mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-08 07:03:58 -05:00
348 lines
13 KiB
Go
348 lines
13 KiB
Go
package client
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/OffchainLabs/go-bitfield"
|
|
fieldparams "github.com/OffchainLabs/prysm/v7/config/fieldparams"
|
|
"github.com/OffchainLabs/prysm/v7/config/params"
|
|
"github.com/OffchainLabs/prysm/v7/consensus-types/primitives"
|
|
"github.com/OffchainLabs/prysm/v7/crypto/bls"
|
|
ethpb "github.com/OffchainLabs/prysm/v7/proto/prysm/v1alpha1"
|
|
"github.com/OffchainLabs/prysm/v7/testing/assert"
|
|
"github.com/OffchainLabs/prysm/v7/testing/require"
|
|
"github.com/OffchainLabs/prysm/v7/testing/util"
|
|
"github.com/OffchainLabs/prysm/v7/validator/client/iface"
|
|
logTest "github.com/sirupsen/logrus/hooks/test"
|
|
"go.uber.org/mock/gomock"
|
|
)
|
|
|
|
func TestSubmitAggregateAndProof_GetDutiesRequestFailure(t *testing.T) {
|
|
for _, isSlashingProtectionMinimal := range [...]bool{false, true} {
|
|
t.Run(fmt.Sprintf("SlashingProtectionMinimal:%v", isSlashingProtectionMinimal), func(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
validator, _, validatorKey, finish := setup(t, isSlashingProtectionMinimal)
|
|
validator.duties = ðpb.ValidatorDutiesContainer{CurrentEpochDuties: []*ethpb.ValidatorDuty{}}
|
|
defer finish()
|
|
|
|
var pubKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(pubKey[:], validatorKey.PublicKey().Marshal())
|
|
validator.SubmitAggregateAndProof(t.Context(), 0, pubKey)
|
|
|
|
require.LogsContain(t, hook, "Could not fetch validator assignment")
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSubmitAggregateAndProof_SignFails(t *testing.T) {
|
|
for _, isSlashingProtectionMinimal := range [...]bool{false, true} {
|
|
t.Run(fmt.Sprintf("SlashingProtectionMinimal:%v", isSlashingProtectionMinimal), func(t *testing.T) {
|
|
validator, m, validatorKey, finish := setup(t, isSlashingProtectionMinimal)
|
|
defer finish()
|
|
var pubKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(pubKey[:], validatorKey.PublicKey().Marshal())
|
|
validator.duties = ðpb.ValidatorDutiesContainer{
|
|
CurrentEpochDuties: []*ethpb.ValidatorDuty{
|
|
{
|
|
PublicKey: validatorKey.PublicKey().Marshal(),
|
|
},
|
|
},
|
|
}
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), // epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().SubmitAggregateSelectionProof(
|
|
gomock.Any(), // ctx
|
|
gomock.AssignableToTypeOf(ðpb.AggregateSelectionRequest{}),
|
|
gomock.Any(),
|
|
gomock.Any(),
|
|
).Return(ðpb.AggregateSelectionResponse{
|
|
AggregateAndProof: ðpb.AggregateAttestationAndProof{
|
|
AggregatorIndex: 0,
|
|
Aggregate: util.HydrateAttestation(ðpb.Attestation{
|
|
AggregationBits: make([]byte, 1),
|
|
}),
|
|
SelectionProof: make([]byte, 96),
|
|
},
|
|
}, nil)
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), // epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: nil}, errors.New("bad domain root"))
|
|
|
|
validator.SubmitAggregateAndProof(t.Context(), 0, pubKey)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSubmitAggregateAndProof_Ok(t *testing.T) {
|
|
for _, isSlashingProtectionMinimal := range [...]bool{false, true} {
|
|
t.Run(fmt.Sprintf("Phase 0 (SlashingProtectionMinimal:%v)", isSlashingProtectionMinimal), func(t *testing.T) {
|
|
validator, m, validatorKey, finish := setup(t, isSlashingProtectionMinimal)
|
|
defer finish()
|
|
var pubKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(pubKey[:], validatorKey.PublicKey().Marshal())
|
|
validator.duties = ðpb.ValidatorDutiesContainer{
|
|
CurrentEpochDuties: []*ethpb.ValidatorDuty{
|
|
{
|
|
PublicKey: validatorKey.PublicKey().Marshal(),
|
|
},
|
|
},
|
|
}
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), // epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().SubmitAggregateSelectionProof(
|
|
gomock.Any(), // ctx
|
|
gomock.AssignableToTypeOf(ðpb.AggregateSelectionRequest{}),
|
|
gomock.Any(),
|
|
gomock.Any(),
|
|
).Return(ðpb.AggregateSelectionResponse{
|
|
AggregateAndProof: ðpb.AggregateAttestationAndProof{
|
|
AggregatorIndex: 0,
|
|
Aggregate: util.HydrateAttestation(ðpb.Attestation{
|
|
AggregationBits: make([]byte, 1),
|
|
}),
|
|
SelectionProof: make([]byte, 96),
|
|
},
|
|
}, nil)
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), // epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().SubmitSignedAggregateSelectionProof(
|
|
gomock.Any(), // ctx
|
|
gomock.AssignableToTypeOf(ðpb.SignedAggregateSubmitRequest{}),
|
|
).Return(ðpb.SignedAggregateSubmitResponse{AttestationDataRoot: make([]byte, 32)}, nil)
|
|
|
|
validator.SubmitAggregateAndProof(t.Context(), 0, pubKey)
|
|
})
|
|
}
|
|
for _, isSlashingProtectionMinimal := range [...]bool{false, true} {
|
|
t.Run(fmt.Sprintf("Electra (SlashingProtectionMinimal:%v)", isSlashingProtectionMinimal), func(t *testing.T) {
|
|
electraForkEpoch := uint64(1)
|
|
params.SetupTestConfigCleanup(t)
|
|
cfg := params.BeaconConfig().Copy()
|
|
cfg.ElectraForkEpoch = primitives.Epoch(electraForkEpoch)
|
|
params.OverrideBeaconConfig(cfg)
|
|
|
|
validator, m, validatorKey, finish := setup(t, isSlashingProtectionMinimal)
|
|
defer finish()
|
|
var pubKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(pubKey[:], validatorKey.PublicKey().Marshal())
|
|
validator.duties = ðpb.ValidatorDutiesContainer{
|
|
CurrentEpochDuties: []*ethpb.ValidatorDuty{
|
|
{
|
|
PublicKey: validatorKey.PublicKey().Marshal(),
|
|
},
|
|
},
|
|
}
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), // epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().SubmitAggregateSelectionProofElectra(
|
|
gomock.Any(), // ctx
|
|
gomock.AssignableToTypeOf(ðpb.AggregateSelectionRequest{}),
|
|
gomock.Any(),
|
|
gomock.Any(),
|
|
).Return(ðpb.AggregateSelectionElectraResponse{
|
|
AggregateAndProof: ðpb.AggregateAttestationAndProofElectra{
|
|
AggregatorIndex: 0,
|
|
Aggregate: util.HydrateAttestationElectra(ðpb.AttestationElectra{
|
|
AggregationBits: make([]byte, 1),
|
|
}),
|
|
SelectionProof: make([]byte, 96),
|
|
},
|
|
}, nil)
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), // epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().SubmitSignedAggregateSelectionProofElectra(
|
|
gomock.Any(), // ctx
|
|
gomock.AssignableToTypeOf(ðpb.SignedAggregateSubmitElectraRequest{}),
|
|
).Return(ðpb.SignedAggregateSubmitResponse{AttestationDataRoot: make([]byte, 32)}, nil)
|
|
|
|
validator.SubmitAggregateAndProof(t.Context(), params.BeaconConfig().SlotsPerEpoch.Mul(electraForkEpoch), pubKey)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSubmitAggregateAndProof_Distributed(t *testing.T) {
|
|
validatorIdx := primitives.ValidatorIndex(123)
|
|
slot := primitives.Slot(456)
|
|
ctx := t.Context()
|
|
for _, isSlashingProtectionMinimal := range [...]bool{false, true} {
|
|
t.Run(fmt.Sprintf("SlashingProtectionMinimal:%v", isSlashingProtectionMinimal), func(t *testing.T) {
|
|
validator, m, validatorKey, finish := setup(t, isSlashingProtectionMinimal)
|
|
defer finish()
|
|
|
|
var pubKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(pubKey[:], validatorKey.PublicKey().Marshal())
|
|
validator.duties = ðpb.ValidatorDutiesContainer{
|
|
CurrentEpochDuties: []*ethpb.ValidatorDuty{
|
|
{
|
|
PublicKey: validatorKey.PublicKey().Marshal(),
|
|
ValidatorIndex: validatorIdx,
|
|
AttesterSlot: slot,
|
|
},
|
|
},
|
|
}
|
|
|
|
validator.distributed = true
|
|
validator.attSelections = make(map[attSelectionKey]iface.BeaconCommitteeSelection)
|
|
validator.attSelections[attSelectionKey{
|
|
slot: slot,
|
|
index: 123,
|
|
}] = iface.BeaconCommitteeSelection{
|
|
SelectionProof: make([]byte, 96),
|
|
Slot: slot,
|
|
ValidatorIndex: validatorIdx,
|
|
}
|
|
|
|
m.validatorClient.EXPECT().SubmitAggregateSelectionProof(
|
|
gomock.Any(), // ctx
|
|
gomock.AssignableToTypeOf(ðpb.AggregateSelectionRequest{}),
|
|
gomock.Any(),
|
|
gomock.Any(),
|
|
).Return(ðpb.AggregateSelectionResponse{
|
|
AggregateAndProof: ðpb.AggregateAttestationAndProof{
|
|
AggregatorIndex: 0,
|
|
Aggregate: util.HydrateAttestation(ðpb.Attestation{
|
|
AggregationBits: make([]byte, 1),
|
|
}),
|
|
SelectionProof: make([]byte, 96),
|
|
},
|
|
}, nil)
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), // epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().SubmitSignedAggregateSelectionProof(
|
|
gomock.Any(), // ctx
|
|
gomock.AssignableToTypeOf(ðpb.SignedAggregateSubmitRequest{}),
|
|
).Return(ðpb.SignedAggregateSubmitResponse{AttestationDataRoot: make([]byte, 32)}, nil)
|
|
|
|
validator.SubmitAggregateAndProof(ctx, slot, pubKey)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestWaitForSlotTwoThird_WaitCorrectly(t *testing.T) {
|
|
for _, isSlashingProtectionMinimal := range [...]bool{false, true} {
|
|
t.Run(fmt.Sprintf("SlashingProtectionMinimal:%v", isSlashingProtectionMinimal), func(t *testing.T) {
|
|
validator, _, _, finish := setup(t, isSlashingProtectionMinimal)
|
|
defer finish()
|
|
currentTime := time.Now()
|
|
numOfSlots := primitives.Slot(4)
|
|
slotDuration := params.BeaconConfig().SlotDuration()
|
|
validator.genesisTime = currentTime.Add(-slotDuration * time.Duration(numOfSlots))
|
|
timeToSleep := params.BeaconConfig().SlotComponentDuration(params.BeaconConfig().AggregrateDueBPS)
|
|
|
|
twoThirdTime := currentTime.Add(timeToSleep)
|
|
validator.waitToSlotTwoThirds(t.Context(), numOfSlots)
|
|
currentTime = time.Now()
|
|
assert.Equal(t, twoThirdTime.Unix(), currentTime.Unix())
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestWaitForSlotTwoThird_DoneContext_ReturnsImmediately(t *testing.T) {
|
|
for _, isSlashingProtectionMinimal := range [...]bool{false, true} {
|
|
t.Run(fmt.Sprintf("SlashingProtectionMinimal:%v", isSlashingProtectionMinimal), func(t *testing.T) {
|
|
validator, _, _, finish := setup(t, isSlashingProtectionMinimal)
|
|
defer finish()
|
|
currentTime := time.Now()
|
|
numOfSlots := primitives.Slot(4)
|
|
slotDuration := params.BeaconConfig().SlotDuration()
|
|
validator.genesisTime = currentTime.Add(-slotDuration * time.Duration(numOfSlots))
|
|
|
|
expectedTime := time.Now()
|
|
ctx, cancel := context.WithCancel(t.Context())
|
|
cancel()
|
|
validator.waitToSlotTwoThirds(ctx, numOfSlots)
|
|
currentTime = time.Now()
|
|
assert.Equal(t, expectedTime.Unix(), currentTime.Unix())
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestAggregateAndProofSignature_CanSignValidSignature(t *testing.T) {
|
|
for _, isSlashingProtectionMinimal := range [...]bool{false, true} {
|
|
t.Run(fmt.Sprintf("Phase 0 (SlashingProtectionMinimal:%v)", isSlashingProtectionMinimal), func(t *testing.T) {
|
|
validator, m, validatorKey, finish := setup(t, isSlashingProtectionMinimal)
|
|
defer finish()
|
|
|
|
var pubKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(pubKey[:], validatorKey.PublicKey().Marshal())
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
ðpb.DomainRequest{Epoch: 0, Domain: params.BeaconConfig().DomainAggregateAndProof[:]},
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
agg := ðpb.AggregateAttestationAndProof{
|
|
AggregatorIndex: 0,
|
|
Aggregate: util.HydrateAttestation(ðpb.Attestation{
|
|
AggregationBits: bitfield.NewBitlist(1),
|
|
}),
|
|
SelectionProof: make([]byte, 96),
|
|
}
|
|
sig, err := validator.aggregateAndProofSig(t.Context(), pubKey, agg, 0 /* slot */)
|
|
require.NoError(t, err)
|
|
_, err = bls.SignatureFromBytes(sig)
|
|
require.NoError(t, err)
|
|
})
|
|
}
|
|
for _, isSlashingProtectionMinimal := range [...]bool{false, true} {
|
|
t.Run(fmt.Sprintf("Electra (SlashingProtectionMinimal:%v)", isSlashingProtectionMinimal), func(t *testing.T) {
|
|
electraForkEpoch := uint64(1)
|
|
params.SetupTestConfigCleanup(t)
|
|
cfg := params.BeaconConfig().Copy()
|
|
cfg.ElectraForkEpoch = primitives.Epoch(electraForkEpoch)
|
|
params.OverrideBeaconConfig(cfg)
|
|
|
|
validator, m, validatorKey, finish := setup(t, isSlashingProtectionMinimal)
|
|
defer finish()
|
|
|
|
var pubKey [fieldparams.BLSPubkeyLength]byte
|
|
copy(pubKey[:], validatorKey.PublicKey().Marshal())
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
ðpb.DomainRequest{Epoch: 0, Domain: params.BeaconConfig().DomainAggregateAndProof[:]},
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
agg := ðpb.AggregateAttestationAndProofElectra{
|
|
AggregatorIndex: 0,
|
|
Aggregate: util.HydrateAttestationElectra(ðpb.AttestationElectra{
|
|
AggregationBits: bitfield.NewBitlist(1),
|
|
}),
|
|
SelectionProof: make([]byte, 96),
|
|
}
|
|
sig, err := validator.aggregateAndProofSig(t.Context(), pubKey, agg, params.BeaconConfig().SlotsPerEpoch.Mul(electraForkEpoch) /* slot */)
|
|
require.NoError(t, err)
|
|
_, err = bls.SignatureFromBytes(sig)
|
|
require.NoError(t, err)
|
|
})
|
|
}
|
|
}
|