mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-06 22:23:56 -05:00
* Ran gopls modernize to fix everything go run golang.org/x/tools/gopls/internal/analysis/modernize/cmd/modernize@latest -fix -test ./... * Override rules_go provided dependency for golang.org/x/tools to v0.38.0. To update this, checked out rules_go, then ran `bazel run //go/tools/releaser -- upgrade-dep -mirror=false org_golang_x_tools` and copied the patches. * Fix buildtag violations and ignore buildtag violations in external * Introduce modernize analyzer package. * Add modernize "any" analyzer. * Fix violations of any analyzer * Add modernize "appendclipped" analyzer. * Fix violations of appendclipped * Add modernize "bloop" analyzer. * Add modernize "fmtappendf" analyzer. * Add modernize "forvar" analyzer. * Add modernize "mapsloop" analyzer. * Add modernize "minmax" analyzer. * Fix violations of minmax analyzer * Add modernize "omitzero" analyzer. * Add modernize "rangeint" analyzer. * Fix violations of rangeint. * Add modernize "reflecttypefor" analyzer. * Fix violations of reflecttypefor analyzer. * Add modernize "slicescontains" analyzer. * Add modernize "slicessort" analyzer. * Add modernize "slicesdelete" analyzer. This is disabled by default for now. See https://go.dev/issue/73686. * Add modernize "stringscutprefix" analyzer. * Add modernize "stringsbuilder" analyzer. * Fix violations of stringsbuilder analyzer. * Add modernize "stringsseq" analyzer. * Add modernize "testingcontext" analyzer. * Add modernize "waitgroup" analyzer. * Changelog fragment * gofmt * gazelle * Add modernize "newexpr" analyzer. * Disable newexpr until go1.26 * Add more details in WORKSPACE on how to update the override * @nalepae feedback on min() * gofmt * Fix violations of forvar
180 lines
7.4 KiB
Go
180 lines
7.4 KiB
Go
package signing_test
|
|
|
|
import (
|
|
"bytes"
|
|
"testing"
|
|
|
|
"github.com/OffchainLabs/prysm/v7/beacon-chain/core/helpers"
|
|
"github.com/OffchainLabs/prysm/v7/beacon-chain/core/signing"
|
|
"github.com/OffchainLabs/prysm/v7/beacon-chain/core/time"
|
|
"github.com/OffchainLabs/prysm/v7/beacon-chain/state"
|
|
fieldparams "github.com/OffchainLabs/prysm/v7/config/fieldparams"
|
|
"github.com/OffchainLabs/prysm/v7/config/params"
|
|
"github.com/OffchainLabs/prysm/v7/crypto/bls"
|
|
"github.com/OffchainLabs/prysm/v7/encoding/bytesutil"
|
|
ethpb "github.com/OffchainLabs/prysm/v7/proto/prysm/v1alpha1"
|
|
"github.com/OffchainLabs/prysm/v7/testing/assert"
|
|
"github.com/OffchainLabs/prysm/v7/testing/require"
|
|
"github.com/OffchainLabs/prysm/v7/testing/util"
|
|
"github.com/ethereum/go-ethereum/common/hexutil"
|
|
fuzz "github.com/google/gofuzz"
|
|
)
|
|
|
|
func TestSigningRoot_ComputeSigningRoot(t *testing.T) {
|
|
emptyBlock := util.NewBeaconBlock()
|
|
_, err := signing.ComputeSigningRoot(emptyBlock, bytesutil.PadTo([]byte{'T', 'E', 'S', 'T'}, 32))
|
|
assert.NoError(t, err, "Could not compute signing root of block")
|
|
}
|
|
|
|
func TestSigningRoot_ComputeDomain(t *testing.T) {
|
|
tests := []struct {
|
|
epoch uint64
|
|
domainType [4]byte
|
|
domain []byte
|
|
}{
|
|
{epoch: 1, domainType: [4]byte{4, 0, 0, 0}, domain: []byte{4, 0, 0, 0, 245, 165, 253, 66, 209, 106, 32, 48, 39, 152, 239, 110, 211, 9, 151, 155, 67, 0, 61, 35, 32, 217, 240, 232, 234, 152, 49, 169}},
|
|
{epoch: 2, domainType: [4]byte{4, 0, 0, 0}, domain: []byte{4, 0, 0, 0, 245, 165, 253, 66, 209, 106, 32, 48, 39, 152, 239, 110, 211, 9, 151, 155, 67, 0, 61, 35, 32, 217, 240, 232, 234, 152, 49, 169}},
|
|
{epoch: 2, domainType: [4]byte{5, 0, 0, 0}, domain: []byte{5, 0, 0, 0, 245, 165, 253, 66, 209, 106, 32, 48, 39, 152, 239, 110, 211, 9, 151, 155, 67, 0, 61, 35, 32, 217, 240, 232, 234, 152, 49, 169}},
|
|
{epoch: 3, domainType: [4]byte{4, 0, 0, 0}, domain: []byte{4, 0, 0, 0, 245, 165, 253, 66, 209, 106, 32, 48, 39, 152, 239, 110, 211, 9, 151, 155, 67, 0, 61, 35, 32, 217, 240, 232, 234, 152, 49, 169}},
|
|
{epoch: 3, domainType: [4]byte{5, 0, 0, 0}, domain: []byte{5, 0, 0, 0, 245, 165, 253, 66, 209, 106, 32, 48, 39, 152, 239, 110, 211, 9, 151, 155, 67, 0, 61, 35, 32, 217, 240, 232, 234, 152, 49, 169}},
|
|
}
|
|
for _, tt := range tests {
|
|
if got, err := signing.ComputeDomain(tt.domainType, nil, nil); !bytes.Equal(got, tt.domain) {
|
|
t.Errorf("wanted domain version: %d, got: %d", tt.domain, got)
|
|
} else {
|
|
require.NoError(t, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestSigningRoot_ComputeDomainAndSign(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
genState func(t *testing.T) (state.BeaconState, []bls.SecretKey)
|
|
genBlock func(t *testing.T, st state.BeaconState, keys []bls.SecretKey) *ethpb.SignedBeaconBlock
|
|
domainType [4]byte
|
|
want []byte
|
|
}{
|
|
{
|
|
name: "block proposer",
|
|
genState: func(t *testing.T) (state.BeaconState, []bls.SecretKey) {
|
|
beaconState, privKeys := util.DeterministicGenesisState(t, 100)
|
|
require.NoError(t, beaconState.SetSlot(beaconState.Slot()+1))
|
|
return beaconState, privKeys
|
|
},
|
|
genBlock: func(t *testing.T, st state.BeaconState, keys []bls.SecretKey) *ethpb.SignedBeaconBlock {
|
|
block, err := util.GenerateFullBlock(st, keys, nil, 1)
|
|
require.NoError(t, err)
|
|
return block
|
|
},
|
|
domainType: params.BeaconConfig().DomainBeaconProposer,
|
|
want: []byte{
|
|
0xad, 0xd8, 0xf0, 0xd1, 0xae, 0x82, 0xaa, 0x3, 0x9a, 0xcd, 0x8e, 0xb7, 0x84, 0x14, 0x1c, 0x21, 0x81,
|
|
0xbc, 0x1b, 0x2, 0xb5, 0x6d, 0x4c, 0x76, 0x36, 0x5f, 0xba, 0x6e, 0x33, 0x9e, 0xda, 0xe, 0x36, 0xe1,
|
|
0xf, 0x30, 0xae, 0x6, 0x44, 0xd4, 0x38, 0x21, 0xf0, 0x45, 0xc2, 0x54, 0x68, 0x2f, 0x12, 0xcc, 0x27,
|
|
0x45, 0x72, 0x5, 0xaf, 0xb4, 0x85, 0x60, 0xdb, 0x7a, 0x1f, 0xe7, 0xa8, 0x62, 0xf5, 0x71, 0xac, 0x88,
|
|
0x8c, 0xd3, 0xba, 0x4d, 0xa3, 0x3d, 0x3b, 0x87, 0x9b, 0x23, 0xae, 0xe4, 0x46, 0xc6, 0x36, 0xca, 0xa5,
|
|
0xa1, 0x2d, 0x9e, 0x7, 0xc1, 0x40, 0xed, 0x99, 0xfd, 0xae, 0xce,
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
beaconState, privKeys := tt.genState(t)
|
|
idx, err := helpers.BeaconProposerIndex(t.Context(), beaconState)
|
|
require.NoError(t, err)
|
|
block := tt.genBlock(t, beaconState, privKeys)
|
|
got, err := signing.ComputeDomainAndSign(
|
|
beaconState, time.CurrentEpoch(beaconState), block, tt.domainType, privKeys[idx])
|
|
require.NoError(t, err)
|
|
require.DeepEqual(t, tt.want, got, "Incorrect signature")
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestSigningRoot_ComputeForkDigest(t *testing.T) {
|
|
tests := []struct {
|
|
version []byte
|
|
root [32]byte
|
|
result [4]byte
|
|
}{
|
|
{version: []byte{'A', 'B', 'C', 'D'}, root: [32]byte{'i', 'o', 'p'}, result: [4]byte{0x69, 0x5c, 0x26, 0x47}},
|
|
{version: []byte{'i', 'm', 'n', 'a'}, root: [32]byte{'z', 'a', 'b'}, result: [4]byte{0x1c, 0x38, 0x84, 0x58}},
|
|
{version: []byte{'b', 'w', 'r', 't'}, root: [32]byte{'r', 'd', 'c'}, result: [4]byte{0x83, 0x34, 0x38, 0x88}},
|
|
}
|
|
for _, tt := range tests {
|
|
digest, err := signing.ComputeForkDigest(tt.version, tt.root[:])
|
|
require.NoError(t, err)
|
|
assert.Equal(t, tt.result, digest, "Wanted domain version: %#x, got: %#x", digest, tt.result)
|
|
}
|
|
}
|
|
|
|
func TestFuzzverifySigningRoot_10000(_ *testing.T) {
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
st := ðpb.BeaconState{}
|
|
var pubkey [fieldparams.BLSPubkeyLength]byte
|
|
var sig [96]byte
|
|
var domain [4]byte
|
|
var p []byte
|
|
var s []byte
|
|
var d []byte
|
|
for range 10000 {
|
|
fuzzer.Fuzz(st)
|
|
fuzzer.Fuzz(&pubkey)
|
|
fuzzer.Fuzz(&sig)
|
|
fuzzer.Fuzz(&domain)
|
|
fuzzer.Fuzz(st)
|
|
fuzzer.Fuzz(&p)
|
|
fuzzer.Fuzz(&s)
|
|
fuzzer.Fuzz(&d)
|
|
err := signing.VerifySigningRoot(st, pubkey[:], sig[:], domain[:])
|
|
_ = err
|
|
err = signing.VerifySigningRoot(st, p, s, d)
|
|
_ = err
|
|
}
|
|
}
|
|
|
|
func TestDigestMap(t *testing.T) {
|
|
testVersion := []byte{'A', 'B', 'C', 'D'}
|
|
testValRoot := [32]byte{'t', 'e', 's', 't', 'r', 'o', 'o', 't'}
|
|
digest, err := signing.ComputeForkDigest(testVersion, testValRoot[:])
|
|
assert.NoError(t, err)
|
|
|
|
cachedDigest, err := signing.ComputeForkDigest(testVersion, testValRoot[:])
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, digest, cachedDigest)
|
|
testVersion[3] = 'E'
|
|
cachedDigest, err = signing.ComputeForkDigest(testVersion, testValRoot[:])
|
|
assert.NoError(t, err)
|
|
assert.NotEqual(t, digest, cachedDigest)
|
|
testValRoot[5] = 'z'
|
|
cachedDigest2, err := signing.ComputeForkDigest(testVersion, testValRoot[:])
|
|
assert.NoError(t, err)
|
|
assert.NotEqual(t, digest, cachedDigest2)
|
|
assert.NotEqual(t, cachedDigest, cachedDigest2)
|
|
}
|
|
func TestBlockSignatureBatch_NoSigVerification(t *testing.T) {
|
|
tests := []struct {
|
|
pubkey []byte
|
|
mockSignature []byte
|
|
domain []byte
|
|
wantMessageHexs []string
|
|
}{
|
|
{
|
|
pubkey: []byte{0xa9, 0x9a, 0x76, 0xed, 0x77, 0x96, 0xf7, 0xbe, 0x22, 0xd5, 0xb7, 0xe8, 0x5d, 0xee, 0xb7, 0xc5, 0x67, 0x7e, 0x88, 0xe5, 0x11, 0xe0, 0xb3, 0x37, 0x61, 0x8f, 0x8c, 0x4e, 0xb6, 0x13, 0x49, 0xb4, 0xbf, 0x2d, 0x15, 0x3f, 0x64, 0x9f, 0x7b, 0x53, 0x35, 0x9f, 0xe8, 0xb9, 0x4a, 0x38, 0xe4, 0x4c},
|
|
mockSignature: []byte{0xa9, 0x9a, 0x76, 0xed, 0x77},
|
|
domain: []byte{4, 0, 0, 0, 245, 165, 253, 66, 209, 106, 32, 48, 39, 152, 239, 110, 211, 9, 151, 155, 67, 0, 61, 35, 32, 217, 240, 232, 234, 152, 49, 169},
|
|
wantMessageHexs: []string{"0xe6012bc68e112797a91ed6889e7453f8e304fb76fbffcec1c62eef280a93f7ba"},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
block := util.NewBeaconBlock()
|
|
got, err := signing.BlockSignatureBatch(tt.pubkey, tt.mockSignature, tt.domain, block.Block.HashTreeRoot)
|
|
require.NoError(t, err)
|
|
for i, message := range got.Messages {
|
|
require.Equal(t, hexutil.Encode(message[:]), tt.wantMessageHexs[i])
|
|
}
|
|
}
|
|
}
|