mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-26 05:17:22 +00:00
df33ce3309
* slasher beacon node changes * remaining beacon node items * moar changes * gaz * flag fix * rem slashable * builds * imports * fix up * pruning faster test * deepsource * fix wrong item * node node feature flags * broken test * preston review * more preston comments * comment Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
188 lines
5.8 KiB
Go
188 lines
5.8 KiB
Go
package kv
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"testing"
|
|
|
|
types "github.com/prysmaticlabs/eth2-types"
|
|
"github.com/prysmaticlabs/prysm/config/params"
|
|
"github.com/prysmaticlabs/prysm/encoding/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/testing/require"
|
|
bolt "go.etcd.io/bbolt"
|
|
)
|
|
|
|
func TestPruneAttestations_NoPruning(t *testing.T) {
|
|
pubKey := [48]byte{1}
|
|
validatorDB := setupDB(t, [][48]byte{pubKey})
|
|
|
|
// Write attesting history for every single epoch
|
|
// since genesis to a specified number of epochs.
|
|
numEpochs := params.BeaconConfig().SlashingProtectionPruningEpochs - 1
|
|
err := setupAttestationsForEveryEpoch(t, validatorDB, pubKey, numEpochs)
|
|
require.NoError(t, err)
|
|
|
|
// Next, attempt to prune and realize that we still have all epochs intact
|
|
err = validatorDB.PruneAttestations(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
startEpoch := types.Epoch(0)
|
|
err = checkAttestingHistoryAfterPruning(
|
|
t,
|
|
validatorDB,
|
|
pubKey,
|
|
startEpoch,
|
|
numEpochs,
|
|
false, /* should be pruned */
|
|
)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func TestPruneAttestations_OK(t *testing.T) {
|
|
numKeys := uint64(64)
|
|
pks := make([][48]byte, 0, numKeys)
|
|
for i := uint64(0); i < numKeys; i++ {
|
|
pks = append(pks, bytesutil.ToBytes48(bytesutil.ToBytes(i, 48)))
|
|
}
|
|
validatorDB := setupDB(t, pks)
|
|
|
|
// Write attesting history for every single epoch
|
|
// since genesis to SLASHING_PROTECTION_PRUNING_EPOCHS * 2.
|
|
numEpochs := params.BeaconConfig().SlashingProtectionPruningEpochs * 2
|
|
for _, pk := range pks {
|
|
require.NoError(t, setupAttestationsForEveryEpoch(t, validatorDB, pk, numEpochs))
|
|
}
|
|
|
|
require.NoError(t, validatorDB.PruneAttestations(context.Background()))
|
|
|
|
// Next, verify that we pruned every epoch
|
|
// from genesis to SLASHING_PROTECTION_PRUNING_EPOCHS - 1.
|
|
startEpoch := types.Epoch(0)
|
|
for _, pk := range pks {
|
|
err := checkAttestingHistoryAfterPruning(
|
|
t,
|
|
validatorDB,
|
|
pk,
|
|
startEpoch,
|
|
params.BeaconConfig().SlashingProtectionPruningEpochs-1,
|
|
true, /* should be pruned */
|
|
)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
// Next, verify that we pruned every epoch
|
|
// from N = SLASHING_PROTECTION_PRUNING_EPOCHS to N * 2.
|
|
startEpoch = params.BeaconConfig().SlashingProtectionPruningEpochs
|
|
endEpoch := startEpoch * 2
|
|
for _, pk := range pks {
|
|
err := checkAttestingHistoryAfterPruning(
|
|
t,
|
|
validatorDB,
|
|
pk,
|
|
startEpoch,
|
|
endEpoch,
|
|
false, /* should not be pruned */
|
|
)
|
|
require.NoError(t, err)
|
|
}
|
|
}
|
|
|
|
func BenchmarkPruneAttestations(b *testing.B) {
|
|
numKeys := uint64(8)
|
|
pks := make([][48]byte, 0, numKeys)
|
|
for i := uint64(0); i < numKeys; i++ {
|
|
pks = append(pks, bytesutil.ToBytes48(bytesutil.ToBytes(i, 48)))
|
|
}
|
|
validatorDB := setupDB(b, pks)
|
|
|
|
// Write attesting history for every single epoch
|
|
// since genesis to SLASHING_PROTECTION_PRUNING_EPOCHS * 20.
|
|
numEpochs := params.BeaconConfig().SlashingProtectionPruningEpochs * 20
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
b.StopTimer()
|
|
for _, pk := range pks {
|
|
require.NoError(b, setupAttestationsForEveryEpoch(b, validatorDB, pk, numEpochs))
|
|
}
|
|
b.StartTimer()
|
|
|
|
require.NoError(b, validatorDB.PruneAttestations(context.Background()))
|
|
}
|
|
}
|
|
|
|
// Saves attesting history for every (source, target = source + 1) pairs since genesis
|
|
// up to a given number of epochs for a validator public key.
|
|
func setupAttestationsForEveryEpoch(t testing.TB, validatorDB *Store, pubKey [48]byte, numEpochs types.Epoch) error {
|
|
return validatorDB.update(func(tx *bolt.Tx) error {
|
|
bucket := tx.Bucket(pubKeysBucket)
|
|
pkBucket, err := bucket.CreateBucketIfNotExists(pubKey[:])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
signingRootsBucket, err := pkBucket.CreateBucketIfNotExists(attestationSigningRootsBucket)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
sourceEpochsBucket, err := pkBucket.CreateBucketIfNotExists(attestationSourceEpochsBucket)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for sourceEpoch := types.Epoch(0); sourceEpoch < numEpochs; sourceEpoch++ {
|
|
targetEpoch := sourceEpoch + 1
|
|
targetEpochBytes := bytesutil.EpochToBytesBigEndian(targetEpoch)
|
|
sourceEpochBytes := bytesutil.EpochToBytesBigEndian(sourceEpoch)
|
|
// Save (source epoch, target epoch) pairs.
|
|
if err := sourceEpochsBucket.Put(sourceEpochBytes, targetEpochBytes); err != nil {
|
|
return err
|
|
}
|
|
// Save signing root for target epoch.
|
|
var signingRoot [32]byte
|
|
copy(signingRoot[:], fmt.Sprintf("%d", targetEpochBytes))
|
|
if err := signingRootsBucket.Put(targetEpochBytes, signingRoot[:]); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
})
|
|
}
|
|
|
|
// Verifies, based on a boolean input argument, whether or not we should have
|
|
// pruned all attesting history since genesis up to a specified number of epochs.
|
|
func checkAttestingHistoryAfterPruning(
|
|
t testing.TB,
|
|
validatorDB *Store,
|
|
pubKey [48]byte,
|
|
startEpoch,
|
|
numEpochs types.Epoch,
|
|
shouldBePruned bool,
|
|
) error {
|
|
return validatorDB.view(func(tx *bolt.Tx) error {
|
|
bucket := tx.Bucket(pubKeysBucket)
|
|
pkBkt := bucket.Bucket(pubKey[:])
|
|
signingRootsBkt := pkBkt.Bucket(attestationSigningRootsBucket)
|
|
sourceEpochsBkt := pkBkt.Bucket(attestationSourceEpochsBucket)
|
|
for sourceEpoch := startEpoch; sourceEpoch < numEpochs; sourceEpoch++ {
|
|
targetEpoch := sourceEpoch + 1
|
|
targetEpochBytes := bytesutil.EpochToBytesBigEndian(targetEpoch)
|
|
sourceEpochBytes := bytesutil.EpochToBytesBigEndian(sourceEpoch)
|
|
|
|
storedTargetEpoch := sourceEpochsBkt.Get(sourceEpochBytes)
|
|
signingRoot := signingRootsBkt.Get(targetEpochBytes)
|
|
if shouldBePruned {
|
|
// Expect to have no data if we have pruned.
|
|
require.Equal(t, true, signingRoot == nil)
|
|
require.Equal(t, true, storedTargetEpoch == nil)
|
|
} else {
|
|
// Expect the correct signing root.
|
|
var expectedSigningRoot [32]byte
|
|
copy(expectedSigningRoot[:], fmt.Sprintf("%d", targetEpochBytes))
|
|
require.DeepEqual(t, expectedSigningRoot[:], signingRoot)
|
|
// Expect the correct target epoch.
|
|
require.DeepEqual(t, targetEpochBytes, storedTargetEpoch)
|
|
}
|
|
}
|
|
return nil
|
|
})
|
|
}
|