mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 04:47:18 +00:00
92932ae58e
* Change LowestSignedProposal to Also Return a Boolean for Slashing Protection (#8020) * amend to use bools * ineff assign * comment * Update `LowestSignedTargetEpoch` to include exists (#8004) * Replace highest with lowerest * Update validator/db/kv/attestation_history_v2.go Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * Update validator/db/kv/attestation_history_v2.go Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * Invert equality for saveLowestSourceTargetToDB * Add eip checks to ensure epochs cant be lower than db ones * Should be less than equal to * Check if epoch exists in DB getters * Revert run time checks Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com> * Export Attesting History for Slashing Interchange Standard (#8027) * added in att history checks * logic for export * export return nil * test for export atts * round trip passes first try! * rem println * fix up tests * pass test * Validate Proposers Are Not Slashable With Regard to Data Within Slasher Interchange JSON (#8031) * filter slashable blocks and atts in same json stub * add filter blocks func * add test for filtering out the bad public keys * Export Slashing Protection History Via CLI (#8040) * include cli entrypoint for history exports * builds properly * test to confirm we export the data as expected * abstract helpers properly * full test suite * gaz * better errors * marshal ident * Add the additional eip-3076 attestation checks (#7966) * Replace highest with lowerest * Update validator/db/kv/attestation_history_v2.go Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * Update validator/db/kv/attestation_history_v2.go Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * Invert equality for saveLowestSourceTargetToDB * Add eip checks to ensure epochs cant be lower than db ones * Should be less than equal to * Check if epoch exists in DB getters Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * Add EIP-3076 Invariants for Proposer Slashing Protection (#8067) * add invariant for proposer protection * write different test cases * pass tests * Add EIP-3076 Interchange JSON CLI command to validator (#7880) * Import JSON CLI * CLI impotr * f * Begin adding new commands in slashing protection * Move testing helpers to separate packae * Add command for importing slashing protection JSONs * fix import cycle * fix test * Undo cleaning changes * Improvements * Add better prompts * Fix prompt * Fix * Fix * Fix * Fix conflict * Fix * Fixes * Fixes * Fix exported func * test func * Fixes * fix test * simplify import and standardize with export * add round trip test * true integration test works * fix up comments * logrus * better error * fix build * build fix * Update validator/slashing-protection/cli_export.go Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> * Update validator/slashing-protection/cli_import.go Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> * fmt Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> * Filter Slashable Attester Public Keys in Slashing Interchange Import (#8051) * filter slashable attesters from the same JSON * builds * fix up initially broken test * circular dep * import fix * giz * added in attesting history package * add test for filter slashable attester keys * pass tests * Save Slashable Keys to Disk in the Validator Client (#8082) * begin db funcs * add in test and bucket * gaz * rem changes to import * ineff assign * add godoc * Properly Handle Duplicate Public Key Entries in Slashing Interchange Imports (#8089) * Prevent Blacklisted Public Keys from Slashing Protection Imports from Having Duties at Runtime (#8084) * tests on update duties * ensure the slashable public keys are filtered out from update duties via test * begin test * attempt test * rename for better context * pass tests * deep source * ensure tests pass * Check for Signing Root Mismatch When Submitting Proposals and Importing Proposals in Slashing Interchange (#8085) * flexible signing root * add test * add tests * fix test * Preston's comments * res tests * ensure we consider the case for minimum proposals * pass test * tests passing * rem unused code * Set Empty Epochs in Between Attestations as FAR_FUTURE_EPOCH in Attesting History (#8113) * set target data * all tests passing * ineff assign * signing root * Add Slashing Interchange, EIP-3076, Spec Tests to Prysm (#7858) * Add interchange test framework * add checks for attestations * Import genesis root if necessary * flexible signing root * add test * Sync * fix up test build * only 3 failing tests now * two failing * attempting to debug problems in conformity tests * include latest changes * protect test in validator/client passing * pass tests * imports * spec tests passing with bazel * gh archive link to spectests using tar.gz suffix * rev * rev more comment changes * fix sha * godoc * add back save Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * Implement Migration for Unattested Epochs in Attesting History Database (#8121) * migrate attesting history backbone done * begin migration logic * implement migration logic * migration test * add test * migration logic * bazel * migration to its own file * Handle empty blocks and attestations in interchange json and sort interchange json by public key (#8132) * Handle empty blocks and attestations in interchange json * add test * sort json * easier empty arrays * pass test Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * builds * more tests finally build * Align Slashing Interchange With Optimized Slashing Protection (#8268) * attestation history should account for multiple targets per source * attempt at some fixes * attempt some test fixes * experimenting with sorting * only one more failing test * tests now pass * slash protect tests passing * only few tests now failing * only spec tests failing now * spec tests passing * all tests passing * helper function for verifying double votes * use helper * gaz * deep source * tests fixed * expect specific number of times for domain data calls * final comments * Batch Save Imported EIP-3076 Attestations (#8304) * optimize save * test added * add test for sad path Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com> * revert bad find replace * add comment to db func Co-authored-by: terence tsao <terence@prysmaticlabs.com> Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com> Co-authored-by: Ivan Martinez <ivanthegreatdev@gmail.com> Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> Co-authored-by: Shay Zluf <thezluf@gmail.com>
114 lines
3.9 KiB
Go
114 lines
3.9 KiB
Go
package testing
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"github.com/prysmaticlabs/prysm/shared/rand"
|
|
"github.com/prysmaticlabs/prysm/validator/db/kv"
|
|
"github.com/prysmaticlabs/prysm/validator/slashing-protection/local/standard-protection-format/format"
|
|
)
|
|
|
|
// MockSlashingProtectionJSON creates a mock, full slashing protection JSON struct
|
|
// using attesting and proposing histories provided.
|
|
func MockSlashingProtectionJSON(
|
|
publicKeys [][48]byte,
|
|
attestingHistories [][]*kv.AttestationRecord,
|
|
proposalHistories []kv.ProposalHistoryForPubkey,
|
|
) (*format.EIPSlashingProtectionFormat, error) {
|
|
standardProtectionFormat := &format.EIPSlashingProtectionFormat{}
|
|
standardProtectionFormat.Metadata.GenesisValidatorsRoot = fmt.Sprintf("%#x", bytesutil.PadTo([]byte{32}, 32))
|
|
standardProtectionFormat.Metadata.InterchangeFormatVersion = format.INTERCHANGE_FORMAT_VERSION
|
|
for i := 0; i < len(publicKeys); i++ {
|
|
data := &format.ProtectionData{
|
|
Pubkey: fmt.Sprintf("%#x", publicKeys[i]),
|
|
}
|
|
if len(attestingHistories) > 0 {
|
|
for _, att := range attestingHistories[i] {
|
|
data.SignedAttestations = append(data.SignedAttestations, &format.SignedAttestation{
|
|
TargetEpoch: fmt.Sprintf("%d", att.Target),
|
|
SourceEpoch: fmt.Sprintf("%d", att.Source),
|
|
SigningRoot: fmt.Sprintf("%#x", att.SigningRoot),
|
|
})
|
|
}
|
|
}
|
|
if len(proposalHistories) > 0 {
|
|
for _, proposal := range proposalHistories[i].Proposals {
|
|
block := &format.SignedBlock{
|
|
Slot: fmt.Sprintf("%d", proposal.Slot),
|
|
SigningRoot: fmt.Sprintf("%#x", proposal.SigningRoot),
|
|
}
|
|
data.SignedBlocks = append(data.SignedBlocks, block)
|
|
}
|
|
}
|
|
standardProtectionFormat.Data = append(standardProtectionFormat.Data, data)
|
|
}
|
|
return standardProtectionFormat, nil
|
|
}
|
|
|
|
// MockAttestingAndProposalHistories given a number of validators, creates mock attesting
|
|
// and proposing histories within WEAK_SUBJECTIVITY_PERIOD bounds.
|
|
func MockAttestingAndProposalHistories(numValidators int) ([][]*kv.AttestationRecord, []kv.ProposalHistoryForPubkey) {
|
|
// deduplicate and transform them into our internal format.
|
|
attData := make([][]*kv.AttestationRecord, numValidators)
|
|
proposalData := make([]kv.ProposalHistoryForPubkey, numValidators)
|
|
gen := rand.NewGenerator()
|
|
for v := 0; v < numValidators; v++ {
|
|
latestTarget := gen.Intn(int(params.BeaconConfig().WeakSubjectivityPeriod) / 1000)
|
|
// If 0, we change the value to 1 as the we compute source by doing (target-1)
|
|
// to prevent any underflows in this setup helper.
|
|
if latestTarget == 0 {
|
|
latestTarget = 1
|
|
}
|
|
historicalAtts := make([]*kv.AttestationRecord, 0)
|
|
proposals := make([]kv.Proposal, 0)
|
|
for i := 1; i < latestTarget; i++ {
|
|
signingRoot := [32]byte{}
|
|
signingRootStr := fmt.Sprintf("%d", i)
|
|
copy(signingRoot[:], signingRootStr)
|
|
historicalAtts = append(historicalAtts, &kv.AttestationRecord{
|
|
Source: uint64(i - 1),
|
|
Target: uint64(i),
|
|
SigningRoot: signingRoot,
|
|
})
|
|
}
|
|
for i := 1; i <= latestTarget; i++ {
|
|
signingRoot := [32]byte{}
|
|
signingRootStr := fmt.Sprintf("%d", i)
|
|
copy(signingRoot[:], signingRootStr)
|
|
proposals = append(proposals, kv.Proposal{
|
|
Slot: uint64(i),
|
|
SigningRoot: signingRoot[:],
|
|
})
|
|
}
|
|
proposalData[v] = kv.ProposalHistoryForPubkey{Proposals: proposals}
|
|
attData[v] = historicalAtts
|
|
}
|
|
return attData, proposalData
|
|
}
|
|
|
|
// CreateRandomPubKeys --
|
|
func CreateRandomPubKeys(numValidators int) ([][48]byte, error) {
|
|
pubKeys := make([][48]byte, numValidators)
|
|
for i := 0; i < numValidators; i++ {
|
|
randKey, err := bls.RandKey()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
copy(pubKeys[i][:], randKey.PublicKey().Marshal())
|
|
}
|
|
return pubKeys, nil
|
|
}
|
|
|
|
// CreateMockRoots --
|
|
func CreateMockRoots(numRoots int) [][32]byte {
|
|
roots := make([][32]byte, numRoots)
|
|
for i := 0; i < numRoots; i++ {
|
|
var rt [32]byte
|
|
copy(rt[:], fmt.Sprintf("%d", i))
|
|
}
|
|
return roots
|
|
}
|