mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-17 23:38:46 +00:00
693 lines
24 KiB
Go
693 lines
24 KiB
Go
package apimiddleware
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/json"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"reflect"
|
|
"strconv"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/gogo/protobuf/types"
|
|
"github.com/prysmaticlabs/prysm/api/gateway/apimiddleware"
|
|
"github.com/prysmaticlabs/prysm/config/params"
|
|
ethpbv2 "github.com/prysmaticlabs/prysm/proto/eth/v2"
|
|
"github.com/prysmaticlabs/prysm/testing/assert"
|
|
"github.com/prysmaticlabs/prysm/testing/require"
|
|
"github.com/prysmaticlabs/prysm/time/slots"
|
|
)
|
|
|
|
func TestWrapAttestationArray(t *testing.T) {
|
|
t.Run("ok", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &submitAttestationRequestJson{},
|
|
}
|
|
unwrappedAtts := []*attestationJson{{AggregationBits: "1010"}}
|
|
unwrappedAttsJson, err := json.Marshal(unwrappedAtts)
|
|
require.NoError(t, err)
|
|
|
|
var body bytes.Buffer
|
|
_, err = body.Write(unwrappedAttsJson)
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
|
|
runDefault, errJson := wrapAttestationsArray(endpoint, nil, request)
|
|
require.Equal(t, true, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(true), runDefault)
|
|
wrappedAtts := &submitAttestationRequestJson{}
|
|
require.NoError(t, json.NewDecoder(request.Body).Decode(wrappedAtts))
|
|
require.Equal(t, 1, len(wrappedAtts.Data), "wrong number of wrapped items")
|
|
assert.Equal(t, "1010", wrappedAtts.Data[0].AggregationBits)
|
|
})
|
|
|
|
t.Run("invalid_body", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &submitAttestationRequestJson{},
|
|
}
|
|
var body bytes.Buffer
|
|
_, err := body.Write([]byte("invalid"))
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
|
|
runDefault, errJson := wrapAttestationsArray(endpoint, nil, request)
|
|
require.Equal(t, false, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
assert.Equal(t, true, strings.Contains(errJson.Msg(), "could not decode body"))
|
|
assert.Equal(t, http.StatusInternalServerError, errJson.StatusCode())
|
|
})
|
|
}
|
|
|
|
func TestWrapValidatorIndicesArray(t *testing.T) {
|
|
t.Run("ok", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &dutiesRequestJson{},
|
|
}
|
|
unwrappedIndices := []string{"1", "2"}
|
|
unwrappedIndicesJson, err := json.Marshal(unwrappedIndices)
|
|
require.NoError(t, err)
|
|
|
|
var body bytes.Buffer
|
|
_, err = body.Write(unwrappedIndicesJson)
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
|
|
runDefault, errJson := wrapValidatorIndicesArray(endpoint, nil, request)
|
|
require.Equal(t, true, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(true), runDefault)
|
|
wrappedIndices := &dutiesRequestJson{}
|
|
require.NoError(t, json.NewDecoder(request.Body).Decode(wrappedIndices))
|
|
require.Equal(t, 2, len(wrappedIndices.Index), "wrong number of wrapped items")
|
|
assert.Equal(t, "1", wrappedIndices.Index[0])
|
|
assert.Equal(t, "2", wrappedIndices.Index[1])
|
|
})
|
|
|
|
t.Run("invalid_body", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &dutiesRequestJson{},
|
|
}
|
|
var body bytes.Buffer
|
|
_, err := body.Write([]byte("invalid"))
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
|
|
runDefault, errJson := wrapValidatorIndicesArray(endpoint, nil, request)
|
|
require.Equal(t, false, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
assert.Equal(t, true, strings.Contains(errJson.Msg(), "could not decode body"))
|
|
assert.Equal(t, http.StatusInternalServerError, errJson.StatusCode())
|
|
})
|
|
}
|
|
|
|
func TestWrapSignedAggregateAndProofArray(t *testing.T) {
|
|
t.Run("ok", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &submitAggregateAndProofsRequestJson{},
|
|
}
|
|
unwrappedAggs := []*signedAggregateAttestationAndProofJson{{Signature: "sig"}}
|
|
unwrappedAggsJson, err := json.Marshal(unwrappedAggs)
|
|
require.NoError(t, err)
|
|
|
|
var body bytes.Buffer
|
|
_, err = body.Write(unwrappedAggsJson)
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
|
|
runDefault, errJson := wrapSignedAggregateAndProofArray(endpoint, nil, request)
|
|
require.Equal(t, true, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(true), runDefault)
|
|
wrappedAggs := &submitAggregateAndProofsRequestJson{}
|
|
require.NoError(t, json.NewDecoder(request.Body).Decode(wrappedAggs))
|
|
require.Equal(t, 1, len(wrappedAggs.Data), "wrong number of wrapped items")
|
|
assert.Equal(t, "sig", wrappedAggs.Data[0].Signature)
|
|
})
|
|
|
|
t.Run("invalid_body", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &submitAggregateAndProofsRequestJson{},
|
|
}
|
|
var body bytes.Buffer
|
|
_, err := body.Write([]byte("invalid"))
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
|
|
runDefault, errJson := wrapSignedAggregateAndProofArray(endpoint, nil, request)
|
|
require.Equal(t, false, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
assert.Equal(t, true, strings.Contains(errJson.Msg(), "could not decode body"))
|
|
assert.Equal(t, http.StatusInternalServerError, errJson.StatusCode())
|
|
})
|
|
}
|
|
|
|
func TestWrapBeaconCommitteeSubscriptionsArray(t *testing.T) {
|
|
t.Run("ok", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &submitBeaconCommitteeSubscriptionsRequestJson{},
|
|
}
|
|
unwrappedSubs := []*beaconCommitteeSubscribeJson{{
|
|
ValidatorIndex: "1",
|
|
CommitteeIndex: "1",
|
|
CommitteesAtSlot: "1",
|
|
Slot: "1",
|
|
IsAggregator: true,
|
|
}}
|
|
unwrappedSubsJson, err := json.Marshal(unwrappedSubs)
|
|
require.NoError(t, err)
|
|
|
|
var body bytes.Buffer
|
|
_, err = body.Write(unwrappedSubsJson)
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
|
|
runDefault, errJson := wrapBeaconCommitteeSubscriptionsArray(endpoint, nil, request)
|
|
require.Equal(t, true, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(true), runDefault)
|
|
wrappedSubs := &submitBeaconCommitteeSubscriptionsRequestJson{}
|
|
require.NoError(t, json.NewDecoder(request.Body).Decode(wrappedSubs))
|
|
require.Equal(t, 1, len(wrappedSubs.Data), "wrong number of wrapped items")
|
|
assert.Equal(t, "1", wrappedSubs.Data[0].ValidatorIndex)
|
|
assert.Equal(t, "1", wrappedSubs.Data[0].CommitteeIndex)
|
|
assert.Equal(t, "1", wrappedSubs.Data[0].CommitteesAtSlot)
|
|
assert.Equal(t, "1", wrappedSubs.Data[0].Slot)
|
|
assert.Equal(t, true, wrappedSubs.Data[0].IsAggregator)
|
|
})
|
|
|
|
t.Run("invalid_body", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &submitBeaconCommitteeSubscriptionsRequestJson{},
|
|
}
|
|
var body bytes.Buffer
|
|
_, err := body.Write([]byte("invalid"))
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
|
|
runDefault, errJson := wrapBeaconCommitteeSubscriptionsArray(endpoint, nil, request)
|
|
require.Equal(t, false, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
assert.Equal(t, true, strings.Contains(errJson.Msg(), "could not decode body"))
|
|
assert.Equal(t, http.StatusInternalServerError, errJson.StatusCode())
|
|
})
|
|
}
|
|
|
|
func TestWrapSyncCommitteeSubscriptionsArray(t *testing.T) {
|
|
t.Run("ok", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &submitSyncCommitteeSubscriptionRequestJson{},
|
|
}
|
|
unwrappedSubs := []*syncCommitteeSubscriptionJson{
|
|
{
|
|
ValidatorIndex: "1",
|
|
SyncCommitteeIndices: []string{"1", "2"},
|
|
UntilEpoch: "1",
|
|
},
|
|
{
|
|
ValidatorIndex: "2",
|
|
SyncCommitteeIndices: []string{"3", "4"},
|
|
UntilEpoch: "2",
|
|
},
|
|
}
|
|
unwrappedSubsJson, err := json.Marshal(unwrappedSubs)
|
|
require.NoError(t, err)
|
|
|
|
var body bytes.Buffer
|
|
_, err = body.Write(unwrappedSubsJson)
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
|
|
runDefault, errJson := wrapSyncCommitteeSubscriptionsArray(endpoint, nil, request)
|
|
require.Equal(t, true, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(true), runDefault)
|
|
wrappedSubs := &submitSyncCommitteeSubscriptionRequestJson{}
|
|
require.NoError(t, json.NewDecoder(request.Body).Decode(wrappedSubs))
|
|
require.Equal(t, 2, len(wrappedSubs.Data), "wrong number of wrapped items")
|
|
assert.Equal(t, "1", wrappedSubs.Data[0].ValidatorIndex)
|
|
require.Equal(t, 2, len(wrappedSubs.Data[0].SyncCommitteeIndices), "wrong number of committee indices")
|
|
assert.Equal(t, "1", wrappedSubs.Data[0].SyncCommitteeIndices[0])
|
|
assert.Equal(t, "2", wrappedSubs.Data[0].SyncCommitteeIndices[1])
|
|
assert.Equal(t, "1", wrappedSubs.Data[0].UntilEpoch)
|
|
})
|
|
|
|
t.Run("invalid_body", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &submitSyncCommitteeSubscriptionRequestJson{},
|
|
}
|
|
var body bytes.Buffer
|
|
_, err := body.Write([]byte("invalid"))
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
|
|
runDefault, errJson := wrapSyncCommitteeSubscriptionsArray(endpoint, nil, request)
|
|
require.Equal(t, false, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
assert.Equal(t, true, strings.Contains(errJson.Msg(), "could not decode body"))
|
|
assert.Equal(t, http.StatusInternalServerError, errJson.StatusCode())
|
|
})
|
|
}
|
|
|
|
func TestWrapSyncCommitteeSignaturesArray(t *testing.T) {
|
|
t.Run("ok", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &submitSyncCommitteeSignaturesRequestJson{},
|
|
}
|
|
unwrappedSigs := []*syncCommitteeMessageJson{{
|
|
Slot: "1",
|
|
BeaconBlockRoot: "root",
|
|
ValidatorIndex: "1",
|
|
Signature: "sig",
|
|
}}
|
|
unwrappedSigsJson, err := json.Marshal(unwrappedSigs)
|
|
require.NoError(t, err)
|
|
|
|
var body bytes.Buffer
|
|
_, err = body.Write(unwrappedSigsJson)
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
|
|
runDefault, errJson := wrapSyncCommitteeSignaturesArray(endpoint, nil, request)
|
|
require.Equal(t, true, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(true), runDefault)
|
|
wrappedSigs := &submitSyncCommitteeSignaturesRequestJson{}
|
|
require.NoError(t, json.NewDecoder(request.Body).Decode(wrappedSigs))
|
|
require.Equal(t, 1, len(wrappedSigs.Data), "wrong number of wrapped items")
|
|
assert.Equal(t, "1", wrappedSigs.Data[0].Slot)
|
|
assert.Equal(t, "root", wrappedSigs.Data[0].BeaconBlockRoot)
|
|
assert.Equal(t, "1", wrappedSigs.Data[0].ValidatorIndex)
|
|
assert.Equal(t, "sig", wrappedSigs.Data[0].Signature)
|
|
})
|
|
|
|
t.Run("invalid_body", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &submitSyncCommitteeSignaturesRequestJson{},
|
|
}
|
|
var body bytes.Buffer
|
|
_, err := body.Write([]byte("invalid"))
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
|
|
runDefault, errJson := wrapSyncCommitteeSignaturesArray(endpoint, nil, request)
|
|
require.Equal(t, false, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
assert.Equal(t, true, strings.Contains(errJson.Msg(), "could not decode body"))
|
|
assert.Equal(t, http.StatusInternalServerError, errJson.StatusCode())
|
|
})
|
|
}
|
|
|
|
func TestWrapSignedContributionAndProofsArray(t *testing.T) {
|
|
t.Run("ok", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &submitContributionAndProofsRequestJson{},
|
|
}
|
|
unwrapped := []*signedContributionAndProofJson{
|
|
{
|
|
Message: &contributionAndProofJson{
|
|
AggregatorIndex: "1",
|
|
Contribution: &syncCommitteeContributionJson{
|
|
Slot: "1",
|
|
BeaconBlockRoot: "root",
|
|
SubcommitteeIndex: "1",
|
|
AggregationBits: "bits",
|
|
Signature: "sig",
|
|
},
|
|
SelectionProof: "proof",
|
|
},
|
|
Signature: "sig",
|
|
},
|
|
{
|
|
Message: &contributionAndProofJson{},
|
|
Signature: "sig",
|
|
},
|
|
}
|
|
unwrappedJson, err := json.Marshal(unwrapped)
|
|
require.NoError(t, err)
|
|
|
|
var body bytes.Buffer
|
|
_, err = body.Write(unwrappedJson)
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
|
|
runDefault, errJson := wrapSignedContributionAndProofsArray(endpoint, nil, request)
|
|
require.Equal(t, true, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(true), runDefault)
|
|
wrapped := &submitContributionAndProofsRequestJson{}
|
|
require.NoError(t, json.NewDecoder(request.Body).Decode(wrapped))
|
|
require.Equal(t, 2, len(wrapped.Data), "wrong number of wrapped items")
|
|
assert.Equal(t, "sig", wrapped.Data[0].Signature)
|
|
require.NotNil(t, wrapped.Data[0].Message)
|
|
msg := wrapped.Data[0].Message
|
|
assert.Equal(t, "1", msg.AggregatorIndex)
|
|
assert.Equal(t, "proof", msg.SelectionProof)
|
|
require.NotNil(t, msg.Contribution)
|
|
assert.Equal(t, "1", msg.Contribution.Slot)
|
|
assert.Equal(t, "root", msg.Contribution.BeaconBlockRoot)
|
|
assert.Equal(t, "1", msg.Contribution.SubcommitteeIndex)
|
|
assert.Equal(t, "bits", msg.Contribution.AggregationBits)
|
|
assert.Equal(t, "sig", msg.Contribution.Signature)
|
|
})
|
|
|
|
t.Run("invalid_body", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &submitContributionAndProofsRequestJson{},
|
|
}
|
|
var body bytes.Buffer
|
|
_, err := body.Write([]byte("invalid"))
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
|
|
runDefault, errJson := wrapSignedContributionAndProofsArray(endpoint, nil, request)
|
|
require.Equal(t, false, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
assert.Equal(t, true, strings.Contains(errJson.Msg(), "could not decode body"))
|
|
assert.Equal(t, http.StatusInternalServerError, errJson.StatusCode())
|
|
})
|
|
}
|
|
|
|
func TestSetInitialPublishBlockPostRequest(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{}
|
|
s := struct {
|
|
Message struct {
|
|
Slot string
|
|
}
|
|
}{}
|
|
t.Run("Phase 0", func(t *testing.T) {
|
|
s.Message = struct{ Slot string }{Slot: "0"}
|
|
j, err := json.Marshal(s)
|
|
require.NoError(t, err)
|
|
var body bytes.Buffer
|
|
_, err = body.Write(j)
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
runDefault, errJson := setInitialPublishBlockPostRequest(endpoint, nil, request)
|
|
require.Equal(t, true, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(true), runDefault)
|
|
assert.Equal(t, reflect.TypeOf(signedBeaconBlockContainerJson{}).Name(), reflect.Indirect(reflect.ValueOf(endpoint.PostRequest)).Type().Name())
|
|
})
|
|
t.Run("Altair", func(t *testing.T) {
|
|
slot, err := slots.EpochStart(params.BeaconConfig().AltairForkEpoch)
|
|
require.NoError(t, err)
|
|
s.Message = struct{ Slot string }{Slot: strconv.FormatUint(uint64(slot), 10)}
|
|
j, err := json.Marshal(s)
|
|
require.NoError(t, err)
|
|
var body bytes.Buffer
|
|
_, err = body.Write(j)
|
|
require.NoError(t, err)
|
|
request := httptest.NewRequest("POST", "http://foo.example", &body)
|
|
runDefault, errJson := setInitialPublishBlockPostRequest(endpoint, nil, request)
|
|
require.Equal(t, true, errJson == nil)
|
|
assert.Equal(t, apimiddleware.RunDefault(true), runDefault)
|
|
assert.Equal(t, reflect.TypeOf(signedBeaconBlockAltairContainerJson{}).Name(), reflect.Indirect(reflect.ValueOf(endpoint.PostRequest)).Type().Name())
|
|
})
|
|
}
|
|
|
|
func TestPreparePublishedBlock(t *testing.T) {
|
|
t.Run("Phase 0", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &signedBeaconBlockContainerJson{
|
|
Message: &beaconBlockJson{
|
|
Body: &beaconBlockBodyJson{},
|
|
},
|
|
},
|
|
}
|
|
errJson := preparePublishedBlock(endpoint, nil, nil)
|
|
require.Equal(t, true, errJson == nil)
|
|
_, ok := endpoint.PostRequest.(*phase0PublishBlockRequestJson)
|
|
assert.Equal(t, true, ok)
|
|
})
|
|
|
|
t.Run("Altair", func(t *testing.T) {
|
|
endpoint := &apimiddleware.Endpoint{
|
|
PostRequest: &signedBeaconBlockAltairContainerJson{
|
|
Message: &beaconBlockAltairJson{
|
|
Body: &beaconBlockBodyAltairJson{},
|
|
},
|
|
},
|
|
}
|
|
errJson := preparePublishedBlock(endpoint, nil, nil)
|
|
require.Equal(t, true, errJson == nil)
|
|
_, ok := endpoint.PostRequest.(*altairPublishBlockRequestJson)
|
|
assert.Equal(t, true, ok)
|
|
})
|
|
|
|
t.Run("unsupported block type", func(t *testing.T) {
|
|
errJson := preparePublishedBlock(&apimiddleware.Endpoint{}, nil, nil)
|
|
assert.Equal(t, true, strings.Contains(errJson.Msg(), "unsupported block type"))
|
|
})
|
|
}
|
|
|
|
func TestPrepareValidatorAggregates(t *testing.T) {
|
|
body := &tempSyncCommitteesResponseJson{
|
|
Data: &tempSyncCommitteeValidatorsJson{
|
|
Validators: []string{"1", "2"},
|
|
ValidatorAggregates: []*tempSyncSubcommitteeValidatorsJson{
|
|
{
|
|
Validators: []string{"3", "4"},
|
|
},
|
|
{
|
|
Validators: []string{"5"},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
bodyJson, err := json.Marshal(body)
|
|
require.NoError(t, err)
|
|
|
|
container := &syncCommitteesResponseJson{}
|
|
runDefault, errJson := prepareValidatorAggregates(bodyJson, container)
|
|
require.Equal(t, nil, errJson)
|
|
require.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
assert.DeepEqual(t, []string{"1", "2"}, container.Data.Validators)
|
|
require.DeepEqual(t, [][]string{{"3", "4"}, {"5"}}, container.Data.ValidatorAggregates)
|
|
}
|
|
|
|
func TestSerializeV2Block(t *testing.T) {
|
|
t.Run("Phase 0", func(t *testing.T) {
|
|
response := &blockV2ResponseJson{
|
|
Version: ethpbv2.Version_PHASE0.String(),
|
|
Data: &signedBeaconBlockContainerV2Json{
|
|
Phase0Block: &beaconBlockJson{
|
|
Slot: "1",
|
|
ProposerIndex: "1",
|
|
ParentRoot: "root",
|
|
StateRoot: "root",
|
|
Body: &beaconBlockBodyJson{},
|
|
},
|
|
AltairBlock: nil,
|
|
Signature: "sig",
|
|
},
|
|
}
|
|
runDefault, j, errJson := serializeV2Block(response)
|
|
require.Equal(t, nil, errJson)
|
|
require.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
require.NotNil(t, j)
|
|
resp := &phase0BlockResponseJson{}
|
|
require.NoError(t, json.Unmarshal(j, resp))
|
|
require.NotNil(t, resp.Data)
|
|
require.NotNil(t, resp.Data.Message)
|
|
beaconBlock := resp.Data.Message
|
|
assert.Equal(t, "1", beaconBlock.Slot)
|
|
assert.Equal(t, "1", beaconBlock.ProposerIndex)
|
|
assert.Equal(t, "root", beaconBlock.ParentRoot)
|
|
assert.Equal(t, "root", beaconBlock.StateRoot)
|
|
require.NotNil(t, beaconBlock.Body)
|
|
})
|
|
|
|
t.Run("Altair", func(t *testing.T) {
|
|
response := &blockV2ResponseJson{
|
|
Version: ethpbv2.Version_ALTAIR.String(),
|
|
Data: &signedBeaconBlockContainerV2Json{
|
|
Phase0Block: nil,
|
|
AltairBlock: &beaconBlockAltairJson{
|
|
Slot: "1",
|
|
ProposerIndex: "1",
|
|
ParentRoot: "root",
|
|
StateRoot: "root",
|
|
Body: &beaconBlockBodyAltairJson{},
|
|
},
|
|
Signature: "sig",
|
|
},
|
|
}
|
|
runDefault, j, errJson := serializeV2Block(response)
|
|
require.Equal(t, nil, errJson)
|
|
require.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
require.NotNil(t, j)
|
|
resp := &altairBlockResponseJson{}
|
|
require.NoError(t, json.Unmarshal(j, resp))
|
|
require.NotNil(t, resp.Data)
|
|
require.NotNil(t, resp.Data.Message)
|
|
beaconBlock := resp.Data.Message
|
|
assert.Equal(t, "1", beaconBlock.Slot)
|
|
assert.Equal(t, "1", beaconBlock.ProposerIndex)
|
|
assert.Equal(t, "root", beaconBlock.ParentRoot)
|
|
assert.Equal(t, "root", beaconBlock.StateRoot)
|
|
require.NotNil(t, beaconBlock.Body)
|
|
})
|
|
|
|
t.Run("incorrect response type", func(t *testing.T) {
|
|
response := &types.Empty{}
|
|
runDefault, j, errJson := serializeV2Block(response)
|
|
require.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
require.Equal(t, 0, len(j))
|
|
require.NotNil(t, errJson)
|
|
assert.Equal(t, true, strings.Contains(errJson.Msg(), "container is not of the correct type"))
|
|
})
|
|
|
|
t.Run("unsupported block version", func(t *testing.T) {
|
|
response := &blockV2ResponseJson{
|
|
Version: "unsupported",
|
|
}
|
|
runDefault, j, errJson := serializeV2Block(response)
|
|
require.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
require.Equal(t, 0, len(j))
|
|
require.NotNil(t, errJson)
|
|
assert.Equal(t, true, strings.Contains(errJson.Msg(), "unsupported block version"))
|
|
})
|
|
}
|
|
|
|
func TestSerializeV2State(t *testing.T) {
|
|
t.Run("Phase 0", func(t *testing.T) {
|
|
response := &beaconStateV2ResponseJson{
|
|
Version: ethpbv2.Version_PHASE0.String(),
|
|
Data: &beaconStateContainerV2Json{
|
|
Phase0State: &beaconStateJson{},
|
|
AltairState: nil,
|
|
},
|
|
}
|
|
runDefault, j, errJson := serializeV2State(response)
|
|
require.Equal(t, nil, errJson)
|
|
require.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
require.NotNil(t, j)
|
|
require.NoError(t, json.Unmarshal(j, &phase0StateResponseJson{}))
|
|
})
|
|
|
|
t.Run("Altair", func(t *testing.T) {
|
|
response := &beaconStateV2ResponseJson{
|
|
Version: ethpbv2.Version_ALTAIR.String(),
|
|
Data: &beaconStateContainerV2Json{
|
|
Phase0State: nil,
|
|
AltairState: &beaconStateAltairJson{},
|
|
},
|
|
}
|
|
runDefault, j, errJson := serializeV2State(response)
|
|
require.Equal(t, nil, errJson)
|
|
require.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
require.NotNil(t, j)
|
|
require.NoError(t, json.Unmarshal(j, &altairStateResponseJson{}))
|
|
})
|
|
|
|
t.Run("Bellatrix", func(t *testing.T) {
|
|
response := &beaconStateV2ResponseJson{
|
|
Version: ethpbv2.Version_BELLATRIX.String(),
|
|
Data: &beaconStateContainerV2Json{
|
|
Phase0State: nil,
|
|
BellatrixState: &beaconStateBellatrixJson{},
|
|
},
|
|
}
|
|
runDefault, j, errJson := serializeV2State(response)
|
|
require.Equal(t, nil, errJson)
|
|
require.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
require.NotNil(t, j)
|
|
require.NoError(t, json.Unmarshal(j, &bellatrixStateResponseJson{}))
|
|
})
|
|
|
|
t.Run("incorrect response type", func(t *testing.T) {
|
|
runDefault, j, errJson := serializeV2State(&types.Empty{})
|
|
require.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
require.Equal(t, 0, len(j))
|
|
require.NotNil(t, errJson)
|
|
assert.Equal(t, true, strings.Contains(errJson.Msg(), "container is not of the correct type"))
|
|
})
|
|
|
|
t.Run("unsupported state version", func(t *testing.T) {
|
|
response := &beaconStateV2ResponseJson{
|
|
Version: "unsupported",
|
|
}
|
|
runDefault, j, errJson := serializeV2State(response)
|
|
require.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
require.Equal(t, 0, len(j))
|
|
require.NotNil(t, errJson)
|
|
assert.Equal(t, true, strings.Contains(errJson.Msg(), "unsupported state version"))
|
|
})
|
|
}
|
|
|
|
func TestSerializeProduceV2Block(t *testing.T) {
|
|
t.Run("Phase 0", func(t *testing.T) {
|
|
response := &produceBlockResponseV2Json{
|
|
Version: ethpbv2.Version_PHASE0.String(),
|
|
Data: &beaconBlockContainerV2Json{
|
|
Phase0Block: &beaconBlockJson{
|
|
Slot: "1",
|
|
ProposerIndex: "1",
|
|
ParentRoot: "root",
|
|
StateRoot: "root",
|
|
Body: &beaconBlockBodyJson{},
|
|
},
|
|
AltairBlock: nil,
|
|
},
|
|
}
|
|
runDefault, j, errJson := serializeProducedV2Block(response)
|
|
require.Equal(t, nil, errJson)
|
|
require.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
require.NotNil(t, j)
|
|
resp := &phase0ProduceBlockResponseJson{}
|
|
require.NoError(t, json.Unmarshal(j, resp))
|
|
require.NotNil(t, resp.Data)
|
|
require.NotNil(t, resp.Data)
|
|
beaconBlock := resp.Data
|
|
assert.Equal(t, "1", beaconBlock.Slot)
|
|
assert.Equal(t, "1", beaconBlock.ProposerIndex)
|
|
assert.Equal(t, "root", beaconBlock.ParentRoot)
|
|
assert.Equal(t, "root", beaconBlock.StateRoot)
|
|
require.NotNil(t, beaconBlock.Body)
|
|
})
|
|
|
|
t.Run("Altair", func(t *testing.T) {
|
|
response := &produceBlockResponseV2Json{
|
|
Version: ethpbv2.Version_ALTAIR.String(),
|
|
Data: &beaconBlockContainerV2Json{
|
|
Phase0Block: nil,
|
|
AltairBlock: &beaconBlockAltairJson{
|
|
Slot: "1",
|
|
ProposerIndex: "1",
|
|
ParentRoot: "root",
|
|
StateRoot: "root",
|
|
Body: &beaconBlockBodyAltairJson{},
|
|
},
|
|
},
|
|
}
|
|
runDefault, j, errJson := serializeProducedV2Block(response)
|
|
require.Equal(t, nil, errJson)
|
|
require.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
require.NotNil(t, j)
|
|
resp := &altairProduceBlockResponseJson{}
|
|
require.NoError(t, json.Unmarshal(j, resp))
|
|
require.NotNil(t, resp.Data)
|
|
require.NotNil(t, resp.Data)
|
|
beaconBlock := resp.Data
|
|
assert.Equal(t, "1", beaconBlock.Slot)
|
|
assert.Equal(t, "1", beaconBlock.ProposerIndex)
|
|
assert.Equal(t, "root", beaconBlock.ParentRoot)
|
|
assert.Equal(t, "root", beaconBlock.StateRoot)
|
|
require.NotNil(t, beaconBlock.Body)
|
|
})
|
|
|
|
t.Run("incorrect response type", func(t *testing.T) {
|
|
response := &types.Empty{}
|
|
runDefault, j, errJson := serializeProducedV2Block(response)
|
|
require.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
require.Equal(t, 0, len(j))
|
|
require.NotNil(t, errJson)
|
|
assert.Equal(t, true, strings.Contains(errJson.Msg(), "container is not of the correct type"))
|
|
})
|
|
|
|
t.Run("unsupported block version", func(t *testing.T) {
|
|
response := &produceBlockResponseV2Json{
|
|
Version: "unsupported",
|
|
}
|
|
runDefault, j, errJson := serializeProducedV2Block(response)
|
|
require.Equal(t, apimiddleware.RunDefault(false), runDefault)
|
|
require.Equal(t, 0, len(j))
|
|
require.NotNil(t, errJson)
|
|
assert.Equal(t, true, strings.Contains(errJson.Msg(), "unsupported block version"))
|
|
})
|
|
}
|