prysm-pulse/validator/keymanager/remote-web3signer/v1/requests.go
james-prysm b38e4ddc3e
Web3signer: Bellatrix Block (#10590)
* initial commit

* fixing bazel

* removing extra space

* adding blindedbeaconblock

* adding unit tests

* fixing bazel build

* switching to switch statement

* fixing function parameters

* fixing ineffectual err error

* deleting unused files

* updating web3signer version to support bellatrix

* adding metrics

* testing longer run

* changing log level to help find errors

* changing logging back to all to better understand the issue

* testing better way to get public keys for web3signer on validator

* fixing bazel

* rolling back changes

* missed rolling back 1 thing

* adding flag back in

* adding comments back in

* testing lower participation

* adding logs to see web3signer keys for comparison

* fix bazel

* adding more logs temporariliy

* switching hex utility function

* web3signer doesn't support deposits, so changing this

* rolling back unintended unit test

* rolling back some changes for debugging

* Update validator/keymanager/remote-web3signer/v1/web3signer_types.go

Co-authored-by: Radosław Kapka <rkapka@wp.pl>

* Update testing/endtoend/components/web3remotesigner.go

Co-authored-by: Radosław Kapka <rkapka@wp.pl>

* Update testing/endtoend/endtoend_test.go

Co-authored-by: Radosław Kapka <rkapka@wp.pl>

* Update testing/endtoend/endtoend_test.go

Co-authored-by: Radosław Kapka <rkapka@wp.pl>

* fixing merge conflict

* Update validator/keymanager/remote-web3signer/v1/requests.go

* Update testing/endtoend/endtoend_test.go

Co-authored-by: Raul Jordan <raul@prysmaticlabs.com>

* Update validator/keymanager/remote-web3signer/v1/requests.go

Co-authored-by: terencechain <terence@prysmaticlabs.com>

* prysm doesn't currently support deposits for web3signer

* reverting back to old implementation

Co-authored-by: Radosław Kapka <rkapka@wp.pl>
Co-authored-by: Raul Jordan <raul@prysmaticlabs.com>
Co-authored-by: terencechain <terence@prysmaticlabs.com>
2022-05-18 15:20:20 +00:00

337 lines
12 KiB
Go

package v1
import (
"fmt"
"github.com/ethereum/go-ethereum/common/hexutil"
"github.com/pkg/errors"
"github.com/prysmaticlabs/prysm/consensus-types/interfaces"
"github.com/prysmaticlabs/prysm/consensus-types/wrapper"
validatorpb "github.com/prysmaticlabs/prysm/proto/prysm/v1alpha1/validator-client"
)
// GetBlockSignRequest maps the request for signing type BLOCK.
func GetBlockSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*BlockSignRequest, error) {
beaconBlock, ok := request.Object.(*validatorpb.SignRequest_Block)
if !ok {
return nil, errors.New("failed to cast request object to block")
}
if beaconBlock == nil {
return nil, errors.New("invalid sign request: BeaconBlock is nil")
}
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
if err != nil {
return nil, err
}
beaconBlockBody, err := MapBeaconBlockBody(beaconBlock.Block.Body)
if err != nil {
return nil, err
}
return &BlockSignRequest{
Type: "BLOCK",
ForkInfo: fork,
SigningRoot: hexutil.Encode(request.SigningRoot),
Block: &BeaconBlock{
Slot: fmt.Sprint(beaconBlock.Block.Slot),
ProposerIndex: fmt.Sprint(beaconBlock.Block.ProposerIndex),
ParentRoot: hexutil.Encode(beaconBlock.Block.ParentRoot),
StateRoot: hexutil.Encode(beaconBlock.Block.StateRoot),
Body: beaconBlockBody,
},
}, nil
}
// GetAggregationSlotSignRequest maps the request for signing type AGGREGATION_SLOT.
func GetAggregationSlotSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*AggregationSlotSignRequest, error) {
aggregationSlot, ok := request.Object.(*validatorpb.SignRequest_Slot)
if !ok {
return nil, errors.New("failed to cast request object to aggregation slot")
}
if aggregationSlot == nil {
return nil, errors.New("invalid sign request: Slot is nil")
}
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
if err != nil {
return nil, err
}
return &AggregationSlotSignRequest{
Type: "AGGREGATION_SLOT",
ForkInfo: fork,
SigningRoot: hexutil.Encode(request.SigningRoot),
AggregationSlot: &AggregationSlot{
Slot: fmt.Sprint(aggregationSlot.Slot),
},
}, nil
}
// GetAggregateAndProofSignRequest maps the request for signing type AGGREGATE_AND_PROOF.
func GetAggregateAndProofSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*AggregateAndProofSignRequest, error) {
aggregateAttestationAndProof, ok := request.Object.(*validatorpb.SignRequest_AggregateAttestationAndProof)
if !ok {
return nil, errors.New("failed to cast request object to aggregate attestation and proof")
}
if aggregateAttestationAndProof == nil {
return nil, errors.New("invalid sign request: AggregateAndProof is nil")
}
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
if err != nil {
return nil, err
}
aggregateAndProof, err := MapAggregateAndProof(aggregateAttestationAndProof.AggregateAttestationAndProof)
if err != nil {
return nil, err
}
return &AggregateAndProofSignRequest{
Type: "AGGREGATE_AND_PROOF",
ForkInfo: fork,
SigningRoot: hexutil.Encode(request.SigningRoot),
AggregateAndProof: aggregateAndProof,
}, nil
}
// GetAttestationSignRequest maps the request for signing type ATTESTATION.
func GetAttestationSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*AttestationSignRequest, error) {
attestation, ok := request.Object.(*validatorpb.SignRequest_AttestationData)
if !ok {
return nil, errors.New("failed to cast request object to attestation")
}
if attestation == nil {
return nil, errors.New("invalid sign request: Attestation is nil")
}
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
if err != nil {
return nil, err
}
attestationData, err := MapAttestationData(attestation.AttestationData)
if err != nil {
return nil, err
}
return &AttestationSignRequest{
Type: "ATTESTATION",
ForkInfo: fork,
SigningRoot: hexutil.Encode(request.SigningRoot),
Attestation: attestationData,
}, nil
}
// GetBlockV2AltairSignRequest maps the request for signing type BLOCK_V2.
func GetBlockV2AltairSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*BlockV2AltairSignRequest, error) {
beaconBlockV2, ok := request.Object.(*validatorpb.SignRequest_BlockV2)
if !ok {
return nil, errors.New("failed to cast request object to block v2")
}
if beaconBlockV2 == nil {
return nil, errors.New("invalid sign request: BeaconBlock is nil")
}
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
if err != nil {
return nil, err
}
beaconBlockAltair, err := MapBeaconBlockAltair(beaconBlockV2.BlockV2)
if err != nil {
return nil, err
}
return &BlockV2AltairSignRequest{
Type: "BLOCK_V2",
ForkInfo: fork,
SigningRoot: hexutil.Encode(request.SigningRoot),
BeaconBlock: &BeaconBlockAltairBlockV2{
Version: "ALTAIR",
Block: beaconBlockAltair,
},
}, nil
}
// GetRandaoRevealSignRequest maps the request for signing type RANDAO_REVEAL.
func GetRandaoRevealSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*RandaoRevealSignRequest, error) {
randaoReveal, ok := request.Object.(*validatorpb.SignRequest_Epoch)
if !ok {
return nil, errors.New("failed to cast request object to randao reveal")
}
if randaoReveal == nil {
return nil, errors.New("invalid sign request: Epoch is nil")
}
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
if err != nil {
return nil, err
}
return &RandaoRevealSignRequest{
Type: "RANDAO_REVEAL",
ForkInfo: fork,
SigningRoot: hexutil.Encode(request.SigningRoot),
RandaoReveal: &RandaoReveal{
Epoch: fmt.Sprint(randaoReveal.Epoch),
},
}, nil
}
// GetVoluntaryExitSignRequest maps the request for signing type VOLUNTARY_EXIT.
func GetVoluntaryExitSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*VoluntaryExitSignRequest, error) {
voluntaryExit, ok := request.Object.(*validatorpb.SignRequest_Exit)
if !ok {
return nil, errors.New("failed to cast request object to voluntary exit")
}
if voluntaryExit == nil || voluntaryExit.Exit == nil {
return nil, errors.New("invalid sign request: Exit is nil")
}
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
if err != nil {
return nil, err
}
return &VoluntaryExitSignRequest{
Type: "VOLUNTARY_EXIT",
ForkInfo: fork,
SigningRoot: hexutil.Encode(request.SigningRoot),
VoluntaryExit: &VoluntaryExit{
ValidatorIndex: fmt.Sprint(voluntaryExit.Exit.ValidatorIndex),
Epoch: fmt.Sprint(voluntaryExit.Exit.Epoch),
},
}, nil
}
// GetSyncCommitteeMessageSignRequest maps the request for signing type SYNC_COMMITTEE_MESSAGE.
func GetSyncCommitteeMessageSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*SyncCommitteeMessageSignRequest, error) {
if request == nil {
return nil, errors.New("nil sign request provided")
}
syncCommitteeMessage, ok := request.Object.(*validatorpb.SignRequest_SyncMessageBlockRoot)
if !ok {
return nil, errors.New("failed to cast request object to sync committee message")
}
if syncCommitteeMessage == nil || syncCommitteeMessage.SyncMessageBlockRoot == nil {
return nil, errors.New("invalid sign request: SyncCommitteeMessage is nil")
}
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
if err != nil {
return nil, err
}
return &SyncCommitteeMessageSignRequest{
Type: "SYNC_COMMITTEE_MESSAGE",
ForkInfo: fork,
SigningRoot: hexutil.Encode(request.SigningRoot),
SyncCommitteeMessage: &SyncCommitteeMessage{
BeaconBlockRoot: hexutil.Encode(syncCommitteeMessage.SyncMessageBlockRoot),
Slot: fmt.Sprint(request.SigningSlot),
},
}, nil
}
// GetSyncCommitteeSelectionProofSignRequest maps the request for signing type SYNC_COMMITTEE_SELECTION_PROOF.
func GetSyncCommitteeSelectionProofSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*SyncCommitteeSelectionProofSignRequest, error) {
if request == nil {
return nil, errors.New("nil sign request provided")
}
syncCommitteeSelectionProof, ok := request.Object.(*validatorpb.SignRequest_SyncAggregatorSelectionData)
if !ok {
return nil, errors.New("failed to cast request object to sync committee selection proof")
}
if syncCommitteeSelectionProof == nil {
return nil, errors.New("invalid sign request: SyncCommitteeSelectionProof is nil")
}
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
if err != nil {
return nil, err
}
aggregatorSelectionData, err := MapSyncAggregatorSelectionData(syncCommitteeSelectionProof.SyncAggregatorSelectionData)
if err != nil {
return nil, err
}
return &SyncCommitteeSelectionProofSignRequest{
Type: "SYNC_COMMITTEE_SELECTION_PROOF",
ForkInfo: fork,
SigningRoot: hexutil.Encode(request.SigningRoot),
SyncAggregatorSelectionData: aggregatorSelectionData,
}, nil
}
// GetSyncCommitteeContributionAndProofSignRequest maps the request for signing type SYNC_COMMITTEE_CONTRIBUTION_AND_PROOF.
func GetSyncCommitteeContributionAndProofSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*SyncCommitteeContributionAndProofSignRequest, error) {
if request == nil {
return nil, errors.New("nil sign request provided")
}
syncCommitteeContributionAndProof, ok := request.Object.(*validatorpb.SignRequest_ContributionAndProof)
if !ok {
return nil, errors.New("failed to cast request object to sync committee contribution and proof")
}
if syncCommitteeContributionAndProof == nil {
return nil, errors.New("invalid sign request: SyncCommitteeContributionAndProof is nil")
}
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
if err != nil {
return nil, err
}
contribution, err := MapContributionAndProof(syncCommitteeContributionAndProof.ContributionAndProof)
if err != nil {
return nil, err
}
return &SyncCommitteeContributionAndProofSignRequest{
Type: "SYNC_COMMITTEE_CONTRIBUTION_AND_PROOF",
ForkInfo: fork,
SigningRoot: hexutil.Encode(request.SigningRoot),
ContributionAndProof: contribution,
}, nil
}
// GetBlockV2BellatrixSignRequest maps the request for signing type BLOCK_V2_BELLATRIX.
// note: web3signer uses blockv2 instead of block v3 for signing type
func GetBlockV2BellatrixSignRequest(request *validatorpb.SignRequest, genesisValidatorsRoot []byte) (*BlockV2BellatrixSignRequest, error) {
if request == nil {
return nil, errors.New("nil sign request provided")
}
var b interfaces.BeaconBlock
switch request.Object.(type) {
case *validatorpb.SignRequest_BlindedBlockV3:
blindedBlockV3, ok := request.Object.(*validatorpb.SignRequest_BlindedBlockV3)
if !ok {
return nil, errors.New("failed to cast request object to blinded block v3")
}
if blindedBlockV3 == nil {
return nil, errors.New("invalid sign request - blindedBlockV3 is nil")
}
beaconBlock, err := wrapper.WrappedBeaconBlock(blindedBlockV3.BlindedBlockV3)
if err != nil {
return nil, err
}
b = beaconBlock
case *validatorpb.SignRequest_BlockV3:
blockV3Bellatrix, ok := request.Object.(*validatorpb.SignRequest_BlockV3)
if !ok {
return nil, errors.New("failed to cast request object to block v3 bellatrix")
}
if blockV3Bellatrix == nil {
return nil, errors.New("invalid sign request: blockV3Bellatrix is nil")
}
beaconBlock, err := wrapper.WrappedBeaconBlock(blockV3Bellatrix.BlockV3)
if err != nil {
return nil, err
}
b = beaconBlock
default:
return nil, errors.New("invalid sign request - invalid object type")
}
fork, err := MapForkInfo(request.SigningSlot, genesisValidatorsRoot)
if err != nil {
return nil, err
}
beaconBlockHeader, err := interfaces.BeaconBlockHeaderFromBlockInterface(b)
if err != nil {
return nil, err
}
return &BlockV2BellatrixSignRequest{
Type: "BLOCK_V2",
ForkInfo: fork,
SigningRoot: hexutil.Encode(request.SigningRoot),
BeaconBlock: &BeaconBlockBellatrixBlockV2{
Version: "BELLATRIX",
BlockHeader: &BeaconBlockHeader{
Slot: fmt.Sprint(beaconBlockHeader.Slot),
ProposerIndex: fmt.Sprint(beaconBlockHeader.ProposerIndex),
ParentRoot: hexutil.Encode(beaconBlockHeader.ParentRoot),
StateRoot: hexutil.Encode(beaconBlockHeader.StateRoot),
BodyRoot: hexutil.Encode(beaconBlockHeader.BodyRoot),
},
},
}, nil
}