mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-08 23:18:15 -05:00
* backfill service * fix bug where origin state is never unlocked * support mvslice states * use renamed interface * refactor db code to skip block cache for backfill * lint * add test for verifier.verify * enable service in service init test * cancellation cleanup * adding nil checks to configset juggling * assume blocks are available by default As long as we're sure the AvailableBlocker is initialized correctly during node startup, defaulting to assuming we aren't in a checkpoint sync simplifies things greatly for tests. * block saving path refactor and bugfix * fix fillback test * fix BackfillStatus init tests --------- Co-authored-by: Kasey Kirkham <kasey@users.noreply.github.com>
126 lines
3.8 KiB
Go
126 lines
3.8 KiB
Go
package backfill
|
|
|
|
import (
|
|
"github.com/pkg/errors"
|
|
"github.com/prysmaticlabs/prysm/v4/beacon-chain/core/signing"
|
|
fieldparams "github.com/prysmaticlabs/prysm/v4/config/fieldparams"
|
|
"github.com/prysmaticlabs/prysm/v4/config/params"
|
|
"github.com/prysmaticlabs/prysm/v4/consensus-types/blocks"
|
|
"github.com/prysmaticlabs/prysm/v4/consensus-types/interfaces"
|
|
"github.com/prysmaticlabs/prysm/v4/consensus-types/primitives"
|
|
"github.com/prysmaticlabs/prysm/v4/crypto/bls"
|
|
"github.com/prysmaticlabs/prysm/v4/network/forks"
|
|
"github.com/prysmaticlabs/prysm/v4/time/slots"
|
|
)
|
|
|
|
var errInvalidBatchChain = errors.New("parent_root of block does not match the previous block's root")
|
|
var errProposerIndexTooHigh = errors.New("proposer index not present in origin state")
|
|
var errUnknownDomain = errors.New("runtime error looking up signing domain for fork")
|
|
|
|
// VerifiedROBlocks represents a slice of blocks that have passed signature verification.
|
|
type VerifiedROBlocks []blocks.ROBlock
|
|
|
|
type verifier struct {
|
|
keys [][fieldparams.BLSPubkeyLength]byte
|
|
maxVal primitives.ValidatorIndex
|
|
domain *domainCache
|
|
}
|
|
|
|
// TODO: rewrite this to use ROBlock.
|
|
func (vr verifier) verify(blks []interfaces.ReadOnlySignedBeaconBlock) (VerifiedROBlocks, error) {
|
|
var err error
|
|
result := make([]blocks.ROBlock, len(blks))
|
|
sigSet := bls.NewSet()
|
|
for i := range blks {
|
|
result[i], err = blocks.NewROBlock(blks[i])
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if i > 0 && result[i-1].Root() != result[i].Block().ParentRoot() {
|
|
p, b := result[i-1], result[i]
|
|
return nil, errors.Wrapf(errInvalidBatchChain,
|
|
"slot %d parent_root=%#x, slot %d root=%#x",
|
|
b.Block().Slot(), b.Block().ParentRoot(),
|
|
p.Block().Slot(), p.Root())
|
|
}
|
|
set, err := vr.blockSignatureBatch(result[i])
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
sigSet.Join(set)
|
|
}
|
|
v, err := sigSet.Verify()
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "block signature verification error")
|
|
}
|
|
if !v {
|
|
return nil, errors.New("batch block signature verification failed")
|
|
}
|
|
return result, nil
|
|
}
|
|
|
|
func (vr verifier) blockSignatureBatch(b blocks.ROBlock) (*bls.SignatureBatch, error) {
|
|
pidx := b.Block().ProposerIndex()
|
|
if pidx > vr.maxVal {
|
|
return nil, errProposerIndexTooHigh
|
|
}
|
|
dom, err := vr.domain.forEpoch(slots.ToEpoch(b.Block().Slot()))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
sig := b.Signature()
|
|
pk := vr.keys[pidx][:]
|
|
root := b.Root()
|
|
rootF := func() ([32]byte, error) { return root, nil }
|
|
return signing.BlockSignatureBatch(pk, sig[:], dom, rootF)
|
|
}
|
|
|
|
func newBackfillVerifier(vr []byte, keys [][fieldparams.BLSPubkeyLength]byte) (*verifier, error) {
|
|
dc, err := newDomainCache(vr, params.BeaconConfig().DomainBeaconProposer,
|
|
forks.NewOrderedSchedule(params.BeaconConfig()))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
v := &verifier{
|
|
keys: keys,
|
|
domain: dc,
|
|
}
|
|
v.maxVal = primitives.ValidatorIndex(len(v.keys) - 1)
|
|
return v, nil
|
|
}
|
|
|
|
// domainCache provides a fast signing domain lookup by epoch.
|
|
type domainCache struct {
|
|
fsched forks.OrderedSchedule
|
|
forkDomains map[[4]byte][]byte
|
|
dType [bls.DomainByteLength]byte
|
|
}
|
|
|
|
func newDomainCache(vRoot []byte, dType [bls.DomainByteLength]byte, fsched forks.OrderedSchedule) (*domainCache, error) {
|
|
dc := &domainCache{
|
|
fsched: fsched,
|
|
forkDomains: make(map[[4]byte][]byte),
|
|
dType: dType,
|
|
}
|
|
for _, entry := range fsched {
|
|
d, err := signing.ComputeDomain(dc.dType, entry.Version[:], vRoot)
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "failed to pre-compute signing domain for fork version=%#x", entry.Version)
|
|
}
|
|
dc.forkDomains[entry.Version] = d
|
|
}
|
|
return dc, nil
|
|
}
|
|
|
|
func (dc *domainCache) forEpoch(e primitives.Epoch) ([]byte, error) {
|
|
fork, err := dc.fsched.VersionForEpoch(e)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
d, ok := dc.forkDomains[fork]
|
|
if !ok {
|
|
return nil, errors.Wrapf(errUnknownDomain, "fork version=%#x, epoch=%d", fork, e)
|
|
}
|
|
return d, nil
|
|
}
|