prysm-pulse/beacon-chain/rpc/attester_server_test.go
Raul Jordan 3d8bb73f15
Attester RPC Server Functions (#1505)
* initial validator attesthead rewrite based on proposer rewrite

* proceed with fetching committees and tree hashing the canonical head at assigned attester slot

* complete filling the properties of attestation data and all associated root hashes

* add when to attest todo

* finish entire attester client logic

* tests with mocks checked in

* tests passing in client

* stubbed out server implementation

* fixed build due to old property

* regen mocks with new mockgen version

* fixed broken tests

* complete bazel build fix

* address some review comments

* deep proto test

* server implementation logic

* attestation info tests

* completed passing tests, tree hash still blocked by error with nil fields unfortunately

* fix todo failure

* gazelle rerun and master merge

* testing full behavior of attestation info server

* finished all required server tests and implementation

* break loop

* fix tests due to genesis slot updates
2019-02-11 10:15:25 -06:00

194 lines
6.5 KiB
Go

package rpc
import (
"context"
"strings"
"testing"
"github.com/prysmaticlabs/prysm/shared/hashutil"
"github.com/prysmaticlabs/prysm/shared/params"
"github.com/gogo/protobuf/proto"
"github.com/prysmaticlabs/prysm/beacon-chain/core/blocks"
"github.com/prysmaticlabs/prysm/beacon-chain/internal"
pbp2p "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1"
pb "github.com/prysmaticlabs/prysm/proto/beacon/rpc/v1"
)
func TestAttestHead(t *testing.T) {
mockOperationService := &mockOperationService{}
attesterServer := &AttesterServer{
operationService: mockOperationService,
}
req := &pbp2p.Attestation{
Data: &pbp2p.AttestationData{
Slot: 999,
Shard: 1,
ShardBlockRootHash32: []byte{'a'},
},
}
if _, err := attesterServer.AttestHead(context.Background(), req); err != nil {
t.Errorf("Could not attest head correctly: %v", err)
}
}
func TestAttestationInfoAtSlot_NilHeadAtSlot(t *testing.T) {
db := internal.SetupDB(t)
defer internal.TeardownDB(t, db)
attesterServer := &AttesterServer{
beaconDB: db,
}
want := "no block found at slot 5"
req := &pb.AttestationInfoRequest{
Slot: 5,
}
if _, err := attesterServer.AttestationInfoAtSlot(context.Background(), req); !strings.Contains(err.Error(), want) {
t.Errorf("Expected %v, received %v", want, err)
}
}
func TestAttestationInfoAtSlot_EpochBoundaryFailure(t *testing.T) {
db := internal.SetupDB(t)
defer internal.TeardownDB(t, db)
beaconState := &pbp2p.BeaconState{
Slot: 5,
LatestBlockRootHash32S: make([][]byte, 20),
}
block := blocks.NewGenesisBlock([]byte("stateroot"))
block.Slot = 100
attesterServer := &AttesterServer{
beaconDB: db,
}
if err := attesterServer.beaconDB.SaveBlock(block); err != nil {
t.Fatalf("Could not save block in test db: %v", err)
}
if err := attesterServer.beaconDB.UpdateChainHead(block, beaconState); err != nil {
t.Fatalf("Could not update chain head in test db: %v", err)
}
want := "could not get epoch boundary block"
req := &pb.AttestationInfoRequest{
Slot: 100,
}
if _, err := attesterServer.AttestationInfoAtSlot(context.Background(), req); !strings.Contains(err.Error(), want) {
t.Errorf("Expected %v, received %v", want, err)
}
}
func TestAttestationInfoAtSlot_JustifiedBlockFailure(t *testing.T) {
db := internal.SetupDB(t)
defer internal.TeardownDB(t, db)
beaconState := &pbp2p.BeaconState{
Slot: params.BeaconConfig().EpochLength + 2,
LatestBlockRootHash32S: make([][]byte, 20),
}
block := &pbp2p.BeaconBlock{
Slot: 1,
}
attesterServer := &AttesterServer{
beaconDB: db,
}
if err := attesterServer.beaconDB.SaveBlock(block); err != nil {
t.Fatalf("Could not save block in test db: %v", err)
}
if err := attesterServer.beaconDB.UpdateChainHead(block, beaconState); err != nil {
t.Fatalf("Could not update chain head in test db: %v", err)
}
epochBoundaryBlock := &pbp2p.BeaconBlock{
Slot: 1,
}
if err := attesterServer.beaconDB.SaveBlock(epochBoundaryBlock); err != nil {
t.Fatalf("Could not save block in test db: %v", err)
}
if err := attesterServer.beaconDB.UpdateChainHead(epochBoundaryBlock, beaconState); err != nil {
t.Fatalf("Could not update chain head in test db: %v", err)
}
want := "could not get justified block"
req := &pb.AttestationInfoRequest{
Slot: 1,
}
if _, err := attesterServer.AttestationInfoAtSlot(context.Background(), req); !strings.Contains(err.Error(), want) {
t.Errorf("Expected %v, received %v", want, err)
}
}
func TestAttestationInfoAtSlot_Ok(t *testing.T) {
db := internal.SetupDB(t)
defer internal.TeardownDB(t, db)
block := &pbp2p.BeaconBlock{
Slot: 1,
}
epochBoundaryBlock := &pbp2p.BeaconBlock{
Slot: 1 * params.BeaconConfig().EpochLength,
}
justifiedBlock := &pbp2p.BeaconBlock{
Slot: 2 * params.BeaconConfig().EpochLength,
}
blockRoot, err := hashutil.HashBeaconBlock(block) // TODO(#1461): Use tree hashing instead.
if err != nil {
t.Fatalf("Could not hash beacon block: %v", err)
}
justifiedBlockRoot, err := hashutil.HashBeaconBlock(justifiedBlock) // TODO(#1461): Use tree hashing instead.
if err != nil {
t.Fatalf("Could not hash justified block: %v", err)
}
epochBoundaryRoot, err := hashutil.HashBeaconBlock(epochBoundaryBlock) // TODO(#1461): Use tree hashing instead.
if err != nil {
t.Fatalf("Could not hash justified block: %v", err)
}
beaconState := &pbp2p.BeaconState{
Slot: 3 * params.BeaconConfig().EpochLength,
JustifiedEpoch: 2 * params.BeaconConfig().EpochLength,
LatestBlockRootHash32S: make([][]byte, 3*params.BeaconConfig().EpochLength),
LatestCrosslinks: []*pbp2p.Crosslink{
{
ShardBlockRootHash32: []byte("A"),
},
},
}
beaconState.LatestBlockRootHash32S[1] = blockRoot[:]
beaconState.LatestBlockRootHash32S[1*params.BeaconConfig().EpochLength] = epochBoundaryRoot[:]
beaconState.LatestBlockRootHash32S[2*params.BeaconConfig().EpochLength] = justifiedBlockRoot[:]
attesterServer := &AttesterServer{
beaconDB: db,
}
if err := attesterServer.beaconDB.SaveBlock(block); err != nil {
t.Fatalf("Could not save block in test db: %v", err)
}
if err := attesterServer.beaconDB.UpdateChainHead(block, beaconState); err != nil {
t.Fatalf("Could not update chain head in test db: %v", err)
}
if err := attesterServer.beaconDB.SaveBlock(epochBoundaryBlock); err != nil {
t.Fatalf("Could not save block in test db: %v", err)
}
if err := attesterServer.beaconDB.UpdateChainHead(epochBoundaryBlock, beaconState); err != nil {
t.Fatalf("Could not update chain head in test db: %v", err)
}
if err := attesterServer.beaconDB.SaveBlock(justifiedBlock); err != nil {
t.Fatalf("Could not save block in test db: %v", err)
}
if err := attesterServer.beaconDB.UpdateChainHead(justifiedBlock, beaconState); err != nil {
t.Fatalf("Could not update chain head in test db: %v", err)
}
req := &pb.AttestationInfoRequest{
Slot: 1,
Shard: 0,
}
res, err := attesterServer.AttestationInfoAtSlot(context.Background(), req)
if err != nil {
t.Fatalf("Could not get attestation info at slot: %v", err)
}
expectedInfo := &pb.AttestationInfoResponse{
BeaconBlockRootHash32: blockRoot[:],
EpochBoundaryRootHash32: epochBoundaryRoot[:],
JustifiedEpoch: 2 * params.BeaconConfig().EpochLength,
JustifiedBlockRootHash32: justifiedBlockRoot[:],
LatestCrosslink: &pbp2p.Crosslink{
ShardBlockRootHash32: []byte("A"),
},
}
if !proto.Equal(res, expectedInfo) {
t.Errorf("Expected attestation info to match, received %v, wanted %v", res, expectedInfo)
}
}