262 lines
7.6 KiB
Rust
262 lines
7.6 KiB
Rust
use super::bls::{
|
|
AggregateSignature,
|
|
};
|
|
use super::helpers::{
|
|
BlockTestParams,
|
|
TestStore,
|
|
run_block_validation_scenario,
|
|
serialize_block,
|
|
};
|
|
use super::types::{
|
|
Block,
|
|
Hash256,
|
|
ProposerMap,
|
|
};
|
|
use super::ssz_helpers::ssz_block::SszBlock;
|
|
use super::validation::block_validation::{
|
|
SszBlockValidationError,
|
|
BlockStatus,
|
|
};
|
|
use super::validation::attestation_validation::{
|
|
AttestationValidationError,
|
|
};
|
|
use super::hashing::canonical_hash;
|
|
|
|
fn get_simple_params() -> BlockTestParams {
|
|
let validators_per_shard: usize = 5;
|
|
let cycle_length: u8 = 2;
|
|
let shard_count: u16 = 4;
|
|
let shards_per_slot: u16 = shard_count / u16::from(cycle_length);
|
|
let total_validators: usize = validators_per_shard * shard_count as usize;
|
|
let block_slot = u64::from(cycle_length) * 10000;
|
|
let attestations_justified_slot = block_slot - u64::from(cycle_length);
|
|
let parent_proposer_index = 0;
|
|
|
|
let validation_context_slot = block_slot;
|
|
let validation_context_justified_slot = attestations_justified_slot;
|
|
let validation_context_justified_block_hash = Hash256::from("justified_hash".as_bytes());
|
|
let validation_context_finalized_slot = 0;
|
|
|
|
BlockTestParams {
|
|
total_validators,
|
|
cycle_length,
|
|
shard_count,
|
|
shards_per_slot,
|
|
validators_per_shard,
|
|
parent_proposer_index,
|
|
block_slot,
|
|
attestations_justified_slot,
|
|
validation_context_slot,
|
|
validation_context_justified_slot,
|
|
validation_context_justified_block_hash,
|
|
validation_context_finalized_slot,
|
|
}
|
|
}
|
|
|
|
// TODO: test bad ssz serialization
|
|
|
|
#[test]
|
|
fn test_block_validation_valid() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |block: Block, attester_map, proposer_map, stores| {
|
|
/*
|
|
* Do not mutate
|
|
*/
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status.unwrap().0, BlockStatus::NewBlock);
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_valid_known_block() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |block: Block, attester_map, proposer_map, stores: TestStore| {
|
|
/*
|
|
* Pre-store the block in the database
|
|
*/
|
|
let block_ssz = serialize_block(&block);
|
|
let block_hash = canonical_hash(&block_ssz);
|
|
stores.block.put_serialized_block(&block_hash, &block_ssz).unwrap();
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status.unwrap(), (BlockStatus::KnownBlock, None));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_parent_slot_too_high() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |mut block: Block, attester_map, proposer_map, stores| {
|
|
block.slot_number = params.validation_context_justified_slot + 1;
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::ParentSlotHigherThanBlockSlot));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_future_slot() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |mut block: Block, attester_map, proposer_map, stores| {
|
|
block.slot_number = block.slot_number + 1;
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::FutureSlot));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_slot_already_finalized() {
|
|
let mut params = get_simple_params();
|
|
|
|
params.validation_context_finalized_slot = params.block_slot;
|
|
params.validation_context_justified_slot = params.validation_context_finalized_slot +
|
|
u64::from(params.cycle_length);
|
|
|
|
let mutator = |block, attester_map, proposer_map, stores| {
|
|
/*
|
|
* Do not mutate
|
|
*/
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::SlotAlreadyFinalized));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_unknown_pow_hash() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |mut block: Block, attester_map, proposer_map, stores| {
|
|
block.pow_chain_ref = Hash256::from("unknown pow hash".as_bytes());
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::UnknownPoWChainRef));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_unknown_parent_hash() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |mut block: Block, attester_map, proposer_map, stores| {
|
|
block.parent_hash = Hash256::from("unknown parent block".as_bytes());
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::UnknownParentHash));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_1st_attestation_signature() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |mut block: Block, attester_map, proposer_map, stores| {
|
|
/*
|
|
* Set the second attestaion record to have an invalid signature.
|
|
*/
|
|
block.attestations[0].aggregate_sig = AggregateSignature::new();
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::AttestationValidationError(
|
|
AttestationValidationError::BadAggregateSignature)));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_no_parent_proposer_signature() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |block: Block, attester_map, mut proposer_map: ProposerMap, stores: TestStore| {
|
|
/*
|
|
* Set the proposer for this slot to be a validator that does not exist.
|
|
*/
|
|
let ssz = stores.block.get_serialized_block(&block.parent_hash.as_ref()).unwrap().unwrap();
|
|
let parent_block_slot = SszBlock::from_slice(&ssz[..]).unwrap().slot_number();
|
|
proposer_map.insert(parent_block_slot, params.total_validators + 1);
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::NoProposerSignature));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_bad_proposer_map() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |block, attester_map, _, stores| {
|
|
/*
|
|
* Initialize a new, empty proposer map
|
|
*/
|
|
let proposer_map = ProposerMap::new();
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::BadProposerMap));
|
|
}
|
|
|
|
#[test]
|
|
fn test_block_validation_invalid_2nd_attestation_signature() {
|
|
let params = get_simple_params();
|
|
|
|
let mutator = |mut block: Block, attester_map, proposer_map, stores| {
|
|
/*
|
|
* Set the second attestaion record to have an invalid signature.
|
|
*/
|
|
block.attestations[1].aggregate_sig = AggregateSignature::new();
|
|
(block, attester_map, proposer_map, stores)
|
|
};
|
|
|
|
let status = run_block_validation_scenario(
|
|
¶ms,
|
|
mutator);
|
|
|
|
assert_eq!(status, Err(SszBlockValidationError::AttestationValidationError(
|
|
AttestationValidationError::BadAggregateSignature)));
|
|
}
|