Implement getBlobSidecars support for PeerDAS (#6755)

* Implement getBlobSidecars endpoint for PeerDAS.

* Merge branch 'unstable' into peerdas-get-blob-sidecars

* Fix incorrect logging.

* Replace `and_then` usage.
This commit is contained in:
Jimmy Chen
2025-01-08 14:12:34 +11:00
committed by GitHub
parent 57141d8b4b
commit 7ec748a108
3 changed files with 202 additions and 31 deletions

View File

@@ -7,8 +7,9 @@ use std::sync::Arc;
use types::beacon_block_body::KzgCommitments; use types::beacon_block_body::KzgCommitments;
use types::data_column_sidecar::{Cell, DataColumn, DataColumnSidecarError}; use types::data_column_sidecar::{Cell, DataColumn, DataColumnSidecarError};
use types::{ use types::{
Blob, ChainSpec, ColumnIndex, DataColumnSidecar, DataColumnSidecarList, EthSpec, Hash256, Blob, BlobSidecar, BlobSidecarList, ChainSpec, ColumnIndex, DataColumnSidecar,
KzgCommitment, KzgProof, KzgProofs, SignedBeaconBlock, SignedBeaconBlockHeader, DataColumnSidecarList, EthSpec, Hash256, KzgCommitment, KzgProof, KzgProofs, SignedBeaconBlock,
SignedBeaconBlockHeader, SignedBlindedBeaconBlock,
}; };
/// Converts a blob ssz List object to an array to be used with the kzg /// Converts a blob ssz List object to an array to be used with the kzg
@@ -243,6 +244,83 @@ fn build_data_column_sidecars<E: EthSpec>(
Ok(sidecars) Ok(sidecars)
} }
/// Reconstruct blobs from a subset of data column sidecars (requires at least 50%).
///
/// If `blob_indices_opt` is `None`, this function attempts to reconstruct all blobs associated
/// with the block.
pub fn reconstruct_blobs<E: EthSpec>(
kzg: &Kzg,
data_columns: &[Arc<DataColumnSidecar<E>>],
blob_indices_opt: Option<Vec<u64>>,
signed_block: &SignedBlindedBeaconBlock<E>,
) -> Result<BlobSidecarList<E>, String> {
// The data columns are from the database, so we assume their correctness.
let first_data_column = data_columns
.first()
.ok_or("data_columns should have at least one element".to_string())?;
let blob_indices: Vec<usize> = match blob_indices_opt {
Some(indices) => indices.into_iter().map(|i| i as usize).collect(),
None => {
let num_of_blobs = first_data_column.kzg_commitments.len();
(0..num_of_blobs).collect()
}
};
let blob_sidecars = blob_indices
.into_par_iter()
.map(|row_index| {
let mut cells: Vec<KzgCellRef> = vec![];
let mut cell_ids: Vec<u64> = vec![];
for data_column in data_columns {
let cell = data_column
.column
.get(row_index)
.ok_or(format!("Missing data column at row index {row_index}"))
.and_then(|cell| {
ssz_cell_to_crypto_cell::<E>(cell).map_err(|e| format!("{e:?}"))
})?;
cells.push(cell);
cell_ids.push(data_column.index);
}
let (cells, _kzg_proofs) = kzg
.recover_cells_and_compute_kzg_proofs(&cell_ids, &cells)
.map_err(|e| format!("Failed to recover cells and compute KZG proofs: {e:?}"))?;
let num_cells_original_blob = cells.len() / 2;
let blob_bytes = cells
.into_iter()
.take(num_cells_original_blob)
.flat_map(|cell| cell.into_iter())
.collect();
let blob = Blob::<E>::new(blob_bytes).map_err(|e| format!("{e:?}"))?;
let kzg_commitment = first_data_column
.kzg_commitments
.get(row_index)
.ok_or(format!("Missing KZG commitment for blob {row_index}"))?;
let kzg_proof = compute_blob_kzg_proof::<E>(kzg, &blob, *kzg_commitment)
.map_err(|e| format!("{e:?}"))?;
BlobSidecar::<E>::new_with_existing_proof(
row_index,
blob,
signed_block,
first_data_column.signed_block_header.clone(),
&first_data_column.kzg_commitments_inclusion_proof,
kzg_proof,
)
.map(Arc::new)
.map_err(|e| format!("{e:?}"))
})
.collect::<Result<Vec<_>, _>>()?
.into();
Ok(blob_sidecars)
}
/// Reconstruct all data columns from a subset of data column sidecars (requires at least 50%). /// Reconstruct all data columns from a subset of data column sidecars (requires at least 50%).
pub fn reconstruct_data_columns<E: EthSpec>( pub fn reconstruct_data_columns<E: EthSpec>(
kzg: &Kzg, kzg: &Kzg,
@@ -265,7 +343,7 @@ pub fn reconstruct_data_columns<E: EthSpec>(
for data_column in data_columns { for data_column in data_columns {
let cell = data_column.column.get(row_index).ok_or( let cell = data_column.column.get(row_index).ok_or(
KzgError::InconsistentArrayLength(format!( KzgError::InconsistentArrayLength(format!(
"Missing data column at index {row_index}" "Missing data column at row index {row_index}"
)), )),
)?; )?;
@@ -289,12 +367,16 @@ pub fn reconstruct_data_columns<E: EthSpec>(
#[cfg(test)] #[cfg(test)]
mod test { mod test {
use crate::kzg_utils::{blobs_to_data_column_sidecars, reconstruct_data_columns}; use crate::kzg_utils::{
blobs_to_data_column_sidecars, reconstruct_blobs, reconstruct_data_columns,
};
use bls::Signature; use bls::Signature;
use eth2::types::BlobsBundle;
use execution_layer::test_utils::generate_blobs;
use kzg::{trusted_setup::get_trusted_setup, Kzg, KzgCommitment, TrustedSetup}; use kzg::{trusted_setup::get_trusted_setup, Kzg, KzgCommitment, TrustedSetup};
use types::{ use types::{
beacon_block_body::KzgCommitments, BeaconBlock, BeaconBlockDeneb, Blob, BlobsList, beacon_block_body::KzgCommitments, BeaconBlock, BeaconBlockDeneb, BlobsList, ChainSpec,
ChainSpec, EmptyBlock, EthSpec, MainnetEthSpec, SignedBeaconBlock, EmptyBlock, EthSpec, MainnetEthSpec, SignedBeaconBlock,
}; };
type E = MainnetEthSpec; type E = MainnetEthSpec;
@@ -308,6 +390,7 @@ mod test {
test_build_data_columns_empty(&kzg, &spec); test_build_data_columns_empty(&kzg, &spec);
test_build_data_columns(&kzg, &spec); test_build_data_columns(&kzg, &spec);
test_reconstruct_data_columns(&kzg, &spec); test_reconstruct_data_columns(&kzg, &spec);
test_reconstruct_blobs_from_data_columns(&kzg, &spec);
} }
#[track_caller] #[track_caller]
@@ -379,6 +462,36 @@ mod test {
} }
} }
#[track_caller]
fn test_reconstruct_blobs_from_data_columns(kzg: &Kzg, spec: &ChainSpec) {
let num_of_blobs = 6;
let (signed_block, blobs) = create_test_block_and_blobs::<E>(num_of_blobs, spec);
let blob_refs = blobs.iter().collect::<Vec<_>>();
let column_sidecars =
blobs_to_data_column_sidecars(&blob_refs, &signed_block, kzg, spec).unwrap();
// Now reconstruct
let signed_blinded_block = signed_block.into();
let blob_indices = vec![3, 4, 5];
let reconstructed_blobs = reconstruct_blobs(
kzg,
&column_sidecars.iter().as_slice()[0..column_sidecars.len() / 2],
Some(blob_indices.clone()),
&signed_blinded_block,
)
.unwrap();
for i in blob_indices {
let reconstructed_blob = &reconstructed_blobs
.iter()
.find(|sidecar| sidecar.index == i)
.map(|sidecar| sidecar.blob.clone())
.expect("reconstructed blob should exist");
let original_blob = blobs.get(i as usize).unwrap();
assert_eq!(reconstructed_blob, original_blob, "{i}");
}
}
fn get_kzg() -> Kzg { fn get_kzg() -> Kzg {
let trusted_setup: TrustedSetup = serde_json::from_reader(get_trusted_setup().as_slice()) let trusted_setup: TrustedSetup = serde_json::from_reader(get_trusted_setup().as_slice())
.map_err(|e| format!("Unable to read trusted setup file: {}", e)) .map_err(|e| format!("Unable to read trusted setup file: {}", e))
@@ -397,12 +510,20 @@ mod test {
KzgCommitments::<E>::new(vec![KzgCommitment::empty_for_testing(); num_of_blobs]) KzgCommitments::<E>::new(vec![KzgCommitment::empty_for_testing(); num_of_blobs])
.unwrap(); .unwrap();
let signed_block = SignedBeaconBlock::from_block(block, Signature::empty()); let mut signed_block = SignedBeaconBlock::from_block(block, Signature::empty());
let blobs = (0..num_of_blobs) let (blobs_bundle, _) = generate_blobs::<E>(num_of_blobs).unwrap();
.map(|_| Blob::<E>::default()) let BlobsBundle {
.collect::<Vec<_>>() blobs,
.into(); commitments,
proofs: _,
} = blobs_bundle;
*signed_block
.message_mut()
.body_mut()
.blob_kzg_commitments_mut()
.unwrap() = commitments;
(signed_block, blobs) (signed_block, blobs)
} }

View File

@@ -1,4 +1,5 @@
use crate::{state_id::checkpoint_slot_and_execution_optimistic, ExecutionOptimistic}; use crate::{state_id::checkpoint_slot_and_execution_optimistic, ExecutionOptimistic};
use beacon_chain::kzg_utils::reconstruct_blobs;
use beacon_chain::{BeaconChain, BeaconChainError, BeaconChainTypes, WhenSlotSkipped}; use beacon_chain::{BeaconChain, BeaconChainError, BeaconChainTypes, WhenSlotSkipped};
use eth2::types::BlobIndicesQuery; use eth2::types::BlobIndicesQuery;
use eth2::types::BlockId as CoreBlockId; use eth2::types::BlockId as CoreBlockId;
@@ -9,6 +10,7 @@ use types::{
BlobSidecarList, EthSpec, FixedBytesExtended, Hash256, SignedBeaconBlock, BlobSidecarList, EthSpec, FixedBytesExtended, Hash256, SignedBeaconBlock,
SignedBlindedBeaconBlock, Slot, SignedBlindedBeaconBlock, Slot,
}; };
use warp::Rejection;
/// Wraps `eth2::types::BlockId` and provides a simple way to obtain a block or root for a given /// Wraps `eth2::types::BlockId` and provides a simple way to obtain a block or root for a given
/// `BlockId`. /// `BlockId`.
@@ -261,7 +263,7 @@ impl BlockId {
#[allow(clippy::type_complexity)] #[allow(clippy::type_complexity)]
pub fn get_blinded_block_and_blob_list_filtered<T: BeaconChainTypes>( pub fn get_blinded_block_and_blob_list_filtered<T: BeaconChainTypes>(
&self, &self,
indices: BlobIndicesQuery, query: BlobIndicesQuery,
chain: &BeaconChain<T>, chain: &BeaconChain<T>,
) -> Result< ) -> Result<
( (
@@ -286,20 +288,32 @@ impl BlockId {
// Return the `BlobSidecarList` identified by `self`. // Return the `BlobSidecarList` identified by `self`.
let blob_sidecar_list = if !blob_kzg_commitments.is_empty() { let blob_sidecar_list = if !blob_kzg_commitments.is_empty() {
chain if chain.spec.is_peer_das_enabled_for_epoch(block.epoch()) {
.store Self::get_blobs_from_data_columns(chain, root, query.indices, &block)?
.get_blobs(&root) } else {
.map_err(|e| warp_utils::reject::beacon_chain_error(e.into()))? Self::get_blobs(chain, root, query.indices)?
.ok_or_else(|| { }
warp_utils::reject::custom_not_found(format!(
"no blobs stored for block {root}"
))
})?
} else { } else {
BlobSidecarList::default() BlobSidecarList::default()
}; };
let blob_sidecar_list_filtered = match indices.indices { Ok((block, blob_sidecar_list, execution_optimistic, finalized))
}
fn get_blobs<T: BeaconChainTypes>(
chain: &BeaconChain<T>,
root: Hash256,
indices: Option<Vec<u64>>,
) -> Result<BlobSidecarList<T::EthSpec>, Rejection> {
let blob_sidecar_list = chain
.store
.get_blobs(&root)
.map_err(|e| warp_utils::reject::beacon_chain_error(e.into()))?
.ok_or_else(|| {
warp_utils::reject::custom_not_found(format!("no blobs stored for block {root}"))
})?;
let blob_sidecar_list_filtered = match indices {
Some(vec) => { Some(vec) => {
let list = blob_sidecar_list let list = blob_sidecar_list
.into_iter() .into_iter()
@@ -310,12 +324,48 @@ impl BlockId {
} }
None => blob_sidecar_list, None => blob_sidecar_list,
}; };
Ok((
block, Ok(blob_sidecar_list_filtered)
blob_sidecar_list_filtered, }
execution_optimistic,
finalized, fn get_blobs_from_data_columns<T: BeaconChainTypes>(
)) chain: &BeaconChain<T>,
root: Hash256,
blob_indices: Option<Vec<u64>>,
block: &SignedBlindedBeaconBlock<<T as BeaconChainTypes>::EthSpec>,
) -> Result<BlobSidecarList<T::EthSpec>, Rejection> {
let column_indices = chain.store.get_data_column_keys(root).map_err(|e| {
warp_utils::reject::custom_server_error(format!(
"Error fetching data columns keys: {e:?}"
))
})?;
let num_found_column_keys = column_indices.len();
let num_required_columns = chain.spec.number_of_columns / 2;
let is_blob_available = num_found_column_keys >= num_required_columns;
if is_blob_available {
let data_columns = column_indices
.into_iter()
.filter_map(
|column_index| match chain.get_data_column(&root, &column_index) {
Ok(Some(data_column)) => Some(Ok(data_column)),
Ok(None) => None,
Err(e) => Some(Err(warp_utils::reject::beacon_chain_error(e))),
},
)
.collect::<Result<Vec<_>, _>>()?;
reconstruct_blobs(&chain.kzg, &data_columns, blob_indices, block).map_err(|e| {
warp_utils::reject::custom_server_error(format!(
"Error reconstructing data columns: {e:?}"
))
})
} else {
Err(warp_utils::reject::custom_server_error(
format!("Insufficient data columns to reconstruct blobs: required {num_required_columns}, but only {num_found_column_keys} were found.")
))
}
} }
} }

View File

@@ -1,9 +1,9 @@
use crate::test_utils::TestRandom; use crate::test_utils::TestRandom;
use crate::ForkName;
use crate::{ use crate::{
beacon_block_body::BLOB_KZG_COMMITMENTS_INDEX, BeaconBlockHeader, BeaconStateError, Blob, beacon_block_body::BLOB_KZG_COMMITMENTS_INDEX, BeaconBlockHeader, BeaconStateError, Blob,
Epoch, EthSpec, FixedVector, Hash256, SignedBeaconBlockHeader, Slot, VariableList, Epoch, EthSpec, FixedVector, Hash256, SignedBeaconBlockHeader, Slot, VariableList,
}; };
use crate::{AbstractExecPayload, ForkName};
use crate::{ForkVersionDeserialize, KzgProofs, SignedBeaconBlock}; use crate::{ForkVersionDeserialize, KzgProofs, SignedBeaconBlock};
use bls::Signature; use bls::Signature;
use derivative::Derivative; use derivative::Derivative;
@@ -150,10 +150,10 @@ impl<E: EthSpec> BlobSidecar<E> {
}) })
} }
pub fn new_with_existing_proof( pub fn new_with_existing_proof<Payload: AbstractExecPayload<E>>(
index: usize, index: usize,
blob: Blob<E>, blob: Blob<E>,
signed_block: &SignedBeaconBlock<E>, signed_block: &SignedBeaconBlock<E, Payload>,
signed_block_header: SignedBeaconBlockHeader, signed_block_header: SignedBeaconBlockHeader,
kzg_commitments_inclusion_proof: &[Hash256], kzg_commitments_inclusion_proof: &[Hash256],
kzg_proof: KzgProof, kzg_proof: KzgProof,