mirror of
https://github.com/sigp/lighthouse.git
synced 2026-05-02 04:03:35 +00:00
Electra: Remaining Consensus Data Structures (#5712)
* Attestation superstruct changes for EIP 7549 (#5644)
* update
* experiment
* superstruct changes
* revert
* superstruct changes
* fix tests
* indexed attestation
* indexed attestation superstruct
* updated TODOs
* `superstruct` the `AttesterSlashing` (#5636)
* `superstruct` Attester Fork Variants
* Push a little further
* Deal with Encode / Decode of AttesterSlashing
* not so sure about this..
* Stop Encode/Decode Bounds from Propagating Out
* Tons of Changes..
* More Conversions to AttestationRef
* Add AsReference trait (#15)
* Add AsReference trait
* Fix some snafus
* Got it Compiling! :D
* Got Tests Building
* Get beacon chain tests compiling
---------
Co-authored-by: Michael Sproul <micsproul@gmail.com>
* Merge remote-tracking branch 'upstream/unstable' into electra_attestation_changes
* Make EF Tests Fork-Agnostic (#5713)
* Finish EF Test Fork Agnostic (#5714)
* Superstruct `AggregateAndProof` (#5715)
* Upgrade `superstruct` to `0.8.0`
* superstruct `AggregateAndProof`
* Merge remote-tracking branch 'sigp/unstable' into electra_attestation_changes
* cargo fmt
* Merge pull request #5726 from realbigsean/electra_attestation_changes
Merge unstable into Electra attestation changes
* EIP7549 `get_attestation_indices` (#5657)
* get attesting indices electra impl
* fmt
* get tests to pass
* fmt
* fix some beacon chain tests
* fmt
* fix slasher test
* fmt got me again
* fix more tests
* fix tests
* Some small changes (#5739)
* cargo fmt (#5740)
* Sketch op pool changes
* fix get attesting indices (#5742)
* fix get attesting indices
* better errors
* fix compile
* only get committee index once
* Ef test fixes (#5753)
* attestation related ef test fixes
* delete commented out stuff
* Fix Aggregation Pool for Electra (#5754)
* Fix Aggregation Pool for Electra
* Remove Outdated Interface
* fix ssz (#5755)
* Get `electra_op_pool` up to date (#5756)
* fix get attesting indices (#5742)
* fix get attesting indices
* better errors
* fix compile
* only get committee index once
* Ef test fixes (#5753)
* attestation related ef test fixes
* delete commented out stuff
* Fix Aggregation Pool for Electra (#5754)
* Fix Aggregation Pool for Electra
* Remove Outdated Interface
* fix ssz (#5755)
---------
Co-authored-by: realbigsean <sean@sigmaprime.io>
* Revert "Get `electra_op_pool` up to date (#5756)" (#5757)
This reverts commit ab9e58aa3d.
* Merge branch 'electra_attestation_changes' of https://github.com/sigp/lighthouse into electra_op_pool
* Compute on chain aggregate impl (#5752)
* add compute_on_chain_agg impl to op pool changes
* fmt
* get op pool tests to pass
* update the naive agg pool interface (#5760)
* Fix bugs in cross-committee aggregation
* Add comment to max cover optimisation
* Fix assert
* Merge pull request #5749 from sigp/electra_op_pool
Optimise Electra op pool aggregation
* update committee offset
* Fix Electra Fork Choice Tests (#5764)
* Subscribe to the correct subnets for electra attestations (#5782)
* subscribe to the correct att subnets for electra
* subscribe to the correct att subnets for electra
* cargo fmt
* fix slashing handling
* Merge remote-tracking branch 'upstream/unstable'
* Send unagg attestation based on fork
* Publish all aggregates
* just one more check bro plz..
* Merge pull request #5832 from ethDreamer/electra_attestation_changes_merge_unstable
Merge `unstable` into `electra_attestation_changes`
* Merge pull request #5835 from realbigsean/fix-validator-logic
Fix validator logic
* Merge pull request #5816 from realbigsean/electra-attestation-slashing-handling
Electra slashing handling
* Electra attestation changes rm decode impl (#5856)
* Remove Crappy Decode impl for Attestation
* Remove Inefficient Attestation Decode impl
* Implement Schema Upgrade / Downgrade
* Update beacon_node/beacon_chain/src/schema_change/migration_schema_v20.rs
Co-authored-by: Michael Sproul <micsproul@gmail.com>
---------
Co-authored-by: Michael Sproul <micsproul@gmail.com>
* Fix failing attestation tests and misc electra attestation cleanup (#5810)
* - get attestation related beacon chain tests to pass
- observed attestations are now keyed off of data + committee index
- rename op pool attestationref to compactattestationref
- remove unwraps in agg pool and use options instead
- cherry pick some changes from ef-tests-electra
* cargo fmt
* fix failing test
* Revert dockerfile changes
* make committee_index return option
* function args shouldnt be a ref to attestation ref
* fmt
* fix dup imports
---------
Co-authored-by: realbigsean <seananderson33@GMAIL.com>
* fix some todos (#5817)
* Merge branch 'unstable' of https://github.com/sigp/lighthouse into electra_attestation_changes
* add consolidations to merkle calc for inclusion proof
* Remove Duplicate KZG Commitment Merkle Proof Code (#5874)
* Remove Duplicate KZG Commitment Merkle Proof Code
* s/tree_lists/fields/
* Merge branch 'unstable' of https://github.com/sigp/lighthouse into electra_attestation_changes
* fix compile
* Fix slasher tests (#5906)
* Fix electra tests
* Add electra attestations to double vote tests
* Update superstruct to 0.8
* Merge remote-tracking branch 'origin/unstable' into electra_attestation_changes
* Small cleanup in slasher tests
* Clean up Electra observed aggregates (#5929)
* Use consistent key in observed_attestations
* Remove unwraps from observed aggregates
* Merge branch 'unstable' of https://github.com/sigp/lighthouse into electra_attestation_changes
* De-dup attestation constructor logic
* Remove unwraps in Attestation construction
* Dedup match_attestation_data
* Remove outdated TODO
* Use ForkName Ord in fork-choice tests
* Use ForkName Ord in BeaconBlockBody
* Make to_electra not fallible
* Remove TestRandom impl for IndexedAttestation
* Remove IndexedAttestation faulty Decode impl
* Drop TestRandom impl
* Add PendingAttestationInElectra
* Indexed att on disk (#35)
* indexed att on disk
* fix lints
* Update slasher/src/migrate.rs
Co-authored-by: ethDreamer <37123614+ethDreamer@users.noreply.github.com>
---------
Co-authored-by: Lion - dapplion <35266934+dapplion@users.noreply.github.com>
Co-authored-by: ethDreamer <37123614+ethDreamer@users.noreply.github.com>
* add electra fork enabled fn to ForkName impl (#36)
* add electra fork enabled fn to ForkName impl
* remove inadvertent file
* Update common/eth2/src/types.rs
Co-authored-by: ethDreamer <37123614+ethDreamer@users.noreply.github.com>
* Dedup attestation constructor logic in attester cache
* Use if let Ok for committee_bits
* Dedup Attestation constructor code
* Diff reduction in tests
* Fix beacon_chain tests
* Diff reduction
* Use Ord for ForkName in pubsub
* Resolve into_attestation_and_indices todo
* Remove stale TODO
* Fix beacon_chain tests
* Test spec invariant
* Use electra_enabled in pubsub
* Remove get_indexed_attestation_from_signed_aggregate
* Use ok_or instead of if let else
* committees are sorted
* remove dup method `get_indexed_attestation_from_committees`
* Merge pull request #5940 from dapplion/electra_attestation_changes_lionreview
Electra attestations #5712 review
* update default persisted op pool deserialization
* ensure aggregate and proof uses serde untagged on ref
* Fork aware ssz static attestation tests
* Electra attestation changes from Lions review (#5971)
* dedup/cleanup and remove unneeded hashset use
* remove irrelevant TODOs
* Merge branch 'unstable' of https://github.com/sigp/lighthouse into electra_attestation_changes
* Electra attestation changes sean review (#5972)
* instantiate empty bitlist in unreachable code
* clean up error conversion
* fork enabled bool cleanup
* remove a couple todos
* return bools instead of options in `aggregate` and use the result
* delete commented out code
* use map macros in simple transformations
* remove signers_disjoint_from
* get ef tests compiling
* get ef tests compiling
* update intentionally excluded files
* Avoid changing slasher schema for Electra
* Delete slasher schema v4
* Fix clippy
* Fix compilation of beacon_chain tests
* Update database.rs
* Add electra lightclient types
* Update slasher/src/database.rs
* fix imports
* Merge pull request #5980 from dapplion/electra-lightclient
Add electra lightclient types
* Merge pull request #5975 from michaelsproul/electra-slasher-no-migration
Avoid changing slasher schema for Electra
* Update beacon_node/beacon_chain/src/attestation_verification.rs
* Update beacon_node/beacon_chain/src/attestation_verification.rs
This commit is contained in:
@@ -247,13 +247,12 @@ where
|
||||
) -> Result<()> {
|
||||
self.sets
|
||||
.sets
|
||||
.reserve(block.message().body().attester_slashings().len() * 2);
|
||||
.reserve(block.message().body().attester_slashings_len() * 2);
|
||||
|
||||
block
|
||||
.message()
|
||||
.body()
|
||||
.attester_slashings()
|
||||
.iter()
|
||||
.try_for_each(|attester_slashing| {
|
||||
let (set_1, set_2) = attester_slashing_signature_sets(
|
||||
self.state,
|
||||
@@ -277,20 +276,19 @@ where
|
||||
) -> Result<()> {
|
||||
self.sets
|
||||
.sets
|
||||
.reserve(block.message().body().attestations().len());
|
||||
.reserve(block.message().body().attestations_len());
|
||||
|
||||
block
|
||||
.message()
|
||||
.body()
|
||||
.attestations()
|
||||
.iter()
|
||||
.try_for_each(|attestation| {
|
||||
let indexed_attestation = ctxt.get_indexed_attestation(self.state, attestation)?;
|
||||
|
||||
self.sets.push(indexed_attestation_signature_set(
|
||||
self.state,
|
||||
self.get_pubkey.clone(),
|
||||
&attestation.signature,
|
||||
attestation.signature(),
|
||||
indexed_attestation,
|
||||
self.spec,
|
||||
)?);
|
||||
|
||||
@@ -89,6 +89,7 @@ pub enum BlockProcessingError {
|
||||
found: Hash256,
|
||||
},
|
||||
WithdrawalCredentialsInvalid,
|
||||
PendingAttestationInElectra,
|
||||
}
|
||||
|
||||
impl From<BeaconStateError> for BlockProcessingError {
|
||||
|
||||
@@ -13,11 +13,11 @@ fn error(reason: Invalid) -> BlockOperationError<Invalid> {
|
||||
/// Verify an `IndexedAttestation`.
|
||||
pub fn is_valid_indexed_attestation<E: EthSpec>(
|
||||
state: &BeaconState<E>,
|
||||
indexed_attestation: &IndexedAttestation<E>,
|
||||
indexed_attestation: IndexedAttestationRef<E>,
|
||||
verify_signatures: VerifySignatures,
|
||||
spec: &ChainSpec,
|
||||
) -> Result<()> {
|
||||
let indices = &indexed_attestation.attesting_indices;
|
||||
let indices = indexed_attestation.attesting_indices_to_vec();
|
||||
|
||||
// Verify that indices aren't empty
|
||||
verify!(!indices.is_empty(), Invalid::IndicesEmpty);
|
||||
@@ -36,14 +36,14 @@ pub fn is_valid_indexed_attestation<E: EthSpec>(
|
||||
})?;
|
||||
Ok(())
|
||||
};
|
||||
check_sorted(indices)?;
|
||||
check_sorted(&indices)?;
|
||||
|
||||
if verify_signatures.is_true() {
|
||||
verify!(
|
||||
indexed_attestation_signature_set(
|
||||
state,
|
||||
|i| get_pubkey_from_state(state, i),
|
||||
&indexed_attestation.signature,
|
||||
indexed_attestation.signature(),
|
||||
indexed_attestation,
|
||||
spec
|
||||
)?
|
||||
|
||||
@@ -46,13 +46,16 @@ pub mod base {
|
||||
///
|
||||
/// Returns `Ok(())` if the validation and state updates completed successfully, otherwise returns
|
||||
/// an `Err` describing the invalid object or cause of failure.
|
||||
pub fn process_attestations<E: EthSpec>(
|
||||
pub fn process_attestations<'a, E: EthSpec, I>(
|
||||
state: &mut BeaconState<E>,
|
||||
attestations: &[Attestation<E>],
|
||||
attestations: I,
|
||||
verify_signatures: VerifySignatures,
|
||||
ctxt: &mut ConsensusContext<E>,
|
||||
spec: &ChainSpec,
|
||||
) -> Result<(), BlockProcessingError> {
|
||||
) -> Result<(), BlockProcessingError>
|
||||
where
|
||||
I: Iterator<Item = AttestationRef<'a, E>>,
|
||||
{
|
||||
// Ensure required caches are all built. These should be no-ops during regular operation.
|
||||
state.build_committee_cache(RelativeEpoch::Current, spec)?;
|
||||
state.build_committee_cache(RelativeEpoch::Previous, spec)?;
|
||||
@@ -63,7 +66,7 @@ pub mod base {
|
||||
let proposer_index = ctxt.get_proposer_index(state, spec)?;
|
||||
|
||||
// Verify and apply each attestation.
|
||||
for (i, attestation) in attestations.iter().enumerate() {
|
||||
for (i, attestation) in attestations.enumerate() {
|
||||
verify_attestation_for_block_inclusion(
|
||||
state,
|
||||
attestation,
|
||||
@@ -73,6 +76,12 @@ pub mod base {
|
||||
)
|
||||
.map_err(|e| e.into_with_index(i))?;
|
||||
|
||||
let AttestationRef::Base(attestation) = attestation else {
|
||||
// Pending attestations have been deprecated in a altair, this branch should
|
||||
// never happen
|
||||
return Err(BlockProcessingError::PendingAttestationInElectra);
|
||||
};
|
||||
|
||||
let pending_attestation = PendingAttestation {
|
||||
aggregation_bits: attestation.aggregation_bits.clone(),
|
||||
data: attestation.data.clone(),
|
||||
@@ -101,24 +110,24 @@ pub mod altair_deneb {
|
||||
use super::*;
|
||||
use crate::common::update_progressive_balances_cache::update_progressive_balances_on_attestation;
|
||||
|
||||
pub fn process_attestations<E: EthSpec>(
|
||||
pub fn process_attestations<'a, E: EthSpec, I>(
|
||||
state: &mut BeaconState<E>,
|
||||
attestations: &[Attestation<E>],
|
||||
attestations: I,
|
||||
verify_signatures: VerifySignatures,
|
||||
ctxt: &mut ConsensusContext<E>,
|
||||
spec: &ChainSpec,
|
||||
) -> Result<(), BlockProcessingError> {
|
||||
attestations
|
||||
.iter()
|
||||
.enumerate()
|
||||
.try_for_each(|(i, attestation)| {
|
||||
process_attestation(state, attestation, i, ctxt, verify_signatures, spec)
|
||||
})
|
||||
) -> Result<(), BlockProcessingError>
|
||||
where
|
||||
I: Iterator<Item = AttestationRef<'a, E>>,
|
||||
{
|
||||
attestations.enumerate().try_for_each(|(i, attestation)| {
|
||||
process_attestation(state, attestation, i, ctxt, verify_signatures, spec)
|
||||
})
|
||||
}
|
||||
|
||||
pub fn process_attestation<E: EthSpec>(
|
||||
state: &mut BeaconState<E>,
|
||||
attestation: &Attestation<E>,
|
||||
attestation: AttestationRef<E>,
|
||||
att_index: usize,
|
||||
ctxt: &mut ConsensusContext<E>,
|
||||
verify_signatures: VerifySignatures,
|
||||
@@ -128,26 +137,24 @@ pub mod altair_deneb {
|
||||
let previous_epoch = ctxt.previous_epoch;
|
||||
let current_epoch = ctxt.current_epoch;
|
||||
|
||||
let attesting_indices = verify_attestation_for_block_inclusion(
|
||||
let indexed_att = verify_attestation_for_block_inclusion(
|
||||
state,
|
||||
attestation,
|
||||
ctxt,
|
||||
verify_signatures,
|
||||
spec,
|
||||
)
|
||||
.map_err(|e| e.into_with_index(att_index))?
|
||||
.attesting_indices
|
||||
.clone();
|
||||
.map_err(|e| e.into_with_index(att_index))?;
|
||||
|
||||
// Matching roots, participation flag indices
|
||||
let data = &attestation.data;
|
||||
let data = attestation.data();
|
||||
let inclusion_delay = state.slot().safe_sub(data.slot)?.as_u64();
|
||||
let participation_flag_indices =
|
||||
get_attestation_participation_flag_indices(state, data, inclusion_delay, spec)?;
|
||||
|
||||
// Update epoch participation flags.
|
||||
let mut proposer_reward_numerator = 0;
|
||||
for index in &attesting_indices {
|
||||
for index in indexed_att.attesting_indices_iter() {
|
||||
let index = *index as usize;
|
||||
|
||||
let validator_effective_balance = state.epoch_cache().get_effective_balance(index)?;
|
||||
@@ -231,16 +238,19 @@ pub fn process_proposer_slashings<E: EthSpec>(
|
||||
///
|
||||
/// Returns `Ok(())` if the validation and state updates completed successfully, otherwise returns
|
||||
/// an `Err` describing the invalid object or cause of failure.
|
||||
pub fn process_attester_slashings<E: EthSpec>(
|
||||
pub fn process_attester_slashings<'a, E: EthSpec, I>(
|
||||
state: &mut BeaconState<E>,
|
||||
attester_slashings: &[AttesterSlashing<E>],
|
||||
attester_slashings: I,
|
||||
verify_signatures: VerifySignatures,
|
||||
ctxt: &mut ConsensusContext<E>,
|
||||
spec: &ChainSpec,
|
||||
) -> Result<(), BlockProcessingError> {
|
||||
) -> Result<(), BlockProcessingError>
|
||||
where
|
||||
I: Iterator<Item = AttesterSlashingRef<'a, E>>,
|
||||
{
|
||||
state.build_slashings_cache()?;
|
||||
|
||||
for (i, attester_slashing) in attester_slashings.iter().enumerate() {
|
||||
for (i, attester_slashing) in attester_slashings.enumerate() {
|
||||
let slashable_indices =
|
||||
verify_attester_slashing(state, attester_slashing, verify_signatures, spec)
|
||||
.map_err(|e| e.into_with_index(i))?;
|
||||
|
||||
@@ -7,10 +7,10 @@ use ssz::DecodeError;
|
||||
use std::borrow::Cow;
|
||||
use tree_hash::TreeHash;
|
||||
use types::{
|
||||
AbstractExecPayload, AggregateSignature, AttesterSlashing, BeaconBlockRef, BeaconState,
|
||||
AbstractExecPayload, AggregateSignature, AttesterSlashingRef, BeaconBlockRef, BeaconState,
|
||||
BeaconStateError, ChainSpec, DepositData, Domain, Epoch, EthSpec, Fork, Hash256,
|
||||
InconsistentFork, IndexedAttestation, ProposerSlashing, PublicKey, PublicKeyBytes, Signature,
|
||||
SignedAggregateAndProof, SignedBeaconBlock, SignedBeaconBlockHeader,
|
||||
InconsistentFork, IndexedAttestation, IndexedAttestationRef, ProposerSlashing, PublicKey,
|
||||
PublicKeyBytes, Signature, SignedAggregateAndProof, SignedBeaconBlock, SignedBeaconBlockHeader,
|
||||
SignedBlsToExecutionChange, SignedContributionAndProof, SignedRoot, SignedVoluntaryExit,
|
||||
SigningData, Slot, SyncAggregate, SyncAggregatorSelectionData, Unsigned,
|
||||
};
|
||||
@@ -272,28 +272,28 @@ pub fn indexed_attestation_signature_set<'a, 'b, E, F>(
|
||||
state: &'a BeaconState<E>,
|
||||
get_pubkey: F,
|
||||
signature: &'a AggregateSignature,
|
||||
indexed_attestation: &'b IndexedAttestation<E>,
|
||||
indexed_attestation: IndexedAttestationRef<'b, E>,
|
||||
spec: &'a ChainSpec,
|
||||
) -> Result<SignatureSet<'a>>
|
||||
where
|
||||
E: EthSpec,
|
||||
F: Fn(usize) -> Option<Cow<'a, PublicKey>>,
|
||||
{
|
||||
let mut pubkeys = Vec::with_capacity(indexed_attestation.attesting_indices.len());
|
||||
for &validator_idx in &indexed_attestation.attesting_indices {
|
||||
let mut pubkeys = Vec::with_capacity(indexed_attestation.attesting_indices_len());
|
||||
for &validator_idx in indexed_attestation.attesting_indices_iter() {
|
||||
pubkeys.push(
|
||||
get_pubkey(validator_idx as usize).ok_or(Error::ValidatorUnknown(validator_idx))?,
|
||||
);
|
||||
}
|
||||
|
||||
let domain = spec.get_domain(
|
||||
indexed_attestation.data.target.epoch,
|
||||
indexed_attestation.data().target.epoch,
|
||||
Domain::BeaconAttester,
|
||||
&state.fork(),
|
||||
state.genesis_validators_root(),
|
||||
);
|
||||
|
||||
let message = indexed_attestation.data.signing_root(domain);
|
||||
let message = indexed_attestation.data().signing_root(domain);
|
||||
|
||||
Ok(SignatureSet::multiple_pubkeys(signature, pubkeys, message))
|
||||
}
|
||||
@@ -312,21 +312,21 @@ where
|
||||
E: EthSpec,
|
||||
F: Fn(usize) -> Option<Cow<'a, PublicKey>>,
|
||||
{
|
||||
let mut pubkeys = Vec::with_capacity(indexed_attestation.attesting_indices.len());
|
||||
for &validator_idx in &indexed_attestation.attesting_indices {
|
||||
let mut pubkeys = Vec::with_capacity(indexed_attestation.attesting_indices_len());
|
||||
for &validator_idx in indexed_attestation.attesting_indices_iter() {
|
||||
pubkeys.push(
|
||||
get_pubkey(validator_idx as usize).ok_or(Error::ValidatorUnknown(validator_idx))?,
|
||||
);
|
||||
}
|
||||
|
||||
let domain = spec.get_domain(
|
||||
indexed_attestation.data.target.epoch,
|
||||
indexed_attestation.data().target.epoch,
|
||||
Domain::BeaconAttester,
|
||||
fork,
|
||||
genesis_validators_root,
|
||||
);
|
||||
|
||||
let message = indexed_attestation.data.signing_root(domain);
|
||||
let message = indexed_attestation.data().signing_root(domain);
|
||||
|
||||
Ok(SignatureSet::multiple_pubkeys(signature, pubkeys, message))
|
||||
}
|
||||
@@ -335,7 +335,7 @@ where
|
||||
pub fn attester_slashing_signature_sets<'a, E, F>(
|
||||
state: &'a BeaconState<E>,
|
||||
get_pubkey: F,
|
||||
attester_slashing: &'a AttesterSlashing<E>,
|
||||
attester_slashing: AttesterSlashingRef<'a, E>,
|
||||
spec: &'a ChainSpec,
|
||||
) -> Result<(SignatureSet<'a>, SignatureSet<'a>)>
|
||||
where
|
||||
@@ -346,15 +346,15 @@ where
|
||||
indexed_attestation_signature_set(
|
||||
state,
|
||||
get_pubkey.clone(),
|
||||
&attester_slashing.attestation_1.signature,
|
||||
&attester_slashing.attestation_1,
|
||||
attester_slashing.attestation_1().signature(),
|
||||
attester_slashing.attestation_1(),
|
||||
spec,
|
||||
)?,
|
||||
indexed_attestation_signature_set(
|
||||
state,
|
||||
get_pubkey,
|
||||
&attester_slashing.attestation_2.signature,
|
||||
&attester_slashing.attestation_2,
|
||||
attester_slashing.attestation_2().signature(),
|
||||
attester_slashing.attestation_2(),
|
||||
spec,
|
||||
)?,
|
||||
))
|
||||
@@ -425,7 +425,7 @@ where
|
||||
E: EthSpec,
|
||||
F: Fn(usize) -> Option<Cow<'a, PublicKey>>,
|
||||
{
|
||||
let slot = signed_aggregate_and_proof.message.aggregate.data.slot;
|
||||
let slot = signed_aggregate_and_proof.message().aggregate().data().slot;
|
||||
|
||||
let domain = spec.get_domain(
|
||||
slot.epoch(E::slots_per_epoch()),
|
||||
@@ -434,9 +434,8 @@ where
|
||||
genesis_validators_root,
|
||||
);
|
||||
let message = slot.signing_root(domain);
|
||||
let signature = &signed_aggregate_and_proof.message.selection_proof;
|
||||
let validator_index = signed_aggregate_and_proof.message.aggregator_index;
|
||||
|
||||
let signature = signed_aggregate_and_proof.message().selection_proof();
|
||||
let validator_index = signed_aggregate_and_proof.message().aggregator_index();
|
||||
Ok(SignatureSet::single_pubkey(
|
||||
signature,
|
||||
get_pubkey(validator_index as usize).ok_or(Error::ValidatorUnknown(validator_index))?,
|
||||
@@ -456,9 +455,9 @@ where
|
||||
F: Fn(usize) -> Option<Cow<'a, PublicKey>>,
|
||||
{
|
||||
let target_epoch = signed_aggregate_and_proof
|
||||
.message
|
||||
.aggregate
|
||||
.data
|
||||
.message()
|
||||
.aggregate()
|
||||
.data()
|
||||
.target
|
||||
.epoch;
|
||||
|
||||
@@ -468,9 +467,9 @@ where
|
||||
fork,
|
||||
genesis_validators_root,
|
||||
);
|
||||
let message = signed_aggregate_and_proof.message.signing_root(domain);
|
||||
let signature = &signed_aggregate_and_proof.signature;
|
||||
let validator_index = signed_aggregate_and_proof.message.aggregator_index;
|
||||
let message = signed_aggregate_and_proof.message().signing_root(domain);
|
||||
let signature = signed_aggregate_and_proof.signature();
|
||||
let validator_index = signed_aggregate_and_proof.message().aggregator_index();
|
||||
|
||||
Ok(SignatureSet::single_pubkey(
|
||||
signature,
|
||||
|
||||
@@ -388,8 +388,13 @@ async fn invalid_attestation_no_committee_for_index() {
|
||||
.clone()
|
||||
.deconstruct()
|
||||
.0;
|
||||
head_block.to_mut().body_mut().attestations_mut()[0]
|
||||
.data
|
||||
head_block
|
||||
.to_mut()
|
||||
.body_mut()
|
||||
.attestations_mut()
|
||||
.next()
|
||||
.unwrap()
|
||||
.data_mut()
|
||||
.index += 1;
|
||||
let mut ctxt = ConsensusContext::new(state.slot());
|
||||
let result = process_operations::process_attestations(
|
||||
@@ -423,11 +428,22 @@ async fn invalid_attestation_wrong_justified_checkpoint() {
|
||||
.clone()
|
||||
.deconstruct()
|
||||
.0;
|
||||
let old_justified_checkpoint = head_block.body().attestations()[0].data.source;
|
||||
let old_justified_checkpoint = head_block
|
||||
.body()
|
||||
.attestations()
|
||||
.next()
|
||||
.unwrap()
|
||||
.data()
|
||||
.source;
|
||||
let mut new_justified_checkpoint = old_justified_checkpoint;
|
||||
new_justified_checkpoint.epoch += Epoch::new(1);
|
||||
head_block.to_mut().body_mut().attestations_mut()[0]
|
||||
.data
|
||||
head_block
|
||||
.to_mut()
|
||||
.body_mut()
|
||||
.attestations_mut()
|
||||
.next()
|
||||
.unwrap()
|
||||
.data_mut()
|
||||
.source = new_justified_checkpoint;
|
||||
|
||||
let mut ctxt = ConsensusContext::new(state.slot());
|
||||
@@ -467,8 +483,14 @@ async fn invalid_attestation_bad_aggregation_bitfield_len() {
|
||||
.clone()
|
||||
.deconstruct()
|
||||
.0;
|
||||
head_block.to_mut().body_mut().attestations_mut()[0].aggregation_bits =
|
||||
Bitfield::with_capacity(spec.target_committee_size).unwrap();
|
||||
*head_block
|
||||
.to_mut()
|
||||
.body_mut()
|
||||
.attestations_mut()
|
||||
.next()
|
||||
.unwrap()
|
||||
.aggregation_bits_base_mut()
|
||||
.unwrap() = Bitfield::with_capacity(spec.target_committee_size).unwrap();
|
||||
|
||||
let mut ctxt = ConsensusContext::new(state.slot());
|
||||
let result = process_operations::process_attestations(
|
||||
@@ -501,7 +523,13 @@ async fn invalid_attestation_bad_signature() {
|
||||
.clone()
|
||||
.deconstruct()
|
||||
.0;
|
||||
head_block.to_mut().body_mut().attestations_mut()[0].signature = AggregateSignature::empty();
|
||||
*head_block
|
||||
.to_mut()
|
||||
.body_mut()
|
||||
.attestations_mut()
|
||||
.next()
|
||||
.unwrap()
|
||||
.signature_mut() = AggregateSignature::empty();
|
||||
|
||||
let mut ctxt = ConsensusContext::new(state.slot());
|
||||
let result = process_operations::process_attestations(
|
||||
@@ -536,10 +564,15 @@ async fn invalid_attestation_included_too_early() {
|
||||
.clone()
|
||||
.deconstruct()
|
||||
.0;
|
||||
let new_attesation_slot = head_block.body().attestations()[0].data.slot
|
||||
let new_attesation_slot = head_block.body().attestations().next().unwrap().data().slot
|
||||
+ Slot::new(MainnetEthSpec::slots_per_epoch());
|
||||
head_block.to_mut().body_mut().attestations_mut()[0]
|
||||
.data
|
||||
head_block
|
||||
.to_mut()
|
||||
.body_mut()
|
||||
.attestations_mut()
|
||||
.next()
|
||||
.unwrap()
|
||||
.data_mut()
|
||||
.slot = new_attesation_slot;
|
||||
|
||||
let mut ctxt = ConsensusContext::new(state.slot());
|
||||
@@ -579,10 +612,15 @@ async fn invalid_attestation_included_too_late() {
|
||||
.clone()
|
||||
.deconstruct()
|
||||
.0;
|
||||
let new_attesation_slot = head_block.body().attestations()[0].data.slot
|
||||
let new_attesation_slot = head_block.body().attestations().next().unwrap().data().slot
|
||||
- Slot::new(MainnetEthSpec::slots_per_epoch());
|
||||
head_block.to_mut().body_mut().attestations_mut()[0]
|
||||
.data
|
||||
head_block
|
||||
.to_mut()
|
||||
.body_mut()
|
||||
.attestations_mut()
|
||||
.next()
|
||||
.unwrap()
|
||||
.data_mut()
|
||||
.slot = new_attesation_slot;
|
||||
|
||||
let mut ctxt = ConsensusContext::new(state.slot());
|
||||
@@ -619,8 +657,13 @@ async fn invalid_attestation_target_epoch_slot_mismatch() {
|
||||
.clone()
|
||||
.deconstruct()
|
||||
.0;
|
||||
head_block.to_mut().body_mut().attestations_mut()[0]
|
||||
.data
|
||||
head_block
|
||||
.to_mut()
|
||||
.body_mut()
|
||||
.attestations_mut()
|
||||
.next()
|
||||
.unwrap()
|
||||
.data_mut()
|
||||
.target
|
||||
.epoch += Epoch::new(1);
|
||||
|
||||
@@ -655,7 +698,7 @@ async fn valid_insert_attester_slashing() {
|
||||
let mut ctxt = ConsensusContext::new(state.slot());
|
||||
let result = process_operations::process_attester_slashings(
|
||||
&mut state,
|
||||
&[attester_slashing],
|
||||
[attester_slashing.to_ref()].into_iter(),
|
||||
VerifySignatures::True,
|
||||
&mut ctxt,
|
||||
&spec,
|
||||
@@ -671,13 +714,20 @@ async fn invalid_attester_slashing_not_slashable() {
|
||||
let harness = get_harness::<MainnetEthSpec>(EPOCH_OFFSET, VALIDATOR_COUNT).await;
|
||||
|
||||
let mut attester_slashing = harness.make_attester_slashing(vec![1, 2]);
|
||||
attester_slashing.attestation_1 = attester_slashing.attestation_2.clone();
|
||||
match &mut attester_slashing {
|
||||
AttesterSlashing::Base(ref mut attester_slashing) => {
|
||||
attester_slashing.attestation_1 = attester_slashing.attestation_2.clone();
|
||||
}
|
||||
AttesterSlashing::Electra(ref mut attester_slashing) => {
|
||||
attester_slashing.attestation_1 = attester_slashing.attestation_2.clone();
|
||||
}
|
||||
}
|
||||
|
||||
let mut state = harness.get_current_state();
|
||||
let mut ctxt = ConsensusContext::new(state.slot());
|
||||
let result = process_operations::process_attester_slashings(
|
||||
&mut state,
|
||||
&[attester_slashing],
|
||||
[attester_slashing.to_ref()].into_iter(),
|
||||
VerifySignatures::True,
|
||||
&mut ctxt,
|
||||
&spec,
|
||||
@@ -699,13 +749,20 @@ async fn invalid_attester_slashing_1_invalid() {
|
||||
let harness = get_harness::<MainnetEthSpec>(EPOCH_OFFSET, VALIDATOR_COUNT).await;
|
||||
|
||||
let mut attester_slashing = harness.make_attester_slashing(vec![1, 2]);
|
||||
attester_slashing.attestation_1.attesting_indices = VariableList::from(vec![2, 1]);
|
||||
match &mut attester_slashing {
|
||||
AttesterSlashing::Base(ref mut attester_slashing) => {
|
||||
attester_slashing.attestation_1.attesting_indices = VariableList::from(vec![2, 1]);
|
||||
}
|
||||
AttesterSlashing::Electra(ref mut attester_slashing) => {
|
||||
attester_slashing.attestation_1.attesting_indices = VariableList::from(vec![2, 1]);
|
||||
}
|
||||
}
|
||||
|
||||
let mut state = harness.get_current_state();
|
||||
let mut ctxt = ConsensusContext::new(state.slot());
|
||||
let result = process_operations::process_attester_slashings(
|
||||
&mut state,
|
||||
&[attester_slashing],
|
||||
[attester_slashing.to_ref()].into_iter(),
|
||||
VerifySignatures::True,
|
||||
&mut ctxt,
|
||||
&spec,
|
||||
@@ -730,13 +787,20 @@ async fn invalid_attester_slashing_2_invalid() {
|
||||
let harness = get_harness::<MainnetEthSpec>(EPOCH_OFFSET, VALIDATOR_COUNT).await;
|
||||
|
||||
let mut attester_slashing = harness.make_attester_slashing(vec![1, 2]);
|
||||
attester_slashing.attestation_2.attesting_indices = VariableList::from(vec![2, 1]);
|
||||
match &mut attester_slashing {
|
||||
AttesterSlashing::Base(ref mut attester_slashing) => {
|
||||
attester_slashing.attestation_2.attesting_indices = VariableList::from(vec![2, 1]);
|
||||
}
|
||||
AttesterSlashing::Electra(ref mut attester_slashing) => {
|
||||
attester_slashing.attestation_2.attesting_indices = VariableList::from(vec![2, 1]);
|
||||
}
|
||||
}
|
||||
|
||||
let mut state = harness.get_current_state();
|
||||
let mut ctxt = ConsensusContext::new(state.slot());
|
||||
let result = process_operations::process_attester_slashings(
|
||||
&mut state,
|
||||
&[attester_slashing],
|
||||
[attester_slashing.to_ref()].into_iter(),
|
||||
VerifySignatures::True,
|
||||
&mut ctxt,
|
||||
&spec,
|
||||
|
||||
@@ -17,12 +17,12 @@ fn error(reason: Invalid) -> BlockOperationError<Invalid> {
|
||||
/// Optionally verifies the aggregate signature, depending on `verify_signatures`.
|
||||
pub fn verify_attestation_for_block_inclusion<'ctxt, E: EthSpec>(
|
||||
state: &BeaconState<E>,
|
||||
attestation: &Attestation<E>,
|
||||
attestation: AttestationRef<'ctxt, E>,
|
||||
ctxt: &'ctxt mut ConsensusContext<E>,
|
||||
verify_signatures: VerifySignatures,
|
||||
spec: &ChainSpec,
|
||||
) -> Result<&'ctxt IndexedAttestation<E>> {
|
||||
let data = &attestation.data;
|
||||
) -> Result<IndexedAttestationRef<'ctxt, E>> {
|
||||
let data = attestation.data();
|
||||
|
||||
verify!(
|
||||
data.slot.safe_add(spec.min_attestation_inclusion_delay)? <= state.slot(),
|
||||
@@ -61,12 +61,12 @@ pub fn verify_attestation_for_block_inclusion<'ctxt, E: EthSpec>(
|
||||
/// Spec v0.12.1
|
||||
pub fn verify_attestation_for_state<'ctxt, E: EthSpec>(
|
||||
state: &BeaconState<E>,
|
||||
attestation: &Attestation<E>,
|
||||
attestation: AttestationRef<'ctxt, E>,
|
||||
ctxt: &'ctxt mut ConsensusContext<E>,
|
||||
verify_signatures: VerifySignatures,
|
||||
spec: &ChainSpec,
|
||||
) -> Result<&'ctxt IndexedAttestation<E>> {
|
||||
let data = &attestation.data;
|
||||
) -> Result<IndexedAttestationRef<'ctxt, E>> {
|
||||
let data = attestation.data();
|
||||
|
||||
verify!(
|
||||
data.index < state.get_committee_count_at_slot(data.slot)?,
|
||||
@@ -87,10 +87,10 @@ pub fn verify_attestation_for_state<'ctxt, E: EthSpec>(
|
||||
///
|
||||
/// Spec v0.12.1
|
||||
fn verify_casper_ffg_vote<E: EthSpec>(
|
||||
attestation: &Attestation<E>,
|
||||
attestation: AttestationRef<E>,
|
||||
state: &BeaconState<E>,
|
||||
) -> Result<()> {
|
||||
let data = &attestation.data;
|
||||
let data = attestation.data();
|
||||
verify!(
|
||||
data.target.epoch == data.slot.epoch(E::slots_per_epoch()),
|
||||
Invalid::TargetEpochSlotMismatch {
|
||||
|
||||
@@ -18,12 +18,12 @@ fn error(reason: Invalid) -> BlockOperationError<Invalid> {
|
||||
/// invalidity.
|
||||
pub fn verify_attester_slashing<E: EthSpec>(
|
||||
state: &BeaconState<E>,
|
||||
attester_slashing: &AttesterSlashing<E>,
|
||||
attester_slashing: AttesterSlashingRef<'_, E>,
|
||||
verify_signatures: VerifySignatures,
|
||||
spec: &ChainSpec,
|
||||
) -> Result<Vec<u64>> {
|
||||
let attestation_1 = &attester_slashing.attestation_1;
|
||||
let attestation_2 = &attester_slashing.attestation_2;
|
||||
let attestation_1 = attester_slashing.attestation_1();
|
||||
let attestation_2 = attester_slashing.attestation_2();
|
||||
|
||||
// Spec: is_slashable_attestation_data
|
||||
verify!(
|
||||
@@ -45,7 +45,7 @@ pub fn verify_attester_slashing<E: EthSpec>(
|
||||
/// Returns Ok(indices) if `indices.len() > 0`
|
||||
pub fn get_slashable_indices<E: EthSpec>(
|
||||
state: &BeaconState<E>,
|
||||
attester_slashing: &AttesterSlashing<E>,
|
||||
attester_slashing: AttesterSlashingRef<'_, E>,
|
||||
) -> Result<Vec<u64>> {
|
||||
get_slashable_indices_modular(state, attester_slashing, |_, validator| {
|
||||
validator.is_slashable_at(state.current_epoch())
|
||||
@@ -56,23 +56,22 @@ pub fn get_slashable_indices<E: EthSpec>(
|
||||
/// for determining whether a given validator should be considered slashable.
|
||||
pub fn get_slashable_indices_modular<F, E: EthSpec>(
|
||||
state: &BeaconState<E>,
|
||||
attester_slashing: &AttesterSlashing<E>,
|
||||
attester_slashing: AttesterSlashingRef<'_, E>,
|
||||
is_slashable: F,
|
||||
) -> Result<Vec<u64>>
|
||||
where
|
||||
F: Fn(u64, &Validator) -> bool,
|
||||
{
|
||||
let attestation_1 = &attester_slashing.attestation_1;
|
||||
let attestation_2 = &attester_slashing.attestation_2;
|
||||
let attestation_1 = attester_slashing.attestation_1();
|
||||
let attestation_2 = attester_slashing.attestation_2();
|
||||
|
||||
let attesting_indices_1 = attestation_1
|
||||
.attesting_indices
|
||||
.iter()
|
||||
.attesting_indices_iter()
|
||||
.cloned()
|
||||
.collect::<BTreeSet<_>>();
|
||||
|
||||
let attesting_indices_2 = attestation_2
|
||||
.attesting_indices
|
||||
.iter()
|
||||
.attesting_indices_iter()
|
||||
.cloned()
|
||||
.collect::<BTreeSet<_>>();
|
||||
|
||||
|
||||
Reference in New Issue
Block a user