2019-06-28 13:44:44 +00:00
|
|
|
# beacon_chain
|
|
|
|
# Copyright (c) 2018-2019 Status Research & Development GmbH
|
|
|
|
# Licensed and distributed under either of
|
|
|
|
# * MIT license (license terms in the root directory or at http://opensource.org/licenses/MIT).
|
|
|
|
# * Apache v2 license (license terms in the root directory or at http://www.apache.org/licenses/LICENSE-2.0).
|
|
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
|
|
|
|
# State transition - block processing, as described in
|
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#beacon-chain-state-transition-function
|
|
|
|
#
|
|
|
|
# The purpose of this code right is primarily educational, to help piece
|
|
|
|
# together the mechanics of the beacon state and to discover potential problem
|
|
|
|
# areas.
|
|
|
|
#
|
|
|
|
# The entry point is `process_block` which is at the bottom of this file.
|
|
|
|
#
|
|
|
|
# General notes about the code (TODO):
|
|
|
|
# * It's inefficient - we quadratically copy, allocate and iterate when there
|
|
|
|
# are faster options
|
|
|
|
# * Weird styling - the sections taken from the spec use python styling while
|
|
|
|
# the others use NEP-1 - helps grepping identifiers in spec
|
|
|
|
# * We mix procedural and functional styles for no good reason, except that the
|
|
|
|
# spec does so also.
|
|
|
|
# * There are likely lots of bugs.
|
|
|
|
# * For indices, we get a mix of uint64, ValidatorIndex and int - this is currently
|
|
|
|
# swept under the rug with casts
|
|
|
|
# * The spec uses uint64 for data types, but functions in the spec often assume
|
|
|
|
# signed bigint semantics - under- and overflows ensue
|
|
|
|
# * Sane error handling is missing in most cases (yay, we'll get the chance to
|
|
|
|
# debate exceptions again!)
|
|
|
|
# When updating the code, add TODO sections to mark where there are clear
|
|
|
|
# improvements to be made - other than that, keep things similar to spec for
|
|
|
|
# now.
|
|
|
|
|
|
|
|
import # TODO - cleanup imports
|
|
|
|
algorithm, collections/sets, chronicles, math, options, sequtils, sets, tables,
|
|
|
|
../extras, ../ssz, ../beacon_node_types,
|
2019-07-03 07:35:05 +00:00
|
|
|
beaconstate, crypto, datatypes, digest, helpers, validator
|
2019-06-28 13:44:44 +00:00
|
|
|
|
2019-08-26 09:09:47 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v0.8.3/specs/core/0_beacon-chain.md#block-header
|
2019-06-28 13:44:44 +00:00
|
|
|
proc processBlockHeader(
|
|
|
|
state: var BeaconState, blck: BeaconBlock, flags: UpdateFlags,
|
|
|
|
stateCache: var StateCache): bool =
|
|
|
|
# Verify that the slots match
|
|
|
|
if not (blck.slot == state.slot):
|
|
|
|
notice "Block header: slot mismatch",
|
2019-08-15 16:01:55 +00:00
|
|
|
block_slot = shortLog(blck.slot),
|
|
|
|
state_slot = shortLog(state.slot)
|
2019-06-28 13:44:44 +00:00
|
|
|
return false
|
|
|
|
|
|
|
|
# Verify that the parent matches
|
|
|
|
if skipValidation notin flags and not (blck.parent_root ==
|
|
|
|
signing_root(state.latest_block_header)):
|
|
|
|
notice "Block header: previous block root mismatch",
|
|
|
|
latest_block_header = state.latest_block_header,
|
|
|
|
blck = shortLog(blck),
|
|
|
|
latest_block_header_root = shortLog(signing_root(state.latest_block_header))
|
|
|
|
return false
|
|
|
|
|
|
|
|
# Save current block as the new latest block
|
|
|
|
state.latest_block_header = BeaconBlockHeader(
|
|
|
|
slot: blck.slot,
|
|
|
|
parent_root: blck.parent_root,
|
2019-07-15 12:57:18 +00:00
|
|
|
# state_root: zeroed, overwritten in the next `process_slot` call
|
2019-06-28 13:44:44 +00:00
|
|
|
body_root: hash_tree_root(blck.body),
|
2019-07-15 12:57:18 +00:00
|
|
|
# signature is always zeroed
|
2019-06-28 13:44:44 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
# Verify proposer is not slashed
|
|
|
|
let proposer =
|
2019-07-01 09:13:14 +00:00
|
|
|
state.validators[get_beacon_proposer_index(state, stateCache)]
|
2019-06-28 13:44:44 +00:00
|
|
|
if proposer.slashed:
|
|
|
|
notice "Block header: proposer slashed"
|
|
|
|
return false
|
|
|
|
|
|
|
|
# Verify proposer signature
|
|
|
|
if skipValidation notin flags and not bls_verify(
|
|
|
|
proposer.pubkey,
|
|
|
|
signing_root(blck).data,
|
|
|
|
blck.signature,
|
|
|
|
get_domain(state, DOMAIN_BEACON_PROPOSER)):
|
|
|
|
notice "Block header: invalid block header",
|
|
|
|
proposer_pubkey = proposer.pubkey,
|
|
|
|
block_root = shortLog(signing_root(blck)),
|
|
|
|
block_signature = blck.signature
|
|
|
|
return false
|
|
|
|
|
|
|
|
true
|
|
|
|
|
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v0.7.1/specs/core/0_beacon-chain.md#randao
|
|
|
|
proc processRandao(
|
|
|
|
state: var BeaconState, body: BeaconBlockBody, flags: UpdateFlags,
|
|
|
|
stateCache: var StateCache): bool =
|
|
|
|
let
|
|
|
|
proposer_index = get_beacon_proposer_index(state, stateCache)
|
2019-07-01 09:13:14 +00:00
|
|
|
proposer = addr state.validators[proposer_index]
|
2019-06-28 13:44:44 +00:00
|
|
|
|
|
|
|
# Verify that the provided randao value is valid
|
|
|
|
if skipValidation notin flags:
|
|
|
|
if not bls_verify(
|
|
|
|
proposer.pubkey,
|
|
|
|
hash_tree_root(get_current_epoch(state).uint64).data,
|
|
|
|
body.randao_reveal,
|
|
|
|
get_domain(state, DOMAIN_RANDAO)):
|
|
|
|
|
|
|
|
notice "Randao mismatch", proposer_pubkey = proposer.pubkey,
|
|
|
|
message = get_current_epoch(state),
|
|
|
|
signature = body.randao_reveal,
|
|
|
|
slot = state.slot
|
|
|
|
return false
|
|
|
|
|
|
|
|
# Mix it in
|
|
|
|
let
|
|
|
|
mix = get_current_epoch(state) mod LATEST_RANDAO_MIXES_LENGTH
|
|
|
|
rr = eth2hash(body.randao_reveal.getBytes()).data
|
|
|
|
|
2019-07-01 09:42:37 +00:00
|
|
|
for i, b in state.randao_mixes[mix].data:
|
|
|
|
state.randao_mixes[mix].data[i] = b xor rr[i]
|
2019-06-28 13:44:44 +00:00
|
|
|
|
|
|
|
true
|
|
|
|
|
2019-08-26 09:09:47 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v0.8.3/specs/core/0_beacon-chain.md#eth1-data
|
2019-06-28 13:44:44 +00:00
|
|
|
func processEth1Data(state: var BeaconState, body: BeaconBlockBody) =
|
|
|
|
state.eth1_data_votes.add body.eth1_data
|
|
|
|
if state.eth1_data_votes.count(body.eth1_data) * 2 >
|
|
|
|
SLOTS_PER_ETH1_VOTING_PERIOD:
|
2019-07-01 09:42:37 +00:00
|
|
|
state.eth1_data = body.eth1_data
|
2019-06-28 13:44:44 +00:00
|
|
|
|
2019-08-26 09:09:47 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v0.8.3/specs/core/0_beacon-chain.md#is_slashable_validator
|
2019-06-28 13:44:44 +00:00
|
|
|
func is_slashable_validator(validator: Validator, epoch: Epoch): bool =
|
|
|
|
# Check if ``validator`` is slashable.
|
|
|
|
(not validator.slashed) and
|
|
|
|
(validator.activation_epoch <= epoch) and
|
|
|
|
(epoch < validator.withdrawable_epoch)
|
|
|
|
|
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v0.6.3/specs/core/0_beacon-chain.md#proposer-slashings
|
|
|
|
proc processProposerSlashings(
|
|
|
|
state: var BeaconState, blck: BeaconBlock, flags: UpdateFlags,
|
|
|
|
stateCache: var StateCache): bool =
|
|
|
|
if len(blck.body.proposer_slashings) > MAX_PROPOSER_SLASHINGS:
|
|
|
|
notice "PropSlash: too many!",
|
|
|
|
proposer_slashings = len(blck.body.proposer_slashings)
|
|
|
|
return false
|
|
|
|
|
|
|
|
for proposer_slashing in blck.body.proposer_slashings:
|
2019-07-01 09:13:14 +00:00
|
|
|
let proposer = state.validators[proposer_slashing.proposer_index.int]
|
2019-06-28 13:44:44 +00:00
|
|
|
|
|
|
|
# Verify that the epoch is the same
|
2019-07-01 07:53:42 +00:00
|
|
|
if not (compute_epoch_of_slot(proposer_slashing.header_1.slot) ==
|
|
|
|
compute_epoch_of_slot(proposer_slashing.header_2.slot)):
|
2019-06-28 13:44:44 +00:00
|
|
|
notice "PropSlash: epoch mismatch"
|
|
|
|
return false
|
|
|
|
|
|
|
|
# But the headers are different
|
|
|
|
if not (proposer_slashing.header_1 != proposer_slashing.header_2):
|
|
|
|
notice "PropSlash: headers not different"
|
|
|
|
return false
|
|
|
|
|
|
|
|
# Check proposer is slashable
|
|
|
|
if not is_slashable_validator(proposer, get_current_epoch(state)):
|
|
|
|
notice "PropSlash: slashed proposer"
|
|
|
|
return false
|
|
|
|
|
|
|
|
# Signatures are valid
|
|
|
|
if skipValidation notin flags:
|
|
|
|
for i, header in @[proposer_slashing.header_1, proposer_slashing.header_2]:
|
|
|
|
if not bls_verify(
|
|
|
|
proposer.pubkey,
|
|
|
|
signing_root(header).data,
|
|
|
|
header.signature,
|
|
|
|
get_domain(
|
2019-07-01 07:53:42 +00:00
|
|
|
state, DOMAIN_BEACON_PROPOSER, compute_epoch_of_slot(header.slot))):
|
2019-06-28 13:44:44 +00:00
|
|
|
notice "PropSlash: invalid signature",
|
|
|
|
signature_index = i
|
|
|
|
return false
|
|
|
|
|
|
|
|
slashValidator(
|
|
|
|
state, proposer_slashing.proposer_index.ValidatorIndex, stateCache)
|
|
|
|
|
|
|
|
true
|
|
|
|
|
2019-08-26 09:09:47 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v0.8.3/specs/core/0_beacon-chain.md#is_slashable_attestation_data
|
2019-06-28 13:44:44 +00:00
|
|
|
func is_slashable_attestation_data(
|
|
|
|
data_1: AttestationData, data_2: AttestationData): bool =
|
|
|
|
## Check if ``data_1`` and ``data_2`` are slashable according to Casper FFG
|
|
|
|
## rules.
|
|
|
|
|
|
|
|
# Double vote
|
2019-07-02 21:14:55 +00:00
|
|
|
(data_1 != data_2 and data_1.target.epoch == data_2.target.epoch) or
|
2019-06-28 13:44:44 +00:00
|
|
|
# Surround vote
|
2019-07-02 21:14:55 +00:00
|
|
|
(data_1.source.epoch < data_2.source.epoch and
|
|
|
|
data_2.target.epoch < data_1.target.epoch)
|
2019-06-28 13:44:44 +00:00
|
|
|
|
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v0.7.1/specs/core/0_beacon-chain.md#attester-slashings
|
|
|
|
proc processAttesterSlashings(state: var BeaconState, blck: BeaconBlock,
|
|
|
|
stateCache: var StateCache): bool =
|
|
|
|
# Process ``AttesterSlashing`` operation.
|
|
|
|
if len(blck.body.attester_slashings) > MAX_ATTESTER_SLASHINGS:
|
|
|
|
notice "CaspSlash: too many!"
|
|
|
|
return false
|
|
|
|
|
|
|
|
result = true
|
|
|
|
for attester_slashing in blck.body.attester_slashings:
|
|
|
|
let
|
|
|
|
attestation_1 = attester_slashing.attestation_1
|
|
|
|
attestation_2 = attester_slashing.attestation_2
|
|
|
|
|
|
|
|
if not is_slashable_attestation_data(
|
|
|
|
attestation_1.data, attestation_2.data):
|
|
|
|
notice "CaspSlash: surround or double vote check failed"
|
|
|
|
return false
|
|
|
|
|
2019-07-02 21:14:55 +00:00
|
|
|
if not is_valid_indexed_attestation(state, attestation_1):
|
2019-06-28 13:44:44 +00:00
|
|
|
notice "CaspSlash: invalid votes 1"
|
|
|
|
return false
|
|
|
|
|
2019-07-02 21:14:55 +00:00
|
|
|
if not is_valid_indexed_attestation(state, attestation_2):
|
2019-06-28 13:44:44 +00:00
|
|
|
notice "CaspSlash: invalid votes 2"
|
|
|
|
return false
|
|
|
|
|
|
|
|
var slashed_any = false
|
|
|
|
|
|
|
|
## TODO there's a lot of sorting/set construction here and
|
|
|
|
## verify_indexed_attestation, but go by spec unless there
|
|
|
|
## is compelling perf evidence otherwise.
|
|
|
|
let attesting_indices_1 =
|
|
|
|
attestation_1.custody_bit_0_indices & attestation_1.custody_bit_1_indices
|
|
|
|
let attesting_indices_2 =
|
|
|
|
attestation_2.custody_bit_0_indices & attestation_2.custody_bit_1_indices
|
|
|
|
for index in sorted(toSeq(intersection(toSet(attesting_indices_1),
|
|
|
|
toSet(attesting_indices_2)).items), system.cmp):
|
2019-07-01 09:13:14 +00:00
|
|
|
if is_slashable_validator(state.validators[index.int],
|
2019-06-28 13:44:44 +00:00
|
|
|
get_current_epoch(state)):
|
|
|
|
slash_validator(state, index.ValidatorIndex, stateCache)
|
|
|
|
slashed_any = true
|
|
|
|
result = result and slashed_any
|
|
|
|
|
2019-08-14 08:56:32 +00:00
|
|
|
func get_attesting_indices(
|
|
|
|
state: BeaconState, attestations: openarray[PendingAttestation],
|
|
|
|
stateCache: var StateCache): HashSet[ValidatorIndex] =
|
|
|
|
result = initSet[ValidatorIndex]()
|
|
|
|
for a in attestations:
|
|
|
|
result = result.union(get_attesting_indices(
|
|
|
|
state, a.data, a.aggregation_bits, stateCache))
|
|
|
|
|
|
|
|
func get_unslashed_attesting_indices(
|
|
|
|
state: BeaconState, attestations: openarray[PendingAttestation],
|
|
|
|
stateCache: var StateCache): HashSet[ValidatorIndex] =
|
|
|
|
result = get_attesting_indices(state, attestations, stateCache)
|
|
|
|
for index in result:
|
|
|
|
if state.validators[index].slashed:
|
|
|
|
result.excl index
|
|
|
|
|
2019-06-28 13:44:44 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v0.6.3/specs/core/0_beacon-chain.md#attestations
|
2019-08-14 08:56:32 +00:00
|
|
|
proc processAttestations*(
|
2019-06-28 13:44:44 +00:00
|
|
|
state: var BeaconState, blck: BeaconBlock, flags: UpdateFlags,
|
|
|
|
stateCache: var StateCache): bool =
|
|
|
|
## Each block includes a number of attestations that the proposer chose. Each
|
|
|
|
## attestation represents an update to a specific shard and is signed by a
|
|
|
|
## committee of validators.
|
|
|
|
## Here we make sanity checks for each attestation and it to the state - most
|
|
|
|
## updates will happen at the epoch boundary where state updates happen in
|
|
|
|
## bulk.
|
|
|
|
if blck.body.attestations.len > MAX_ATTESTATIONS:
|
|
|
|
notice "Attestation: too many!", attestations = blck.body.attestations.len
|
|
|
|
return false
|
|
|
|
|
2019-08-19 16:41:13 +00:00
|
|
|
trace "in processAttestations, not processed attestations",
|
2019-08-14 08:56:32 +00:00
|
|
|
attestations_len = blck.body.attestations.len()
|
|
|
|
|
2019-07-02 21:14:55 +00:00
|
|
|
if not blck.body.attestations.allIt(process_attestation(state, it, flags, stateCache)):
|
2019-06-28 13:44:44 +00:00
|
|
|
return false
|
|
|
|
|
|
|
|
# All checks passed - update state
|
|
|
|
# Apply the attestations
|
|
|
|
var committee_count_cache = initTable[Epoch, uint64]()
|
|
|
|
|
2019-08-19 16:41:13 +00:00
|
|
|
trace "in processAttestations, has processed attestations",
|
2019-08-14 08:56:32 +00:00
|
|
|
attestations_len = blck.body.attestations.len()
|
|
|
|
|
|
|
|
var cache = get_empty_per_epoch_cache()
|
|
|
|
|
2019-06-28 13:44:44 +00:00
|
|
|
for attestation in blck.body.attestations:
|
|
|
|
# Caching
|
|
|
|
let
|
2019-07-02 21:14:55 +00:00
|
|
|
epoch = attestation.data.target.epoch
|
2019-06-28 13:44:44 +00:00
|
|
|
committee_count = if epoch in committee_count_cache:
|
|
|
|
committee_count_cache[epoch]
|
|
|
|
else:
|
2019-07-02 14:31:48 +00:00
|
|
|
get_committee_count(state, epoch)
|
2019-06-28 13:44:44 +00:00
|
|
|
committee_count_cache[epoch] = committee_count
|
|
|
|
|
|
|
|
# Spec content
|
|
|
|
let attestation_slot =
|
|
|
|
get_attestation_data_slot(state, attestation.data, committee_count)
|
|
|
|
let pending_attestation = PendingAttestation(
|
|
|
|
data: attestation.data,
|
2019-07-01 07:53:42 +00:00
|
|
|
aggregation_bits: attestation.aggregation_bits,
|
2019-06-28 13:44:44 +00:00
|
|
|
inclusion_delay: state.slot - attestation_slot,
|
|
|
|
proposer_index: get_beacon_proposer_index(state, stateCache),
|
|
|
|
)
|
|
|
|
|
2019-07-02 21:14:55 +00:00
|
|
|
if attestation.data.target.epoch == get_current_epoch(state):
|
2019-06-28 13:44:44 +00:00
|
|
|
state.current_epoch_attestations.add(pending_attestation)
|
|
|
|
else:
|
|
|
|
state.previous_epoch_attestations.add(pending_attestation)
|
|
|
|
|
2019-08-19 16:41:13 +00:00
|
|
|
trace "processAttestations",
|
2019-08-14 08:56:32 +00:00
|
|
|
target_epoch=attestation.data.target.epoch,
|
|
|
|
current_epoch= get_current_epoch(state),
|
|
|
|
current_epoch_attestations_len=len(get_attesting_indices(state, state.current_epoch_attestations, cache)),
|
|
|
|
previous_epoch_attestations_len=len(get_attesting_indices(state, state.previous_epoch_attestations, cache)),
|
|
|
|
prev_unslashed_attesting_indices=get_unslashed_attesting_indices(state, state.previous_epoch_attestations, cache),
|
|
|
|
cur_unslashed_attesting_indices=get_unslashed_attesting_indices(state, state.current_epoch_attestations, cache),
|
|
|
|
prev_attesting_indices=get_attesting_indices(state, state.previous_epoch_attestations, cache),
|
|
|
|
cur_attesting_indices=get_attesting_indices(state, state.current_epoch_attestations, cache),
|
|
|
|
new_attestation_indices=get_attesting_indices(state, attestation.data, attestation.aggregation_bits, cache)
|
|
|
|
|
2019-06-28 13:44:44 +00:00
|
|
|
true
|
|
|
|
|
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v0.5.1/specs/core/0_beacon-chain.md#deposits
|
|
|
|
proc processDeposits(state: var BeaconState, blck: BeaconBlock): bool =
|
|
|
|
if not (len(blck.body.deposits) <= MAX_DEPOSITS):
|
|
|
|
notice "processDeposits: too many deposits"
|
|
|
|
return false
|
|
|
|
|
|
|
|
for deposit in blck.body.deposits:
|
|
|
|
if not process_deposit(state, deposit):
|
|
|
|
notice "processDeposits: deposit invalid"
|
|
|
|
return false
|
|
|
|
|
|
|
|
true
|
|
|
|
|
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v0.6.3/specs/core/0_beacon-chain.md#voluntary-exits
|
|
|
|
proc processVoluntaryExits(
|
|
|
|
state: var BeaconState, blck: BeaconBlock, flags: UpdateFlags): bool =
|
|
|
|
# Process ``VoluntaryExit`` transaction.
|
|
|
|
if len(blck.body.voluntary_exits) > MAX_VOLUNTARY_EXITS:
|
|
|
|
notice "Exit: too many!"
|
|
|
|
return false
|
|
|
|
|
|
|
|
for exit in blck.body.voluntary_exits:
|
2019-07-01 09:13:14 +00:00
|
|
|
let validator = state.validators[exit.validator_index.int]
|
2019-06-28 13:44:44 +00:00
|
|
|
|
|
|
|
# Verify the validator is active
|
|
|
|
if not is_active_validator(validator, get_current_epoch(state)):
|
|
|
|
notice "Exit: validator not active"
|
|
|
|
return false
|
|
|
|
|
|
|
|
# Verify the validator has not yet exited
|
|
|
|
if not (validator.exit_epoch == FAR_FUTURE_EPOCH):
|
|
|
|
notice "Exit: validator has exited"
|
|
|
|
return false
|
|
|
|
|
|
|
|
## Exits must specify an epoch when they become valid; they are not valid
|
|
|
|
## before then
|
|
|
|
if not (get_current_epoch(state) >= exit.epoch):
|
|
|
|
notice "Exit: exit epoch not passed"
|
|
|
|
return false
|
|
|
|
|
|
|
|
# Verify the validator has been active long enough
|
|
|
|
# TODO detect underflow
|
|
|
|
if not (get_current_epoch(state) - validator.activation_epoch >=
|
|
|
|
PERSISTENT_COMMITTEE_PERIOD):
|
|
|
|
notice "Exit: not in validator set long enough"
|
|
|
|
return false
|
|
|
|
|
|
|
|
# Verify signature
|
|
|
|
if skipValidation notin flags:
|
|
|
|
if not bls_verify(
|
|
|
|
validator.pubkey, signing_root(exit).data, exit.signature,
|
|
|
|
get_domain(state, DOMAIN_VOLUNTARY_EXIT, exit.epoch)):
|
|
|
|
notice "Exit: invalid signature"
|
|
|
|
return false
|
|
|
|
|
|
|
|
# Initiate exit
|
|
|
|
initiate_validator_exit(state, exit.validator_index.ValidatorIndex)
|
|
|
|
|
|
|
|
true
|
|
|
|
|
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v0.7.1/specs/core/0_beacon-chain.md#transfers
|
|
|
|
proc processTransfers(state: var BeaconState, blck: BeaconBlock,
|
|
|
|
flags: UpdateFlags, stateCache: var StateCache): bool =
|
|
|
|
if not (len(blck.body.transfers) <= MAX_TRANSFERS):
|
|
|
|
notice "Transfer: too many transfers"
|
|
|
|
return false
|
|
|
|
|
|
|
|
for transfer in blck.body.transfers:
|
|
|
|
let sender_balance = state.balances[transfer.sender.int]
|
|
|
|
|
|
|
|
## Verify the amount and fee are not individually too big (for anti-overflow
|
|
|
|
## purposes)
|
|
|
|
if not (sender_balance >= max(transfer.amount, transfer.fee)):
|
|
|
|
notice "Transfer: sender balance too low for transfer amount or fee"
|
|
|
|
return false
|
|
|
|
|
|
|
|
# A transfer is valid in only one slot
|
|
|
|
if not (state.slot == transfer.slot):
|
|
|
|
notice "Transfer: slot mismatch"
|
|
|
|
return false
|
|
|
|
|
|
|
|
## Sender must be not yet eligible for activation, withdrawn, or transfer
|
|
|
|
## balance over MAX_EFFECTIVE_BALANCE
|
|
|
|
if not (
|
2019-07-01 09:13:14 +00:00
|
|
|
state.validators[transfer.sender.int].activation_epoch ==
|
2019-06-28 13:44:44 +00:00
|
|
|
FAR_FUTURE_EPOCH or
|
|
|
|
get_current_epoch(state) >=
|
2019-07-01 09:13:14 +00:00
|
|
|
state.validators[
|
2019-06-28 13:44:44 +00:00
|
|
|
transfer.sender.int].withdrawable_epoch or
|
|
|
|
transfer.amount + transfer.fee + MAX_EFFECTIVE_BALANCE <=
|
|
|
|
state.balances[transfer.sender.int]):
|
|
|
|
notice "Transfer: only withdrawn or not-activated accounts with sufficient balance can transfer"
|
|
|
|
return false
|
|
|
|
|
|
|
|
# Verify that the pubkey is valid
|
2019-07-01 09:13:14 +00:00
|
|
|
let wc = state.validators[transfer.sender.int].
|
2019-06-28 13:44:44 +00:00
|
|
|
withdrawal_credentials
|
|
|
|
if not (wc.data[0] == BLS_WITHDRAWAL_PREFIX and
|
|
|
|
wc.data[1..^1] == eth2hash(transfer.pubkey.getBytes).data[1..^1]):
|
|
|
|
notice "Transfer: incorrect withdrawal credentials"
|
|
|
|
return false
|
|
|
|
|
|
|
|
# Verify that the signature is valid
|
|
|
|
if skipValidation notin flags:
|
|
|
|
if not bls_verify(
|
|
|
|
transfer.pubkey, signing_root(transfer).data, transfer.signature,
|
|
|
|
get_domain(state, DOMAIN_TRANSFER)):
|
|
|
|
notice "Transfer: incorrect signature"
|
|
|
|
return false
|
|
|
|
|
|
|
|
# Process the transfer
|
|
|
|
decrease_balance(
|
|
|
|
state, transfer.sender.ValidatorIndex, transfer.amount + transfer.fee)
|
|
|
|
increase_balance(
|
|
|
|
state, transfer.recipient.ValidatorIndex, transfer.amount)
|
|
|
|
increase_balance(
|
|
|
|
state, get_beacon_proposer_index(state, stateCache), transfer.fee)
|
|
|
|
|
|
|
|
# Verify balances are not dust
|
|
|
|
if not (
|
|
|
|
0'u64 < state.balances[transfer.sender.int] and
|
|
|
|
state.balances[transfer.sender.int] < MIN_DEPOSIT_AMOUNT):
|
|
|
|
notice "Transfer: sender balance too low for transfer amount or fee"
|
|
|
|
return false
|
|
|
|
|
|
|
|
if not (
|
|
|
|
0'u64 < state.balances[transfer.recipient.int] and
|
|
|
|
state.balances[transfer.recipient.int] < MIN_DEPOSIT_AMOUNT):
|
|
|
|
notice "Transfer: sender balance too low for transfer amount or fee"
|
|
|
|
return false
|
|
|
|
|
|
|
|
true
|
|
|
|
|
|
|
|
|
|
|
|
proc processBlock*(
|
|
|
|
state: var BeaconState, blck: BeaconBlock, flags: UpdateFlags,
|
|
|
|
stateCache: var StateCache): bool =
|
|
|
|
## When there's a new block, we need to verify that the block is sane and
|
|
|
|
## update the state accordingly
|
|
|
|
|
|
|
|
# TODO when there's a failure, we should reset the state!
|
|
|
|
# TODO probably better to do all verification first, then apply state changes
|
|
|
|
|
|
|
|
if not processBlockHeader(state, blck, flags, stateCache):
|
2019-08-15 16:01:55 +00:00
|
|
|
notice "Block header not valid", slot = shortLog(state.slot)
|
2019-06-28 13:44:44 +00:00
|
|
|
return false
|
|
|
|
|
|
|
|
if not processRandao(state, blck.body, flags, stateCache):
|
2019-08-15 16:01:55 +00:00
|
|
|
debug "[Block processing] Randao failure", slot = shortLog(state.slot)
|
2019-06-28 13:44:44 +00:00
|
|
|
return false
|
|
|
|
|
|
|
|
processEth1Data(state, blck.body)
|
|
|
|
|
|
|
|
if not processProposerSlashings(state, blck, flags, stateCache):
|
2019-08-15 16:01:55 +00:00
|
|
|
debug "[Block processing] Proposer slashing failure", slot = shortLog(state.slot)
|
2019-06-28 13:44:44 +00:00
|
|
|
return false
|
|
|
|
|
|
|
|
if not processAttesterSlashings(state, blck, stateCache):
|
2019-08-15 16:01:55 +00:00
|
|
|
debug "[Block processing] Attester slashing failure", slot = shortLog(state.slot)
|
2019-06-28 13:44:44 +00:00
|
|
|
return false
|
|
|
|
|
|
|
|
if not processAttestations(state, blck, flags, stateCache):
|
2019-08-15 16:01:55 +00:00
|
|
|
debug "[Block processing] Attestation processing failure", slot = shortLog(state.slot)
|
2019-06-28 13:44:44 +00:00
|
|
|
return false
|
|
|
|
|
|
|
|
if not processDeposits(state, blck):
|
2019-08-15 16:01:55 +00:00
|
|
|
debug "[Block processing] Deposit processing failure", slot = shortLog(state.slot)
|
2019-06-28 13:44:44 +00:00
|
|
|
return false
|
|
|
|
|
|
|
|
if not processVoluntaryExits(state, blck, flags):
|
2019-08-15 16:01:55 +00:00
|
|
|
debug "[Block processing] Exit processing failure", slot = shortLog(state.slot)
|
2019-06-28 13:44:44 +00:00
|
|
|
return false
|
|
|
|
|
|
|
|
if not processTransfers(state, blck, flags, stateCache):
|
2019-08-15 16:01:55 +00:00
|
|
|
debug "[Block processing] Transfer processing failure", slot = shortLog(state.slot)
|
2019-06-28 13:44:44 +00:00
|
|
|
return false
|
|
|
|
|
|
|
|
true
|