mirror of
https://github.com/QuilibriumNetwork/ceremonyclient.git
synced 2026-02-21 10:27:26 +08:00
* v2.1.0.2 * restore tweaks to simlibp2p * fix: nil ref on size calc * fix: panic should induce shutdown from event_distributor * fix: friendlier initialization that requires less manual kickstarting for test/devnets * fix: fewer available shards than provers should choose shard length * fix: update stored worker registry, improve logging for debug mode * fix: shut the fuck up, peer log * qol: log value should be snake cased * fix:non-archive snap sync issues * fix: separate X448/Decaf448 signed keys, add onion key to registry * fix: overflow arithmetic on frame number comparison * fix: worker registration should be idempotent if inputs are same, otherwise permit updated records * fix: remove global prover state from size calculation * fix: divide by zero case * fix: eager prover * fix: broadcast listener default * qol: diagnostic data for peer authenticator * fix: master/worker connectivity issue in sparse networks tight coupling of peer and workers can sometimes interfere if mesh is sparse, so give workers a pseudoidentity but publish messages with the proper peer key * fix: reorder steps of join creation * fix: join verify frame source + ensure domain is properly padded (unnecessary but good for consistency) * fix: add delegate to protobuf <-> reified join conversion * fix: preempt prover from planning with no workers * fix: use the unallocated workers to generate a proof * qol: underflow causes join fail in first ten frames on test/devnets * qol: small logging tweaks for easier log correlation in debug mode * qol: use fisher-yates shuffle to ensure prover allocations are evenly distributed when scores are equal * qol: separate decisional logic on post-enrollment confirmation into consensus engine, proposer, and worker manager where relevant, refactor out scoring * reuse shard descriptors for both join planning and confirm/reject decisions * fix: add missing interface method and amend test blossomsub to use new peer id basis * fix: only check allocations if they exist * fix: pomw mint proof data needs to be hierarchically under global intrinsic domain * staging temporary state under diagnostics * fix: first phase of distributed lock refactoring * fix: compute intrinsic locking * fix: hypergraph intrinsic locking * fix: token intrinsic locking * fix: update execution engines to support new locking model * fix: adjust tests with new execution shape * fix: weave in lock/unlock semantics to liveness provider * fix lock fallthrough, add missing allocation update * qol: additional logging for diagnostics, also testnet/devnet handling for confirmations * fix: establish grace period on halt scenario to permit recovery * fix: support test/devnet defaults for coverage scenarios * fix: nil ref on consensus halts for non-archive nodes * fix: remove unnecessary prefix from prover ref * add test coverage for fork choice behaviors and replay – once passing, blocker (2) is resolved * fix: no fork replay on repeat for non-archive nodes, snap now behaves correctly * rollup of pre-liveness check lock interactions * ahead of tests, get the protobuf/metrics-related changes out so teams can prepare * add test coverage for distributed lock behaviors – once passing, blocker (3) is resolved * fix: blocker (3) * Dev docs improvements (#445) * Make install deps script more robust * Improve testing instructions * Worker node should stop upon OS SIGINT/SIGTERM signal (#447) * move pebble close to Stop() * move deferred Stop() to Start() * add core id to worker stop log message * create done os signal channel and stop worker upon message to it --------- Co-authored-by: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com> --------- Co-authored-by: Daz <daz_the_corgi@proton.me> Co-authored-by: Black Swan <3999712+blacks1ne@users.noreply.github.com>
339 lines
9.9 KiB
Go
339 lines
9.9 KiB
Go
package vdf_test
|
|
|
|
import (
|
|
"bytes"
|
|
gcrypto "crypto"
|
|
"io"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"go.uber.org/zap"
|
|
"source.quilibrium.com/quilibrium/monorepo/protobufs"
|
|
"source.quilibrium.com/quilibrium/monorepo/types/crypto"
|
|
"source.quilibrium.com/quilibrium/monorepo/vdf"
|
|
)
|
|
|
|
func TestProveAndVerifyFrameHeader(t *testing.T) {
|
|
l, _ := zap.NewProduction()
|
|
w := vdf.NewWesolowskiFrameProver(l)
|
|
|
|
// Create a mock BLS constructor
|
|
blsConstructor := &MockBlsConstructor{}
|
|
|
|
// Create a mock BLS key
|
|
blsKey := &MockBlsSigner{}
|
|
|
|
// Create a previous frame
|
|
previousFrame := &protobufs.FrameHeader{
|
|
Address: []byte("test-address"),
|
|
FrameNumber: 1,
|
|
Timestamp: time.Now().UnixMilli(),
|
|
Difficulty: 10000,
|
|
Output: bytes.Repeat([]byte{0x01}, 516),
|
|
ParentSelector: bytes.Repeat([]byte{0x00}, 32),
|
|
RequestsRoot: bytes.Repeat([]byte{0x02}, 74),
|
|
StateRoots: [][]byte{
|
|
bytes.Repeat([]byte{0x03}, 74),
|
|
bytes.Repeat([]byte{0x04}, 74),
|
|
bytes.Repeat([]byte{0x05}, 74),
|
|
bytes.Repeat([]byte{0x06}, 74),
|
|
},
|
|
Prover: bytes.Repeat([]byte{0x07}, 32),
|
|
}
|
|
|
|
// Test parameters
|
|
address := []byte("test-address")
|
|
requestsRoot := bytes.Repeat([]byte{0x08}, 74)
|
|
stateRoots := [][]byte{
|
|
bytes.Repeat([]byte{0x09}, 74),
|
|
bytes.Repeat([]byte{0x0a}, 74),
|
|
bytes.Repeat([]byte{0x0b}, 74),
|
|
bytes.Repeat([]byte{0x0c}, 74),
|
|
}
|
|
prover := bytes.Repeat([]byte{0x0d}, 32)
|
|
timestamp := time.Now().UnixMilli()
|
|
difficulty := uint32(10000)
|
|
proverIndex := uint8(0)
|
|
|
|
// Prove frame header
|
|
header, err := w.ProveFrameHeader(
|
|
previousFrame,
|
|
address,
|
|
requestsRoot,
|
|
stateRoots,
|
|
prover,
|
|
blsKey,
|
|
timestamp,
|
|
difficulty,
|
|
10000,
|
|
proverIndex,
|
|
)
|
|
assert.NoError(t, err)
|
|
assert.NotNil(t, header)
|
|
assert.Equal(t, previousFrame.FrameNumber+1, header.FrameNumber)
|
|
assert.Equal(t, timestamp, header.Timestamp)
|
|
assert.Equal(t, difficulty, header.Difficulty)
|
|
assert.Equal(t, address, header.Address)
|
|
assert.Equal(t, requestsRoot, header.RequestsRoot)
|
|
assert.Equal(t, stateRoots, header.StateRoots)
|
|
assert.Equal(t, prover, header.Prover)
|
|
assert.NotNil(t, header.PublicKeySignatureBls48581)
|
|
|
|
// Verify frame header
|
|
indices, err := w.VerifyFrameHeader(header, blsConstructor)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, []uint8{0}, indices)
|
|
}
|
|
|
|
func TestVerifyFrameHeaderValidation(t *testing.T) {
|
|
l, _ := zap.NewProduction()
|
|
w := vdf.NewWesolowskiFrameProver(l)
|
|
blsConstructor := &MockBlsConstructor{}
|
|
|
|
tests := []struct {
|
|
name string
|
|
frame *protobufs.FrameHeader
|
|
expectError string
|
|
}{
|
|
{
|
|
name: "empty address",
|
|
frame: &protobufs.FrameHeader{
|
|
Address: []byte{},
|
|
FrameNumber: 1,
|
|
Timestamp: time.Now().UnixMilli(),
|
|
Difficulty: 10000,
|
|
Output: bytes.Repeat([]byte{0x01}, 516),
|
|
ParentSelector: bytes.Repeat([]byte{0x00}, 32),
|
|
RequestsRoot: bytes.Repeat([]byte{0x02}, 74),
|
|
StateRoots: [][]byte{
|
|
bytes.Repeat([]byte{0x03}, 74),
|
|
bytes.Repeat([]byte{0x04}, 74),
|
|
bytes.Repeat([]byte{0x05}, 74),
|
|
bytes.Repeat([]byte{0x06}, 74),
|
|
},
|
|
Prover: bytes.Repeat([]byte{0x07}, 32),
|
|
PublicKeySignatureBls48581: &protobufs.BLS48581AggregateSignature{
|
|
Bitmask: bytes.Repeat([]byte{0x01}, 32),
|
|
Signature: bytes.Repeat([]byte{0x02}, 74),
|
|
PublicKey: &protobufs.BLS48581G2PublicKey{
|
|
KeyValue: bytes.Repeat([]byte{0x03}, 585),
|
|
},
|
|
},
|
|
},
|
|
expectError: "invalid address",
|
|
},
|
|
{
|
|
name: "invalid requests root length",
|
|
frame: &protobufs.FrameHeader{
|
|
Address: []byte("test"),
|
|
FrameNumber: 1,
|
|
Timestamp: time.Now().UnixMilli(),
|
|
Difficulty: 10000,
|
|
Output: bytes.Repeat([]byte{0x01}, 516),
|
|
ParentSelector: bytes.Repeat([]byte{0x00}, 32),
|
|
RequestsRoot: bytes.Repeat([]byte{0x02}, 73), // Wrong length
|
|
StateRoots: [][]byte{
|
|
bytes.Repeat([]byte{0x03}, 74),
|
|
bytes.Repeat([]byte{0x04}, 74),
|
|
bytes.Repeat([]byte{0x05}, 74),
|
|
bytes.Repeat([]byte{0x06}, 74),
|
|
},
|
|
Prover: bytes.Repeat([]byte{0x07}, 32),
|
|
PublicKeySignatureBls48581: &protobufs.BLS48581AggregateSignature{
|
|
Bitmask: bytes.Repeat([]byte{0x01}, 32),
|
|
Signature: bytes.Repeat([]byte{0x02}, 74),
|
|
PublicKey: &protobufs.BLS48581G2PublicKey{
|
|
KeyValue: bytes.Repeat([]byte{0x03}, 585),
|
|
},
|
|
},
|
|
},
|
|
expectError: "invalid requests root length",
|
|
},
|
|
{
|
|
name: "invalid state roots count",
|
|
frame: &protobufs.FrameHeader{
|
|
Address: []byte("test"),
|
|
FrameNumber: 1,
|
|
Timestamp: time.Now().UnixMilli(),
|
|
Difficulty: 10000,
|
|
Output: bytes.Repeat([]byte{0x01}, 516),
|
|
ParentSelector: bytes.Repeat([]byte{0x00}, 32),
|
|
RequestsRoot: bytes.Repeat([]byte{0x02}, 74),
|
|
StateRoots: [][]byte{
|
|
bytes.Repeat([]byte{0x03}, 74),
|
|
bytes.Repeat([]byte{0x04}, 74),
|
|
bytes.Repeat([]byte{0x05}, 74),
|
|
}, // Only 3 roots instead of 4
|
|
Prover: bytes.Repeat([]byte{0x07}, 32),
|
|
PublicKeySignatureBls48581: &protobufs.BLS48581AggregateSignature{
|
|
Bitmask: bytes.Repeat([]byte{0x01}, 32),
|
|
Signature: bytes.Repeat([]byte{0x02}, 74),
|
|
PublicKey: &protobufs.BLS48581G2PublicKey{
|
|
KeyValue: bytes.Repeat([]byte{0x03}, 585),
|
|
},
|
|
},
|
|
},
|
|
expectError: "invalid state roots count",
|
|
},
|
|
{
|
|
name: "invalid state root length",
|
|
frame: &protobufs.FrameHeader{
|
|
Address: []byte("test"),
|
|
FrameNumber: 1,
|
|
Timestamp: time.Now().UnixMilli(),
|
|
Difficulty: 10000,
|
|
Output: bytes.Repeat([]byte{0x01}, 516),
|
|
ParentSelector: bytes.Repeat([]byte{0x00}, 32),
|
|
RequestsRoot: bytes.Repeat([]byte{0x02}, 74),
|
|
StateRoots: [][]byte{
|
|
bytes.Repeat([]byte{0x03}, 74),
|
|
bytes.Repeat([]byte{0x04}, 73), // Wrong length
|
|
bytes.Repeat([]byte{0x05}, 74),
|
|
bytes.Repeat([]byte{0x06}, 74),
|
|
},
|
|
Prover: bytes.Repeat([]byte{0x07}, 32),
|
|
PublicKeySignatureBls48581: &protobufs.BLS48581AggregateSignature{
|
|
Bitmask: bytes.Repeat([]byte{0x01}, 32),
|
|
Signature: bytes.Repeat([]byte{0x02}, 74),
|
|
PublicKey: &protobufs.BLS48581G2PublicKey{
|
|
KeyValue: bytes.Repeat([]byte{0x03}, 585),
|
|
},
|
|
},
|
|
},
|
|
expectError: "invalid state root length",
|
|
},
|
|
{
|
|
name: "empty prover",
|
|
frame: &protobufs.FrameHeader{
|
|
Address: []byte("test"),
|
|
FrameNumber: 1,
|
|
Timestamp: time.Now().UnixMilli(),
|
|
Difficulty: 10000,
|
|
Output: bytes.Repeat([]byte{0x01}, 516),
|
|
ParentSelector: bytes.Repeat([]byte{0x00}, 32),
|
|
RequestsRoot: bytes.Repeat([]byte{0x02}, 74),
|
|
StateRoots: [][]byte{
|
|
bytes.Repeat([]byte{0x03}, 74),
|
|
bytes.Repeat([]byte{0x04}, 74),
|
|
bytes.Repeat([]byte{0x05}, 74),
|
|
bytes.Repeat([]byte{0x06}, 74),
|
|
},
|
|
Prover: []byte{}, // Empty prover
|
|
PublicKeySignatureBls48581: &protobufs.BLS48581AggregateSignature{
|
|
Bitmask: bytes.Repeat([]byte{0x01}, 32),
|
|
Signature: bytes.Repeat([]byte{0x02}, 74),
|
|
PublicKey: &protobufs.BLS48581G2PublicKey{
|
|
KeyValue: bytes.Repeat([]byte{0x03}, 585),
|
|
},
|
|
},
|
|
},
|
|
expectError: "invalid prover",
|
|
},
|
|
{
|
|
name: "invalid output length",
|
|
frame: &protobufs.FrameHeader{
|
|
Address: []byte("test"),
|
|
FrameNumber: 1,
|
|
Timestamp: time.Now().UnixMilli(),
|
|
Difficulty: 10000,
|
|
Output: bytes.Repeat([]byte{0x01}, 515), // Wrong length
|
|
ParentSelector: bytes.Repeat([]byte{0x00}, 32),
|
|
RequestsRoot: bytes.Repeat([]byte{0x02}, 74),
|
|
StateRoots: [][]byte{
|
|
bytes.Repeat([]byte{0x03}, 74),
|
|
bytes.Repeat([]byte{0x04}, 74),
|
|
bytes.Repeat([]byte{0x05}, 74),
|
|
bytes.Repeat([]byte{0x06}, 74),
|
|
},
|
|
Prover: bytes.Repeat([]byte{0x07}, 32),
|
|
PublicKeySignatureBls48581: &protobufs.BLS48581AggregateSignature{
|
|
Bitmask: bytes.Repeat([]byte{0x01}, 32),
|
|
Signature: bytes.Repeat([]byte{0x02}, 74),
|
|
PublicKey: &protobufs.BLS48581G2PublicKey{
|
|
KeyValue: bytes.Repeat([]byte{0x03}, 585),
|
|
},
|
|
},
|
|
},
|
|
expectError: "invalid output",
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
_, err := w.VerifyFrameHeader(tt.frame, blsConstructor)
|
|
assert.Error(t, err)
|
|
assert.Contains(t, err.Error(), tt.expectError)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestProveFrameHeaderMissingPreviousFrame(t *testing.T) {
|
|
l, _ := zap.NewProduction()
|
|
w := vdf.NewWesolowskiFrameProver(l)
|
|
blsKey := &MockBlsSigner{}
|
|
|
|
_, err := w.ProveFrameHeader(
|
|
nil, // Missing previous frame
|
|
[]byte("test"),
|
|
bytes.Repeat([]byte{0x01}, 74),
|
|
[][]byte{
|
|
bytes.Repeat([]byte{0x02}, 74),
|
|
bytes.Repeat([]byte{0x03}, 74),
|
|
bytes.Repeat([]byte{0x04}, 74),
|
|
bytes.Repeat([]byte{0x05}, 74),
|
|
},
|
|
bytes.Repeat([]byte{0x06}, 32),
|
|
blsKey,
|
|
time.Now().UnixMilli(),
|
|
10000,
|
|
10000,
|
|
0,
|
|
)
|
|
assert.Error(t, err)
|
|
assert.Contains(t, err.Error(), "missing header")
|
|
}
|
|
|
|
// Mock implementations for testing
|
|
|
|
type MockBlsConstructor struct{}
|
|
|
|
func (m *MockBlsConstructor) Aggregate(publicKeys [][]byte, signatures [][]byte) (crypto.BlsAggregateOutput, error) {
|
|
return nil, nil
|
|
}
|
|
|
|
func (m *MockBlsConstructor) New() (crypto.Signer, []byte, error) {
|
|
return &MockBlsSigner{}, bytes.Repeat([]byte{0x01}, 74), nil
|
|
}
|
|
|
|
func (m *MockBlsConstructor) FromBytes(privKey, pubKey []byte) (crypto.Signer, error) {
|
|
return &MockBlsSigner{}, nil
|
|
}
|
|
|
|
func (m *MockBlsConstructor) VerifySignatureRaw(pubKey, signature, message, domain []byte) bool {
|
|
return true // Always return true for testing
|
|
}
|
|
|
|
type MockBlsSigner struct{}
|
|
|
|
// Sign implements crypto.Signer.
|
|
func (m *MockBlsSigner) Sign(rand io.Reader, digest []byte, opts gcrypto.SignerOpts) (signature []byte, err error) {
|
|
return bytes.Repeat([]byte{0x03}, 74), nil
|
|
}
|
|
|
|
func (m *MockBlsSigner) GetType() crypto.KeyType {
|
|
return crypto.KeyTypeBLS48581G2
|
|
}
|
|
|
|
func (m *MockBlsSigner) Public() gcrypto.PublicKey {
|
|
return bytes.Repeat([]byte{0x01}, 585)
|
|
}
|
|
|
|
func (m *MockBlsSigner) Private() []byte {
|
|
return bytes.Repeat([]byte{0x02}, 74)
|
|
}
|
|
|
|
func (m *MockBlsSigner) SignWithDomain(message, domain []byte) ([]byte, error) {
|
|
return bytes.Repeat([]byte{0x03}, 74), nil
|
|
}
|