mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-31 23:41:22 +00:00
5e939378d0
* Ignore latest messages in fork choice prior to latest justified * Make sure Compact Committee Roots isn't changed by process_final_updates * WIP add attestation bitfields length to match committee length * Begin work on updating spec tests to 0.8.2 * WIP set up for new spec test structure * Fix slashings * Get mainnet tests mostly passing for attestations and attester slashings * Fix process attestation test * Undo change * Complete spec tests for all operations Still need sanity block tests * Fix BLS sigs * Reduce amount of reused code in core/blocks/spectests/ * Fix tests * Update block sanity tests to 0.8.2 * Update epoch spec tests to 0.8.2 * Clean up all tests and fix shuffling/epoch tests * WIP update bls tests to 0.8.2 * WIP update bls tests to 0.8.3 * Finish BLS spectest update to 0.8.3 * Fix shuffling spec tests * Fix more tests * Update proto ssz spec tests to 0.8.3 * Attempt to fix PrevEpochFFGDataMismatches test * Goimports * Fix documentation * fix test * Use custom general spec tests * Reduce code footprint * Remove unneeded minimal skip * Fix for comments * Fix for comments * Fix test * Small fixes * Cleanup block spec tests a bit * Undo change * fix validator * Fix validator tests * Run gazelle * Fix error output for epoch spec tests
1201 lines
36 KiB
Go
1201 lines
36 KiB
Go
package state_test
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"crypto/rand"
|
|
"encoding/binary"
|
|
"fmt"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/prysmaticlabs/go-bitfield"
|
|
"github.com/prysmaticlabs/go-ssz"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/blocks"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/state"
|
|
pb "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1"
|
|
ethpb "github.com/prysmaticlabs/prysm/proto/eth/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/hashutil"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil"
|
|
"github.com/prysmaticlabs/prysm/shared/trieutil"
|
|
"github.com/sirupsen/logrus"
|
|
)
|
|
|
|
func TestExecuteStateTransition_IncorrectSlot(t *testing.T) {
|
|
beaconState := &pb.BeaconState{
|
|
Slot: 5,
|
|
}
|
|
block := ðpb.BeaconBlock{
|
|
Slot: 4,
|
|
}
|
|
want := "expected state.slot"
|
|
if _, err := state.ExecuteStateTransition(context.Background(), beaconState, block); !strings.Contains(err.Error(), want) {
|
|
t.Errorf("Expected %s, received %v", want, err)
|
|
}
|
|
}
|
|
|
|
func TestExecuteStateTransition_FullProcess(t *testing.T) {
|
|
helpers.ClearAllCaches()
|
|
deposits, privKeys := testutil.SetupInitialDeposits(t, 100)
|
|
beaconState, err := state.GenesisBeaconState(deposits, uint64(0), ðpb.Eth1Data{})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
eth1Data := ðpb.Eth1Data{
|
|
DepositCount: 100,
|
|
DepositRoot: []byte{2},
|
|
}
|
|
beaconState.Slot = params.BeaconConfig().SlotsPerEpoch - 1
|
|
beaconState.Eth1Data.DepositCount = 100
|
|
beaconState.LatestBlockHeader = ðpb.BeaconBlockHeader{Slot: beaconState.Slot}
|
|
beaconState.Eth1DataVotes = []*ethpb.Eth1Data{eth1Data}
|
|
|
|
oldMix := beaconState.RandaoMixes[1]
|
|
oldStartShard := beaconState.StartShard
|
|
parentRoot, err := ssz.SigningRoot(beaconState.LatestBlockHeader)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
beaconState.Slot++
|
|
epoch := helpers.CurrentEpoch(beaconState)
|
|
randaoReveal, err := testutil.CreateRandaoReveal(beaconState, epoch, privKeys)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
beaconState.Slot--
|
|
block := ðpb.BeaconBlock{
|
|
Slot: beaconState.Slot + 1,
|
|
ParentRoot: parentRoot[:],
|
|
Body: ðpb.BeaconBlockBody{
|
|
RandaoReveal: randaoReveal,
|
|
Eth1Data: eth1Data,
|
|
},
|
|
}
|
|
|
|
stateRootCandidate, err := state.ExecuteStateTransitionNoVerify(context.Background(), beaconState, block)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
stateRoot, err := ssz.HashTreeRoot(stateRootCandidate)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
block.StateRoot = stateRoot[:]
|
|
|
|
block, err = testutil.SignBlock(beaconState, block, privKeys)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
beaconState, err = state.ExecuteStateTransition(context.Background(), beaconState, block)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
if beaconState.Slot != 64 {
|
|
t.Errorf("Unexpected Slot number, expected: 64, received: %d", beaconState.Slot)
|
|
}
|
|
|
|
if bytes.Equal(beaconState.RandaoMixes[1], oldMix) {
|
|
t.Errorf("Did not expect new and old randao mix to equal, %#x == %#x", beaconState.RandaoMixes[0], oldMix)
|
|
}
|
|
|
|
if beaconState.StartShard == oldStartShard {
|
|
t.Errorf("Did not expect new and old start shard to equal, %#x == %#x", beaconState.StartShard, oldStartShard)
|
|
}
|
|
}
|
|
|
|
func TestProcessBlock_IncorrectProposerSlashing(t *testing.T) {
|
|
helpers.ClearAllCaches()
|
|
deposits, privKeys := testutil.SetupInitialDeposits(t, 100)
|
|
beaconState, err := state.GenesisBeaconState(deposits, uint64(0), ðpb.Eth1Data{})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
genesisBlock := blocks.NewGenesisBlock([]byte{})
|
|
bodyRoot, err := ssz.HashTreeRoot(genesisBlock)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
beaconState.LatestBlockHeader = ðpb.BeaconBlockHeader{
|
|
Slot: genesisBlock.Slot,
|
|
ParentRoot: genesisBlock.ParentRoot,
|
|
BodyRoot: bodyRoot[:],
|
|
}
|
|
parentRoot, err := ssz.SigningRoot(beaconState.LatestBlockHeader)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
slashing := ðpb.ProposerSlashing{
|
|
Header_1: ðpb.BeaconBlockHeader{Slot: params.BeaconConfig().SlotsPerEpoch},
|
|
Header_2: ðpb.BeaconBlockHeader{Slot: params.BeaconConfig().SlotsPerEpoch * 2},
|
|
}
|
|
|
|
epoch := helpers.CurrentEpoch(beaconState)
|
|
randaoReveal, err := testutil.CreateRandaoReveal(beaconState, epoch, privKeys)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
blkDeposits := make([]*ethpb.Deposit, 0)
|
|
block := ðpb.BeaconBlock{
|
|
ParentRoot: parentRoot[:],
|
|
Slot: 0,
|
|
Body: ðpb.BeaconBlockBody{
|
|
RandaoReveal: randaoReveal,
|
|
ProposerSlashings: []*ethpb.ProposerSlashing{slashing},
|
|
Eth1Data: ðpb.Eth1Data{
|
|
DepositRoot: []byte{2},
|
|
BlockHash: []byte{3},
|
|
},
|
|
Deposits: blkDeposits,
|
|
},
|
|
}
|
|
block, err = testutil.SignBlock(beaconState, block, privKeys)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
want := "could not process block proposer slashing"
|
|
if _, err := state.ProcessBlock(context.Background(), beaconState, block); !strings.Contains(err.Error(), want) {
|
|
t.Errorf("Expected %s, received %v", want, err)
|
|
}
|
|
}
|
|
|
|
func TestProcessBlock_IncorrectProcessBlockAttestations(t *testing.T) {
|
|
deposits, privKeys := testutil.SetupInitialDeposits(t, 100)
|
|
beaconState, err := state.GenesisBeaconState(deposits, uint64(0), ðpb.Eth1Data{})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
beaconState.Slashings = make([]uint64, params.BeaconConfig().EpochsPerSlashingsVector)
|
|
|
|
proposerSlashIdx := uint64(3)
|
|
|
|
currentEpoch := helpers.CurrentEpoch(beaconState)
|
|
domain := helpers.Domain(beaconState, currentEpoch, params.BeaconConfig().DomainBeaconProposer)
|
|
|
|
header1 := ðpb.BeaconBlockHeader{
|
|
Slot: 1,
|
|
StateRoot: []byte("A"),
|
|
}
|
|
signingRoot, err := ssz.SigningRoot(header1)
|
|
if err != nil {
|
|
t.Errorf("Could not get signing root of beacon block header: %v", err)
|
|
}
|
|
header1.Signature = privKeys[proposerSlashIdx].Sign(signingRoot[:], domain).Marshal()[:]
|
|
|
|
header2 := ðpb.BeaconBlockHeader{
|
|
Slot: 1,
|
|
StateRoot: []byte("B"),
|
|
}
|
|
signingRoot, err = ssz.SigningRoot(header2)
|
|
if err != nil {
|
|
t.Errorf("Could not get signing root of beacon block header: %v", err)
|
|
}
|
|
header2.Signature = privKeys[proposerSlashIdx].Sign(signingRoot[:], domain).Marshal()[:]
|
|
|
|
proposerSlashings := []*ethpb.ProposerSlashing{
|
|
{
|
|
ProposerIndex: proposerSlashIdx,
|
|
Header_1: header1,
|
|
Header_2: header2,
|
|
},
|
|
}
|
|
beaconState.Validators[proposerSlashIdx].PublicKey = privKeys[proposerSlashIdx].PublicKey().Marshal()[:]
|
|
|
|
att1 := ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Epoch: 0},
|
|
Target: ðpb.Checkpoint{Epoch: 0},
|
|
Crosslink: ðpb.Crosslink{
|
|
Shard: 4,
|
|
},
|
|
},
|
|
CustodyBit_0Indices: []uint64{0, 1},
|
|
}
|
|
dataAndCustodyBit := &pb.AttestationDataAndCustodyBit{
|
|
Data: att1.Data,
|
|
CustodyBit: false,
|
|
}
|
|
hashTreeRoot, err := ssz.HashTreeRoot(dataAndCustodyBit)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
domain = helpers.Domain(beaconState, currentEpoch, params.BeaconConfig().DomainAttestation)
|
|
sig0 := privKeys[0].Sign(hashTreeRoot[:], domain)
|
|
sig1 := privKeys[1].Sign(hashTreeRoot[:], domain)
|
|
aggregateSig := bls.AggregateSignatures([]*bls.Signature{sig0, sig1})
|
|
att1.Signature = aggregateSig.Marshal()[:]
|
|
|
|
att2 := ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Epoch: 1},
|
|
Target: ðpb.Checkpoint{Epoch: 0},
|
|
Crosslink: ðpb.Crosslink{
|
|
Shard: 4,
|
|
},
|
|
},
|
|
CustodyBit_0Indices: []uint64{0, 1},
|
|
}
|
|
dataAndCustodyBit = &pb.AttestationDataAndCustodyBit{
|
|
Data: att2.Data,
|
|
CustodyBit: false,
|
|
}
|
|
hashTreeRoot, err = ssz.HashTreeRoot(dataAndCustodyBit)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
sig0 = privKeys[0].Sign(hashTreeRoot[:], domain)
|
|
sig1 = privKeys[1].Sign(hashTreeRoot[:], domain)
|
|
aggregateSig = bls.AggregateSignatures([]*bls.Signature{sig0, sig1})
|
|
att2.Signature = aggregateSig.Marshal()[:]
|
|
|
|
slashings := []*ethpb.AttesterSlashing{
|
|
{
|
|
Attestation_1: att1,
|
|
Attestation_2: att2,
|
|
},
|
|
}
|
|
|
|
att := ðpb.Attestation{
|
|
Data: ðpb.AttestationData{
|
|
Target: ðpb.Checkpoint{Epoch: 0},
|
|
Crosslink: ðpb.Crosslink{},
|
|
},
|
|
AggregationBits: bitfield.NewBitlist(0),
|
|
CustodyBits: bitfield.NewBitlist(0),
|
|
}
|
|
|
|
epoch := helpers.CurrentEpoch(beaconState)
|
|
randaoReveal, err := testutil.CreateRandaoReveal(beaconState, epoch, privKeys)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
genesisBlock := blocks.NewGenesisBlock([]byte{})
|
|
bodyRoot, err := ssz.HashTreeRoot(genesisBlock)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
beaconState.LatestBlockHeader = ðpb.BeaconBlockHeader{
|
|
Slot: genesisBlock.Slot,
|
|
ParentRoot: genesisBlock.ParentRoot,
|
|
BodyRoot: bodyRoot[:],
|
|
}
|
|
parentRoot, err := ssz.SigningRoot(beaconState.LatestBlockHeader)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
block := ðpb.BeaconBlock{
|
|
ParentRoot: parentRoot[:],
|
|
Slot: 0,
|
|
Body: ðpb.BeaconBlockBody{
|
|
RandaoReveal: randaoReveal,
|
|
ProposerSlashings: proposerSlashings,
|
|
AttesterSlashings: slashings,
|
|
Attestations: []*ethpb.Attestation{att},
|
|
Eth1Data: ðpb.Eth1Data{
|
|
DepositRoot: []byte{2},
|
|
BlockHash: []byte{3},
|
|
},
|
|
Deposits: make([]*ethpb.Deposit, 0),
|
|
},
|
|
}
|
|
block, err = testutil.SignBlock(beaconState, block, privKeys)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
want := "could not process block attestations"
|
|
if _, err := state.ProcessBlock(context.Background(), beaconState, block); !strings.Contains(err.Error(), want) {
|
|
t.Errorf("Expected %s, received %v", want, err)
|
|
}
|
|
}
|
|
|
|
func TestProcessBlock_IncorrectProcessExits(t *testing.T) {
|
|
helpers.ClearAllCaches()
|
|
|
|
deposits, _ := testutil.SetupInitialDeposits(t, 100)
|
|
beaconState, err := state.GenesisBeaconState(deposits, uint64(0), ðpb.Eth1Data{})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
beaconState.Slashings = make([]uint64, params.BeaconConfig().EpochsPerSlashingsVector)
|
|
proposerSlashings := []*ethpb.ProposerSlashing{
|
|
{
|
|
ProposerIndex: 3,
|
|
Header_1: ðpb.BeaconBlockHeader{
|
|
Slot: 1,
|
|
Signature: []byte("A"),
|
|
},
|
|
Header_2: ðpb.BeaconBlockHeader{
|
|
Slot: 1,
|
|
Signature: []byte("B"),
|
|
},
|
|
},
|
|
}
|
|
attesterSlashings := []*ethpb.AttesterSlashing{
|
|
{
|
|
Attestation_1: ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Epoch: 0},
|
|
Target: ðpb.Checkpoint{Epoch: 0},
|
|
Crosslink: ðpb.Crosslink{
|
|
Shard: 4,
|
|
}},
|
|
CustodyBit_0Indices: []uint64{0, 1},
|
|
},
|
|
Attestation_2: ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Epoch: 1},
|
|
Target: ðpb.Checkpoint{Epoch: 0},
|
|
Crosslink: ðpb.Crosslink{
|
|
Shard: 4,
|
|
}},
|
|
CustodyBit_0Indices: []uint64{0, 1},
|
|
},
|
|
},
|
|
}
|
|
var blockRoots [][]byte
|
|
for i := uint64(0); i < params.BeaconConfig().SlotsPerHistoricalRoot; i++ {
|
|
blockRoots = append(blockRoots, []byte{byte(i)})
|
|
}
|
|
beaconState.BlockRoots = blockRoots
|
|
beaconState.CurrentCrosslinks = []*ethpb.Crosslink{
|
|
{
|
|
DataRoot: []byte{1},
|
|
},
|
|
}
|
|
blockAtt := ðpb.Attestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Epoch: 0},
|
|
Target: ðpb.Checkpoint{Epoch: 0, Root: []byte("hello-world")},
|
|
Crosslink: ðpb.Crosslink{
|
|
Shard: 0,
|
|
StartEpoch: 0,
|
|
},
|
|
},
|
|
AggregationBits: bitfield.Bitlist{0xC0, 0xC0, 0xC0, 0xC0, 0x01},
|
|
CustodyBits: bitfield.Bitlist{0x00, 0x00, 0x00, 0x00, 0x01},
|
|
}
|
|
attestations := []*ethpb.Attestation{blockAtt}
|
|
var exits []*ethpb.VoluntaryExit
|
|
for i := uint64(0); i < params.BeaconConfig().MaxVoluntaryExits+1; i++ {
|
|
exits = append(exits, ðpb.VoluntaryExit{})
|
|
}
|
|
genesisBlock := blocks.NewGenesisBlock([]byte{})
|
|
bodyRoot, err := ssz.HashTreeRoot(genesisBlock)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
beaconState.LatestBlockHeader = ðpb.BeaconBlockHeader{
|
|
Slot: genesisBlock.Slot,
|
|
ParentRoot: genesisBlock.ParentRoot,
|
|
BodyRoot: bodyRoot[:],
|
|
}
|
|
parentRoot, err := ssz.SigningRoot(beaconState.LatestBlockHeader)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
block := ðpb.BeaconBlock{
|
|
ParentRoot: parentRoot[:],
|
|
Slot: 1,
|
|
Body: ðpb.BeaconBlockBody{
|
|
RandaoReveal: []byte{},
|
|
ProposerSlashings: proposerSlashings,
|
|
AttesterSlashings: attesterSlashings,
|
|
Attestations: attestations,
|
|
VoluntaryExits: exits,
|
|
Eth1Data: ðpb.Eth1Data{
|
|
DepositRoot: []byte{2},
|
|
BlockHash: []byte{3},
|
|
},
|
|
},
|
|
}
|
|
beaconState.Slot += params.BeaconConfig().MinAttestationInclusionDelay
|
|
beaconState.CurrentCrosslinks = []*ethpb.Crosslink{
|
|
{
|
|
Shard: 0,
|
|
StartEpoch: 0,
|
|
},
|
|
}
|
|
beaconState.CurrentJustifiedCheckpoint.Root = []byte("hello-world")
|
|
beaconState.CurrentEpochAttestations = []*pb.PendingAttestation{}
|
|
|
|
encoded, err := ssz.HashTreeRoot(beaconState.CurrentCrosslinks[0])
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
block.Body.Attestations[0].Data.Crosslink.ParentRoot = encoded[:]
|
|
block.Body.Attestations[0].Data.Crosslink.DataRoot = params.BeaconConfig().ZeroHash[:]
|
|
if _, err := state.ProcessBlock(context.Background(), beaconState, block); err == nil {
|
|
t.Error("Expected err, received nil")
|
|
}
|
|
}
|
|
|
|
func TestProcessBlock_PassesProcessingConditions(t *testing.T) {
|
|
deposits, privKeys := testutil.SetupInitialDeposits(t, 100)
|
|
beaconState, err := state.GenesisBeaconState(deposits, uint64(0), ðpb.Eth1Data{})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
genesisBlock := blocks.NewGenesisBlock([]byte{})
|
|
bodyRoot, err := ssz.HashTreeRoot(genesisBlock)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
beaconState.LatestBlockHeader = ðpb.BeaconBlockHeader{
|
|
Slot: genesisBlock.Slot,
|
|
ParentRoot: genesisBlock.ParentRoot,
|
|
BodyRoot: bodyRoot[:],
|
|
}
|
|
beaconState.Slashings = make([]uint64, params.BeaconConfig().EpochsPerSlashingsVector)
|
|
beaconState.CurrentCrosslinks = []*ethpb.Crosslink{
|
|
{
|
|
Shard: 0,
|
|
StartEpoch: helpers.SlotToEpoch(beaconState.Slot),
|
|
DataRoot: []byte{1},
|
|
},
|
|
}
|
|
beaconState.CurrentJustifiedCheckpoint.Root = []byte("hello-world")
|
|
beaconState.CurrentEpochAttestations = []*pb.PendingAttestation{}
|
|
encoded, err := ssz.HashTreeRoot(beaconState.CurrentCrosslinks[0])
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
proposerSlashIdx := uint64(3)
|
|
slotsPerEpoch := params.BeaconConfig().SlotsPerEpoch
|
|
beaconState.Slot = (params.BeaconConfig().PersistentCommitteePeriod * slotsPerEpoch) + params.BeaconConfig().MinAttestationInclusionDelay
|
|
|
|
currentEpoch := helpers.CurrentEpoch(beaconState)
|
|
domain := helpers.Domain(
|
|
beaconState,
|
|
currentEpoch,
|
|
params.BeaconConfig().DomainBeaconProposer,
|
|
)
|
|
|
|
header1 := ðpb.BeaconBlockHeader{
|
|
Slot: 1,
|
|
StateRoot: []byte("A"),
|
|
}
|
|
signingRoot, err := ssz.SigningRoot(header1)
|
|
if err != nil {
|
|
t.Errorf("Could not get signing root of beacon block header: %v", err)
|
|
}
|
|
header1.Signature = privKeys[proposerSlashIdx].Sign(signingRoot[:], domain).Marshal()[:]
|
|
|
|
header2 := ðpb.BeaconBlockHeader{
|
|
Slot: 1,
|
|
StateRoot: []byte("B"),
|
|
}
|
|
signingRoot, err = ssz.SigningRoot(header2)
|
|
if err != nil {
|
|
t.Errorf("Could not get signing root of beacon block header: %v", err)
|
|
}
|
|
header2.Signature = privKeys[proposerSlashIdx].Sign(signingRoot[:], domain).Marshal()[:]
|
|
|
|
proposerSlashings := []*ethpb.ProposerSlashing{
|
|
{
|
|
ProposerIndex: proposerSlashIdx,
|
|
Header_1: header1,
|
|
Header_2: header2,
|
|
},
|
|
}
|
|
beaconState.Validators[proposerSlashIdx].PublicKey = privKeys[proposerSlashIdx].PublicKey().Marshal()[:]
|
|
|
|
att1 := ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Epoch: 0, Root: []byte{'A'}},
|
|
Target: ðpb.Checkpoint{Epoch: 0},
|
|
Crosslink: ðpb.Crosslink{
|
|
Shard: 4,
|
|
},
|
|
},
|
|
CustodyBit_0Indices: []uint64{0, 1},
|
|
}
|
|
dataAndCustodyBit := &pb.AttestationDataAndCustodyBit{
|
|
Data: att1.Data,
|
|
CustodyBit: false,
|
|
}
|
|
hashTreeRoot, err := ssz.HashTreeRoot(dataAndCustodyBit)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
domain = helpers.Domain(beaconState, currentEpoch, params.BeaconConfig().DomainAttestation)
|
|
sig0 := privKeys[0].Sign(hashTreeRoot[:], domain)
|
|
sig1 := privKeys[1].Sign(hashTreeRoot[:], domain)
|
|
aggregateSig := bls.AggregateSignatures([]*bls.Signature{sig0, sig1})
|
|
att1.Signature = aggregateSig.Marshal()[:]
|
|
|
|
att2 := ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Epoch: 0, Root: []byte{'B'}},
|
|
Target: ðpb.Checkpoint{Epoch: 0},
|
|
Crosslink: ðpb.Crosslink{
|
|
Shard: 4,
|
|
},
|
|
},
|
|
CustodyBit_0Indices: []uint64{0, 1},
|
|
}
|
|
dataAndCustodyBit = &pb.AttestationDataAndCustodyBit{
|
|
Data: att2.Data,
|
|
CustodyBit: false,
|
|
}
|
|
hashTreeRoot, err = ssz.HashTreeRoot(dataAndCustodyBit)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
sig0 = privKeys[0].Sign(hashTreeRoot[:], domain)
|
|
sig1 = privKeys[1].Sign(hashTreeRoot[:], domain)
|
|
aggregateSig = bls.AggregateSignatures([]*bls.Signature{sig0, sig1})
|
|
att2.Signature = aggregateSig.Marshal()[:]
|
|
|
|
attesterSlashings := []*ethpb.AttesterSlashing{
|
|
{
|
|
Attestation_1: att1,
|
|
Attestation_2: att2,
|
|
},
|
|
}
|
|
|
|
var blockRoots [][]byte
|
|
for i := uint64(0); i < params.BeaconConfig().SlotsPerHistoricalRoot; i++ {
|
|
blockRoots = append(blockRoots, []byte{byte(i)})
|
|
}
|
|
beaconState.BlockRoots = blockRoots
|
|
|
|
aggBits := bitfield.NewBitlist(1)
|
|
aggBits.SetBitAt(1, true)
|
|
custodyBits := bitfield.NewBitlist(1)
|
|
blockAtt := ðpb.Attestation{
|
|
Data: ðpb.AttestationData{
|
|
Target: ðpb.Checkpoint{Epoch: helpers.SlotToEpoch(beaconState.Slot)},
|
|
Source: ðpb.Checkpoint{
|
|
Epoch: 0,
|
|
Root: []byte("hello-world"),
|
|
},
|
|
Crosslink: ðpb.Crosslink{
|
|
Shard: 0,
|
|
EndEpoch: 64,
|
|
DataRoot: params.BeaconConfig().ZeroHash[:],
|
|
ParentRoot: encoded[:],
|
|
},
|
|
},
|
|
AggregationBits: aggBits,
|
|
CustodyBits: custodyBits,
|
|
}
|
|
attestingIndices, err := helpers.AttestingIndices(beaconState, blockAtt.Data, blockAtt.AggregationBits)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
dataAndCustodyBit = &pb.AttestationDataAndCustodyBit{
|
|
Data: blockAtt.Data,
|
|
CustodyBit: false,
|
|
}
|
|
hashTreeRoot, err = ssz.HashTreeRoot(dataAndCustodyBit)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
sigs := make([]*bls.Signature, len(attestingIndices))
|
|
for i, indice := range attestingIndices {
|
|
sig := privKeys[indice].Sign(hashTreeRoot[:], domain)
|
|
sigs[i] = sig
|
|
}
|
|
blockAtt.Signature = bls.AggregateSignatures(sigs).Marshal()[:]
|
|
|
|
exit := ðpb.VoluntaryExit{
|
|
ValidatorIndex: 10,
|
|
Epoch: 0,
|
|
}
|
|
signingRoot, err = ssz.SigningRoot(exit)
|
|
if err != nil {
|
|
t.Errorf("Could not get signing root of beacon block header: %v", err)
|
|
}
|
|
domain = helpers.Domain(beaconState, currentEpoch, params.BeaconConfig().DomainVoluntaryExit)
|
|
exit.Signature = privKeys[exit.ValidatorIndex].Sign(signingRoot[:], domain).Marshal()[:]
|
|
|
|
parentRoot, err := ssz.SigningRoot(beaconState.LatestBlockHeader)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
randaoReveal, err := testutil.CreateRandaoReveal(beaconState, currentEpoch, privKeys)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
block := ðpb.BeaconBlock{
|
|
ParentRoot: parentRoot[:],
|
|
Slot: beaconState.Slot,
|
|
Body: ðpb.BeaconBlockBody{
|
|
RandaoReveal: randaoReveal,
|
|
ProposerSlashings: proposerSlashings,
|
|
AttesterSlashings: attesterSlashings,
|
|
Attestations: []*ethpb.Attestation{blockAtt},
|
|
VoluntaryExits: []*ethpb.VoluntaryExit{exit},
|
|
Eth1Data: ðpb.Eth1Data{
|
|
DepositRoot: []byte{2},
|
|
BlockHash: []byte{3},
|
|
},
|
|
},
|
|
}
|
|
|
|
block, err = testutil.SignBlock(beaconState, block, privKeys)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
beaconState, err = state.ProcessBlock(context.Background(), beaconState, block)
|
|
if err != nil {
|
|
t.Errorf("Expected block to pass processing conditions: %v", err)
|
|
}
|
|
|
|
if !beaconState.Validators[proposerSlashings[0].ProposerIndex].Slashed {
|
|
t.Errorf("Expected validator at index %d to be slashed, received false", proposerSlashings[0].ProposerIndex)
|
|
}
|
|
|
|
if !beaconState.Validators[1].Slashed {
|
|
t.Error("Expected validator at index 1 to be slashed, received false")
|
|
}
|
|
|
|
received := beaconState.Validators[exit.ValidatorIndex].ExitEpoch
|
|
wanted := params.BeaconConfig().FarFutureEpoch
|
|
if received == wanted {
|
|
t.Errorf("Expected validator at index %d to be exiting, did not expect: %d", exit.ValidatorIndex, wanted)
|
|
}
|
|
}
|
|
|
|
func TestProcessEpoch_CantGetTgtAttsPrevEpoch(t *testing.T) {
|
|
atts := []*pb.PendingAttestation{{Data: ðpb.AttestationData{Target: ðpb.Checkpoint{Epoch: 1}}}}
|
|
_, err := state.ProcessEpoch(context.Background(), &pb.BeaconState{CurrentEpochAttestations: atts})
|
|
if !strings.Contains(err.Error(), "could not get target atts prev epoch") {
|
|
t.Fatal("Did not receive wanted error")
|
|
}
|
|
}
|
|
|
|
func TestProcessEpoch_CantGetTgtAttsCurrEpoch(t *testing.T) {
|
|
epoch := uint64(1)
|
|
|
|
atts := []*pb.PendingAttestation{{Data: ðpb.AttestationData{Crosslink: ðpb.Crosslink{Shard: 100}}}}
|
|
_, err := state.ProcessEpoch(context.Background(), &pb.BeaconState{
|
|
Slot: epoch * params.BeaconConfig().SlotsPerEpoch,
|
|
BlockRoots: make([][]byte, 128),
|
|
RandaoMixes: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
ActiveIndexRoots: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
CurrentEpochAttestations: atts})
|
|
if !strings.Contains(err.Error(), "could not get target atts current epoch") {
|
|
t.Fatal("Did not receive wanted error")
|
|
}
|
|
}
|
|
|
|
func TestProcessEpoch_CanProcess(t *testing.T) {
|
|
helpers.ClearAllCaches()
|
|
epoch := uint64(1)
|
|
|
|
atts := []*pb.PendingAttestation{{Data: ðpb.AttestationData{Crosslink: ðpb.Crosslink{Shard: 0}, Target: ðpb.Checkpoint{}}}}
|
|
var crosslinks []*ethpb.Crosslink
|
|
for i := uint64(0); i < params.BeaconConfig().ShardCount; i++ {
|
|
crosslinks = append(crosslinks, ðpb.Crosslink{
|
|
StartEpoch: 0,
|
|
DataRoot: []byte{'A'},
|
|
})
|
|
}
|
|
newState, err := state.ProcessEpoch(context.Background(), &pb.BeaconState{
|
|
Slot: epoch*params.BeaconConfig().SlotsPerEpoch + 1,
|
|
BlockRoots: make([][]byte, 128),
|
|
Slashings: []uint64{0, 1e9, 1e9},
|
|
RandaoMixes: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
ActiveIndexRoots: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
CompactCommitteesRoots: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
CurrentCrosslinks: crosslinks,
|
|
CurrentEpochAttestations: atts,
|
|
FinalizedCheckpoint: ðpb.Checkpoint{},
|
|
JustificationBits: bitfield.Bitvector4{0x00},
|
|
CurrentJustifiedCheckpoint: ðpb.Checkpoint{},
|
|
})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
wanted := uint64(0)
|
|
if newState.Slashings[2] != wanted {
|
|
t.Errorf("Wanted slashed balance: %d, got: %d", wanted, newState.Slashings[2])
|
|
}
|
|
}
|
|
|
|
func TestProcessEpoch_NotPanicOnEmptyActiveValidatorIndices(t *testing.T) {
|
|
newState := &pb.BeaconState{
|
|
ActiveIndexRoots: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
Slashings: make([]uint64, params.BeaconConfig().EpochsPerSlashingsVector),
|
|
RandaoMixes: make([][]byte, params.BeaconConfig().SlotsPerEpoch),
|
|
}
|
|
|
|
state.ProcessEpoch(context.Background(), newState)
|
|
}
|
|
|
|
func BenchmarkProcessEpoch65536Validators(b *testing.B) {
|
|
logrus.SetLevel(logrus.PanicLevel)
|
|
|
|
helpers.ClearAllCaches()
|
|
epoch := uint64(1)
|
|
|
|
validatorCount := params.BeaconConfig().MinGenesisActiveValidatorCount * 4
|
|
shardCount := validatorCount / params.BeaconConfig().TargetCommitteeSize
|
|
validators := make([]*ethpb.Validator, validatorCount)
|
|
balances := make([]uint64, validatorCount)
|
|
|
|
for i := 0; i < len(validators); i++ {
|
|
validators[i] = ðpb.Validator{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
|
|
}
|
|
balances[i] = params.BeaconConfig().MaxEffectiveBalance
|
|
}
|
|
|
|
var atts []*pb.PendingAttestation
|
|
for i := uint64(0); i < shardCount; i++ {
|
|
atts = append(atts, &pb.PendingAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Crosslink: ðpb.Crosslink{
|
|
Shard: i,
|
|
},
|
|
},
|
|
AggregationBits: []byte{0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF},
|
|
InclusionDelay: 1,
|
|
})
|
|
}
|
|
|
|
var crosslinks []*ethpb.Crosslink
|
|
for i := uint64(0); i < params.BeaconConfig().ShardCount; i++ {
|
|
crosslinks = append(crosslinks, ðpb.Crosslink{
|
|
StartEpoch: 0,
|
|
DataRoot: []byte{'A'},
|
|
})
|
|
}
|
|
|
|
s := &pb.BeaconState{
|
|
Slot: epoch*params.BeaconConfig().SlotsPerEpoch + 1,
|
|
Validators: validators,
|
|
Balances: balances,
|
|
StartShard: 512,
|
|
FinalizedCheckpoint: ðpb.Checkpoint{},
|
|
BlockRoots: make([][]byte, 254),
|
|
Slashings: []uint64{0, 1e9, 0},
|
|
RandaoMixes: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
ActiveIndexRoots: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
CurrentCrosslinks: crosslinks,
|
|
PreviousEpochAttestations: atts,
|
|
}
|
|
|
|
// Precache the shuffled indices
|
|
for i := uint64(0); i < shardCount; i++ {
|
|
if _, err := helpers.CrosslinkCommittee(s, 0, i); err != nil {
|
|
b.Fatal(err)
|
|
}
|
|
}
|
|
|
|
b.ResetTimer()
|
|
for n := 0; n < b.N; n++ {
|
|
_, err := state.ProcessEpoch(context.Background(), s)
|
|
if err != nil {
|
|
b.Fatal(err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func BenchmarkProcessBlk_65536Validators_FullBlock(b *testing.B) {
|
|
logrus.SetLevel(logrus.PanicLevel)
|
|
helpers.ClearAllCaches()
|
|
testConfig := params.BeaconConfig()
|
|
testConfig.MaxTransfers = 1
|
|
|
|
validatorCount := params.BeaconConfig().MinGenesisActiveValidatorCount * 4
|
|
shardCount := validatorCount / params.BeaconConfig().TargetCommitteeSize
|
|
validators := make([]*ethpb.Validator, validatorCount)
|
|
for i := 0; i < len(validators); i++ {
|
|
validators[i] = ðpb.Validator{
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
WithdrawableEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
ActivationEligibilityEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
}
|
|
}
|
|
validatorBalances := make([]uint64, len(validators))
|
|
for i := 0; i < len(validatorBalances); i++ {
|
|
validatorBalances[i] = params.BeaconConfig().MaxEffectiveBalance
|
|
}
|
|
|
|
randaoMixes := make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector)
|
|
for i := 0; i < len(randaoMixes); i++ {
|
|
randaoMixes[i] = params.BeaconConfig().ZeroHash[:]
|
|
}
|
|
|
|
var crosslinks []*ethpb.Crosslink
|
|
for i := uint64(0); i < params.BeaconConfig().ShardCount; i++ {
|
|
crosslinks = append(crosslinks, ðpb.Crosslink{
|
|
StartEpoch: 0,
|
|
DataRoot: []byte{'A'},
|
|
})
|
|
}
|
|
|
|
s := &pb.BeaconState{
|
|
Slot: 20,
|
|
LatestBlockHeader: ðpb.BeaconBlockHeader{},
|
|
BlockRoots: make([][]byte, 254),
|
|
RandaoMixes: randaoMixes,
|
|
Validators: validators,
|
|
Balances: validatorBalances,
|
|
Slashings: make([]uint64, params.BeaconConfig().EpochsPerSlashingsVector),
|
|
ActiveIndexRoots: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
CurrentJustifiedCheckpoint: ðpb.Checkpoint{
|
|
Root: []byte("hello-world"),
|
|
},
|
|
Fork: &pb.Fork{
|
|
PreviousVersion: []byte{0, 0, 0, 0},
|
|
CurrentVersion: []byte{0, 0, 0, 0},
|
|
},
|
|
CurrentCrosslinks: crosslinks,
|
|
}
|
|
|
|
// Set up proposer slashing object for block
|
|
proposerSlashings := []*ethpb.ProposerSlashing{
|
|
{
|
|
ProposerIndex: 1,
|
|
Header_1: ðpb.BeaconBlockHeader{
|
|
Slot: 0,
|
|
Signature: []byte("A"),
|
|
},
|
|
Header_2: ðpb.BeaconBlockHeader{
|
|
Slot: 0,
|
|
Signature: []byte("B"),
|
|
},
|
|
},
|
|
}
|
|
|
|
// Set up attester slashing object for block
|
|
attesterSlashings := []*ethpb.AttesterSlashing{
|
|
{
|
|
Attestation_1: ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Crosslink: ðpb.Crosslink{
|
|
Shard: 5,
|
|
},
|
|
},
|
|
CustodyBit_0Indices: []uint64{2, 3},
|
|
},
|
|
Attestation_2: ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Crosslink: ðpb.Crosslink{
|
|
Shard: 5,
|
|
},
|
|
},
|
|
CustodyBit_0Indices: []uint64{2, 3},
|
|
},
|
|
},
|
|
}
|
|
|
|
// Set up deposit object for block
|
|
deposit := ðpb.Deposit{
|
|
Data: ðpb.Deposit_Data{
|
|
PublicKey: []byte{1, 2, 3},
|
|
Amount: params.BeaconConfig().MaxEffectiveBalance,
|
|
},
|
|
}
|
|
leaf, err := ssz.HashTreeRoot(deposit.Data)
|
|
if err != nil {
|
|
b.Fatal(err)
|
|
}
|
|
depositTrie, err := trieutil.GenerateTrieFromItems([][]byte{leaf[:]}, int(params.BeaconConfig().DepositContractTreeDepth))
|
|
if err != nil {
|
|
b.Fatalf("Could not generate trie: %v", err)
|
|
}
|
|
proof, err := depositTrie.MerkleProof(0)
|
|
if err != nil {
|
|
b.Fatalf("Could not generate proof: %v", err)
|
|
}
|
|
deposit.Proof = proof
|
|
root := depositTrie.Root()
|
|
|
|
// Set up randao reveal object for block
|
|
proposerIdx, err := helpers.BeaconProposerIndex(s)
|
|
if err != nil {
|
|
b.Fatal(err)
|
|
}
|
|
priv, err := bls.RandKey(rand.Reader)
|
|
if err != nil {
|
|
b.Fatal(err)
|
|
}
|
|
s.Validators[proposerIdx].PublicKey = priv.PublicKey().Marshal()
|
|
buf := make([]byte, 32)
|
|
binary.LittleEndian.PutUint64(buf, 0)
|
|
domain := helpers.Domain(s, 0, params.BeaconConfig().DomainRandao)
|
|
epochSignature := priv.Sign(buf, domain)
|
|
|
|
// Set up transfer object for block
|
|
transfers := []*ethpb.Transfer{
|
|
{
|
|
Slot: s.Slot,
|
|
SenderIndex: 3,
|
|
RecipientIndex: 4,
|
|
Fee: params.BeaconConfig().MinDepositAmount,
|
|
Amount: params.BeaconConfig().MinDepositAmount,
|
|
SenderWithdrawalPublicKey: []byte("A"),
|
|
},
|
|
}
|
|
buf = []byte{params.BeaconConfig().BLSWithdrawalPrefixByte}
|
|
pubKey := []byte("A")
|
|
hashed := hashutil.Hash(pubKey)
|
|
buf = append(buf, hashed[:]...)
|
|
s.Validators[3].WithdrawalCredentials = buf
|
|
|
|
// Set up attestations obj for block.
|
|
encoded, err := ssz.HashTreeRoot(s.CurrentCrosslinks[0])
|
|
if err != nil {
|
|
b.Fatal(err)
|
|
}
|
|
|
|
attestations := make([]*ethpb.Attestation, 128)
|
|
for i := 0; i < len(attestations); i++ {
|
|
attestations[i] = ðpb.Attestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Root: []byte("hello-world")},
|
|
Crosslink: ðpb.Crosslink{
|
|
Shard: uint64(i),
|
|
ParentRoot: encoded[:],
|
|
DataRoot: params.BeaconConfig().ZeroHash[:],
|
|
},
|
|
},
|
|
AggregationBits: bitfield.Bitlist{0xC0, 0xC0, 0xC0, 0xC0, 0xC0, 0xC0, 0xC0,
|
|
0xC0, 0xC0, 0xC0, 0xC0, 0xC0, 0xC0, 0xC0, 0xC0, 0xC0, 0x01},
|
|
CustodyBits: bitfield.NewBitlist(0),
|
|
}
|
|
}
|
|
|
|
blk := ðpb.BeaconBlock{
|
|
Slot: s.Slot,
|
|
Body: ðpb.BeaconBlockBody{
|
|
Eth1Data: ðpb.Eth1Data{
|
|
DepositRoot: root[:],
|
|
BlockHash: root[:],
|
|
},
|
|
RandaoReveal: epochSignature.Marshal(),
|
|
Attestations: attestations,
|
|
ProposerSlashings: proposerSlashings,
|
|
AttesterSlashings: attesterSlashings,
|
|
Transfers: transfers,
|
|
},
|
|
}
|
|
|
|
// Precache the shuffled indices
|
|
for i := uint64(0); i < shardCount; i++ {
|
|
if _, err := helpers.CrosslinkCommittee(s, 0, i); err != nil {
|
|
b.Fatal(err)
|
|
}
|
|
}
|
|
|
|
b.ResetTimer()
|
|
for n := 0; n < b.N; n++ {
|
|
_, err := state.ProcessBlock(context.Background(), s, blk)
|
|
if err != nil {
|
|
b.Fatal(err)
|
|
}
|
|
// Reset state fields to process block again
|
|
s.Validators[1].Slashed = false
|
|
s.Validators[2].Slashed = false
|
|
s.Balances[3] += 2 * params.BeaconConfig().MinDepositAmount
|
|
}
|
|
}
|
|
|
|
func TestCanProcessEpoch_TrueOnEpochs(t *testing.T) {
|
|
if params.BeaconConfig().SlotsPerEpoch != 64 {
|
|
t.Errorf("SlotsPerEpoch should be 64 for these tests to pass")
|
|
}
|
|
|
|
tests := []struct {
|
|
slot uint64
|
|
canProcessEpoch bool
|
|
}{
|
|
{
|
|
slot: 1,
|
|
canProcessEpoch: false,
|
|
}, {
|
|
slot: 63,
|
|
canProcessEpoch: true,
|
|
},
|
|
{
|
|
slot: 64,
|
|
canProcessEpoch: false,
|
|
}, {
|
|
slot: 127,
|
|
canProcessEpoch: true,
|
|
}, {
|
|
slot: 1000000000,
|
|
canProcessEpoch: false,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
s := &pb.BeaconState{Slot: tt.slot}
|
|
if state.CanProcessEpoch(s) != tt.canProcessEpoch {
|
|
t.Errorf(
|
|
"CanProcessEpoch(%d) = %v. Wanted %v",
|
|
tt.slot,
|
|
state.CanProcessEpoch(s),
|
|
tt.canProcessEpoch,
|
|
)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestProcessOperations_OverMaxProposerSlashings(t *testing.T) {
|
|
maxSlashings := params.BeaconConfig().MaxProposerSlashings
|
|
block := ðpb.BeaconBlock{
|
|
Body: ðpb.BeaconBlockBody{
|
|
ProposerSlashings: make([]*ethpb.ProposerSlashing, maxSlashings+1),
|
|
},
|
|
}
|
|
|
|
want := fmt.Sprintf("number of proposer slashings (%d) in block body exceeds allowed threshold of %d",
|
|
len(block.Body.ProposerSlashings), params.BeaconConfig().MaxProposerSlashings)
|
|
if _, err := state.ProcessOperations(
|
|
context.Background(),
|
|
&pb.BeaconState{},
|
|
block.Body,
|
|
); !strings.Contains(err.Error(), want) {
|
|
t.Errorf("Expected %s, received %v", want, err)
|
|
}
|
|
}
|
|
|
|
func TestProcessOperations_OverMaxAttesterSlashings(t *testing.T) {
|
|
maxSlashings := params.BeaconConfig().MaxAttesterSlashings
|
|
block := ðpb.BeaconBlock{
|
|
Body: ðpb.BeaconBlockBody{
|
|
AttesterSlashings: make([]*ethpb.AttesterSlashing, maxSlashings+1),
|
|
},
|
|
}
|
|
|
|
want := fmt.Sprintf("number of attester slashings (%d) in block body exceeds allowed threshold of %d",
|
|
len(block.Body.AttesterSlashings), params.BeaconConfig().MaxAttesterSlashings)
|
|
if _, err := state.ProcessOperations(
|
|
context.Background(),
|
|
&pb.BeaconState{},
|
|
block.Body,
|
|
); !strings.Contains(err.Error(), want) {
|
|
t.Errorf("Expected %s, received %v", want, err)
|
|
}
|
|
}
|
|
|
|
func TestProcessOperations_OverMaxAttestations(t *testing.T) {
|
|
block := ðpb.BeaconBlock{
|
|
Body: ðpb.BeaconBlockBody{
|
|
Attestations: make([]*ethpb.Attestation, params.BeaconConfig().MaxAttestations+1),
|
|
},
|
|
}
|
|
|
|
want := fmt.Sprintf("number of attestations (%d) in block body exceeds allowed threshold of %d",
|
|
len(block.Body.Attestations), params.BeaconConfig().MaxAttestations)
|
|
if _, err := state.ProcessOperations(
|
|
context.Background(),
|
|
&pb.BeaconState{},
|
|
block.Body,
|
|
); !strings.Contains(err.Error(), want) {
|
|
t.Errorf("Expected %s, received %v", want, err)
|
|
}
|
|
}
|
|
|
|
func TestProcessOperations_OverMaxTransfers(t *testing.T) {
|
|
block := ðpb.BeaconBlock{
|
|
Body: ðpb.BeaconBlockBody{
|
|
Transfers: make([]*ethpb.Transfer, params.BeaconConfig().MaxTransfers+1),
|
|
},
|
|
}
|
|
|
|
want := fmt.Sprintf("number of transfers (%d) in block body exceeds allowed threshold of %d",
|
|
len(block.Body.Transfers), params.BeaconConfig().MaxTransfers)
|
|
if _, err := state.ProcessOperations(
|
|
context.Background(),
|
|
&pb.BeaconState{},
|
|
block.Body,
|
|
); !strings.Contains(err.Error(), want) {
|
|
t.Errorf("Expected %s, received %v", want, err)
|
|
}
|
|
}
|
|
|
|
func TestProcessOperation_OverMaxVoluntaryExits(t *testing.T) {
|
|
maxExits := params.BeaconConfig().MaxVoluntaryExits
|
|
block := ðpb.BeaconBlock{
|
|
Body: ðpb.BeaconBlockBody{
|
|
VoluntaryExits: make([]*ethpb.VoluntaryExit, maxExits+1),
|
|
},
|
|
}
|
|
|
|
want := fmt.Sprintf("number of voluntary exits (%d) in block body exceeds allowed threshold of %d",
|
|
len(block.Body.VoluntaryExits), maxExits)
|
|
if _, err := state.ProcessOperations(
|
|
context.Background(),
|
|
&pb.BeaconState{},
|
|
block.Body,
|
|
); !strings.Contains(err.Error(), want) {
|
|
t.Errorf("Expected %s, received %v", want, err)
|
|
}
|
|
}
|
|
|
|
func TestProcessOperations_IncorrectDeposits(t *testing.T) {
|
|
s := &pb.BeaconState{
|
|
Eth1Data: ðpb.Eth1Data{DepositCount: 100},
|
|
Eth1DepositIndex: 98,
|
|
}
|
|
block := ðpb.BeaconBlock{
|
|
Body: ðpb.BeaconBlockBody{
|
|
Deposits: []*ethpb.Deposit{{}},
|
|
},
|
|
}
|
|
|
|
want := fmt.Sprintf("incorrect outstanding deposits in block body, wanted: %d, got: %d",
|
|
s.Eth1Data.DepositCount-s.Eth1DepositIndex, len(block.Body.Deposits))
|
|
if _, err := state.ProcessOperations(
|
|
context.Background(),
|
|
s,
|
|
block.Body,
|
|
); !strings.Contains(err.Error(), want) {
|
|
t.Errorf("Expected %s, received %v", want, err)
|
|
}
|
|
}
|
|
|
|
func TestProcessOperation_DuplicateTransfer(t *testing.T) {
|
|
testConfig := params.BeaconConfig()
|
|
testConfig.MaxTransfers = 2
|
|
transfers := []*ethpb.Transfer{
|
|
{
|
|
Amount: 1,
|
|
},
|
|
{
|
|
Amount: 1,
|
|
},
|
|
}
|
|
registry := []*ethpb.Validator{}
|
|
s := &pb.BeaconState{
|
|
Validators: registry,
|
|
Eth1Data: ðpb.Eth1Data{DepositCount: 100},
|
|
Eth1DepositIndex: 98,
|
|
}
|
|
block := ðpb.BeaconBlock{
|
|
Body: ðpb.BeaconBlockBody{
|
|
Transfers: transfers,
|
|
Deposits: []*ethpb.Deposit{{}, {}},
|
|
},
|
|
}
|
|
|
|
want := "duplicate transfer"
|
|
if _, err := state.ProcessOperations(
|
|
context.Background(),
|
|
s,
|
|
block.Body,
|
|
); !strings.Contains(err.Error(), want) {
|
|
t.Errorf("Expected %s, received %v", want, err)
|
|
}
|
|
}
|