402 lines
12 KiB
Go
402 lines
12 KiB
Go
// stm: #integration
|
|
package itests
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/filecoin-project/go-address"
|
|
"github.com/filecoin-project/go-bitfield"
|
|
"github.com/filecoin-project/go-state-types/builtin"
|
|
minertypes "github.com/filecoin-project/go-state-types/builtin/v8/miner"
|
|
"github.com/filecoin-project/go-state-types/crypto"
|
|
"github.com/filecoin-project/go-state-types/dline"
|
|
prooftypes "github.com/filecoin-project/go-state-types/proof"
|
|
"github.com/filecoin-project/lotus/api"
|
|
"github.com/filecoin-project/lotus/build"
|
|
"github.com/filecoin-project/lotus/chain/actors"
|
|
"github.com/filecoin-project/lotus/chain/types"
|
|
"github.com/filecoin-project/lotus/itests/kit"
|
|
)
|
|
|
|
func TestWindowPostDispute(t *testing.T) {
|
|
//stm: @CHAIN_SYNCER_LOAD_GENESIS_001, @CHAIN_SYNCER_FETCH_TIPSET_001,
|
|
//stm: @CHAIN_SYNCER_START_001, @CHAIN_SYNCER_SYNC_001, @BLOCKCHAIN_BEACON_VALIDATE_BLOCK_VALUES_01
|
|
//stm: @CHAIN_SYNCER_COLLECT_CHAIN_001, @CHAIN_SYNCER_COLLECT_HEADERS_001, @CHAIN_SYNCER_VALIDATE_TIPSET_001
|
|
//stm: @CHAIN_SYNCER_NEW_PEER_HEAD_001, @CHAIN_SYNCER_VALIDATE_MESSAGE_META_001, @CHAIN_SYNCER_STOP_001
|
|
|
|
//stm: @CHAIN_INCOMING_HANDLE_INCOMING_BLOCKS_001, @CHAIN_INCOMING_VALIDATE_BLOCK_PUBSUB_001, @CHAIN_INCOMING_VALIDATE_MESSAGE_PUBSUB_001
|
|
kit.Expensive(t)
|
|
|
|
kit.QuietMiningLogs()
|
|
|
|
blocktime := 2 * time.Millisecond
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
defer cancel()
|
|
|
|
var (
|
|
client kit.TestFullNode
|
|
chainMiner kit.TestMiner
|
|
evilMiner kit.TestMiner
|
|
)
|
|
|
|
// First, we configure two miners. After sealing, we're going to turn off the first miner so
|
|
// it doesn't submit proofs.
|
|
//
|
|
// Then we're going to manually submit bad proofs.
|
|
opts := []kit.NodeOpt{kit.WithAllSubsystems()}
|
|
ens := kit.NewEnsemble(t, kit.MockProofs()).
|
|
FullNode(&client, opts...).
|
|
Miner(&chainMiner, &client, opts...).
|
|
Miner(&evilMiner, &client, append(opts, kit.PresealSectors(0))...).
|
|
Start()
|
|
|
|
defaultFrom, err := client.WalletDefaultAddress(ctx)
|
|
require.NoError(t, err)
|
|
|
|
// Mine with the _second_ node (the good one).
|
|
ens.InterconnectAll().BeginMining(blocktime, &chainMiner)
|
|
|
|
// Give the chain miner enough sectors to win every block.
|
|
chainMiner.PledgeSectors(ctx, 10, 0, nil)
|
|
// And the evil one 1 sector. No cookie for you.
|
|
evilMiner.PledgeSectors(ctx, 1, 0, nil)
|
|
|
|
// Let the evil miner's sectors gain power.
|
|
evilMinerAddr, err := evilMiner.ActorAddress(ctx)
|
|
require.NoError(t, err)
|
|
|
|
//stm: @CHAIN_STATE_MINER_CALCULATE_DEADLINE_001
|
|
di, err := client.StateMinerProvingDeadline(ctx, evilMinerAddr, types.EmptyTSK)
|
|
require.NoError(t, err)
|
|
|
|
t.Logf("Running one proving period\n")
|
|
|
|
waitUntil := di.PeriodStart + di.WPoStProvingPeriod*2 + 1
|
|
t.Logf("End for head.Height > %d", waitUntil)
|
|
|
|
ts := client.WaitTillChain(ctx, kit.HeightAtLeast(waitUntil))
|
|
t.Logf("Now head.Height = %d", ts.Height())
|
|
|
|
//stm: @CHAIN_STATE_MINER_POWER_001
|
|
p, err := client.StateMinerPower(ctx, evilMinerAddr, types.EmptyTSK)
|
|
require.NoError(t, err)
|
|
|
|
ssz, err := evilMiner.ActorSectorSize(ctx, evilMinerAddr)
|
|
require.NoError(t, err)
|
|
|
|
// make sure it has gained power.
|
|
require.Equal(t, p.MinerPower.RawBytePower, types.NewInt(uint64(ssz)))
|
|
|
|
//stm: @MINER_SECTOR_LIST_001
|
|
evilSectors, err := evilMiner.SectorsListNonGenesis(ctx)
|
|
require.NoError(t, err)
|
|
evilSectorNo := evilSectors[0] // only one.
|
|
//stm: @CHAIN_STATE_SECTOR_PARTITION_001
|
|
evilSectorLoc, err := client.StateSectorPartition(ctx, evilMinerAddr, evilSectorNo, types.EmptyTSK)
|
|
require.NoError(t, err)
|
|
|
|
t.Log("evil miner stopping")
|
|
|
|
// Now stop the evil miner, and start manually submitting bad proofs.
|
|
require.NoError(t, evilMiner.Stop(ctx))
|
|
|
|
t.Log("evil miner stopped")
|
|
|
|
// Wait until we need to prove our sector.
|
|
for {
|
|
//stm: @CHAIN_STATE_MINER_CALCULATE_DEADLINE_001
|
|
di, err = client.StateMinerProvingDeadline(ctx, evilMinerAddr, types.EmptyTSK)
|
|
require.NoError(t, err)
|
|
if di.Index == evilSectorLoc.Deadline && di.CurrentEpoch-di.Open > 1 {
|
|
break
|
|
}
|
|
build.Clock.Sleep(blocktime)
|
|
}
|
|
|
|
err = submitBadProof(ctx, client, evilMiner.OwnerKey.Address, evilMinerAddr, di, evilSectorLoc.Deadline, evilSectorLoc.Partition)
|
|
require.NoError(t, err, "evil proof not accepted")
|
|
|
|
// Wait until after the proving period.
|
|
for {
|
|
//stm: @CHAIN_STATE_MINER_CALCULATE_DEADLINE_001
|
|
di, err = client.StateMinerProvingDeadline(ctx, evilMinerAddr, types.EmptyTSK)
|
|
require.NoError(t, err)
|
|
if di.Index != evilSectorLoc.Deadline {
|
|
break
|
|
}
|
|
build.Clock.Sleep(blocktime)
|
|
}
|
|
|
|
t.Log("accepted evil proof")
|
|
|
|
//stm: @CHAIN_STATE_MINER_POWER_001
|
|
// Make sure the evil node didn't lose any power.
|
|
p, err = client.StateMinerPower(ctx, evilMinerAddr, types.EmptyTSK)
|
|
require.NoError(t, err)
|
|
require.Equal(t, p.MinerPower.RawBytePower, types.NewInt(uint64(ssz)))
|
|
|
|
// OBJECTION! The good miner files a DISPUTE!!!!
|
|
{
|
|
params := &minertypes.DisputeWindowedPoStParams{
|
|
Deadline: evilSectorLoc.Deadline,
|
|
PoStIndex: 0,
|
|
}
|
|
|
|
enc, aerr := actors.SerializeParams(params)
|
|
require.NoError(t, aerr)
|
|
|
|
msg := &types.Message{
|
|
To: evilMinerAddr,
|
|
Method: builtin.MethodsMiner.DisputeWindowedPoSt,
|
|
Params: enc,
|
|
Value: types.NewInt(0),
|
|
From: defaultFrom,
|
|
}
|
|
sm, err := client.MpoolPushMessage(ctx, msg, nil)
|
|
require.NoError(t, err)
|
|
|
|
t.Log("waiting dispute")
|
|
//stm: @CHAIN_STATE_WAIT_MSG_001
|
|
rec, err := client.StateWaitMsg(ctx, sm.Cid(), build.MessageConfidence, api.LookbackNoLimit, true)
|
|
require.NoError(t, err)
|
|
require.Zero(t, rec.Receipt.ExitCode, "dispute not accepted: %s", rec.Receipt.ExitCode.Error())
|
|
}
|
|
|
|
//stm: @CHAIN_STATE_MINER_POWER_001
|
|
// Objection SUSTAINED!
|
|
// Make sure the evil node lost power.
|
|
p, err = client.StateMinerPower(ctx, evilMinerAddr, types.EmptyTSK)
|
|
require.NoError(t, err)
|
|
require.True(t, p.MinerPower.RawBytePower.IsZero())
|
|
|
|
// Now we begin the redemption arc.
|
|
require.True(t, p.MinerPower.RawBytePower.IsZero())
|
|
|
|
// First, recover the sector.
|
|
|
|
{
|
|
//stm: @CHAIN_STATE_MINER_INFO_001
|
|
minerInfo, err := client.StateMinerInfo(ctx, evilMinerAddr, types.EmptyTSK)
|
|
require.NoError(t, err)
|
|
|
|
params := &minertypes.DeclareFaultsRecoveredParams{
|
|
Recoveries: []minertypes.RecoveryDeclaration{{
|
|
Deadline: evilSectorLoc.Deadline,
|
|
Partition: evilSectorLoc.Partition,
|
|
Sectors: bitfield.NewFromSet([]uint64{uint64(evilSectorNo)}),
|
|
}},
|
|
}
|
|
|
|
enc, aerr := actors.SerializeParams(params)
|
|
require.NoError(t, aerr)
|
|
|
|
msg := &types.Message{
|
|
To: evilMinerAddr,
|
|
Method: builtin.MethodsMiner.DeclareFaultsRecovered,
|
|
Params: enc,
|
|
Value: types.FromFil(30), // repay debt.
|
|
From: minerInfo.Owner,
|
|
}
|
|
sm, err := client.MpoolPushMessage(ctx, msg, nil)
|
|
require.NoError(t, err)
|
|
|
|
//stm: @CHAIN_STATE_WAIT_MSG_001
|
|
rec, err := client.StateWaitMsg(ctx, sm.Cid(), build.MessageConfidence, api.LookbackNoLimit, true)
|
|
require.NoError(t, err)
|
|
require.Zero(t, rec.Receipt.ExitCode, "recovery not accepted: %s", rec.Receipt.ExitCode.Error())
|
|
}
|
|
|
|
// Then wait for the deadline.
|
|
for {
|
|
//stm: @CHAIN_STATE_MINER_CALCULATE_DEADLINE_001
|
|
di, err = client.StateMinerProvingDeadline(ctx, evilMinerAddr, types.EmptyTSK)
|
|
require.NoError(t, err)
|
|
|
|
if di.Index == evilSectorLoc.Deadline && di.CurrentEpoch-di.Open > 1 {
|
|
break
|
|
}
|
|
build.Clock.Sleep(blocktime)
|
|
}
|
|
|
|
// Now try to be evil again
|
|
err = submitBadProof(ctx, client, evilMiner.OwnerKey.Address, evilMinerAddr, di, evilSectorLoc.Deadline, evilSectorLoc.Partition)
|
|
require.Error(t, err)
|
|
require.Contains(t, err.Error(), "invalid post was submitted")
|
|
require.Contains(t, err.Error(), "(RetCode=16)")
|
|
|
|
// It didn't work because we're recovering.
|
|
}
|
|
|
|
func TestWindowPostDisputeFails(t *testing.T) {
|
|
//stm: @CHAIN_SYNCER_LOAD_GENESIS_001, @CHAIN_SYNCER_FETCH_TIPSET_001,
|
|
//stm: @CHAIN_SYNCER_START_001, @CHAIN_SYNCER_SYNC_001, @BLOCKCHAIN_BEACON_VALIDATE_BLOCK_VALUES_01
|
|
//stm: @CHAIN_SYNCER_COLLECT_CHAIN_001, @CHAIN_SYNCER_COLLECT_HEADERS_001, @CHAIN_SYNCER_VALIDATE_TIPSET_001
|
|
//stm: @CHAIN_SYNCER_NEW_PEER_HEAD_001, @CHAIN_SYNCER_VALIDATE_MESSAGE_META_001, @CHAIN_SYNCER_STOP_001
|
|
//stm: @CHAIN_STATE_MINER_GET_DEADLINES_001
|
|
kit.Expensive(t)
|
|
|
|
kit.QuietMiningLogs()
|
|
|
|
blocktime := 2 * time.Millisecond
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
defer cancel()
|
|
|
|
client, miner, ens := kit.EnsembleMinimal(t, kit.MockProofs())
|
|
ens.InterconnectAll().BeginMining(blocktime)
|
|
|
|
defaultFrom, err := client.WalletDefaultAddress(ctx)
|
|
require.NoError(t, err)
|
|
|
|
maddr, err := miner.ActorAddress(ctx)
|
|
require.NoError(t, err)
|
|
|
|
build.Clock.Sleep(time.Second)
|
|
|
|
miner.PledgeSectors(ctx, 10, 0, nil)
|
|
|
|
//stm: @CHAIN_STATE_MINER_CALCULATE_DEADLINE_001
|
|
di, err := client.StateMinerProvingDeadline(ctx, maddr, types.EmptyTSK)
|
|
require.NoError(t, err)
|
|
|
|
t.Log("Running one proving period")
|
|
waitUntil := di.PeriodStart + di.WPoStProvingPeriod*2 + 1
|
|
t.Logf("End for head.Height > %d", waitUntil)
|
|
|
|
ts := client.WaitTillChain(ctx, kit.HeightAtLeast(waitUntil))
|
|
t.Logf("Now head.Height = %d", ts.Height())
|
|
|
|
ssz, err := miner.ActorSectorSize(ctx, maddr)
|
|
require.NoError(t, err)
|
|
expectedPower := types.NewInt(uint64(ssz) * (kit.DefaultPresealsPerBootstrapMiner + 10))
|
|
|
|
//stm: @CHAIN_STATE_MINER_POWER_001
|
|
p, err := client.StateMinerPower(ctx, maddr, types.EmptyTSK)
|
|
require.NoError(t, err)
|
|
|
|
// make sure it has gained power.
|
|
require.Equal(t, p.MinerPower.RawBytePower, expectedPower)
|
|
|
|
// Wait until a proof has been submitted.
|
|
var targetDeadline uint64
|
|
waitForProof:
|
|
for {
|
|
deadlines, err := client.StateMinerDeadlines(ctx, maddr, types.EmptyTSK)
|
|
require.NoError(t, err)
|
|
for dlIdx, dl := range deadlines {
|
|
nonEmpty, err := dl.PostSubmissions.IsEmpty()
|
|
require.NoError(t, err)
|
|
if nonEmpty {
|
|
targetDeadline = uint64(dlIdx)
|
|
break waitForProof
|
|
}
|
|
}
|
|
|
|
build.Clock.Sleep(blocktime)
|
|
}
|
|
|
|
for {
|
|
//stm: @CHAIN_STATE_MINER_CALCULATE_DEADLINE_001
|
|
di, err := client.StateMinerProvingDeadline(ctx, maddr, types.EmptyTSK)
|
|
require.NoError(t, err)
|
|
// wait until the deadline finishes.
|
|
if di.Index == ((targetDeadline + 1) % di.WPoStPeriodDeadlines) {
|
|
break
|
|
}
|
|
|
|
build.Clock.Sleep(blocktime)
|
|
}
|
|
|
|
// Try to object to the proof. This should fail.
|
|
{
|
|
params := &minertypes.DisputeWindowedPoStParams{
|
|
Deadline: targetDeadline,
|
|
PoStIndex: 0,
|
|
}
|
|
|
|
enc, aerr := actors.SerializeParams(params)
|
|
require.NoError(t, aerr)
|
|
|
|
msg := &types.Message{
|
|
To: maddr,
|
|
Method: builtin.MethodsMiner.DisputeWindowedPoSt,
|
|
Params: enc,
|
|
Value: types.NewInt(0),
|
|
From: defaultFrom,
|
|
}
|
|
_, err := client.MpoolPushMessage(ctx, msg, nil)
|
|
require.Error(t, err)
|
|
require.Contains(t, err.Error(), "failed to dispute valid post")
|
|
require.Contains(t, err.Error(), "(RetCode=16)")
|
|
}
|
|
}
|
|
|
|
func submitBadProof(
|
|
ctx context.Context,
|
|
client api.FullNode, owner address.Address, maddr address.Address,
|
|
di *dline.Info, dlIdx, partIdx uint64,
|
|
) error {
|
|
head, err := client.ChainHead(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
//stm: @CHAIN_STATE_MINER_INFO_001
|
|
minerInfo, err := client.StateMinerInfo(ctx, maddr, head.Key())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
//stm: @CHAIN_STATE_GET_RANDOMNESS_FROM_TICKETS_001
|
|
commEpoch := di.Open
|
|
commRand, err := client.StateGetRandomnessFromTickets(
|
|
ctx, crypto.DomainSeparationTag_PoStChainCommit,
|
|
commEpoch, nil, head.Key(),
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
params := &minertypes.SubmitWindowedPoStParams{
|
|
ChainCommitEpoch: commEpoch,
|
|
ChainCommitRand: commRand,
|
|
Deadline: dlIdx,
|
|
Partitions: []minertypes.PoStPartition{{Index: partIdx}},
|
|
Proofs: []prooftypes.PoStProof{{
|
|
PoStProof: minerInfo.WindowPoStProofType,
|
|
ProofBytes: []byte("I'm soooo very evil."),
|
|
}},
|
|
}
|
|
|
|
enc, aerr := actors.SerializeParams(params)
|
|
if aerr != nil {
|
|
return aerr
|
|
}
|
|
|
|
msg := &types.Message{
|
|
To: maddr,
|
|
Method: builtin.MethodsMiner.SubmitWindowedPoSt,
|
|
Params: enc,
|
|
Value: types.NewInt(0),
|
|
From: owner,
|
|
}
|
|
sm, err := client.MpoolPushMessage(ctx, msg, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
//stm: @CHAIN_STATE_WAIT_MSG_001
|
|
rec, err := client.StateWaitMsg(ctx, sm.Cid(), build.MessageConfidence, api.LookbackNoLimit, true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if rec.Receipt.ExitCode.IsError() {
|
|
return rec.Receipt.ExitCode
|
|
}
|
|
return nil
|
|
}
|