mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-04 00:44:27 +00:00
ae13bb5c83
* begin using tree hash instead of hash for state and blocks * replace with ssz * rem references to vote cache * replace all instances of state/block hash with root * goimports * almost every test in the world fails * goimports * all tests pass, tree hash across repo
214 lines
7.0 KiB
Go
214 lines
7.0 KiB
Go
package state
|
|
|
|
import (
|
|
"bytes"
|
|
"reflect"
|
|
"strconv"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
"github.com/prysmaticlabs/prysm/shared/ssz"
|
|
|
|
b "github.com/prysmaticlabs/prysm/beacon-chain/core/blocks"
|
|
pb "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
)
|
|
|
|
func TestInitialBeaconState_Ok(t *testing.T) {
|
|
if params.BeaconConfig().EpochLength != 64 {
|
|
t.Errorf("EpochLength should be 64 for these tests to pass")
|
|
}
|
|
|
|
if params.BeaconConfig().GenesisSlot != 1<<63 {
|
|
t.Error("GenesisSlot should be 2^63 for these tests to pass")
|
|
}
|
|
initialEpochNumber := params.BeaconConfig().GenesisEpoch
|
|
|
|
if params.BeaconConfig().GenesisForkVersion != 0 {
|
|
t.Error("InitialSlot should be 0 for these tests to pass")
|
|
}
|
|
initialForkVersion := params.BeaconConfig().GenesisForkVersion
|
|
|
|
if params.BeaconConfig().ZeroHash != [32]byte{} {
|
|
t.Error("ZeroHash should be all 0s for these tests to pass")
|
|
}
|
|
|
|
if params.BeaconConfig().LatestRandaoMixesLength != 8192 {
|
|
t.Error("LatestRandaoMixesLength should be 8192 for these tests to pass")
|
|
}
|
|
latestRandaoMixesLength := int(params.BeaconConfig().LatestRandaoMixesLength)
|
|
|
|
if params.BeaconConfig().ShardCount != 1024 {
|
|
t.Error("ShardCount should be 1024 for these tests to pass")
|
|
}
|
|
shardCount := int(params.BeaconConfig().ShardCount)
|
|
|
|
if params.BeaconConfig().LatestBlockRootsLength != 8192 {
|
|
t.Error("LatestBlockRootsLength should be 8192 for these tests to pass")
|
|
}
|
|
|
|
if params.BeaconConfig().DepositsForChainStart != 16384 {
|
|
t.Error("DepositsForChainStart should be 16384 for these tests to pass")
|
|
}
|
|
depositsForChainStart := int(params.BeaconConfig().DepositsForChainStart)
|
|
|
|
if params.BeaconConfig().LatestPenalizedExitLength != 8192 {
|
|
t.Error("LatestPenalizedExitLength should be 8192 for these tests to pass")
|
|
}
|
|
latestPenalizedExitLength := int(params.BeaconConfig().LatestPenalizedExitLength)
|
|
|
|
genesisTime := uint64(99999)
|
|
processedPowReceiptRoot := []byte{'A', 'B', 'C'}
|
|
maxDeposit := params.BeaconConfig().MaxDepositAmount
|
|
var deposits []*pb.Deposit
|
|
for i := 0; i < depositsForChainStart; i++ {
|
|
depositData, err := b.EncodeDepositData(
|
|
&pb.DepositInput{
|
|
Pubkey: []byte(strconv.Itoa(i)),
|
|
ProofOfPossession: []byte{'B'},
|
|
WithdrawalCredentialsHash32: []byte{'C'},
|
|
},
|
|
maxDeposit,
|
|
time.Now().Unix(),
|
|
)
|
|
if err != nil {
|
|
t.Fatalf("Could not encode deposit data: %v", err)
|
|
}
|
|
deposits = append(deposits, &pb.Deposit{
|
|
MerkleBranchHash32S: [][]byte{{1}, {2}, {3}},
|
|
MerkleTreeIndex: 0,
|
|
DepositData: depositData,
|
|
})
|
|
}
|
|
|
|
state, err := InitialBeaconState(
|
|
deposits,
|
|
genesisTime,
|
|
processedPowReceiptRoot)
|
|
if err != nil {
|
|
t.Fatalf("could not execute InitialBeaconState: %v", err)
|
|
}
|
|
|
|
// Misc fields checks.
|
|
if state.Slot != params.BeaconConfig().GenesisSlot {
|
|
t.Error("Slot was not correctly initialized")
|
|
}
|
|
if state.GenesisTime != genesisTime {
|
|
t.Error("GenesisTime was not correctly initialized")
|
|
}
|
|
if !reflect.DeepEqual(*state.Fork, pb.Fork{
|
|
PreviousVersion: initialForkVersion,
|
|
CurrentVersion: initialForkVersion,
|
|
Epoch: initialEpochNumber,
|
|
}) {
|
|
t.Error("Fork was not correctly initialized")
|
|
}
|
|
|
|
// Validator registry fields checks.
|
|
if state.ValidatorRegistryUpdateEpoch != initialEpochNumber {
|
|
t.Error("ValidatorRegistryUpdateSlot was not correctly initialized")
|
|
}
|
|
if len(state.ValidatorRegistry) != depositsForChainStart {
|
|
t.Error("ValidatorRegistry was not correctly initialized")
|
|
}
|
|
if len(state.ValidatorBalances) != depositsForChainStart {
|
|
t.Error("ValidatorBalances was not correctly initialized")
|
|
}
|
|
|
|
// Randomness and committees fields checks.
|
|
if len(state.LatestRandaoMixesHash32S) != latestRandaoMixesLength {
|
|
t.Error("Length of LatestRandaoMixesHash32S was not correctly initialized")
|
|
}
|
|
|
|
// Finality fields checks.
|
|
if state.PreviousJustifiedEpoch != initialEpochNumber {
|
|
t.Error("PreviousJustifiedEpoch was not correctly initialized")
|
|
}
|
|
if state.JustifiedEpoch != initialEpochNumber {
|
|
t.Error("JustifiedEpoch was not correctly initialized")
|
|
}
|
|
if state.FinalizedEpoch != initialEpochNumber {
|
|
t.Error("FinalizedSlot was not correctly initialized")
|
|
}
|
|
if state.JustificationBitfield != 0 {
|
|
t.Error("JustificationBitfield was not correctly initialized")
|
|
}
|
|
|
|
// Recent state checks.
|
|
if len(state.LatestCrosslinks) != shardCount {
|
|
t.Error("Length of LatestCrosslinks was not correctly initialized")
|
|
}
|
|
if !reflect.DeepEqual(state.LatestPenalizedBalances,
|
|
make([]uint64, latestPenalizedExitLength)) {
|
|
t.Error("LatestPenalizedBalances was not correctly initialized")
|
|
}
|
|
if !reflect.DeepEqual(state.LatestAttestations, []*pb.PendingAttestation{}) {
|
|
t.Error("LatestAttestations was not correctly initialized")
|
|
}
|
|
if !reflect.DeepEqual(state.BatchedBlockRootHash32S, [][]byte{}) {
|
|
t.Error("BatchedBlockRootHash32S was not correctly initialized")
|
|
}
|
|
activeValidators := helpers.ActiveValidatorIndices(state.ValidatorRegistry, params.BeaconConfig().GenesisEpoch)
|
|
genesisActiveIndexRoot, err := ssz.TreeHash(activeValidators)
|
|
if err != nil {
|
|
t.Fatalf("Could not determine genesis active index root: %v", err)
|
|
}
|
|
if !bytes.Equal(state.LatestIndexRootHash32S[0], genesisActiveIndexRoot[:]) {
|
|
t.Errorf(
|
|
"Expected index roots to be the tree hash root of active validator indices, received %#x",
|
|
state.LatestIndexRootHash32S[0],
|
|
)
|
|
}
|
|
seed, err := helpers.GenerateSeed(state, params.BeaconConfig().GenesisEpoch)
|
|
if err != nil {
|
|
t.Fatalf("Could not generate initial seed: %v", err)
|
|
}
|
|
if !bytes.Equal(seed[:], state.CurrentEpochSeedHash32) {
|
|
t.Errorf("Expected current epoch seed to be %#x, received %#x", seed[:], state.CurrentEpochSeedHash32)
|
|
}
|
|
|
|
// deposit root checks.
|
|
if !bytes.Equal(state.LatestEth1Data.DepositRootHash32, processedPowReceiptRoot) {
|
|
t.Error("LatestEth1Data DepositRootHash32 was not correctly initialized")
|
|
}
|
|
if !reflect.DeepEqual(state.Eth1DataVotes, []*pb.Eth1DataVote{}) {
|
|
t.Error("Eth1DataVotes was not correctly initialized")
|
|
}
|
|
}
|
|
|
|
func TestGenesisState_HashEquality(t *testing.T) {
|
|
state1, _ := InitialBeaconState(nil, 0, nil)
|
|
state2, _ := InitialBeaconState(nil, 0, nil)
|
|
|
|
root1, err1 := ssz.TreeHash(state1)
|
|
root2, err2 := ssz.TreeHash(state2)
|
|
|
|
if err1 != nil || err2 != nil {
|
|
t.Fatalf("Failed to marshal state to bytes: %v %v", err1, err2)
|
|
}
|
|
|
|
if root1 != root2 {
|
|
t.Fatalf("Tree hash of two genesis states should be equal, received %#x == %#x", root1, root2)
|
|
}
|
|
}
|
|
|
|
func TestGenesisState_InitializesLatestBlockHashes(t *testing.T) {
|
|
s, _ := InitialBeaconState(nil, 0, nil)
|
|
want, got := len(s.LatestBlockRootHash32S), int(params.BeaconConfig().LatestBlockRootsLength)
|
|
if want != got {
|
|
t.Errorf("Wrong number of recent block hashes. Got: %d Want: %d", got, want)
|
|
}
|
|
|
|
want = cap(s.LatestBlockRootHash32S)
|
|
if want != got {
|
|
t.Errorf("The slice underlying array capacity is wrong. Got: %d Want: %d", got, want)
|
|
}
|
|
|
|
for _, h := range s.LatestBlockRootHash32S {
|
|
if !bytes.Equal(h, params.BeaconConfig().ZeroHash[:]) {
|
|
t.Errorf("Unexpected non-zero hash data: %v", h)
|
|
}
|
|
}
|
|
}
|