-
Notifications
You must be signed in to change notification settings - Fork 989
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Confirmation rule prerequisite - fork choice filter change #3431
Confirmation rule prerequisite - fork choice filter change #3431
Conversation
Co-authored-by: Hsiao-Wei Wang <[email protected]>
The change looks good to me. I don't think Bellatrix FC is affected by the change introduce in this PR. A question, would we need to add new tests along fixing the existing ones? (I guess no but asking just in case) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not sure I follow -- is this to pull out a bit of functionality into specifically defined functions so that the beacon-api's can just reference these functions instead of trying to (re)define the behaviour there?
voting_source = get_voting_source(store, block_root) | ||
|
||
# The voting source should be at the same height as the store's justified checkpoint | ||
# The voting source should be either at the same height as the store's justified checkpoint or | ||
# not more than two epochs ago |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah, this is the substantive change
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not sure I understand the connection to the Beacon-APIs here. can you elaborate?
This PR includes the changes to the Fork Choice required to ensure the safety of the confirmation rule. This means that, once this PR is implemented, the confirmation rule can be safely executed via standard Beacon API calls as done here. I have updated the title and PR description accordingly. I hope that this clarifies. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks good/correct.
Need to port to non-Phase0 functions as needed and then we can merge
Just checked and it looks like that no change is required to any of the non-Phase 0 specs. |
Co-authored-by: Mikhail Kalinin <[email protected]>
The PR itself looks good to me. 👍 But since it's a substantive change, we may need to be clear about when it can be on devnet/testnet/mainnet before merging it. |
…firmation-rule update test checks
To support confirmation rule via beacon-APIs as described in spec PR, add `--debug-fork-choice-version=pr3431` option and enable when Deneb fork is scheduled. To opt-out, `--debug-fork-choice-version=stable`, or don't schedule Deneb. - ethereum/consensus-specs#3431 - ethereum/consensus-specs#3466 "will bundle this with deneb release": - ethereum/pm#844 (comment)
To support confirmation rule via beacon-APIs as described in spec PR, add `--debug-fork-choice-version=pr3431` option and enable when Deneb fork is scheduled. To opt-out, `--debug-fork-choice-version=stable`, or don't schedule Deneb. - ethereum/consensus-specs#3431 - ethereum/consensus-specs#3466 "will bundle this with deneb release": - ethereum/pm#844 (comment)
…5450) To support confirmation rule via beacon-APIs as described in spec PR, add `--debug-fork-choice-version=pr3431` option and enable when Deneb fork is scheduled. To opt-out, `--debug-fork-choice-version=stable`, or don't schedule Deneb. - ethereum/consensus-specs#3431 - ethereum/consensus-specs#3466 "will bundle this with deneb release": - ethereum/pm#844 (comment)
This PR specifies the changes to the Fork Choice specification required for the safe execution of the confirmation rule specified in #3339.
By implementing these changes, the confirmation rule can be safely run by means of beacon APIs calls, though there would be no connection to the execution layer.
See sections 3.1 to 3.4 of this document for the rationale about the changes proposed and the related security analysis.
TODO: