mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-12 04:30:04 +00:00
7f56ac6355
* Massive code cleanup * fix test issues * remove GetGenesis mock expectations * unused receiver * rename unused params Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
83 lines
2.6 KiB
Go
83 lines
2.6 KiB
Go
package mock
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
|
|
"github.com/prysmaticlabs/prysm/async/event"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/signing"
|
|
fieldparams "github.com/prysmaticlabs/prysm/config/fieldparams"
|
|
"github.com/prysmaticlabs/prysm/crypto/bls"
|
|
"github.com/prysmaticlabs/prysm/encoding/bytesutil"
|
|
ethpbservice "github.com/prysmaticlabs/prysm/proto/eth/service"
|
|
validatorpb "github.com/prysmaticlabs/prysm/proto/prysm/v1alpha1/validator-client"
|
|
"github.com/prysmaticlabs/prysm/testing/util"
|
|
"github.com/prysmaticlabs/prysm/time/slots"
|
|
"github.com/prysmaticlabs/prysm/validator/keymanager"
|
|
)
|
|
|
|
// MockKeymanager --
|
|
type MockKeymanager struct {
|
|
PublicKeys [][fieldparams.BLSPubkeyLength]byte
|
|
ReloadPublicKeysChan chan [][fieldparams.BLSPubkeyLength]byte
|
|
ReloadPublicKeysCalled bool
|
|
accountsChangedFeed *event.Feed
|
|
}
|
|
|
|
func NewMock() MockKeymanager {
|
|
return MockKeymanager{
|
|
accountsChangedFeed: new(event.Feed),
|
|
ReloadPublicKeysChan: make(chan [][fieldparams.BLSPubkeyLength]byte, 1),
|
|
}
|
|
}
|
|
|
|
// FetchValidatingPublicKeys --
|
|
func (m *MockKeymanager) FetchValidatingPublicKeys(context.Context) ([][fieldparams.BLSPubkeyLength]byte, error) {
|
|
return m.PublicKeys, nil
|
|
}
|
|
|
|
// Sign --
|
|
func (*MockKeymanager) Sign(_ context.Context, s *validatorpb.SignRequest) (bls.Signature, error) {
|
|
key, err := bls.RandKey()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
st, _ := util.DeterministicGenesisState(nil, 1)
|
|
e := slots.ToEpoch(st.Slot())
|
|
byteValue, err := signing.ComputeDomainAndSign(st, e, s.SigningSlot, bytesutil.ToBytes4(s.SignatureDomain), key)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return bls.SignatureFromBytes(byteValue)
|
|
}
|
|
|
|
// SubscribeAccountChanges --
|
|
func (m *MockKeymanager) SubscribeAccountChanges(chan [][fieldparams.BLSPubkeyLength]byte) event.Subscription {
|
|
return m.accountsChangedFeed.Subscribe(m.ReloadPublicKeysChan)
|
|
}
|
|
|
|
// ReloadPublicKeys --
|
|
func (m *MockKeymanager) ReloadPublicKeys(context.Context) ([][fieldparams.BLSPubkeyLength]byte, error) {
|
|
m.ReloadPublicKeysCalled = true
|
|
m.ReloadPublicKeysChan <- m.PublicKeys
|
|
return m.PublicKeys, nil
|
|
}
|
|
|
|
// ExtractKeystores --
|
|
func (*MockKeymanager) ExtractKeystores(
|
|
_ context.Context, _ []bls.PublicKey, _ string,
|
|
) ([]*keymanager.Keystore, error) {
|
|
return nil, errors.New("extracting keys not supported for a remote keymanager")
|
|
}
|
|
|
|
// ListKeymanagerAccounts --
|
|
func (*MockKeymanager) ListKeymanagerAccounts(
|
|
context.Context, keymanager.ListKeymanagerAccountConfig) error {
|
|
return nil
|
|
}
|
|
|
|
func (*MockKeymanager) DeleteKeystores(context.Context, [][]byte,
|
|
) ([]*ethpbservice.DeletedKeystoreStatus, error) {
|
|
return nil, nil
|
|
}
|