mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-06 01:32:18 +00:00
12403d249f
* HTTP proxy server for Eth2 APIs (#8904) * Implement API HTTP proxy server * cleanup + more comments * gateway will no longer be dependent on beaconv1 * handle error during ErrorJson type assertion * simplify handling of endpoint data * fix mux v1 route * use URL encoding for all requests * comment fieldProcessor * fix failing test * change proxy port to not interfere with e2e * gzl * simplify conditional expression * Move appending custom error header to grpcutils package * add api-middleware-port flag * fix documentation for processField * modify e2e port * change field processing error message * better error message for field processing * simplify base64ToHexProcessor * fix json structs * Run several new endpoints through API middleware (#8922) * Implement API HTTP proxy server * cleanup + more comments * gateway will no longer be dependent on beaconv1 * handle error during ErrorJson type assertion * simplify handling of endpoint data * fix mux v1 route * use URL encoding for all requests * comment fieldProcessor * fix failing test * change proxy port to not interfere with e2e * gzl * simplify conditional expression * Move appending custom error header to grpcutils package * add api-middleware-port flag * fix documentation for processField * modify e2e port * change field processing error message * better error message for field processing * simplify base64ToHexProcessor * fix json structs * /eth/v1/beacon/states/{state_id}/validators * /eth/v1/beacon/states/{state_id}/validators/{validator_id} * /eth/v1/beacon/states/{state_id}/validator_balances * /eth/v1/beacon/states/{state_id}/committees * allow skipping base64-encoding for query params * /eth/v1/beacon/pool/attestations * replace break with continue * Remove unused functions (#8924) Co-authored-by: terence tsao <terence@prysmaticlabs.com> * Process SSZ-serialized beacon state through API middleware (#8925) * update field names * Process SSZ-serialized beacon state through API middleware * revert changes to go.mod and go.sum * Revert "Merge branch '__develop' into feature/api-middleware" This reverts commit 7c739a8fd71e2c1e3a14be85abd29a59b57ae9b5, reversing changes made to 2d0f8e012ecb006888ed8e826b45625a3edc2eeb. * update ethereumapis * update validator field name * update deps.bzl * update json tags (#8942) * Run `/node/syncing` through API Middleware (#8944) * add IsSyncing field to grpc response * run /node/syncing through the middleware Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * Return HTTP status codes other than 200 and 500 from node and debug endpoints (#8937) * error codes for node endpoints * error codes for debug endpoints * better comment about headers * gzl * review comments * comment on return value * update fakeChecker used for fuzz tests * fix failing tests * Allow to pass URL params literally, without encoding to base64 (#8938) * Allow to pass URL params literally, without encoding to base64 * fix compile error Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * Process SSZ-serialized beacon state through API middleware (#8925) * update field names * Process SSZ-serialized beacon state through API middleware * revert changes to go.mod and go.sum * Revert "Merge branch '__develop' into feature/api-middleware" This reverts commit 7c739a8fd71e2c1e3a14be85abd29a59b57ae9b5, reversing changes made to 2d0f8e012ecb006888ed8e826b45625a3edc2eeb. * update ethereumapis * update validator field name * update deps.bzl * update json tags (#8942) * Run `/node/syncing` through API Middleware (#8944) * add IsSyncing field to grpc response * run /node/syncing through the middleware Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * Return HTTP status codes other than 200 and 500 from node and debug endpoints (#8937) * error codes for node endpoints * error codes for debug endpoints * better comment about headers * gzl * review comments * comment on return value * update fakeChecker used for fuzz tests * fix failing tests * Allow to pass URL params literally, without encoding to base64 (#8938) * Allow to pass URL params literally, without encoding to base64 * fix compile error Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * unused import * Return correct status codes from beacon endpoints (#8960) * Various API Middleware fixes (#8963) * Return correct status codes from `/states` endpoints * better error messages in debug and node * better error messages in state * returning correct error codes from validator endpoints * correct error codes for getting a block header * gzl * fix err variable name * fix nil block comparison * test fixes * make status enum test better * fix ineffectual assignment * make PR unstuck * return proper status codes * return uppercase keys from /config/spec * return lowercase validator status * convert requested enum values to uppercase * validator fixes * Implement `/beacon/headers` endpoint (#8966) * Refactor API Middleware into more manageable code (#8984) * move endpoint registration out of shared package * divide main function into smaller components * return early on error * implement hooks * implement custom handlers and add documentation * fix test compile error * restrict package visibility * remove redundant error checking * rename file * API Middleware unit tests (#8998) * move endpoint registration out of shared package * divide main function into smaller components * return early on error * implement hooks * implement custom handlers and add documentation * fix test compile error * restrict package visibility * remove redundant error checking * rename file * api_middleware_processing * endpoints * gzl * remove gazelle:ignore * merge * Implement SSZ version of `/blocks/{block_id}` (#8970) * Implement SSZ version of `/blocks/{block_id}` * add dependencies back * fix indentation in deps.bzl * parameterize ssz functions * get block ssz * update ethereumapis dependency * gzl * Do not reuse `Endpoint` structs between API calls (#9007) * code refactor * implement endpoint factory * fix test * fmt * include pbs * gaz * test naming fixes * remove unused code * radek comments * revert endpoint test * bring back bytes test case * move `signedBeaconBlock` to `migration` package * change `fmt.Errorf` to `errors.Wrap` * capitalize SSZ * capitalize URL * more review feedback * rename `handleGetBlockSSZ` to `handleGetBeaconBlockSSZ` * rename `IndexOutOfRangeError` to `ValidatorIndexOutOfRangeError` * simplify parameter names * test header * more corrections * properly allocate array capacity Co-authored-by: terence tsao <terence@prysmaticlabs.com> Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> Co-authored-by: Nishant Das <nishdas93@gmail.com>
327 lines
12 KiB
Go
327 lines
12 KiB
Go
package beaconv1
|
|
|
|
import (
|
|
"context"
|
|
"strconv"
|
|
|
|
"github.com/pkg/errors"
|
|
types "github.com/prysmaticlabs/eth2-types"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/rpc/statefetcher"
|
|
iface "github.com/prysmaticlabs/prysm/beacon-chain/state/interface"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/state/stateV0"
|
|
ethpb "github.com/prysmaticlabs/prysm/proto/eth/v1"
|
|
"github.com/prysmaticlabs/prysm/proto/migration"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"google.golang.org/grpc/codes"
|
|
"google.golang.org/grpc/status"
|
|
)
|
|
|
|
// invalidValidatorIdError represents an error scenario where a validator's ID is invalid.
|
|
type invalidValidatorIdError struct {
|
|
message string
|
|
}
|
|
|
|
// newInvalidValidatorIdError creates a new error instance.
|
|
func newInvalidValidatorIdError(validatorId []byte, reason error) invalidValidatorIdError {
|
|
return invalidValidatorIdError{
|
|
message: errors.Wrapf(reason, "could not decode validator id '%s'", string(validatorId)).Error(),
|
|
}
|
|
}
|
|
|
|
// Error returns the underlying error message.
|
|
func (e *invalidValidatorIdError) Error() string {
|
|
return e.message
|
|
}
|
|
|
|
// GetValidator returns a validator specified by state and id or public key along with status and balance.
|
|
func (bs *Server) GetValidator(ctx context.Context, req *ethpb.StateValidatorRequest) (*ethpb.StateValidatorResponse, error) {
|
|
state, err := bs.StateFetcher.State(ctx, req.StateId)
|
|
if err != nil {
|
|
if stateNotFoundErr, ok := err.(*statefetcher.StateNotFoundError); ok {
|
|
return nil, status.Errorf(codes.NotFound, "could not get state: %v", stateNotFoundErr)
|
|
} else if parseErr, ok := err.(*statefetcher.StateIdParseError); ok {
|
|
return nil, status.Errorf(codes.InvalidArgument, "Invalid state ID: %v", parseErr)
|
|
}
|
|
return nil, status.Errorf(codes.Internal, "State not found: %v", err)
|
|
}
|
|
if len(req.ValidatorId) == 0 {
|
|
return nil, status.Error(codes.InvalidArgument, "Validator ID is required")
|
|
}
|
|
valContainer, err := valContainersByRequestIds(state, [][]byte{req.ValidatorId})
|
|
if err != nil {
|
|
return nil, handleValContainerErr(err)
|
|
}
|
|
if len(valContainer) == 0 {
|
|
return nil, status.Error(codes.NotFound, "Could not find validator")
|
|
}
|
|
return ðpb.StateValidatorResponse{Data: valContainer[0]}, nil
|
|
}
|
|
|
|
// ListValidators returns filterable list of validators with their balance, status and index.
|
|
func (bs *Server) ListValidators(ctx context.Context, req *ethpb.StateValidatorsRequest) (*ethpb.StateValidatorsResponse, error) {
|
|
state, err := bs.StateFetcher.State(ctx, req.StateId)
|
|
if err != nil {
|
|
if stateNotFoundErr, ok := err.(*statefetcher.StateNotFoundError); ok {
|
|
return nil, status.Errorf(codes.NotFound, "State not found: %v", stateNotFoundErr)
|
|
} else if parseErr, ok := err.(*statefetcher.StateIdParseError); ok {
|
|
return nil, status.Errorf(codes.InvalidArgument, "Invalid state ID: %v", parseErr)
|
|
}
|
|
return nil, status.Errorf(codes.Internal, "Could not get state: %v", err)
|
|
}
|
|
|
|
valContainers, err := valContainersByRequestIds(state, req.Id)
|
|
if err != nil {
|
|
return nil, handleValContainerErr(err)
|
|
}
|
|
|
|
// Exit early if no matching validators we found or we don't want to further filter validators by status.
|
|
if len(valContainers) == 0 || len(req.Status) == 0 {
|
|
return ðpb.StateValidatorsResponse{Data: valContainers}, nil
|
|
}
|
|
|
|
filterStatus := make(map[ethpb.ValidatorStatus]bool, len(req.Status))
|
|
const lastValidStatusValue = ethpb.ValidatorStatus(12)
|
|
for _, ss := range req.Status {
|
|
if ss > lastValidStatusValue {
|
|
return nil, status.Errorf(codes.InvalidArgument, "Invalid status "+ss.String())
|
|
}
|
|
filterStatus[ss] = true
|
|
}
|
|
epoch := helpers.SlotToEpoch(state.Slot())
|
|
filteredVals := make([]*ethpb.ValidatorContainer, 0, len(valContainers))
|
|
for _, vc := range valContainers {
|
|
valStatus, err := validatorStatus(vc.Validator, epoch)
|
|
if err != nil {
|
|
return nil, status.Errorf(codes.Internal, "Could not get validator status: %v", err)
|
|
}
|
|
valSubStatus, err := validatorSubStatus(vc.Validator, epoch)
|
|
if err != nil {
|
|
return nil, status.Errorf(codes.Internal, "Could not get validator sub status: %v", err)
|
|
}
|
|
if filterStatus[valStatus] || filterStatus[valSubStatus] {
|
|
filteredVals = append(filteredVals, vc)
|
|
}
|
|
}
|
|
return ðpb.StateValidatorsResponse{Data: filteredVals}, nil
|
|
}
|
|
|
|
// ListValidatorBalances returns a filterable list of validator balances.
|
|
func (bs *Server) ListValidatorBalances(ctx context.Context, req *ethpb.ValidatorBalancesRequest) (*ethpb.ValidatorBalancesResponse, error) {
|
|
state, err := bs.StateFetcher.State(ctx, req.StateId)
|
|
if err != nil {
|
|
if stateNotFoundErr, ok := err.(*statefetcher.StateNotFoundError); ok {
|
|
return nil, status.Errorf(codes.NotFound, "State not found: %v", stateNotFoundErr)
|
|
} else if parseErr, ok := err.(*statefetcher.StateIdParseError); ok {
|
|
return nil, status.Errorf(codes.InvalidArgument, "Invalid state ID: %v", parseErr)
|
|
}
|
|
return nil, status.Errorf(codes.Internal, "Could not get state: %v", err)
|
|
}
|
|
|
|
valContainers, err := valContainersByRequestIds(state, req.Id)
|
|
if err != nil {
|
|
return nil, handleValContainerErr(err)
|
|
}
|
|
valBalances := make([]*ethpb.ValidatorBalance, len(valContainers))
|
|
for i := 0; i < len(valContainers); i++ {
|
|
valBalances[i] = ðpb.ValidatorBalance{
|
|
Index: valContainers[i].Index,
|
|
Balance: valContainers[i].Balance,
|
|
}
|
|
}
|
|
return ðpb.ValidatorBalancesResponse{Data: valBalances}, nil
|
|
}
|
|
|
|
// ListCommittees retrieves the committees for the given state at the given epoch.
|
|
// If the requested slot and index are defined, only those committees are returned.
|
|
func (bs *Server) ListCommittees(ctx context.Context, req *ethpb.StateCommitteesRequest) (*ethpb.StateCommitteesResponse, error) {
|
|
state, err := bs.StateFetcher.State(ctx, req.StateId)
|
|
if err != nil {
|
|
if stateNotFoundErr, ok := err.(*statefetcher.StateNotFoundError); ok {
|
|
return nil, status.Errorf(codes.NotFound, "State not found: %v", stateNotFoundErr)
|
|
} else if parseErr, ok := err.(*statefetcher.StateIdParseError); ok {
|
|
return nil, status.Errorf(codes.InvalidArgument, "Invalid state ID: %v", parseErr)
|
|
}
|
|
return nil, status.Errorf(codes.Internal, "Could not get state: %v", err)
|
|
}
|
|
|
|
epoch := helpers.SlotToEpoch(state.Slot())
|
|
if req.Epoch != nil {
|
|
epoch = *req.Epoch
|
|
}
|
|
activeCount, err := helpers.ActiveValidatorCount(state, epoch)
|
|
if err != nil {
|
|
return nil, status.Errorf(codes.Internal, "Could not get active validator count: %v", err)
|
|
}
|
|
|
|
startSlot, err := helpers.StartSlot(epoch)
|
|
if err != nil {
|
|
return nil, status.Errorf(codes.InvalidArgument, "Invalid epoch: %v", err)
|
|
}
|
|
endSlot, err := helpers.EndSlot(epoch)
|
|
if err != nil {
|
|
return nil, status.Errorf(codes.InvalidArgument, "Invalid epoch: %v", err)
|
|
}
|
|
committeesPerSlot := helpers.SlotCommitteeCount(activeCount)
|
|
committees := make([]*ethpb.Committee, 0)
|
|
for slot := startSlot; slot <= endSlot; slot++ {
|
|
if req.Slot != nil && slot != *req.Slot {
|
|
continue
|
|
}
|
|
for index := types.CommitteeIndex(0); index < types.CommitteeIndex(committeesPerSlot); index++ {
|
|
if req.Index != nil && index != *req.Index {
|
|
continue
|
|
}
|
|
committee, err := helpers.BeaconCommitteeFromState(state, slot, index)
|
|
if err != nil {
|
|
return nil, status.Errorf(codes.Internal, "Could not get committee: %v", err)
|
|
}
|
|
committeeContainer := ðpb.Committee{
|
|
Index: index,
|
|
Slot: slot,
|
|
Validators: committee,
|
|
}
|
|
committees = append(committees, committeeContainer)
|
|
}
|
|
}
|
|
return ðpb.StateCommitteesResponse{Data: committees}, nil
|
|
}
|
|
|
|
// This function returns the validator object based on the passed in ID. The validator ID could be its public key,
|
|
// or its index.
|
|
func valContainersByRequestIds(state iface.BeaconState, validatorIds [][]byte) ([]*ethpb.ValidatorContainer, error) {
|
|
epoch := helpers.SlotToEpoch(state.Slot())
|
|
var valContainers []*ethpb.ValidatorContainer
|
|
if len(validatorIds) == 0 {
|
|
allValidators := state.Validators()
|
|
allBalances := state.Balances()
|
|
valContainers = make([]*ethpb.ValidatorContainer, len(allValidators))
|
|
for i, validator := range allValidators {
|
|
v1Validator := migration.V1Alpha1ValidatorToV1(validator)
|
|
subStatus, err := validatorSubStatus(v1Validator, epoch)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "could not get validator sub status")
|
|
}
|
|
valContainers[i] = ðpb.ValidatorContainer{
|
|
Index: types.ValidatorIndex(i),
|
|
Balance: allBalances[i],
|
|
Status: subStatus,
|
|
Validator: v1Validator,
|
|
}
|
|
}
|
|
} else {
|
|
valContainers = make([]*ethpb.ValidatorContainer, 0, len(validatorIds))
|
|
for _, validatorId := range validatorIds {
|
|
var valIndex types.ValidatorIndex
|
|
if len(validatorId) == params.BeaconConfig().BLSPubkeyLength {
|
|
var ok bool
|
|
valIndex, ok = state.ValidatorIndexByPubkey(bytesutil.ToBytes48(validatorId))
|
|
if !ok {
|
|
// Ignore well-formed yet unknown public keys.
|
|
continue
|
|
}
|
|
} else {
|
|
index, err := strconv.ParseUint(string(validatorId), 10, 64)
|
|
if err != nil {
|
|
e := newInvalidValidatorIdError(validatorId, err)
|
|
return nil, &e
|
|
}
|
|
valIndex = types.ValidatorIndex(index)
|
|
}
|
|
validator, err := state.ValidatorAtIndex(valIndex)
|
|
if _, ok := err.(*stateV0.ValidatorIndexOutOfRangeError); ok {
|
|
// Ignore well-formed yet unknown indexes.
|
|
continue
|
|
}
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "could not get validator")
|
|
}
|
|
v1Validator := migration.V1Alpha1ValidatorToV1(validator)
|
|
subStatus, err := validatorSubStatus(v1Validator, epoch)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "could not get validator sub status")
|
|
}
|
|
valContainers = append(valContainers, ðpb.ValidatorContainer{
|
|
Index: valIndex,
|
|
Balance: v1Validator.EffectiveBalance,
|
|
Status: subStatus,
|
|
Validator: v1Validator,
|
|
})
|
|
}
|
|
}
|
|
|
|
return valContainers, nil
|
|
}
|
|
|
|
func validatorStatus(validator *ethpb.Validator, epoch types.Epoch) (ethpb.ValidatorStatus, error) {
|
|
valStatus, err := validatorSubStatus(validator, epoch)
|
|
if err != nil {
|
|
return 0, errors.Wrap(err, "could not get sub status")
|
|
}
|
|
switch valStatus {
|
|
case ethpb.ValidatorStatus_PENDING_INITIALIZED, ethpb.ValidatorStatus_PENDING_QUEUED:
|
|
return ethpb.ValidatorStatus_PENDING, nil
|
|
case ethpb.ValidatorStatus_ACTIVE_ONGOING, ethpb.ValidatorStatus_ACTIVE_SLASHED, ethpb.ValidatorStatus_ACTIVE_EXITING:
|
|
return ethpb.ValidatorStatus_ACTIVE, nil
|
|
case ethpb.ValidatorStatus_EXITED_UNSLASHED, ethpb.ValidatorStatus_EXITED_SLASHED:
|
|
return ethpb.ValidatorStatus_EXITED, nil
|
|
case ethpb.ValidatorStatus_WITHDRAWAL_POSSIBLE, ethpb.ValidatorStatus_WITHDRAWAL_DONE:
|
|
return ethpb.ValidatorStatus_WITHDRAWAL, nil
|
|
}
|
|
return 0, errors.New("invalid validator state")
|
|
}
|
|
|
|
func validatorSubStatus(validator *ethpb.Validator, epoch types.Epoch) (ethpb.ValidatorStatus, error) {
|
|
farFutureEpoch := params.BeaconConfig().FarFutureEpoch
|
|
|
|
// Pending.
|
|
if validator.ActivationEpoch > epoch {
|
|
if validator.ActivationEligibilityEpoch == farFutureEpoch {
|
|
return ethpb.ValidatorStatus_PENDING_INITIALIZED, nil
|
|
} else if validator.ActivationEligibilityEpoch < farFutureEpoch {
|
|
return ethpb.ValidatorStatus_PENDING_QUEUED, nil
|
|
}
|
|
}
|
|
|
|
// Active.
|
|
if validator.ActivationEpoch <= epoch && epoch < validator.ExitEpoch {
|
|
if validator.ExitEpoch == farFutureEpoch {
|
|
return ethpb.ValidatorStatus_ACTIVE_ONGOING, nil
|
|
} else if validator.ExitEpoch < farFutureEpoch {
|
|
if validator.Slashed {
|
|
return ethpb.ValidatorStatus_ACTIVE_SLASHED, nil
|
|
}
|
|
return ethpb.ValidatorStatus_ACTIVE_EXITING, nil
|
|
}
|
|
}
|
|
|
|
// Exited.
|
|
if validator.ExitEpoch <= epoch && epoch < validator.WithdrawableEpoch {
|
|
if validator.Slashed {
|
|
return ethpb.ValidatorStatus_EXITED_SLASHED, nil
|
|
}
|
|
return ethpb.ValidatorStatus_EXITED_UNSLASHED, nil
|
|
}
|
|
|
|
if validator.WithdrawableEpoch <= epoch {
|
|
if validator.EffectiveBalance != 0 {
|
|
return ethpb.ValidatorStatus_WITHDRAWAL_POSSIBLE, nil
|
|
} else {
|
|
return ethpb.ValidatorStatus_WITHDRAWAL_DONE, nil
|
|
}
|
|
}
|
|
|
|
return 0, errors.New("invalid validator state")
|
|
}
|
|
|
|
func handleValContainerErr(err error) error {
|
|
if outOfRangeErr, ok := err.(*stateV0.ValidatorIndexOutOfRangeError); ok {
|
|
return status.Errorf(codes.InvalidArgument, "Invalid validator ID: %v", outOfRangeErr)
|
|
}
|
|
if invalidIdErr, ok := err.(*invalidValidatorIdError); ok {
|
|
return status.Errorf(codes.InvalidArgument, "Invalid validator ID: %v", invalidIdErr)
|
|
}
|
|
return status.Errorf(codes.Internal, "Could not get validator container: %v", err)
|
|
}
|