mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-04 16:54:28 +00:00
8c04ced1a6
* fixed epoch_processing * penalize->slash * exit -> voluntary_exit * SEED_LOOKAHEAD -> MIN_SEED_LOOKAHED * ENTRY_EXIT_DELAY -> ACTIVATION_EXIT_DELAY * `INCLUDER_REWARD_QUOTIENT` -> `ATTESTATION_INCLUSION_REWARD_QUOTIEN` * LatestIndexRoots -> LatestActiveIndexRoots * `MIN_VALIDATOR_WITHDRAWAL_EPOCHS` -> `MIN_VALIDATOR_WITHDRAWAL_DELAY` * MAX_WITHDRAWALS_PER_EPOCH -> MAX_EXIT_DEQUEUES_PER_EPOCH * ETH1_DATA_VOTING_PERIOD -> EPOCHS_PER_ETH1_VOTING_PERIOD * SLOT_DURATION -> SECONDS_PER_SLOT * EPOCH_LENGTH -> SLOTS_PER_EPOCH * SLOT_DURATION -> SECONDS_PER_SLOT take 2 * rest of the misc fixes for config name changes * remove tools/bootnode/.!74296!bootnode.go * `current_epoch_start_shard` -> `current_shuffling_start_shard`, `current_shuffling_epoch`, `current_shuffling_see` * go fmt * fixed comment * updated pseudocode comments * merged master
160 lines
4.6 KiB
Go
160 lines
4.6 KiB
Go
package operations
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"reflect"
|
|
"testing"
|
|
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/internal"
|
|
pb "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1"
|
|
"github.com/prysmaticlabs/prysm/shared/hashutil"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil"
|
|
"github.com/sirupsen/logrus"
|
|
logTest "github.com/sirupsen/logrus/hooks/test"
|
|
)
|
|
|
|
func init() {
|
|
logrus.SetLevel(logrus.DebugLevel)
|
|
}
|
|
|
|
func TestStop(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
opsService := NewOperationService(context.Background(), &Config{})
|
|
|
|
if err := opsService.Stop(); err != nil {
|
|
t.Fatalf("Unable to stop operation service: %v", err)
|
|
}
|
|
|
|
msg := hook.LastEntry().Message
|
|
want := "Stopping service"
|
|
if msg != want {
|
|
t.Errorf("incorrect log, expected %s, got %s", want, msg)
|
|
}
|
|
|
|
// The context should have been canceled.
|
|
if opsService.ctx.Err() != context.Canceled {
|
|
t.Error("context was not canceled")
|
|
}
|
|
hook.Reset()
|
|
}
|
|
|
|
func TestErrorStatus_Ok(t *testing.T) {
|
|
service := NewOperationService(context.Background(), &Config{})
|
|
if service.Status() != nil {
|
|
t.Errorf("service status should be nil to begin with, got: %v", service.error)
|
|
}
|
|
err := errors.New("error error error")
|
|
service.error = err
|
|
|
|
if service.Status() != err {
|
|
t.Error("service status did not return wanted err")
|
|
}
|
|
}
|
|
|
|
func TestIncomingExits_Ok(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
beaconDB := internal.SetupDB(t)
|
|
defer internal.TeardownDB(t, beaconDB)
|
|
service := NewOperationService(context.Background(), &Config{BeaconDB: beaconDB})
|
|
|
|
exitRoutine := make(chan bool)
|
|
go func() {
|
|
service.saveOperations()
|
|
<-exitRoutine
|
|
}()
|
|
exit := &pb.VoluntaryExit{Epoch: 100}
|
|
hash, err := hashutil.HashProto(exit)
|
|
if err != nil {
|
|
t.Fatalf("Could not hash exit proto: %v", err)
|
|
}
|
|
|
|
service.incomingValidatorExits <- exit
|
|
service.cancel()
|
|
exitRoutine <- true
|
|
|
|
want := fmt.Sprintf("Exit request %#x saved in db", hash)
|
|
testutil.AssertLogsContain(t, hook, want)
|
|
}
|
|
|
|
func TestIncomingAttestation_Ok(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
beaconDB := internal.SetupDB(t)
|
|
defer internal.TeardownDB(t, beaconDB)
|
|
service := NewOperationService(context.Background(), &Config{BeaconDB: beaconDB})
|
|
|
|
exitRoutine := make(chan bool)
|
|
go func() {
|
|
service.saveOperations()
|
|
<-exitRoutine
|
|
}()
|
|
attestation := &pb.Attestation{
|
|
AggregationBitfield: []byte{'A'},
|
|
Data: &pb.AttestationData{
|
|
Slot: 100,
|
|
}}
|
|
hash, err := hashutil.HashProto(attestation)
|
|
if err != nil {
|
|
t.Fatalf("Could not hash exit proto: %v", err)
|
|
}
|
|
|
|
service.incomingAtt <- attestation
|
|
service.cancel()
|
|
exitRoutine <- true
|
|
|
|
want := fmt.Sprintf("Attestation %#x saved in db", hash)
|
|
testutil.AssertLogsContain(t, hook, want)
|
|
}
|
|
|
|
func TestRetrieveAttestations_Ok(t *testing.T) {
|
|
beaconDB := internal.SetupDB(t)
|
|
defer internal.TeardownDB(t, beaconDB)
|
|
service := NewOperationService(context.Background(), &Config{BeaconDB: beaconDB})
|
|
|
|
// Save 140 attestations for test. During 1st retrieval we should get slot:0 - slot:128 attestations,
|
|
// 2nd retrieval we should get slot:128 - slot:140 attestations.
|
|
// Max attestation config value is set to 128.
|
|
origAttestations := make([]*pb.Attestation, 140)
|
|
for i := 0; i < len(origAttestations); i++ {
|
|
origAttestations[i] = &pb.Attestation{
|
|
Data: &pb.AttestationData{
|
|
Slot: uint64(i),
|
|
Shard: uint64(i),
|
|
},
|
|
}
|
|
if err := service.beaconDB.SaveAttestation(origAttestations[i]); err != nil {
|
|
t.Fatalf("Failed to save attestation: %v", err)
|
|
}
|
|
}
|
|
// Test we can retrieve attestations from slot0 - slot127 (Max attestation amount).
|
|
attestations, err := service.PendingAttestations()
|
|
if err != nil {
|
|
t.Fatalf("Could not retrieve attestations: %v", err)
|
|
}
|
|
if !reflect.DeepEqual(attestations, origAttestations[0:params.BeaconConfig().MaxAttestations]) {
|
|
t.Errorf("Retrieved attestations did not match prev generated attestations for the first %d",
|
|
params.BeaconConfig().MaxAttestations)
|
|
}
|
|
|
|
// Test we can retrieve attestations from slot128 - slot139.
|
|
attestations, err = service.PendingAttestations()
|
|
if err != nil {
|
|
t.Fatalf("Could not retrieve attestations: %v", err)
|
|
}
|
|
if !reflect.DeepEqual(attestations, origAttestations[params.BeaconConfig().MaxAttestations:]) {
|
|
t.Errorf("Retrieved attestations did not match prev generated attestations for the first %d",
|
|
params.BeaconConfig().MaxAttestations)
|
|
}
|
|
|
|
// Verify attestation pool is empty now we have retrieved everything.
|
|
attestations, err = service.PendingAttestations()
|
|
if err != nil {
|
|
t.Fatalf("Could not retrieve attestations: %v", err)
|
|
}
|
|
if len(attestations) != 0 {
|
|
t.Errorf("Attestation pool should be empty but got a length of %d", len(attestations))
|
|
}
|
|
}
|