prysm-pulse/beacon-chain/rpc/beaconv1/validator_test.go
Raul Jordan 5aac06f04e
Move EthereumAPIs Into Prysm (#8968)
* begin move

* use same import path

* imports

* regen protos

* regen

* no rename

* generate ssz

* gaz

* fmt

* edit build file

* imports

* modify

* remove generated files

* remove protos

* edit imports in prysm

* beacon chain all builds

* edit script

* add generated pbs

* add replace rules

* license for ethereumapis protos

* change visibility

* fmt

* update build files to gaz ignore

* use proper form

* edit imports

* wrap block

* revert scripts

* revert go mod
2021-06-02 18:49:52 -05:00

935 lines
26 KiB
Go

package beaconv1
import (
"bytes"
"context"
"strings"
"testing"
ethpb_alpha "github.com/prysmaticlabs/prysm/proto/eth/v1alpha1"
"github.com/ethereum/go-ethereum/common/hexutil"
types "github.com/prysmaticlabs/eth2-types"
chainMock "github.com/prysmaticlabs/prysm/beacon-chain/blockchain/testing"
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
"github.com/prysmaticlabs/prysm/beacon-chain/rpc/statefetcher"
iface "github.com/prysmaticlabs/prysm/beacon-chain/state/interface"
ethpb "github.com/prysmaticlabs/prysm/proto/eth/v1"
"github.com/prysmaticlabs/prysm/shared/params"
"github.com/prysmaticlabs/prysm/shared/testutil"
"github.com/prysmaticlabs/prysm/shared/testutil/assert"
"github.com/prysmaticlabs/prysm/shared/testutil/require"
)
func TestGetValidator(t *testing.T) {
ctx := context.Background()
var state iface.BeaconState
state, _ = testutil.DeterministicGenesisState(t, 8192)
t.Run("Head Get Validator by index", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
resp, err := s.GetValidator(ctx, &ethpb.StateValidatorRequest{
StateId: []byte("head"),
ValidatorId: []byte("15"),
})
require.NoError(t, err)
assert.Equal(t, types.ValidatorIndex(15), resp.Data.Index)
})
t.Run("Head Get Validator by pubkey", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
pubKey := state.PubkeyAtIndex(types.ValidatorIndex(20))
resp, err := s.GetValidator(ctx, &ethpb.StateValidatorRequest{
StateId: []byte("head"),
ValidatorId: pubKey[:],
})
require.NoError(t, err)
assert.Equal(t, types.ValidatorIndex(20), resp.Data.Index)
assert.Equal(t, true, bytes.Equal(pubKey[:], resp.Data.Validator.Pubkey))
})
t.Run("Hex root not found", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
stateId, err := hexutil.Decode("0x" + strings.Repeat("f", 64))
require.NoError(t, err)
_, err = s.GetValidator(ctx, &ethpb.StateValidatorRequest{
StateId: stateId,
})
require.ErrorContains(t, "state not found in the last 8192 state roots in head state", err)
})
t.Run("Invalid state ID", func(t *testing.T) {
s := Server{}
pubKey := state.PubkeyAtIndex(types.ValidatorIndex(20))
_, err := s.GetValidator(ctx, &ethpb.StateValidatorRequest{
StateId: []byte("foo"),
ValidatorId: pubKey[:],
})
require.ErrorContains(t, "invalid state ID: foo", err)
})
t.Run("Validator ID required", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
_, err := s.GetValidator(ctx, &ethpb.StateValidatorRequest{
StateId: []byte("head"),
})
require.ErrorContains(t, "Must request a validator id", err)
})
}
func TestListValidators(t *testing.T) {
ctx := context.Background()
var state iface.BeaconState
state, _ = testutil.DeterministicGenesisState(t, 8192)
t.Run("Head List All Validators", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
resp, err := s.ListValidators(ctx, &ethpb.StateValidatorsRequest{
StateId: []byte("head"),
})
require.NoError(t, err)
assert.Equal(t, len(resp.Data), 8192)
for _, val := range resp.Data {
assert.Equal(t, ethpb.ValidatorStatus_ACTIVE_ONGOING, val.Status)
}
})
t.Run("Head List Validators by index", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
ids := [][]byte{[]byte("15"), []byte("26"), []byte("400")}
idNums := []types.ValidatorIndex{15, 26, 400}
resp, err := s.ListValidators(ctx, &ethpb.StateValidatorsRequest{
StateId: []byte("head"),
Id: ids,
})
require.NoError(t, err)
for i, val := range resp.Data {
assert.Equal(t, idNums[i], val.Index)
assert.Equal(t, ethpb.ValidatorStatus_ACTIVE_ONGOING, val.Status)
}
})
t.Run("Head List Validators by pubkey", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
idNums := []types.ValidatorIndex{20, 66, 90, 100}
pubkey1 := state.PubkeyAtIndex(types.ValidatorIndex(20))
pubkey2 := state.PubkeyAtIndex(types.ValidatorIndex(66))
pubkey3 := state.PubkeyAtIndex(types.ValidatorIndex(90))
pubkey4 := state.PubkeyAtIndex(types.ValidatorIndex(100))
pubKeys := [][]byte{pubkey1[:], pubkey2[:], pubkey3[:], pubkey4[:]}
resp, err := s.ListValidators(ctx, &ethpb.StateValidatorsRequest{
StateId: []byte("head"),
Id: pubKeys,
})
require.NoError(t, err)
for i, val := range resp.Data {
assert.Equal(t, idNums[i], val.Index)
assert.Equal(t, true, bytes.Equal(pubKeys[i], val.Validator.Pubkey))
assert.Equal(t, ethpb.ValidatorStatus_ACTIVE_ONGOING, val.Status)
}
})
t.Run("Head List Validators by both index and pubkey", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
idNums := []types.ValidatorIndex{20, 90, 170, 129}
pubkey1 := state.PubkeyAtIndex(types.ValidatorIndex(20))
pubkey2 := state.PubkeyAtIndex(types.ValidatorIndex(90))
pubkey3 := state.PubkeyAtIndex(types.ValidatorIndex(170))
pubkey4 := state.PubkeyAtIndex(types.ValidatorIndex(129))
pubkeys := [][]byte{pubkey1[:], pubkey2[:], pubkey3[:], pubkey4[:]}
ids := [][]byte{pubkey1[:], []byte("90"), pubkey3[:], []byte("129")}
resp, err := s.ListValidators(ctx, &ethpb.StateValidatorsRequest{
StateId: []byte("head"),
Id: ids,
})
require.NoError(t, err)
for i, val := range resp.Data {
assert.Equal(t, idNums[i], val.Index)
assert.Equal(t, true, bytes.Equal(pubkeys[i], val.Validator.Pubkey))
assert.Equal(t, ethpb.ValidatorStatus_ACTIVE_ONGOING, val.Status)
}
})
t.Run("Hex root not found", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
stateId, err := hexutil.Decode("0x" + strings.Repeat("f", 64))
require.NoError(t, err)
_, err = s.ListValidators(ctx, &ethpb.StateValidatorsRequest{
StateId: stateId,
})
require.ErrorContains(t, "state not found in the last 8192 state roots in head state", err)
})
t.Run("Invalid state ID", func(t *testing.T) {
s := Server{}
_, err := s.ListValidators(ctx, &ethpb.StateValidatorsRequest{
StateId: []byte("foo"),
})
require.ErrorContains(t, "invalid state ID: foo", err)
})
}
func TestListValidators_Status(t *testing.T) {
ctx := context.Background()
var state iface.BeaconState
state, _ = testutil.DeterministicGenesisState(t, 8192)
farFutureEpoch := params.BeaconConfig().FarFutureEpoch
validators := []*ethpb_alpha.Validator{
// Pending initialized.
{
ActivationEpoch: farFutureEpoch,
ActivationEligibilityEpoch: farFutureEpoch,
},
// Pending queued.
{
ActivationEpoch: 10,
ActivationEligibilityEpoch: 4,
},
// Active ongoing.
{
ActivationEpoch: 0,
ExitEpoch: farFutureEpoch,
},
// Active slashed.
{
ActivationEpoch: 0,
ExitEpoch: 30,
Slashed: true,
},
// Active exiting.
{
ActivationEpoch: 3,
ExitEpoch: 30,
Slashed: false,
},
// Exit slashed (at epoch 35).
{
ActivationEpoch: 3,
ExitEpoch: 30,
WithdrawableEpoch: 40,
Slashed: true,
},
// Exit unslashed (at epoch 35).
{
ActivationEpoch: 3,
ExitEpoch: 30,
WithdrawableEpoch: 40,
Slashed: false,
},
// Withdrawable (at epoch 45).
{
ActivationEpoch: 3,
ExitEpoch: 30,
WithdrawableEpoch: 40,
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
Slashed: false,
},
// Withdrawal done (at epoch 45).
{
ActivationEpoch: 3,
ExitEpoch: 30,
WithdrawableEpoch: 40,
EffectiveBalance: 0,
Slashed: false,
},
}
for _, validator := range validators {
require.NoError(t, state.AppendValidator(validator))
require.NoError(t, state.AppendBalance(params.BeaconConfig().MaxEffectiveBalance))
}
t.Run("Head List All ACTIVE Validators", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
resp, err := s.ListValidators(ctx, &ethpb.StateValidatorsRequest{
StateId: []byte("head"),
Status: []ethpb.ValidatorStatus{ethpb.ValidatorStatus_ACTIVE},
})
require.NoError(t, err)
assert.Equal(t, len(resp.Data), 8192+2 /* 2 active */)
for _, datum := range resp.Data {
status, err := validatorStatus(datum.Validator, 0)
require.NoError(t, err)
require.Equal(
t,
true,
status == ethpb.ValidatorStatus_ACTIVE,
)
require.Equal(
t,
true,
datum.Status == ethpb.ValidatorStatus_ACTIVE_ONGOING ||
datum.Status == ethpb.ValidatorStatus_ACTIVE_EXITING ||
datum.Status == ethpb.ValidatorStatus_ACTIVE_SLASHED,
)
}
})
t.Run("Head List All ACTIVE_ONGOING Validators", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
resp, err := s.ListValidators(ctx, &ethpb.StateValidatorsRequest{
StateId: []byte("head"),
Status: []ethpb.ValidatorStatus{ethpb.ValidatorStatus_ACTIVE_ONGOING},
})
require.NoError(t, err)
assert.Equal(t, len(resp.Data), 8192+1 /* 1 active_ongoing */)
for _, datum := range resp.Data {
status, err := validatorSubStatus(datum.Validator, 0)
require.NoError(t, err)
require.Equal(
t,
true,
status == ethpb.ValidatorStatus_ACTIVE_ONGOING,
)
require.Equal(
t,
true,
datum.Status == ethpb.ValidatorStatus_ACTIVE_ONGOING,
)
}
})
require.NoError(t, state.SetSlot(params.BeaconConfig().SlotsPerEpoch*35))
t.Run("Head List All EXITED Validators", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
resp, err := s.ListValidators(ctx, &ethpb.StateValidatorsRequest{
StateId: []byte("head"),
Status: []ethpb.ValidatorStatus{ethpb.ValidatorStatus_EXITED},
})
require.NoError(t, err)
assert.Equal(t, 4 /* 4 exited */, len(resp.Data))
for _, datum := range resp.Data {
status, err := validatorStatus(datum.Validator, 35)
require.NoError(t, err)
require.Equal(
t,
true,
status == ethpb.ValidatorStatus_EXITED,
)
require.Equal(
t,
true,
datum.Status == ethpb.ValidatorStatus_EXITED_UNSLASHED || datum.Status == ethpb.ValidatorStatus_EXITED_SLASHED,
)
}
})
t.Run("Head List All PENDING_INITIALIZED and EXITED_UNSLASHED Validators", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
resp, err := s.ListValidators(ctx, &ethpb.StateValidatorsRequest{
StateId: []byte("head"),
Status: []ethpb.ValidatorStatus{ethpb.ValidatorStatus_PENDING_INITIALIZED, ethpb.ValidatorStatus_EXITED_UNSLASHED},
})
require.NoError(t, err)
assert.Equal(t, 4 /* 4 exited */, len(resp.Data))
for _, datum := range resp.Data {
status, err := validatorSubStatus(datum.Validator, 35)
require.NoError(t, err)
require.Equal(
t,
true,
status == ethpb.ValidatorStatus_PENDING_INITIALIZED || status == ethpb.ValidatorStatus_EXITED_UNSLASHED,
)
require.Equal(
t,
true,
datum.Status == ethpb.ValidatorStatus_PENDING_INITIALIZED || datum.Status == ethpb.ValidatorStatus_EXITED_UNSLASHED,
)
}
})
t.Run("Head List All PENDING and EXITED Validators", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
resp, err := s.ListValidators(ctx, &ethpb.StateValidatorsRequest{
StateId: []byte("head"),
Status: []ethpb.ValidatorStatus{ethpb.ValidatorStatus_PENDING, ethpb.ValidatorStatus_EXITED_SLASHED},
})
require.NoError(t, err)
assert.Equal(t, 2 /* 1 pending, 1 exited */, len(resp.Data))
for _, datum := range resp.Data {
status, err := validatorStatus(datum.Validator, 35)
require.NoError(t, err)
subStatus, err := validatorSubStatus(datum.Validator, 35)
require.NoError(t, err)
require.Equal(
t,
true,
status == ethpb.ValidatorStatus_PENDING || subStatus == ethpb.ValidatorStatus_EXITED_SLASHED,
)
require.Equal(
t,
true,
datum.Status == ethpb.ValidatorStatus_PENDING_INITIALIZED || datum.Status == ethpb.ValidatorStatus_EXITED_SLASHED,
)
}
})
}
func TestListValidatorBalances(t *testing.T) {
ctx := context.Background()
var state iface.BeaconState
state, _ = testutil.DeterministicGenesisState(t, 8192)
t.Run("Head List Validators Balance by index", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
ids := [][]byte{[]byte("15"), []byte("26"), []byte("400")}
idNums := []types.ValidatorIndex{15, 26, 400}
resp, err := s.ListValidatorBalances(ctx, &ethpb.ValidatorBalancesRequest{
StateId: []byte("head"),
Id: ids,
})
require.NoError(t, err)
for i, val := range resp.Data {
assert.Equal(t, idNums[i], val.Index)
assert.Equal(t, params.BeaconConfig().MaxEffectiveBalance, val.Balance)
}
})
t.Run("Head List Validators Balance by pubkey", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
idNums := []types.ValidatorIndex{20, 66, 90, 100}
pubkey1 := state.PubkeyAtIndex(types.ValidatorIndex(20))
pubkey2 := state.PubkeyAtIndex(types.ValidatorIndex(66))
pubkey3 := state.PubkeyAtIndex(types.ValidatorIndex(90))
pubkey4 := state.PubkeyAtIndex(types.ValidatorIndex(100))
pubKeys := [][]byte{pubkey1[:], pubkey2[:], pubkey3[:], pubkey4[:]}
resp, err := s.ListValidatorBalances(ctx, &ethpb.ValidatorBalancesRequest{
StateId: []byte("head"),
Id: pubKeys,
})
require.NoError(t, err)
for i, val := range resp.Data {
assert.Equal(t, idNums[i], val.Index)
assert.Equal(t, params.BeaconConfig().MaxEffectiveBalance, val.Balance)
}
})
t.Run("Head List Validators Balance by both index and pubkey", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
idNums := []types.ValidatorIndex{20, 90, 170, 129}
pubkey1 := state.PubkeyAtIndex(types.ValidatorIndex(20))
pubkey3 := state.PubkeyAtIndex(types.ValidatorIndex(170))
ids := [][]byte{pubkey1[:], []byte("90"), pubkey3[:], []byte("129")}
resp, err := s.ListValidatorBalances(ctx, &ethpb.ValidatorBalancesRequest{
StateId: []byte("head"),
Id: ids,
})
require.NoError(t, err)
for i, val := range resp.Data {
assert.Equal(t, idNums[i], val.Index)
assert.Equal(t, params.BeaconConfig().MaxEffectiveBalance, val.Balance)
}
})
t.Run("Hex root not found", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
stateId, err := hexutil.Decode("0x" + strings.Repeat("f", 64))
require.NoError(t, err)
_, err = s.ListValidatorBalances(ctx, &ethpb.ValidatorBalancesRequest{
StateId: stateId,
})
require.ErrorContains(t, "state not found in the last 8192 state roots in head state", err)
})
t.Run("Invalid state ID", func(t *testing.T) {
s := Server{}
_, err := s.ListValidatorBalances(ctx, &ethpb.ValidatorBalancesRequest{
StateId: []byte("foo"),
})
require.ErrorContains(t, "invalid state ID: foo", err)
})
}
func TestListCommittees(t *testing.T) {
ctx := context.Background()
var state iface.BeaconState
state, _ = testutil.DeterministicGenesisState(t, 8192)
epoch := helpers.SlotToEpoch(state.Slot())
t.Run("Head All Committees", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
resp, err := s.ListCommittees(ctx, &ethpb.StateCommitteesRequest{
StateId: []byte("head"),
})
require.NoError(t, err)
assert.Equal(t, int(params.BeaconConfig().SlotsPerEpoch)*2, len(resp.Data))
for _, datum := range resp.Data {
assert.Equal(t, true, datum.Index == types.CommitteeIndex(0) || datum.Index == types.CommitteeIndex(1))
assert.Equal(t, epoch, helpers.SlotToEpoch(datum.Slot))
}
})
t.Run("Head All Committees of Epoch 10", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
epoch := types.Epoch(10)
resp, err := s.ListCommittees(ctx, &ethpb.StateCommitteesRequest{
StateId: []byte("head"),
Epoch: &epoch,
})
require.NoError(t, err)
for _, datum := range resp.Data {
assert.Equal(t, true, datum.Slot >= 320 && datum.Slot <= 351)
}
})
t.Run("Head All Committees of Slot 4", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
slot := types.Slot(4)
resp, err := s.ListCommittees(ctx, &ethpb.StateCommitteesRequest{
StateId: []byte("head"),
Slot: &slot,
})
require.NoError(t, err)
assert.Equal(t, 2, len(resp.Data))
index := types.CommitteeIndex(0)
for _, datum := range resp.Data {
assert.Equal(t, epoch, helpers.SlotToEpoch(datum.Slot))
assert.Equal(t, slot, datum.Slot)
assert.Equal(t, index, datum.Index)
index++
}
})
t.Run("Head All Committees of Index 1", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
index := types.CommitteeIndex(1)
resp, err := s.ListCommittees(ctx, &ethpb.StateCommitteesRequest{
StateId: []byte("head"),
Index: &index,
})
require.NoError(t, err)
assert.Equal(t, int(params.BeaconConfig().SlotsPerEpoch), len(resp.Data))
slot := types.Slot(0)
for _, datum := range resp.Data {
assert.Equal(t, epoch, helpers.SlotToEpoch(datum.Slot))
assert.Equal(t, slot, datum.Slot)
assert.Equal(t, index, datum.Index)
slot++
}
})
t.Run("Head All Committees of Slot 2, Index 1", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
index := types.CommitteeIndex(1)
slot := types.Slot(2)
resp, err := s.ListCommittees(ctx, &ethpb.StateCommitteesRequest{
StateId: []byte("head"),
Slot: &slot,
Index: &index,
})
require.NoError(t, err)
assert.Equal(t, 1, len(resp.Data))
for _, datum := range resp.Data {
assert.Equal(t, epoch, helpers.SlotToEpoch(datum.Slot))
assert.Equal(t, slot, datum.Slot)
assert.Equal(t, index, datum.Index)
}
})
t.Run("Hex root not found", func(t *testing.T) {
s := Server{
StateFetcher: statefetcher.StateProvider{
ChainInfoFetcher: &chainMock.ChainService{State: state},
},
}
stateId, err := hexutil.Decode("0x" + strings.Repeat("f", 64))
require.NoError(t, err)
_, err = s.ListCommittees(ctx, &ethpb.StateCommitteesRequest{
StateId: stateId,
})
require.ErrorContains(t, "state not found in the last 8192 state roots in head state", err)
})
t.Run("Invalid state ID", func(t *testing.T) {
s := Server{}
_, err := s.ListCommittees(ctx, &ethpb.StateCommitteesRequest{
StateId: []byte("foo"),
})
require.ErrorContains(t, "invalid state ID: foo", err)
})
}
func Test_validatorStatus(t *testing.T) {
farFutureEpoch := params.BeaconConfig().FarFutureEpoch
type args struct {
validator *ethpb.Validator
epoch types.Epoch
}
tests := []struct {
name string
args args
want ethpb.ValidatorStatus
wantErr bool
}{
{
name: "pending initialized",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: farFutureEpoch,
ActivationEligibilityEpoch: farFutureEpoch,
},
epoch: types.Epoch(5),
},
want: ethpb.ValidatorStatus_PENDING,
},
{
name: "pending queued",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 10,
ActivationEligibilityEpoch: 2,
},
epoch: types.Epoch(5),
},
want: ethpb.ValidatorStatus_PENDING,
},
{
name: "active ongoing",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 3,
ExitEpoch: farFutureEpoch,
},
epoch: types.Epoch(5),
},
want: ethpb.ValidatorStatus_ACTIVE,
},
{
name: "active slashed",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 3,
ExitEpoch: 30,
Slashed: true,
},
epoch: types.Epoch(5),
},
want: ethpb.ValidatorStatus_ACTIVE,
},
{
name: "active exiting",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 3,
ExitEpoch: 30,
Slashed: false,
},
epoch: types.Epoch(5),
},
want: ethpb.ValidatorStatus_ACTIVE,
},
{
name: "exited slashed",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 3,
ExitEpoch: 30,
WithdrawableEpoch: 40,
Slashed: true,
},
epoch: types.Epoch(35),
},
want: ethpb.ValidatorStatus_EXITED,
},
{
name: "exited unslashed",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 3,
ExitEpoch: 30,
WithdrawableEpoch: 40,
Slashed: false,
},
epoch: types.Epoch(35),
},
want: ethpb.ValidatorStatus_EXITED,
},
{
name: "withdrawal possible",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 3,
ExitEpoch: 30,
WithdrawableEpoch: 40,
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
Slashed: false,
},
epoch: types.Epoch(45),
},
want: ethpb.ValidatorStatus_WITHDRAWAL,
},
{
name: "withdrawal done",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 3,
ExitEpoch: 30,
WithdrawableEpoch: 40,
EffectiveBalance: 0,
Slashed: false,
},
epoch: types.Epoch(45),
},
want: ethpb.ValidatorStatus_WITHDRAWAL,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
got, err := validatorStatus(tt.args.validator, tt.args.epoch)
require.NoError(t, err)
if got != tt.want {
t.Errorf("validatorStatus() got = %v, want %v", got, tt.want)
}
})
}
}
func Test_validatorSubStatus(t *testing.T) {
farFutureEpoch := params.BeaconConfig().FarFutureEpoch
type args struct {
validator *ethpb.Validator
epoch types.Epoch
}
tests := []struct {
name string
args args
want ethpb.ValidatorStatus
wantErr bool
}{
{
name: "pending initialized",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: farFutureEpoch,
ActivationEligibilityEpoch: farFutureEpoch,
},
epoch: types.Epoch(5),
},
want: ethpb.ValidatorStatus_PENDING_INITIALIZED,
},
{
name: "pending queued",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 10,
ActivationEligibilityEpoch: 2,
},
epoch: types.Epoch(5),
},
want: ethpb.ValidatorStatus_PENDING_QUEUED,
},
{
name: "active ongoing",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 3,
ExitEpoch: farFutureEpoch,
},
epoch: types.Epoch(5),
},
want: ethpb.ValidatorStatus_ACTIVE_ONGOING,
},
{
name: "active slashed",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 3,
ExitEpoch: 30,
Slashed: true,
},
epoch: types.Epoch(5),
},
want: ethpb.ValidatorStatus_ACTIVE_SLASHED,
},
{
name: "active exiting",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 3,
ExitEpoch: 30,
Slashed: false,
},
epoch: types.Epoch(5),
},
want: ethpb.ValidatorStatus_ACTIVE_EXITING,
},
{
name: "exited slashed",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 3,
ExitEpoch: 30,
WithdrawableEpoch: 40,
Slashed: true,
},
epoch: types.Epoch(35),
},
want: ethpb.ValidatorStatus_EXITED_SLASHED,
},
{
name: "exited unslashed",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 3,
ExitEpoch: 30,
WithdrawableEpoch: 40,
Slashed: false,
},
epoch: types.Epoch(35),
},
want: ethpb.ValidatorStatus_EXITED_UNSLASHED,
},
{
name: "withdrawal possible",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 3,
ExitEpoch: 30,
WithdrawableEpoch: 40,
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
Slashed: false,
},
epoch: types.Epoch(45),
},
want: ethpb.ValidatorStatus_WITHDRAWAL_POSSIBLE,
},
{
name: "withdrawal done",
args: args{
validator: &ethpb.Validator{
ActivationEpoch: 3,
ExitEpoch: 30,
WithdrawableEpoch: 40,
EffectiveBalance: 0,
Slashed: false,
},
epoch: types.Epoch(45),
},
want: ethpb.ValidatorStatus_WITHDRAWAL_DONE,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
got, err := validatorSubStatus(tt.args.validator, tt.args.epoch)
require.NoError(t, err)
if got != tt.want {
t.Errorf("validatorSubStatus() got = %v, want %v", got, tt.want)
}
})
}
}