@lodestar/beacon-node
Version:
A Typescript implementation of the beacon chain
219 lines • 14.3 kB
JavaScript
import { routes } from "@lodestar/api";
import { SYNC_COMMITTEE_SUBNET_SIZE, isForkPostElectra } from "@lodestar/params";
import { isElectraAttestation, ssz } from "@lodestar/types";
import { AttestationError, AttestationErrorCode, GossipAction, SyncCommitteeError, } from "../../../../chain/errors/index.js";
import { validateApiAttesterSlashing } from "../../../../chain/validation/attesterSlashing.js";
import { validateApiBlsToExecutionChange } from "../../../../chain/validation/blsToExecutionChange.js";
import { toElectraSingleAttestation, validateApiAttestation } from "../../../../chain/validation/index.js";
import { validateApiProposerSlashing } from "../../../../chain/validation/proposerSlashing.js";
import { validateApiSyncCommittee } from "../../../../chain/validation/syncCommittee.js";
import { validateApiVoluntaryExit } from "../../../../chain/validation/voluntaryExit.js";
import { validateGossipFnRetryUnknownRoot } from "../../../../network/processor/gossipHandlers.js";
import { ApiError, IndexedError } from "../../errors.js";
export function getBeaconPoolApi({ chain, logger, metrics, network, }) {
return {
async getPoolAttestations({ slot, committeeIndex }) {
// Already filtered by slot
let attestations = chain.aggregatedAttestationPool.getAll(slot);
const fork = chain.config.getForkName(slot ?? chain.clock.currentSlot);
if (isForkPostElectra(fork)) {
throw new ApiError(400, `Use getPoolAttestationsV2 to retrieve pool attestations for post-electra fork=${fork}`);
}
if (committeeIndex !== undefined) {
attestations = attestations.filter((attestation) => committeeIndex === attestation.data.index);
}
return { data: attestations };
},
async getPoolAttestationsV2({ slot, committeeIndex }) {
// Already filtered by slot
let attestations = chain.aggregatedAttestationPool.getAll(slot);
const fork = chain.config.getForkName(slot ?? attestations[0]?.data.slot ?? chain.clock.currentSlot);
const isPostElectra = isForkPostElectra(fork);
attestations = attestations.filter((attestation) => isPostElectra ? isElectraAttestation(attestation) : !isElectraAttestation(attestation));
if (committeeIndex !== undefined) {
attestations = attestations.filter((attestation) => committeeIndex === attestation.data.index);
}
return { data: attestations, meta: { version: fork } };
},
async getPoolAttesterSlashings() {
const fork = chain.config.getForkName(chain.clock.currentSlot);
if (isForkPostElectra(fork)) {
throw new ApiError(400, `Use getPoolAttesterSlashingsV2 to retrieve pool attester slashings for post-electra fork=${fork}`);
}
return { data: chain.opPool.getAllAttesterSlashings() };
},
async getPoolAttesterSlashingsV2() {
const fork = chain.config.getForkName(chain.clock.currentSlot);
return { data: chain.opPool.getAllAttesterSlashings(), meta: { version: fork } };
},
async getPoolProposerSlashings() {
return { data: chain.opPool.getAllProposerSlashings() };
},
async getPoolVoluntaryExits() {
return { data: chain.opPool.getAllVoluntaryExits() };
},
async getPoolBLSToExecutionChanges() {
return { data: chain.opPool.getAllBlsToExecutionChanges().map(({ data }) => data) };
},
async submitPoolAttestations({ signedAttestations }) {
await this.submitPoolAttestationsV2({ signedAttestations });
},
async submitPoolAttestationsV2({ signedAttestations }) {
const seenTimestampSec = Date.now() / 1000;
const failures = [];
// api attestation has high priority, we allow them to be added to pool even when it's late
// this is to prevent "No aggregated attestation for slot" issue
// see https://github.com/ChainSafe/lodestar/issues/7548
const priority = true;
await Promise.all(signedAttestations.map(async (attestation, i) => {
try {
const fork = chain.config.getForkName(chain.clock.currentSlot);
const validateFn = () => validateApiAttestation(fork, chain, { attestation, serializedData: null });
const { slot, beaconBlockRoot } = attestation.data;
// when a validator is configured with multiple beacon node urls, this attestation data may come from another beacon node
// and the block hasn't been in our forkchoice since we haven't seen / processing that block
// see https://github.com/ChainSafe/lodestar/issues/5098
const { indexedAttestation, subnet, attDataRootHex, committeeIndex, committeeValidatorIndex, committeeSize } = await validateGossipFnRetryUnknownRoot(validateFn, network, chain, slot, beaconBlockRoot);
if (network.shouldAggregate(subnet, slot)) {
const insertOutcome = chain.attestationPool.add(committeeIndex, attestation, attDataRootHex, committeeValidatorIndex, committeeSize, priority);
metrics?.opPool.attestationPool.apiInsertOutcome.inc({ insertOutcome });
}
if (isForkPostElectra(fork)) {
chain.emitter.emit(routes.events.EventType.singleAttestation, attestation);
}
else {
chain.emitter.emit(routes.events.EventType.attestation, attestation);
chain.emitter.emit(routes.events.EventType.singleAttestation, toElectraSingleAttestation(attestation, indexedAttestation.attestingIndices[0]));
}
const sentPeers = await network.publishBeaconAttestation(attestation, subnet);
chain.validatorMonitor?.onPoolSubmitUnaggregatedAttestation(seenTimestampSec, indexedAttestation, subnet, sentPeers);
}
catch (e) {
const logCtx = { slot: attestation.data.slot, index: attestation.data.index };
if (e instanceof AttestationError && e.type.code === AttestationErrorCode.ATTESTATION_ALREADY_KNOWN) {
logger.debug("Ignoring known attestation", logCtx);
// Attestations might already be published by another node as part of a fallback setup or DVT cluster
// and can reach our node by gossip before the api. The error can be ignored and should not result in a 500 response.
return;
}
failures.push({ index: i, message: e.message });
logger.error(`Error on submitPoolAttestations [${i}]`, logCtx, e);
if (e instanceof AttestationError && e.action === GossipAction.REJECT) {
chain.persistInvalidSszValue(ssz.phase0.Attestation, attestation, "api_reject");
}
}
}));
if (failures.length > 0) {
throw new IndexedError("Error processing attestations", failures);
}
},
async submitPoolAttesterSlashings({ attesterSlashing }) {
await this.submitPoolAttesterSlashingsV2({ attesterSlashing });
},
async submitPoolAttesterSlashingsV2({ attesterSlashing }) {
await validateApiAttesterSlashing(chain, attesterSlashing);
const fork = chain.config.getForkName(Number(attesterSlashing.attestation1.data.slot));
chain.opPool.insertAttesterSlashing(fork, attesterSlashing);
await network.publishAttesterSlashing(attesterSlashing);
},
async submitPoolProposerSlashings({ proposerSlashing }) {
await validateApiProposerSlashing(chain, proposerSlashing);
chain.opPool.insertProposerSlashing(proposerSlashing);
await network.publishProposerSlashing(proposerSlashing);
},
async submitPoolVoluntaryExit({ signedVoluntaryExit }) {
await validateApiVoluntaryExit(chain, signedVoluntaryExit);
chain.opPool.insertVoluntaryExit(signedVoluntaryExit);
chain.emitter.emit(routes.events.EventType.voluntaryExit, signedVoluntaryExit);
await network.publishVoluntaryExit(signedVoluntaryExit);
},
async submitPoolBLSToExecutionChange({ blsToExecutionChanges }) {
const failures = [];
await Promise.all(blsToExecutionChanges.map(async (blsToExecutionChange, i) => {
try {
// Ignore even if the change exists and reprocess
await validateApiBlsToExecutionChange(chain, blsToExecutionChange);
const preCapella = chain.clock.currentEpoch < chain.config.CAPELLA_FORK_EPOCH;
chain.opPool.insertBlsToExecutionChange(blsToExecutionChange, preCapella);
chain.emitter.emit(routes.events.EventType.blsToExecutionChange, blsToExecutionChange);
if (!preCapella) {
await network.publishBlsToExecutionChange(blsToExecutionChange);
}
}
catch (e) {
failures.push({ index: i, message: e.message });
logger.error(`Error on submitPoolBLSToExecutionChange [${i}]`, { validatorIndex: blsToExecutionChange.message.validatorIndex }, e);
}
}));
if (failures.length > 0) {
throw new IndexedError("Error processing BLS to execution changes", failures);
}
},
/**
* POST `/eth/v1/beacon/pool/sync_committees`
*
* Submits sync committee signature objects to the node.
* Sync committee signatures are not present in phase0, but are required for Altair networks.
* If a sync committee signature is validated successfully the node MUST publish that sync committee signature on all applicable subnets.
* If one or more sync committee signatures fail validation the node MUST return a 400 error with details of which sync committee signatures have failed, and why.
*
* https://github.com/ethereum/beacon-APIs/pull/135
*/
async submitPoolSyncCommitteeSignatures({ signatures }) {
// Fetch states for all slots of the `signatures`
const slots = new Set();
for (const signature of signatures) {
slots.add(signature.slot);
}
// TODO: Fetch states at signature slots
const state = chain.getHeadState();
const failures = [];
await Promise.all(signatures.map(async (signature, i) => {
try {
const synCommittee = state.epochCtx.getIndexedSyncCommittee(signature.slot);
const indexesInCommittee = synCommittee.validatorIndexMap.get(signature.validatorIndex);
if (indexesInCommittee === undefined || indexesInCommittee.length === 0) {
return; // Not a sync committee member
}
// Verify signature only, all other data is very likely to be correct, since the `signature` object is created by this node.
// Worst case if `signature` is not valid, gossip peers will drop it and slightly downscore us.
await validateApiSyncCommittee(chain, state, signature);
// The same validator can appear multiple times in the sync committee. It can appear multiple times per
// subnet even. First compute on which subnet the signature must be broadcasted to.
const subnets = [];
// same to api attestation, we allow api SyncCommittee to be added to pool even when it's late
// see https://github.com/ChainSafe/lodestar/issues/7548
const priority = true;
for (const indexInCommittee of indexesInCommittee) {
// Sync committee subnet members are just sequential in the order they appear in SyncCommitteeIndexes array
const subnet = Math.floor(indexInCommittee / SYNC_COMMITTEE_SUBNET_SIZE);
const indexInSubcommittee = indexInCommittee % SYNC_COMMITTEE_SUBNET_SIZE;
chain.syncCommitteeMessagePool.add(subnet, signature, indexInSubcommittee, priority);
// Cheap de-duplication code to avoid using a Set. indexesInCommittee is always sorted
if (subnets.length === 0 || subnets.at(-1) !== subnet) {
subnets.push(subnet);
}
}
// TODO: Broadcast at once to all topics
await Promise.all(subnets.map(async (subnet) => network.publishSyncCommitteeSignature(signature, subnet)));
}
catch (e) {
// TODO: gossipsub should allow publishing same message to different topics
// https://github.com/ChainSafe/js-libp2p-gossipsub/issues/272
if (e.message === "PublishError.Duplicate") {
return;
}
failures.push({ index: i, message: e.message });
logger.error(`Error on submitPoolSyncCommitteeSignatures [${i}]`, { slot: signature.slot, validatorIndex: signature.validatorIndex }, e);
if (e instanceof SyncCommitteeError && e.action === GossipAction.REJECT) {
chain.persistInvalidSszValue(ssz.altair.SyncCommitteeMessage, signature, "api_reject");
}
}
}));
if (failures.length > 0) {
throw new IndexedError("Error processing sync committee signatures", failures);
}
},
};
}
//# sourceMappingURL=index.js.map