package sync import ( "bytes" "context" "fmt" "testing" "time" lru "github.com/hashicorp/golang-lru" pubsub "github.com/libp2p/go-libp2p-pubsub" pubsubpb "github.com/libp2p/go-libp2p-pubsub/pb" ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1" "github.com/prysmaticlabs/go-bitfield" mockChain "github.com/prysmaticlabs/prysm/beacon-chain/blockchain/testing" "github.com/prysmaticlabs/prysm/beacon-chain/core/helpers" dbtest "github.com/prysmaticlabs/prysm/beacon-chain/db/testing" p2ptest "github.com/prysmaticlabs/prysm/beacon-chain/p2p/testing" mockSync "github.com/prysmaticlabs/prysm/beacon-chain/sync/initial-sync/testing" "github.com/prysmaticlabs/prysm/shared/bytesutil" "github.com/prysmaticlabs/prysm/shared/params" "github.com/prysmaticlabs/prysm/shared/testutil" "github.com/prysmaticlabs/prysm/shared/testutil/require" ) func TestService_validateCommitteeIndexBeaconAttestation(t *testing.T) { ctx := context.Background() p := p2ptest.NewTestP2P(t) db := dbtest.SetupDB(t) chain := &mockChain.ChainService{ // 1 slot ago. Genesis: time.Now().Add(time.Duration(-1*int64(params.BeaconConfig().SecondsPerSlot)) * time.Second), ValidatorsRoot: [32]byte{'A'}, ValidAttestation: true, } c, err := lru.New(10) require.NoError(t, err) s := &Service{ initialSync: &mockSync.Sync{IsSyncing: false}, p2p: p, db: db, chain: chain, blkRootToPendingAtts: make(map[[32]byte][]*ethpb.SignedAggregateAttestationAndProof), seenAttestationCache: c, } err = s.initCaches() require.NoError(t, err) invalidRoot := [32]byte{'A', 'B', 'C', 'D'} s.setBadBlock(ctx, invalidRoot) digest, err := s.forkDigest() require.NoError(t, err) blk := testutil.NewBeaconBlock() blk.Block.Slot = 1 require.NoError(t, db.SaveBlock(ctx, blk)) validBlockRoot, err := blk.Block.HashTreeRoot() require.NoError(t, err) chain.FinalizedCheckPoint = ðpb.Checkpoint{ Root: validBlockRoot[:], Epoch: 0, } validators := uint64(64) savedState, keys := testutil.DeterministicGenesisState(t, validators) require.NoError(t, savedState.SetSlot(1)) require.NoError(t, db.SaveState(context.Background(), savedState, validBlockRoot)) chain.State = savedState tests := []struct { name string msg *ethpb.Attestation topic string validAttestationSignature bool want bool }{ { name: "valid attestation signature", msg: ðpb.Attestation{ AggregationBits: bitfield.Bitlist{0b101}, Data: ðpb.AttestationData{ BeaconBlockRoot: validBlockRoot[:], CommitteeIndex: 0, Slot: 1, Target: ðpb.Checkpoint{ Epoch: 0, Root: validBlockRoot[:], }, Source: ðpb.Checkpoint{Root: make([]byte, 32)}, }, }, topic: fmt.Sprintf("/eth2/%x/beacon_attestation_1", digest), validAttestationSignature: true, want: true, }, { name: "valid attestation signature with nil topic", msg: ðpb.Attestation{ AggregationBits: bitfield.Bitlist{0b101}, Data: ðpb.AttestationData{ BeaconBlockRoot: validBlockRoot[:], CommitteeIndex: 0, Slot: 1, Target: ðpb.Checkpoint{ Epoch: 0, Root: validBlockRoot[:], }, Source: ðpb.Checkpoint{Root: make([]byte, 32)}, }, }, topic: "", validAttestationSignature: true, want: false, }, { name: "bad target epoch", msg: ðpb.Attestation{ AggregationBits: bitfield.Bitlist{0b101}, Data: ðpb.AttestationData{ BeaconBlockRoot: validBlockRoot[:], CommitteeIndex: 0, Slot: 1, Target: ðpb.Checkpoint{ Epoch: 10, Root: validBlockRoot[:], }, Source: ðpb.Checkpoint{Root: make([]byte, 32)}, }, }, topic: fmt.Sprintf("/eth2/%x/beacon_attestation_1", digest), validAttestationSignature: true, want: false, }, { name: "already seen", msg: ðpb.Attestation{ AggregationBits: bitfield.Bitlist{0b101}, Data: ðpb.AttestationData{ BeaconBlockRoot: validBlockRoot[:], CommitteeIndex: 0, Slot: 1, Target: ðpb.Checkpoint{Root: make([]byte, 32)}, Source: ðpb.Checkpoint{Root: make([]byte, 32)}, }, }, topic: fmt.Sprintf("/eth2/%x/beacon_attestation_1", digest), validAttestationSignature: true, want: false, }, { name: "invalid beacon block", msg: ðpb.Attestation{ AggregationBits: bitfield.Bitlist{0b101}, Data: ðpb.AttestationData{ BeaconBlockRoot: invalidRoot[:], CommitteeIndex: 0, Slot: 1, Target: ðpb.Checkpoint{Root: make([]byte, 32)}, Source: ðpb.Checkpoint{Root: make([]byte, 32)}, }, }, topic: fmt.Sprintf("/eth2/%x/beacon_attestation_1", digest), validAttestationSignature: true, want: false, }, { name: "committee index exceeds committee length", msg: ðpb.Attestation{ AggregationBits: bitfield.Bitlist{0b101}, Data: ðpb.AttestationData{ BeaconBlockRoot: validBlockRoot[:], CommitteeIndex: 4, Slot: 1, Target: ðpb.Checkpoint{Root: make([]byte, 32)}, Source: ðpb.Checkpoint{Root: make([]byte, 32)}, }, }, topic: fmt.Sprintf("/eth2/%x/beacon_attestation_2", digest), validAttestationSignature: true, want: false, }, { name: "wrong committee index", msg: ðpb.Attestation{ AggregationBits: bitfield.Bitlist{0b101}, Data: ðpb.AttestationData{ BeaconBlockRoot: validBlockRoot[:], CommitteeIndex: 2, Slot: 1, Target: ðpb.Checkpoint{Root: make([]byte, 32)}, Source: ðpb.Checkpoint{Root: make([]byte, 32)}, }, }, topic: fmt.Sprintf("/eth2/%x/beacon_attestation_2", digest), validAttestationSignature: true, want: false, }, { name: "already aggregated", msg: ðpb.Attestation{ AggregationBits: bitfield.Bitlist{0b1011}, Data: ðpb.AttestationData{ BeaconBlockRoot: validBlockRoot[:], CommitteeIndex: 1, Slot: 1, Target: ðpb.Checkpoint{Root: make([]byte, 32)}, Source: ðpb.Checkpoint{Root: make([]byte, 32)}, }, }, topic: fmt.Sprintf("/eth2/%x/beacon_attestation_1", digest), validAttestationSignature: true, want: false, }, { name: "missing block", msg: ðpb.Attestation{ AggregationBits: bitfield.Bitlist{0b101}, Data: ðpb.AttestationData{ BeaconBlockRoot: bytesutil.PadTo([]byte("missing"), 32), CommitteeIndex: 1, Slot: 1, Target: ðpb.Checkpoint{Root: make([]byte, 32)}, Source: ðpb.Checkpoint{Root: make([]byte, 32)}, }, }, topic: fmt.Sprintf("/eth2/%x/beacon_attestation_1", digest), validAttestationSignature: true, want: false, }, { name: "invalid attestation", msg: ðpb.Attestation{ AggregationBits: bitfield.Bitlist{0b101}, Data: ðpb.AttestationData{ BeaconBlockRoot: validBlockRoot[:], CommitteeIndex: 1, Slot: 1, Target: ðpb.Checkpoint{Root: make([]byte, 32)}, Source: ðpb.Checkpoint{Root: make([]byte, 32)}, }, }, topic: fmt.Sprintf("/eth2/%x/beacon_attestation_1", digest), validAttestationSignature: false, want: false, }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { helpers.ClearCache() chain.ValidAttestation = tt.validAttestationSignature if tt.validAttestationSignature { com, err := helpers.BeaconCommitteeFromState(savedState, tt.msg.Data.Slot, tt.msg.Data.CommitteeIndex) require.NoError(t, err) domain, err := helpers.Domain(savedState.Fork(), tt.msg.Data.Target.Epoch, params.BeaconConfig().DomainBeaconAttester, savedState.GenesisValidatorRoot()) require.NoError(t, err) attRoot, err := helpers.ComputeSigningRoot(tt.msg.Data, domain) require.NoError(t, err) for i := 0; ; i++ { if tt.msg.AggregationBits.BitAt(uint64(i)) { tt.msg.Signature = keys[com[i]].Sign(attRoot[:]).Marshal() break } } } else { tt.msg.Signature = make([]byte, 96) } buf := new(bytes.Buffer) _, err := p.Encoding().EncodeGossip(buf, tt.msg) require.NoError(t, err) m := &pubsub.Message{ Message: &pubsubpb.Message{ Data: buf.Bytes(), Topic: &tt.topic, }, } if tt.topic == "" { m.Message.Topic = nil } received := s.validateCommitteeIndexBeaconAttestation(ctx, "" /*peerID*/, m) == pubsub.ValidationAccept if received != tt.want { t.Fatalf("Did not received wanted validation. Got %v, wanted %v", !tt.want, tt.want) } if tt.want && m.ValidatorData == nil { t.Error("Expected validator data to be set") } }) } }