mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 04:47:18 +00:00
d2337d0ec1
* Disable some static analysis checks for coverage builds * Merge branch 'master' into fix-coverage-builds * disable lostcancel for third_party code * Merge branch 'fix-coverage-builds' of github.com:prysmaticlabs/prysm into fix-coverage-builds * Merge refs/heads/master into fix-coverage-builds * A few lostcancel fixes * Merge branch 'fix-coverage-builds' of github.com:prysmaticlabs/prysm into fix-coverage-builds * Merge refs/heads/master into fix-coverage-builds
200 lines
5.2 KiB
Go
200 lines
5.2 KiB
Go
package sync
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"math/rand"
|
|
"reflect"
|
|
"testing"
|
|
"time"
|
|
|
|
lru "github.com/hashicorp/golang-lru"
|
|
pubsub "github.com/libp2p/go-libp2p-pubsub"
|
|
pubsubpb "github.com/libp2p/go-libp2p-pubsub/pb"
|
|
ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1"
|
|
mock "github.com/prysmaticlabs/prysm/beacon-chain/blockchain/testing"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/p2p"
|
|
p2ptest "github.com/prysmaticlabs/prysm/beacon-chain/p2p/testing"
|
|
stateTrie "github.com/prysmaticlabs/prysm/beacon-chain/state"
|
|
mockSync "github.com/prysmaticlabs/prysm/beacon-chain/sync/initial-sync/testing"
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil"
|
|
)
|
|
|
|
func setupValidAttesterSlashing(t *testing.T) (*ethpb.AttesterSlashing, *stateTrie.BeaconState) {
|
|
state, privKeys := testutil.DeterministicGenesisState(t, 5)
|
|
vals := state.Validators()
|
|
for _, vv := range vals {
|
|
vv.WithdrawableEpoch = 1 * params.BeaconConfig().SlotsPerEpoch
|
|
}
|
|
if err := state.SetValidators(vals); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
att1 := ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Epoch: 1},
|
|
Target: ðpb.Checkpoint{Epoch: 0},
|
|
},
|
|
AttestingIndices: []uint64{0, 1},
|
|
}
|
|
domain, err := helpers.Domain(state.Fork(), 0, params.BeaconConfig().DomainBeaconAttester, state.GenesisValidatorRoot())
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
hashTreeRoot, err := helpers.ComputeSigningRoot(att1.Data, domain)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
sig0 := privKeys[0].Sign(hashTreeRoot[:])
|
|
sig1 := privKeys[1].Sign(hashTreeRoot[:])
|
|
aggregateSig := bls.AggregateSignatures([]*bls.Signature{sig0, sig1})
|
|
att1.Signature = aggregateSig.Marshal()[:]
|
|
|
|
att2 := ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Epoch: 0},
|
|
Target: ðpb.Checkpoint{Epoch: 0},
|
|
},
|
|
AttestingIndices: []uint64{0, 1},
|
|
}
|
|
hashTreeRoot, err = helpers.ComputeSigningRoot(att2.Data, domain)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
sig0 = privKeys[0].Sign(hashTreeRoot[:])
|
|
sig1 = privKeys[1].Sign(hashTreeRoot[:])
|
|
aggregateSig = bls.AggregateSignatures([]*bls.Signature{sig0, sig1})
|
|
att2.Signature = aggregateSig.Marshal()[:]
|
|
|
|
slashing := ðpb.AttesterSlashing{
|
|
Attestation_1: att1,
|
|
Attestation_2: att2,
|
|
}
|
|
|
|
currentSlot := 2 * params.BeaconConfig().SlotsPerEpoch
|
|
if err := state.SetSlot(currentSlot); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
b := make([]byte, 32)
|
|
if _, err := rand.Read(b); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
return slashing, state
|
|
}
|
|
|
|
func TestValidateAttesterSlashing_ValidSlashing(t *testing.T) {
|
|
p := p2ptest.NewTestP2P(t)
|
|
ctx := context.Background()
|
|
|
|
slashing, s := setupValidAttesterSlashing(t)
|
|
|
|
c, err := lru.New(10)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
r := &Service{
|
|
p2p: p,
|
|
chain: &mock.ChainService{State: s},
|
|
initialSync: &mockSync.Sync{IsSyncing: false},
|
|
seenAttesterSlashingCache: c,
|
|
}
|
|
|
|
buf := new(bytes.Buffer)
|
|
if _, err := p.Encoding().Encode(buf, slashing); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
msg := &pubsub.Message{
|
|
Message: &pubsubpb.Message{
|
|
Data: buf.Bytes(),
|
|
TopicIDs: []string{
|
|
p2p.GossipTypeMapping[reflect.TypeOf(slashing)],
|
|
},
|
|
},
|
|
}
|
|
valid := r.validateAttesterSlashing(ctx, "foobar", msg) == pubsub.ValidationAccept
|
|
|
|
if !valid {
|
|
t.Error("Failed Validation")
|
|
}
|
|
|
|
if msg.ValidatorData == nil {
|
|
t.Error("Decoded message was not set on the message validator data")
|
|
}
|
|
}
|
|
|
|
func TestValidateAttesterSlashing_ContextTimeout(t *testing.T) {
|
|
p := p2ptest.NewTestP2P(t)
|
|
|
|
slashing, state := setupValidAttesterSlashing(t)
|
|
slashing.Attestation_1.Data.Target.Epoch = 100000000
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 100*time.Millisecond)
|
|
defer cancel()
|
|
|
|
c, err := lru.New(10)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
r := &Service{
|
|
p2p: p,
|
|
chain: &mock.ChainService{State: state},
|
|
initialSync: &mockSync.Sync{IsSyncing: false},
|
|
seenAttesterSlashingCache: c,
|
|
}
|
|
|
|
buf := new(bytes.Buffer)
|
|
if _, err := p.Encoding().Encode(buf, slashing); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
msg := &pubsub.Message{
|
|
Message: &pubsubpb.Message{
|
|
Data: buf.Bytes(),
|
|
TopicIDs: []string{
|
|
p2p.GossipTypeMapping[reflect.TypeOf(slashing)],
|
|
},
|
|
},
|
|
}
|
|
valid := r.validateAttesterSlashing(ctx, "", msg) == pubsub.ValidationAccept
|
|
|
|
if valid {
|
|
t.Error("slashing from the far distant future should have timed out and returned false")
|
|
}
|
|
}
|
|
|
|
func TestValidateAttesterSlashing_Syncing(t *testing.T) {
|
|
p := p2ptest.NewTestP2P(t)
|
|
ctx := context.Background()
|
|
|
|
slashing, s := setupValidAttesterSlashing(t)
|
|
|
|
r := &Service{
|
|
p2p: p,
|
|
chain: &mock.ChainService{State: s},
|
|
initialSync: &mockSync.Sync{IsSyncing: true},
|
|
}
|
|
|
|
buf := new(bytes.Buffer)
|
|
if _, err := p.Encoding().Encode(buf, slashing); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
msg := &pubsub.Message{
|
|
Message: &pubsubpb.Message{
|
|
Data: buf.Bytes(),
|
|
TopicIDs: []string{
|
|
p2p.GossipTypeMapping[reflect.TypeOf(slashing)],
|
|
},
|
|
},
|
|
}
|
|
valid := r.validateAttesterSlashing(ctx, "", msg) == pubsub.ValidationAccept
|
|
if valid {
|
|
t.Error("Passed validation")
|
|
}
|
|
}
|