package beacon import ( "bytes" "context" "fmt" "reflect" "strconv" "strings" "testing" "github.com/gogo/protobuf/proto" ptypes "github.com/gogo/protobuf/types" "github.com/prysmaticlabs/go-bitfield" "github.com/prysmaticlabs/go-ssz" mock "github.com/prysmaticlabs/prysm/beacon-chain/blockchain/testing" "github.com/prysmaticlabs/prysm/beacon-chain/core/helpers" "github.com/prysmaticlabs/prysm/beacon-chain/db" dbTest "github.com/prysmaticlabs/prysm/beacon-chain/db/testing" pbp2p "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1" ethpb "github.com/prysmaticlabs/prysm/proto/eth/v1alpha1" "github.com/prysmaticlabs/prysm/shared/params" ) func init() { // Use minimal config to reduce test setup time. params.OverrideBeaconConfig(params.MinimalSpecConfig()) } func TestServer_ListValidatorBalances_PaginationOutOfRange(t *testing.T) { db := dbTest.SetupDB(t) defer dbTest.TeardownDB(t, db) setupValidators(t, db, 3) headState, err := db.HeadState(context.Background()) if err != nil { t.Fatal(err) } bs := &Server{ HeadFetcher: &mock.ChainService{ State: headState, }, } req := ðpb.GetValidatorBalancesRequest{PageToken: strconv.Itoa(1), PageSize: 100} wanted := fmt.Sprintf("page start %d >= list %d", req.PageSize, len(headState.Balances)) if _, err := bs.ListValidatorBalances(context.Background(), req); err != nil && !strings.Contains(err.Error(), wanted) { t.Errorf("Expected error %v, received %v", wanted, err) } } func TestServer_ListValidatorBalances_ExceedsMaxPageSize(t *testing.T) { bs := &Server{} exceedsMax := int32(params.BeaconConfig().MaxPageSize + 1) wanted := fmt.Sprintf( "Requested page size %d can not be greater than max size %d", exceedsMax, params.BeaconConfig().MaxPageSize, ) req := ðpb.GetValidatorBalancesRequest{PageToken: strconv.Itoa(0), PageSize: exceedsMax} if _, err := bs.ListValidatorBalances(context.Background(), req); err != nil && !strings.Contains(err.Error(), wanted) { t.Errorf("Expected error %v, received %v", wanted, err) } } func TestServer_ListValidatorBalances_Pagination_Default(t *testing.T) { db := dbTest.SetupDB(t) defer dbTest.TeardownDB(t, db) setupValidators(t, db, 100) headState, err := db.HeadState(context.Background()) if err != nil { t.Fatal(err) } bs := &Server{ BeaconDB: db, HeadFetcher: &mock.ChainService{State: headState}, } tests := []struct { req *ethpb.GetValidatorBalancesRequest res *ethpb.ValidatorBalances }{ {req: ðpb.GetValidatorBalancesRequest{PublicKeys: [][]byte{{99}}}, res: ðpb.ValidatorBalances{ Balances: []*ethpb.ValidatorBalances_Balance{ {Index: 99, PublicKey: []byte{99}, Balance: 99}, }, NextPageToken: strconv.Itoa(1), TotalSize: 1, }, }, {req: ðpb.GetValidatorBalancesRequest{Indices: []uint64{1, 2, 3}}, res: ðpb.ValidatorBalances{ Balances: []*ethpb.ValidatorBalances_Balance{ {Index: 1, PublicKey: []byte{1}, Balance: 1}, {Index: 2, PublicKey: []byte{2}, Balance: 2}, {Index: 3, PublicKey: []byte{3}, Balance: 3}, }, NextPageToken: strconv.Itoa(1), TotalSize: 3, }, }, {req: ðpb.GetValidatorBalancesRequest{PublicKeys: [][]byte{{10}, {11}, {12}}}, res: ðpb.ValidatorBalances{ Balances: []*ethpb.ValidatorBalances_Balance{ {Index: 10, PublicKey: []byte{10}, Balance: 10}, {Index: 11, PublicKey: []byte{11}, Balance: 11}, {Index: 12, PublicKey: []byte{12}, Balance: 12}, }, NextPageToken: strconv.Itoa(1), TotalSize: 3, }}, {req: ðpb.GetValidatorBalancesRequest{PublicKeys: [][]byte{{2}, {3}}, Indices: []uint64{3, 4}}, // Duplication res: ðpb.ValidatorBalances{ Balances: []*ethpb.ValidatorBalances_Balance{ {Index: 2, PublicKey: []byte{2}, Balance: 2}, {Index: 3, PublicKey: []byte{3}, Balance: 3}, {Index: 4, PublicKey: []byte{4}, Balance: 4}, }, NextPageToken: strconv.Itoa(1), TotalSize: 3, }}, {req: ðpb.GetValidatorBalancesRequest{PublicKeys: [][]byte{{}}, Indices: []uint64{3, 4}}, // Public key has a blank value res: ðpb.ValidatorBalances{ Balances: []*ethpb.ValidatorBalances_Balance{ {Index: 3, PublicKey: []byte{3}, Balance: 3}, {Index: 4, PublicKey: []byte{4}, Balance: 4}, }, NextPageToken: strconv.Itoa(1), TotalSize: 2, }}, } for _, test := range tests { res, err := bs.ListValidatorBalances(context.Background(), test.req) if err != nil { t.Fatal(err) } if !proto.Equal(res, test.res) { t.Errorf("Expected %v, received %v", test.res, res) } } } func TestServer_ListValidatorBalances_Pagination_CustomPageSizes(t *testing.T) { db := dbTest.SetupDB(t) defer dbTest.TeardownDB(t, db) count := 1000 setupValidators(t, db, count) headState, err := db.HeadState(context.Background()) if err != nil { t.Fatal(err) } bs := &Server{ HeadFetcher: &mock.ChainService{ State: headState, }, } tests := []struct { req *ethpb.GetValidatorBalancesRequest res *ethpb.ValidatorBalances }{ {req: ðpb.GetValidatorBalancesRequest{PageToken: strconv.Itoa(1), PageSize: 3}, res: ðpb.ValidatorBalances{ Balances: []*ethpb.ValidatorBalances_Balance{ {PublicKey: []byte{3}, Index: 3, Balance: uint64(3)}, {PublicKey: []byte{4}, Index: 4, Balance: uint64(4)}, {PublicKey: []byte{5}, Index: 5, Balance: uint64(5)}}, NextPageToken: strconv.Itoa(2), TotalSize: int32(count)}}, {req: ðpb.GetValidatorBalancesRequest{PageToken: strconv.Itoa(10), PageSize: 5}, res: ðpb.ValidatorBalances{ Balances: []*ethpb.ValidatorBalances_Balance{ {PublicKey: []byte{50}, Index: 50, Balance: uint64(50)}, {PublicKey: []byte{51}, Index: 51, Balance: uint64(51)}, {PublicKey: []byte{52}, Index: 52, Balance: uint64(52)}, {PublicKey: []byte{53}, Index: 53, Balance: uint64(53)}, {PublicKey: []byte{54}, Index: 54, Balance: uint64(54)}}, NextPageToken: strconv.Itoa(11), TotalSize: int32(count)}}, {req: ðpb.GetValidatorBalancesRequest{PageToken: strconv.Itoa(33), PageSize: 3}, res: ðpb.ValidatorBalances{ Balances: []*ethpb.ValidatorBalances_Balance{ {PublicKey: []byte{99}, Index: 99, Balance: uint64(99)}, {PublicKey: []byte{100}, Index: 100, Balance: uint64(100)}, {PublicKey: []byte{101}, Index: 101, Balance: uint64(101)}, }, NextPageToken: strconv.Itoa(34), TotalSize: int32(count)}}, {req: ðpb.GetValidatorBalancesRequest{PageSize: 2}, res: ðpb.ValidatorBalances{ Balances: []*ethpb.ValidatorBalances_Balance{ {PublicKey: []byte{0}, Index: 0, Balance: uint64(0)}, {PublicKey: []byte{1}, Index: 1, Balance: uint64(1)}}, NextPageToken: strconv.Itoa(1), TotalSize: int32(count)}}, } for _, test := range tests { res, err := bs.ListValidatorBalances(context.Background(), test.req) if err != nil { t.Fatal(err) } if !proto.Equal(res, test.res) { t.Errorf("Expected %v, received %v", test.res, res) } } } func TestServer_ListValidatorBalances_OutOfRange(t *testing.T) { db := dbTest.SetupDB(t) defer dbTest.TeardownDB(t, db) setupValidators(t, db, 1) headState, err := db.HeadState(context.Background()) if err != nil { t.Fatal(err) } bs := &Server{ BeaconDB: db, HeadFetcher: &mock.ChainService{State: headState}, } req := ðpb.GetValidatorBalancesRequest{Indices: []uint64{uint64(1)}} wanted := "does not exist" if _, err := bs.ListValidatorBalances(context.Background(), req); !strings.Contains(err.Error(), wanted) { t.Errorf("Expected error %v, received %v", wanted, err) } } func TestServer_ListValidatorBalances_FromArchive(t *testing.T) { db := dbTest.SetupDB(t) defer dbTest.TeardownDB(t, db) ctx := context.Background() epoch := uint64(0) validators, balances := setupValidators(t, db, 100) if err := db.SaveArchivedBalances(ctx, epoch, balances); err != nil { t.Fatal(err) } newerBalances := make([]uint64, len(balances)) for i := 0; i < len(newerBalances); i++ { newerBalances[i] = balances[i] * 2 } bs := &Server{ BeaconDB: db, HeadFetcher: &mock.ChainService{ State: &pbp2p.BeaconState{ Slot: params.BeaconConfig().SlotsPerEpoch * 3, Validators: validators, Balances: newerBalances, }, }, } req := ðpb.GetValidatorBalancesRequest{ QueryFilter: ðpb.GetValidatorBalancesRequest_Epoch{Epoch: 0}, Indices: []uint64{uint64(1)}, } res, err := bs.ListValidatorBalances(context.Background(), req) if err != nil { t.Fatal(err) } // We should expect a response containing the old balance from epoch 0, // not the new balance from the current state. want := []*ethpb.ValidatorBalances_Balance{ { PublicKey: validators[1].PublicKey, Index: 1, Balance: balances[1], }, } if !reflect.DeepEqual(want, res.Balances) { t.Errorf("Wanted %v, received %v", want, res.Balances) } } func TestServer_ListValidatorBalances_FromArchive_NewValidatorNotFound(t *testing.T) { db := dbTest.SetupDB(t) defer dbTest.TeardownDB(t, db) ctx := context.Background() epoch := uint64(0) _, balances := setupValidators(t, db, 100) if err := db.SaveArchivedBalances(ctx, epoch, balances); err != nil { t.Fatal(err) } newValidators, newBalances := setupValidators(t, db, 200) bs := &Server{ BeaconDB: db, HeadFetcher: &mock.ChainService{ State: &pbp2p.BeaconState{ Slot: params.BeaconConfig().SlotsPerEpoch * 3, Validators: newValidators, Balances: newBalances, }, }, } req := ðpb.GetValidatorBalancesRequest{ QueryFilter: ðpb.GetValidatorBalancesRequest_Epoch{Epoch: 0}, Indices: []uint64{1, 150, 161}, } if _, err := bs.ListValidatorBalances(context.Background(), req); !strings.Contains(err.Error(), "does not exist") { t.Errorf("Wanted out of range error for including newer validators in the arguments, received %v", err) } } func TestServer_GetValidators_NoPagination(t *testing.T) { db := dbTest.SetupDB(t) defer dbTest.TeardownDB(t, db) validators, _ := setupValidators(t, db, 100) headState, err := db.HeadState(context.Background()) if err != nil { t.Fatal(err) } bs := &Server{ HeadFetcher: &mock.ChainService{ State: headState, }, FinalizationFetcher: &mock.ChainService{ FinalizedCheckPoint: ðpb.Checkpoint{ Epoch: 0, }, }, } received, err := bs.GetValidators(context.Background(), ðpb.GetValidatorsRequest{}) if err != nil { t.Fatal(err) } if !reflect.DeepEqual(validators, received.Validators) { t.Fatal("Incorrect respond of validators") } } func TestServer_GetValidators_Pagination(t *testing.T) { db := dbTest.SetupDB(t) defer dbTest.TeardownDB(t, db) count := 100 setupValidators(t, db, count) headState, err := db.HeadState(context.Background()) if err != nil { t.Fatal(err) } bs := &Server{ HeadFetcher: &mock.ChainService{ State: headState, }, FinalizationFetcher: &mock.ChainService{ FinalizedCheckPoint: ðpb.Checkpoint{ Epoch: 0, }, }, } tests := []struct { req *ethpb.GetValidatorsRequest res *ethpb.Validators }{ {req: ðpb.GetValidatorsRequest{PageToken: strconv.Itoa(1), PageSize: 3}, res: ðpb.Validators{ Validators: []*ethpb.Validator{ {PublicKey: []byte{3}}, {PublicKey: []byte{4}}, {PublicKey: []byte{5}}}, NextPageToken: strconv.Itoa(2), TotalSize: int32(count)}}, {req: ðpb.GetValidatorsRequest{PageToken: strconv.Itoa(10), PageSize: 5}, res: ðpb.Validators{ Validators: []*ethpb.Validator{ {PublicKey: []byte{50}}, {PublicKey: []byte{51}}, {PublicKey: []byte{52}}, {PublicKey: []byte{53}}, {PublicKey: []byte{54}}}, NextPageToken: strconv.Itoa(11), TotalSize: int32(count)}}, {req: ðpb.GetValidatorsRequest{PageToken: strconv.Itoa(33), PageSize: 3}, res: ðpb.Validators{ Validators: []*ethpb.Validator{ {PublicKey: []byte{99}}}, NextPageToken: strconv.Itoa(34), TotalSize: int32(count)}}, {req: ðpb.GetValidatorsRequest{PageSize: 2}, res: ðpb.Validators{ Validators: []*ethpb.Validator{ {PublicKey: []byte{0}}, {PublicKey: []byte{1}}}, NextPageToken: strconv.Itoa(1), TotalSize: int32(count)}}, } for _, test := range tests { res, err := bs.GetValidators(context.Background(), test.req) if err != nil { t.Fatal(err) } if !proto.Equal(res, test.res) { t.Error("Incorrect respond of validators") } } } func TestServer_GetValidators_PaginationOutOfRange(t *testing.T) { db := dbTest.SetupDB(t) defer dbTest.TeardownDB(t, db) count := 1 validators, _ := setupValidators(t, db, count) headState, err := db.HeadState(context.Background()) if err != nil { t.Fatal(err) } bs := &Server{ HeadFetcher: &mock.ChainService{ State: headState, }, FinalizationFetcher: &mock.ChainService{ FinalizedCheckPoint: ðpb.Checkpoint{ Epoch: 0, }, }, } req := ðpb.GetValidatorsRequest{PageToken: strconv.Itoa(1), PageSize: 100} wanted := fmt.Sprintf("page start %d >= list %d", req.PageSize, len(validators)) if _, err := bs.GetValidators(context.Background(), req); !strings.Contains(err.Error(), wanted) { t.Errorf("Expected error %v, received %v", wanted, err) } } func TestServer_GetValidators_ExceedsMaxPageSize(t *testing.T) { bs := &Server{} exceedsMax := int32(params.BeaconConfig().MaxPageSize + 1) wanted := fmt.Sprintf("Requested page size %d can not be greater than max size %d", exceedsMax, params.BeaconConfig().MaxPageSize) req := ðpb.GetValidatorsRequest{PageToken: strconv.Itoa(0), PageSize: exceedsMax} if _, err := bs.GetValidators(context.Background(), req); !strings.Contains(err.Error(), wanted) { t.Errorf("Expected error %v, received %v", wanted, err) } } func TestServer_GetValidators_DefaultPageSize(t *testing.T) { db := dbTest.SetupDB(t) defer dbTest.TeardownDB(t, db) validators, _ := setupValidators(t, db, 1000) headState, err := db.HeadState(context.Background()) if err != nil { t.Fatal(err) } bs := &Server{ HeadFetcher: &mock.ChainService{ State: headState, }, FinalizationFetcher: &mock.ChainService{ FinalizedCheckPoint: ðpb.Checkpoint{ Epoch: 0, }, }, } req := ðpb.GetValidatorsRequest{} res, err := bs.GetValidators(context.Background(), req) if err != nil { t.Fatal(err) } i := 0 j := params.BeaconConfig().DefaultPageSize if !reflect.DeepEqual(res.Validators, validators[i:j]) { t.Error("Incorrect respond of validators") } } func TestServer_GetValidators_FromOldEpoch(t *testing.T) { db := dbTest.SetupDB(t) defer dbTest.TeardownDB(t, db) numEpochs := 30 validators := make([]*ethpb.Validator, numEpochs) for i := 0; i < numEpochs; i++ { validators[i] = ðpb.Validator{ ActivationEpoch: uint64(i), } } bs := &Server{ HeadFetcher: &mock.ChainService{ State: &pbp2p.BeaconState{ Validators: validators, }, }, FinalizationFetcher: &mock.ChainService{ FinalizedCheckPoint: ðpb.Checkpoint{ Epoch: 200, }, }, } req := ðpb.GetValidatorsRequest{ QueryFilter: ðpb.GetValidatorsRequest_Genesis{ Genesis: true, }, } res, err := bs.GetValidators(context.Background(), req) if err != nil { t.Fatal(err) } if len(res.Validators) != 1 { t.Errorf("Wanted 1 validator at genesis, received %d", len(res.Validators)) } req = ðpb.GetValidatorsRequest{ QueryFilter: ðpb.GetValidatorsRequest_Epoch{ Epoch: 20, }, } res, err = bs.GetValidators(context.Background(), req) if err != nil { t.Fatal(err) } if !reflect.DeepEqual(res.Validators, validators[:21]) { t.Errorf("Incorrect number of validators, wanted %d received %d", 20, len(res.Validators)) } } func TestServer_GetValidatorActiveSetChanges(t *testing.T) { ctx := context.Background() validators := make([]*ethpb.Validator, 6) headState := &pbp2p.BeaconState{ Slot: 0, Validators: validators, } for i := 0; i < len(validators); i++ { activationEpoch := params.BeaconConfig().FarFutureEpoch withdrawableEpoch := params.BeaconConfig().FarFutureEpoch exitEpoch := params.BeaconConfig().FarFutureEpoch slashed := false // Mark indices divisible by two as activated. if i%2 == 0 { activationEpoch = helpers.DelayedActivationExitEpoch(0) } else if i%3 == 0 { // Mark indices divisible by 3 as slashed. withdrawableEpoch = params.BeaconConfig().EpochsPerSlashingsVector slashed = true } else if i%5 == 0 { // Mark indices divisible by 5 as exited. exitEpoch = 0 withdrawableEpoch = params.BeaconConfig().MinValidatorWithdrawabilityDelay } headState.Validators[i] = ðpb.Validator{ ActivationEpoch: activationEpoch, PublicKey: []byte(strconv.Itoa(i)), WithdrawableEpoch: withdrawableEpoch, Slashed: slashed, ExitEpoch: exitEpoch, } } bs := &Server{ HeadFetcher: &mock.ChainService{ State: headState, }, FinalizationFetcher: &mock.ChainService{ FinalizedCheckPoint: ðpb.Checkpoint{Epoch: 0}, }, } res, err := bs.GetValidatorActiveSetChanges(ctx, ðpb.GetValidatorActiveSetChangesRequest{}) if err != nil { t.Fatal(err) } wantedActive := [][]byte{ []byte("0"), []byte("2"), []byte("4"), } wantedSlashed := [][]byte{ []byte("3"), } wantedExited := [][]byte{ []byte("5"), } wanted := ðpb.ActiveSetChanges{ Epoch: 0, ActivatedPublicKeys: wantedActive, ExitedPublicKeys: wantedExited, SlashedPublicKeys: wantedSlashed, } if !proto.Equal(wanted, res) { t.Errorf("Wanted %v, received %v", wanted, res) } } func TestServer_GetValidatorActiveSetChanges_FromArchive(t *testing.T) { db := dbTest.SetupDB(t) defer dbTest.TeardownDB(t, db) ctx := context.Background() validators := make([]*ethpb.Validator, 6) headState := &pbp2p.BeaconState{ Slot: 0, Validators: validators, } activatedIndices := make([]uint64, 0) slashedIndices := make([]uint64, 0) exitedIndices := make([]uint64, 0) for i := 0; i < len(validators); i++ { // Mark indices divisible by two as activated. if i%2 == 0 { activatedIndices = append(activatedIndices, uint64(i)) } else if i%3 == 0 { // Mark indices divisible by 3 as slashed. slashedIndices = append(slashedIndices, uint64(i)) } else if i%5 == 0 { // Mark indices divisible by 5 as exited. exitedIndices = append(exitedIndices, uint64(i)) } headState.Validators[i] = ðpb.Validator{ PublicKey: []byte(strconv.Itoa(i)), } } archivedChanges := ðpb.ArchivedActiveSetChanges{ Activated: activatedIndices, Exited: exitedIndices, Slashed: slashedIndices, } // We store the changes during the genesis epoch. if err := db.SaveArchivedActiveValidatorChanges(ctx, 0, archivedChanges); err != nil { t.Fatal(err) } // We store the same changes during epoch 5 for further testing. if err := db.SaveArchivedActiveValidatorChanges(ctx, 5, archivedChanges); err != nil { t.Fatal(err) } bs := &Server{ BeaconDB: db, HeadFetcher: &mock.ChainService{ State: headState, }, FinalizationFetcher: &mock.ChainService{ // Pick an epoch far in the future so that we trigger fetching from the archive. FinalizedCheckPoint: ðpb.Checkpoint{Epoch: 100}, }, } res, err := bs.GetValidatorActiveSetChanges(ctx, ðpb.GetValidatorActiveSetChangesRequest{ QueryFilter: ðpb.GetValidatorActiveSetChangesRequest_Genesis{Genesis: true}, }) if err != nil { t.Fatal(err) } wantedActive := [][]byte{ []byte("0"), []byte("2"), []byte("4"), } wantedSlashed := [][]byte{ []byte("3"), } wantedExited := [][]byte{ []byte("5"), } wanted := ðpb.ActiveSetChanges{ Epoch: 0, ActivatedPublicKeys: wantedActive, ExitedPublicKeys: wantedExited, SlashedPublicKeys: wantedSlashed, } if !proto.Equal(wanted, res) { t.Errorf("Wanted %v, received %v", wanted, res) } res, err = bs.GetValidatorActiveSetChanges(ctx, ðpb.GetValidatorActiveSetChangesRequest{ QueryFilter: ðpb.GetValidatorActiveSetChangesRequest_Epoch{Epoch: 5}, }) if err != nil { t.Fatal(err) } wanted.Epoch = 5 if !proto.Equal(wanted, res) { t.Errorf("Wanted %v, received %v", wanted, res) } } func TestServer_GetValidatorQueue_PendingActivation(t *testing.T) { headState := &pbp2p.BeaconState{ Validators: []*ethpb.Validator{ { ActivationEpoch: helpers.DelayedActivationExitEpoch(0), ActivationEligibilityEpoch: 3, PublicKey: []byte("3"), }, { ActivationEpoch: helpers.DelayedActivationExitEpoch(0), ActivationEligibilityEpoch: 2, PublicKey: []byte("2"), }, { ActivationEpoch: helpers.DelayedActivationExitEpoch(0), ActivationEligibilityEpoch: 1, PublicKey: []byte("1"), }, }, FinalizedCheckpoint: ðpb.Checkpoint{ Epoch: 0, }, } bs := &Server{ HeadFetcher: &mock.ChainService{ State: headState, }, } res, err := bs.GetValidatorQueue(context.Background(), &ptypes.Empty{}) if err != nil { t.Fatal(err) } // We verify the keys are properly sorted by the validators' activation eligibility epoch. wanted := [][]byte{ []byte("1"), []byte("2"), []byte("3"), } wantChurn, err := helpers.ValidatorChurnLimit(headState) if err != nil { t.Fatal(err) } if res.ChurnLimit != wantChurn { t.Errorf("Wanted churn %d, received %d", wantChurn, res.ChurnLimit) } if !reflect.DeepEqual(res.ActivationPublicKeys, wanted) { t.Errorf("Wanted %v, received %v", wanted, res.ActivationPublicKeys) } } func TestServer_GetValidatorQueue_PendingExit(t *testing.T) { headState := &pbp2p.BeaconState{ Validators: []*ethpb.Validator{ { ActivationEpoch: 0, ExitEpoch: 4, WithdrawableEpoch: 3, PublicKey: []byte("3"), }, { ActivationEpoch: 0, ExitEpoch: 4, WithdrawableEpoch: 2, PublicKey: []byte("2"), }, { ActivationEpoch: 0, ExitEpoch: 4, WithdrawableEpoch: 1, PublicKey: []byte("1"), }, }, FinalizedCheckpoint: ðpb.Checkpoint{ Epoch: 0, }, } bs := &Server{ HeadFetcher: &mock.ChainService{ State: headState, }, } res, err := bs.GetValidatorQueue(context.Background(), &ptypes.Empty{}) if err != nil { t.Fatal(err) } // We verify the keys are properly sorted by the validators' withdrawable epoch. wanted := [][]byte{ []byte("1"), []byte("2"), []byte("3"), } wantChurn, err := helpers.ValidatorChurnLimit(headState) if err != nil { t.Fatal(err) } if res.ChurnLimit != wantChurn { t.Errorf("Wanted churn %d, received %d", wantChurn, res.ChurnLimit) } if !reflect.DeepEqual(res.ExitPublicKeys, wanted) { t.Errorf("Wanted %v, received %v", wanted, res.ExitPublicKeys) } } func TestServer_GetValidatorsParticipation_FromArchive(t *testing.T) { db := dbTest.SetupDB(t) defer dbTest.TeardownDB(t, db) ctx := context.Background() epoch := uint64(4) part := ðpb.ValidatorParticipation{ GlobalParticipationRate: 1.0, VotedEther: 20, EligibleEther: 20, } if err := db.SaveArchivedValidatorParticipation(ctx, epoch-2, part); err != nil { t.Fatal(err) } bs := &Server{ BeaconDB: db, HeadFetcher: &mock.ChainService{ State: &pbp2p.BeaconState{Slot: helpers.StartSlot(epoch + 1)}, }, FinalizationFetcher: &mock.ChainService{ FinalizedCheckPoint: ðpb.Checkpoint{ Epoch: epoch + 1, }, }, } if _, err := bs.GetValidatorParticipation(ctx, ðpb.GetValidatorParticipationRequest{ QueryFilter: ðpb.GetValidatorParticipationRequest_Epoch{ Epoch: epoch + 2, }, }); err == nil { t.Error("Expected error when requesting future epoch, received nil") } // We request data from epoch 0, which we didn't archive, so we should expect an error. if _, err := bs.GetValidatorParticipation(ctx, ðpb.GetValidatorParticipationRequest{ QueryFilter: ðpb.GetValidatorParticipationRequest_Genesis{ Genesis: true, }, }); err == nil { t.Error("Expected error when data from archive is not found, received nil") } want := ðpb.ValidatorParticipationResponse{ Epoch: epoch - 2, Finalized: true, Participation: part, } res, err := bs.GetValidatorParticipation(ctx, ðpb.GetValidatorParticipationRequest{ QueryFilter: ðpb.GetValidatorParticipationRequest_Epoch{ Epoch: epoch - 2, }, }) if err != nil { t.Fatal(err) } if !proto.Equal(want, res) { t.Errorf("Wanted %v, received %v", want, res) } } func TestServer_GetValidatorsParticipation_CurrentEpoch(t *testing.T) { helpers.ClearAllCaches() db := dbTest.SetupDB(t) defer dbTest.TeardownDB(t, db) ctx := context.Background() epoch := uint64(1) attestedBalance := uint64(1) validatorCount := uint64(100) validators := make([]*ethpb.Validator, validatorCount) balances := make([]uint64, validatorCount) for i := 0; i < len(validators); i++ { validators[i] = ðpb.Validator{ ExitEpoch: params.BeaconConfig().FarFutureEpoch, EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance, } balances[i] = params.BeaconConfig().MaxEffectiveBalance } atts := []*pbp2p.PendingAttestation{{Data: ðpb.AttestationData{Target: ðpb.Checkpoint{}}}} s := &pbp2p.BeaconState{ Slot: epoch*params.BeaconConfig().SlotsPerEpoch + 1, Validators: validators, Balances: balances, BlockRoots: make([][]byte, 128), Slashings: []uint64{0, 1e9, 1e9}, RandaoMixes: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector), CurrentEpochAttestations: atts, FinalizedCheckpoint: ðpb.Checkpoint{}, JustificationBits: bitfield.Bitvector4{0x00}, CurrentJustifiedCheckpoint: ðpb.Checkpoint{}, } bs := &Server{ BeaconDB: db, HeadFetcher: &mock.ChainService{State: s}, } res, err := bs.GetValidatorParticipation(ctx, ðpb.GetValidatorParticipationRequest{ QueryFilter: ðpb.GetValidatorParticipationRequest_Epoch{ Epoch: epoch, }, }) if err != nil { t.Fatal(err) } wanted := ðpb.ValidatorParticipation{ VotedEther: attestedBalance, EligibleEther: validatorCount * params.BeaconConfig().MaxEffectiveBalance, GlobalParticipationRate: float32(attestedBalance) / float32(validatorCount*params.BeaconConfig().MaxEffectiveBalance), } if !reflect.DeepEqual(res.Participation, wanted) { t.Error("Incorrect validator participation respond") } } func TestServer_GetChainHead(t *testing.T) { s := &pbp2p.BeaconState{ PreviousJustifiedCheckpoint: ðpb.Checkpoint{Epoch: 3, Root: []byte{'A'}}, CurrentJustifiedCheckpoint: ðpb.Checkpoint{Epoch: 2, Root: []byte{'B'}}, FinalizedCheckpoint: ðpb.Checkpoint{Epoch: 1, Root: []byte{'C'}}, } bs := &Server{HeadFetcher: &mock.ChainService{State: s}} head, err := bs.GetChainHead(context.Background(), nil) if err != nil { t.Fatal(err) } if head.PreviousJustifiedSlot != 3*params.BeaconConfig().SlotsPerEpoch { t.Errorf("Wanted PreviousJustifiedSlot: %d, got: %d", 3*params.BeaconConfig().SlotsPerEpoch, head.PreviousJustifiedSlot) } if head.JustifiedSlot != 2*params.BeaconConfig().SlotsPerEpoch { t.Errorf("Wanted JustifiedSlot: %d, got: %d", 2*params.BeaconConfig().SlotsPerEpoch, head.JustifiedSlot) } if head.FinalizedSlot != 1*params.BeaconConfig().SlotsPerEpoch { t.Errorf("Wanted FinalizedSlot: %d, got: %d", 1*params.BeaconConfig().SlotsPerEpoch, head.FinalizedSlot) } if !bytes.Equal([]byte{'A'}, head.PreviousJustifiedBlockRoot) { t.Errorf("Wanted PreviousJustifiedBlockRoot: %v, got: %v", []byte{'A'}, head.PreviousJustifiedBlockRoot) } if !bytes.Equal([]byte{'B'}, head.JustifiedBlockRoot) { t.Errorf("Wanted JustifiedBlockRoot: %v, got: %v", []byte{'B'}, head.JustifiedBlockRoot) } if !bytes.Equal([]byte{'C'}, head.FinalizedBlockRoot) { t.Errorf("Wanted FinalizedBlockRoot: %v, got: %v", []byte{'C'}, head.FinalizedBlockRoot) } } func setupValidators(t *testing.T, db db.Database, count int) ([]*ethpb.Validator, []uint64) { ctx := context.Background() balances := make([]uint64, count) validators := make([]*ethpb.Validator, 0, count) for i := 0; i < count; i++ { if err := db.SaveValidatorIndex(ctx, [48]byte{byte(i)}, uint64(i)); err != nil { t.Fatal(err) } balances[i] = uint64(i) validators = append(validators, ðpb.Validator{ PublicKey: []byte{byte(i)}, }) } blk := ðpb.BeaconBlock{ Slot: 0, } blockRoot, err := ssz.SigningRoot(blk) if err != nil { t.Fatal(err) } if err := db.SaveHeadBlockRoot(ctx, blockRoot); err != nil { t.Fatal(err) } if err := db.SaveState( context.Background(), &pbp2p.BeaconState{Validators: validators, Balances: balances}, blockRoot, ); err != nil { t.Fatal(err) } return validators, balances }