mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 21:07:18 +00:00
dca93ce641
* analyzer with tests * fix bazel file * modify analyzer to fix build issues * add analyzer to tool chain * remove arrays from inspections * fix redundant [:] operator * Merge branch 'master' into use-slice-directly * Merge branch 'master' into use-slice-directly * fix another inspection * add package-level comment
956 lines
34 KiB
Go
956 lines
34 KiB
Go
package state_test
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"encoding/binary"
|
|
"fmt"
|
|
"testing"
|
|
|
|
ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1"
|
|
"github.com/prysmaticlabs/go-bitfield"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/blocks"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/state"
|
|
beaconstate "github.com/prysmaticlabs/prysm/beacon-chain/state"
|
|
pb "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1"
|
|
"github.com/prysmaticlabs/prysm/shared/attestationutil"
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/hashutil"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/assert"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/require"
|
|
"github.com/prysmaticlabs/prysm/shared/trieutil"
|
|
"github.com/sirupsen/logrus"
|
|
)
|
|
|
|
func init() {
|
|
state.SkipSlotCache.Disable()
|
|
}
|
|
|
|
func TestExecuteStateTransition_IncorrectSlot(t *testing.T) {
|
|
base := &pb.BeaconState{
|
|
Slot: 5,
|
|
}
|
|
beaconState, err := beaconstate.InitializeFromProto(base)
|
|
require.NoError(t, err)
|
|
block := ðpb.SignedBeaconBlock{
|
|
Block: ðpb.BeaconBlock{
|
|
Slot: 4,
|
|
},
|
|
}
|
|
want := "expected state.slot"
|
|
_, err = state.ExecuteStateTransition(context.Background(), beaconState, block)
|
|
assert.ErrorContains(t, want, err)
|
|
}
|
|
|
|
func TestExecuteStateTransition_FullProcess(t *testing.T) {
|
|
beaconState, privKeys := testutil.DeterministicGenesisState(t, 100)
|
|
|
|
eth1Data := ðpb.Eth1Data{
|
|
DepositCount: 100,
|
|
DepositRoot: bytesutil.PadTo([]byte{2}, 32),
|
|
BlockHash: make([]byte, 32),
|
|
}
|
|
require.NoError(t, beaconState.SetSlot(params.BeaconConfig().SlotsPerEpoch-1))
|
|
e := beaconState.Eth1Data()
|
|
e.DepositCount = 100
|
|
require.NoError(t, beaconState.SetEth1Data(e))
|
|
bh := beaconState.LatestBlockHeader()
|
|
bh.Slot = beaconState.Slot()
|
|
require.NoError(t, beaconState.SetLatestBlockHeader(bh))
|
|
require.NoError(t, beaconState.SetEth1DataVotes([]*ethpb.Eth1Data{eth1Data}))
|
|
|
|
oldMix, err := beaconState.RandaoMixAtIndex(1)
|
|
require.NoError(t, err)
|
|
|
|
require.NoError(t, beaconState.SetSlot(beaconState.Slot()+1))
|
|
epoch := helpers.CurrentEpoch(beaconState)
|
|
randaoReveal, err := testutil.RandaoReveal(beaconState, epoch, privKeys)
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconState.SetSlot(beaconState.Slot()-1))
|
|
|
|
nextSlotState, err := state.ProcessSlots(context.Background(), beaconState.Copy(), beaconState.Slot()+1)
|
|
require.NoError(t, err)
|
|
parentRoot, err := nextSlotState.LatestBlockHeader().HashTreeRoot()
|
|
require.NoError(t, err)
|
|
proposerIdx, err := helpers.BeaconProposerIndex(nextSlotState)
|
|
require.NoError(t, err)
|
|
block := testutil.NewBeaconBlock()
|
|
block.Block.ProposerIndex = proposerIdx
|
|
block.Block.Slot = beaconState.Slot() + 1
|
|
block.Block.ParentRoot = parentRoot[:]
|
|
block.Block.Body.RandaoReveal = randaoReveal
|
|
block.Block.Body.Eth1Data = eth1Data
|
|
|
|
stateRoot, err := state.CalculateStateRoot(context.Background(), beaconState, block)
|
|
require.NoError(t, err)
|
|
|
|
block.Block.StateRoot = stateRoot[:]
|
|
|
|
sig, err := testutil.BlockSignature(beaconState, block.Block, privKeys)
|
|
require.NoError(t, err)
|
|
block.Signature = sig.Marshal()
|
|
|
|
beaconState, err = state.ExecuteStateTransition(context.Background(), beaconState, block)
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, params.BeaconConfig().SlotsPerEpoch, beaconState.Slot(), "Unexpected Slot number")
|
|
|
|
mix, err := beaconState.RandaoMixAtIndex(1)
|
|
require.NoError(t, err)
|
|
if bytes.Equal(mix, oldMix) {
|
|
t.Errorf("Did not expect new and old randao mix to equal, %#x == %#x", mix, oldMix)
|
|
}
|
|
}
|
|
|
|
func TestExecuteStateTransitionNoVerify_FullProcess(t *testing.T) {
|
|
beaconState, privKeys := testutil.DeterministicGenesisState(t, 100)
|
|
|
|
eth1Data := ðpb.Eth1Data{
|
|
DepositCount: 100,
|
|
DepositRoot: bytesutil.PadTo([]byte{2}, 32),
|
|
BlockHash: make([]byte, 32),
|
|
}
|
|
require.NoError(t, beaconState.SetSlot(params.BeaconConfig().SlotsPerEpoch-1))
|
|
e := beaconState.Eth1Data()
|
|
e.DepositCount = 100
|
|
require.NoError(t, beaconState.SetEth1Data(e))
|
|
bh := beaconState.LatestBlockHeader()
|
|
bh.Slot = beaconState.Slot()
|
|
require.NoError(t, beaconState.SetLatestBlockHeader(bh))
|
|
require.NoError(t, beaconState.SetEth1DataVotes([]*ethpb.Eth1Data{eth1Data}))
|
|
|
|
require.NoError(t, beaconState.SetSlot(beaconState.Slot()+1))
|
|
epoch := helpers.CurrentEpoch(beaconState)
|
|
randaoReveal, err := testutil.RandaoReveal(beaconState, epoch, privKeys)
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconState.SetSlot(beaconState.Slot()-1))
|
|
|
|
nextSlotState, err := state.ProcessSlots(context.Background(), beaconState.Copy(), beaconState.Slot()+1)
|
|
require.NoError(t, err)
|
|
parentRoot, err := nextSlotState.LatestBlockHeader().HashTreeRoot()
|
|
require.NoError(t, err)
|
|
proposerIdx, err := helpers.BeaconProposerIndex(nextSlotState)
|
|
require.NoError(t, err)
|
|
block := testutil.NewBeaconBlock()
|
|
block.Block.ProposerIndex = proposerIdx
|
|
block.Block.Slot = beaconState.Slot() + 1
|
|
block.Block.ParentRoot = parentRoot[:]
|
|
block.Block.Body.RandaoReveal = randaoReveal
|
|
block.Block.Body.Eth1Data = eth1Data
|
|
|
|
stateRoot, err := state.CalculateStateRoot(context.Background(), beaconState, block)
|
|
require.NoError(t, err)
|
|
|
|
block.Block.StateRoot = stateRoot[:]
|
|
|
|
sig, err := testutil.BlockSignature(beaconState, block.Block, privKeys)
|
|
require.NoError(t, err)
|
|
block.Signature = sig.Marshal()
|
|
|
|
set, beaconState, err := state.ExecuteStateTransitionNoVerifyAnySig(context.Background(), beaconState, block)
|
|
assert.NoError(t, err)
|
|
verified, err := set.Verify()
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, true, verified, "Could not verify signature set")
|
|
}
|
|
|
|
func TestProcessBlock_IncorrectProposerSlashing(t *testing.T) {
|
|
beaconState, privKeys := testutil.DeterministicGenesisState(t, 100)
|
|
|
|
block, err := testutil.GenerateFullBlock(beaconState, privKeys, nil, 1)
|
|
require.NoError(t, err)
|
|
slashing := ðpb.ProposerSlashing{
|
|
Header_1: ðpb.SignedBeaconBlockHeader{
|
|
Header: ðpb.BeaconBlockHeader{
|
|
Slot: params.BeaconConfig().SlotsPerEpoch,
|
|
ParentRoot: make([]byte, 32),
|
|
StateRoot: make([]byte, 32),
|
|
BodyRoot: make([]byte, 32),
|
|
},
|
|
Signature: make([]byte, 96),
|
|
},
|
|
Header_2: ðpb.SignedBeaconBlockHeader{
|
|
Header: ðpb.BeaconBlockHeader{
|
|
Slot: params.BeaconConfig().SlotsPerEpoch * 2,
|
|
ParentRoot: make([]byte, 32),
|
|
StateRoot: make([]byte, 32),
|
|
BodyRoot: make([]byte, 32),
|
|
},
|
|
Signature: make([]byte, 96),
|
|
},
|
|
}
|
|
block.Block.Body.ProposerSlashings = []*ethpb.ProposerSlashing{slashing}
|
|
|
|
require.NoError(t, beaconState.SetSlot(beaconState.Slot()+1))
|
|
proposerIdx, err := helpers.BeaconProposerIndex(beaconState)
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconState.SetSlot(beaconState.Slot()-1))
|
|
block.Signature, err = helpers.ComputeDomainAndSign(beaconState, helpers.CurrentEpoch(beaconState), block.Block, params.BeaconConfig().DomainBeaconProposer, privKeys[proposerIdx])
|
|
require.NoError(t, err)
|
|
|
|
beaconState, err = state.ProcessSlots(context.Background(), beaconState, 1)
|
|
require.NoError(t, err)
|
|
want := "could not verify proposer slashing"
|
|
_, err = state.ProcessBlock(context.Background(), beaconState, block)
|
|
assert.ErrorContains(t, want, err)
|
|
}
|
|
|
|
func TestProcessBlock_IncorrectProcessBlockAttestations(t *testing.T) {
|
|
beaconState, privKeys := testutil.DeterministicGenesisState(t, 100)
|
|
|
|
att := ðpb.Attestation{
|
|
Data: ðpb.AttestationData{
|
|
Target: ðpb.Checkpoint{Epoch: 0, Root: make([]byte, 32)},
|
|
Source: ðpb.Checkpoint{Epoch: 0, Root: make([]byte, 32)},
|
|
BeaconBlockRoot: make([]byte, 32),
|
|
},
|
|
AggregationBits: bitfield.NewBitlist(3),
|
|
Signature: bls.RandKey().Sign([]byte("foo")).Marshal(),
|
|
}
|
|
|
|
block, err := testutil.GenerateFullBlock(beaconState, privKeys, nil, 1)
|
|
require.NoError(t, err)
|
|
block.Block.Body.Attestations = []*ethpb.Attestation{att}
|
|
require.NoError(t, beaconState.SetSlot(beaconState.Slot()+1))
|
|
proposerIdx, err := helpers.BeaconProposerIndex(beaconState)
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconState.SetSlot(beaconState.Slot()-1))
|
|
block.Signature, err = helpers.ComputeDomainAndSign(beaconState, helpers.CurrentEpoch(beaconState), block.Block, params.BeaconConfig().DomainBeaconProposer, privKeys[proposerIdx])
|
|
require.NoError(t, err)
|
|
|
|
beaconState, err = state.ProcessSlots(context.Background(), beaconState, 1)
|
|
require.NoError(t, err)
|
|
|
|
want := "could not verify attestation"
|
|
_, err = state.ProcessBlock(context.Background(), beaconState, block)
|
|
assert.ErrorContains(t, want, err)
|
|
}
|
|
|
|
func TestProcessBlock_IncorrectProcessExits(t *testing.T) {
|
|
beaconState, _ := testutil.DeterministicGenesisState(t, 100)
|
|
|
|
proposerSlashings := []*ethpb.ProposerSlashing{
|
|
{
|
|
Header_1: ðpb.SignedBeaconBlockHeader{
|
|
Header: ðpb.BeaconBlockHeader{
|
|
ProposerIndex: 3,
|
|
Slot: 1,
|
|
ParentRoot: make([]byte, 32),
|
|
StateRoot: make([]byte, 32),
|
|
BodyRoot: make([]byte, 32),
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("A"), 96),
|
|
},
|
|
Header_2: ðpb.SignedBeaconBlockHeader{
|
|
Header: ðpb.BeaconBlockHeader{
|
|
ProposerIndex: 3,
|
|
Slot: 1,
|
|
ParentRoot: make([]byte, 32),
|
|
StateRoot: make([]byte, 32),
|
|
BodyRoot: make([]byte, 32),
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("B"), 96),
|
|
},
|
|
},
|
|
}
|
|
attesterSlashings := []*ethpb.AttesterSlashing{
|
|
{
|
|
Attestation_1: ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Epoch: 0, Root: make([]byte, 32)},
|
|
Target: ðpb.Checkpoint{Epoch: 0, Root: make([]byte, 32)},
|
|
},
|
|
AttestingIndices: []uint64{0, 1},
|
|
Signature: make([]byte, 96),
|
|
},
|
|
Attestation_2: ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Epoch: 1, Root: make([]byte, 32)},
|
|
Target: ðpb.Checkpoint{Epoch: 0, Root: make([]byte, 32)},
|
|
},
|
|
AttestingIndices: []uint64{0, 1},
|
|
Signature: make([]byte, 96),
|
|
},
|
|
},
|
|
}
|
|
var blockRoots [][]byte
|
|
for i := uint64(0); i < params.BeaconConfig().SlotsPerHistoricalRoot; i++ {
|
|
blockRoots = append(blockRoots, []byte{byte(i)})
|
|
}
|
|
require.NoError(t, beaconState.SetBlockRoots(blockRoots))
|
|
blockAtt := ðpb.Attestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Epoch: 0, Root: make([]byte, 32)},
|
|
Target: ðpb.Checkpoint{Epoch: 0, Root: bytesutil.PadTo([]byte("hello-world"), 32)},
|
|
BeaconBlockRoot: make([]byte, 32),
|
|
},
|
|
AggregationBits: bitfield.Bitlist{0xC0, 0xC0, 0xC0, 0xC0, 0x01},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
attestations := []*ethpb.Attestation{blockAtt}
|
|
var exits []*ethpb.SignedVoluntaryExit
|
|
for i := uint64(0); i < params.BeaconConfig().MaxVoluntaryExits+1; i++ {
|
|
exits = append(exits, ðpb.SignedVoluntaryExit{})
|
|
}
|
|
genesisBlock := blocks.NewGenesisBlock([]byte{})
|
|
bodyRoot, err := genesisBlock.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
err = beaconState.SetLatestBlockHeader(ðpb.BeaconBlockHeader{
|
|
Slot: genesisBlock.Block.Slot,
|
|
ParentRoot: genesisBlock.Block.ParentRoot,
|
|
BodyRoot: bodyRoot[:],
|
|
StateRoot: make([]byte, 32),
|
|
})
|
|
require.NoError(t, err)
|
|
parentRoot, err := beaconState.LatestBlockHeader().HashTreeRoot()
|
|
require.NoError(t, err)
|
|
block := testutil.NewBeaconBlock()
|
|
block.Block.Slot = 1
|
|
block.Block.ParentRoot = parentRoot[:]
|
|
block.Block.Body.ProposerSlashings = proposerSlashings
|
|
block.Block.Body.Attestations = attestations
|
|
block.Block.Body.AttesterSlashings = attesterSlashings
|
|
block.Block.Body.VoluntaryExits = exits
|
|
block.Block.Body.Eth1Data.DepositRoot = bytesutil.PadTo([]byte{2}, 32)
|
|
block.Block.Body.Eth1Data.BlockHash = bytesutil.PadTo([]byte{3}, 32)
|
|
err = beaconState.SetSlot(beaconState.Slot() + params.BeaconConfig().MinAttestationInclusionDelay)
|
|
require.NoError(t, err)
|
|
cp := beaconState.CurrentJustifiedCheckpoint()
|
|
cp.Root = []byte("hello-world")
|
|
require.NoError(t, beaconState.SetCurrentJustifiedCheckpoint(cp))
|
|
require.NoError(t, beaconState.SetCurrentEpochAttestations([]*pb.PendingAttestation{}))
|
|
_, err = state.VerifyOperationLengths(context.Background(), beaconState, block)
|
|
wanted := "number of voluntary exits (17) in block body exceeds allowed threshold of 16"
|
|
assert.ErrorContains(t, wanted, err)
|
|
}
|
|
|
|
func createFullBlockWithOperations(t *testing.T) (*beaconstate.BeaconState,
|
|
*ethpb.SignedBeaconBlock, []*ethpb.Attestation, []*ethpb.ProposerSlashing, []*ethpb.SignedVoluntaryExit) {
|
|
beaconState, privKeys := testutil.DeterministicGenesisState(t, 32)
|
|
genesisBlock := blocks.NewGenesisBlock([]byte{})
|
|
bodyRoot, err := genesisBlock.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
err = beaconState.SetLatestBlockHeader(ðpb.BeaconBlockHeader{
|
|
Slot: genesisBlock.Block.Slot,
|
|
ParentRoot: genesisBlock.Block.ParentRoot,
|
|
StateRoot: params.BeaconConfig().ZeroHash[:],
|
|
BodyRoot: bodyRoot[:],
|
|
})
|
|
require.NoError(t, err)
|
|
err = beaconState.SetSlashings(make([]uint64, params.BeaconConfig().EpochsPerSlashingsVector))
|
|
require.NoError(t, err)
|
|
cp := beaconState.CurrentJustifiedCheckpoint()
|
|
mockRoot := [32]byte{}
|
|
copy(mockRoot[:], "hello-world")
|
|
cp.Root = mockRoot[:]
|
|
require.NoError(t, beaconState.SetCurrentJustifiedCheckpoint(cp))
|
|
require.NoError(t, beaconState.SetCurrentEpochAttestations([]*pb.PendingAttestation{}))
|
|
|
|
proposerSlashIdx := uint64(3)
|
|
slotsPerEpoch := params.BeaconConfig().SlotsPerEpoch
|
|
err = beaconState.SetSlot((params.BeaconConfig().ShardCommitteePeriod * slotsPerEpoch) + params.BeaconConfig().MinAttestationInclusionDelay)
|
|
require.NoError(t, err)
|
|
|
|
currentEpoch := helpers.CurrentEpoch(beaconState)
|
|
header1 := ðpb.SignedBeaconBlockHeader{
|
|
Header: ðpb.BeaconBlockHeader{
|
|
ProposerIndex: proposerSlashIdx,
|
|
Slot: 1,
|
|
StateRoot: bytesutil.PadTo([]byte("A"), 32),
|
|
ParentRoot: make([]byte, 32),
|
|
BodyRoot: make([]byte, 32),
|
|
},
|
|
}
|
|
header1.Signature, err = helpers.ComputeDomainAndSign(beaconState, currentEpoch, header1.Header, params.BeaconConfig().DomainBeaconProposer, privKeys[proposerSlashIdx])
|
|
require.NoError(t, err)
|
|
|
|
header2 := ðpb.SignedBeaconBlockHeader{
|
|
Header: ðpb.BeaconBlockHeader{
|
|
ProposerIndex: proposerSlashIdx,
|
|
Slot: 1,
|
|
StateRoot: bytesutil.PadTo([]byte("B"), 32),
|
|
ParentRoot: make([]byte, 32),
|
|
BodyRoot: make([]byte, 32),
|
|
},
|
|
}
|
|
header2.Signature, err = helpers.ComputeDomainAndSign(beaconState, helpers.CurrentEpoch(beaconState), header2.Header, params.BeaconConfig().DomainBeaconProposer, privKeys[proposerSlashIdx])
|
|
require.NoError(t, err)
|
|
|
|
proposerSlashings := []*ethpb.ProposerSlashing{
|
|
{
|
|
Header_1: header1,
|
|
Header_2: header2,
|
|
},
|
|
}
|
|
validators := beaconState.Validators()
|
|
validators[proposerSlashIdx].PublicKey = privKeys[proposerSlashIdx].PublicKey().Marshal()
|
|
require.NoError(t, beaconState.SetValidators(validators))
|
|
|
|
mockRoot2 := [32]byte{'A'}
|
|
att1 := ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Epoch: 0, Root: mockRoot2[:]},
|
|
Target: ðpb.Checkpoint{Epoch: 0, Root: make([]byte, 32)},
|
|
BeaconBlockRoot: make([]byte, 32),
|
|
},
|
|
AttestingIndices: []uint64{0, 1},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
domain, err := helpers.Domain(beaconState.Fork(), currentEpoch, params.BeaconConfig().DomainBeaconAttester, beaconState.GenesisValidatorRoot())
|
|
require.NoError(t, err)
|
|
hashTreeRoot, err := helpers.ComputeSigningRoot(att1.Data, domain)
|
|
require.NoError(t, err)
|
|
sig0 := privKeys[0].Sign(hashTreeRoot[:])
|
|
sig1 := privKeys[1].Sign(hashTreeRoot[:])
|
|
aggregateSig := bls.AggregateSignatures([]bls.Signature{sig0, sig1})
|
|
att1.Signature = aggregateSig.Marshal()
|
|
|
|
mockRoot3 := [32]byte{'B'}
|
|
att2 := ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Epoch: 0, Root: mockRoot3[:]},
|
|
Target: ðpb.Checkpoint{Epoch: 0, Root: make([]byte, 32)},
|
|
BeaconBlockRoot: make([]byte, 32),
|
|
},
|
|
AttestingIndices: []uint64{0, 1},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
|
|
hashTreeRoot, err = helpers.ComputeSigningRoot(att2.Data, domain)
|
|
require.NoError(t, err)
|
|
sig0 = privKeys[0].Sign(hashTreeRoot[:])
|
|
sig1 = privKeys[1].Sign(hashTreeRoot[:])
|
|
aggregateSig = bls.AggregateSignatures([]bls.Signature{sig0, sig1})
|
|
att2.Signature = aggregateSig.Marshal()
|
|
|
|
attesterSlashings := []*ethpb.AttesterSlashing{
|
|
{
|
|
Attestation_1: att1,
|
|
Attestation_2: att2,
|
|
},
|
|
}
|
|
|
|
var blockRoots [][]byte
|
|
for i := uint64(0); i < params.BeaconConfig().SlotsPerHistoricalRoot; i++ {
|
|
blockRoots = append(blockRoots, []byte{byte(i)})
|
|
}
|
|
require.NoError(t, beaconState.SetBlockRoots(blockRoots))
|
|
|
|
aggBits := bitfield.NewBitlist(1)
|
|
aggBits.SetBitAt(0, true)
|
|
blockAtt := ðpb.Attestation{
|
|
Data: ðpb.AttestationData{
|
|
Slot: beaconState.Slot(),
|
|
BeaconBlockRoot: make([]byte, 32),
|
|
Target: ðpb.Checkpoint{Epoch: helpers.CurrentEpoch(beaconState), Root: make([]byte, 32)},
|
|
Source: ðpb.Checkpoint{
|
|
Epoch: 0,
|
|
Root: mockRoot[:],
|
|
}},
|
|
AggregationBits: aggBits,
|
|
Signature: make([]byte, 96),
|
|
}
|
|
|
|
committee, err := helpers.BeaconCommitteeFromState(beaconState, blockAtt.Data.Slot, blockAtt.Data.CommitteeIndex)
|
|
assert.NoError(t, err)
|
|
attestingIndices := attestationutil.AttestingIndices(blockAtt.AggregationBits, committee)
|
|
assert.NoError(t, err)
|
|
hashTreeRoot, err = helpers.ComputeSigningRoot(blockAtt.Data, domain)
|
|
assert.NoError(t, err)
|
|
sigs := make([]bls.Signature, len(attestingIndices))
|
|
for i, indice := range attestingIndices {
|
|
sig := privKeys[indice].Sign(hashTreeRoot[:])
|
|
sigs[i] = sig
|
|
}
|
|
blockAtt.Signature = bls.AggregateSignatures(sigs).Marshal()
|
|
|
|
exit := ðpb.SignedVoluntaryExit{
|
|
Exit: ðpb.VoluntaryExit{
|
|
ValidatorIndex: 10,
|
|
Epoch: 0,
|
|
},
|
|
}
|
|
exit.Signature, err = helpers.ComputeDomainAndSign(beaconState, currentEpoch, exit.Exit, params.BeaconConfig().DomainVoluntaryExit, privKeys[exit.Exit.ValidatorIndex])
|
|
require.NoError(t, err)
|
|
|
|
header := beaconState.LatestBlockHeader()
|
|
prevStateRoot, err := beaconState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
header.StateRoot = prevStateRoot[:]
|
|
require.NoError(t, beaconState.SetLatestBlockHeader(header))
|
|
parentRoot, err := beaconState.LatestBlockHeader().HashTreeRoot()
|
|
require.NoError(t, err)
|
|
copied := beaconState.Copy()
|
|
require.NoError(t, copied.SetSlot(beaconState.Slot()+1))
|
|
randaoReveal, err := testutil.RandaoReveal(copied, currentEpoch, privKeys)
|
|
require.NoError(t, err)
|
|
proposerIndex, err := helpers.BeaconProposerIndex(copied)
|
|
require.NoError(t, err)
|
|
block := ðpb.SignedBeaconBlock{
|
|
Block: ðpb.BeaconBlock{
|
|
ParentRoot: parentRoot[:],
|
|
Slot: beaconState.Slot() + 1,
|
|
ProposerIndex: proposerIndex,
|
|
Body: ðpb.BeaconBlockBody{
|
|
Graffiti: make([]byte, 32),
|
|
RandaoReveal: randaoReveal,
|
|
ProposerSlashings: proposerSlashings,
|
|
AttesterSlashings: attesterSlashings,
|
|
Attestations: []*ethpb.Attestation{blockAtt},
|
|
VoluntaryExits: []*ethpb.SignedVoluntaryExit{exit},
|
|
Eth1Data: ðpb.Eth1Data{
|
|
DepositRoot: bytesutil.PadTo([]byte{2}, 32),
|
|
BlockHash: bytesutil.PadTo([]byte{3}, 32),
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
sig, err := testutil.BlockSignature(beaconState, block.Block, privKeys)
|
|
require.NoError(t, err)
|
|
block.Signature = sig.Marshal()
|
|
|
|
require.NoError(t, beaconState.SetSlot(block.Block.Slot))
|
|
return beaconState, block, []*ethpb.Attestation{blockAtt}, proposerSlashings, []*ethpb.SignedVoluntaryExit{exit}
|
|
}
|
|
|
|
func TestProcessBlock_PassesProcessingConditions(t *testing.T) {
|
|
beaconState, block, _, proposerSlashings, exits := createFullBlockWithOperations(t)
|
|
exit := exits[0]
|
|
|
|
beaconState, err := state.ProcessBlock(context.Background(), beaconState, block)
|
|
require.NoError(t, err, "Expected block to pass processing conditions")
|
|
|
|
v, err := beaconState.ValidatorAtIndex(proposerSlashings[0].Header_1.Header.ProposerIndex)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, true, v.Slashed, "Expected validator at index %d to be slashed", proposerSlashings[0].Header_1.Header.ProposerIndex)
|
|
v, err = beaconState.ValidatorAtIndex(1)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, true, v.Slashed, "Expected validator at index 1 to be slashed, received false")
|
|
|
|
v, err = beaconState.ValidatorAtIndex(exit.Exit.ValidatorIndex)
|
|
require.NoError(t, err)
|
|
received := v.ExitEpoch
|
|
wanted := params.BeaconConfig().FarFutureEpoch
|
|
assert.NotEqual(t, wanted, received, "Expected validator at index %d to be exiting", exit.Exit.ValidatorIndex)
|
|
}
|
|
|
|
func TestProcessBlockNoVerify_PassesProcessingConditions(t *testing.T) {
|
|
beaconState, block, _, _, _ := createFullBlockWithOperations(t)
|
|
set, _, err := state.ProcessBlockNoVerifyAnySig(context.Background(), beaconState, block)
|
|
require.NoError(t, err)
|
|
// Test Signature set verifies.
|
|
verified, err := set.Verify()
|
|
require.NoError(t, err)
|
|
assert.Equal(t, true, verified, "Could not verify signature set.")
|
|
}
|
|
|
|
func TestProcessEpochPrecompute_CanProcess(t *testing.T) {
|
|
epoch := uint64(1)
|
|
|
|
atts := []*pb.PendingAttestation{{Data: ðpb.AttestationData{Target: ðpb.Checkpoint{Root: make([]byte, 32)}}, InclusionDelay: 1}}
|
|
slashing := make([]uint64, params.BeaconConfig().EpochsPerSlashingsVector)
|
|
base := &pb.BeaconState{
|
|
Slot: epoch*params.BeaconConfig().SlotsPerEpoch + 1,
|
|
BlockRoots: make([][]byte, 128),
|
|
Slashings: slashing,
|
|
RandaoMixes: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
CurrentEpochAttestations: atts,
|
|
FinalizedCheckpoint: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
JustificationBits: bitfield.Bitvector4{0x00},
|
|
CurrentJustifiedCheckpoint: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
Validators: []*ethpb.Validator{},
|
|
}
|
|
s, err := beaconstate.InitializeFromProto(base)
|
|
require.NoError(t, err)
|
|
newState, err := state.ProcessEpochPrecompute(context.Background(), s)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, uint64(0), newState.Slashings()[2], "Unexpected slashed balance")
|
|
}
|
|
func BenchmarkProcessBlk_65536Validators_FullBlock(b *testing.B) {
|
|
logrus.SetLevel(logrus.PanicLevel)
|
|
|
|
validatorCount := params.BeaconConfig().MinGenesisActiveValidatorCount * 4
|
|
committeeCount := validatorCount / params.BeaconConfig().TargetCommitteeSize
|
|
validators := make([]*ethpb.Validator, validatorCount)
|
|
for i := 0; i < len(validators); i++ {
|
|
validators[i] = ðpb.Validator{
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
WithdrawableEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
ActivationEligibilityEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
}
|
|
}
|
|
validatorBalances := make([]uint64, len(validators))
|
|
for i := 0; i < len(validatorBalances); i++ {
|
|
validatorBalances[i] = params.BeaconConfig().MaxEffectiveBalance
|
|
}
|
|
|
|
randaoMixes := make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector)
|
|
for i := 0; i < len(randaoMixes); i++ {
|
|
randaoMixes[i] = params.BeaconConfig().ZeroHash[:]
|
|
}
|
|
|
|
base := &pb.BeaconState{
|
|
Slot: 20,
|
|
LatestBlockHeader: ðpb.BeaconBlockHeader{},
|
|
BlockRoots: make([][]byte, 254),
|
|
RandaoMixes: randaoMixes,
|
|
Validators: validators,
|
|
Balances: validatorBalances,
|
|
Slashings: make([]uint64, params.BeaconConfig().EpochsPerSlashingsVector),
|
|
CurrentJustifiedCheckpoint: ðpb.Checkpoint{
|
|
Root: []byte("hello-world"),
|
|
},
|
|
Fork: &pb.Fork{
|
|
PreviousVersion: []byte{0, 0, 0, 0},
|
|
CurrentVersion: []byte{0, 0, 0, 0},
|
|
},
|
|
}
|
|
s, err := beaconstate.InitializeFromProto(base)
|
|
require.NoError(b, err)
|
|
|
|
// Set up proposer slashing object for block
|
|
proposerSlashings := []*ethpb.ProposerSlashing{
|
|
{
|
|
Header_1: ðpb.SignedBeaconBlockHeader{
|
|
Header: ðpb.BeaconBlockHeader{
|
|
ProposerIndex: 1,
|
|
Slot: 0,
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("A"), 96),
|
|
},
|
|
Header_2: ðpb.SignedBeaconBlockHeader{
|
|
Header: ðpb.BeaconBlockHeader{
|
|
ProposerIndex: 1,
|
|
Slot: 0,
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("B"), 96),
|
|
},
|
|
},
|
|
}
|
|
|
|
// Set up attester slashing object for block
|
|
attesterSlashings := []*ethpb.AttesterSlashing{
|
|
{
|
|
Attestation_1: ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
BeaconBlockRoot: make([]byte, 32),
|
|
Target: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
},
|
|
AttestingIndices: []uint64{2, 3},
|
|
},
|
|
Attestation_2: ðpb.IndexedAttestation{
|
|
Data: ðpb.AttestationData{
|
|
BeaconBlockRoot: make([]byte, 32),
|
|
Target: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
},
|
|
AttestingIndices: []uint64{2, 3},
|
|
},
|
|
},
|
|
}
|
|
|
|
// Set up deposit object for block
|
|
deposit := ðpb.Deposit{
|
|
Data: ðpb.Deposit_Data{
|
|
PublicKey: []byte{1, 2, 3},
|
|
Amount: params.BeaconConfig().MaxEffectiveBalance,
|
|
},
|
|
}
|
|
leaf, err := deposit.Data.HashTreeRoot()
|
|
require.NoError(b, err)
|
|
depositTrie, err := trieutil.GenerateTrieFromItems([][]byte{leaf[:]}, int(params.BeaconConfig().DepositContractTreeDepth))
|
|
require.NoError(b, err, "Could not generate trie")
|
|
proof, err := depositTrie.MerkleProof(0)
|
|
require.NoError(b, err, "Could not generate proof")
|
|
deposit.Proof = proof
|
|
root := depositTrie.Root()
|
|
|
|
// Set up randao reveal object for block
|
|
proposerIdx, err := helpers.BeaconProposerIndex(s)
|
|
require.NoError(b, err)
|
|
priv := bls.RandKey()
|
|
v := s.Validators()
|
|
v[proposerIdx].PublicKey = priv.PublicKey().Marshal()
|
|
buf := make([]byte, 32)
|
|
binary.LittleEndian.PutUint64(buf, 0)
|
|
domain, err := helpers.Domain(s.Fork(), 0, params.BeaconConfig().DomainRandao, s.GenesisValidatorRoot())
|
|
require.NoError(b, err)
|
|
ctr := &pb.SigningData{
|
|
ObjectRoot: buf,
|
|
Domain: domain,
|
|
}
|
|
root, err = ctr.HashTreeRoot()
|
|
require.NoError(b, err)
|
|
epochSignature := priv.Sign(root[:])
|
|
|
|
buf = []byte{params.BeaconConfig().BLSWithdrawalPrefixByte}
|
|
pubKey := []byte("A")
|
|
hashed := hashutil.Hash(pubKey)
|
|
buf = append(buf, hashed[:]...)
|
|
v[3].WithdrawalCredentials = buf
|
|
|
|
require.NoError(b, s.SetValidators(v))
|
|
|
|
attestations := make([]*ethpb.Attestation, 128)
|
|
for i := 0; i < len(attestations); i++ {
|
|
attestations[i] = ðpb.Attestation{
|
|
Data: ðpb.AttestationData{
|
|
Source: ðpb.Checkpoint{Root: []byte("hello-world")}},
|
|
AggregationBits: bitfield.Bitlist{0xC0, 0xC0, 0xC0, 0xC0, 0xC0, 0xC0, 0xC0,
|
|
0xC0, 0xC0, 0xC0, 0xC0, 0xC0, 0xC0, 0xC0, 0xC0, 0xC0, 0x01},
|
|
}
|
|
}
|
|
|
|
blk := ðpb.SignedBeaconBlock{
|
|
Block: ðpb.BeaconBlock{
|
|
Slot: s.Slot(),
|
|
Body: ðpb.BeaconBlockBody{
|
|
Eth1Data: ðpb.Eth1Data{
|
|
DepositRoot: root[:],
|
|
BlockHash: root[:],
|
|
},
|
|
RandaoReveal: epochSignature.Marshal(),
|
|
Attestations: attestations,
|
|
ProposerSlashings: proposerSlashings,
|
|
AttesterSlashings: attesterSlashings,
|
|
},
|
|
},
|
|
}
|
|
|
|
// Precache the shuffled indices
|
|
for i := uint64(0); i < committeeCount; i++ {
|
|
_, err := helpers.BeaconCommitteeFromState(s, 0, i)
|
|
require.NoError(b, err)
|
|
}
|
|
|
|
b.ResetTimer()
|
|
for n := 0; n < b.N; n++ {
|
|
_, err := state.ProcessBlock(context.Background(), s, blk)
|
|
require.NoError(b, err)
|
|
// Reset state fields to process block again
|
|
v := s.Validators()
|
|
v[1].Slashed = false
|
|
v[2].Slashed = false
|
|
require.NoError(b, s.SetValidators(v))
|
|
balances := s.Balances()
|
|
balances[3] += 2 * params.BeaconConfig().MinDepositAmount
|
|
require.NoError(b, s.SetBalances(balances))
|
|
}
|
|
}
|
|
|
|
func TestProcessBlk_AttsBasedOnValidatorCount(t *testing.T) {
|
|
logrus.SetLevel(logrus.PanicLevel)
|
|
|
|
// Default at 256 validators, can raise this number with faster BLS.
|
|
validatorCount := uint64(256)
|
|
s, privKeys := testutil.DeterministicGenesisState(t, validatorCount)
|
|
require.NoError(t, s.SetSlot(params.BeaconConfig().SlotsPerEpoch))
|
|
|
|
bitCount := validatorCount / params.BeaconConfig().SlotsPerEpoch
|
|
aggBits := bitfield.NewBitlist(bitCount)
|
|
for i := uint64(1); i < bitCount; i++ {
|
|
aggBits.SetBitAt(i, true)
|
|
}
|
|
atts := make([]*ethpb.Attestation, 1)
|
|
|
|
for i := 0; i < len(atts); i++ {
|
|
att := ðpb.Attestation{
|
|
Data: ðpb.AttestationData{
|
|
Slot: 1,
|
|
Source: ðpb.Checkpoint{Epoch: 0, Root: params.BeaconConfig().ZeroHash[:]},
|
|
Target: ðpb.Checkpoint{Epoch: 0, Root: make([]byte, 32)},
|
|
BeaconBlockRoot: make([]byte, 32),
|
|
},
|
|
AggregationBits: aggBits,
|
|
Signature: make([]byte, 96),
|
|
}
|
|
|
|
committee, err := helpers.BeaconCommitteeFromState(s, att.Data.Slot, att.Data.CommitteeIndex)
|
|
assert.NoError(t, err)
|
|
attestingIndices := attestationutil.AttestingIndices(att.AggregationBits, committee)
|
|
domain, err := helpers.Domain(s.Fork(), 0, params.BeaconConfig().DomainBeaconAttester, s.GenesisValidatorRoot())
|
|
require.NoError(t, err)
|
|
sigs := make([]bls.Signature, len(attestingIndices))
|
|
for i, indice := range attestingIndices {
|
|
hashTreeRoot, err := helpers.ComputeSigningRoot(att.Data, domain)
|
|
assert.NoError(t, err)
|
|
sig := privKeys[indice].Sign(hashTreeRoot[:])
|
|
sigs[i] = sig
|
|
}
|
|
att.Signature = bls.AggregateSignatures(sigs).Marshal()
|
|
atts[i] = att
|
|
}
|
|
|
|
copied := s.Copy()
|
|
require.NoError(t, copied.SetSlot(s.Slot()+1))
|
|
epochSignature, err := testutil.RandaoReveal(copied, helpers.CurrentEpoch(copied), privKeys)
|
|
require.NoError(t, err)
|
|
header := s.LatestBlockHeader()
|
|
prevStateRoot, err := s.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
header.StateRoot = prevStateRoot[:]
|
|
require.NoError(t, s.SetLatestBlockHeader(header))
|
|
|
|
parentRoot, err := s.LatestBlockHeader().HashTreeRoot()
|
|
require.NoError(t, err)
|
|
|
|
nextSlotState := s.Copy()
|
|
require.NoError(t, nextSlotState.SetSlot(s.Slot()+1))
|
|
proposerIdx, err := helpers.BeaconProposerIndex(nextSlotState)
|
|
require.NoError(t, err)
|
|
blk := testutil.NewBeaconBlock()
|
|
blk.Block.ProposerIndex = proposerIdx
|
|
blk.Block.Slot = s.Slot() + 1
|
|
blk.Block.ParentRoot = parentRoot[:]
|
|
blk.Block.Body.RandaoReveal = epochSignature
|
|
blk.Block.Body.Attestations = atts
|
|
sig, err := testutil.BlockSignature(s, blk.Block, privKeys)
|
|
require.NoError(t, err)
|
|
blk.Signature = sig.Marshal()
|
|
|
|
params.SetupTestConfigCleanup(t)
|
|
config := params.BeaconConfig()
|
|
config.MinAttestationInclusionDelay = 0
|
|
params.OverrideBeaconConfig(config)
|
|
|
|
require.NoError(t, s.SetSlot(s.Slot()+1))
|
|
_, err = state.ProcessBlock(context.Background(), s, blk)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func TestCanProcessEpoch_TrueOnEpochs(t *testing.T) {
|
|
tests := []struct {
|
|
slot uint64
|
|
canProcessEpoch bool
|
|
}{
|
|
{
|
|
slot: 1,
|
|
canProcessEpoch: false,
|
|
}, {
|
|
slot: 63,
|
|
canProcessEpoch: true,
|
|
},
|
|
{
|
|
slot: 64,
|
|
canProcessEpoch: false,
|
|
}, {
|
|
slot: 127,
|
|
canProcessEpoch: true,
|
|
}, {
|
|
slot: 1000000000,
|
|
canProcessEpoch: false,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
b := &pb.BeaconState{Slot: tt.slot}
|
|
s, err := beaconstate.InitializeFromProto(b)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, tt.canProcessEpoch, state.CanProcessEpoch(s), "CanProcessEpoch(%d)", tt.slot)
|
|
}
|
|
}
|
|
|
|
func TestProcessBlock_OverMaxProposerSlashings(t *testing.T) {
|
|
maxSlashings := params.BeaconConfig().MaxProposerSlashings
|
|
b := ðpb.SignedBeaconBlock{
|
|
Block: ðpb.BeaconBlock{
|
|
Body: ðpb.BeaconBlockBody{
|
|
ProposerSlashings: make([]*ethpb.ProposerSlashing, maxSlashings+1),
|
|
},
|
|
},
|
|
}
|
|
want := fmt.Sprintf("number of proposer slashings (%d) in block body exceeds allowed threshold of %d",
|
|
len(b.Block.Body.ProposerSlashings), params.BeaconConfig().MaxProposerSlashings)
|
|
_, err := state.VerifyOperationLengths(context.Background(), &beaconstate.BeaconState{}, b)
|
|
assert.ErrorContains(t, want, err)
|
|
}
|
|
|
|
func TestProcessBlock_OverMaxAttesterSlashings(t *testing.T) {
|
|
maxSlashings := params.BeaconConfig().MaxAttesterSlashings
|
|
b := ðpb.SignedBeaconBlock{
|
|
Block: ðpb.BeaconBlock{
|
|
Body: ðpb.BeaconBlockBody{
|
|
AttesterSlashings: make([]*ethpb.AttesterSlashing, maxSlashings+1),
|
|
},
|
|
},
|
|
}
|
|
want := fmt.Sprintf("number of attester slashings (%d) in block body exceeds allowed threshold of %d",
|
|
len(b.Block.Body.AttesterSlashings), params.BeaconConfig().MaxAttesterSlashings)
|
|
_, err := state.VerifyOperationLengths(context.Background(), &beaconstate.BeaconState{}, b)
|
|
assert.ErrorContains(t, want, err)
|
|
}
|
|
|
|
func TestProcessBlock_OverMaxAttestations(t *testing.T) {
|
|
b := ðpb.SignedBeaconBlock{
|
|
Block: ðpb.BeaconBlock{
|
|
Body: ðpb.BeaconBlockBody{
|
|
Attestations: make([]*ethpb.Attestation, params.BeaconConfig().MaxAttestations+1),
|
|
},
|
|
},
|
|
}
|
|
want := fmt.Sprintf("number of attestations (%d) in block body exceeds allowed threshold of %d",
|
|
len(b.Block.Body.Attestations), params.BeaconConfig().MaxAttestations)
|
|
_, err := state.VerifyOperationLengths(context.Background(), &beaconstate.BeaconState{}, b)
|
|
assert.ErrorContains(t, want, err)
|
|
}
|
|
|
|
func TestProcessBlock_OverMaxVoluntaryExits(t *testing.T) {
|
|
maxExits := params.BeaconConfig().MaxVoluntaryExits
|
|
b := ðpb.SignedBeaconBlock{
|
|
Block: ðpb.BeaconBlock{
|
|
Body: ðpb.BeaconBlockBody{
|
|
VoluntaryExits: make([]*ethpb.SignedVoluntaryExit, maxExits+1),
|
|
},
|
|
},
|
|
}
|
|
want := fmt.Sprintf("number of voluntary exits (%d) in block body exceeds allowed threshold of %d",
|
|
len(b.Block.Body.VoluntaryExits), maxExits)
|
|
_, err := state.VerifyOperationLengths(context.Background(), &beaconstate.BeaconState{}, b)
|
|
assert.ErrorContains(t, want, err)
|
|
}
|
|
|
|
func TestProcessBlock_IncorrectDeposits(t *testing.T) {
|
|
base := &pb.BeaconState{
|
|
Eth1Data: ðpb.Eth1Data{DepositCount: 100},
|
|
Eth1DepositIndex: 98,
|
|
}
|
|
s, err := beaconstate.InitializeFromProto(base)
|
|
require.NoError(t, err)
|
|
b := ðpb.SignedBeaconBlock{
|
|
Block: ðpb.BeaconBlock{
|
|
Body: ðpb.BeaconBlockBody{
|
|
Deposits: []*ethpb.Deposit{{}},
|
|
},
|
|
},
|
|
}
|
|
want := fmt.Sprintf("incorrect outstanding deposits in block body, wanted: %d, got: %d",
|
|
s.Eth1Data().DepositCount-s.Eth1DepositIndex(), len(b.Block.Body.Deposits))
|
|
_, err = state.VerifyOperationLengths(context.Background(), s, b)
|
|
assert.ErrorContains(t, want, err)
|
|
}
|
|
|
|
func TestProcessSlots_SameSlotAsParentState(t *testing.T) {
|
|
slot := uint64(2)
|
|
parentState, err := beaconstate.InitializeFromProto(&pb.BeaconState{Slot: slot})
|
|
require.NoError(t, err)
|
|
|
|
_, err = state.ProcessSlots(context.Background(), parentState, slot)
|
|
assert.ErrorContains(t, "expected state.slot 2 < slot 2", err)
|
|
}
|
|
|
|
func TestProcessSlots_LowerSlotAsParentState(t *testing.T) {
|
|
slot := uint64(2)
|
|
parentState, err := beaconstate.InitializeFromProto(&pb.BeaconState{Slot: slot})
|
|
require.NoError(t, err)
|
|
|
|
_, err = state.ProcessSlots(context.Background(), parentState, slot-1)
|
|
assert.ErrorContains(t, "expected state.slot 2 < slot 1", err)
|
|
}
|