2021-04-09 19:13:59 +00:00
|
|
|
package rpc
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"testing"
|
|
|
|
|
2021-04-16 07:46:38 +00:00
|
|
|
"github.com/golang/protobuf/ptypes/empty"
|
2023-03-17 18:52:56 +00:00
|
|
|
pb "github.com/prysmaticlabs/prysm/v4/proto/prysm/v1alpha1/validator-client"
|
|
|
|
"github.com/prysmaticlabs/prysm/v4/testing/require"
|
|
|
|
"github.com/prysmaticlabs/prysm/v4/validator/accounts"
|
|
|
|
"github.com/prysmaticlabs/prysm/v4/validator/db/kv"
|
|
|
|
"github.com/prysmaticlabs/prysm/v4/validator/keymanager"
|
|
|
|
"github.com/prysmaticlabs/prysm/v4/validator/slashing-protection-history/format"
|
|
|
|
mocks "github.com/prysmaticlabs/prysm/v4/validator/testing"
|
2021-04-09 19:13:59 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestImportSlashingProtection_Preconditions(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
localWalletDir := setupWalletDir(t)
|
|
|
|
defaultWalletPath = localWalletDir
|
|
|
|
|
|
|
|
// Empty JSON.
|
|
|
|
req := &pb.ImportSlashingProtectionRequest{
|
|
|
|
SlashingProtectionJson: "",
|
|
|
|
}
|
|
|
|
s := &Server{
|
|
|
|
walletDir: defaultWalletPath,
|
|
|
|
}
|
|
|
|
|
|
|
|
// No validator DB provided.
|
|
|
|
_, err := s.ImportSlashingProtection(ctx, req)
|
|
|
|
require.ErrorContains(t, "err finding validator database at path", err)
|
|
|
|
|
|
|
|
// Create Wallet and add to server for more realistic testing.
|
2022-09-02 14:56:47 +00:00
|
|
|
opts := []accounts.Option{
|
|
|
|
accounts.WithWalletDir(defaultWalletPath),
|
|
|
|
accounts.WithKeymanagerType(keymanager.Local),
|
|
|
|
accounts.WithWalletPassword(strongPass),
|
|
|
|
accounts.WithSkipMnemonicConfirm(true),
|
|
|
|
}
|
|
|
|
acc, err := accounts.NewCLIManager(opts...)
|
|
|
|
require.NoError(t, err)
|
|
|
|
w, err := acc.WalletCreate(ctx)
|
2021-04-09 19:13:59 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
s.wallet = w
|
|
|
|
|
|
|
|
numValidators := 1
|
|
|
|
// Create public keys for the mock validator DB.
|
|
|
|
pubKeys, err := mocks.CreateRandomPubKeys(numValidators)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// Create a validator database.
|
|
|
|
validatorDB, err := kv.NewKVStore(ctx, defaultWalletPath, &kv.Config{
|
|
|
|
PubKeys: pubKeys,
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
s.valDB = validatorDB
|
|
|
|
|
|
|
|
// Have to close it after import is done otherwise it complains db is not open.
|
|
|
|
defer func() {
|
|
|
|
require.NoError(t, validatorDB.Close())
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Test empty JSON.
|
|
|
|
_, err = s.ImportSlashingProtection(ctx, req)
|
|
|
|
require.ErrorContains(t, "empty slashing_protection json specified", err)
|
|
|
|
|
|
|
|
// Generate mock slashing history.
|
|
|
|
attestingHistory := make([][]*kv.AttestationRecord, 0)
|
|
|
|
proposalHistory := make([]kv.ProposalHistoryForPubkey, len(pubKeys))
|
|
|
|
for i := 0; i < len(pubKeys); i++ {
|
|
|
|
proposalHistory[i].Proposals = make([]kv.Proposal, 0)
|
|
|
|
}
|
|
|
|
mockJSON, err := mocks.MockSlashingProtectionJSON(pubKeys, attestingHistory, proposalHistory)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// JSON encode the protection JSON and save it in rpc req.
|
|
|
|
encoded, err := json.Marshal(mockJSON)
|
|
|
|
require.NoError(t, err)
|
|
|
|
req.SlashingProtectionJson = string(encoded)
|
|
|
|
|
|
|
|
_, err = s.ImportSlashingProtection(ctx, req)
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestExportSlashingProtection_Preconditions(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
localWalletDir := setupWalletDir(t)
|
|
|
|
defaultWalletPath = localWalletDir
|
|
|
|
|
|
|
|
s := &Server{
|
|
|
|
walletDir: defaultWalletPath,
|
|
|
|
}
|
|
|
|
// No validator DB provided.
|
|
|
|
_, err := s.ExportSlashingProtection(ctx, &empty.Empty{})
|
|
|
|
require.ErrorContains(t, "err finding validator database at path", err)
|
|
|
|
|
|
|
|
numValidators := 10
|
|
|
|
// Create public keys for the mock validator DB.
|
|
|
|
pubKeys, err := mocks.CreateRandomPubKeys(numValidators)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// We create a validator database.
|
|
|
|
validatorDB, err := kv.NewKVStore(ctx, defaultWalletPath, &kv.Config{
|
|
|
|
PubKeys: pubKeys,
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
s.valDB = validatorDB
|
|
|
|
|
|
|
|
// Have to close it after export is done otherwise it complains db is not open.
|
|
|
|
defer func() {
|
|
|
|
require.NoError(t, validatorDB.Close())
|
|
|
|
}()
|
2021-11-03 14:16:57 +00:00
|
|
|
genesisValidatorsRoot := [32]byte{1}
|
|
|
|
err = validatorDB.SaveGenesisValidatorsRoot(ctx, genesisValidatorsRoot[:])
|
|
|
|
require.NoError(t, err)
|
2021-04-09 19:13:59 +00:00
|
|
|
|
|
|
|
_, err = s.ExportSlashingProtection(ctx, &empty.Empty{})
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestImportExportSlashingProtection_RoundTrip(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
localWalletDir := setupWalletDir(t)
|
|
|
|
defaultWalletPath = localWalletDir
|
|
|
|
|
|
|
|
s := &Server{
|
|
|
|
walletDir: defaultWalletPath,
|
|
|
|
}
|
|
|
|
|
|
|
|
numValidators := 10
|
|
|
|
// Create public keys for the mock validator DB.
|
|
|
|
pubKeys, err := mocks.CreateRandomPubKeys(numValidators)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// Create a validator database.
|
|
|
|
validatorDB, err := kv.NewKVStore(ctx, defaultWalletPath, &kv.Config{
|
|
|
|
PubKeys: pubKeys,
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
s.valDB = validatorDB
|
|
|
|
|
|
|
|
// Have to close it after import is done otherwise it complains db is not open.
|
|
|
|
defer func() {
|
|
|
|
require.NoError(t, validatorDB.Close())
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Generate mock slashing history.
|
|
|
|
attestingHistory := make([][]*kv.AttestationRecord, 0)
|
|
|
|
proposalHistory := make([]kv.ProposalHistoryForPubkey, len(pubKeys))
|
|
|
|
for i := 0; i < len(pubKeys); i++ {
|
|
|
|
proposalHistory[i].Proposals = make([]kv.Proposal, 0)
|
|
|
|
}
|
|
|
|
mockJSON, err := mocks.MockSlashingProtectionJSON(pubKeys, attestingHistory, proposalHistory)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// JSON encode the protection JSON and save it in rpc req.
|
|
|
|
encoded, err := json.Marshal(mockJSON)
|
|
|
|
require.NoError(t, err)
|
|
|
|
req := &pb.ImportSlashingProtectionRequest{
|
|
|
|
SlashingProtectionJson: string(encoded),
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = s.ImportSlashingProtection(ctx, req)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
reqE, err := s.ExportSlashingProtection(ctx, &empty.Empty{})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// Attempt to read the exported data and convert from string to EIP-3076.
|
|
|
|
enc := []byte(reqE.File)
|
|
|
|
|
|
|
|
receivedJSON := &format.EIPSlashingProtectionFormat{}
|
|
|
|
err = json.Unmarshal(enc, receivedJSON)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
require.DeepEqual(t, mockJSON.Metadata, receivedJSON.Metadata)
|
|
|
|
}
|