package blockchain import ( "context" "strings" "testing" "github.com/gogo/protobuf/proto" ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1" "github.com/prysmaticlabs/prysm/beacon-chain/cache" "github.com/prysmaticlabs/prysm/beacon-chain/core/helpers" "github.com/prysmaticlabs/prysm/beacon-chain/core/state" testDB "github.com/prysmaticlabs/prysm/beacon-chain/db/testing" "github.com/prysmaticlabs/prysm/beacon-chain/forkchoice/protoarray" "github.com/prysmaticlabs/prysm/beacon-chain/state/stategen" pb "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1" "github.com/prysmaticlabs/prysm/shared/bytesutil" "github.com/prysmaticlabs/prysm/shared/featureconfig" "github.com/prysmaticlabs/prysm/shared/params" "github.com/prysmaticlabs/prysm/shared/testutil" "github.com/prysmaticlabs/prysm/shared/testutil/assert" "github.com/prysmaticlabs/prysm/shared/testutil/require" ) func TestStore_OnAttestation(t *testing.T) { ctx := context.Background() db, sc := testDB.SetupDB(t) cfg := &Config{ BeaconDB: db, ForkChoiceStore: protoarray.New(0, 0, [32]byte{}), StateGen: stategen.New(db, sc), } service, err := NewService(ctx, cfg) require.NoError(t, err) _, err = blockTree1(db, []byte{'g'}) require.NoError(t, err) BlkWithOutState := testutil.NewBeaconBlock() BlkWithOutState.Block.Slot = 0 require.NoError(t, db.SaveBlock(ctx, BlkWithOutState)) BlkWithOutStateRoot, err := BlkWithOutState.Block.HashTreeRoot() require.NoError(t, err) BlkWithStateBadAtt := testutil.NewBeaconBlock() BlkWithStateBadAtt.Block.Slot = 1 require.NoError(t, db.SaveBlock(ctx, BlkWithStateBadAtt)) BlkWithStateBadAttRoot, err := BlkWithStateBadAtt.Block.HashTreeRoot() require.NoError(t, err) s := testutil.NewBeaconState() require.NoError(t, s.SetSlot(100*params.BeaconConfig().SlotsPerEpoch)) require.NoError(t, service.beaconDB.SaveState(ctx, s, BlkWithStateBadAttRoot)) BlkWithValidState := testutil.NewBeaconBlock() BlkWithValidState.Block.Slot = 2 require.NoError(t, db.SaveBlock(ctx, BlkWithValidState)) BlkWithValidStateRoot, err := BlkWithValidState.Block.HashTreeRoot() require.NoError(t, err) s = testutil.NewBeaconState() err = s.SetFork(&pb.Fork{ Epoch: 0, CurrentVersion: params.BeaconConfig().GenesisForkVersion, PreviousVersion: params.BeaconConfig().GenesisForkVersion, }) require.NoError(t, err) require.NoError(t, service.beaconDB.SaveState(ctx, s, BlkWithValidStateRoot)) tests := []struct { name string a *ethpb.Attestation wantErr bool wantErrString string }{ { name: "attestation's data slot not aligned with target vote", a: ðpb.Attestation{Data: ðpb.AttestationData{Slot: params.BeaconConfig().SlotsPerEpoch, Target: ðpb.Checkpoint{Root: make([]byte, 32)}}}, wantErr: true, wantErrString: "data slot is not in the same epoch as target 1 != 0", }, { name: "attestation's target root not in db", a: ðpb.Attestation{Data: ðpb.AttestationData{Target: ðpb.Checkpoint{Root: bytesutil.PadTo([]byte{'A'}, 32)}}}, wantErr: true, wantErrString: "target root does not exist in db", }, { name: "no pre state for attestations's target block", a: ðpb.Attestation{Data: ðpb.AttestationData{Target: ðpb.Checkpoint{Root: BlkWithOutStateRoot[:]}}}, wantErr: true, wantErrString: "could not get pre state for epoch 0", }, { name: "process attestation doesn't match current epoch", a: ðpb.Attestation{Data: ðpb.AttestationData{Slot: 100 * params.BeaconConfig().SlotsPerEpoch, Target: ðpb.Checkpoint{Epoch: 100, Root: BlkWithStateBadAttRoot[:]}}}, wantErr: true, wantErrString: "target epoch 100 does not match current epoch", }, { name: "process nil attestation", a: nil, wantErr: true, wantErrString: "nil attestation", }, { name: "process nil field (a.Data) in attestation", a: ðpb.Attestation{}, wantErr: true, wantErrString: "nil attestation.Data field", }, { name: "process nil field (a.Target) in attestation", a: ðpb.Attestation{ Data: ðpb.AttestationData{ BeaconBlockRoot: make([]byte, 32), Target: nil, Source: ðpb.Checkpoint{Root: make([]byte, 32)}, }, AggregationBits: make([]byte, 1), Signature: make([]byte, 96), }, wantErr: true, wantErrString: "nil attestation.Data.Target field", }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { _, err := service.onAttestation(ctx, tt.a) if tt.wantErr { if err == nil || !strings.Contains(err.Error(), tt.wantErrString) { t.Errorf("Store.onAttestation() error = %v, wantErr = %v", err, tt.wantErrString) } } else { t.Error(err) } }) } } func TestStore_OnAttestationUsingCheckptCache(t *testing.T) { resetCfg := featureconfig.InitWithReset(&featureconfig.Flags{UseCheckPointInfoCache: true}) defer resetCfg() ctx := context.Background() db, sc := testDB.SetupDB(t) cfg := &Config{ BeaconDB: db, ForkChoiceStore: protoarray.New(0, 0, [32]byte{}), StateGen: stategen.New(db, sc), } service, err := NewService(ctx, cfg) require.NoError(t, err) _, err = blockTree1(db, []byte{'g'}) require.NoError(t, err) BlkWithOutState := testutil.NewBeaconBlock() BlkWithOutState.Block.Slot = 0 require.NoError(t, db.SaveBlock(ctx, BlkWithOutState)) BlkWithOutStateRoot, err := BlkWithOutState.Block.HashTreeRoot() require.NoError(t, err) BlkWithStateBadAtt := testutil.NewBeaconBlock() BlkWithStateBadAtt.Block.Slot = 1 require.NoError(t, db.SaveBlock(ctx, BlkWithStateBadAtt)) BlkWithStateBadAttRoot, err := BlkWithStateBadAtt.Block.HashTreeRoot() require.NoError(t, err) s := testutil.NewBeaconState() require.NoError(t, s.SetSlot(100*params.BeaconConfig().SlotsPerEpoch)) require.NoError(t, service.beaconDB.SaveState(ctx, s, BlkWithStateBadAttRoot)) BlkWithValidState := testutil.NewBeaconBlock() BlkWithValidState.Block.Slot = 2 require.NoError(t, db.SaveBlock(ctx, BlkWithValidState)) BlkWithValidStateRoot, err := BlkWithValidState.Block.HashTreeRoot() require.NoError(t, err) s = testutil.NewBeaconState() err = s.SetFork(&pb.Fork{ Epoch: 0, CurrentVersion: params.BeaconConfig().GenesisForkVersion, PreviousVersion: params.BeaconConfig().GenesisForkVersion, }) require.NoError(t, err) require.NoError(t, service.beaconDB.SaveState(ctx, s, BlkWithValidStateRoot)) tests := []struct { name string a *ethpb.Attestation wantErr bool wantErrString string }{ { name: "attestation's data slot not aligned with target vote", a: ðpb.Attestation{Data: ðpb.AttestationData{Slot: params.BeaconConfig().SlotsPerEpoch, Target: ðpb.Checkpoint{Root: make([]byte, 32)}}}, wantErr: true, wantErrString: "data slot is not in the same epoch as target 1 != 0", }, { name: "attestation's target root not in db", a: ðpb.Attestation{Data: ðpb.AttestationData{Target: ðpb.Checkpoint{Root: bytesutil.PadTo([]byte{'A'}, 32)}}}, wantErr: true, wantErrString: "target root does not exist in db", }, { name: "no pre state for attestations's target block", a: ðpb.Attestation{Data: ðpb.AttestationData{Target: ðpb.Checkpoint{Root: BlkWithOutStateRoot[:]}}}, wantErr: true, wantErrString: "could not get pre state for epoch 0", }, { name: "process attestation doesn't match current epoch", a: ðpb.Attestation{Data: ðpb.AttestationData{Slot: 100 * params.BeaconConfig().SlotsPerEpoch, Target: ðpb.Checkpoint{Epoch: 100, Root: BlkWithStateBadAttRoot[:]}}}, wantErr: true, wantErrString: "target epoch 100 does not match current epoch", }, { name: "process nil attestation", a: nil, wantErr: true, wantErrString: "nil attestation", }, { name: "process nil field (a.Data) in attestation", a: ðpb.Attestation{}, wantErr: true, wantErrString: "nil attestation.Data field", }, { name: "process nil field (a.Target) in attestation", a: ðpb.Attestation{ Data: ðpb.AttestationData{ BeaconBlockRoot: make([]byte, 32), Target: nil, Source: ðpb.Checkpoint{Root: make([]byte, 32)}, }, AggregationBits: make([]byte, 1), Signature: make([]byte, 96), }, wantErr: true, wantErrString: "nil attestation.Data.Target field", }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { _, err := service.onAttestation(ctx, tt.a) if tt.wantErr { if err == nil || !strings.Contains(err.Error(), tt.wantErrString) { t.Errorf("Store.onAttestation() error = %v, wantErr = %v", err, tt.wantErrString) } } else { t.Error(err) } }) } } func TestStore_SaveCheckpointState(t *testing.T) { ctx := context.Background() db, sc := testDB.SetupDB(t) cfg := &Config{ BeaconDB: db, StateGen: stategen.New(db, sc), } service, err := NewService(ctx, cfg) require.NoError(t, err) s := testutil.NewBeaconState() err = s.SetFinalizedCheckpoint(ðpb.Checkpoint{Root: bytesutil.PadTo([]byte{'A'}, 32)}) require.NoError(t, err) val := ðpb.Validator{ PublicKey: bytesutil.PadTo([]byte("foo"), 48), WithdrawalCredentials: bytesutil.PadTo([]byte("bar"), 32), } err = s.SetValidators([]*ethpb.Validator{val}) require.NoError(t, err) err = s.SetBalances([]uint64{0}) require.NoError(t, err) r := [32]byte{'g'} require.NoError(t, service.beaconDB.SaveState(ctx, s, r)) service.justifiedCheckpt = ðpb.Checkpoint{Root: r[:]} service.bestJustifiedCheckpt = ðpb.Checkpoint{Root: r[:]} service.finalizedCheckpt = ðpb.Checkpoint{Root: r[:]} service.prevFinalizedCheckpt = ðpb.Checkpoint{Root: r[:]} r = bytesutil.ToBytes32([]byte{'A'}) cp1 := ðpb.Checkpoint{Epoch: 1, Root: bytesutil.PadTo([]byte{'A'}, 32)} require.NoError(t, service.beaconDB.SaveState(ctx, s, bytesutil.ToBytes32([]byte{'A'}))) require.NoError(t, service.beaconDB.SaveStateSummary(ctx, &pb.StateSummary{Root: bytesutil.PadTo([]byte{'A'}, 32)})) s1, err := service.getAttPreState(ctx, cp1) require.NoError(t, err) assert.Equal(t, 1*params.BeaconConfig().SlotsPerEpoch, s1.Slot(), "Unexpected state slot") cp2 := ðpb.Checkpoint{Epoch: 2, Root: bytesutil.PadTo([]byte{'B'}, 32)} require.NoError(t, service.beaconDB.SaveState(ctx, s, bytesutil.ToBytes32([]byte{'B'}))) require.NoError(t, service.beaconDB.SaveStateSummary(ctx, &pb.StateSummary{Root: bytesutil.PadTo([]byte{'B'}, 32)})) s2, err := service.getAttPreState(ctx, cp2) require.NoError(t, err) assert.Equal(t, 2*params.BeaconConfig().SlotsPerEpoch, s2.Slot(), "Unexpected state slot") s1, err = service.getAttPreState(ctx, cp1) require.NoError(t, err) assert.Equal(t, 1*params.BeaconConfig().SlotsPerEpoch, s1.Slot(), "Unexpected state slot") s1, err = service.checkpointState.StateByCheckpoint(cp1) require.NoError(t, err) assert.Equal(t, 1*params.BeaconConfig().SlotsPerEpoch, s1.Slot(), "Unexpected state slot") s2, err = service.checkpointState.StateByCheckpoint(cp2) require.NoError(t, err) assert.Equal(t, 2*params.BeaconConfig().SlotsPerEpoch, s2.Slot(), "Unexpected state slot") require.NoError(t, s.SetSlot(params.BeaconConfig().SlotsPerEpoch+1)) service.justifiedCheckpt = ðpb.Checkpoint{Root: r[:]} service.bestJustifiedCheckpt = ðpb.Checkpoint{Root: r[:]} service.finalizedCheckpt = ðpb.Checkpoint{Root: r[:]} service.prevFinalizedCheckpt = ðpb.Checkpoint{Root: r[:]} cp3 := ðpb.Checkpoint{Epoch: 1, Root: bytesutil.PadTo([]byte{'C'}, 32)} require.NoError(t, service.beaconDB.SaveState(ctx, s, bytesutil.ToBytes32([]byte{'C'}))) require.NoError(t, service.beaconDB.SaveStateSummary(ctx, &pb.StateSummary{Root: bytesutil.PadTo([]byte{'C'}, 32)})) s3, err := service.getAttPreState(ctx, cp3) require.NoError(t, err) assert.Equal(t, s.Slot(), s3.Slot(), "Unexpected state slot") } func TestStore_UpdateCheckpointState(t *testing.T) { ctx := context.Background() db, sc := testDB.SetupDB(t) cfg := &Config{ BeaconDB: db, StateGen: stategen.New(db, sc), } service, err := NewService(ctx, cfg) require.NoError(t, err) epoch := uint64(1) baseState, _ := testutil.DeterministicGenesisState(t, 1) require.NoError(t, baseState.SetSlot(epoch*params.BeaconConfig().SlotsPerEpoch)) checkpoint := ðpb.Checkpoint{Epoch: epoch, Root: bytesutil.PadTo([]byte("hi"), 32)} require.NoError(t, service.beaconDB.SaveState(ctx, baseState, bytesutil.ToBytes32(checkpoint.Root))) returned, err := service.getAttPreState(ctx, checkpoint) require.NoError(t, err) assert.Equal(t, returned.Slot(), baseState.Slot(), "Incorrectly returned base state") cached, err := service.checkpointState.StateByCheckpoint(checkpoint) require.NoError(t, err) assert.NotNil(t, cached, "State should have been cached") epoch = uint64(2) newCheckpoint := ðpb.Checkpoint{Epoch: epoch, Root: bytesutil.PadTo([]byte("bye"), 32)} require.NoError(t, service.beaconDB.SaveState(ctx, baseState, bytesutil.ToBytes32(newCheckpoint.Root))) returned, err = service.getAttPreState(ctx, newCheckpoint) require.NoError(t, err) s, err := helpers.StartSlot(newCheckpoint.Epoch) require.NoError(t, err) baseState, err = state.ProcessSlots(ctx, baseState, s) require.NoError(t, err) assert.Equal(t, returned.Slot(), baseState.Slot(), "Incorrectly returned base state") cached, err = service.checkpointState.StateByCheckpoint(newCheckpoint) require.NoError(t, err) if !proto.Equal(returned.InnerStateUnsafe(), cached.InnerStateUnsafe()) { t.Error("Incorrectly cached base state") } } func TestAttEpoch_MatchPrevEpoch(t *testing.T) { ctx := context.Background() db, _ := testDB.SetupDB(t) cfg := &Config{BeaconDB: db} service, err := NewService(ctx, cfg) require.NoError(t, err) nowTime := params.BeaconConfig().SlotsPerEpoch * params.BeaconConfig().SecondsPerSlot require.NoError(t, service.verifyAttTargetEpoch(ctx, 0, nowTime, ðpb.Checkpoint{Root: make([]byte, 32)})) } func TestAttEpoch_MatchCurrentEpoch(t *testing.T) { ctx := context.Background() db, _ := testDB.SetupDB(t) cfg := &Config{BeaconDB: db} service, err := NewService(ctx, cfg) require.NoError(t, err) nowTime := params.BeaconConfig().SlotsPerEpoch * params.BeaconConfig().SecondsPerSlot require.NoError(t, service.verifyAttTargetEpoch(ctx, 0, nowTime, ðpb.Checkpoint{Epoch: 1})) } func TestAttEpoch_NotMatch(t *testing.T) { ctx := context.Background() db, _ := testDB.SetupDB(t) cfg := &Config{BeaconDB: db} service, err := NewService(ctx, cfg) require.NoError(t, err) nowTime := 2 * params.BeaconConfig().SlotsPerEpoch * params.BeaconConfig().SecondsPerSlot err = service.verifyAttTargetEpoch(ctx, 0, nowTime, ðpb.Checkpoint{Root: make([]byte, 32)}) assert.ErrorContains(t, "target epoch 0 does not match current epoch 2 or prev epoch 1", err) } func TestVerifyBeaconBlock_NoBlock(t *testing.T) { ctx := context.Background() db, _ := testDB.SetupDB(t) cfg := &Config{BeaconDB: db} service, err := NewService(ctx, cfg) require.NoError(t, err) d := ðpb.AttestationData{ BeaconBlockRoot: make([]byte, 32), Target: ðpb.Checkpoint{Root: make([]byte, 32)}, Source: ðpb.Checkpoint{Root: make([]byte, 32)}, } assert.ErrorContains(t, "beacon block 0x000000000000 does not exist", service.verifyBeaconBlock(ctx, d)) } func TestVerifyBeaconBlock_futureBlock(t *testing.T) { ctx := context.Background() db, _ := testDB.SetupDB(t) cfg := &Config{BeaconDB: db} service, err := NewService(ctx, cfg) require.NoError(t, err) b := testutil.NewBeaconBlock() b.Block.Slot = 2 require.NoError(t, service.beaconDB.SaveBlock(ctx, b)) r, err := b.Block.HashTreeRoot() require.NoError(t, err) d := ðpb.AttestationData{Slot: 1, BeaconBlockRoot: r[:]} assert.ErrorContains(t, "could not process attestation for future block", service.verifyBeaconBlock(ctx, d)) } func TestVerifyBeaconBlock_OK(t *testing.T) { ctx := context.Background() db, _ := testDB.SetupDB(t) cfg := &Config{BeaconDB: db} service, err := NewService(ctx, cfg) require.NoError(t, err) b := testutil.NewBeaconBlock() b.Block.Slot = 2 require.NoError(t, service.beaconDB.SaveBlock(ctx, b)) r, err := b.Block.HashTreeRoot() require.NoError(t, err) d := ðpb.AttestationData{Slot: 2, BeaconBlockRoot: r[:]} assert.NoError(t, service.verifyBeaconBlock(ctx, d), "Did not receive the wanted error") } func TestVerifyLMDFFGConsistent_NotOK(t *testing.T) { ctx := context.Background() db, _ := testDB.SetupDB(t) cfg := &Config{BeaconDB: db, ForkChoiceStore: protoarray.New(0, 0, [32]byte{})} service, err := NewService(ctx, cfg) require.NoError(t, err) b32 := testutil.NewBeaconBlock() b32.Block.Slot = 32 require.NoError(t, service.beaconDB.SaveBlock(ctx, b32)) r32, err := b32.Block.HashTreeRoot() require.NoError(t, err) b33 := testutil.NewBeaconBlock() b33.Block.Slot = 33 b33.Block.ParentRoot = r32[:] require.NoError(t, service.beaconDB.SaveBlock(ctx, b33)) r33, err := b33.Block.HashTreeRoot() require.NoError(t, err) wanted := "FFG and LMD votes are not consistent" assert.ErrorContains(t, wanted, service.verifyLMDFFGConsistent(context.Background(), 1, []byte{'a'}, r33[:])) } func TestVerifyLMDFFGConsistent_OK(t *testing.T) { ctx := context.Background() db, _ := testDB.SetupDB(t) cfg := &Config{BeaconDB: db, ForkChoiceStore: protoarray.New(0, 0, [32]byte{})} service, err := NewService(ctx, cfg) require.NoError(t, err) b32 := testutil.NewBeaconBlock() b32.Block.Slot = 32 require.NoError(t, service.beaconDB.SaveBlock(ctx, b32)) r32, err := b32.Block.HashTreeRoot() require.NoError(t, err) b33 := testutil.NewBeaconBlock() b33.Block.Slot = 33 b33.Block.ParentRoot = r32[:] require.NoError(t, service.beaconDB.SaveBlock(ctx, b33)) r33, err := b33.Block.HashTreeRoot() require.NoError(t, err) err = service.verifyLMDFFGConsistent(context.Background(), 1, r32[:], r33[:]) assert.NoError(t, err, "Could not verify LMD and FFG votes to be consistent") } func TestGetAttCheckptInfo(t *testing.T) { ctx := context.Background() db, _ := testDB.SetupDB(t) cfg := &Config{BeaconDB: db, StateGen: stategen.New(db, cache.NewStateSummaryCache())} service, err := NewService(ctx, cfg) require.NoError(t, err) baseState, _ := testutil.DeterministicGenesisState(t, 128) b := testutil.NewBeaconBlock() r, err := b.Block.HashTreeRoot() require.NoError(t, err) require.NoError(t, service.beaconDB.SaveState(ctx, baseState, r)) require.NoError(t, service.beaconDB.SaveBlock(ctx, b)) require.NoError(t, service.beaconDB.SaveGenesisBlockRoot(ctx, r)) checkpoint := ðpb.Checkpoint{Root: r[:]} returned, err := service.getAttCheckPtInfo(ctx, checkpoint, 0) require.NoError(t, err) seed, err := helpers.Seed(baseState, 0, params.BeaconConfig().DomainBeaconAttester) require.NoError(t, err) indices, err := helpers.ActiveValidatorIndices(baseState, 0) require.NoError(t, err) validators := baseState.ValidatorsReadOnly() pks := make([][]byte, len(validators)) for i := 0; i < len(pks); i++ { pk := validators[i].PublicKey() pks[i] = pk[:] } wanted := &pb.CheckPtInfo{ Fork: baseState.Fork(), GenesisRoot: baseState.GenesisValidatorRoot(), Seed: seed[:], ActiveIndices: indices, PubKeys: pks, } require.DeepEqual(t, wanted, returned) cached, err := service.checkPtInfoCache.get(checkpoint) require.NoError(t, err) require.DeepEqual(t, wanted, cached) }