package client import ( "context" "errors" "io/ioutil" "testing" "time" ptypes "github.com/gogo/protobuf/types" "github.com/golang/mock/gomock" ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1" slashpb "github.com/prysmaticlabs/prysm/proto/slashing" "github.com/prysmaticlabs/prysm/shared/bls" "github.com/prysmaticlabs/prysm/shared/bytesutil" "github.com/prysmaticlabs/prysm/shared/mock" "github.com/prysmaticlabs/prysm/shared/params" "github.com/prysmaticlabs/prysm/shared/testutil/assert" "github.com/prysmaticlabs/prysm/shared/testutil/require" dbTest "github.com/prysmaticlabs/prysm/validator/db/testing" keymanager "github.com/prysmaticlabs/prysm/validator/keymanager/v1" "github.com/sirupsen/logrus" logTest "github.com/sirupsen/logrus/hooks/test" ) func init() { logrus.SetLevel(logrus.DebugLevel) logrus.SetOutput(ioutil.Discard) } var _ Validator = (*validator)(nil) const cancelledCtx = "context has been canceled" func publicKeys(t *testing.T, km keymanager.KeyManager) [][]byte { keys, err := km.FetchValidatingKeys() assert.NoError(t, err, "Cannot fetch validating keys") res := make([][]byte, len(keys)) for i := range keys { res[i] = keys[i][:] } return res } func generateMockStatusResponse(pubkeys [][]byte) *ethpb.ValidatorActivationResponse { multipleStatus := make([]*ethpb.ValidatorActivationResponse_Status, len(pubkeys)) for i, key := range pubkeys { multipleStatus[i] = ðpb.ValidatorActivationResponse_Status{ PublicKey: key, Status: ðpb.ValidatorStatusResponse{ Status: ethpb.ValidatorStatus_UNKNOWN_STATUS, }, } } return ðpb.ValidatorActivationResponse{Statuses: multipleStatus} } func TestWaitForChainStart_SetsChainStartGenesisTime(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManager, validatorClient: client, } genesis := uint64(time.Unix(1, 0).Unix()) clientStream := mock.NewMockBeaconNodeValidator_WaitForChainStartClient(ctrl) client.EXPECT().WaitForChainStart( gomock.Any(), &ptypes.Empty{}, ).Return(clientStream, nil) clientStream.EXPECT().Recv().Return( ðpb.ChainStartResponse{ Started: true, GenesisTime: genesis, }, nil, ) require.NoError(t, v.WaitForChainStart(context.Background())) assert.Equal(t, genesis, v.genesisTime, "Unexpected chain start time") assert.NotNil(t, v.ticker, "Expected ticker to be set, received nil") } func TestWaitForChainStart_ContextCanceled(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManager, validatorClient: client, } genesis := uint64(time.Unix(0, 0).Unix()) clientStream := mock.NewMockBeaconNodeValidator_WaitForChainStartClient(ctrl) client.EXPECT().WaitForChainStart( gomock.Any(), &ptypes.Empty{}, ).Return(clientStream, nil) clientStream.EXPECT().Recv().Return( ðpb.ChainStartResponse{ Started: true, GenesisTime: genesis, }, nil, ) ctx, cancel := context.WithCancel(context.Background()) cancel() assert.ErrorContains(t, cancelledCtx, v.WaitForChainStart(ctx)) } func TestWaitForChainStart_StreamSetupFails(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManager, validatorClient: client, } clientStream := mock.NewMockBeaconNodeValidator_WaitForChainStartClient(ctrl) client.EXPECT().WaitForChainStart( gomock.Any(), &ptypes.Empty{}, ).Return(clientStream, errors.New("failed stream")) err := v.WaitForChainStart(context.Background()) want := "could not setup beacon chain ChainStart streaming client" assert.ErrorContains(t, want, err) } func TestWaitForChainStart_ReceiveErrorFromStream(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManager, validatorClient: client, } clientStream := mock.NewMockBeaconNodeValidator_WaitForChainStartClient(ctrl) client.EXPECT().WaitForChainStart( gomock.Any(), &ptypes.Empty{}, ).Return(clientStream, nil) clientStream.EXPECT().Recv().Return( nil, errors.New("fails"), ) err := v.WaitForChainStart(context.Background()) want := "could not receive ChainStart from stream" assert.ErrorContains(t, want, err) } func TestWaitForSynced_SetsGenesisTime(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManager, validatorClient: client, } genesis := uint64(time.Unix(1, 0).Unix()) clientStream := mock.NewMockBeaconNodeValidator_WaitForSyncedClient(ctrl) client.EXPECT().WaitForSynced( gomock.Any(), &ptypes.Empty{}, ).Return(clientStream, nil) clientStream.EXPECT().Recv().Return( ðpb.SyncedResponse{ Synced: true, GenesisTime: genesis, }, nil, ) require.NoError(t, v.WaitForSynced(context.Background())) assert.Equal(t, genesis, v.genesisTime, "Unexpected chain start time") assert.NotNil(t, v.ticker, "Expected ticker to be set, received nil") } func TestWaitForSynced_ContextCanceled(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManager, validatorClient: client, } genesis := uint64(time.Unix(0, 0).Unix()) clientStream := mock.NewMockBeaconNodeValidator_WaitForSyncedClient(ctrl) client.EXPECT().WaitForSynced( gomock.Any(), &ptypes.Empty{}, ).Return(clientStream, nil) clientStream.EXPECT().Recv().Return( ðpb.SyncedResponse{ Synced: true, GenesisTime: genesis, }, nil, ) ctx, cancel := context.WithCancel(context.Background()) cancel() assert.ErrorContains(t, cancelledCtx, v.WaitForSynced(ctx)) } func TestWaitForSynced_StreamSetupFails(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManager, validatorClient: client, } clientStream := mock.NewMockBeaconNodeValidator_WaitForSyncedClient(ctrl) client.EXPECT().WaitForSynced( gomock.Any(), &ptypes.Empty{}, ).Return(clientStream, errors.New("failed stream")) err := v.WaitForSynced(context.Background()) want := "could not setup beacon chain Synced streaming client" assert.ErrorContains(t, want, err) } func TestWaitForSynced_ReceiveErrorFromStream(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManager, validatorClient: client, } clientStream := mock.NewMockBeaconNodeValidator_WaitForSyncedClient(ctrl) client.EXPECT().WaitForSynced( gomock.Any(), &ptypes.Empty{}, ).Return(clientStream, nil) clientStream.EXPECT().Recv().Return( nil, errors.New("fails"), ) err := v.WaitForSynced(context.Background()) want := "could not receive Synced from stream" assert.ErrorContains(t, want, err) } func TestWaitActivation_ContextCanceled(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManager, validatorClient: client, } clientStream := mock.NewMockBeaconNodeValidator_WaitForActivationClient(ctrl) client.EXPECT().WaitForActivation( gomock.Any(), ðpb.ValidatorActivationRequest{ PublicKeys: publicKeys(t, v.keyManager), }, ).Return(clientStream, nil) clientStream.EXPECT().Recv().Return( ðpb.ValidatorActivationResponse{}, nil, ) ctx, cancel := context.WithCancel(context.Background()) cancel() assert.ErrorContains(t, cancelledCtx, v.WaitForActivation(ctx)) } func TestWaitActivation_StreamSetupFails(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManager, validatorClient: client, } clientStream := mock.NewMockBeaconNodeValidator_WaitForActivationClient(ctrl) client.EXPECT().WaitForActivation( gomock.Any(), ðpb.ValidatorActivationRequest{ PublicKeys: publicKeys(t, v.keyManager), }, ).Return(clientStream, errors.New("failed stream")) err := v.WaitForActivation(context.Background()) want := "could not setup validator WaitForActivation streaming client" assert.ErrorContains(t, want, err) } func TestWaitActivation_ReceiveErrorFromStream(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManager, validatorClient: client, } clientStream := mock.NewMockBeaconNodeValidator_WaitForActivationClient(ctrl) client.EXPECT().WaitForActivation( gomock.Any(), ðpb.ValidatorActivationRequest{ PublicKeys: publicKeys(t, v.keyManager), }, ).Return(clientStream, nil) clientStream.EXPECT().Recv().Return( nil, errors.New("fails"), ) err := v.WaitForActivation(context.Background()) want := "could not receive validator activation from stream" assert.ErrorContains(t, want, err) } func TestWaitActivation_LogsActivationEpochOK(t *testing.T) { hook := logTest.NewGlobal() ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManager, validatorClient: client, genesisTime: 1, } resp := generateMockStatusResponse(publicKeys(t, v.keyManager)) resp.Statuses[0].Status.Status = ethpb.ValidatorStatus_ACTIVE clientStream := mock.NewMockBeaconNodeValidator_WaitForActivationClient(ctrl) client.EXPECT().WaitForActivation( gomock.Any(), ðpb.ValidatorActivationRequest{ PublicKeys: publicKeys(t, v.keyManager), }, ).Return(clientStream, nil) clientStream.EXPECT().Recv().Return( resp, nil, ) assert.NoError(t, v.WaitForActivation(context.Background()), "Could not wait for activation") require.LogsContain(t, hook, "Validator activated") } func TestCanonicalHeadSlot_FailedRPC(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconChainClient(ctrl) v := validator{ keyManager: testKeyManager, beaconClient: client, genesisTime: 1, } client.EXPECT().GetChainHead( gomock.Any(), gomock.Any(), ).Return(nil, errors.New("failed")) _, err := v.CanonicalHeadSlot(context.Background()) assert.ErrorContains(t, "failed", err) } func TestCanonicalHeadSlot_OK(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconChainClient(ctrl) v := validator{ keyManager: testKeyManager, beaconClient: client, } client.EXPECT().GetChainHead( gomock.Any(), gomock.Any(), ).Return(ðpb.ChainHead{HeadSlot: 0}, nil) headSlot, err := v.CanonicalHeadSlot(context.Background()) require.NoError(t, err) assert.Equal(t, uint64(0), headSlot, "Mismatch slots") } func TestWaitMultipleActivation_LogsActivationEpochOK(t *testing.T) { hook := logTest.NewGlobal() ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManagerThreeValidators, validatorClient: client, genesisTime: 1, } publicKeys := publicKeys(t, v.keyManager) resp := generateMockStatusResponse(publicKeys) resp.Statuses[0].Status.Status = ethpb.ValidatorStatus_ACTIVE resp.Statuses[1].Status.Status = ethpb.ValidatorStatus_ACTIVE clientStream := mock.NewMockBeaconNodeValidator_WaitForActivationClient(ctrl) client.EXPECT().WaitForActivation( gomock.Any(), ðpb.ValidatorActivationRequest{ PublicKeys: publicKeys, }, ).Return(clientStream, nil) clientStream.EXPECT().Recv().Return( resp, nil, ) require.NoError(t, v.WaitForActivation(context.Background()), "Could not wait for activation") require.LogsContain(t, hook, "Validator activated") } func TestWaitActivation_NotAllValidatorsActivatedOK(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManagerThreeValidators, validatorClient: client, genesisTime: 1, } resp := generateMockStatusResponse(publicKeys(t, v.keyManager)) resp.Statuses[0].Status.Status = ethpb.ValidatorStatus_ACTIVE clientStream := mock.NewMockBeaconNodeValidator_WaitForActivationClient(ctrl) client.EXPECT().WaitForActivation( gomock.Any(), gomock.Any(), ).Return(clientStream, nil) clientStream.EXPECT().Recv().Return( ðpb.ValidatorActivationResponse{}, nil, ) clientStream.EXPECT().Recv().Return( resp, nil, ) assert.NoError(t, v.WaitForActivation(context.Background()), "Could not wait for activation") } func TestWaitSync_ContextCanceled(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() n := mock.NewMockNodeClient(ctrl) v := validator{ node: n, } ctx, cancel := context.WithCancel(context.Background()) cancel() n.EXPECT().GetSyncStatus( gomock.Any(), gomock.Any(), ).Return(ðpb.SyncStatus{Syncing: true}, nil) assert.ErrorContains(t, cancelledCtx, v.WaitForSync(ctx)) } func TestWaitSync_NotSyncing(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() n := mock.NewMockNodeClient(ctrl) v := validator{ node: n, } n.EXPECT().GetSyncStatus( gomock.Any(), gomock.Any(), ).Return(ðpb.SyncStatus{Syncing: false}, nil) require.NoError(t, v.WaitForSync(context.Background())) } func TestWaitSync_Syncing(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() n := mock.NewMockNodeClient(ctrl) v := validator{ node: n, } n.EXPECT().GetSyncStatus( gomock.Any(), gomock.Any(), ).Return(ðpb.SyncStatus{Syncing: true}, nil) n.EXPECT().GetSyncStatus( gomock.Any(), gomock.Any(), ).Return(ðpb.SyncStatus{Syncing: false}, nil) require.NoError(t, v.WaitForSync(context.Background())) } func TestUpdateDuties_DoesNothingWhenNotEpochStart_AlreadyExistingAssignments(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) slot := uint64(1) v := validator{ keyManager: testKeyManager, validatorClient: client, duties: ðpb.DutiesResponse{ Duties: []*ethpb.DutiesResponse_Duty{ { Committee: []uint64{}, AttesterSlot: 10, CommitteeIndex: 20, }, }, }, } client.EXPECT().GetDuties( gomock.Any(), gomock.Any(), ).Times(0) assert.NoError(t, v.UpdateDuties(context.Background(), slot), "Could not update assignments") } func TestUpdateDuties_ReturnsError(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManager, validatorClient: client, duties: ðpb.DutiesResponse{ Duties: []*ethpb.DutiesResponse_Duty{ { CommitteeIndex: 1, }, }, }, } expected := errors.New("bad") client.EXPECT().GetDuties( gomock.Any(), gomock.Any(), ).Return(nil, expected) assert.ErrorContains(t, expected.Error(), v.UpdateDuties(context.Background(), params.BeaconConfig().SlotsPerEpoch)) assert.Equal(t, (*ethpb.DutiesResponse)(nil), v.duties, "Assignments should have been cleared on failure") } func TestUpdateDuties_OK(t *testing.T) { ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) slot := params.BeaconConfig().SlotsPerEpoch resp := ðpb.DutiesResponse{ Duties: []*ethpb.DutiesResponse_Duty{ { AttesterSlot: params.BeaconConfig().SlotsPerEpoch, ValidatorIndex: 200, CommitteeIndex: 100, Committee: []uint64{0, 1, 2, 3}, PublicKey: []byte("testPubKey_1"), ProposerSlots: []uint64{params.BeaconConfig().SlotsPerEpoch + 1}, }, }, } v := validator{ keyManager: testKeyManager, validatorClient: client, } client.EXPECT().GetDuties( gomock.Any(), gomock.Any(), ).Return(resp, nil) client.EXPECT().GetDuties( gomock.Any(), gomock.Any(), ).Return(resp, nil) client.EXPECT().SubscribeCommitteeSubnets( gomock.Any(), gomock.Any(), ).Return(nil, nil) require.NoError(t, v.UpdateDuties(context.Background(), slot), "Could not update assignments") assert.Equal(t, params.BeaconConfig().SlotsPerEpoch+1, v.duties.Duties[0].ProposerSlots[0], "Unexpected validator assignments") assert.Equal(t, params.BeaconConfig().SlotsPerEpoch, v.duties.Duties[0].AttesterSlot, "Unexpected validator assignments") assert.Equal(t, resp.Duties[0].CommitteeIndex, v.duties.Duties[0].CommitteeIndex, "Unexpected validator assignments") assert.Equal(t, resp.Duties[0].ValidatorIndex, v.duties.Duties[0].ValidatorIndex, "Unexpected validator assignments") } func TestUpdateProtections_OK(t *testing.T) { pubKey1 := [48]byte{1} pubKey2 := [48]byte{2} ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) db := dbTest.SetupDB(t, [][48]byte{pubKey1, pubKey2}) newMap := make(map[uint64]uint64) newMap[0] = params.BeaconConfig().FarFutureEpoch newMap[1] = 0 newMap[2] = 1 history := &slashpb.AttestationHistory{ TargetToSource: newMap, LatestEpochWritten: 2, } newMap2 := make(map[uint64]uint64) newMap2[0] = params.BeaconConfig().FarFutureEpoch newMap2[1] = params.BeaconConfig().FarFutureEpoch newMap2[2] = params.BeaconConfig().FarFutureEpoch newMap2[3] = 2 history2 := &slashpb.AttestationHistory{ TargetToSource: newMap, LatestEpochWritten: 3, } histories := make(map[[48]byte]*slashpb.AttestationHistory) histories[pubKey1] = history histories[pubKey2] = history2 require.NoError(t, db.SaveAttestationHistoryForPubKeys(context.Background(), histories)) slot := params.BeaconConfig().SlotsPerEpoch duties := ðpb.DutiesResponse{ CurrentEpochDuties: []*ethpb.DutiesResponse_Duty{ { AttesterSlot: slot, ValidatorIndex: 200, CommitteeIndex: 100, Committee: []uint64{0, 1, 2, 3}, PublicKey: pubKey1[:], }, { AttesterSlot: slot, ValidatorIndex: 201, CommitteeIndex: 100, Committee: []uint64{0, 1, 2, 3}, PublicKey: pubKey2[:], }, }, } v := validator{ db: db, keyManager: testKeyManager, validatorClient: client, duties: duties, } require.NoError(t, v.UpdateProtections(context.Background(), slot), "Could not update assignments") require.DeepEqual(t, history, v.attesterHistoryByPubKey[pubKey1], "Unexpected retrieved history") require.DeepEqual(t, history2, v.attesterHistoryByPubKey[pubKey2], "Unexpected retrieved history") } func TestSaveProtections_OK(t *testing.T) { pubKey1 := [48]byte{1} pubKey2 := [48]byte{2} ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) db := dbTest.SetupDB(t, [][48]byte{pubKey1, pubKey2}) cleanHistories, err := db.AttestationHistoryForPubKeys(context.Background(), [][48]byte{pubKey1, pubKey2}) require.NoError(t, err) v := validator{ db: db, keyManager: testKeyManager, validatorClient: client, attesterHistoryByPubKey: cleanHistories, } history1 := cleanHistories[pubKey1] history1 = markAttestationForTargetEpoch(history1, 0, 1) history2 := markAttestationForTargetEpoch(history1, 2, 3) cleanHistories[pubKey1] = history1 cleanHistories[pubKey2] = history2 v.attesterHistoryByPubKey = cleanHistories require.NoError(t, v.SaveProtections(context.Background()), "Could not update assignments") savedHistories, err := db.AttestationHistoryForPubKeys(context.Background(), [][48]byte{pubKey1, pubKey2}) require.NoError(t, err) require.DeepEqual(t, history1, savedHistories[pubKey1], "Unexpected retrieved history") require.DeepEqual(t, history2, savedHistories[pubKey2], "Unexpected retrieved history") } func TestRolesAt_OK(t *testing.T) { v, m, finish := setup(t) defer finish() sks := make([]bls.SecretKey, 4) sks[0] = bls.RandKey() sks[1] = bls.RandKey() sks[2] = bls.RandKey() sks[3] = bls.RandKey() v.keyManager = keymanager.NewDirect(sks) v.duties = ðpb.DutiesResponse{ Duties: []*ethpb.DutiesResponse_Duty{ { CommitteeIndex: 1, AttesterSlot: 1, PublicKey: sks[0].PublicKey().Marshal(), }, { CommitteeIndex: 2, ProposerSlots: []uint64{1}, PublicKey: sks[1].PublicKey().Marshal(), }, { CommitteeIndex: 1, AttesterSlot: 2, PublicKey: sks[2].PublicKey().Marshal(), }, { CommitteeIndex: 2, AttesterSlot: 1, ProposerSlots: []uint64{1, 5}, PublicKey: sks[3].PublicKey().Marshal(), }, }, } m.validatorClient.EXPECT().DomainData( gomock.Any(), // ctx gomock.Any(), // epoch ).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/) m.validatorClient.EXPECT().DomainData( gomock.Any(), // ctx gomock.Any(), // epoch ).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/) roleMap, err := v.RolesAt(context.Background(), 1) require.NoError(t, err) assert.Equal(t, ValidatorRole(roleAttester), roleMap[bytesutil.ToBytes48(sks[0].PublicKey().Marshal())][0]) assert.Equal(t, ValidatorRole(roleProposer), roleMap[bytesutil.ToBytes48(sks[1].PublicKey().Marshal())][0]) assert.Equal(t, ValidatorRole(roleUnknown), roleMap[bytesutil.ToBytes48(sks[2].PublicKey().Marshal())][0]) assert.Equal(t, ValidatorRole(roleProposer), roleMap[bytesutil.ToBytes48(sks[3].PublicKey().Marshal())][0]) assert.Equal(t, ValidatorRole(roleAttester), roleMap[bytesutil.ToBytes48(sks[3].PublicKey().Marshal())][1]) assert.Equal(t, ValidatorRole(roleAggregator), roleMap[bytesutil.ToBytes48(sks[3].PublicKey().Marshal())][2]) } func TestRolesAt_DoesNotAssignProposer_Slot0(t *testing.T) { v, m, finish := setup(t) defer finish() sks := make([]bls.SecretKey, 3) sks[0] = bls.RandKey() sks[1] = bls.RandKey() sks[2] = bls.RandKey() v.keyManager = keymanager.NewDirect(sks) v.duties = ðpb.DutiesResponse{ Duties: []*ethpb.DutiesResponse_Duty{ { CommitteeIndex: 1, AttesterSlot: 0, ProposerSlots: []uint64{0}, PublicKey: sks[0].PublicKey().Marshal(), }, { CommitteeIndex: 2, AttesterSlot: 4, ProposerSlots: nil, PublicKey: sks[1].PublicKey().Marshal(), }, { CommitteeIndex: 1, AttesterSlot: 3, ProposerSlots: nil, PublicKey: sks[2].PublicKey().Marshal(), }, }, } m.validatorClient.EXPECT().DomainData( gomock.Any(), // ctx gomock.Any(), // epoch ).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/) roleMap, err := v.RolesAt(context.Background(), 0) require.NoError(t, err) assert.Equal(t, ValidatorRole(roleAttester), roleMap[bytesutil.ToBytes48(sks[0].PublicKey().Marshal())][0]) assert.Equal(t, ValidatorRole(roleUnknown), roleMap[bytesutil.ToBytes48(sks[1].PublicKey().Marshal())][0]) assert.Equal(t, ValidatorRole(roleUnknown), roleMap[bytesutil.ToBytes48(sks[2].PublicKey().Marshal())][0]) } func TestCheckAndLogValidatorStatus_OK(t *testing.T) { nonexistentIndex := ^uint64(0) type statusTest struct { name string status *ethpb.ValidatorActivationResponse_Status log string active bool } pubKeys := [][]byte{ bytesutil.Uint64ToBytesLittleEndian(0), bytesutil.Uint64ToBytesLittleEndian(1), bytesutil.Uint64ToBytesLittleEndian(2), bytesutil.Uint64ToBytesLittleEndian(3), } tests := []statusTest{ { name: "UNKNOWN_STATUS, no deposit found yet", status: ðpb.ValidatorActivationResponse_Status{ PublicKey: pubKeys[0], Index: nonexistentIndex, Status: ðpb.ValidatorStatusResponse{ Status: ethpb.ValidatorStatus_UNKNOWN_STATUS, }, }, log: "Waiting for deposit to be observed by beacon node", }, { name: "DEPOSITED, deposit found", status: ðpb.ValidatorActivationResponse_Status{ PublicKey: pubKeys[0], Index: nonexistentIndex, Status: ðpb.ValidatorStatusResponse{ Status: ethpb.ValidatorStatus_DEPOSITED, DepositInclusionSlot: 50, Eth1DepositBlockNumber: 400, }, }, log: "Deposit for validator received but not processed into the beacon state\" eth1DepositBlockNumber=400 expectedInclusionSlot=50", }, { name: "DEPOSITED into state", status: ðpb.ValidatorActivationResponse_Status{ PublicKey: pubKeys[0], Index: 30, Status: ðpb.ValidatorStatusResponse{ Status: ethpb.ValidatorStatus_DEPOSITED, PositionInActivationQueue: 30, }, }, log: "Deposit processed, entering activation queue after finalization\" index=30 positionInActivationQueue=30", }, { name: "PENDING", status: ðpb.ValidatorActivationResponse_Status{ PublicKey: pubKeys[0], Index: 50, Status: ðpb.ValidatorStatusResponse{ Status: ethpb.ValidatorStatus_PENDING, ActivationEpoch: params.BeaconConfig().FarFutureEpoch, PositionInActivationQueue: 6, }, }, log: "Waiting to be assigned activation epoch\" index=50 positionInActivationQueue=6", }, { name: "PENDING", status: ðpb.ValidatorActivationResponse_Status{ PublicKey: pubKeys[0], Index: 89, Status: ðpb.ValidatorStatusResponse{ Status: ethpb.ValidatorStatus_PENDING, ActivationEpoch: 60, PositionInActivationQueue: 5, }, }, log: "Waiting for activation\" activationEpoch=60 index=89", }, { name: "EXITED", status: ðpb.ValidatorActivationResponse_Status{ PublicKey: pubKeys[0], Status: ðpb.ValidatorStatusResponse{ Status: ethpb.ValidatorStatus_EXITED, }, }, log: "Validator exited", }, } for _, test := range tests { t.Run(test.name, func(t *testing.T) { hook := logTest.NewGlobal() ctrl := gomock.NewController(t) defer ctrl.Finish() client := mock.NewMockBeaconNodeValidatorClient(ctrl) v := validator{ keyManager: testKeyManager, validatorClient: client, duties: ðpb.DutiesResponse{ Duties: []*ethpb.DutiesResponse_Duty{ { CommitteeIndex: 1, }, }, }, } active := v.checkAndLogValidatorStatus([]*ethpb.ValidatorActivationResponse_Status{test.status}) require.Equal(t, test.active, active, "Expected key to be active") require.LogsContain(t, hook, test.log) }) } }