package types
|
|
|
|
import (
|
|
"math"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/tendermint/tendermint/crypto/tmhash"
|
|
tmproto "github.com/tendermint/tendermint/proto/types"
|
|
)
|
|
|
|
var testProposal *Proposal
|
|
|
|
func init() {
|
|
var stamp, err = time.Parse(TimeFormat, "2018-02-11T07:09:22.765Z")
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
testProposal = &Proposal{
|
|
Height: 12345,
|
|
Round: 23456,
|
|
BlockID: BlockID{[]byte{1, 2, 3}, PartSetHeader{111, []byte("blockparts")}},
|
|
POLRound: -1,
|
|
Timestamp: stamp,
|
|
}
|
|
}
|
|
|
|
func TestProposalSignable(t *testing.T) {
|
|
chainID := "test_chain_id"
|
|
signBytes := testProposal.SignBytes(chainID)
|
|
|
|
expected, err := cdc.MarshalBinaryLengthPrefixed(CanonicalizeProposal(chainID, testProposal))
|
|
require.NoError(t, err)
|
|
require.Equal(t, expected, signBytes, "Got unexpected sign bytes for Proposal")
|
|
}
|
|
|
|
func TestProposalString(t *testing.T) {
|
|
str := testProposal.String()
|
|
expected := `Proposal{12345/23456 (010203:111:626C6F636B70, -1) 000000000000 @ 2018-02-11T07:09:22.765Z}`
|
|
if str != expected {
|
|
t.Errorf("got unexpected string for Proposal. Expected:\n%v\nGot:\n%v", expected, str)
|
|
}
|
|
}
|
|
|
|
func TestProposalVerifySignature(t *testing.T) {
|
|
privVal := NewMockPV()
|
|
pubKey, err := privVal.GetPubKey()
|
|
require.NoError(t, err)
|
|
|
|
prop := NewProposal(
|
|
4, 2, 2,
|
|
BlockID{[]byte{1, 2, 3}, PartSetHeader{777, []byte("proper")}})
|
|
signBytes := prop.SignBytes("test_chain_id")
|
|
|
|
// sign it
|
|
err = privVal.SignProposal("test_chain_id", prop)
|
|
require.NoError(t, err)
|
|
|
|
// verify the same proposal
|
|
valid := pubKey.VerifyBytes(signBytes, prop.Signature)
|
|
require.True(t, valid)
|
|
|
|
// serialize, deserialize and verify again....
|
|
newProp := new(Proposal)
|
|
bs, err := cdc.MarshalBinaryLengthPrefixed(prop)
|
|
require.NoError(t, err)
|
|
err = cdc.UnmarshalBinaryLengthPrefixed(bs, &newProp)
|
|
require.NoError(t, err)
|
|
|
|
// verify the transmitted proposal
|
|
newSignBytes := newProp.SignBytes("test_chain_id")
|
|
require.Equal(t, string(signBytes), string(newSignBytes))
|
|
valid = pubKey.VerifyBytes(newSignBytes, newProp.Signature)
|
|
require.True(t, valid)
|
|
}
|
|
|
|
func BenchmarkProposalWriteSignBytes(b *testing.B) {
|
|
for i := 0; i < b.N; i++ {
|
|
testProposal.SignBytes("test_chain_id")
|
|
}
|
|
}
|
|
|
|
func BenchmarkProposalSign(b *testing.B) {
|
|
privVal := NewMockPV()
|
|
for i := 0; i < b.N; i++ {
|
|
err := privVal.SignProposal("test_chain_id", testProposal)
|
|
if err != nil {
|
|
b.Error(err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func BenchmarkProposalVerifySignature(b *testing.B) {
|
|
privVal := NewMockPV()
|
|
err := privVal.SignProposal("test_chain_id", testProposal)
|
|
require.NoError(b, err)
|
|
pubKey, err := privVal.GetPubKey()
|
|
require.NoError(b, err)
|
|
|
|
for i := 0; i < b.N; i++ {
|
|
pubKey.VerifyBytes(testProposal.SignBytes("test_chain_id"), testProposal.Signature)
|
|
}
|
|
}
|
|
|
|
func TestProposalValidateBasic(t *testing.T) {
|
|
|
|
privVal := NewMockPV()
|
|
testCases := []struct {
|
|
testName string
|
|
malleateProposal func(*Proposal)
|
|
expectErr bool
|
|
}{
|
|
{"Good Proposal", func(p *Proposal) {}, false},
|
|
{"Invalid Type", func(p *Proposal) { p.Type = tmproto.PrecommitType }, true},
|
|
{"Invalid Height", func(p *Proposal) { p.Height = -1 }, true},
|
|
{"Invalid Round", func(p *Proposal) { p.Round = -1 }, true},
|
|
{"Invalid POLRound", func(p *Proposal) { p.POLRound = -2 }, true},
|
|
{"Invalid BlockId", func(p *Proposal) {
|
|
p.BlockID = BlockID{[]byte{1, 2, 3}, PartSetHeader{111, []byte("blockparts")}}
|
|
}, true},
|
|
{"Invalid Signature", func(p *Proposal) {
|
|
p.Signature = make([]byte, 0)
|
|
}, true},
|
|
{"Too big Signature", func(p *Proposal) {
|
|
p.Signature = make([]byte, MaxSignatureSize+1)
|
|
}, true},
|
|
}
|
|
blockID := makeBlockID(tmhash.Sum([]byte("blockhash")), math.MaxInt32, tmhash.Sum([]byte("partshash")))
|
|
|
|
for _, tc := range testCases {
|
|
tc := tc
|
|
t.Run(tc.testName, func(t *testing.T) {
|
|
prop := NewProposal(
|
|
4, 2, 2,
|
|
blockID)
|
|
err := privVal.SignProposal("test_chain_id", prop)
|
|
require.NoError(t, err)
|
|
tc.malleateProposal(prop)
|
|
assert.Equal(t, tc.expectErr, prop.ValidateBasic() != nil, "Validate Basic had an unexpected result")
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestProposalProtoBuf(t *testing.T) {
|
|
proposal := NewProposal(1, 2, 3, makeBlockID([]byte("hash"), 2, []byte("part_set_hash")))
|
|
proposal.Signature = []byte("sig")
|
|
proposal2 := NewProposal(1, 2, 3, BlockID{})
|
|
|
|
testCases := []struct {
|
|
msg string
|
|
p1 *Proposal
|
|
expPass bool
|
|
}{
|
|
{"success", proposal, true},
|
|
{"success", proposal2, false}, // blcokID cannot be empty
|
|
{"empty proposal failure validatebasic", &Proposal{}, false},
|
|
{"nil proposal", nil, false},
|
|
}
|
|
for _, tc := range testCases {
|
|
protoProposal := tc.p1.ToProto()
|
|
|
|
p, err := ProposalFromProto(protoProposal)
|
|
if tc.expPass {
|
|
require.NoError(t, err)
|
|
require.Equal(t, tc.p1, p, tc.msg)
|
|
} else {
|
|
require.Error(t, err)
|
|
}
|
|
}
|
|
}
|