b73c497be2
## Issue Addressed NA ## Proposed Changes - Refactor the `bls` crate to support multiple BLS "backends" (e.g., milagro, blst, etc). - Removes some duplicate, unused code in `common/rest_types/src/validator.rs`. - Removes the old "upgrade legacy keypairs" functionality (these were unencrypted keys that haven't been supported for a few testnets, no one should be using them anymore). ## Additional Info Most of the files changed are just inconsequential changes to function names. ## TODO - [x] Optimization levels - [x] Infinity point: https://github.com/supranational/blst/issues/11 - [x] Ensure milagro *and* blst are tested via CI - [x] What to do with unsafe code? - [x] Test infinity point in signature sets
229 lines
5.7 KiB
Rust
229 lines
5.7 KiB
Rust
// #![cfg(not(feature = "fake_crypto"))]
|
|
|
|
use state_processing::{
|
|
per_block_processing, test_utils::BlockBuilder, BlockProcessingError, BlockSignatureStrategy,
|
|
};
|
|
use types::{
|
|
AggregateSignature, BeaconState, ChainSpec, EthSpec, Hash256, Keypair, MinimalEthSpec,
|
|
Signature, SignedBeaconBlock, Slot,
|
|
};
|
|
|
|
const VALIDATOR_COUNT: usize = 64;
|
|
|
|
fn get_block<T, F>(mut mutate_builder: F) -> (SignedBeaconBlock<T>, BeaconState<T>)
|
|
where
|
|
T: EthSpec,
|
|
F: FnMut(&mut BlockBuilder<T>),
|
|
{
|
|
let spec = T::default_spec();
|
|
let mut builder: BlockBuilder<T> = BlockBuilder::new(VALIDATOR_COUNT, &spec);
|
|
builder.set_slot(Slot::from(T::slots_per_epoch() * 3 - 2));
|
|
builder.build_caches(&spec);
|
|
mutate_builder(&mut builder);
|
|
builder.build(&spec)
|
|
}
|
|
|
|
fn test_scenario<T: EthSpec, F, G>(mutate_builder: F, mut invalidate_block: G, spec: &ChainSpec)
|
|
where
|
|
T: EthSpec,
|
|
F: FnMut(&mut BlockBuilder<T>),
|
|
G: FnMut(&mut SignedBeaconBlock<T>),
|
|
{
|
|
let (mut block, mut state) = get_block::<T, _>(mutate_builder);
|
|
|
|
/*
|
|
* Control check to ensure the valid block should pass verification.
|
|
*/
|
|
|
|
assert_eq!(
|
|
per_block_processing(
|
|
&mut state.clone(),
|
|
&block,
|
|
None,
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
spec
|
|
),
|
|
Ok(()),
|
|
"valid block should pass with verify individual"
|
|
);
|
|
|
|
assert_eq!(
|
|
per_block_processing(
|
|
&mut state.clone(),
|
|
&block,
|
|
None,
|
|
BlockSignatureStrategy::VerifyBulk,
|
|
spec
|
|
),
|
|
Ok(()),
|
|
"valid block should pass with verify bulk"
|
|
);
|
|
|
|
invalidate_block(&mut block);
|
|
|
|
/*
|
|
* Check to ensure the invalid block fails.
|
|
*/
|
|
|
|
assert!(
|
|
per_block_processing(
|
|
&mut state.clone(),
|
|
&block,
|
|
None,
|
|
BlockSignatureStrategy::VerifyIndividual,
|
|
spec
|
|
)
|
|
.is_err(),
|
|
"invalid block should fail with verify individual"
|
|
);
|
|
|
|
assert_eq!(
|
|
per_block_processing(
|
|
&mut state,
|
|
&block,
|
|
None,
|
|
BlockSignatureStrategy::VerifyBulk,
|
|
spec
|
|
),
|
|
Err(BlockProcessingError::BulkSignatureVerificationFailed),
|
|
"invalid block should fail with verify bulk"
|
|
);
|
|
}
|
|
|
|
// TODO: use lazy static
|
|
fn agg_sig() -> AggregateSignature {
|
|
let mut agg_sig = AggregateSignature::infinity();
|
|
agg_sig.add_assign(&sig());
|
|
agg_sig
|
|
}
|
|
|
|
// TODO: use lazy static
|
|
fn sig() -> Signature {
|
|
let keypair = Keypair::random();
|
|
keypair.sk.sign(Hash256::from_low_u64_be(42))
|
|
}
|
|
|
|
type TestEthSpec = MinimalEthSpec;
|
|
|
|
mod signatures_minimal {
|
|
use super::*;
|
|
|
|
#[test]
|
|
fn block_proposal() {
|
|
let spec = &TestEthSpec::default_spec();
|
|
|
|
test_scenario::<TestEthSpec, _, _>(|_| {}, |block| block.signature = sig(), spec);
|
|
}
|
|
|
|
#[test]
|
|
fn randao() {
|
|
let spec = &TestEthSpec::default_spec();
|
|
|
|
test_scenario::<TestEthSpec, _, _>(
|
|
|_| {},
|
|
|block| block.message.body.randao_reveal = sig(),
|
|
spec,
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn proposer_slashing() {
|
|
let spec = &TestEthSpec::default_spec();
|
|
|
|
test_scenario::<TestEthSpec, _, _>(
|
|
|mut builder| {
|
|
builder.num_proposer_slashings = 1;
|
|
},
|
|
|block| {
|
|
block.message.body.proposer_slashings[0]
|
|
.signed_header_1
|
|
.signature = sig()
|
|
},
|
|
spec,
|
|
);
|
|
test_scenario::<TestEthSpec, _, _>(
|
|
|mut builder| {
|
|
builder.num_proposer_slashings = 1;
|
|
},
|
|
|block| {
|
|
block.message.body.proposer_slashings[0]
|
|
.signed_header_2
|
|
.signature = sig()
|
|
},
|
|
spec,
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn attester_slashing() {
|
|
let spec = &TestEthSpec::default_spec();
|
|
|
|
test_scenario::<TestEthSpec, _, _>(
|
|
|mut builder| {
|
|
builder.num_attester_slashings = 1;
|
|
},
|
|
|block| {
|
|
block.message.body.attester_slashings[0]
|
|
.attestation_1
|
|
.signature = agg_sig()
|
|
},
|
|
spec,
|
|
);
|
|
test_scenario::<TestEthSpec, _, _>(
|
|
|mut builder| {
|
|
builder.num_attester_slashings = 1;
|
|
},
|
|
|block| {
|
|
block.message.body.attester_slashings[0]
|
|
.attestation_2
|
|
.signature = agg_sig()
|
|
},
|
|
spec,
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn attestation() {
|
|
let spec = &TestEthSpec::default_spec();
|
|
|
|
test_scenario::<TestEthSpec, _, _>(
|
|
|mut builder| {
|
|
builder.num_attestations = 1;
|
|
},
|
|
|block| block.message.body.attestations[0].signature = agg_sig(),
|
|
spec,
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
// TODO: fix fail by making valid merkle proofs.
|
|
#[should_panic]
|
|
fn deposit() {
|
|
let spec = &TestEthSpec::default_spec();
|
|
|
|
test_scenario::<TestEthSpec, _, _>(
|
|
|mut builder| {
|
|
builder.num_deposits = 1;
|
|
},
|
|
|block| block.message.body.deposits[0].data.signature = sig().into(),
|
|
spec,
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn exit() {
|
|
let mut spec = &mut TestEthSpec::default_spec();
|
|
|
|
// Allows the test to pass.
|
|
spec.shard_committee_period = 0;
|
|
|
|
test_scenario::<TestEthSpec, _, _>(
|
|
|mut builder| {
|
|
builder.num_exits = 1;
|
|
},
|
|
|block| block.message.body.voluntary_exits[0].signature = sig(),
|
|
spec,
|
|
);
|
|
}
|
|
}
|