mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-09 21:38:05 -05:00
197 lines
5.8 KiB
Go
197 lines
5.8 KiB
Go
package transition
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/OffchainLabs/prysm/v6/beacon-chain/core/time"
|
|
state_native "github.com/OffchainLabs/prysm/v6/beacon-chain/state/state-native"
|
|
"github.com/OffchainLabs/prysm/v6/consensus-types/blocks"
|
|
"github.com/OffchainLabs/prysm/v6/consensus-types/primitives"
|
|
ethpb "github.com/OffchainLabs/prysm/v6/proto/prysm/v1alpha1"
|
|
"github.com/OffchainLabs/prysm/v6/testing/require"
|
|
fuzz "github.com/google/gofuzz"
|
|
)
|
|
|
|
func TestFuzzExecuteStateTransition_1000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
ctx := t.Context()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
sb := ðpb.SignedBeaconBlock{}
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for i := 0; i < 1000; i++ {
|
|
fuzzer.Fuzz(state)
|
|
fuzzer.Fuzz(sb)
|
|
if sb.Block == nil || sb.Block.Body == nil {
|
|
continue
|
|
}
|
|
wsb, err := blocks.NewSignedBeaconBlock(sb)
|
|
require.NoError(t, err)
|
|
s, err := ExecuteStateTransition(ctx, state, wsb)
|
|
if err != nil && s != nil {
|
|
t.Fatalf("state should be nil on err. found: %v on error: %v for state: %v and signed block: %v", s, err, state, sb)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestFuzzCalculateStateRoot_1000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
ctx := t.Context()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
sb := ðpb.SignedBeaconBlock{}
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for i := 0; i < 1000; i++ {
|
|
fuzzer.Fuzz(state)
|
|
fuzzer.Fuzz(sb)
|
|
if sb.Block == nil || sb.Block.Body == nil {
|
|
continue
|
|
}
|
|
wsb, err := blocks.NewSignedBeaconBlock(sb)
|
|
require.NoError(t, err)
|
|
stateRoot, err := CalculateStateRoot(ctx, state, wsb)
|
|
if err != nil && stateRoot != [32]byte{} {
|
|
t.Fatalf("state root should be empty on err. found: %v on error: %v for signed block: %v", stateRoot, err, sb)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestFuzzProcessSlot_1000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
ctx := t.Context()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for i := 0; i < 1000; i++ {
|
|
fuzzer.Fuzz(state)
|
|
s, err := ProcessSlot(ctx, state)
|
|
if err != nil && s != nil {
|
|
t.Fatalf("state should be nil on err. found: %v on error: %v for state: %v", s, err, state)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestFuzzProcessSlots_1000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
ctx := t.Context()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
slot := primitives.Slot(0)
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for i := 0; i < 1000; i++ {
|
|
fuzzer.Fuzz(state)
|
|
fuzzer.Fuzz(&slot)
|
|
s, err := ProcessSlots(ctx, state, slot)
|
|
if err != nil && s != nil {
|
|
t.Fatalf("state should be nil on err. found: %v on error: %v for state: %v", s, err, state)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestFuzzprocessOperationsNoVerify_1000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
ctx := t.Context()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
bb := ðpb.BeaconBlock{}
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for i := 0; i < 1000; i++ {
|
|
fuzzer.Fuzz(state)
|
|
fuzzer.Fuzz(bb)
|
|
if bb.Body == nil {
|
|
continue
|
|
}
|
|
wb, err := blocks.NewBeaconBlock(bb)
|
|
require.NoError(t, err)
|
|
s, err := ProcessOperationsNoVerifyAttsSigs(ctx, state, wb)
|
|
if err != nil && s != nil {
|
|
t.Fatalf("state should be nil on err. found: %v on error: %v for block body: %v", s, err, bb)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestFuzzverifyOperationLengths_10000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
bb := ðpb.BeaconBlock{}
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for i := 0; i < 10000; i++ {
|
|
fuzzer.Fuzz(state)
|
|
fuzzer.Fuzz(bb)
|
|
if bb.Body == nil {
|
|
continue
|
|
}
|
|
wb, err := blocks.NewBeaconBlock(bb)
|
|
require.NoError(t, err)
|
|
_, err = VerifyOperationLengths(t.Context(), state, wb)
|
|
_ = err
|
|
}
|
|
}
|
|
|
|
func TestFuzzCanProcessEpoch_10000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for i := 0; i < 10000; i++ {
|
|
fuzzer.Fuzz(state)
|
|
time.CanProcessEpoch(state)
|
|
}
|
|
}
|
|
|
|
func TestFuzzProcessEpochPrecompute_1000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
ctx := t.Context()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for i := 0; i < 1000; i++ {
|
|
fuzzer.Fuzz(state)
|
|
s, err := ProcessEpochPrecompute(ctx, state)
|
|
if err != nil && s != nil {
|
|
t.Fatalf("state should be nil on err. found: %v on error: %v for state: %v", s, err, state)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestFuzzProcessBlockForStateRoot_1000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
ctx := t.Context()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
sb := ðpb.SignedBeaconBlock{}
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for i := 0; i < 1000; i++ {
|
|
fuzzer.Fuzz(state)
|
|
fuzzer.Fuzz(sb)
|
|
if sb.Block == nil || sb.Block.Body == nil || sb.Block.Body.Eth1Data == nil {
|
|
continue
|
|
}
|
|
wsb, err := blocks.NewSignedBeaconBlock(sb)
|
|
require.NoError(t, err)
|
|
s, err := ProcessBlockForStateRoot(ctx, state, wsb)
|
|
if err != nil && s != nil {
|
|
t.Fatalf("state should be nil on err. found: %v on error: %v for signed block: %v", s, err, sb)
|
|
}
|
|
}
|
|
}
|