#![cfg(not(debug_assertions))] use beacon_chain::block_verification_types::RpcBlock; use beacon_chain::test_utils::{AttestationStrategy, BeaconChainHarness, BlockStrategy}; use beacon_chain::{StateSkipConfig, WhenSlotSkipped}; use lazy_static::lazy_static; use std::sync::Arc; use tree_hash::TreeHash; use types::{AggregateSignature, EthSpec, Keypair, MainnetEthSpec, RelativeEpoch, Slot}; pub const VALIDATOR_COUNT: usize = 16; lazy_static! { /// A cached set of keys. static ref KEYPAIRS: Vec = types::test_utils::generate_deterministic_keypairs(VALIDATOR_COUNT); } /// This test builds a chain that is just long enough to finalize an epoch then it produces an /// attestation at each slot from genesis through to three epochs past the head. /// /// It checks the produced attestation against some locally computed values. #[tokio::test] async fn produces_attestations() { let num_blocks_produced = MainnetEthSpec::slots_per_epoch() * 4; let additional_slots_tested = MainnetEthSpec::slots_per_epoch() * 3; let harness = BeaconChainHarness::builder(MainnetEthSpec) .default_spec() .keypairs(KEYPAIRS[..].to_vec()) .fresh_ephemeral_store() .mock_execution_layer() .build(); let chain = &harness.chain; // Test all valid committee indices for all slots in the chain. // for slot in 0..=current_slot.as_u64() + MainnetEthSpec::slots_per_epoch() * 3 { for slot in 0..=num_blocks_produced + additional_slots_tested { if slot > 0 && slot <= num_blocks_produced { harness.advance_slot(); harness .extend_chain( 1, BlockStrategy::OnCanonicalHead, AttestationStrategy::AllValidators, ) .await; } let slot = Slot::from(slot); let mut state = chain .state_at_slot(slot, StateSkipConfig::WithStateRoots) .expect("should get state"); let block_slot = if slot <= num_blocks_produced { slot } else { Slot::from(num_blocks_produced) }; let blinded_block = chain .block_at_slot(block_slot, WhenSlotSkipped::Prev) .expect("should get block") .expect("block should not be skipped"); let block_root = blinded_block.message().tree_hash_root(); let block = chain .store .make_full_block(&block_root, blinded_block) .unwrap(); let blobs = chain.get_blobs(&block_root).unwrap(); let epoch_boundary_slot = state .current_epoch() .start_slot(MainnetEthSpec::slots_per_epoch()); let target_root = if state.slot() == epoch_boundary_slot { block_root } else { *state .get_block_root(epoch_boundary_slot) .expect("should get target block root") }; state .build_committee_cache(RelativeEpoch::Current, &harness.chain.spec) .unwrap(); let committee_cache = state .committee_cache(RelativeEpoch::Current) .expect("should get committee_cache"); let committee_count = committee_cache.committees_per_slot(); for index in 0..committee_count { let committee_len = committee_cache .get_beacon_committee(slot, index) .expect("should get committee for slot") .committee .len(); let attestation = chain .produce_unaggregated_attestation(slot, index) .expect("should produce attestation"); let data = &attestation.data; assert_eq!( attestation.aggregation_bits.len(), committee_len, "bad committee len" ); assert!( attestation.aggregation_bits.is_zero(), "some committee bits are set" ); assert_eq!( attestation.signature, AggregateSignature::empty(), "bad signature" ); assert_eq!(data.index, index, "bad index"); assert_eq!(data.slot, slot, "bad slot"); assert_eq!(data.beacon_block_root, block_root, "bad block root"); assert_eq!( data.source, state.current_justified_checkpoint(), "bad source" ); assert_eq!( data.source, state.current_justified_checkpoint(), "bad source" ); assert_eq!(data.target.epoch, state.current_epoch(), "bad target epoch"); assert_eq!(data.target.root, target_root, "bad target root"); let rpc_block = RpcBlock::::new(None, Arc::new(block.clone()), Some(blobs.clone())) .unwrap(); let beacon_chain::data_availability_checker::MaybeAvailableBlock::Available( available_block, ) = chain .data_availability_checker .verify_kzg_for_rpc_block(rpc_block) .unwrap() else { panic!("block should be available") }; let early_attestation = { let proto_block = chain .canonical_head .fork_choice_read_lock() .get_block(&block_root) .unwrap(); chain .early_attester_cache .add_head_block( block_root, available_block, proto_block, &state, &chain.spec, ) .unwrap(); chain .early_attester_cache .try_attest(slot, index, &chain.spec) .unwrap() .unwrap() }; assert_eq!( attestation, early_attestation, "early attester cache inconsistent" ); } } } /// Ensures that the early attester cache wont create an attestation to a block in a later slot than /// the one requested. #[tokio::test] async fn early_attester_cache_old_request() { let harness = BeaconChainHarness::builder(MainnetEthSpec) .default_spec() .keypairs(KEYPAIRS[..].to_vec()) .fresh_ephemeral_store() .mock_execution_layer() .build(); harness.advance_slot(); harness .extend_chain( 2, BlockStrategy::OnCanonicalHead, AttestationStrategy::AllValidators, ) .await; let head = harness.chain.head_snapshot(); assert_eq!(head.beacon_block.slot(), 2); let head_proto_block = harness .chain .canonical_head .fork_choice_read_lock() .get_block(&head.beacon_block_root) .unwrap(); let head_blobs = harness .chain .get_blobs(&head.beacon_block_root) .expect("should get blobs"); let rpc_block = RpcBlock::::new(None, head.beacon_block.clone(), Some(head_blobs)).unwrap(); let beacon_chain::data_availability_checker::MaybeAvailableBlock::Available(available_block) = harness .chain .data_availability_checker .verify_kzg_for_rpc_block(rpc_block) .unwrap() else { panic!("block should be available") }; harness .chain .early_attester_cache .add_head_block( head.beacon_block_root, available_block, head_proto_block, &head.beacon_state, &harness.chain.spec, ) .unwrap(); let attest_slot = head.beacon_block.slot() - 1; let attestation = harness .chain .produce_unaggregated_attestation(attest_slot, 0) .unwrap(); assert_eq!(attestation.data.slot, attest_slot); let attested_block = harness .chain .get_blinded_block(&attestation.data.beacon_block_root) .unwrap() .unwrap(); assert_eq!(attested_block.slot(), attest_slot); }