2018-11-23 23:58:49 +00:00
|
|
|
import
|
2019-01-14 12:19:44 +00:00
|
|
|
std_shims/[os_shims, objects], net, sequtils, options, tables,
|
2019-02-06 17:56:04 +00:00
|
|
|
chronos, chronicles, confutils, eth/[p2p, keys],
|
2019-01-26 19:32:10 +00:00
|
|
|
spec/[datatypes, digest, crypto, beaconstate, helpers, validator], conf, time,
|
2018-12-28 16:51:40 +00:00
|
|
|
state_transition, fork_choice, ssz, beacon_chain_db, validator_pool, extras,
|
2019-02-28 21:21:29 +00:00
|
|
|
attestation_pool, block_pool,
|
2019-02-18 10:34:39 +00:00
|
|
|
mainchain_monitor, gossipsub_protocol, trusted_state_snapshots,
|
2019-02-05 19:21:18 +00:00
|
|
|
eth/trie/db, eth/trie/backends/rocksdb_backend
|
2018-11-23 23:58:49 +00:00
|
|
|
|
|
|
|
type
|
|
|
|
BeaconNode* = ref object
|
|
|
|
network*: EthereumNode
|
|
|
|
db*: BeaconChainDB
|
2018-11-29 01:08:34 +00:00
|
|
|
config*: BeaconNodeConf
|
2018-11-23 23:58:49 +00:00
|
|
|
keys*: KeyPair
|
2018-11-26 13:33:06 +00:00
|
|
|
attachedValidators: ValidatorPool
|
2019-03-11 15:38:36 +00:00
|
|
|
blockPool*: BlockPool
|
2019-02-18 10:34:39 +00:00
|
|
|
state*: StateData
|
2018-12-28 16:51:40 +00:00
|
|
|
attestationPool: AttestationPool
|
2018-11-26 13:33:06 +00:00
|
|
|
mainchainMonitor: MainchainMonitor
|
2019-02-28 21:21:29 +00:00
|
|
|
potentialHeads: seq[Eth2Digest]
|
2018-11-23 23:58:49 +00:00
|
|
|
|
|
|
|
const
|
2018-11-29 01:08:34 +00:00
|
|
|
version = "v0.1" # TODO: read this from the nimble file
|
2018-11-23 23:58:49 +00:00
|
|
|
clientId = "nimbus beacon node " & version
|
2018-11-26 13:33:06 +00:00
|
|
|
|
|
|
|
topicBeaconBlocks = "ethereum/2.1/beacon_chain/blocks"
|
|
|
|
topicAttestations = "ethereum/2.1/beacon_chain/attestations"
|
2019-02-28 21:21:29 +00:00
|
|
|
topicfetchBlocks = "ethereum/2.1/beacon_chain/fetch"
|
2019-02-07 21:14:08 +00:00
|
|
|
|
2019-02-18 10:34:39 +00:00
|
|
|
|
|
|
|
proc onBeaconBlock*(node: BeaconNode, blck: BeaconBlock) {.gcsafe.}
|
|
|
|
|
|
|
|
import sync_protocol
|
|
|
|
|
|
|
|
|
2019-01-25 17:35:22 +00:00
|
|
|
func shortValidatorKey(node: BeaconNode, validatorIdx: int): string =
|
2019-02-28 21:21:29 +00:00
|
|
|
($node.state.data.validator_registry[validatorIdx].pubkey)[0..7]
|
|
|
|
|
|
|
|
func slotStart(node: BeaconNode, slot: Slot): Timestamp =
|
|
|
|
node.state.data.slotStart(slot)
|
2019-01-05 21:01:26 +00:00
|
|
|
|
2018-11-23 23:58:49 +00:00
|
|
|
proc ensureNetworkKeys*(dataDir: string): KeyPair =
|
|
|
|
# TODO:
|
|
|
|
# 1. Check if keys already exist in the data dir
|
|
|
|
# 2. Generate new ones and save them in the directory
|
|
|
|
# if necessary
|
|
|
|
return newKeyPair()
|
|
|
|
|
2018-11-29 01:08:34 +00:00
|
|
|
proc init*(T: type BeaconNode, conf: BeaconNodeConf): T =
|
2018-11-23 23:58:49 +00:00
|
|
|
new result
|
|
|
|
result.config = conf
|
2018-12-19 12:58:53 +00:00
|
|
|
|
2018-12-28 16:51:40 +00:00
|
|
|
result.attachedValidators = ValidatorPool.init
|
|
|
|
init result.mainchainMonitor, "", Port(0) # TODO: specify geth address and port
|
|
|
|
|
2019-01-14 12:19:44 +00:00
|
|
|
let trieDB = trieDB newChainDb(string conf.dataDir)
|
|
|
|
result.db = BeaconChainDB.init(trieDB)
|
2019-01-25 14:17:35 +00:00
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
# TODO this is problably not the right place to ensure that db is sane..
|
2019-02-21 04:42:17 +00:00
|
|
|
# TODO does it really make sense to load from DB if a state snapshot has been
|
|
|
|
# specified on command line? potentially, this should be the other way
|
|
|
|
# around...
|
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
let headBlock = result.db.getHeadBlock()
|
|
|
|
if headBlock.isNone():
|
|
|
|
let
|
|
|
|
tailState = result.config.stateSnapshot.get()
|
|
|
|
tailBlock = get_initial_beacon_block(tailState)
|
|
|
|
blockRoot = hash_tree_root_final(tailBlock)
|
|
|
|
|
|
|
|
notice "Creating new database from snapshot",
|
|
|
|
blockRoot = shortLog(blockRoot),
|
|
|
|
stateRoot = shortLog(tailBlock.state_root),
|
|
|
|
fork = tailState.fork,
|
|
|
|
validators = tailState.validator_registry.len()
|
|
|
|
|
|
|
|
result.db.putState(tailState)
|
|
|
|
result.db.putBlock(tailBlock)
|
|
|
|
result.db.putTailBlock(blockRoot)
|
|
|
|
result.db.putHeadBlock(blockRoot)
|
|
|
|
|
|
|
|
result.blockPool = BlockPool.init(result.db)
|
|
|
|
result.attestationPool = AttestationPool.init(result.blockPool)
|
2019-01-25 14:17:35 +00:00
|
|
|
|
2018-11-29 01:08:34 +00:00
|
|
|
result.keys = ensureNetworkKeys(string conf.dataDir)
|
2018-11-23 23:58:49 +00:00
|
|
|
|
|
|
|
var address: Address
|
2018-12-28 16:51:40 +00:00
|
|
|
address.ip = parseIpAddress("127.0.0.1")
|
2018-11-23 23:58:49 +00:00
|
|
|
address.tcpPort = Port(conf.tcpPort)
|
|
|
|
address.udpPort = Port(conf.udpPort)
|
2018-12-19 12:58:53 +00:00
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
result.network =
|
|
|
|
newEthereumNode(result.keys, address, 0, nil, clientId, minPeers = 1)
|
2019-02-18 10:34:39 +00:00
|
|
|
let state = result.network.protocolState(BeaconSync)
|
|
|
|
state.node = result
|
|
|
|
state.db = result.db
|
2019-02-28 21:21:29 +00:00
|
|
|
|
|
|
|
let
|
|
|
|
head = result.blockPool.get(result.db.getHeadBlock().get())
|
|
|
|
|
|
|
|
result.state = result.blockPool.loadTailState()
|
|
|
|
result.blockPool.updateState(result.state, head.get().refs)
|
2018-11-23 23:58:49 +00:00
|
|
|
|
2018-12-19 12:58:53 +00:00
|
|
|
writeFile(string(conf.dataDir) / "beacon_node.address",
|
|
|
|
$result.network.listeningAddress)
|
|
|
|
|
|
|
|
proc connectToNetwork(node: BeaconNode) {.async.} =
|
|
|
|
var bootstrapNodes = newSeq[ENode]()
|
|
|
|
|
|
|
|
for node in node.config.bootstrapNodes:
|
|
|
|
bootstrapNodes.add initENode(node)
|
|
|
|
|
|
|
|
let bootstrapFile = string node.config.bootstrapNodesFile
|
|
|
|
if bootstrapFile.len > 0:
|
|
|
|
for ln in lines(bootstrapFile):
|
|
|
|
bootstrapNodes.add initENode(string ln)
|
|
|
|
|
|
|
|
if bootstrapNodes.len > 0:
|
2018-12-28 16:51:40 +00:00
|
|
|
info "Connecting to bootstrap nodes", bootstrapNodes
|
2018-12-19 12:58:53 +00:00
|
|
|
else:
|
2018-12-28 16:51:40 +00:00
|
|
|
info "Waiting for connections"
|
2019-02-27 08:15:24 +00:00
|
|
|
await node.network.connectToNetwork(bootstrapNodes)
|
2018-12-19 12:58:53 +00:00
|
|
|
|
2018-11-23 23:58:49 +00:00
|
|
|
proc sync*(node: BeaconNode): Future[bool] {.async.} =
|
2019-02-28 21:21:29 +00:00
|
|
|
if node.state.data.slotDistanceFromNow() > WEAK_SUBJECTVITY_PERIOD.int64:
|
|
|
|
# node.state.data = await obtainTrustedStateSnapshot(node.db)
|
|
|
|
return false
|
2018-11-23 23:58:49 +00:00
|
|
|
else:
|
2019-02-28 21:21:29 +00:00
|
|
|
# TODO waiting for genesis should probably be moved elsewhere.. it has
|
|
|
|
# little to do with syncing..
|
2019-01-16 23:01:15 +00:00
|
|
|
let t = now()
|
2019-02-28 21:21:29 +00:00
|
|
|
if t < node.state.data.genesis_time * 1000:
|
|
|
|
notice "Waiting for genesis",
|
|
|
|
fromNow = int(node.state.data.genesis_time * 1000 - t) div 1000
|
|
|
|
await sleepAsync int(node.state.data.genesis_time * 1000 - t)
|
|
|
|
|
|
|
|
let
|
|
|
|
targetSlot = node.state.data.getSlotFromTime()
|
2019-01-16 23:01:15 +00:00
|
|
|
|
2019-02-15 16:33:32 +00:00
|
|
|
# TODO: change this to a full sync / block download
|
|
|
|
info "Syncing state from remote peers",
|
2019-02-28 21:21:29 +00:00
|
|
|
finalized_epoch = humaneEpochNum(node.state.data.finalized_epoch),
|
2019-02-15 16:33:32 +00:00
|
|
|
target_slot_epoch = humaneEpochNum(targetSlot.slot_to_epoch)
|
|
|
|
|
2019-02-21 04:42:17 +00:00
|
|
|
# TODO: sync is called at the beginning of the program, but doing this kind
|
|
|
|
# of catching up here is wrong - if we fall behind on processing
|
|
|
|
# for whatever reason, we want to be safe against the damage that
|
|
|
|
# might cause regardless if we just started or have been running for
|
|
|
|
# long. A classic example where this might happen is when the
|
|
|
|
# computer goes to sleep - when waking up, we'll be in the middle of
|
|
|
|
# processing, but behind everyone else.
|
2019-02-28 21:21:29 +00:00
|
|
|
# TOOD we now detect during epoch scheduling if we're very far behind -
|
|
|
|
# that would potentially be a good place to run the sync (?)
|
2019-02-21 04:42:17 +00:00
|
|
|
# while node.beaconState.finalized_epoch < targetSlot.slot_to_epoch:
|
|
|
|
# var (peer, changeLog) = await node.network.getValidatorChangeLog(
|
|
|
|
# node.beaconState.validator_registry_delta_chain_tip)
|
|
|
|
|
|
|
|
# if peer == nil:
|
|
|
|
# error "Failed to sync with any peer"
|
|
|
|
# return false
|
|
|
|
|
|
|
|
# if applyValidatorChangeLog(changeLog, node.beaconState):
|
|
|
|
# node.db.persistState(node.beaconState)
|
|
|
|
# node.db.persistBlock(changeLog.signedBlock)
|
|
|
|
# else:
|
|
|
|
# warn "Ignoring invalid validator change log", sentFrom = peer
|
2018-11-23 23:58:49 +00:00
|
|
|
|
|
|
|
return true
|
|
|
|
|
2018-12-05 13:58:41 +00:00
|
|
|
template findIt(s: openarray, predicate: untyped): int =
|
|
|
|
var res = -1
|
|
|
|
for i, it {.inject.} in s:
|
|
|
|
if predicate:
|
|
|
|
res = i
|
|
|
|
break
|
|
|
|
res
|
|
|
|
|
2018-11-23 23:58:49 +00:00
|
|
|
proc addLocalValidators*(node: BeaconNode) =
|
2019-03-07 13:59:28 +00:00
|
|
|
for privKey in node.config.validators:
|
2018-12-19 12:58:53 +00:00
|
|
|
let
|
|
|
|
pubKey = privKey.pubKey()
|
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
let idx = node.state.data.validator_registry.findIt(it.pubKey == pubKey)
|
2018-12-05 13:58:41 +00:00
|
|
|
if idx == -1:
|
|
|
|
warn "Validator not in registry", pubKey
|
|
|
|
else:
|
2019-01-25 17:35:22 +00:00
|
|
|
debug "Attaching validator", validator = shortValidatorKey(node, idx),
|
|
|
|
idx, pubKey
|
2019-02-14 21:41:04 +00:00
|
|
|
node.attachedValidators.addLocalValidator(idx, pubKey, privKey)
|
2018-12-05 13:58:41 +00:00
|
|
|
|
2018-12-28 16:51:40 +00:00
|
|
|
info "Local validators attached ", count = node.attachedValidators.count
|
2018-11-23 23:58:49 +00:00
|
|
|
|
2018-11-26 13:33:06 +00:00
|
|
|
proc getAttachedValidator(node: BeaconNode, idx: int): AttachedValidator =
|
2019-02-28 21:21:29 +00:00
|
|
|
let validatorKey = node.state.data.validator_registry[idx].pubkey
|
2018-11-26 13:33:06 +00:00
|
|
|
return node.attachedValidators.getValidator(validatorKey)
|
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
proc updateHead(node: BeaconNode) =
|
|
|
|
# TODO placeholder logic for running the fork choice
|
|
|
|
var
|
|
|
|
head = node.state.blck
|
|
|
|
headSlot = node.state.data.slot
|
|
|
|
|
|
|
|
# LRB fork choice - latest resolved block :)
|
|
|
|
for ph in node.potentialHeads:
|
|
|
|
let blck = node.blockPool.get(ph)
|
|
|
|
if blck.isNone():
|
|
|
|
continue
|
|
|
|
if blck.get().data.slot >= headSlot:
|
|
|
|
head = blck.get().refs
|
|
|
|
headSlot = blck.get().data.slot
|
|
|
|
node.potentialHeads.setLen(0)
|
|
|
|
|
|
|
|
if head.root == node.state.blck.root:
|
|
|
|
debug "No new head found",
|
|
|
|
stateRoot = shortLog(node.state.root),
|
|
|
|
blockRoot = shortLog(node.state.blck.root),
|
|
|
|
stateSlot = humaneSlotNum(node.state.data.slot)
|
|
|
|
return
|
|
|
|
|
|
|
|
node.blockPool.updateState(node.state, head)
|
|
|
|
|
|
|
|
# TODO this should probably be in blockpool, but what if updateState is
|
|
|
|
# called with a non-head block?
|
|
|
|
node.db.putHeadBlock(node.state.blck.root)
|
|
|
|
|
|
|
|
# TODO we should save the state every now and then, but which state do we
|
|
|
|
# save? When we receive a block and process it, the state from a
|
|
|
|
# particular epoch may become finalized - but we no longer have it!
|
|
|
|
# One thing that would work would be to replay from some earlier
|
|
|
|
# state (the tail?) to the new finalized state, then save that. Another
|
|
|
|
# option would be to simply save every epoch start state, and eventually
|
|
|
|
# point it out as it becomes finalized..
|
|
|
|
|
|
|
|
info "Updated head",
|
|
|
|
stateRoot = shortLog(node.state.root),
|
|
|
|
headBlockRoot = shortLog(node.state.blck.root),
|
|
|
|
stateSlot = humaneSlotNum(node.state.data.slot)
|
|
|
|
|
2018-11-29 01:08:34 +00:00
|
|
|
proc makeAttestation(node: BeaconNode,
|
2018-12-28 16:51:40 +00:00
|
|
|
validator: AttachedValidator,
|
2019-02-20 01:33:58 +00:00
|
|
|
slot: Slot,
|
2018-12-28 16:51:40 +00:00
|
|
|
shard: uint64,
|
|
|
|
committeeLen: int,
|
|
|
|
indexInCommittee: int) {.async.} =
|
|
|
|
doAssert node != nil
|
|
|
|
doAssert validator != nil
|
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
# It's time to make an attestation. To do so, we must determine what we
|
|
|
|
# consider to be the head block - this is done by the fork choice rule.
|
|
|
|
# TODO this lazy update of the head is good because it delays head resolution
|
|
|
|
# until the very latest moment - on the other hand, if it takes long, the
|
|
|
|
# attestation might be late!
|
|
|
|
node.updateHead()
|
|
|
|
|
|
|
|
# Check pending attestations - maybe we found some blocks for them
|
|
|
|
node.attestationPool.resolve(node.state.data)
|
|
|
|
|
|
|
|
# It might be that the latest block we found is an old one - if this is the
|
|
|
|
# case, we need to fast-forward the state
|
|
|
|
# TODO maybe this is not necessary? We just use the justified epoch from the
|
|
|
|
# state - investigate if it can change (and maybe restructure the state
|
|
|
|
# update code so it becomes obvious... this would require moving away
|
|
|
|
# from the huge state object)
|
|
|
|
var state = node.state.data
|
|
|
|
skipSlots(state, node.state.blck.root, slot)
|
2018-12-28 16:51:40 +00:00
|
|
|
|
2019-03-09 04:23:14 +00:00
|
|
|
# If we call makeAttestation too late, we must advance head only to `slot`
|
|
|
|
doAssert state.slot == slot,
|
|
|
|
"Corner case: head advanced beyond sheduled attestation slot"
|
2019-02-19 23:35:02 +00:00
|
|
|
|
2019-03-09 04:23:14 +00:00
|
|
|
let
|
|
|
|
attestationData = makeAttestationData(state, shard, node.state.blck.root)
|
2019-02-19 23:35:02 +00:00
|
|
|
validatorSignature = await validator.signAttestation(attestationData)
|
2018-12-28 16:51:40 +00:00
|
|
|
|
2019-03-09 04:23:14 +00:00
|
|
|
var aggregationBitfield = repeat(0'u8, ceil_div8(committeeLen))
|
|
|
|
bitSet(aggregationBitfield, indexInCommittee)
|
2018-12-28 16:51:40 +00:00
|
|
|
|
|
|
|
var attestation = Attestation(
|
|
|
|
data: attestationData,
|
|
|
|
aggregate_signature: validatorSignature,
|
2019-03-09 04:23:14 +00:00
|
|
|
aggregation_bitfield: aggregationBitfield,
|
2019-02-12 22:50:02 +00:00
|
|
|
# Stub in phase0
|
2019-03-09 04:23:14 +00:00
|
|
|
custody_bitfield: newSeq[byte](aggregationBitfield.len)
|
2019-02-12 22:50:02 +00:00
|
|
|
)
|
2018-11-26 13:33:06 +00:00
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
# TODO what are we waiting for here? broadcast should never block, and never
|
|
|
|
# fail...
|
2018-11-29 01:08:34 +00:00
|
|
|
await node.network.broadcast(topicAttestations, attestation)
|
2018-11-26 13:33:06 +00:00
|
|
|
|
2019-02-19 23:35:02 +00:00
|
|
|
info "Attestation sent",
|
|
|
|
slot = humaneSlotNum(attestationData.slot),
|
|
|
|
shard = attestationData.shard,
|
|
|
|
validator = shortValidatorKey(node, validator.idx),
|
2019-02-28 21:21:29 +00:00
|
|
|
signature = shortLog(validatorSignature),
|
|
|
|
beaconBlockRoot = shortLog(attestationData.beacon_block_root)
|
2018-12-28 16:51:40 +00:00
|
|
|
|
2018-11-29 01:08:34 +00:00
|
|
|
proc proposeBlock(node: BeaconNode,
|
|
|
|
validator: AttachedValidator,
|
2019-02-20 01:33:58 +00:00
|
|
|
slot: Slot) {.async.} =
|
2018-12-28 16:51:40 +00:00
|
|
|
doAssert node != nil
|
|
|
|
doAssert validator != nil
|
2019-02-28 21:21:29 +00:00
|
|
|
doAssert validator.idx < node.state.data.validator_registry.len
|
2018-12-28 16:51:40 +00:00
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
# To propose a block, we should know what the head is, because that's what
|
|
|
|
# we'll be building the next block upon..
|
|
|
|
node.updateHead()
|
2019-01-05 21:01:26 +00:00
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
# To create a block, we'll first apply a partial block to the state, skipping
|
|
|
|
# some validations.
|
|
|
|
# TODO technically, we could leave the state with the new block applied here,
|
|
|
|
# though it works this way as well because eventually we'll receive the
|
|
|
|
# block through broadcast.. to apply or not to apply permantently, that
|
|
|
|
# is the question...
|
|
|
|
var state = node.state.data
|
2019-02-19 23:35:02 +00:00
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
skipSlots(state, node.state.blck.root, slot - 1)
|
2019-01-05 21:01:26 +00:00
|
|
|
|
2018-12-28 16:51:40 +00:00
|
|
|
var blockBody = BeaconBlockBody(
|
2019-02-28 21:21:29 +00:00
|
|
|
attestations: node.attestationPool.getAttestationsForBlock(slot))
|
2018-12-28 16:51:40 +00:00
|
|
|
|
|
|
|
var newBlock = BeaconBlock(
|
|
|
|
slot: slot,
|
2019-02-28 21:21:29 +00:00
|
|
|
parent_root: node.state.blck.root,
|
2019-03-08 16:40:17 +00:00
|
|
|
randao_reveal: validator.genRandaoReveal(state, slot),
|
2019-01-18 00:14:22 +00:00
|
|
|
eth1_data: node.mainchainMonitor.getBeaconBlockRef(),
|
2019-03-11 15:33:24 +00:00
|
|
|
body: blockBody,
|
2018-12-28 16:51:40 +00:00
|
|
|
signature: ValidatorSig(), # we need the rest of the block first!
|
2019-03-11 15:33:24 +00:00
|
|
|
)
|
2018-12-28 16:51:40 +00:00
|
|
|
|
2019-02-19 23:35:02 +00:00
|
|
|
let ok =
|
2019-03-08 16:40:17 +00:00
|
|
|
updateState(state, node.state.blck.root, newBlock, {skipValidation})
|
2018-12-28 16:51:40 +00:00
|
|
|
doAssert ok # TODO: err, could this fail somehow?
|
2018-11-26 13:33:06 +00:00
|
|
|
|
2018-12-28 16:51:40 +00:00
|
|
|
newBlock.state_root = Eth2Digest(data: hash_tree_root(state))
|
2018-11-26 13:33:06 +00:00
|
|
|
|
2019-03-11 15:33:24 +00:00
|
|
|
let proposal = Proposal(
|
2018-12-28 16:51:40 +00:00
|
|
|
slot: slot,
|
|
|
|
shard: BEACON_CHAIN_SHARD_NUMBER,
|
2019-03-11 15:33:24 +00:00
|
|
|
block_root: Eth2Digest(data: signed_root(newBlock, "signature")),
|
|
|
|
signature: ValidatorSig(),
|
|
|
|
)
|
|
|
|
newBlock.signature = await validator.signBlockProposal(state.fork, proposal)
|
2018-11-26 13:33:06 +00:00
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
# TODO what are we waiting for here? broadcast should never block, and never
|
|
|
|
# fail...
|
2018-12-28 16:51:40 +00:00
|
|
|
await node.network.broadcast(topicBeaconBlocks, newBlock)
|
2018-11-26 13:33:06 +00:00
|
|
|
|
2019-02-19 23:35:02 +00:00
|
|
|
info "Block proposed",
|
|
|
|
slot = humaneSlotNum(slot),
|
2019-02-28 21:21:29 +00:00
|
|
|
stateRoot = shortLog(newBlock.state_root),
|
|
|
|
parentRoot = shortLog(newBlock.parent_root),
|
2019-02-19 23:35:02 +00:00
|
|
|
validator = shortValidatorKey(node, validator.idx),
|
|
|
|
idx = validator.idx
|
2018-11-26 13:33:06 +00:00
|
|
|
|
2018-12-28 16:51:40 +00:00
|
|
|
proc scheduleBlockProposal(node: BeaconNode,
|
2019-02-20 01:33:58 +00:00
|
|
|
slot: Slot,
|
2018-12-28 16:51:40 +00:00
|
|
|
validator: AttachedValidator) =
|
|
|
|
# TODO:
|
|
|
|
# This function exists only to hide a bug with Nim's closures.
|
2019-01-09 01:01:07 +00:00
|
|
|
# If you inline it in `scheduleEpochActions`, you'll see the
|
2018-12-28 16:51:40 +00:00
|
|
|
# internal `doAssert` starting to fail.
|
|
|
|
doAssert validator != nil
|
|
|
|
|
2019-02-19 23:35:02 +00:00
|
|
|
let
|
2019-02-28 21:21:29 +00:00
|
|
|
at = node.slotStart(slot)
|
2019-02-19 23:35:02 +00:00
|
|
|
now = fastEpochTime()
|
|
|
|
|
|
|
|
if now > at:
|
|
|
|
warn "Falling behind on block proposals", at, now, slot
|
2019-01-25 17:35:22 +00:00
|
|
|
|
|
|
|
info "Scheduling block proposal",
|
|
|
|
validator = shortValidatorKey(node, validator.idx),
|
2019-02-12 15:56:58 +00:00
|
|
|
idx = validator.idx,
|
2019-02-07 21:14:08 +00:00
|
|
|
slot = humaneSlotNum(slot),
|
2019-02-19 23:35:02 +00:00
|
|
|
fromNow = (at - now) div 1000
|
2019-01-25 17:35:22 +00:00
|
|
|
|
2019-02-19 23:35:02 +00:00
|
|
|
addTimer(at) do (x: pointer) {.gcsafe.}:
|
2019-01-25 17:35:22 +00:00
|
|
|
# TODO timers are generally not accurate / guaranteed to fire at the right
|
|
|
|
# time - need to guard here against early / late firings
|
2018-12-28 16:51:40 +00:00
|
|
|
doAssert validator != nil
|
2019-02-18 18:54:05 +00:00
|
|
|
asyncCheck proposeBlock(node, validator, slot)
|
2018-12-28 16:51:40 +00:00
|
|
|
|
|
|
|
proc scheduleAttestation(node: BeaconNode,
|
|
|
|
validator: AttachedValidator,
|
2019-02-20 01:33:58 +00:00
|
|
|
slot: Slot,
|
2018-12-28 16:51:40 +00:00
|
|
|
shard: uint64,
|
|
|
|
committeeLen: int,
|
|
|
|
indexInCommittee: int) =
|
|
|
|
# TODO:
|
|
|
|
# This function exists only to hide a bug with Nim's closures.
|
2019-01-09 01:01:07 +00:00
|
|
|
# If you inline it in `scheduleEpochActions`, you'll see the
|
2018-12-28 16:51:40 +00:00
|
|
|
# internal `doAssert` starting to fail.
|
|
|
|
doAssert validator != nil
|
|
|
|
|
2019-02-19 23:35:02 +00:00
|
|
|
let
|
2019-02-28 21:21:29 +00:00
|
|
|
at = node.slotStart(slot)
|
2019-02-19 23:35:02 +00:00
|
|
|
now = fastEpochTime()
|
|
|
|
|
|
|
|
if now > at:
|
|
|
|
warn "Falling behind on attestations", at, now, slot
|
|
|
|
|
|
|
|
debug "Scheduling attestation",
|
|
|
|
validator = shortValidatorKey(node, validator.idx),
|
|
|
|
fromNow = (at - now) div 1000,
|
|
|
|
slot = humaneSlotNum(slot),
|
|
|
|
shard
|
|
|
|
|
|
|
|
addTimer(at) do (p: pointer) {.gcsafe.}:
|
2018-12-28 16:51:40 +00:00
|
|
|
doAssert validator != nil
|
2019-02-18 18:54:05 +00:00
|
|
|
asyncCheck makeAttestation(node, validator, slot,
|
2018-12-28 16:51:40 +00:00
|
|
|
shard, committeeLen, indexInCommittee)
|
2018-11-26 13:33:06 +00:00
|
|
|
|
2019-02-20 01:33:58 +00:00
|
|
|
proc scheduleEpochActions(node: BeaconNode, epoch: Epoch) =
|
2018-11-23 23:58:49 +00:00
|
|
|
## This schedules the required block proposals and
|
|
|
|
## attestations from our attached validators.
|
2018-12-28 16:51:40 +00:00
|
|
|
doAssert node != nil
|
2019-02-19 23:35:02 +00:00
|
|
|
doAssert epoch >= GENESIS_EPOCH,
|
2019-02-28 21:21:29 +00:00
|
|
|
"Epoch: " & $epoch & ", humane epoch: " & $humaneEpochNum(epoch)
|
|
|
|
|
|
|
|
debug "Scheduling epoch actions",
|
|
|
|
epoch = humaneEpochNum(epoch),
|
|
|
|
stateEpoch = humaneEpochNum(node.state.data.slot.slot_to_epoch())
|
|
|
|
|
2019-03-08 16:40:17 +00:00
|
|
|
# In case some late blocks dropped in
|
|
|
|
node.updateHead()
|
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
# Sanity check - verify that the current head block is not too far behind
|
|
|
|
if node.state.data.slot.slot_to_epoch() + 1 < epoch:
|
2019-03-08 16:40:17 +00:00
|
|
|
# We're hopelessly behind!
|
|
|
|
#
|
|
|
|
# There's a few ways this can happen:
|
|
|
|
#
|
|
|
|
# * we receive no attestations or blocks for an extended period of time
|
|
|
|
# * all the attestations we receive are bogus - maybe we're connected to
|
|
|
|
# the wrong network?
|
|
|
|
# * we just started and still haven't synced
|
|
|
|
#
|
|
|
|
# TODO make an effort to find other nodes and sync? A worst case scenario
|
|
|
|
# here is that the network stalls because nobody is sending out
|
|
|
|
# attestations because nobody is scheduling them, in a vicious
|
|
|
|
# circle
|
|
|
|
# TODO diagnose the various scenarios and do something smart...
|
|
|
|
|
|
|
|
let
|
|
|
|
expectedSlot = node.state.data.getSlotFromTime()
|
|
|
|
nextSlot = expectedSlot + 1
|
|
|
|
at = node.slotStart(nextSlot)
|
|
|
|
|
|
|
|
notice "Delaying epoch scheduling, head too old - scheduling new attempt",
|
|
|
|
stateSlot = humaneSlotNum(node.state.data.slot),
|
|
|
|
expectedEpoch = humaneEpochNum(epoch),
|
|
|
|
expectedSlot = humaneSlotNum(expectedSlot),
|
|
|
|
fromNow = (at - fastEpochTime()) div 1000
|
|
|
|
|
|
|
|
addTimer(at) do (p: pointer):
|
|
|
|
node.scheduleEpochActions(nextSlot.slot_to_epoch())
|
|
|
|
return
|
2019-02-28 21:21:29 +00:00
|
|
|
|
|
|
|
# TODO: is this necessary with the new shuffling?
|
|
|
|
# see get_beacon_proposer_index
|
|
|
|
var nextState = node.state.data
|
|
|
|
|
|
|
|
skipSlots(nextState, node.state.blck.root, epoch.get_epoch_start_slot())
|
|
|
|
|
|
|
|
# TODO we don't need to do anything at slot 0 - what about slots we missed
|
|
|
|
# if we got delayed above?
|
2019-02-12 15:56:58 +00:00
|
|
|
let start = if epoch == GENESIS_EPOCH: 1.uint64 else: 0.uint64
|
|
|
|
|
2019-02-20 01:33:58 +00:00
|
|
|
for i in start ..< SLOTS_PER_EPOCH:
|
|
|
|
let slot = epoch * SLOTS_PER_EPOCH + i
|
2019-02-19 23:35:02 +00:00
|
|
|
nextState.slot = slot # ugly trick, see get_beacon_proposer_index
|
|
|
|
|
|
|
|
block: # Schedule block proposals
|
|
|
|
let proposerIdx = get_beacon_proposer_index(nextState, slot)
|
|
|
|
let validator = node.getAttachedValidator(proposerIdx)
|
|
|
|
|
|
|
|
if validator != nil:
|
|
|
|
# TODO:
|
|
|
|
# Warm-up the proposer earlier to try to obtain previous
|
|
|
|
# missing blocks if necessary
|
|
|
|
scheduleBlockProposal(node, slot, validator)
|
|
|
|
|
|
|
|
block: # Schedule attestations
|
|
|
|
for crosslink_committee in get_crosslink_committees_at_slot(
|
|
|
|
nextState, slot):
|
|
|
|
for i, validatorIdx in crosslink_committee.committee:
|
|
|
|
let validator = node.getAttachedValidator(validatorIdx)
|
|
|
|
if validator != nil:
|
|
|
|
scheduleAttestation(
|
|
|
|
node, validator, slot, crosslink_committee.shard,
|
|
|
|
crosslink_committee.committee.len, i)
|
2018-12-28 16:51:40 +00:00
|
|
|
|
2019-01-25 17:35:22 +00:00
|
|
|
let
|
2019-02-18 15:58:34 +00:00
|
|
|
nextEpoch = epoch + 1
|
2019-02-28 21:21:29 +00:00
|
|
|
at = node.slotStart(nextEpoch.get_epoch_start_slot())
|
2018-11-23 23:58:49 +00:00
|
|
|
|
2019-01-25 17:35:22 +00:00
|
|
|
info "Scheduling next epoch update",
|
|
|
|
fromNow = (at - fastEpochTime()) div 1000,
|
2019-02-18 15:58:34 +00:00
|
|
|
epoch = humaneEpochNum(nextEpoch)
|
2019-01-25 17:35:22 +00:00
|
|
|
|
|
|
|
addTimer(at) do (p: pointer):
|
2019-02-21 04:42:17 +00:00
|
|
|
node.scheduleEpochActions(nextEpoch)
|
2018-11-23 23:58:49 +00:00
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
proc fetchBlocks(node: BeaconNode, roots: seq[Eth2Digest]) =
|
|
|
|
if roots.len == 0: return
|
|
|
|
|
|
|
|
# TODO shouldn't send to all!
|
|
|
|
# TODO should never fail - asyncCheck is wrong here..
|
|
|
|
asyncCheck node.network.broadcast(topicfetchBlocks, roots)
|
|
|
|
|
|
|
|
proc onFetchBlocks(node: BeaconNode, roots: seq[Eth2Digest]) =
|
|
|
|
# TODO placeholder logic for block recovery
|
|
|
|
debug "fetchBlocks received",
|
|
|
|
roots = roots.len
|
|
|
|
for root in roots:
|
|
|
|
if (let blck = node.db.getBlock(root); blck.isSome()):
|
|
|
|
# TODO should never fail - asyncCheck is wrong here..
|
|
|
|
# TODO should obviously not spam, but rather send it back to the requester
|
|
|
|
asyncCheck node.network.broadcast(topicBeaconBlocks, blck.get())
|
|
|
|
|
|
|
|
proc scheduleSlotStartActions(node: BeaconNode, slot: Slot) =
|
|
|
|
# TODO in this setup, we retry fetching blocks at the beginning of every slot,
|
|
|
|
# hoping that we'll get some before it's time to attest or propose - is
|
|
|
|
# there a better time to do this?
|
|
|
|
let missingBlocks = node.blockPool.checkUnresolved()
|
|
|
|
node.fetchBlocks(missingBlocks)
|
2019-01-31 16:06:48 +00:00
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
let
|
|
|
|
nextSlot = slot + 1
|
|
|
|
at = node.slotStart(nextSlot)
|
|
|
|
|
|
|
|
info "Scheduling next slot start action block",
|
|
|
|
fromNow = (at - fastEpochTime()) div 1000,
|
|
|
|
slot = humaneSlotNum(nextSlot)
|
|
|
|
|
|
|
|
addTimer(at) do (p: pointer):
|
|
|
|
node.scheduleSlotStartActions(nextSlot)
|
2019-02-21 04:42:17 +00:00
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
proc onAttestation(node: BeaconNode, attestation: Attestation) =
|
|
|
|
# We received an attestation from the network but don't know much about it
|
|
|
|
# yet - in particular, we haven't verified that it belongs to particular chain
|
|
|
|
# we're on, or that it follows the rules of the protocol
|
|
|
|
debug "Attestation received",
|
2019-02-21 04:42:17 +00:00
|
|
|
slot = humaneSlotNum(attestation.data.slot),
|
|
|
|
shard = attestation.data.shard,
|
2019-02-28 21:21:29 +00:00
|
|
|
beaconBlockRoot = shortLog(attestation.data.beacon_block_root),
|
|
|
|
justifiedEpoch = humaneEpochNum(attestation.data.justified_epoch),
|
|
|
|
justifiedBlockRoot = shortLog(attestation.data.justified_block_root),
|
|
|
|
signature = shortLog(attestation.aggregate_signature)
|
2019-02-21 04:42:17 +00:00
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
node.attestationPool.add(node.state.data, attestation)
|
2019-02-21 04:42:17 +00:00
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
if attestation.data.beacon_block_root notin node.potentialHeads:
|
|
|
|
node.potentialHeads.add attestation.data.beacon_block_root
|
2019-02-21 04:42:17 +00:00
|
|
|
|
|
|
|
proc onBeaconBlock(node: BeaconNode, blck: BeaconBlock) =
|
2019-02-28 21:21:29 +00:00
|
|
|
# We received a block but don't know much about it yet - in particular, we
|
|
|
|
# don't know if it's part of the chain we're currently building.
|
|
|
|
let blockRoot = hash_tree_root_final(blck)
|
|
|
|
debug "Block received",
|
|
|
|
blockRoot = shortLog(blockRoot),
|
2019-02-21 04:42:17 +00:00
|
|
|
slot = humaneSlotNum(blck.slot),
|
2019-02-28 21:21:29 +00:00
|
|
|
stateRoot = shortLog(blck.state_root),
|
|
|
|
parentRoot = shortLog(blck.parent_root),
|
|
|
|
signature = shortLog(blck.signature),
|
|
|
|
proposer_slashings = blck.body.proposer_slashings.len,
|
|
|
|
attester_slashings = blck.body.attester_slashings.len,
|
|
|
|
attestations = blck.body.attestations.len,
|
|
|
|
deposits = blck.body.deposits.len,
|
|
|
|
voluntary_exits = blck.body.voluntary_exits.len,
|
|
|
|
transfers = blck.body.transfers.len
|
|
|
|
|
2019-03-08 16:40:17 +00:00
|
|
|
var
|
|
|
|
# TODO We could avoid this copy by having node.state as a general cache
|
|
|
|
# that just holds a random recent state - that would however require
|
|
|
|
# rethinking scheduling etc, which relies on there being a fairly
|
|
|
|
# accurate representation of the state available. Notably, when there's
|
|
|
|
# a reorg, the scheduling might change!
|
|
|
|
stateTmp = node.state
|
|
|
|
if not node.blockPool.add(stateTmp, blockRoot, blck):
|
2019-02-28 21:21:29 +00:00
|
|
|
# TODO the fact that add returns a bool that causes the parent block to be
|
|
|
|
# pre-emptively fetched is quite ugly - fix.
|
|
|
|
node.fetchBlocks(@[blck.parent_root])
|
|
|
|
|
|
|
|
# Delay updating the head until the latest moment possible - this makes it
|
|
|
|
# more likely that we've managed to resolve the block, in case of
|
|
|
|
# irregularities
|
|
|
|
if blockRoot notin node.potentialHeads:
|
|
|
|
node.potentialHeads.add blockRoot
|
|
|
|
|
|
|
|
# The block we received contains attestations, and we might not yet know about
|
|
|
|
# all of them. Let's add them to the attestation pool - in case they block
|
|
|
|
# is not yet resolved, neither will the attestations be!
|
2019-02-21 04:42:17 +00:00
|
|
|
for attestation in blck.body.attestations:
|
|
|
|
# TODO attestation pool needs to be taught to deal with overlapping
|
|
|
|
# attestations!
|
|
|
|
discard # node.onAttestation(attestation)
|
|
|
|
|
|
|
|
proc run*(node: BeaconNode) =
|
|
|
|
node.network.subscribe(topicBeaconBlocks) do (blck: BeaconBlock):
|
|
|
|
node.onBeaconBlock(blck)
|
|
|
|
|
|
|
|
node.network.subscribe(topicAttestations) do (attestation: Attestation):
|
|
|
|
node.onAttestation(attestation)
|
2018-12-28 16:51:40 +00:00
|
|
|
|
2019-02-28 21:21:29 +00:00
|
|
|
node.network.subscribe(topicfetchBlocks) do (roots: seq[Eth2Digest]):
|
|
|
|
node.onFetchBlocks(roots)
|
|
|
|
|
|
|
|
let nowSlot = node.state.data.getSlotFromTime()
|
|
|
|
|
|
|
|
node.scheduleEpochActions(nowSlot.slot_to_epoch())
|
|
|
|
node.scheduleSlotStartActions(nowSlot)
|
2018-12-28 16:51:40 +00:00
|
|
|
|
2019-01-25 17:35:22 +00:00
|
|
|
runForever()
|
2018-11-23 23:58:49 +00:00
|
|
|
|
2018-12-19 12:58:53 +00:00
|
|
|
var gPidFile: string
|
|
|
|
proc createPidFile(filename: string) =
|
|
|
|
createDir splitFile(filename).dir
|
|
|
|
writeFile filename, $getCurrentProcessId()
|
|
|
|
gPidFile = filename
|
|
|
|
addQuitProc proc {.noconv.} = removeFile gPidFile
|
|
|
|
|
2018-11-23 23:58:49 +00:00
|
|
|
when isMainModule:
|
2018-12-28 16:51:40 +00:00
|
|
|
let config = load BeaconNodeConf
|
2019-01-21 19:42:37 +00:00
|
|
|
if config.logLevel != LogLevel.NONE:
|
|
|
|
setLogLevel(config.logLevel)
|
2019-01-16 23:01:15 +00:00
|
|
|
|
2018-12-19 12:58:53 +00:00
|
|
|
case config.cmd
|
|
|
|
of createChain:
|
2019-02-15 16:33:32 +00:00
|
|
|
createStateSnapshot(
|
2019-03-07 13:59:28 +00:00
|
|
|
config.validatorsDir.string, config.numValidators, config.firstValidator,
|
|
|
|
config.genesisOffset, config.outputStateFile.string)
|
2018-12-19 12:58:53 +00:00
|
|
|
quit 0
|
|
|
|
|
|
|
|
of noCommand:
|
2019-01-25 17:35:22 +00:00
|
|
|
waitFor synchronizeClock()
|
2018-12-28 16:51:40 +00:00
|
|
|
createPidFile(config.dataDir.string / "beacon_node.pid")
|
2018-12-19 12:58:53 +00:00
|
|
|
|
|
|
|
var node = BeaconNode.init config
|
|
|
|
|
2019-01-25 17:35:22 +00:00
|
|
|
dynamicLogScope(node = node.config.tcpPort - 50000):
|
2019-02-21 04:42:17 +00:00
|
|
|
# TODO: while it's nice to cheat by waiting for connections here, we
|
|
|
|
# actually need to make this part of normal application flow -
|
|
|
|
# losing all connections might happen at any time and we should be
|
|
|
|
# prepared to handle it.
|
2019-01-25 17:35:22 +00:00
|
|
|
waitFor node.connectToNetwork()
|
|
|
|
|
|
|
|
if not waitFor node.sync():
|
|
|
|
quit 1
|
2018-12-19 12:58:53 +00:00
|
|
|
|
2019-01-25 17:35:22 +00:00
|
|
|
info "Starting beacon node",
|
2019-02-28 21:21:29 +00:00
|
|
|
slotsSinceFinalization = node.state.data.slotDistanceFromNow(),
|
|
|
|
stateSlot = humaneSlotNum(node.state.data.slot),
|
2019-02-14 19:32:33 +00:00
|
|
|
SHARD_COUNT,
|
2019-02-20 01:33:58 +00:00
|
|
|
SLOTS_PER_EPOCH,
|
2019-02-19 23:07:56 +00:00
|
|
|
SECONDS_PER_SLOT,
|
2019-02-14 19:32:33 +00:00
|
|
|
SPEC_VERSION
|
2018-11-23 23:58:49 +00:00
|
|
|
|
2019-01-25 17:35:22 +00:00
|
|
|
node.addLocalValidators()
|
2019-02-21 04:42:17 +00:00
|
|
|
node.run()
|