], blockCopy.Block.Slot, headRoot, signedHeadBlock.Block.Slot)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ReceiveBlockNoPubsubForkchoice is a function that defines the all operations (minus pubsub and forkchoice)
|
|
// that are preformed blocks that is received from initial sync service. The operations consists of:
|
|
// 1. Validate block, apply state transition and update check points
|
|
// 2. Save latest head info
|
|
func (s *Service) ReceiveBlockNoPubsubForkchoice(ctx context.Context, block *ethpb.SignedBeaconBlock) error {
|
|
ctx, span := trace.StartSpan(ctx, "beacon-chain.blockchain.ReceiveBlockNoForkchoice")
|
|
defer span.End()
|
|
blockCopy := proto.Clone(block).(*ethpb.SignedBeaconBlock)
|
|
|
|
// Apply state transition on the new block.
|
|
var postState *pb.BeaconState
|
|
var err error
|
|
if featureconfig.Get().ProtoArrayForkChoice {
|
|
postState, err = s.onBlock(ctx, blockCopy)
|
|
if err != nil {
|
|
err := errors.Wrap(err, "could not process block")
|
|
traceutil.AnnotateError(span, err)
|
|
return err
|
|
}
|
|
} else {
|
|
postState, err = s.forkChoiceStoreOld.OnBlock(ctx, blockCopy)
|
|
if err != nil {
|
|
err := errors.Wrap(err, "could not process block from fork choice service")
|
|
traceutil.AnnotateError(span, err)
|
|
return err
|
|
}
|
|
}
|
|
|
|
root, err := ssz.HashTreeRoot(blockCopy.Block)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not get signing root on received block")
|
|
}
|
|
cachedHeadRoot, err := s.HeadRoot(ctx)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not get head root from cache")
|
|
}
|
|
if !bytes.Equal(root[:], cachedHeadRoot) {
|
|
if err := s.saveHead(ctx, blockCopy, root); err != nil {
|
|
return errors.Wrap(err, "could not save head")
|
|
}
|
|
}
|
|
|
|
if featureconfig.Get().ProtoArrayForkChoice {
|
|
if err := s.forkChoiceStore.ProcessBlock(ctx, blockCopy.Block.Slot, root, bytesutil.ToBytes32(blockCopy.Block.ParentRoot), postState.CurrentJustifiedCheckpoint.Epoch, postState.FinalizedCheckpoint.Epoch); err != nil {
|
|
return errors.Wrap(err, "could not process block for proto array fork choice")
|
|
}
|
|
|
|
for _, a := range blockCopy.Block.Body.Attestations {
|
|
committee, err := helpers.BeaconCommitteeFromState(postState, a.Data.Slot, a.Data.CommitteeIndex)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
indices, err := attestationutil.AttestingIndices(a.AggregationBits, committee)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
s.forkChoiceStore.ProcessAttestation(ctx, indices, bytesutil.ToBytes32(a.Data.BeaconBlockRoot), a.Data.Target.Epoch)
|
|
}
|
|
}
|
|
|
|
// Send notification of the processed block to the state feed.
|
|
s.stateNotifier.StateFeed().Send(&feed.Event{
|
|
Type: statefeed.BlockProcessed,
|
|
Data: &statefeed.BlockProcessedData{
|
|
BlockRoot: root,
|
|
Verified: true,
|
|
},
|
|
})
|
|
|
|
// Reports on block and fork choice metrics.
|
|
s.reportSlotMetrics(blockCopy.Block.Slot)
|
|
|
|
// Log state transition data.
|
|
logStateTransitionData(blockCopy.Block)
|
|
|
|
s.epochParticipationLock.Lock()
|
|
defer s.epochParticipationLock.Unlock()
|
|
s.epochParticipation[helpers.SlotToEpoch(blockCopy.Block.Slot)] = precompute.Balances
|
|
|
|
processedBlkNoPubsubForkchoice.Inc()
|
|
return nil
|
|
}
|
|
|
|
// ReceiveBlockNoVerify runs state transition on a input block without verifying the block's BLS contents.
|
|
// Depends on the security model, this is the "minimal" work a node can do to sync the chain.
|
|
// It simulates light client behavior and assumes 100% trust with the syncing peer.
|
|
func (s *Service) ReceiveBlockNoVerify(ctx context.Context, block *ethpb.SignedBeaconBlock) error {
|
|
ctx, span := trace.StartSpan(ctx, "beacon-chain.blockchain.ReceiveBlockNoVerify")
|
|
defer span.End()
|
|
blockCopy := proto.Clone(block).(*ethpb.SignedBeaconBlock)
|
|
|
|
// Apply state transition on the incoming newly received blockCopy without verifying its BLS contents.
|
|
var postState *pb.BeaconState
|
|
var err error
|
|
if featureconfig.Get().ProtoArrayForkChoice {
|
|
postState, err = s.onBlockInitialSyncStateTransition(ctx, blockCopy)
|
|
if err != nil {
|
|
err := errors.Wrap(err, "could not process block")
|
|
traceutil.AnnotateError(span, err)
|
|
return err
|
|
}
|
|
} else {
|
|
postState, err = s.forkChoiceStoreOld.OnBlockInitialSyncStateTransition(ctx, blockCopy)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not process blockCopy from fork choice service")
|
|
}
|
|
}
|
|
|
|
root, err := ssz.HashTreeRoot(blockCopy.Block)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not get signing root on received blockCopy")
|
|
}
|
|
|
|
cachedHeadRoot, err := s.HeadRoot(ctx)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not get head root from cache")
|
|
}
|
|
|
|
if featureconfig.Get().ProtoArrayForkChoice {
|
|
if err := s.forkChoiceStore.ProcessBlock(ctx, blockCopy.Block.Slot, root, bytesutil.ToBytes32(blockCopy.Block.ParentRoot), postState.CurrentJustifiedCheckpoint.Epoch, postState.FinalizedCheckpoint.Epoch); err != nil {
|
|
return errors.Wrap(err, "could not process block for proto array fork choice")
|
|
}
|
|
|
|
for _, a := range blockCopy.Block.Body.Attestations {
|
|
committee, err := helpers.BeaconCommitteeFromState(postState, a.Data.Slot, a.Data.CommitteeIndex)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
indices, err := attestationutil.AttestingIndices(a.AggregationBits, committee)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
s.forkChoiceStore.ProcessAttestation(ctx, indices, bytesutil.ToBytes32(a.Data.BeaconBlockRoot), a.Data.Target.Epoch)
|
|
}
|
|
}
|
|
|
|
if featureconfig.Get().InitSyncCacheState {
|
|
if !bytes.Equal(root[:], cachedHeadRoot) {
|
|
if err := s.saveHeadNoDB(ctx, blockCopy, root); err != nil {
|
|
err := errors.Wrap(err, "could not save head")
|
|
traceutil.AnnotateError(span, err)
|
|
return err
|
|
}
|
|
}
|
|
} else {
|
|
if !bytes.Equal(root[:], cachedHeadRoot) {
|
|
if err := s.saveHead(ctx, blockCopy, root); err != nil {
|
|
err := errors.Wrap(err, "could not save head")
|
|
traceutil.AnnotateError(span, err)
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
// Send notification of the processed block to the state feed.
|
|
s.stateNotifier.StateFeed().Send(&feed.Event{
|
|
Type: statefeed.BlockProcessed,
|
|
Data: &statefeed.BlockProcessedData{
|
|
BlockRoot: root,
|
|
Verified: false,
|
|
},
|
|
})
|
|
|
|
// Reports on blockCopy and fork choice metrics.
|
|
s.reportSlotMetrics(blockCopy.Block.Slot)
|
|
|
|
// Log state transition data.
|
|
log.WithFields(logrus.Fields{
|
|
"slot": blockCopy.Block.Slot,
|
|
"attestations": len(blockCopy.Block.Body.Attestations),
|
|
"deposits": len(blockCopy.Block.Body.Deposits),
|
|
}).Debug("Finished applying state transition")
|
|
|
|
s.epochParticipationLock.Lock()
|
|
defer s.epochParticipationLock.Unlock()
|
|
s.epochParticipation[helpers.SlotToEpoch(blockCopy.Block.Slot)] = precompute.Balances
|
|
|
|
return nil
|
|
}
|
|
|
|
// This checks if the block is from a competing chain, emits warning and updates metrics.
|
|
func isCompetingBlock(root []byte, slot uint64, headRoot []byte, headSlot uint64) {
|
|
if !bytes.Equal(root[:], headRoot) {
|
|
log.WithFields(logrus.Fields{
|
|
"blkSlot": slot,
|
|
"blkRoot": hex.EncodeToString(root[:]),
|
|
"headSlot": headSlot,
|
|
"headRoot": hex.EncodeToString(headRoot),
|
|
}).Warn("Calculated head diffs from new block")
|
|
competingBlks.Inc()
|
|
}
|
|
}
|