mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-30 15:06:31 +00:00
329 lines
8.8 KiB
Go
329 lines
8.8 KiB
Go
package rpc
|
|
|
|
import (
|
|
"context"
|
|
"sync"
|
|
"testing"
|
|
|
|
"github.com/gogo/protobuf/proto"
|
|
"github.com/prysmaticlabs/go-ssz"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/cache"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
dbutil "github.com/prysmaticlabs/prysm/beacon-chain/db/testing"
|
|
pbp2p "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1"
|
|
pb "github.com/prysmaticlabs/prysm/proto/beacon/rpc/v1"
|
|
ethpb "github.com/prysmaticlabs/prysm/proto/eth/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/shared/featureconfig"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
mock "github.com/prysmaticlabs/prysm/beacon-chain/blockchain/testing"
|
|
)
|
|
|
|
type mockBroadcaster struct{}
|
|
|
|
func (m *mockBroadcaster) Broadcast(ctx context.Context, msg proto.Message) error {
|
|
return nil
|
|
}
|
|
|
|
func TestSubmitAttestation_OK(t *testing.T) {
|
|
db := dbutil.SetupDB(t)
|
|
defer dbutil.TeardownDB(t, db)
|
|
ctx := context.Background()
|
|
|
|
mockOperationService := &mockOperationService{}
|
|
attesterServer := &AttesterServer{
|
|
operationService: mockOperationService,
|
|
p2p: &mockBroadcaster{},
|
|
beaconDB: db,
|
|
cache: cache.NewAttestationCache(),
|
|
}
|
|
head := ðpb.BeaconBlock{
|
|
Slot: 999,
|
|
ParentRoot: []byte{'a'},
|
|
}
|
|
if err := db.SaveBlock(ctx, head); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
root, err := ssz.SigningRoot(head)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
validators := make([]*ethpb.Validator, params.BeaconConfig().MinGenesisActiveValidatorCount/16)
|
|
for i := 0; i < len(validators); i++ {
|
|
validators[i] = ðpb.Validator{
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
EffectiveBalance: params.BeaconConfig().MaxEffectiveBalance,
|
|
}
|
|
}
|
|
|
|
state := &pbp2p.BeaconState{
|
|
Slot: params.BeaconConfig().SlotsPerEpoch + 1,
|
|
Validators: validators,
|
|
RandaoMixes: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
ActiveIndexRoots: make([][]byte, params.BeaconConfig().EpochsPerHistoricalVector),
|
|
}
|
|
|
|
if err := db.SaveHeadBlockRoot(ctx, root); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if err := db.SaveState(ctx, state, root); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
req := ðpb.Attestation{
|
|
Data: ðpb.AttestationData{
|
|
BeaconBlockRoot: root[:],
|
|
Crosslink: ðpb.Crosslink{
|
|
Shard: 935,
|
|
DataRoot: []byte{'a'},
|
|
},
|
|
Source: ðpb.Checkpoint{},
|
|
Target: ðpb.Checkpoint{},
|
|
},
|
|
}
|
|
if _, err := attesterServer.SubmitAttestation(context.Background(), req); err != nil {
|
|
t.Errorf("Could not attest head correctly: %v", err)
|
|
}
|
|
}
|
|
|
|
func TestRequestAttestation_OK(t *testing.T) {
|
|
block := ðpb.BeaconBlock{
|
|
Slot: 3*params.BeaconConfig().SlotsPerEpoch + 1,
|
|
}
|
|
targetBlock := ðpb.BeaconBlock{
|
|
Slot: 1 * params.BeaconConfig().SlotsPerEpoch,
|
|
}
|
|
justifiedBlock := ðpb.BeaconBlock{
|
|
Slot: 2 * params.BeaconConfig().SlotsPerEpoch,
|
|
}
|
|
blockRoot, err := ssz.SigningRoot(block)
|
|
if err != nil {
|
|
t.Fatalf("Could not hash beacon block: %v", err)
|
|
}
|
|
justifiedRoot, err := ssz.SigningRoot(justifiedBlock)
|
|
if err != nil {
|
|
t.Fatalf("Could not get signing root for justified block: %v", err)
|
|
}
|
|
targetRoot, err := ssz.SigningRoot(targetBlock)
|
|
if err != nil {
|
|
t.Fatalf("Could not get signing root for target block: %v", err)
|
|
}
|
|
|
|
beaconState := &pbp2p.BeaconState{
|
|
Slot: 3*params.BeaconConfig().SlotsPerEpoch + 1,
|
|
BlockRoots: make([][]byte, params.BeaconConfig().SlotsPerHistoricalRoot),
|
|
CurrentCrosslinks: []*ethpb.Crosslink{
|
|
{
|
|
DataRoot: []byte("A"),
|
|
},
|
|
},
|
|
PreviousCrosslinks: []*ethpb.Crosslink{
|
|
{
|
|
DataRoot: []byte("A"),
|
|
},
|
|
},
|
|
CurrentJustifiedCheckpoint: ðpb.Checkpoint{
|
|
Epoch: 2,
|
|
Root: justifiedRoot[:],
|
|
},
|
|
}
|
|
beaconState.BlockRoots[1] = blockRoot[:]
|
|
beaconState.BlockRoots[1*params.BeaconConfig().SlotsPerEpoch] = targetRoot[:]
|
|
beaconState.BlockRoots[2*params.BeaconConfig().SlotsPerEpoch] = justifiedRoot[:]
|
|
attesterServer := &AttesterServer{
|
|
p2p: &mockBroadcaster{},
|
|
cache: cache.NewAttestationCache(),
|
|
chainService: &mock.ChainService{State: beaconState, Root: blockRoot[:]},
|
|
}
|
|
|
|
req := &pb.AttestationRequest{
|
|
Shard: 0,
|
|
Slot: 3*params.BeaconConfig().SlotsPerEpoch + 1,
|
|
}
|
|
res, err := attesterServer.RequestAttestation(context.Background(), req)
|
|
if err != nil {
|
|
t.Fatalf("Could not get attestation info at slot: %v", err)
|
|
}
|
|
|
|
crosslinkRoot, err := ssz.HashTreeRoot(beaconState.CurrentCrosslinks[req.Shard])
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
expectedInfo := ðpb.AttestationData{
|
|
BeaconBlockRoot: blockRoot[:],
|
|
Source: ðpb.Checkpoint{
|
|
Epoch: 2,
|
|
Root: justifiedRoot[:],
|
|
},
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 3,
|
|
},
|
|
Crosslink: ðpb.Crosslink{
|
|
EndEpoch: 3,
|
|
ParentRoot: crosslinkRoot[:],
|
|
DataRoot: params.BeaconConfig().ZeroHash[:],
|
|
},
|
|
}
|
|
|
|
if !proto.Equal(res, expectedInfo) {
|
|
t.Errorf("Expected attestation info to match, received %v, wanted %v", res, expectedInfo)
|
|
}
|
|
}
|
|
|
|
func TestAttestationDataAtSlot_handlesFarAwayJustifiedEpoch(t *testing.T) {
|
|
// Scenario:
|
|
//
|
|
// State slot = 10000
|
|
// Last justified slot = epoch start of 1500
|
|
// HistoricalRootsLimit = 8192
|
|
//
|
|
// More background: https://github.com/prysmaticlabs/prysm/issues/2153
|
|
// This test breaks if it doesnt use mainnet config
|
|
params.OverrideBeaconConfig(params.MainnetConfig())
|
|
defer params.OverrideBeaconConfig(params.MinimalSpecConfig())
|
|
|
|
// Ensure HistoricalRootsLimit matches scenario
|
|
cfg := params.BeaconConfig()
|
|
cfg.HistoricalRootsLimit = 8192
|
|
params.OverrideBeaconConfig(cfg)
|
|
|
|
block := ðpb.BeaconBlock{
|
|
Slot: 10000,
|
|
}
|
|
epochBoundaryBlock := ðpb.BeaconBlock{
|
|
Slot: helpers.StartSlot(helpers.SlotToEpoch(10000)),
|
|
}
|
|
justifiedBlock := ðpb.BeaconBlock{
|
|
Slot: helpers.StartSlot(helpers.SlotToEpoch(1500)) - 2, // Imagine two skip block
|
|
}
|
|
blockRoot, err := ssz.SigningRoot(block)
|
|
if err != nil {
|
|
t.Fatalf("Could not hash beacon block: %v", err)
|
|
}
|
|
justifiedBlockRoot, err := ssz.SigningRoot(justifiedBlock)
|
|
if err != nil {
|
|
t.Fatalf("Could not hash justified block: %v", err)
|
|
}
|
|
epochBoundaryRoot, err := ssz.SigningRoot(epochBoundaryBlock)
|
|
if err != nil {
|
|
t.Fatalf("Could not hash justified block: %v", err)
|
|
}
|
|
beaconState := &pbp2p.BeaconState{
|
|
Slot: 10000,
|
|
BlockRoots: make([][]byte, params.BeaconConfig().SlotsPerHistoricalRoot),
|
|
PreviousCrosslinks: []*ethpb.Crosslink{
|
|
{
|
|
DataRoot: []byte("A"),
|
|
},
|
|
},
|
|
CurrentCrosslinks: []*ethpb.Crosslink{
|
|
{
|
|
DataRoot: []byte("A"),
|
|
},
|
|
},
|
|
CurrentJustifiedCheckpoint: ðpb.Checkpoint{
|
|
Epoch: helpers.SlotToEpoch(1500),
|
|
Root: justifiedBlockRoot[:],
|
|
},
|
|
}
|
|
beaconState.BlockRoots[1] = blockRoot[:]
|
|
beaconState.BlockRoots[1*params.BeaconConfig().SlotsPerEpoch] = epochBoundaryRoot[:]
|
|
beaconState.BlockRoots[2*params.BeaconConfig().SlotsPerEpoch] = justifiedBlockRoot[:]
|
|
attesterServer := &AttesterServer{
|
|
p2p: &mockBroadcaster{},
|
|
cache: cache.NewAttestationCache(),
|
|
chainService: &mock.ChainService{State: beaconState, Root: blockRoot[:]},
|
|
}
|
|
|
|
req := &pb.AttestationRequest{
|
|
Shard: 0,
|
|
Slot: 10000,
|
|
}
|
|
res, err := attesterServer.RequestAttestation(context.Background(), req)
|
|
if err != nil {
|
|
t.Fatalf("Could not get attestation info at slot: %v", err)
|
|
}
|
|
|
|
crosslinkRoot, err := ssz.HashTreeRoot(beaconState.CurrentCrosslinks[req.Shard])
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
expectedInfo := ðpb.AttestationData{
|
|
BeaconBlockRoot: blockRoot[:],
|
|
Source: ðpb.Checkpoint{
|
|
Epoch: helpers.SlotToEpoch(1500),
|
|
Root: justifiedBlockRoot[:],
|
|
},
|
|
Target: ðpb.Checkpoint{
|
|
Epoch: 156,
|
|
},
|
|
Crosslink: ðpb.Crosslink{
|
|
ParentRoot: crosslinkRoot[:],
|
|
EndEpoch: params.BeaconConfig().SlotsPerEpoch,
|
|
DataRoot: params.BeaconConfig().ZeroHash[:],
|
|
},
|
|
}
|
|
|
|
if !proto.Equal(res, expectedInfo) {
|
|
t.Errorf("Expected attestation info to match, received %v, wanted %v", res, expectedInfo)
|
|
}
|
|
}
|
|
|
|
func TestAttestationDataAtSlot_handlesInProgressRequest(t *testing.T) {
|
|
// Cache toggled by feature flag for now. See https://github.com/prysmaticlabs/prysm/issues/3106.
|
|
featureconfig.InitFeatureConfig(&featureconfig.FeatureFlagConfig{
|
|
EnableAttestationCache: true,
|
|
})
|
|
defer func() {
|
|
featureconfig.InitFeatureConfig(nil)
|
|
}()
|
|
|
|
ctx := context.Background()
|
|
server := &AttesterServer{
|
|
cache: cache.NewAttestationCache(),
|
|
}
|
|
|
|
req := &pb.AttestationRequest{
|
|
Shard: 1,
|
|
Slot: 2,
|
|
}
|
|
|
|
res := ðpb.AttestationData{
|
|
Target: ðpb.Checkpoint{Epoch: 55},
|
|
}
|
|
|
|
if err := server.cache.MarkInProgress(req); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
wg.Add(1)
|
|
go func() {
|
|
defer wg.Done()
|
|
response, err := server.RequestAttestation(ctx, req)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
if !proto.Equal(res, response) {
|
|
t.Error("Expected equal responses from cache")
|
|
}
|
|
}()
|
|
|
|
wg.Add(1)
|
|
go func() {
|
|
defer wg.Done()
|
|
|
|
if err := server.cache.Put(ctx, req, res); err != nil {
|
|
t.Error(err)
|
|
}
|
|
if err := server.cache.MarkNotInProgress(req); err != nil {
|
|
t.Error(err)
|
|
}
|
|
}()
|
|
|
|
wg.Wait()
|
|
}
|