cosmos-sdk/x/slashing/keeper/msg_server_test.go
2025-03-21 15:04:36 -07:00

333 lines
10 KiB
Go

package keeper_test
import (
"time"
sdkmath "cosmossdk.io/math"
"github.com/cosmos/cosmos-sdk/testutil/testdata"
sdk "github.com/cosmos/cosmos-sdk/types"
slashingtypes "github.com/cosmos/cosmos-sdk/x/slashing/types"
"github.com/cosmos/cosmos-sdk/x/staking/types"
)
func (s *KeeperTestSuite) TestUpdateParams() {
require := s.Require()
minSignedPerWindow, err := sdkmath.LegacyNewDecFromStr("0.60")
require.NoError(err)
slashFractionDoubleSign, err := sdkmath.LegacyNewDecFromStr("0.022")
require.NoError(err)
slashFractionDowntime, err := sdkmath.LegacyNewDecFromStr("0.0089")
require.NoError(err)
invalidVal, err := sdkmath.LegacyNewDecFromStr("-1")
require.NoError(err)
testCases := []struct {
name string
request *slashingtypes.MsgUpdateParams
expectErr bool
expErrMsg string
}{
{
name: "set invalid authority",
request: &slashingtypes.MsgUpdateParams{
Authority: "foo",
},
expectErr: true,
expErrMsg: "invalid authority",
},
{
name: "set invalid signed blocks window",
request: &slashingtypes.MsgUpdateParams{
Authority: s.slashingKeeper.GetAuthority(),
Params: slashingtypes.Params{
SignedBlocksWindow: 0,
MinSignedPerWindow: minSignedPerWindow,
DowntimeJailDuration: time.Duration(34800000000000),
SlashFractionDoubleSign: slashFractionDoubleSign,
SlashFractionDowntime: slashFractionDowntime,
},
},
expectErr: true,
expErrMsg: "signed blocks window must be positive",
},
{
name: "set invalid min signed per window",
request: &slashingtypes.MsgUpdateParams{
Authority: s.slashingKeeper.GetAuthority(),
Params: slashingtypes.Params{
SignedBlocksWindow: int64(750),
MinSignedPerWindow: invalidVal,
DowntimeJailDuration: time.Duration(34800000000000),
SlashFractionDoubleSign: slashFractionDoubleSign,
SlashFractionDowntime: slashFractionDowntime,
},
},
expectErr: true,
expErrMsg: "min signed per window cannot be negative",
},
{
name: "set invalid downtime jail duration",
request: &slashingtypes.MsgUpdateParams{
Authority: s.slashingKeeper.GetAuthority(),
Params: slashingtypes.Params{
SignedBlocksWindow: int64(750),
MinSignedPerWindow: minSignedPerWindow,
DowntimeJailDuration: time.Duration(0),
SlashFractionDoubleSign: slashFractionDoubleSign,
SlashFractionDowntime: slashFractionDowntime,
},
},
expectErr: true,
expErrMsg: "downtime jail duration must be positive",
},
{
name: "set invalid slash fraction double sign",
request: &slashingtypes.MsgUpdateParams{
Authority: s.slashingKeeper.GetAuthority(),
Params: slashingtypes.Params{
SignedBlocksWindow: int64(750),
MinSignedPerWindow: minSignedPerWindow,
DowntimeJailDuration: time.Duration(10),
SlashFractionDoubleSign: invalidVal,
SlashFractionDowntime: slashFractionDowntime,
},
},
expectErr: true,
expErrMsg: "double sign slash fraction cannot be negative",
},
{
name: "set invalid slash fraction downtime",
request: &slashingtypes.MsgUpdateParams{
Authority: s.slashingKeeper.GetAuthority(),
Params: slashingtypes.Params{
SignedBlocksWindow: int64(750),
MinSignedPerWindow: minSignedPerWindow,
DowntimeJailDuration: time.Duration(10),
SlashFractionDoubleSign: slashFractionDoubleSign,
SlashFractionDowntime: invalidVal,
},
},
expectErr: true,
expErrMsg: "downtime slash fraction cannot be negative",
},
{
name: "set full valid params",
request: &slashingtypes.MsgUpdateParams{
Authority: s.slashingKeeper.GetAuthority(),
Params: slashingtypes.Params{
SignedBlocksWindow: int64(750),
MinSignedPerWindow: minSignedPerWindow,
DowntimeJailDuration: time.Duration(34800000000000),
SlashFractionDoubleSign: slashFractionDoubleSign,
SlashFractionDowntime: slashFractionDowntime,
},
},
expectErr: false,
},
}
for _, tc := range testCases {
s.Run(tc.name, func() {
_, err := s.msgServer.UpdateParams(s.ctx, tc.request)
if tc.expectErr {
require.Error(err)
require.Contains(err.Error(), tc.expErrMsg)
} else {
require.NoError(err)
}
})
}
}
func (s *KeeperTestSuite) TestUnjail() {
testCases := []struct {
name string
malleate func() *slashingtypes.MsgUnjail
expErr bool
expErrMsg string
}{
{
name: "invalid validator address: invalid request",
malleate: func() *slashingtypes.MsgUnjail {
return &slashingtypes.MsgUnjail{
ValidatorAddr: "invalid",
}
},
expErr: true,
expErrMsg: "decoding bech32 failed",
},
{
name: "no self delegation: invalid request",
malleate: func() *slashingtypes.MsgUnjail {
_, pubKey, addr := testdata.KeyTestPubAddr()
valAddr := sdk.ValAddress(addr)
val, err := types.NewValidator(valAddr.String(), pubKey, types.Description{Moniker: "test"})
s.Require().NoError(err)
s.stakingKeeper.EXPECT().Validator(s.ctx, valAddr).Return(val, nil)
s.stakingKeeper.EXPECT().Delegation(s.ctx, addr, valAddr).Return(nil, nil)
return &slashingtypes.MsgUnjail{
ValidatorAddr: sdk.ValAddress(addr).String(),
}
},
expErr: true,
expErrMsg: "validator has no self-delegation",
},
{
name: "validator not in the state: invalid request",
malleate: func() *slashingtypes.MsgUnjail {
_, _, addr := testdata.KeyTestPubAddr()
valAddr := sdk.ValAddress(addr)
s.stakingKeeper.EXPECT().Validator(s.ctx, valAddr).Return(nil, nil)
return &slashingtypes.MsgUnjail{
ValidatorAddr: valAddr.String(),
}
},
expErr: true,
expErrMsg: "address is not associated with any known validator",
},
{
name: "validator not jailed: invalid request",
malleate: func() *slashingtypes.MsgUnjail {
_, pubKey, addr := testdata.KeyTestPubAddr()
valAddr := sdk.ValAddress(addr)
val, err := types.NewValidator(valAddr.String(), pubKey, types.Description{Moniker: "test"})
val.Tokens = sdkmath.NewInt(1000)
val.DelegatorShares = sdkmath.LegacyNewDec(1)
val.Jailed = false
s.Require().NoError(err)
info := slashingtypes.NewValidatorSigningInfo(sdk.ConsAddress(addr), int64(4), int64(3),
time.Unix(2, 0), false, int64(10))
s.Require().NoError(s.slashingKeeper.SetValidatorSigningInfo(s.ctx, sdk.ConsAddress(addr), info))
s.stakingKeeper.EXPECT().Validator(s.ctx, valAddr).Return(val, nil)
del := types.NewDelegation(addr.String(), valAddr.String(), sdkmath.LegacyNewDec(100))
s.stakingKeeper.EXPECT().Delegation(s.ctx, addr, valAddr).Return(del, nil)
return &slashingtypes.MsgUnjail{
ValidatorAddr: sdk.ValAddress(addr).String(),
}
},
expErr: true,
expErrMsg: "validator not jailed",
},
{
name: "validator tombstoned: invalid request",
malleate: func() *slashingtypes.MsgUnjail {
_, pubKey, addr := testdata.KeyTestPubAddr()
valAddr := sdk.ValAddress(addr)
val, err := types.NewValidator(valAddr.String(), pubKey, types.Description{Moniker: "test"})
val.Tokens = sdkmath.NewInt(1000)
val.DelegatorShares = sdkmath.LegacyNewDec(1)
val.Jailed = true
s.Require().NoError(err)
info := slashingtypes.NewValidatorSigningInfo(sdk.ConsAddress(addr), int64(4), int64(3),
time.Unix(2, 0), true, int64(10))
s.Require().NoError(s.slashingKeeper.SetValidatorSigningInfo(s.ctx, sdk.ConsAddress(addr), info))
s.stakingKeeper.EXPECT().Validator(s.ctx, valAddr).Return(val, nil)
del := types.NewDelegation(addr.String(), valAddr.String(), sdkmath.LegacyNewDec(100))
s.stakingKeeper.EXPECT().Delegation(s.ctx, addr, valAddr).Return(del, nil)
return &slashingtypes.MsgUnjail{
ValidatorAddr: sdk.ValAddress(addr).String(),
}
},
expErr: true,
expErrMsg: "validator still jailed; cannot be unjailed",
},
{
name: "unjailing before wait period: invalid request",
malleate: func() *slashingtypes.MsgUnjail {
_, pubKey, addr := testdata.KeyTestPubAddr()
valAddr := sdk.ValAddress(addr)
val, err := types.NewValidator(valAddr.String(), pubKey, types.Description{Moniker: "test"})
val.Tokens = sdkmath.NewInt(1000)
val.DelegatorShares = sdkmath.LegacyNewDec(1)
val.Jailed = true
s.Require().NoError(err)
info := slashingtypes.NewValidatorSigningInfo(sdk.ConsAddress(addr), int64(4), int64(3),
s.ctx.BlockTime().AddDate(0, 0, 1), false, int64(10))
s.Require().NoError(s.slashingKeeper.SetValidatorSigningInfo(s.ctx, sdk.ConsAddress(addr), info))
s.stakingKeeper.EXPECT().Validator(s.ctx, valAddr).Return(val, nil)
del := types.NewDelegation(addr.String(), valAddr.String(), sdkmath.LegacyNewDec(10000))
s.stakingKeeper.EXPECT().Delegation(s.ctx, addr, valAddr).Return(del, nil)
return &slashingtypes.MsgUnjail{
ValidatorAddr: sdk.ValAddress(addr).String(),
}
},
expErr: true,
expErrMsg: "validator still jailed; cannot be unjailed",
},
{
name: "valid request",
malleate: func() *slashingtypes.MsgUnjail {
_, pubKey, addr := testdata.KeyTestPubAddr()
valAddr := sdk.ValAddress(addr)
val, err := types.NewValidator(valAddr.String(), pubKey, types.Description{Moniker: "test"})
val.Tokens = sdkmath.NewInt(1000)
val.DelegatorShares = sdkmath.LegacyNewDec(1)
val.Jailed = true
s.Require().NoError(err)
info := slashingtypes.NewValidatorSigningInfo(sdk.ConsAddress(addr), int64(4), int64(3),
time.Unix(2, 0), false, int64(10))
s.Require().NoError(s.slashingKeeper.SetValidatorSigningInfo(s.ctx, sdk.ConsAddress(addr), info))
s.stakingKeeper.EXPECT().Validator(s.ctx, valAddr).Return(val, nil)
del := types.NewDelegation(addr.String(), valAddr.String(), sdkmath.LegacyNewDec(100))
s.stakingKeeper.EXPECT().Delegation(s.ctx, addr, valAddr).Return(del, nil)
s.stakingKeeper.EXPECT().Unjail(s.ctx, sdk.ConsAddress(addr)).Return(nil)
return &slashingtypes.MsgUnjail{
ValidatorAddr: sdk.ValAddress(addr).String(),
}
},
expErr: false,
},
}
for _, tc := range testCases {
s.Run(tc.name, func() {
req := tc.malleate()
_, err := s.msgServer.Unjail(s.ctx, req)
if tc.expErr {
s.Require().Error(err)
s.Require().Contains(err.Error(), tc.expErrMsg)
} else {
s.Require().NoError(err)
}
})
}
}