# beacon_chain # Copyright (c) 2018-2020 Status Research & Development GmbH # Licensed and distributed under either of # * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT). # * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0). # at your option. This file may not be copied, modified, or distributed except according to those terms. # State transition - block processing, as described in # https://github.com/ethereum/eth2.0-specs/blob/master/specs/core/0_beacon-chain.md#beacon-chain-state-transition-function # # The purpose of this code right is primarily educational, to help piece # together the mechanics of the beacon state and to discover potential problem # areas. # # The entry point is `process_block` which is at the bottom of this file. # # General notes about the code (TODO): # * Weird styling - the sections taken from the spec use python styling while # the others use NEP-1 - helps grepping identifiers in spec # * We mix procedural and functional styles for no good reason, except that the # spec does so also. # * For indices, we get a mix of uint64, ValidatorIndex and int - this is currently # swept under the rug with casts # * Sane error handling is missing in most cases (yay, we'll get the chance to # debate exceptions again!) # When updating the code, add TODO sections to mark where there are clear # improvements to be made - other than that, keep things similar to spec for # now. {.push raises: [Defect].} import algorithm, collections/sets, chronicles, options, sequtils, sets, ../extras, ../ssz/merkleization, metrics, beaconstate, crypto, datatypes, digest, helpers, validator, ../../nbench/bench_lab # https://github.com/ethereum/eth2.0-metrics/blob/master/metrics.md#additional-metrics declareGauge beacon_current_live_validators, "Number of active validators that successfully included attestation on chain for current epoch" # On block declareGauge beacon_previous_live_validators, "Number of active validators that successfully included attestation on chain for previous epoch" # On block declareGauge beacon_pending_deposits, "Number of pending deposits (state.eth1_data.deposit_count - state.eth1_deposit_index)" # On block declareGauge beacon_processed_deposits_total, "Number of total deposits included on chain" # On block # https://github.com/ethereum/eth2.0-specs/blob/v0.11.3/specs/phase0/beacon-chain.md#block-header proc process_block_header*( state: var BeaconState, blck: BeaconBlock, flags: UpdateFlags, stateCache: var StateCache): bool {.nbench.}= # Verify that the slots match if not (blck.slot == state.slot): notice "Block header: slot mismatch", block_slot = shortLog(blck.slot), state_slot = shortLog(state.slot) return false # Verify that the block is newer than latest block header if not (blck.slot > state.latest_block_header.slot): debug "Block header: block not newer than latest block header" return false # Verify that proposer index is the correct index let proposer_index = get_beacon_proposer_index(state, stateCache) if proposer_index.isNone: debug "Block header: proposer missing" return false if not (blck.proposer_index.ValidatorIndex == proposer_index.get): notice "Block header: proposer index incorrect", block_proposer_index = blck.proposer_index.ValidatorIndex, proposer_index = proposer_index.get return false # Verify that the parent matches if skipBlockParentRootValidation notin flags and not (blck.parent_root == hash_tree_root(state.latest_block_header)): notice "Block header: previous block root mismatch", latest_block_header = state.latest_block_header, blck = shortLog(blck), latest_block_header_root = shortLog(hash_tree_root(state.latest_block_header)) return false # Cache current block as the new latest block state.latest_block_header = BeaconBlockHeader( slot: blck.slot, proposer_index: blck.proposer_index, parent_root: blck.parent_root, # state_root: zeroed, overwritten in the next `process_slot` call body_root: hash_tree_root(blck.body), ) # Verify proposer is not slashed let proposer = state.validators[proposer_index.get] if proposer.slashed: notice "Block header: proposer slashed" return false true proc `xor`[T: array](a, b: T): T = for i in 0.. SLOTS_PER_ETH1_VOTING_PERIOD.int: state.eth1_data = body.eth1_data # https://github.com/ethereum/eth2.0-specs/blob/v0.11.3/specs/phase0/beacon-chain.md#is_slashable_validator func is_slashable_validator(validator: Validator, epoch: Epoch): bool = # Check if ``validator`` is slashable. (not validator.slashed) and (validator.activation_epoch <= epoch) and (epoch < validator.withdrawable_epoch) # https://github.com/ethereum/eth2.0-specs/blob/v0.11.3/specs/phase0/beacon-chain.md#proposer-slashings proc process_proposer_slashing*( state: var BeaconState, proposer_slashing: ProposerSlashing, flags: UpdateFlags, stateCache: var StateCache): bool {.nbench.}= let header_1 = proposer_slashing.signed_header_1.message header_2 = proposer_slashing.signed_header_2.message # Not from spec if header_1.proposer_index.int >= state.validators.len: notice "Proposer slashing: invalid proposer index" return false # Verify header slots match if not (header_1.slot == header_2.slot): notice "Proposer slashing: slot mismatch" return false # Verify header proposer indices match if not (header_1.proposer_index == header_2.proposer_index): notice "Proposer slashing: proposer indices mismatch" return false # Verify the headers are different if not (header_1 != header_2): notice "Proposer slashing: headers not different" return false # Verify the proposer is slashable let proposer = state.validators[header_1.proposer_index] if not is_slashable_validator(proposer, get_current_epoch(state)): notice "Proposer slashing: slashed proposer" return false # Verify signatures if skipBlsValidation notin flags: for i, signed_header in [proposer_slashing.signed_header_1, proposer_slashing.signed_header_2]: let domain = get_domain( state, DOMAIN_BEACON_PROPOSER, compute_epoch_at_slot(signed_header.message.slot) ) let signing_root = compute_signing_root(signed_header.message, domain) if not blsVerify(proposer.pubkey, signing_root.data, signed_header.signature): notice "Proposer slashing: invalid signature", signature_index = i return false slashValidator(state, header_1.proposer_index.ValidatorIndex, stateCache) true # https://github.com/ethereum/eth2.0-specs/blob/v0.11.3/specs/phase0/beacon-chain.md#is_slashable_attestation_data func is_slashable_attestation_data( data_1: AttestationData, data_2: AttestationData): bool = ## Check if ``data_1`` and ``data_2`` are slashable according to Casper FFG ## rules. # Double vote (data_1 != data_2 and data_1.target.epoch == data_2.target.epoch) or # Surround vote (data_1.source.epoch < data_2.source.epoch and data_2.target.epoch < data_1.target.epoch) # https://github.com/ethereum/eth2.0-specs/blob/v0.11.3/specs/phase0/beacon-chain.md#attester-slashings proc process_attester_slashing*( state: var BeaconState, attester_slashing: AttesterSlashing, flags: UpdateFlags, stateCache: var StateCache ): bool {.nbench.}= let attestation_1 = attester_slashing.attestation_1 attestation_2 = attester_slashing.attestation_2 if not is_slashable_attestation_data( attestation_1.data, attestation_2.data): notice "Attester slashing: surround or double vote check failed" return false if not is_valid_indexed_attestation(state, attestation_1, flags): notice "Attester slashing: invalid attestation 1" return false if not is_valid_indexed_attestation(state, attestation_2, flags): notice "Attester slashing: invalid attestation 2" return false var slashed_any = false for index in sorted(toSeq(intersection( toHashSet(attestation_1.attesting_indices.asSeq), toHashSet(attestation_2.attesting_indices.asSeq)).items), system.cmp): if is_slashable_validator( state.validators[index.int], get_current_epoch(state)): slash_validator(state, index.ValidatorIndex, stateCache) slashed_any = true if not slashed_any: notice "Attester slashing: Trying to slash participant(s) twice" return false return true # https://github.com/ethereum/eth2.0-specs/blob/v0.9.4/specs/core/0_beacon-chain.md#voluntary-exits proc process_voluntary_exit*( state: var BeaconState, signed_voluntary_exit: SignedVoluntaryExit, flags: UpdateFlags): bool {.nbench.}= let voluntary_exit = signed_voluntary_exit.message # Not in spec. Check that validator_index is in range if voluntary_exit.validator_index.int >= state.validators.len: notice "Exit: invalid validator index", index = voluntary_exit.validator_index, num_validators = state.validators.len return false let validator = state.validators[voluntary_exit.validator_index.int] # Verify the validator is active if not is_active_validator(validator, get_current_epoch(state)): notice "Exit: validator not active" return false # Verify the validator has not yet exited if validator.exit_epoch != FAR_FUTURE_EPOCH: notice "Exit: validator has exited" return false ## Exits must specify an epoch when they become valid; they are not valid ## before then if not (get_current_epoch(state) >= voluntary_exit.epoch): notice "Exit: exit epoch not passed" return false # Verify the validator has been active long enough if not (get_current_epoch(state) >= validator.activation_epoch + PERSISTENT_COMMITTEE_PERIOD): notice "Exit: not in validator set long enough" return false # Verify signature if skipBlsValidation notin flags: let domain = get_domain(state, DOMAIN_VOLUNTARY_EXIT, voluntary_exit.epoch) let signing_root = compute_signing_root(voluntary_exit, domain) if not bls_verify(validator.pubkey, signing_root.data, signed_voluntary_exit.signature): notice "Exit: invalid signature" return false # Initiate exit debug "Exit: processing voluntary exit (validator_leaving)", index = voluntary_exit.validator_index, num_validators = state.validators.len, epoch = voluntary_exit.epoch, current_epoch = get_current_epoch(state), validator_slashed = validator.slashed, validator_withdrawable_epoch = validator.withdrawable_epoch, validator_exit_epoch = validator.exit_epoch, validator_effective_balance = validator.effective_balance var cache = get_empty_per_epoch_cache() initiate_validator_exit( state, voluntary_exit.validator_index.ValidatorIndex, cache) true # https://github.com/ethereum/eth2.0-specs/blob/v0.11.3/specs/phase0/beacon-chain.md#operations proc process_operations(state: var BeaconState, body: BeaconBlockBody, flags: UpdateFlags, stateCache: var StateCache): bool {.nbench.} = # Verify that outstanding deposits are processed up to the maximum number of # deposits let num_deposits = len(body.deposits).int64 req_deposits = min(MAX_DEPOSITS, state.eth1_data.deposit_count.int64 - state.eth1_deposit_index.int64) if not (num_deposits == req_deposits): notice "processOperations: incorrect number of deposits", num_deposits = num_deposits, req_deposits = req_deposits, deposit_count = state.eth1_data.deposit_count, deposit_index = state.eth1_deposit_index return false template for_ops_cached(operations: auto, fn: auto) = for operation in operations: if not fn(state, operation, flags, stateCache): return false template for_ops(operations: auto, fn: auto) = for operation in operations: if not fn(state, operation, flags): return false for_ops_cached(body.proposer_slashings, process_proposer_slashing) for_ops_cached(body.attester_slashings, process_attester_slashing) for_ops_cached(body.attestations, process_attestation) for_ops(body.deposits, process_deposit) for_ops(body.voluntary_exits, process_voluntary_exit) true # https://github.com/ethereum/eth2.0-specs/blob/v0.11.3/specs/phase0/beacon-chain.md#block-processing proc process_block*( state: var BeaconState, blck: BeaconBlock, flags: UpdateFlags, stateCache: var StateCache): bool {.nbench.}= ## When there's a new block, we need to verify that the block is sane and ## update the state accordingly # TODO when there's a failure, we should reset the state! # TODO probably better to do all verification first, then apply state changes # https://github.com/ethereum/eth2.0-metrics/blob/master/metrics.md#additional-metrics # doesn't seem to specify at what point in block processing this metric is to be read, # and this avoids the early-return issue (could also use defer, etc). beacon_pending_deposits.set( state.eth1_data.deposit_count.int64 - state.eth1_deposit_index.int64) beacon_processed_deposits_total.set(state.eth1_deposit_index.int64) # Adds nontrivial additional computation, but only does so when metrics # enabled. beacon_current_live_validators.set(toHashSet( mapIt(state.current_epoch_attestations, it.proposerIndex)).len.int64) beacon_previous_live_validators.set(toHashSet( mapIt(state.previous_epoch_attestations, it.proposerIndex)).len.int64) if not process_block_header(state, blck, flags, stateCache): notice "Block header not valid", slot = shortLog(state.slot) return false if not processRandao(state, blck.body, flags, stateCache): debug "[Block processing] Randao failure", slot = shortLog(state.slot) return false process_eth1_data(state, blck.body) if not process_operations(state, blck.body, flags, stateCache): # One could combine this and the default-true, but that's a bit implicit return false true # https://github.com/ethereum/eth2.0-specs/blob/v0.11.1/specs/phase0/validator.md#aggregation-selection func get_slot_signature*( fork: Fork, genesis_validators_root: Eth2Digest, slot: Slot, privkey: ValidatorPrivKey): ValidatorSig = let domain = get_domain(fork, DOMAIN_SELECTION_PROOF, compute_epoch_at_slot(slot), genesis_validators_root) signing_root = compute_signing_root(slot, domain) blsSign(privKey, signing_root.data) # https://github.com/ethereum/eth2.0-specs/blob/v0.11.1/specs/phase0/validator.md#randao-reveal func get_epoch_signature*( fork: Fork, genesis_validators_root: Eth2Digest, slot: Slot, privkey: ValidatorPrivKey): ValidatorSig = let domain = get_domain(fork, DOMAIN_RANDAO, compute_epoch_at_slot(slot), genesis_validators_root) signing_root = compute_signing_root(compute_epoch_at_slot(slot), domain) blsSign(privKey, signing_root.data) # https://github.com/ethereum/eth2.0-specs/blob/v0.11.1/specs/phase0/validator.md#signature func get_block_signature*( fork: Fork, genesis_validators_root: Eth2Digest, slot: Slot, root: Eth2Digest, privkey: ValidatorPrivKey): ValidatorSig = let domain = get_domain(fork, DOMAIN_BEACON_PROPOSER, compute_epoch_at_slot(slot), genesis_validators_root) signing_root = compute_signing_root(root, domain) blsSign(privKey, signing_root.data) # https://github.com/ethereum/eth2.0-specs/blob/v0.11.1/specs/phase0/validator.md#broadcast-aggregate func get_aggregate_and_proof_signature*(fork: Fork, genesis_validators_root: Eth2Digest, aggregate_and_proof: AggregateAndProof, privKey: ValidatorPrivKey): ValidatorSig = let aggregate = aggregate_and_proof.aggregate domain = get_domain(fork, DOMAIN_AGGREGATE_AND_PROOF, compute_epoch_at_slot(aggregate.data.slot), genesis_validators_root) signing_root = compute_signing_root(aggregate_and_proof, domain) return blsSign(privKey, signing_root.data) # https://github.com/ethereum/eth2.0-specs/blob/v0.11.1/specs/phase0/validator.md#aggregate-signature func get_attestation_signature*( fork: Fork, genesis_validators_root: Eth2Digest, attestation: AttestationData, privkey: ValidatorPrivKey): ValidatorSig = let attestationRoot = hash_tree_root(attestation) domain = get_domain(fork, DOMAIN_BEACON_ATTESTER, attestation.target.epoch, genesis_validators_root) signing_root = compute_signing_root(attestationRoot, domain) blsSign(privKey, signing_root.data)