@lodestar/state-transition 1.39.0-dev.aceb5b7416 → 1.39.0-dev.b2437a6348

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (154) hide show
  1. package/lib/block/index.d.ts.map +1 -1
  2. package/lib/block/index.js +4 -2
  3. package/lib/block/index.js.map +1 -1
  4. package/lib/block/isValidIndexedAttestation.d.ts +5 -5
  5. package/lib/block/isValidIndexedAttestation.d.ts.map +1 -1
  6. package/lib/block/isValidIndexedAttestation.js +9 -10
  7. package/lib/block/isValidIndexedAttestation.js.map +1 -1
  8. package/lib/block/processAttestationPhase0.d.ts.map +1 -1
  9. package/lib/block/processAttestationPhase0.js +1 -1
  10. package/lib/block/processAttestationPhase0.js.map +1 -1
  11. package/lib/block/processAttestationsAltair.d.ts.map +1 -1
  12. package/lib/block/processAttestationsAltair.js +1 -1
  13. package/lib/block/processAttestationsAltair.js.map +1 -1
  14. package/lib/block/processAttesterSlashing.d.ts +3 -2
  15. package/lib/block/processAttesterSlashing.d.ts.map +1 -1
  16. package/lib/block/processAttesterSlashing.js +3 -3
  17. package/lib/block/processAttesterSlashing.js.map +1 -1
  18. package/lib/block/processBlsToExecutionChange.d.ts +3 -1
  19. package/lib/block/processBlsToExecutionChange.d.ts.map +1 -1
  20. package/lib/block/processBlsToExecutionChange.js +7 -11
  21. package/lib/block/processBlsToExecutionChange.js.map +1 -1
  22. package/lib/block/processExecutionPayload.d.ts.map +1 -1
  23. package/lib/block/processExecutionPayload.js +6 -4
  24. package/lib/block/processExecutionPayload.js.map +1 -1
  25. package/lib/block/processProposerSlashing.d.ts +5 -2
  26. package/lib/block/processProposerSlashing.d.ts.map +1 -1
  27. package/lib/block/processProposerSlashing.js +7 -5
  28. package/lib/block/processProposerSlashing.js.map +1 -1
  29. package/lib/block/processRandao.js +2 -2
  30. package/lib/block/processRandao.js.map +1 -1
  31. package/lib/block/processSyncCommittee.d.ts +3 -1
  32. package/lib/block/processSyncCommittee.d.ts.map +1 -1
  33. package/lib/block/processSyncCommittee.js +6 -4
  34. package/lib/block/processSyncCommittee.js.map +1 -1
  35. package/lib/block/processVoluntaryExit.d.ts.map +1 -1
  36. package/lib/block/processVoluntaryExit.js +2 -1
  37. package/lib/block/processVoluntaryExit.js.map +1 -1
  38. package/lib/block/processWithdrawals.d.ts +3 -3
  39. package/lib/block/processWithdrawals.d.ts.map +1 -1
  40. package/lib/block/processWithdrawals.js +152 -105
  41. package/lib/block/processWithdrawals.js.map +1 -1
  42. package/lib/cache/epochCache.d.ts +6 -12
  43. package/lib/cache/epochCache.d.ts.map +1 -1
  44. package/lib/cache/epochCache.js +33 -105
  45. package/lib/cache/epochCache.js.map +1 -1
  46. package/lib/cache/epochTransitionCache.d.ts +5 -12
  47. package/lib/cache/epochTransitionCache.d.ts.map +1 -1
  48. package/lib/cache/epochTransitionCache.js +4 -14
  49. package/lib/cache/epochTransitionCache.js.map +1 -1
  50. package/lib/cache/stateCache.d.ts +1 -0
  51. package/lib/cache/stateCache.d.ts.map +1 -1
  52. package/lib/cache/stateCache.js +1 -2
  53. package/lib/cache/stateCache.js.map +1 -1
  54. package/lib/epoch/processProposerLookahead.d.ts.map +1 -1
  55. package/lib/epoch/processProposerLookahead.js +3 -6
  56. package/lib/epoch/processProposerLookahead.js.map +1 -1
  57. package/lib/index.d.ts +2 -1
  58. package/lib/index.d.ts.map +1 -1
  59. package/lib/index.js +2 -0
  60. package/lib/index.js.map +1 -1
  61. package/lib/rewards/attestationsRewards.d.ts +6 -0
  62. package/lib/rewards/attestationsRewards.d.ts.map +1 -0
  63. package/lib/rewards/attestationsRewards.js +113 -0
  64. package/lib/rewards/attestationsRewards.js.map +1 -0
  65. package/lib/rewards/blockRewards.d.ts +14 -0
  66. package/lib/rewards/blockRewards.d.ts.map +1 -0
  67. package/lib/rewards/blockRewards.js +96 -0
  68. package/lib/rewards/blockRewards.js.map +1 -0
  69. package/lib/rewards/index.d.ts +4 -0
  70. package/lib/rewards/index.d.ts.map +1 -0
  71. package/lib/rewards/index.js +4 -0
  72. package/lib/rewards/index.js.map +1 -0
  73. package/lib/rewards/syncCommitteeRewards.d.ts +6 -0
  74. package/lib/rewards/syncCommitteeRewards.d.ts.map +1 -0
  75. package/lib/rewards/syncCommitteeRewards.js +35 -0
  76. package/lib/rewards/syncCommitteeRewards.js.map +1 -0
  77. package/lib/signatureSets/attesterSlashings.d.ts +5 -5
  78. package/lib/signatureSets/attesterSlashings.d.ts.map +1 -1
  79. package/lib/signatureSets/attesterSlashings.js +10 -7
  80. package/lib/signatureSets/attesterSlashings.js.map +1 -1
  81. package/lib/signatureSets/blsToExecutionChange.d.ts +1 -2
  82. package/lib/signatureSets/blsToExecutionChange.d.ts.map +1 -1
  83. package/lib/signatureSets/blsToExecutionChange.js +2 -2
  84. package/lib/signatureSets/blsToExecutionChange.js.map +1 -1
  85. package/lib/signatureSets/index.d.ts +3 -2
  86. package/lib/signatureSets/index.d.ts.map +1 -1
  87. package/lib/signatureSets/index.js +10 -10
  88. package/lib/signatureSets/index.js.map +1 -1
  89. package/lib/signatureSets/indexedAttestation.d.ts +6 -6
  90. package/lib/signatureSets/indexedAttestation.d.ts.map +1 -1
  91. package/lib/signatureSets/indexedAttestation.js +12 -9
  92. package/lib/signatureSets/indexedAttestation.js.map +1 -1
  93. package/lib/signatureSets/proposer.d.ts +6 -6
  94. package/lib/signatureSets/proposer.d.ts.map +1 -1
  95. package/lib/signatureSets/proposer.js +12 -11
  96. package/lib/signatureSets/proposer.js.map +1 -1
  97. package/lib/signatureSets/proposerSlashings.d.ts +4 -4
  98. package/lib/signatureSets/proposerSlashings.d.ts.map +1 -1
  99. package/lib/signatureSets/proposerSlashings.js +7 -4
  100. package/lib/signatureSets/proposerSlashings.js.map +1 -1
  101. package/lib/signatureSets/randao.d.ts +3 -3
  102. package/lib/signatureSets/randao.d.ts.map +1 -1
  103. package/lib/signatureSets/randao.js +6 -4
  104. package/lib/signatureSets/randao.js.map +1 -1
  105. package/lib/signatureSets/voluntaryExits.d.ts +5 -5
  106. package/lib/signatureSets/voluntaryExits.d.ts.map +1 -1
  107. package/lib/signatureSets/voluntaryExits.js +10 -7
  108. package/lib/signatureSets/voluntaryExits.js.map +1 -1
  109. package/lib/stateTransition.js +1 -1
  110. package/lib/stateTransition.js.map +1 -1
  111. package/lib/types.d.ts +1 -1
  112. package/lib/types.d.ts.map +1 -1
  113. package/lib/util/epochShuffling.d.ts +1 -34
  114. package/lib/util/epochShuffling.d.ts.map +1 -1
  115. package/lib/util/epochShuffling.js +1 -1
  116. package/lib/util/epochShuffling.js.map +1 -1
  117. package/lib/util/execution.d.ts +11 -1
  118. package/lib/util/execution.d.ts.map +1 -1
  119. package/lib/util/execution.js +26 -1
  120. package/lib/util/execution.js.map +1 -1
  121. package/package.json +14 -11
  122. package/src/block/index.ts +6 -2
  123. package/src/block/isValidIndexedAttestation.ts +22 -12
  124. package/src/block/processAttestationPhase0.ts +3 -1
  125. package/src/block/processAttestationsAltair.ts +7 -1
  126. package/src/block/processAttesterSlashing.ts +16 -4
  127. package/src/block/processBlsToExecutionChange.ts +13 -14
  128. package/src/block/processExecutionPayload.ts +14 -8
  129. package/src/block/processProposerSlashing.ts +21 -6
  130. package/src/block/processRandao.ts +2 -2
  131. package/src/block/processSyncCommittee.ts +15 -4
  132. package/src/block/processVoluntaryExit.ts +4 -1
  133. package/src/block/processWithdrawals.ts +230 -135
  134. package/src/cache/epochCache.ts +40 -118
  135. package/src/cache/epochTransitionCache.ts +9 -34
  136. package/src/cache/stateCache.ts +2 -2
  137. package/src/epoch/processProposerLookahead.ts +3 -7
  138. package/src/index.ts +2 -2
  139. package/src/rewards/attestationsRewards.ts +200 -0
  140. package/src/rewards/blockRewards.ts +150 -0
  141. package/src/rewards/index.ts +3 -0
  142. package/src/rewards/syncCommitteeRewards.ts +56 -0
  143. package/src/signatureSets/attesterSlashings.ts +14 -9
  144. package/src/signatureSets/blsToExecutionChange.ts +2 -3
  145. package/src/signatureSets/index.ts +14 -11
  146. package/src/signatureSets/indexedAttestation.ts +18 -11
  147. package/src/signatureSets/proposer.ts +14 -12
  148. package/src/signatureSets/proposerSlashings.ts +10 -10
  149. package/src/signatureSets/randao.ts +7 -5
  150. package/src/signatureSets/voluntaryExits.ts +14 -9
  151. package/src/stateTransition.ts +1 -1
  152. package/src/types.ts +1 -0
  153. package/src/util/epochShuffling.ts +2 -43
  154. package/src/util/execution.ts +39 -0
@@ -1,41 +1,47 @@
1
+ import {BeaconConfig} from "@lodestar/config";
1
2
  import {ForkSeq, MAX_COMMITTEES_PER_SLOT, MAX_VALIDATORS_PER_COMMITTEE} from "@lodestar/params";
2
- import {IndexedAttestation, IndexedAttestationBigint} from "@lodestar/types";
3
+ import {IndexedAttestation, IndexedAttestationBigint, Slot} from "@lodestar/types";
3
4
  import {Index2PubkeyCache} from "../cache/pubkeyCache.js";
4
5
  import {getIndexedAttestationBigintSignatureSet, getIndexedAttestationSignatureSet} from "../signatureSets/index.js";
5
- import {CachedBeaconStateAllForks} from "../types.js";
6
6
  import {verifySignatureSet} from "../util/index.js";
7
7
 
8
8
  /**
9
9
  * Check if `indexedAttestation` has sorted and unique indices and a valid aggregate signature.
10
10
  */
11
11
  export function isValidIndexedAttestation(
12
+ config: BeaconConfig,
12
13
  index2pubkey: Index2PubkeyCache,
13
- state: CachedBeaconStateAllForks,
14
+ stateSlot: Slot,
15
+ validatorsLen: number,
14
16
  indexedAttestation: IndexedAttestation,
15
17
  verifySignature: boolean
16
18
  ): boolean {
17
- if (!isValidIndexedAttestationIndices(state, indexedAttestation.attestingIndices)) {
19
+ if (!isValidIndexedAttestationIndices(config, stateSlot, validatorsLen, indexedAttestation.attestingIndices)) {
18
20
  return false;
19
21
  }
20
22
 
21
23
  if (verifySignature) {
22
- return verifySignatureSet(getIndexedAttestationSignatureSet(index2pubkey, state, indexedAttestation));
24
+ return verifySignatureSet(getIndexedAttestationSignatureSet(config, index2pubkey, stateSlot, indexedAttestation));
23
25
  }
24
26
  return true;
25
27
  }
26
28
 
27
29
  export function isValidIndexedAttestationBigint(
30
+ config: BeaconConfig,
28
31
  index2pubkey: Index2PubkeyCache,
29
- state: CachedBeaconStateAllForks,
32
+ stateSlot: Slot,
33
+ validatorsLen: number,
30
34
  indexedAttestation: IndexedAttestationBigint,
31
35
  verifySignature: boolean
32
36
  ): boolean {
33
- if (!isValidIndexedAttestationIndices(state, indexedAttestation.attestingIndices)) {
37
+ if (!isValidIndexedAttestationIndices(config, stateSlot, validatorsLen, indexedAttestation.attestingIndices)) {
34
38
  return false;
35
39
  }
36
40
 
37
41
  if (verifySignature) {
38
- return verifySignatureSet(getIndexedAttestationBigintSignatureSet(index2pubkey, state, indexedAttestation));
42
+ return verifySignatureSet(
43
+ getIndexedAttestationBigintSignatureSet(config, index2pubkey, stateSlot, indexedAttestation)
44
+ );
39
45
  }
40
46
  return true;
41
47
  }
@@ -43,10 +49,15 @@ export function isValidIndexedAttestationBigint(
43
49
  /**
44
50
  * Check if `indexedAttestation` has sorted and unique indices and a valid aggregate signature.
45
51
  */
46
- export function isValidIndexedAttestationIndices(state: CachedBeaconStateAllForks, indices: number[]): boolean {
52
+ export function isValidIndexedAttestationIndices(
53
+ config: BeaconConfig,
54
+ stateSlot: Slot,
55
+ validatorsLen: number,
56
+ indices: number[]
57
+ ): boolean {
47
58
  // verify max number of indices
48
59
  const maxIndices =
49
- state.config.getForkSeq(state.slot) >= ForkSeq.electra
60
+ config.getForkSeq(stateSlot) >= ForkSeq.electra
50
61
  ? MAX_VALIDATORS_PER_COMMITTEE * MAX_COMMITTEES_PER_SLOT
51
62
  : MAX_VALIDATORS_PER_COMMITTEE;
52
63
  if (!(indices.length > 0 && indices.length <= maxIndices)) {
@@ -63,9 +74,8 @@ export function isValidIndexedAttestationIndices(state: CachedBeaconStateAllFork
63
74
  }
64
75
 
65
76
  // check if indices are out of bounds, by checking the highest index (since it is sorted)
66
- // TODO - SLOW CODE - Does this .length check the tree and is expensive?
67
77
  const lastIndex = indices.at(-1);
68
- if (lastIndex && lastIndex >= state.validators.length) {
78
+ if (lastIndex && lastIndex >= validatorsLen) {
69
79
  return false;
70
80
  }
71
81
 
@@ -52,8 +52,10 @@ export function processAttestationPhase0(
52
52
 
53
53
  if (
54
54
  !isValidIndexedAttestation(
55
+ state.config,
55
56
  epochCtx.index2pubkey,
56
- state,
57
+ state.slot,
58
+ state.validators.length,
57
59
  epochCtx.getIndexedAttestation(ForkSeq.phase0, attestation),
58
60
  verifySignature
59
61
  )
@@ -64,7 +64,13 @@ export function processAttestationsAltair(
64
64
  // TODO: Why should we verify an indexed attestation that we just created? If it's just for the signature
65
65
  // we can verify only that and nothing else.
66
66
  if (verifySignature) {
67
- const sigSet = getAttestationWithIndicesSignatureSet(epochCtx.index2pubkey, state, attestation, attestingIndices);
67
+ const sigSet = getAttestationWithIndicesSignatureSet(
68
+ state.config,
69
+ epochCtx.index2pubkey,
70
+ state.slot,
71
+ attestation,
72
+ attestingIndices
73
+ );
68
74
  if (!verifySignatureSet(sigSet)) {
69
75
  throw new Error("Attestation signature is not valid");
70
76
  }
@@ -1,5 +1,6 @@
1
+ import {BeaconConfig} from "@lodestar/config";
1
2
  import {ForkSeq} from "@lodestar/params";
2
- import {AttesterSlashing} from "@lodestar/types";
3
+ import {AttesterSlashing, Slot} from "@lodestar/types";
3
4
  import {Index2PubkeyCache} from "../cache/pubkeyCache.js";
4
5
  import {CachedBeaconStateAllForks} from "../types.js";
5
6
  import {getAttesterSlashableIndices, isSlashableAttestationData, isSlashableValidator} from "../util/index.js";
@@ -19,7 +20,14 @@ export function processAttesterSlashing(
19
20
  verifySignatures = true
20
21
  ): void {
21
22
  const {epochCtx} = state;
22
- assertValidAttesterSlashing(epochCtx.index2pubkey, state, attesterSlashing, verifySignatures);
23
+ assertValidAttesterSlashing(
24
+ state.config,
25
+ epochCtx.index2pubkey,
26
+ state.slot,
27
+ state.validators.length,
28
+ attesterSlashing,
29
+ verifySignatures
30
+ );
23
31
 
24
32
  const intersectingIndices = getAttesterSlashableIndices(attesterSlashing);
25
33
 
@@ -39,8 +47,10 @@ export function processAttesterSlashing(
39
47
  }
40
48
 
41
49
  export function assertValidAttesterSlashing(
50
+ config: BeaconConfig,
42
51
  index2pubkey: Index2PubkeyCache,
43
- state: CachedBeaconStateAllForks,
52
+ stateSlot: Slot,
53
+ validatorsLen: number,
44
54
  attesterSlashing: AttesterSlashing,
45
55
  verifySignatures = true
46
56
  ): void {
@@ -55,7 +65,9 @@ export function assertValidAttesterSlashing(
55
65
  // be higher than the clock and the slashing would still be valid. Same applies to attestation data index, which
56
66
  // can be any arbitrary value. Must use bigint variants to hash correctly to all possible values
57
67
  for (const [i, attestation] of [attestation1, attestation2].entries()) {
58
- if (!isValidIndexedAttestationBigint(index2pubkey, state, attestation, verifySignatures)) {
68
+ if (
69
+ !isValidIndexedAttestationBigint(config, index2pubkey, stateSlot, validatorsLen, attestation, verifySignatures)
70
+ ) {
59
71
  throw new Error(`AttesterSlashing attestation${i} is invalid`);
60
72
  }
61
73
  }
@@ -1,7 +1,9 @@
1
1
  import {digest} from "@chainsafe/as-sha256";
2
2
  import {byteArrayEquals} from "@chainsafe/ssz";
3
+ import {BeaconConfig} from "@lodestar/config";
3
4
  import {BLS_WITHDRAWAL_PREFIX, ETH1_ADDRESS_WITHDRAWAL_PREFIX} from "@lodestar/params";
4
5
  import {capella} from "@lodestar/types";
6
+ import {Validator} from "@lodestar/types/phase0";
5
7
  import {toHex} from "@lodestar/utils";
6
8
  import {verifyBlsToExecutionChangeSignature} from "../signatureSets/index.js";
7
9
  import {CachedBeaconStateCapella} from "../types.js";
@@ -12,12 +14,18 @@ export function processBlsToExecutionChange(
12
14
  ): void {
13
15
  const addressChange = signedBlsToExecutionChange.message;
14
16
 
15
- const validation = isValidBlsToExecutionChange(state, signedBlsToExecutionChange, true);
17
+ if (addressChange.validatorIndex >= state.validators.length) {
18
+ throw Error(
19
+ `withdrawalValidatorIndex ${addressChange.validatorIndex} >= state.validators len ${state.validators.length}`
20
+ );
21
+ }
22
+
23
+ const validator = state.validators.get(addressChange.validatorIndex);
24
+ const validation = isValidBlsToExecutionChange(state.config, validator, signedBlsToExecutionChange, true);
16
25
  if (!validation.valid) {
17
26
  throw validation.error;
18
27
  }
19
28
 
20
- const validator = state.validators.get(addressChange.validatorIndex);
21
29
  const newWithdrawalCredentials = new Uint8Array(32);
22
30
  newWithdrawalCredentials[0] = ETH1_ADDRESS_WITHDRAWAL_PREFIX;
23
31
  newWithdrawalCredentials.set(addressChange.toExecutionAddress, 12);
@@ -27,22 +35,13 @@ export function processBlsToExecutionChange(
27
35
  }
28
36
 
29
37
  export function isValidBlsToExecutionChange(
30
- state: CachedBeaconStateCapella,
38
+ config: BeaconConfig,
39
+ validator: Validator,
31
40
  signedBLSToExecutionChange: capella.SignedBLSToExecutionChange,
32
41
  verifySignature = true
33
42
  ): {valid: true} | {valid: false; error: Error} {
34
43
  const addressChange = signedBLSToExecutionChange.message;
35
44
 
36
- if (addressChange.validatorIndex >= state.validators.length) {
37
- return {
38
- valid: false,
39
- error: Error(
40
- `withdrawalValidatorIndex ${addressChange.validatorIndex} > state.validators len ${state.validators.length}`
41
- ),
42
- };
43
- }
44
-
45
- const validator = state.validators.getReadonly(addressChange.validatorIndex);
46
45
  const {withdrawalCredentials} = validator;
47
46
  if (withdrawalCredentials[0] !== BLS_WITHDRAWAL_PREFIX) {
48
47
  return {
@@ -65,7 +64,7 @@ export function isValidBlsToExecutionChange(
65
64
  };
66
65
  }
67
66
 
68
- if (verifySignature && !verifyBlsToExecutionChangeSignature(state, signedBLSToExecutionChange)) {
67
+ if (verifySignature && !verifyBlsToExecutionChangeSignature(config, signedBLSToExecutionChange)) {
69
68
  return {
70
69
  valid: false,
71
70
  error: Error(
@@ -3,7 +3,11 @@ import {ForkName, ForkSeq, isForkPostDeneb} from "@lodestar/params";
3
3
  import {BeaconBlockBody, BlindedBeaconBlockBody, deneb, isExecutionPayload} from "@lodestar/types";
4
4
  import {toHex, toRootHex} from "@lodestar/utils";
5
5
  import {CachedBeaconStateBellatrix, CachedBeaconStateCapella} from "../types.js";
6
- import {executionPayloadToPayloadHeader, getFullOrBlindedPayloadFromBody} from "../util/execution.js";
6
+ import {
7
+ executionPayloadToPayloadHeader,
8
+ getFullOrBlindedPayloadFromBody,
9
+ isMergeTransitionComplete,
10
+ } from "../util/execution.js";
7
11
  import {computeEpochAtSlot, computeTimeAtSlot, getRandaoMix} from "../util/index.js";
8
12
  import {BlockExternalData, ExecutionPayloadStatus} from "./externalData.js";
9
13
 
@@ -17,13 +21,15 @@ export function processExecutionPayload(
17
21
  const forkName = ForkName[ForkSeq[fork] as ForkName];
18
22
  // Verify consistency of the parent hash, block number, base fee per gas and gas limit
19
23
  // with respect to the previous execution payload header
20
- const {latestExecutionPayloadHeader} = state;
21
- if (!byteArrayEquals(payload.parentHash, latestExecutionPayloadHeader.blockHash)) {
22
- throw Error(
23
- `Invalid execution payload parentHash ${toRootHex(payload.parentHash)} latest blockHash ${toRootHex(
24
- latestExecutionPayloadHeader.blockHash
25
- )}`
26
- );
24
+ if (isMergeTransitionComplete(state)) {
25
+ const {latestExecutionPayloadHeader} = state;
26
+ if (!byteArrayEquals(payload.parentHash, latestExecutionPayloadHeader.blockHash)) {
27
+ throw Error(
28
+ `Invalid execution payload parentHash ${toRootHex(payload.parentHash)} latest blockHash ${toRootHex(
29
+ latestExecutionPayloadHeader.blockHash
30
+ )}`
31
+ );
32
+ }
27
33
  }
28
34
 
29
35
  // Verify random
@@ -1,5 +1,8 @@
1
+ import {BeaconConfig} from "@lodestar/config";
1
2
  import {ForkSeq, SLOTS_PER_EPOCH} from "@lodestar/params";
2
- import {phase0, ssz} from "@lodestar/types";
3
+ import {Slot, phase0, ssz} from "@lodestar/types";
4
+ import {Validator} from "@lodestar/types/phase0";
5
+ import {Index2PubkeyCache} from "../cache/pubkeyCache.js";
3
6
  import {getProposerSlashingSignatureSets} from "../signatureSets/index.js";
4
7
  import {CachedBeaconStateAllForks, CachedBeaconStateGloas} from "../types.js";
5
8
  import {computeEpochAtSlot, isSlashableValidator} from "../util/index.js";
@@ -18,7 +21,15 @@ export function processProposerSlashing(
18
21
  proposerSlashing: phase0.ProposerSlashing,
19
22
  verifySignatures = true
20
23
  ): void {
21
- assertValidProposerSlashing(state, proposerSlashing, verifySignatures);
24
+ const proposer = state.validators.getReadonly(proposerSlashing.signedHeader1.message.proposerIndex);
25
+ assertValidProposerSlashing(
26
+ state.config,
27
+ state.epochCtx.index2pubkey,
28
+ state.slot,
29
+ proposerSlashing,
30
+ proposer,
31
+ verifySignatures
32
+ );
22
33
 
23
34
  if (fork >= ForkSeq.gloas) {
24
35
  const slot = Number(proposerSlashing.signedHeader1.message.slot);
@@ -45,8 +56,11 @@ export function processProposerSlashing(
45
56
  }
46
57
 
47
58
  export function assertValidProposerSlashing(
48
- state: CachedBeaconStateAllForks,
59
+ config: BeaconConfig,
60
+ index2pubkey: Index2PubkeyCache,
61
+ stateSlot: Slot,
49
62
  proposerSlashing: phase0.ProposerSlashing,
63
+ proposer: Validator,
50
64
  verifySignatures = true
51
65
  ): void {
52
66
  const header1 = proposerSlashing.signedHeader1.message;
@@ -70,14 +84,15 @@ export function assertValidProposerSlashing(
70
84
  }
71
85
 
72
86
  // verify the proposer is slashable
73
- const proposer = state.validators.getReadonly(header1.proposerIndex);
74
- if (!isSlashableValidator(proposer, state.epochCtx.epoch)) {
87
+ // ideally we would get the proposer from state.validators using proposerIndex but that requires access to state
88
+ // instead of that we pass in the proposer directly from the consumer side
89
+ if (!isSlashableValidator(proposer, computeEpochAtSlot(stateSlot))) {
75
90
  throw new Error("ProposerSlashing proposer is not slashable");
76
91
  }
77
92
 
78
93
  // verify signatures
79
94
  if (verifySignatures) {
80
- const signatureSets = getProposerSlashingSignatureSets(state.epochCtx.index2pubkey, state, proposerSlashing);
95
+ const signatureSets = getProposerSlashingSignatureSets(config, index2pubkey, stateSlot, proposerSlashing);
81
96
  for (let i = 0; i < signatureSets.length; i++) {
82
97
  if (!verifySignatureSet(signatureSets[i])) {
83
98
  throw new Error(`ProposerSlashing header${i + 1} signature invalid`);
@@ -12,12 +12,12 @@ import {getRandaoMix} from "../util/index.js";
12
12
  * PERF: Fixed work independent of block contents.
13
13
  */
14
14
  export function processRandao(state: CachedBeaconStateAllForks, block: BeaconBlock, verifySignature = true): void {
15
- const {epochCtx} = state;
15
+ const {epochCtx, config} = state;
16
16
  const epoch = epochCtx.epoch;
17
17
  const randaoReveal = block.body.randaoReveal;
18
18
 
19
19
  // verify RANDAO reveal
20
- if (verifySignature && !verifyRandaoSignature(epochCtx.index2pubkey, state, block)) {
20
+ if (verifySignature && !verifyRandaoSignature(config, epochCtx.index2pubkey, block)) {
21
21
  throw new Error("RANDAO reveal is an invalid signature");
22
22
  }
23
23
 
@@ -1,7 +1,9 @@
1
1
  import {byteArrayEquals} from "@chainsafe/ssz";
2
+ import {BeaconConfig} from "@lodestar/config";
2
3
  import {DOMAIN_SYNC_COMMITTEE, SYNC_COMMITTEE_SIZE} from "@lodestar/params";
3
4
  import {altair, ssz} from "@lodestar/types";
4
5
  import {Index2PubkeyCache} from "../cache/pubkeyCache.js";
6
+ import {SyncCommitteeCache} from "../cache/syncCommitteeCache.js";
5
7
  import {G2_POINT_AT_INFINITY} from "../constants/index.js";
6
8
  import {CachedBeaconStateAllForks} from "../types.js";
7
9
  import {
@@ -24,7 +26,13 @@ export function processSyncAggregate(
24
26
  if (verifySignatures) {
25
27
  // This is to conform to the spec - we want the signature to be verified
26
28
  const participantIndices = block.body.syncAggregate.syncCommitteeBits.intersectValues(committeeIndices);
27
- const signatureSet = getSyncCommitteeSignatureSet(state.epochCtx.index2pubkey, state, block, participantIndices);
29
+ const signatureSet = getSyncCommitteeSignatureSet(
30
+ state.config,
31
+ state.epochCtx.index2pubkey,
32
+ state.epochCtx.currentSyncCommitteeIndexed,
33
+ block,
34
+ participantIndices
35
+ );
28
36
  // When there's no participation we consider the signature valid and just ignore i
29
37
  if (signatureSet !== null && !verifySignatureSet(signatureSet)) {
30
38
  throw Error("Sync committee signature invalid");
@@ -64,8 +72,9 @@ export function processSyncAggregate(
64
72
  }
65
73
 
66
74
  export function getSyncCommitteeSignatureSet(
75
+ config: BeaconConfig,
67
76
  index2pubkey: Index2PubkeyCache,
68
- state: CachedBeaconStateAllForks,
77
+ currentSyncCommitteeIndexed: SyncCommitteeCache,
69
78
  block: altair.BeaconBlock,
70
79
  /** Optional parameter to prevent computing it twice */
71
80
  participantIndices?: number[]
@@ -93,7 +102,7 @@ export function getSyncCommitteeSignatureSet(
93
102
  const rootSigned = block.parentRoot;
94
103
 
95
104
  if (!participantIndices) {
96
- const committeeIndices = state.epochCtx.currentSyncCommitteeIndexed.validatorIndices;
105
+ const committeeIndices = currentSyncCommitteeIndexed.validatorIndices;
97
106
  participantIndices = syncAggregate.syncCommitteeBits.intersectValues(committeeIndices);
98
107
  }
99
108
 
@@ -107,7 +116,9 @@ export function getSyncCommitteeSignatureSet(
107
116
  throw Error("Empty sync committee signature is not infinity");
108
117
  }
109
118
 
110
- const domain = state.config.getDomain(state.slot, DOMAIN_SYNC_COMMITTEE, previousSlot);
119
+ // the getDomain() api requires the state slot as 1st param, however it's the same to block.slot in state-transition
120
+ // and the same epoch when we verify blocks in batch in beacon-node. So we can safely use block.slot here.
121
+ const domain = config.getDomain(block.slot, DOMAIN_SYNC_COMMITTEE, previousSlot);
111
122
 
112
123
  return {
113
124
  type: SignatureSetType.aggregate,
@@ -74,7 +74,10 @@ export function getVoluntaryExitValidity(
74
74
  return VoluntaryExitValidity.pendingWithdrawals;
75
75
  }
76
76
 
77
- if (verifySignature && !verifyVoluntaryExitSignature(epochCtx.index2pubkey, state, signedVoluntaryExit)) {
77
+ if (
78
+ verifySignature &&
79
+ !verifyVoluntaryExitSignature(state.config, epochCtx.index2pubkey, state.slot, signedVoluntaryExit)
80
+ ) {
78
81
  return VoluntaryExitValidity.invalidSignature;
79
82
  }
80
83