mirror of
https://gitlab.com/pulsechaincom/lighthouse-pulse.git
synced 2025-01-16 16:58:47 +00:00
c571afb8d8
* Update hashmap hashset to stable futures * Adds panic test to hashset delay * Port remote_beacon_node to stable futures * Fix lcli merge conflicts * Non rpc stuff compiles * Remove padding * Add error enum, zeroize more things * Fix comment * protocol.rs compiles * Port websockets, timer and notifier to stable futures (#1035) * Fix lcli * Port timer to stable futures * Fix timer * Port websocket_server to stable futures * Port notifier to stable futures * Add TODOS * Port remote_beacon_node to stable futures * Partial eth2-libp2p stable future upgrade * Finished first round of fighting RPC types * Further progress towards porting eth2-libp2p adds caching to discovery * Update behaviour * Add keystore builder * Remove keystore stuff from val client * Add more tests, comments * RPC handler to stable futures * Update RPC to master libp2p * Add more comments, test vectors * Network service additions * Progress on improving JSON validation * More JSON verification * Start moving JSON into own mod * Remove old code * Add more tests, reader/writers * Tidy * Move keystore into own file * Move more logic into keystore file * Tidy * Tidy * Fix the fallback transport construction (#1102) * Allow for odd-character hex * Correct warning * Remove hashmap delay * Compiling version of eth2-libp2p * Update all crates versions * Fix conversion function and add tests (#1113) * Add more json missing field checks * Use scrypt by default * Tidy, address comments * Test path and uuid in vectors * Fix comment * Add checks for kdf params * Enforce empty kdf message * Port validator_client to stable futures (#1114) * Add PH & MS slot clock changes * Account for genesis time * Add progress on duties refactor * Add simple is_aggregator bool to val subscription * Start work on attestation_verification.rs * Add progress on ObservedAttestations * Progress with ObservedAttestations * Fix tests * Add observed attestations to the beacon chain * Add attestation observation to processing code * Add progress on attestation verification * Add first draft of ObservedAttesters * Add more tests * Add observed attesters to beacon chain * Add observers to attestation processing * Add more attestation verification * Create ObservedAggregators map * Remove commented-out code * Add observed aggregators into chain * Add progress * Finish adding features to attestation verification * Ensure beacon chain compiles * Link attn verification into chain * Integrate new attn verification in chain * Remove old attestation processing code * Start trying to fix beacon_chain tests * Split adding into pools into two functions * Add aggregation to harness * Get test harness working again * Adjust the number of aggregators for test harness * Fix edge-case in harness * Integrate new attn processing in network * Fix compile bug in validator_client * Update validator API endpoints * Fix aggreagation in test harness * Fix enum thing * Fix attestation observation bug: * Patch failing API tests * Start adding comments to attestation verification * Remove unused attestation field * Unify "is block known" logic * Update comments * Supress fork choice errors for network processing * Add todos * Tidy * Add gossip attn tests * Disallow test harness to produce old attns * Comment out in-progress tests * Partially address pruning tests * Fix failing store test * Add aggregate tests * Add comments about which spec conditions we check * Dont re-aggregate * Split apart test harness attn production * Fix compile error in network * Make progress on commented-out test * Fix skipping attestation test * Add fork choice verification tests * Tidy attn tests, remove dead code * Remove some accidentally added code * Fix clippy lint * Rename test file * Add block tests, add cheap block proposer check * Rename block testing file * Add observed_block_producers * Tidy * Switch around block signature verification * Finish block testing * Remove gossip from signature tests * First pass of self review * Fix deviation in spec * Update test spec tags * Start moving over to hashset * Finish moving observed attesters to hashmap * Move aggregation pool over to hashmap * Make fc attn borrow again * Fix rest_api compile error * Fix missing comments * Fix monster test * Uncomment increasing slots test * Address remaining comments * Remove unsafe, use cfg test * Remove cfg test flag * Fix dodgy comment * Revert "Update hashmap hashset to stable futures" This reverts commit d432378a3cc5cd67fc29c0b15b96b886c1323554. * Revert "Adds panic test to hashset delay" This reverts commit 281502396fc5b90d9c421a309c2c056982c9525b. * Ported attestation_service * Ported duties_service * Ported fork_service * More ports * Port block_service * Minor fixes * VC compiles * Update TODOS * Borrow self where possible * Ignore aggregates that are already known. * Unify aggregator modulo logic * Fix typo in logs * Refactor validator subscription logic * Avoid reproducing selection proof * Skip HTTP call if no subscriptions * Rename DutyAndState -> DutyAndProof * Tidy logs * Print root as dbg * Fix compile errors in tests * Fix compile error in test * Re-Fix attestation and duties service * Minor fixes Co-authored-by: Paul Hauner <paul@paulhauner.com> * Expose json_keystore mod * First commits on path derivation * Progress with implementation * More progress * Passing intermediate test vectors * Tidy, add comments * Add DerivedKey structs * Move key derivation into own crate * Add zeroize structs * Return error for empty seed * Add tests * Tidy * First commits on path derivation * Progress with implementation * Move key derivation into own crate * Start defining JSON wallet * Add progress * Split out encrypt/decrypt * First commits on path derivation * Progress with implementation * More progress * Passing intermediate test vectors * Tidy, add comments * Add DerivedKey structs * Move key derivation into own crate * Add zeroize structs * Return error for empty seed * Add tests * Tidy * Add progress * Replace some password usage with slice * First commits on path derivation * Progress with implementation * More progress * Passing intermediate test vectors * Tidy, add comments * Add DerivedKey structs * Move key derivation into own crate * Add zeroize structs * Return error for empty seed * Add tests * Tidy * Add progress * Expose PlainText struct * First commits on path derivation * Progress with implementation * More progress * Passing intermediate test vectors * Tidy, add comments * Add DerivedKey structs * Move key derivation into own crate * Add zeroize structs * Return error for empty seed * Add tests * Tidy * Add builder * Expose consts, remove Password * Minor progress * Expose SALT_SIZE * First compiling version * Add test vectors * Network crate update to stable futures * Move dbg assert statement * Port account_manager to stable futures (#1121) * Port account_manager to stable futures * Run async fns in tokio environment * Port rest_api crate to stable futures (#1118) * Port rest_api lib to stable futures * Reduce tokio features * Update notifier to stable futures * Builder update * Further updates * Add mnemonic, tidy * Convert self referential async functions * Tidy * Add testing * Add first attempt at validator_dir * Present pubkey field * stable futures fixes (#1124) * Fix eth1 update functions * Fix genesis and client * Fix beacon node lib * Return appropriate runtimes from environment * Fix test rig * Refactor eth1 service update * Upgrade simulator to stable futures * Lighthouse compiles on stable futures * Add first pass of wallet manager * Progress with CLI * Remove println debugging statement * Tidy output * Tidy 600 perms * Update libp2p service, start rpc test upgrade * Add validator creation flow * Update network crate for new libp2p * Start tidying, adding comments * Update tokio::codec to futures_codec (#1128) * Further work towards RPC corrections * Correct http timeout and network service select * Add wallet mgr testing * Shift LockedWallet into own file * Add comments to fs * Start integration into VC * Use tokio runtime for libp2p * Revert "Update tokio::codec to futures_codec (#1128)" This reverts commit e57aea924acf5cbabdcea18895ac07e38a425ed7. * Upgrade RPC libp2p tests * Upgrade secio fallback test * Add lcli keypair upgrade command * Upgrade gossipsub examples * Clean up RPC protocol * Test fixes (#1133) * Correct websocket timeout and run on os thread * Fix network test * Add --secrets-dir to VC * Remove --legacy-keys from VC * Clean up PR * Correct tokio tcp move attestation service tests * Upgrade attestation service tests * Fix sim * Correct network test * Correct genesis test * Start docs * Add progress for validator generation * Tidy error messages * Test corrections * Log info when block is received * Modify logs and update attester service events * Stable futures: fixes to vc, eth1 and account manager (#1142) * Add local testnet scripts * Remove whiteblock script * Rename local testnet script * Move spawns onto handle * Fix VC panic * Initial fix to block production issue * Tidy block producer fix * Tidy further * Add local testnet clean script * Run cargo fmt * Tidy duties service * Tidy fork service * Tidy ForkService * Tidy AttestationService * Tidy notifier * Ensure await is not suppressed in eth1 * Ensure await is not suppressed in account_manager * Use .ok() instead of .unwrap_or(()) * RPC decoding test for proto * Update discv5 and eth2-libp2p deps * Run cargo fmt * Pre-build keystores for sim * Fix lcli double runtime issue (#1144) * Handle stream termination and dialing peer errors * Correct peer_info variant types * Add progress on new deposit flow * Remove unnecessary warnings * Handle subnet unsubscription removal and improve logigng * Add logs around ping * Upgrade discv5 and improve logging * Handle peer connection status for multiple connections * Improve network service logging * Add more incomplete progress * Improve logging around peer manager * Upgrade swarm poll centralise peer management * Identify clients on error * Fix `remove_peer` in sync (#1150) * remove_peer removes from all chains * Remove logs * Fix early return from loop * Improved logging, fix panic * Partially correct tests * Add deposit command * Remove old validator directory * Start adding AM tests * Stable futures: Vc sync (#1149) * Improve syncing heuristic * Add comments * Use safer method for tolerance * Fix tests * Binary testing progress * Progress with CLI tests * Use constants for flags * More account manager testing * Improve CLI tests * Move upgrade-legacy-keypairs into account man * Use rayon for VC key generation * Add comments to `validator_dir` * Add testing to validator_dir * Add fix to eth1-sim * Check errors in eth1-sim * Fix mutability issue * Ensure password file ends in .pass * Add more tests to wallet manager * Tidy deposit * Tidy account manager * Tidy account manager * Remove panic * Generate keypairs earlier in sim * Tidy eth1-sime * Try to fix eth1 sim * Address review comments * Fix typo in CLI command * Update docs * Disable eth1 sim * Remove eth1 sim completely Co-authored-by: Age Manning <Age@AgeManning.com> Co-authored-by: pawanjay176 <pawandhananjay@gmail.com>
421 lines
12 KiB
Rust
421 lines
12 KiB
Rust
#![cfg(not(debug_assertions))]
|
|
|
|
use account_manager::{
|
|
upgrade_legacy_keypairs::{CMD as UPGRADE_CMD, *},
|
|
validator::{create::*, CMD as VALIDATOR_CMD},
|
|
wallet::{
|
|
create::{CMD as CREATE_CMD, *},
|
|
list::CMD as LIST_CMD,
|
|
CMD as WALLET_CMD,
|
|
},
|
|
BASE_DIR_FLAG, CMD as ACCOUNT_CMD, *,
|
|
};
|
|
use std::env;
|
|
use std::fs;
|
|
use std::path::{Path, PathBuf};
|
|
use std::process::{Command, Output};
|
|
use std::str::from_utf8;
|
|
use tempfile::{tempdir, TempDir};
|
|
use types::Keypair;
|
|
use validator_dir::ValidatorDir;
|
|
|
|
// TODO: create tests for the `lighthouse account validator deposit` command. This involves getting
|
|
// access to an IPC endpoint during testing or adding support for deposit submission via HTTP and
|
|
// using ganache-cli.
|
|
|
|
/// Returns the `lighthouse account` command.
|
|
fn account_cmd() -> Command {
|
|
let target_dir = env!("CARGO_BIN_EXE_lighthouse");
|
|
let path = target_dir
|
|
.parse::<PathBuf>()
|
|
.expect("should parse CARGO_TARGET_DIR");
|
|
|
|
let mut cmd = Command::new(path);
|
|
cmd.arg(ACCOUNT_CMD);
|
|
cmd
|
|
}
|
|
|
|
/// Returns the `lighthouse account wallet` command.
|
|
fn wallet_cmd() -> Command {
|
|
let mut cmd = account_cmd();
|
|
cmd.arg(WALLET_CMD);
|
|
cmd
|
|
}
|
|
|
|
/// Executes a `Command`, returning a `Result` based upon the success exit code of the command.
|
|
fn output_result(cmd: &mut Command) -> Result<Output, String> {
|
|
let output = cmd.output().expect("should run command");
|
|
|
|
if output.status.success() {
|
|
Ok(output)
|
|
} else {
|
|
Err(from_utf8(&output.stderr)
|
|
.expect("stderr is not utf8")
|
|
.to_string())
|
|
}
|
|
}
|
|
|
|
/// Returns the number of nodes in a directory.
|
|
fn dir_child_count<P: AsRef<Path>>(dir: P) -> usize {
|
|
fs::read_dir(dir).expect("should read dir").count()
|
|
}
|
|
|
|
/// Uses `lighthouse account wallet list` to list all wallets.
|
|
fn list_wallets<P: AsRef<Path>>(base_dir: P) -> Vec<String> {
|
|
let output = output_result(
|
|
wallet_cmd()
|
|
.arg(format!("--{}", BASE_DIR_FLAG))
|
|
.arg(base_dir.as_ref().as_os_str())
|
|
.arg(LIST_CMD),
|
|
)
|
|
.unwrap();
|
|
let stdout = from_utf8(&output.stdout)
|
|
.expect("stdout is not utf8")
|
|
.to_string();
|
|
|
|
stdout[..stdout.len() - 1]
|
|
.split("\n")
|
|
.map(Into::into)
|
|
.collect()
|
|
}
|
|
|
|
/// Create a wallet using the lighthouse CLI.
|
|
fn create_wallet<P: AsRef<Path>>(
|
|
name: &str,
|
|
base_dir: P,
|
|
password: P,
|
|
mnemonic: P,
|
|
) -> Result<Output, String> {
|
|
output_result(
|
|
wallet_cmd()
|
|
.arg(format!("--{}", BASE_DIR_FLAG))
|
|
.arg(base_dir.as_ref().as_os_str())
|
|
.arg(CREATE_CMD)
|
|
.arg(format!("--{}", NAME_FLAG))
|
|
.arg(&name)
|
|
.arg(format!("--{}", PASSPHRASE_FLAG))
|
|
.arg(password.as_ref().as_os_str())
|
|
.arg(format!("--{}", MNEMONIC_FLAG))
|
|
.arg(mnemonic.as_ref().as_os_str()),
|
|
)
|
|
}
|
|
|
|
/// Helper struct for testing wallets.
|
|
struct TestWallet {
|
|
base_dir: PathBuf,
|
|
password_dir: TempDir,
|
|
mnemonic_dir: TempDir,
|
|
name: String,
|
|
}
|
|
|
|
impl TestWallet {
|
|
/// Creates a new wallet tester, without _actually_ creating it via the CLI.
|
|
pub fn new<P: AsRef<Path>>(base_dir: P, name: &str) -> Self {
|
|
Self {
|
|
base_dir: base_dir.as_ref().into(),
|
|
password_dir: tempdir().unwrap(),
|
|
mnemonic_dir: tempdir().unwrap(),
|
|
name: name.into(),
|
|
}
|
|
}
|
|
|
|
pub fn base_dir(&self) -> PathBuf {
|
|
self.base_dir.clone()
|
|
}
|
|
|
|
pub fn password_path(&self) -> PathBuf {
|
|
self.password_dir.path().join("password.pass")
|
|
}
|
|
|
|
pub fn mnemonic_path(&self) -> PathBuf {
|
|
self.mnemonic_dir.path().join("mnemonic")
|
|
}
|
|
|
|
/// Actually create the wallet using the lighthouse CLI.
|
|
pub fn create(&self) -> Result<Output, String> {
|
|
create_wallet(
|
|
&self.name,
|
|
self.base_dir(),
|
|
self.password_path(),
|
|
self.mnemonic_path(),
|
|
)
|
|
}
|
|
|
|
/// Create a wallet, expecting it to succeed.
|
|
pub fn create_expect_success(&self) {
|
|
self.create().unwrap();
|
|
assert!(self.password_path().exists(), "{} password", self.name);
|
|
assert!(self.mnemonic_path().exists(), "{} mnemonic", self.name);
|
|
assert!(list_wallets(self.base_dir()).contains(&self.name));
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn without_pass_extension() {
|
|
let base_dir = tempdir().unwrap();
|
|
let password_dir = tempdir().unwrap();
|
|
let mnemonic_dir = tempdir().unwrap();
|
|
|
|
let err = create_wallet(
|
|
"bad_extension",
|
|
base_dir.path(),
|
|
&password_dir.path().join("password"),
|
|
&mnemonic_dir.path().join("mnemonic"),
|
|
)
|
|
.unwrap_err();
|
|
|
|
assert!(err.contains("ends in .pass"));
|
|
}
|
|
|
|
#[test]
|
|
fn wallet_create_and_list() {
|
|
let base_temp_dir = tempdir().unwrap();
|
|
let base_dir: PathBuf = base_temp_dir.path().into();
|
|
|
|
let wally = TestWallet::new(&base_dir, "wally");
|
|
|
|
assert_eq!(dir_child_count(&base_dir), 0);
|
|
|
|
wally.create_expect_success();
|
|
|
|
assert_eq!(dir_child_count(&base_dir), 1);
|
|
assert!(wally.password_path().exists());
|
|
assert!(wally.mnemonic_path().exists());
|
|
|
|
// Should not create a wallet with a duplicate name.
|
|
wally.create().unwrap_err();
|
|
|
|
assert_eq!(list_wallets(wally.base_dir()).len(), 1);
|
|
|
|
let wally2 = TestWallet::new(&base_dir, "wally2");
|
|
wally2.create_expect_success();
|
|
|
|
assert_eq!(list_wallets(wally.base_dir()).len(), 2);
|
|
}
|
|
|
|
/// Returns the `lighthouse account wallet` command.
|
|
fn validator_cmd() -> Command {
|
|
let mut cmd = account_cmd();
|
|
cmd.arg(VALIDATOR_CMD);
|
|
cmd
|
|
}
|
|
|
|
/// Helper struct for testing wallets.
|
|
struct TestValidator {
|
|
wallet: TestWallet,
|
|
validator_dir: PathBuf,
|
|
secrets_dir: PathBuf,
|
|
}
|
|
|
|
impl TestValidator {
|
|
pub fn new<P: AsRef<Path>>(validator_dir: P, secrets_dir: P, wallet: TestWallet) -> Self {
|
|
Self {
|
|
wallet,
|
|
validator_dir: validator_dir.as_ref().into(),
|
|
secrets_dir: secrets_dir.as_ref().into(),
|
|
}
|
|
}
|
|
|
|
/// Create validators, returning a list of validator pubkeys on success.
|
|
pub fn create(
|
|
&self,
|
|
quantity_flag: &str,
|
|
quantity: usize,
|
|
store_withdrawal_key: bool,
|
|
) -> Result<Vec<String>, String> {
|
|
let mut cmd = validator_cmd();
|
|
cmd.arg(format!("--{}", BASE_DIR_FLAG))
|
|
.arg(self.wallet.base_dir().into_os_string())
|
|
.arg(CREATE_CMD)
|
|
.arg(format!("--{}", WALLET_NAME_FLAG))
|
|
.arg(&self.wallet.name)
|
|
.arg(format!("--{}", WALLET_PASSPHRASE_FLAG))
|
|
.arg(self.wallet.password_path().into_os_string())
|
|
.arg(format!("--{}", VALIDATOR_DIR_FLAG))
|
|
.arg(self.validator_dir.clone().into_os_string())
|
|
.arg(format!("--{}", SECRETS_DIR_FLAG))
|
|
.arg(self.secrets_dir.clone().into_os_string())
|
|
.arg(format!("--{}", DEPOSIT_GWEI_FLAG))
|
|
.arg("32000000000")
|
|
.arg(format!("--{}", quantity_flag))
|
|
.arg(format!("{}", quantity));
|
|
|
|
let output = if store_withdrawal_key {
|
|
output_result(cmd.arg(format!("--{}", STORE_WITHDRAW_FLAG))).unwrap()
|
|
} else {
|
|
output_result(&mut cmd).unwrap()
|
|
};
|
|
|
|
let stdout = from_utf8(&output.stdout)
|
|
.expect("stdout is not utf8")
|
|
.to_string();
|
|
|
|
if stdout == "" {
|
|
return Ok(vec![]);
|
|
}
|
|
|
|
let pubkeys = stdout[..stdout.len() - 1]
|
|
.split("\n")
|
|
.map(|line| {
|
|
let tab = line.find("\t").expect("line must have tab");
|
|
let (_, pubkey) = line.split_at(tab + 1);
|
|
pubkey.to_string()
|
|
})
|
|
.collect::<Vec<_>>();
|
|
|
|
Ok(pubkeys)
|
|
}
|
|
|
|
/// Create a validators, expecting success.
|
|
pub fn create_expect_success(
|
|
&self,
|
|
quantity_flag: &str,
|
|
quantity: usize,
|
|
store_withdrawal_key: bool,
|
|
) -> Vec<ValidatorDir> {
|
|
let pubkeys = self
|
|
.create(quantity_flag, quantity, store_withdrawal_key)
|
|
.unwrap();
|
|
|
|
pubkeys
|
|
.into_iter()
|
|
.map(|pk| {
|
|
// Password should have been created.
|
|
assert!(self.secrets_dir.join(&pk).exists(), "password exists");
|
|
|
|
// Should have created a validator directory.
|
|
let dir = ValidatorDir::open(self.validator_dir.join(&pk))
|
|
.expect("should open validator dir");
|
|
|
|
// Validator dir should have a voting keypair.
|
|
let voting_keypair = dir.voting_keypair(&self.secrets_dir).unwrap();
|
|
|
|
// Validator dir should *not* have a withdrawal keypair.
|
|
let withdrawal_result = dir.withdrawal_keypair(&self.secrets_dir);
|
|
if store_withdrawal_key {
|
|
let withdrawal_keypair = withdrawal_result.unwrap();
|
|
assert_ne!(voting_keypair.pk, withdrawal_keypair.pk);
|
|
} else {
|
|
withdrawal_result.unwrap_err();
|
|
}
|
|
|
|
// Deposit tx file should not exist yet.
|
|
assert!(!dir.eth1_deposit_tx_hash_exists(), "deposit tx");
|
|
|
|
// Should have created a valid deposit data file.
|
|
dir.eth1_deposit_data().unwrap().unwrap();
|
|
dir
|
|
})
|
|
.collect()
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn validator_create() {
|
|
let base_dir = tempdir().unwrap();
|
|
let validator_dir = tempdir().unwrap();
|
|
let secrets_dir = tempdir().unwrap();
|
|
|
|
let wallet = TestWallet::new(base_dir.path(), "wally");
|
|
wallet.create_expect_success();
|
|
|
|
assert_eq!(dir_child_count(validator_dir.path()), 0);
|
|
|
|
let validator = TestValidator::new(validator_dir.path(), secrets_dir.path(), wallet);
|
|
|
|
// Create a validator _without_ storing the withdraw key.
|
|
validator.create_expect_success(COUNT_FLAG, 1, false);
|
|
|
|
assert_eq!(dir_child_count(validator_dir.path()), 1);
|
|
|
|
// Create a validator storing the withdraw key.
|
|
validator.create_expect_success(COUNT_FLAG, 1, true);
|
|
|
|
assert_eq!(dir_child_count(validator_dir.path()), 2);
|
|
|
|
// Use the at-most flag with less validators then are in the directory.
|
|
assert_eq!(
|
|
validator.create_expect_success(AT_MOST_FLAG, 1, true).len(),
|
|
0
|
|
);
|
|
|
|
assert_eq!(dir_child_count(validator_dir.path()), 2);
|
|
|
|
// Use the at-most flag with the same number of validators that are in the directory.
|
|
assert_eq!(
|
|
validator.create_expect_success(AT_MOST_FLAG, 2, true).len(),
|
|
0
|
|
);
|
|
|
|
assert_eq!(dir_child_count(validator_dir.path()), 2);
|
|
|
|
// Use the at-most flag with two more number of validators than are in the directory.
|
|
assert_eq!(
|
|
validator.create_expect_success(AT_MOST_FLAG, 4, true).len(),
|
|
2
|
|
);
|
|
|
|
assert_eq!(dir_child_count(validator_dir.path()), 4);
|
|
|
|
// Create multiple validators with the count flag.
|
|
assert_eq!(
|
|
validator.create_expect_success(COUNT_FLAG, 2, true).len(),
|
|
2
|
|
);
|
|
|
|
assert_eq!(dir_child_count(validator_dir.path()), 6);
|
|
}
|
|
|
|
fn write_legacy_keypair<P: AsRef<Path>>(name: &str, dir: P) -> Keypair {
|
|
let keypair = Keypair::random();
|
|
|
|
let mut keypair_bytes = keypair.pk.as_bytes();
|
|
keypair_bytes.extend_from_slice(&keypair.sk.as_raw().as_bytes());
|
|
|
|
fs::write(dir.as_ref().join(name), &keypair_bytes).unwrap();
|
|
|
|
keypair
|
|
}
|
|
|
|
#[test]
|
|
fn upgrade_legacy_keypairs() {
|
|
let validators_dir = tempdir().unwrap();
|
|
let secrets_dir = tempdir().unwrap();
|
|
|
|
let validators = (0..2)
|
|
.into_iter()
|
|
.map(|i| {
|
|
let validator_dir = validators_dir.path().join(format!("myval{}", i));
|
|
|
|
fs::create_dir_all(&validator_dir).unwrap();
|
|
|
|
let voting_keypair = write_legacy_keypair(VOTING_KEYPAIR_FILE, &validator_dir);
|
|
let withdrawal_keypair = write_legacy_keypair(WITHDRAWAL_KEYPAIR_FILE, &validator_dir);
|
|
|
|
(validator_dir, voting_keypair, withdrawal_keypair)
|
|
})
|
|
.collect::<Vec<_>>();
|
|
|
|
account_cmd()
|
|
.arg(UPGRADE_CMD)
|
|
.arg(format!("--{}", VALIDATOR_DIR_FLAG))
|
|
.arg(validators_dir.path().as_os_str())
|
|
.arg(format!("--{}", SECRETS_DIR_FLAG))
|
|
.arg(secrets_dir.path().as_os_str())
|
|
.output()
|
|
.unwrap();
|
|
|
|
for (validator_dir, voting_keypair, withdrawal_keypair) in validators {
|
|
let dir = ValidatorDir::open(&validator_dir).unwrap();
|
|
|
|
assert_eq!(
|
|
voting_keypair,
|
|
dir.voting_keypair(secrets_dir.path()).unwrap()
|
|
);
|
|
assert_eq!(
|
|
withdrawal_keypair,
|
|
dir.withdrawal_keypair(secrets_dir.path()).unwrap()
|
|
);
|
|
}
|
|
}
|