// #![cfg(not(feature = "fake_crypto"))] use state_processing::{ per_block_processing, test_utils::BlockBuilder, BlockProcessingError, BlockSignatureStrategy, }; use types::{ AggregateSignature, BeaconState, ChainSpec, EthSpec, Hash256, Keypair, MinimalEthSpec, Signature, SignedBeaconBlock, Slot, }; const VALIDATOR_COUNT: usize = 64; fn get_block(mut mutate_builder: F) -> (SignedBeaconBlock, BeaconState) where T: EthSpec, F: FnMut(&mut BlockBuilder), { let spec = T::default_spec(); let mut builder: BlockBuilder = BlockBuilder::new(VALIDATOR_COUNT, &spec); builder.set_slot(Slot::from(T::slots_per_epoch() * 3 - 2)); builder.build_caches(&spec); mutate_builder(&mut builder); builder.build(&spec) } fn test_scenario(mutate_builder: F, mut invalidate_block: G, spec: &ChainSpec) where T: EthSpec, F: FnMut(&mut BlockBuilder), G: FnMut(&mut SignedBeaconBlock), { let (mut block, mut state) = get_block::(mutate_builder); /* * Control check to ensure the valid block should pass verification. */ assert_eq!( per_block_processing( &mut state.clone(), &block, None, BlockSignatureStrategy::VerifyIndividual, spec ), Ok(()), "valid block should pass with verify individual" ); assert_eq!( per_block_processing( &mut state.clone(), &block, None, BlockSignatureStrategy::VerifyBulk, spec ), Ok(()), "valid block should pass with verify bulk" ); invalidate_block(&mut block); /* * Check to ensure the invalid block fails. */ assert!( per_block_processing( &mut state.clone(), &block, None, BlockSignatureStrategy::VerifyIndividual, spec ) .is_err(), "invalid block should fail with verify individual" ); assert_eq!( per_block_processing( &mut state, &block, None, BlockSignatureStrategy::VerifyBulk, spec ), Err(BlockProcessingError::BulkSignatureVerificationFailed), "invalid block should fail with verify bulk" ); } // TODO: use lazy static fn agg_sig() -> AggregateSignature { let mut agg_sig = AggregateSignature::infinity(); agg_sig.add_assign(&sig()); agg_sig } // TODO: use lazy static fn sig() -> Signature { let keypair = Keypair::random(); keypair.sk.sign(Hash256::from_low_u64_be(42)) } type TestEthSpec = MinimalEthSpec; mod signatures_minimal { use super::*; #[test] fn block_proposal() { let spec = &TestEthSpec::default_spec(); test_scenario::(|_| {}, |block| block.signature = sig(), spec); } #[test] fn randao() { let spec = &TestEthSpec::default_spec(); test_scenario::( |_| {}, |block| block.message.body.randao_reveal = sig(), spec, ); } #[test] fn proposer_slashing() { let spec = &TestEthSpec::default_spec(); test_scenario::( |mut builder| { builder.num_proposer_slashings = 1; }, |block| { block.message.body.proposer_slashings[0] .signed_header_1 .signature = sig() }, spec, ); test_scenario::( |mut builder| { builder.num_proposer_slashings = 1; }, |block| { block.message.body.proposer_slashings[0] .signed_header_2 .signature = sig() }, spec, ); } #[test] fn attester_slashing() { let spec = &TestEthSpec::default_spec(); test_scenario::( |mut builder| { builder.num_attester_slashings = 1; }, |block| { block.message.body.attester_slashings[0] .attestation_1 .signature = agg_sig() }, spec, ); test_scenario::( |mut builder| { builder.num_attester_slashings = 1; }, |block| { block.message.body.attester_slashings[0] .attestation_2 .signature = agg_sig() }, spec, ); } #[test] fn attestation() { let spec = &TestEthSpec::default_spec(); test_scenario::( |mut builder| { builder.num_attestations = 1; }, |block| block.message.body.attestations[0].signature = agg_sig(), spec, ); } #[test] // TODO: fix fail by making valid merkle proofs. #[should_panic] fn deposit() { let spec = &TestEthSpec::default_spec(); test_scenario::( |mut builder| { builder.num_deposits = 1; }, |block| block.message.body.deposits[0].data.signature = sig().into(), spec, ); } #[test] fn exit() { let mut spec = &mut TestEthSpec::default_spec(); // Allows the test to pass. spec.shard_committee_period = 0; test_scenario::( |mut builder| { builder.num_exits = 1; }, |block| block.message.body.voluntary_exits[0].signature = sig(), spec, ); } }