mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 21:07:18 +00:00
1b5b8a57e0
* Update io_kubernetes_build commit hash to 1246899 * Update dependency build_bazel_rules_nodejs to v0.33.1 * Update dependency com_github_hashicorp_golang_lru to v0.5.1 * Update libp2p * Update io_bazel_rules_k8s commit hash to e68d5d7 * Starting to remove old protos * Bazel build proto passes * Fixing pb version * Cleaned up core package * Fixing tests * 6 tests failing * Update proto bugs * Fixed incorrect validator ordering proto * Sync with master * Update go-ssz commit * Removed bad copies from v1alpha1 folder * add json spec json to pb handler * add nested proto example * proto/testing test works * fix refactoring build failures * use merged ssz * push latest changes * used forked json encoding * used forked json encoding * fix warning * fix build issues * fix test and lint * fix build * lint
148 lines
3.4 KiB
Go
148 lines
3.4 KiB
Go
package db
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/boltdb/bolt"
|
|
pb "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1"
|
|
ethpb "github.com/prysmaticlabs/prysm/proto/eth/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/shared/hashutil"
|
|
)
|
|
|
|
func TestSaveAndRetrieveValidatorIndex_OK(t *testing.T) {
|
|
db := setupDB(t)
|
|
defer teardownDB(t, db)
|
|
|
|
p1 := []byte{'A', 'B', 'C'}
|
|
p2 := []byte{'D', 'E', 'F'}
|
|
|
|
if err := db.SaveValidatorIndex(p1, 1); err != nil {
|
|
t.Fatalf("Failed to save vallidator index: %v", err)
|
|
}
|
|
if err := db.SaveValidatorIndex(p2, 2); err != nil {
|
|
t.Fatalf("Failed to save vallidator index: %v", err)
|
|
}
|
|
|
|
index1, err := db.ValidatorIndex(p1)
|
|
if err != nil {
|
|
t.Fatalf("Failed to call Attestation: %v", err)
|
|
}
|
|
if index1 != 1 {
|
|
t.Fatalf("Saved index and retrieved index are not equal: %#x and %#x", 1, index1)
|
|
}
|
|
|
|
index2, err := db.ValidatorIndex(p2)
|
|
if err != nil {
|
|
t.Fatalf("Failed to call Attestation: %v", err)
|
|
}
|
|
if index2 != 2 {
|
|
t.Fatalf("Saved index and retrieved index are not equal: %#x and %#x", 2, index2)
|
|
}
|
|
}
|
|
|
|
func TestSaveAndDeleteValidatorIndex_OK(t *testing.T) {
|
|
db := setupDB(t)
|
|
defer teardownDB(t, db)
|
|
|
|
p1 := []byte{'1', '2', '3'}
|
|
|
|
if err := db.SaveValidatorIndex(p1, 3); err != nil {
|
|
t.Fatalf("Failed to save validator index: %v", err)
|
|
}
|
|
if err := db.SaveState(context.Background(), &pb.BeaconState{}); err != nil {
|
|
t.Fatalf("Failed to save state: %v", err)
|
|
}
|
|
index, err := db.ValidatorIndex(p1)
|
|
if err != nil {
|
|
t.Fatalf("Failed to call validator Index: %v", err)
|
|
}
|
|
if index != 3 {
|
|
t.Fatalf("Saved index and retrieved index are not equal: %#x and %#x", 3, index)
|
|
}
|
|
|
|
if err := db.DeleteValidatorIndex(p1); err != nil {
|
|
t.Fatalf("Could not delete attestation: %v", err)
|
|
}
|
|
_, err = db.ValidatorIndex(p1)
|
|
want := fmt.Sprintf("validator %#x does not exist", p1)
|
|
if !strings.Contains(err.Error(), want) {
|
|
t.Errorf("Want: %v, got: %v", want, err.Error())
|
|
}
|
|
}
|
|
|
|
func TestHasValidator(t *testing.T) {
|
|
db := setupDB(t)
|
|
defer teardownDB(t, db)
|
|
|
|
pk := []byte("pk")
|
|
|
|
// Populate the db with some public key
|
|
if err := db.db.Update(func(tx *bolt.Tx) error {
|
|
bkt := tx.Bucket(validatorBucket)
|
|
h := hashutil.Hash(pk)
|
|
return bkt.Put(h[:], []byte("data"))
|
|
}); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if !db.HasValidator(pk) {
|
|
t.Error("Database did not have expected validator")
|
|
}
|
|
|
|
if db.HasValidator([]byte("bogus")) {
|
|
t.Error("Database returned true for validator that did not exist")
|
|
}
|
|
}
|
|
|
|
func TestHasAnyValidator(t *testing.T) {
|
|
db := setupDB(t)
|
|
defer teardownDB(t, db)
|
|
|
|
knownPubKeys := [][]byte{
|
|
[]byte("pk1"),
|
|
[]byte("pk2"),
|
|
}
|
|
unknownPubKeys := [][]byte{
|
|
[]byte("pk3"),
|
|
[]byte("pk4"),
|
|
}
|
|
|
|
// Populate the db with some public key
|
|
if err := db.db.Update(func(tx *bolt.Tx) error {
|
|
bkt := tx.Bucket(validatorBucket)
|
|
for _, pk := range knownPubKeys {
|
|
h := hashutil.Hash(pk)
|
|
if err := bkt.Put(h[:], []byte("data")); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
beaconState := &pb.BeaconState{
|
|
Validators: []*ethpb.Validator{},
|
|
}
|
|
|
|
has, err := db.HasAnyValidators(beaconState, append(knownPubKeys, unknownPubKeys...))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if !has {
|
|
t.Error("Database did not have expected validators")
|
|
}
|
|
|
|
has, err = db.HasAnyValidators(beaconState, unknownPubKeys)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if has {
|
|
t.Error("Database returned true when there are only pubkeys that did not exist")
|
|
}
|
|
}
|