mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-09 21:38:05 -05:00
441 lines
17 KiB
Go
441 lines
17 KiB
Go
package epoch_test
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
|
|
types "github.com/prysmaticlabs/eth2-types"
|
|
"github.com/prysmaticlabs/go-bitfield"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/epoch"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
iface "github.com/prysmaticlabs/prysm/beacon-chain/state/interface"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/state/v1"
|
|
pb "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1"
|
|
ethpb "github.com/prysmaticlabs/prysm/proto/prysm/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/assert"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/require"
|
|
"google.golang.org/protobuf/proto"
|
|
)
|
|
|
|
func TestUnslashedAttestingIndices_CanSortAndFilter(t *testing.T) {
|
|
// Generate 2 attestations.
|
|
atts := make([]*pb.PendingAttestation, 2)
|
|
for i := 0; i < len(atts); i++ {
|
|
atts[i] = &pb.PendingAttestation{
|
|
Data: ðpb.AttestationData{Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
Target: ðpb.Checkpoint{Epoch: 0, Root: make([]byte, 32)},
|
|
},
|
|
AggregationBits: bitfield.Bitlist{0x00, 0xFF, 0xFF, 0xFF},
|
|
}
|
|
}
|
|
|
|
// Generate validators and state for the 2 attestations.
|
|
validatorCount := 1000
|
|
validators := make([]*ethpb.Validator, validatorCount)
|
|
for i := 0; i < len(validators); i++ {
|
|
validators[i] = ðpb.Validator{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
}
|
|
}
|
|
base := &pb.BeaconState{
|
|
Validators: validators,
|
|
RandaoMixes: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
}
|
|
beaconState, err := v1.InitializeFromProto(base)
|
|
require.NoError(t, err)
|
|
|
|
indices, err := epoch.UnslashedAttestingIndices(beaconState, atts)
|
|
require.NoError(t, err)
|
|
for i := 0; i < len(indices)-1; i++ {
|
|
if indices[i] >= indices[i+1] {
|
|
t.Error("sorted indices not sorted or duplicated")
|
|
}
|
|
}
|
|
|
|
// Verify the slashed validator is filtered.
|
|
slashedValidator := indices[0]
|
|
validators = beaconState.Validators()
|
|
validators[slashedValidator].Slashed = true
|
|
require.NoError(t, beaconState.SetValidators(validators))
|
|
indices, err = epoch.UnslashedAttestingIndices(beaconState, atts)
|
|
require.NoError(t, err)
|
|
for i := 0; i < len(indices); i++ {
|
|
assert.NotEqual(t, slashedValidator, indices[i], "Slashed validator %d is not filtered", slashedValidator)
|
|
}
|
|
}
|
|
|
|
func TestUnslashedAttestingIndices_DuplicatedAttestations(t *testing.T) {
|
|
// Generate 5 of the same attestations.
|
|
atts := make([]*pb.PendingAttestation, 5)
|
|
for i := 0; i < len(atts); i++ {
|
|
atts[i] = &pb.PendingAttestation{
|
|
Data: ðpb.AttestationData{Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
Target: ðpb.Checkpoint{Epoch: 0}},
|
|
AggregationBits: bitfield.Bitlist{0x00, 0xFF, 0xFF, 0xFF},
|
|
}
|
|
}
|
|
|
|
// Generate validators and state for the 5 attestations.
|
|
validatorCount := 1000
|
|
validators := make([]*ethpb.Validator, validatorCount)
|
|
for i := 0; i < len(validators); i++ {
|
|
validators[i] = ðpb.Validator{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
}
|
|
}
|
|
base := &pb.BeaconState{
|
|
Validators: validators,
|
|
RandaoMixes: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
}
|
|
beaconState, err := v1.InitializeFromProto(base)
|
|
require.NoError(t, err)
|
|
|
|
indices, err := epoch.UnslashedAttestingIndices(beaconState, atts)
|
|
require.NoError(t, err)
|
|
|
|
for i := 0; i < len(indices)-1; i++ {
|
|
if indices[i] >= indices[i+1] {
|
|
t.Error("sorted indices not sorted or duplicated")
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestAttestingBalance_CorrectBalance(t *testing.T) {
|
|
helpers.ClearCache()
|
|
// Generate 2 attestations.
|
|
atts := make([]*pb.PendingAttestation, 2)
|
|
for i := 0; i < len(atts); i++ {
|
|
atts[i] = &pb.PendingAttestation{
|
|
Data: ðpb.AttestationData{
|
|
Target: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
Source: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
Slot: types.Slot(i),
|
|
},
|
|
AggregationBits: bitfield.Bitlist{0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x01},
|
|
}
|
|
}
|
|
|
|
// Generate validators with balances and state for the 2 attestations.
|
|
validators := make([]*ethpb.Validator, params.BeaconConfig().MinGenesisActiveValidatorCount)
|
|
balances := make([]uint64, params.BeaconConfig().MinGenesisActiveValidatorCount)
|
|
for i := 0; i < len(validators); i++ {
|
|
validators[i] = ðpb.Validator{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
|
|
}
|
|
balances[i] = params.BeaconConfig().MaxEffectiveBalance
|
|
}
|
|
base := &pb.BeaconState{
|
|
Slot: 2,
|
|
RandaoMixes: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
|
|
Validators: validators,
|
|
Balances: balances,
|
|
}
|
|
beaconState, err := v1.InitializeFromProto(base)
|
|
require.NoError(t, err)
|
|
|
|
balance, err := epoch.AttestingBalance(beaconState, atts)
|
|
require.NoError(t, err)
|
|
wanted := 256 * params.BeaconConfig().MaxEffectiveBalance
|
|
assert.Equal(t, wanted, balance)
|
|
}
|
|
|
|
func TestProcessSlashings_NotSlashed(t *testing.T) {
|
|
base := &pb.BeaconState{
|
|
Slot: 0,
|
|
Validators: []*ethpb.Validator{{Slashed: true}},
|
|
Balances: []uint64{params.BeaconConfig().MaxEffectiveBalance},
|
|
Slashings: []uint64{0, 1e9},
|
|
}
|
|
s, err := v1.InitializeFromProto(base)
|
|
require.NoError(t, err)
|
|
newState, err := epoch.ProcessSlashings(s)
|
|
require.NoError(t, err)
|
|
wanted := params.BeaconConfig().MaxEffectiveBalance
|
|
assert.Equal(t, wanted, newState.Balances()[0], "Unexpected slashed balance")
|
|
}
|
|
|
|
func TestProcessSlashings_SlashedLess(t *testing.T) {
|
|
tests := []struct {
|
|
state *pb.BeaconState
|
|
want uint64
|
|
}{
|
|
{
|
|
state: &pb.BeaconState{
|
|
Validators: []*ethpb.Validator{
|
|
{Slashed: true,
|
|
WithdrawableEpoch: params.BeaconConfig().EpochsPerSlashingsVector / 2,
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance},
|
|
{ExitEpoch: params.BeaconConfig().FarFutureEpoch, EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance}},
|
|
Balances: []uint64{params.BeaconConfig().MaxEffectiveBalance, params.BeaconConfig().MaxEffectiveBalance},
|
|
Slashings: []uint64{0, 1e9},
|
|
},
|
|
// penalty = validator balance / increment * (2*total_penalties) / total_balance * increment
|
|
// 1000000000 = (32 * 1e9) / (1 * 1e9) * (1*1e9) / (32*1e9) * (1 * 1e9)
|
|
want: uint64(31000000000), // 32 * 1e9 - 1000000000
|
|
},
|
|
{
|
|
state: &pb.BeaconState{
|
|
Validators: []*ethpb.Validator{
|
|
{Slashed: true,
|
|
WithdrawableEpoch: params.BeaconConfig().EpochsPerSlashingsVector / 2,
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance},
|
|
{ExitEpoch: params.BeaconConfig().FarFutureEpoch, EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance},
|
|
{ExitEpoch: params.BeaconConfig().FarFutureEpoch, EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance},
|
|
},
|
|
Balances: []uint64{params.BeaconConfig().MaxEffectiveBalance, params.BeaconConfig().MaxEffectiveBalance},
|
|
Slashings: []uint64{0, 1e9},
|
|
},
|
|
// penalty = validator balance / increment * (2*total_penalties) / total_balance * increment
|
|
// 500000000 = (32 * 1e9) / (1 * 1e9) * (1*1e9) / (32*1e9) * (1 * 1e9)
|
|
want: uint64(32000000000), // 32 * 1e9 - 500000000
|
|
},
|
|
{
|
|
state: &pb.BeaconState{
|
|
Validators: []*ethpb.Validator{
|
|
{Slashed: true,
|
|
WithdrawableEpoch: params.BeaconConfig().EpochsPerSlashingsVector / 2,
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance},
|
|
{ExitEpoch: params.BeaconConfig().FarFutureEpoch, EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance},
|
|
{ExitEpoch: params.BeaconConfig().FarFutureEpoch, EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance},
|
|
},
|
|
Balances: []uint64{params.BeaconConfig().MaxEffectiveBalance, params.BeaconConfig().MaxEffectiveBalance},
|
|
Slashings: []uint64{0, 2 * 1e9},
|
|
},
|
|
// penalty = validator balance / increment * (3*total_penalties) / total_balance * increment
|
|
// 1000000000 = (32 * 1e9) / (1 * 1e9) * (1*2e9) / (64*1e9) * (1 * 1e9)
|
|
want: uint64(31000000000), // 32 * 1e9 - 1000000000
|
|
},
|
|
{
|
|
state: &pb.BeaconState{
|
|
Validators: []*ethpb.Validator{
|
|
{Slashed: true,
|
|
WithdrawableEpoch: params.BeaconConfig().EpochsPerSlashingsVector / 2,
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance - params.BeaconConfig().EffectiveBalanceIncrement},
|
|
{ExitEpoch: params.BeaconConfig().FarFutureEpoch, EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance - params.BeaconConfig().EffectiveBalanceIncrement}},
|
|
Balances: []uint64{params.BeaconConfig().MaxEffectiveBalance - params.BeaconConfig().EffectiveBalanceIncrement, params.BeaconConfig().MaxEffectiveBalance - params.BeaconConfig().EffectiveBalanceIncrement},
|
|
Slashings: []uint64{0, 1e9},
|
|
},
|
|
// penalty = validator balance / increment * (3*total_penalties) / total_balance * increment
|
|
// 2000000000 = (32 * 1e9 - 1*1e9) / (1 * 1e9) * (2*1e9) / (31*1e9) * (1 * 1e9)
|
|
want: uint64(30000000000), // 32 * 1e9 - 2000000000
|
|
},
|
|
}
|
|
|
|
for i, tt := range tests {
|
|
t.Run(fmt.Sprint(i), func(t *testing.T) {
|
|
original := proto.Clone(tt.state)
|
|
s, err := v1.InitializeFromProto(tt.state)
|
|
require.NoError(t, err)
|
|
newState, err := epoch.ProcessSlashings(s)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, tt.want, newState.Balances()[0], "ProcessSlashings({%v}) = newState; newState.Balances[0] = %d", original, newState.Balances()[0])
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestProcessFinalUpdates_CanProcess(t *testing.T) {
|
|
s := buildState(t, params.BeaconConfig().SlotsPerHistoricalRoot-1, uint64(params.BeaconConfig().SlotsPerEpoch))
|
|
ce := helpers.CurrentEpoch(s)
|
|
ne := ce + 1
|
|
require.NoError(t, s.SetEth1DataVotes([]*ethpb.Eth1Data{}))
|
|
balances := s.Balances()
|
|
balances[0] = 31.75 * 1e9
|
|
balances[1] = 31.74 * 1e9
|
|
require.NoError(t, s.SetBalances(balances))
|
|
|
|
slashings := s.Slashings()
|
|
slashings[ce] = 0
|
|
require.NoError(t, s.SetSlashings(slashings))
|
|
mixes := s.RandaoMixes()
|
|
mixes[ce] = []byte{'A'}
|
|
require.NoError(t, s.SetRandaoMixes(mixes))
|
|
newS, err := epoch.ProcessFinalUpdates(s)
|
|
require.NoError(t, err)
|
|
|
|
// Verify effective balance is correctly updated.
|
|
assert.Equal(t, params.BeaconConfig().MaxEffectiveBalance, newS.Validators()[0].EffectiveBalance, "Effective balance incorrectly updated")
|
|
assert.Equal(t, uint64(31*1e9), newS.Validators()[1].EffectiveBalance, "Effective balance incorrectly updated")
|
|
|
|
// Verify slashed balances correctly updated.
|
|
assert.Equal(t, newS.Slashings()[ce], newS.Slashings()[ne], "Unexpected slashed balance")
|
|
|
|
// Verify randao is correctly updated in the right position.
|
|
mix, err := newS.RandaoMixAtIndex(uint64(ne))
|
|
assert.NoError(t, err)
|
|
assert.DeepNotEqual(t, params.BeaconConfig().ZeroHash[:], mix, "latest RANDAO still zero hashes")
|
|
|
|
// Verify historical root accumulator was appended.
|
|
assert.Equal(t, 1, len(newS.HistoricalRoots()), "Unexpected slashed balance")
|
|
currAtt, err := newS.CurrentEpochAttestations()
|
|
require.NoError(t, err)
|
|
assert.NotNil(t, currAtt, "Nil value stored in current epoch attestations instead of empty slice")
|
|
}
|
|
|
|
func TestProcessRegistryUpdates_NoRotation(t *testing.T) {
|
|
base := &pb.BeaconState{
|
|
Slot: 5 * params.BeaconConfig().SlotsPerEpoch,
|
|
Validators: []*ethpb.Validator{
|
|
{ExitEpoch: params.BeaconConfig().MaxSeedLookahead},
|
|
{ExitEpoch: params.BeaconConfig().MaxSeedLookahead},
|
|
},
|
|
Balances: []uint64{
|
|
params.BeaconConfig().MaxEffectiveBalance,
|
|
params.BeaconConfig().MaxEffectiveBalance,
|
|
},
|
|
FinalizedCheckpoint: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
}
|
|
beaconState, err := v1.InitializeFromProto(base)
|
|
require.NoError(t, err)
|
|
newState, err := epoch.ProcessRegistryUpdates(beaconState)
|
|
require.NoError(t, err)
|
|
for i, validator := range newState.Validators() {
|
|
assert.Equal(t, params.BeaconConfig().MaxSeedLookahead, validator.ExitEpoch, "Could not update registry %d", i)
|
|
}
|
|
}
|
|
|
|
func TestProcessRegistryUpdates_EligibleToActivate(t *testing.T) {
|
|
base := &pb.BeaconState{
|
|
Slot: 5 * params.BeaconConfig().SlotsPerEpoch,
|
|
FinalizedCheckpoint: ðpb.Checkpoint{Epoch: 6, Root: make([]byte, 32)},
|
|
}
|
|
limit, err := helpers.ValidatorChurnLimit(0)
|
|
require.NoError(t, err)
|
|
for i := uint64(0); i < limit+10; i++ {
|
|
base.Validators = append(base.Validators, ðpb.Validator{
|
|
ActivationEligibilityEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
|
|
ActivationEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
})
|
|
}
|
|
beaconState, err := v1.InitializeFromProto(base)
|
|
require.NoError(t, err)
|
|
currentEpoch := helpers.CurrentEpoch(beaconState)
|
|
newState, err := epoch.ProcessRegistryUpdates(beaconState)
|
|
require.NoError(t, err)
|
|
for i, validator := range newState.Validators() {
|
|
assert.Equal(t, currentEpoch+1, validator.ActivationEligibilityEpoch, "Could not update registry %d, unexpected activation eligibility epoch", i)
|
|
if uint64(i) < limit && validator.ActivationEpoch != helpers.ActivationExitEpoch(currentEpoch) {
|
|
t.Errorf("Could not update registry %d, validators failed to activate: wanted activation epoch %d, got %d",
|
|
i, helpers.ActivationExitEpoch(currentEpoch), validator.ActivationEpoch)
|
|
}
|
|
if uint64(i) >= limit && validator.ActivationEpoch != params.BeaconConfig().FarFutureEpoch {
|
|
t.Errorf("Could not update registry %d, validators should not have been activated, wanted activation epoch: %d, got %d",
|
|
i, params.BeaconConfig().FarFutureEpoch, validator.ActivationEpoch)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestProcessRegistryUpdates_ActivationCompletes(t *testing.T) {
|
|
base := &pb.BeaconState{
|
|
Slot: 5 * params.BeaconConfig().SlotsPerEpoch,
|
|
Validators: []*ethpb.Validator{
|
|
{ExitEpoch: params.BeaconConfig().MaxSeedLookahead,
|
|
ActivationEpoch: 5 + params.BeaconConfig().MaxSeedLookahead + 1},
|
|
{ExitEpoch: params.BeaconConfig().MaxSeedLookahead,
|
|
ActivationEpoch: 5 + params.BeaconConfig().MaxSeedLookahead + 1},
|
|
},
|
|
FinalizedCheckpoint: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
}
|
|
beaconState, err := v1.InitializeFromProto(base)
|
|
require.NoError(t, err)
|
|
newState, err := epoch.ProcessRegistryUpdates(beaconState)
|
|
require.NoError(t, err)
|
|
for i, validator := range newState.Validators() {
|
|
assert.Equal(t, params.BeaconConfig().MaxSeedLookahead, validator.ExitEpoch, "Could not update registry %d, unexpected exit slot", i)
|
|
}
|
|
}
|
|
|
|
func TestProcessRegistryUpdates_ValidatorsEjected(t *testing.T) {
|
|
base := &pb.BeaconState{
|
|
Slot: 0,
|
|
Validators: []*ethpb.Validator{
|
|
{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
EffectiveBalance: params.BeaconConfig().EjectionBalance - 1,
|
|
},
|
|
{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
EffectiveBalance: params.BeaconConfig().EjectionBalance - 1,
|
|
},
|
|
},
|
|
FinalizedCheckpoint: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
}
|
|
beaconState, err := v1.InitializeFromProto(base)
|
|
require.NoError(t, err)
|
|
newState, err := epoch.ProcessRegistryUpdates(beaconState)
|
|
require.NoError(t, err)
|
|
for i, validator := range newState.Validators() {
|
|
assert.Equal(t, params.BeaconConfig().MaxSeedLookahead+1, validator.ExitEpoch, "Could not update registry %d, unexpected exit slot", i)
|
|
}
|
|
}
|
|
|
|
func TestProcessRegistryUpdates_CanExits(t *testing.T) {
|
|
e := types.Epoch(5)
|
|
exitEpoch := helpers.ActivationExitEpoch(e)
|
|
minWithdrawalDelay := params.BeaconConfig().MinValidatorWithdrawabilityDelay
|
|
base := &pb.BeaconState{
|
|
Slot: params.BeaconConfig().SlotsPerEpoch.Mul(uint64(e)),
|
|
Validators: []*ethpb.Validator{
|
|
{
|
|
ExitEpoch: exitEpoch,
|
|
WithdrawableEpoch: exitEpoch + minWithdrawalDelay},
|
|
{
|
|
ExitEpoch: exitEpoch,
|
|
WithdrawableEpoch: exitEpoch + minWithdrawalDelay},
|
|
},
|
|
FinalizedCheckpoint: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
}
|
|
beaconState, err := v1.InitializeFromProto(base)
|
|
require.NoError(t, err)
|
|
newState, err := epoch.ProcessRegistryUpdates(beaconState)
|
|
require.NoError(t, err)
|
|
for i, validator := range newState.Validators() {
|
|
assert.Equal(t, exitEpoch, validator.ExitEpoch, "Could not update registry %d, unexpected exit slot", i)
|
|
}
|
|
}
|
|
|
|
func buildState(t testing.TB, slot types.Slot, validatorCount uint64) iface.BeaconState {
|
|
validators := make([]*ethpb.Validator, validatorCount)
|
|
for i := 0; i < len(validators); i++ {
|
|
validators[i] = ðpb.Validator{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
|
|
}
|
|
}
|
|
validatorBalances := make([]uint64, len(validators))
|
|
for i := 0; i < len(validatorBalances); i++ {
|
|
validatorBalances[i] = params.BeaconConfig().MaxEffectiveBalance
|
|
}
|
|
latestActiveIndexRoots := make(
|
|
[][]byte,
|
|
params.BeaconConfig().EpochsPerHistoricalVector,
|
|
)
|
|
for i := 0; i < len(latestActiveIndexRoots); i++ {
|
|
latestActiveIndexRoots[i] = params.BeaconConfig().ZeroHash[:]
|
|
}
|
|
latestRandaoMixes := make(
|
|
[][]byte,
|
|
params.BeaconConfig().EpochsPerHistoricalVector,
|
|
)
|
|
for i := 0; i < len(latestRandaoMixes); i++ {
|
|
latestRandaoMixes[i] = params.BeaconConfig().ZeroHash[:]
|
|
}
|
|
s, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
if err := s.SetSlot(slot); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := s.SetBalances(validatorBalances); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := s.SetValidators(validators); err != nil {
|
|
t.Error(err)
|
|
}
|
|
return s
|
|
}
|