package sync import ( "bytes" "context" "math/rand" "reflect" "testing" "time" lru "github.com/hashicorp/golang-lru" pubsub "github.com/libp2p/go-libp2p-pubsub" pubsubpb "github.com/libp2p/go-libp2p-pubsub/pb" ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1" mock "github.com/prysmaticlabs/prysm/beacon-chain/blockchain/testing" "github.com/prysmaticlabs/prysm/beacon-chain/core/helpers" "github.com/prysmaticlabs/prysm/beacon-chain/p2p" p2ptest "github.com/prysmaticlabs/prysm/beacon-chain/p2p/testing" stateTrie "github.com/prysmaticlabs/prysm/beacon-chain/state" mockSync "github.com/prysmaticlabs/prysm/beacon-chain/sync/initial-sync/testing" "github.com/prysmaticlabs/prysm/shared/bls" "github.com/prysmaticlabs/prysm/shared/params" "github.com/prysmaticlabs/prysm/shared/testutil" ) func setupValidAttesterSlashing(t *testing.T) (*ethpb.AttesterSlashing, *stateTrie.BeaconState) { state, privKeys := testutil.DeterministicGenesisState(t, 5) vals := state.Validators() for _, vv := range vals { vv.WithdrawableEpoch = 1 * params.BeaconConfig().SlotsPerEpoch } if err := state.SetValidators(vals); err != nil { t.Fatal(err) } att1 := ðpb.IndexedAttestation{ Data: ðpb.AttestationData{ Source: ðpb.Checkpoint{Epoch: 1}, Target: ðpb.Checkpoint{Epoch: 0}, }, AttestingIndices: []uint64{0, 1}, } domain, err := helpers.Domain(state.Fork(), 0, params.BeaconConfig().DomainBeaconAttester, state.GenesisValidatorRoot()) if err != nil { t.Fatal(err) } hashTreeRoot, err := helpers.ComputeSigningRoot(att1.Data, domain) if err != nil { t.Error(err) } sig0 := privKeys[0].Sign(hashTreeRoot[:]) sig1 := privKeys[1].Sign(hashTreeRoot[:]) aggregateSig := bls.AggregateSignatures([]bls.Signature{sig0, sig1}) att1.Signature = aggregateSig.Marshal()[:] att2 := ðpb.IndexedAttestation{ Data: ðpb.AttestationData{ Source: ðpb.Checkpoint{Epoch: 0}, Target: ðpb.Checkpoint{Epoch: 0}, }, AttestingIndices: []uint64{0, 1}, } hashTreeRoot, err = helpers.ComputeSigningRoot(att2.Data, domain) if err != nil { t.Error(err) } sig0 = privKeys[0].Sign(hashTreeRoot[:]) sig1 = privKeys[1].Sign(hashTreeRoot[:]) aggregateSig = bls.AggregateSignatures([]bls.Signature{sig0, sig1}) att2.Signature = aggregateSig.Marshal()[:] slashing := ðpb.AttesterSlashing{ Attestation_1: att1, Attestation_2: att2, } currentSlot := 2 * params.BeaconConfig().SlotsPerEpoch if err := state.SetSlot(currentSlot); err != nil { t.Fatal(err) } b := make([]byte, 32) if _, err := rand.Read(b); err != nil { t.Fatal(err) } return slashing, state } func TestValidateAttesterSlashing_ValidSlashing(t *testing.T) { p := p2ptest.NewTestP2P(t) ctx := context.Background() slashing, s := setupValidAttesterSlashing(t) c, err := lru.New(10) if err != nil { t.Fatal(err) } r := &Service{ p2p: p, chain: &mock.ChainService{State: s}, initialSync: &mockSync.Sync{IsSyncing: false}, seenAttesterSlashingCache: c, } buf := new(bytes.Buffer) if _, err := p.Encoding().EncodeGossip(buf, slashing); err != nil { t.Fatal(err) } msg := &pubsub.Message{ Message: &pubsubpb.Message{ Data: buf.Bytes(), TopicIDs: []string{ p2p.GossipTypeMapping[reflect.TypeOf(slashing)], }, }, } valid := r.validateAttesterSlashing(ctx, "foobar", msg) == pubsub.ValidationAccept if !valid { t.Error("Failed Validation") } if msg.ValidatorData == nil { t.Error("Decoded message was not set on the message validator data") } } func TestValidateAttesterSlashing_ContextTimeout(t *testing.T) { p := p2ptest.NewTestP2P(t) slashing, state := setupValidAttesterSlashing(t) slashing.Attestation_1.Data.Target.Epoch = 100000000 ctx, cancel := context.WithTimeout(context.Background(), 100*time.Millisecond) defer cancel() c, err := lru.New(10) if err != nil { t.Fatal(err) } r := &Service{ p2p: p, chain: &mock.ChainService{State: state}, initialSync: &mockSync.Sync{IsSyncing: false}, seenAttesterSlashingCache: c, } buf := new(bytes.Buffer) if _, err := p.Encoding().EncodeGossip(buf, slashing); err != nil { t.Fatal(err) } msg := &pubsub.Message{ Message: &pubsubpb.Message{ Data: buf.Bytes(), TopicIDs: []string{ p2p.GossipTypeMapping[reflect.TypeOf(slashing)], }, }, } valid := r.validateAttesterSlashing(ctx, "", msg) == pubsub.ValidationAccept if valid { t.Error("slashing from the far distant future should have timed out and returned false") } } func TestValidateAttesterSlashing_Syncing(t *testing.T) { p := p2ptest.NewTestP2P(t) ctx := context.Background() slashing, s := setupValidAttesterSlashing(t) r := &Service{ p2p: p, chain: &mock.ChainService{State: s}, initialSync: &mockSync.Sync{IsSyncing: true}, } buf := new(bytes.Buffer) if _, err := p.Encoding().EncodeGossip(buf, slashing); err != nil { t.Fatal(err) } msg := &pubsub.Message{ Message: &pubsubpb.Message{ Data: buf.Bytes(), TopicIDs: []string{ p2p.GossipTypeMapping[reflect.TypeOf(slashing)], }, }, } valid := r.validateAttesterSlashing(ctx, "", msg) == pubsub.ValidationAccept if valid { t.Error("Passed validation") } }