mirror of
https://gitlab.com/pulsechaincom/lighthouse-pulse.git
synced 2025-01-20 10:31:12 +00:00
484 lines
15 KiB
Rust
484 lines
15 KiB
Rust
extern crate ssz;
|
|
|
|
use self::ssz::{
|
|
SszStream,
|
|
};
|
|
use std::sync::Arc;
|
|
use super::{
|
|
BlockValidationContext,
|
|
SszBlockValidationError,
|
|
BlockStatus,
|
|
AttesterMap,
|
|
ProposerMap,
|
|
};
|
|
use super::db::stores::{
|
|
BlockStore,
|
|
PoWChainStore,
|
|
ValidatorStore,
|
|
};
|
|
use super::db::{
|
|
MemoryDB,
|
|
};
|
|
use super::utils::hash::canonical_hash;
|
|
use super::utils::types::{
|
|
Hash256,
|
|
Bitfield,
|
|
};
|
|
use super::SszBlock;
|
|
use super::super::Block;
|
|
use super::super::attestation_record::AttestationRecord;
|
|
use super::super::super::bls::{
|
|
Keypair,
|
|
Signature,
|
|
AggregateSignature,
|
|
};
|
|
|
|
pub struct TestStore {
|
|
pub db: Arc<MemoryDB>,
|
|
pub block: Arc<BlockStore<MemoryDB>>,
|
|
pub pow_chain: Arc<PoWChainStore<MemoryDB>>,
|
|
pub validator: Arc<ValidatorStore<MemoryDB>>,
|
|
}
|
|
|
|
impl TestStore {
|
|
pub fn new() -> Self {
|
|
let db = Arc::new(MemoryDB::open());
|
|
let block = Arc::new(BlockStore::new(db.clone()));
|
|
let pow_chain = Arc::new(PoWChainStore::new(db.clone()));
|
|
let validator = Arc::new(ValidatorStore::new(db.clone()));
|
|
Self {
|
|
db,
|
|
block,
|
|
pow_chain,
|
|
validator,
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Debug)]
|
|
pub struct TestParams {
|
|
pub total_validators: usize,
|
|
pub cycle_length: u8,
|
|
pub shard_count: u16,
|
|
pub shards_per_slot: u16,
|
|
pub validators_per_shard: usize,
|
|
pub block_slot: u64,
|
|
pub attestations_justified_slot: u64,
|
|
pub parent_proposer_index: usize,
|
|
pub validation_context_slot: u64,
|
|
pub validation_context_justified_slot: u64,
|
|
pub validation_context_finalized_slot: u64,
|
|
}
|
|
type ParentHashes = Vec<Hash256>;
|
|
|
|
/// Setup for a block validation function, without actually executing the
|
|
/// block validation function.
|
|
pub fn setup_block_validation_scenario(params: &TestParams)
|
|
-> (Block, ParentHashes, AttesterMap, ProposerMap, TestStore)
|
|
{
|
|
let stores = TestStore::new();
|
|
|
|
let cycle_length = params.cycle_length;
|
|
let shards_per_slot = params.shards_per_slot;
|
|
let validators_per_shard = params.validators_per_shard;
|
|
let block_slot = params.block_slot;
|
|
let attestations_justified_slot = params.attestations_justified_slot;
|
|
|
|
let parent_hashes: Vec<Hash256> = (0..(cycle_length * 2))
|
|
.map(|i| Hash256::from(i as u64))
|
|
.collect();
|
|
let parent_hash = Hash256::from("parent_hash".as_bytes());
|
|
let randao_reveal = Hash256::from("randao_reveal".as_bytes());
|
|
let justified_block_hash = Hash256::from("justified_hash".as_bytes());
|
|
let pow_chain_ref = Hash256::from("pow_chain".as_bytes());
|
|
let active_state_root = Hash256::from("active_state".as_bytes());
|
|
let crystallized_state_root = Hash256::from("cry_state".as_bytes());
|
|
let shard_block_hash = Hash256::from("shard_block_hash".as_bytes());
|
|
|
|
stores.pow_chain.put_block_hash(pow_chain_ref.as_ref()).unwrap();
|
|
stores.block.put_serialized_block(justified_block_hash.as_ref(), &vec![42]).unwrap();
|
|
|
|
/*
|
|
* Generate a minimum viable parent block and store it in the database.
|
|
*/
|
|
let mut parent_block = Block::zero();
|
|
let parent_attestation = AttestationRecord::zero();
|
|
parent_block.slot_number = block_slot - 1;
|
|
parent_block.attestations.push(parent_attestation);
|
|
let parent_block_ssz = serialize_block(&parent_block);
|
|
stores.block.put_serialized_block(parent_hash.as_ref(), &parent_block_ssz).unwrap();
|
|
|
|
let proposer_map = {
|
|
let mut proposer_map = ProposerMap::new();
|
|
proposer_map.insert(parent_block.slot_number, params.parent_proposer_index);
|
|
proposer_map
|
|
};
|
|
|
|
let (attester_map, attestations, _keypairs) = {
|
|
let mut i = 0;
|
|
let attestation_slot = block_slot - 1;
|
|
let mut attester_map = AttesterMap::new();
|
|
let mut attestations = vec![];
|
|
let mut keypairs = vec![];
|
|
for shard in 0..shards_per_slot {
|
|
let mut attesters = vec![];
|
|
let mut attester_bitfield = Bitfield::new();
|
|
let mut aggregate_sig = AggregateSignature::new();
|
|
|
|
let parent_hashes_slice = {
|
|
let distance: usize = (block_slot - attestation_slot) as usize;
|
|
let last: usize = parent_hashes.len() - distance;
|
|
let first: usize = last - usize::from(cycle_length);
|
|
&parent_hashes[first..last]
|
|
};
|
|
|
|
let attestation_message = {
|
|
let mut stream = SszStream::new();
|
|
stream.append(&attestation_slot);
|
|
stream.append_vec(&parent_hashes_slice.to_vec());
|
|
stream.append(&shard);
|
|
stream.append(&shard_block_hash);
|
|
stream.append(&attestations_justified_slot);
|
|
let bytes = stream.drain();
|
|
canonical_hash(&bytes)
|
|
};
|
|
|
|
|
|
|
|
for attestation_index in 0..validators_per_shard {
|
|
/*
|
|
* Add the attester to the attestation indices for this shard.
|
|
*/
|
|
attesters.push(i);
|
|
/*
|
|
* Set the voters bit on the bitfield to true.
|
|
*/
|
|
attester_bitfield.set_bit(attestation_index, true);
|
|
/*
|
|
* Generate a random keypair for this validatior and clone it into the
|
|
* list of keypairs.
|
|
*/
|
|
let keypair = Keypair::random();
|
|
keypairs.push(keypair.clone());
|
|
/*
|
|
* Store the validators public key in the database.
|
|
*/
|
|
stores.validator.put_public_key_by_index(i, &keypair.pk).unwrap();
|
|
/*
|
|
* Generate a new signature and aggregate it on the rolling signature.
|
|
*/
|
|
let sig = Signature::new(&attestation_message, &keypair.sk);
|
|
aggregate_sig.add(&sig);
|
|
/*
|
|
* Increment the validator counter to monotonically assign validators.
|
|
*/
|
|
i += 1;
|
|
}
|
|
|
|
attester_map.insert((attestation_slot, shard), attesters);
|
|
let attestation = AttestationRecord {
|
|
slot: attestation_slot,
|
|
shard_id: shard,
|
|
oblique_parent_hashes: vec![],
|
|
shard_block_hash,
|
|
attester_bitfield,
|
|
justified_slot: attestations_justified_slot,
|
|
justified_block_hash,
|
|
aggregate_sig,
|
|
};
|
|
attestations.push(attestation);
|
|
}
|
|
(attester_map, attestations, keypairs)
|
|
};
|
|
|
|
let block = Block {
|
|
parent_hash,
|
|
slot_number: block_slot,
|
|
randao_reveal,
|
|
attestations,
|
|
pow_chain_ref,
|
|
active_state_root,
|
|
crystallized_state_root,
|
|
};
|
|
|
|
(block,
|
|
parent_hashes,
|
|
attester_map,
|
|
proposer_map,
|
|
stores)
|
|
}
|
|
|
|
/// Helper function to take some Block and SSZ serialize it.
|
|
pub fn serialize_block(b: &Block) -> Vec<u8> {
|
|
let mut stream = SszStream::new();
|
|
stream.append(b);
|
|
stream.drain()
|
|
}
|
|
|
|
/// Setup and run a block validation scenario, given some parameters.
|
|
///
|
|
/// Returns the Result returned from the block validation function.
|
|
pub fn run_block_validation_scenario<F>(
|
|
params: &TestParams,
|
|
mutator_func: F)
|
|
-> Result<(BlockStatus, Option<Block>), SszBlockValidationError>
|
|
where F: FnOnce(Block, AttesterMap, ProposerMap, TestStore)
|
|
-> (Block, AttesterMap, ProposerMap, TestStore)
|
|
{
|
|
let (block,
|
|
parent_hashes,
|
|
attester_map,
|
|
proposer_map,
|
|
stores) = setup_block_validation_scenario(¶ms);
|
|
|
|
let (block,
|
|
attester_map,
|
|
proposer_map,
|
|
stores) = mutator_func(block, attester_map, proposer_map, stores);
|
|
|
|
let ssz_bytes = serialize_block(&block);
|
|
let ssz_block = SszBlock::from_slice(&ssz_bytes[..])
|
|
.unwrap();
|
|
|
|
let context = BlockValidationContext {
|
|
present_slot: params.validation_context_slot,
|
|
cycle_length: params.cycle_length,
|
|
last_justified_slot: params.validation_context_justified_slot,
|
|
last_finalized_slot: params.validation_context_finalized_slot,
|
|
parent_hashes: Arc::new(parent_hashes),
|
|
proposer_map: Arc::new(proposer_map),
|
|
attester_map: Arc::new(attester_map),
|
|
block_store: stores.block.clone(),
|
|
validator_store: stores.validator.clone(),
|
|
pow_store: stores.pow_chain.clone()
|
|
};
|
|
let validation_status = context.validate_ssz_block(&ssz_block);
|
|
/*
|
|
* If validation returned a block, make sure it's the same block we supplied to it.
|
|
*
|
|
* I.e., there were no errors during the serialization -> deserialization process.
|
|
*/
|
|
if let Ok((_, Some(returned_block))) = &validation_status {
|
|
assert_eq!(*returned_block, block);
|
|
};
|
|
validation_status
|
|
}
|
|
|
|
fn get_simple_params() -> TestParams {
|
|
let validators_per_shard: usize = 5;
|
|
let cycle_length: u8 = 2;
|
|
let shard_count: u16 = 4;
|
|
let shards_per_slot: u16 = shard_count / u16::from(cycle_length);
|
|
let total_validators: usize = validators_per_shard * shard_count as usize;
|
|
let block_slot = u64::from(cycle_length) * 10000;
|
|
let attestations_justified_slot = block_slot - u64::from(cycle_length);
|
|
let parent_proposer_index = 0;
|
|
|
|
let validation_context_slot = block_slot;
|
|
let validation_context_justified_slot = attestations_justified_slot;
|
|
let validation_context_finalized_slot = 0;
|
|
|
|
TestParams {
|
|
total_validators,
|
|
cycle_length,
|
|
shard_count,
|
|
shards_per_slot,
|
|
validators_per_shard,
|
|
parent_proposer_index,
|
|
block_slot,
|
|
attestations_justified_slot,
|
|
validation_context_slot,
|
|
validation_context_justified_slot,
|
|
validation_context_finalized_slot,
|
|
}
|
|
}
|
|
|
|
// TODO: test bad ssz serialization
|
|
|
|
#[test]
|
|
fn test_block_validation_valid() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |block: Block, attester_map, proposer_map, stores| {
|
|
/*
|
|
* Do not mutate
|
|
*/
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status.unwrap().0, BlockStatus::NewBlock);
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_valid_known_block() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |block: Block, attester_map, proposer_map, stores: TestStore| {
|
|
/*
|
|
* Pre-store the block in the database
|
|
*/
|
|
let block_ssz = serialize_block(&block);
|
|
let block_hash = canonical_hash(&block_ssz);
|
|
stores.block.put_serialized_block(&block_hash, &block_ssz).unwrap();
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status.unwrap(), (BlockStatus::KnownBlock, None));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_future_slot() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |mut block: Block, attester_map, proposer_map, stores| {
|
|
block.slot_number = block.slot_number + 1;
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::FutureSlot));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_slot_already_finalized() {
|
|
let mut params = get_simple_params();
|
|
|
|
params.validation_context_finalized_slot = params.block_slot;
|
|
params.validation_context_justified_slot = params.validation_context_finalized_slot +
|
|
u64::from(params.cycle_length);
|
|
|
|
let mutator = |block, attester_map, proposer_map, stores| {
|
|
/*
|
|
* Do not mutate
|
|
*/
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::SlotAlreadyFinalized));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_unknown_pow_hash() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |mut block: Block, attester_map, proposer_map, stores| {
|
|
block.pow_chain_ref = Hash256::from("unknown pow hash".as_bytes());
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::UnknownPoWChainRef));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_unknown_parent_hash() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |mut block: Block, attester_map, proposer_map, stores| {
|
|
block.parent_hash = Hash256::from("unknown parent block".as_bytes());
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::UnknownParentHash));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_1st_attestation_signature() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |mut block: Block, attester_map, proposer_map, stores| {
|
|
/*
|
|
* Set the second attestaion record to have an invalid signature.
|
|
*/
|
|
block.attestations[0].aggregate_sig = AggregateSignature::new();
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::FirstAttestationSignatureFailed));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_no_parent_proposer_signature() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |block: Block, attester_map, mut proposer_map: ProposerMap, stores: TestStore| {
|
|
/*
|
|
* Set the proposer for this slot to be a validator that does not exist.
|
|
*/
|
|
let ssz = stores.block.get_serialized_block(&block.parent_hash.as_ref()).unwrap().unwrap();
|
|
let parent_block_slot = SszBlock::from_slice(&ssz[..]).unwrap().slot_number();
|
|
proposer_map.insert(parent_block_slot, params.total_validators + 1);
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::NoProposerSignature));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_bad_proposer_map() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |block, attester_map, _, stores| {
|
|
/*
|
|
* Initialize a new, empty proposer map
|
|
*/
|
|
let proposer_map = ProposerMap::new();
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::BadProposerMap));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_2nd_attestation_signature() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |mut block: Block, attester_map, proposer_map, stores| {
|
|
/*
|
|
* Set the second attestaion record to have an invalid signature.
|
|
*/
|
|
block.attestations[1].aggregate_sig = AggregateSignature::new();
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::AttestationSignatureFailed));
|
|
}
|