mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 04:47:18 +00:00
f0fcebccc4
* Get started on cleaning up slashing protection * Merge branch 'master' of github.com:prysmaticlabs/prysm into cleanup-protection * Move protection functions to own files * Lint * Merge branch 'master' of github.com:prysmaticlabs/prysm into cleanup-protection * Begin adding test for proposal protection * Merge branch 'master' of github.com:prysmaticlabs/prysm into cleanup-protection * Fix build * Fix tests * Fix tst * Fix tests * Fix proposal tests * Merge branch 'master' into cleanup-protection * Merge branch 'master' into cleanup-protection * Merge branch 'master' into cleanup-protection * Merge branch 'master' of github.com:prysmaticlabs/prysm into cleanup-protection * Reorder protections * Change lock * Fix test * Merge branch 'master' into cleanup-protection * Merge branch 'master' into cleanup-protection * Merge branch 'master' into cleanup-protection * Change log * Merge branch 'cleanup-protection' of github.com:prysmaticlabs/prysm into cleanup-protection * Merge branch 'master' into cleanup-protection
102 lines
3.0 KiB
Go
102 lines
3.0 KiB
Go
package slashingprotection
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
eth "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1"
|
|
mockSlasher "github.com/prysmaticlabs/prysm/validator/testing"
|
|
)
|
|
|
|
func TestService_VerifyAttestation(t *testing.T) {
|
|
s := &Service{slasherClient: mockSlasher.MockSlasher{SlashAttestation: true}}
|
|
att := ð.IndexedAttestation{
|
|
AttestingIndices: []uint64{1, 2},
|
|
Data: ð.AttestationData{
|
|
Slot: 5,
|
|
CommitteeIndex: 2,
|
|
BeaconBlockRoot: []byte("great block"),
|
|
Source: ð.Checkpoint{
|
|
Epoch: 4,
|
|
Root: []byte("good source"),
|
|
},
|
|
Target: ð.Checkpoint{
|
|
Epoch: 10,
|
|
Root: []byte("good target"),
|
|
},
|
|
},
|
|
}
|
|
if s.CheckAttestationSafety(context.Background(), att) {
|
|
t.Error("Expected verify attestation to fail verification")
|
|
}
|
|
s = &Service{slasherClient: mockSlasher.MockSlasher{SlashAttestation: false}}
|
|
if !s.CheckAttestationSafety(context.Background(), att) {
|
|
t.Error("Expected verify attestation to pass verification")
|
|
}
|
|
}
|
|
|
|
func TestService_CommitAttestation(t *testing.T) {
|
|
s := &Service{slasherClient: mockSlasher.MockSlasher{SlashAttestation: true}}
|
|
att := ð.IndexedAttestation{
|
|
AttestingIndices: []uint64{1, 2},
|
|
Data: ð.AttestationData{
|
|
Slot: 5,
|
|
CommitteeIndex: 2,
|
|
BeaconBlockRoot: []byte("great block"),
|
|
Source: ð.Checkpoint{
|
|
Epoch: 4,
|
|
Root: []byte("good source"),
|
|
},
|
|
Target: ð.Checkpoint{
|
|
Epoch: 10,
|
|
Root: []byte("good target"),
|
|
},
|
|
},
|
|
}
|
|
if s.CommitAttestation(context.Background(), att) {
|
|
t.Error("Expected commit attestation to fail verification")
|
|
}
|
|
s = &Service{slasherClient: mockSlasher.MockSlasher{SlashAttestation: false}}
|
|
if !s.CommitAttestation(context.Background(), att) {
|
|
t.Error("Expected commit attestation to pass verification")
|
|
}
|
|
}
|
|
|
|
func TestService_CommitBlock(t *testing.T) {
|
|
s := &Service{slasherClient: mockSlasher.MockSlasher{SlashBlock: true}}
|
|
blk := ð.SignedBeaconBlockHeader{
|
|
Header: ð.BeaconBlockHeader{
|
|
Slot: 0,
|
|
ProposerIndex: 0,
|
|
ParentRoot: []byte("parent"),
|
|
StateRoot: []byte("state"),
|
|
BodyRoot: []byte("body"),
|
|
},
|
|
}
|
|
if s.CommitBlock(context.Background(), blk) {
|
|
t.Error("Expected commit block to fail verification")
|
|
}
|
|
s = &Service{slasherClient: mockSlasher.MockSlasher{SlashBlock: false}}
|
|
if !s.CommitBlock(context.Background(), blk) {
|
|
t.Error("Expected commit block to pass verification")
|
|
}
|
|
}
|
|
|
|
func TestService_VerifyBlock(t *testing.T) {
|
|
s := &Service{slasherClient: mockSlasher.MockSlasher{SlashBlock: true}}
|
|
blk := ð.BeaconBlockHeader{
|
|
Slot: 0,
|
|
ProposerIndex: 0,
|
|
ParentRoot: []byte("parent"),
|
|
StateRoot: []byte("state"),
|
|
BodyRoot: []byte("body"),
|
|
}
|
|
if s.CheckBlockSafety(context.Background(), blk) {
|
|
t.Error("Expected verify block to fail verification")
|
|
}
|
|
s = &Service{slasherClient: mockSlasher.MockSlasher{SlashBlock: false}}
|
|
if !s.CheckBlockSafety(context.Background(), blk) {
|
|
t.Error("Expected verify block to pass verification")
|
|
}
|
|
}
|