@lodestar/state-transition 1.39.0-dev.075956b855 → 1.39.0-dev.0bce7eb9f1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (91) hide show
  1. package/lib/block/isValidIndexedAttestation.d.ts +4 -5
  2. package/lib/block/isValidIndexedAttestation.d.ts.map +1 -1
  3. package/lib/block/isValidIndexedAttestation.js +9 -10
  4. package/lib/block/isValidIndexedAttestation.js.map +1 -1
  5. package/lib/block/processAttestationPhase0.d.ts.map +1 -1
  6. package/lib/block/processAttestationPhase0.js +1 -1
  7. package/lib/block/processAttestationPhase0.js.map +1 -1
  8. package/lib/block/processAttesterSlashing.d.ts +3 -2
  9. package/lib/block/processAttesterSlashing.d.ts.map +1 -1
  10. package/lib/block/processAttesterSlashing.js +3 -3
  11. package/lib/block/processAttesterSlashing.js.map +1 -1
  12. package/lib/block/processBlsToExecutionChange.d.ts +3 -1
  13. package/lib/block/processBlsToExecutionChange.d.ts.map +1 -1
  14. package/lib/block/processBlsToExecutionChange.js +7 -11
  15. package/lib/block/processBlsToExecutionChange.js.map +1 -1
  16. package/lib/block/processProposerSlashing.d.ts +5 -2
  17. package/lib/block/processProposerSlashing.d.ts.map +1 -1
  18. package/lib/block/processProposerSlashing.js +7 -5
  19. package/lib/block/processProposerSlashing.js.map +1 -1
  20. package/lib/block/processWithdrawals.d.ts +3 -3
  21. package/lib/block/processWithdrawals.d.ts.map +1 -1
  22. package/lib/block/processWithdrawals.js +152 -105
  23. package/lib/block/processWithdrawals.js.map +1 -1
  24. package/lib/cache/epochCache.d.ts +6 -12
  25. package/lib/cache/epochCache.d.ts.map +1 -1
  26. package/lib/cache/epochCache.js +33 -105
  27. package/lib/cache/epochCache.js.map +1 -1
  28. package/lib/cache/epochTransitionCache.d.ts +5 -12
  29. package/lib/cache/epochTransitionCache.d.ts.map +1 -1
  30. package/lib/cache/epochTransitionCache.js +4 -14
  31. package/lib/cache/epochTransitionCache.js.map +1 -1
  32. package/lib/cache/stateCache.d.ts.map +1 -1
  33. package/lib/cache/stateCache.js +1 -2
  34. package/lib/cache/stateCache.js.map +1 -1
  35. package/lib/epoch/processProposerLookahead.d.ts.map +1 -1
  36. package/lib/epoch/processProposerLookahead.js +3 -6
  37. package/lib/epoch/processProposerLookahead.js.map +1 -1
  38. package/lib/index.d.ts +1 -0
  39. package/lib/index.d.ts.map +1 -1
  40. package/lib/index.js +1 -0
  41. package/lib/index.js.map +1 -1
  42. package/lib/rewards/attestationsRewards.d.ts +6 -0
  43. package/lib/rewards/attestationsRewards.d.ts.map +1 -0
  44. package/lib/rewards/attestationsRewards.js +113 -0
  45. package/lib/rewards/attestationsRewards.js.map +1 -0
  46. package/lib/rewards/blockRewards.d.ts +14 -0
  47. package/lib/rewards/blockRewards.d.ts.map +1 -0
  48. package/lib/rewards/blockRewards.js +96 -0
  49. package/lib/rewards/blockRewards.js.map +1 -0
  50. package/lib/rewards/index.d.ts +4 -0
  51. package/lib/rewards/index.d.ts.map +1 -0
  52. package/lib/rewards/index.js +4 -0
  53. package/lib/rewards/index.js.map +1 -0
  54. package/lib/rewards/syncCommitteeRewards.d.ts +6 -0
  55. package/lib/rewards/syncCommitteeRewards.d.ts.map +1 -0
  56. package/lib/rewards/syncCommitteeRewards.js +35 -0
  57. package/lib/rewards/syncCommitteeRewards.js.map +1 -0
  58. package/lib/signatureSets/blsToExecutionChange.d.ts +1 -2
  59. package/lib/signatureSets/blsToExecutionChange.d.ts.map +1 -1
  60. package/lib/signatureSets/blsToExecutionChange.js +2 -2
  61. package/lib/signatureSets/blsToExecutionChange.js.map +1 -1
  62. package/lib/signatureSets/proposer.d.ts +3 -4
  63. package/lib/signatureSets/proposer.d.ts.map +1 -1
  64. package/lib/signatureSets/proposer.js +5 -6
  65. package/lib/signatureSets/proposer.js.map +1 -1
  66. package/lib/types.d.ts +1 -1
  67. package/lib/types.d.ts.map +1 -1
  68. package/lib/util/epochShuffling.d.ts +1 -34
  69. package/lib/util/epochShuffling.d.ts.map +1 -1
  70. package/lib/util/epochShuffling.js +1 -1
  71. package/lib/util/epochShuffling.js.map +1 -1
  72. package/package.json +14 -11
  73. package/src/block/isValidIndexedAttestation.ts +17 -12
  74. package/src/block/processAttestationPhase0.ts +2 -1
  75. package/src/block/processAttesterSlashing.ts +16 -4
  76. package/src/block/processBlsToExecutionChange.ts +13 -14
  77. package/src/block/processProposerSlashing.ts +21 -11
  78. package/src/block/processWithdrawals.ts +230 -135
  79. package/src/cache/epochCache.ts +40 -118
  80. package/src/cache/epochTransitionCache.ts +9 -34
  81. package/src/cache/stateCache.ts +1 -2
  82. package/src/epoch/processProposerLookahead.ts +3 -7
  83. package/src/index.ts +1 -0
  84. package/src/rewards/attestationsRewards.ts +200 -0
  85. package/src/rewards/blockRewards.ts +150 -0
  86. package/src/rewards/index.ts +3 -0
  87. package/src/rewards/syncCommitteeRewards.ts +56 -0
  88. package/src/signatureSets/blsToExecutionChange.ts +2 -3
  89. package/src/signatureSets/proposer.ts +6 -7
  90. package/src/types.ts +1 -0
  91. package/src/util/epochShuffling.ts +2 -43
@@ -1,9 +1,8 @@
1
1
  import {BeaconConfig} from "@lodestar/config";
2
2
  import {ForkSeq, MAX_COMMITTEES_PER_SLOT, MAX_VALIDATORS_PER_COMMITTEE} from "@lodestar/params";
3
- import {IndexedAttestation, IndexedAttestationBigint} from "@lodestar/types";
3
+ import {IndexedAttestation, IndexedAttestationBigint, Slot} from "@lodestar/types";
4
4
  import {Index2PubkeyCache} from "../cache/pubkeyCache.js";
5
5
  import {getIndexedAttestationBigintSignatureSet, getIndexedAttestationSignatureSet} from "../signatureSets/index.js";
6
- import {CachedBeaconStateAllForks} from "../types.js";
7
6
  import {verifySignatureSet} from "../util/index.js";
8
7
 
9
8
  /**
@@ -12,16 +11,17 @@ import {verifySignatureSet} from "../util/index.js";
12
11
  export function isValidIndexedAttestation(
13
12
  config: BeaconConfig,
14
13
  index2pubkey: Index2PubkeyCache,
15
- state: CachedBeaconStateAllForks,
14
+ stateSlot: Slot,
15
+ validatorsLen: number,
16
16
  indexedAttestation: IndexedAttestation,
17
17
  verifySignature: boolean
18
18
  ): boolean {
19
- if (!isValidIndexedAttestationIndices(state, indexedAttestation.attestingIndices)) {
19
+ if (!isValidIndexedAttestationIndices(config, stateSlot, validatorsLen, indexedAttestation.attestingIndices)) {
20
20
  return false;
21
21
  }
22
22
 
23
23
  if (verifySignature) {
24
- return verifySignatureSet(getIndexedAttestationSignatureSet(config, index2pubkey, state.slot, indexedAttestation));
24
+ return verifySignatureSet(getIndexedAttestationSignatureSet(config, index2pubkey, stateSlot, indexedAttestation));
25
25
  }
26
26
  return true;
27
27
  }
@@ -29,17 +29,18 @@ export function isValidIndexedAttestation(
29
29
  export function isValidIndexedAttestationBigint(
30
30
  config: BeaconConfig,
31
31
  index2pubkey: Index2PubkeyCache,
32
- state: CachedBeaconStateAllForks,
32
+ stateSlot: Slot,
33
+ validatorsLen: number,
33
34
  indexedAttestation: IndexedAttestationBigint,
34
35
  verifySignature: boolean
35
36
  ): boolean {
36
- if (!isValidIndexedAttestationIndices(state, indexedAttestation.attestingIndices)) {
37
+ if (!isValidIndexedAttestationIndices(config, stateSlot, validatorsLen, indexedAttestation.attestingIndices)) {
37
38
  return false;
38
39
  }
39
40
 
40
41
  if (verifySignature) {
41
42
  return verifySignatureSet(
42
- getIndexedAttestationBigintSignatureSet(config, index2pubkey, state.slot, indexedAttestation)
43
+ getIndexedAttestationBigintSignatureSet(config, index2pubkey, stateSlot, indexedAttestation)
43
44
  );
44
45
  }
45
46
  return true;
@@ -48,10 +49,15 @@ export function isValidIndexedAttestationBigint(
48
49
  /**
49
50
  * Check if `indexedAttestation` has sorted and unique indices and a valid aggregate signature.
50
51
  */
51
- export function isValidIndexedAttestationIndices(state: CachedBeaconStateAllForks, indices: number[]): boolean {
52
+ export function isValidIndexedAttestationIndices(
53
+ config: BeaconConfig,
54
+ stateSlot: Slot,
55
+ validatorsLen: number,
56
+ indices: number[]
57
+ ): boolean {
52
58
  // verify max number of indices
53
59
  const maxIndices =
54
- state.config.getForkSeq(state.slot) >= ForkSeq.electra
60
+ config.getForkSeq(stateSlot) >= ForkSeq.electra
55
61
  ? MAX_VALIDATORS_PER_COMMITTEE * MAX_COMMITTEES_PER_SLOT
56
62
  : MAX_VALIDATORS_PER_COMMITTEE;
57
63
  if (!(indices.length > 0 && indices.length <= maxIndices)) {
@@ -68,9 +74,8 @@ export function isValidIndexedAttestationIndices(state: CachedBeaconStateAllFork
68
74
  }
69
75
 
70
76
  // check if indices are out of bounds, by checking the highest index (since it is sorted)
71
- // TODO - SLOW CODE - Does this .length check the tree and is expensive?
72
77
  const lastIndex = indices.at(-1);
73
- if (lastIndex && lastIndex >= state.validators.length) {
78
+ if (lastIndex && lastIndex >= validatorsLen) {
74
79
  return false;
75
80
  }
76
81
 
@@ -54,7 +54,8 @@ export function processAttestationPhase0(
54
54
  !isValidIndexedAttestation(
55
55
  state.config,
56
56
  epochCtx.index2pubkey,
57
- state,
57
+ state.slot,
58
+ state.validators.length,
58
59
  epochCtx.getIndexedAttestation(ForkSeq.phase0, attestation),
59
60
  verifySignature
60
61
  )
@@ -1,5 +1,6 @@
1
+ import {BeaconConfig} from "@lodestar/config";
1
2
  import {ForkSeq} from "@lodestar/params";
2
- import {AttesterSlashing} from "@lodestar/types";
3
+ import {AttesterSlashing, Slot} from "@lodestar/types";
3
4
  import {Index2PubkeyCache} from "../cache/pubkeyCache.js";
4
5
  import {CachedBeaconStateAllForks} from "../types.js";
5
6
  import {getAttesterSlashableIndices, isSlashableAttestationData, isSlashableValidator} from "../util/index.js";
@@ -19,7 +20,14 @@ export function processAttesterSlashing(
19
20
  verifySignatures = true
20
21
  ): void {
21
22
  const {epochCtx} = state;
22
- assertValidAttesterSlashing(epochCtx.index2pubkey, state, attesterSlashing, verifySignatures);
23
+ assertValidAttesterSlashing(
24
+ state.config,
25
+ epochCtx.index2pubkey,
26
+ state.slot,
27
+ state.validators.length,
28
+ attesterSlashing,
29
+ verifySignatures
30
+ );
23
31
 
24
32
  const intersectingIndices = getAttesterSlashableIndices(attesterSlashing);
25
33
 
@@ -39,8 +47,10 @@ export function processAttesterSlashing(
39
47
  }
40
48
 
41
49
  export function assertValidAttesterSlashing(
50
+ config: BeaconConfig,
42
51
  index2pubkey: Index2PubkeyCache,
43
- state: CachedBeaconStateAllForks,
52
+ stateSlot: Slot,
53
+ validatorsLen: number,
44
54
  attesterSlashing: AttesterSlashing,
45
55
  verifySignatures = true
46
56
  ): void {
@@ -55,7 +65,9 @@ export function assertValidAttesterSlashing(
55
65
  // be higher than the clock and the slashing would still be valid. Same applies to attestation data index, which
56
66
  // can be any arbitrary value. Must use bigint variants to hash correctly to all possible values
57
67
  for (const [i, attestation] of [attestation1, attestation2].entries()) {
58
- if (!isValidIndexedAttestationBigint(state.config, index2pubkey, state, attestation, verifySignatures)) {
68
+ if (
69
+ !isValidIndexedAttestationBigint(config, index2pubkey, stateSlot, validatorsLen, attestation, verifySignatures)
70
+ ) {
59
71
  throw new Error(`AttesterSlashing attestation${i} is invalid`);
60
72
  }
61
73
  }
@@ -1,7 +1,9 @@
1
1
  import {digest} from "@chainsafe/as-sha256";
2
2
  import {byteArrayEquals} from "@chainsafe/ssz";
3
+ import {BeaconConfig} from "@lodestar/config";
3
4
  import {BLS_WITHDRAWAL_PREFIX, ETH1_ADDRESS_WITHDRAWAL_PREFIX} from "@lodestar/params";
4
5
  import {capella} from "@lodestar/types";
6
+ import {Validator} from "@lodestar/types/phase0";
5
7
  import {toHex} from "@lodestar/utils";
6
8
  import {verifyBlsToExecutionChangeSignature} from "../signatureSets/index.js";
7
9
  import {CachedBeaconStateCapella} from "../types.js";
@@ -12,12 +14,18 @@ export function processBlsToExecutionChange(
12
14
  ): void {
13
15
  const addressChange = signedBlsToExecutionChange.message;
14
16
 
15
- const validation = isValidBlsToExecutionChange(state, signedBlsToExecutionChange, true);
17
+ if (addressChange.validatorIndex >= state.validators.length) {
18
+ throw Error(
19
+ `withdrawalValidatorIndex ${addressChange.validatorIndex} >= state.validators len ${state.validators.length}`
20
+ );
21
+ }
22
+
23
+ const validator = state.validators.get(addressChange.validatorIndex);
24
+ const validation = isValidBlsToExecutionChange(state.config, validator, signedBlsToExecutionChange, true);
16
25
  if (!validation.valid) {
17
26
  throw validation.error;
18
27
  }
19
28
 
20
- const validator = state.validators.get(addressChange.validatorIndex);
21
29
  const newWithdrawalCredentials = new Uint8Array(32);
22
30
  newWithdrawalCredentials[0] = ETH1_ADDRESS_WITHDRAWAL_PREFIX;
23
31
  newWithdrawalCredentials.set(addressChange.toExecutionAddress, 12);
@@ -27,22 +35,13 @@ export function processBlsToExecutionChange(
27
35
  }
28
36
 
29
37
  export function isValidBlsToExecutionChange(
30
- state: CachedBeaconStateCapella,
38
+ config: BeaconConfig,
39
+ validator: Validator,
31
40
  signedBLSToExecutionChange: capella.SignedBLSToExecutionChange,
32
41
  verifySignature = true
33
42
  ): {valid: true} | {valid: false; error: Error} {
34
43
  const addressChange = signedBLSToExecutionChange.message;
35
44
 
36
- if (addressChange.validatorIndex >= state.validators.length) {
37
- return {
38
- valid: false,
39
- error: Error(
40
- `withdrawalValidatorIndex ${addressChange.validatorIndex} > state.validators len ${state.validators.length}`
41
- ),
42
- };
43
- }
44
-
45
- const validator = state.validators.getReadonly(addressChange.validatorIndex);
46
45
  const {withdrawalCredentials} = validator;
47
46
  if (withdrawalCredentials[0] !== BLS_WITHDRAWAL_PREFIX) {
48
47
  return {
@@ -65,7 +64,7 @@ export function isValidBlsToExecutionChange(
65
64
  };
66
65
  }
67
66
 
68
- if (verifySignature && !verifyBlsToExecutionChangeSignature(state, signedBLSToExecutionChange)) {
67
+ if (verifySignature && !verifyBlsToExecutionChangeSignature(config, signedBLSToExecutionChange)) {
69
68
  return {
70
69
  valid: false,
71
70
  error: Error(
@@ -1,5 +1,8 @@
1
+ import {BeaconConfig} from "@lodestar/config";
1
2
  import {ForkSeq, SLOTS_PER_EPOCH} from "@lodestar/params";
2
- import {phase0, ssz} from "@lodestar/types";
3
+ import {Slot, phase0, ssz} from "@lodestar/types";
4
+ import {Validator} from "@lodestar/types/phase0";
5
+ import {Index2PubkeyCache} from "../cache/pubkeyCache.js";
3
6
  import {getProposerSlashingSignatureSets} from "../signatureSets/index.js";
4
7
  import {CachedBeaconStateAllForks, CachedBeaconStateGloas} from "../types.js";
5
8
  import {computeEpochAtSlot, isSlashableValidator} from "../util/index.js";
@@ -18,7 +21,15 @@ export function processProposerSlashing(
18
21
  proposerSlashing: phase0.ProposerSlashing,
19
22
  verifySignatures = true
20
23
  ): void {
21
- assertValidProposerSlashing(state, proposerSlashing, verifySignatures);
24
+ const proposer = state.validators.getReadonly(proposerSlashing.signedHeader1.message.proposerIndex);
25
+ assertValidProposerSlashing(
26
+ state.config,
27
+ state.epochCtx.index2pubkey,
28
+ state.slot,
29
+ proposerSlashing,
30
+ proposer,
31
+ verifySignatures
32
+ );
22
33
 
23
34
  if (fork >= ForkSeq.gloas) {
24
35
  const slot = Number(proposerSlashing.signedHeader1.message.slot);
@@ -45,8 +56,11 @@ export function processProposerSlashing(
45
56
  }
46
57
 
47
58
  export function assertValidProposerSlashing(
48
- state: CachedBeaconStateAllForks,
59
+ config: BeaconConfig,
60
+ index2pubkey: Index2PubkeyCache,
61
+ stateSlot: Slot,
49
62
  proposerSlashing: phase0.ProposerSlashing,
63
+ proposer: Validator,
50
64
  verifySignatures = true
51
65
  ): void {
52
66
  const header1 = proposerSlashing.signedHeader1.message;
@@ -70,19 +84,15 @@ export function assertValidProposerSlashing(
70
84
  }
71
85
 
72
86
  // verify the proposer is slashable
73
- const proposer = state.validators.getReadonly(header1.proposerIndex);
74
- if (!isSlashableValidator(proposer, state.epochCtx.epoch)) {
87
+ // ideally we would get the proposer from state.validators using proposerIndex but that requires access to state
88
+ // instead of that we pass in the proposer directly from the consumer side
89
+ if (!isSlashableValidator(proposer, computeEpochAtSlot(stateSlot))) {
75
90
  throw new Error("ProposerSlashing proposer is not slashable");
76
91
  }
77
92
 
78
93
  // verify signatures
79
94
  if (verifySignatures) {
80
- const signatureSets = getProposerSlashingSignatureSets(
81
- state.config,
82
- state.epochCtx.index2pubkey,
83
- state.slot,
84
- proposerSlashing
85
- );
95
+ const signatureSets = getProposerSlashingSignatureSets(config, index2pubkey, stateSlot, proposerSlashing);
86
96
  for (let i = 0; i < signatureSets.length; i++) {
87
97
  if (!verifySignatureSet(signatureSets[i])) {
88
98
  throw new Error(`ProposerSlashing header${i + 1} signature invalid`);