-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Attestation Using Head State instead of Latest State #2156
Changes from all commits
3894f66
7c2ed1d
364ad5d
7dd53e6
68b317c
e12b62f
2d1f619
903efa9
8b06e88
c191e8b
8f3d3fa
5ad0409
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -46,22 +46,26 @@ func (as *AttesterServer) AttestationDataAtSlot(ctx context.Context, req *pb.Att | |
if err != nil { | ||
return nil, fmt.Errorf("failed to retrieve chain head: %v", err) | ||
} | ||
blockRoot, err := hashutil.HashBeaconBlock(head) | ||
headRoot, err := hashutil.HashBeaconBlock(head) | ||
if err != nil { | ||
return nil, fmt.Errorf("could not tree hash beacon block: %v", err) | ||
} | ||
beaconState, err := as.beaconDB.State(ctx) | ||
|
||
// Let head state be the state of head block processed through empty slots up to assigned slot. | ||
headState, err := as.beaconDB.HeadState(ctx) | ||
if err != nil { | ||
return nil, fmt.Errorf("could not fetch beacon state: %v", err) | ||
return nil, fmt.Errorf("could not fetch head state: %v", err) | ||
} | ||
for beaconState.Slot < req.Slot { | ||
beaconState, err = state.ExecuteStateTransition( | ||
ctx, beaconState, nil /* block */, blockRoot, state.DefaultConfig(), | ||
|
||
for headState.Slot < req.Slot { | ||
headState, err = state.ExecuteStateTransition( | ||
ctx, headState, nil /* block */, headRoot, state.DefaultConfig(), | ||
) | ||
if err != nil { | ||
return nil, fmt.Errorf("could not execute head transition: %v", err) | ||
} | ||
} | ||
|
||
// Fetch the epoch boundary root = hash_tree_root(epoch_boundary) | ||
// where epoch_boundary is the block at the most recent epoch boundary in the | ||
// chain defined by head -- i.e. the BeaconBlock where block.slot == get_epoch_start_slot(head.slot). | ||
|
@@ -70,15 +74,12 @@ func (as *AttesterServer) AttestationDataAtSlot(ctx context.Context, req *pb.Att | |
epochBoundaryRoot := make([]byte, 32) | ||
epochStartSlot := helpers.StartSlot(helpers.SlotToEpoch(head.Slot)) | ||
if epochStartSlot == head.Slot { | ||
hash, err := hashutil.HashBeaconBlock(head) | ||
if err != nil { | ||
return nil, fmt.Errorf("could not tree hash head block: %v", err) | ||
} | ||
epochBoundaryRoot = hash[:] | ||
epochBoundaryRoot = headRoot[:] | ||
} else { | ||
epochBoundaryRoot, err = blocks.BlockRoot(beaconState, epochStartSlot) | ||
epochBoundaryRoot, err = blocks.BlockRoot(headState, epochStartSlot) | ||
if err != nil { | ||
return nil, fmt.Errorf("could not get epoch boundary block: %v", err) | ||
return nil, fmt.Errorf("could not get epoch boundary block for slot %d: %v", | ||
epochStartSlot, err) | ||
} | ||
} | ||
// epoch_start_slot = get_epoch_start_slot(slot_to_epoch(head.slot)) | ||
|
@@ -87,15 +88,12 @@ func (as *AttesterServer) AttestationDataAtSlot(ctx context.Context, req *pb.Att | |
// On the server side, this is fetched by calling get_block_root(state, justified_epoch). | ||
// If the last justified boundary slot is the same as state current slot (ex: slot 0), | ||
// we set justified block root to an empty root. | ||
lastJustifiedSlot := helpers.StartSlot(beaconState.JustifiedEpoch) | ||
lastJustifiedSlot := helpers.StartSlot(headState.JustifiedEpoch) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Bug3: Because of 1, it gives us an incorrect justified slot |
||
justifiedBlockRoot := make([]byte, 32) | ||
if lastJustifiedSlot != beaconState.Slot { | ||
var justifiedBlock *pbp2p.BeaconBlock | ||
for i := uint64(0); justifiedBlock == nil && i < params.BeaconConfig().SlotsPerEpoch; i++ { | ||
justifiedBlock, err = as.beaconDB.BlockBySlot(lastJustifiedSlot - i) | ||
if err != nil { | ||
return nil, fmt.Errorf("could not get justified block: %v", err) | ||
} | ||
if lastJustifiedSlot != headState.Slot { | ||
justifiedBlock, err := as.beaconDB.BlockBySlot(lastJustifiedSlot) | ||
if err != nil { | ||
return nil, fmt.Errorf("could not get justified block: %v", err) | ||
} | ||
|
||
justifiedBlockRoot32, err := hashutil.HashBeaconBlock(justifiedBlock) | ||
|
@@ -105,15 +103,18 @@ func (as *AttesterServer) AttestationDataAtSlot(ctx context.Context, req *pb.Att | |
justifiedBlockRoot = justifiedBlockRoot32[:] | ||
} | ||
|
||
if beaconState.Slot == params.BeaconConfig().GenesisSlot { | ||
epochBoundaryRoot = blockRoot[:] | ||
justifiedBlockRoot = blockRoot[:] | ||
// If an attester has to attest for gensis block. | ||
if headState.Slot == params.BeaconConfig().GenesisSlot { | ||
epochBoundaryRoot = headRoot[:] | ||
justifiedBlockRoot = headRoot[:] | ||
} | ||
|
||
return &pb.AttestationDataResponse{ | ||
BeaconBlockRootHash32: blockRoot[:], | ||
HeadSlot: headState.Slot, | ||
BeaconBlockRootHash32: headRoot[:], | ||
EpochBoundaryRootHash32: epochBoundaryRoot, | ||
JustifiedEpoch: beaconState.JustifiedEpoch, | ||
JustifiedEpoch: headState.JustifiedEpoch, | ||
JustifiedBlockRootHash32: justifiedBlockRoot, | ||
LatestCrosslink: beaconState.LatestCrosslinks[req.Shard], | ||
LatestCrosslink: headState.LatestCrosslinks[req.Shard], | ||
}, nil | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Bug2: Because of 1, it gives us an incorrect epoch boundary root