mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-27 21:57:16 +00:00
3d8bb73f15
* initial validator attesthead rewrite based on proposer rewrite * proceed with fetching committees and tree hashing the canonical head at assigned attester slot * complete filling the properties of attestation data and all associated root hashes * add when to attest todo * finish entire attester client logic * tests with mocks checked in * tests passing in client * stubbed out server implementation * fixed build due to old property * regen mocks with new mockgen version * fixed broken tests * complete bazel build fix * address some review comments * deep proto test * server implementation logic * attestation info tests * completed passing tests, tree hash still blocked by error with nil fields unfortunately * fix todo failure * gazelle rerun and master merge * testing full behavior of attestation info server * finished all required server tests and implementation * break loop * fix tests due to genesis slot updates
194 lines
6.5 KiB
Go
194 lines
6.5 KiB
Go
package rpc
|
|
|
|
import (
|
|
"context"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/prysmaticlabs/prysm/shared/hashutil"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
|
|
"github.com/gogo/protobuf/proto"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/blocks"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/internal"
|
|
|
|
pbp2p "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1"
|
|
pb "github.com/prysmaticlabs/prysm/proto/beacon/rpc/v1"
|
|
)
|
|
|
|
func TestAttestHead(t *testing.T) {
|
|
mockOperationService := &mockOperationService{}
|
|
attesterServer := &AttesterServer{
|
|
operationService: mockOperationService,
|
|
}
|
|
req := &pbp2p.Attestation{
|
|
Data: &pbp2p.AttestationData{
|
|
Slot: 999,
|
|
Shard: 1,
|
|
ShardBlockRootHash32: []byte{'a'},
|
|
},
|
|
}
|
|
if _, err := attesterServer.AttestHead(context.Background(), req); err != nil {
|
|
t.Errorf("Could not attest head correctly: %v", err)
|
|
}
|
|
}
|
|
|
|
func TestAttestationInfoAtSlot_NilHeadAtSlot(t *testing.T) {
|
|
db := internal.SetupDB(t)
|
|
defer internal.TeardownDB(t, db)
|
|
attesterServer := &AttesterServer{
|
|
beaconDB: db,
|
|
}
|
|
want := "no block found at slot 5"
|
|
req := &pb.AttestationInfoRequest{
|
|
Slot: 5,
|
|
}
|
|
if _, err := attesterServer.AttestationInfoAtSlot(context.Background(), req); !strings.Contains(err.Error(), want) {
|
|
t.Errorf("Expected %v, received %v", want, err)
|
|
}
|
|
}
|
|
|
|
func TestAttestationInfoAtSlot_EpochBoundaryFailure(t *testing.T) {
|
|
db := internal.SetupDB(t)
|
|
defer internal.TeardownDB(t, db)
|
|
beaconState := &pbp2p.BeaconState{
|
|
Slot: 5,
|
|
LatestBlockRootHash32S: make([][]byte, 20),
|
|
}
|
|
block := blocks.NewGenesisBlock([]byte("stateroot"))
|
|
block.Slot = 100
|
|
attesterServer := &AttesterServer{
|
|
beaconDB: db,
|
|
}
|
|
if err := attesterServer.beaconDB.SaveBlock(block); err != nil {
|
|
t.Fatalf("Could not save block in test db: %v", err)
|
|
}
|
|
if err := attesterServer.beaconDB.UpdateChainHead(block, beaconState); err != nil {
|
|
t.Fatalf("Could not update chain head in test db: %v", err)
|
|
}
|
|
want := "could not get epoch boundary block"
|
|
req := &pb.AttestationInfoRequest{
|
|
Slot: 100,
|
|
}
|
|
if _, err := attesterServer.AttestationInfoAtSlot(context.Background(), req); !strings.Contains(err.Error(), want) {
|
|
t.Errorf("Expected %v, received %v", want, err)
|
|
}
|
|
}
|
|
|
|
func TestAttestationInfoAtSlot_JustifiedBlockFailure(t *testing.T) {
|
|
db := internal.SetupDB(t)
|
|
defer internal.TeardownDB(t, db)
|
|
beaconState := &pbp2p.BeaconState{
|
|
Slot: params.BeaconConfig().EpochLength + 2,
|
|
LatestBlockRootHash32S: make([][]byte, 20),
|
|
}
|
|
block := &pbp2p.BeaconBlock{
|
|
Slot: 1,
|
|
}
|
|
attesterServer := &AttesterServer{
|
|
beaconDB: db,
|
|
}
|
|
if err := attesterServer.beaconDB.SaveBlock(block); err != nil {
|
|
t.Fatalf("Could not save block in test db: %v", err)
|
|
}
|
|
if err := attesterServer.beaconDB.UpdateChainHead(block, beaconState); err != nil {
|
|
t.Fatalf("Could not update chain head in test db: %v", err)
|
|
}
|
|
epochBoundaryBlock := &pbp2p.BeaconBlock{
|
|
Slot: 1,
|
|
}
|
|
if err := attesterServer.beaconDB.SaveBlock(epochBoundaryBlock); err != nil {
|
|
t.Fatalf("Could not save block in test db: %v", err)
|
|
}
|
|
if err := attesterServer.beaconDB.UpdateChainHead(epochBoundaryBlock, beaconState); err != nil {
|
|
t.Fatalf("Could not update chain head in test db: %v", err)
|
|
}
|
|
want := "could not get justified block"
|
|
req := &pb.AttestationInfoRequest{
|
|
Slot: 1,
|
|
}
|
|
if _, err := attesterServer.AttestationInfoAtSlot(context.Background(), req); !strings.Contains(err.Error(), want) {
|
|
t.Errorf("Expected %v, received %v", want, err)
|
|
}
|
|
}
|
|
|
|
func TestAttestationInfoAtSlot_Ok(t *testing.T) {
|
|
db := internal.SetupDB(t)
|
|
defer internal.TeardownDB(t, db)
|
|
block := &pbp2p.BeaconBlock{
|
|
Slot: 1,
|
|
}
|
|
epochBoundaryBlock := &pbp2p.BeaconBlock{
|
|
Slot: 1 * params.BeaconConfig().EpochLength,
|
|
}
|
|
justifiedBlock := &pbp2p.BeaconBlock{
|
|
Slot: 2 * params.BeaconConfig().EpochLength,
|
|
}
|
|
blockRoot, err := hashutil.HashBeaconBlock(block) // TODO(#1461): Use tree hashing instead.
|
|
if err != nil {
|
|
t.Fatalf("Could not hash beacon block: %v", err)
|
|
}
|
|
justifiedBlockRoot, err := hashutil.HashBeaconBlock(justifiedBlock) // TODO(#1461): Use tree hashing instead.
|
|
if err != nil {
|
|
t.Fatalf("Could not hash justified block: %v", err)
|
|
}
|
|
epochBoundaryRoot, err := hashutil.HashBeaconBlock(epochBoundaryBlock) // TODO(#1461): Use tree hashing instead.
|
|
if err != nil {
|
|
t.Fatalf("Could not hash justified block: %v", err)
|
|
}
|
|
beaconState := &pbp2p.BeaconState{
|
|
Slot: 3 * params.BeaconConfig().EpochLength,
|
|
JustifiedEpoch: 2 * params.BeaconConfig().EpochLength,
|
|
LatestBlockRootHash32S: make([][]byte, 3*params.BeaconConfig().EpochLength),
|
|
LatestCrosslinks: []*pbp2p.Crosslink{
|
|
{
|
|
ShardBlockRootHash32: []byte("A"),
|
|
},
|
|
},
|
|
}
|
|
beaconState.LatestBlockRootHash32S[1] = blockRoot[:]
|
|
beaconState.LatestBlockRootHash32S[1*params.BeaconConfig().EpochLength] = epochBoundaryRoot[:]
|
|
beaconState.LatestBlockRootHash32S[2*params.BeaconConfig().EpochLength] = justifiedBlockRoot[:]
|
|
attesterServer := &AttesterServer{
|
|
beaconDB: db,
|
|
}
|
|
if err := attesterServer.beaconDB.SaveBlock(block); err != nil {
|
|
t.Fatalf("Could not save block in test db: %v", err)
|
|
}
|
|
if err := attesterServer.beaconDB.UpdateChainHead(block, beaconState); err != nil {
|
|
t.Fatalf("Could not update chain head in test db: %v", err)
|
|
}
|
|
if err := attesterServer.beaconDB.SaveBlock(epochBoundaryBlock); err != nil {
|
|
t.Fatalf("Could not save block in test db: %v", err)
|
|
}
|
|
if err := attesterServer.beaconDB.UpdateChainHead(epochBoundaryBlock, beaconState); err != nil {
|
|
t.Fatalf("Could not update chain head in test db: %v", err)
|
|
}
|
|
if err := attesterServer.beaconDB.SaveBlock(justifiedBlock); err != nil {
|
|
t.Fatalf("Could not save block in test db: %v", err)
|
|
}
|
|
if err := attesterServer.beaconDB.UpdateChainHead(justifiedBlock, beaconState); err != nil {
|
|
t.Fatalf("Could not update chain head in test db: %v", err)
|
|
}
|
|
req := &pb.AttestationInfoRequest{
|
|
Slot: 1,
|
|
Shard: 0,
|
|
}
|
|
res, err := attesterServer.AttestationInfoAtSlot(context.Background(), req)
|
|
if err != nil {
|
|
t.Fatalf("Could not get attestation info at slot: %v", err)
|
|
}
|
|
expectedInfo := &pb.AttestationInfoResponse{
|
|
BeaconBlockRootHash32: blockRoot[:],
|
|
EpochBoundaryRootHash32: epochBoundaryRoot[:],
|
|
JustifiedEpoch: 2 * params.BeaconConfig().EpochLength,
|
|
JustifiedBlockRootHash32: justifiedBlockRoot[:],
|
|
LatestCrosslink: &pbp2p.Crosslink{
|
|
ShardBlockRootHash32: []byte("A"),
|
|
},
|
|
}
|
|
if !proto.Equal(res, expectedInfo) {
|
|
t.Errorf("Expected attestation info to match, received %v, wanted %v", res, expectedInfo)
|
|
}
|
|
}
|