Revert bad blocks on missed fork (#2529)

## Issue Addressed

Closes #2526

## Proposed Changes

If the head block fails to decode on start up, do two things:

1. Revert all blocks between the head and the most recent hard fork (to `fork_slot - 1`).
2. Reset fork choice so that it contains the new head, and all blocks back to the new head's finalized checkpoint.

## Additional Info

I tweaked some of the beacon chain test harness stuff in order to make it generic enough to test with a non-zero slot clock on start-up. In the process I consolidated all the various `new_` methods into a single generic one which will hopefully serve all future uses 🤞
This commit is contained in:
Michael Sproul 2021-08-30 06:41:31 +00:00
parent 6b65b6f3bd
commit 10945e0619
16 changed files with 683 additions and 213 deletions

1
Cargo.lock generated
View File

@ -4317,7 +4317,6 @@ dependencies = [
"store", "store",
"strum", "strum",
"task_executor", "task_executor",
"tempfile",
"tokio", "tokio",
"tokio-stream", "tokio-stream",
"tokio-util", "tokio-util",

View File

@ -1,5 +1,6 @@
use crate::beacon_chain::{BEACON_CHAIN_DB_KEY, ETH1_CACHE_DB_KEY, OP_POOL_DB_KEY}; use crate::beacon_chain::{BEACON_CHAIN_DB_KEY, ETH1_CACHE_DB_KEY, OP_POOL_DB_KEY};
use crate::eth1_chain::{CachingEth1Backend, SszEth1}; use crate::eth1_chain::{CachingEth1Backend, SszEth1};
use crate::fork_revert::{reset_fork_choice_to_finalization, revert_to_fork_boundary};
use crate::head_tracker::HeadTracker; use crate::head_tracker::HeadTracker;
use crate::migrate::{BackgroundMigrator, MigratorConfig}; use crate::migrate::{BackgroundMigrator, MigratorConfig};
use crate::persisted_beacon_chain::PersistedBeaconChain; use crate::persisted_beacon_chain::PersistedBeaconChain;
@ -19,7 +20,7 @@ use futures::channel::mpsc::Sender;
use operation_pool::{OperationPool, PersistedOperationPool}; use operation_pool::{OperationPool, PersistedOperationPool};
use parking_lot::RwLock; use parking_lot::RwLock;
use slasher::Slasher; use slasher::Slasher;
use slog::{crit, info, Logger}; use slog::{crit, error, info, Logger};
use slot_clock::{SlotClock, TestingSlotClock}; use slot_clock::{SlotClock, TestingSlotClock};
use std::marker::PhantomData; use std::marker::PhantomData;
use std::sync::Arc; use std::sync::Arc;
@ -135,6 +136,11 @@ where
self self
} }
/// Get a reference to the builder's spec.
pub fn get_spec(&self) -> &ChainSpec {
&self.spec
}
/// Sets the maximum number of blocks that will be skipped when processing /// Sets the maximum number of blocks that will be skipped when processing
/// some consensus messages. /// some consensus messages.
/// ///
@ -320,10 +326,10 @@ where
let fc_store = BeaconForkChoiceStore::get_forkchoice_store(store, &genesis); let fc_store = BeaconForkChoiceStore::get_forkchoice_store(store, &genesis);
let fork_choice = ForkChoice::from_genesis( let fork_choice = ForkChoice::from_anchor(
fc_store, fc_store,
genesis.beacon_block_root, genesis.beacon_block_root,
&genesis.beacon_block.deconstruct().0, &genesis.beacon_block,
&genesis.beacon_state, &genesis.beacon_state,
) )
.map_err(|e| format!("Unable to build initialize ForkChoice: {:?}", e))?; .map_err(|e| format!("Unable to build initialize ForkChoice: {:?}", e))?;
@ -356,6 +362,13 @@ where
self self
} }
/// Fetch a reference to the slot clock.
///
/// Can be used for mutation during testing due to `SlotClock`'s internal mutability.
pub fn get_slot_clock(&self) -> Option<&TSlotClock> {
self.slot_clock.as_ref()
}
/// Sets a `Sender` to allow the beacon chain to send shutdown signals. /// Sets a `Sender` to allow the beacon chain to send shutdown signals.
pub fn shutdown_sender(mut self, sender: Sender<ShutdownReason>) -> Self { pub fn shutdown_sender(mut self, sender: Sender<ShutdownReason>) -> Self {
self.shutdown_sender = Some(sender); self.shutdown_sender = Some(sender);
@ -427,6 +440,7 @@ where
let mut validator_monitor = self let mut validator_monitor = self
.validator_monitor .validator_monitor
.ok_or("Cannot build without a validator monitor")?; .ok_or("Cannot build without a validator monitor")?;
let head_tracker = Arc::new(self.head_tracker.unwrap_or_default());
let current_slot = if slot_clock let current_slot = if slot_clock
.is_prior_to_genesis() .is_prior_to_genesis()
@ -437,20 +451,57 @@ where
slot_clock.now().ok_or("Unable to read slot")? slot_clock.now().ok_or("Unable to read slot")?
}; };
let head_block_root = fork_choice let initial_head_block_root = fork_choice
.get_head(current_slot) .get_head(current_slot)
.map_err(|e| format!("Unable to get fork choice head: {:?}", e))?; .map_err(|e| format!("Unable to get fork choice head: {:?}", e))?;
let head_block = store // Try to decode the head block according to the current fork, if that fails, try
.get_block(&head_block_root) // to backtrack to before the most recent fork.
.map_err(|e| descriptive_db_error("head block", &e))? let (head_block_root, head_block, head_reverted) =
.ok_or("Head block not found in store")?; match store.get_block(&initial_head_block_root) {
Ok(Some(block)) => (initial_head_block_root, block, false),
Ok(None) => return Err("Head block not found in store".into()),
Err(StoreError::SszDecodeError(_)) => {
error!(
log,
"Error decoding head block";
"message" => "This node has likely missed a hard fork. \
It will try to revert the invalid blocks and keep running, \
but any stray blocks and states will not be deleted. \
Long-term you should consider re-syncing this node."
);
let (block_root, block) = revert_to_fork_boundary(
current_slot,
initial_head_block_root,
store.clone(),
&self.spec,
&log,
)?;
// Update head tracker.
head_tracker.register_block(block_root, block.parent_root(), block.slot());
(block_root, block, true)
}
Err(e) => return Err(descriptive_db_error("head block", &e)),
};
let head_state_root = head_block.state_root(); let head_state_root = head_block.state_root();
let head_state = store let head_state = store
.get_state(&head_state_root, Some(head_block.slot())) .get_state(&head_state_root, Some(head_block.slot()))
.map_err(|e| descriptive_db_error("head state", &e))? .map_err(|e| descriptive_db_error("head state", &e))?
.ok_or("Head state not found in store")?; .ok_or("Head state not found in store")?;
// If the head reverted then we need to reset fork choice using the new head's finalized
// checkpoint.
if head_reverted {
fork_choice = reset_fork_choice_to_finalization(
head_block_root,
&head_state,
store.clone(),
&self.spec,
)?;
}
let mut canonical_head = BeaconSnapshot { let mut canonical_head = BeaconSnapshot {
beacon_block_root: head_block_root, beacon_block_root: head_block_root,
beacon_block: head_block, beacon_block: head_block,
@ -541,7 +592,7 @@ where
genesis_state_root, genesis_state_root,
fork_choice: RwLock::new(fork_choice), fork_choice: RwLock::new(fork_choice),
event_handler: self.event_handler, event_handler: self.event_handler,
head_tracker: Arc::new(self.head_tracker.unwrap_or_default()), head_tracker,
snapshot_cache: TimeoutRwLock::new(SnapshotCache::new( snapshot_cache: TimeoutRwLock::new(SnapshotCache::new(
DEFAULT_SNAPSHOT_CACHE_SIZE, DEFAULT_SNAPSHOT_CACHE_SIZE,
canonical_head, canonical_head,

View File

@ -0,0 +1,174 @@
use crate::{BeaconForkChoiceStore, BeaconSnapshot};
use fork_choice::ForkChoice;
use itertools::process_results;
use slog::{info, warn, Logger};
use state_processing::state_advance::complete_state_advance;
use state_processing::{per_block_processing, per_block_processing::BlockSignatureStrategy};
use std::sync::Arc;
use store::{iter::ParentRootBlockIterator, HotColdDB, ItemStore};
use types::{BeaconState, ChainSpec, EthSpec, ForkName, Hash256, SignedBeaconBlock, Slot};
const CORRUPT_DB_MESSAGE: &str = "The database could be corrupt. Check its file permissions or \
consider deleting it by running with the --purge-db flag.";
/// Revert the head to the last block before the most recent hard fork.
///
/// This function is destructive and should only be used if there is no viable alternative. It will
/// cause the reverted blocks and states to be completely forgotten, lying dormant in the database
/// forever.
///
/// Return the `(head_block_root, head_block)` that should be used post-reversion.
pub fn revert_to_fork_boundary<E: EthSpec, Hot: ItemStore<E>, Cold: ItemStore<E>>(
current_slot: Slot,
head_block_root: Hash256,
store: Arc<HotColdDB<E, Hot, Cold>>,
spec: &ChainSpec,
log: &Logger,
) -> Result<(Hash256, SignedBeaconBlock<E>), String> {
let current_fork = spec.fork_name_at_slot::<E>(current_slot);
let fork_epoch = spec
.fork_epoch(current_fork)
.ok_or_else(|| format!("Current fork '{}' never activates", current_fork))?;
if current_fork == ForkName::Base {
return Err(format!(
"Cannot revert to before phase0 hard fork. {}",
CORRUPT_DB_MESSAGE
));
}
warn!(
log,
"Reverting invalid head block";
"target_fork" => %current_fork,
"fork_epoch" => fork_epoch,
);
let block_iter = ParentRootBlockIterator::fork_tolerant(&store, head_block_root);
process_results(block_iter, |mut iter| {
iter.find_map(|(block_root, block)| {
if block.slot() < fork_epoch.start_slot(E::slots_per_epoch()) {
Some((block_root, block))
} else {
info!(
log,
"Reverting block";
"block_root" => ?block_root,
"slot" => block.slot(),
);
None
}
})
})
.map_err(|e| {
format!(
"Error fetching blocks to revert: {:?}. {}",
e, CORRUPT_DB_MESSAGE
)
})?
.ok_or_else(|| format!("No pre-fork blocks found. {}", CORRUPT_DB_MESSAGE))
}
/// Reset fork choice to the finalized checkpoint of the supplied head state.
///
/// The supplied `head_block_root` should correspond to the most recently applied block on
/// `head_state`.
///
/// This function avoids quirks of fork choice initialization by replaying all of the blocks from
/// the checkpoint to the head.
///
/// See this issue for details: https://github.com/ethereum/consensus-specs/issues/2566
///
/// It will fail if the finalized state or any of the blocks to replay are unavailable.
///
/// WARNING: this function is destructive and causes fork choice to permanently forget all
/// chains other than the chain leading to `head_block_root`. It should only be used in extreme
/// circumstances when there is no better alternative.
pub fn reset_fork_choice_to_finalization<E: EthSpec, Hot: ItemStore<E>, Cold: ItemStore<E>>(
head_block_root: Hash256,
head_state: &BeaconState<E>,
store: Arc<HotColdDB<E, Hot, Cold>>,
spec: &ChainSpec,
) -> Result<ForkChoice<BeaconForkChoiceStore<E, Hot, Cold>, E>, String> {
// Fetch finalized block.
let finalized_checkpoint = head_state.finalized_checkpoint();
let finalized_block_root = finalized_checkpoint.root;
let finalized_block = store
.get_block(&finalized_block_root)
.map_err(|e| format!("Error loading finalized block: {:?}", e))?
.ok_or_else(|| {
format!(
"Finalized block missing for revert: {:?}",
finalized_block_root
)
})?;
// Advance finalized state to finalized epoch (to handle skipped slots).
let finalized_state_root = finalized_block.state_root();
let mut finalized_state = store
.get_state(&finalized_state_root, Some(finalized_block.slot()))
.map_err(|e| format!("Error loading finalized state: {:?}", e))?
.ok_or_else(|| {
format!(
"Finalized block state missing from database: {:?}",
finalized_state_root
)
})?;
let finalized_slot = finalized_checkpoint.epoch.start_slot(E::slots_per_epoch());
complete_state_advance(
&mut finalized_state,
Some(finalized_state_root),
finalized_slot,
spec,
)
.map_err(|e| {
format!(
"Error advancing finalized state to finalized epoch: {:?}",
e
)
})?;
let finalized_snapshot = BeaconSnapshot {
beacon_block_root: finalized_block_root,
beacon_block: finalized_block,
beacon_state: finalized_state,
};
let fc_store = BeaconForkChoiceStore::get_forkchoice_store(store.clone(), &finalized_snapshot);
let mut fork_choice = ForkChoice::from_anchor(
fc_store,
finalized_block_root,
&finalized_snapshot.beacon_block,
&finalized_snapshot.beacon_state,
)
.map_err(|e| format!("Unable to reset fork choice for revert: {:?}", e))?;
// Replay blocks from finalized checkpoint back to head.
// We do not replay attestations presently, relying on the absence of other blocks
// to guarantee `head_block_root` as the head.
let blocks = store
.load_blocks_to_replay(finalized_slot + 1, head_state.slot(), head_block_root)
.map_err(|e| format!("Error loading blocks to replay for fork choice: {:?}", e))?;
let mut state = finalized_snapshot.beacon_state;
for block in blocks {
complete_state_advance(&mut state, None, block.slot(), spec)
.map_err(|e| format!("State advance failed: {:?}", e))?;
per_block_processing(
&mut state,
&block,
None,
BlockSignatureStrategy::NoVerification,
spec,
)
.map_err(|e| format!("Error replaying block: {:?}", e))?;
let (block, _) = block.deconstruct();
fork_choice
.on_block(block.slot(), &block, block.canonical_root(), &state)
.map_err(|e| format!("Error applying replayed block to fork choice: {:?}", e))?;
}
Ok(fork_choice)
}

View File

@ -11,6 +11,7 @@ pub mod chain_config;
mod errors; mod errors;
pub mod eth1_chain; pub mod eth1_chain;
pub mod events; pub mod events;
pub mod fork_revert;
mod head_tracker; mod head_tracker;
mod metrics; mod metrics;
pub mod migrate; pub mod migrate;

View File

@ -334,16 +334,33 @@ impl<E: EthSpec, Hot: ItemStore<E>, Cold: ItemStore<E>> BackgroundMigrator<E, Ho
); );
for (head_hash, head_slot) in heads { for (head_hash, head_slot) in heads {
// Load head block. If it fails with a decode error, it's likely a reverted block,
// so delete it from the head tracker but leave it and its states in the database
// This is suboptimal as it wastes disk space, but it's difficult to fix. A re-sync
// can be used to reclaim the space.
let head_state_root = match store.get_block(&head_hash) {
Ok(Some(block)) => block.state_root(),
Ok(None) => {
return Err(BeaconStateError::MissingBeaconBlock(head_hash.into()).into())
}
Err(Error::SszDecodeError(e)) => {
warn!(
log,
"Forgetting invalid head block";
"block_root" => ?head_hash,
"error" => ?e,
);
abandoned_heads.insert(head_hash);
continue;
}
Err(e) => return Err(e.into()),
};
let mut potentially_abandoned_head = Some(head_hash); let mut potentially_abandoned_head = Some(head_hash);
let mut potentially_abandoned_blocks = vec![]; let mut potentially_abandoned_blocks = vec![];
let head_state_hash = store
.get_block(&head_hash)?
.ok_or_else(|| BeaconStateError::MissingBeaconBlock(head_hash.into()))?
.state_root();
// Iterate backwards from this head, staging blocks and states for deletion. // Iterate backwards from this head, staging blocks and states for deletion.
let iter = std::iter::once(Ok((head_hash, head_state_hash, head_slot))) let iter = std::iter::once(Ok((head_hash, head_state_root, head_slot)))
.chain(RootsIterator::from_block(store.clone(), head_hash)?); .chain(RootsIterator::from_block(store.clone(), head_hash)?);
for maybe_tuple in iter { for maybe_tuple in iter {

View File

@ -29,7 +29,6 @@ use std::sync::Arc;
use std::time::Duration; use std::time::Duration;
use store::{config::StoreConfig, BlockReplay, HotColdDB, ItemStore, LevelDB, MemoryStore}; use store::{config::StoreConfig, BlockReplay, HotColdDB, ItemStore, LevelDB, MemoryStore};
use task_executor::ShutdownReason; use task_executor::ShutdownReason;
use tempfile::{tempdir, TempDir};
use tree_hash::TreeHash; use tree_hash::TreeHash;
use types::sync_selection_proof::SyncSelectionProof; use types::sync_selection_proof::SyncSelectionProof;
pub use types::test_utils::generate_deterministic_keypairs; pub use types::test_utils::generate_deterministic_keypairs;
@ -50,6 +49,12 @@ pub const HARNESS_SLOT_TIME: Duration = Duration::from_secs(1);
// Environment variable to read if `fork_from_env` feature is enabled. // Environment variable to read if `fork_from_env` feature is enabled.
const FORK_NAME_ENV_VAR: &str = "FORK_NAME"; const FORK_NAME_ENV_VAR: &str = "FORK_NAME";
// Default target aggregators to set during testing, this ensures an aggregator at each slot.
//
// You should mutate the `ChainSpec` prior to initialising the harness if you would like to use
// a different value.
pub const DEFAULT_TARGET_AGGREGATORS: u64 = u64::max_value();
pub type BaseHarnessType<TEthSpec, THotStore, TColdStore> = pub type BaseHarnessType<TEthSpec, THotStore, TColdStore> =
Witness<TestingSlotClock, CachingEth1Backend<TEthSpec>, TEthSpec, THotStore, TColdStore>; Witness<TestingSlotClock, CachingEth1Backend<TEthSpec>, TEthSpec, THotStore, TColdStore>;
@ -126,7 +131,7 @@ pub fn test_logger() -> Logger {
/// If the `fork_from_env` feature is enabled, read the fork to use from the FORK_NAME environment /// If the `fork_from_env` feature is enabled, read the fork to use from the FORK_NAME environment
/// variable. Otherwise use the default spec. /// variable. Otherwise use the default spec.
pub fn test_spec<E: EthSpec>() -> ChainSpec { pub fn test_spec<E: EthSpec>() -> ChainSpec {
if cfg!(feature = "fork_from_env") { let mut spec = if cfg!(feature = "fork_from_env") {
let fork_name = std::env::var(FORK_NAME_ENV_VAR).unwrap_or_else(|e| { let fork_name = std::env::var(FORK_NAME_ENV_VAR).unwrap_or_else(|e| {
panic!( panic!(
"{} env var must be defined when using fork_from_env: {:?}", "{} env var must be defined when using fork_from_env: {:?}",
@ -141,7 +146,11 @@ pub fn test_spec<E: EthSpec>() -> ChainSpec {
fork.make_genesis_spec(E::default_spec()) fork.make_genesis_spec(E::default_spec())
} else { } else {
E::default_spec() E::default_spec()
} };
// Set target aggregators to a high value by default.
spec.target_aggregators_per_committee = DEFAULT_TARGET_AGGREGATORS;
spec
} }
/// A testing harness which can instantiate a `BeaconChain` and populate it with blocks and /// A testing harness which can instantiate a `BeaconChain` and populate it with blocks and
@ -153,7 +162,6 @@ pub struct BeaconChainHarness<T: BeaconChainTypes> {
pub chain: Arc<BeaconChain<T>>, pub chain: Arc<BeaconChain<T>>,
pub spec: ChainSpec, pub spec: ChainSpec,
pub data_dir: TempDir,
pub shutdown_receiver: Receiver<ShutdownReason>, pub shutdown_receiver: Receiver<ShutdownReason>,
pub rng: Mutex<StdRng>, pub rng: Mutex<StdRng>,
@ -188,200 +196,123 @@ impl<E: EthSpec> BeaconChainHarness<EphemeralHarnessType<E>> {
spec: Option<ChainSpec>, spec: Option<ChainSpec>,
validator_keypairs: Vec<Keypair>, validator_keypairs: Vec<Keypair>,
config: StoreConfig, config: StoreConfig,
) -> Self {
// Setting the target aggregators to really high means that _all_ validators in the
// committee are required to produce an aggregate. This is overkill, however with small
// validator counts it's the only way to be certain there is _at least one_ aggregator per
// committee.
Self::new_with_target_aggregators(
eth_spec_instance,
spec,
validator_keypairs,
1 << 32,
config,
)
}
/// Instantiate a new harness with a custom `target_aggregators_per_committee` spec value
pub fn new_with_target_aggregators(
eth_spec_instance: E,
spec: Option<ChainSpec>,
validator_keypairs: Vec<Keypair>,
target_aggregators_per_committee: u64,
store_config: StoreConfig,
) -> Self { ) -> Self {
Self::new_with_chain_config( Self::new_with_chain_config(
eth_spec_instance, eth_spec_instance,
spec, spec,
validator_keypairs, validator_keypairs,
target_aggregators_per_committee, config,
store_config,
ChainConfig::default(), ChainConfig::default(),
) )
} }
/// Instantiate a new harness with `validator_count` initial validators, a custom
/// `target_aggregators_per_committee` spec value, and a `ChainConfig`
pub fn new_with_chain_config( pub fn new_with_chain_config(
eth_spec_instance: E, eth_spec_instance: E,
spec: Option<ChainSpec>, spec: Option<ChainSpec>,
validator_keypairs: Vec<Keypair>, validator_keypairs: Vec<Keypair>,
target_aggregators_per_committee: u64,
store_config: StoreConfig, store_config: StoreConfig,
chain_config: ChainConfig, chain_config: ChainConfig,
) -> Self { ) -> Self {
Self::new_with_mutator( Self::ephemeral_with_mutator(
eth_spec_instance, eth_spec_instance,
spec, spec,
validator_keypairs, validator_keypairs,
target_aggregators_per_committee,
store_config, store_config,
chain_config, chain_config,
|x| x, |x| x,
) )
} }
/// Apply a function to beacon chain builder before building. pub fn ephemeral_with_mutator(
pub fn new_with_mutator(
eth_spec_instance: E, eth_spec_instance: E,
spec: Option<ChainSpec>, spec: Option<ChainSpec>,
validator_keypairs: Vec<Keypair>, validator_keypairs: Vec<Keypair>,
target_aggregators_per_committee: u64,
store_config: StoreConfig, store_config: StoreConfig,
chain_config: ChainConfig, chain_config: ChainConfig,
mutator: impl FnOnce( mutator: impl FnOnce(
BeaconChainBuilder<EphemeralHarnessType<E>>, BeaconChainBuilder<EphemeralHarnessType<E>>,
) -> BeaconChainBuilder<EphemeralHarnessType<E>>, ) -> BeaconChainBuilder<EphemeralHarnessType<E>>,
) -> Self { ) -> Self {
let data_dir = tempdir().expect("should create temporary data_dir"); let spec = spec.unwrap_or_else(test_spec::<E>);
let mut spec = spec.unwrap_or_else(test_spec::<E>);
spec.target_aggregators_per_committee = target_aggregators_per_committee;
let (shutdown_tx, shutdown_receiver) = futures::channel::mpsc::channel(1);
let log = test_logger(); let log = test_logger();
let store = Arc::new(HotColdDB::open_ephemeral(store_config, spec.clone(), log).unwrap());
let store = HotColdDB::open_ephemeral(store_config, spec.clone(), log.clone()).unwrap(); Self::new_with_mutator(
let builder = BeaconChainBuilder::new(eth_spec_instance) eth_spec_instance,
.logger(log.clone()) spec,
.custom_spec(spec.clone()) store,
.store(Arc::new(store)) validator_keypairs.clone(),
.store_migrator_config(MigratorConfig::default().blocking()) chain_config,
.genesis_state( |mut builder| {
interop_genesis_state::<E>(&validator_keypairs, HARNESS_GENESIS_TIME, &spec) builder = mutator(builder);
.expect("should generate interop state"), let genesis_state = interop_genesis_state::<E>(
) &validator_keypairs,
.expect("should build state using recent genesis") HARNESS_GENESIS_TIME,
.dummy_eth1_backend() builder.get_spec(),
.expect("should build dummy backend") )
.testing_slot_clock(HARNESS_SLOT_TIME) .expect("should generate interop state");
.expect("should configure testing slot clock") builder
.shutdown_sender(shutdown_tx) .genesis_state(genesis_state)
.chain_config(chain_config) .expect("should build state using recent genesis")
.event_handler(Some(ServerSentEventHandler::new_with_capacity( },
log.clone(), )
1,
)))
.monitor_validators(true, vec![], log);
let chain = mutator(builder).build().expect("should build");
Self {
spec: chain.spec.clone(),
chain: Arc::new(chain),
validator_keypairs,
data_dir,
shutdown_receiver,
rng: make_rng(),
}
} }
} }
impl<E: EthSpec> BeaconChainHarness<DiskHarnessType<E>> { impl<E: EthSpec> BeaconChainHarness<DiskHarnessType<E>> {
/// Instantiate a new harness with `validator_count` initial validators. /// Disk store, start from genesis.
pub fn new_with_disk_store( pub fn new_with_disk_store(
eth_spec_instance: E, eth_spec_instance: E,
spec: Option<ChainSpec>, spec: Option<ChainSpec>,
store: Arc<HotColdDB<E, LevelDB<E>, LevelDB<E>>>, store: Arc<HotColdDB<E, LevelDB<E>, LevelDB<E>>>,
validator_keypairs: Vec<Keypair>, validator_keypairs: Vec<Keypair>,
) -> Self { ) -> Self {
let data_dir = tempdir().expect("should create temporary data_dir");
let spec = spec.unwrap_or_else(test_spec::<E>); let spec = spec.unwrap_or_else(test_spec::<E>);
let log = test_logger(); let chain_config = ChainConfig::default();
let (shutdown_tx, shutdown_receiver) = futures::channel::mpsc::channel(1);
let chain = BeaconChainBuilder::new(eth_spec_instance) Self::new_with_mutator(
.logger(log.clone()) eth_spec_instance,
.custom_spec(spec.clone()) spec,
.import_max_skip_slots(None) store,
.store(store) validator_keypairs.clone(),
.store_migrator_config(MigratorConfig::default().blocking()) chain_config,
.genesis_state( |builder| {
interop_genesis_state::<E>(&validator_keypairs, HARNESS_GENESIS_TIME, &spec) let genesis_state = interop_genesis_state::<E>(
.expect("should generate interop state"), &validator_keypairs,
) HARNESS_GENESIS_TIME,
.expect("should build state using recent genesis") builder.get_spec(),
.dummy_eth1_backend() )
.expect("should build dummy backend") .expect("should generate interop state");
.testing_slot_clock(HARNESS_SLOT_TIME) builder
.expect("should configure testing slot clock") .genesis_state(genesis_state)
.shutdown_sender(shutdown_tx) .expect("should build state using recent genesis")
.monitor_validators(true, vec![], log) },
.build() )
.expect("should build");
Self {
spec: chain.spec.clone(),
chain: Arc::new(chain),
validator_keypairs,
data_dir,
shutdown_receiver,
rng: make_rng(),
}
} }
}
impl<E: EthSpec> BeaconChainHarness<DiskHarnessType<E>> { /// Disk store, resume.
/// Instantiate a new harness with `validator_count` initial validators.
pub fn resume_from_disk_store( pub fn resume_from_disk_store(
eth_spec_instance: E, eth_spec_instance: E,
spec: Option<ChainSpec>, spec: Option<ChainSpec>,
store: Arc<HotColdDB<E, LevelDB<E>, LevelDB<E>>>, store: Arc<HotColdDB<E, LevelDB<E>, LevelDB<E>>>,
validator_keypairs: Vec<Keypair>, validator_keypairs: Vec<Keypair>,
data_dir: TempDir,
) -> Self { ) -> Self {
let spec = spec.unwrap_or_else(test_spec::<E>); let spec = spec.unwrap_or_else(test_spec::<E>);
let log = test_logger(); let chain_config = ChainConfig::default();
let (shutdown_tx, shutdown_receiver) = futures::channel::mpsc::channel(1);
let chain = BeaconChainBuilder::new(eth_spec_instance) Self::new_with_mutator(
.logger(log.clone()) eth_spec_instance,
.custom_spec(spec) spec,
.import_max_skip_slots(None) store,
.store(store)
.store_migrator_config(MigratorConfig::default().blocking())
.resume_from_db()
.expect("should resume beacon chain from db")
.dummy_eth1_backend()
.expect("should build dummy backend")
.testing_slot_clock(Duration::from_secs(1))
.expect("should configure testing slot clock")
.shutdown_sender(shutdown_tx)
.monitor_validators(true, vec![], log)
.build()
.expect("should build");
Self {
spec: chain.spec.clone(),
chain: Arc::new(chain),
validator_keypairs, validator_keypairs,
data_dir, chain_config,
shutdown_receiver, |builder| {
rng: make_rng(), builder
} .resume_from_db()
.expect("should resume from database")
},
)
} }
} }
@ -391,6 +322,62 @@ where
Hot: ItemStore<E>, Hot: ItemStore<E>,
Cold: ItemStore<E>, Cold: ItemStore<E>,
{ {
/// Generic initializer.
///
/// This initializer should be able to handle almost any configuration via arguments and the
/// provided `mutator` function. Please do not copy and paste this function.
pub fn new_with_mutator(
eth_spec_instance: E,
spec: ChainSpec,
store: Arc<HotColdDB<E, Hot, Cold>>,
validator_keypairs: Vec<Keypair>,
chain_config: ChainConfig,
mutator: impl FnOnce(
BeaconChainBuilder<BaseHarnessType<E, Hot, Cold>>,
) -> BeaconChainBuilder<BaseHarnessType<E, Hot, Cold>>,
) -> Self {
let (shutdown_tx, shutdown_receiver) = futures::channel::mpsc::channel(1);
let log = test_logger();
let mut builder = BeaconChainBuilder::new(eth_spec_instance)
.logger(log.clone())
.custom_spec(spec)
.store(store)
.store_migrator_config(MigratorConfig::default().blocking())
.dummy_eth1_backend()
.expect("should build dummy backend")
.shutdown_sender(shutdown_tx)
.chain_config(chain_config)
.event_handler(Some(ServerSentEventHandler::new_with_capacity(
log.clone(),
1,
)))
.monitor_validators(true, vec![], log);
// Caller must initialize genesis state.
builder = mutator(builder);
// Initialize the slot clock only if it hasn't already been initialized.
builder = if builder.get_slot_clock().is_none() {
builder
.testing_slot_clock(HARNESS_SLOT_TIME)
.expect("should configure testing slot clock")
} else {
builder
};
let chain = builder.build().expect("should build");
Self {
spec: chain.spec.clone(),
chain: Arc::new(chain),
validator_keypairs,
shutdown_receiver,
rng: make_rng(),
}
}
pub fn logger(&self) -> &slog::Logger { pub fn logger(&self) -> &slog::Logger {
&self.chain.log &self.chain.log
} }
@ -574,6 +561,9 @@ where
attestation_slot: Slot, attestation_slot: Slot,
) -> Vec<Vec<(Attestation<E>, SubnetId)>> { ) -> Vec<Vec<(Attestation<E>, SubnetId)>> {
let committee_count = state.get_committee_count_at_slot(state.slot()).unwrap(); let committee_count = state.get_committee_count_at_slot(state.slot()).unwrap();
let fork = self
.spec
.fork_at_epoch(attestation_slot.epoch(E::slots_per_epoch()));
state state
.get_beacon_committees_at_slot(attestation_slot) .get_beacon_committees_at_slot(attestation_slot)
@ -604,7 +594,7 @@ where
let domain = self.spec.get_domain( let domain = self.spec.get_domain(
attestation.data.target.epoch, attestation.data.target.epoch,
Domain::BeaconAttester, Domain::BeaconAttester,
&state.fork(), &fork,
state.genesis_validators_root(), state.genesis_validators_root(),
); );
@ -651,6 +641,9 @@ where
.expect("should be called on altair beacon state") .expect("should be called on altair beacon state")
.clone(), .clone(),
}; };
let fork = self
.spec
.fork_at_epoch(message_slot.epoch(E::slots_per_epoch()));
sync_committee sync_committee
.pubkeys .pubkeys
@ -672,7 +665,7 @@ where
head_block_root, head_block_root,
validator_index as u64, validator_index as u64,
&self.validator_keypairs[validator_index].sk, &self.validator_keypairs[validator_index].sk,
&state.fork(), &fork,
state.genesis_validators_root(), state.genesis_validators_root(),
&self.spec, &self.spec,
); );
@ -727,6 +720,7 @@ where
block_hash, block_hash,
slot, slot,
); );
let fork = self.spec.fork_at_epoch(slot.epoch(E::slots_per_epoch()));
let aggregated_attestations: Vec<Option<SignedAggregateAndProof<E>>> = let aggregated_attestations: Vec<Option<SignedAggregateAndProof<E>>> =
unaggregated_attestations unaggregated_attestations
@ -749,9 +743,9 @@ where
} }
let selection_proof = SelectionProof::new::<E>( let selection_proof = SelectionProof::new::<E>(
state.slot(), slot,
&self.validator_keypairs[*validator_index].sk, &self.validator_keypairs[*validator_index].sk,
&state.fork(), &fork,
state.genesis_validators_root(), state.genesis_validators_root(),
&self.spec, &self.spec,
); );
@ -782,7 +776,7 @@ where
aggregate, aggregate,
None, None,
&self.validator_keypairs[aggregator_index].sk, &self.validator_keypairs[aggregator_index].sk,
&state.fork(), &fork,
state.genesis_validators_root(), state.genesis_validators_root(),
&self.spec, &self.spec,
); );

View File

@ -5,7 +5,9 @@ extern crate lazy_static;
use beacon_chain::{ use beacon_chain::{
attestation_verification::Error as AttnError, attestation_verification::Error as AttnError,
test_utils::{AttestationStrategy, BeaconChainHarness, BlockStrategy, EphemeralHarnessType}, test_utils::{
test_spec, AttestationStrategy, BeaconChainHarness, BlockStrategy, EphemeralHarnessType,
},
BeaconChain, BeaconChainTypes, WhenSlotSkipped, BeaconChain, BeaconChainTypes, WhenSlotSkipped,
}; };
use int_to_bytes::int_to_bytes32; use int_to_bytes::int_to_bytes32;
@ -33,13 +35,16 @@ lazy_static! {
/// Returns a beacon chain harness. /// Returns a beacon chain harness.
fn get_harness(validator_count: usize) -> BeaconChainHarness<EphemeralHarnessType<E>> { fn get_harness(validator_count: usize) -> BeaconChainHarness<EphemeralHarnessType<E>> {
let harness = BeaconChainHarness::new_with_target_aggregators( let mut spec = test_spec::<E>();
// A kind-of arbitrary number that ensures that _some_ validators are aggregators, but
// not all.
spec.target_aggregators_per_committee = 4;
let harness = BeaconChainHarness::new_with_store_config(
MainnetEthSpec, MainnetEthSpec,
None, Some(spec),
KEYPAIRS[0..validator_count].to_vec(), KEYPAIRS[0..validator_count].to_vec(),
// A kind-of arbitrary number that ensures that _some_ validators are aggregators, but
// not all.
4,
StoreConfig::default(), StoreConfig::default(),
); );

View File

@ -840,11 +840,10 @@ fn verify_block_for_gossip_slashing_detection() {
.unwrap(), .unwrap(),
); );
let harness = BeaconChainHarness::new_with_mutator( let harness = BeaconChainHarness::ephemeral_with_mutator(
MainnetEthSpec, MainnetEthSpec,
None, None,
KEYPAIRS.to_vec(), KEYPAIRS.to_vec(),
1 << 32,
StoreConfig::default(), StoreConfig::default(),
ChainConfig::default(), ChainConfig::default(),
|builder| builder.slasher(slasher.clone()), |builder| builder.slasher(slasher.clone()),
@ -927,7 +926,6 @@ fn add_base_block_to_altair_chain() {
MainnetEthSpec, MainnetEthSpec,
Some(spec), Some(spec),
KEYPAIRS[..].to_vec(), KEYPAIRS[..].to_vec(),
1 << 32,
StoreConfig::default(), StoreConfig::default(),
ChainConfig::default(), ChainConfig::default(),
); );
@ -1047,7 +1045,6 @@ fn add_altair_block_to_base_chain() {
MainnetEthSpec, MainnetEthSpec,
Some(spec), Some(spec),
KEYPAIRS[..].to_vec(), KEYPAIRS[..].to_vec(),
1 << 32,
StoreConfig::default(), StoreConfig::default(),
ChainConfig::default(), ChainConfig::default(),
); );

View File

@ -2,9 +2,10 @@
use beacon_chain::attestation_verification::Error as AttnError; use beacon_chain::attestation_verification::Error as AttnError;
use beacon_chain::test_utils::{ use beacon_chain::test_utils::{
test_logger, test_spec, AttestationStrategy, BeaconChainHarness, BlockStrategy, DiskHarnessType, test_logger, test_spec, AttestationStrategy, BeaconChainHarness, BlockStrategy,
DiskHarnessType, HARNESS_SLOT_TIME,
}; };
use beacon_chain::{BeaconChain, BeaconChainTypes, BeaconSnapshot}; use beacon_chain::{BeaconChain, BeaconChainTypes, BeaconSnapshot, ChainConfig};
use lazy_static::lazy_static; use lazy_static::lazy_static;
use maplit::hashset; use maplit::hashset;
use rand::Rng; use rand::Rng;
@ -34,7 +35,13 @@ type E = MinimalEthSpec;
type TestHarness = BeaconChainHarness<DiskHarnessType<E>>; type TestHarness = BeaconChainHarness<DiskHarnessType<E>>;
fn get_store(db_path: &TempDir) -> Arc<HotColdDB<E, LevelDB<E>, LevelDB<E>>> { fn get_store(db_path: &TempDir) -> Arc<HotColdDB<E, LevelDB<E>, LevelDB<E>>> {
let spec = test_spec::<E>(); get_store_with_spec(db_path, test_spec::<E>())
}
fn get_store_with_spec(
db_path: &TempDir,
spec: ChainSpec,
) -> Arc<HotColdDB<E, LevelDB<E>, LevelDB<E>>> {
let hot_path = db_path.path().join("hot_db"); let hot_path = db_path.path().join("hot_db");
let cold_path = db_path.path().join("cold_db"); let cold_path = db_path.path().join("cold_db");
let config = StoreConfig::default(); let config = StoreConfig::default();
@ -1785,7 +1792,6 @@ fn finalizes_after_resuming_from_db() {
.persist_eth1_cache() .persist_eth1_cache()
.expect("should persist the eth1 cache"); .expect("should persist the eth1 cache");
let data_dir = harness.data_dir;
let original_chain = harness.chain; let original_chain = harness.chain;
let resumed_harness = BeaconChainHarness::resume_from_disk_store( let resumed_harness = BeaconChainHarness::resume_from_disk_store(
@ -1793,7 +1799,6 @@ fn finalizes_after_resuming_from_db() {
None, None,
store, store,
KEYPAIRS[0..validator_count].to_vec(), KEYPAIRS[0..validator_count].to_vec(),
data_dir,
); );
assert_chains_pretty_much_the_same(&original_chain, &resumed_harness.chain); assert_chains_pretty_much_the_same(&original_chain, &resumed_harness.chain);
@ -1839,6 +1844,170 @@ fn finalizes_after_resuming_from_db() {
); );
} }
#[test]
fn revert_minority_fork_on_resume() {
let validator_count = 16;
let slots_per_epoch = MinimalEthSpec::slots_per_epoch();
let fork_epoch = Epoch::new(4);
let fork_slot = fork_epoch.start_slot(slots_per_epoch);
let initial_blocks = slots_per_epoch * fork_epoch.as_u64() - 1;
let post_fork_blocks = slots_per_epoch * 3;
let mut spec1 = MinimalEthSpec::default_spec();
spec1.altair_fork_epoch = None;
let mut spec2 = MinimalEthSpec::default_spec();
spec2.altair_fork_epoch = Some(fork_epoch);
let all_validators = (0..validator_count).collect::<Vec<usize>>();
// Chain with no fork epoch configured.
let db_path1 = tempdir().unwrap();
let store1 = get_store_with_spec(&db_path1, spec1.clone());
let harness1 = BeaconChainHarness::new_with_disk_store(
MinimalEthSpec,
Some(spec1),
store1,
KEYPAIRS[0..validator_count].to_vec(),
);
// Chain with fork epoch configured.
let db_path2 = tempdir().unwrap();
let store2 = get_store_with_spec(&db_path2, spec2.clone());
let harness2 = BeaconChainHarness::new_with_disk_store(
MinimalEthSpec,
Some(spec2.clone()),
store2,
KEYPAIRS[0..validator_count].to_vec(),
);
// Apply the same blocks to both chains initially.
let mut state = harness1.get_current_state();
let mut block_root = harness1.chain.genesis_block_root;
for slot in (1..=initial_blocks).map(Slot::new) {
let state_root = state.update_tree_hash_cache().unwrap();
let attestations = harness1.make_attestations(
&all_validators,
&state,
state_root,
block_root.into(),
slot,
);
harness1.set_current_slot(slot);
harness2.set_current_slot(slot);
harness1.process_attestations(attestations.clone());
harness2.process_attestations(attestations);
let (block, new_state) = harness1.make_block(state, slot);
harness1.process_block(slot, block.clone()).unwrap();
harness2.process_block(slot, block.clone()).unwrap();
state = new_state;
block_root = block.canonical_root();
}
assert_eq!(harness1.chain.head_info().unwrap().slot, fork_slot - 1);
assert_eq!(harness2.chain.head_info().unwrap().slot, fork_slot - 1);
// Fork the two chains.
let mut state1 = state.clone();
let mut state2 = state.clone();
let mut majority_blocks = vec![];
for i in 0..post_fork_blocks {
let slot = fork_slot + i;
// Attestations on majority chain.
let state_root = state.update_tree_hash_cache().unwrap();
let attestations = harness2.make_attestations(
&all_validators,
&state2,
state_root,
block_root.into(),
slot,
);
harness2.set_current_slot(slot);
harness2.process_attestations(attestations);
// Minority chain block (no attesters).
let (block1, new_state1) = harness1.make_block(state1, slot);
harness1.process_block(slot, block1).unwrap();
state1 = new_state1;
// Majority chain block (all attesters).
let (block2, new_state2) = harness2.make_block(state2, slot);
harness2.process_block(slot, block2.clone()).unwrap();
state2 = new_state2;
block_root = block2.canonical_root();
majority_blocks.push(block2);
}
let end_slot = fork_slot + post_fork_blocks - 1;
assert_eq!(harness1.chain.head_info().unwrap().slot, end_slot);
assert_eq!(harness2.chain.head_info().unwrap().slot, end_slot);
// Resume from disk with the hard-fork activated: this should revert the post-fork blocks.
// We have to do some hackery with the `slot_clock` so that the correct slot is set when
// the beacon chain builder loads the head block.
drop(harness1);
let resume_store = get_store_with_spec(&db_path1, spec2.clone());
let resumed_harness = BeaconChainHarness::new_with_mutator(
MinimalEthSpec,
spec2,
resume_store,
KEYPAIRS[0..validator_count].to_vec(),
ChainConfig::default(),
|mut builder| {
builder = builder
.resume_from_db()
.unwrap()
.testing_slot_clock(HARNESS_SLOT_TIME)
.unwrap();
builder
.get_slot_clock()
.unwrap()
.set_slot(end_slot.as_u64());
builder
},
);
// Head should now be just before the fork.
resumed_harness.chain.fork_choice().unwrap();
let head = resumed_harness.chain.head_info().unwrap();
assert_eq!(head.slot, fork_slot - 1);
// Head track should know the canonical head and the rogue head.
assert_eq!(resumed_harness.chain.heads().len(), 2);
assert!(resumed_harness.chain.knows_head(&head.block_root.into()));
// Apply blocks from the majority chain and trigger finalization.
let initial_split_slot = resumed_harness.chain.store.get_split_slot();
for block in &majority_blocks {
resumed_harness.process_block_result(block.clone()).unwrap();
// The canonical head should be the block from the majority chain.
resumed_harness.chain.fork_choice().unwrap();
let head_info = resumed_harness.chain.head_info().unwrap();
assert_eq!(head_info.slot, block.slot());
assert_eq!(head_info.block_root, block.canonical_root());
}
let advanced_split_slot = resumed_harness.chain.store.get_split_slot();
// Check that the migration ran successfully.
assert!(advanced_split_slot > initial_split_slot);
// Check that there is only a single head now matching harness2 (the minority chain is gone).
let heads = resumed_harness.chain.heads();
assert_eq!(heads, harness2.chain.heads());
assert_eq!(heads.len(), 1);
}
/// Checks that two chains are the same, for the purpose of these tests. /// Checks that two chains are the same, for the purpose of these tests.
/// ///
/// Several fields that are hard/impossible to check are ignored (e.g., the store). /// Several fields that are hard/impossible to check are ignored (e.g., the store).

View File

@ -9,7 +9,6 @@ sloggers = "1.0.1"
genesis = { path = "../genesis" } genesis = { path = "../genesis" }
lazy_static = "1.4.0" lazy_static = "1.4.0"
matches = "0.1.8" matches = "0.1.8"
tempfile = "3.1.0"
exit-future = "0.2.0" exit-future = "0.2.0"
slog-term = "2.6.0" slog-term = "2.6.0"
slog-async = "2.5.0" slog-async = "2.5.0"

View File

@ -262,22 +262,40 @@ impl<E: EthSpec, Hot: ItemStore<E>, Cold: ItemStore<E>> HotColdDB<E, Hot, Cold>
return Ok(Some(block.clone())); return Ok(Some(block.clone()));
} }
// Fetch from database. let block = self.get_block_with(block_root, |bytes| {
match self SignedBeaconBlock::from_ssz_bytes(bytes, &self.spec)
.hot_db })?;
.get_bytes(DBColumn::BeaconBlock.into(), block_root.as_bytes())?
{
Some(block_bytes) => {
// Deserialize.
let block = SignedBeaconBlock::from_ssz_bytes(&block_bytes, &self.spec)?;
// Add to cache. // Add to cache.
self.block_cache.lock().put(*block_root, block.clone()); if let Some(ref block) = block {
self.block_cache.lock().put(*block_root, block.clone());
Ok(Some(block))
}
None => Ok(None),
} }
Ok(block)
}
/// Fetch a block from the store, ignoring which fork variant it *should* be for.
pub fn get_block_any_variant(
&self,
block_root: &Hash256,
) -> Result<Option<SignedBeaconBlock<E>>, Error> {
self.get_block_with(block_root, SignedBeaconBlock::any_from_ssz_bytes)
}
/// Fetch a block from the store using a custom decode function.
///
/// This is useful for e.g. ignoring the slot-indicated fork to forcefully load a block as if it
/// were for a different fork.
pub fn get_block_with(
&self,
block_root: &Hash256,
decoder: impl FnOnce(&[u8]) -> Result<SignedBeaconBlock<E>, ssz::DecodeError>,
) -> Result<Option<SignedBeaconBlock<E>>, Error> {
self.hot_db
.get_bytes(DBColumn::BeaconBlock.into(), block_root.as_bytes())?
.map(|block_bytes| decoder(&block_bytes))
.transpose()
.map_err(|e| e.into())
} }
/// Determine whether a block exists in the database. /// Determine whether a block exists in the database.
@ -766,7 +784,7 @@ impl<E: EthSpec, Hot: ItemStore<E>, Cold: ItemStore<E>> HotColdDB<E, Hot, Cold>
/// ///
/// Blocks are returned in slot-ascending order, suitable for replaying on a state with slot /// Blocks are returned in slot-ascending order, suitable for replaying on a state with slot
/// equal to `start_slot`, to reach a state with slot equal to `end_slot`. /// equal to `start_slot`, to reach a state with slot equal to `end_slot`.
fn load_blocks_to_replay( pub fn load_blocks_to_replay(
&self, &self,
start_slot: Slot, start_slot: Slot,
end_slot: Slot, end_slot: Slot,

View File

@ -232,6 +232,7 @@ impl<'a, T: EthSpec, Hot: ItemStore<T>, Cold: ItemStore<T>> Iterator
pub struct ParentRootBlockIterator<'a, E: EthSpec, Hot: ItemStore<E>, Cold: ItemStore<E>> { pub struct ParentRootBlockIterator<'a, E: EthSpec, Hot: ItemStore<E>, Cold: ItemStore<E>> {
store: &'a HotColdDB<E, Hot, Cold>, store: &'a HotColdDB<E, Hot, Cold>,
next_block_root: Hash256, next_block_root: Hash256,
decode_any_variant: bool,
_phantom: PhantomData<E>, _phantom: PhantomData<E>,
} }
@ -242,6 +243,17 @@ impl<'a, E: EthSpec, Hot: ItemStore<E>, Cold: ItemStore<E>>
Self { Self {
store, store,
next_block_root: start_block_root, next_block_root: start_block_root,
decode_any_variant: false,
_phantom: PhantomData,
}
}
/// Block iterator that is tolerant of blocks that have the wrong fork for their slot.
pub fn fork_tolerant(store: &'a HotColdDB<E, Hot, Cold>, start_block_root: Hash256) -> Self {
Self {
store,
next_block_root: start_block_root,
decode_any_variant: true,
_phantom: PhantomData, _phantom: PhantomData,
} }
} }
@ -253,10 +265,12 @@ impl<'a, E: EthSpec, Hot: ItemStore<E>, Cold: ItemStore<E>>
Ok(None) Ok(None)
} else { } else {
let block_root = self.next_block_root; let block_root = self.next_block_root;
let block = self let block = if self.decode_any_variant {
.store self.store.get_block_any_variant(&block_root)
.get_block(&block_root)? } else {
.ok_or(Error::BlockNotFound(block_root))?; self.store.get_block(&block_root)
}?
.ok_or(Error::BlockNotFound(block_root))?;
self.next_block_root = block.message().parent_root(); self.next_block_root = block.message().parent_root();
Ok(Some((block_root, block))) Ok(Some((block_root, block)))
} }

View File

@ -4,7 +4,7 @@ use proto_array::{Block as ProtoBlock, ProtoArrayForkChoice};
use ssz_derive::{Decode, Encode}; use ssz_derive::{Decode, Encode};
use types::{ use types::{
AttestationShufflingId, BeaconBlock, BeaconState, BeaconStateError, Checkpoint, Epoch, EthSpec, AttestationShufflingId, BeaconBlock, BeaconState, BeaconStateError, Checkpoint, Epoch, EthSpec,
Hash256, IndexedAttestation, RelativeEpoch, Slot, Hash256, IndexedAttestation, RelativeEpoch, SignedBeaconBlock, Slot,
}; };
use crate::ForkChoiceStore; use crate::ForkChoiceStore;
@ -38,6 +38,10 @@ pub enum Error<T> {
ForkChoiceStoreError(T), ForkChoiceStoreError(T),
UnableToSetJustifiedCheckpoint(T), UnableToSetJustifiedCheckpoint(T),
AfterBlockFailed(T), AfterBlockFailed(T),
InvalidAnchor {
block_slot: Slot,
state_slot: Slot,
},
} }
impl<T> From<InvalidAttestation> for Error<T> { impl<T> From<InvalidAttestation> for Error<T> {
@ -237,20 +241,28 @@ where
T: ForkChoiceStore<E>, T: ForkChoiceStore<E>,
E: EthSpec, E: EthSpec,
{ {
/// Instantiates `Self` from the genesis parameters. /// Instantiates `Self` from an anchor (genesis or another finalized checkpoint).
pub fn from_genesis( pub fn from_anchor(
fc_store: T, fc_store: T,
genesis_block_root: Hash256, anchor_block_root: Hash256,
genesis_block: &BeaconBlock<E>, anchor_block: &SignedBeaconBlock<E>,
genesis_state: &BeaconState<E>, anchor_state: &BeaconState<E>,
) -> Result<Self, Error<T::Error>> { ) -> Result<Self, Error<T::Error>> {
let finalized_block_slot = genesis_block.slot(); // Sanity check: the anchor must lie on an epoch boundary.
let finalized_block_state_root = genesis_block.state_root(); if anchor_block.slot() % E::slots_per_epoch() != 0 {
return Err(Error::InvalidAnchor {
block_slot: anchor_block.slot(),
state_slot: anchor_state.slot(),
});
}
let finalized_block_slot = anchor_block.slot();
let finalized_block_state_root = anchor_block.state_root();
let current_epoch_shuffling_id = let current_epoch_shuffling_id =
AttestationShufflingId::new(genesis_block_root, genesis_state, RelativeEpoch::Current) AttestationShufflingId::new(anchor_block_root, anchor_state, RelativeEpoch::Current)
.map_err(Error::BeaconStateError)?; .map_err(Error::BeaconStateError)?;
let next_epoch_shuffling_id = let next_epoch_shuffling_id =
AttestationShufflingId::new(genesis_block_root, genesis_state, RelativeEpoch::Next) AttestationShufflingId::new(anchor_block_root, anchor_state, RelativeEpoch::Next)
.map_err(Error::BeaconStateError)?; .map_err(Error::BeaconStateError)?;
let proto_array = ProtoArrayForkChoice::new( let proto_array = ProtoArrayForkChoice::new(

View File

@ -48,12 +48,10 @@ impl fmt::Debug for ForkChoiceTest {
impl ForkChoiceTest { impl ForkChoiceTest {
/// Creates a new tester. /// Creates a new tester.
pub fn new() -> Self { pub fn new() -> Self {
let harness = BeaconChainHarness::new_with_target_aggregators( let harness = BeaconChainHarness::new_with_store_config(
MainnetEthSpec, MainnetEthSpec,
None, None,
generate_deterministic_keypairs(VALIDATOR_COUNT), generate_deterministic_keypairs(VALIDATOR_COUNT),
// Ensure we always have an aggregator for each slot.
u64::max_value(),
StoreConfig::default(), StoreConfig::default(),
); );
@ -66,8 +64,6 @@ impl ForkChoiceTest {
MainnetEthSpec, MainnetEthSpec,
None, None,
generate_deterministic_keypairs(VALIDATOR_COUNT), generate_deterministic_keypairs(VALIDATOR_COUNT),
// Ensure we always have an aggregator for each slot.
u64::max_value(),
StoreConfig::default(), StoreConfig::default(),
chain_config, chain_config,
); );

View File

@ -88,6 +88,17 @@ impl<T: EthSpec> BeaconBlock<T> {
} }
} }
/// Try decoding each beacon block variant in sequence.
///
/// This is *not* recommended unless you really have no idea what variant the block should be.
/// Usually it's better to prefer `from_ssz_bytes` which will decode the correct variant based
/// on the fork slot.
pub fn any_from_ssz_bytes(bytes: &[u8]) -> Result<Self, ssz::DecodeError> {
BeaconBlockAltair::from_ssz_bytes(bytes)
.map(BeaconBlock::Altair)
.or_else(|_| BeaconBlockBase::from_ssz_bytes(bytes).map(BeaconBlock::Base))
}
/// Convenience accessor for the `body` as a `BeaconBlockBodyRef`. /// Convenience accessor for the `body` as a `BeaconBlockBodyRef`.
pub fn body(&self) -> BeaconBlockBodyRef<'_, T> { pub fn body(&self) -> BeaconBlockBodyRef<'_, T> {
self.to_ref().body() self.to_ref().body()

View File

@ -74,10 +74,23 @@ impl<E: EthSpec> SignedBeaconBlock<E> {
self.message().fork_name(spec) self.message().fork_name(spec)
} }
/// SSZ decode. /// SSZ decode with fork variant determined by slot.
pub fn from_ssz_bytes(bytes: &[u8], spec: &ChainSpec) -> Result<Self, ssz::DecodeError> { pub fn from_ssz_bytes(bytes: &[u8], spec: &ChainSpec) -> Result<Self, ssz::DecodeError> {
// We need to use the slot-switching `from_ssz_bytes` of `BeaconBlock`, which doesn't Self::from_ssz_bytes_with(bytes, |bytes| BeaconBlock::from_ssz_bytes(bytes, spec))
// compose with the other SSZ utils, so we duplicate some parts of `ssz_derive` here. }
/// SSZ decode which attempts to decode all variants (slow).
pub fn any_from_ssz_bytes(bytes: &[u8]) -> Result<Self, ssz::DecodeError> {
Self::from_ssz_bytes_with(bytes, BeaconBlock::any_from_ssz_bytes)
}
/// SSZ decode with custom decode function.
pub fn from_ssz_bytes_with(
bytes: &[u8],
block_decoder: impl FnOnce(&[u8]) -> Result<BeaconBlock<E>, ssz::DecodeError>,
) -> Result<Self, ssz::DecodeError> {
// We need the customer decoder for `BeaconBlock`, which doesn't compose with the other
// SSZ utils, so we duplicate some parts of `ssz_derive` here.
let mut builder = ssz::SszDecoderBuilder::new(bytes); let mut builder = ssz::SszDecoderBuilder::new(bytes);
builder.register_anonymous_variable_length_item()?; builder.register_anonymous_variable_length_item()?;
@ -86,7 +99,7 @@ impl<E: EthSpec> SignedBeaconBlock<E> {
let mut decoder = builder.build()?; let mut decoder = builder.build()?;
// Read the first item as a `BeaconBlock`. // Read the first item as a `BeaconBlock`.
let message = decoder.decode_next_with(|bytes| BeaconBlock::from_ssz_bytes(bytes, spec))?; let message = decoder.decode_next_with(block_decoder)?;
let signature = decoder.decode_next()?; let signature = decoder.decode_next()?;
Ok(Self::from_block(message, signature)) Ok(Self::from_block(message, signature))