mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-27 05:38:55 +00:00
d077483577
* v3 import renamings * tidy * fmt * rev * Update beacon-chain/core/epoch/precompute/reward_penalty_test.go * Update beacon-chain/core/helpers/validators_test.go * Update beacon-chain/db/alias.go * Update beacon-chain/db/alias.go * Update beacon-chain/db/alias.go * Update beacon-chain/db/iface/BUILD.bazel * Update beacon-chain/db/kv/kv.go * Update beacon-chain/db/kv/state.go * Update beacon-chain/rpc/prysm/v1alpha1/validator/attester_test.go * Update beacon-chain/rpc/prysm/v1alpha1/validator/attester_test.go * Update beacon-chain/sync/initial-sync/service.go * fix deps * fix bad replacements * fix bad replacements * change back * gohashtree version * fix deps Co-authored-by: Nishant Das <nishdas93@gmail.com> Co-authored-by: Potuz <potuz@prysmaticlabs.com>
228 lines
8.8 KiB
Go
228 lines
8.8 KiB
Go
package monitor
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/prysmaticlabs/prysm/v3/beacon-chain/core/altair"
|
|
"github.com/prysmaticlabs/prysm/v3/beacon-chain/core/helpers"
|
|
"github.com/prysmaticlabs/prysm/v3/beacon-chain/state"
|
|
"github.com/prysmaticlabs/prysm/v3/config/params"
|
|
"github.com/prysmaticlabs/prysm/v3/consensus-types/interfaces"
|
|
types "github.com/prysmaticlabs/prysm/v3/consensus-types/primitives"
|
|
"github.com/prysmaticlabs/prysm/v3/encoding/bytesutil"
|
|
ethpb "github.com/prysmaticlabs/prysm/v3/proto/prysm/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/v3/proto/prysm/v1alpha1/attestation"
|
|
"github.com/prysmaticlabs/prysm/v3/runtime/version"
|
|
"github.com/prysmaticlabs/prysm/v3/time/slots"
|
|
"github.com/sirupsen/logrus"
|
|
)
|
|
|
|
// canUpdateAttestedValidator returns true if the validator is tracked and if the
|
|
// given slot is different than the last attested slot from this validator.
|
|
// It assumes that a read lock is held on the monitor service.
|
|
func (s *Service) canUpdateAttestedValidator(idx types.ValidatorIndex, slot types.Slot) bool {
|
|
if !s.trackedIndex(idx) {
|
|
return false
|
|
}
|
|
|
|
if lp, ok := s.latestPerformance[idx]; ok {
|
|
return lp.attestedSlot != slot
|
|
}
|
|
return false
|
|
}
|
|
|
|
// attestingIndices returns the indices of validators that participated in the given aggregated attestation.
|
|
func attestingIndices(ctx context.Context, state state.BeaconState, att *ethpb.Attestation) ([]uint64, error) {
|
|
committee, err := helpers.BeaconCommitteeFromState(ctx, state, att.Data.Slot, att.Data.CommitteeIndex)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return attestation.AttestingIndices(att.AggregationBits, committee)
|
|
}
|
|
|
|
// logMessageTimelyFlagsForIndex returns the log message with performance info for the attestation (head, source, target)
|
|
func logMessageTimelyFlagsForIndex(idx types.ValidatorIndex, data *ethpb.AttestationData) logrus.Fields {
|
|
return logrus.Fields{
|
|
"ValidatorIndex": idx,
|
|
"Slot": data.Slot,
|
|
"Source": fmt.Sprintf("%#x", bytesutil.Trunc(data.Source.Root)),
|
|
"Target": fmt.Sprintf("%#x", bytesutil.Trunc(data.Target.Root)),
|
|
"Head": fmt.Sprintf("%#x", bytesutil.Trunc(data.BeaconBlockRoot)),
|
|
}
|
|
}
|
|
|
|
// processAttestations logs the event for the tracked validators' attestations inclusion in block
|
|
func (s *Service) processAttestations(ctx context.Context, state state.BeaconState, blk interfaces.BeaconBlock) {
|
|
if blk == nil || blk.Body() == nil {
|
|
return
|
|
}
|
|
for _, att := range blk.Body().Attestations() {
|
|
s.processIncludedAttestation(ctx, state, att)
|
|
}
|
|
}
|
|
|
|
// processIncludedAttestation logs in the event for the tracked validators' and their latest attestation gets processed.
|
|
func (s *Service) processIncludedAttestation(ctx context.Context, state state.BeaconState, att *ethpb.Attestation) {
|
|
attestingIndices, err := attestingIndices(ctx, state, att)
|
|
if err != nil {
|
|
log.WithError(err).Error("Could not get attesting indices")
|
|
return
|
|
}
|
|
s.Lock()
|
|
defer s.Unlock()
|
|
for _, idx := range attestingIndices {
|
|
if s.canUpdateAttestedValidator(types.ValidatorIndex(idx), att.Data.Slot) {
|
|
logFields := logMessageTimelyFlagsForIndex(types.ValidatorIndex(idx), att.Data)
|
|
balance, err := state.BalanceAtIndex(types.ValidatorIndex(idx))
|
|
if err != nil {
|
|
log.WithError(err).Error("Could not get balance")
|
|
return
|
|
}
|
|
|
|
aggregatedPerf := s.aggregatedPerformance[types.ValidatorIndex(idx)]
|
|
aggregatedPerf.totalAttestedCount++
|
|
aggregatedPerf.totalRequestedCount++
|
|
|
|
latestPerf := s.latestPerformance[types.ValidatorIndex(idx)]
|
|
balanceChg := int64(balance - latestPerf.balance)
|
|
latestPerf.balanceChange = balanceChg
|
|
latestPerf.balance = balance
|
|
latestPerf.attestedSlot = att.Data.Slot
|
|
latestPerf.inclusionSlot = state.Slot()
|
|
inclusionSlotGauge.WithLabelValues(fmt.Sprintf("%d", idx)).Set(float64(latestPerf.inclusionSlot))
|
|
aggregatedPerf.totalDistance += uint64(latestPerf.inclusionSlot - latestPerf.attestedSlot)
|
|
|
|
if state.Version() == version.Altair {
|
|
targetIdx := params.BeaconConfig().TimelyTargetFlagIndex
|
|
sourceIdx := params.BeaconConfig().TimelySourceFlagIndex
|
|
headIdx := params.BeaconConfig().TimelyHeadFlagIndex
|
|
|
|
var participation []byte
|
|
if slots.ToEpoch(latestPerf.inclusionSlot) ==
|
|
slots.ToEpoch(latestPerf.attestedSlot) {
|
|
participation, err = state.CurrentEpochParticipation()
|
|
if err != nil {
|
|
log.WithError(err).Error("Could not get current epoch participation")
|
|
return
|
|
}
|
|
} else {
|
|
participation, err = state.PreviousEpochParticipation()
|
|
if err != nil {
|
|
log.WithError(err).Error("Could not get previous epoch participation")
|
|
return
|
|
}
|
|
}
|
|
flags := participation[idx]
|
|
hasFlag, err := altair.HasValidatorFlag(flags, sourceIdx)
|
|
if err != nil {
|
|
log.WithError(err).Error("Could not get timely Source flag")
|
|
return
|
|
}
|
|
latestPerf.timelySource = hasFlag
|
|
hasFlag, err = altair.HasValidatorFlag(flags, headIdx)
|
|
if err != nil {
|
|
log.WithError(err).Error("Could not get timely Head flag")
|
|
return
|
|
}
|
|
latestPerf.timelyHead = hasFlag
|
|
hasFlag, err = altair.HasValidatorFlag(flags, targetIdx)
|
|
if err != nil {
|
|
log.WithError(err).Error("Could not get timely Target flag")
|
|
return
|
|
}
|
|
latestPerf.timelyTarget = hasFlag
|
|
|
|
if latestPerf.timelySource {
|
|
timelySourceCounter.WithLabelValues(fmt.Sprintf("%d", idx)).Inc()
|
|
aggregatedPerf.totalCorrectSource++
|
|
}
|
|
if latestPerf.timelyHead {
|
|
timelyHeadCounter.WithLabelValues(fmt.Sprintf("%d", idx)).Inc()
|
|
aggregatedPerf.totalCorrectHead++
|
|
}
|
|
if latestPerf.timelyTarget {
|
|
timelyTargetCounter.WithLabelValues(fmt.Sprintf("%d", idx)).Inc()
|
|
aggregatedPerf.totalCorrectTarget++
|
|
}
|
|
}
|
|
logFields["CorrectHead"] = latestPerf.timelyHead
|
|
logFields["CorrectSource"] = latestPerf.timelySource
|
|
logFields["CorrectTarget"] = latestPerf.timelyTarget
|
|
logFields["InclusionSlot"] = latestPerf.inclusionSlot
|
|
logFields["NewBalance"] = balance
|
|
logFields["BalanceChange"] = balanceChg
|
|
|
|
s.latestPerformance[types.ValidatorIndex(idx)] = latestPerf
|
|
s.aggregatedPerformance[types.ValidatorIndex(idx)] = aggregatedPerf
|
|
log.WithFields(logFields).Info("Attestation included")
|
|
}
|
|
}
|
|
}
|
|
|
|
// processUnaggregatedAttestation logs when the beacon node observes an unaggregated attestation from tracked validator.
|
|
func (s *Service) processUnaggregatedAttestation(ctx context.Context, att *ethpb.Attestation) {
|
|
s.RLock()
|
|
defer s.RUnlock()
|
|
root := bytesutil.ToBytes32(att.Data.BeaconBlockRoot)
|
|
st := s.config.StateGen.StateByRootIfCachedNoCopy(root)
|
|
if st == nil {
|
|
log.WithField("BeaconBlockRoot", fmt.Sprintf("%#x", bytesutil.Trunc(root[:]))).Debug(
|
|
"Skipping unaggregated attestation due to state not found in cache")
|
|
return
|
|
}
|
|
attestingIndices, err := attestingIndices(ctx, st, att)
|
|
if err != nil {
|
|
log.WithError(err).Error("Could not get attesting indices")
|
|
return
|
|
}
|
|
for _, idx := range attestingIndices {
|
|
if s.canUpdateAttestedValidator(types.ValidatorIndex(idx), att.Data.Slot) {
|
|
logFields := logMessageTimelyFlagsForIndex(types.ValidatorIndex(idx), att.Data)
|
|
log.WithFields(logFields).Info("Processed unaggregated attestation")
|
|
}
|
|
}
|
|
}
|
|
|
|
// processUnaggregatedAttestation logs when the beacon node observes an aggregated attestation from tracked validator.
|
|
func (s *Service) processAggregatedAttestation(ctx context.Context, att *ethpb.AggregateAttestationAndProof) {
|
|
s.Lock()
|
|
defer s.Unlock()
|
|
if s.trackedIndex(att.AggregatorIndex) {
|
|
log.WithFields(logrus.Fields{
|
|
"AggregatorIndex": att.AggregatorIndex,
|
|
"Slot": att.Aggregate.Data.Slot,
|
|
"BeaconBlockRoot": fmt.Sprintf("%#x", bytesutil.Trunc(
|
|
att.Aggregate.Data.BeaconBlockRoot)),
|
|
"SourceRoot": fmt.Sprintf("%#x", bytesutil.Trunc(
|
|
att.Aggregate.Data.Source.Root)),
|
|
"TargetRoot": fmt.Sprintf("%#x", bytesutil.Trunc(
|
|
att.Aggregate.Data.Target.Root)),
|
|
}).Info("Processed attestation aggregation")
|
|
aggregatedPerf := s.aggregatedPerformance[att.AggregatorIndex]
|
|
aggregatedPerf.totalAggregations++
|
|
s.aggregatedPerformance[att.AggregatorIndex] = aggregatedPerf
|
|
aggregationCounter.WithLabelValues(fmt.Sprintf("%d", att.AggregatorIndex)).Inc()
|
|
}
|
|
|
|
var root [32]byte
|
|
copy(root[:], att.Aggregate.Data.BeaconBlockRoot)
|
|
st := s.config.StateGen.StateByRootIfCachedNoCopy(root)
|
|
if st == nil {
|
|
log.WithField("BeaconBlockRoot", fmt.Sprintf("%#x", bytesutil.Trunc(root[:]))).Debug(
|
|
"Skipping aggregated attestation due to state not found in cache")
|
|
return
|
|
}
|
|
attestingIndices, err := attestingIndices(ctx, st, att.Aggregate)
|
|
if err != nil {
|
|
log.WithError(err).Error("Could not get attesting indices")
|
|
return
|
|
}
|
|
for _, idx := range attestingIndices {
|
|
if s.canUpdateAttestedValidator(types.ValidatorIndex(idx), att.Aggregate.Data.Slot) {
|
|
logFields := logMessageTimelyFlagsForIndex(types.ValidatorIndex(idx), att.Aggregate.Data)
|
|
log.WithFields(logFields).Info("Processed aggregated attestation")
|
|
}
|
|
}
|
|
}
|