mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-06 01:32:18 +00:00
12403d249f
* HTTP proxy server for Eth2 APIs (#8904) * Implement API HTTP proxy server * cleanup + more comments * gateway will no longer be dependent on beaconv1 * handle error during ErrorJson type assertion * simplify handling of endpoint data * fix mux v1 route * use URL encoding for all requests * comment fieldProcessor * fix failing test * change proxy port to not interfere with e2e * gzl * simplify conditional expression * Move appending custom error header to grpcutils package * add api-middleware-port flag * fix documentation for processField * modify e2e port * change field processing error message * better error message for field processing * simplify base64ToHexProcessor * fix json structs * Run several new endpoints through API middleware (#8922) * Implement API HTTP proxy server * cleanup + more comments * gateway will no longer be dependent on beaconv1 * handle error during ErrorJson type assertion * simplify handling of endpoint data * fix mux v1 route * use URL encoding for all requests * comment fieldProcessor * fix failing test * change proxy port to not interfere with e2e * gzl * simplify conditional expression * Move appending custom error header to grpcutils package * add api-middleware-port flag * fix documentation for processField * modify e2e port * change field processing error message * better error message for field processing * simplify base64ToHexProcessor * fix json structs * /eth/v1/beacon/states/{state_id}/validators * /eth/v1/beacon/states/{state_id}/validators/{validator_id} * /eth/v1/beacon/states/{state_id}/validator_balances * /eth/v1/beacon/states/{state_id}/committees * allow skipping base64-encoding for query params * /eth/v1/beacon/pool/attestations * replace break with continue * Remove unused functions (#8924) Co-authored-by: terence tsao <terence@prysmaticlabs.com> * Process SSZ-serialized beacon state through API middleware (#8925) * update field names * Process SSZ-serialized beacon state through API middleware * revert changes to go.mod and go.sum * Revert "Merge branch '__develop' into feature/api-middleware" This reverts commit 7c739a8fd71e2c1e3a14be85abd29a59b57ae9b5, reversing changes made to 2d0f8e012ecb006888ed8e826b45625a3edc2eeb. * update ethereumapis * update validator field name * update deps.bzl * update json tags (#8942) * Run `/node/syncing` through API Middleware (#8944) * add IsSyncing field to grpc response * run /node/syncing through the middleware Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * Return HTTP status codes other than 200 and 500 from node and debug endpoints (#8937) * error codes for node endpoints * error codes for debug endpoints * better comment about headers * gzl * review comments * comment on return value * update fakeChecker used for fuzz tests * fix failing tests * Allow to pass URL params literally, without encoding to base64 (#8938) * Allow to pass URL params literally, without encoding to base64 * fix compile error Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * Process SSZ-serialized beacon state through API middleware (#8925) * update field names * Process SSZ-serialized beacon state through API middleware * revert changes to go.mod and go.sum * Revert "Merge branch '__develop' into feature/api-middleware" This reverts commit 7c739a8fd71e2c1e3a14be85abd29a59b57ae9b5, reversing changes made to 2d0f8e012ecb006888ed8e826b45625a3edc2eeb. * update ethereumapis * update validator field name * update deps.bzl * update json tags (#8942) * Run `/node/syncing` through API Middleware (#8944) * add IsSyncing field to grpc response * run /node/syncing through the middleware Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * Return HTTP status codes other than 200 and 500 from node and debug endpoints (#8937) * error codes for node endpoints * error codes for debug endpoints * better comment about headers * gzl * review comments * comment on return value * update fakeChecker used for fuzz tests * fix failing tests * Allow to pass URL params literally, without encoding to base64 (#8938) * Allow to pass URL params literally, without encoding to base64 * fix compile error Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> * unused import * Return correct status codes from beacon endpoints (#8960) * Various API Middleware fixes (#8963) * Return correct status codes from `/states` endpoints * better error messages in debug and node * better error messages in state * returning correct error codes from validator endpoints * correct error codes for getting a block header * gzl * fix err variable name * fix nil block comparison * test fixes * make status enum test better * fix ineffectual assignment * make PR unstuck * return proper status codes * return uppercase keys from /config/spec * return lowercase validator status * convert requested enum values to uppercase * validator fixes * Implement `/beacon/headers` endpoint (#8966) * Refactor API Middleware into more manageable code (#8984) * move endpoint registration out of shared package * divide main function into smaller components * return early on error * implement hooks * implement custom handlers and add documentation * fix test compile error * restrict package visibility * remove redundant error checking * rename file * API Middleware unit tests (#8998) * move endpoint registration out of shared package * divide main function into smaller components * return early on error * implement hooks * implement custom handlers and add documentation * fix test compile error * restrict package visibility * remove redundant error checking * rename file * api_middleware_processing * endpoints * gzl * remove gazelle:ignore * merge * Implement SSZ version of `/blocks/{block_id}` (#8970) * Implement SSZ version of `/blocks/{block_id}` * add dependencies back * fix indentation in deps.bzl * parameterize ssz functions * get block ssz * update ethereumapis dependency * gzl * Do not reuse `Endpoint` structs between API calls (#9007) * code refactor * implement endpoint factory * fix test * fmt * include pbs * gaz * test naming fixes * remove unused code * radek comments * revert endpoint test * bring back bytes test case * move `signedBeaconBlock` to `migration` package * change `fmt.Errorf` to `errors.Wrap` * capitalize SSZ * capitalize URL * more review feedback * rename `handleGetBlockSSZ` to `handleGetBeaconBlockSSZ` * rename `IndexOutOfRangeError` to `ValidatorIndexOutOfRangeError` * simplify parameter names * test header * more corrections * properly allocate array capacity Co-authored-by: terence tsao <terence@prysmaticlabs.com> Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> Co-authored-by: Nishant Das <nishdas93@gmail.com>
1011 lines
30 KiB
Go
1011 lines
30 KiB
Go
package beaconv1
|
|
|
|
import (
|
|
"context"
|
|
"reflect"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
|
|
eth2types "github.com/prysmaticlabs/eth2-types"
|
|
"github.com/prysmaticlabs/go-bitfield"
|
|
chainMock "github.com/prysmaticlabs/prysm/beacon-chain/blockchain/testing"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/operations/attestations"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/operations/slashings"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/operations/voluntaryexits"
|
|
p2pMock "github.com/prysmaticlabs/prysm/beacon-chain/p2p/testing"
|
|
pb "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1"
|
|
ethpb "github.com/prysmaticlabs/prysm/proto/eth/v1"
|
|
eth "github.com/prysmaticlabs/prysm/proto/eth/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/proto/migration"
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/grpcutils"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/assert"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/require"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/protobuf/types/known/emptypb"
|
|
)
|
|
|
|
func TestListPoolAttestations(t *testing.T) {
|
|
state, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
att1 := ð.Attestation{
|
|
AggregationBits: []byte{1, 10},
|
|
Data: ð.AttestationData{
|
|
Slot: 1,
|
|
CommitteeIndex: 1,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("blockroot1"), 32),
|
|
Source: ð.Checkpoint{
|
|
Epoch: 1,
|
|
Root: bytesutil.PadTo([]byte("sourceroot1"), 32),
|
|
},
|
|
Target: ð.Checkpoint{
|
|
Epoch: 10,
|
|
Root: bytesutil.PadTo([]byte("targetroot1"), 32),
|
|
},
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature1"), 96),
|
|
}
|
|
att2 := ð.Attestation{
|
|
AggregationBits: []byte{4, 40},
|
|
Data: ð.AttestationData{
|
|
Slot: 4,
|
|
CommitteeIndex: 4,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("blockroot4"), 32),
|
|
Source: ð.Checkpoint{
|
|
Epoch: 4,
|
|
Root: bytesutil.PadTo([]byte("sourceroot4"), 32),
|
|
},
|
|
Target: ð.Checkpoint{
|
|
Epoch: 40,
|
|
Root: bytesutil.PadTo([]byte("targetroot4"), 32),
|
|
},
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature4"), 96),
|
|
}
|
|
att3 := ð.Attestation{
|
|
AggregationBits: []byte{2, 20},
|
|
Data: ð.AttestationData{
|
|
Slot: 2,
|
|
CommitteeIndex: 2,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("blockroot2"), 32),
|
|
Source: ð.Checkpoint{
|
|
Epoch: 2,
|
|
Root: bytesutil.PadTo([]byte("sourceroot2"), 32),
|
|
},
|
|
Target: ð.Checkpoint{
|
|
Epoch: 20,
|
|
Root: bytesutil.PadTo([]byte("targetroot2"), 32),
|
|
},
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature2"), 96),
|
|
}
|
|
att4 := ð.Attestation{
|
|
AggregationBits: bitfield.NewBitlist(8),
|
|
Data: ð.AttestationData{
|
|
Slot: 4,
|
|
CommitteeIndex: 4,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("blockroot2"), 32),
|
|
Source: ð.Checkpoint{
|
|
Epoch: 2,
|
|
Root: bytesutil.PadTo([]byte("sourceroot2"), 32),
|
|
},
|
|
Target: ð.Checkpoint{
|
|
Epoch: 20,
|
|
Root: bytesutil.PadTo([]byte("targetroot2"), 32),
|
|
},
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature2"), 96),
|
|
}
|
|
att5 := ð.Attestation{
|
|
AggregationBits: bitfield.NewBitlist(8),
|
|
Data: ð.AttestationData{
|
|
Slot: 2,
|
|
CommitteeIndex: 4,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("blockroot1"), 32),
|
|
Source: ð.Checkpoint{
|
|
Epoch: 2,
|
|
Root: bytesutil.PadTo([]byte("sourceroot2"), 32),
|
|
},
|
|
Target: ð.Checkpoint{
|
|
Epoch: 20,
|
|
Root: bytesutil.PadTo([]byte("targetroot2"), 32),
|
|
},
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature1"), 96),
|
|
}
|
|
att6 := ð.Attestation{
|
|
AggregationBits: bitfield.NewBitlist(8),
|
|
Data: ð.AttestationData{
|
|
Slot: 2,
|
|
CommitteeIndex: 4,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("blockroot2"), 32),
|
|
Source: ð.Checkpoint{
|
|
Epoch: 2,
|
|
Root: bytesutil.PadTo([]byte("sourceroot2"), 32),
|
|
},
|
|
Target: ð.Checkpoint{
|
|
Epoch: 20,
|
|
Root: bytesutil.PadTo([]byte("targetroot2"), 32),
|
|
},
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature2"), 96),
|
|
}
|
|
s := &Server{
|
|
ChainInfoFetcher: &chainMock.ChainService{State: state},
|
|
AttestationsPool: attestations.NewPool(),
|
|
}
|
|
require.NoError(t, s.AttestationsPool.SaveAggregatedAttestations([]*eth.Attestation{att1, att2, att3}))
|
|
require.NoError(t, s.AttestationsPool.SaveUnaggregatedAttestations([]*eth.Attestation{att4, att5, att6}))
|
|
|
|
t.Run("empty request", func(t *testing.T) {
|
|
req := ðpb.AttestationsPoolRequest{}
|
|
resp, err := s.ListPoolAttestations(context.Background(), req)
|
|
require.NoError(t, err)
|
|
require.Equal(t, 6, len(resp.Data))
|
|
})
|
|
|
|
t.Run("slot request", func(t *testing.T) {
|
|
slot := eth2types.Slot(2)
|
|
req := ðpb.AttestationsPoolRequest{
|
|
Slot: &slot,
|
|
}
|
|
resp, err := s.ListPoolAttestations(context.Background(), req)
|
|
require.NoError(t, err)
|
|
require.Equal(t, 3, len(resp.Data))
|
|
for _, datum := range resp.Data {
|
|
assert.DeepEqual(t, datum.Data.Slot, slot)
|
|
}
|
|
})
|
|
|
|
t.Run("index request", func(t *testing.T) {
|
|
index := eth2types.CommitteeIndex(4)
|
|
req := ðpb.AttestationsPoolRequest{
|
|
CommitteeIndex: &index,
|
|
}
|
|
resp, err := s.ListPoolAttestations(context.Background(), req)
|
|
require.NoError(t, err)
|
|
require.Equal(t, 4, len(resp.Data))
|
|
for _, datum := range resp.Data {
|
|
assert.DeepEqual(t, datum.Data.Index, index)
|
|
}
|
|
})
|
|
|
|
t.Run("both slot + index request", func(t *testing.T) {
|
|
slot := eth2types.Slot(2)
|
|
index := eth2types.CommitteeIndex(4)
|
|
req := ðpb.AttestationsPoolRequest{
|
|
Slot: &slot,
|
|
CommitteeIndex: &index,
|
|
}
|
|
resp, err := s.ListPoolAttestations(context.Background(), req)
|
|
require.NoError(t, err)
|
|
require.Equal(t, 2, len(resp.Data))
|
|
for _, datum := range resp.Data {
|
|
assert.DeepEqual(t, datum.Data.Index, index)
|
|
assert.DeepEqual(t, datum.Data.Slot, slot)
|
|
}
|
|
})
|
|
}
|
|
|
|
func TestListPoolAttesterSlashings(t *testing.T) {
|
|
state, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
slashing1 := ð.AttesterSlashing{
|
|
Attestation_1: ð.IndexedAttestation{
|
|
AttestingIndices: []uint64{1, 10},
|
|
Data: ð.AttestationData{
|
|
Slot: 1,
|
|
CommitteeIndex: 1,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("blockroot1"), 32),
|
|
Source: ð.Checkpoint{
|
|
Epoch: 1,
|
|
Root: bytesutil.PadTo([]byte("sourceroot1"), 32),
|
|
},
|
|
Target: ð.Checkpoint{
|
|
Epoch: 10,
|
|
Root: bytesutil.PadTo([]byte("targetroot1"), 32),
|
|
},
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature1"), 96),
|
|
},
|
|
Attestation_2: ð.IndexedAttestation{
|
|
AttestingIndices: []uint64{2, 20},
|
|
Data: ð.AttestationData{
|
|
Slot: 2,
|
|
CommitteeIndex: 2,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("blockroot2"), 32),
|
|
Source: ð.Checkpoint{
|
|
Epoch: 2,
|
|
Root: bytesutil.PadTo([]byte("sourceroot2"), 32),
|
|
},
|
|
Target: ð.Checkpoint{
|
|
Epoch: 20,
|
|
Root: bytesutil.PadTo([]byte("targetroot2"), 32),
|
|
},
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature2"), 96),
|
|
},
|
|
}
|
|
slashing2 := ð.AttesterSlashing{
|
|
Attestation_1: ð.IndexedAttestation{
|
|
AttestingIndices: []uint64{3, 30},
|
|
Data: ð.AttestationData{
|
|
Slot: 3,
|
|
CommitteeIndex: 3,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("blockroot3"), 32),
|
|
Source: ð.Checkpoint{
|
|
Epoch: 3,
|
|
Root: bytesutil.PadTo([]byte("sourceroot3"), 32),
|
|
},
|
|
Target: ð.Checkpoint{
|
|
Epoch: 30,
|
|
Root: bytesutil.PadTo([]byte("targetroot3"), 32),
|
|
},
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature3"), 96),
|
|
},
|
|
Attestation_2: ð.IndexedAttestation{
|
|
AttestingIndices: []uint64{4, 40},
|
|
Data: ð.AttestationData{
|
|
Slot: 4,
|
|
CommitteeIndex: 4,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("blockroot4"), 32),
|
|
Source: ð.Checkpoint{
|
|
Epoch: 4,
|
|
Root: bytesutil.PadTo([]byte("sourceroot4"), 32),
|
|
},
|
|
Target: ð.Checkpoint{
|
|
Epoch: 40,
|
|
Root: bytesutil.PadTo([]byte("targetroot4"), 32),
|
|
},
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature4"), 96),
|
|
},
|
|
}
|
|
|
|
s := &Server{
|
|
ChainInfoFetcher: &chainMock.ChainService{State: state},
|
|
SlashingsPool: &slashings.PoolMock{PendingAttSlashings: []*eth.AttesterSlashing{slashing1, slashing2}},
|
|
}
|
|
|
|
resp, err := s.ListPoolAttesterSlashings(context.Background(), &emptypb.Empty{})
|
|
require.NoError(t, err)
|
|
require.Equal(t, 2, len(resp.Data))
|
|
assert.DeepEqual(t, migration.V1Alpha1AttSlashingToV1(slashing1), resp.Data[0])
|
|
assert.DeepEqual(t, migration.V1Alpha1AttSlashingToV1(slashing2), resp.Data[1])
|
|
}
|
|
|
|
func TestListPoolProposerSlashings(t *testing.T) {
|
|
state, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
slashing1 := ð.ProposerSlashing{
|
|
Header_1: ð.SignedBeaconBlockHeader{
|
|
Header: ð.BeaconBlockHeader{
|
|
Slot: 1,
|
|
ProposerIndex: 1,
|
|
ParentRoot: bytesutil.PadTo([]byte("parentroot1"), 32),
|
|
StateRoot: bytesutil.PadTo([]byte("stateroot1"), 32),
|
|
BodyRoot: bytesutil.PadTo([]byte("bodyroot1"), 32),
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature1"), 96),
|
|
},
|
|
Header_2: ð.SignedBeaconBlockHeader{
|
|
Header: ð.BeaconBlockHeader{
|
|
Slot: 2,
|
|
ProposerIndex: 2,
|
|
ParentRoot: bytesutil.PadTo([]byte("parentroot2"), 32),
|
|
StateRoot: bytesutil.PadTo([]byte("stateroot2"), 32),
|
|
BodyRoot: bytesutil.PadTo([]byte("bodyroot2"), 32),
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature2"), 96),
|
|
},
|
|
}
|
|
slashing2 := ð.ProposerSlashing{
|
|
Header_1: ð.SignedBeaconBlockHeader{
|
|
Header: ð.BeaconBlockHeader{
|
|
Slot: 3,
|
|
ProposerIndex: 3,
|
|
ParentRoot: bytesutil.PadTo([]byte("parentroot3"), 32),
|
|
StateRoot: bytesutil.PadTo([]byte("stateroot3"), 32),
|
|
BodyRoot: bytesutil.PadTo([]byte("bodyroot3"), 32),
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature3"), 96),
|
|
},
|
|
Header_2: ð.SignedBeaconBlockHeader{
|
|
Header: ð.BeaconBlockHeader{
|
|
Slot: 4,
|
|
ProposerIndex: 4,
|
|
ParentRoot: bytesutil.PadTo([]byte("parentroot4"), 32),
|
|
StateRoot: bytesutil.PadTo([]byte("stateroot4"), 32),
|
|
BodyRoot: bytesutil.PadTo([]byte("bodyroot4"), 32),
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature4"), 96),
|
|
},
|
|
}
|
|
|
|
s := &Server{
|
|
ChainInfoFetcher: &chainMock.ChainService{State: state},
|
|
SlashingsPool: &slashings.PoolMock{PendingPropSlashings: []*eth.ProposerSlashing{slashing1, slashing2}},
|
|
}
|
|
|
|
resp, err := s.ListPoolProposerSlashings(context.Background(), &emptypb.Empty{})
|
|
require.NoError(t, err)
|
|
require.Equal(t, 2, len(resp.Data))
|
|
assert.DeepEqual(t, migration.V1Alpha1ProposerSlashingToV1(slashing1), resp.Data[0])
|
|
assert.DeepEqual(t, migration.V1Alpha1ProposerSlashingToV1(slashing2), resp.Data[1])
|
|
}
|
|
|
|
func TestListPoolVoluntaryExits(t *testing.T) {
|
|
state, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
exit1 := ð.SignedVoluntaryExit{
|
|
Exit: ð.VoluntaryExit{
|
|
Epoch: 1,
|
|
ValidatorIndex: 1,
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature1"), 96),
|
|
}
|
|
exit2 := ð.SignedVoluntaryExit{
|
|
Exit: ð.VoluntaryExit{
|
|
Epoch: 2,
|
|
ValidatorIndex: 2,
|
|
},
|
|
Signature: bytesutil.PadTo([]byte("signature2"), 96),
|
|
}
|
|
|
|
s := &Server{
|
|
ChainInfoFetcher: &chainMock.ChainService{State: state},
|
|
VoluntaryExitsPool: &voluntaryexits.PoolMock{Exits: []*eth.SignedVoluntaryExit{exit1, exit2}},
|
|
}
|
|
|
|
resp, err := s.ListPoolVoluntaryExits(context.Background(), &emptypb.Empty{})
|
|
require.NoError(t, err)
|
|
require.Equal(t, 2, len(resp.Data))
|
|
assert.DeepEqual(t, migration.V1Alpha1ExitToV1(exit1), resp.Data[0])
|
|
assert.DeepEqual(t, migration.V1Alpha1ExitToV1(exit2), resp.Data[1])
|
|
}
|
|
|
|
func TestSubmitAttesterSlashing_Ok(t *testing.T) {
|
|
ctx := context.Background()
|
|
|
|
_, keys, err := testutil.DeterministicDepositsAndKeys(1)
|
|
require.NoError(t, err)
|
|
validator := ð.Validator{
|
|
PublicKey: keys[0].PublicKey().Marshal(),
|
|
}
|
|
state, err := testutil.NewBeaconState(func(state *pb.BeaconState) error {
|
|
state.Validators = []*eth.Validator{validator}
|
|
return nil
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
slashing := ðpb.AttesterSlashing{
|
|
Attestation_1: ðpb.IndexedAttestation{
|
|
AttestingIndices: []uint64{0},
|
|
Data: ðpb.AttestationData{
|
|
Slot: 1,
|
|
Index: 1,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("blockroot1"), 32),
|
|
Source: ðpb.Checkpoint{
|
|
Epoch: 1,
|
|
Root: bytesutil.PadTo([]byte("sourceroot1"), 32),
|
|
},
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 10,
|
|
Root: bytesutil.PadTo([]byte("targetroot1"), 32),
|
|
},
|
|
},
|
|
Signature: make([]byte, 96),
|
|
},
|
|
Attestation_2: ðpb.IndexedAttestation{
|
|
AttestingIndices: []uint64{0},
|
|
Data: ðpb.AttestationData{
|
|
Slot: 1,
|
|
Index: 1,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("blockroot2"), 32),
|
|
Source: ðpb.Checkpoint{
|
|
Epoch: 1,
|
|
Root: bytesutil.PadTo([]byte("sourceroot2"), 32),
|
|
},
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 10,
|
|
Root: bytesutil.PadTo([]byte("targetroot2"), 32),
|
|
},
|
|
},
|
|
Signature: make([]byte, 96),
|
|
},
|
|
}
|
|
|
|
for _, att := range []*ethpb.IndexedAttestation{slashing.Attestation_1, slashing.Attestation_2} {
|
|
sb, err := helpers.ComputeDomainAndSign(state, att.Data.Target.Epoch, att.Data, params.BeaconConfig().DomainBeaconAttester, keys[0])
|
|
require.NoError(t, err)
|
|
sig, err := bls.SignatureFromBytes(sb)
|
|
require.NoError(t, err)
|
|
att.Signature = sig.Marshal()
|
|
}
|
|
|
|
broadcaster := &p2pMock.MockBroadcaster{}
|
|
s := &Server{
|
|
ChainInfoFetcher: &chainMock.ChainService{State: state},
|
|
SlashingsPool: &slashings.PoolMock{},
|
|
Broadcaster: broadcaster,
|
|
}
|
|
|
|
_, err = s.SubmitAttesterSlashing(ctx, slashing)
|
|
require.NoError(t, err)
|
|
pendingSlashings := s.SlashingsPool.PendingAttesterSlashings(ctx, state, true)
|
|
require.Equal(t, 1, len(pendingSlashings))
|
|
assert.DeepEqual(t, migration.V1AttSlashingToV1Alpha1(slashing), pendingSlashings[0])
|
|
assert.Equal(t, true, broadcaster.BroadcastCalled)
|
|
}
|
|
|
|
func TestSubmitAttesterSlashing_InvalidSlashing(t *testing.T) {
|
|
ctx := context.Background()
|
|
state, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
|
|
attestation := ðpb.IndexedAttestation{
|
|
AttestingIndices: []uint64{0},
|
|
Data: ðpb.AttestationData{
|
|
Slot: 1,
|
|
Index: 1,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("blockroot1"), 32),
|
|
Source: ðpb.Checkpoint{
|
|
Epoch: 1,
|
|
Root: bytesutil.PadTo([]byte("sourceroot1"), 32),
|
|
},
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 10,
|
|
Root: bytesutil.PadTo([]byte("targetroot1"), 32),
|
|
},
|
|
},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
|
|
slashing := ðpb.AttesterSlashing{
|
|
Attestation_1: attestation,
|
|
Attestation_2: attestation,
|
|
}
|
|
|
|
broadcaster := &p2pMock.MockBroadcaster{}
|
|
s := &Server{
|
|
ChainInfoFetcher: &chainMock.ChainService{State: state},
|
|
SlashingsPool: &slashings.PoolMock{},
|
|
Broadcaster: broadcaster,
|
|
}
|
|
|
|
_, err = s.SubmitAttesterSlashing(ctx, slashing)
|
|
require.ErrorContains(t, "Invalid attester slashing", err)
|
|
assert.Equal(t, false, broadcaster.BroadcastCalled)
|
|
}
|
|
|
|
func TestSubmitProposerSlashing_Ok(t *testing.T) {
|
|
ctx := context.Background()
|
|
|
|
_, keys, err := testutil.DeterministicDepositsAndKeys(1)
|
|
require.NoError(t, err)
|
|
validator := ð.Validator{
|
|
PublicKey: keys[0].PublicKey().Marshal(),
|
|
WithdrawableEpoch: eth2types.Epoch(1),
|
|
}
|
|
state, err := testutil.NewBeaconState(func(state *pb.BeaconState) error {
|
|
state.Validators = []*eth.Validator{validator}
|
|
return nil
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
slashing := ðpb.ProposerSlashing{
|
|
SignedHeader_1: ðpb.SignedBeaconBlockHeader{
|
|
Message: ðpb.BeaconBlockHeader{
|
|
Slot: 1,
|
|
ProposerIndex: 0,
|
|
ParentRoot: bytesutil.PadTo([]byte("parentroot1"), 32),
|
|
StateRoot: bytesutil.PadTo([]byte("stateroot1"), 32),
|
|
BodyRoot: bytesutil.PadTo([]byte("bodyroot1"), 32),
|
|
},
|
|
Signature: make([]byte, 96),
|
|
},
|
|
SignedHeader_2: ðpb.SignedBeaconBlockHeader{
|
|
Message: ðpb.BeaconBlockHeader{
|
|
Slot: 1,
|
|
ProposerIndex: 0,
|
|
ParentRoot: bytesutil.PadTo([]byte("parentroot2"), 32),
|
|
StateRoot: bytesutil.PadTo([]byte("stateroot2"), 32),
|
|
BodyRoot: bytesutil.PadTo([]byte("bodyroot2"), 32),
|
|
},
|
|
Signature: make([]byte, 96),
|
|
},
|
|
}
|
|
|
|
for _, h := range []*ethpb.SignedBeaconBlockHeader{slashing.SignedHeader_1, slashing.SignedHeader_2} {
|
|
sb, err := helpers.ComputeDomainAndSign(
|
|
state,
|
|
helpers.SlotToEpoch(h.Message.Slot),
|
|
h.Message,
|
|
params.BeaconConfig().DomainBeaconProposer,
|
|
keys[0],
|
|
)
|
|
require.NoError(t, err)
|
|
sig, err := bls.SignatureFromBytes(sb)
|
|
require.NoError(t, err)
|
|
h.Signature = sig.Marshal()
|
|
}
|
|
|
|
broadcaster := &p2pMock.MockBroadcaster{}
|
|
s := &Server{
|
|
ChainInfoFetcher: &chainMock.ChainService{State: state},
|
|
SlashingsPool: &slashings.PoolMock{},
|
|
Broadcaster: broadcaster,
|
|
}
|
|
|
|
_, err = s.SubmitProposerSlashing(ctx, slashing)
|
|
require.NoError(t, err)
|
|
pendingSlashings := s.SlashingsPool.PendingProposerSlashings(ctx, state, true)
|
|
require.Equal(t, 1, len(pendingSlashings))
|
|
assert.DeepEqual(t, migration.V1ProposerSlashingToV1Alpha1(slashing), pendingSlashings[0])
|
|
assert.Equal(t, true, broadcaster.BroadcastCalled)
|
|
}
|
|
|
|
func TestSubmitProposerSlashing_InvalidSlashing(t *testing.T) {
|
|
ctx := context.Background()
|
|
state, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
|
|
header := ðpb.SignedBeaconBlockHeader{
|
|
Message: ðpb.BeaconBlockHeader{
|
|
Slot: 1,
|
|
ProposerIndex: 0,
|
|
ParentRoot: bytesutil.PadTo([]byte("parentroot1"), 32),
|
|
StateRoot: bytesutil.PadTo([]byte("stateroot1"), 32),
|
|
BodyRoot: bytesutil.PadTo([]byte("bodyroot1"), 32),
|
|
},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
|
|
slashing := ðpb.ProposerSlashing{
|
|
SignedHeader_1: header,
|
|
SignedHeader_2: header,
|
|
}
|
|
|
|
broadcaster := &p2pMock.MockBroadcaster{}
|
|
s := &Server{
|
|
ChainInfoFetcher: &chainMock.ChainService{State: state},
|
|
SlashingsPool: &slashings.PoolMock{},
|
|
Broadcaster: broadcaster,
|
|
}
|
|
|
|
_, err = s.SubmitProposerSlashing(ctx, slashing)
|
|
require.ErrorContains(t, "Invalid proposer slashing", err)
|
|
assert.Equal(t, false, broadcaster.BroadcastCalled)
|
|
}
|
|
|
|
func TestSubmitVoluntaryExit_Ok(t *testing.T) {
|
|
ctx := context.Background()
|
|
|
|
_, keys, err := testutil.DeterministicDepositsAndKeys(1)
|
|
require.NoError(t, err)
|
|
validator := ð.Validator{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
PublicKey: keys[0].PublicKey().Marshal(),
|
|
}
|
|
state, err := testutil.NewBeaconState(func(state *pb.BeaconState) error {
|
|
state.Validators = []*eth.Validator{validator}
|
|
// Satisfy activity time required before exiting.
|
|
state.Slot = params.BeaconConfig().SlotsPerEpoch.Mul(uint64(params.BeaconConfig().ShardCommitteePeriod))
|
|
return nil
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
exit := ðpb.SignedVoluntaryExit{
|
|
Message: ðpb.VoluntaryExit{
|
|
Epoch: 0,
|
|
ValidatorIndex: 0,
|
|
},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
|
|
sb, err := helpers.ComputeDomainAndSign(state, exit.Message.Epoch, exit.Message, params.BeaconConfig().DomainVoluntaryExit, keys[0])
|
|
require.NoError(t, err)
|
|
sig, err := bls.SignatureFromBytes(sb)
|
|
require.NoError(t, err)
|
|
exit.Signature = sig.Marshal()
|
|
|
|
broadcaster := &p2pMock.MockBroadcaster{}
|
|
s := &Server{
|
|
ChainInfoFetcher: &chainMock.ChainService{State: state},
|
|
VoluntaryExitsPool: &voluntaryexits.PoolMock{},
|
|
Broadcaster: broadcaster,
|
|
}
|
|
|
|
_, err = s.SubmitVoluntaryExit(ctx, exit)
|
|
require.NoError(t, err)
|
|
pendingExits := s.VoluntaryExitsPool.PendingExits(state, state.Slot(), true)
|
|
require.Equal(t, 1, len(pendingExits))
|
|
assert.DeepEqual(t, migration.V1ExitToV1Alpha1(exit), pendingExits[0])
|
|
assert.Equal(t, true, broadcaster.BroadcastCalled)
|
|
}
|
|
|
|
func TestSubmitVoluntaryExit_InvalidValidatorIndex(t *testing.T) {
|
|
ctx := context.Background()
|
|
|
|
_, keys, err := testutil.DeterministicDepositsAndKeys(1)
|
|
require.NoError(t, err)
|
|
validator := ð.Validator{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
PublicKey: keys[0].PublicKey().Marshal(),
|
|
}
|
|
state, err := testutil.NewBeaconState(func(state *pb.BeaconState) error {
|
|
state.Validators = []*eth.Validator{validator}
|
|
return nil
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
exit := ðpb.SignedVoluntaryExit{
|
|
Message: ðpb.VoluntaryExit{
|
|
Epoch: 0,
|
|
ValidatorIndex: 99,
|
|
},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
|
|
broadcaster := &p2pMock.MockBroadcaster{}
|
|
s := &Server{
|
|
ChainInfoFetcher: &chainMock.ChainService{State: state},
|
|
VoluntaryExitsPool: &voluntaryexits.PoolMock{},
|
|
Broadcaster: broadcaster,
|
|
}
|
|
|
|
_, err = s.SubmitVoluntaryExit(ctx, exit)
|
|
require.ErrorContains(t, "Could not get exiting validator", err)
|
|
assert.Equal(t, false, broadcaster.BroadcastCalled)
|
|
}
|
|
|
|
func TestSubmitVoluntaryExit_InvalidExit(t *testing.T) {
|
|
ctx := context.Background()
|
|
|
|
_, keys, err := testutil.DeterministicDepositsAndKeys(1)
|
|
require.NoError(t, err)
|
|
validator := ð.Validator{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
PublicKey: keys[0].PublicKey().Marshal(),
|
|
}
|
|
state, err := testutil.NewBeaconState(func(state *pb.BeaconState) error {
|
|
state.Validators = []*eth.Validator{validator}
|
|
return nil
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
exit := ðpb.SignedVoluntaryExit{
|
|
Message: ðpb.VoluntaryExit{
|
|
Epoch: 0,
|
|
ValidatorIndex: 0,
|
|
},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
|
|
broadcaster := &p2pMock.MockBroadcaster{}
|
|
s := &Server{
|
|
ChainInfoFetcher: &chainMock.ChainService{State: state},
|
|
VoluntaryExitsPool: &voluntaryexits.PoolMock{},
|
|
Broadcaster: broadcaster,
|
|
}
|
|
|
|
_, err = s.SubmitVoluntaryExit(ctx, exit)
|
|
require.ErrorContains(t, "Invalid voluntary exit", err)
|
|
assert.Equal(t, false, broadcaster.BroadcastCalled)
|
|
}
|
|
|
|
func TestServer_SubmitAttestations_Ok(t *testing.T) {
|
|
ctx := context.Background()
|
|
params.SetupTestConfigCleanup(t)
|
|
c := params.BeaconConfig()
|
|
// Required for correct committee size calculation.
|
|
c.SlotsPerEpoch = 1
|
|
params.OverrideBeaconConfig(c)
|
|
|
|
_, keys, err := testutil.DeterministicDepositsAndKeys(1)
|
|
require.NoError(t, err)
|
|
validators := []*eth.Validator{
|
|
{
|
|
PublicKey: keys[0].PublicKey().Marshal(),
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
},
|
|
}
|
|
state, err := testutil.NewBeaconState(func(state *pb.BeaconState) error {
|
|
state.Validators = validators
|
|
state.Slot = 1
|
|
state.PreviousJustifiedCheckpoint = ð.Checkpoint{
|
|
Epoch: 0,
|
|
Root: bytesutil.PadTo([]byte("sourceroot1"), 32),
|
|
}
|
|
return nil
|
|
})
|
|
require.NoError(t, err)
|
|
b := bitfield.NewBitlist(1)
|
|
b.SetBitAt(0, true)
|
|
|
|
sourceCheckpoint := ðpb.Checkpoint{
|
|
Epoch: 0,
|
|
Root: bytesutil.PadTo([]byte("sourceroot1"), 32),
|
|
}
|
|
att1 := ðpb.Attestation{
|
|
AggregationBits: b,
|
|
Data: ðpb.AttestationData{
|
|
Slot: 0,
|
|
Index: 0,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("beaconblockroot1"), 32),
|
|
Source: sourceCheckpoint,
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 0,
|
|
Root: bytesutil.PadTo([]byte("targetroot1"), 32),
|
|
},
|
|
},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
att2 := ðpb.Attestation{
|
|
AggregationBits: b,
|
|
Data: ðpb.AttestationData{
|
|
Slot: 0,
|
|
Index: 0,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("beaconblockroot2"), 32),
|
|
Source: sourceCheckpoint,
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 0,
|
|
Root: bytesutil.PadTo([]byte("targetroot2"), 32),
|
|
},
|
|
},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
|
|
for _, att := range []*ethpb.Attestation{att1, att2} {
|
|
sb, err := helpers.ComputeDomainAndSign(
|
|
state,
|
|
helpers.SlotToEpoch(att.Data.Slot),
|
|
att.Data,
|
|
params.BeaconConfig().DomainBeaconAttester,
|
|
keys[0],
|
|
)
|
|
require.NoError(t, err)
|
|
sig, err := bls.SignatureFromBytes(sb)
|
|
require.NoError(t, err)
|
|
att.Signature = sig.Marshal()
|
|
}
|
|
|
|
broadcaster := &p2pMock.MockBroadcaster{}
|
|
s := &Server{
|
|
ChainInfoFetcher: &chainMock.ChainService{State: state},
|
|
AttestationsPool: &attestations.PoolMock{},
|
|
Broadcaster: broadcaster,
|
|
}
|
|
|
|
_, err = s.SubmitAttestations(ctx, ðpb.SubmitAttestationsRequest{
|
|
Data: []*ethpb.Attestation{att1, att2},
|
|
})
|
|
require.NoError(t, err)
|
|
savedAtts := s.AttestationsPool.AggregatedAttestations()
|
|
require.Equal(t, 2, len(savedAtts))
|
|
expectedAtt1, err := att1.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
expectedAtt2, err := att2.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
actualAtt1, err := savedAtts[0].HashTreeRoot()
|
|
require.NoError(t, err)
|
|
actualAtt2, err := savedAtts[1].HashTreeRoot()
|
|
require.NoError(t, err)
|
|
for _, r := range [][32]byte{actualAtt1, actualAtt2} {
|
|
assert.Equal(t, true, reflect.DeepEqual(expectedAtt1, r) || reflect.DeepEqual(expectedAtt2, r))
|
|
}
|
|
assert.Equal(t, true, broadcaster.BroadcastCalled)
|
|
assert.Equal(t, 2, len(broadcaster.BroadcastMessages))
|
|
}
|
|
|
|
func TestServer_SubmitAttestations_ValidAttestationSubmitted(t *testing.T) {
|
|
ctx := grpc.NewContextWithServerTransportStream(context.Background(), &runtime.ServerTransportStream{})
|
|
|
|
params.SetupTestConfigCleanup(t)
|
|
c := params.BeaconConfig()
|
|
// Required for correct committee size calculation.
|
|
c.SlotsPerEpoch = 1
|
|
params.OverrideBeaconConfig(c)
|
|
|
|
_, keys, err := testutil.DeterministicDepositsAndKeys(1)
|
|
require.NoError(t, err)
|
|
validators := []*eth.Validator{
|
|
{
|
|
PublicKey: keys[0].PublicKey().Marshal(),
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
},
|
|
}
|
|
state, err := testutil.NewBeaconState(func(state *pb.BeaconState) error {
|
|
state.Validators = validators
|
|
state.Slot = 1
|
|
state.PreviousJustifiedCheckpoint = ð.Checkpoint{
|
|
Epoch: 0,
|
|
Root: bytesutil.PadTo([]byte("sourceroot1"), 32),
|
|
}
|
|
return nil
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
sourceCheckpoint := ðpb.Checkpoint{
|
|
Epoch: 0,
|
|
Root: bytesutil.PadTo([]byte("sourceroot1"), 32),
|
|
}
|
|
b := bitfield.NewBitlist(1)
|
|
b.SetBitAt(0, true)
|
|
attValid := ðpb.Attestation{
|
|
AggregationBits: b,
|
|
Data: ðpb.AttestationData{
|
|
Slot: 0,
|
|
Index: 0,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("beaconblockroot1"), 32),
|
|
Source: sourceCheckpoint,
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 0,
|
|
Root: bytesutil.PadTo([]byte("targetroot1"), 32),
|
|
},
|
|
},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
attInvalidTarget := ðpb.Attestation{
|
|
AggregationBits: b,
|
|
Data: ðpb.AttestationData{
|
|
Slot: 0,
|
|
Index: 0,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("beaconblockroot2"), 32),
|
|
Source: ðpb.Checkpoint{
|
|
Epoch: 0,
|
|
Root: bytesutil.PadTo([]byte("sourceroot2"), 32),
|
|
},
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 99,
|
|
Root: bytesutil.PadTo([]byte("targetroot2"), 32),
|
|
},
|
|
},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
attInvalidSignature := ðpb.Attestation{
|
|
AggregationBits: b,
|
|
Data: ðpb.AttestationData{
|
|
Slot: 0,
|
|
Index: 0,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("beaconblockroot2"), 32),
|
|
Source: sourceCheckpoint,
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 0,
|
|
Root: bytesutil.PadTo([]byte("targetroot2"), 32),
|
|
},
|
|
},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
|
|
// Don't sign attInvalidSignature.
|
|
for _, att := range []*ethpb.Attestation{attValid, attInvalidTarget} {
|
|
sb, err := helpers.ComputeDomainAndSign(
|
|
state,
|
|
helpers.SlotToEpoch(att.Data.Slot),
|
|
att.Data,
|
|
params.BeaconConfig().DomainBeaconAttester,
|
|
keys[0],
|
|
)
|
|
require.NoError(t, err)
|
|
sig, err := bls.SignatureFromBytes(sb)
|
|
require.NoError(t, err)
|
|
att.Signature = sig.Marshal()
|
|
}
|
|
|
|
broadcaster := &p2pMock.MockBroadcaster{}
|
|
s := &Server{
|
|
ChainInfoFetcher: &chainMock.ChainService{State: state},
|
|
AttestationsPool: &attestations.PoolMock{},
|
|
Broadcaster: broadcaster,
|
|
}
|
|
|
|
_, err = s.SubmitAttestations(ctx, ðpb.SubmitAttestationsRequest{
|
|
Data: []*ethpb.Attestation{attValid, attInvalidTarget, attInvalidSignature},
|
|
})
|
|
require.ErrorContains(t, "One or more attestations failed validation", err)
|
|
savedAtts := s.AttestationsPool.AggregatedAttestations()
|
|
require.Equal(t, 1, len(savedAtts))
|
|
expectedAtt, err := attValid.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
actualAtt, err := savedAtts[0].HashTreeRoot()
|
|
require.NoError(t, err)
|
|
assert.DeepEqual(t, expectedAtt, actualAtt)
|
|
assert.Equal(t, true, broadcaster.BroadcastCalled)
|
|
require.Equal(t, 1, len(broadcaster.BroadcastMessages))
|
|
broadcastRoot, err := broadcaster.BroadcastMessages[0].(*eth.Attestation).HashTreeRoot()
|
|
require.NoError(t, err)
|
|
require.DeepEqual(t, expectedAtt, broadcastRoot)
|
|
}
|
|
|
|
func TestServer_SubmitAttestations_InvalidAttestationHeader(t *testing.T) {
|
|
ctx := grpc.NewContextWithServerTransportStream(context.Background(), &runtime.ServerTransportStream{})
|
|
|
|
params.SetupTestConfigCleanup(t)
|
|
c := params.BeaconConfig()
|
|
// Required for correct committee size calculation.
|
|
c.SlotsPerEpoch = 1
|
|
params.OverrideBeaconConfig(c)
|
|
|
|
_, keys, err := testutil.DeterministicDepositsAndKeys(1)
|
|
require.NoError(t, err)
|
|
validators := []*eth.Validator{
|
|
{
|
|
PublicKey: keys[0].PublicKey().Marshal(),
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
},
|
|
}
|
|
state, err := testutil.NewBeaconState(func(state *pb.BeaconState) error {
|
|
state.Validators = validators
|
|
state.Slot = 1
|
|
state.PreviousJustifiedCheckpoint = ð.Checkpoint{
|
|
Epoch: 0,
|
|
Root: bytesutil.PadTo([]byte("sourceroot1"), 32),
|
|
}
|
|
return nil
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
b := bitfield.NewBitlist(1)
|
|
b.SetBitAt(0, true)
|
|
att := ðpb.Attestation{
|
|
AggregationBits: b,
|
|
Data: ðpb.AttestationData{
|
|
Slot: 0,
|
|
Index: 0,
|
|
BeaconBlockRoot: bytesutil.PadTo([]byte("beaconblockroot2"), 32),
|
|
Source: ðpb.Checkpoint{
|
|
Epoch: 0,
|
|
Root: bytesutil.PadTo([]byte("sourceroot2"), 32),
|
|
},
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 99,
|
|
Root: bytesutil.PadTo([]byte("targetroot2"), 32),
|
|
},
|
|
},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
|
|
sb, err := helpers.ComputeDomainAndSign(
|
|
state,
|
|
helpers.SlotToEpoch(att.Data.Slot),
|
|
att.Data,
|
|
params.BeaconConfig().DomainBeaconAttester,
|
|
keys[0],
|
|
)
|
|
require.NoError(t, err)
|
|
sig, err := bls.SignatureFromBytes(sb)
|
|
require.NoError(t, err)
|
|
att.Signature = sig.Marshal()
|
|
|
|
broadcaster := &p2pMock.MockBroadcaster{}
|
|
s := &Server{
|
|
ChainInfoFetcher: &chainMock.ChainService{State: state},
|
|
AttestationsPool: &attestations.PoolMock{},
|
|
Broadcaster: broadcaster,
|
|
}
|
|
|
|
_, err = s.SubmitAttestations(ctx, ðpb.SubmitAttestationsRequest{
|
|
Data: []*ethpb.Attestation{att},
|
|
})
|
|
require.ErrorContains(t, "One or more attestations failed validation", err)
|
|
sts, ok := grpc.ServerTransportStreamFromContext(ctx).(*runtime.ServerTransportStream)
|
|
require.Equal(t, true, ok, "type assertion failed")
|
|
md := sts.Header()
|
|
v, ok := md[strings.ToLower(grpcutils.CustomErrorMetadataKey)]
|
|
require.Equal(t, true, ok, "could not retrieve custom error metadata value")
|
|
assert.DeepEqual(
|
|
t,
|
|
[]string{"{\"failures\":[{\"index\":0,\"message\":\"expected target epoch (99) to be the previous epoch (0) or the current epoch (1)\"}]}"},
|
|
v,
|
|
)
|
|
}
|