mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-10 19:51:20 +00:00
b38e4ddc3e
* initial commit * fixing bazel * removing extra space * adding blindedbeaconblock * adding unit tests * fixing bazel build * switching to switch statement * fixing function parameters * fixing ineffectual err error * deleting unused files * updating web3signer version to support bellatrix * adding metrics * testing longer run * changing log level to help find errors * changing logging back to all to better understand the issue * testing better way to get public keys for web3signer on validator * fixing bazel * rolling back changes * missed rolling back 1 thing * adding flag back in * adding comments back in * testing lower participation * adding logs to see web3signer keys for comparison * fix bazel * adding more logs temporariliy * switching hex utility function * web3signer doesn't support deposits, so changing this * rolling back unintended unit test * rolling back some changes for debugging * Update validator/keymanager/remote-web3signer/v1/web3signer_types.go Co-authored-by: Radosław Kapka <rkapka@wp.pl> * Update testing/endtoend/components/web3remotesigner.go Co-authored-by: Radosław Kapka <rkapka@wp.pl> * Update testing/endtoend/endtoend_test.go Co-authored-by: Radosław Kapka <rkapka@wp.pl> * Update testing/endtoend/endtoend_test.go Co-authored-by: Radosław Kapka <rkapka@wp.pl> * fixing merge conflict * Update validator/keymanager/remote-web3signer/v1/requests.go * Update testing/endtoend/endtoend_test.go Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * Update validator/keymanager/remote-web3signer/v1/requests.go Co-authored-by: terencechain <terence@prysmaticlabs.com> * prysm doesn't currently support deposits for web3signer * reverting back to old implementation Co-authored-by: Radosław Kapka <rkapka@wp.pl> Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> Co-authored-by: terencechain <terence@prysmaticlabs.com>
337 lines
12 KiB
Go
337 lines
12 KiB
Go
package v1
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/ethereum/go-ethereum/common/hexutil"
|
|
"github.com/pkg/errors"
|
|
"github.com/prysmaticlabs/prysm/consensus-types/interfaces"
|
|
"github.com/prysmaticlabs/prysm/consensus-types/wrapper"
|
|
validatorpb "github.com/prysmaticlabs/prysm/proto/prysm/v1alpha1/validator-client"
|
|
)
|
|
|
|
// GetBlockSignRequest maps the request for signing type BLOCK.
|
|
func GetBlockSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*BlockSignRequest, error) {
|
|
beaconBlock, ok := request.Object.(*validatorpb.SignRequest_Block)
|
|
if !ok {
|
|
return nil, errors.New("failed to cast request object to block")
|
|
}
|
|
if beaconBlock == nil {
|
|
return nil, errors.New("invalid sign request: BeaconBlock is nil")
|
|
}
|
|
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
beaconBlockBody, err := MapBeaconBlockBody(beaconBlock.Block.Body)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &BlockSignRequest{
|
|
Type: "BLOCK",
|
|
ForkInfo: fork,
|
|
SigningRoot: hexutil.Encode(request.SigningRoot),
|
|
Block: &BeaconBlock{
|
|
Slot: fmt.Sprint(beaconBlock.Block.Slot),
|
|
ProposerIndex: fmt.Sprint(beaconBlock.Block.ProposerIndex),
|
|
ParentRoot: hexutil.Encode(beaconBlock.Block.ParentRoot),
|
|
StateRoot: hexutil.Encode(beaconBlock.Block.StateRoot),
|
|
Body: beaconBlockBody,
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
// GetAggregationSlotSignRequest maps the request for signing type AGGREGATION_SLOT.
|
|
func GetAggregationSlotSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*AggregationSlotSignRequest, error) {
|
|
aggregationSlot, ok := request.Object.(*validatorpb.SignRequest_Slot)
|
|
if !ok {
|
|
return nil, errors.New("failed to cast request object to aggregation slot")
|
|
}
|
|
if aggregationSlot == nil {
|
|
return nil, errors.New("invalid sign request: Slot is nil")
|
|
}
|
|
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &AggregationSlotSignRequest{
|
|
Type: "AGGREGATION_SLOT",
|
|
ForkInfo: fork,
|
|
SigningRoot: hexutil.Encode(request.SigningRoot),
|
|
AggregationSlot: &AggregationSlot{
|
|
Slot: fmt.Sprint(aggregationSlot.Slot),
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
// GetAggregateAndProofSignRequest maps the request for signing type AGGREGATE_AND_PROOF.
|
|
func GetAggregateAndProofSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*AggregateAndProofSignRequest, error) {
|
|
aggregateAttestationAndProof, ok := request.Object.(*validatorpb.SignRequest_AggregateAttestationAndProof)
|
|
if !ok {
|
|
return nil, errors.New("failed to cast request object to aggregate attestation and proof")
|
|
}
|
|
if aggregateAttestationAndProof == nil {
|
|
return nil, errors.New("invalid sign request: AggregateAndProof is nil")
|
|
}
|
|
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
aggregateAndProof, err := MapAggregateAndProof(aggregateAttestationAndProof.AggregateAttestationAndProof)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &AggregateAndProofSignRequest{
|
|
Type: "AGGREGATE_AND_PROOF",
|
|
ForkInfo: fork,
|
|
SigningRoot: hexutil.Encode(request.SigningRoot),
|
|
AggregateAndProof: aggregateAndProof,
|
|
}, nil
|
|
}
|
|
|
|
// GetAttestationSignRequest maps the request for signing type ATTESTATION.
|
|
func GetAttestationSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*AttestationSignRequest, error) {
|
|
attestation, ok := request.Object.(*validatorpb.SignRequest_AttestationData)
|
|
if !ok {
|
|
return nil, errors.New("failed to cast request object to attestation")
|
|
}
|
|
if attestation == nil {
|
|
return nil, errors.New("invalid sign request: Attestation is nil")
|
|
}
|
|
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
attestationData, err := MapAttestationData(attestation.AttestationData)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &AttestationSignRequest{
|
|
Type: "ATTESTATION",
|
|
ForkInfo: fork,
|
|
SigningRoot: hexutil.Encode(request.SigningRoot),
|
|
Attestation: attestationData,
|
|
}, nil
|
|
}
|
|
|
|
// GetBlockV2AltairSignRequest maps the request for signing type BLOCK_V2.
|
|
func GetBlockV2AltairSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*BlockV2AltairSignRequest, error) {
|
|
beaconBlockV2, ok := request.Object.(*validatorpb.SignRequest_BlockV2)
|
|
if !ok {
|
|
return nil, errors.New("failed to cast request object to block v2")
|
|
}
|
|
if beaconBlockV2 == nil {
|
|
return nil, errors.New("invalid sign request: BeaconBlock is nil")
|
|
}
|
|
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
beaconBlockAltair, err := MapBeaconBlockAltair(beaconBlockV2.BlockV2)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &BlockV2AltairSignRequest{
|
|
Type: "BLOCK_V2",
|
|
ForkInfo: fork,
|
|
SigningRoot: hexutil.Encode(request.SigningRoot),
|
|
BeaconBlock: &BeaconBlockAltairBlockV2{
|
|
Version: "ALTAIR",
|
|
Block: beaconBlockAltair,
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
// GetRandaoRevealSignRequest maps the request for signing type RANDAO_REVEAL.
|
|
func GetRandaoRevealSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*RandaoRevealSignRequest, error) {
|
|
randaoReveal, ok := request.Object.(*validatorpb.SignRequest_Epoch)
|
|
if !ok {
|
|
return nil, errors.New("failed to cast request object to randao reveal")
|
|
}
|
|
if randaoReveal == nil {
|
|
return nil, errors.New("invalid sign request: Epoch is nil")
|
|
}
|
|
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &RandaoRevealSignRequest{
|
|
Type: "RANDAO_REVEAL",
|
|
ForkInfo: fork,
|
|
SigningRoot: hexutil.Encode(request.SigningRoot),
|
|
RandaoReveal: &RandaoReveal{
|
|
Epoch: fmt.Sprint(randaoReveal.Epoch),
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
// GetVoluntaryExitSignRequest maps the request for signing type VOLUNTARY_EXIT.
|
|
func GetVoluntaryExitSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*VoluntaryExitSignRequest, error) {
|
|
voluntaryExit, ok := request.Object.(*validatorpb.SignRequest_Exit)
|
|
if !ok {
|
|
return nil, errors.New("failed to cast request object to voluntary exit")
|
|
}
|
|
if voluntaryExit == nil || voluntaryExit.Exit == nil {
|
|
return nil, errors.New("invalid sign request: Exit is nil")
|
|
}
|
|
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &VoluntaryExitSignRequest{
|
|
Type: "VOLUNTARY_EXIT",
|
|
ForkInfo: fork,
|
|
SigningRoot: hexutil.Encode(request.SigningRoot),
|
|
VoluntaryExit: &VoluntaryExit{
|
|
ValidatorIndex: fmt.Sprint(voluntaryExit.Exit.ValidatorIndex),
|
|
Epoch: fmt.Sprint(voluntaryExit.Exit.Epoch),
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
// GetSyncCommitteeMessageSignRequest maps the request for signing type SYNC_COMMITTEE_MESSAGE.
|
|
func GetSyncCommitteeMessageSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*SyncCommitteeMessageSignRequest, error) {
|
|
if request == nil {
|
|
return nil, errors.New("nil sign request provided")
|
|
}
|
|
syncCommitteeMessage, ok := request.Object.(*validatorpb.SignRequest_SyncMessageBlockRoot)
|
|
if !ok {
|
|
return nil, errors.New("failed to cast request object to sync committee message")
|
|
}
|
|
if syncCommitteeMessage == nil || syncCommitteeMessage.SyncMessageBlockRoot == nil {
|
|
return nil, errors.New("invalid sign request: SyncCommitteeMessage is nil")
|
|
}
|
|
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &SyncCommitteeMessageSignRequest{
|
|
Type: "SYNC_COMMITTEE_MESSAGE",
|
|
ForkInfo: fork,
|
|
SigningRoot: hexutil.Encode(request.SigningRoot),
|
|
SyncCommitteeMessage: &SyncCommitteeMessage{
|
|
BeaconBlockRoot: hexutil.Encode(syncCommitteeMessage.SyncMessageBlockRoot),
|
|
Slot: fmt.Sprint(request.SigningSlot),
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
// GetSyncCommitteeSelectionProofSignRequest maps the request for signing type SYNC_COMMITTEE_SELECTION_PROOF.
|
|
func GetSyncCommitteeSelectionProofSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*SyncCommitteeSelectionProofSignRequest, error) {
|
|
if request == nil {
|
|
return nil, errors.New("nil sign request provided")
|
|
}
|
|
syncCommitteeSelectionProof, ok := request.Object.(*validatorpb.SignRequest_SyncAggregatorSelectionData)
|
|
if !ok {
|
|
return nil, errors.New("failed to cast request object to sync committee selection proof")
|
|
}
|
|
if syncCommitteeSelectionProof == nil {
|
|
return nil, errors.New("invalid sign request: SyncCommitteeSelectionProof is nil")
|
|
}
|
|
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
aggregatorSelectionData, err := MapSyncAggregatorSelectionData(syncCommitteeSelectionProof.SyncAggregatorSelectionData)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &SyncCommitteeSelectionProofSignRequest{
|
|
Type: "SYNC_COMMITTEE_SELECTION_PROOF",
|
|
ForkInfo: fork,
|
|
SigningRoot: hexutil.Encode(request.SigningRoot),
|
|
SyncAggregatorSelectionData: aggregatorSelectionData,
|
|
}, nil
|
|
}
|
|
|
|
// GetSyncCommitteeContributionAndProofSignRequest maps the request for signing type SYNC_COMMITTEE_CONTRIBUTION_AND_PROOF.
|
|
func GetSyncCommitteeContributionAndProofSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*SyncCommitteeContributionAndProofSignRequest, error) {
|
|
if request == nil {
|
|
return nil, errors.New("nil sign request provided")
|
|
}
|
|
syncCommitteeContributionAndProof, ok := request.Object.(*validatorpb.SignRequest_ContributionAndProof)
|
|
if !ok {
|
|
return nil, errors.New("failed to cast request object to sync committee contribution and proof")
|
|
}
|
|
if syncCommitteeContributionAndProof == nil {
|
|
return nil, errors.New("invalid sign request: SyncCommitteeContributionAndProof is nil")
|
|
}
|
|
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
contribution, err := MapContributionAndProof(syncCommitteeContributionAndProof.ContributionAndProof)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &SyncCommitteeContributionAndProofSignRequest{
|
|
Type: "SYNC_COMMITTEE_CONTRIBUTION_AND_PROOF",
|
|
ForkInfo: fork,
|
|
SigningRoot: hexutil.Encode(request.SigningRoot),
|
|
ContributionAndProof: contribution,
|
|
}, nil
|
|
}
|
|
|
|
// GetBlockV2BellatrixSignRequest maps the request for signing type BLOCK_V2_BELLATRIX.
|
|
// note: web3signer uses blockv2 instead of block v3 for signing type
|
|
func GetBlockV2BellatrixSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*BlockV2BellatrixSignRequest, error) {
|
|
if request == nil {
|
|
return nil, errors.New("nil sign request provided")
|
|
}
|
|
var b interfaces.BeaconBlock
|
|
switch request.Object.(type) {
|
|
case *validatorpb.SignRequest_BlindedBlockV3:
|
|
blindedBlockV3, ok := request.Object.(*validatorpb.SignRequest_BlindedBlockV3)
|
|
if !ok {
|
|
return nil, errors.New("failed to cast request object to blinded block v3")
|
|
}
|
|
if blindedBlockV3 == nil {
|
|
return nil, errors.New("invalid sign request - blindedBlockV3 is nil")
|
|
}
|
|
beaconBlock, err := wrapper.WrappedBeaconBlock(blindedBlockV3.BlindedBlockV3)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
b = beaconBlock
|
|
case *validatorpb.SignRequest_BlockV3:
|
|
blockV3Bellatrix, ok := request.Object.(*validatorpb.SignRequest_BlockV3)
|
|
if !ok {
|
|
return nil, errors.New("failed to cast request object to block v3 bellatrix")
|
|
}
|
|
|
|
if blockV3Bellatrix == nil {
|
|
return nil, errors.New("invalid sign request: blockV3Bellatrix is nil")
|
|
}
|
|
beaconBlock, err := wrapper.WrappedBeaconBlock(blockV3Bellatrix.BlockV3)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
b = beaconBlock
|
|
default:
|
|
return nil, errors.New("invalid sign request - invalid object type")
|
|
}
|
|
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
beaconBlockHeader, err := interfaces.BeaconBlockHeaderFromBlockInterface(b)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &BlockV2BellatrixSignRequest{
|
|
Type: "BLOCK_V2",
|
|
ForkInfo: fork,
|
|
SigningRoot: hexutil.Encode(request.SigningRoot),
|
|
BeaconBlock: &BeaconBlockBellatrixBlockV2{
|
|
Version: "BELLATRIX",
|
|
BlockHeader: &BeaconBlockHeader{
|
|
Slot: fmt.Sprint(beaconBlockHeader.Slot),
|
|
ProposerIndex: fmt.Sprint(beaconBlockHeader.ProposerIndex),
|
|
ParentRoot: hexutil.Encode(beaconBlockHeader.ParentRoot),
|
|
StateRoot: hexutil.Encode(beaconBlockHeader.StateRoot),
|
|
BodyRoot: hexutil.Encode(beaconBlockHeader.BodyRoot),
|
|
},
|
|
},
|
|
}, nil
|
|
}
|