@lodestar/beacon-node 1.36.0-dev.6f46a8bd20 → 1.36.0-dev.782dc5ee45
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/api/impl/beacon/blocks/index.d.ts.map +1 -1
- package/lib/api/impl/beacon/blocks/index.js +41 -22
- package/lib/api/impl/beacon/blocks/index.js.map +1 -1
- package/lib/api/impl/lodestar/index.d.ts +5 -0
- package/lib/api/impl/lodestar/index.d.ts.map +1 -1
- package/lib/api/impl/lodestar/index.js +29 -1
- package/lib/api/impl/lodestar/index.js.map +1 -1
- package/lib/api/impl/node/utils.js +1 -1
- package/lib/api/impl/node/utils.js.map +1 -1
- package/lib/chain/chain.d.ts +5 -2
- package/lib/chain/chain.d.ts.map +1 -1
- package/lib/chain/chain.js +32 -16
- package/lib/chain/chain.js.map +1 -1
- package/lib/chain/errors/blobSidecarError.d.ts +5 -0
- package/lib/chain/errors/blobSidecarError.d.ts.map +1 -1
- package/lib/chain/errors/blobSidecarError.js.map +1 -1
- package/lib/chain/errors/blockError.d.ts +1 -0
- package/lib/chain/errors/blockError.d.ts.map +1 -1
- package/lib/chain/errors/dataColumnSidecarError.d.ts +21 -14
- package/lib/chain/errors/dataColumnSidecarError.d.ts.map +1 -1
- package/lib/chain/errors/dataColumnSidecarError.js +4 -0
- package/lib/chain/errors/dataColumnSidecarError.js.map +1 -1
- package/lib/chain/forkChoice/index.d.ts +9 -1
- package/lib/chain/forkChoice/index.d.ts.map +1 -1
- package/lib/chain/forkChoice/index.js +109 -4
- package/lib/chain/forkChoice/index.js.map +1 -1
- package/lib/chain/interface.d.ts +2 -0
- package/lib/chain/interface.d.ts.map +1 -1
- package/lib/chain/options.d.ts +0 -2
- package/lib/chain/options.d.ts.map +1 -1
- package/lib/chain/options.js +2 -2
- package/lib/chain/options.js.map +1 -1
- package/lib/chain/stateCache/datastore/db.d.ts +12 -0
- package/lib/chain/stateCache/datastore/db.d.ts.map +1 -1
- package/lib/chain/stateCache/datastore/db.js +70 -0
- package/lib/chain/stateCache/datastore/db.js.map +1 -1
- package/lib/chain/stateCache/datastore/file.d.ts +1 -0
- package/lib/chain/stateCache/datastore/file.d.ts.map +1 -1
- package/lib/chain/stateCache/datastore/file.js +7 -0
- package/lib/chain/stateCache/datastore/file.js.map +1 -1
- package/lib/chain/stateCache/datastore/types.d.ts +1 -0
- package/lib/chain/stateCache/datastore/types.d.ts.map +1 -1
- package/lib/chain/stateCache/persistentCheckpointsCache.d.ts +16 -1
- package/lib/chain/stateCache/persistentCheckpointsCache.d.ts.map +1 -1
- package/lib/chain/stateCache/persistentCheckpointsCache.js +31 -1
- package/lib/chain/stateCache/persistentCheckpointsCache.js.map +1 -1
- package/lib/chain/validation/blobSidecar.d.ts +4 -1
- package/lib/chain/validation/blobSidecar.d.ts.map +1 -1
- package/lib/chain/validation/blobSidecar.js +46 -11
- package/lib/chain/validation/blobSidecar.js.map +1 -1
- package/lib/chain/validation/block.d.ts.map +1 -1
- package/lib/chain/validation/block.js +1 -0
- package/lib/chain/validation/block.js.map +1 -1
- package/lib/chain/validation/dataColumnSidecar.d.ts +4 -1
- package/lib/chain/validation/dataColumnSidecar.d.ts.map +1 -1
- package/lib/chain/validation/dataColumnSidecar.js +64 -19
- package/lib/chain/validation/dataColumnSidecar.js.map +1 -1
- package/lib/index.d.ts +2 -0
- package/lib/index.d.ts.map +1 -1
- package/lib/index.js +2 -0
- package/lib/index.js.map +1 -1
- package/lib/network/core/networkCore.d.ts.map +1 -1
- package/lib/network/core/networkCore.js +5 -1
- package/lib/network/core/networkCore.js.map +1 -1
- package/lib/network/core/networkCoreWorker.js +6 -1
- package/lib/network/core/networkCoreWorker.js.map +1 -1
- package/lib/network/core/networkCoreWorkerHandler.js +1 -1
- package/lib/network/core/networkCoreWorkerHandler.js.map +1 -1
- package/lib/network/events.d.ts +1 -0
- package/lib/network/events.d.ts.map +1 -1
- package/lib/network/gossip/encoding.js +1 -1
- package/lib/network/gossip/encoding.js.map +1 -1
- package/lib/network/gossip/gossipsub.d.ts.map +1 -1
- package/lib/network/gossip/gossipsub.js +6 -1
- package/lib/network/gossip/gossipsub.js.map +1 -1
- package/lib/network/gossip/interface.d.ts +2 -0
- package/lib/network/gossip/interface.d.ts.map +1 -1
- package/lib/network/gossip/snappy_bun.d.ts +3 -0
- package/lib/network/gossip/snappy_bun.d.ts.map +1 -0
- package/lib/network/gossip/snappy_bun.js +3 -0
- package/lib/network/gossip/snappy_bun.js.map +1 -0
- package/lib/network/metadata.d.ts +1 -1
- package/lib/network/metadata.d.ts.map +1 -1
- package/lib/network/metadata.js +1 -0
- package/lib/network/metadata.js.map +1 -1
- package/lib/network/options.d.ts +0 -1
- package/lib/network/options.d.ts.map +1 -1
- package/lib/network/options.js.map +1 -1
- package/lib/network/peers/discover.js +2 -2
- package/lib/network/peers/discover.js.map +1 -1
- package/lib/network/processor/gossipHandlers.d.ts.map +1 -1
- package/lib/network/processor/gossipHandlers.js +15 -1
- package/lib/network/processor/gossipHandlers.js.map +1 -1
- package/lib/network/processor/gossipValidatorFn.d.ts.map +1 -1
- package/lib/network/processor/gossipValidatorFn.js +3 -2
- package/lib/network/processor/gossipValidatorFn.js.map +1 -1
- package/lib/network/processor/types.d.ts +2 -0
- package/lib/network/processor/types.d.ts.map +1 -1
- package/lib/network/reqresp/ReqRespBeaconNode.d.ts.map +1 -1
- package/lib/network/reqresp/ReqRespBeaconNode.js +3 -1
- package/lib/network/reqresp/ReqRespBeaconNode.js.map +1 -1
- package/lib/network/reqresp/handlers/beaconBlocksByRange.d.ts +2 -1
- package/lib/network/reqresp/handlers/beaconBlocksByRange.d.ts.map +1 -1
- package/lib/network/reqresp/handlers/beaconBlocksByRange.js +14 -3
- package/lib/network/reqresp/handlers/beaconBlocksByRange.js.map +1 -1
- package/lib/network/reqresp/handlers/dataColumnSidecarsByRange.d.ts +2 -1
- package/lib/network/reqresp/handlers/dataColumnSidecarsByRange.d.ts.map +1 -1
- package/lib/network/reqresp/handlers/dataColumnSidecarsByRange.js +9 -1
- package/lib/network/reqresp/handlers/dataColumnSidecarsByRange.js.map +1 -1
- package/lib/network/reqresp/handlers/dataColumnSidecarsByRoot.d.ts +2 -1
- package/lib/network/reqresp/handlers/dataColumnSidecarsByRoot.d.ts.map +1 -1
- package/lib/network/reqresp/handlers/dataColumnSidecarsByRoot.js +9 -1
- package/lib/network/reqresp/handlers/dataColumnSidecarsByRoot.js.map +1 -1
- package/lib/network/reqresp/handlers/index.js +6 -6
- package/lib/network/reqresp/handlers/index.js.map +1 -1
- package/lib/network/reqresp/types.d.ts +1 -0
- package/lib/network/reqresp/types.d.ts.map +1 -1
- package/lib/node/nodejs.d.ts +2 -1
- package/lib/node/nodejs.d.ts.map +1 -1
- package/lib/node/nodejs.js +2 -1
- package/lib/node/nodejs.js.map +1 -1
- package/lib/sync/range/range.d.ts.map +1 -1
- package/lib/sync/range/range.js +2 -1
- package/lib/sync/range/range.js.map +1 -1
- package/lib/sync/unknownBlock.js +1 -1
- package/lib/sync/unknownBlock.js.map +1 -1
- package/lib/sync/utils/downloadByRange.d.ts +59 -15
- package/lib/sync/utils/downloadByRange.d.ts.map +1 -1
- package/lib/sync/utils/downloadByRange.js +204 -83
- package/lib/sync/utils/downloadByRange.js.map +1 -1
- package/lib/sync/utils/downloadByRoot.d.ts +8 -14
- package/lib/sync/utils/downloadByRoot.d.ts.map +1 -1
- package/lib/sync/utils/downloadByRoot.js +18 -33
- package/lib/sync/utils/downloadByRoot.js.map +1 -1
- package/lib/sync/utils/remoteSyncType.d.ts +2 -1
- package/lib/sync/utils/remoteSyncType.d.ts.map +1 -1
- package/lib/sync/utils/remoteSyncType.js +19 -4
- package/lib/sync/utils/remoteSyncType.js.map +1 -1
- package/lib/util/blobs.d.ts +1 -1
- package/lib/util/blobs.d.ts.map +1 -1
- package/lib/util/blobs.js +53 -20
- package/lib/util/blobs.js.map +1 -1
- package/lib/util/sszBytes.d.ts +2 -0
- package/lib/util/sszBytes.d.ts.map +1 -1
- package/lib/util/sszBytes.js +25 -0
- package/lib/util/sszBytes.js.map +1 -1
- package/package.json +20 -15
- package/src/api/impl/beacon/blocks/index.ts +47 -25
- package/src/api/impl/lodestar/index.ts +36 -1
- package/src/api/impl/node/utils.ts +1 -1
- package/src/chain/chain.ts +48 -23
- package/src/chain/errors/blobSidecarError.ts +12 -2
- package/src/chain/errors/blockError.ts +1 -1
- package/src/chain/errors/dataColumnSidecarError.ts +31 -16
- package/src/chain/forkChoice/index.ts +178 -2
- package/src/chain/interface.ts +2 -0
- package/src/chain/options.ts +2 -3
- package/src/chain/stateCache/datastore/db.ts +89 -1
- package/src/chain/stateCache/datastore/file.ts +8 -0
- package/src/chain/stateCache/datastore/types.ts +1 -0
- package/src/chain/stateCache/persistentCheckpointsCache.ts +45 -2
- package/src/chain/validation/blobSidecar.ts +54 -10
- package/src/chain/validation/block.ts +1 -0
- package/src/chain/validation/dataColumnSidecar.ts +76 -19
- package/src/index.ts +2 -0
- package/src/network/core/networkCore.ts +5 -1
- package/src/network/core/networkCoreWorker.ts +7 -2
- package/src/network/core/networkCoreWorkerHandler.ts +1 -1
- package/src/network/events.ts +1 -1
- package/src/network/gossip/encoding.ts +1 -1
- package/src/network/gossip/gossipsub.ts +7 -1
- package/src/network/gossip/interface.ts +2 -0
- package/src/network/gossip/snappy_bun.ts +2 -0
- package/src/network/metadata.ts +3 -1
- package/src/network/options.ts +0 -1
- package/src/network/peers/discover.ts +2 -2
- package/src/network/processor/gossipHandlers.ts +16 -1
- package/src/network/processor/gossipValidatorFn.ts +15 -2
- package/src/network/processor/types.ts +2 -0
- package/src/network/reqresp/ReqRespBeaconNode.ts +3 -1
- package/src/network/reqresp/handlers/beaconBlocksByRange.ts +18 -3
- package/src/network/reqresp/handlers/dataColumnSidecarsByRange.ts +13 -1
- package/src/network/reqresp/handlers/dataColumnSidecarsByRoot.ts +13 -1
- package/src/network/reqresp/handlers/index.ts +6 -6
- package/src/network/reqresp/types.ts +1 -0
- package/src/node/nodejs.ts +3 -0
- package/src/sync/range/range.ts +2 -1
- package/src/sync/unknownBlock.ts +1 -1
- package/src/sync/utils/downloadByRange.ts +273 -108
- package/src/sync/utils/downloadByRoot.ts +22 -56
- package/src/sync/utils/remoteSyncType.ts +23 -4
- package/src/util/blobs.ts +64 -20
- package/src/util/sszBytes.ts +30 -0
package/src/chain/options.ts
CHANGED
|
@@ -8,6 +8,7 @@ import {ShufflingCacheOpts} from "./shufflingCache.js";
|
|
|
8
8
|
import {DEFAULT_MAX_BLOCK_STATES, FIFOBlockStateCacheOpts} from "./stateCache/fifoBlockStateCache.js";
|
|
9
9
|
import {
|
|
10
10
|
DEFAULT_MAX_CP_STATE_EPOCHS_IN_MEMORY,
|
|
11
|
+
DEFAULT_MAX_CP_STATE_ON_DISK,
|
|
11
12
|
PersistentCheckpointStateCacheOpts,
|
|
12
13
|
} from "./stateCache/persistentCheckpointsCache.js";
|
|
13
14
|
import {ValidatorMonitorOpts} from "./validatorMonitor.js";
|
|
@@ -41,8 +42,6 @@ export type IChainOptions = BlockProcessOpts &
|
|
|
41
42
|
maxCachedBlobSidecars?: number;
|
|
42
43
|
/** Max number of produced block roots (blinded or full) cached for broadcast validations */
|
|
43
44
|
maxCachedProducedRoots?: number;
|
|
44
|
-
/** Subscribe to and custody all data column sidecar subnets */
|
|
45
|
-
supernode?: boolean;
|
|
46
45
|
initialCustodyGroupCount?: number;
|
|
47
46
|
broadcastValidationStrictness?: string;
|
|
48
47
|
minSameMessageSignatureSetsToBatch: number;
|
|
@@ -118,7 +117,6 @@ export const defaultChainOptions: IChainOptions = {
|
|
|
118
117
|
archiveMode: DEFAULT_ARCHIVE_MODE,
|
|
119
118
|
pruneHistory: false,
|
|
120
119
|
emitPayloadAttributes: false,
|
|
121
|
-
supernode: false,
|
|
122
120
|
// for gossip block validation, it's unlikely we see a reorg with 32 slots
|
|
123
121
|
// for attestation validation, having this value ensures we don't have to regen states most of the time
|
|
124
122
|
maxSkipSlots: 32,
|
|
@@ -135,4 +133,5 @@ export const defaultChainOptions: IChainOptions = {
|
|
|
135
133
|
nHistoricalStatesFileDataStore: true,
|
|
136
134
|
maxBlockStates: DEFAULT_MAX_BLOCK_STATES,
|
|
137
135
|
maxCPStateEpochsInMemory: DEFAULT_MAX_CP_STATE_EPOCHS_IN_MEMORY,
|
|
136
|
+
maxCPStateEpochsOnDisk: DEFAULT_MAX_CP_STATE_ON_DISK,
|
|
138
137
|
};
|
|
@@ -1,5 +1,11 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import {SLOTS_PER_EPOCH} from "@lodestar/params";
|
|
2
|
+
import {Epoch, phase0, ssz} from "@lodestar/types";
|
|
3
|
+
import {MapDef} from "@lodestar/utils";
|
|
2
4
|
import {IBeaconDb} from "../../../db/interface.js";
|
|
5
|
+
import {
|
|
6
|
+
getLastProcessedSlotFromBeaconStateSerialized,
|
|
7
|
+
getSlotFromBeaconStateSerialized,
|
|
8
|
+
} from "../../../util/sszBytes.js";
|
|
3
9
|
import {CPStateDatastore, DatastoreKey} from "./types.js";
|
|
4
10
|
|
|
5
11
|
/**
|
|
@@ -22,6 +28,13 @@ export class DbCPStateDatastore implements CPStateDatastore {
|
|
|
22
28
|
return this.db.checkpointState.getBinary(serializedCheckpoint);
|
|
23
29
|
}
|
|
24
30
|
|
|
31
|
+
async readLatestSafe(): Promise<Uint8Array | null> {
|
|
32
|
+
const allKeys = await this.readKeys();
|
|
33
|
+
if (allKeys.length === 0) return null;
|
|
34
|
+
|
|
35
|
+
return getLatestSafeDatastoreKey(allKeys, this.read.bind(this));
|
|
36
|
+
}
|
|
37
|
+
|
|
25
38
|
async readKeys(): Promise<DatastoreKey[]> {
|
|
26
39
|
return this.db.checkpointState.keys();
|
|
27
40
|
}
|
|
@@ -34,3 +47,78 @@ export function datastoreKeyToCheckpoint(key: DatastoreKey): phase0.Checkpoint {
|
|
|
34
47
|
export function checkpointToDatastoreKey(cp: phase0.Checkpoint): DatastoreKey {
|
|
35
48
|
return ssz.phase0.Checkpoint.serialize(cp);
|
|
36
49
|
}
|
|
50
|
+
|
|
51
|
+
/**
|
|
52
|
+
* Get the latest safe checkpoint state the node can use to boot from
|
|
53
|
+
* - it should be the checkpoint state that's unique in its epoch
|
|
54
|
+
* - its last processed block slot should be at epoch boundary or last slot of previous epoch
|
|
55
|
+
* - state slot should be at epoch boundary
|
|
56
|
+
* - state slot should be equal to epoch * SLOTS_PER_EPOCH
|
|
57
|
+
*
|
|
58
|
+
* return the serialized data of Current Root Checkpoint State (CRCS) or Previous Root Checkpoint State (PRCS)
|
|
59
|
+
*
|
|
60
|
+
*/
|
|
61
|
+
export async function getLatestSafeDatastoreKey(
|
|
62
|
+
allKeys: DatastoreKey[],
|
|
63
|
+
readFn: (key: DatastoreKey) => Promise<Uint8Array | null>
|
|
64
|
+
): Promise<Uint8Array | null> {
|
|
65
|
+
const checkpointsByEpoch = new MapDef<Epoch, DatastoreKey[]>(() => []);
|
|
66
|
+
for (const key of allKeys) {
|
|
67
|
+
const cp = datastoreKeyToCheckpoint(key);
|
|
68
|
+
checkpointsByEpoch.getOrDefault(cp.epoch).push(key);
|
|
69
|
+
}
|
|
70
|
+
|
|
71
|
+
const dataStoreKeyByEpoch: Map<Epoch, DatastoreKey> = new Map();
|
|
72
|
+
for (const [epoch, keys] of checkpointsByEpoch.entries()) {
|
|
73
|
+
// only consider epochs with a single checkpoint to avoid ambiguity from forks
|
|
74
|
+
if (keys.length === 1) {
|
|
75
|
+
dataStoreKeyByEpoch.set(epoch, keys[0]);
|
|
76
|
+
}
|
|
77
|
+
}
|
|
78
|
+
|
|
79
|
+
const epochsDesc = Array.from(dataStoreKeyByEpoch.keys()).sort((a, b) => b - a);
|
|
80
|
+
for (const epoch of epochsDesc) {
|
|
81
|
+
const datastoreKey = dataStoreKeyByEpoch.get(epoch);
|
|
82
|
+
if (datastoreKey == null) {
|
|
83
|
+
// should not happen
|
|
84
|
+
continue;
|
|
85
|
+
}
|
|
86
|
+
|
|
87
|
+
const stateBytes = await readFn(datastoreKey);
|
|
88
|
+
if (stateBytes == null) {
|
|
89
|
+
// should not happen
|
|
90
|
+
continue;
|
|
91
|
+
}
|
|
92
|
+
|
|
93
|
+
const lastProcessedSlot = getLastProcessedSlotFromBeaconStateSerialized(stateBytes);
|
|
94
|
+
if (lastProcessedSlot == null) {
|
|
95
|
+
// cannot extract last processed slot from serialized state, skip
|
|
96
|
+
continue;
|
|
97
|
+
}
|
|
98
|
+
|
|
99
|
+
const stateSlot = getSlotFromBeaconStateSerialized(stateBytes);
|
|
100
|
+
if (stateSlot == null) {
|
|
101
|
+
// cannot extract slot from serialized state, skip
|
|
102
|
+
continue;
|
|
103
|
+
}
|
|
104
|
+
|
|
105
|
+
if (lastProcessedSlot !== stateSlot && lastProcessedSlot !== stateSlot - 1) {
|
|
106
|
+
// not CRCS or PRCS, skip
|
|
107
|
+
continue;
|
|
108
|
+
}
|
|
109
|
+
|
|
110
|
+
if (stateSlot % SLOTS_PER_EPOCH !== 0) {
|
|
111
|
+
// not at epoch boundary, skip
|
|
112
|
+
continue;
|
|
113
|
+
}
|
|
114
|
+
|
|
115
|
+
if (stateSlot !== SLOTS_PER_EPOCH * epoch) {
|
|
116
|
+
// should not happen after above checks, but just to be safe
|
|
117
|
+
continue;
|
|
118
|
+
}
|
|
119
|
+
|
|
120
|
+
return stateBytes;
|
|
121
|
+
}
|
|
122
|
+
|
|
123
|
+
return null;
|
|
124
|
+
}
|
|
@@ -2,6 +2,7 @@ import path from "node:path";
|
|
|
2
2
|
import {phase0, ssz} from "@lodestar/types";
|
|
3
3
|
import {fromHex, toHex} from "@lodestar/utils";
|
|
4
4
|
import {ensureDir, readFile, readFileNames, removeFile, writeIfNotExist} from "../../../util/file.js";
|
|
5
|
+
import {getLatestSafeDatastoreKey} from "./db.js";
|
|
5
6
|
import {CPStateDatastore, DatastoreKey} from "./types.js";
|
|
6
7
|
|
|
7
8
|
const CHECKPOINT_STATES_FOLDER = "checkpoint_states";
|
|
@@ -44,6 +45,13 @@ export class FileCPStateDatastore implements CPStateDatastore {
|
|
|
44
45
|
return readFile(filePath);
|
|
45
46
|
}
|
|
46
47
|
|
|
48
|
+
async readLatestSafe(): Promise<Uint8Array | null> {
|
|
49
|
+
const allKeys = await this.readKeys();
|
|
50
|
+
if (allKeys.length === 0) return null;
|
|
51
|
+
|
|
52
|
+
return getLatestSafeDatastoreKey(allKeys, this.read.bind(this));
|
|
53
|
+
}
|
|
54
|
+
|
|
47
55
|
async readKeys(): Promise<DatastoreKey[]> {
|
|
48
56
|
const fileNames = await readFileNames(this.folderPath);
|
|
49
57
|
return fileNames
|
|
@@ -8,6 +8,7 @@ export interface CPStateDatastore {
|
|
|
8
8
|
write: (cpKey: phase0.Checkpoint, stateBytes: Uint8Array) => Promise<DatastoreKey>;
|
|
9
9
|
remove: (key: DatastoreKey) => Promise<void>;
|
|
10
10
|
read: (key: DatastoreKey) => Promise<Uint8Array | null>;
|
|
11
|
+
readLatestSafe: () => Promise<Uint8Array | null>;
|
|
11
12
|
readKeys: () => Promise<DatastoreKey[]>;
|
|
12
13
|
init?: () => Promise<void>;
|
|
13
14
|
}
|
|
@@ -17,8 +17,10 @@ import {MapTracker} from "./mapMetrics.js";
|
|
|
17
17
|
import {BlockStateCache, CacheItemType, CheckpointHex, CheckpointStateCache} from "./types.js";
|
|
18
18
|
|
|
19
19
|
export type PersistentCheckpointStateCacheOpts = {
|
|
20
|
-
/** Keep max n
|
|
20
|
+
/** Keep max n state epochs in memory, persist the rest to disk */
|
|
21
21
|
maxCPStateEpochsInMemory?: number;
|
|
22
|
+
/** Keep max n state epochs on disk */
|
|
23
|
+
maxCPStateEpochsOnDisk?: number;
|
|
22
24
|
};
|
|
23
25
|
|
|
24
26
|
type PersistentCheckpointStateCacheModules = {
|
|
@@ -58,6 +60,14 @@ type LoadedStateBytesData = {persistedKey: DatastoreKey; stateBytes: Uint8Array}
|
|
|
58
60
|
*/
|
|
59
61
|
export const DEFAULT_MAX_CP_STATE_EPOCHS_IN_MEMORY = 3;
|
|
60
62
|
|
|
63
|
+
/**
|
|
64
|
+
* By default we don't prune any persistent checkpoint states as it's not safe to delete them during
|
|
65
|
+
* long non-finality as we don't know the state of the chain and there could be a deep (hundreds of epochs) reorg
|
|
66
|
+
* if there two competing chains with similar weight but we wouldn't have a close enough state to pivot to this chain
|
|
67
|
+
* and instead require a resync from last finalized checkpoint state which could be very far in the past.
|
|
68
|
+
*/
|
|
69
|
+
export const DEFAULT_MAX_CP_STATE_ON_DISK = Infinity;
|
|
70
|
+
|
|
61
71
|
// TODO GLOAS: re-evaluate this timing
|
|
62
72
|
const PROCESS_CHECKPOINT_STATES_BPS = 6667;
|
|
63
73
|
|
|
@@ -104,6 +114,7 @@ export class PersistentCheckpointStateCache implements CheckpointStateCache {
|
|
|
104
114
|
private preComputedCheckpoint: string | null = null;
|
|
105
115
|
private preComputedCheckpointHits: number | null = null;
|
|
106
116
|
private readonly maxEpochsInMemory: number;
|
|
117
|
+
private readonly maxEpochsOnDisk: number;
|
|
107
118
|
private readonly datastore: CPStateDatastore;
|
|
108
119
|
private readonly blockStateCache: BlockStateCache;
|
|
109
120
|
private readonly bufferPool?: BufferPool | null;
|
|
@@ -139,10 +150,16 @@ export class PersistentCheckpointStateCache implements CheckpointStateCache {
|
|
|
139
150
|
this.logger = logger;
|
|
140
151
|
this.clock = clock;
|
|
141
152
|
this.signal = signal;
|
|
153
|
+
|
|
142
154
|
if (opts.maxCPStateEpochsInMemory !== undefined && opts.maxCPStateEpochsInMemory < 0) {
|
|
143
155
|
throw new Error("maxEpochsInMemory must be >= 0");
|
|
144
156
|
}
|
|
157
|
+
if (opts.maxCPStateEpochsOnDisk !== undefined && opts.maxCPStateEpochsOnDisk < 0) {
|
|
158
|
+
throw new Error("maxCPStateEpochsOnDisk must be >= 0");
|
|
159
|
+
}
|
|
160
|
+
|
|
145
161
|
this.maxEpochsInMemory = opts.maxCPStateEpochsInMemory ?? DEFAULT_MAX_CP_STATE_EPOCHS_IN_MEMORY;
|
|
162
|
+
this.maxEpochsOnDisk = opts.maxCPStateEpochsOnDisk ?? DEFAULT_MAX_CP_STATE_ON_DISK;
|
|
146
163
|
// Specify different datastore for testing
|
|
147
164
|
this.datastore = datastore;
|
|
148
165
|
this.blockStateCache = blockStateCache;
|
|
@@ -324,6 +341,7 @@ export class PersistentCheckpointStateCache implements CheckpointStateCache {
|
|
|
324
341
|
this.logger.verbose("Added checkpoint state to memory", {epoch: cp.epoch, rootHex: cpHex.rootHex});
|
|
325
342
|
}
|
|
326
343
|
this.epochIndex.getOrDefault(cp.epoch).add(cpHex.rootHex);
|
|
344
|
+
this.prunePersistedStates();
|
|
327
345
|
}
|
|
328
346
|
|
|
329
347
|
/**
|
|
@@ -766,13 +784,38 @@ export class PersistentCheckpointStateCache implements CheckpointStateCache {
|
|
|
766
784
|
this.cache.delete(key);
|
|
767
785
|
}
|
|
768
786
|
this.epochIndex.delete(epoch);
|
|
769
|
-
this.logger.verbose("Pruned
|
|
787
|
+
this.logger.verbose("Pruned checkpoint states for epoch", {
|
|
770
788
|
epoch,
|
|
771
789
|
persistCount,
|
|
772
790
|
rootHexes: Array.from(rootHexes).join(","),
|
|
773
791
|
});
|
|
774
792
|
}
|
|
775
793
|
|
|
794
|
+
/**
|
|
795
|
+
* Prune persisted checkpoint states from disk.
|
|
796
|
+
* Note that this should handle all possible errors and not throw.
|
|
797
|
+
*/
|
|
798
|
+
private prunePersistedStates(): void {
|
|
799
|
+
// epochsOnDisk epochsInMemory
|
|
800
|
+
// |----------------------------------------------------------|----------------------|
|
|
801
|
+
const maxTrackedEpochs = this.maxEpochsOnDisk + this.maxEpochsInMemory;
|
|
802
|
+
if (this.epochIndex.size <= maxTrackedEpochs) {
|
|
803
|
+
return;
|
|
804
|
+
}
|
|
805
|
+
|
|
806
|
+
const sortedEpochs = Array.from(this.epochIndex.keys()).sort((a, b) => a - b);
|
|
807
|
+
const pruneEpochs = sortedEpochs.slice(0, sortedEpochs.length - maxTrackedEpochs);
|
|
808
|
+
for (const epoch of pruneEpochs) {
|
|
809
|
+
this.deleteAllEpochItems(epoch).catch((e) =>
|
|
810
|
+
this.logger.debug(
|
|
811
|
+
"Error delete all epoch items",
|
|
812
|
+
{epoch, maxEpochsOnDisk: this.maxEpochsOnDisk, maxEpochsInMemory: this.maxEpochsInMemory},
|
|
813
|
+
e as Error
|
|
814
|
+
)
|
|
815
|
+
);
|
|
816
|
+
}
|
|
817
|
+
}
|
|
818
|
+
|
|
776
819
|
/**
|
|
777
820
|
* Serialize validators to bytes leveraging the buffer pool to save memory allocation.
|
|
778
821
|
* - As monitored on holesky as of Jan 2024, it helps save ~500ms state reload time (4.3s vs 3.8s)
|
|
@@ -8,7 +8,8 @@ import {
|
|
|
8
8
|
import {
|
|
9
9
|
computeEpochAtSlot,
|
|
10
10
|
computeStartSlotAtEpoch,
|
|
11
|
-
|
|
11
|
+
getBlockHeaderProposerSignatureSetByHeaderSlot,
|
|
12
|
+
getBlockHeaderProposerSignatureSetByParentStateSlot,
|
|
12
13
|
} from "@lodestar/state-transition";
|
|
13
14
|
import {BlobIndex, Root, Slot, SubnetID, deneb, ssz} from "@lodestar/types";
|
|
14
15
|
import {toRootHex, verifyMerkleBranch} from "@lodestar/utils";
|
|
@@ -100,7 +101,12 @@ export async function validateGossipBlobSidecar(
|
|
|
100
101
|
// descend from the finalized root.
|
|
101
102
|
// (Non-Lighthouse): Since we prune all blocks non-descendant from finalized checking the `db.block` database won't be useful to guard
|
|
102
103
|
// against known bad fork blocks, so we throw PARENT_UNKNOWN for cases (1) and (2)
|
|
103
|
-
throw new BlobSidecarGossipError(GossipAction.IGNORE, {
|
|
104
|
+
throw new BlobSidecarGossipError(GossipAction.IGNORE, {
|
|
105
|
+
code: BlobSidecarErrorCode.PARENT_UNKNOWN,
|
|
106
|
+
parentRoot,
|
|
107
|
+
blockRoot: blockHex,
|
|
108
|
+
slot: blobSlot,
|
|
109
|
+
});
|
|
104
110
|
}
|
|
105
111
|
|
|
106
112
|
// [REJECT] The blob is from a higher slot than its parent.
|
|
@@ -120,15 +126,23 @@ export async function validateGossipBlobSidecar(
|
|
|
120
126
|
const blockState = await chain.regen
|
|
121
127
|
.getBlockSlotState(parentRoot, blobSlot, {dontTransferCache: true}, RegenCaller.validateGossipBlock)
|
|
122
128
|
.catch(() => {
|
|
123
|
-
throw new BlobSidecarGossipError(GossipAction.IGNORE, {
|
|
129
|
+
throw new BlobSidecarGossipError(GossipAction.IGNORE, {
|
|
130
|
+
code: BlobSidecarErrorCode.PARENT_UNKNOWN,
|
|
131
|
+
parentRoot,
|
|
132
|
+
blockRoot: blockHex,
|
|
133
|
+
slot: blobSlot,
|
|
134
|
+
});
|
|
124
135
|
});
|
|
125
136
|
|
|
126
137
|
// [REJECT] The proposer signature, signed_beacon_block.signature, is valid with respect to the proposer_index pubkey.
|
|
127
|
-
const signatureSet =
|
|
138
|
+
const signatureSet = getBlockHeaderProposerSignatureSetByParentStateSlot(blockState, blobSidecar.signedBlockHeader);
|
|
128
139
|
// Don't batch so verification is not delayed
|
|
129
140
|
if (!(await chain.bls.verifySignatureSets([signatureSet], {verifyOnMainThread: true}))) {
|
|
130
141
|
throw new BlobSidecarGossipError(GossipAction.REJECT, {
|
|
131
142
|
code: BlobSidecarErrorCode.PROPOSAL_SIGNATURE_INVALID,
|
|
143
|
+
blockRoot: blockHex,
|
|
144
|
+
index: blobSidecar.index,
|
|
145
|
+
slot: blobSlot,
|
|
132
146
|
});
|
|
133
147
|
}
|
|
134
148
|
|
|
@@ -175,8 +189,12 @@ export async function validateGossipBlobSidecar(
|
|
|
175
189
|
* Validate some blob sidecars in a block
|
|
176
190
|
*
|
|
177
191
|
* Requires the block to be known to the node
|
|
192
|
+
*
|
|
193
|
+
* NOTE: chain is optional to skip signature verification. Helpful for testing purposes and so that can control whether
|
|
194
|
+
* signature gets checked depending on the reqresp method that is being checked
|
|
178
195
|
*/
|
|
179
196
|
export async function validateBlockBlobSidecars(
|
|
197
|
+
chain: IBeaconChain | null,
|
|
180
198
|
blockSlot: Slot,
|
|
181
199
|
blockRoot: Root,
|
|
182
200
|
blockBlobCount: number,
|
|
@@ -196,7 +214,8 @@ export async function validateBlockBlobSidecars(
|
|
|
196
214
|
}
|
|
197
215
|
|
|
198
216
|
// Hash the first sidecar block header and compare the rest via (cheaper) equality
|
|
199
|
-
const
|
|
217
|
+
const firstSidecarSignedBlockHeader = blobSidecars[0].signedBlockHeader;
|
|
218
|
+
const firstSidecarBlockHeader = firstSidecarSignedBlockHeader.message;
|
|
200
219
|
const firstBlockRoot = ssz.phase0.BeaconBlockHeader.hashTreeRoot(firstSidecarBlockHeader);
|
|
201
220
|
if (Buffer.compare(blockRoot, firstBlockRoot) !== 0) {
|
|
202
221
|
throw new BlobSidecarValidationError(
|
|
@@ -211,17 +230,42 @@ export async function validateBlockBlobSidecars(
|
|
|
211
230
|
);
|
|
212
231
|
}
|
|
213
232
|
|
|
233
|
+
if (chain !== null) {
|
|
234
|
+
const headState = await chain.getHeadState();
|
|
235
|
+
const signatureSet = getBlockHeaderProposerSignatureSetByHeaderSlot(headState, firstSidecarSignedBlockHeader);
|
|
236
|
+
|
|
237
|
+
if (
|
|
238
|
+
!(await chain.bls.verifySignatureSets([signatureSet], {
|
|
239
|
+
batchable: true,
|
|
240
|
+
priority: true,
|
|
241
|
+
verifyOnMainThread: false,
|
|
242
|
+
}))
|
|
243
|
+
) {
|
|
244
|
+
throw new BlobSidecarValidationError({
|
|
245
|
+
code: BlobSidecarErrorCode.PROPOSAL_SIGNATURE_INVALID,
|
|
246
|
+
blockRoot: toRootHex(blockRoot),
|
|
247
|
+
slot: blockSlot,
|
|
248
|
+
index: blobSidecars[0].index,
|
|
249
|
+
});
|
|
250
|
+
}
|
|
251
|
+
}
|
|
252
|
+
|
|
214
253
|
const commitments = [];
|
|
215
254
|
const blobs = [];
|
|
216
255
|
const proofs = [];
|
|
217
|
-
for (
|
|
218
|
-
const
|
|
219
|
-
|
|
256
|
+
for (let i = 0; i < blobSidecars.length; i++) {
|
|
257
|
+
const blobSidecar = blobSidecars[i];
|
|
258
|
+
const blobIndex = blobSidecar.index;
|
|
259
|
+
|
|
260
|
+
if (
|
|
261
|
+
i !== 0 &&
|
|
262
|
+
!ssz.phase0.SignedBeaconBlockHeader.equals(blobSidecar.signedBlockHeader, firstSidecarSignedBlockHeader)
|
|
263
|
+
) {
|
|
220
264
|
throw new BlobSidecarValidationError(
|
|
221
265
|
{
|
|
222
266
|
code: BlobSidecarErrorCode.INCORRECT_BLOCK,
|
|
223
267
|
slot: blockSlot,
|
|
224
|
-
blobIdx,
|
|
268
|
+
blobIdx: blobIndex,
|
|
225
269
|
expected: toRootHex(blockRoot),
|
|
226
270
|
actual: "unknown - compared via equality",
|
|
227
271
|
},
|
|
@@ -234,7 +278,7 @@ export async function validateBlockBlobSidecars(
|
|
|
234
278
|
{
|
|
235
279
|
code: BlobSidecarErrorCode.INCLUSION_PROOF_INVALID,
|
|
236
280
|
slot: blockSlot,
|
|
237
|
-
blobIdx,
|
|
281
|
+
blobIdx: blobIndex,
|
|
238
282
|
},
|
|
239
283
|
"BlobSidecar inclusion proof invalid"
|
|
240
284
|
);
|
|
@@ -158,6 +158,7 @@ export async function validateGossipBlock(
|
|
|
158
158
|
if (!(await chain.bls.verifySignatureSets([signatureSet], {verifyOnMainThread: true}))) {
|
|
159
159
|
throw new BlockGossipError(GossipAction.REJECT, {
|
|
160
160
|
code: BlockErrorCode.PROPOSAL_SIGNATURE_INVALID,
|
|
161
|
+
blockSlot,
|
|
161
162
|
});
|
|
162
163
|
}
|
|
163
164
|
|
|
@@ -7,7 +7,8 @@ import {
|
|
|
7
7
|
import {
|
|
8
8
|
computeEpochAtSlot,
|
|
9
9
|
computeStartSlotAtEpoch,
|
|
10
|
-
|
|
10
|
+
getBlockHeaderProposerSignatureSetByHeaderSlot,
|
|
11
|
+
getBlockHeaderProposerSignatureSetByParentStateSlot,
|
|
11
12
|
} from "@lodestar/state-transition";
|
|
12
13
|
import {Root, Slot, SubnetID, fulu, ssz} from "@lodestar/types";
|
|
13
14
|
import {toRootHex, verifyMerkleBranch} from "@lodestar/utils";
|
|
@@ -39,7 +40,7 @@ export async function validateGossipDataColumnSidecar(
|
|
|
39
40
|
if (computeSubnetForDataColumnSidecar(chain.config, dataColumnSidecar) !== gossipSubnet) {
|
|
40
41
|
throw new DataColumnSidecarGossipError(GossipAction.REJECT, {
|
|
41
42
|
code: DataColumnSidecarErrorCode.INVALID_SUBNET,
|
|
42
|
-
|
|
43
|
+
columnIndex: dataColumnSidecar.index,
|
|
43
44
|
gossipSubnet: gossipSubnet,
|
|
44
45
|
});
|
|
45
46
|
}
|
|
@@ -86,6 +87,7 @@ export async function validateGossipDataColumnSidecar(
|
|
|
86
87
|
throw new DataColumnSidecarGossipError(GossipAction.IGNORE, {
|
|
87
88
|
code: DataColumnSidecarErrorCode.PARENT_UNKNOWN,
|
|
88
89
|
parentRoot,
|
|
90
|
+
slot: blockHeader.slot,
|
|
89
91
|
});
|
|
90
92
|
}
|
|
91
93
|
|
|
@@ -108,6 +110,7 @@ export async function validateGossipDataColumnSidecar(
|
|
|
108
110
|
throw new DataColumnSidecarGossipError(GossipAction.IGNORE, {
|
|
109
111
|
code: DataColumnSidecarErrorCode.PARENT_UNKNOWN,
|
|
110
112
|
parentRoot,
|
|
113
|
+
slot: blockHeader.slot,
|
|
111
114
|
});
|
|
112
115
|
});
|
|
113
116
|
|
|
@@ -128,15 +131,23 @@ export async function validateGossipDataColumnSidecar(
|
|
|
128
131
|
}
|
|
129
132
|
|
|
130
133
|
// 5) [REJECT] The proposer signature of sidecar.signed_block_header, is valid with respect to the block_header.proposer_index pubkey.
|
|
131
|
-
const signatureSet =
|
|
134
|
+
const signatureSet = getBlockHeaderProposerSignatureSetByParentStateSlot(
|
|
135
|
+
blockState,
|
|
136
|
+
dataColumnSidecar.signedBlockHeader
|
|
137
|
+
);
|
|
132
138
|
// Don't batch so verification is not delayed
|
|
133
139
|
if (
|
|
134
140
|
!(await chain.bls.verifySignatureSets([signatureSet], {
|
|
135
141
|
verifyOnMainThread: blockHeader.slot > chain.forkChoice.getHead().slot,
|
|
136
142
|
}))
|
|
137
143
|
) {
|
|
144
|
+
const blockRoot = ssz.phase0.BeaconBlockHeader.hashTreeRoot(dataColumnSidecar.signedBlockHeader.message);
|
|
145
|
+
const blockRootHex = toRootHex(blockRoot);
|
|
138
146
|
throw new DataColumnSidecarGossipError(GossipAction.REJECT, {
|
|
139
147
|
code: DataColumnSidecarErrorCode.PROPOSAL_SIGNATURE_INVALID,
|
|
148
|
+
blockRoot: blockRootHex,
|
|
149
|
+
index: dataColumnSidecar.index,
|
|
150
|
+
slot: blockHeader.slot,
|
|
140
151
|
});
|
|
141
152
|
}
|
|
142
153
|
|
|
@@ -156,7 +167,7 @@ export async function validateGossipDataColumnSidecar(
|
|
|
156
167
|
throw new DataColumnSidecarGossipError(GossipAction.REJECT, {
|
|
157
168
|
code: DataColumnSidecarErrorCode.INCLUSION_PROOF_INVALID,
|
|
158
169
|
slot: dataColumnSidecar.signedBlockHeader.message.slot,
|
|
159
|
-
|
|
170
|
+
columnIndex: dataColumnSidecar.index,
|
|
160
171
|
});
|
|
161
172
|
}
|
|
162
173
|
|
|
@@ -173,7 +184,7 @@ export async function validateGossipDataColumnSidecar(
|
|
|
173
184
|
throw new DataColumnSidecarGossipError(GossipAction.REJECT, {
|
|
174
185
|
code: DataColumnSidecarErrorCode.INVALID_KZG_PROOF,
|
|
175
186
|
slot: blockHeader.slot,
|
|
176
|
-
|
|
187
|
+
columnIndex: dataColumnSidecar.index,
|
|
177
188
|
});
|
|
178
189
|
} finally {
|
|
179
190
|
kzgProofTimer?.();
|
|
@@ -193,7 +204,7 @@ function verifyDataColumnSidecar(config: ChainForkConfig, dataColumnSidecar: ful
|
|
|
193
204
|
throw new DataColumnSidecarGossipError(GossipAction.REJECT, {
|
|
194
205
|
code: DataColumnSidecarErrorCode.INVALID_INDEX,
|
|
195
206
|
slot: dataColumnSidecar.signedBlockHeader.message.slot,
|
|
196
|
-
|
|
207
|
+
columnIndex: dataColumnSidecar.index,
|
|
197
208
|
});
|
|
198
209
|
}
|
|
199
210
|
|
|
@@ -201,7 +212,7 @@ function verifyDataColumnSidecar(config: ChainForkConfig, dataColumnSidecar: ful
|
|
|
201
212
|
throw new DataColumnSidecarGossipError(GossipAction.REJECT, {
|
|
202
213
|
code: DataColumnSidecarErrorCode.NO_COMMITMENTS,
|
|
203
214
|
slot: dataColumnSidecar.signedBlockHeader.message.slot,
|
|
204
|
-
|
|
215
|
+
columnIndex: dataColumnSidecar.index,
|
|
205
216
|
});
|
|
206
217
|
}
|
|
207
218
|
|
|
@@ -212,7 +223,7 @@ function verifyDataColumnSidecar(config: ChainForkConfig, dataColumnSidecar: ful
|
|
|
212
223
|
throw new DataColumnSidecarGossipError(GossipAction.REJECT, {
|
|
213
224
|
code: DataColumnSidecarErrorCode.TOO_MANY_KZG_COMMITMENTS,
|
|
214
225
|
slot: dataColumnSidecar.signedBlockHeader.message.slot,
|
|
215
|
-
|
|
226
|
+
columnIndex: dataColumnSidecar.index,
|
|
216
227
|
count: dataColumnSidecar.kzgCommitments.length,
|
|
217
228
|
limit: maxBlobsPerBlock,
|
|
218
229
|
});
|
|
@@ -271,8 +282,12 @@ export function verifyDataColumnSidecarInclusionProof(dataColumnSidecar: fulu.Da
|
|
|
271
282
|
* Validate a subset of data column sidecars in a block
|
|
272
283
|
*
|
|
273
284
|
* Requires the block to be known to the node
|
|
285
|
+
*
|
|
286
|
+
* NOTE: chain is optional to skip signature verification. Helpful for testing purposes and so that can control whether
|
|
287
|
+
* signature gets checked depending on the reqresp method that is being checked
|
|
274
288
|
*/
|
|
275
289
|
export async function validateBlockDataColumnSidecars(
|
|
290
|
+
chain: IBeaconChain | null,
|
|
276
291
|
blockSlot: Slot,
|
|
277
292
|
blockRoot: Root,
|
|
278
293
|
blockBlobCount: number,
|
|
@@ -293,16 +308,16 @@ export async function validateBlockDataColumnSidecars(
|
|
|
293
308
|
"Block has no blob commitments but data column sidecars were provided"
|
|
294
309
|
);
|
|
295
310
|
}
|
|
296
|
-
|
|
297
311
|
// Hash the first sidecar block header and compare the rest via (cheaper) equality
|
|
298
|
-
const
|
|
312
|
+
const firstSidecarSignedBlockHeader = dataColumnSidecars[0].signedBlockHeader;
|
|
313
|
+
const firstSidecarBlockHeader = firstSidecarSignedBlockHeader.message;
|
|
299
314
|
const firstBlockRoot = ssz.phase0.BeaconBlockHeader.hashTreeRoot(firstSidecarBlockHeader);
|
|
300
315
|
if (Buffer.compare(blockRoot, firstBlockRoot) !== 0) {
|
|
301
316
|
throw new DataColumnSidecarValidationError(
|
|
302
317
|
{
|
|
303
318
|
code: DataColumnSidecarErrorCode.INCORRECT_BLOCK,
|
|
304
319
|
slot: blockSlot,
|
|
305
|
-
|
|
320
|
+
columnIndex: 0,
|
|
306
321
|
expected: toRootHex(blockRoot),
|
|
307
322
|
actual: toRootHex(firstBlockRoot),
|
|
308
323
|
},
|
|
@@ -310,6 +325,26 @@ export async function validateBlockDataColumnSidecars(
|
|
|
310
325
|
);
|
|
311
326
|
}
|
|
312
327
|
|
|
328
|
+
if (chain !== null) {
|
|
329
|
+
const headState = await chain.getHeadState();
|
|
330
|
+
const signatureSet = getBlockHeaderProposerSignatureSetByHeaderSlot(headState, firstSidecarSignedBlockHeader);
|
|
331
|
+
|
|
332
|
+
if (
|
|
333
|
+
!(await chain.bls.verifySignatureSets([signatureSet], {
|
|
334
|
+
batchable: true,
|
|
335
|
+
priority: true,
|
|
336
|
+
verifyOnMainThread: false,
|
|
337
|
+
}))
|
|
338
|
+
) {
|
|
339
|
+
throw new DataColumnSidecarValidationError({
|
|
340
|
+
code: DataColumnSidecarErrorCode.PROPOSAL_SIGNATURE_INVALID,
|
|
341
|
+
blockRoot: toRootHex(blockRoot),
|
|
342
|
+
slot: blockSlot,
|
|
343
|
+
index: dataColumnSidecars[0].index,
|
|
344
|
+
});
|
|
345
|
+
}
|
|
346
|
+
}
|
|
347
|
+
|
|
313
348
|
const commitments: Uint8Array[] = [];
|
|
314
349
|
const cellIndices: number[] = [];
|
|
315
350
|
const cells: Uint8Array[] = [];
|
|
@@ -317,33 +352,55 @@ export async function validateBlockDataColumnSidecars(
|
|
|
317
352
|
for (let i = 0; i < dataColumnSidecars.length; i++) {
|
|
318
353
|
const columnSidecar = dataColumnSidecars[i];
|
|
319
354
|
|
|
355
|
+
if (
|
|
356
|
+
i !== 0 &&
|
|
357
|
+
!ssz.phase0.SignedBeaconBlockHeader.equals(firstSidecarSignedBlockHeader, columnSidecar.signedBlockHeader)
|
|
358
|
+
) {
|
|
359
|
+
throw new DataColumnSidecarValidationError({
|
|
360
|
+
code: DataColumnSidecarErrorCode.INCORRECT_HEADER_ROOT,
|
|
361
|
+
slot: blockSlot,
|
|
362
|
+
expected: toRootHex(blockRoot),
|
|
363
|
+
actual: toRootHex(ssz.phase0.BeaconBlockHeader.hashTreeRoot(columnSidecar.signedBlockHeader.message)),
|
|
364
|
+
});
|
|
365
|
+
}
|
|
366
|
+
|
|
320
367
|
if (columnSidecar.index >= NUMBER_OF_COLUMNS) {
|
|
321
368
|
throw new DataColumnSidecarValidationError(
|
|
322
369
|
{
|
|
323
370
|
code: DataColumnSidecarErrorCode.INVALID_INDEX,
|
|
324
371
|
slot: blockSlot,
|
|
325
|
-
|
|
372
|
+
columnIndex: columnSidecar.index,
|
|
326
373
|
},
|
|
327
374
|
"DataColumnSidecar has invalid index"
|
|
328
375
|
);
|
|
329
376
|
}
|
|
330
377
|
|
|
331
|
-
if (columnSidecar.
|
|
378
|
+
if (columnSidecar.column.length !== blockBlobCount) {
|
|
332
379
|
throw new DataColumnSidecarValidationError({
|
|
333
|
-
code: DataColumnSidecarErrorCode.
|
|
380
|
+
code: DataColumnSidecarErrorCode.INCORRECT_CELL_COUNT,
|
|
334
381
|
slot: blockSlot,
|
|
335
|
-
|
|
382
|
+
columnIndex: columnSidecar.index,
|
|
336
383
|
expected: blockBlobCount,
|
|
384
|
+
actual: columnSidecar.column.length,
|
|
385
|
+
});
|
|
386
|
+
}
|
|
387
|
+
|
|
388
|
+
if (columnSidecar.column.length !== columnSidecar.kzgCommitments.length) {
|
|
389
|
+
throw new DataColumnSidecarValidationError({
|
|
390
|
+
code: DataColumnSidecarErrorCode.INCORRECT_KZG_COMMITMENTS_COUNT,
|
|
391
|
+
slot: blockSlot,
|
|
392
|
+
columnIndex: columnSidecar.index,
|
|
393
|
+
expected: columnSidecar.column.length,
|
|
337
394
|
actual: columnSidecar.kzgCommitments.length,
|
|
338
395
|
});
|
|
339
396
|
}
|
|
340
397
|
|
|
341
|
-
if (columnSidecar.
|
|
398
|
+
if (columnSidecar.column.length !== columnSidecar.kzgProofs.length) {
|
|
342
399
|
throw new DataColumnSidecarValidationError({
|
|
343
400
|
code: DataColumnSidecarErrorCode.INCORRECT_KZG_PROOF_COUNT,
|
|
344
401
|
slot: blockSlot,
|
|
345
|
-
|
|
346
|
-
expected: columnSidecar.
|
|
402
|
+
columnIndex: columnSidecar.index,
|
|
403
|
+
expected: columnSidecar.column.length,
|
|
347
404
|
actual: columnSidecar.kzgProofs.length,
|
|
348
405
|
});
|
|
349
406
|
}
|
|
@@ -353,7 +410,7 @@ export async function validateBlockDataColumnSidecars(
|
|
|
353
410
|
{
|
|
354
411
|
code: DataColumnSidecarErrorCode.INCLUSION_PROOF_INVALID,
|
|
355
412
|
slot: blockSlot,
|
|
356
|
-
|
|
413
|
+
columnIndex: columnSidecar.index,
|
|
357
414
|
},
|
|
358
415
|
"DataColumnSidecar has invalid inclusion proof"
|
|
359
416
|
);
|
package/src/index.ts
CHANGED
|
@@ -3,6 +3,8 @@
|
|
|
3
3
|
export type {RestApiServerMetrics, RestApiServerModules, RestApiServerOpts} from "./api/rest/base.js";
|
|
4
4
|
export {RestApiServer} from "./api/rest/base.js";
|
|
5
5
|
export {checkAndPersistAnchorState, initStateFromDb, initStateFromEth1} from "./chain/index.js";
|
|
6
|
+
export {DbCPStateDatastore} from "./chain/stateCache/datastore/db.js";
|
|
7
|
+
export {FileCPStateDatastore} from "./chain/stateCache/datastore/file.js";
|
|
6
8
|
export {BeaconDb, type IBeaconDb} from "./db/index.js";
|
|
7
9
|
export {Eth1Provider, type IEth1Provider} from "./eth1/index.js";
|
|
8
10
|
// Export metrics utilities to de-duplicate validator metrics
|
|
@@ -553,7 +553,11 @@ export class NetworkCore implements INetworkCore {
|
|
|
553
553
|
// On fork boundary transition
|
|
554
554
|
if (epoch === nextBoundaryEpoch) {
|
|
555
555
|
// updateEth2Field() MUST be called with clock epoch, onEpoch event is emitted in response to clock events
|
|
556
|
-
this.metadata.updateEth2Field(epoch);
|
|
556
|
+
const {forkDigest} = this.metadata.updateEth2Field(epoch);
|
|
557
|
+
// Update local status to reflect the new fork digest, otherwise we will disconnect peers that re-status us
|
|
558
|
+
// right after the fork transition due to incompatible forks as our fork digest is stale since we only
|
|
559
|
+
// update it once we import a new head or when emitting update status event.
|
|
560
|
+
this.statusCache.update({...this.statusCache.get(), forkDigest});
|
|
557
561
|
this.reqResp.registerProtocolsAtBoundary(nextBoundary);
|
|
558
562
|
}
|
|
559
563
|
|
|
@@ -98,8 +98,13 @@ const core = await NetworkCore.init({
|
|
|
98
98
|
metricsRegistry: metricsRegister,
|
|
99
99
|
events,
|
|
100
100
|
clock,
|
|
101
|
-
getReqRespHandler: (method) => (req, peerId) =>
|
|
102
|
-
reqRespBridgeRespCaller.getAsyncIterable({
|
|
101
|
+
getReqRespHandler: (method) => (req, peerId, peerClient) =>
|
|
102
|
+
reqRespBridgeRespCaller.getAsyncIterable({
|
|
103
|
+
method,
|
|
104
|
+
req,
|
|
105
|
+
peerId: peerIdToString(peerId),
|
|
106
|
+
peerClient,
|
|
107
|
+
}),
|
|
103
108
|
activeValidatorCount: workerData.activeValidatorCount,
|
|
104
109
|
initialStatus: workerData.initialStatus,
|
|
105
110
|
initialCustodyGroupCount: workerData.initialCustodyGroupCount,
|