mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-10 16:08:26 -05:00
* Prepare for future fork boilerplate. * Implement the Fulu fork boilerplate. * `Upgraded state to <fork> log`: Move from debug to info. Rationale: This log is the only one notifying the user a new fork happened. A new fork is always a little bit stressful for a node operator. Having at least one log indicating the client switched fork is something useful. * Update testing/util/helpers.go Co-authored-by: Radosław Kapka <rkapka@wp.pl> * Fix Radek's comment. * Fix Radek's comment. * Update beacon-chain/state/state-native/state_trie.go Co-authored-by: Radosław Kapka <rkapka@wp.pl> * Update beacon-chain/state/state-native/state_trie.go Co-authored-by: Radosław Kapka <rkapka@wp.pl> * Fix Radek's comment. * Fix Radek's comment. * Fix Radek's comment. * Remove Electra struct type aliasing. --------- Co-authored-by: Radosław Kapka <rkapka@wp.pl>
180 lines
6.2 KiB
Go
180 lines
6.2 KiB
Go
package util
|
|
|
|
import (
|
|
"context"
|
|
"encoding/binary"
|
|
"fmt"
|
|
"math"
|
|
"testing"
|
|
|
|
"github.com/pkg/errors"
|
|
"github.com/prysmaticlabs/prysm/v5/beacon-chain/core/helpers"
|
|
"github.com/prysmaticlabs/prysm/v5/beacon-chain/core/signing"
|
|
"github.com/prysmaticlabs/prysm/v5/beacon-chain/core/time"
|
|
"github.com/prysmaticlabs/prysm/v5/beacon-chain/core/transition"
|
|
"github.com/prysmaticlabs/prysm/v5/beacon-chain/state"
|
|
"github.com/prysmaticlabs/prysm/v5/config/params"
|
|
"github.com/prysmaticlabs/prysm/v5/consensus-types/blocks"
|
|
"github.com/prysmaticlabs/prysm/v5/consensus-types/interfaces"
|
|
"github.com/prysmaticlabs/prysm/v5/consensus-types/primitives"
|
|
"github.com/prysmaticlabs/prysm/v5/crypto/bls"
|
|
"github.com/prysmaticlabs/prysm/v5/crypto/rand"
|
|
ethpb "github.com/prysmaticlabs/prysm/v5/proto/prysm/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/v5/runtime/version"
|
|
"github.com/prysmaticlabs/prysm/v5/testing/require"
|
|
)
|
|
|
|
// RandaoReveal returns a signature of the requested epoch using the beacon proposer private key.
|
|
func RandaoReveal(beaconState state.ReadOnlyBeaconState, epoch primitives.Epoch, privKeys []bls.SecretKey) ([]byte, error) {
|
|
// We fetch the proposer's index as that is whom the RANDAO will be verified against.
|
|
proposerIdx, err := helpers.BeaconProposerIndex(context.Background(), beaconState)
|
|
if err != nil {
|
|
return []byte{}, errors.Wrap(err, "could not get beacon proposer index")
|
|
}
|
|
buf := make([]byte, 32)
|
|
binary.LittleEndian.PutUint64(buf, uint64(epoch))
|
|
|
|
// We make the previous validator's index sign the message instead of the proposer.
|
|
sszEpoch := primitives.SSZUint64(epoch)
|
|
return signing.ComputeDomainAndSign(beaconState, epoch, &sszEpoch, params.BeaconConfig().DomainRandao, privKeys[proposerIdx])
|
|
}
|
|
|
|
// BlockSignature calculates the post-state root of the block and returns the signature.
|
|
func BlockSignature(
|
|
bState state.BeaconState,
|
|
block interface{},
|
|
privKeys []bls.SecretKey,
|
|
) (bls.Signature, error) {
|
|
var wsb interfaces.ReadOnlySignedBeaconBlock
|
|
var err error
|
|
// copy the state since we need to process slots
|
|
bState = bState.Copy()
|
|
switch b := block.(type) {
|
|
case *ethpb.BeaconBlock:
|
|
wsb, err = blocks.NewSignedBeaconBlock(ðpb.SignedBeaconBlock{Block: b})
|
|
case *ethpb.BeaconBlockAltair:
|
|
wsb, err = blocks.NewSignedBeaconBlock(ðpb.SignedBeaconBlockAltair{Block: b})
|
|
case *ethpb.BeaconBlockBellatrix:
|
|
wsb, err = blocks.NewSignedBeaconBlock(ðpb.SignedBeaconBlockBellatrix{Block: b})
|
|
case *ethpb.BeaconBlockCapella:
|
|
wsb, err = blocks.NewSignedBeaconBlock(ðpb.SignedBeaconBlockCapella{Block: b})
|
|
case *ethpb.BeaconBlockDeneb:
|
|
wsb, err = blocks.NewSignedBeaconBlock(ðpb.SignedBeaconBlockDeneb{Block: b})
|
|
case *ethpb.BeaconBlockElectra:
|
|
wsb, err = blocks.NewSignedBeaconBlock(ðpb.SignedBeaconBlockElectra{Block: b})
|
|
default:
|
|
return nil, fmt.Errorf("unsupported block type %T", b)
|
|
}
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "could not wrap block")
|
|
}
|
|
s, err := transition.CalculateStateRoot(context.Background(), bState, wsb)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "could not calculate state root")
|
|
}
|
|
|
|
switch b := block.(type) {
|
|
case *ethpb.BeaconBlock:
|
|
b.StateRoot = s[:]
|
|
case *ethpb.BeaconBlockAltair:
|
|
b.StateRoot = s[:]
|
|
case *ethpb.BeaconBlockBellatrix:
|
|
b.StateRoot = s[:]
|
|
case *ethpb.BeaconBlockCapella:
|
|
b.StateRoot = s[:]
|
|
case *ethpb.BeaconBlockDeneb:
|
|
b.StateRoot = s[:]
|
|
case *ethpb.BeaconBlockElectra:
|
|
b.StateRoot = s[:]
|
|
}
|
|
|
|
// Temporarily increasing the beacon state slot here since BeaconProposerIndex is a
|
|
// function deterministic on beacon state slot.
|
|
var blockSlot primitives.Slot
|
|
switch b := block.(type) {
|
|
case *ethpb.BeaconBlock:
|
|
blockSlot = b.Slot
|
|
case *ethpb.BeaconBlockAltair:
|
|
blockSlot = b.Slot
|
|
case *ethpb.BeaconBlockBellatrix:
|
|
blockSlot = b.Slot
|
|
case *ethpb.BeaconBlockCapella:
|
|
blockSlot = b.Slot
|
|
case *ethpb.BeaconBlockDeneb:
|
|
blockSlot = b.Slot
|
|
case *ethpb.BeaconBlockElectra:
|
|
blockSlot = b.Slot
|
|
}
|
|
|
|
// process slots to get the right fork
|
|
bState, err = transition.ProcessSlots(context.Background(), bState, blockSlot)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
domain, err := signing.Domain(bState.Fork(), time.CurrentEpoch(bState), params.BeaconConfig().DomainBeaconProposer, bState.GenesisValidatorsRoot())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
var blockRoot [32]byte
|
|
switch b := block.(type) {
|
|
case *ethpb.BeaconBlock:
|
|
blockRoot, err = signing.ComputeSigningRoot(b, domain)
|
|
case *ethpb.BeaconBlockAltair:
|
|
blockRoot, err = signing.ComputeSigningRoot(b, domain)
|
|
case *ethpb.BeaconBlockBellatrix:
|
|
blockRoot, err = signing.ComputeSigningRoot(b, domain)
|
|
case *ethpb.BeaconBlockCapella:
|
|
blockRoot, err = signing.ComputeSigningRoot(b, domain)
|
|
case *ethpb.BeaconBlockDeneb:
|
|
blockRoot, err = signing.ComputeSigningRoot(b, domain)
|
|
case *ethpb.BeaconBlockElectra:
|
|
blockRoot, err = signing.ComputeSigningRoot(b, domain)
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
proposerIdx, err := helpers.BeaconProposerIndex(context.Background(), bState)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return privKeys[proposerIdx].Sign(blockRoot[:]), nil
|
|
}
|
|
|
|
// Random32Bytes generates a random 32 byte slice.
|
|
func Random32Bytes(t *testing.T) []byte {
|
|
b := make([]byte, 32)
|
|
_, err := rand.NewDeterministicGenerator().Read(b)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
return b
|
|
}
|
|
|
|
// HackForksMaxuint is helpful for tests that need to set up cases for some future forks.
|
|
// We have unit tests that assert our config matches the upstream config, where some forks epoch are always
|
|
// set to MaxUint64 until they are formally set. This creates an issue for tests that want to
|
|
// work with slots that are defined to be after these forks because converting the max epoch to a slot leads
|
|
// to multiplication overflow.
|
|
// Monkey patching tests with this function is the simplest workaround in these cases.
|
|
func HackForksMaxuint(t *testing.T, forksVersion []int) func() {
|
|
bc := params.MainnetConfig().Copy()
|
|
for _, forkVersion := range forksVersion {
|
|
switch forkVersion {
|
|
case version.Electra:
|
|
bc.ElectraForkEpoch = math.MaxUint32 - 1
|
|
case version.Fulu:
|
|
bc.FuluForkEpoch = math.MaxUint32
|
|
default:
|
|
t.Fatalf("unsupported fork version %d", forkVersion)
|
|
}
|
|
}
|
|
undo, err := params.SetActiveWithUndo(bc)
|
|
require.NoError(t, err)
|
|
return func() {
|
|
require.NoError(t, undo())
|
|
}
|
|
}
|