mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-26 05:17:22 +00:00
427 lines
15 KiB
Go
427 lines
15 KiB
Go
package sync
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/golang/snappy"
|
|
pubsub "github.com/libp2p/go-libp2p-pubsub"
|
|
pubsubpb "github.com/libp2p/go-libp2p-pubsub/pb"
|
|
"github.com/libp2p/go-libp2p/core/peer"
|
|
mockChain "github.com/prysmaticlabs/prysm/v3/beacon-chain/blockchain/testing"
|
|
"github.com/prysmaticlabs/prysm/v3/beacon-chain/core/signing"
|
|
testingdb "github.com/prysmaticlabs/prysm/v3/beacon-chain/db/testing"
|
|
doublylinkedtree "github.com/prysmaticlabs/prysm/v3/beacon-chain/forkchoice/doubly-linked-tree"
|
|
"github.com/prysmaticlabs/prysm/v3/beacon-chain/operations/blstoexec"
|
|
"github.com/prysmaticlabs/prysm/v3/beacon-chain/p2p"
|
|
"github.com/prysmaticlabs/prysm/v3/beacon-chain/p2p/encoder"
|
|
mockp2p "github.com/prysmaticlabs/prysm/v3/beacon-chain/p2p/testing"
|
|
"github.com/prysmaticlabs/prysm/v3/beacon-chain/state/stategen"
|
|
mockSync "github.com/prysmaticlabs/prysm/v3/beacon-chain/sync/initial-sync/testing"
|
|
"github.com/prysmaticlabs/prysm/v3/config/params"
|
|
ethpb "github.com/prysmaticlabs/prysm/v3/proto/prysm/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/v3/testing/assert"
|
|
"github.com/prysmaticlabs/prysm/v3/testing/util"
|
|
"github.com/prysmaticlabs/prysm/v3/time/slots"
|
|
)
|
|
|
|
func TestService_ValidateBlsToExecutionChange(t *testing.T) {
|
|
beaconDB := testingdb.SetupDB(t)
|
|
defaultTopic := p2p.BlsToExecutionChangeSubnetTopicFormat
|
|
fakeDigest := []byte{0xAB, 0x00, 0xCC, 0x9E}
|
|
wantedExecAddress := []byte{0xd8, 0xdA, 0x6B, 0xF2, 0x69, 0x64, 0xaF, 0x9D, 0x7e, 0xEd, 0x9e, 0x03, 0xE5, 0x34, 0x15, 0xD3, 0x7a, 0xA9, 0x60, 0x45}
|
|
defaultTopic = defaultTopic + "/" + encoder.ProtocolSuffixSSZSnappy
|
|
chainService := &mockChain.ChainService{
|
|
Genesis: time.Now(),
|
|
ValidatorsRoot: [32]byte{'A'},
|
|
}
|
|
emptySig := [96]byte{}
|
|
type args struct {
|
|
ctx context.Context
|
|
pid peer.ID
|
|
msg *ethpb.SignedBLSToExecutionChange
|
|
topic string
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
svc *Service
|
|
setupSvc func(s *Service, msg *ethpb.SignedBLSToExecutionChange, topic string) (*Service, string)
|
|
args args
|
|
want pubsub.ValidationResult
|
|
}{
|
|
{
|
|
name: "Is syncing",
|
|
svc: NewService(context.Background(),
|
|
WithP2P(mockp2p.NewTestP2P(t)),
|
|
WithInitialSync(&mockSync.Sync{IsSyncing: true}),
|
|
WithChainService(chainService),
|
|
WithStateNotifier(chainService.StateNotifier()),
|
|
WithOperationNotifier(chainService.OperationNotifier()),
|
|
),
|
|
setupSvc: func(s *Service, msg *ethpb.SignedBLSToExecutionChange, topic string) (*Service, string) {
|
|
s.cfg.stateGen = stategen.New(beaconDB, doublylinkedtree.New())
|
|
s.cfg.beaconDB = beaconDB
|
|
s.initCaches()
|
|
return s, topic
|
|
},
|
|
args: args{
|
|
ctx: context.Background(),
|
|
pid: "random",
|
|
topic: "junk",
|
|
msg: ðpb.SignedBLSToExecutionChange{
|
|
Message: ðpb.BLSToExecutionChange{
|
|
ValidatorIndex: 0,
|
|
FromBlsPubkey: make([]byte, 48),
|
|
ToExecutionAddress: make([]byte, 20),
|
|
},
|
|
Signature: emptySig[:],
|
|
}},
|
|
want: pubsub.ValidationIgnore,
|
|
},
|
|
{
|
|
name: "Bad Topic",
|
|
svc: NewService(context.Background(),
|
|
WithP2P(mockp2p.NewTestP2P(t)),
|
|
WithInitialSync(&mockSync.Sync{IsSyncing: false}),
|
|
WithChainService(chainService),
|
|
WithStateNotifier(chainService.StateNotifier()),
|
|
WithOperationNotifier(chainService.OperationNotifier()),
|
|
),
|
|
setupSvc: func(s *Service, msg *ethpb.SignedBLSToExecutionChange, topic string) (*Service, string) {
|
|
s.cfg.stateGen = stategen.New(beaconDB, doublylinkedtree.New())
|
|
s.cfg.beaconDB = beaconDB
|
|
s.initCaches()
|
|
return s, topic
|
|
},
|
|
args: args{
|
|
ctx: context.Background(),
|
|
pid: "random",
|
|
topic: "junk",
|
|
msg: ðpb.SignedBLSToExecutionChange{
|
|
Message: ðpb.BLSToExecutionChange{
|
|
ValidatorIndex: 0,
|
|
FromBlsPubkey: make([]byte, 48),
|
|
ToExecutionAddress: make([]byte, 20),
|
|
},
|
|
Signature: emptySig[:],
|
|
}},
|
|
want: pubsub.ValidationReject,
|
|
},
|
|
{
|
|
name: "Already Seen Message",
|
|
svc: NewService(context.Background(),
|
|
WithP2P(mockp2p.NewTestP2P(t)),
|
|
WithInitialSync(&mockSync.Sync{IsSyncing: false}),
|
|
WithChainService(chainService),
|
|
WithStateNotifier(chainService.StateNotifier()),
|
|
WithOperationNotifier(chainService.OperationNotifier()),
|
|
WithBlsToExecPool(blstoexec.NewPool()),
|
|
),
|
|
setupSvc: func(s *Service, msg *ethpb.SignedBLSToExecutionChange, topic string) (*Service, string) {
|
|
s.cfg.stateGen = stategen.New(beaconDB, doublylinkedtree.New())
|
|
s.cfg.beaconDB = beaconDB
|
|
s.initCaches()
|
|
s.cfg.blsToExecPool.InsertBLSToExecChange(ðpb.SignedBLSToExecutionChange{
|
|
Message: ðpb.BLSToExecutionChange{
|
|
ValidatorIndex: 10,
|
|
FromBlsPubkey: make([]byte, 48),
|
|
ToExecutionAddress: make([]byte, 20),
|
|
},
|
|
Signature: emptySig[:],
|
|
})
|
|
return s, topic
|
|
},
|
|
args: args{
|
|
ctx: context.Background(),
|
|
pid: "random",
|
|
topic: fmt.Sprintf(defaultTopic, fakeDigest),
|
|
msg: ðpb.SignedBLSToExecutionChange{
|
|
Message: ðpb.BLSToExecutionChange{
|
|
ValidatorIndex: 10,
|
|
FromBlsPubkey: make([]byte, 48),
|
|
ToExecutionAddress: make([]byte, 20),
|
|
},
|
|
Signature: emptySig[:],
|
|
}},
|
|
want: pubsub.ValidationIgnore,
|
|
},
|
|
{
|
|
name: "Non-capella Head state",
|
|
svc: NewService(context.Background(),
|
|
WithP2P(mockp2p.NewTestP2P(t)),
|
|
WithInitialSync(&mockSync.Sync{IsSyncing: false}),
|
|
WithChainService(chainService),
|
|
WithStateNotifier(chainService.StateNotifier()),
|
|
WithOperationNotifier(chainService.OperationNotifier()),
|
|
WithBlsToExecPool(blstoexec.NewPool()),
|
|
),
|
|
setupSvc: func(s *Service, msg *ethpb.SignedBLSToExecutionChange, topic string) (*Service, string) {
|
|
s.cfg.stateGen = stategen.New(beaconDB, doublylinkedtree.New())
|
|
s.cfg.beaconDB = beaconDB
|
|
s.initCaches()
|
|
st, _ := util.DeterministicGenesisStateBellatrix(t, 128)
|
|
s.cfg.chain = &mockChain.ChainService{
|
|
ValidatorsRoot: [32]byte{'A'},
|
|
Genesis: time.Now().Add(-time.Second * time.Duration(params.BeaconConfig().SecondsPerSlot) * time.Duration(10)),
|
|
State: st,
|
|
}
|
|
|
|
return s, topic
|
|
},
|
|
args: args{
|
|
ctx: context.Background(),
|
|
pid: "random",
|
|
topic: fmt.Sprintf(defaultTopic, fakeDigest),
|
|
msg: ðpb.SignedBLSToExecutionChange{
|
|
Message: ðpb.BLSToExecutionChange{
|
|
ValidatorIndex: 0,
|
|
FromBlsPubkey: make([]byte, 48),
|
|
ToExecutionAddress: make([]byte, 20),
|
|
},
|
|
Signature: emptySig[:],
|
|
}},
|
|
want: pubsub.ValidationIgnore,
|
|
},
|
|
{
|
|
name: "Non-existent Validator Index",
|
|
svc: NewService(context.Background(),
|
|
WithP2P(mockp2p.NewTestP2P(t)),
|
|
WithInitialSync(&mockSync.Sync{IsSyncing: false}),
|
|
WithChainService(chainService),
|
|
WithStateNotifier(chainService.StateNotifier()),
|
|
WithOperationNotifier(chainService.OperationNotifier()),
|
|
WithBlsToExecPool(blstoexec.NewPool()),
|
|
),
|
|
setupSvc: func(s *Service, msg *ethpb.SignedBLSToExecutionChange, topic string) (*Service, string) {
|
|
s.cfg.stateGen = stategen.New(beaconDB, doublylinkedtree.New())
|
|
s.cfg.beaconDB = beaconDB
|
|
s.initCaches()
|
|
st, _ := util.DeterministicGenesisStateCapella(t, 128)
|
|
s.cfg.chain = &mockChain.ChainService{
|
|
ValidatorsRoot: [32]byte{'A'},
|
|
Genesis: time.Now().Add(-time.Second * time.Duration(params.BeaconConfig().SecondsPerSlot) * time.Duration(10)),
|
|
State: st,
|
|
}
|
|
|
|
msg.Message.ValidatorIndex = 130
|
|
return s, topic
|
|
},
|
|
args: args{
|
|
ctx: context.Background(),
|
|
pid: "random",
|
|
topic: fmt.Sprintf(defaultTopic, fakeDigest),
|
|
msg: ðpb.SignedBLSToExecutionChange{
|
|
Message: ðpb.BLSToExecutionChange{
|
|
ValidatorIndex: 0,
|
|
FromBlsPubkey: make([]byte, 48),
|
|
ToExecutionAddress: make([]byte, 20),
|
|
},
|
|
Signature: emptySig[:],
|
|
}},
|
|
want: pubsub.ValidationReject,
|
|
},
|
|
{
|
|
name: "Invalid Withdrawal Pubkey",
|
|
svc: NewService(context.Background(),
|
|
WithP2P(mockp2p.NewTestP2P(t)),
|
|
WithInitialSync(&mockSync.Sync{IsSyncing: false}),
|
|
WithChainService(chainService),
|
|
WithStateNotifier(chainService.StateNotifier()),
|
|
WithOperationNotifier(chainService.OperationNotifier()),
|
|
WithBlsToExecPool(blstoexec.NewPool()),
|
|
),
|
|
setupSvc: func(s *Service, msg *ethpb.SignedBLSToExecutionChange, topic string) (*Service, string) {
|
|
s.cfg.stateGen = stategen.New(beaconDB, doublylinkedtree.New())
|
|
s.cfg.beaconDB = beaconDB
|
|
s.initCaches()
|
|
st, keys := util.DeterministicGenesisStateCapella(t, 128)
|
|
s.cfg.chain = &mockChain.ChainService{
|
|
ValidatorsRoot: [32]byte{'A'},
|
|
Genesis: time.Now().Add(-time.Second * time.Duration(params.BeaconConfig().SecondsPerSlot) * time.Duration(10)),
|
|
State: st,
|
|
}
|
|
|
|
msg.Message.ValidatorIndex = 50
|
|
// Provide invalid withdrawal key for validator
|
|
msg.Message.FromBlsPubkey = keys[0].PublicKey().Marshal()
|
|
msg.Message.ToExecutionAddress = wantedExecAddress
|
|
return s, topic
|
|
},
|
|
args: args{
|
|
ctx: context.Background(),
|
|
pid: "random",
|
|
topic: fmt.Sprintf(defaultTopic, fakeDigest),
|
|
msg: ðpb.SignedBLSToExecutionChange{
|
|
Message: ðpb.BLSToExecutionChange{
|
|
ValidatorIndex: 0,
|
|
FromBlsPubkey: make([]byte, 48),
|
|
ToExecutionAddress: make([]byte, 20),
|
|
},
|
|
Signature: emptySig[:],
|
|
}},
|
|
want: pubsub.ValidationReject,
|
|
},
|
|
{
|
|
name: "Invalid Credentials in State",
|
|
svc: NewService(context.Background(),
|
|
WithP2P(mockp2p.NewTestP2P(t)),
|
|
WithInitialSync(&mockSync.Sync{IsSyncing: false}),
|
|
WithChainService(chainService),
|
|
WithStateNotifier(chainService.StateNotifier()),
|
|
WithOperationNotifier(chainService.OperationNotifier()),
|
|
WithBlsToExecPool(blstoexec.NewPool()),
|
|
),
|
|
setupSvc: func(s *Service, msg *ethpb.SignedBLSToExecutionChange, topic string) (*Service, string) {
|
|
s.cfg.stateGen = stategen.New(beaconDB, doublylinkedtree.New())
|
|
s.cfg.beaconDB = beaconDB
|
|
s.initCaches()
|
|
st, keys := util.DeterministicGenesisStateCapella(t, 128)
|
|
assert.NoError(t, st.ApplyToEveryValidator(func(idx int, val *ethpb.Validator) (bool, *ethpb.Validator, error) {
|
|
newCreds := make([]byte, 32)
|
|
newCreds[0] = params.BeaconConfig().ETH1AddressWithdrawalPrefixByte
|
|
copy(newCreds[12:], wantedExecAddress)
|
|
val.WithdrawalCredentials = newCreds
|
|
return true, val, nil
|
|
}))
|
|
s.cfg.chain = &mockChain.ChainService{
|
|
ValidatorsRoot: [32]byte{'A'},
|
|
Genesis: time.Now().Add(-time.Second * time.Duration(params.BeaconConfig().SecondsPerSlot) * time.Duration(10)),
|
|
State: st,
|
|
}
|
|
|
|
msg.Message.ValidatorIndex = 50
|
|
// Provide Correct withdrawal pubkey
|
|
msg.Message.FromBlsPubkey = keys[51].PublicKey().Marshal()
|
|
msg.Message.ToExecutionAddress = wantedExecAddress
|
|
return s, topic
|
|
},
|
|
args: args{
|
|
ctx: context.Background(),
|
|
pid: "random",
|
|
topic: fmt.Sprintf(defaultTopic, fakeDigest),
|
|
msg: ðpb.SignedBLSToExecutionChange{
|
|
Message: ðpb.BLSToExecutionChange{
|
|
ValidatorIndex: 0,
|
|
FromBlsPubkey: make([]byte, 48),
|
|
ToExecutionAddress: make([]byte, 20),
|
|
},
|
|
Signature: emptySig[:],
|
|
}},
|
|
want: pubsub.ValidationReject,
|
|
},
|
|
{
|
|
name: "Invalid Execution Change Signature",
|
|
svc: NewService(context.Background(),
|
|
WithP2P(mockp2p.NewTestP2P(t)),
|
|
WithInitialSync(&mockSync.Sync{IsSyncing: false}),
|
|
WithChainService(chainService),
|
|
WithStateNotifier(chainService.StateNotifier()),
|
|
WithOperationNotifier(chainService.OperationNotifier()),
|
|
WithBlsToExecPool(blstoexec.NewPool()),
|
|
),
|
|
setupSvc: func(s *Service, msg *ethpb.SignedBLSToExecutionChange, topic string) (*Service, string) {
|
|
s.cfg.stateGen = stategen.New(beaconDB, doublylinkedtree.New())
|
|
s.cfg.beaconDB = beaconDB
|
|
s.initCaches()
|
|
st, keys := util.DeterministicGenesisStateCapella(t, 128)
|
|
s.cfg.chain = &mockChain.ChainService{
|
|
ValidatorsRoot: [32]byte{'A'},
|
|
Genesis: time.Now().Add(-time.Second * time.Duration(params.BeaconConfig().SecondsPerSlot) * time.Duration(10)),
|
|
State: st,
|
|
}
|
|
|
|
msg.Message.ValidatorIndex = 50
|
|
// Provide invalid withdrawal key for validator
|
|
msg.Message.FromBlsPubkey = keys[51].PublicKey().Marshal()
|
|
msg.Message.ToExecutionAddress = wantedExecAddress
|
|
badSig := make([]byte, 96)
|
|
copy(badSig, []byte{'j', 'u', 'n', 'k'})
|
|
msg.Signature = badSig
|
|
return s, topic
|
|
},
|
|
args: args{
|
|
ctx: context.Background(),
|
|
pid: "random",
|
|
topic: fmt.Sprintf(defaultTopic, fakeDigest),
|
|
msg: ðpb.SignedBLSToExecutionChange{
|
|
Message: ðpb.BLSToExecutionChange{
|
|
ValidatorIndex: 0,
|
|
FromBlsPubkey: make([]byte, 48),
|
|
ToExecutionAddress: make([]byte, 20),
|
|
},
|
|
Signature: emptySig[:],
|
|
}},
|
|
want: pubsub.ValidationReject,
|
|
},
|
|
{
|
|
name: "Valid Execution Change Message",
|
|
svc: NewService(context.Background(),
|
|
WithP2P(mockp2p.NewTestP2P(t)),
|
|
WithInitialSync(&mockSync.Sync{IsSyncing: false}),
|
|
WithChainService(chainService),
|
|
WithStateNotifier(chainService.StateNotifier()),
|
|
WithOperationNotifier(chainService.OperationNotifier()),
|
|
WithBlsToExecPool(blstoexec.NewPool()),
|
|
),
|
|
setupSvc: func(s *Service, msg *ethpb.SignedBLSToExecutionChange, topic string) (*Service, string) {
|
|
s.cfg.stateGen = stategen.New(beaconDB, doublylinkedtree.New())
|
|
s.cfg.beaconDB = beaconDB
|
|
s.initCaches()
|
|
st, keys := util.DeterministicGenesisStateCapella(t, 128)
|
|
s.cfg.chain = &mockChain.ChainService{
|
|
ValidatorsRoot: [32]byte{'A'},
|
|
Genesis: time.Now().Add(-time.Second * time.Duration(params.BeaconConfig().SecondsPerSlot) * time.Duration(10)),
|
|
State: st,
|
|
}
|
|
|
|
msg.Message.ValidatorIndex = 50
|
|
// Provide invalid withdrawal key for validator
|
|
msg.Message.FromBlsPubkey = keys[51].PublicKey().Marshal()
|
|
msg.Message.ToExecutionAddress = wantedExecAddress
|
|
epoch := slots.ToEpoch(st.Slot())
|
|
domain, err := signing.Domain(st.Fork(), epoch, params.BeaconConfig().DomainBLSToExecutionChange, st.GenesisValidatorsRoot())
|
|
assert.NoError(t, err)
|
|
htr, err := signing.SigningData(msg.Message.HashTreeRoot, domain)
|
|
assert.NoError(t, err)
|
|
msg.Signature = keys[51].Sign(htr[:]).Marshal()
|
|
return s, topic
|
|
},
|
|
args: args{
|
|
ctx: context.Background(),
|
|
pid: "random",
|
|
topic: fmt.Sprintf(defaultTopic, fakeDigest),
|
|
msg: ðpb.SignedBLSToExecutionChange{
|
|
Message: ðpb.BLSToExecutionChange{
|
|
ValidatorIndex: 0,
|
|
FromBlsPubkey: make([]byte, 48),
|
|
ToExecutionAddress: make([]byte, 20),
|
|
},
|
|
Signature: emptySig[:],
|
|
}},
|
|
want: pubsub.ValidationAccept,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
tt.svc, tt.args.topic = tt.setupSvc(tt.svc, tt.args.msg, tt.args.topic)
|
|
marshalledObj, err := tt.args.msg.MarshalSSZ()
|
|
assert.NoError(t, err)
|
|
marshalledObj = snappy.Encode(nil, marshalledObj)
|
|
msg := &pubsub.Message{
|
|
Message: &pubsubpb.Message{
|
|
Data: marshalledObj,
|
|
Topic: &tt.args.topic,
|
|
},
|
|
ReceivedFrom: "",
|
|
ValidatorData: nil,
|
|
}
|
|
if got, err := tt.svc.validateBlsToExecutionChange(tt.args.ctx, tt.args.pid, msg); got != tt.want {
|
|
_ = err
|
|
t.Errorf("validateBlsToExecutionChange() = %v, want %v", got, tt.want)
|
|
}
|
|
})
|
|
}
|
|
}
|