mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-19 04:42:34 +00:00
## Issue Addressed Implements support for importing and exporting the slashing protection DB interchange format described here: https://hackmd.io/@sproul/Bk0Y0qdGD Also closes #1584 ## Proposed Changes * [x] Support for serializing and deserializing the format * [x] Support for importing and exporting Lighthouse's database * [x] CLI commands to invoke import and export * [x] Export to minimal format (required when a minimal format has been previously imported) * [x] Tests for export to minimal (utilising mixed importing and attestation signing?) * [x] Tests for import/export of complete format, and import of minimal format * [x] ~~Prevent attestations with sources less than our max source (Danny's suggestion). Required for the fake attestation that we put in for the minimal format to block attestations from source 0.~~ * [x] Add the concept of a "low watermark" for compatibility with the minimal format Bonus! * [x] A fix to a potentially nasty bug involving validators getting re-registered each time the validator client ran! Thankfully, the ordering of keys meant that the validator IDs used for attestations and blocks remained stable -- otherwise we could have had some slashings on our hands! 😱 * [x] Tests to confirm that this bug is indeed vanquished
63 lines
2.3 KiB
Rust
63 lines
2.3 KiB
Rust
use crate::hash256_from_row;
|
|
use types::{AttestationData, Epoch, Hash256, SignedRoot};
|
|
|
|
/// An attestation that has previously been signed.
|
|
#[derive(Clone, Debug, PartialEq)]
|
|
pub struct SignedAttestation {
|
|
pub source_epoch: Epoch,
|
|
pub target_epoch: Epoch,
|
|
pub signing_root: Hash256,
|
|
}
|
|
|
|
/// Reasons why an attestation may be slashable (or invalid).
|
|
#[derive(PartialEq, Debug)]
|
|
pub enum InvalidAttestation {
|
|
/// The attestation has the same target epoch as an attestation from the DB (enclosed).
|
|
DoubleVote(SignedAttestation),
|
|
/// The attestation surrounds an existing attestation from the database (`prev`).
|
|
NewSurroundsPrev { prev: SignedAttestation },
|
|
/// The attestation is surrounded by an existing attestation from the database (`prev`).
|
|
PrevSurroundsNew { prev: SignedAttestation },
|
|
/// The attestation is invalid because its source epoch is greater than its target epoch.
|
|
SourceExceedsTarget,
|
|
/// The attestation is invalid because its source epoch is less than the lower bound on source
|
|
/// epochs for this validator.
|
|
SourceLessThanLowerBound {
|
|
source_epoch: Epoch,
|
|
bound_epoch: Epoch,
|
|
},
|
|
/// The attestation is invalid because its target epoch is less than or equal to the lower
|
|
/// bound on target epochs for this validator.
|
|
TargetLessThanOrEqLowerBound {
|
|
target_epoch: Epoch,
|
|
bound_epoch: Epoch,
|
|
},
|
|
}
|
|
|
|
impl SignedAttestation {
|
|
pub fn new(source_epoch: Epoch, target_epoch: Epoch, signing_root: Hash256) -> Self {
|
|
Self {
|
|
source_epoch,
|
|
target_epoch,
|
|
signing_root,
|
|
}
|
|
}
|
|
|
|
/// Create a `SignedAttestation` from attestation data and a domain.
|
|
pub fn from_attestation(attestation: &AttestationData, domain: Hash256) -> Self {
|
|
Self {
|
|
source_epoch: attestation.source.epoch,
|
|
target_epoch: attestation.target.epoch,
|
|
signing_root: attestation.signing_root(domain),
|
|
}
|
|
}
|
|
|
|
/// Create a `SignedAttestation` from an SQLite row of `(source, target, signing_root)`.
|
|
pub fn from_row(row: &rusqlite::Row) -> rusqlite::Result<Self> {
|
|
let source = row.get(0)?;
|
|
let target = row.get(1)?;
|
|
let signing_root = hash256_from_row(2, row)?;
|
|
Ok(SignedAttestation::new(source, target, signing_root))
|
|
}
|
|
}
|