mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-03 00:31:50 +00:00
* Update state processing for v0.12 * Fix EF test runners for v0.12 * Fix some tests * Fix broken attestation verification test * More test fixes * Fix typo found in review
428 lines
13 KiB
Rust
428 lines
13 KiB
Rust
//! A `SignatureSet` is an abstraction over the components of a signature. A `SignatureSet` may be
|
|
//! validated individually, or alongside in others in a potentially cheaper bulk operation.
|
|
//!
|
|
//! This module exposes one function to extract each type of `SignatureSet` from a `BeaconBlock`.
|
|
use bls::SignatureSet;
|
|
use ssz::DecodeError;
|
|
use std::borrow::Cow;
|
|
use std::convert::TryInto;
|
|
use tree_hash::TreeHash;
|
|
use types::{
|
|
AggregateSignature, AttesterSlashing, BeaconBlock, BeaconState, BeaconStateError, ChainSpec,
|
|
DepositData, Domain, EthSpec, Fork, Hash256, IndexedAttestation, ProposerSlashing, PublicKey,
|
|
Signature, SignedAggregateAndProof, SignedBeaconBlock, SignedBeaconBlockHeader, SignedRoot,
|
|
SignedVoluntaryExit, SigningData,
|
|
};
|
|
|
|
pub type Result<T> = std::result::Result<T, Error>;
|
|
|
|
#[derive(Debug, PartialEq, Clone)]
|
|
pub enum Error {
|
|
/// Signature verification failed. The block is invalid.
|
|
SignatureInvalid(DecodeError),
|
|
/// There was an error attempting to read from a `BeaconState`. Block
|
|
/// validity was not determined.
|
|
BeaconStateError(BeaconStateError),
|
|
/// Attempted to find the public key of a validator that does not exist. You cannot distinguish
|
|
/// between an error and an invalid block in this case.
|
|
ValidatorUnknown(u64),
|
|
/// The `BeaconBlock` has a `proposer_index` that does not match the index we computed locally.
|
|
///
|
|
/// The block is invalid.
|
|
IncorrectBlockProposer { block: u64, local_shuffling: u64 },
|
|
/// The public keys supplied do not match the number of objects requiring keys. Block validity
|
|
/// was not determined.
|
|
MismatchedPublicKeyLen { pubkey_len: usize, other_len: usize },
|
|
/// The public key bytes stored in the `BeaconState` were not valid. This is a serious internal
|
|
/// error.
|
|
BadBlsBytes { validator_index: u64 },
|
|
}
|
|
|
|
impl From<BeaconStateError> for Error {
|
|
fn from(e: BeaconStateError) -> Error {
|
|
Error::BeaconStateError(e)
|
|
}
|
|
}
|
|
|
|
/// Helper function to get a public key from a `state`.
|
|
pub fn get_pubkey_from_state<'a, T>(
|
|
state: &'a BeaconState<T>,
|
|
validator_index: usize,
|
|
) -> Option<Cow<'a, PublicKey>>
|
|
where
|
|
T: EthSpec,
|
|
{
|
|
state
|
|
.validators
|
|
.get(validator_index)
|
|
.and_then(|v| {
|
|
let pk: Option<PublicKey> = (&v.pubkey).try_into().ok();
|
|
pk
|
|
})
|
|
.map(Cow::Owned)
|
|
}
|
|
|
|
/// A signature set that is valid if a block was signed by the expected block producer.
|
|
pub fn block_proposal_signature_set<'a, T, F>(
|
|
state: &'a BeaconState<T>,
|
|
get_pubkey: F,
|
|
signed_block: &'a SignedBeaconBlock<T>,
|
|
block_root: Option<Hash256>,
|
|
spec: &'a ChainSpec,
|
|
) -> Result<SignatureSet>
|
|
where
|
|
T: EthSpec,
|
|
F: Fn(usize) -> Option<Cow<'a, PublicKey>>,
|
|
{
|
|
let block = &signed_block.message;
|
|
let proposer_index = state.get_beacon_proposer_index(block.slot, spec)?;
|
|
|
|
if proposer_index as u64 != block.proposer_index {
|
|
return Err(Error::IncorrectBlockProposer {
|
|
block: block.proposer_index,
|
|
local_shuffling: proposer_index as u64,
|
|
});
|
|
}
|
|
|
|
let domain = spec.get_domain(
|
|
block.slot.epoch(T::slots_per_epoch()),
|
|
Domain::BeaconProposer,
|
|
&state.fork,
|
|
state.genesis_validators_root,
|
|
);
|
|
|
|
let message = if let Some(root) = block_root {
|
|
SigningData {
|
|
object_root: root,
|
|
domain,
|
|
}
|
|
.tree_hash_root()
|
|
} else {
|
|
block.signing_root(domain)
|
|
};
|
|
|
|
Ok(SignatureSet::single(
|
|
&signed_block.signature,
|
|
get_pubkey(proposer_index).ok_or_else(|| Error::ValidatorUnknown(proposer_index as u64))?,
|
|
message.as_bytes().to_vec(),
|
|
))
|
|
}
|
|
|
|
/// A signature set that is valid if the block proposers randao reveal signature is correct.
|
|
pub fn randao_signature_set<'a, T, F>(
|
|
state: &'a BeaconState<T>,
|
|
get_pubkey: F,
|
|
block: &'a BeaconBlock<T>,
|
|
spec: &'a ChainSpec,
|
|
) -> Result<SignatureSet>
|
|
where
|
|
T: EthSpec,
|
|
F: Fn(usize) -> Option<Cow<'a, PublicKey>>,
|
|
{
|
|
let proposer_index = state.get_beacon_proposer_index(block.slot, spec)?;
|
|
|
|
let domain = spec.get_domain(
|
|
block.slot.epoch(T::slots_per_epoch()),
|
|
Domain::Randao,
|
|
&state.fork,
|
|
state.genesis_validators_root,
|
|
);
|
|
|
|
let message = block.slot.epoch(T::slots_per_epoch()).signing_root(domain);
|
|
|
|
Ok(SignatureSet::single(
|
|
&block.body.randao_reveal,
|
|
get_pubkey(proposer_index).ok_or_else(|| Error::ValidatorUnknown(proposer_index as u64))?,
|
|
message.as_bytes().to_vec(),
|
|
))
|
|
}
|
|
|
|
/// Returns two signature sets, one for each `BlockHeader` included in the `ProposerSlashing`.
|
|
pub fn proposer_slashing_signature_set<'a, T, F>(
|
|
state: &'a BeaconState<T>,
|
|
get_pubkey: F,
|
|
proposer_slashing: &'a ProposerSlashing,
|
|
spec: &'a ChainSpec,
|
|
) -> Result<(SignatureSet, SignatureSet)>
|
|
where
|
|
T: EthSpec,
|
|
F: Fn(usize) -> Option<Cow<'a, PublicKey>>,
|
|
{
|
|
let proposer_index = proposer_slashing.signed_header_1.message.proposer_index as usize;
|
|
|
|
Ok((
|
|
block_header_signature_set(
|
|
state,
|
|
&proposer_slashing.signed_header_1,
|
|
get_pubkey(proposer_index)
|
|
.ok_or_else(|| Error::ValidatorUnknown(proposer_index as u64))?,
|
|
spec,
|
|
)?,
|
|
block_header_signature_set(
|
|
state,
|
|
&proposer_slashing.signed_header_2,
|
|
get_pubkey(proposer_index)
|
|
.ok_or_else(|| Error::ValidatorUnknown(proposer_index as u64))?,
|
|
spec,
|
|
)?,
|
|
))
|
|
}
|
|
|
|
/// Returns a signature set that is valid if the given `pubkey` signed the `header`.
|
|
fn block_header_signature_set<'a, T: EthSpec>(
|
|
state: &'a BeaconState<T>,
|
|
signed_header: &'a SignedBeaconBlockHeader,
|
|
pubkey: Cow<'a, PublicKey>,
|
|
spec: &'a ChainSpec,
|
|
) -> Result<SignatureSet> {
|
|
let domain = spec.get_domain(
|
|
signed_header.message.slot.epoch(T::slots_per_epoch()),
|
|
Domain::BeaconProposer,
|
|
&state.fork,
|
|
state.genesis_validators_root,
|
|
);
|
|
|
|
let message = signed_header
|
|
.message
|
|
.signing_root(domain)
|
|
.as_bytes()
|
|
.to_vec();
|
|
|
|
Ok(SignatureSet::single(
|
|
&signed_header.signature,
|
|
pubkey,
|
|
message,
|
|
))
|
|
}
|
|
|
|
/// Returns the signature set for the given `indexed_attestation`.
|
|
pub fn indexed_attestation_signature_set<'a, 'b, T, F>(
|
|
state: &'a BeaconState<T>,
|
|
get_pubkey: F,
|
|
signature: &'a AggregateSignature,
|
|
indexed_attestation: &'b IndexedAttestation<T>,
|
|
spec: &'a ChainSpec,
|
|
) -> Result<SignatureSet>
|
|
where
|
|
T: EthSpec,
|
|
F: Fn(usize) -> Option<Cow<'a, PublicKey>>,
|
|
{
|
|
let pubkeys = indexed_attestation
|
|
.attesting_indices
|
|
.into_iter()
|
|
.map(|&validator_idx| {
|
|
Ok(get_pubkey(validator_idx as usize)
|
|
.ok_or_else(|| Error::ValidatorUnknown(validator_idx))?)
|
|
})
|
|
.collect::<Result<_>>()?;
|
|
|
|
let domain = spec.get_domain(
|
|
indexed_attestation.data.target.epoch,
|
|
Domain::BeaconAttester,
|
|
&state.fork,
|
|
state.genesis_validators_root,
|
|
);
|
|
|
|
let message = indexed_attestation.data.signing_root(domain);
|
|
let message = message.as_bytes().to_vec();
|
|
|
|
Ok(SignatureSet::new(signature, pubkeys, message))
|
|
}
|
|
|
|
/// Returns the signature set for the given `indexed_attestation` but pubkeys are supplied directly
|
|
/// instead of from the state.
|
|
pub fn indexed_attestation_signature_set_from_pubkeys<'a, 'b, T, F>(
|
|
get_pubkey: F,
|
|
signature: &'a AggregateSignature,
|
|
indexed_attestation: &'b IndexedAttestation<T>,
|
|
fork: &Fork,
|
|
genesis_validators_root: Hash256,
|
|
spec: &'a ChainSpec,
|
|
) -> Result<SignatureSet>
|
|
where
|
|
T: EthSpec,
|
|
F: Fn(usize) -> Option<Cow<'a, PublicKey>>,
|
|
{
|
|
let pubkeys = indexed_attestation
|
|
.attesting_indices
|
|
.into_iter()
|
|
.map(|&validator_idx| {
|
|
Ok(get_pubkey(validator_idx as usize)
|
|
.ok_or_else(|| Error::ValidatorUnknown(validator_idx))?)
|
|
})
|
|
.collect::<Result<_>>()?;
|
|
|
|
let domain = spec.get_domain(
|
|
indexed_attestation.data.target.epoch,
|
|
Domain::BeaconAttester,
|
|
&fork,
|
|
genesis_validators_root,
|
|
);
|
|
|
|
let message = indexed_attestation.data.signing_root(domain);
|
|
let message = message.as_bytes().to_vec();
|
|
|
|
Ok(SignatureSet::new(signature, pubkeys, message))
|
|
}
|
|
|
|
/// Returns the signature set for the given `attester_slashing` and corresponding `pubkeys`.
|
|
pub fn attester_slashing_signature_sets<'a, T, F>(
|
|
state: &'a BeaconState<T>,
|
|
get_pubkey: F,
|
|
attester_slashing: &'a AttesterSlashing<T>,
|
|
spec: &'a ChainSpec,
|
|
) -> Result<(SignatureSet, SignatureSet)>
|
|
where
|
|
T: EthSpec,
|
|
F: Fn(usize) -> Option<Cow<'a, PublicKey>> + Clone,
|
|
{
|
|
Ok((
|
|
indexed_attestation_signature_set(
|
|
state,
|
|
get_pubkey.clone(),
|
|
&attester_slashing.attestation_1.signature,
|
|
&attester_slashing.attestation_1,
|
|
spec,
|
|
)?,
|
|
indexed_attestation_signature_set(
|
|
state,
|
|
get_pubkey,
|
|
&attester_slashing.attestation_2.signature,
|
|
&attester_slashing.attestation_2,
|
|
spec,
|
|
)?,
|
|
))
|
|
}
|
|
|
|
/// Returns the BLS values in a `Deposit`, if they're all valid. Otherwise, returns `None`.
|
|
///
|
|
/// This method is separate to `deposit_signature_set` to satisfy lifetime requirements.
|
|
pub fn deposit_pubkey_signature_message(
|
|
deposit_data: &DepositData,
|
|
spec: &ChainSpec,
|
|
) -> Option<(PublicKey, Signature, Vec<u8>)> {
|
|
let pubkey = (&deposit_data.pubkey).try_into().ok()?;
|
|
let signature = (&deposit_data.signature).try_into().ok()?;
|
|
let domain = spec.get_deposit_domain();
|
|
let message = deposit_data
|
|
.as_deposit_message()
|
|
.signing_root(domain)
|
|
.as_bytes()
|
|
.to_vec();
|
|
Some((pubkey, signature, message))
|
|
}
|
|
|
|
/// Returns the signature set for some set of deposit signatures, made with
|
|
/// `deposit_pubkey_signature_message`.
|
|
pub fn deposit_signature_set<'a>(
|
|
pubkey_signature_message: &'a (PublicKey, Signature, Vec<u8>),
|
|
) -> SignatureSet {
|
|
let (pubkey, signature, message) = pubkey_signature_message;
|
|
|
|
// Note: Deposits are valid across forks, thus the deposit domain is computed
|
|
// with the fok zeroed.
|
|
SignatureSet::single(&signature, Cow::Borrowed(pubkey), message.clone())
|
|
}
|
|
|
|
/// Returns a signature set that is valid if the `SignedVoluntaryExit` was signed by the indicated
|
|
/// validator.
|
|
pub fn exit_signature_set<'a, T, F>(
|
|
state: &'a BeaconState<T>,
|
|
get_pubkey: F,
|
|
signed_exit: &'a SignedVoluntaryExit,
|
|
spec: &'a ChainSpec,
|
|
) -> Result<SignatureSet>
|
|
where
|
|
T: EthSpec,
|
|
F: Fn(usize) -> Option<Cow<'a, PublicKey>>,
|
|
{
|
|
let exit = &signed_exit.message;
|
|
let proposer_index = exit.validator_index as usize;
|
|
|
|
let domain = spec.get_domain(
|
|
exit.epoch,
|
|
Domain::VoluntaryExit,
|
|
&state.fork,
|
|
state.genesis_validators_root,
|
|
);
|
|
|
|
let message = exit.signing_root(domain).as_bytes().to_vec();
|
|
|
|
Ok(SignatureSet::single(
|
|
&signed_exit.signature,
|
|
get_pubkey(proposer_index).ok_or_else(|| Error::ValidatorUnknown(proposer_index as u64))?,
|
|
message,
|
|
))
|
|
}
|
|
|
|
pub fn signed_aggregate_selection_proof_signature_set<'a, T, F>(
|
|
get_pubkey: F,
|
|
signed_aggregate_and_proof: &'a SignedAggregateAndProof<T>,
|
|
fork: &Fork,
|
|
genesis_validators_root: Hash256,
|
|
spec: &'a ChainSpec,
|
|
) -> Result<SignatureSet>
|
|
where
|
|
T: EthSpec,
|
|
F: Fn(usize) -> Option<Cow<'a, PublicKey>>,
|
|
{
|
|
let slot = signed_aggregate_and_proof.message.aggregate.data.slot;
|
|
|
|
let domain = spec.get_domain(
|
|
slot.epoch(T::slots_per_epoch()),
|
|
Domain::SelectionProof,
|
|
fork,
|
|
genesis_validators_root,
|
|
);
|
|
let message = slot.signing_root(domain).as_bytes().to_vec();
|
|
let signature = &signed_aggregate_and_proof.message.selection_proof;
|
|
let validator_index = signed_aggregate_and_proof.message.aggregator_index;
|
|
|
|
Ok(SignatureSet::single(
|
|
signature,
|
|
get_pubkey(validator_index as usize)
|
|
.ok_or_else(|| Error::ValidatorUnknown(validator_index))?,
|
|
message,
|
|
))
|
|
}
|
|
|
|
pub fn signed_aggregate_signature_set<'a, T, F>(
|
|
get_pubkey: F,
|
|
signed_aggregate_and_proof: &'a SignedAggregateAndProof<T>,
|
|
fork: &Fork,
|
|
genesis_validators_root: Hash256,
|
|
spec: &'a ChainSpec,
|
|
) -> Result<SignatureSet>
|
|
where
|
|
T: EthSpec,
|
|
F: Fn(usize) -> Option<Cow<'a, PublicKey>>,
|
|
{
|
|
let target_epoch = signed_aggregate_and_proof
|
|
.message
|
|
.aggregate
|
|
.data
|
|
.target
|
|
.epoch;
|
|
|
|
let domain = spec.get_domain(
|
|
target_epoch,
|
|
Domain::AggregateAndProof,
|
|
fork,
|
|
genesis_validators_root,
|
|
);
|
|
let message = signed_aggregate_and_proof
|
|
.message
|
|
.signing_root(domain)
|
|
.as_bytes()
|
|
.to_vec();
|
|
let signature = &signed_aggregate_and_proof.signature;
|
|
let validator_index = signed_aggregate_and_proof.message.aggregator_index;
|
|
|
|
Ok(SignatureSet::single(
|
|
signature,
|
|
get_pubkey(validator_index as usize)
|
|
.ok_or_else(|| Error::ValidatorUnknown(validator_index))?,
|
|
message,
|
|
))
|
|
}
|