prysm-pulse/beacon-chain/slasher/process_slashings_test.go
Sammy Rosso 8ebbde7836
Testutil refactor attestations (#10952)
* Add AttestationUtil receiver

* Modify usage to account for the receiver

* Add missing explanatory comments

Co-authored-by: Radosław Kapka <rkapka@wp.pl>
2022-06-29 16:42:33 +00:00

254 lines
7.3 KiB
Go

package slasher
import (
"context"
"testing"
mock "github.com/prysmaticlabs/prysm/beacon-chain/blockchain/testing"
"github.com/prysmaticlabs/prysm/beacon-chain/core/signing"
dbtest "github.com/prysmaticlabs/prysm/beacon-chain/db/testing"
slashingsmock "github.com/prysmaticlabs/prysm/beacon-chain/operations/slashings/mock"
"github.com/prysmaticlabs/prysm/beacon-chain/state/stategen"
"github.com/prysmaticlabs/prysm/config/params"
"github.com/prysmaticlabs/prysm/crypto/bls"
"github.com/prysmaticlabs/prysm/encoding/bytesutil"
ethpb "github.com/prysmaticlabs/prysm/proto/prysm/v1alpha1"
"github.com/prysmaticlabs/prysm/testing/require"
"github.com/prysmaticlabs/prysm/testing/util"
logTest "github.com/sirupsen/logrus/hooks/test"
)
func TestService_processAttesterSlashings(t *testing.T) {
ctx := context.Background()
slasherDB := dbtest.SetupSlasherDB(t)
beaconDB := dbtest.SetupDB(t)
beaconState, err := util.NewBeaconState()
require.NoError(t, err)
privKey, err := bls.RandKey()
require.NoError(t, err)
validators := make([]*ethpb.Validator, 1)
validators[0] = &ethpb.Validator{
PublicKey: privKey.PublicKey().Marshal(),
WithdrawalCredentials: make([]byte, 32),
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
}
err = beaconState.SetValidators(validators)
require.NoError(t, err)
mockChain := &mock.ChainService{
State: beaconState,
}
s := &Service{
serviceCfg: &ServiceConfig{
Database: slasherDB,
AttestationStateFetcher: mockChain,
StateGen: stategen.New(beaconDB),
SlashingPoolInserter: &slashingsmock.PoolMock{},
HeadStateFetcher: mockChain,
},
}
au := util.AttestationUtil{}
firstAtt := au.HydrateIndexedAttestation(&ethpb.IndexedAttestation{
AttestingIndices: []uint64{0},
})
secondAtt := au.HydrateIndexedAttestation(&ethpb.IndexedAttestation{
AttestingIndices: []uint64{0},
})
domain, err := signing.Domain(
beaconState.Fork(),
0,
params.BeaconConfig().DomainBeaconAttester,
beaconState.GenesisValidatorsRoot(),
)
require.NoError(t, err)
signingRoot, err := signing.ComputeSigningRoot(firstAtt.Data, domain)
require.NoError(t, err)
t.Run("first_att_valid_sig_second_invalid", func(tt *testing.T) {
hook := logTest.NewGlobal()
// Use valid signature for the first att, but bad one for the second.
signature := privKey.Sign(signingRoot[:])
firstAtt.Signature = signature.Marshal()
secondAtt.Signature = make([]byte, 96)
slashings := []*ethpb.AttesterSlashing{
{
Attestation_1: firstAtt,
Attestation_2: secondAtt,
},
}
err = s.processAttesterSlashings(ctx, slashings)
require.NoError(tt, err)
require.LogsContain(tt, hook, "Invalid signature")
})
t.Run("first_att_invalid_sig_second_valid", func(tt *testing.T) {
hook := logTest.NewGlobal()
// Use invalid signature for the first att, but valid for the second.
signature := privKey.Sign(signingRoot[:])
firstAtt.Signature = make([]byte, 96)
secondAtt.Signature = signature.Marshal()
slashings := []*ethpb.AttesterSlashing{
{
Attestation_1: firstAtt,
Attestation_2: secondAtt,
},
}
err = s.processAttesterSlashings(ctx, slashings)
require.NoError(tt, err)
require.LogsContain(tt, hook, "Invalid signature")
})
t.Run("both_valid_att_signatures", func(tt *testing.T) {
hook := logTest.NewGlobal()
// Use valid signatures.
signature := privKey.Sign(signingRoot[:])
firstAtt.Signature = signature.Marshal()
secondAtt.Signature = signature.Marshal()
slashings := []*ethpb.AttesterSlashing{
{
Attestation_1: firstAtt,
Attestation_2: secondAtt,
},
}
err = s.processAttesterSlashings(ctx, slashings)
require.NoError(tt, err)
require.LogsDoNotContain(tt, hook, "Invalid signature")
})
}
func TestService_processProposerSlashings(t *testing.T) {
ctx := context.Background()
slasherDB := dbtest.SetupSlasherDB(t)
beaconDB := dbtest.SetupDB(t)
beaconState, err := util.NewBeaconState()
require.NoError(t, err)
privKey, err := bls.RandKey()
require.NoError(t, err)
validators := make([]*ethpb.Validator, 1)
validators[0] = &ethpb.Validator{
PublicKey: privKey.PublicKey().Marshal(),
WithdrawalCredentials: make([]byte, 32),
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
}
err = beaconState.SetValidators(validators)
require.NoError(t, err)
mockChain := &mock.ChainService{
State: beaconState,
}
s := &Service{
serviceCfg: &ServiceConfig{
Database: slasherDB,
AttestationStateFetcher: mockChain,
StateGen: stategen.New(beaconDB),
SlashingPoolInserter: &slashingsmock.PoolMock{},
HeadStateFetcher: mockChain,
},
}
parentRoot := bytesutil.ToBytes32([]byte("parent"))
err = s.serviceCfg.StateGen.SaveState(ctx, parentRoot, beaconState)
require.NoError(t, err)
firstBlockHeader := util.HydrateSignedBeaconHeader(&ethpb.SignedBeaconBlockHeader{
Header: &ethpb.BeaconBlockHeader{
Slot: 0,
ProposerIndex: 0,
ParentRoot: parentRoot[:],
},
})
secondBlockHeader := util.HydrateSignedBeaconHeader(&ethpb.SignedBeaconBlockHeader{
Header: &ethpb.BeaconBlockHeader{
Slot: 0,
ProposerIndex: 0,
ParentRoot: parentRoot[:],
},
})
domain, err := signing.Domain(
beaconState.Fork(),
0,
params.BeaconConfig().DomainBeaconProposer,
beaconState.GenesisValidatorsRoot(),
)
require.NoError(t, err)
htr, err := firstBlockHeader.Header.HashTreeRoot()
require.NoError(t, err)
container := &ethpb.SigningData{
ObjectRoot: htr[:],
Domain: domain,
}
require.NoError(t, err)
signingRoot, err := container.HashTreeRoot()
require.NoError(t, err)
t.Run("first_header_valid_sig_second_invalid", func(tt *testing.T) {
hook := logTest.NewGlobal()
// Use valid signature for the first header, but bad one for the second.
signature := privKey.Sign(signingRoot[:])
firstBlockHeader.Signature = signature.Marshal()
secondBlockHeader.Signature = make([]byte, 96)
slashings := []*ethpb.ProposerSlashing{
{
Header_1: firstBlockHeader,
Header_2: secondBlockHeader,
},
}
err = s.processProposerSlashings(ctx, slashings)
require.NoError(tt, err)
require.LogsContain(tt, hook, "Invalid signature")
})
t.Run("first_header_invalid_sig_second_valid", func(tt *testing.T) {
hook := logTest.NewGlobal()
// Use invalid signature for the first header, but valid for the second.
signature := privKey.Sign(signingRoot[:])
firstBlockHeader.Signature = make([]byte, 96)
secondBlockHeader.Signature = signature.Marshal()
slashings := []*ethpb.ProposerSlashing{
{
Header_1: firstBlockHeader,
Header_2: secondBlockHeader,
},
}
err = s.processProposerSlashings(ctx, slashings)
require.NoError(tt, err)
require.LogsContain(tt, hook, "Invalid signature")
})
t.Run("both_valid_header_signatures", func(tt *testing.T) {
hook := logTest.NewGlobal()
// Use valid signatures.
signature := privKey.Sign(signingRoot[:])
firstBlockHeader.Signature = signature.Marshal()
secondBlockHeader.Signature = signature.Marshal()
slashings := []*ethpb.ProposerSlashing{
{
Header_1: firstBlockHeader,
Header_2: secondBlockHeader,
},
}
err = s.processProposerSlashings(ctx, slashings)
require.NoError(tt, err)
require.LogsDoNotContain(tt, hook, "Invalid signature")
})
}