# beacon_chain # Copyright (c) 2018-2022 Status Research & Development GmbH # Licensed and distributed under either of # * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT). # * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0). # at your option. This file may not be copied, modified, or distributed except according to those terms. when (NimMajor, NimMinor) < (1, 4): {.push raises: [Defect].} else: {.push raises: [].} import std/[options, tables, json, streams, sequtils, uri], chronos, chronicles, metrics, eth/async_utils, json_serialization/std/net, presto, presto/client, ../spec/[keystore, signatures, helpers, crypto], ../spec/datatypes/[phase0, altair], ../spec/eth2_apis/[rest_types, eth2_rest_serialization, rest_remote_signer_calls], ../filepath, ./slashing_protection export streams, options, keystore, phase0, altair, tables, uri, crypto, rest_types, eth2_rest_serialization, rest_remote_signer_calls, slashing_protection const WEB3_SIGNER_DELAY_TOLERANCE = 3.seconds DOPPELGANGER_EPOCHS_COUNT = 2 declareGauge validators, "Number of validators attached to the beacon node" type ValidatorKind* {.pure.} = enum Local, Remote ValidatorConnection* = RestClientRef AttachedValidator* = ref object data*: KeystoreData case kind*: ValidatorKind of ValidatorKind.Local: discard of ValidatorKind.Remote: clients*: seq[(RestClientRef, RemoteSignerInfo)] threshold*: uint32 # The index at which this validator has been observed in the chain - # it does not change as long as there are no reorgs on eth1 - however, the # index might not be valid in all eth2 histories, so it should not be # assumed that a valid index is stored here! index*: Opt[ValidatorIndex] # Epoch when validator activated. activationEpoch*: Opt[Epoch] # Cache the latest slot signature - the slot signature is used to determine # if the validator will be aggregating (in the near future) slotSignature*: Opt[tuple[slot: Slot, signature: ValidatorSig]] # For the external payload builder; each epoch, the external payload # builder should be informed of current validators externalBuilderRegistration*: Opt[SignedValidatorRegistrationV1] startSlot*: Slot lastWarning*: Opt[Slot] SignResponse* = Web3SignerDataResponse SignatureResult* = Result[ValidatorSig, string] SyncCommitteeMessageResult* = Result[SyncCommitteeMessage, string] ValidatorPool* = object validators*: Table[ValidatorPubKey, AttachedValidator] slashingProtection*: SlashingProtectionDB template pubkey*(v: AttachedValidator): ValidatorPubKey = v.data.pubkey func shortLog*(v: AttachedValidator): string = case v.kind of ValidatorKind.Local: shortLog(v.pubkey) of ValidatorKind.Remote: shortLog(v.pubkey) func init*(T: type ValidatorPool, slashingProtectionDB: SlashingProtectionDB): T = ## Initialize the validator pool and the slashing protection service ## `genesis_validators_root` is used as an unique ID for the ## blockchain ## `backend` is the KeyValue Store backend T(slashingProtection: slashingProtectionDB) template count*(pool: ValidatorPool): int = len(pool.validators) proc addLocalValidator*( pool: var ValidatorPool, keystore: KeystoreData, index: Opt[ValidatorIndex], feeRecipient: Eth1Address, slot: Slot, activationEpoch: Opt[Epoch]) = doAssert keystore.kind == KeystoreKind.Local let v = AttachedValidator( kind: ValidatorKind.Local, index: index, data: keystore, externalBuilderRegistration: Opt.none SignedValidatorRegistrationV1, startSlot: slot, activationEpoch: activationEpoch ) pool.validators[v.pubkey] = v # Fee recipient may change after startup, but we log the initial value here notice "Local validator attached", pubkey = v.pubkey, validator = shortLog(v), initial_fee_recipient = feeRecipient.toHex(), start_slot = slot validators.set(pool.count().int64) proc addLocalValidator*( pool: var ValidatorPool, keystore: KeystoreData, feeRecipient: Eth1Address, slot: Slot) = addLocalValidator(pool, keystore, feeRecipient, slot) proc addRemoteValidator*(pool: var ValidatorPool, keystore: KeystoreData, clients: seq[(RestClientRef, RemoteSignerInfo)], index: Opt[ValidatorIndex], feeRecipient: Eth1Address, slot: Slot, activationEpoch: Opt[Epoch]) = doAssert keystore.kind == KeystoreKind.Remote let v = AttachedValidator( kind: ValidatorKind.Remote, index: index, data: keystore, clients: clients, externalBuilderRegistration: Opt.none SignedValidatorRegistrationV1, startSlot: slot, activationEpoch: activationEpoch ) pool.validators[v.pubkey] = v notice "Remote validator attached", pubkey = v.pubkey, validator = shortLog(v), remote_signer = $keystore.remotes, initial_fee_recipient = feeRecipient.toHex(), start_slot = slot validators.set(pool.count().int64) proc getValidator*(pool: ValidatorPool, validatorKey: ValidatorPubKey): AttachedValidator = pool.validators.getOrDefault(validatorKey) proc contains*(pool: ValidatorPool, pubkey: ValidatorPubKey): bool = ## Returns ``true`` if validator with key ``pubkey`` present in ``pool``. pool.validators.contains(pubkey) proc removeValidator*(pool: var ValidatorPool, pubkey: ValidatorPubKey) = ## Delete validator with public key ``pubkey`` from ``pool``. let validator = pool.validators.getOrDefault(pubkey) if not(isNil(validator)): pool.validators.del(pubkey) case validator.kind of ValidatorKind.Local: notice "Local validator detached", pubkey, validator = shortLog(validator) of ValidatorKind.Remote: notice "Remote validator detached", pubkey, validator = shortLog(validator) validators.set(pool.count().int64) proc updateValidator*(pool: var ValidatorPool, pubkey: ValidatorPubKey, index: ValidatorIndex) = ## Set validator ``index`` to validator with public key ``pubkey`` stored ## in ``pool``. ## This procedure will not raise if validator with public key ``pubkey`` is ## not present in the pool. var v: AttachedValidator if pool.validators.pop(pubkey, v): v.index = Opt.some(index) pool.validators[pubkey] = v proc close*(pool: var ValidatorPool) = ## Unlock and close all validator keystore's files managed by ``pool``. for validator in pool.validators.values(): let res = validator.data.handle.closeLockedFile() if res.isErr(): notice "Could not unlock validator's keystore file", pubkey = validator.pubkey, validator = shortLog(validator) proc addRemoteValidator*(pool: var ValidatorPool, keystore: KeystoreData, index: Opt[ValidatorIndex], feeRecipient: Eth1Address, slot: Slot, activationEpoch: Opt[Epoch]) = var clients: seq[(RestClientRef, RemoteSignerInfo)] let httpFlags = block: var res: set[HttpClientFlag] if RemoteKeystoreFlag.IgnoreSSLVerification in keystore.flags: res.incl({HttpClientFlag.NoVerifyHost, HttpClientFlag.NoVerifyServerName}) res let prestoFlags = {RestClientFlag.CommaSeparatedArray} for remote in keystore.remotes: let client = RestClientRef.new($remote.url, prestoFlags, httpFlags) if client.isErr(): warn "Unable to resolve distributed signer address", remote_url = $remote.url, validator = $remote.pubkey clients.add((client.get(), remote)) pool.addRemoteValidator(keystore, clients, index, feeRecipient, slot, activationEpoch) iterator publicKeys*(pool: ValidatorPool): ValidatorPubKey = for item in pool.validators.keys(): yield item iterator indices*(pool: ValidatorPool): ValidatorIndex = for item in pool.validators.values(): if item.index.isSome(): yield item.index.get() iterator items*(pool: ValidatorPool): AttachedValidator = for item in pool.validators.values(): yield item proc doppelgangerCheck*(validator: AttachedValidator, epoch: Epoch, broadcastEpoch: Epoch): Result[bool, cstring] = ## Perform check of ``validator`` for doppelganger. ## ## Returns ``true`` if `validator` do not have doppelganger and could perform ## validator actions. ## ## Returns ``false`` if `validator` has doppelganger in network and MUST not ## perform any validator actions. ## ## Returns error, if its impossible to perform doppelganger check. let startEpoch = validator.startSlot.epoch() # startEpoch is epoch when / # validator appeared in beacon_node. activationEpoch = validator.activationEpoch # validator's activation_epoch currentStartEpoch = max(startEpoch, broadcastEpoch) if activationEpoch.isNone() or activationEpoch.get() > epoch: # If validator's `activation_epoch` is not set or `activation_epoch` is far # from current wall epoch - it should not participate in the network. err("Validator is not activated yet, or beacon node clock is invalid") else: if currentStartEpoch > epoch: err("Validator is not started or broadcast is not started, or " & "beacon node clock is invalid") else: let actEpoch = activationEpoch.get() # max(startEpoch, broadcastEpoch) <= activateEpoch <= epoch if (currentStartEpoch <= actEpoch) and (actEpoch <= epoch): # Validator was activated, we going to skip doppelganger protection ok(true) else: if epoch - currentStartEpoch < DOPPELGANGER_EPOCHS_COUNT: # Validator is started in unsafe period. ok(false) else: # Validator is already passed checking period, so we allow # validator to participate in the network. ok(true) proc signWithDistributedKey(v: AttachedValidator, request: Web3SignerRequest): Future[SignatureResult] {.async.} = doAssert v.data.threshold <= uint32(v.clients.len) let signatureReqs = mapIt(v.clients, it[0].signData(it[1].pubkey, request)) deadline = sleepAsync(WEB3_SIGNER_DELAY_TOLERANCE) await allFutures(signatureReqs) or deadline var shares: seq[SignatureShare] var neededShares = v.data.threshold for i, req in signatureReqs: template shareInfo: untyped = v.clients[i][1] if req.done and req.read.isOk: shares.add req.read.get.toSignatureShare(shareInfo.id) neededShares = neededShares - 1 else: warn "Failed to obtain signature from remote signer", pubkey = shareInfo.pubkey, signerUrl = $(v.clients[i][0].address) if neededShares == 0: let recovered = shares.recoverSignature() return SignatureResult.ok recovered.toValidatorSig return SignatureResult.err "Not enough shares to recover the signature" proc signWithSingleKey(v: AttachedValidator, request: Web3SignerRequest): Future[SignatureResult] {.async.} = doAssert v.clients.len == 1 let (client, info) = v.clients[0] let res = awaitWithTimeout(client.signData(info.pubkey, request), WEB3_SIGNER_DELAY_TOLERANCE): return SignatureResult.err "Timeout" if res.isErr: return SignatureResult.err res.error else: return SignatureResult.ok res.get.toValidatorSig proc signData(v: AttachedValidator, request: Web3SignerRequest): Future[SignatureResult] = doAssert v.kind == ValidatorKind.Remote debug "Signing request with remote signer", validator = shortLog(v), kind = request.kind if v.clients.len == 1: v.signWithSingleKey(request) else: v.signWithDistributedKey(request) # https://github.com/ethereum/consensus-specs/blob/v1.3.0-alpha.0/specs/phase0/validator.md#signature proc getBlockSignature*(v: AttachedValidator, fork: Fork, genesis_validators_root: Eth2Digest, slot: Slot, block_root: Eth2Digest, blck: ForkedBeaconBlock | ForkedBlindedBeaconBlock | BlindedBeaconBlock ): Future[SignatureResult] {.async.} = return case v.kind of ValidatorKind.Local: SignatureResult.ok( get_block_signature( fork, genesis_validators_root, slot, block_root, v.data.privateKey).toValidatorSig()) of ValidatorKind.Remote: when blck is ForkedBlindedBeaconBlock: let web3SignerBlock = case blck.kind of BeaconBlockFork.Phase0: Web3SignerForkedBeaconBlock( kind: BeaconBlockFork.Phase0, phase0Data: blck.phase0Data) of BeaconBlockFork.Altair: Web3SignerForkedBeaconBlock( kind: BeaconBlockFork.Altair, altairData: blck.altairData) of BeaconBlockFork.Bellatrix: Web3SignerForkedBeaconBlock( kind: BeaconBlockFork.Bellatrix, bellatrixData: blck.bellatrixData.toBeaconBlockHeader) of BeaconBlockFork.Capella: Web3SignerForkedBeaconBlock( kind: BeaconBlockFork.Capella, capellaData: blck.capellaData.toBeaconBlockHeader) request = Web3SignerRequest.init( fork, genesis_validators_root, web3SignerBlock) await v.signData(request) elif blck is BlindedBeaconBlock: let request = Web3SignerRequest.init( fork, genesis_validators_root, Web3SignerForkedBeaconBlock( kind: BeaconBlockFork.Bellatrix, bellatrixData: blck.toBeaconBlockHeader)) await v.signData(request) else: let web3SignerBlock = case blck.kind of BeaconBlockFork.Phase0: Web3SignerForkedBeaconBlock( kind: BeaconBlockFork.Phase0, phase0Data: blck.phase0Data) of BeaconBlockFork.Altair: Web3SignerForkedBeaconBlock( kind: BeaconBlockFork.Altair, altairData: blck.altairData) of BeaconBlockFork.Bellatrix: Web3SignerForkedBeaconBlock( kind: BeaconBlockFork.Bellatrix, bellatrixData: blck.bellatrixData.toBeaconBlockHeader) of BeaconBlockFork.Capella: Web3SignerForkedBeaconBlock( kind: BeaconBlockFork.Capella, capellaData: blck.capellaData.toBeaconBlockHeader) request = Web3SignerRequest.init( fork, genesis_validators_root, web3SignerBlock) await v.signData(request) # https://github.com/ethereum/consensus-specs/blob/v1.3.0-alpha.0/specs/phase0/validator.md#aggregate-signature proc getAttestationSignature*(v: AttachedValidator, fork: Fork, genesis_validators_root: Eth2Digest, data: AttestationData ): Future[SignatureResult] {.async.} = return case v.kind of ValidatorKind.Local: SignatureResult.ok( get_attestation_signature( fork, genesis_validators_root, data, v.data.privateKey).toValidatorSig()) of ValidatorKind.Remote: let request = Web3SignerRequest.init(fork, genesis_validators_root, data) await v.signData(request) # https://github.com/ethereum/consensus-specs/blob/v1.3.0-alpha.0/specs/phase0/validator.md#broadcast-aggregate proc getAggregateAndProofSignature*(v: AttachedValidator, fork: Fork, genesis_validators_root: Eth2Digest, aggregate_and_proof: AggregateAndProof ): Future[SignatureResult] {.async.} = return case v.kind of ValidatorKind.Local: SignatureResult.ok( get_aggregate_and_proof_signature( fork, genesis_validators_root, aggregate_and_proof, v.data.privateKey).toValidatorSig() ) of ValidatorKind.Remote: let request = Web3SignerRequest.init( fork, genesis_validators_root, aggregate_and_proof) await v.signData(request) # https://github.com/ethereum/consensus-specs/blob/v1.3.0-alpha.0/specs/altair/validator.md#prepare-sync-committee-message proc getSyncCommitteeMessage*(v: AttachedValidator, fork: Fork, genesis_validators_root: Eth2Digest, slot: Slot, beacon_block_root: Eth2Digest ): Future[SyncCommitteeMessageResult] {.async.} = let signature = case v.kind of ValidatorKind.Local: SignatureResult.ok(get_sync_committee_message_signature( fork, genesis_validators_root, slot, beacon_block_root, v.data.privateKey).toValidatorSig()) of ValidatorKind.Remote: let request = Web3SignerRequest.init( fork, genesis_validators_root, beacon_block_root, slot) await v.signData(request) if signature.isErr: return SyncCommitteeMessageResult.err("Failed to obtain signature") return SyncCommitteeMessageResult.ok( SyncCommitteeMessage( slot: slot, beacon_block_root: beacon_block_root, validator_index: uint64(v.index.get()), signature: signature.get() ) ) # https://github.com/ethereum/consensus-specs/blob/v1.2.0/specs/altair/validator.md#aggregation-selection proc getSyncCommitteeSelectionProof*(v: AttachedValidator, fork: Fork, genesis_validators_root: Eth2Digest, slot: Slot, subcommittee_index: SyncSubcommitteeIndex ): Future[SignatureResult] {.async.} = return case v.kind of ValidatorKind.Local: SignatureResult.ok(get_sync_committee_selection_proof( fork, genesis_validators_root, slot, subcommittee_index, v.data.privateKey).toValidatorSig()) of ValidatorKind.Remote: let request = Web3SignerRequest.init( fork, genesis_validators_root, SyncAggregatorSelectionData( slot: slot, subcommittee_index: uint64 subcommittee_index) ) await v.signData(request) # https://github.com/ethereum/consensus-specs/blob/v1.2.0/specs/altair/validator.md#broadcast-sync-committee-contribution proc getContributionAndProofSignature*(v: AttachedValidator, fork: Fork, genesis_validators_root: Eth2Digest, contribution_and_proof: ContributionAndProof ): Future[SignatureResult] {.async.} = return case v.kind of ValidatorKind.Local: SignatureResult.ok(get_contribution_and_proof_signature( fork, genesis_validators_root, contribution_and_proof, v.data.privateKey).toValidatorSig()) of ValidatorKind.Remote: let request = Web3SignerRequest.init( fork, genesis_validators_root, contribution_and_proof) await v.signData(request) # https://github.com/ethereum/consensus-specs/blob/v1.3.0-alpha.0/specs/phase0/validator.md#randao-reveal proc getEpochSignature*(v: AttachedValidator, fork: Fork, genesis_validators_root: Eth2Digest, epoch: Epoch ): Future[SignatureResult] {.async.} = return case v.kind of ValidatorKind.Local: SignatureResult.ok(get_epoch_signature( fork, genesis_validators_root, epoch, v.data.privateKey).toValidatorSig()) of ValidatorKind.Remote: let request = Web3SignerRequest.init( fork, genesis_validators_root, epoch) await v.signData(request) # https://github.com/ethereum/consensus-specs/blob/v1.3.0-alpha.0/specs/phase0/validator.md#aggregation-selection proc getSlotSignature*(v: AttachedValidator, fork: Fork, genesis_validators_root: Eth2Digest, slot: Slot ): Future[SignatureResult] {.async.} = if v.slotSignature.isSome and v.slotSignature.get.slot == slot: return SignatureResult.ok(v.slotSignature.get.signature) let signature = case v.kind of ValidatorKind.Local: SignatureResult.ok(get_slot_signature( fork, genesis_validators_root, slot, v.data.privateKey).toValidatorSig()) of ValidatorKind.Remote: let request = Web3SignerRequest.init(fork, genesis_validators_root, slot) await v.signData(request) if signature.isErr: return signature v.slotSignature = Opt.some((slot, signature.get)) return signature # https://github.com/ethereum/builder-specs/blob/v0.2.0/specs/builder.md#signing proc getBuilderSignature*(v: AttachedValidator, fork: Fork, validatorRegistration: ValidatorRegistrationV1): Future[SignatureResult] {.async.} = return case v.kind of ValidatorKind.Local: SignatureResult.ok(get_builder_signature( fork, validatorRegistration, v.data.privateKey).toValidatorSig()) of ValidatorKind.Remote: let request = Web3SignerRequest.init( fork, ZERO_HASH, validatorRegistration) await v.signData(request)