mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-09 13:28:01 -05:00
* config params into pkg * gaz Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
403 lines
12 KiB
Go
403 lines
12 KiB
Go
package altair_test
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
"time"
|
|
|
|
types "github.com/prysmaticlabs/eth2-types"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/altair"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
stateAltair "github.com/prysmaticlabs/prysm/beacon-chain/state/v2"
|
|
"github.com/prysmaticlabs/prysm/config/params"
|
|
"github.com/prysmaticlabs/prysm/crypto/bls"
|
|
ethpb "github.com/prysmaticlabs/prysm/proto/prysm/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/assert"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/require"
|
|
prysmTime "github.com/prysmaticlabs/prysm/time"
|
|
)
|
|
|
|
func TestSyncCommitteeIndices_CanGet(t *testing.T) {
|
|
getState := func(t *testing.T, count uint64) *stateAltair.BeaconState {
|
|
validators := make([]*ethpb.Validator, count)
|
|
for i := 0; i < len(validators); i++ {
|
|
validators[i] = ðpb.Validator{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
EffectiveBalance: params.BeaconConfig().MinDepositAmount,
|
|
}
|
|
}
|
|
state, err := stateAltair.InitializeFromProto(ðpb.BeaconStateAltair{
|
|
Validators: validators,
|
|
RandaoMixes: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
})
|
|
require.NoError(t, err)
|
|
return state
|
|
}
|
|
|
|
type args struct {
|
|
state *stateAltair.BeaconState
|
|
epoch types.Epoch
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
wantErr bool
|
|
errString string
|
|
}{
|
|
{
|
|
name: "nil state",
|
|
args: args{
|
|
state: nil,
|
|
},
|
|
wantErr: true,
|
|
errString: "nil inner state",
|
|
},
|
|
{
|
|
name: "genesis validator count, epoch 0",
|
|
args: args{
|
|
state: getState(t, params.BeaconConfig().MinGenesisActiveValidatorCount),
|
|
epoch: 0,
|
|
},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "genesis validator count, epoch 100",
|
|
args: args{
|
|
state: getState(t, params.BeaconConfig().MinGenesisActiveValidatorCount),
|
|
epoch: 100,
|
|
},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "less than optimal validator count, epoch 100",
|
|
args: args{
|
|
state: getState(t, params.BeaconConfig().MaxValidatorsPerCommittee),
|
|
epoch: 100,
|
|
},
|
|
wantErr: false,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
helpers.ClearCache()
|
|
got, err := altair.NextSyncCommitteeIndices(context.Background(), tt.args.state)
|
|
if tt.wantErr {
|
|
require.ErrorContains(t, tt.errString, err)
|
|
} else {
|
|
require.NoError(t, err)
|
|
require.Equal(t, int(params.BeaconConfig().SyncCommitteeSize), len(got))
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSyncCommitteeIndices_DifferentPeriods(t *testing.T) {
|
|
helpers.ClearCache()
|
|
getState := func(t *testing.T, count uint64) *stateAltair.BeaconState {
|
|
validators := make([]*ethpb.Validator, count)
|
|
for i := 0; i < len(validators); i++ {
|
|
validators[i] = ðpb.Validator{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
EffectiveBalance: params.BeaconConfig().MinDepositAmount,
|
|
}
|
|
}
|
|
state, err := stateAltair.InitializeFromProto(ðpb.BeaconStateAltair{
|
|
Validators: validators,
|
|
RandaoMixes: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
})
|
|
require.NoError(t, err)
|
|
return state
|
|
}
|
|
|
|
state := getState(t, params.BeaconConfig().MaxValidatorsPerCommittee)
|
|
got1, err := altair.NextSyncCommitteeIndices(context.Background(), state)
|
|
require.NoError(t, err)
|
|
require.NoError(t, state.SetSlot(params.BeaconConfig().SlotsPerEpoch))
|
|
got2, err := altair.NextSyncCommitteeIndices(context.Background(), state)
|
|
require.NoError(t, err)
|
|
require.DeepNotEqual(t, got1, got2)
|
|
require.NoError(t, state.SetSlot(params.BeaconConfig().SlotsPerEpoch*types.Slot(params.BeaconConfig().EpochsPerSyncCommitteePeriod)))
|
|
got2, err = altair.NextSyncCommitteeIndices(context.Background(), state)
|
|
require.NoError(t, err)
|
|
require.DeepNotEqual(t, got1, got2)
|
|
require.NoError(t, state.SetSlot(params.BeaconConfig().SlotsPerEpoch*types.Slot(2*params.BeaconConfig().EpochsPerSyncCommitteePeriod)))
|
|
got2, err = altair.NextSyncCommitteeIndices(context.Background(), state)
|
|
require.NoError(t, err)
|
|
require.DeepNotEqual(t, got1, got2)
|
|
}
|
|
|
|
func TestSyncCommittee_CanGet(t *testing.T) {
|
|
getState := func(t *testing.T, count uint64) *stateAltair.BeaconState {
|
|
validators := make([]*ethpb.Validator, count)
|
|
for i := 0; i < len(validators); i++ {
|
|
blsKey, err := bls.RandKey()
|
|
require.NoError(t, err)
|
|
validators[i] = ðpb.Validator{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
EffectiveBalance: params.BeaconConfig().MinDepositAmount,
|
|
PublicKey: blsKey.PublicKey().Marshal(),
|
|
}
|
|
}
|
|
state, err := stateAltair.InitializeFromProto(ðpb.BeaconStateAltair{
|
|
Validators: validators,
|
|
RandaoMixes: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
})
|
|
require.NoError(t, err)
|
|
return state
|
|
}
|
|
|
|
type args struct {
|
|
state *stateAltair.BeaconState
|
|
epoch types.Epoch
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
wantErr bool
|
|
errString string
|
|
}{
|
|
{
|
|
name: "nil state",
|
|
args: args{
|
|
state: nil,
|
|
},
|
|
wantErr: true,
|
|
errString: "nil inner state",
|
|
},
|
|
{
|
|
name: "genesis validator count, epoch 0",
|
|
args: args{
|
|
state: getState(t, params.BeaconConfig().MinGenesisActiveValidatorCount),
|
|
epoch: 0,
|
|
},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "genesis validator count, epoch 100",
|
|
args: args{
|
|
state: getState(t, params.BeaconConfig().MinGenesisActiveValidatorCount),
|
|
epoch: 100,
|
|
},
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "less than optimal validator count, epoch 100",
|
|
args: args{
|
|
state: getState(t, params.BeaconConfig().MaxValidatorsPerCommittee),
|
|
epoch: 100,
|
|
},
|
|
wantErr: false,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
helpers.ClearCache()
|
|
if !tt.wantErr {
|
|
require.NoError(t, tt.args.state.SetSlot(types.Slot(tt.args.epoch)*params.BeaconConfig().SlotsPerEpoch))
|
|
}
|
|
got, err := altair.NextSyncCommittee(context.Background(), tt.args.state)
|
|
if tt.wantErr {
|
|
require.ErrorContains(t, tt.errString, err)
|
|
} else {
|
|
require.NoError(t, err)
|
|
require.Equal(t, int(params.BeaconConfig().SyncCommitteeSize), len(got.Pubkeys))
|
|
require.Equal(t, params.BeaconConfig().BLSPubkeyLength, len(got.AggregatePubkey))
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestValidateNilSyncContribution(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
s *ethpb.SignedContributionAndProof
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "nil object",
|
|
s: nil,
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "nil message",
|
|
s: ðpb.SignedContributionAndProof{},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "nil contribution",
|
|
s: ðpb.SignedContributionAndProof{Message: ðpb.ContributionAndProof{}},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "nil bitfield",
|
|
s: ðpb.SignedContributionAndProof{
|
|
Message: ðpb.ContributionAndProof{
|
|
Contribution: ðpb.SyncCommitteeContribution{},
|
|
}},
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "non nil sync contribution",
|
|
s: ðpb.SignedContributionAndProof{
|
|
Message: ðpb.ContributionAndProof{
|
|
Contribution: ðpb.SyncCommitteeContribution{
|
|
AggregationBits: []byte{},
|
|
},
|
|
}},
|
|
wantErr: false,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
if err := altair.ValidateNilSyncContribution(tt.s); (err != nil) != tt.wantErr {
|
|
t.Errorf("ValidateNilSyncContribution() error = %v, wantErr %v", err, tt.wantErr)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSyncSubCommitteePubkeys_CanGet(t *testing.T) {
|
|
helpers.ClearCache()
|
|
state := getState(t, params.BeaconConfig().MaxValidatorsPerCommittee)
|
|
com, err := altair.NextSyncCommittee(context.Background(), state)
|
|
require.NoError(t, err)
|
|
sub, err := altair.SyncSubCommitteePubkeys(com, 0)
|
|
require.NoError(t, err)
|
|
subCommSize := params.BeaconConfig().SyncCommitteeSize / params.BeaconConfig().SyncCommitteeSubnetCount
|
|
require.Equal(t, int(subCommSize), len(sub))
|
|
require.DeepSSZEqual(t, com.Pubkeys[0:subCommSize], sub)
|
|
|
|
sub, err = altair.SyncSubCommitteePubkeys(com, 1)
|
|
require.NoError(t, err)
|
|
require.DeepSSZEqual(t, com.Pubkeys[subCommSize:2*subCommSize], sub)
|
|
|
|
sub, err = altair.SyncSubCommitteePubkeys(com, 2)
|
|
require.NoError(t, err)
|
|
require.DeepSSZEqual(t, com.Pubkeys[2*subCommSize:3*subCommSize], sub)
|
|
|
|
sub, err = altair.SyncSubCommitteePubkeys(com, 3)
|
|
require.NoError(t, err)
|
|
require.DeepSSZEqual(t, com.Pubkeys[3*subCommSize:], sub)
|
|
|
|
}
|
|
|
|
func Test_ValidateSyncMessageTime(t *testing.T) {
|
|
if params.BeaconNetworkConfig().MaximumGossipClockDisparity < 200*time.Millisecond {
|
|
t.Fatal("This test expects the maximum clock disparity to be at least 200ms")
|
|
}
|
|
|
|
type args struct {
|
|
syncMessageSlot types.Slot
|
|
genesisTime time.Time
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
wantedErr string
|
|
}{
|
|
{
|
|
name: "sync_message.slot == current_slot",
|
|
args: args{
|
|
syncMessageSlot: 15,
|
|
genesisTime: prysmTime.Now().Add(-15 * time.Duration(params.BeaconConfig().SecondsPerSlot) * time.Second),
|
|
},
|
|
},
|
|
{
|
|
name: "sync_message.slot == current_slot, received in middle of slot",
|
|
args: args{
|
|
syncMessageSlot: 15,
|
|
genesisTime: prysmTime.Now().Add(
|
|
-15 * time.Duration(params.BeaconConfig().SecondsPerSlot) * time.Second,
|
|
).Add(-(time.Duration(params.BeaconConfig().SecondsPerSlot/2) * time.Second)),
|
|
},
|
|
},
|
|
{
|
|
name: "sync_message.slot == current_slot, received 200ms early",
|
|
args: args{
|
|
syncMessageSlot: 16,
|
|
genesisTime: prysmTime.Now().Add(
|
|
-16 * time.Duration(params.BeaconConfig().SecondsPerSlot) * time.Second,
|
|
).Add(-200 * time.Millisecond),
|
|
},
|
|
},
|
|
{
|
|
name: "sync_message.slot > current_slot",
|
|
args: args{
|
|
syncMessageSlot: 16,
|
|
genesisTime: prysmTime.Now().Add(-(15 * time.Duration(params.BeaconConfig().SecondsPerSlot) * time.Second)),
|
|
},
|
|
wantedErr: "sync message slot 16 not within allowable range of",
|
|
},
|
|
{
|
|
name: "sync_message.slot == current_slot+CLOCK_DISPARITY",
|
|
args: args{
|
|
syncMessageSlot: 100,
|
|
genesisTime: prysmTime.Now().Add(-(100*time.Duration(params.BeaconConfig().SecondsPerSlot)*time.Second - params.BeaconNetworkConfig().MaximumGossipClockDisparity)),
|
|
},
|
|
wantedErr: "",
|
|
},
|
|
{
|
|
name: "sync_message.slot == current_slot+CLOCK_DISPARITY-1000ms",
|
|
args: args{
|
|
syncMessageSlot: 100,
|
|
genesisTime: prysmTime.Now().Add(-(100 * time.Duration(params.BeaconConfig().SecondsPerSlot) * time.Second) + params.BeaconNetworkConfig().MaximumGossipClockDisparity + 1000*time.Millisecond),
|
|
},
|
|
wantedErr: "sync message slot 100 not within allowable range of",
|
|
},
|
|
{
|
|
name: "sync_message.slot == current_slot-CLOCK_DISPARITY",
|
|
args: args{
|
|
syncMessageSlot: 100,
|
|
genesisTime: prysmTime.Now().Add(-(100*time.Duration(params.BeaconConfig().SecondsPerSlot)*time.Second + params.BeaconNetworkConfig().MaximumGossipClockDisparity)),
|
|
},
|
|
wantedErr: "",
|
|
},
|
|
{
|
|
name: "sync_message.slot > current_slot+CLOCK_DISPARITY",
|
|
args: args{
|
|
syncMessageSlot: 101,
|
|
genesisTime: prysmTime.Now().Add(-(100*time.Duration(params.BeaconConfig().SecondsPerSlot)*time.Second + params.BeaconNetworkConfig().MaximumGossipClockDisparity)),
|
|
},
|
|
wantedErr: "sync message slot 101 not within allowable range of",
|
|
},
|
|
{
|
|
name: "sync_message.slot is well beyond current slot",
|
|
args: args{
|
|
syncMessageSlot: 1 << 32,
|
|
genesisTime: prysmTime.Now().Add(-15 * time.Duration(params.BeaconConfig().SecondsPerSlot) * time.Second),
|
|
},
|
|
wantedErr: "which exceeds max allowed value relative to the local clock",
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
err := altair.ValidateSyncMessageTime(tt.args.syncMessageSlot, tt.args.genesisTime,
|
|
params.BeaconNetworkConfig().MaximumGossipClockDisparity)
|
|
if tt.wantedErr != "" {
|
|
assert.ErrorContains(t, tt.wantedErr, err)
|
|
} else {
|
|
assert.NoError(t, err)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func getState(t *testing.T, count uint64) *stateAltair.BeaconState {
|
|
validators := make([]*ethpb.Validator, count)
|
|
for i := 0; i < len(validators); i++ {
|
|
blsKey, err := bls.RandKey()
|
|
require.NoError(t, err)
|
|
validators[i] = ðpb.Validator{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
EffectiveBalance: params.BeaconConfig().MinDepositAmount,
|
|
PublicKey: blsKey.PublicKey().Marshal(),
|
|
}
|
|
}
|
|
state, err := stateAltair.InitializeFromProto(ðpb.BeaconStateAltair{
|
|
Validators: validators,
|
|
RandaoMixes: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
})
|
|
require.NoError(t, err)
|
|
return state
|
|
}
|