mirror of
https://gitlab.com/pulsechaincom/lighthouse-pulse.git
synced 2024-12-22 11:41:28 +00:00
7bec3f9b59
* Optional slashing protection for remote keys * Merge remote-tracking branch 'origin/unstable' into disable-slashing-protection-web3signer * Start writing tests * Merge remote-tracking branch 'origin/unstable' into disable-slashing-protection-web3signer * Merge remote-tracking branch 'michael/disable-slashing-protection-web3signer' into disable-slashing-protection-web3signer * Make half-written tests compile * Make tests work * Update help text * Update book CLI text * Merge remote-tracking branch 'origin/unstable' into disable-slashing-protection-web3signer * More logging & CLI tests * CLI tweaks
656 lines
19 KiB
Rust
656 lines
19 KiB
Rust
use validator_client::{ApiTopic, Config};
|
|
|
|
use crate::exec::CommandLineTestExec;
|
|
use bls::{Keypair, PublicKeyBytes};
|
|
use std::fs::File;
|
|
use std::io::Write;
|
|
use std::net::IpAddr;
|
|
use std::path::PathBuf;
|
|
use std::process::Command;
|
|
use std::str::FromStr;
|
|
use std::string::ToString;
|
|
use tempfile::TempDir;
|
|
use types::Address;
|
|
|
|
/// Returns the `lighthouse validator_client` command.
|
|
fn base_cmd() -> Command {
|
|
let lighthouse_bin = env!("CARGO_BIN_EXE_lighthouse");
|
|
let path = lighthouse_bin
|
|
.parse::<PathBuf>()
|
|
.expect("should parse CARGO_TARGET_DIR");
|
|
|
|
let mut cmd = Command::new(path);
|
|
cmd.arg("validator_client");
|
|
cmd
|
|
}
|
|
|
|
// Wrapper around `Command` for easier Command Line Testing.
|
|
struct CommandLineTest {
|
|
cmd: Command,
|
|
}
|
|
impl CommandLineTest {
|
|
fn new() -> CommandLineTest {
|
|
let base_cmd = base_cmd();
|
|
CommandLineTest { cmd: base_cmd }
|
|
}
|
|
}
|
|
|
|
impl CommandLineTestExec for CommandLineTest {
|
|
type Config = Config;
|
|
|
|
fn cmd_mut(&mut self) -> &mut Command {
|
|
&mut self.cmd
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn datadir_flag() {
|
|
CommandLineTest::new()
|
|
.run()
|
|
.with_config_and_dir(|config, dir| {
|
|
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn validators_and_secrets_dir_flags() {
|
|
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
CommandLineTest::new()
|
|
.flag("validators-dir", dir.path().join("validators").to_str())
|
|
.flag("secrets-dir", dir.path().join("secrets").to_str())
|
|
.run_with_no_datadir()
|
|
.with_config(|config| {
|
|
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn validators_dir_alias_flags() {
|
|
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
CommandLineTest::new()
|
|
.flag("validator-dir", dir.path().join("validators").to_str())
|
|
.flag("secrets-dir", dir.path().join("secrets").to_str())
|
|
.run_with_no_datadir()
|
|
.with_config(|config| {
|
|
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn beacon_nodes_flag() {
|
|
CommandLineTest::new()
|
|
.flag(
|
|
"beacon-nodes",
|
|
Some("http://localhost:1001,https://project:secret@infura.io/"),
|
|
)
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(
|
|
config.beacon_nodes[0].full.to_string(),
|
|
"http://localhost:1001/"
|
|
);
|
|
assert_eq!(config.beacon_nodes[0].to_string(), "http://localhost:1001/");
|
|
assert_eq!(
|
|
config.beacon_nodes[1].full.to_string(),
|
|
"https://project:secret@infura.io/"
|
|
);
|
|
assert_eq!(config.beacon_nodes[1].to_string(), "https://infura.io/");
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn disable_auto_discover_flag() {
|
|
CommandLineTest::new()
|
|
.flag("disable-auto-discover", None)
|
|
.run()
|
|
.with_config(|config| assert!(config.disable_auto_discover));
|
|
}
|
|
|
|
#[test]
|
|
fn init_slashing_protections_flag() {
|
|
CommandLineTest::new()
|
|
.flag("init-slashing-protection", None)
|
|
.run()
|
|
.with_config(|config| assert!(config.init_slashing_protection));
|
|
}
|
|
|
|
#[test]
|
|
fn use_long_timeouts_flag() {
|
|
CommandLineTest::new()
|
|
.flag("use-long-timeouts", None)
|
|
.run()
|
|
.with_config(|config| assert!(config.use_long_timeouts));
|
|
}
|
|
|
|
#[test]
|
|
fn beacon_nodes_tls_certs_flag() {
|
|
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
CommandLineTest::new()
|
|
.flag(
|
|
"beacon-nodes-tls-certs",
|
|
Some(
|
|
vec![
|
|
dir.path().join("certificate.crt").to_str().unwrap(),
|
|
dir.path().join("certificate2.crt").to_str().unwrap(),
|
|
]
|
|
.join(",")
|
|
.as_str(),
|
|
),
|
|
)
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(
|
|
config.beacon_nodes_tls_certs,
|
|
Some(vec![
|
|
dir.path().join("certificate.crt"),
|
|
dir.path().join("certificate2.crt")
|
|
])
|
|
)
|
|
});
|
|
}
|
|
|
|
// Tests for Graffiti flags.
|
|
#[test]
|
|
fn graffiti_flag() {
|
|
CommandLineTest::new()
|
|
.flag("graffiti", Some("nice-graffiti"))
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(
|
|
config.graffiti.unwrap().to_string(),
|
|
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
)
|
|
});
|
|
}
|
|
#[test]
|
|
fn graffiti_file_flag() {
|
|
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
let mut file = File::create(dir.path().join("graffiti.txt")).expect("Unable to create file");
|
|
let new_key = Keypair::random();
|
|
let pubkeybytes = PublicKeyBytes::from(new_key.pk);
|
|
let contents = "default:nice-graffiti";
|
|
file.write_all(contents.as_bytes())
|
|
.expect("Unable to write to file");
|
|
CommandLineTest::new()
|
|
.flag(
|
|
"graffiti-file",
|
|
dir.path().join("graffiti.txt").as_os_str().to_str(),
|
|
)
|
|
.run()
|
|
.with_config(|config| {
|
|
// Public key not present so load default.
|
|
assert_eq!(
|
|
config
|
|
.graffiti_file
|
|
.clone()
|
|
.unwrap()
|
|
.load_graffiti(&pubkeybytes)
|
|
.unwrap()
|
|
.unwrap()
|
|
.to_string(),
|
|
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
)
|
|
});
|
|
}
|
|
#[test]
|
|
fn graffiti_file_with_pk_flag() {
|
|
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
let mut file = File::create(dir.path().join("graffiti.txt")).expect("Unable to create file");
|
|
let new_key = Keypair::random();
|
|
let pubkeybytes = PublicKeyBytes::from(new_key.pk);
|
|
let contents = format!("{}:nice-graffiti", pubkeybytes.to_string());
|
|
file.write_all(contents.as_bytes())
|
|
.expect("Unable to write to file");
|
|
CommandLineTest::new()
|
|
.flag(
|
|
"graffiti-file",
|
|
dir.path().join("graffiti.txt").as_os_str().to_str(),
|
|
)
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(
|
|
config
|
|
.graffiti_file
|
|
.clone()
|
|
.unwrap()
|
|
.load_graffiti(&pubkeybytes)
|
|
.unwrap()
|
|
.unwrap()
|
|
.to_string(),
|
|
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
)
|
|
});
|
|
}
|
|
|
|
// Tests for suggested-fee-recipient flags.
|
|
#[test]
|
|
fn fee_recipient_flag() {
|
|
CommandLineTest::new()
|
|
.flag(
|
|
"suggested-fee-recipient",
|
|
Some("0x00000000219ab540356cbb839cbe05303d7705fa"),
|
|
)
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(
|
|
config.fee_recipient,
|
|
Some(Address::from_str("0x00000000219ab540356cbb839cbe05303d7705fa").unwrap())
|
|
)
|
|
});
|
|
}
|
|
|
|
// Tests for HTTP flags.
|
|
#[test]
|
|
fn http_flag() {
|
|
CommandLineTest::new()
|
|
.flag("http", None)
|
|
.run()
|
|
.with_config(|config| assert!(config.http_api.enabled));
|
|
}
|
|
#[test]
|
|
fn http_address_flag() {
|
|
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
CommandLineTest::new()
|
|
.flag("http", None)
|
|
.flag("http-address", Some("127.0.0.99"))
|
|
.flag("unencrypted-http-transport", None)
|
|
.run()
|
|
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
}
|
|
#[test]
|
|
fn http_address_ipv6_flag() {
|
|
let addr = "::1".parse::<IpAddr>().unwrap();
|
|
CommandLineTest::new()
|
|
.flag("http", None)
|
|
.flag("http-address", Some("::1"))
|
|
.flag("unencrypted-http-transport", None)
|
|
.run()
|
|
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
}
|
|
#[test]
|
|
#[should_panic]
|
|
fn missing_unencrypted_http_transport_flag() {
|
|
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
CommandLineTest::new()
|
|
.flag("http", None)
|
|
.flag("http-address", Some("127.0.0.99"))
|
|
.run()
|
|
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
}
|
|
#[test]
|
|
fn http_port_flag() {
|
|
CommandLineTest::new()
|
|
.flag("http", None)
|
|
.flag("http-port", Some("9090"))
|
|
.run()
|
|
.with_config(|config| assert_eq!(config.http_api.listen_port, 9090));
|
|
}
|
|
#[test]
|
|
fn http_allow_origin_flag() {
|
|
CommandLineTest::new()
|
|
.flag("http", None)
|
|
.flag("http-allow-origin", Some("http://localhost:9009"))
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(
|
|
config.http_api.allow_origin,
|
|
Some("http://localhost:9009".to_string())
|
|
);
|
|
});
|
|
}
|
|
#[test]
|
|
fn http_allow_origin_all_flag() {
|
|
CommandLineTest::new()
|
|
.flag("http", None)
|
|
.flag("http-allow-origin", Some("*"))
|
|
.run()
|
|
.with_config(|config| assert_eq!(config.http_api.allow_origin, Some("*".to_string())));
|
|
}
|
|
#[test]
|
|
fn http_allow_keystore_export_default() {
|
|
CommandLineTest::new()
|
|
.flag("http", None)
|
|
.run()
|
|
.with_config(|config| assert!(!config.http_api.allow_keystore_export));
|
|
}
|
|
#[test]
|
|
fn http_allow_keystore_export_present() {
|
|
CommandLineTest::new()
|
|
.flag("http", None)
|
|
.flag("http-allow-keystore-export", None)
|
|
.run()
|
|
.with_config(|config| assert!(config.http_api.allow_keystore_export));
|
|
}
|
|
#[test]
|
|
fn http_store_keystore_passwords_in_secrets_dir_default() {
|
|
CommandLineTest::new()
|
|
.flag("http", None)
|
|
.run()
|
|
.with_config(|config| assert!(!config.http_api.store_passwords_in_secrets_dir));
|
|
}
|
|
#[test]
|
|
fn http_store_keystore_passwords_in_secrets_dir_present() {
|
|
CommandLineTest::new()
|
|
.flag("http", None)
|
|
.flag("http-store-passwords-in-secrets-dir", None)
|
|
.run()
|
|
.with_config(|config| assert!(config.http_api.store_passwords_in_secrets_dir));
|
|
}
|
|
|
|
// Tests for Metrics flags.
|
|
#[test]
|
|
fn metrics_flag() {
|
|
CommandLineTest::new()
|
|
.flag("metrics", None)
|
|
.run()
|
|
.with_config(|config| assert!(config.http_metrics.enabled));
|
|
}
|
|
#[test]
|
|
fn metrics_address_flag() {
|
|
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
CommandLineTest::new()
|
|
.flag("metrics", None)
|
|
.flag("metrics-address", Some("127.0.0.99"))
|
|
.run()
|
|
.with_config(|config| assert_eq!(config.http_metrics.listen_addr, addr));
|
|
}
|
|
#[test]
|
|
fn metrics_address_ipv6_flag() {
|
|
let addr = "::1".parse::<IpAddr>().unwrap();
|
|
CommandLineTest::new()
|
|
.flag("metrics", None)
|
|
.flag("metrics-address", Some("::1"))
|
|
.run()
|
|
.with_config(|config| assert_eq!(config.http_metrics.listen_addr, addr));
|
|
}
|
|
#[test]
|
|
fn metrics_port_flag() {
|
|
CommandLineTest::new()
|
|
.flag("metrics", None)
|
|
.flag("metrics-port", Some("9090"))
|
|
.run()
|
|
.with_config(|config| assert_eq!(config.http_metrics.listen_port, 9090));
|
|
}
|
|
#[test]
|
|
fn metrics_allow_origin_flag() {
|
|
CommandLineTest::new()
|
|
.flag("metrics", None)
|
|
.flag("metrics-allow-origin", Some("http://localhost:9009"))
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(
|
|
config.http_metrics.allow_origin,
|
|
Some("http://localhost:9009".to_string())
|
|
);
|
|
});
|
|
}
|
|
#[test]
|
|
fn metrics_allow_origin_all_flag() {
|
|
CommandLineTest::new()
|
|
.flag("metrics", None)
|
|
.flag("metrics-allow-origin", Some("*"))
|
|
.run()
|
|
.with_config(|config| assert_eq!(config.http_metrics.allow_origin, Some("*".to_string())));
|
|
}
|
|
#[test]
|
|
pub fn malloc_tuning_flag() {
|
|
CommandLineTest::new()
|
|
.flag("disable-malloc-tuning", None)
|
|
.run()
|
|
.with_config(|config| assert_eq!(config.http_metrics.allocator_metrics_enabled, false));
|
|
}
|
|
#[test]
|
|
pub fn malloc_tuning_default() {
|
|
CommandLineTest::new()
|
|
.run()
|
|
.with_config(|config| assert_eq!(config.http_metrics.allocator_metrics_enabled, true));
|
|
}
|
|
#[test]
|
|
fn doppelganger_protection_flag() {
|
|
CommandLineTest::new()
|
|
.flag("enable-doppelganger-protection", None)
|
|
.run()
|
|
.with_config(|config| assert!(config.enable_doppelganger_protection));
|
|
}
|
|
#[test]
|
|
fn no_doppelganger_protection_flag() {
|
|
CommandLineTest::new()
|
|
.run()
|
|
.with_config(|config| assert!(!config.enable_doppelganger_protection));
|
|
}
|
|
#[test]
|
|
fn produce_block_v3_flag() {
|
|
CommandLineTest::new()
|
|
.flag("produce-block-v3", None)
|
|
.run()
|
|
.with_config(|config| assert!(config.produce_block_v3));
|
|
}
|
|
|
|
#[test]
|
|
fn no_produce_block_v3_flag() {
|
|
CommandLineTest::new()
|
|
.run()
|
|
.with_config(|config| assert!(!config.produce_block_v3));
|
|
}
|
|
|
|
#[test]
|
|
fn no_gas_limit_flag() {
|
|
CommandLineTest::new()
|
|
.run()
|
|
.with_config(|config| assert!(config.gas_limit.is_none()));
|
|
}
|
|
#[test]
|
|
fn gas_limit_flag() {
|
|
CommandLineTest::new()
|
|
.flag("gas-limit", Some("600"))
|
|
.flag("builder-proposals", None)
|
|
.run()
|
|
.with_config(|config| assert_eq!(config.gas_limit, Some(600)));
|
|
}
|
|
#[test]
|
|
fn no_builder_proposals_flag() {
|
|
CommandLineTest::new()
|
|
.run()
|
|
.with_config(|config| assert!(!config.builder_proposals));
|
|
}
|
|
#[test]
|
|
fn builder_proposals_flag() {
|
|
CommandLineTest::new()
|
|
.flag("builder-proposals", None)
|
|
.run()
|
|
.with_config(|config| assert!(config.builder_proposals));
|
|
}
|
|
#[test]
|
|
fn builder_boost_factor_flag() {
|
|
CommandLineTest::new()
|
|
.flag("builder-boost-factor", Some("150"))
|
|
.run()
|
|
.with_config(|config| assert_eq!(config.builder_boost_factor, Some(150)));
|
|
}
|
|
#[test]
|
|
fn no_builder_boost_factor_flag() {
|
|
CommandLineTest::new()
|
|
.run()
|
|
.with_config(|config| assert_eq!(config.builder_boost_factor, None));
|
|
}
|
|
#[test]
|
|
fn prefer_builder_proposals_flag() {
|
|
CommandLineTest::new()
|
|
.flag("prefer-builder-proposals", None)
|
|
.run()
|
|
.with_config(|config| assert!(config.prefer_builder_proposals));
|
|
}
|
|
#[test]
|
|
fn no_prefer_builder_proposals_flag() {
|
|
CommandLineTest::new()
|
|
.run()
|
|
.with_config(|config| assert!(!config.prefer_builder_proposals));
|
|
}
|
|
#[test]
|
|
fn no_builder_registration_timestamp_override_flag() {
|
|
CommandLineTest::new()
|
|
.run()
|
|
.with_config(|config| assert!(config.builder_registration_timestamp_override.is_none()));
|
|
}
|
|
#[test]
|
|
fn builder_registration_timestamp_override_flag() {
|
|
CommandLineTest::new()
|
|
.flag("builder-registration-timestamp-override", Some("100"))
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(config.builder_registration_timestamp_override, Some(100))
|
|
});
|
|
}
|
|
#[test]
|
|
fn monitoring_endpoint() {
|
|
CommandLineTest::new()
|
|
.flag("monitoring-endpoint", Some("http://example:8000"))
|
|
.flag("monitoring-endpoint-period", Some("30"))
|
|
.run()
|
|
.with_config(|config| {
|
|
let api_conf = config.monitoring_api.as_ref().unwrap();
|
|
assert_eq!(api_conf.monitoring_endpoint.as_str(), "http://example:8000");
|
|
assert_eq!(api_conf.update_period_secs, Some(30));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn disable_run_on_all_flag() {
|
|
CommandLineTest::new()
|
|
.flag("disable-run-on-all", None)
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(config.broadcast_topics, vec![]);
|
|
});
|
|
// --broadcast flag takes precedence
|
|
CommandLineTest::new()
|
|
.flag("disable-run-on-all", None)
|
|
.flag("broadcast", Some("attestations"))
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(config.broadcast_topics, vec![ApiTopic::Attestations]);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn no_broadcast_flag() {
|
|
CommandLineTest::new().run().with_config(|config| {
|
|
assert_eq!(config.broadcast_topics, vec![ApiTopic::Subscriptions]);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn broadcast_flag() {
|
|
// "none" variant
|
|
CommandLineTest::new()
|
|
.flag("broadcast", Some("none"))
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(config.broadcast_topics, vec![]);
|
|
});
|
|
// "none" with other values is ignored
|
|
CommandLineTest::new()
|
|
.flag("broadcast", Some("none,sync-committee"))
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(config.broadcast_topics, vec![ApiTopic::SyncCommittee]);
|
|
});
|
|
// Other valid variants
|
|
CommandLineTest::new()
|
|
.flag("broadcast", Some("blocks, subscriptions"))
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(
|
|
config.broadcast_topics,
|
|
vec![ApiTopic::Blocks, ApiTopic::Subscriptions],
|
|
);
|
|
});
|
|
// Omitted "subscription" overrides default
|
|
CommandLineTest::new()
|
|
.flag("broadcast", Some("attestations"))
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(config.broadcast_topics, vec![ApiTopic::Attestations]);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "Unknown API topic")]
|
|
fn wrong_broadcast_flag() {
|
|
CommandLineTest::new()
|
|
.flag("broadcast", Some("foo, subscriptions"))
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(
|
|
config.broadcast_topics,
|
|
vec![ApiTopic::Blocks, ApiTopic::Subscriptions],
|
|
);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn latency_measurement_service() {
|
|
CommandLineTest::new().run().with_config(|config| {
|
|
assert!(config.enable_latency_measurement_service);
|
|
});
|
|
CommandLineTest::new()
|
|
.flag("latency-measurement-service", None)
|
|
.run()
|
|
.with_config(|config| {
|
|
assert!(config.enable_latency_measurement_service);
|
|
});
|
|
CommandLineTest::new()
|
|
.flag("latency-measurement-service", Some("true"))
|
|
.run()
|
|
.with_config(|config| {
|
|
assert!(config.enable_latency_measurement_service);
|
|
});
|
|
CommandLineTest::new()
|
|
.flag("latency-measurement-service", Some("false"))
|
|
.run()
|
|
.with_config(|config| {
|
|
assert!(!config.enable_latency_measurement_service);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn validator_registration_batch_size() {
|
|
CommandLineTest::new().run().with_config(|config| {
|
|
assert_eq!(config.validator_registration_batch_size, 500);
|
|
});
|
|
CommandLineTest::new()
|
|
.flag("validator-registration-batch-size", Some("100"))
|
|
.run()
|
|
.with_config(|config| {
|
|
assert_eq!(config.validator_registration_batch_size, 100);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic]
|
|
fn validator_registration_batch_size_zero_value() {
|
|
CommandLineTest::new()
|
|
.flag("validator-registration-batch-size", Some("0"))
|
|
.run();
|
|
}
|
|
|
|
#[test]
|
|
fn validator_disable_web3_signer_slashing_protection_default() {
|
|
CommandLineTest::new().run().with_config(|config| {
|
|
assert!(config.enable_web3signer_slashing_protection);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn validator_disable_web3_signer_slashing_protection() {
|
|
CommandLineTest::new()
|
|
.flag("disable-slashing-protection-web3signer", None)
|
|
.run()
|
|
.with_config(|config| {
|
|
assert!(!config.enable_web3signer_slashing_protection);
|
|
});
|
|
}
|