8.8 KiB
EIP-7732 -- Honest Validator
This document represents the changes and additions to the Honest validator guide included in the EIP-7732 fork.
Table of Contents
Validator assignment
A validator may be a member of the new Payload Timeliness Committee (PTC) for a given slot. To check for PTC assignments the validator uses the helper get_ptc_assignment(state, epoch, validator_index) where epoch <= next_epoch.
PTC committee selection is only stable within the context of the current and next epoch.
def get_ptc_assignment(
state: BeaconState,
epoch: Epoch,
validator_index: ValidatorIndex) -> Optional[Slot]:
"""
Returns the slot during the requested epoch in which the validator with index `validator_index`
is a member of the PTC. Returns None if no assignment is found.
"""
next_epoch = Epoch(get_current_epoch(state) + 1)
assert epoch <= next_epoch
start_slot = compute_start_slot_at_epoch(epoch)
for slot in range(start_slot, start_slot + SLOTS_PER_EPOCH):
if validator_index in get_ptc(state, Slot(slot)):
return Slot(slot)
return None
Lookahead
[New in EIP-7732]
get_ptc_assignment should be called at the start of each epoch to get the assignment for the next epoch (current_epoch + 1). A validator should plan for future assignments by noting their assigned PTC slot.
Beacon chain responsibilities
All validator responsibilities remain unchanged other than the following:
- Proposers are no longer required to broadcast
BlobSidecarobjects, as this becomes a builder's duty. - Some validators are selected per slot to become PTC members, these validators must broadcast
PayloadAttestationMessageobjects during the assigned slot before the deadline of3 * SECONDS_PER_SLOT // INTERVALS_PER_SLOTseconds into the slot.
Attestation
Attestation duties are not changed for validators, however the attestation deadline is implicitly changed by the change in INTERVALS_PER_SLOT.
Sync Committee participations
Sync committee duties are not changed for validators, however the submission deadline is implicitly changed by the change in INTERVALS_PER_SLOT.
Block proposal
Validators are still expected to propose SignedBeaconBlock at the beginning of any slot during which is_proposer(state, validator_index) returns true. The mechanism to prepare this beacon block and related sidecars differs from previous forks as follows
Constructing the new signed_execution_payload_header field in BeaconBlockBody
To obtain signed_execution_payload_header, a block proposer building a block on top of a state must take the following actions:
- Listen to the
execution_payload_headergossip global topic and save an acceptedsigned_execution_payload_headerfrom a builder. Proposer MAY obtain these signed messages by other off-protocol means. - The
signed_execution_payload_headermust satisfy the verification conditions found inprocess_execution_payload_header, that is- The header signature must be valid
- The builder balance can cover the header value
- The header slot is for the proposal block slot
- The header parent block hash equals the state's
latest_block_hash. - The header parent block root equals the current block's
parent_root.
- Select one bid and set
body.signed_execution_payload_header = signed_execution_payload_header
Constructing the new payload_attestations field in BeaconBlockBody
Up to MAX_PAYLOAD_ATTESTATIONS, aggregate payload attestations can be included in the block. The validator will have to
- Listen to the
payload_attestation_messagegossip global topic - The payload attestations added must satisfy the verification conditions found in payload attestation gossip validation and payload attestation processing. This means
- The
data.beacon_block_rootcorresponds toblock.parent_root. - The slot of the parent block is exactly one slot before the proposing slot.
- The signature of the payload attestation data message verifies correctly.
- The
- The proposer needs to aggregate all payload attestations with the same data into a given
PayloadAttestationobject. For this it needs to fill theaggregation_bitsfield by using the relative position of the validator indices with respect to the PTC that is obtained fromget_ptc(state, block_slot - 1). - The proposer should only include payload attestations that are consistent with the current block they are proposing. That is, if the previous block had a payload, they should only include attestations with
payload_status = PAYLOAD_PRESENT. Proposers are penalized for attestations that are not-consistent with their view.
Blob sidecars
The blob sidecars are no longer broadcast by the validator, and thus their construction is not necessary. This deprecates the corresponding sections from the honest validator guide in the Electra fork, moving them, albeit with some modifications, to the honest Builder guide
Payload timeliness attestation
Some validators are selected to submit payload timeliness attestations. Validators should call get_ptc_assignment at the beginning of an epoch to be prepared to submit their PTC attestations during the next epoch.
A validator should create and broadcast the payload_attestation_message to the global execution attestation subnet not after SECONDS_PER_SLOT * 3 / INTERVALS_PER_SLOT seconds since the start of slot
Constructing a payload attestation
If a validator is in the payload attestation committee for the current slot (as obtained from get_ptc_assignment above) then the validator should prepare a PayloadAttestationMessage for the current slot,
according to the logic in get_payload_attestation_message below and broadcast it not after SECONDS_PER_SLOT * 3 / INTERVALS_PER_SLOT seconds since the start of the slot, to the global payload_attestation_message pubsub topic.
The validator creates payload_attestation_message as follows:
- If the validator has not seen any beacon block for the assigned slot, do not submit a payload attestation. It will be ignored anyway.
- Set
data.beacon_block_rootbe the HTR of the beacon block seen for the assigned slot - Set
data.slotto be the assigned slot. - Set
data.payload_statusas follows- If a
SignedExecutionPayloadEnvelopehas been seen referencing the blockdata.beacon_block_rootand the envelope haspayload_withheld = False, set toPAYLOAD_PRESENT. - If a
SignedExecutionPayloadEnvelopehas been seen referencing the blockdata.beacon_block_rootand the envelope haspayload_withheld = True, set toPAYLOAD_WITHHELD. - If no
SignedExecutionPayloadEnvelopehas been seen referencing the blockdata.beacon_block_rootset toPAYLOAD_ABSENT.
- If a
- Set
payload_attestation_message.validator_index = validator_indexwherevalidator_indexis the validator chosen to submit. The private key mapping tostate.validators[validator_index].pubkeyis used to sign the payload timeliness attestation. - Sign the
payload_attestation_message.datausing the helperget_payload_attestation_message_signature.
Notice that the attester only signs the PayloadAttestationData and not the validator_index field in the message. Proposers need to aggregate these attestations as described above.
def get_payload_attestation_message_signature(
state: BeaconState, attestation: PayloadAttestationMessage, privkey: int) -> BLSSignature:
domain = get_domain(state, DOMAIN_PTC_ATTESTER, compute_epoch_at_slot(attestation.data.slot))
signing_root = compute_signing_root(attestation.data, domain)
return bls.Sign(privkey, signing_root)
Remark Validators do not need to check the full validity of the ExecutionPayload contained in within the envelope, but the checks in the P2P guide should pass for the SignedExecutionPayloadEnvelope.