293 lines
10 KiB
Nim
293 lines
10 KiB
Nim
|
# beacon_chain
|
||
|
# Copyright (c) 2024 Status Research & Development GmbH
|
||
|
# Licensed and distributed under either of
|
||
|
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
|
||
|
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
|
||
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
||
|
|
||
|
{.push raises: [].}
|
||
|
|
||
|
# This module is started when a chain stall is detected, i.e.,
|
||
|
# a long period without any chain progress, while at the same time being
|
||
|
# connected to a healthy number of different peers.
|
||
|
#
|
||
|
# In such a scenario, the network may partition into multiple groups of peers
|
||
|
# that build on separate branches. It is vital to specifically target peers
|
||
|
# from different partitions and download branches which are not necessarily
|
||
|
# popularly served. Branches may be unpopular because they are expensive to
|
||
|
# apply, and may have a difficult time propagating despite a large weight in
|
||
|
# attestations backing them. This only exacerbates the longer the split view
|
||
|
# scenario is ongoing.
|
||
|
#
|
||
|
# While sync manager can sync popular chains well, it cannot reliably sync
|
||
|
# minority chains only served by a limited number of peers. This module
|
||
|
# augments sync manager in the split view scenario.
|
||
|
# Note that request manager is not running while sync manager is running.
|
||
|
#
|
||
|
# Once both sync manager and branch discovery stopped resolving new blocks,
|
||
|
# `syncStatus` will report `ChainSyncStatus.Degraded` and `blockchain_dag` state
|
||
|
# will be gradually advanced to the wall slot to prepare for block proposal.
|
||
|
# If at that time, no additional branches were discovered, validator duties
|
||
|
# will be performed based on local fork choice.
|
||
|
#
|
||
|
# Note that the canonical chain may not be on the highest slot number,
|
||
|
# as some partitions of the network may have built on top of branches
|
||
|
# with lower validator support while the canonical chain was not visible.
|
||
|
|
||
|
import
|
||
|
std/algorithm,
|
||
|
chronos, chronicles, metrics, results,
|
||
|
../spec/[forks, network],
|
||
|
../consensus_object_pools/block_pools_types,
|
||
|
../networking/[eth2_network, peer_pool],
|
||
|
./sync_protocol
|
||
|
|
||
|
logScope:
|
||
|
topics = "branchdiscovery"
|
||
|
|
||
|
declareGauge beacon_sync_branchdiscovery_state,
|
||
|
"Branch discovery module operating state"
|
||
|
|
||
|
declareCounter beacon_sync_branchdiscovery_discovered_blocks,
|
||
|
"Number of beacon blocks discovered by the branch discovery module"
|
||
|
|
||
|
type
|
||
|
BranchDiscoveryState* {.pure.} = enum
|
||
|
Stopped,
|
||
|
Suspended,
|
||
|
Active
|
||
|
|
||
|
GetSlotCallback* =
|
||
|
proc(): Slot {.gcsafe, raises: [].}
|
||
|
|
||
|
IsBlockKnownCallback* =
|
||
|
proc(blockRoot: Eth2Digest): bool {.gcsafe, raises: [].}
|
||
|
|
||
|
BlockVerifierCallback* = proc(
|
||
|
signedBlock: ForkedSignedBeaconBlock,
|
||
|
blobs: Opt[BlobSidecars]
|
||
|
): Future[Result[void, VerifierError]] {.async: (raises: [CancelledError]).}
|
||
|
|
||
|
BranchDiscovery* = object
|
||
|
network: Eth2Node
|
||
|
getFinalizedSlot: GetSlotCallback
|
||
|
isBlockKnown: IsBlockKnownCallback
|
||
|
blockVerifier: BlockVerifierCallback
|
||
|
isActive: AsyncEvent
|
||
|
loopFuture: Future[void].Raising([])
|
||
|
|
||
|
proc new*(
|
||
|
T: type BranchDiscovery,
|
||
|
network: Eth2Node,
|
||
|
getFinalizedSlot: GetSlotCallback,
|
||
|
isBlockKnown: IsBlockKnownCallback,
|
||
|
blockVerifier: BlockVerifierCallback): ref BranchDiscovery =
|
||
|
let self = (ref BranchDiscovery)(
|
||
|
network: network,
|
||
|
getFinalizedSlot: getFinalizedSlot,
|
||
|
isBlockKnown: isBlockKnown,
|
||
|
blockVerifier: blockVerifier,
|
||
|
isActive: newAsyncEvent())
|
||
|
self[].isActive.fire()
|
||
|
self
|
||
|
|
||
|
proc discoverBranch(
|
||
|
self: BranchDiscovery, peer: Peer) {.async: (raises: [CancelledError]).} =
|
||
|
logScope:
|
||
|
peer
|
||
|
peer_score = peer.getScore()
|
||
|
|
||
|
let
|
||
|
finalizedSlot = self.getFinalizedSlot()
|
||
|
peerHeadSlot = peer.getHeadSlot()
|
||
|
if peerHeadSlot <= finalizedSlot:
|
||
|
peer.updateScore(PeerScoreUseless)
|
||
|
debug "Peer's head slot is already finalized", peerHeadSlot, finalizedSlot
|
||
|
return
|
||
|
|
||
|
var blockRoot = peer.getHeadRoot()
|
||
|
logScope: blockRoot
|
||
|
if self.isBlockKnown(blockRoot):
|
||
|
peer.updateScore(PeerScoreUseless)
|
||
|
debug "Peer's head block root is already known"
|
||
|
return
|
||
|
|
||
|
const
|
||
|
maxRequestsPerBurst = 20
|
||
|
burstDuration = chronos.seconds(40)
|
||
|
let bucket = TokenBucket.new(maxRequestsPerBurst, burstDuration)
|
||
|
|
||
|
var parentSlot = peerHeadSlot + 1
|
||
|
logScope: parentSlot
|
||
|
while true:
|
||
|
if self.isBlockKnown(blockRoot):
|
||
|
debug "Branch from peer no longer unknown"
|
||
|
return
|
||
|
if peer.getScore() < PeerScoreLowLimit:
|
||
|
debug "Failed to discover new branch from peer"
|
||
|
return
|
||
|
|
||
|
debug "Discovering new branch from peer"
|
||
|
try:
|
||
|
await bucket.consume(1)
|
||
|
except CancelledError as exc:
|
||
|
raise exc
|
||
|
except CatchableError as exc:
|
||
|
raiseAssert "TokenBucket.consume should not fail: " & $exc.msg
|
||
|
let rsp = await peer.beaconBlocksByRoot_v2(BlockRootsList @[blockRoot])
|
||
|
if rsp.isErr:
|
||
|
# `eth2_network` already descored according to the specific error
|
||
|
debug "Failed to receive block", err = rsp.error
|
||
|
await sleepAsync(RESP_TIMEOUT_DUR)
|
||
|
continue
|
||
|
template blocks: untyped = rsp.get
|
||
|
|
||
|
# The peer was the one providing us with this block root, it should exist
|
||
|
if blocks.len == 0:
|
||
|
peer.updateScore(PeerScoreNoValues)
|
||
|
debug "Received no blocks", numBlocks = blocks.len
|
||
|
await sleepAsync(RESP_TIMEOUT_DUR)
|
||
|
continue
|
||
|
if blocks.len > 1:
|
||
|
peer.updateScore(PeerScoreBadResponse)
|
||
|
debug "Received too many blocks", numBlocks = blocks.len
|
||
|
return
|
||
|
template blck: untyped = blocks[0][]
|
||
|
if blck.slot >= parentSlot:
|
||
|
peer.updateScore(PeerScoreBadResponse)
|
||
|
debug "Received block older than parent", receivedSlot = blck.slot
|
||
|
return
|
||
|
if blck.root != blockRoot:
|
||
|
peer.updateScore(PeerScoreBadResponse)
|
||
|
debug "Received incorrect block", receivedRoot = blck.root
|
||
|
return
|
||
|
|
||
|
var blobIds: seq[BlobIdentifier]
|
||
|
withBlck(blck):
|
||
|
when consensusFork >= ConsensusFork.Deneb:
|
||
|
for i in 0 ..< forkyBlck.message.body.blob_kzg_commitments.len:
|
||
|
blobIds.add BlobIdentifier(block_root: blockRoot, index: i.BlobIndex)
|
||
|
var blobs: Opt[BlobSidecars]
|
||
|
if blobIds.len > 0:
|
||
|
while true:
|
||
|
if self.isBlockKnown(blockRoot):
|
||
|
debug "Branch from peer no longer unknown"
|
||
|
return
|
||
|
if peer.getScore() < PeerScoreLowLimit:
|
||
|
debug "Failed to discover new branch from peer"
|
||
|
return
|
||
|
|
||
|
try:
|
||
|
await bucket.consume(1)
|
||
|
except CancelledError as exc:
|
||
|
raise exc
|
||
|
except CatchableError as exc:
|
||
|
raiseAssert "TokenBucket.consume should not fail: " & $exc.msg
|
||
|
let r = await peer.blobSidecarsByRoot(BlobIdentifierList blobIds)
|
||
|
if r.isErr:
|
||
|
# `eth2_network` already descored according to the specific error
|
||
|
debug "Failed to receive blobs", err = r.error
|
||
|
await sleepAsync(RESP_TIMEOUT_DUR)
|
||
|
continue
|
||
|
template blobSidecars: untyped = r.unsafeGet
|
||
|
|
||
|
if blobSidecars.len < blobIds.len:
|
||
|
peer.updateScore(PeerScoreMissingValues)
|
||
|
debug "Received not all blobs",
|
||
|
numBlobs = blobSidecars.len, expectedNumBlobs = blobIds.len
|
||
|
await sleepAsync(RESP_TIMEOUT_DUR)
|
||
|
continue
|
||
|
if blobSidecars.len > blobIds.len:
|
||
|
peer.updateScore(PeerScoreBadResponse)
|
||
|
debug "Received too many blobs",
|
||
|
numBlobs = blobSidecars.len, expectedNumBlobs = blobIds.len
|
||
|
return
|
||
|
for i, blobSidecar in blobSidecars:
|
||
|
let root = hash_tree_root(blobSidecar[].signed_block_header.message)
|
||
|
if root != blockRoot:
|
||
|
peer.updateScore(PeerScoreBadResponse)
|
||
|
debug "Received unexpected blob"
|
||
|
return
|
||
|
blobSidecar[].verify_blob_sidecar_inclusion_proof().isOkOr:
|
||
|
peer.updateScore(PeerScoreBadResponse)
|
||
|
debug "Received invalid blob"
|
||
|
return
|
||
|
blobs = Opt.some distinctBase(blobSidecars).sortedByIt(it.index)
|
||
|
for i, blobSidecar in blobs.get:
|
||
|
if blobSidecar[].index != i.BlobIndex:
|
||
|
peer.updateScore(PeerScoreBadResponse)
|
||
|
debug "Received duplicate blobs while others are missing"
|
||
|
return
|
||
|
break
|
||
|
|
||
|
let err = (await self.blockVerifier(blck, blobs)).errorOr:
|
||
|
peer.updateScore(PeerScoreGoodBatchValue + PeerScoreGoodValues)
|
||
|
beacon_sync_branchdiscovery_discovered_blocks.inc()
|
||
|
info "Discovered new branch from peer"
|
||
|
break
|
||
|
case err
|
||
|
of VerifierError.Invalid:
|
||
|
peer.updateScore(PeerScoreBadResponse)
|
||
|
debug "Received invalid block"
|
||
|
return
|
||
|
of VerifierError.UnviableFork:
|
||
|
peer.updateScore(PeerScoreUnviableFork)
|
||
|
debug "Received unviable block"
|
||
|
return
|
||
|
of VerifierError.Duplicate:
|
||
|
peer.updateScore(PeerScoreGoodValues)
|
||
|
debug "Connected new branch from peer"
|
||
|
break
|
||
|
of VerifierError.MissingParent:
|
||
|
peer.updateScore(PeerScoreGoodBatchValue)
|
||
|
parentSlot = blck.slot
|
||
|
blockRoot = blck.getForkedBlockField(parent_root)
|
||
|
continue
|
||
|
|
||
|
proc loop(self: ref BranchDiscovery) {.async: (raises: []).} =
|
||
|
try:
|
||
|
while true:
|
||
|
await self[].isActive.wait()
|
||
|
await sleepAsync(RESP_TIMEOUT_DUR)
|
||
|
|
||
|
let peer =
|
||
|
try:
|
||
|
self[].network.peerPool.acquireNoWait()
|
||
|
except PeerPoolError as exc:
|
||
|
debug "Failed to acquire peer", exc = exc.msg
|
||
|
continue
|
||
|
defer: self[].network.peerPool.release(peer)
|
||
|
|
||
|
await self[].discoverBranch(peer)
|
||
|
except CancelledError:
|
||
|
return
|
||
|
|
||
|
func state*(self: ref BranchDiscovery): BranchDiscoveryState =
|
||
|
if self[].loopFuture == nil:
|
||
|
BranchDiscoveryState.Stopped
|
||
|
elif not self[].isActive.isSet:
|
||
|
BranchDiscoveryState.Suspended
|
||
|
else:
|
||
|
BranchDiscoveryState.Active
|
||
|
|
||
|
proc start*(self: ref BranchDiscovery) =
|
||
|
doAssert self[].loopFuture == nil
|
||
|
info "Starting discovery of new branches"
|
||
|
self[].loopFuture = self.loop()
|
||
|
beacon_sync_branchdiscovery_state.set(self.state.ord().int64)
|
||
|
|
||
|
proc stop*(self: ref BranchDiscovery) {.async: (raises: []).} =
|
||
|
if self[].loopFuture != nil:
|
||
|
info "Stopping discovery of new branches"
|
||
|
await self[].loopFuture.cancelAndWait()
|
||
|
self[].loopFuture = nil
|
||
|
beacon_sync_branchdiscovery_state.set(self.state.ord().int64)
|
||
|
|
||
|
proc suspend*(self: ref BranchDiscovery) =
|
||
|
self[].isActive.clear()
|
||
|
beacon_sync_branchdiscovery_state.set(self.state.ord().int64)
|
||
|
|
||
|
proc resume*(self: ref BranchDiscovery) =
|
||
|
self[].isActive.fire()
|
||
|
beacon_sync_branchdiscovery_state.set(self.state.ord().int64)
|