mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-26 05:17:22 +00:00
eca67cec4c
Co-authored-by: terence tsao <terence@prysmaticlabs.com>
296 lines
9.2 KiB
Go
296 lines
9.2 KiB
Go
package sync
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"fmt"
|
|
"testing"
|
|
"time"
|
|
|
|
lru "github.com/hashicorp/golang-lru"
|
|
pubsub "github.com/libp2p/go-libp2p-pubsub"
|
|
pubsubpb "github.com/libp2p/go-libp2p-pubsub/pb"
|
|
ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1"
|
|
"github.com/prysmaticlabs/go-bitfield"
|
|
mockChain "github.com/prysmaticlabs/prysm/beacon-chain/blockchain/testing"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
dbtest "github.com/prysmaticlabs/prysm/beacon-chain/db/testing"
|
|
p2ptest "github.com/prysmaticlabs/prysm/beacon-chain/p2p/testing"
|
|
mockSync "github.com/prysmaticlabs/prysm/beacon-chain/sync/initial-sync/testing"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/require"
|
|
)
|
|
|
|
func TestService_validateCommitteeIndexBeaconAttestation(t *testing.T) {
|
|
ctx := context.Background()
|
|
p := p2ptest.NewTestP2P(t)
|
|
db := dbtest.SetupDB(t)
|
|
chain := &mockChain.ChainService{
|
|
// 1 slot ago.
|
|
Genesis: time.Now().Add(time.Duration(-1*int64(params.BeaconConfig().SecondsPerSlot)) * time.Second),
|
|
ValidatorsRoot: [32]byte{'A'},
|
|
ValidAttestation: true,
|
|
}
|
|
|
|
c, err := lru.New(10)
|
|
require.NoError(t, err)
|
|
s := &Service{
|
|
cfg: &Config{
|
|
InitialSync: &mockSync.Sync{IsSyncing: false},
|
|
P2P: p,
|
|
DB: db,
|
|
Chain: chain,
|
|
AttestationNotifier: (&mockChain.ChainService{}).OperationNotifier(),
|
|
},
|
|
blkRootToPendingAtts: make(map[[32]byte][]*ethpb.SignedAggregateAttestationAndProof),
|
|
seenAttestationCache: c,
|
|
}
|
|
err = s.initCaches()
|
|
require.NoError(t, err)
|
|
|
|
invalidRoot := [32]byte{'A', 'B', 'C', 'D'}
|
|
s.setBadBlock(ctx, invalidRoot)
|
|
|
|
digest, err := s.forkDigest()
|
|
require.NoError(t, err)
|
|
|
|
blk := testutil.NewBeaconBlock()
|
|
blk.Block.Slot = 1
|
|
require.NoError(t, db.SaveBlock(ctx, blk))
|
|
|
|
validBlockRoot, err := blk.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
chain.FinalizedCheckPoint = ðpb.Checkpoint{
|
|
Root: validBlockRoot[:],
|
|
Epoch: 0,
|
|
}
|
|
|
|
validators := uint64(64)
|
|
savedState, keys := testutil.DeterministicGenesisState(t, validators)
|
|
require.NoError(t, savedState.SetSlot(1))
|
|
require.NoError(t, db.SaveState(context.Background(), savedState, validBlockRoot))
|
|
chain.State = savedState
|
|
|
|
tests := []struct {
|
|
name string
|
|
msg *ethpb.Attestation
|
|
topic string
|
|
validAttestationSignature bool
|
|
want bool
|
|
}{
|
|
{
|
|
name: "valid attestation signature",
|
|
msg: ðpb.Attestation{
|
|
AggregationBits: bitfield.Bitlist{0b101},
|
|
Data: ðpb.AttestationData{
|
|
BeaconBlockRoot: validBlockRoot[:],
|
|
CommitteeIndex: 0,
|
|
Slot: 1,
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 0,
|
|
Root: validBlockRoot[:],
|
|
},
|
|
Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
},
|
|
},
|
|
topic: fmt.Sprintf("/eth2/%x/beacon_attestation_1", digest),
|
|
validAttestationSignature: true,
|
|
want: true,
|
|
},
|
|
{
|
|
name: "valid attestation signature with nil topic",
|
|
msg: ðpb.Attestation{
|
|
AggregationBits: bitfield.Bitlist{0b101},
|
|
Data: ðpb.AttestationData{
|
|
BeaconBlockRoot: validBlockRoot[:],
|
|
CommitteeIndex: 0,
|
|
Slot: 1,
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 0,
|
|
Root: validBlockRoot[:],
|
|
},
|
|
Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
},
|
|
},
|
|
topic: "",
|
|
validAttestationSignature: true,
|
|
want: false,
|
|
},
|
|
{
|
|
name: "bad target epoch",
|
|
msg: ðpb.Attestation{
|
|
AggregationBits: bitfield.Bitlist{0b101},
|
|
Data: ðpb.AttestationData{
|
|
BeaconBlockRoot: validBlockRoot[:],
|
|
CommitteeIndex: 0,
|
|
Slot: 1,
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 10,
|
|
Root: validBlockRoot[:],
|
|
},
|
|
Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
},
|
|
},
|
|
topic: fmt.Sprintf("/eth2/%x/beacon_attestation_1", digest),
|
|
validAttestationSignature: true,
|
|
want: false,
|
|
},
|
|
{
|
|
name: "already seen",
|
|
msg: ðpb.Attestation{
|
|
AggregationBits: bitfield.Bitlist{0b101},
|
|
Data: ðpb.AttestationData{
|
|
BeaconBlockRoot: validBlockRoot[:],
|
|
CommitteeIndex: 0,
|
|
Slot: 1,
|
|
Target: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
},
|
|
},
|
|
topic: fmt.Sprintf("/eth2/%x/beacon_attestation_1", digest),
|
|
validAttestationSignature: true,
|
|
want: false,
|
|
},
|
|
{
|
|
name: "invalid beacon block",
|
|
msg: ðpb.Attestation{
|
|
AggregationBits: bitfield.Bitlist{0b101},
|
|
Data: ðpb.AttestationData{
|
|
BeaconBlockRoot: invalidRoot[:],
|
|
CommitteeIndex: 0,
|
|
Slot: 1,
|
|
Target: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
},
|
|
},
|
|
topic: fmt.Sprintf("/eth2/%x/beacon_attestation_1", digest),
|
|
validAttestationSignature: true,
|
|
want: false,
|
|
},
|
|
{
|
|
name: "committee index exceeds committee length",
|
|
msg: ðpb.Attestation{
|
|
AggregationBits: bitfield.Bitlist{0b101},
|
|
Data: ðpb.AttestationData{
|
|
BeaconBlockRoot: validBlockRoot[:],
|
|
CommitteeIndex: 4,
|
|
Slot: 1,
|
|
Target: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
},
|
|
},
|
|
topic: fmt.Sprintf("/eth2/%x/beacon_attestation_2", digest),
|
|
validAttestationSignature: true,
|
|
want: false,
|
|
},
|
|
{
|
|
name: "wrong committee index",
|
|
msg: ðpb.Attestation{
|
|
AggregationBits: bitfield.Bitlist{0b101},
|
|
Data: ðpb.AttestationData{
|
|
BeaconBlockRoot: validBlockRoot[:],
|
|
CommitteeIndex: 2,
|
|
Slot: 1,
|
|
Target: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
},
|
|
},
|
|
topic: fmt.Sprintf("/eth2/%x/beacon_attestation_2", digest),
|
|
validAttestationSignature: true,
|
|
want: false,
|
|
},
|
|
{
|
|
name: "already aggregated",
|
|
msg: ðpb.Attestation{
|
|
AggregationBits: bitfield.Bitlist{0b1011},
|
|
Data: ðpb.AttestationData{
|
|
BeaconBlockRoot: validBlockRoot[:],
|
|
CommitteeIndex: 1,
|
|
Slot: 1,
|
|
Target: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
},
|
|
},
|
|
topic: fmt.Sprintf("/eth2/%x/beacon_attestation_1", digest),
|
|
validAttestationSignature: true,
|
|
want: false,
|
|
},
|
|
{
|
|
name: "missing block",
|
|
msg: ðpb.Attestation{
|
|
AggregationBits: bitfield.Bitlist{0b101},
|
|
Data: ðpb.AttestationData{
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("missing"), 32),
|
|
CommitteeIndex: 1,
|
|
Slot: 1,
|
|
Target: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
},
|
|
},
|
|
topic: fmt.Sprintf("/eth2/%x/beacon_attestation_1", digest),
|
|
validAttestationSignature: true,
|
|
want: false,
|
|
},
|
|
{
|
|
name: "invalid attestation",
|
|
msg: ðpb.Attestation{
|
|
AggregationBits: bitfield.Bitlist{0b101},
|
|
Data: ðpb.AttestationData{
|
|
BeaconBlockRoot: validBlockRoot[:],
|
|
CommitteeIndex: 1,
|
|
Slot: 1,
|
|
Target: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
},
|
|
},
|
|
topic: fmt.Sprintf("/eth2/%x/beacon_attestation_1", digest),
|
|
validAttestationSignature: false,
|
|
want: false,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
helpers.ClearCache()
|
|
chain.ValidAttestation = tt.validAttestationSignature
|
|
if tt.validAttestationSignature {
|
|
com, err := helpers.BeaconCommitteeFromState(savedState, tt.msg.Data.Slot, tt.msg.Data.CommitteeIndex)
|
|
require.NoError(t, err)
|
|
domain, err := helpers.Domain(savedState.Fork(), tt.msg.Data.Target.Epoch, params.BeaconConfig().DomainBeaconAttester, savedState.GenesisValidatorRoot())
|
|
require.NoError(t, err)
|
|
attRoot, err := helpers.ComputeSigningRoot(tt.msg.Data, domain)
|
|
require.NoError(t, err)
|
|
for i := 0; ; i++ {
|
|
if tt.msg.AggregationBits.BitAt(uint64(i)) {
|
|
tt.msg.Signature = keys[com[i]].Sign(attRoot[:]).Marshal()
|
|
break
|
|
}
|
|
}
|
|
} else {
|
|
tt.msg.Signature = make([]byte, 96)
|
|
}
|
|
buf := new(bytes.Buffer)
|
|
_, err := p.Encoding().EncodeGossip(buf, tt.msg)
|
|
require.NoError(t, err)
|
|
m := &pubsub.Message{
|
|
Message: &pubsubpb.Message{
|
|
Data: buf.Bytes(),
|
|
Topic: &tt.topic,
|
|
},
|
|
}
|
|
if tt.topic == "" {
|
|
m.Message.Topic = nil
|
|
}
|
|
received := s.validateCommitteeIndexBeaconAttestation(ctx, "" /*peerID*/, m) == pubsub.ValidationAccept
|
|
if received != tt.want {
|
|
t.Fatalf("Did not received wanted validation. Got %v, wanted %v", !tt.want, tt.want)
|
|
}
|
|
if tt.want && m.ValidatorData == nil {
|
|
t.Error("Expected validator data to be set")
|
|
}
|
|
})
|
|
}
|
|
}
|