mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-02 16:21:42 +00:00
Electra alpha8 spec updates (#6496)
* Fix partial withdrawals count * Remove get_active_balance * Remove queue_entire_balance_and_reset_validator * Switch to compounding when consolidating with source==target * Queue deposit requests and apply them during epoch processing * Fix ef tests * Clear todos * Fix engine api formatting issues * Merge branch 'unstable' into electra-alpha7 * Make add_validator_to_registry more in line with the spec * Address some review comments * Cleanup * Update initialize_beacon_state_from_eth1 * Merge branch 'unstable' into electra-alpha7 * Fix rpc decoding for blobs by range/root * Fix block hash computation * Fix process_deposits bug * Merge branch 'unstable' into electra-alpha7 * Fix topup deposit processing bug * Update builder api for electra * Refactor mock builder to separate functionality * Merge branch 'unstable' into electra-alpha7 * Address review comments * Use copied for reference rather than cloned * Optimise and simplify PendingDepositsContext::new * Merge remote-tracking branch 'origin/unstable' into electra-alpha7 * Fix processing of deposits with invalid signatures * Remove redundant code in genesis init * Revert "Refactor mock builder to separate functionality" This reverts commit6d10456912. * Revert "Update builder api for electra" This reverts commitc5c9aca6db. * Simplify pre-activation sorting * Fix stale validators used in upgrade_to_electra * Merge branch 'unstable' into electra-alpha7
This commit is contained in:
@@ -7,7 +7,7 @@ use keccak_hash::KECCAK_EMPTY_LIST_RLP;
|
||||
use triehash::ordered_trie_root;
|
||||
use types::{
|
||||
EncodableExecutionBlockHeader, EthSpec, ExecutionBlockHash, ExecutionBlockHeader,
|
||||
ExecutionPayloadRef, Hash256,
|
||||
ExecutionPayloadRef, ExecutionRequests, Hash256,
|
||||
};
|
||||
|
||||
/// Calculate the block hash of an execution block.
|
||||
@@ -17,6 +17,7 @@ use types::{
|
||||
pub fn calculate_execution_block_hash<E: EthSpec>(
|
||||
payload: ExecutionPayloadRef<E>,
|
||||
parent_beacon_block_root: Option<Hash256>,
|
||||
execution_requests: Option<&ExecutionRequests<E>>,
|
||||
) -> (ExecutionBlockHash, Hash256) {
|
||||
// Calculate the transactions root.
|
||||
// We're currently using a deprecated Parity library for this. We should move to a
|
||||
@@ -38,6 +39,7 @@ pub fn calculate_execution_block_hash<E: EthSpec>(
|
||||
|
||||
let rlp_blob_gas_used = payload.blob_gas_used().ok();
|
||||
let rlp_excess_blob_gas = payload.excess_blob_gas().ok();
|
||||
let requests_root = execution_requests.map(|requests| requests.requests_hash());
|
||||
|
||||
// Construct the block header.
|
||||
let exec_block_header = ExecutionBlockHeader::from_payload(
|
||||
@@ -48,6 +50,7 @@ pub fn calculate_execution_block_hash<E: EthSpec>(
|
||||
rlp_blob_gas_used,
|
||||
rlp_excess_blob_gas,
|
||||
parent_beacon_block_root,
|
||||
requests_root,
|
||||
);
|
||||
|
||||
// Hash the RLP encoding of the block header.
|
||||
@@ -118,6 +121,7 @@ mod test {
|
||||
blob_gas_used: None,
|
||||
excess_blob_gas: None,
|
||||
parent_beacon_block_root: None,
|
||||
requests_root: None,
|
||||
};
|
||||
let expected_rlp = "f90200a0e0a94a7a3c9617401586b1a27025d2d9671332d22d540e0af72b069170380f2aa01dcc4de8dec75d7aab85b567b6ccd41ad312451b948a7413f0a142fd40d4934794ba5e000000000000000000000000000000000000a0ec3c94b18b8a1cff7d60f8d258ec723312932928626b4c9355eb4ab3568ec7f7a050f738580ed699f0469702c7ccc63ed2e51bc034be9479b7bff4e68dee84accfa029b0562f7140574dd0d50dee8a271b22e1a0a7b78fca58f7c60370d8317ba2a9b9010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000830200000188016345785d8a00008301553482079e42a0000000000000000000000000000000000000000000000000000000000000000088000000000000000082036b";
|
||||
let expected_hash =
|
||||
@@ -149,6 +153,7 @@ mod test {
|
||||
blob_gas_used: None,
|
||||
excess_blob_gas: None,
|
||||
parent_beacon_block_root: None,
|
||||
requests_root: None,
|
||||
};
|
||||
let expected_rlp = "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";
|
||||
let expected_hash =
|
||||
@@ -181,6 +186,7 @@ mod test {
|
||||
blob_gas_used: None,
|
||||
excess_blob_gas: None,
|
||||
parent_beacon_block_root: None,
|
||||
requests_root: None,
|
||||
};
|
||||
let expected_hash =
|
||||
Hash256::from_str("6da69709cd5a34079b6604d29cd78fc01dacd7c6268980057ad92a2bede87351")
|
||||
@@ -211,6 +217,7 @@ mod test {
|
||||
blob_gas_used: Some(0x0u64),
|
||||
excess_blob_gas: Some(0x0u64),
|
||||
parent_beacon_block_root: Some(Hash256::from_str("f7d327d2c04e4f12e9cdd492e53d39a1d390f8b1571e3b2a22ac6e1e170e5b1a").unwrap()),
|
||||
requests_root: None,
|
||||
};
|
||||
let expected_hash =
|
||||
Hash256::from_str("a7448e600ead0a23d16f96aa46e8dea9eef8a7c5669a5f0a5ff32709afe9c408")
|
||||
@@ -221,29 +228,30 @@ mod test {
|
||||
#[test]
|
||||
fn test_rlp_encode_block_electra() {
|
||||
let header = ExecutionBlockHeader {
|
||||
parent_hash: Hash256::from_str("172864416698b842f4c92f7b476be294b4ef720202779df194cd225f531053ab").unwrap(),
|
||||
parent_hash: Hash256::from_str("a628f146df398a339768bd101f7dc41d828be79aca5dd02cc878a51bdbadd761").unwrap(),
|
||||
ommers_hash: Hash256::from_str("1dcc4de8dec75d7aab85b567b6ccd41ad312451b948a7413f0a142fd40d49347").unwrap(),
|
||||
beneficiary: Address::from_str("878705ba3f8bc32fcf7f4caa1a35e72af65cf766").unwrap(),
|
||||
state_root: Hash256::from_str("c6457d0df85c84c62d1c68f68138b6e796e8a44fb44de221386fb2d5611c41e0").unwrap(),
|
||||
transactions_root: Hash256::from_str("56e81f171bcc55a6ff8345e692c0f86e5b48e01b996cadc001622fb5e363b421").unwrap(),
|
||||
receipts_root: Hash256::from_str("56e81f171bcc55a6ff8345e692c0f86e5b48e01b996cadc001622fb5e363b421").unwrap(),
|
||||
logs_bloom:<[u8; 256]>::from_hex("00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000").unwrap().into(),
|
||||
beneficiary: Address::from_str("f97e180c050e5ab072211ad2c213eb5aee4df134").unwrap(),
|
||||
state_root: Hash256::from_str("fdff009f8280bd113ebb4df8ce4e2dcc9322d43184a0b506e70b7f4823ca1253").unwrap(),
|
||||
transactions_root: Hash256::from_str("452806578b4fa881cafb019c47e767e37e2249accf859159f00cddefb2579bb5").unwrap(),
|
||||
receipts_root: Hash256::from_str("72ceac0f16a32041c881b3220d39ca506a286bef163c01a4d0821cd4027d31c7").unwrap(),
|
||||
logs_bloom:<[u8; 256]>::from_hex("10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000").unwrap().into(),
|
||||
difficulty: Uint256::ZERO,
|
||||
number: Uint256::from(97),
|
||||
gas_limit: Uint256::from(27482534),
|
||||
gas_used: Uint256::ZERO,
|
||||
timestamp: 1692132829u64,
|
||||
extra_data: hex::decode("d883010d00846765746888676f312e32302e37856c696e7578").unwrap(),
|
||||
mix_hash: Hash256::from_str("0b493c22d2ad4ca76c77ae6ad916af429b42b1dc98fdcb8e5ddbd049bbc5d623").unwrap(),
|
||||
number: Uint256::from(8230),
|
||||
gas_limit: Uint256::from(30000000),
|
||||
gas_used: Uint256::from(3716848),
|
||||
timestamp: 1730921268,
|
||||
extra_data: hex::decode("d883010e0c846765746888676f312e32332e32856c696e7578").unwrap(),
|
||||
mix_hash: Hash256::from_str("e87ca9a45b2e61bbe9080d897db1d584b5d2367d22e898af901091883b7b96ec").unwrap(),
|
||||
nonce: Hash64::ZERO,
|
||||
base_fee_per_gas: Uint256::from(2374u64),
|
||||
base_fee_per_gas: Uint256::from(7u64),
|
||||
withdrawals_root: Some(Hash256::from_str("56e81f171bcc55a6ff8345e692c0f86e5b48e01b996cadc001622fb5e363b421").unwrap()),
|
||||
blob_gas_used: Some(0x0u64),
|
||||
excess_blob_gas: Some(0x0u64),
|
||||
parent_beacon_block_root: Some(Hash256::from_str("f7d327d2c04e4f12e9cdd492e53d39a1d390f8b1571e3b2a22ac6e1e170e5b1a").unwrap()),
|
||||
blob_gas_used: Some(786432),
|
||||
excess_blob_gas: Some(44695552),
|
||||
parent_beacon_block_root: Some(Hash256::from_str("f3a888fee010ebb1ae083547004e96c254b240437823326fdff8354b1fc25629").unwrap()),
|
||||
requests_root: Some(Hash256::from_str("9440d3365f07573919e1e9ac5178c20ec6fe267357ee4baf8b6409901f331b62").unwrap()),
|
||||
};
|
||||
let expected_hash =
|
||||
Hash256::from_str("a7448e600ead0a23d16f96aa46e8dea9eef8a7c5669a5f0a5ff32709afe9c408")
|
||||
Hash256::from_str("61e67afc96bf21be6aab52c1ace1db48de7b83f03119b0644deb4b69e87e09e1")
|
||||
.unwrap();
|
||||
test_rlp_encoding(&header, None, expected_hash);
|
||||
}
|
||||
|
||||
@@ -812,7 +812,7 @@ impl HttpJsonRpc {
|
||||
new_payload_request_electra.versioned_hashes,
|
||||
new_payload_request_electra.parent_beacon_block_root,
|
||||
new_payload_request_electra
|
||||
.execution_requests_list
|
||||
.execution_requests
|
||||
.get_execution_requests_list(),
|
||||
]);
|
||||
|
||||
|
||||
@@ -6,7 +6,9 @@ use strum::EnumString;
|
||||
use superstruct::superstruct;
|
||||
use types::beacon_block_body::KzgCommitments;
|
||||
use types::blob_sidecar::BlobsList;
|
||||
use types::execution_requests::{ConsolidationRequests, DepositRequests, WithdrawalRequests};
|
||||
use types::execution_requests::{
|
||||
ConsolidationRequests, DepositRequests, RequestPrefix, WithdrawalRequests,
|
||||
};
|
||||
use types::{Blob, FixedVector, KzgProof, Unsigned};
|
||||
|
||||
#[derive(Debug, PartialEq, Serialize, Deserialize)]
|
||||
@@ -339,25 +341,6 @@ impl<E: EthSpec> From<JsonExecutionPayload<E>> for ExecutionPayload<E> {
|
||||
}
|
||||
}
|
||||
|
||||
/// This is used to index into the `execution_requests` array.
|
||||
#[derive(Debug, Copy, Clone)]
|
||||
enum RequestPrefix {
|
||||
Deposit,
|
||||
Withdrawal,
|
||||
Consolidation,
|
||||
}
|
||||
|
||||
impl RequestPrefix {
|
||||
pub fn from_prefix(prefix: u8) -> Option<Self> {
|
||||
match prefix {
|
||||
0 => Some(Self::Deposit),
|
||||
1 => Some(Self::Withdrawal),
|
||||
2 => Some(Self::Consolidation),
|
||||
_ => None,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/// Format of `ExecutionRequests` received over the engine api.
|
||||
///
|
||||
/// Array of ssz-encoded requests list encoded as hex bytes.
|
||||
@@ -379,7 +362,8 @@ impl<E: EthSpec> TryFrom<JsonExecutionRequests> for ExecutionRequests<E> {
|
||||
|
||||
for (i, request) in value.0.into_iter().enumerate() {
|
||||
// hex string
|
||||
let decoded_bytes = hex::decode(request).map_err(|e| format!("Invalid hex {:?}", e))?;
|
||||
let decoded_bytes = hex::decode(request.strip_prefix("0x").unwrap_or(&request))
|
||||
.map_err(|e| format!("Invalid hex {:?}", e))?;
|
||||
match RequestPrefix::from_prefix(i as u8) {
|
||||
Some(RequestPrefix::Deposit) => {
|
||||
requests.deposits = DepositRequests::<E>::from_ssz_bytes(&decoded_bytes)
|
||||
@@ -431,7 +415,7 @@ pub struct JsonGetPayloadResponse<E: EthSpec> {
|
||||
#[superstruct(only(V3, V4))]
|
||||
pub should_override_builder: bool,
|
||||
#[superstruct(only(V4))]
|
||||
pub requests: JsonExecutionRequests,
|
||||
pub execution_requests: JsonExecutionRequests,
|
||||
}
|
||||
|
||||
impl<E: EthSpec> TryFrom<JsonGetPayloadResponse<E>> for GetPayloadResponse<E> {
|
||||
@@ -464,7 +448,7 @@ impl<E: EthSpec> TryFrom<JsonGetPayloadResponse<E>> for GetPayloadResponse<E> {
|
||||
block_value: response.block_value,
|
||||
blobs_bundle: response.blobs_bundle.into(),
|
||||
should_override_builder: response.should_override_builder,
|
||||
requests: response.requests.try_into()?,
|
||||
requests: response.execution_requests.try_into()?,
|
||||
}))
|
||||
}
|
||||
}
|
||||
|
||||
@@ -44,7 +44,7 @@ pub struct NewPayloadRequest<'block, E: EthSpec> {
|
||||
#[superstruct(only(Deneb, Electra))]
|
||||
pub parent_beacon_block_root: Hash256,
|
||||
#[superstruct(only(Electra))]
|
||||
pub execution_requests_list: &'block ExecutionRequests<E>,
|
||||
pub execution_requests: &'block ExecutionRequests<E>,
|
||||
}
|
||||
|
||||
impl<'block, E: EthSpec> NewPayloadRequest<'block, E> {
|
||||
@@ -121,8 +121,11 @@ impl<'block, E: EthSpec> NewPayloadRequest<'block, E> {
|
||||
|
||||
let _timer = metrics::start_timer(&metrics::EXECUTION_LAYER_VERIFY_BLOCK_HASH);
|
||||
|
||||
let (header_hash, rlp_transactions_root) =
|
||||
calculate_execution_block_hash(payload, parent_beacon_block_root);
|
||||
let (header_hash, rlp_transactions_root) = calculate_execution_block_hash(
|
||||
payload,
|
||||
parent_beacon_block_root,
|
||||
self.execution_requests().ok().copied(),
|
||||
);
|
||||
|
||||
if header_hash != self.block_hash() {
|
||||
return Err(Error::BlockHashMismatch {
|
||||
@@ -185,7 +188,7 @@ impl<'a, E: EthSpec> TryFrom<BeaconBlockRef<'a, E>> for NewPayloadRequest<'a, E>
|
||||
.map(kzg_commitment_to_versioned_hash)
|
||||
.collect(),
|
||||
parent_beacon_block_root: block_ref.parent_root,
|
||||
execution_requests_list: &block_ref.body.execution_requests,
|
||||
execution_requests: &block_ref.body.execution_requests,
|
||||
})),
|
||||
}
|
||||
}
|
||||
|
||||
@@ -374,7 +374,7 @@ pub async fn handle_rpc<E: EthSpec>(
|
||||
.into(),
|
||||
should_override_builder: false,
|
||||
// TODO(electra): add EL requests in mock el
|
||||
requests: Default::default(),
|
||||
execution_requests: Default::default(),
|
||||
})
|
||||
.unwrap()
|
||||
}
|
||||
|
||||
@@ -136,7 +136,7 @@ where
|
||||
pub earliest_consolidation_epoch: Epoch,
|
||||
|
||||
#[superstruct(only(Electra))]
|
||||
pub pending_balance_deposits: List<PendingBalanceDeposit, E::PendingBalanceDepositsLimit>,
|
||||
pub pending_deposits: List<PendingDeposit, E::PendingDepositsLimit>,
|
||||
#[superstruct(only(Electra))]
|
||||
pub pending_partial_withdrawals:
|
||||
List<PendingPartialWithdrawal, E::PendingPartialWithdrawalsLimit>,
|
||||
@@ -403,7 +403,7 @@ impl<E: EthSpec> TryInto<BeaconState<E>> for PartialBeaconState<E> {
|
||||
earliest_exit_epoch,
|
||||
consolidation_balance_to_consume,
|
||||
earliest_consolidation_epoch,
|
||||
pending_balance_deposits,
|
||||
pending_deposits,
|
||||
pending_partial_withdrawals,
|
||||
pending_consolidations
|
||||
],
|
||||
|
||||
@@ -514,6 +514,7 @@ pub fn get_expected_withdrawals<E: EthSpec>(
|
||||
// Consume pending partial withdrawals
|
||||
let partial_withdrawals_count =
|
||||
if let Ok(partial_withdrawals) = state.pending_partial_withdrawals() {
|
||||
let mut partial_withdrawals_count = 0;
|
||||
for withdrawal in partial_withdrawals {
|
||||
if withdrawal.withdrawable_epoch > epoch
|
||||
|| withdrawals.len() == spec.max_pending_partials_per_withdrawals_sweep as usize
|
||||
@@ -546,8 +547,9 @@ pub fn get_expected_withdrawals<E: EthSpec>(
|
||||
});
|
||||
withdrawal_index.safe_add_assign(1)?;
|
||||
}
|
||||
partial_withdrawals_count.safe_add_assign(1)?;
|
||||
}
|
||||
Some(withdrawals.len())
|
||||
Some(partial_withdrawals_count)
|
||||
} else {
|
||||
None
|
||||
};
|
||||
|
||||
@@ -7,7 +7,6 @@ use crate::per_block_processing::errors::{BlockProcessingError, IntoWithIndex};
|
||||
use crate::VerifySignatures;
|
||||
use types::consts::altair::{PARTICIPATION_FLAG_WEIGHTS, PROPOSER_WEIGHT, WEIGHT_DENOMINATOR};
|
||||
use types::typenum::U33;
|
||||
use types::validator::is_compounding_withdrawal_credential;
|
||||
|
||||
pub fn process_operations<E: EthSpec, Payload: AbstractExecPayload<E>>(
|
||||
state: &mut BeaconState<E>,
|
||||
@@ -378,7 +377,7 @@ pub fn process_deposits<E: EthSpec>(
|
||||
if state.eth1_deposit_index() < eth1_deposit_index_limit {
|
||||
let expected_deposit_len = std::cmp::min(
|
||||
E::MaxDeposits::to_u64(),
|
||||
state.get_outstanding_deposit_len()?,
|
||||
eth1_deposit_index_limit.safe_sub(state.eth1_deposit_index())?,
|
||||
);
|
||||
block_verify!(
|
||||
deposits.len() as u64 == expected_deposit_len,
|
||||
@@ -450,39 +449,46 @@ pub fn apply_deposit<E: EthSpec>(
|
||||
|
||||
if let Some(index) = validator_index {
|
||||
// [Modified in Electra:EIP7251]
|
||||
if let Ok(pending_balance_deposits) = state.pending_balance_deposits_mut() {
|
||||
pending_balance_deposits.push(PendingBalanceDeposit { index, amount })?;
|
||||
|
||||
let validator = state
|
||||
.validators()
|
||||
.get(index as usize)
|
||||
.ok_or(BeaconStateError::UnknownValidator(index as usize))?;
|
||||
|
||||
if is_compounding_withdrawal_credential(deposit_data.withdrawal_credentials, spec)
|
||||
&& validator.has_eth1_withdrawal_credential(spec)
|
||||
&& is_valid_deposit_signature(&deposit_data, spec).is_ok()
|
||||
{
|
||||
state.switch_to_compounding_validator(index as usize, spec)?;
|
||||
}
|
||||
if let Ok(pending_deposits) = state.pending_deposits_mut() {
|
||||
pending_deposits.push(PendingDeposit {
|
||||
pubkey: deposit_data.pubkey,
|
||||
withdrawal_credentials: deposit_data.withdrawal_credentials,
|
||||
amount,
|
||||
signature: deposit_data.signature,
|
||||
slot: spec.genesis_slot, // Use `genesis_slot` to distinguish from a pending deposit request
|
||||
})?;
|
||||
} else {
|
||||
// Update the existing validator balance.
|
||||
increase_balance(state, index as usize, amount)?;
|
||||
}
|
||||
} else {
|
||||
}
|
||||
// New validator
|
||||
else {
|
||||
// The signature should be checked for new validators. Return early for a bad
|
||||
// signature.
|
||||
if is_valid_deposit_signature(&deposit_data, spec).is_err() {
|
||||
return Ok(());
|
||||
}
|
||||
|
||||
state.add_validator_to_registry(&deposit_data, spec)?;
|
||||
let new_validator_index = state.validators().len().safe_sub(1)? as u64;
|
||||
state.add_validator_to_registry(
|
||||
deposit_data.pubkey,
|
||||
deposit_data.withdrawal_credentials,
|
||||
if state.fork_name_unchecked() >= ForkName::Electra {
|
||||
0
|
||||
} else {
|
||||
amount
|
||||
},
|
||||
spec,
|
||||
)?;
|
||||
|
||||
// [New in Electra:EIP7251]
|
||||
if let Ok(pending_balance_deposits) = state.pending_balance_deposits_mut() {
|
||||
pending_balance_deposits.push(PendingBalanceDeposit {
|
||||
index: new_validator_index,
|
||||
if let Ok(pending_deposits) = state.pending_deposits_mut() {
|
||||
pending_deposits.push(PendingDeposit {
|
||||
pubkey: deposit_data.pubkey,
|
||||
withdrawal_credentials: deposit_data.withdrawal_credentials,
|
||||
amount,
|
||||
signature: deposit_data.signature,
|
||||
slot: spec.genesis_slot, // Use `genesis_slot` to distinguish from a pending deposit request
|
||||
})?;
|
||||
}
|
||||
}
|
||||
@@ -596,13 +602,18 @@ pub fn process_deposit_requests<E: EthSpec>(
|
||||
if state.deposit_requests_start_index()? == spec.unset_deposit_requests_start_index {
|
||||
*state.deposit_requests_start_index_mut()? = request.index
|
||||
}
|
||||
let deposit_data = DepositData {
|
||||
pubkey: request.pubkey,
|
||||
withdrawal_credentials: request.withdrawal_credentials,
|
||||
amount: request.amount,
|
||||
signature: request.signature.clone().into(),
|
||||
};
|
||||
apply_deposit(state, deposit_data, None, false, spec)?
|
||||
let slot = state.slot();
|
||||
|
||||
// [New in Electra:EIP7251]
|
||||
if let Ok(pending_deposits) = state.pending_deposits_mut() {
|
||||
pending_deposits.push(PendingDeposit {
|
||||
pubkey: request.pubkey,
|
||||
withdrawal_credentials: request.withdrawal_credentials,
|
||||
amount: request.amount,
|
||||
signature: request.signature.clone(),
|
||||
slot,
|
||||
})?;
|
||||
}
|
||||
}
|
||||
|
||||
Ok(())
|
||||
@@ -621,11 +632,84 @@ pub fn process_consolidation_requests<E: EthSpec>(
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn is_valid_switch_to_compounding_request<E: EthSpec>(
|
||||
state: &BeaconState<E>,
|
||||
consolidation_request: &ConsolidationRequest,
|
||||
spec: &ChainSpec,
|
||||
) -> Result<bool, BlockProcessingError> {
|
||||
// Switch to compounding requires source and target be equal
|
||||
if consolidation_request.source_pubkey != consolidation_request.target_pubkey {
|
||||
return Ok(false);
|
||||
}
|
||||
|
||||
// Verify pubkey exists
|
||||
let Some(source_index) = state
|
||||
.pubkey_cache()
|
||||
.get(&consolidation_request.source_pubkey)
|
||||
else {
|
||||
// source validator doesn't exist
|
||||
return Ok(false);
|
||||
};
|
||||
|
||||
let source_validator = state.get_validator(source_index)?;
|
||||
// Verify the source withdrawal credentials
|
||||
// Note: We need to specifically check for eth1 withdrawal credentials here
|
||||
// If the validator is already compounding, the compounding request is not valid.
|
||||
if let Some(withdrawal_address) = source_validator
|
||||
.has_eth1_withdrawal_credential(spec)
|
||||
.then(|| {
|
||||
source_validator
|
||||
.withdrawal_credentials
|
||||
.as_slice()
|
||||
.get(12..)
|
||||
.map(Address::from_slice)
|
||||
})
|
||||
.flatten()
|
||||
{
|
||||
if withdrawal_address != consolidation_request.source_address {
|
||||
return Ok(false);
|
||||
}
|
||||
} else {
|
||||
// Source doesn't have eth1 withdrawal credentials
|
||||
return Ok(false);
|
||||
}
|
||||
|
||||
// Verify the source is active
|
||||
let current_epoch = state.current_epoch();
|
||||
if !source_validator.is_active_at(current_epoch) {
|
||||
return Ok(false);
|
||||
}
|
||||
// Verify exits for source has not been initiated
|
||||
if source_validator.exit_epoch != spec.far_future_epoch {
|
||||
return Ok(false);
|
||||
}
|
||||
|
||||
Ok(true)
|
||||
}
|
||||
|
||||
pub fn process_consolidation_request<E: EthSpec>(
|
||||
state: &mut BeaconState<E>,
|
||||
consolidation_request: &ConsolidationRequest,
|
||||
spec: &ChainSpec,
|
||||
) -> Result<(), BlockProcessingError> {
|
||||
if is_valid_switch_to_compounding_request(state, consolidation_request, spec)? {
|
||||
let Some(source_index) = state
|
||||
.pubkey_cache()
|
||||
.get(&consolidation_request.source_pubkey)
|
||||
else {
|
||||
// source validator doesn't exist. This is unreachable as `is_valid_switch_to_compounding_request`
|
||||
// will return false in that case.
|
||||
return Ok(());
|
||||
};
|
||||
state.switch_to_compounding_validator(source_index, spec)?;
|
||||
return Ok(());
|
||||
}
|
||||
|
||||
// Verify that source != target, so a consolidation cannot be used as an exit.
|
||||
if consolidation_request.source_pubkey == consolidation_request.target_pubkey {
|
||||
return Ok(());
|
||||
}
|
||||
|
||||
// If the pending consolidations queue is full, consolidation requests are ignored
|
||||
if state.pending_consolidations()?.len() == E::PendingConsolidationsLimit::to_usize() {
|
||||
return Ok(());
|
||||
@@ -649,10 +733,6 @@ pub fn process_consolidation_request<E: EthSpec>(
|
||||
// target validator doesn't exist
|
||||
return Ok(());
|
||||
};
|
||||
// Verify that source != target, so a consolidation cannot be used as an exit.
|
||||
if source_index == target_index {
|
||||
return Ok(());
|
||||
}
|
||||
|
||||
let source_validator = state.get_validator(source_index)?;
|
||||
// Verify the source withdrawal credentials
|
||||
@@ -699,5 +779,10 @@ pub fn process_consolidation_request<E: EthSpec>(
|
||||
target_index: target_index as u64,
|
||||
})?;
|
||||
|
||||
let target_validator = state.get_validator(target_index)?;
|
||||
// Churn any target excess active balance of target and raise its max
|
||||
if target_validator.has_eth1_withdrawal_credential(spec) {
|
||||
state.switch_to_compounding_validator(target_index, spec)?;
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
|
||||
@@ -28,6 +28,7 @@ pub enum EpochProcessingError {
|
||||
SinglePassMissingActivationQueue,
|
||||
MissingEarliestExitEpoch,
|
||||
MissingExitBalanceToConsume,
|
||||
PendingDepositsLogicError,
|
||||
}
|
||||
|
||||
impl From<InclusionError> for EpochProcessingError {
|
||||
|
||||
@@ -4,6 +4,7 @@ use crate::{
|
||||
update_progressive_balances_cache::initialize_progressive_balances_cache,
|
||||
},
|
||||
epoch_cache::{initialize_epoch_cache, PreEpochCache},
|
||||
per_block_processing::is_valid_deposit_signature,
|
||||
per_epoch_processing::{Delta, Error, ParticipationEpochSummary},
|
||||
};
|
||||
use itertools::izip;
|
||||
@@ -16,9 +17,9 @@ use types::{
|
||||
TIMELY_TARGET_FLAG_INDEX, WEIGHT_DENOMINATOR,
|
||||
},
|
||||
milhouse::Cow,
|
||||
ActivationQueue, BeaconState, BeaconStateError, ChainSpec, Checkpoint, Epoch, EthSpec,
|
||||
ExitCache, ForkName, List, ParticipationFlags, PendingBalanceDeposit, ProgressiveBalancesCache,
|
||||
RelativeEpoch, Unsigned, Validator,
|
||||
ActivationQueue, BeaconState, BeaconStateError, ChainSpec, Checkpoint, DepositData, Epoch,
|
||||
EthSpec, ExitCache, ForkName, List, ParticipationFlags, PendingDeposit,
|
||||
ProgressiveBalancesCache, RelativeEpoch, Unsigned, Validator,
|
||||
};
|
||||
|
||||
pub struct SinglePassConfig {
|
||||
@@ -26,7 +27,7 @@ pub struct SinglePassConfig {
|
||||
pub rewards_and_penalties: bool,
|
||||
pub registry_updates: bool,
|
||||
pub slashings: bool,
|
||||
pub pending_balance_deposits: bool,
|
||||
pub pending_deposits: bool,
|
||||
pub pending_consolidations: bool,
|
||||
pub effective_balance_updates: bool,
|
||||
}
|
||||
@@ -44,7 +45,7 @@ impl SinglePassConfig {
|
||||
rewards_and_penalties: true,
|
||||
registry_updates: true,
|
||||
slashings: true,
|
||||
pending_balance_deposits: true,
|
||||
pending_deposits: true,
|
||||
pending_consolidations: true,
|
||||
effective_balance_updates: true,
|
||||
}
|
||||
@@ -56,7 +57,7 @@ impl SinglePassConfig {
|
||||
rewards_and_penalties: false,
|
||||
registry_updates: false,
|
||||
slashings: false,
|
||||
pending_balance_deposits: false,
|
||||
pending_deposits: false,
|
||||
pending_consolidations: false,
|
||||
effective_balance_updates: false,
|
||||
}
|
||||
@@ -85,15 +86,17 @@ struct SlashingsContext {
|
||||
penalty_per_effective_balance_increment: u64,
|
||||
}
|
||||
|
||||
struct PendingBalanceDepositsContext {
|
||||
struct PendingDepositsContext {
|
||||
/// The value to set `next_deposit_index` to *after* processing completes.
|
||||
next_deposit_index: usize,
|
||||
/// The value to set `deposit_balance_to_consume` to *after* processing completes.
|
||||
deposit_balance_to_consume: u64,
|
||||
/// Total balance increases for each validator due to pending balance deposits.
|
||||
validator_deposits_to_process: HashMap<usize, u64>,
|
||||
/// The deposits to append to `pending_balance_deposits` after processing all applicable deposits.
|
||||
deposits_to_postpone: Vec<PendingBalanceDeposit>,
|
||||
/// The deposits to append to `pending_deposits` after processing all applicable deposits.
|
||||
deposits_to_postpone: Vec<PendingDeposit>,
|
||||
/// New validators to be added to the state *after* processing completes.
|
||||
new_validator_deposits: Vec<PendingDeposit>,
|
||||
}
|
||||
|
||||
struct EffectiveBalancesContext {
|
||||
@@ -138,6 +141,7 @@ pub fn process_epoch_single_pass<E: EthSpec>(
|
||||
state.build_exit_cache(spec)?;
|
||||
state.build_committee_cache(RelativeEpoch::Previous, spec)?;
|
||||
state.build_committee_cache(RelativeEpoch::Current, spec)?;
|
||||
state.update_pubkey_cache()?;
|
||||
|
||||
let previous_epoch = state.previous_epoch();
|
||||
let current_epoch = state.current_epoch();
|
||||
@@ -163,12 +167,11 @@ pub fn process_epoch_single_pass<E: EthSpec>(
|
||||
let slashings_ctxt = &SlashingsContext::new(state, state_ctxt, spec)?;
|
||||
let mut next_epoch_cache = PreEpochCache::new_for_next_epoch(state)?;
|
||||
|
||||
let pending_balance_deposits_ctxt =
|
||||
if fork_name.electra_enabled() && conf.pending_balance_deposits {
|
||||
Some(PendingBalanceDepositsContext::new(state, spec)?)
|
||||
} else {
|
||||
None
|
||||
};
|
||||
let pending_deposits_ctxt = if fork_name.electra_enabled() && conf.pending_deposits {
|
||||
Some(PendingDepositsContext::new(state, spec, &conf)?)
|
||||
} else {
|
||||
None
|
||||
};
|
||||
|
||||
let mut earliest_exit_epoch = state.earliest_exit_epoch().ok();
|
||||
let mut exit_balance_to_consume = state.exit_balance_to_consume().ok();
|
||||
@@ -303,9 +306,9 @@ pub fn process_epoch_single_pass<E: EthSpec>(
|
||||
process_single_slashing(&mut balance, &validator, slashings_ctxt, state_ctxt, spec)?;
|
||||
}
|
||||
|
||||
// `process_pending_balance_deposits`
|
||||
if let Some(pending_balance_deposits_ctxt) = &pending_balance_deposits_ctxt {
|
||||
process_pending_balance_deposits_for_validator(
|
||||
// `process_pending_deposits`
|
||||
if let Some(pending_balance_deposits_ctxt) = &pending_deposits_ctxt {
|
||||
process_pending_deposits_for_validator(
|
||||
&mut balance,
|
||||
validator_info,
|
||||
pending_balance_deposits_ctxt,
|
||||
@@ -342,20 +345,84 @@ pub fn process_epoch_single_pass<E: EthSpec>(
|
||||
// Finish processing pending balance deposits if relevant.
|
||||
//
|
||||
// This *could* be reordered after `process_pending_consolidations` which pushes only to the end
|
||||
// of the `pending_balance_deposits` list. But we may as well preserve the write ordering used
|
||||
// of the `pending_deposits` list. But we may as well preserve the write ordering used
|
||||
// by the spec and do this first.
|
||||
if let Some(ctxt) = pending_balance_deposits_ctxt {
|
||||
let mut new_pending_balance_deposits = List::try_from_iter(
|
||||
if let Some(ctxt) = pending_deposits_ctxt {
|
||||
let mut new_balance_deposits = List::try_from_iter(
|
||||
state
|
||||
.pending_balance_deposits()?
|
||||
.pending_deposits()?
|
||||
.iter_from(ctxt.next_deposit_index)?
|
||||
.cloned(),
|
||||
)?;
|
||||
for deposit in ctxt.deposits_to_postpone {
|
||||
new_pending_balance_deposits.push(deposit)?;
|
||||
new_balance_deposits.push(deposit)?;
|
||||
}
|
||||
*state.pending_balance_deposits_mut()? = new_pending_balance_deposits;
|
||||
*state.pending_deposits_mut()? = new_balance_deposits;
|
||||
*state.deposit_balance_to_consume_mut()? = ctxt.deposit_balance_to_consume;
|
||||
|
||||
// `new_validator_deposits` may contain multiple deposits with the same pubkey where
|
||||
// the first deposit creates the new validator and the others are topups.
|
||||
// Each item in the vec is a (pubkey, validator_index)
|
||||
let mut added_validators = Vec::new();
|
||||
for deposit in ctxt.new_validator_deposits {
|
||||
let deposit_data = DepositData {
|
||||
pubkey: deposit.pubkey,
|
||||
withdrawal_credentials: deposit.withdrawal_credentials,
|
||||
amount: deposit.amount,
|
||||
signature: deposit.signature,
|
||||
};
|
||||
// Only check the signature if this is the first deposit for the validator,
|
||||
// following the logic from `apply_pending_deposit` in the spec.
|
||||
if let Some(validator_index) = state.get_validator_index(&deposit_data.pubkey)? {
|
||||
state
|
||||
.get_balance_mut(validator_index)?
|
||||
.safe_add_assign(deposit_data.amount)?;
|
||||
} else if is_valid_deposit_signature(&deposit_data, spec).is_ok() {
|
||||
// Apply the new deposit to the state
|
||||
let validator_index = state.add_validator_to_registry(
|
||||
deposit_data.pubkey,
|
||||
deposit_data.withdrawal_credentials,
|
||||
deposit_data.amount,
|
||||
spec,
|
||||
)?;
|
||||
added_validators.push((deposit_data.pubkey, validator_index));
|
||||
}
|
||||
}
|
||||
if conf.effective_balance_updates {
|
||||
// Re-process effective balance updates for validators affected by top-up of new validators.
|
||||
let (
|
||||
validators,
|
||||
balances,
|
||||
_,
|
||||
current_epoch_participation,
|
||||
_,
|
||||
progressive_balances,
|
||||
_,
|
||||
_,
|
||||
) = state.mutable_validator_fields()?;
|
||||
for (_, validator_index) in added_validators.iter() {
|
||||
let balance = *balances
|
||||
.get(*validator_index)
|
||||
.ok_or(BeaconStateError::UnknownValidator(*validator_index))?;
|
||||
let mut validator = validators
|
||||
.get_cow(*validator_index)
|
||||
.ok_or(BeaconStateError::UnknownValidator(*validator_index))?;
|
||||
let validator_current_epoch_participation = *current_epoch_participation
|
||||
.get(*validator_index)
|
||||
.ok_or(BeaconStateError::UnknownValidator(*validator_index))?;
|
||||
process_single_effective_balance_update(
|
||||
*validator_index,
|
||||
balance,
|
||||
&mut validator,
|
||||
validator_current_epoch_participation,
|
||||
&mut next_epoch_cache,
|
||||
progressive_balances,
|
||||
effective_balances_ctxt,
|
||||
state_ctxt,
|
||||
spec,
|
||||
)?;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Process consolidations outside the single-pass loop, as they depend on balances for multiple
|
||||
@@ -819,8 +886,12 @@ fn process_single_slashing(
|
||||
Ok(())
|
||||
}
|
||||
|
||||
impl PendingBalanceDepositsContext {
|
||||
fn new<E: EthSpec>(state: &BeaconState<E>, spec: &ChainSpec) -> Result<Self, Error> {
|
||||
impl PendingDepositsContext {
|
||||
fn new<E: EthSpec>(
|
||||
state: &BeaconState<E>,
|
||||
spec: &ChainSpec,
|
||||
config: &SinglePassConfig,
|
||||
) -> Result<Self, Error> {
|
||||
let available_for_processing = state
|
||||
.deposit_balance_to_consume()?
|
||||
.safe_add(state.get_activation_exit_churn_limit(spec)?)?;
|
||||
@@ -830,10 +901,31 @@ impl PendingBalanceDepositsContext {
|
||||
let mut next_deposit_index = 0;
|
||||
let mut validator_deposits_to_process = HashMap::new();
|
||||
let mut deposits_to_postpone = vec![];
|
||||
let mut new_validator_deposits = vec![];
|
||||
let mut is_churn_limit_reached = false;
|
||||
let finalized_slot = state
|
||||
.finalized_checkpoint()
|
||||
.epoch
|
||||
.start_slot(E::slots_per_epoch());
|
||||
|
||||
let pending_balance_deposits = state.pending_balance_deposits()?;
|
||||
let pending_deposits = state.pending_deposits()?;
|
||||
|
||||
for deposit in pending_balance_deposits.iter() {
|
||||
for deposit in pending_deposits.iter() {
|
||||
// Do not process deposit requests if the Eth1 bridge deposits are not yet applied.
|
||||
if deposit.slot > spec.genesis_slot
|
||||
&& state.eth1_deposit_index() < state.deposit_requests_start_index()?
|
||||
{
|
||||
break;
|
||||
}
|
||||
// Do not process is deposit slot has not been finalized.
|
||||
if deposit.slot > finalized_slot {
|
||||
break;
|
||||
}
|
||||
// Do not process if we have reached the limit for the number of deposits
|
||||
// processed in an epoch.
|
||||
if next_deposit_index >= E::max_pending_deposits_per_epoch() {
|
||||
break;
|
||||
}
|
||||
// We have to do a bit of indexing into `validators` here, but I can't see any way
|
||||
// around that without changing the spec.
|
||||
//
|
||||
@@ -844,48 +936,70 @@ impl PendingBalanceDepositsContext {
|
||||
// take, just whether it is non-default. Nor do we need to know the value of
|
||||
// `withdrawable_epoch`, because `next_epoch <= withdrawable_epoch` will evaluate to
|
||||
// `true` both for the actual value & the default placeholder value (`FAR_FUTURE_EPOCH`).
|
||||
let validator = state.get_validator(deposit.index as usize)?;
|
||||
let already_exited = validator.exit_epoch < spec.far_future_epoch;
|
||||
// In the spec process_registry_updates is called before process_pending_balance_deposits
|
||||
// so we must account for process_registry_updates ejecting the validator for low balance
|
||||
// and setting the exit_epoch to < far_future_epoch. Note that in the spec the effective
|
||||
// balance update does not happen until *after* the registry update, so we don't need to
|
||||
// account for changes to the effective balance that would push it below the ejection
|
||||
// balance here.
|
||||
let will_be_exited = validator.is_active_at(current_epoch)
|
||||
&& validator.effective_balance <= spec.ejection_balance;
|
||||
if already_exited || will_be_exited {
|
||||
if next_epoch <= validator.withdrawable_epoch {
|
||||
deposits_to_postpone.push(deposit.clone());
|
||||
} else {
|
||||
// Deposited balance will never become active. Increase balance but do not
|
||||
// consume churn.
|
||||
validator_deposits_to_process
|
||||
.entry(deposit.index as usize)
|
||||
.or_insert(0)
|
||||
.safe_add_assign(deposit.amount)?;
|
||||
}
|
||||
} else {
|
||||
// Deposit does not fit in the churn, no more deposit processing in this epoch.
|
||||
if processed_amount.safe_add(deposit.amount)? > available_for_processing {
|
||||
break;
|
||||
}
|
||||
// Deposit fits in the churn, process it. Increase balance and consume churn.
|
||||
let mut is_validator_exited = false;
|
||||
let mut is_validator_withdrawn = false;
|
||||
let opt_validator_index = state.pubkey_cache().get(&deposit.pubkey);
|
||||
if let Some(validator_index) = opt_validator_index {
|
||||
let validator = state.get_validator(validator_index)?;
|
||||
let already_exited = validator.exit_epoch < spec.far_future_epoch;
|
||||
// In the spec process_registry_updates is called before process_pending_deposits
|
||||
// so we must account for process_registry_updates ejecting the validator for low balance
|
||||
// and setting the exit_epoch to < far_future_epoch. Note that in the spec the effective
|
||||
// balance update does not happen until *after* the registry update, so we don't need to
|
||||
// account for changes to the effective balance that would push it below the ejection
|
||||
// balance here.
|
||||
// Note: we only consider this if registry_updates are enabled in the config.
|
||||
// EF tests require us to run epoch_processing functions in isolation.
|
||||
let will_be_exited = config.registry_updates
|
||||
&& (validator.is_active_at(current_epoch)
|
||||
&& validator.effective_balance <= spec.ejection_balance);
|
||||
is_validator_exited = already_exited || will_be_exited;
|
||||
is_validator_withdrawn = validator.withdrawable_epoch < next_epoch;
|
||||
}
|
||||
|
||||
if is_validator_withdrawn {
|
||||
// Deposited balance will never become active. Queue a balance increase but do not
|
||||
// consume churn. Validator index must be known if the validator is known to be
|
||||
// withdrawn (see calculation of `is_validator_withdrawn` above).
|
||||
let validator_index =
|
||||
opt_validator_index.ok_or(Error::PendingDepositsLogicError)?;
|
||||
validator_deposits_to_process
|
||||
.entry(deposit.index as usize)
|
||||
.entry(validator_index)
|
||||
.or_insert(0)
|
||||
.safe_add_assign(deposit.amount)?;
|
||||
} else if is_validator_exited {
|
||||
// Validator is exiting, postpone the deposit until after withdrawable epoch
|
||||
deposits_to_postpone.push(deposit.clone());
|
||||
} else {
|
||||
// Check if deposit fits in the churn, otherwise, do no more deposit processing in this epoch.
|
||||
is_churn_limit_reached =
|
||||
processed_amount.safe_add(deposit.amount)? > available_for_processing;
|
||||
if is_churn_limit_reached {
|
||||
break;
|
||||
}
|
||||
processed_amount.safe_add_assign(deposit.amount)?;
|
||||
|
||||
// Deposit fits in the churn, process it. Increase balance and consume churn.
|
||||
if let Some(validator_index) = state.pubkey_cache().get(&deposit.pubkey) {
|
||||
validator_deposits_to_process
|
||||
.entry(validator_index)
|
||||
.or_insert(0)
|
||||
.safe_add_assign(deposit.amount)?;
|
||||
} else {
|
||||
// The `PendingDeposit` is for a new validator
|
||||
new_validator_deposits.push(deposit.clone());
|
||||
}
|
||||
}
|
||||
|
||||
// Regardless of how the deposit was handled, we move on in the queue.
|
||||
next_deposit_index.safe_add_assign(1)?;
|
||||
}
|
||||
|
||||
let deposit_balance_to_consume = if next_deposit_index == pending_balance_deposits.len() {
|
||||
0
|
||||
} else {
|
||||
// Accumulate churn only if the churn limit has been hit.
|
||||
let deposit_balance_to_consume = if is_churn_limit_reached {
|
||||
available_for_processing.safe_sub(processed_amount)?
|
||||
} else {
|
||||
0
|
||||
};
|
||||
|
||||
Ok(Self {
|
||||
@@ -893,14 +1007,15 @@ impl PendingBalanceDepositsContext {
|
||||
deposit_balance_to_consume,
|
||||
validator_deposits_to_process,
|
||||
deposits_to_postpone,
|
||||
new_validator_deposits,
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
fn process_pending_balance_deposits_for_validator(
|
||||
fn process_pending_deposits_for_validator(
|
||||
balance: &mut Cow<u64>,
|
||||
validator_info: &ValidatorInfo,
|
||||
pending_balance_deposits_ctxt: &PendingBalanceDepositsContext,
|
||||
pending_balance_deposits_ctxt: &PendingDepositsContext,
|
||||
) -> Result<(), Error> {
|
||||
if let Some(deposit_amount) = pending_balance_deposits_ctxt
|
||||
.validator_deposits_to_process
|
||||
@@ -941,21 +1056,20 @@ fn process_pending_consolidations<E: EthSpec>(
|
||||
break;
|
||||
}
|
||||
|
||||
// Calculate the active balance while we have the source validator loaded. This is a safe
|
||||
// reordering.
|
||||
let source_balance = *state
|
||||
.balances()
|
||||
.get(source_index)
|
||||
.ok_or(BeaconStateError::UnknownValidator(source_index))?;
|
||||
let active_balance =
|
||||
source_validator.get_active_balance(source_balance, spec, state_ctxt.fork_name);
|
||||
|
||||
// Churn any target excess active balance of target and raise its max.
|
||||
state.switch_to_compounding_validator(target_index, spec)?;
|
||||
// Calculate the consolidated balance
|
||||
let max_effective_balance =
|
||||
source_validator.get_max_effective_balance(spec, state_ctxt.fork_name);
|
||||
let source_effective_balance = std::cmp::min(
|
||||
*state
|
||||
.balances()
|
||||
.get(source_index)
|
||||
.ok_or(BeaconStateError::UnknownValidator(source_index))?,
|
||||
max_effective_balance,
|
||||
);
|
||||
|
||||
// Move active balance to target. Excess balance is withdrawable.
|
||||
decrease_balance(state, source_index, active_balance)?;
|
||||
increase_balance(state, target_index, active_balance)?;
|
||||
decrease_balance(state, source_index, source_effective_balance)?;
|
||||
increase_balance(state, target_index, source_effective_balance)?;
|
||||
|
||||
affected_validators.insert(source_index);
|
||||
affected_validators.insert(target_index);
|
||||
|
||||
@@ -1,8 +1,10 @@
|
||||
use bls::Signature;
|
||||
use itertools::Itertools;
|
||||
use safe_arith::SafeArith;
|
||||
use std::mem;
|
||||
use types::{
|
||||
BeaconState, BeaconStateElectra, BeaconStateError as Error, ChainSpec, Epoch, EpochCache,
|
||||
EthSpec, Fork,
|
||||
EthSpec, Fork, PendingDeposit,
|
||||
};
|
||||
|
||||
/// Transform a `Deneb` state into an `Electra` state.
|
||||
@@ -38,29 +40,44 @@ pub fn upgrade_to_electra<E: EthSpec>(
|
||||
|
||||
// Add validators that are not yet active to pending balance deposits
|
||||
let validators = post.validators().clone();
|
||||
let mut pre_activation = validators
|
||||
let pre_activation = validators
|
||||
.iter()
|
||||
.enumerate()
|
||||
.filter(|(_, validator)| validator.activation_epoch == spec.far_future_epoch)
|
||||
.sorted_by_key(|(index, validator)| (validator.activation_eligibility_epoch, *index))
|
||||
.collect::<Vec<_>>();
|
||||
|
||||
// Sort the indices by activation_eligibility_epoch and then by index
|
||||
pre_activation.sort_by(|(index_a, val_a), (index_b, val_b)| {
|
||||
if val_a.activation_eligibility_epoch == val_b.activation_eligibility_epoch {
|
||||
index_a.cmp(index_b)
|
||||
} else {
|
||||
val_a
|
||||
.activation_eligibility_epoch
|
||||
.cmp(&val_b.activation_eligibility_epoch)
|
||||
}
|
||||
});
|
||||
|
||||
// Process validators to queue entire balance and reset them
|
||||
for (index, _) in pre_activation {
|
||||
post.queue_entire_balance_and_reset_validator(index, spec)?;
|
||||
let balance = post
|
||||
.balances_mut()
|
||||
.get_mut(index)
|
||||
.ok_or(Error::UnknownValidator(index))?;
|
||||
let balance_copy = *balance;
|
||||
*balance = 0_u64;
|
||||
|
||||
let validator = post
|
||||
.validators_mut()
|
||||
.get_mut(index)
|
||||
.ok_or(Error::UnknownValidator(index))?;
|
||||
validator.effective_balance = 0;
|
||||
validator.activation_eligibility_epoch = spec.far_future_epoch;
|
||||
let pubkey = validator.pubkey;
|
||||
let withdrawal_credentials = validator.withdrawal_credentials;
|
||||
|
||||
post.pending_deposits_mut()?
|
||||
.push(PendingDeposit {
|
||||
pubkey,
|
||||
withdrawal_credentials,
|
||||
amount: balance_copy,
|
||||
signature: Signature::infinity()?.into(),
|
||||
slot: spec.genesis_slot,
|
||||
})
|
||||
.map_err(Error::MilhouseError)?;
|
||||
}
|
||||
|
||||
// Ensure early adopters of compounding credentials go through the activation churn
|
||||
let validators = post.validators().clone();
|
||||
for (index, validator) in validators.iter().enumerate() {
|
||||
if validator.has_compounding_withdrawal_credential(spec) {
|
||||
post.queue_excess_active_balance(index, spec)?;
|
||||
@@ -137,7 +154,7 @@ pub fn upgrade_state_to_electra<E: EthSpec>(
|
||||
earliest_exit_epoch,
|
||||
consolidation_balance_to_consume: 0,
|
||||
earliest_consolidation_epoch,
|
||||
pending_balance_deposits: Default::default(),
|
||||
pending_deposits: Default::default(),
|
||||
pending_partial_withdrawals: Default::default(),
|
||||
pending_consolidations: Default::default(),
|
||||
// Caches
|
||||
|
||||
@@ -509,7 +509,7 @@ where
|
||||
#[compare_fields(as_iter)]
|
||||
#[test_random(default)]
|
||||
#[superstruct(only(Electra))]
|
||||
pub pending_balance_deposits: List<PendingBalanceDeposit, E::PendingBalanceDepositsLimit>,
|
||||
pub pending_deposits: List<PendingDeposit, E::PendingDepositsLimit>,
|
||||
#[compare_fields(as_iter)]
|
||||
#[test_random(default)]
|
||||
#[superstruct(only(Electra))]
|
||||
@@ -1547,19 +1547,23 @@ impl<E: EthSpec> BeaconState<E> {
|
||||
.ok_or(Error::UnknownValidator(validator_index))
|
||||
}
|
||||
|
||||
/// Add a validator to the registry and return the validator index that was allocated for it.
|
||||
pub fn add_validator_to_registry(
|
||||
&mut self,
|
||||
deposit_data: &DepositData,
|
||||
pubkey: PublicKeyBytes,
|
||||
withdrawal_credentials: Hash256,
|
||||
amount: u64,
|
||||
spec: &ChainSpec,
|
||||
) -> Result<(), Error> {
|
||||
let fork = self.fork_name_unchecked();
|
||||
let amount = if fork.electra_enabled() {
|
||||
0
|
||||
} else {
|
||||
deposit_data.amount
|
||||
};
|
||||
self.validators_mut()
|
||||
.push(Validator::from_deposit(deposit_data, amount, fork, spec))?;
|
||||
) -> Result<usize, Error> {
|
||||
let index = self.validators().len();
|
||||
let fork_name = self.fork_name_unchecked();
|
||||
self.validators_mut().push(Validator::from_deposit(
|
||||
pubkey,
|
||||
withdrawal_credentials,
|
||||
amount,
|
||||
fork_name,
|
||||
spec,
|
||||
))?;
|
||||
self.balances_mut().push(amount)?;
|
||||
|
||||
// Altair or later initializations.
|
||||
@@ -1573,7 +1577,20 @@ impl<E: EthSpec> BeaconState<E> {
|
||||
inactivity_scores.push(0)?;
|
||||
}
|
||||
|
||||
Ok(())
|
||||
// Keep the pubkey cache up to date if it was up to date prior to this call.
|
||||
//
|
||||
// Doing this here while we know the pubkey and index is marginally quicker than doing it in
|
||||
// a call to `update_pubkey_cache` later because we don't need to index into the validators
|
||||
// tree again.
|
||||
let pubkey_cache = self.pubkey_cache_mut();
|
||||
if pubkey_cache.len() == index {
|
||||
let success = pubkey_cache.insert(pubkey, index);
|
||||
if !success {
|
||||
return Err(Error::PubkeyCacheInconsistent);
|
||||
}
|
||||
}
|
||||
|
||||
Ok(index)
|
||||
}
|
||||
|
||||
/// Safe copy-on-write accessor for the `validators` list.
|
||||
@@ -1780,19 +1797,6 @@ impl<E: EthSpec> BeaconState<E> {
|
||||
}
|
||||
}
|
||||
|
||||
/// Get the number of outstanding deposits.
|
||||
///
|
||||
/// Returns `Err` if the state is invalid.
|
||||
pub fn get_outstanding_deposit_len(&self) -> Result<u64, Error> {
|
||||
self.eth1_data()
|
||||
.deposit_count
|
||||
.checked_sub(self.eth1_deposit_index())
|
||||
.ok_or(Error::InvalidDepositState {
|
||||
deposit_count: self.eth1_data().deposit_count,
|
||||
deposit_index: self.eth1_deposit_index(),
|
||||
})
|
||||
}
|
||||
|
||||
/// Build all caches (except the tree hash cache), if they need to be built.
|
||||
pub fn build_caches(&mut self, spec: &ChainSpec) -> Result<(), Error> {
|
||||
self.build_all_committee_caches(spec)?;
|
||||
@@ -2149,27 +2153,6 @@ impl<E: EthSpec> BeaconState<E> {
|
||||
.map_err(Into::into)
|
||||
}
|
||||
|
||||
/// Get active balance for the given `validator_index`.
|
||||
pub fn get_active_balance(
|
||||
&self,
|
||||
validator_index: usize,
|
||||
spec: &ChainSpec,
|
||||
current_fork: ForkName,
|
||||
) -> Result<u64, Error> {
|
||||
let max_effective_balance = self
|
||||
.validators()
|
||||
.get(validator_index)
|
||||
.map(|validator| validator.get_max_effective_balance(spec, current_fork))
|
||||
.ok_or(Error::UnknownValidator(validator_index))?;
|
||||
Ok(std::cmp::min(
|
||||
*self
|
||||
.balances()
|
||||
.get(validator_index)
|
||||
.ok_or(Error::UnknownValidator(validator_index))?,
|
||||
max_effective_balance,
|
||||
))
|
||||
}
|
||||
|
||||
pub fn get_pending_balance_to_withdraw(&self, validator_index: usize) -> Result<u64, Error> {
|
||||
let mut pending_balance = 0;
|
||||
for withdrawal in self
|
||||
@@ -2196,42 +2179,18 @@ impl<E: EthSpec> BeaconState<E> {
|
||||
if *balance > spec.min_activation_balance {
|
||||
let excess_balance = balance.safe_sub(spec.min_activation_balance)?;
|
||||
*balance = spec.min_activation_balance;
|
||||
self.pending_balance_deposits_mut()?
|
||||
.push(PendingBalanceDeposit {
|
||||
index: validator_index as u64,
|
||||
amount: excess_balance,
|
||||
})?;
|
||||
let validator = self.get_validator(validator_index)?.clone();
|
||||
self.pending_deposits_mut()?.push(PendingDeposit {
|
||||
pubkey: validator.pubkey,
|
||||
withdrawal_credentials: validator.withdrawal_credentials,
|
||||
amount: excess_balance,
|
||||
signature: Signature::infinity()?.into(),
|
||||
slot: spec.genesis_slot,
|
||||
})?;
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn queue_entire_balance_and_reset_validator(
|
||||
&mut self,
|
||||
validator_index: usize,
|
||||
spec: &ChainSpec,
|
||||
) -> Result<(), Error> {
|
||||
let balance = self
|
||||
.balances_mut()
|
||||
.get_mut(validator_index)
|
||||
.ok_or(Error::UnknownValidator(validator_index))?;
|
||||
let balance_copy = *balance;
|
||||
*balance = 0_u64;
|
||||
|
||||
let validator = self
|
||||
.validators_mut()
|
||||
.get_mut(validator_index)
|
||||
.ok_or(Error::UnknownValidator(validator_index))?;
|
||||
validator.effective_balance = 0;
|
||||
validator.activation_eligibility_epoch = spec.far_future_epoch;
|
||||
|
||||
self.pending_balance_deposits_mut()?
|
||||
.push(PendingBalanceDeposit {
|
||||
index: validator_index as u64,
|
||||
amount: balance_copy,
|
||||
})
|
||||
.map_err(Into::into)
|
||||
}
|
||||
|
||||
/// Change the withdrawal prefix of the given `validator_index` to the compounding withdrawal validator prefix.
|
||||
pub fn switch_to_compounding_validator(
|
||||
&mut self,
|
||||
@@ -2242,12 +2201,10 @@ impl<E: EthSpec> BeaconState<E> {
|
||||
.validators_mut()
|
||||
.get_mut(validator_index)
|
||||
.ok_or(Error::UnknownValidator(validator_index))?;
|
||||
if validator.has_eth1_withdrawal_credential(spec) {
|
||||
AsMut::<[u8; 32]>::as_mut(&mut validator.withdrawal_credentials)[0] =
|
||||
spec.compounding_withdrawal_prefix_byte;
|
||||
AsMut::<[u8; 32]>::as_mut(&mut validator.withdrawal_credentials)[0] =
|
||||
spec.compounding_withdrawal_prefix_byte;
|
||||
|
||||
self.queue_excess_active_balance(validator_index, spec)?;
|
||||
}
|
||||
self.queue_excess_active_balance(validator_index, spec)?;
|
||||
Ok(())
|
||||
}
|
||||
|
||||
|
||||
@@ -307,43 +307,6 @@ mod committees {
|
||||
}
|
||||
}
|
||||
|
||||
mod get_outstanding_deposit_len {
|
||||
use super::*;
|
||||
|
||||
async fn state() -> BeaconState<MinimalEthSpec> {
|
||||
get_harness(16, Slot::new(0))
|
||||
.await
|
||||
.chain
|
||||
.head_beacon_state_cloned()
|
||||
}
|
||||
|
||||
#[tokio::test]
|
||||
async fn returns_ok() {
|
||||
let mut state = state().await;
|
||||
assert_eq!(state.get_outstanding_deposit_len(), Ok(0));
|
||||
|
||||
state.eth1_data_mut().deposit_count = 17;
|
||||
*state.eth1_deposit_index_mut() = 16;
|
||||
assert_eq!(state.get_outstanding_deposit_len(), Ok(1));
|
||||
}
|
||||
|
||||
#[tokio::test]
|
||||
async fn returns_err_if_the_state_is_invalid() {
|
||||
let mut state = state().await;
|
||||
// The state is invalid, deposit count is lower than deposit index.
|
||||
state.eth1_data_mut().deposit_count = 16;
|
||||
*state.eth1_deposit_index_mut() = 17;
|
||||
|
||||
assert_eq!(
|
||||
state.get_outstanding_deposit_len(),
|
||||
Err(BeaconStateError::InvalidDepositState {
|
||||
deposit_count: 16,
|
||||
deposit_index: 17,
|
||||
})
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn decode_base_and_altair() {
|
||||
type E = MainnetEthSpec;
|
||||
|
||||
@@ -1,5 +1,6 @@
|
||||
use crate::test_utils::TestRandom;
|
||||
use crate::{Hash256, PublicKeyBytes, Signature};
|
||||
use crate::{Hash256, PublicKeyBytes};
|
||||
use bls::SignatureBytes;
|
||||
use serde::{Deserialize, Serialize};
|
||||
use ssz::Encode;
|
||||
use ssz_derive::{Decode, Encode};
|
||||
@@ -10,7 +11,6 @@ use tree_hash_derive::TreeHash;
|
||||
arbitrary::Arbitrary,
|
||||
Debug,
|
||||
PartialEq,
|
||||
Eq,
|
||||
Hash,
|
||||
Clone,
|
||||
Serialize,
|
||||
@@ -25,7 +25,7 @@ pub struct DepositRequest {
|
||||
pub withdrawal_credentials: Hash256,
|
||||
#[serde(with = "serde_utils::quoted_u64")]
|
||||
pub amount: u64,
|
||||
pub signature: Signature,
|
||||
pub signature: SignatureBytes,
|
||||
#[serde(with = "serde_utils::quoted_u64")]
|
||||
pub index: u64,
|
||||
}
|
||||
@@ -36,7 +36,7 @@ impl DepositRequest {
|
||||
pubkey: PublicKeyBytes::empty(),
|
||||
withdrawal_credentials: Hash256::ZERO,
|
||||
amount: 0,
|
||||
signature: Signature::empty(),
|
||||
signature: SignatureBytes::empty(),
|
||||
index: 0,
|
||||
}
|
||||
.as_ssz_bytes()
|
||||
|
||||
@@ -151,7 +151,7 @@ pub trait EthSpec:
|
||||
/*
|
||||
* New in Electra
|
||||
*/
|
||||
type PendingBalanceDepositsLimit: Unsigned + Clone + Sync + Send + Debug + PartialEq;
|
||||
type PendingDepositsLimit: Unsigned + Clone + Sync + Send + Debug + PartialEq;
|
||||
type PendingPartialWithdrawalsLimit: Unsigned + Clone + Sync + Send + Debug + PartialEq;
|
||||
type PendingConsolidationsLimit: Unsigned + Clone + Sync + Send + Debug + PartialEq;
|
||||
type MaxConsolidationRequestsPerPayload: Unsigned + Clone + Sync + Send + Debug + PartialEq;
|
||||
@@ -159,6 +159,7 @@ pub trait EthSpec:
|
||||
type MaxAttesterSlashingsElectra: Unsigned + Clone + Sync + Send + Debug + PartialEq;
|
||||
type MaxAttestationsElectra: Unsigned + Clone + Sync + Send + Debug + PartialEq;
|
||||
type MaxWithdrawalRequestsPerPayload: Unsigned + Clone + Sync + Send + Debug + PartialEq;
|
||||
type MaxPendingDepositsPerEpoch: Unsigned + Clone + Sync + Send + Debug + PartialEq;
|
||||
|
||||
fn default_spec() -> ChainSpec;
|
||||
|
||||
@@ -331,9 +332,9 @@ pub trait EthSpec:
|
||||
.expect("Preset values are not configurable and never result in non-positive block body depth")
|
||||
}
|
||||
|
||||
/// Returns the `PENDING_BALANCE_DEPOSITS_LIMIT` constant for this specification.
|
||||
fn pending_balance_deposits_limit() -> usize {
|
||||
Self::PendingBalanceDepositsLimit::to_usize()
|
||||
/// Returns the `PENDING_DEPOSITS_LIMIT` constant for this specification.
|
||||
fn pending_deposits_limit() -> usize {
|
||||
Self::PendingDepositsLimit::to_usize()
|
||||
}
|
||||
|
||||
/// Returns the `PENDING_PARTIAL_WITHDRAWALS_LIMIT` constant for this specification.
|
||||
@@ -371,6 +372,11 @@ pub trait EthSpec:
|
||||
Self::MaxWithdrawalRequestsPerPayload::to_usize()
|
||||
}
|
||||
|
||||
/// Returns the `MAX_PENDING_DEPOSITS_PER_EPOCH` constant for this specification.
|
||||
fn max_pending_deposits_per_epoch() -> usize {
|
||||
Self::MaxPendingDepositsPerEpoch::to_usize()
|
||||
}
|
||||
|
||||
fn kzg_commitments_inclusion_proof_depth() -> usize {
|
||||
Self::KzgCommitmentsInclusionProofDepth::to_usize()
|
||||
}
|
||||
@@ -430,7 +436,7 @@ impl EthSpec for MainnetEthSpec {
|
||||
type SlotsPerEth1VotingPeriod = U2048; // 64 epochs * 32 slots per epoch
|
||||
type MaxBlsToExecutionChanges = U16;
|
||||
type MaxWithdrawalsPerPayload = U16;
|
||||
type PendingBalanceDepositsLimit = U134217728;
|
||||
type PendingDepositsLimit = U134217728;
|
||||
type PendingPartialWithdrawalsLimit = U134217728;
|
||||
type PendingConsolidationsLimit = U262144;
|
||||
type MaxConsolidationRequestsPerPayload = U1;
|
||||
@@ -438,6 +444,7 @@ impl EthSpec for MainnetEthSpec {
|
||||
type MaxAttesterSlashingsElectra = U1;
|
||||
type MaxAttestationsElectra = U8;
|
||||
type MaxWithdrawalRequestsPerPayload = U16;
|
||||
type MaxPendingDepositsPerEpoch = U16;
|
||||
|
||||
fn default_spec() -> ChainSpec {
|
||||
ChainSpec::mainnet()
|
||||
@@ -500,7 +507,8 @@ impl EthSpec for MinimalEthSpec {
|
||||
MaxBlsToExecutionChanges,
|
||||
MaxBlobsPerBlock,
|
||||
BytesPerFieldElement,
|
||||
PendingBalanceDepositsLimit,
|
||||
PendingDepositsLimit,
|
||||
MaxPendingDepositsPerEpoch,
|
||||
MaxConsolidationRequestsPerPayload,
|
||||
MaxAttesterSlashingsElectra,
|
||||
MaxAttestationsElectra
|
||||
@@ -557,7 +565,7 @@ impl EthSpec for GnosisEthSpec {
|
||||
type BytesPerFieldElement = U32;
|
||||
type BytesPerBlob = U131072;
|
||||
type KzgCommitmentInclusionProofDepth = U17;
|
||||
type PendingBalanceDepositsLimit = U134217728;
|
||||
type PendingDepositsLimit = U134217728;
|
||||
type PendingPartialWithdrawalsLimit = U134217728;
|
||||
type PendingConsolidationsLimit = U262144;
|
||||
type MaxConsolidationRequestsPerPayload = U1;
|
||||
@@ -565,6 +573,7 @@ impl EthSpec for GnosisEthSpec {
|
||||
type MaxAttesterSlashingsElectra = U1;
|
||||
type MaxAttestationsElectra = U8;
|
||||
type MaxWithdrawalRequestsPerPayload = U16;
|
||||
type MaxPendingDepositsPerEpoch = U16;
|
||||
type FieldElementsPerCell = U64;
|
||||
type FieldElementsPerExtBlob = U8192;
|
||||
type BytesPerCell = U2048;
|
||||
|
||||
@@ -52,9 +52,11 @@ pub struct ExecutionBlockHeader {
|
||||
pub blob_gas_used: Option<u64>,
|
||||
pub excess_blob_gas: Option<u64>,
|
||||
pub parent_beacon_block_root: Option<Hash256>,
|
||||
pub requests_root: Option<Hash256>,
|
||||
}
|
||||
|
||||
impl ExecutionBlockHeader {
|
||||
#[allow(clippy::too_many_arguments)]
|
||||
pub fn from_payload<E: EthSpec>(
|
||||
payload: ExecutionPayloadRef<E>,
|
||||
rlp_empty_list_root: Hash256,
|
||||
@@ -63,6 +65,7 @@ impl ExecutionBlockHeader {
|
||||
rlp_blob_gas_used: Option<u64>,
|
||||
rlp_excess_blob_gas: Option<u64>,
|
||||
rlp_parent_beacon_block_root: Option<Hash256>,
|
||||
rlp_requests_root: Option<Hash256>,
|
||||
) -> Self {
|
||||
// Most of these field mappings are defined in EIP-3675 except for `mixHash`, which is
|
||||
// defined in EIP-4399.
|
||||
@@ -87,6 +90,7 @@ impl ExecutionBlockHeader {
|
||||
blob_gas_used: rlp_blob_gas_used,
|
||||
excess_blob_gas: rlp_excess_blob_gas,
|
||||
parent_beacon_block_root: rlp_parent_beacon_block_root,
|
||||
requests_root: rlp_requests_root,
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -114,6 +118,7 @@ pub struct EncodableExecutionBlockHeader<'a> {
|
||||
pub blob_gas_used: Option<u64>,
|
||||
pub excess_blob_gas: Option<u64>,
|
||||
pub parent_beacon_block_root: Option<&'a [u8]>,
|
||||
pub requests_root: Option<&'a [u8]>,
|
||||
}
|
||||
|
||||
impl<'a> From<&'a ExecutionBlockHeader> for EncodableExecutionBlockHeader<'a> {
|
||||
@@ -139,6 +144,7 @@ impl<'a> From<&'a ExecutionBlockHeader> for EncodableExecutionBlockHeader<'a> {
|
||||
blob_gas_used: header.blob_gas_used,
|
||||
excess_blob_gas: header.excess_blob_gas,
|
||||
parent_beacon_block_root: None,
|
||||
requests_root: None,
|
||||
};
|
||||
if let Some(withdrawals_root) = &header.withdrawals_root {
|
||||
encodable.withdrawals_root = Some(withdrawals_root.as_slice());
|
||||
@@ -146,6 +152,9 @@ impl<'a> From<&'a ExecutionBlockHeader> for EncodableExecutionBlockHeader<'a> {
|
||||
if let Some(parent_beacon_block_root) = &header.parent_beacon_block_root {
|
||||
encodable.parent_beacon_block_root = Some(parent_beacon_block_root.as_slice())
|
||||
}
|
||||
if let Some(requests_root) = &header.requests_root {
|
||||
encodable.requests_root = Some(requests_root.as_slice())
|
||||
}
|
||||
encodable
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,7 +1,8 @@
|
||||
use crate::test_utils::TestRandom;
|
||||
use crate::{ConsolidationRequest, DepositRequest, EthSpec, WithdrawalRequest};
|
||||
use crate::{ConsolidationRequest, DepositRequest, EthSpec, Hash256, WithdrawalRequest};
|
||||
use alloy_primitives::Bytes;
|
||||
use derivative::Derivative;
|
||||
use ethereum_hashing::{DynamicContext, Sha256Context};
|
||||
use serde::{Deserialize, Serialize};
|
||||
use ssz::Encode;
|
||||
use ssz_derive::{Decode, Encode};
|
||||
@@ -47,6 +48,43 @@ impl<E: EthSpec> ExecutionRequests<E> {
|
||||
let consolidation_bytes = Bytes::from(self.consolidations.as_ssz_bytes());
|
||||
vec![deposit_bytes, withdrawal_bytes, consolidation_bytes]
|
||||
}
|
||||
|
||||
/// Generate the execution layer `requests_hash` based on EIP-7685.
|
||||
///
|
||||
/// `sha256(sha256(requests_0) ++ sha256(requests_1) ++ ...)`
|
||||
pub fn requests_hash(&self) -> Hash256 {
|
||||
let mut hasher = DynamicContext::new();
|
||||
|
||||
for (i, request) in self.get_execution_requests_list().iter().enumerate() {
|
||||
let mut request_hasher = DynamicContext::new();
|
||||
request_hasher.update(&[i as u8]);
|
||||
request_hasher.update(request);
|
||||
let request_hash = request_hasher.finalize();
|
||||
|
||||
hasher.update(&request_hash);
|
||||
}
|
||||
|
||||
hasher.finalize().into()
|
||||
}
|
||||
}
|
||||
|
||||
/// This is used to index into the `execution_requests` array.
|
||||
#[derive(Debug, Copy, Clone)]
|
||||
pub enum RequestPrefix {
|
||||
Deposit,
|
||||
Withdrawal,
|
||||
Consolidation,
|
||||
}
|
||||
|
||||
impl RequestPrefix {
|
||||
pub fn from_prefix(prefix: u8) -> Option<Self> {
|
||||
match prefix {
|
||||
0 => Some(Self::Deposit),
|
||||
1 => Some(Self::Withdrawal),
|
||||
2 => Some(Self::Consolidation),
|
||||
_ => None,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[cfg(test)]
|
||||
|
||||
@@ -54,8 +54,8 @@ pub mod light_client_finality_update;
|
||||
pub mod light_client_optimistic_update;
|
||||
pub mod light_client_update;
|
||||
pub mod pending_attestation;
|
||||
pub mod pending_balance_deposit;
|
||||
pub mod pending_consolidation;
|
||||
pub mod pending_deposit;
|
||||
pub mod pending_partial_withdrawal;
|
||||
pub mod proposer_preparation_data;
|
||||
pub mod proposer_slashing;
|
||||
@@ -170,7 +170,7 @@ pub use crate::execution_payload_header::{
|
||||
ExecutionPayloadHeaderDeneb, ExecutionPayloadHeaderElectra, ExecutionPayloadHeaderRef,
|
||||
ExecutionPayloadHeaderRefMut,
|
||||
};
|
||||
pub use crate::execution_requests::ExecutionRequests;
|
||||
pub use crate::execution_requests::{ExecutionRequests, RequestPrefix};
|
||||
pub use crate::fork::Fork;
|
||||
pub use crate::fork_context::ForkContext;
|
||||
pub use crate::fork_data::ForkData;
|
||||
@@ -210,8 +210,8 @@ pub use crate::payload::{
|
||||
FullPayloadRef, OwnedExecPayload,
|
||||
};
|
||||
pub use crate::pending_attestation::PendingAttestation;
|
||||
pub use crate::pending_balance_deposit::PendingBalanceDeposit;
|
||||
pub use crate::pending_consolidation::PendingConsolidation;
|
||||
pub use crate::pending_deposit::PendingDeposit;
|
||||
pub use crate::pending_partial_withdrawal::PendingPartialWithdrawal;
|
||||
pub use crate::preset::{
|
||||
AltairPreset, BasePreset, BellatrixPreset, CapellaPreset, DenebPreset, ElectraPreset,
|
||||
|
||||
@@ -1,4 +1,5 @@
|
||||
use crate::test_utils::TestRandom;
|
||||
use crate::*;
|
||||
use serde::{Deserialize, Serialize};
|
||||
use ssz_derive::{Decode, Encode};
|
||||
use test_random_derive::TestRandom;
|
||||
@@ -8,7 +9,6 @@ use tree_hash_derive::TreeHash;
|
||||
arbitrary::Arbitrary,
|
||||
Debug,
|
||||
PartialEq,
|
||||
Eq,
|
||||
Hash,
|
||||
Clone,
|
||||
Serialize,
|
||||
@@ -18,16 +18,18 @@ use tree_hash_derive::TreeHash;
|
||||
TreeHash,
|
||||
TestRandom,
|
||||
)]
|
||||
pub struct PendingBalanceDeposit {
|
||||
#[serde(with = "serde_utils::quoted_u64")]
|
||||
pub index: u64,
|
||||
pub struct PendingDeposit {
|
||||
pub pubkey: PublicKeyBytes,
|
||||
pub withdrawal_credentials: Hash256,
|
||||
#[serde(with = "serde_utils::quoted_u64")]
|
||||
pub amount: u64,
|
||||
pub signature: SignatureBytes,
|
||||
pub slot: Slot,
|
||||
}
|
||||
|
||||
#[cfg(test)]
|
||||
mod tests {
|
||||
use super::*;
|
||||
|
||||
ssz_and_tree_hash_tests!(PendingBalanceDeposit);
|
||||
ssz_and_tree_hash_tests!(PendingDeposit);
|
||||
}
|
||||
@@ -263,7 +263,7 @@ impl ElectraPreset {
|
||||
whistleblower_reward_quotient_electra: spec.whistleblower_reward_quotient_electra,
|
||||
max_pending_partials_per_withdrawals_sweep: spec
|
||||
.max_pending_partials_per_withdrawals_sweep,
|
||||
pending_balance_deposits_limit: E::pending_balance_deposits_limit() as u64,
|
||||
pending_balance_deposits_limit: E::pending_deposits_limit() as u64,
|
||||
pending_partial_withdrawals_limit: E::pending_partial_withdrawals_limit() as u64,
|
||||
pending_consolidations_limit: E::pending_consolidations_limit() as u64,
|
||||
max_consolidation_requests_per_payload: E::max_consolidation_requests_per_payload()
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
use crate::{
|
||||
test_utils::TestRandom, Address, BeaconState, ChainSpec, Checkpoint, DepositData, Epoch,
|
||||
EthSpec, FixedBytesExtended, ForkName, Hash256, PublicKeyBytes,
|
||||
test_utils::TestRandom, Address, BeaconState, ChainSpec, Checkpoint, Epoch, EthSpec,
|
||||
FixedBytesExtended, ForkName, Hash256, PublicKeyBytes,
|
||||
};
|
||||
use serde::{Deserialize, Serialize};
|
||||
use ssz_derive::{Decode, Encode};
|
||||
@@ -38,14 +38,15 @@ pub struct Validator {
|
||||
impl Validator {
|
||||
#[allow(clippy::arithmetic_side_effects)]
|
||||
pub fn from_deposit(
|
||||
deposit_data: &DepositData,
|
||||
pubkey: PublicKeyBytes,
|
||||
withdrawal_credentials: Hash256,
|
||||
amount: u64,
|
||||
fork_name: ForkName,
|
||||
spec: &ChainSpec,
|
||||
) -> Self {
|
||||
let mut validator = Validator {
|
||||
pubkey: deposit_data.pubkey,
|
||||
withdrawal_credentials: deposit_data.withdrawal_credentials,
|
||||
pubkey,
|
||||
withdrawal_credentials,
|
||||
activation_eligibility_epoch: spec.far_future_epoch,
|
||||
activation_epoch: spec.far_future_epoch,
|
||||
exit_epoch: spec.far_future_epoch,
|
||||
@@ -291,16 +292,6 @@ impl Validator {
|
||||
spec.max_effective_balance
|
||||
}
|
||||
}
|
||||
|
||||
pub fn get_active_balance(
|
||||
&self,
|
||||
validator_balance: u64,
|
||||
spec: &ChainSpec,
|
||||
current_fork: ForkName,
|
||||
) -> u64 {
|
||||
let max_effective_balance = self.get_max_effective_balance(spec, current_fork);
|
||||
std::cmp::min(validator_balance, max_effective_balance)
|
||||
}
|
||||
}
|
||||
|
||||
impl Default for Validator {
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
TESTS_TAG := v1.5.0-alpha.6
|
||||
TESTS_TAG := v1.5.0-alpha.8
|
||||
TESTS = general minimal mainnet
|
||||
TARBALLS = $(patsubst %,%-$(TESTS_TAG).tar.gz,$(TESTS))
|
||||
|
||||
|
||||
@@ -86,7 +86,7 @@ type_name!(RewardsAndPenalties, "rewards_and_penalties");
|
||||
type_name!(RegistryUpdates, "registry_updates");
|
||||
type_name!(Slashings, "slashings");
|
||||
type_name!(Eth1DataReset, "eth1_data_reset");
|
||||
type_name!(PendingBalanceDeposits, "pending_balance_deposits");
|
||||
type_name!(PendingBalanceDeposits, "pending_deposits");
|
||||
type_name!(PendingConsolidations, "pending_consolidations");
|
||||
type_name!(EffectiveBalanceUpdates, "effective_balance_updates");
|
||||
type_name!(SlashingsReset, "slashings_reset");
|
||||
@@ -193,7 +193,7 @@ impl<E: EthSpec> EpochTransition<E> for PendingBalanceDeposits {
|
||||
state,
|
||||
spec,
|
||||
SinglePassConfig {
|
||||
pending_balance_deposits: true,
|
||||
pending_deposits: true,
|
||||
..SinglePassConfig::disable_all()
|
||||
},
|
||||
)
|
||||
@@ -363,7 +363,7 @@ impl<E: EthSpec, T: EpochTransition<E>> Case for EpochProcessing<E, T> {
|
||||
}
|
||||
|
||||
if !fork_name.electra_enabled()
|
||||
&& (T::name() == "pending_consolidations" || T::name() == "pending_balance_deposits")
|
||||
&& (T::name() == "pending_consolidations" || T::name() == "pending_deposits")
|
||||
{
|
||||
return false;
|
||||
}
|
||||
|
||||
@@ -134,7 +134,7 @@ type_name_generic!(LightClientUpdateElectra, "LightClientUpdate");
|
||||
type_name_generic!(PendingAttestation);
|
||||
type_name!(PendingConsolidation);
|
||||
type_name!(PendingPartialWithdrawal);
|
||||
type_name!(PendingBalanceDeposit);
|
||||
type_name!(PendingDeposit);
|
||||
type_name!(ProposerSlashing);
|
||||
type_name_generic!(SignedAggregateAndProof);
|
||||
type_name_generic!(SignedAggregateAndProofBase, "SignedAggregateAndProof");
|
||||
|
||||
@@ -243,8 +243,7 @@ mod ssz_static {
|
||||
use types::historical_summary::HistoricalSummary;
|
||||
use types::{
|
||||
AttesterSlashingBase, AttesterSlashingElectra, ConsolidationRequest, DepositRequest,
|
||||
LightClientBootstrapAltair, PendingBalanceDeposit, PendingPartialWithdrawal,
|
||||
WithdrawalRequest, *,
|
||||
LightClientBootstrapAltair, PendingDeposit, PendingPartialWithdrawal, WithdrawalRequest, *,
|
||||
};
|
||||
|
||||
ssz_static_test!(attestation_data, AttestationData);
|
||||
@@ -661,8 +660,8 @@ mod ssz_static {
|
||||
|
||||
#[test]
|
||||
fn pending_balance_deposit() {
|
||||
SszStaticHandler::<PendingBalanceDeposit, MinimalEthSpec>::electra_and_later().run();
|
||||
SszStaticHandler::<PendingBalanceDeposit, MainnetEthSpec>::electra_and_later().run();
|
||||
SszStaticHandler::<PendingDeposit, MinimalEthSpec>::electra_and_later().run();
|
||||
SszStaticHandler::<PendingDeposit, MainnetEthSpec>::electra_and_later().run();
|
||||
}
|
||||
|
||||
#[test]
|
||||
|
||||
Reference in New Issue
Block a user