mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-23 20:07:17 +00:00
d17996f8b0
* Update V3 from V4 * Fix build v3 -> v4 * Update ssz * Update beacon_chain.pb.go * Fix formatter import * Update update-mockgen.sh comment to v4 * Fix conflicts. Pass build and tests * Fix test
196 lines
7.2 KiB
Go
196 lines
7.2 KiB
Go
package client
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/golang/mock/gomock"
|
|
"github.com/prysmaticlabs/prysm/v4/config/features"
|
|
fieldparams "github.com/prysmaticlabs/prysm/v4/config/fieldparams"
|
|
"github.com/prysmaticlabs/prysm/v4/config/params"
|
|
"github.com/prysmaticlabs/prysm/v4/consensus-types/blocks"
|
|
"github.com/prysmaticlabs/prysm/v4/consensus-types/interfaces"
|
|
"github.com/prysmaticlabs/prysm/v4/consensus-types/primitives"
|
|
ethpb "github.com/prysmaticlabs/prysm/v4/proto/prysm/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/v4/testing/require"
|
|
"github.com/prysmaticlabs/prysm/v4/testing/util"
|
|
)
|
|
|
|
func Test_slashableProposalCheck_PreventsLowerThanMinProposal(t *testing.T) {
|
|
ctx := context.Background()
|
|
validator, _, validatorKey, finish := setup(t)
|
|
defer finish()
|
|
lowestSignedSlot := primitives.Slot(10)
|
|
var pubKeyBytes [fieldparams.BLSPubkeyLength]byte
|
|
copy(pubKeyBytes[:], validatorKey.PublicKey().Marshal())
|
|
|
|
// We save a proposal at the lowest signed slot in the DB.
|
|
err := validator.db.SaveProposalHistoryForSlot(ctx, pubKeyBytes, lowestSignedSlot, []byte{1})
|
|
require.NoError(t, err)
|
|
require.NoError(t, err)
|
|
|
|
// We expect the same block with a slot lower than the lowest
|
|
// signed slot to fail validation.
|
|
blk := ðpb.SignedBeaconBlock{
|
|
Block: ðpb.BeaconBlock{
|
|
Slot: lowestSignedSlot - 1,
|
|
ProposerIndex: 0,
|
|
Body: ðpb.BeaconBlockBody{},
|
|
},
|
|
Signature: params.BeaconConfig().EmptySignature[:],
|
|
}
|
|
wsb, err := blocks.NewSignedBeaconBlock(blk)
|
|
require.NoError(t, err)
|
|
err = validator.slashableProposalCheck(context.Background(), pubKeyBytes, wsb, [32]byte{4})
|
|
require.ErrorContains(t, "could not sign block with slot <= lowest signed", err)
|
|
|
|
// We expect the same block with a slot equal to the lowest
|
|
// signed slot to pass validation if signing roots are equal.
|
|
blk = ðpb.SignedBeaconBlock{
|
|
Block: ðpb.BeaconBlock{
|
|
Slot: lowestSignedSlot,
|
|
ProposerIndex: 0,
|
|
Body: ðpb.BeaconBlockBody{},
|
|
},
|
|
Signature: params.BeaconConfig().EmptySignature[:],
|
|
}
|
|
wsb, err = blocks.NewSignedBeaconBlock(blk)
|
|
require.NoError(t, err)
|
|
err = validator.slashableProposalCheck(context.Background(), pubKeyBytes, wsb, [32]byte{1})
|
|
require.NoError(t, err)
|
|
|
|
// We expect the same block with a slot equal to the lowest
|
|
// signed slot to fail validation if signing roots are different.
|
|
wsb, err = blocks.NewSignedBeaconBlock(blk)
|
|
require.NoError(t, err)
|
|
err = validator.slashableProposalCheck(context.Background(), pubKeyBytes, wsb, [32]byte{4})
|
|
require.ErrorContains(t, failedBlockSignLocalErr, err)
|
|
|
|
// We expect the same block with a slot > than the lowest
|
|
// signed slot to pass validation.
|
|
blk = ðpb.SignedBeaconBlock{
|
|
Block: ðpb.BeaconBlock{
|
|
Slot: lowestSignedSlot + 1,
|
|
ProposerIndex: 0,
|
|
Body: ðpb.BeaconBlockBody{},
|
|
},
|
|
Signature: params.BeaconConfig().EmptySignature[:],
|
|
}
|
|
|
|
wsb, err = blocks.NewSignedBeaconBlock(blk)
|
|
require.NoError(t, err)
|
|
err = validator.slashableProposalCheck(context.Background(), pubKeyBytes, wsb, [32]byte{3})
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func Test_slashableProposalCheck(t *testing.T) {
|
|
ctx := context.Background()
|
|
config := &features.Flags{
|
|
RemoteSlasherProtection: true,
|
|
}
|
|
reset := features.InitWithReset(config)
|
|
defer reset()
|
|
validator, mocks, validatorKey, finish := setup(t)
|
|
defer finish()
|
|
|
|
blk := util.HydrateSignedBeaconBlock(ðpb.SignedBeaconBlock{
|
|
Block: ðpb.BeaconBlock{
|
|
Slot: 10,
|
|
ProposerIndex: 0,
|
|
Body: ðpb.BeaconBlockBody{},
|
|
},
|
|
Signature: params.BeaconConfig().EmptySignature[:],
|
|
})
|
|
|
|
var pubKeyBytes [fieldparams.BLSPubkeyLength]byte
|
|
copy(pubKeyBytes[:], validatorKey.PublicKey().Marshal())
|
|
|
|
// We save a proposal at slot 1 as our lowest proposal.
|
|
err := validator.db.SaveProposalHistoryForSlot(ctx, pubKeyBytes, 1, []byte{1})
|
|
require.NoError(t, err)
|
|
|
|
// We save a proposal at slot 10 with a dummy signing root.
|
|
dummySigningRoot := [32]byte{1}
|
|
err = validator.db.SaveProposalHistoryForSlot(ctx, pubKeyBytes, 10, dummySigningRoot[:])
|
|
require.NoError(t, err)
|
|
var pubKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(pubKey[:], validatorKey.PublicKey().Marshal())
|
|
sBlock, err := blocks.NewSignedBeaconBlock(blk)
|
|
require.NoError(t, err)
|
|
blockHdr, err := interfaces.SignedBeaconBlockHeaderFromBlockInterface(sBlock)
|
|
require.NoError(t, err)
|
|
|
|
mocks.slasherClient.EXPECT().IsSlashableBlock(
|
|
gomock.Any(), // ctx
|
|
blockHdr,
|
|
).Return(ðpb.ProposerSlashingResponse{}, nil /*err*/)
|
|
|
|
// We expect the same block sent out with the same root should not be slasahble.
|
|
err = validator.slashableProposalCheck(context.Background(), pubKey, sBlock, dummySigningRoot)
|
|
require.NoError(t, err)
|
|
|
|
// We expect the same block sent out with a different signing root should be slasahble.
|
|
err = validator.slashableProposalCheck(context.Background(), pubKey, sBlock, [32]byte{2})
|
|
require.ErrorContains(t, failedBlockSignLocalErr, err)
|
|
|
|
// We save a proposal at slot 11 with a nil signing root.
|
|
blk.Block.Slot = 11
|
|
sBlock, err = blocks.NewSignedBeaconBlock(blk)
|
|
require.NoError(t, err)
|
|
err = validator.db.SaveProposalHistoryForSlot(ctx, pubKeyBytes, blk.Block.Slot, nil)
|
|
require.NoError(t, err)
|
|
|
|
// We expect the same block sent out should return slashable error even
|
|
// if we had a nil signing root stored in the database.
|
|
err = validator.slashableProposalCheck(context.Background(), pubKey, sBlock, [32]byte{2})
|
|
require.ErrorContains(t, failedBlockSignLocalErr, err)
|
|
|
|
// A block with a different slot for which we do not have a proposing history
|
|
// should not be failing validation.
|
|
blk.Block.Slot = 9
|
|
sBlock, err = blocks.NewSignedBeaconBlock(blk)
|
|
require.NoError(t, err)
|
|
blockHdr, err = interfaces.SignedBeaconBlockHeaderFromBlockInterface(sBlock)
|
|
require.NoError(t, err)
|
|
mocks.slasherClient.EXPECT().IsSlashableBlock(
|
|
gomock.Any(), // ctx
|
|
blockHdr,
|
|
).Return(ðpb.ProposerSlashingResponse{}, nil /*err*/)
|
|
err = validator.slashableProposalCheck(context.Background(), pubKey, sBlock, [32]byte{3})
|
|
require.NoError(t, err, "Expected allowed block not to throw error")
|
|
}
|
|
|
|
func Test_slashableProposalCheck_RemoteProtection(t *testing.T) {
|
|
config := &features.Flags{
|
|
RemoteSlasherProtection: true,
|
|
}
|
|
reset := features.InitWithReset(config)
|
|
defer reset()
|
|
validator, m, validatorKey, finish := setup(t)
|
|
defer finish()
|
|
var pubKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(pubKey[:], validatorKey.PublicKey().Marshal())
|
|
|
|
blk := util.NewBeaconBlock()
|
|
blk.Block.Slot = 10
|
|
sBlock, err := blocks.NewSignedBeaconBlock(blk)
|
|
require.NoError(t, err)
|
|
blockHdr, err := interfaces.SignedBeaconBlockHeaderFromBlockInterface(sBlock)
|
|
require.NoError(t, err)
|
|
m.slasherClient.EXPECT().IsSlashableBlock(
|
|
gomock.Any(), // ctx
|
|
blockHdr,
|
|
).Return(ðpb.ProposerSlashingResponse{ProposerSlashings: []*ethpb.ProposerSlashing{{}}}, nil /*err*/)
|
|
|
|
err = validator.slashableProposalCheck(context.Background(), pubKey, sBlock, [32]byte{2})
|
|
require.ErrorContains(t, failedBlockSignExternalErr, err)
|
|
|
|
m.slasherClient.EXPECT().IsSlashableBlock(
|
|
gomock.Any(), // ctx
|
|
blockHdr,
|
|
).Return(ðpb.ProposerSlashingResponse{}, nil /*err*/)
|
|
|
|
err = validator.slashableProposalCheck(context.Background(), pubKey, sBlock, [32]byte{2})
|
|
require.NoError(t, err, "Expected allowed block not to throw error")
|
|
}
|