mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-26 13:18:57 +00:00
7cc32c4dda
* remove unused code * remove defer use in loop * Remove unused methods and constants * gofmt and gaz * nilness check * remove unused args * Add TODO for refactoring subscribeWithBase to remove unused arg. It seems too involved to include in this sweeping PR. https://github.com/prysmaticlabs/prysm/issues/7437 * replace empty slice declaration * Remove unnecessary type conversions * remove redundant type declaration * rename receivers to be consistent * Remove bootnode query tool. It is now obsolete by discv5 * Remove relay node. It is no longer used or supported * Revert "Remove relay node. It is no longer used or supported" This reverts commit 4bd7717334dad85ef4766ed9bc4da711fb5fa810. * Delete unused test directory * Delete unsupported gcp startup script * Delete old k8s script * build fixes * fix build * go mod tidy * revert slasher/db/kv/block_header.go * fix build * remove redundant nil check * combine func args Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com> Co-authored-by: Victor Farazdagi <simple.square@gmail.com>
163 lines
6.4 KiB
Go
163 lines
6.4 KiB
Go
package blockchain
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/pkg/errors"
|
|
ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
stateTrie "github.com/prysmaticlabs/prysm/beacon-chain/state"
|
|
"github.com/prysmaticlabs/prysm/shared/attestationutil"
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/featureconfig"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"github.com/prysmaticlabs/prysm/shared/timeutils"
|
|
"go.opencensus.io/trace"
|
|
)
|
|
|
|
// ErrTargetRootNotInDB returns when the target block root of an attestation cannot be found in the
|
|
// beacon database.
|
|
var ErrTargetRootNotInDB = errors.New("target root does not exist in db")
|
|
|
|
// onAttestation is called whenever an attestation is received, verifies the attestation is valid and saves
|
|
// it to the DB. As a stateless function, this does not hold nor delay attestation based on the spec descriptions.
|
|
// The delay is handled by the caller in `processAttestation`.
|
|
//
|
|
// Spec pseudocode definition:
|
|
// def on_attestation(store: Store, attestation: Attestation) -> None:
|
|
// """
|
|
// Run ``on_attestation`` upon receiving a new ``attestation`` from either within a block or directly on the wire.
|
|
//
|
|
// An ``attestation`` that is asserted as invalid may be valid at a later time,
|
|
// consider scheduling it for later processing in such case.
|
|
// """
|
|
// validate_on_attestation(store, attestation)
|
|
// store_target_checkpoint_state(store, attestation.data.target)
|
|
//
|
|
// # Get state at the `target` to fully validate attestation
|
|
// target_state = store.checkpoint_states[attestation.data.target]
|
|
// indexed_attestation = get_indexed_attestation(target_state, attestation)
|
|
// assert is_valid_indexed_attestation(target_state, indexed_attestation)
|
|
//
|
|
// # Update latest messages for attesting indices
|
|
// update_latest_messages(store, indexed_attestation.attesting_indices, attestation)
|
|
// TODO(#6072): This code path is highly untested. Requires comprehensive tests and simpler refactoring.
|
|
func (s *Service) onAttestation(ctx context.Context, a *ethpb.Attestation) ([]uint64, error) {
|
|
ctx, span := trace.StartSpan(ctx, "blockChain.onAttestation")
|
|
defer span.End()
|
|
|
|
if a == nil {
|
|
return nil, errors.New("nil attestation")
|
|
}
|
|
if a.Data == nil {
|
|
return nil, errors.New("nil attestation.Data field")
|
|
}
|
|
if a.Data.Target == nil {
|
|
return nil, errors.New("nil attestation.Data.Target field")
|
|
}
|
|
|
|
tgt := stateTrie.CopyCheckpoint(a.Data.Target)
|
|
|
|
if helpers.SlotToEpoch(a.Data.Slot) != a.Data.Target.Epoch {
|
|
return nil, fmt.Errorf("data slot is not in the same epoch as target %d != %d", helpers.SlotToEpoch(a.Data.Slot), a.Data.Target.Epoch)
|
|
}
|
|
|
|
// Verify beacon node has seen the target block before.
|
|
if !s.hasBlock(ctx, bytesutil.ToBytes32(tgt.Root)) {
|
|
return nil, ErrTargetRootNotInDB
|
|
}
|
|
|
|
if featureconfig.Get().UseCheckPointInfoCache {
|
|
c, err := s.AttestationCheckPtInfo(ctx, a)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if err := s.verifyAttTargetEpoch(ctx, uint64(s.genesisTime.Unix()), uint64(timeutils.Now().Unix()), tgt); err != nil {
|
|
return nil, err
|
|
}
|
|
if err := s.verifyBeaconBlock(ctx, a.Data); err != nil {
|
|
return nil, errors.Wrap(err, "could not verify attestation beacon block")
|
|
}
|
|
if err := s.verifyLMDFFGConsistent(ctx, a.Data.Target.Epoch, a.Data.Target.Root, a.Data.BeaconBlockRoot); err != nil {
|
|
return nil, errors.Wrap(err, "could not verify attestation beacon block")
|
|
}
|
|
if err := helpers.VerifySlotTime(uint64(s.genesisTime.Unix()), a.Data.Slot+1, params.BeaconNetworkConfig().MaximumGossipClockDisparity); err != nil {
|
|
return nil, err
|
|
}
|
|
committee, err := helpers.BeaconCommittee(c.ActiveIndices, bytesutil.ToBytes32(c.Seed), a.Data.Slot, a.Data.CommitteeIndex)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
indexedAtt := attestationutil.ConvertToIndexed(ctx, a, committee)
|
|
if err := attestationutil.IsValidAttestationIndices(ctx, indexedAtt); err != nil {
|
|
return nil, err
|
|
}
|
|
domain, err := helpers.Domain(c.Fork, indexedAtt.Data.Target.Epoch, params.BeaconConfig().DomainBeaconAttester, c.GenesisRoot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
indices := indexedAtt.AttestingIndices
|
|
var pubkeys []bls.PublicKey
|
|
for i := 0; i < len(indices); i++ {
|
|
pubkeyAtIdx := c.PubKeys[indices[i]]
|
|
pk, err := bls.PublicKeyFromBytes(pubkeyAtIdx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
pubkeys = append(pubkeys, pk)
|
|
}
|
|
if err := attestationutil.VerifyIndexedAttestationSig(ctx, indexedAtt, pubkeys, domain); err != nil {
|
|
return nil, err
|
|
}
|
|
s.forkChoiceStore.ProcessAttestation(ctx, indexedAtt.AttestingIndices, bytesutil.ToBytes32(a.Data.BeaconBlockRoot), a.Data.Target.Epoch)
|
|
|
|
return indexedAtt.AttestingIndices, nil
|
|
}
|
|
|
|
// Retrieve attestation's data beacon block pre state. Advance pre state to latest epoch if necessary and
|
|
// save it to the cache.
|
|
baseState, err := s.getAttPreState(ctx, tgt)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
genesisTime := baseState.GenesisTime()
|
|
|
|
// Verify attestation target is from current epoch or previous epoch.
|
|
if err := s.verifyAttTargetEpoch(ctx, genesisTime, uint64(timeutils.Now().Unix()), tgt); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Verify attestation beacon block is known and not from the future.
|
|
if err := s.verifyBeaconBlock(ctx, a.Data); err != nil {
|
|
return nil, errors.Wrap(err, "could not verify attestation beacon block")
|
|
}
|
|
|
|
// Verify LMG GHOST and FFG votes are consistent with each other.
|
|
if err := s.verifyLMDFFGConsistent(ctx, a.Data.Target.Epoch, a.Data.Target.Root, a.Data.BeaconBlockRoot); err != nil {
|
|
return nil, errors.Wrap(err, "could not verify attestation beacon block")
|
|
}
|
|
|
|
// Verify attestations can only affect the fork choice of subsequent slots.
|
|
if err := helpers.VerifySlotTime(genesisTime, a.Data.Slot+1, params.BeaconNetworkConfig().MaximumGossipClockDisparity); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Use the target state to validate attestation and calculate the committees.
|
|
indexedAtt, err := s.verifyAttestation(ctx, baseState, a)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if indexedAtt.AttestingIndices == nil {
|
|
return nil, errors.New("nil attesting indices")
|
|
}
|
|
|
|
// Update forkchoice store with the new attestation for updating weight.
|
|
s.forkChoiceStore.ProcessAttestation(ctx, indexedAtt.AttestingIndices, bytesutil.ToBytes32(a.Data.BeaconBlockRoot), a.Data.Target.Epoch)
|
|
|
|
return indexedAtt.AttestingIndices, nil
|
|
}
|