@lodestar/state-transition 1.40.0-dev.0ae7a89ead → 1.40.0-dev.1020f27ca9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (145) hide show
  1. package/lib/block/index.d.ts +1 -0
  2. package/lib/block/index.d.ts.map +1 -1
  3. package/lib/block/index.js +1 -0
  4. package/lib/block/index.js.map +1 -1
  5. package/lib/block/isValidIndexedAttestation.d.ts.map +1 -1
  6. package/lib/block/isValidIndexedAttestation.js +2 -2
  7. package/lib/block/isValidIndexedAttestation.js.map +1 -1
  8. package/lib/block/isValidIndexedPayloadAttestation.d.ts.map +1 -1
  9. package/lib/block/isValidIndexedPayloadAttestation.js +1 -1
  10. package/lib/block/isValidIndexedPayloadAttestation.js.map +1 -1
  11. package/lib/block/processAttestationsAltair.d.ts.map +1 -1
  12. package/lib/block/processAttestationsAltair.js +2 -2
  13. package/lib/block/processAttestationsAltair.js.map +1 -1
  14. package/lib/block/processConsolidationRequest.d.ts +1 -2
  15. package/lib/block/processConsolidationRequest.d.ts.map +1 -1
  16. package/lib/block/processConsolidationRequest.js +2 -2
  17. package/lib/block/processConsolidationRequest.js.map +1 -1
  18. package/lib/block/processDepositRequest.d.ts +8 -2
  19. package/lib/block/processDepositRequest.d.ts.map +1 -1
  20. package/lib/block/processDepositRequest.js +81 -8
  21. package/lib/block/processDepositRequest.js.map +1 -1
  22. package/lib/block/processExecutionPayloadBid.d.ts.map +1 -1
  23. package/lib/block/processExecutionPayloadBid.js +16 -29
  24. package/lib/block/processExecutionPayloadBid.js.map +1 -1
  25. package/lib/block/processExecutionPayloadEnvelope.d.ts.map +1 -1
  26. package/lib/block/processExecutionPayloadEnvelope.js +26 -25
  27. package/lib/block/processExecutionPayloadEnvelope.js.map +1 -1
  28. package/lib/block/processOperations.js +2 -2
  29. package/lib/block/processOperations.js.map +1 -1
  30. package/lib/block/processProposerSlashing.js +2 -2
  31. package/lib/block/processProposerSlashing.js.map +1 -1
  32. package/lib/block/processSyncCommittee.d.ts +1 -2
  33. package/lib/block/processSyncCommittee.d.ts.map +1 -1
  34. package/lib/block/processSyncCommittee.js +5 -5
  35. package/lib/block/processSyncCommittee.js.map +1 -1
  36. package/lib/block/processVoluntaryExit.d.ts +1 -1
  37. package/lib/block/processVoluntaryExit.d.ts.map +1 -1
  38. package/lib/block/processVoluntaryExit.js +45 -3
  39. package/lib/block/processVoluntaryExit.js.map +1 -1
  40. package/lib/block/processWithdrawalRequest.js +1 -1
  41. package/lib/block/processWithdrawalRequest.js.map +1 -1
  42. package/lib/block/processWithdrawals.d.ts +1 -0
  43. package/lib/block/processWithdrawals.d.ts.map +1 -1
  44. package/lib/block/processWithdrawals.js +121 -66
  45. package/lib/block/processWithdrawals.js.map +1 -1
  46. package/lib/epoch/processBuilderPendingPayments.d.ts.map +1 -1
  47. package/lib/epoch/processBuilderPendingPayments.js +1 -4
  48. package/lib/epoch/processBuilderPendingPayments.js.map +1 -1
  49. package/lib/signatureSets/attesterSlashings.d.ts +3 -4
  50. package/lib/signatureSets/attesterSlashings.d.ts.map +1 -1
  51. package/lib/signatureSets/attesterSlashings.js +6 -6
  52. package/lib/signatureSets/attesterSlashings.js.map +1 -1
  53. package/lib/signatureSets/blsToExecutionChange.d.ts +3 -3
  54. package/lib/signatureSets/blsToExecutionChange.d.ts.map +1 -1
  55. package/lib/signatureSets/blsToExecutionChange.js.map +1 -1
  56. package/lib/signatureSets/executionPayloadBid.d.ts +4 -0
  57. package/lib/signatureSets/executionPayloadBid.d.ts.map +1 -0
  58. package/lib/signatureSets/executionPayloadBid.js +8 -0
  59. package/lib/signatureSets/executionPayloadBid.js.map +1 -0
  60. package/lib/signatureSets/executionPayloadEnvelope.d.ts +4 -0
  61. package/lib/signatureSets/executionPayloadEnvelope.d.ts.map +1 -0
  62. package/lib/signatureSets/executionPayloadEnvelope.js +8 -0
  63. package/lib/signatureSets/executionPayloadEnvelope.js.map +1 -0
  64. package/lib/signatureSets/index.d.ts +3 -2
  65. package/lib/signatureSets/index.d.ts.map +1 -1
  66. package/lib/signatureSets/index.js +10 -8
  67. package/lib/signatureSets/index.js.map +1 -1
  68. package/lib/signatureSets/indexedAttestation.d.ts +3 -4
  69. package/lib/signatureSets/indexedAttestation.d.ts.map +1 -1
  70. package/lib/signatureSets/indexedAttestation.js +6 -6
  71. package/lib/signatureSets/indexedAttestation.js.map +1 -1
  72. package/lib/signatureSets/indexedPayloadAttestation.d.ts +5 -4
  73. package/lib/signatureSets/indexedPayloadAttestation.d.ts.map +1 -1
  74. package/lib/signatureSets/indexedPayloadAttestation.js +3 -3
  75. package/lib/signatureSets/indexedPayloadAttestation.js.map +1 -1
  76. package/lib/signatureSets/proposer.d.ts +3 -3
  77. package/lib/signatureSets/proposer.d.ts.map +1 -1
  78. package/lib/signatureSets/proposer.js +12 -12
  79. package/lib/signatureSets/proposer.js.map +1 -1
  80. package/lib/signatureSets/proposerSlashings.d.ts +2 -3
  81. package/lib/signatureSets/proposerSlashings.d.ts.map +1 -1
  82. package/lib/signatureSets/proposerSlashings.js +6 -6
  83. package/lib/signatureSets/proposerSlashings.js.map +1 -1
  84. package/lib/signatureSets/randao.d.ts +1 -1
  85. package/lib/signatureSets/randao.d.ts.map +1 -1
  86. package/lib/signatureSets/randao.js +4 -4
  87. package/lib/signatureSets/randao.js.map +1 -1
  88. package/lib/signatureSets/voluntaryExits.d.ts +2 -2
  89. package/lib/signatureSets/voluntaryExits.d.ts.map +1 -1
  90. package/lib/signatureSets/voluntaryExits.js +6 -6
  91. package/lib/signatureSets/voluntaryExits.js.map +1 -1
  92. package/lib/util/electra.d.ts.map +1 -1
  93. package/lib/util/electra.js +1 -2
  94. package/lib/util/electra.js.map +1 -1
  95. package/lib/util/gloas.d.ts +46 -5
  96. package/lib/util/gloas.d.ts.map +1 -1
  97. package/lib/util/gloas.js +91 -5
  98. package/lib/util/gloas.js.map +1 -1
  99. package/lib/util/index.d.ts +1 -0
  100. package/lib/util/index.d.ts.map +1 -1
  101. package/lib/util/index.js +1 -0
  102. package/lib/util/index.js.map +1 -1
  103. package/lib/util/interop.js +1 -1
  104. package/lib/util/interop.js.map +1 -1
  105. package/lib/util/signatureSets.d.ts +38 -5
  106. package/lib/util/signatureSets.d.ts.map +1 -1
  107. package/lib/util/signatureSets.js +48 -6
  108. package/lib/util/signatureSets.js.map +1 -1
  109. package/lib/util/validator.d.ts +6 -1
  110. package/lib/util/validator.d.ts.map +1 -1
  111. package/lib/util/validator.js +26 -16
  112. package/lib/util/validator.js.map +1 -1
  113. package/package.json +8 -8
  114. package/src/block/index.ts +1 -0
  115. package/src/block/isValidIndexedAttestation.ts +3 -2
  116. package/src/block/isValidIndexedPayloadAttestation.ts +4 -1
  117. package/src/block/processAttestationsAltair.ts +2 -8
  118. package/src/block/processConsolidationRequest.ts +2 -3
  119. package/src/block/processDepositRequest.ts +101 -8
  120. package/src/block/processExecutionPayloadBid.ts +20 -42
  121. package/src/block/processExecutionPayloadEnvelope.ts +34 -30
  122. package/src/block/processOperations.ts +2 -2
  123. package/src/block/processProposerSlashing.ts +2 -2
  124. package/src/block/processSyncCommittee.ts +3 -6
  125. package/src/block/processVoluntaryExit.ts +60 -5
  126. package/src/block/processWithdrawalRequest.ts +1 -1
  127. package/src/block/processWithdrawals.ts +168 -70
  128. package/src/epoch/processBuilderPendingPayments.ts +1 -5
  129. package/src/signatureSets/attesterSlashings.ts +3 -7
  130. package/src/signatureSets/blsToExecutionChange.ts +3 -3
  131. package/src/signatureSets/executionPayloadBid.ts +14 -0
  132. package/src/signatureSets/executionPayloadEnvelope.ts +13 -0
  133. package/src/signatureSets/index.ts +8 -9
  134. package/src/signatureSets/indexedAttestation.ts +2 -7
  135. package/src/signatureSets/indexedPayloadAttestation.ts +9 -7
  136. package/src/signatureSets/proposer.ts +8 -12
  137. package/src/signatureSets/proposerSlashings.ts +4 -7
  138. package/src/signatureSets/randao.ts +4 -8
  139. package/src/signatureSets/voluntaryExits.ts +5 -10
  140. package/src/util/electra.ts +1 -4
  141. package/src/util/gloas.ts +116 -10
  142. package/src/util/index.ts +1 -0
  143. package/src/util/interop.ts +1 -1
  144. package/src/util/signatureSets.ts +84 -8
  145. package/src/util/validator.ts +31 -16
@@ -1,21 +1,114 @@
1
- import {UNSET_DEPOSIT_REQUESTS_START_INDEX} from "@lodestar/params";
2
- import {electra, ssz} from "@lodestar/types";
1
+ import {FAR_FUTURE_EPOCH, ForkSeq, UNSET_DEPOSIT_REQUESTS_START_INDEX} from "@lodestar/params";
2
+ import {BLSPubkey, Bytes32, UintNum64, electra, ssz} from "@lodestar/types";
3
3
  import {CachedBeaconStateElectra, CachedBeaconStateGloas} from "../types.js";
4
+ import {findBuilderIndexByPubkey, isBuilderWithdrawalCredential} from "../util/gloas.js";
5
+ import {computeEpochAtSlot, isValidatorKnown} from "../util/index.js";
6
+ import {isValidDepositSignature} from "./processDeposit.js";
7
+
8
+ /**
9
+ * Apply a deposit for a builder. Either increases balance for existing builder or adds new builder to registry.
10
+ * Spec: https://github.com/ethereum/consensus-specs/blob/v1.7.0-alpha.1/specs/gloas/beacon-chain.md#new-apply_deposit_for_builder
11
+ */
12
+ export function applyDepositForBuilder(
13
+ state: CachedBeaconStateGloas,
14
+ pubkey: BLSPubkey,
15
+ withdrawalCredentials: Bytes32,
16
+ amount: UintNum64,
17
+ signature: Bytes32
18
+ ): void {
19
+ const builderIndex = findBuilderIndexByPubkey(state, pubkey);
20
+
21
+ if (builderIndex !== null) {
22
+ // Existing builder - increase balance
23
+ const builder = state.builders.get(builderIndex);
24
+ builder.balance += amount;
25
+ } else {
26
+ // New builder - verify signature and add to registry
27
+ if (isValidDepositSignature(state.config, pubkey, withdrawalCredentials, amount, signature)) {
28
+ addBuilderToRegistry(state, pubkey, withdrawalCredentials, amount);
29
+ }
30
+ }
31
+ }
32
+
33
+ /**
34
+ * Add a new builder to the builders registry.
35
+ * Reuses slots from exited and fully withdrawn builders if available.
36
+ */
37
+ function addBuilderToRegistry(
38
+ state: CachedBeaconStateGloas,
39
+ pubkey: BLSPubkey,
40
+ withdrawalCredentials: Bytes32,
41
+ amount: UintNum64
42
+ ): void {
43
+ const currentEpoch = computeEpochAtSlot(state.slot);
44
+
45
+ // Try to find a reusable slot from an exited builder with zero balance
46
+ let builderIndex = state.builders.length;
47
+ for (let i = 0; i < state.builders.length; i++) {
48
+ const builder = state.builders.getReadonly(i);
49
+ if (builder.withdrawableEpoch <= currentEpoch && builder.balance === 0) {
50
+ builderIndex = i;
51
+ break;
52
+ }
53
+ }
54
+
55
+ // Create new builder
56
+ const newBuilder = ssz.gloas.Builder.toViewDU({
57
+ pubkey,
58
+ version: withdrawalCredentials[0],
59
+ executionAddress: withdrawalCredentials.subarray(12),
60
+ balance: amount,
61
+ depositEpoch: currentEpoch,
62
+ withdrawableEpoch: FAR_FUTURE_EPOCH,
63
+ });
64
+
65
+ if (builderIndex < state.builders.length) {
66
+ // Reuse existing slot
67
+ state.builders.set(builderIndex, newBuilder);
68
+ } else {
69
+ // Append to end
70
+ state.builders.push(newBuilder);
71
+ }
72
+ }
4
73
 
5
74
  export function processDepositRequest(
75
+ fork: ForkSeq,
6
76
  state: CachedBeaconStateElectra | CachedBeaconStateGloas,
7
77
  depositRequest: electra.DepositRequest
8
78
  ): void {
9
- if (state.depositRequestsStartIndex === UNSET_DEPOSIT_REQUESTS_START_INDEX) {
79
+ const {pubkey, withdrawalCredentials, amount, signature} = depositRequest;
80
+
81
+ // Check if this is a builder or validator deposit
82
+ if (fork >= ForkSeq.gloas) {
83
+ const stateGloas = state as CachedBeaconStateGloas;
84
+ const builderIndex = findBuilderIndexByPubkey(stateGloas, pubkey);
85
+ const validatorIndex = state.epochCtx.getValidatorIndex(pubkey);
86
+
87
+ // Regardless of the withdrawal credentials prefix, if a builder/validator
88
+ // already exists with this pubkey, apply the deposit to their balance
89
+ const isBuilder = builderIndex !== null;
90
+ const isValidator = isValidatorKnown(state, validatorIndex);
91
+ const isBuilderPrefix = isBuilderWithdrawalCredential(withdrawalCredentials);
92
+
93
+ // Route to builder if it's an existing builder OR has builder prefix and is not a validator
94
+ if (isBuilder || (isBuilderPrefix && !isValidator)) {
95
+ // Apply builder deposits immediately
96
+ applyDepositForBuilder(stateGloas, pubkey, withdrawalCredentials, amount, signature);
97
+ return;
98
+ }
99
+ }
100
+
101
+ // Only set deposit_requests_start_index in Electra fork, not Gloas
102
+ if (fork < ForkSeq.gloas && state.depositRequestsStartIndex === UNSET_DEPOSIT_REQUESTS_START_INDEX) {
10
103
  state.depositRequestsStartIndex = depositRequest.index;
11
104
  }
12
105
 
13
- // Create pending deposit
106
+ // Add validator deposits to the queue
14
107
  const pendingDeposit = ssz.electra.PendingDeposit.toViewDU({
15
- pubkey: depositRequest.pubkey,
16
- withdrawalCredentials: depositRequest.withdrawalCredentials,
17
- amount: depositRequest.amount,
18
- signature: depositRequest.signature,
108
+ pubkey,
109
+ withdrawalCredentials,
110
+ amount,
111
+ signature,
19
112
  slot: state.slot,
20
113
  });
21
114
  state.pendingDeposits.push(pendingDeposit);
@@ -1,68 +1,48 @@
1
1
  import {PublicKey, Signature, verify} from "@chainsafe/blst";
2
2
  import {byteArrayEquals} from "@chainsafe/ssz";
3
- import {
4
- DOMAIN_BEACON_BUILDER,
5
- FAR_FUTURE_EPOCH,
6
- ForkPostGloas,
7
- MIN_ACTIVATION_BALANCE,
8
- SLOTS_PER_EPOCH,
9
- } from "@lodestar/params";
3
+ import {BUILDER_INDEX_SELF_BUILD, ForkPostGloas, SLOTS_PER_EPOCH} from "@lodestar/params";
10
4
  import {BeaconBlock, gloas, ssz} from "@lodestar/types";
11
5
  import {toHex, toRootHex} from "@lodestar/utils";
12
6
  import {G2_POINT_AT_INFINITY} from "../constants/constants.ts";
7
+ import {getExecutionPayloadBidSigningRoot} from "../signatureSets/executionPayloadBid.js";
13
8
  import {CachedBeaconStateGloas} from "../types.ts";
14
- import {hasBuilderWithdrawalCredential} from "../util/gloas.ts";
15
- import {computeSigningRoot, getCurrentEpoch, getRandaoMix, isActiveValidator} from "../util/index.ts";
9
+ import {canBuilderCoverBid, isActiveBuilder} from "../util/gloas.ts";
10
+ import {getCurrentEpoch, getRandaoMix} from "../util/index.ts";
16
11
 
17
12
  export function processExecutionPayloadBid(state: CachedBeaconStateGloas, block: BeaconBlock<ForkPostGloas>): void {
18
13
  const signedBid = block.body.signedExecutionPayloadBid;
19
14
  const bid = signedBid.message;
20
15
  const {builderIndex, value: amount} = bid;
21
- const builder = state.validators.getReadonly(builderIndex);
22
16
 
23
17
  // For self-builds, amount must be zero regardless of withdrawal credential prefix
24
- if (builderIndex === block.proposerIndex) {
18
+ if (builderIndex === BUILDER_INDEX_SELF_BUILD) {
25
19
  if (amount !== 0) {
26
20
  throw Error(`Invalid execution payload bid: self-build with non-zero amount ${amount}`);
27
21
  }
28
22
  if (!byteArrayEquals(signedBid.signature, G2_POINT_AT_INFINITY)) {
29
23
  throw Error("Invalid execution payload bid: self-build with non-zero signature");
30
24
  }
31
- // Non-self builds require builder withdrawal credential
32
- } else {
33
- if (!hasBuilderWithdrawalCredential(builder.withdrawalCredentials)) {
34
- throw Error(`Invalid execution payload bid: builder ${builderIndex} does not have builder withdrawal credential`);
25
+ }
26
+ // Non-self builds require active builder with valid signature
27
+ else {
28
+ const builder = state.builders.getReadonly(builderIndex);
29
+
30
+ // Verify that the builder is active
31
+ if (!isActiveBuilder(builder, state.finalizedCheckpoint.epoch)) {
32
+ throw Error(`Invalid execution payload bid: builder ${builderIndex} is not active`);
33
+ }
34
+
35
+ // Verify that the builder has funds to cover the bid
36
+ if (!canBuilderCoverBid(state, builderIndex, amount)) {
37
+ throw Error(`Invalid execution payload bid: builder ${builderIndex} has insufficient balance`);
35
38
  }
36
39
 
40
+ // Verify that the bid signature is valid
37
41
  if (!verifyExecutionPayloadBidSignature(state, builder.pubkey, signedBid)) {
38
42
  throw Error(`Invalid execution payload bid: invalid signature for builder ${builderIndex}`);
39
43
  }
40
44
  }
41
45
 
42
- if (!isActiveValidator(builder, getCurrentEpoch(state))) {
43
- throw Error(`Invalid execution payload bid: builder ${builderIndex} is not active`);
44
- }
45
-
46
- if (builder.slashed) {
47
- throw Error(`Invalid execution payload bid: builder ${builderIndex} is slashed`);
48
- }
49
-
50
- const pendingPayments = state.builderPendingPayments
51
- .getAllReadonly()
52
- .filter((payment) => payment.withdrawal.builderIndex === builderIndex)
53
- .reduce((acc, payment) => acc + payment.withdrawal.amount, 0);
54
- const pendingWithdrawals = state.builderPendingWithdrawals
55
- .getAllReadonly()
56
- .filter((withdrawal) => withdrawal.builderIndex === builderIndex)
57
- .reduce((acc, withdrawal) => acc + withdrawal.amount, 0);
58
-
59
- if (
60
- amount !== 0 &&
61
- state.balances.get(builderIndex) < amount + pendingPayments + pendingWithdrawals + MIN_ACTIVATION_BALANCE
62
- ) {
63
- throw Error("Insufficient builder balance");
64
- }
65
-
66
46
  if (bid.slot !== block.slot) {
67
47
  throw Error(`Bid slot ${bid.slot} does not match block slot ${block.slot}`);
68
48
  }
@@ -91,7 +71,6 @@ export function processExecutionPayloadBid(state: CachedBeaconStateGloas, block:
91
71
  feeRecipient: bid.feeRecipient,
92
72
  amount,
93
73
  builderIndex,
94
- withdrawableEpoch: FAR_FUTURE_EPOCH,
95
74
  }),
96
75
  });
97
76
 
@@ -106,8 +85,7 @@ function verifyExecutionPayloadBidSignature(
106
85
  pubkey: Uint8Array,
107
86
  signedBid: gloas.SignedExecutionPayloadBid
108
87
  ): boolean {
109
- const domain = state.config.getDomain(state.slot, DOMAIN_BEACON_BUILDER);
110
- const signingRoot = computeSigningRoot(ssz.gloas.ExecutionPayloadBid, signedBid.message, domain);
88
+ const signingRoot = getExecutionPayloadBidSigningRoot(state.config, state.slot, signedBid.message);
111
89
 
112
90
  try {
113
91
  const publicKey = PublicKey.fromBytes(pubkey);
@@ -1,10 +1,15 @@
1
1
  import {PublicKey, Signature, verify} from "@chainsafe/blst";
2
2
  import {byteArrayEquals} from "@chainsafe/ssz";
3
- import {DOMAIN_BEACON_BUILDER, SLOTS_PER_EPOCH, SLOTS_PER_HISTORICAL_ROOT} from "@lodestar/params";
3
+ import {
4
+ BUILDER_INDEX_SELF_BUILD,
5
+ DOMAIN_BEACON_BUILDER,
6
+ SLOTS_PER_EPOCH,
7
+ SLOTS_PER_HISTORICAL_ROOT,
8
+ } from "@lodestar/params";
4
9
  import {gloas, ssz} from "@lodestar/types";
5
10
  import {toHex, toRootHex} from "@lodestar/utils";
6
11
  import {CachedBeaconStateGloas} from "../types.ts";
7
- import {computeExitEpochAndUpdateChurn, computeSigningRoot, computeTimeAtSlot} from "../util/index.ts";
12
+ import {computeSigningRoot, computeTimeAtSlot} from "../util/index.ts";
8
13
  import {processConsolidationRequest} from "./processConsolidationRequest.ts";
9
14
  import {processDepositRequest} from "./processDepositRequest.ts";
10
15
  import {processWithdrawalRequest} from "./processWithdrawalRequest.ts";
@@ -19,13 +24,8 @@ export function processExecutionPayloadEnvelope(
19
24
  const payload = envelope.payload;
20
25
  const fork = state.config.getForkSeq(envelope.slot);
21
26
 
22
- if (verify) {
23
- const builderIndex = envelope.builderIndex;
24
- const pubkey = state.validators.getReadonly(builderIndex).pubkey;
25
-
26
- if (!verifyExecutionPayloadEnvelopeSignature(state, pubkey, signedEnvelope)) {
27
- throw new Error("Payload Envelope has invalid signature");
28
- }
27
+ if (verify && !verifyExecutionPayloadEnvelopeSignature(state, signedEnvelope)) {
28
+ throw Error(`Execution payload envelope has invalid signature builderIndex=${envelope.builderIndex}`);
29
29
  }
30
30
 
31
31
  validateExecutionPayloadEnvelope(state, envelope);
@@ -33,7 +33,7 @@ export function processExecutionPayloadEnvelope(
33
33
  const requests = envelope.executionRequests;
34
34
 
35
35
  for (const deposit of requests.deposits) {
36
- processDepositRequest(state, deposit);
36
+ processDepositRequest(fork, state, deposit);
37
37
  }
38
38
 
39
39
  for (const withdrawal of requests.withdrawals) {
@@ -41,7 +41,7 @@ export function processExecutionPayloadEnvelope(
41
41
  }
42
42
 
43
43
  for (const consolidation of requests.consolidations) {
44
- processConsolidationRequest(fork, state, consolidation);
44
+ processConsolidationRequest(state, consolidation);
45
45
  }
46
46
 
47
47
  // Queue the builder payment
@@ -50,9 +50,6 @@ export function processExecutionPayloadEnvelope(
50
50
  const amount = payment.withdrawal.amount;
51
51
 
52
52
  if (amount > 0) {
53
- const exitQueueEpoch = computeExitEpochAndUpdateChurn(state, BigInt(amount));
54
-
55
- payment.withdrawal.withdrawableEpoch = exitQueueEpoch + state.config.MIN_VALIDATOR_WITHDRAWABILITY_DELAY;
56
53
  state.builderPendingWithdrawals.push(payment.withdrawal);
57
54
  }
58
55
 
@@ -75,6 +72,7 @@ function validateExecutionPayloadEnvelope(
75
72
  ): void {
76
73
  const payload = envelope.payload;
77
74
 
75
+ // Cache latest block header state root
78
76
  if (byteArrayEquals(state.latestBlockHeader.stateRoot, ssz.Root.defaultValue())) {
79
77
  const previousStateRoot = state.hashTreeRoot();
80
78
  state.latestBlockHeader.stateRoot = previousStateRoot;
@@ -87,20 +85,18 @@ function validateExecutionPayloadEnvelope(
87
85
  );
88
86
  }
89
87
 
90
- // Verify consistency with the beacon block
91
88
  if (envelope.slot !== state.slot) {
92
89
  throw new Error(`Slot mismatch between envelope and state envelope=${envelope.slot} state=${state.slot}`);
93
90
  }
94
91
 
95
- const committedBid = state.latestExecutionPayloadBid;
96
92
  // Verify consistency with the committed bid
93
+ const committedBid = state.latestExecutionPayloadBid;
97
94
  if (envelope.builderIndex !== committedBid.builderIndex) {
98
95
  throw new Error(
99
96
  `Builder index mismatch between envelope and committed bid envelope=${envelope.builderIndex} committedBid=${committedBid.builderIndex}`
100
97
  );
101
98
  }
102
99
 
103
- // Verify consistency with the committed bid
104
100
  const envelopeKzgRoot = ssz.deneb.BlobKzgCommitments.hashTreeRoot(envelope.blobKzgCommitments);
105
101
  if (!byteArrayEquals(committedBid.blobKzgCommitmentsRoot, envelopeKzgRoot)) {
106
102
  throw new Error(
@@ -108,11 +104,18 @@ function validateExecutionPayloadEnvelope(
108
104
  );
109
105
  }
110
106
 
111
- // Verify the withdrawals root
112
- const envelopeWithdrawalsRoot = ssz.capella.Withdrawals.hashTreeRoot(envelope.payload.withdrawals);
113
- if (!byteArrayEquals(state.latestWithdrawalsRoot, envelopeWithdrawalsRoot)) {
107
+ if (!byteArrayEquals(committedBid.prevRandao, payload.prevRandao)) {
108
+ throw new Error(
109
+ `Prev randao mismatch between committed bid and payload committedBid=${toHex(committedBid.prevRandao)} payload=${toHex(payload.prevRandao)}`
110
+ );
111
+ }
112
+
113
+ // Verify consistency with expected withdrawals
114
+ const payloadWithdrawalsRoot = ssz.capella.Withdrawals.hashTreeRoot(payload.withdrawals);
115
+ const expectedWithdrawalsRoot = state.payloadExpectedWithdrawals.hashTreeRoot();
116
+ if (!byteArrayEquals(payloadWithdrawalsRoot, expectedWithdrawalsRoot)) {
114
117
  throw new Error(
115
- `Withdrawals root mismatch between envelope and latest withdrawals root envelope=${toRootHex(envelopeWithdrawalsRoot)} latestWithdrawalRoot=${toRootHex(state.latestWithdrawalsRoot)}`
118
+ `Withdrawals mismatch between payload and expected withdrawals payload=${toRootHex(payloadWithdrawalsRoot)} expected=${toRootHex(expectedWithdrawalsRoot)}`
116
119
  );
117
120
  }
118
121
 
@@ -137,13 +140,6 @@ function validateExecutionPayloadEnvelope(
137
140
  );
138
141
  }
139
142
 
140
- // Verify prev_randao matches committed bid
141
- if (!byteArrayEquals(committedBid.prevRandao, payload.prevRandao)) {
142
- throw new Error(
143
- `Prev randao mismatch between committed bid and payload committedBid=${toHex(committedBid.prevRandao)} payload=${toHex(payload.prevRandao)}`
144
- );
145
- }
146
-
147
143
  // Verify timestamp
148
144
  if (payload.timestamp !== computeTimeAtSlot(state.config, state.slot, state.genesisTime)) {
149
145
  throw new Error(
@@ -164,14 +160,22 @@ function validateExecutionPayloadEnvelope(
164
160
 
165
161
  function verifyExecutionPayloadEnvelopeSignature(
166
162
  state: CachedBeaconStateGloas,
167
- pubkey: Uint8Array,
168
163
  signedEnvelope: gloas.SignedExecutionPayloadEnvelope
169
164
  ): boolean {
165
+ const builderIndex = signedEnvelope.message.builderIndex;
166
+
170
167
  const domain = state.config.getDomain(state.slot, DOMAIN_BEACON_BUILDER);
171
168
  const signingRoot = computeSigningRoot(ssz.gloas.ExecutionPayloadEnvelope, signedEnvelope.message, domain);
172
169
 
173
170
  try {
174
- const publicKey = PublicKey.fromBytes(pubkey);
171
+ let publicKey: PublicKey;
172
+
173
+ if (builderIndex === BUILDER_INDEX_SELF_BUILD) {
174
+ const validatorIndex = state.latestBlockHeader.proposerIndex;
175
+ publicKey = state.epochCtx.index2pubkey[validatorIndex];
176
+ } else {
177
+ publicKey = PublicKey.fromBytes(state.builders.getReadonly(builderIndex).pubkey);
178
+ }
175
179
  const signature = Signature.fromBytes(signedEnvelope.signature, true);
176
180
 
177
181
  return verify(signingRoot, publicKey, signature);
@@ -75,7 +75,7 @@ export function processOperations(
75
75
  const bodyElectra = body as electra.BeaconBlockBody;
76
76
 
77
77
  for (const depositRequest of bodyElectra.executionRequests.deposits) {
78
- processDepositRequest(stateElectra, depositRequest);
78
+ processDepositRequest(fork, stateElectra, depositRequest);
79
79
  }
80
80
 
81
81
  for (const elWithdrawalRequest of bodyElectra.executionRequests.withdrawals) {
@@ -83,7 +83,7 @@ export function processOperations(
83
83
  }
84
84
 
85
85
  for (const elConsolidationRequest of bodyElectra.executionRequests.consolidations) {
86
- processConsolidationRequest(fork, stateElectra, elConsolidationRequest);
86
+ processConsolidationRequest(stateElectra, elConsolidationRequest);
87
87
  }
88
88
  }
89
89
 
@@ -92,9 +92,9 @@ export function assertValidProposerSlashing(
92
92
 
93
93
  // verify signatures
94
94
  if (verifySignatures) {
95
- const signatureSets = getProposerSlashingSignatureSets(config, index2pubkey, stateSlot, proposerSlashing);
95
+ const signatureSets = getProposerSlashingSignatureSets(config, stateSlot, proposerSlashing);
96
96
  for (let i = 0; i < signatureSets.length; i++) {
97
- if (!verifySignatureSet(signatureSets[i])) {
97
+ if (!verifySignatureSet(signatureSets[i], index2pubkey)) {
98
98
  throw new Error(`ProposerSlashing header${i + 1} signature invalid`);
99
99
  }
100
100
  }
@@ -2,7 +2,6 @@ import {byteArrayEquals} from "@chainsafe/ssz";
2
2
  import {BeaconConfig} from "@lodestar/config";
3
3
  import {DOMAIN_SYNC_COMMITTEE, SYNC_COMMITTEE_SIZE} from "@lodestar/params";
4
4
  import {altair, ssz} from "@lodestar/types";
5
- import {Index2PubkeyCache} from "../cache/pubkeyCache.js";
6
5
  import {SyncCommitteeCache} from "../cache/syncCommitteeCache.js";
7
6
  import {G2_POINT_AT_INFINITY} from "../constants/index.js";
8
7
  import {CachedBeaconStateAllForks} from "../types.js";
@@ -28,13 +27,12 @@ export function processSyncAggregate(
28
27
  const participantIndices = block.body.syncAggregate.syncCommitteeBits.intersectValues(committeeIndices);
29
28
  const signatureSet = getSyncCommitteeSignatureSet(
30
29
  state.config,
31
- state.epochCtx.index2pubkey,
32
30
  state.epochCtx.currentSyncCommitteeIndexed,
33
31
  block,
34
32
  participantIndices
35
33
  );
36
- // When there's no participation we consider the signature valid and just ignore i
37
- if (signatureSet !== null && !verifySignatureSet(signatureSet)) {
34
+ // When there's no participation we consider the signature valid and just ignore it
35
+ if (signatureSet !== null && !verifySignatureSet(signatureSet, state.epochCtx.index2pubkey)) {
38
36
  throw Error("Sync committee signature invalid");
39
37
  }
40
38
  }
@@ -73,7 +71,6 @@ export function processSyncAggregate(
73
71
 
74
72
  export function getSyncCommitteeSignatureSet(
75
73
  config: BeaconConfig,
76
- index2pubkey: Index2PubkeyCache,
77
74
  currentSyncCommitteeIndexed: SyncCommitteeCache,
78
75
  block: altair.BeaconBlock,
79
76
  /** Optional parameter to prevent computing it twice */
@@ -122,7 +119,7 @@ export function getSyncCommitteeSignatureSet(
122
119
 
123
120
  return {
124
121
  type: SignatureSetType.aggregate,
125
- pubkeys: participantIndices.map((i) => index2pubkey[i]),
122
+ indices: participantIndices,
126
123
  signingRoot: computeSigningRoot(ssz.Root, rootSigned, domain),
127
124
  signature,
128
125
  };
@@ -1,8 +1,16 @@
1
+ import {PublicKey, Signature, verify} from "@chainsafe/blst";
1
2
  import {FAR_FUTURE_EPOCH, ForkSeq} from "@lodestar/params";
2
- import {phase0} from "@lodestar/types";
3
+ import {phase0, ssz} from "@lodestar/types";
3
4
  import {verifyVoluntaryExitSignature} from "../signatureSets/index.js";
4
- import {CachedBeaconStateAllForks, CachedBeaconStateElectra} from "../types.js";
5
- import {getPendingBalanceToWithdraw, isActiveValidator} from "../util/index.js";
5
+ import {CachedBeaconStateAllForks, CachedBeaconStateElectra, CachedBeaconStateGloas} from "../types.js";
6
+ import {
7
+ convertValidatorIndexToBuilderIndex,
8
+ getPendingBalanceToWithdrawForBuilder,
9
+ initiateBuilderExit,
10
+ isActiveBuilder,
11
+ isBuilderIndex,
12
+ } from "../util/gloas.js";
13
+ import {computeSigningRoot, getCurrentEpoch, getPendingBalanceToWithdraw, isActiveValidator} from "../util/index.js";
6
14
  import {initiateValidatorExit} from "./index.js";
7
15
 
8
16
  export enum VoluntaryExitValidity {
@@ -16,7 +24,7 @@ export enum VoluntaryExitValidity {
16
24
  }
17
25
 
18
26
  /**
19
- * Process a VoluntaryExit operation. Initiates the exit of a validator.
27
+ * Process a VoluntaryExit operation. Initiates the exit of a validator or builder.
20
28
  *
21
29
  * PERF: Work depends on number of VoluntaryExit per block. On regular networks the average is 0 / block.
22
30
  */
@@ -26,6 +34,53 @@ export function processVoluntaryExit(
26
34
  signedVoluntaryExit: phase0.SignedVoluntaryExit,
27
35
  verifySignature = true
28
36
  ): void {
37
+ const voluntaryExit = signedVoluntaryExit.message;
38
+ const currentEpoch = getCurrentEpoch(state);
39
+
40
+ // Exits must specify an epoch when they become valid; they are not valid before then
41
+ if (currentEpoch < voluntaryExit.epoch) {
42
+ throw Error(`Voluntary exit epoch ${voluntaryExit.epoch} is after current epoch ${currentEpoch}`);
43
+ }
44
+
45
+ // Check if this is a builder exit
46
+ if (fork >= ForkSeq.gloas && isBuilderIndex(voluntaryExit.validatorIndex)) {
47
+ const stateGloas = state as CachedBeaconStateGloas;
48
+ const builderIndex = convertValidatorIndexToBuilderIndex(voluntaryExit.validatorIndex);
49
+ const builder = stateGloas.builders.getReadonly(builderIndex);
50
+
51
+ // Verify the builder is active
52
+ if (!isActiveBuilder(builder, state.finalizedCheckpoint.epoch)) {
53
+ throw Error(`Builder ${builderIndex} is not active`);
54
+ }
55
+
56
+ // Only exit builder if it has no pending withdrawals in the queue
57
+ if (getPendingBalanceToWithdrawForBuilder(stateGloas, builderIndex) !== 0) {
58
+ throw Error(`Builder ${builderIndex} has pending withdrawals`);
59
+ }
60
+
61
+ // Verify signature
62
+ if (verifySignature) {
63
+ const domain = state.config.getDomainForVoluntaryExit(state.slot);
64
+ const signingRoot = computeSigningRoot(ssz.phase0.VoluntaryExit, voluntaryExit, domain);
65
+
66
+ try {
67
+ const publicKey = PublicKey.fromBytes(builder.pubkey);
68
+ const signature = Signature.fromBytes(signedVoluntaryExit.signature, true);
69
+
70
+ if (!verify(signingRoot, publicKey, signature)) {
71
+ throw Error("BLS verify failed");
72
+ }
73
+ } catch (e) {
74
+ throw Error(`Builder ${builderIndex} invalid exit signature reason=${(e as Error).message}`);
75
+ }
76
+ }
77
+
78
+ // Initiate builder exit
79
+ initiateBuilderExit(stateGloas, builderIndex);
80
+ return;
81
+ }
82
+
83
+ // Handle validator exit
29
84
  const validity = getVoluntaryExitValidity(fork, state, signedVoluntaryExit, verifySignature);
30
85
  if (validity !== VoluntaryExitValidity.valid) {
31
86
  throw Error(`Invalid voluntary exit at forkSeq=${fork} reason=${validity}`);
@@ -69,7 +124,7 @@ export function getVoluntaryExitValidity(
69
124
  // only exit validator if it has no pending withdrawals in the queue
70
125
  if (
71
126
  fork >= ForkSeq.electra &&
72
- getPendingBalanceToWithdraw(fork, state as CachedBeaconStateElectra, voluntaryExit.validatorIndex) !== 0
127
+ getPendingBalanceToWithdraw(state as CachedBeaconStateElectra, voluntaryExit.validatorIndex) !== 0
73
128
  ) {
74
129
  return VoluntaryExitValidity.pendingWithdrawals;
75
130
  }
@@ -42,7 +42,7 @@ export function processWithdrawalRequest(
42
42
  }
43
43
 
44
44
  // TODO Electra: Consider caching pendingPartialWithdrawals
45
- const pendingBalanceToWithdraw = getPendingBalanceToWithdraw(fork, state, validatorIndex);
45
+ const pendingBalanceToWithdraw = getPendingBalanceToWithdraw(state, validatorIndex);
46
46
  const validatorBalance = state.balances.get(validatorIndex);
47
47
 
48
48
  if (isFullExitRequest) {