extern crate ssz; use self::ssz::{ SszStream, }; use std::sync::Arc; use super::{ BlockValidationContext, SszBlockValidationError, BlockStatus, AttesterMap, ProposerMap, }; use super::db::stores::{ BlockStore, PoWChainStore, ValidatorStore, }; use super::db::{ MemoryDB, }; use super::utils::hash::canonical_hash; use super::utils::types::{ Hash256, Bitfield, }; use super::SszBlock; use super::super::Block; use super::super::attestation_record::AttestationRecord; use super::super::super::bls::{ Keypair, Signature, AggregateSignature, }; pub struct TestStore { pub db: Arc, pub block: Arc>, pub pow_chain: Arc>, pub validator: Arc>, } impl TestStore { pub fn new() -> Self { let db = Arc::new(MemoryDB::open()); let block = Arc::new(BlockStore::new(db.clone())); let pow_chain = Arc::new(PoWChainStore::new(db.clone())); let validator = Arc::new(ValidatorStore::new(db.clone())); Self { db, block, pow_chain, validator, } } } #[derive(Debug)] pub struct TestParams { pub total_validators: usize, pub cycle_length: u8, pub shard_count: u16, pub shards_per_slot: u16, pub validators_per_shard: usize, pub block_slot: u64, pub attestations_justified_slot: u64, pub parent_proposer_index: usize, pub validation_context_slot: u64, pub validation_context_justified_slot: u64, pub validation_context_finalized_slot: u64, } type ParentHashes = Vec; /// Setup for a block validation function, without actually executing the /// block validation function. pub fn setup_block_validation_scenario(params: &TestParams) -> (Block, ParentHashes, AttesterMap, ProposerMap, TestStore) { let stores = TestStore::new(); let cycle_length = params.cycle_length; let shards_per_slot = params.shards_per_slot; let validators_per_shard = params.validators_per_shard; let block_slot = params.block_slot; let attestations_justified_slot = params.attestations_justified_slot; let parent_hashes: Vec = (0..(cycle_length * 2)) .map(|i| Hash256::from(i as u64)) .collect(); let parent_hash = Hash256::from("parent_hash".as_bytes()); let randao_reveal = Hash256::from("randao_reveal".as_bytes()); let justified_block_hash = Hash256::from("justified_hash".as_bytes()); let pow_chain_ref = Hash256::from("pow_chain".as_bytes()); let active_state_root = Hash256::from("active_state".as_bytes()); let crystallized_state_root = Hash256::from("cry_state".as_bytes()); let shard_block_hash = Hash256::from("shard_block_hash".as_bytes()); stores.pow_chain.put_block_hash(pow_chain_ref.as_ref()).unwrap(); stores.block.put_serialized_block(justified_block_hash.as_ref(), &vec![42]).unwrap(); /* * Generate a minimum viable parent block and store it in the database. */ let mut parent_block = Block::zero(); let parent_attestation = AttestationRecord::zero(); parent_block.slot_number = block_slot - 1; parent_block.attestations.push(parent_attestation); let parent_block_ssz = serialize_block(&parent_block); stores.block.put_serialized_block(parent_hash.as_ref(), &parent_block_ssz).unwrap(); let proposer_map = { let mut proposer_map = ProposerMap::new(); proposer_map.insert(parent_block.slot_number, params.parent_proposer_index); proposer_map }; let (attester_map, attestations, _keypairs) = { let mut i = 0; let attestation_slot = block_slot - 1; let mut attester_map = AttesterMap::new(); let mut attestations = vec![]; let mut keypairs = vec![]; for shard in 0..shards_per_slot { let mut attesters = vec![]; let mut attester_bitfield = Bitfield::new(); let mut aggregate_sig = AggregateSignature::new(); let parent_hashes_slice = { let distance: usize = (block_slot - attestation_slot) as usize; let last: usize = parent_hashes.len() - distance; let first: usize = last - usize::from(cycle_length); &parent_hashes[first..last] }; let attestation_message = { let mut stream = SszStream::new(); stream.append(&attestation_slot); stream.append_vec(&parent_hashes_slice.to_vec()); stream.append(&shard); stream.append(&shard_block_hash); stream.append(&attestations_justified_slot); let bytes = stream.drain(); canonical_hash(&bytes) }; for attestation_index in 0..validators_per_shard { /* * Add the attester to the attestation indices for this shard. */ attesters.push(i); /* * Set the voters bit on the bitfield to true. */ attester_bitfield.set_bit(attestation_index, true); /* * Generate a random keypair for this validatior and clone it into the * list of keypairs. */ let keypair = Keypair::random(); keypairs.push(keypair.clone()); /* * Store the validators public key in the database. */ stores.validator.put_public_key_by_index(i, &keypair.pk).unwrap(); /* * Generate a new signature and aggregate it on the rolling signature. */ let sig = Signature::new(&attestation_message, &keypair.sk); aggregate_sig.add(&sig); /* * Increment the validator counter to monotonically assign validators. */ i += 1; } attester_map.insert((attestation_slot, shard), attesters); let attestation = AttestationRecord { slot: attestation_slot, shard_id: shard, oblique_parent_hashes: vec![], shard_block_hash, attester_bitfield, justified_slot: attestations_justified_slot, justified_block_hash, aggregate_sig, }; attestations.push(attestation); } (attester_map, attestations, keypairs) }; let block = Block { parent_hash, slot_number: block_slot, randao_reveal, attestations, pow_chain_ref, active_state_root, crystallized_state_root, }; (block, parent_hashes, attester_map, proposer_map, stores) } /// Helper function to take some Block and SSZ serialize it. pub fn serialize_block(b: &Block) -> Vec { let mut stream = SszStream::new(); stream.append(b); stream.drain() } /// Setup and run a block validation scenario, given some parameters. /// /// Returns the Result returned from the block validation function. pub fn run_block_validation_scenario( params: &TestParams, mutator_func: F) -> Result<(BlockStatus, Option), SszBlockValidationError> where F: FnOnce(Block, AttesterMap, ProposerMap, TestStore) -> (Block, AttesterMap, ProposerMap, TestStore) { let (block, parent_hashes, attester_map, proposer_map, stores) = setup_block_validation_scenario(¶ms); let (block, attester_map, proposer_map, stores) = mutator_func(block, attester_map, proposer_map, stores); let ssz_bytes = serialize_block(&block); let ssz_block = SszBlock::from_slice(&ssz_bytes[..]) .unwrap(); let context = BlockValidationContext { present_slot: params.validation_context_slot, cycle_length: params.cycle_length, last_justified_slot: params.validation_context_justified_slot, last_finalized_slot: params.validation_context_finalized_slot, parent_hashes: Arc::new(parent_hashes), proposer_map: Arc::new(proposer_map), attester_map: Arc::new(attester_map), block_store: stores.block.clone(), validator_store: stores.validator.clone(), pow_store: stores.pow_chain.clone() }; let validation_status = context.validate_ssz_block(&ssz_block); /* * If validation returned a block, make sure it's the same block we supplied to it. * * I.e., there were no errors during the serialization -> deserialization process. */ if let Ok((_, Some(returned_block))) = &validation_status { assert_eq!(*returned_block, block); }; validation_status } fn get_simple_params() -> TestParams { let validators_per_shard: usize = 5; let cycle_length: u8 = 2; let shard_count: u16 = 4; let shards_per_slot: u16 = shard_count / u16::from(cycle_length); let total_validators: usize = validators_per_shard * shard_count as usize; let block_slot = u64::from(cycle_length) * 10000; let attestations_justified_slot = block_slot - u64::from(cycle_length); let parent_proposer_index = 0; let validation_context_slot = block_slot; let validation_context_justified_slot = attestations_justified_slot; let validation_context_finalized_slot = 0; TestParams { total_validators, cycle_length, shard_count, shards_per_slot, validators_per_shard, parent_proposer_index, block_slot, attestations_justified_slot, validation_context_slot, validation_context_justified_slot, validation_context_finalized_slot, } } // TODO: test bad ssz serialization #[test] fn test_block_validation_valid() { let params = get_simple_params(); let mutator = |block: Block, attester_map, proposer_map, stores| { /* * Do not mutate */ (block, attester_map, proposer_map, stores) }; let status = run_block_validation_scenario( ¶ms, mutator); assert_eq!(status.unwrap().0, BlockStatus::NewBlock); } #[test] fn test_block_validation_valid_known_block() { let params = get_simple_params(); let mutator = |block: Block, attester_map, proposer_map, stores: TestStore| { /* * Pre-store the block in the database */ let block_ssz = serialize_block(&block); let block_hash = canonical_hash(&block_ssz); stores.block.put_serialized_block(&block_hash, &block_ssz).unwrap(); (block, attester_map, proposer_map, stores) }; let status = run_block_validation_scenario( ¶ms, mutator); assert_eq!(status.unwrap(), (BlockStatus::KnownBlock, None)); } #[test] fn test_block_validation_invalid_future_slot() { let params = get_simple_params(); let mutator = |mut block: Block, attester_map, proposer_map, stores| { block.slot_number = block.slot_number + 1; (block, attester_map, proposer_map, stores) }; let status = run_block_validation_scenario( ¶ms, mutator); assert_eq!(status, Err(SszBlockValidationError::FutureSlot)); } #[test] fn test_block_validation_invalid_slot_already_finalized() { let mut params = get_simple_params(); params.validation_context_finalized_slot = params.block_slot; params.validation_context_justified_slot = params.validation_context_finalized_slot + u64::from(params.cycle_length); let mutator = |block, attester_map, proposer_map, stores| { /* * Do not mutate */ (block, attester_map, proposer_map, stores) }; let status = run_block_validation_scenario( ¶ms, mutator); assert_eq!(status, Err(SszBlockValidationError::SlotAlreadyFinalized)); } #[test] fn test_block_validation_invalid_unknown_pow_hash() { let params = get_simple_params(); let mutator = |mut block: Block, attester_map, proposer_map, stores| { block.pow_chain_ref = Hash256::from("unknown pow hash".as_bytes()); (block, attester_map, proposer_map, stores) }; let status = run_block_validation_scenario( ¶ms, mutator); assert_eq!(status, Err(SszBlockValidationError::UnknownPoWChainRef)); } #[test] fn test_block_validation_invalid_unknown_parent_hash() { let params = get_simple_params(); let mutator = |mut block: Block, attester_map, proposer_map, stores| { block.parent_hash = Hash256::from("unknown parent block".as_bytes()); (block, attester_map, proposer_map, stores) }; let status = run_block_validation_scenario( ¶ms, mutator); assert_eq!(status, Err(SszBlockValidationError::UnknownParentHash)); } #[test] fn test_block_validation_invalid_1st_attestation_signature() { let params = get_simple_params(); let mutator = |mut block: Block, attester_map, proposer_map, stores| { /* * Set the second attestaion record to have an invalid signature. */ block.attestations[0].aggregate_sig = AggregateSignature::new(); (block, attester_map, proposer_map, stores) }; let status = run_block_validation_scenario( ¶ms, mutator); assert_eq!(status, Err(SszBlockValidationError::FirstAttestationSignatureFailed)); } #[test] fn test_block_validation_invalid_no_parent_proposer_signature() { let params = get_simple_params(); let mutator = |block: Block, attester_map, mut proposer_map: ProposerMap, stores: TestStore| { /* * Set the proposer for this slot to be a validator that does not exist. */ let ssz = stores.block.get_serialized_block(&block.parent_hash.as_ref()).unwrap().unwrap(); let parent_block_slot = SszBlock::from_slice(&ssz[..]).unwrap().slot_number(); proposer_map.insert(parent_block_slot, params.total_validators + 1); (block, attester_map, proposer_map, stores) }; let status = run_block_validation_scenario( ¶ms, mutator); assert_eq!(status, Err(SszBlockValidationError::NoProposerSignature)); } #[test] fn test_block_validation_invalid_bad_proposer_map() { let params = get_simple_params(); let mutator = |block, attester_map, _, stores| { /* * Initialize a new, empty proposer map */ let proposer_map = ProposerMap::new(); (block, attester_map, proposer_map, stores) }; let status = run_block_validation_scenario( ¶ms, mutator); assert_eq!(status, Err(SszBlockValidationError::BadProposerMap)); } #[test] fn test_block_validation_invalid_2nd_attestation_signature() { let params = get_simple_params(); let mutator = |mut block: Block, attester_map, proposer_map, stores| { /* * Set the second attestaion record to have an invalid signature. */ block.attestations[1].aggregate_sig = AggregateSignature::new(); (block, attester_map, proposer_map, stores) }; let status = run_block_validation_scenario( ¶ms, mutator); assert_eq!(status, Err(SszBlockValidationError::AttestationSignatureFailed)); }