mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 12:57:18 +00:00
7f56ac6355
* Massive code cleanup * fix test issues * remove GetGenesis mock expectations * unused receiver * rename unused params Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
306 lines
8.7 KiB
Go
306 lines
8.7 KiB
Go
package sync
|
|
|
|
import (
|
|
"context"
|
|
"reflect"
|
|
"sync"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/kevinms/leakybucket-go"
|
|
"github.com/libp2p/go-libp2p-core/network"
|
|
"github.com/libp2p/go-libp2p-core/protocol"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/blockchain"
|
|
mock "github.com/prysmaticlabs/prysm/beacon-chain/blockchain/testing"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/signing"
|
|
db "github.com/prysmaticlabs/prysm/beacon-chain/db/testing"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/p2p"
|
|
p2ptest "github.com/prysmaticlabs/prysm/beacon-chain/p2p/testing"
|
|
"github.com/prysmaticlabs/prysm/config/params"
|
|
"github.com/prysmaticlabs/prysm/consensus-types/wrapper"
|
|
"github.com/prysmaticlabs/prysm/encoding/ssz/equality"
|
|
pb "github.com/prysmaticlabs/prysm/proto/prysm/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/proto/prysm/v1alpha1/metadata"
|
|
"github.com/prysmaticlabs/prysm/testing/assert"
|
|
"github.com/prysmaticlabs/prysm/testing/require"
|
|
"github.com/prysmaticlabs/prysm/testing/util"
|
|
)
|
|
|
|
func TestMetaDataRPCHandler_ReceivesMetadata(t *testing.T) {
|
|
p1 := p2ptest.NewTestP2P(t)
|
|
p2 := p2ptest.NewTestP2P(t)
|
|
p1.Connect(p2)
|
|
assert.Equal(t, 1, len(p1.BHost.Network().Peers()), "Expected peers to be connected")
|
|
bitfield := [8]byte{'A', 'B'}
|
|
p1.LocalMetadata = wrapper.WrappedMetadataV0(&pb.MetaDataV0{
|
|
SeqNumber: 2,
|
|
Attnets: bitfield[:],
|
|
})
|
|
|
|
// Set up a head state in the database with data we expect.
|
|
d := db.SetupDB(t)
|
|
r := &Service{
|
|
cfg: &config{
|
|
beaconDB: d,
|
|
p2p: p1,
|
|
chain: &mock.ChainService{
|
|
ValidatorsRoot: [32]byte{},
|
|
},
|
|
},
|
|
rateLimiter: newRateLimiter(p1),
|
|
}
|
|
|
|
// Setup streams
|
|
pcl := protocol.ID(p2p.RPCMetaDataTopicV1)
|
|
topic := string(pcl)
|
|
r.rateLimiter.limiterMap[topic] = leakybucket.NewCollector(1, 1, false)
|
|
var wg sync.WaitGroup
|
|
wg.Add(1)
|
|
p2.BHost.SetStreamHandler(pcl, func(stream network.Stream) {
|
|
defer wg.Done()
|
|
expectSuccess(t, stream)
|
|
out := new(pb.MetaDataV0)
|
|
assert.NoError(t, r.cfg.p2p.Encoding().DecodeWithMaxLength(stream, out))
|
|
assert.DeepEqual(t, p1.LocalMetadata.InnerObject(), out, "MetadataV0 unequal")
|
|
})
|
|
stream1, err := p1.BHost.NewStream(context.Background(), p2.BHost.ID(), pcl)
|
|
require.NoError(t, err)
|
|
|
|
assert.NoError(t, r.metaDataHandler(context.Background(), new(interface{}), stream1))
|
|
|
|
if util.WaitTimeout(&wg, 1*time.Second) {
|
|
t.Fatal("Did not receive stream within 1 sec")
|
|
}
|
|
|
|
conns := p1.BHost.Network().ConnsToPeer(p2.BHost.ID())
|
|
if len(conns) == 0 {
|
|
t.Error("Peer is disconnected despite receiving a valid ping")
|
|
}
|
|
}
|
|
|
|
func TestMetadataRPCHandler_SendsMetadata(t *testing.T) {
|
|
p1 := p2ptest.NewTestP2P(t)
|
|
p2 := p2ptest.NewTestP2P(t)
|
|
p1.Connect(p2)
|
|
assert.Equal(t, 1, len(p1.BHost.Network().Peers()), "Expected peers to be connected")
|
|
bitfield := [8]byte{'A', 'B'}
|
|
p2.LocalMetadata = wrapper.WrappedMetadataV0(&pb.MetaDataV0{
|
|
SeqNumber: 2,
|
|
Attnets: bitfield[:],
|
|
})
|
|
|
|
// Set up a head state in the database with data we expect.
|
|
d := db.SetupDB(t)
|
|
r := &Service{
|
|
cfg: &config{
|
|
beaconDB: d,
|
|
p2p: p1,
|
|
chain: &mock.ChainService{Genesis: time.Now(), ValidatorsRoot: [32]byte{}},
|
|
},
|
|
rateLimiter: newRateLimiter(p1),
|
|
}
|
|
|
|
r2 := &Service{
|
|
cfg: &config{
|
|
beaconDB: d,
|
|
p2p: p2,
|
|
chain: &mock.ChainService{Genesis: time.Now(), ValidatorsRoot: [32]byte{}},
|
|
},
|
|
rateLimiter: newRateLimiter(p2),
|
|
}
|
|
|
|
// Setup streams
|
|
pcl := protocol.ID(p2p.RPCMetaDataTopicV1 + r.cfg.p2p.Encoding().ProtocolSuffix())
|
|
topic := string(pcl)
|
|
r.rateLimiter.limiterMap[topic] = leakybucket.NewCollector(1, 1, false)
|
|
r2.rateLimiter.limiterMap[topic] = leakybucket.NewCollector(1, 1, false)
|
|
|
|
var wg sync.WaitGroup
|
|
wg.Add(1)
|
|
p2.BHost.SetStreamHandler(pcl, func(stream network.Stream) {
|
|
defer wg.Done()
|
|
assert.NoError(t, r2.metaDataHandler(context.Background(), new(interface{}), stream))
|
|
})
|
|
|
|
md, err := r.sendMetaDataRequest(context.Background(), p2.BHost.ID())
|
|
assert.NoError(t, err)
|
|
|
|
if !equality.DeepEqual(md.InnerObject(), p2.LocalMetadata.InnerObject()) {
|
|
t.Fatalf("MetadataV0 unequal, received %v but wanted %v", md, p2.LocalMetadata)
|
|
}
|
|
|
|
if util.WaitTimeout(&wg, 1*time.Second) {
|
|
t.Fatal("Did not receive stream within 1 sec")
|
|
}
|
|
|
|
conns := p1.BHost.Network().ConnsToPeer(p2.BHost.ID())
|
|
if len(conns) == 0 {
|
|
t.Error("Peer is disconnected despite receiving a valid ping")
|
|
}
|
|
}
|
|
|
|
func TestMetadataRPCHandler_SendsMetadataAltair(t *testing.T) {
|
|
params.SetupTestConfigCleanup(t)
|
|
bCfg := params.BeaconConfig().Copy()
|
|
bCfg.AltairForkEpoch = 5
|
|
params.OverrideBeaconConfig(bCfg)
|
|
params.BeaconConfig().InitializeForkSchedule()
|
|
|
|
p1 := p2ptest.NewTestP2P(t)
|
|
p2 := p2ptest.NewTestP2P(t)
|
|
p1.Connect(p2)
|
|
assert.Equal(t, 1, len(p1.BHost.Network().Peers()), "Expected peers to be connected")
|
|
bitfield := [8]byte{'A', 'B'}
|
|
p2.LocalMetadata = wrapper.WrappedMetadataV0(&pb.MetaDataV0{
|
|
SeqNumber: 2,
|
|
Attnets: bitfield[:],
|
|
})
|
|
|
|
// Set up a head state in the database with data we expect.
|
|
d := db.SetupDB(t)
|
|
r := &Service{
|
|
cfg: &config{
|
|
beaconDB: d,
|
|
p2p: p1,
|
|
chain: &mock.ChainService{Genesis: time.Now().Add(-5 * oneEpoch()), ValidatorsRoot: [32]byte{}},
|
|
},
|
|
rateLimiter: newRateLimiter(p1),
|
|
}
|
|
|
|
r2 := &Service{
|
|
cfg: &config{
|
|
beaconDB: d,
|
|
p2p: p2,
|
|
chain: &mock.ChainService{Genesis: time.Now().Add(-5 * oneEpoch()), ValidatorsRoot: [32]byte{}},
|
|
},
|
|
rateLimiter: newRateLimiter(p2),
|
|
}
|
|
|
|
// Setup streams
|
|
pcl := protocol.ID(p2p.RPCMetaDataTopicV2 + r.cfg.p2p.Encoding().ProtocolSuffix())
|
|
topic := string(pcl)
|
|
r.rateLimiter.limiterMap[topic] = leakybucket.NewCollector(2, 2, false)
|
|
r2.rateLimiter.limiterMap[topic] = leakybucket.NewCollector(2, 2, false)
|
|
|
|
var wg sync.WaitGroup
|
|
wg.Add(1)
|
|
p2.BHost.SetStreamHandler(pcl, func(stream network.Stream) {
|
|
defer wg.Done()
|
|
err := r2.metaDataHandler(context.Background(), new(interface{}), stream)
|
|
assert.NoError(t, err)
|
|
})
|
|
|
|
_, err := r.sendMetaDataRequest(context.Background(), p2.BHost.ID())
|
|
assert.NoError(t, err)
|
|
|
|
if util.WaitTimeout(&wg, 1*time.Second) {
|
|
t.Fatal("Did not receive stream within 1 sec")
|
|
}
|
|
|
|
// Fix up peer with the correct metadata.
|
|
p2.LocalMetadata = wrapper.WrappedMetadataV1(&pb.MetaDataV1{
|
|
SeqNumber: 2,
|
|
Attnets: bitfield[:],
|
|
Syncnets: []byte{0x0},
|
|
})
|
|
|
|
wg.Add(1)
|
|
p2.BHost.SetStreamHandler(pcl, func(stream network.Stream) {
|
|
defer wg.Done()
|
|
assert.NoError(t, r2.metaDataHandler(context.Background(), new(interface{}), stream))
|
|
})
|
|
|
|
md, err := r.sendMetaDataRequest(context.Background(), p2.BHost.ID())
|
|
assert.NoError(t, err)
|
|
|
|
if !equality.DeepEqual(md.InnerObject(), p2.LocalMetadata.InnerObject()) {
|
|
t.Fatalf("MetadataV1 unequal, received %v but wanted %v", md, p2.LocalMetadata)
|
|
}
|
|
|
|
if util.WaitTimeout(&wg, 1*time.Second) {
|
|
t.Fatal("Did not receive stream within 1 sec")
|
|
}
|
|
|
|
conns := p1.BHost.Network().ConnsToPeer(p2.BHost.ID())
|
|
if len(conns) == 0 {
|
|
t.Error("Peer is disconnected despite receiving a valid ping")
|
|
}
|
|
}
|
|
|
|
func TestExtractMetaDataType(t *testing.T) {
|
|
// Precompute digests
|
|
genDigest, err := signing.ComputeForkDigest(params.BeaconConfig().GenesisForkVersion, params.BeaconConfig().ZeroHash[:])
|
|
require.NoError(t, err)
|
|
altairDigest, err := signing.ComputeForkDigest(params.BeaconConfig().AltairForkVersion, params.BeaconConfig().ZeroHash[:])
|
|
require.NoError(t, err)
|
|
|
|
type args struct {
|
|
digest []byte
|
|
chain blockchain.ChainInfoFetcher
|
|
}
|
|
tests := []struct {
|
|
name string
|
|
args args
|
|
want metadata.Metadata
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "no digest",
|
|
args: args{
|
|
digest: []byte{},
|
|
chain: &mock.ChainService{ValidatorsRoot: [32]byte{}},
|
|
},
|
|
want: wrapper.WrappedMetadataV0(&pb.MetaDataV0{}),
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "invalid digest",
|
|
args: args{
|
|
digest: []byte{0x00, 0x01},
|
|
chain: &mock.ChainService{ValidatorsRoot: [32]byte{}},
|
|
},
|
|
want: nil,
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "non existent digest",
|
|
args: args{
|
|
digest: []byte{0x00, 0x01, 0x02, 0x03},
|
|
chain: &mock.ChainService{ValidatorsRoot: [32]byte{}},
|
|
},
|
|
want: nil,
|
|
wantErr: true,
|
|
},
|
|
{
|
|
name: "genesis fork version",
|
|
args: args{
|
|
digest: genDigest[:],
|
|
chain: &mock.ChainService{ValidatorsRoot: [32]byte{}},
|
|
},
|
|
want: wrapper.WrappedMetadataV0(&pb.MetaDataV0{}),
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "altair fork version",
|
|
args: args{
|
|
digest: altairDigest[:],
|
|
chain: &mock.ChainService{ValidatorsRoot: [32]byte{}},
|
|
},
|
|
want: wrapper.WrappedMetadataV1(&pb.MetaDataV1{}),
|
|
wantErr: false,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got, err := extractMetaDataType(tt.args.digest, tt.args.chain)
|
|
if (err != nil) != tt.wantErr {
|
|
t.Errorf("extractMetaDataType() error = %v, wantErr %v", err, tt.wantErr)
|
|
return
|
|
}
|
|
if !reflect.DeepEqual(got, tt.want) {
|
|
t.Errorf("extractMetaDataType() got = %v, want %v", got, tt.want)
|
|
}
|
|
})
|
|
}
|
|
}
|