mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-08 02:31:19 +00:00
c69bce5d84
* Use fieldparams for pubkey length * Fix validator tests * fix more tests * fix mock validator * Fix typo * bunch of typos * Update bytes.go * Update BUILD.bazel Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
120 lines
3.9 KiB
Go
120 lines
3.9 KiB
Go
package kv
|
|
|
|
import (
|
|
"context"
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
"testing"
|
|
|
|
fieldparams "github.com/prysmaticlabs/prysm/config/fieldparams"
|
|
ethpb "github.com/prysmaticlabs/prysm/proto/prysm/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/testing/require"
|
|
)
|
|
|
|
func TestStore_Backup(t *testing.T) {
|
|
db := setupDB(t, nil)
|
|
ctx := context.Background()
|
|
root := [32]byte{1}
|
|
require.NoError(t, db.SaveGenesisValidatorsRoot(ctx, root[:]))
|
|
require.NoError(t, db.Backup(ctx, "", true))
|
|
|
|
backupsPath := filepath.Join(db.databasePath, backupsDirectoryName)
|
|
files, err := ioutil.ReadDir(backupsPath)
|
|
require.NoError(t, err)
|
|
require.NotEqual(t, 0, len(files), "No backups created")
|
|
require.NoError(t, db.Close(), "Failed to close database")
|
|
|
|
oldFilePath := filepath.Join(backupsPath, files[0].Name())
|
|
newFilePath := filepath.Join(backupsPath, ProtectionDbFileName)
|
|
// We rename the file to match the database file name
|
|
// our NewKVStore function expects when opening a database.
|
|
require.NoError(t, os.Rename(oldFilePath, newFilePath))
|
|
|
|
backedDB, err := NewKVStore(ctx, backupsPath, &Config{})
|
|
require.NoError(t, err, "Failed to instantiate DB")
|
|
t.Cleanup(func() {
|
|
require.NoError(t, backedDB.Close(), "Failed to close database")
|
|
})
|
|
genesisRoot, err := backedDB.GenesisValidatorsRoot(ctx)
|
|
require.NoError(t, err)
|
|
require.DeepEqual(t, root[:], genesisRoot)
|
|
}
|
|
|
|
func TestStore_NestedBackup(t *testing.T) {
|
|
keys := [][fieldparams.BLSPubkeyLength]byte{{'A'}, {'B'}}
|
|
db := setupDB(t, keys)
|
|
ctx := context.Background()
|
|
root := [32]byte{1}
|
|
idxAtt := ðpb.IndexedAttestation{
|
|
AttestingIndices: nil,
|
|
Data: ðpb.AttestationData{
|
|
Slot: 0,
|
|
CommitteeIndex: 0,
|
|
BeaconBlockRoot: root[:],
|
|
Source: ðpb.Checkpoint{
|
|
Epoch: 10,
|
|
Root: root[:],
|
|
},
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 0,
|
|
Root: root[:],
|
|
},
|
|
},
|
|
Signature: make([]byte, 96),
|
|
}
|
|
require.NoError(t, db.SaveGenesisValidatorsRoot(ctx, root[:]))
|
|
require.NoError(t, db.SaveAttestationForPubKey(context.Background(), keys[0], [32]byte{'C'}, idxAtt))
|
|
require.NoError(t, db.SaveAttestationForPubKey(context.Background(), keys[1], [32]byte{'C'}, idxAtt))
|
|
require.NoError(t, db.Backup(ctx, "", true))
|
|
|
|
backupsPath := filepath.Join(db.databasePath, backupsDirectoryName)
|
|
files, err := ioutil.ReadDir(backupsPath)
|
|
require.NoError(t, err)
|
|
require.NotEqual(t, 0, len(files), "No backups created")
|
|
require.NoError(t, db.Close(), "Failed to close database")
|
|
|
|
oldFilePath := filepath.Join(backupsPath, files[0].Name())
|
|
newFilePath := filepath.Join(backupsPath, ProtectionDbFileName)
|
|
// We rename the file to match the database file name
|
|
// our NewKVStore function expects when opening a database.
|
|
require.NoError(t, os.Rename(oldFilePath, newFilePath))
|
|
|
|
backedDB, err := NewKVStore(ctx, backupsPath, &Config{})
|
|
require.NoError(t, err, "Failed to instantiate DB")
|
|
t.Cleanup(func() {
|
|
require.NoError(t, backedDB.Close(), "Failed to close database")
|
|
})
|
|
genesisRoot, err := backedDB.GenesisValidatorsRoot(ctx)
|
|
require.NoError(t, err)
|
|
require.DeepEqual(t, root[:], genesisRoot)
|
|
|
|
hist, err := backedDB.AttestationHistoryForPubKey(context.Background(), keys[0])
|
|
require.NoError(t, err)
|
|
require.DeepEqual(t, &AttestationRecord{
|
|
PubKey: keys[0],
|
|
Source: 10,
|
|
Target: 0,
|
|
SigningRoot: [32]byte{'C'},
|
|
}, hist[0])
|
|
|
|
hist, err = backedDB.AttestationHistoryForPubKey(context.Background(), keys[1])
|
|
require.NoError(t, err)
|
|
require.DeepEqual(t, &AttestationRecord{
|
|
PubKey: keys[1],
|
|
Source: 10,
|
|
Target: 0,
|
|
SigningRoot: [32]byte{'C'},
|
|
}, hist[0])
|
|
|
|
ep, exists, err := backedDB.LowestSignedSourceEpoch(context.Background(), keys[0])
|
|
require.NoError(t, err)
|
|
require.Equal(t, true, exists)
|
|
require.Equal(t, 10, int(ep))
|
|
|
|
ep, exists, err = backedDB.LowestSignedSourceEpoch(context.Background(), keys[1])
|
|
require.NoError(t, err)
|
|
require.Equal(t, true, exists)
|
|
require.Equal(t, 10, int(ep))
|
|
}
|