nimbus-eth2/beacon_chain/state_transition.nim

994 lines
45 KiB
Nim
Raw Normal View History

# beacon_chain
# Copyright (c) 2018 Status Research & Development GmbH
# Licensed and distributed under either of
# * MIT license (license terms in the root directory or at http://opensource.org/licenses/MIT).
# * Apache v2 license (license terms in the root directory or at http://www.apache.org/licenses/LICENSE-2.0).
# at your option. This file may not be copied, modified, or distributed except according to those terms.
# State transition, as described in
# https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#beacon-chain-state-transition-function
#
# The purpose of this code right is primarily educational, to help piece
# together the mechanics of the beacon state and to discover potential problem
# areas. The entry point is `updateState` which is at the bottom of the file!
#
# General notes about the code (TODO):
# * It's inefficient - we quadratically copy, allocate and iterate when there
# are faster options
# * Weird styling - the sections taken from the spec use python styling while
# the others use NEP-1 - helps grepping identifiers in spec
# * We mix procedural and functional styles for no good reason, except that the
# spec does so also.
# * There are no tests, and likely lots of bugs.
# * For indices, we get a mix of uint64, ValidatorIndex and int - this is currently
# swept under the rug with casts
# * The spec uses uint64 for data types, but functions in the spec often assume
# signed bigint semantics - under- and overflows ensue
# * Sane error handling is missing in most cases (yay, we'll get the chance to
# debate exceptions again!)
# When updating the code, add TODO sections to mark where there are clear
# improvements to be made - other than that, keep things similar to spec for
# now.
2018-09-26 16:26:39 +00:00
import
chronicles, math, options, sequtils,
./extras, ./ssz,
./spec/[beaconstate, crypto, datatypes, digest, helpers, validator]
func flatten[T](v: openArray[seq[T]]): seq[T] =
# TODO not in nim - doh.
for x in v: result.add x
2019-02-11 17:45:57 +00:00
proc verifyProposerSignature(state: BeaconState, blck: BeaconBlock): bool =
## When creating a block, the proposer will sign a version of the block that
## doesn't contain the data (chicken and egg), then add the signature to that
## block. Here, we check that the signature is correct by repeating the same
## process.
##
## https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#proposer-signature
var blck_without_sig = blck
blck_without_sig.signature = ValidatorSig()
let
signed_data = ProposalSignedData(
slot: state.slot,
shard: BEACON_CHAIN_SHARD_NUMBER,
block_root: hash_tree_root_final(blck_without_sig)
)
proposal_hash = hash_tree_root_final(signed_data)
proposer_index = get_beacon_proposer_index(state, state.slot)
2018-12-17 19:36:17 +00:00
bls_verify(
state.validator_registry[proposer_index].pubkey,
proposal_hash.data, blck.signature,
2019-02-11 17:45:57 +00:00
get_domain(state.fork, slot_to_epoch(state.slot), DOMAIN_PROPOSAL))
2019-01-25 17:35:22 +00:00
proc processRandao(
state: var BeaconState, blck: BeaconBlock, flags: UpdateFlags): bool =
## When a validator signs up, they will include a hash number together with
## the deposit - the randao_commitment. The commitment is formed by hashing
## a secret value N times.
## The first time the proposer proposes a block, they will hash their secret
## value N-1 times, and provide the reuslt as "reveal" - now everyone else can
## verify that the reveal matches the commitment by hashing it once.
## The next time the proposer proposes, they will reveal the secret value
## hashed N-2 times and so on, and everyone will verify that it matches N-1.
## The previous reveal has now become the commitment!
##
## Effectively, the block proposer can only reveal N-1 times, so better pick
## a large N!
##
## https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#randao
let
proposer_index = get_beacon_proposer_index(state, state.slot)
proposer = addr state.validator_registry[proposer_index]
if skipValidation notin flags:
# Check that proposer commit and reveal match
# TODO re-enable if appropriate
#let expected = repeat_hash(blck.randao_reveal, proposer.randao_layers)
#if expected != proposer.randao_commitment:
# notice "Randao reveal mismatch", reveal = blck.randao_reveal,
# layers = proposer.randao_layers,
# commitment = proposer.randao_commitment,
# expected
# return false
discard
# Update state and proposer now that we're alright
let
mix = get_current_epoch(state) mod LATEST_RANDAO_MIXES_LENGTH
rr = hash_tree_root_final(blck.randao_reveal).data
for i, b in state.latest_randao_mixes[mix].data:
state.latest_randao_mixes[mix].data[i] = b xor rr[i]
return true
2019-01-16 10:21:06 +00:00
func processDepositRoot(state: var BeaconState, blck: BeaconBlock) =
2019-01-18 00:14:22 +00:00
## https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#eth1-data
2019-01-18 00:14:22 +00:00
for x in state.eth1_data_votes.mitems():
if blck.eth1_data == x.eth1_data:
x.vote_count += 1
return
2019-01-18 00:14:22 +00:00
state.eth1_data_votes.add Eth1DataVote(
eth1_data: blck.eth1_data,
vote_count: 1
)
func penalizeValidator(state: var BeaconState, index: ValidatorIndex) =
exit_validator(state, index)
var validator = state.validator_registry[index]
#state.latest_penalized_exit_balances[(state.slot div EPOCH_LENGTH) mod LATEST_PENALIZED_EXIT_LENGTH] += get_effective_balance(state, index.ValidatorIndex)
let
whistleblower_index = get_beacon_proposer_index(state, state.slot)
whistleblower_reward = get_effective_balance(state, index) div WHISTLEBLOWER_REWARD_QUOTIENT
state.validator_balances[whistleblower_index] += whistleblower_reward
state.validator_balances[index] -= whistleblower_reward
validator.penalized_epoch = get_current_epoch(state)
proc processProposerSlashings(
state: var BeaconState, blck: BeaconBlock, flags: UpdateFlags): bool =
## https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#proposer-slashings-1
if len(blck.body.proposer_slashings) > MAX_PROPOSER_SLASHINGS:
2019-01-25 17:35:22 +00:00
notice "PropSlash: too many!",
proposer_slashings = len(blck.body.proposer_slashings)
return false
for proposer_slashing in blck.body.proposer_slashings:
let proposer = state.validator_registry[proposer_slashing.proposer_index.int]
if skipValidation notin flags:
if not bls_verify(
proposer.pubkey,
hash_tree_root_final(proposer_slashing.proposal_data_1).data,
proposer_slashing.proposal_signature_1,
get_domain(
2019-02-11 17:45:57 +00:00
state.fork, slot_to_epoch(proposer_slashing.proposal_data_1.slot),
DOMAIN_PROPOSAL)):
2019-01-25 17:35:22 +00:00
notice "PropSlash: invalid signature 1"
return false
if not bls_verify(
proposer.pubkey,
hash_tree_root_final(proposer_slashing.proposal_data_2).data,
proposer_slashing.proposal_signature_2,
get_domain(
2019-02-11 17:45:57 +00:00
state.fork, slot_to_epoch(proposer_slashing.proposal_data_2.slot),
DOMAIN_PROPOSAL)):
2019-01-25 17:35:22 +00:00
notice "PropSlash: invalid signature 2"
return false
if not (proposer_slashing.proposal_data_1.slot ==
proposer_slashing.proposal_data_2.slot):
2019-01-25 17:35:22 +00:00
notice "PropSlash: slot mismatch"
return false
if not (proposer_slashing.proposal_data_1.shard ==
proposer_slashing.proposal_data_2.shard):
2019-01-25 17:35:22 +00:00
notice "PropSlash: shard mismatch"
return false
if not (proposer_slashing.proposal_data_1.block_root ==
proposer_slashing.proposal_data_2.block_root):
2019-01-25 17:35:22 +00:00
notice "PropSlash: block root mismatch"
return false
if not (proposer.penalized_epoch > get_current_epoch(state)):
2019-01-25 17:35:22 +00:00
notice "PropSlash: penalized slot"
return false
penalizeValidator(state, proposer_slashing.proposer_index.ValidatorIndex)
return true
# https://github.com/ethereum/eth2.0-specs/blob/v0.1/specs/core/0_beacon-chain.md#verify_slashable_attestation
func verify_slashable_attestation(state: BeaconState, slashable_attestation: SlashableAttestation): bool =
# Verify validity of ``slashable_attestation`` fields.
if anyIt(slashable_attestation.custody_bitfield, it != 0): # [TO BE REMOVED IN PHASE 1]
return false
if len(slashable_attestation.validator_indices) == 0:
return false
for i in 0 ..< (len(slashable_attestation.validator_indices) - 1):
if slashable_attestation.validator_indices[i] >= slashable_attestation.validator_indices[i + 1]:
return false
if not verify_bitfield(slashable_attestation.custody_bitfield, len(slashable_attestation.validator_indices)):
return false
if len(slashable_attestation.validator_indices) > MAX_INDICES_PER_SLASHABLE_VOTE:
return false
var
custody_bit_0_indices: seq[uint64] = @[]
custody_bit_1_indices: seq[uint64] = @[]
for i, validator_index in slashable_attestation.validator_indices:
if get_bitfield_bit(slashable_attestation.custody_bitfield, i) == 0b0:
custody_bit_0_indices.add(validator_index)
else:
custody_bit_1_indices.add(validator_index)
# bug in 0.1 version of spec, fixed later; bls_verify is what works
bls_verify_multiple(
@[
bls_aggregate_pubkeys(mapIt(custody_bit_0_indices, state.validator_registry[it.int].pubkey)),
bls_aggregate_pubkeys(mapIt(custody_bit_1_indices, state.validator_registry[it.int].pubkey)),
],
@[
hash_tree_root(AttestationDataAndCustodyBit(
data: slashable_attestation.data, custody_bit: false)),
hash_tree_root(AttestationDataAndCustodyBit(
data: slashable_attestation.data, custody_bit: true)),
],
slashable_attestation.aggregate_signature,
get_domain(
state.fork,
slot_to_epoch(slashable_attestation.data.slot),
DOMAIN_ATTESTATION,
),
)
2019-01-30 15:35:42 +00:00
proc processAttesterSlashings(state: var BeaconState, blck: BeaconBlock): bool =
## https://github.com/ethereum/eth2.0-specs/blob/dev/specs/core/0_beacon-chain.md#attester-slashings-1
if len(blck.body.attester_slashings) > MAX_ATTESTER_SLASHINGS:
2019-01-25 17:35:22 +00:00
notice "CaspSlash: too many!"
return false
for attester_slashing in blck.body.attester_slashings:
let
slashable_attestation_1 = attester_slashing.slashable_attestation_1
slashable_attestation_2 = attester_slashing.slashable_attestation_2
if not (slashable_attestation_1.data != slashable_attestation_2.data):
2019-01-25 17:35:22 +00:00
notice "CaspSlash: invalid data"
return false
if not (
is_double_vote(slashable_attestation_1.data, slashable_attestation_2.data) or
is_surround_vote(slashable_attestation_1.data, slashable_attestation_2.data)):
2019-01-25 17:35:22 +00:00
notice "CaspSlash: surround or double vote check failed"
return false
if not verify_slashable_attestation(state, slashable_attestation_1):
2019-01-25 17:35:22 +00:00
notice "CaspSlash: invalid votes 1"
return false
if not verify_slashable_attestation(state, slashable_attestation_2):
2019-01-25 17:35:22 +00:00
notice "CaspSlash: invalid votes 2"
return false
let
indices2 = slashable_attestation_2.validator_indices
slashable_indices =
slashable_attestation_1.validator_indices.filterIt(it in indices2)
if not (len(slashable_indices) >= 1):
notice "CaspSlash: no intersection"
return false
for index in slashable_indices:
if state.validator_registry[index.int].penalized_epoch > get_current_epoch(state):
penalize_validator(state, index.ValidatorIndex)
return true
proc processAttestations(
state: var BeaconState, blck: BeaconBlock, flags: UpdateFlags): bool =
## Each block includes a number of attestations that the proposer chose. Each
## attestation represents an update to a specific shard and is signed by a
## committee of validators.
## Here we make sanity checks for each attestation and it to the state - most
## updates will happen at the epoch boundary where state updates happen in
## bulk.
##
## https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#attestations-1
if blck.body.attestations.len > MAX_ATTESTATIONS:
2019-01-25 17:35:22 +00:00
notice "Attestation: too many!", attestations = blck.body.attestations.len
return false
if not blck.body.attestations.allIt(checkAttestation(state, it, flags)):
return false
# All checks passed - update state
state.latest_attestations.add blck.body.attestations.mapIt(
2019-01-30 15:35:42 +00:00
PendingAttestation(
data: it.data,
aggregation_bitfield: it.aggregation_bitfield,
custody_bitfield: it.custody_bitfield,
inclusion_slot: state.slot,
)
)
return true
proc processDeposits(state: var BeaconState, blck: BeaconBlock): bool =
## https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#deposits-1
# TODO! Spec writing in progress
true
func initiate_validator_exit(state: var BeaconState, index: int) =
var validator = state.validator_registry[index]
validator.status_flags = validator.status_flags or INITIATED_EXIT
proc processExits(
state: var BeaconState, blck: BeaconBlock, flags: UpdateFlags): bool =
## https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#exits-1
if len(blck.body.exits) > MAX_EXITS:
2019-01-25 17:35:22 +00:00
notice "Exit: too many!"
return false
for exit in blck.body.exits:
let validator = state.validator_registry[exit.validator_index.int]
if skipValidation notin flags:
if not bls_verify(
validator.pubkey, ZERO_HASH.data, exit.signature,
get_domain(state.fork, exit.epoch, DOMAIN_EXIT)):
2019-01-25 17:35:22 +00:00
notice "Exit: invalid signature"
return false
if not (validator.exit_epoch > get_entry_exit_effect_epoch(get_current_epoch(state))):
2019-01-25 17:35:22 +00:00
notice "Exit: exit/entry too close"
return false
if not (get_current_epoch(state) >= exit.epoch):
notice "Exit: bad epoch"
return false
initiate_validator_exit(state, exit.validator_index.int)
return true
proc process_ejections(state: var BeaconState) =
## Iterate through the validator registry and eject active validators with
## balance below ``EJECTION_BALANCE``
##
## https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#ejections
for index, validator in state.validator_registry:
if is_active_validator(validator, state.slot) and
state.validator_balances[index] < EJECTION_BALANCE:
exit_validator(state, index.ValidatorIndex)
func processSlot(state: var BeaconState, previous_block_root: Eth2Digest) =
## Time on the beacon chain moves in slots. Every time we make it to a new
## slot, a proposer creates a block to represent the state of the beacon
## chain at that time. In case the proposer is missing, it may happen that
## the no block is produced during the slot.
##
## https://github.com/ethereum/eth2.0-specs/blob/v0.1/specs/core/0_beacon-chain.md#per-slot-processing
state.slot += 1
state.latest_block_roots[(state.slot - 1) mod LATEST_BLOCK_ROOTS_LENGTH] =
previous_block_root
if state.slot mod LATEST_BLOCK_ROOTS_LENGTH == 0:
state.batched_block_roots.add(merkle_root(state.latest_block_roots))
proc processBlock(
state: var BeaconState, blck: BeaconBlock, flags: UpdateFlags): bool =
## When there's a new block, we need to verify that the block is sane and
## update the state accordingly
# TODO when there's a failure, we should reset the state!
# TODO probably better to do all verification first, then apply state changes
if not (blck.slot == state.slot):
2019-01-25 17:35:22 +00:00
notice "Unexpected block slot number",
blockSlot = blck.slot,
stateSlot = state.slot
return false
# Spec does not have this check explicitly, but requires that this condition
# holds - so we give verify it as well - this would happen naturally if
# `blck.parent_root` was used in `processSlot` - but that doesn't cut it for
# blockless slot processing.
2019-01-25 17:35:22 +00:00
let stateParentRoot =
state.latest_block_roots[(state.slot - 1) mod LATEST_BLOCK_ROOTS_LENGTH]
if not (blck.parent_root == stateParentRoot):
notice "Unexpected parent root",
blockParentRoot = blck.parent_root,
stateParentRoot
return false
if skipValidation notin flags:
# TODO Technically, we could make processBlock take a generic type instead
# of BeaconBlock - we would then have an intermediate `ProposedBlock`
# type that omits some fields - this way, the compiler would guarantee
# that we don't try to access fields that don't have a value yet
if not verifyProposerSignature(state, blck):
2019-02-11 17:45:57 +00:00
notice "Proposer signature not valid", slot = humaneSlotNum(state.slot)
return false
if not processRandao(state, blck, flags):
return false
2019-01-16 10:21:06 +00:00
processDepositRoot(state, blck)
if not processProposerSlashings(state, blck, flags):
return false
2019-01-30 15:35:42 +00:00
if not processAttesterSlashings(state, blck):
return false
if not processAttestations(state, blck, flags):
return false
if not processDeposits(state, blck):
return false
if not processExits(state, blck, flags):
return false
process_ejections(state)
return true
func get_attester_indices(
state: BeaconState,
2019-01-30 15:35:42 +00:00
attestations: openArray[PendingAttestation]): seq[ValidatorIndex] =
# Union of attesters that participated in some attestations
# TODO spec - add as helper?
attestations.
mapIt(
get_attestation_participants(state, it.data, it.aggregation_bitfield)).
flatten().
deduplicate()
func boundary_attestations(
state: BeaconState, boundary_hash: Eth2Digest,
2019-01-30 15:35:42 +00:00
attestations: openArray[PendingAttestation]
): seq[PendingAttestation] =
# TODO spec - add as helper?
attestations.filterIt(
2018-12-11 21:53:18 +00:00
it.data.epoch_boundary_root == boundary_hash and
it.data.justified_epoch == state.justified_epoch)
func lowerThan(candidate, current: Eth2Digest): bool =
# return true iff candidate is "lower" than current, per spec rule:
2018-12-11 21:53:18 +00:00
# "ties broken by favoring lower `shard_block_root` values"
# TODO spec - clarify hash ordering..
for i, v in current.data:
if v > candidate.data[i]: return true
return false
func processEpoch(state: var BeaconState) =
## https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#per-epoch-processing
if (state.slot + 1) mod EPOCH_LENGTH != 0:
return
# Precomputation
let
active_validator_indices =
get_active_validator_indices(state.validator_registry, state.slot)
total_balance = sum_effective_balances(state, active_validator_indices)
current_epoch = get_current_epoch(state)
previous_epoch = if current_epoch > GENESIS_EPOCH: current_epoch - 1 else: current_epoch
next_epoch = (current_epoch + 1).EpochNumber
# TODO doing this with iterators failed:
# https://github.com/nim-lang/Nim/issues/9827
let
current_epoch_attestations =
state.latest_attestations.filterIt(
state.slot <= it.data.slot + EPOCH_LENGTH and
it.data.slot < state.slot)
current_epoch_boundary_attestations =
boundary_attestations(
state, get_block_root(state, state.slot-EPOCH_LENGTH),
current_epoch_attestations)
current_epoch_boundary_attester_indices =
get_attester_indices(state, current_epoch_attestations)
current_epoch_boundary_attesting_balance =
sum_effective_balances(state, current_epoch_boundary_attester_indices)
let
previous_epoch_attestations =
state.latest_attestations.filterIt(
previous_epoch == slot_to_epoch(it.data.slot))
let
previous_epoch_attester_indices =
get_attester_indices(state, previous_epoch_attestations)
let # Previous epoch justified
previous_epoch_justified_attestations =
concat(current_epoch_attestations, previous_epoch_attestations).
filterIt(it.data.justified_epoch == state.previous_justified_epoch)
previous_epoch_justified_attester_indices =
get_attester_indices(state, previous_epoch_justified_attestations)
previous_epoch_justified_attesting_balance =
sum_effective_balances(state, previous_epoch_justified_attester_indices)
let # Previous epoch boundary
# TODO check this with spec...
negative_uint_hack =
if state.slot < 2 * EPOCH_LENGTH: 0'u64 else: state.slot - 2 * EPOCH_LENGTH
previous_epoch_boundary_attestations =
boundary_attestations(
state, get_block_root(state, negative_uint_hack),
previous_epoch_attestations)
previous_epoch_boundary_attester_indices =
get_attester_indices(state, previous_epoch_boundary_attestations)
previous_epoch_boundary_attesting_balance =
sum_effective_balances(state, previous_epoch_boundary_attester_indices)
let # Previous epoch head
previous_epoch_head_attestations =
previous_epoch_attestations.filterIt(
it.data.beacon_block_root == get_block_root(state, it.data.slot))
previous_epoch_head_attester_indices =
get_attester_indices(state, previous_epoch_head_attestations)
previous_epoch_head_attesting_balance =
sum_effective_balances(state, previous_epoch_head_attester_indices)
# TODO this is really hairy - we cannot capture `state` directly, but we
# can capture a pointer to it - this is safe because we don't leak
# these closures outside this scope, but still..
let statePtr = state.addr
func attesting_validator_indices(
crosslink_committee: CrosslinkCommittee, shard_block_root: Eth2Digest): seq[ValidatorIndex] =
let shard_block_attestations =
concat(current_epoch_attestations, previous_epoch_attestations).
filterIt(it.data.shard == crosslink_committee.shard and
it.data.shard_block_root == shard_block_root)
get_attester_indices(statePtr[], shard_block_attestations)
func winning_root(crosslink_committee: CrosslinkCommittee): Eth2Digest =
# * Let `winning_root(crosslink_committee)` be equal to the value of
# `shard_block_root` such that
# `sum([get_effective_balance(state, i) for i in attesting_validator_indices(crosslink_committee, shard_block_root)])`
# is maximized (ties broken by favoring lower `shard_block_root` values).
let candidates =
concat(current_epoch_attestations, previous_epoch_attestations).
filterIt(it.data.shard == crosslink_committee.shard).
mapIt(it.data.shard_block_root)
# TODO not covered by spec!
if candidates.len == 0:
return
var max_hash = candidates[0]
var max_val =
sum_effective_balances(
statePtr[], attesting_validator_indices(crosslink_committee, max_hash))
for candidate in candidates[1..^1]:
let val = sum_effective_balances(
statePtr[], attesting_validator_indices(crosslink_committee, candidate))
if val > max_val or (val == max_val and candidate.lowerThan(max_hash)):
max_hash = candidate
max_val = val
max_hash
func attesting_validators(crosslink_committee: CrosslinkCommittee): seq[ValidatorIndex] =
attesting_validator_indices(crosslink_committee, winning_root(crosslink_committee))
func attesting_validator_indices(crosslink_committee: CrosslinkCommittee): seq[ValidatorIndex] =
attesting_validator_indices(crosslink_committee, winning_root(crosslink_committee))
func total_attesting_balance(crosslink_committee: CrosslinkCommittee): uint64 =
sum_effective_balances(
statePtr[], attesting_validator_indices(crosslink_committee))
func total_balance_sac(crosslink_committee: CrosslinkCommittee): uint64 =
sum_effective_balances(statePtr[], crosslink_committee.committee)
2019-01-18 00:14:22 +00:00
block: # Eth1 data
if state.slot mod ETH1_DATA_VOTING_PERIOD == 0:
2019-01-18 00:14:22 +00:00
for x in state.eth1_data_votes:
if x.vote_count * 2 >= ETH1_DATA_VOTING_PERIOD:
2019-01-18 00:14:22 +00:00
state.latest_eth1_data = x.eth1_data
break
2019-01-18 00:14:22 +00:00
state.eth1_data_votes = @[]
# TODO Eth1 data
# https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#eth1-data-1
# Helpers for justification
let
previous_total_balance = sum_effective_balances(state, get_active_validator_indices(state.validator_registry, previous_epoch))
current_total_balance = sum_effective_balances(state, get_active_validator_indices(state.validator_registry, current_epoch))
block: # Justification
# https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#justification
# First, update the justification bitfield
var new_justified_epoch = state.justified_epoch
state.justification_bitfield = state.justification_bitfield shl 1
if 3'u64 * previous_epoch_boundary_attesting_balance >= 2'u64 * previous_total_balance:
state.justification_bitfield = state.justification_bitfield or 2
new_justified_epoch = previous_epoch
if 3'u64 * current_epoch_boundary_attesting_balance >= 2'u64 * current_total_balance:
state.justification_bitfield = state.justification_bitfield or 1
new_justified_epoch = current_epoch
# Next, update last finalized epoch if possible
if (state.justification_bitfield shr 1) mod 8 == 0b111 and state.previous_justified_epoch == previous_epoch - 2:
state.finalized_epoch = state.previous_justified_epoch
if (state.justification_bitfield shr 1) mod 4 == 0b11 and state.previous_justified_epoch == previous_epoch - 1:
state.finalized_epoch = state.previous_justified_epoch
if (state.justification_bitfield shr 0) mod 8 == 0b111 and state.justified_epoch == previous_epoch - 1:
state.finalized_epoch = state.justified_epoch
if (state.justification_bitfield shr 0) mod 4 == 0b11 and state.justified_epoch == previous_epoch:
state.finalized_epoch = state.justified_epoch
# Finally, update the following
state.previous_justified_epoch = state.justified_epoch
state.justified_epoch = new_justified_epoch
block: # Crosslinks
# https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#crosslinks
for slot in get_epoch_start_slot(previous_epoch) ..< get_epoch_start_slot(next_epoch):
let crosslink_committees_at_slot = get_crosslink_committees_at_slot(state, slot)
#
#for crosslink_committee, shard in crosslink_committees_at_slot.items:
# if 3 * total_attesting_balance(crosslink_committee) >= 2 * total_balance(crosslink_committee):
# state.latest_crosslinks[shard] = Crosslink(
# slot=state.slot, shard_block_root=winning_root(crosslink_committee))
# Rewards and penalties helpers
# https://github.com/ethereum/eth2.0-specs/blob/dev/specs/core/0_beacon-chain.md#rewards-and-penalties
let
base_reward_quotient =
integer_squareroot(previous_total_balance) div BASE_REWARD_QUOTIENT
func base_reward(state: BeaconState, index: ValidatorIndex): uint64 =
get_effective_balance(state, index) div base_reward_quotient.uint64 div 4
func inactivity_penalty(
state: BeaconState, index: ValidatorIndex, epochs_since_finality: uint64): uint64 =
base_reward(state, index) +
get_effective_balance(state, index) *
epochs_since_finality div INACTIVITY_PENALTY_QUOTIENT div 2
func inclusion_slot(state: BeaconState, v: ValidatorIndex): uint64 =
for a in previous_epoch_attestations:
if v in get_attestation_participants(state, a.data, a.aggregation_bitfield):
return a.inclusion_slot
doAssert false # shouldn't happen..
func inclusion_distance(state: BeaconState, v: ValidatorIndex): uint64 =
for a in previous_epoch_attestations:
if v in get_attestation_participants(state, a.data, a.aggregation_bitfield):
return a.inclusion_slot - a.data.slot
doAssert false # shouldn't happen..
block: # Justification and finalization
let epochs_since_finality = next_epoch - state.finalized_epoch
proc update_balance(attesters: openArray[ValidatorIndex], attesting_balance: uint64) =
# TODO Spec - add helper?
for v in attesters:
statePtr.validator_balances[v] +=
base_reward(statePtr[], v) *
attesting_balance div total_balance
for v in active_validator_indices:
if v notin attesters:
# TODO underflows?
statePtr.validator_balances[v] -= base_reward(statePtr[], v)
if epochs_since_finality <= 4'u64 * EPOCH_LENGTH:
# Expected FFG source
update_balance(
previous_epoch_justified_attester_indices,
previous_epoch_justified_attesting_balance)
# Expected FFG target:
update_balance(
previous_epoch_boundary_attester_indices,
previous_epoch_boundary_attesting_balance)
# Expected beacon chain head:
update_balance(
previous_epoch_head_attester_indices,
previous_epoch_head_attesting_balance)
# Inclusion distance
for v in previous_epoch_attester_indices:
statePtr.validator_balances[v] +=
base_reward(state, v) *
MIN_ATTESTATION_INCLUSION_DELAY div inclusion_distance(state, v)
else:
for index in active_validator_indices:
# TODO underflows?
if index notin previous_epoch_justified_attester_indices:
state.validator_balances[index] -=
inactivity_penalty(state, index, epochs_since_finality)
if index notin previous_epoch_boundary_attester_indices:
state.validator_balances[index] -=
inactivity_penalty(state, index, epochs_since_finality)
if index notin previous_epoch_head_attester_indices:
state.validator_balances[index] -=
inactivity_penalty(state, index, epochs_since_finality)
block: # Attestation inclusion
for v in previous_epoch_attester_indices:
let proposer_index =
get_beacon_proposer_index(state, inclusion_slot(state, v))
state.validator_balances[proposer_index] +=
base_reward(state, v) div INCLUDER_REWARD_QUOTIENT
block: # Crosslinks
# https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#crosslinks-1
for slot in get_epoch_start_slot(previous_epoch) ..< get_epoch_start_slot(current_epoch):
let crosslink_committees_at_slot = get_crosslink_committees_at_slot(state, slot)
for crosslink_committee in crosslink_committees_at_slot:
# TODO https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#crosslinks-1
# but this is a best guess based on reasonableness of what "index" is
for index in crosslink_committee.committee:
if index in attesting_validators(crosslink_committee):
state.validator_balances[index.int] +=
base_reward(state, index) *
total_attesting_balance(crosslink_committee) div
total_balance_sac(crosslink_committee)
else:
# TODO underflows?
state.validator_balances[index] -= base_reward(state, index)
block: # Ejections
process_ejections(state)
block: # Validator registry and shuffling seed data
# https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#validator-registry-and-shuffling-seed-data
state.previous_calculation_epoch = state.current_calculation_epoch
state.previous_epoch_start_shard = state.current_epoch_start_shard
state.previous_epoch_seed = state.current_epoch_seed
#TODO state.latest_index_roots[next_epoch mod LATEST_INDEX_ROOTS_LENGTH] = hash_tree_root_final(get_active_validator_indices(state.validator_registry, next_epoch))
if state.finalized_epoch > state.validator_registry_update_epoch and
allIt(
0 ..< get_current_epoch_committee_count(state).int * EPOCH_LENGTH,
state.latest_crosslinks[(state.current_epoch_start_shard + it.uint64) mod SHARD_COUNT].epoch > state.validator_registry_update_epoch):
update_validator_registry(state)
state.current_calculation_epoch = next_epoch
state.current_epoch_start_shard = (state.current_epoch_start_shard + get_current_epoch_committee_count(state) * EPOCH_LENGTH) mod SHARD_COUNT
state.current_epoch_seed = generate_seed(state, state.current_calculation_epoch)
else:
# If a validator registry change does NOT happen
let epochs_since_last_registry_change = current_epoch - state.validator_registry_update_epoch
if is_power_of_2(epochs_since_last_registry_change):
state.current_calculation_epoch = next_epoch
state.current_epoch_seed = generate_seed(state, state.current_calculation_epoch)
# /Note/ that state.current_epoch_start_shard is left unchanged
# TODO run process_penalties_and_exits
block: # Final updates
state.latest_attestations.keepItIf(
not (it.data.slot + EPOCH_LENGTH < state.slot)
)
proc verifyStateRoot(state: BeaconState, blck: BeaconBlock): bool =
let state_root = hash_tree_root_final(state)
if state_root != blck.state_root:
2019-01-25 17:35:22 +00:00
notice "Block: root verification failed",
block_state_root = blck.state_root, state_root
false
else:
true
proc updateState*(state: var BeaconState, previous_block_root: Eth2Digest,
new_block: Option[BeaconBlock], flags: UpdateFlags): bool =
## Time in the beacon chain moves by slots. Every time (haha.) that happens,
## we will update the beacon state. Normally, the state updates will be driven
## by the contents of a new block, but it may happen that the block goes
## missing - the state updates happen regardless.
## Each call to this function will advance the state by one slot - new_block,
## if present, must match that slot.
##
## The flags are used to specify that certain validations should be skipped
## for the new block. This is done during block proposal, to create a state
## whose hash can be included in the new block.
#
# TODO this function can be written with a loop inside to handle all empty
# slots up to the slot of the new_block - but then again, why not eagerly
# update the state as time passes? Something to ponder...
# One reason to keep it this way is that you need to look ahead if you're
# the block proposer, though in reality we only need a partial update for
# that
# TODO check to which extent this copy can be avoided (considering forks etc),
# for now, it serves as a reminder that we need to handle invalid blocks
# somewhere..
# TODO many functions will mutate `state` partially without rolling back
# the changes in case of failure (look out for `var BeaconState` and
# bool return values...)
# TODO There's a discussion about what this function should do, and when:
# https://github.com/ethereum/eth2.0-specs/issues/284
var old_state = state
# Per-slot updates - these happen regardless if there is a block or not
processSlot(state, previous_block_root)
if new_block.isSome():
# Block updates - these happen when there's a new block being suggested
# by the block proposer. Every actor in the network will update its state
# according to the contents of this block - but first they will validate
# that the block is sane.
# TODO what should happen if block processing fails?
# https://github.com/ethereum/eth2.0-specs/issues/293
if processBlock(state, new_block.get(), flags):
# Block ok so far, proceed with state update
processEpoch(state)
# This is a bit awkward - at the end of processing we verify that the
# state we arrive at is what the block producer thought it would be -
# meaning that potentially, it could fail verification
if skipValidation in flags or verifyStateRoot(state, new_block.get()):
# State root is what it should be - we're done!
return true
# Block processing failed, have to start over
state = old_state
processSlot(state, previous_block_root)
processEpoch(state)
false
else:
# Skip all per-block processing. Move directly to epoch processing
# prison. Do not do any block updates when passing go.
# Heavy updates that happen for every epoch - these never fail (or so we hope)
processEpoch(state)
true
# TODO document this:
# Jacek Sieka
# @arnetheduck
# Dec 21 11:32
# question about making attestations: in the attestation we carry slot and a justified_slot - just to make sure, this justified_slot is the slot that was justified when the state was at slot, not whatever the client may be seeing now? effectively, because we're attesting to MIN_ATTESTATION_INCLUSION_DELAYold states, it might be that we know about a newer justified slot, but don't include it - correct?
# Danny Ryan
# @djrtwo
# Dec 21 11:34
# You are attesting to what you see as the head of the chain at that slot
# The MIN_ATTESTATION_INCLUSION_DELAY is just how many slots must past before this message can be included on chain
# so whatever the justified_slot was inside the state that was associate with the head you are attesting to
# Jacek Sieka
# @arnetheduck
# Dec 21 11:37
# can I revise an attestation, once I get new information (about the shard or state)?
# Danny Ryan
# @djrtwo
# Dec 21 11:37
# We are attesting to the exact current state at that slot. The MIN_ATTESTATION_INCLUSION_DELAY is to attempt to reduce centralization risk in light of fast block times (ensure attestations have time to fully propagate so fair playing field on including them on chain)
# No, if you create two attestations for the same slot, you can be slashed
# https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#is_double_vote
# Jacek Sieka
# @arnetheduck
# Dec 21 11:39
# is there any interest for me to publish my attestation before MIN_ATTESTATION_INCLUSION_DELAY-1 time has passed?
# (apart from the risk of it not being picked up on time)
# Danny Ryan
# @djrtwo
# Dec 21 11:40
# thats the main risk.
# Note, were a bit unsure about MIN_ATTESTATION_INCLUSION_DELAY because it might open up an attestors timing strategy too much. In the case where MIN_ATTESTATION_INCLUSION_DELAY is removed, we just set it to 1
# part of validator honesty assumption is to attest during your slot. That said, a rational actor might act in any number of interesting ways..
# Jacek Sieka
# @arnetheduck
# Dec 21 11:59
# I can probably google this somehow, but bls signatures, anyone knows off the top of their head if they have to be combined one by one, or can two group signatures be combined? what happens to overlap then?
# Danny Ryan
# @djrtwo
# Dec 21 12:00
# Yeah, you can do any linear combination of signatures. but you have to remember the linear combination of pubkeys that constructed
# if you have two instances of a signature from pubkey p, then you need 2*p in the group pubkey
# because the attestation bitfield is only 1 bit per pubkey right now, attestations do not support this
# it could be extended to support N overlaps up to N times per pubkey if we had N bits per validator instead of 1
# We are shying away from this for the time being. If there end up being substantial difficulties in network layer aggregation, then adding bits to aid in supporting overlaps is one potential solution
# Jacek Sieka
# @arnetheduck
# Dec 21 12:02
# ah nice, you anticipated my followup question there :) so it's not a straight-off set union operation
# Danny Ryan
# @djrtwo
# Dec 21 12:02
# depending on the particular network level troubles we run into
# right
# aggregatng sigs and pubkeys are both just ec adds https://github.com/ethereum/py-evm/blob/d82b10ae361cde6abbac62f171fcea7809c4e3cf/eth/_utils/bls.py#L191-L202
# subtractions work too (i suppose this is obvious). You can linearly combine sigs or pubs in any way
# Jacek Sieka
# @arnetheduck
# Dec 21 12:05
# hm.. well, because one thing I'm thinking of is the scenario where someone attests to some shard head and I receive that attestation.. now, let's say that's an honest attestation, but within that same slot, I have more fresh information about a shard for example.. now, I can either sign the data in the old attestation or churn out a new one, risking that neither of these get enough votes to be useful - does that sound.. accurate?
# Danny Ryan
# @djrtwo
# Dec 21 12:08
# So you wont just be signing the head of the shard. This isnt specified yet, but it would be targeting some recent epoch boundary to ensure higher chance of consensus.
# If your recent info is about a better fork in the shard than the one you see the other attester signed, then you are better off signing that fork because if it is winning in your few of the shard chain fork choice, then you would assume it is winning in the view of most attesters shard fork choice
# If some strange circumstance arose in which you saw a majority of attestations that signed something you think is unexpected before you signed, a rational actor might defect to this majority. An honest actor would sign what they believe to be true
# in practice, the actor would have to wait some amount of time past when they should have attested to gather this info.
# also, at the end of the day the validator has to compute the non-outsourcable proof of custody bit, so if the other validators are signing off on some shard chain fork they dont know about, then they cant attest to that data anyway
# (for fear of signing a bad custody bit)
# so their rational move is to just attest to the data they acutally know about and can accurately compute their proof of custody bit on
# Jacek Sieka
# @arnetheduck
# Dec 21 12:58
# what's justified_block_root doing in attestation_data? isn't that available already as get_block_root(state, attestation.data.justified_slot)?
# also, when we sign hash_tree_root(attestation.data) + bytes1(0) - what's the purpose of the 0 byte, given we have domain already?
# Danny Ryan
# @djrtwo
# Dec 21 13:03
# 0 byte is a stub for the proof of custody bit in phase 0
# If the attestation is included in a short range fork but still votes for the chain it is added tos justified_block_root/slot, then we want to count the casper vote
# likely if I see the head of the chain as different from what ends up being the canonical chain, my view of the latest justified block might still be in accordance with the canonical chain
# if my attesation is included in a fork, the head i voted on doesnt necessarily lead back to the justified block in the fork. Without including justified_block_root, my vote could be used in any fork for the same epoch even if the block at that justified_slot height was different
# Danny Ryan
# @djrtwo
# Dec 21 13:14
# Long story short, because attestations can be included in forks of the head they are actually attesting to, we cant be sure of the justified_block that was being voted on by just usng the justified_slot. The security of properties of Casper FFG require that the voter makes a firm commitment to the actual source block, not just the height of the source block
# Jacek Sieka
# @arnetheduck
# Dec 21 13:23
# ok. that's quite a piece. I'm gonna have to draw some diagrams I think :)
# ah. ok. actually makes sense.. I think :)
# Jacek Sieka
# @arnetheduck
# Dec 21 13:31
# how does that interact then with the following check:
# Verify that attestation.data.justified_block_root is equal to get_block_root(state, attestation.data.justified_slot).
# Danny Ryan
# @djrtwo
# Dec 21 13:32
# ah, my bad above. We only include an attestation on chain if it is for the correct source
# Thats one of the bare minimum requirements to get it included on chain. Without the justified_block_root, we cant do that check
# essentially that checks if this attestation is relevant at all to the current forks consensus.
# if the justified_block is wrong, then we know the target of the vote and the head of the attestation are wrong too
# sorry for the slight mix up there
# logic still holds — the justified_slot alone is not actually a firm commitment to a particular chain history. You need the associated hash
# Jacek Sieka
# @arnetheduck
# Dec 21 13:35
# can't you just follow Block.parent_root?
# well, that, and ultimately.. Block.state_root
# Danny Ryan
# @djrtwo
# Dec 21 13:37
# The block the attestation is included in might not be for the same fork the attestation was made
# we first make sure that the attestation and the block that its included in match at the justified_slot. if not, throw it out
# then in the incentives, we give some extra reward if the epoch_boundary_root and the chain match
# and some extra reward if the beacon_block_root match
# if all three match, then the attestation is fully agreeing with the canonical chain. +1 casper vote and strengthening the head of the fork choice
# if just justified_block_root and epoch_boundary_root match then the attestation agrees enough to successfully cast an ffg vote
# if just justified_block_root match, then at least the attestation agrees on the base of the fork choice, but this isnt enough to cast an FFG vote
# Jacek Sieka
# @arnetheduck
# Dec 21 13:41
# if not, throw it out
# it = block or attestation?
# Danny Ryan
# @djrtwo
# Dec 21 13:42
# well, if you are buildling the block ,you shouldnt include it (thus throw it out of current consideration). If you are validating a block you just received and that conditon fails for an attestation, throw the block out because it included a bad attestation and is thus invalid
# The block producer knows when producing the block if they are including bad attestations or other data that will fail state transition
# and should not do that
# Jacek Sieka
# @arnetheduck
# Dec 21 13:43
# yeah, that makes sense, just checking
# ok, I think I'm gonna let that sink in a bit before asking more questions.. thanks :)