2019-05-16 13:06:41 +00:00
|
|
|
#![cfg(all(test, not(feature = "fake_crypto")))]
|
2019-08-30 05:49:06 +00:00
|
|
|
|
2019-04-10 04:42:31 +00:00
|
|
|
use super::block_processing_builder::BlockProcessingBuilder;
|
2019-04-10 11:56:31 +00:00
|
|
|
use super::errors::*;
|
2019-08-29 01:34:25 +00:00
|
|
|
use crate::{per_block_processing, BlockSignatureStrategy};
|
2019-11-12 05:09:33 +00:00
|
|
|
use types::test_utils::{
|
|
|
|
AttestationTestTask, AttesterSlashingTestTask, DepositTestTask, ExitTestTask,
|
|
|
|
ProposerSlashingTestTask,
|
|
|
|
};
|
2019-05-16 13:06:41 +00:00
|
|
|
use types::*;
|
2019-04-10 04:42:31 +00:00
|
|
|
|
2019-11-12 05:09:33 +00:00
|
|
|
pub const NUM_DEPOSITS: u64 = 1;
|
2020-04-01 11:03:03 +00:00
|
|
|
pub const VALIDATOR_COUNT: usize = 64;
|
2019-11-12 05:09:33 +00:00
|
|
|
pub const SLOT_OFFSET: u64 = 4;
|
|
|
|
pub const EXIT_SLOT_OFFSET: u64 = 2048;
|
|
|
|
pub const NUM_ATTESTATIONS: u64 = 1;
|
2019-04-10 04:42:31 +00:00
|
|
|
|
2020-02-10 23:19:36 +00:00
|
|
|
type E = MainnetEthSpec;
|
|
|
|
|
2019-04-10 04:42:31 +00:00
|
|
|
#[test]
|
2019-04-15 00:38:13 +00:00
|
|
|
fn valid_block_ok() {
|
2019-06-08 12:49:04 +00:00
|
|
|
let spec = MainnetEthSpec::default_spec();
|
2019-11-12 05:09:33 +00:00
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
2019-05-16 13:06:41 +00:00
|
|
|
let (block, mut state) = builder.build(None, None, &spec);
|
2019-04-10 11:56:31 +00:00
|
|
|
|
2019-08-29 01:34:25 +00:00
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
2019-04-15 00:38:13 +00:00
|
|
|
|
|
|
|
assert_eq!(result, Ok(()));
|
2019-04-10 11:56:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
2019-04-15 00:38:13 +00:00
|
|
|
fn invalid_block_header_state_slot() {
|
2019-06-08 12:49:04 +00:00
|
|
|
let spec = MainnetEthSpec::default_spec();
|
2019-11-12 05:09:33 +00:00
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
2019-05-16 13:06:41 +00:00
|
|
|
let (mut block, mut state) = builder.build(None, None, &spec);
|
2019-04-10 11:56:31 +00:00
|
|
|
|
2019-09-30 03:58:45 +00:00
|
|
|
state.slot = Slot::new(133_713);
|
2020-02-10 23:19:36 +00:00
|
|
|
block.message.slot = Slot::new(424_242);
|
2019-04-10 11:56:31 +00:00
|
|
|
|
2019-08-29 01:34:25 +00:00
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
2019-04-10 11:56:31 +00:00
|
|
|
|
2019-04-15 00:38:13 +00:00
|
|
|
assert_eq!(
|
|
|
|
result,
|
2019-08-29 01:34:25 +00:00
|
|
|
Err(BlockProcessingError::HeaderInvalid {
|
|
|
|
reason: HeaderInvalid::StateSlotMismatch
|
|
|
|
})
|
2019-04-15 00:38:13 +00:00
|
|
|
);
|
2019-04-10 11:56:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
2019-04-15 00:38:13 +00:00
|
|
|
fn invalid_parent_block_root() {
|
2019-06-08 12:49:04 +00:00
|
|
|
let spec = MainnetEthSpec::default_spec();
|
2019-11-12 05:09:33 +00:00
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
2019-05-16 13:06:41 +00:00
|
|
|
let invalid_parent_root = Hash256::from([0xAA; 32]);
|
|
|
|
let (block, mut state) = builder.build(None, Some(invalid_parent_root), &spec);
|
|
|
|
|
2019-08-29 01:34:25 +00:00
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
2019-05-16 13:06:41 +00:00
|
|
|
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
2019-08-29 01:34:25 +00:00
|
|
|
Err(BlockProcessingError::HeaderInvalid {
|
|
|
|
reason: HeaderInvalid::ParentBlockRootMismatch {
|
2020-02-10 23:19:36 +00:00
|
|
|
state: state.latest_block_header.canonical_root(),
|
|
|
|
block: block.parent_root()
|
2019-05-16 13:06:41 +00:00
|
|
|
}
|
2019-08-29 01:34:25 +00:00
|
|
|
})
|
2019-05-16 13:06:41 +00:00
|
|
|
);
|
2019-04-10 11:56:31 +00:00
|
|
|
}
|
|
|
|
|
2019-04-15 00:38:13 +00:00
|
|
|
#[test]
|
|
|
|
fn invalid_block_signature() {
|
2019-06-08 12:49:04 +00:00
|
|
|
let spec = MainnetEthSpec::default_spec();
|
2019-11-12 05:09:33 +00:00
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
2020-02-10 23:19:36 +00:00
|
|
|
let (block, mut state) = builder.build(None, None, &spec);
|
2019-04-15 00:38:13 +00:00
|
|
|
|
|
|
|
// sign the block with a keypair that is not the expected proposer
|
|
|
|
let keypair = Keypair::random();
|
2020-04-01 11:03:03 +00:00
|
|
|
let block = block.message.sign(
|
|
|
|
&keypair.sk,
|
|
|
|
&state.fork,
|
|
|
|
state.genesis_validators_root,
|
|
|
|
&spec,
|
|
|
|
);
|
2019-04-15 00:38:13 +00:00
|
|
|
|
|
|
|
// process block with invalid block signature
|
2019-08-29 01:34:25 +00:00
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
2019-04-15 00:38:13 +00:00
|
|
|
|
|
|
|
// should get a BadSignature error
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
2019-08-29 01:34:25 +00:00
|
|
|
Err(BlockProcessingError::HeaderInvalid {
|
|
|
|
reason: HeaderInvalid::ProposalSignatureInvalid
|
|
|
|
})
|
2019-04-15 00:38:13 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2019-04-17 21:00:40 +00:00
|
|
|
#[test]
|
|
|
|
fn invalid_randao_reveal_signature() {
|
2019-06-08 12:49:04 +00:00
|
|
|
let spec = MainnetEthSpec::default_spec();
|
2019-11-12 05:09:33 +00:00
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
2019-04-17 21:00:40 +00:00
|
|
|
|
|
|
|
// sign randao reveal with random keypair
|
|
|
|
let keypair = Keypair::random();
|
2019-05-16 13:06:41 +00:00
|
|
|
let (block, mut state) = builder.build(Some(keypair.sk), None, &spec);
|
2019-05-20 06:47:44 +00:00
|
|
|
|
2019-08-29 01:34:25 +00:00
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
2019-04-17 21:00:40 +00:00
|
|
|
|
|
|
|
// should get a BadRandaoSignature error
|
2019-08-29 01:34:25 +00:00
|
|
|
assert_eq!(result, Err(BlockProcessingError::RandaoSignatureInvalid));
|
2019-04-17 21:00:40 +00:00
|
|
|
}
|
|
|
|
|
2019-11-12 05:09:33 +00:00
|
|
|
#[test]
|
|
|
|
fn valid_4_deposits() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = DepositTestTask::Valid;
|
|
|
|
|
|
|
|
let (block, mut state) = builder.build_with_n_deposits(4, test_task, None, None, &spec);
|
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting Ok because these are valid deposits.
|
|
|
|
assert_eq!(result, Ok(()));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_deposit_deposit_count_too_big() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = DepositTestTask::Valid;
|
|
|
|
|
|
|
|
let (block, mut state) =
|
|
|
|
builder.build_with_n_deposits(NUM_DEPOSITS, test_task, None, None, &spec);
|
|
|
|
|
|
|
|
let big_deposit_count = NUM_DEPOSITS + 1;
|
|
|
|
state.eth1_data.deposit_count = big_deposit_count;
|
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting DepositCountInvalid because we incremented the deposit_count
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::DepositCountInvalid {
|
|
|
|
expected: big_deposit_count as usize,
|
|
|
|
found: 1
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_deposit_count_too_small() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = DepositTestTask::Valid;
|
|
|
|
|
|
|
|
let (block, mut state) =
|
|
|
|
builder.build_with_n_deposits(NUM_DEPOSITS, test_task, None, None, &spec);
|
|
|
|
|
|
|
|
let small_deposit_count = NUM_DEPOSITS - 1;
|
|
|
|
state.eth1_data.deposit_count = small_deposit_count;
|
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting DepositCountInvalid because we decremented the deposit_count
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::DepositCountInvalid {
|
|
|
|
expected: small_deposit_count as usize,
|
|
|
|
found: 1
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_deposit_bad_merkle_proof() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = DepositTestTask::Valid;
|
|
|
|
|
|
|
|
let (block, mut state) =
|
|
|
|
builder.build_with_n_deposits(NUM_DEPOSITS, test_task, None, None, &spec);
|
|
|
|
|
|
|
|
let bad_index = state.eth1_deposit_index as usize;
|
|
|
|
|
|
|
|
// Manually offsetting deposit count and index to trigger bad merkle proof
|
|
|
|
state.eth1_data.deposit_count += 1;
|
|
|
|
state.eth1_deposit_index += 1;
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting BadMerkleProof because the proofs were created with different indices
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::DepositInvalid {
|
|
|
|
index: bad_index,
|
|
|
|
reason: DepositInvalid::BadMerkleProof
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_deposit_wrong_pubkey() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = DepositTestTask::BadPubKey;
|
|
|
|
|
|
|
|
let (block, mut state) =
|
|
|
|
builder.build_with_n_deposits(NUM_DEPOSITS, test_task, None, None, &spec);
|
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting Ok(()) even though the public key provided does not correspond to the correct public key
|
|
|
|
assert_eq!(result, Ok(()));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_deposit_wrong_sig() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = DepositTestTask::BadSig;
|
|
|
|
|
|
|
|
let (block, mut state) =
|
|
|
|
builder.build_with_n_deposits(NUM_DEPOSITS, test_task, None, None, &spec);
|
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting Ok(()) even though the block signature does not correspond to the correct public key
|
|
|
|
assert_eq!(result, Ok(()));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_deposit_invalid_pub_key() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = DepositTestTask::InvalidPubKey;
|
|
|
|
|
|
|
|
let (block, mut state) =
|
|
|
|
builder.build_with_n_deposits(NUM_DEPOSITS, test_task, None, None, &spec);
|
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting Ok(()) even though we passed in invalid publickeybytes in the public key field of the deposit data.
|
|
|
|
assert_eq!(result, Ok(()));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn valid_insert_3_exits() {
|
|
|
|
use std::cmp::max;
|
|
|
|
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let num_exits = 3;
|
|
|
|
let num_validators = max(VALIDATOR_COUNT, num_exits);
|
|
|
|
let test_task = ExitTestTask::Valid;
|
|
|
|
let builder = get_builder(&spec, EXIT_SLOT_OFFSET, num_validators);
|
|
|
|
|
|
|
|
let (block, mut state) = builder.build_with_n_exits(num_exits, test_task, None, None, &spec);
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting Ok because these are valid exits.
|
|
|
|
assert_eq!(result, Ok(()));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_exit_validator_unknown() {
|
|
|
|
use std::cmp::max;
|
|
|
|
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let num_exits = 1;
|
|
|
|
let test_task = ExitTestTask::ValidatorUnknown;
|
|
|
|
let num_validators = max(VALIDATOR_COUNT, num_exits);
|
|
|
|
let builder = get_builder(&spec, EXIT_SLOT_OFFSET, num_validators);
|
|
|
|
|
|
|
|
let (block, mut state) = builder.build_with_n_exits(num_exits, test_task, None, None, &spec);
|
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting Validator Unknwon because the exit index is incorrect
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::ExitInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: ExitInvalid::ValidatorUnknown(4242),
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_exit_already_exited() {
|
|
|
|
use std::cmp::max;
|
|
|
|
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let num_exits = 1;
|
|
|
|
let test_task = ExitTestTask::AlreadyExited;
|
|
|
|
let num_validators = max(VALIDATOR_COUNT, num_exits);
|
|
|
|
let builder = get_builder(&spec, EXIT_SLOT_OFFSET, num_validators);
|
|
|
|
|
|
|
|
let (block, mut state) = builder.build_with_n_exits(num_exits, test_task, None, None, &spec);
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting AlreadyExited because we manually set the exit_epoch to be different than far_future_epoch.
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::ExitInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: ExitInvalid::AlreadyExited(0),
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2019-11-21 00:47:30 +00:00
|
|
|
/* FIXME: needs updating for v0.9
|
2019-11-12 05:09:33 +00:00
|
|
|
#[test]
|
|
|
|
fn invalid_exit_not_active() {
|
|
|
|
use std::cmp::max;
|
|
|
|
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let num_exits = 1;
|
|
|
|
let test_task = ExitTestTask::NotActive;
|
|
|
|
let num_validators = max(VALIDATOR_COUNT, num_exits);
|
|
|
|
let builder = get_builder(&spec, EXIT_SLOT_OFFSET, num_validators);
|
|
|
|
|
|
|
|
let (block, mut state) = builder.build_with_n_exits(num_exits, test_task, None, None, &spec);
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting NotActive because we manually set the activation_epoch to be in the future
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::ExitInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: ExitInvalid::NotActive(0),
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
2019-11-21 00:47:30 +00:00
|
|
|
*/
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_exit_already_initiated() {
|
|
|
|
use std::cmp::max;
|
|
|
|
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let num_exits = 1;
|
|
|
|
let test_task = ExitTestTask::AlreadyInitiated;
|
|
|
|
let num_validators = max(VALIDATOR_COUNT, num_exits);
|
|
|
|
let builder = get_builder(&spec, EXIT_SLOT_OFFSET, num_validators);
|
|
|
|
|
|
|
|
let (block, mut state) = builder.build_with_n_exits(num_exits, test_task, None, None, &spec);
|
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting Ok(()) even though we inserted the same exit twice
|
|
|
|
assert_eq!(result, Ok(()));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_exit_future_epoch() {
|
|
|
|
use std::cmp::max;
|
|
|
|
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let num_exits = 1;
|
|
|
|
let test_task = ExitTestTask::FutureEpoch;
|
|
|
|
let num_validators = max(VALIDATOR_COUNT, num_exits);
|
|
|
|
let builder = get_builder(&spec, EXIT_SLOT_OFFSET, num_validators);
|
|
|
|
|
|
|
|
let (block, mut state) = builder.build_with_n_exits(num_exits, test_task, None, None, &spec);
|
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting FutureEpoch because we set the exit_epoch to be far_future_epoch
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::ExitInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: ExitInvalid::FutureEpoch {
|
|
|
|
state: Epoch::from(2048 as u64),
|
|
|
|
exit: spec.far_future_epoch
|
|
|
|
}
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_exit_too_young() {
|
|
|
|
use std::cmp::max;
|
|
|
|
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let num_exits = 1;
|
|
|
|
let test_task = ExitTestTask::Valid;
|
|
|
|
let num_validators = max(VALIDATOR_COUNT, num_exits);
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, num_validators);
|
|
|
|
|
|
|
|
let (block, mut state) = builder.build_with_n_exits(num_exits, test_task, None, None, &spec);
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting TooYoung because validator has not been active for long enough when trying to exit
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::ExitInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: ExitInvalid::TooYoungToExit {
|
|
|
|
current_epoch: Epoch::from(SLOT_OFFSET),
|
|
|
|
earliest_exit_epoch: Epoch::from(2048 as u64)
|
|
|
|
},
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_exit_bad_signature() {
|
|
|
|
use std::cmp::max;
|
|
|
|
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let num_exits = 1;
|
|
|
|
let test_task = ExitTestTask::BadSignature;
|
|
|
|
let num_validators = max(VALIDATOR_COUNT, num_exits);
|
|
|
|
let builder = get_builder(&spec, EXIT_SLOT_OFFSET, num_validators);
|
|
|
|
|
|
|
|
let (block, mut state) = builder.build_with_n_exits(num_exits, test_task, None, None, &spec);
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting Bad Signature because we signed with a different secret key than the correct one.
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::ExitInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: ExitInvalid::BadSignature,
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn valid_attestations() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = AttestationTestTask::Valid;
|
|
|
|
let (block, mut state) =
|
2019-11-21 00:47:30 +00:00
|
|
|
builder.build_with_n_attestations(test_task, NUM_ATTESTATIONS, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting Ok(()) because these are valid attestations
|
|
|
|
assert_eq!(result, Ok(()));
|
|
|
|
}
|
|
|
|
|
2019-11-21 00:47:30 +00:00
|
|
|
/* FIXME: needs updating for v0.9
|
2019-11-12 05:09:33 +00:00
|
|
|
#[test]
|
|
|
|
fn invalid_attestation_no_committee_for_shard() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = AttestationTestTask::NoCommiteeForShard;
|
|
|
|
let (block, mut state) =
|
2019-11-21 00:47:30 +00:00
|
|
|
builder.build_with_n_attestations(test_task, NUM_ATTESTATIONS, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting NoCommiteeForShard because we manually set the crosslink's shard to be invalid
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::BeaconStateError(
|
2019-11-21 00:47:30 +00:00
|
|
|
BeaconStateError::NoCommittee {
|
|
|
|
slot: Slot::new(0),
|
|
|
|
index: 0
|
|
|
|
}
|
2019-11-12 05:09:33 +00:00
|
|
|
))
|
|
|
|
);
|
|
|
|
}
|
2019-11-21 00:47:30 +00:00
|
|
|
*/
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_attestation_wrong_justified_checkpoint() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = AttestationTestTask::WrongJustifiedCheckpoint;
|
|
|
|
let (block, mut state) =
|
2019-11-21 00:47:30 +00:00
|
|
|
builder.build_with_n_attestations(test_task, NUM_ATTESTATIONS, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting WrongJustifiedCheckpoint because we manually set the
|
|
|
|
// source field of the AttestationData object to be invalid
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::AttestationInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: AttestationInvalid::WrongJustifiedCheckpoint {
|
|
|
|
state: Checkpoint {
|
|
|
|
epoch: Epoch::from(2 as u64),
|
|
|
|
root: Hash256::zero(),
|
|
|
|
},
|
|
|
|
attestation: Checkpoint {
|
|
|
|
epoch: Epoch::from(0 as u64),
|
|
|
|
root: Hash256::zero(),
|
|
|
|
},
|
|
|
|
is_current: true,
|
|
|
|
}
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_attestation_bad_indexed_attestation_bad_signature() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
2020-04-01 11:03:03 +00:00
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
2019-11-12 05:09:33 +00:00
|
|
|
let test_task = AttestationTestTask::BadIndexedAttestationBadSignature;
|
|
|
|
let (block, mut state) =
|
2019-11-21 00:47:30 +00:00
|
|
|
builder.build_with_n_attestations(test_task, NUM_ATTESTATIONS, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting BadIndexedAttestation(BadSignature) because we ommitted the aggregation bits in the attestation
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::AttestationInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: AttestationInvalid::BadIndexedAttestation(
|
|
|
|
IndexedAttestationInvalid::BadSignature
|
|
|
|
)
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_attestation_bad_aggregation_bitfield_len() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = AttestationTestTask::BadAggregationBitfieldLen;
|
|
|
|
let (block, mut state) =
|
2019-11-21 00:47:30 +00:00
|
|
|
builder.build_with_n_attestations(test_task, NUM_ATTESTATIONS, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting InvalidBitfield because the size of the aggregation_bitfield is bigger than the commitee size.
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::BeaconStateError(
|
|
|
|
BeaconStateError::InvalidBitfield
|
|
|
|
))
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_attestation_bad_signature() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, 97); // minimal number of required validators for this test
|
|
|
|
let test_task = AttestationTestTask::BadSignature;
|
|
|
|
let (block, mut state) =
|
2019-11-21 00:47:30 +00:00
|
|
|
builder.build_with_n_attestations(test_task, NUM_ATTESTATIONS, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting BadSignature because we're signing with invalid secret_keys
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::AttestationInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: AttestationInvalid::BadIndexedAttestation(
|
|
|
|
IndexedAttestationInvalid::BadSignature
|
|
|
|
)
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_attestation_included_too_early() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = AttestationTestTask::IncludedTooEarly;
|
|
|
|
let (block, mut state) =
|
2019-11-21 00:47:30 +00:00
|
|
|
builder.build_with_n_attestations(test_task, NUM_ATTESTATIONS, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting IncludedTooEarly because the shard included in the crosslink is bigger than expected
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::AttestationInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: AttestationInvalid::IncludedTooEarly {
|
2019-11-21 00:47:30 +00:00
|
|
|
state: state.slot,
|
2019-11-12 05:09:33 +00:00
|
|
|
delay: spec.min_attestation_inclusion_delay,
|
2020-02-10 23:19:36 +00:00
|
|
|
attestation: block.message.body.attestations[0].data.slot,
|
2019-11-12 05:09:33 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_attestation_included_too_late() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
2019-11-21 00:47:30 +00:00
|
|
|
// note to maintainer: might need to increase validator count if we get NoCommittee
|
2019-11-12 05:09:33 +00:00
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = AttestationTestTask::IncludedTooLate;
|
|
|
|
let (block, mut state) =
|
2019-11-21 00:47:30 +00:00
|
|
|
builder.build_with_n_attestations(test_task, NUM_ATTESTATIONS, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
2019-11-21 00:47:30 +00:00
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::AttestationInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: AttestationInvalid::IncludedTooLate {
|
|
|
|
state: state.slot,
|
2020-02-10 23:19:36 +00:00
|
|
|
attestation: block.message.body.attestations[0].data.slot,
|
2019-11-21 00:47:30 +00:00
|
|
|
}
|
|
|
|
})
|
2019-11-12 05:09:33 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
2020-02-10 23:19:36 +00:00
|
|
|
fn invalid_attestation_target_epoch_slot_mismatch() {
|
2019-11-12 05:09:33 +00:00
|
|
|
let spec = MainnetEthSpec::default_spec();
|
2019-11-21 00:47:30 +00:00
|
|
|
// note to maintainer: might need to increase validator count if we get NoCommittee
|
2019-11-12 05:09:33 +00:00
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
2020-02-10 23:19:36 +00:00
|
|
|
let test_task = AttestationTestTask::TargetEpochSlotMismatch;
|
2019-11-12 05:09:33 +00:00
|
|
|
let (block, mut state) =
|
2019-11-21 00:47:30 +00:00
|
|
|
builder.build_with_n_attestations(test_task, NUM_ATTESTATIONS, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
2020-02-10 23:19:36 +00:00
|
|
|
let attestation = &block.message.body.attestations[0].data;
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::AttestationInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: AttestationInvalid::TargetEpochSlotMismatch {
|
|
|
|
target_epoch: attestation.target.epoch,
|
|
|
|
slot_epoch: attestation.slot.epoch(E::slots_per_epoch()),
|
|
|
|
}
|
|
|
|
})
|
2019-11-12 05:09:33 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2019-11-21 00:47:30 +00:00
|
|
|
/* FIXME: needs updating for v0.9
|
2019-11-12 05:09:33 +00:00
|
|
|
#[test]
|
|
|
|
fn invalid_attestation_bad_shard() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = AttestationTestTask::BadShard;
|
|
|
|
let (block, mut state) =
|
2019-11-21 00:47:30 +00:00
|
|
|
builder.build_with_n_attestations(test_task, NUM_ATTESTATIONS, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
2019-11-21 00:47:30 +00:00
|
|
|
// Expecting BadShard or NoCommittee because the shard number is higher than ShardCount
|
2019-11-12 05:09:33 +00:00
|
|
|
assert!(
|
|
|
|
result
|
|
|
|
== Err(BlockProcessingError::AttestationInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: AttestationInvalid::BadShard
|
|
|
|
})
|
|
|
|
|| result
|
|
|
|
== Err(BlockProcessingError::BeaconStateError(
|
2019-11-21 00:47:30 +00:00
|
|
|
BeaconStateError::NoCommittee {
|
|
|
|
slot: Slot::new(0),
|
|
|
|
index: 0
|
|
|
|
}
|
2019-11-12 05:09:33 +00:00
|
|
|
))
|
|
|
|
);
|
|
|
|
}
|
2019-11-21 00:47:30 +00:00
|
|
|
*/
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn valid_insert_attester_slashing() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = AttesterSlashingTestTask::Valid;
|
|
|
|
let num_attester_slashings = 1;
|
|
|
|
let (block, mut state) =
|
2019-11-21 00:47:30 +00:00
|
|
|
builder.build_with_attester_slashing(test_task, num_attester_slashings, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting Ok(()) because attester slashing is valid
|
|
|
|
assert_eq!(result, Ok(()));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_attester_slashing_not_slashable() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = AttesterSlashingTestTask::NotSlashable;
|
|
|
|
let num_attester_slashings = 1;
|
|
|
|
let (block, mut state) =
|
2019-11-21 00:47:30 +00:00
|
|
|
builder.build_with_attester_slashing(test_task, num_attester_slashings, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting NotSlashable because the two attestations are the same
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::AttesterSlashingInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: AttesterSlashingInvalid::NotSlashable
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_attester_slashing_1_invalid() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = AttesterSlashingTestTask::IndexedAttestation1Invalid;
|
|
|
|
let num_attester_slashings = 1;
|
|
|
|
let (block, mut state) =
|
2019-11-21 00:47:30 +00:00
|
|
|
builder.build_with_attester_slashing(test_task, num_attester_slashings, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
2019-11-21 00:47:30 +00:00
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::IndexedAttestationInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: IndexedAttestationInvalid::BadValidatorIndicesOrdering(0)
|
|
|
|
})
|
2019-11-12 05:09:33 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_attester_slashing_2_invalid() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = AttesterSlashingTestTask::IndexedAttestation2Invalid;
|
|
|
|
let num_attester_slashings = 1;
|
|
|
|
let (block, mut state) =
|
2019-11-21 00:47:30 +00:00
|
|
|
builder.build_with_attester_slashing(test_task, num_attester_slashings, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
2019-11-21 00:47:30 +00:00
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::IndexedAttestationInvalid {
|
|
|
|
index: 1,
|
|
|
|
reason: IndexedAttestationInvalid::BadValidatorIndicesOrdering(0)
|
|
|
|
})
|
2019-11-12 05:09:33 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn valid_insert_proposer_slashing() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = ProposerSlashingTestTask::Valid;
|
2019-11-21 00:47:30 +00:00
|
|
|
let (block, mut state) = builder.build_with_proposer_slashing(test_task, 1, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting Ok(()) because we inserted a valid proposer slashing
|
|
|
|
assert_eq!(result, Ok(()));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_proposer_slashing_proposals_identical() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = ProposerSlashingTestTask::ProposalsIdentical;
|
2019-11-21 00:47:30 +00:00
|
|
|
let (block, mut state) = builder.build_with_proposer_slashing(test_task, 1, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
// Expecting ProposalsIdentical because we the two headers are identical
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::ProposerSlashingInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: ProposerSlashingInvalid::ProposalsIdentical
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_proposer_slashing_proposer_unknown() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = ProposerSlashingTestTask::ProposerUnknown;
|
2019-11-21 00:47:30 +00:00
|
|
|
let (block, mut state) = builder.build_with_proposer_slashing(test_task, 1, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting ProposerUnknown because validator_index is unknown
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::ProposerSlashingInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: ProposerSlashingInvalid::ProposerUnknown(3_141_592)
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_proposer_slashing_not_slashable() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = ProposerSlashingTestTask::ProposerNotSlashable;
|
2019-11-21 00:47:30 +00:00
|
|
|
let (block, mut state) = builder.build_with_proposer_slashing(test_task, 1, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
state.validators[0].slashed = true;
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting ProposerNotSlashable because we've already slashed the validator
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::ProposerSlashingInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: ProposerSlashingInvalid::ProposerNotSlashable(0)
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_bad_proposal_1_signature() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = ProposerSlashingTestTask::BadProposal1Signature;
|
2019-11-21 00:47:30 +00:00
|
|
|
let (block, mut state) = builder.build_with_proposer_slashing(test_task, 1, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting BadProposal1Signature because signature of proposal 1 is invalid
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::ProposerSlashingInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: ProposerSlashingInvalid::BadProposal1Signature
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_bad_proposal_2_signature() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = ProposerSlashingTestTask::BadProposal2Signature;
|
2019-11-21 00:47:30 +00:00
|
|
|
let (block, mut state) = builder.build_with_proposer_slashing(test_task, 1, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting BadProposal2Signature because signature of proposal 2 is invalid
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::ProposerSlashingInvalid {
|
|
|
|
index: 0,
|
|
|
|
reason: ProposerSlashingInvalid::BadProposal2Signature
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn invalid_proposer_slashing_proposal_epoch_mismatch() {
|
|
|
|
let spec = MainnetEthSpec::default_spec();
|
|
|
|
let builder = get_builder(&spec, SLOT_OFFSET, VALIDATOR_COUNT);
|
|
|
|
let test_task = ProposerSlashingTestTask::ProposalEpochMismatch;
|
2019-11-21 00:47:30 +00:00
|
|
|
let (block, mut state) = builder.build_with_proposer_slashing(test_task, 1, None, None, &spec);
|
2019-11-12 05:09:33 +00:00
|
|
|
|
|
|
|
let result = per_block_processing(
|
|
|
|
&mut state,
|
|
|
|
&block,
|
|
|
|
None,
|
|
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
|
|
&spec,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Expecting ProposalEpochMismatch because the two epochs are different
|
|
|
|
assert_eq!(
|
|
|
|
result,
|
|
|
|
Err(BlockProcessingError::ProposerSlashingInvalid {
|
|
|
|
index: 0,
|
2019-11-21 00:47:30 +00:00
|
|
|
reason: ProposerSlashingInvalid::ProposalSlotMismatch(
|
2019-11-12 05:09:33 +00:00
|
|
|
Slot::from(0 as u64),
|
|
|
|
Slot::from(128 as u64)
|
|
|
|
)
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
fn get_builder(
|
|
|
|
spec: &ChainSpec,
|
|
|
|
slot_offset: u64,
|
|
|
|
num_validators: usize,
|
2019-11-21 00:47:30 +00:00
|
|
|
) -> BlockProcessingBuilder<MainnetEthSpec> {
|
2019-11-12 05:09:33 +00:00
|
|
|
let mut builder = BlockProcessingBuilder::new(num_validators, &spec);
|
2019-04-10 04:42:31 +00:00
|
|
|
|
2019-11-12 05:09:33 +00:00
|
|
|
// Set the state and block to be in the last slot of the `slot_offset`th epoch.
|
2019-06-08 11:57:25 +00:00
|
|
|
let last_slot_of_epoch =
|
2019-11-12 05:09:33 +00:00
|
|
|
(MainnetEthSpec::genesis_epoch() + slot_offset).end_slot(MainnetEthSpec::slots_per_epoch());
|
2019-06-09 10:26:34 +00:00
|
|
|
builder.set_slot(last_slot_of_epoch);
|
2019-04-10 04:42:31 +00:00
|
|
|
builder.build_caches(&spec);
|
2019-11-21 00:47:30 +00:00
|
|
|
builder
|
2019-04-10 11:56:31 +00:00
|
|
|
}
|