mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-23 06:44:35 +00:00
* Start updating types * WIP * Signature hacking * Existing EF tests passing with fake_crypto * Updates * Delete outdated API spec * The refactor continues * It compiles * WIP test fixes * All release tests passing bar genesis state parsing * Update and test YamlConfig * Update to spec v0.10 compatible BLS * Updates to BLS EF tests * Add EF test for AggregateVerify And delete unused hash2curve tests for uncompressed points * Update EF tests to v0.10.1 * Use optional block root correctly in block proc * Use genesis fork in deposit domain. All tests pass * Cargo fmt * Fast aggregate verify test * Update REST API docs * Cargo fmt * Fix unused import * Bump spec tags to v0.10.1 * Add `seconds_per_eth1_block` to chainspec * Update to timestamp based eth1 voting scheme * Return None from `get_votes_to_consider` if block cache is empty * Handle overflows in `is_candidate_block` * Revert to failing tests * Fix eth1 data sets test * Choose default vote according to spec * Fix collect_valid_votes tests * Fix `get_votes_to_consider` to choose all eligible blocks * Uncomment winning_vote tests * Add comments; remove unused code * Reduce seconds_per_eth1_block for simulation * Addressed review comments * Add test for default vote case * Fix logs * Remove unused functions * Meter default eth1 votes * Fix comments * Address review comments; remove unused dependency * Disable/delete two outdated tests * Bump eth1 default vote warn to error * Delete outdated eth1 test Co-authored-by: Pawan Dhananjay <pawandhananjay@gmail.com>
51 lines
1.8 KiB
Rust
51 lines
1.8 KiB
Rust
use crate::common::initiate_validator_exit;
|
|
use std::cmp;
|
|
use types::{BeaconStateError as Error, *};
|
|
|
|
/// Slash the validator with index ``index``.
|
|
///
|
|
/// Spec v0.10.1
|
|
pub fn slash_validator<T: EthSpec>(
|
|
state: &mut BeaconState<T>,
|
|
slashed_index: usize,
|
|
opt_whistleblower_index: Option<usize>,
|
|
spec: &ChainSpec,
|
|
) -> Result<(), Error> {
|
|
if slashed_index >= state.validators.len() || slashed_index >= state.balances.len() {
|
|
return Err(BeaconStateError::UnknownValidator);
|
|
}
|
|
|
|
let epoch = state.current_epoch();
|
|
|
|
initiate_validator_exit(state, slashed_index, spec)?;
|
|
|
|
state.validators[slashed_index].slashed = true;
|
|
state.validators[slashed_index].withdrawable_epoch = cmp::max(
|
|
state.validators[slashed_index].withdrawable_epoch,
|
|
epoch + Epoch::from(T::EpochsPerSlashingsVector::to_u64()),
|
|
);
|
|
let validator_effective_balance = state.get_effective_balance(slashed_index, spec)?;
|
|
state.set_slashings(
|
|
epoch,
|
|
state.get_slashings(epoch)? + validator_effective_balance,
|
|
)?;
|
|
safe_sub_assign!(
|
|
state.balances[slashed_index],
|
|
validator_effective_balance / spec.min_slashing_penalty_quotient
|
|
);
|
|
|
|
// Apply proposer and whistleblower rewards
|
|
let proposer_index = state.get_beacon_proposer_index(state.slot, spec)?;
|
|
let whistleblower_index = opt_whistleblower_index.unwrap_or(proposer_index);
|
|
let whistleblower_reward = validator_effective_balance / spec.whistleblower_reward_quotient;
|
|
let proposer_reward = whistleblower_reward / spec.proposer_reward_quotient;
|
|
|
|
safe_add_assign!(state.balances[proposer_index], proposer_reward);
|
|
safe_add_assign!(
|
|
state.balances[whistleblower_index],
|
|
whistleblower_reward.saturating_sub(proposer_reward)
|
|
);
|
|
|
|
Ok(())
|
|
}
|