mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-16 06:58:20 +00:00
e0eee87bf4
* first node test * adding in configuration flags for code coverage * adding line to remove file on unit test * adding new test for compressed field trie but is currently broken * changing limit on trie * adding new trie length coverage * adding in test for empty copy of trie * adding more trie tests * adding new field trie * adding more field trie tests * adding clarity to chunking equation * fixing linting * clarifying function for limit * updating native state settings to improve ease of future unit tests * improving unit test * fixing unit tests * adding more tests and fixing linting * adding more coverage and removing unused file * increasing node coverage * adding new test for checking config for booleans * fixing db test * fixing linting * adding signing root test * fixing linting * removing accidently created beacondata * switching not non native state * reverting back to proto use for spec test * reverting back to proto for some tests * turning off native state on some tests * switching more to proto state * rolling back disablenativestate * switching to native state in the state-native package for tests * fixing linting * fixing deepsource complaint * fixing some tests to native state and removing some unused flag checks * convert to native state * fixing linting * issues are being triggered by deleting the db this way so reverting change in hopes of changing this * rolling back testing util * rolling back some tests from native state * rolling back db deletion * test switching native state off after test runs * fixing hasher test * fixing altair and bellatrix hashers for native state * Update beacon-chain/node/node_test.go Co-authored-by: Radosław Kapka <rkapka@wp.pl> * Update validator/rpc/auth_token_test.go Co-authored-by: Radosław Kapka <rkapka@wp.pl> * fixing imports * adding altair proof test Co-authored-by: Radosław Kapka <rkapka@wp.pl>
606 lines
17 KiB
Go
606 lines
17 KiB
Go
package state_native_test
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/prysmaticlabs/prysm/v3/beacon-chain/state"
|
|
statenative "github.com/prysmaticlabs/prysm/v3/beacon-chain/state/state-native"
|
|
"github.com/prysmaticlabs/prysm/v3/config/features"
|
|
"github.com/prysmaticlabs/prysm/v3/config/params"
|
|
"github.com/prysmaticlabs/prysm/v3/encoding/bytesutil"
|
|
ethpb "github.com/prysmaticlabs/prysm/v3/proto/prysm/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/v3/testing/assert"
|
|
"github.com/prysmaticlabs/prysm/v3/testing/require"
|
|
"github.com/prysmaticlabs/prysm/v3/testing/util"
|
|
)
|
|
|
|
func TestInitializeFromProto_Phase0(t *testing.T) {
|
|
features.Init(&features.Flags{EnableNativeState: true})
|
|
testState, _ := util.DeterministicGenesisState(t, 64)
|
|
pbState, err := statenative.ProtobufBeaconStatePhase0(testState.InnerStateUnsafe())
|
|
require.NoError(t, err)
|
|
type test struct {
|
|
name string
|
|
state *ethpb.BeaconState
|
|
error string
|
|
}
|
|
initTests := []test{
|
|
{
|
|
name: "nil state",
|
|
state: nil,
|
|
error: "received nil state",
|
|
},
|
|
{
|
|
name: "nil validators",
|
|
state: ðpb.BeaconState{
|
|
Slot: 4,
|
|
Validators: nil,
|
|
},
|
|
},
|
|
{
|
|
name: "empty state",
|
|
state: ðpb.BeaconState{},
|
|
},
|
|
{
|
|
name: "full state",
|
|
state: pbState,
|
|
},
|
|
}
|
|
for _, tt := range initTests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
_, err := statenative.InitializeFromProtoUnsafePhase0(tt.state)
|
|
if tt.error != "" {
|
|
assert.ErrorContains(t, tt.error, err)
|
|
} else {
|
|
assert.NoError(t, err)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestInitializeFromProto_Altair(t *testing.T) {
|
|
type test struct {
|
|
name string
|
|
state *ethpb.BeaconStateAltair
|
|
error string
|
|
}
|
|
initTests := []test{
|
|
{
|
|
name: "nil state",
|
|
state: nil,
|
|
error: "received nil state",
|
|
},
|
|
{
|
|
name: "nil validators",
|
|
state: ðpb.BeaconStateAltair{
|
|
Slot: 4,
|
|
Validators: nil,
|
|
},
|
|
},
|
|
{
|
|
name: "empty state",
|
|
state: ðpb.BeaconStateAltair{},
|
|
},
|
|
// TODO: Add full state. Blocked by testutil migration.
|
|
}
|
|
for _, tt := range initTests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
features.Init(&features.Flags{EnableNativeState: true})
|
|
_, err := statenative.InitializeFromProtoAltair(tt.state)
|
|
if tt.error != "" {
|
|
require.ErrorContains(t, tt.error, err)
|
|
} else {
|
|
require.NoError(t, err)
|
|
}
|
|
features.Init(&features.Flags{EnableNativeState: false})
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestInitializeFromProto_Bellatrix(t *testing.T) {
|
|
type test struct {
|
|
name string
|
|
state *ethpb.BeaconStateBellatrix
|
|
error string
|
|
}
|
|
initTests := []test{
|
|
{
|
|
name: "nil state",
|
|
state: nil,
|
|
error: "received nil state",
|
|
},
|
|
{
|
|
name: "nil validators",
|
|
state: ðpb.BeaconStateBellatrix{
|
|
Slot: 4,
|
|
Validators: nil,
|
|
},
|
|
},
|
|
{
|
|
name: "empty state",
|
|
state: ðpb.BeaconStateBellatrix{},
|
|
},
|
|
}
|
|
for _, tt := range initTests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
features.Init(&features.Flags{EnableNativeState: true})
|
|
_, err := statenative.InitializeFromProtoBellatrix(tt.state)
|
|
if tt.error != "" {
|
|
require.ErrorContains(t, tt.error, err)
|
|
} else {
|
|
require.NoError(t, err)
|
|
}
|
|
features.Init(&features.Flags{EnableNativeState: false})
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestInitializeFromProtoUnsafe_Phase0(t *testing.T) {
|
|
testState, _ := util.DeterministicGenesisState(t, 64)
|
|
pbState, err := statenative.ProtobufBeaconStatePhase0(testState.InnerStateUnsafe())
|
|
require.NoError(t, err)
|
|
type test struct {
|
|
name string
|
|
state *ethpb.BeaconState
|
|
error string
|
|
}
|
|
initTests := []test{
|
|
{
|
|
name: "nil validators",
|
|
state: ðpb.BeaconState{
|
|
Slot: 4,
|
|
Validators: nil,
|
|
},
|
|
},
|
|
{
|
|
name: "empty state",
|
|
state: ðpb.BeaconState{},
|
|
},
|
|
{
|
|
name: "full state",
|
|
state: pbState,
|
|
},
|
|
}
|
|
for _, tt := range initTests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
features.Init(&features.Flags{EnableNativeState: true})
|
|
_, err := statenative.InitializeFromProtoUnsafePhase0(tt.state)
|
|
if tt.error != "" {
|
|
assert.ErrorContains(t, tt.error, err)
|
|
} else {
|
|
assert.NoError(t, err)
|
|
}
|
|
features.Init(&features.Flags{EnableNativeState: false})
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestInitializeFromProtoUnsafe_Altair(_ *testing.T) {
|
|
type test struct {
|
|
name string
|
|
state *ethpb.BeaconStateAltair
|
|
error string
|
|
}
|
|
initTests := []test{
|
|
{
|
|
name: "nil validators",
|
|
state: ðpb.BeaconStateAltair{
|
|
Slot: 4,
|
|
Validators: nil,
|
|
},
|
|
},
|
|
{
|
|
name: "empty state",
|
|
state: ðpb.BeaconStateAltair{},
|
|
},
|
|
// TODO: Add full state. Blocked by testutil migration.
|
|
}
|
|
_ = initTests
|
|
}
|
|
|
|
func TestInitializeFromProtoUnsafe_Bellatrix(_ *testing.T) {
|
|
type test struct {
|
|
name string
|
|
state *ethpb.BeaconStateBellatrix
|
|
error string
|
|
}
|
|
initTests := []test{
|
|
{
|
|
name: "nil validators",
|
|
state: ðpb.BeaconStateBellatrix{
|
|
Slot: 4,
|
|
Validators: nil,
|
|
},
|
|
},
|
|
{
|
|
name: "empty state",
|
|
state: ðpb.BeaconStateBellatrix{},
|
|
},
|
|
// TODO: Add full state. Blocked by testutil migration.
|
|
}
|
|
_ = initTests
|
|
}
|
|
|
|
func TestBeaconState_HashTreeRoot(t *testing.T) {
|
|
testState, _ := util.DeterministicGenesisState(t, 64)
|
|
|
|
type test struct {
|
|
name string
|
|
stateModify func(beaconState state.BeaconState) (state.BeaconState, error)
|
|
error string
|
|
}
|
|
initTests := []test{
|
|
{
|
|
name: "unchanged state",
|
|
stateModify: func(beaconState state.BeaconState) (state.BeaconState, error) {
|
|
return beaconState, nil
|
|
},
|
|
error: "",
|
|
},
|
|
{
|
|
name: "different slot",
|
|
stateModify: func(beaconState state.BeaconState) (state.BeaconState, error) {
|
|
if err := beaconState.SetSlot(5); err != nil {
|
|
return nil, err
|
|
}
|
|
return beaconState, nil
|
|
},
|
|
error: "",
|
|
},
|
|
{
|
|
name: "different validator balance",
|
|
stateModify: func(beaconState state.BeaconState) (state.BeaconState, error) {
|
|
val, err := beaconState.ValidatorAtIndex(5)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
val.EffectiveBalance = params.BeaconConfig().MaxEffectiveBalance - params.BeaconConfig().EffectiveBalanceIncrement
|
|
if err := beaconState.UpdateValidatorAtIndex(5, val); err != nil {
|
|
return nil, err
|
|
}
|
|
return beaconState, nil
|
|
},
|
|
error: "",
|
|
},
|
|
}
|
|
|
|
var err error
|
|
var oldHTR []byte
|
|
for _, tt := range initTests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
testState, err = tt.stateModify(testState)
|
|
assert.NoError(t, err)
|
|
root, err := testState.HashTreeRoot(context.Background())
|
|
if err == nil && tt.error != "" {
|
|
t.Errorf("Expected error, expected %v, recevied %v", tt.error, err)
|
|
}
|
|
features.Init(&features.Flags{EnableNativeState: true})
|
|
pbState, err := statenative.ProtobufBeaconStatePhase0(testState.InnerStateUnsafe())
|
|
require.NoError(t, err)
|
|
genericHTR, err := pbState.HashTreeRoot()
|
|
if err == nil && tt.error != "" {
|
|
t.Errorf("Expected error, expected %v, recevied %v", tt.error, err)
|
|
}
|
|
assert.DeepNotEqual(t, []byte{}, root[:], "Received empty hash tree root")
|
|
assert.DeepEqual(t, genericHTR[:], root[:], "Expected hash tree root to match generic")
|
|
if len(oldHTR) != 0 && bytes.Equal(root[:], oldHTR) {
|
|
t.Errorf("Expected HTR to change, received %#x == old %#x", root, oldHTR)
|
|
}
|
|
oldHTR = root[:]
|
|
features.Init(&features.Flags{EnableNativeState: false})
|
|
})
|
|
}
|
|
}
|
|
|
|
func BenchmarkBeaconState(b *testing.B) {
|
|
features.Init(&features.Flags{EnableNativeState: true})
|
|
testState, _ := util.DeterministicGenesisState(b, 16000)
|
|
pbState, err := statenative.ProtobufBeaconStatePhase0(testState.InnerStateUnsafe())
|
|
require.NoError(b, err)
|
|
|
|
b.Run("Vectorized SHA256", func(b *testing.B) {
|
|
st, err := statenative.InitializeFromProtoUnsafePhase0(pbState)
|
|
require.NoError(b, err)
|
|
_, err = st.HashTreeRoot(context.Background())
|
|
assert.NoError(b, err)
|
|
})
|
|
|
|
b.Run("Current SHA256", func(b *testing.B) {
|
|
_, err := pbState.HashTreeRoot()
|
|
require.NoError(b, err)
|
|
})
|
|
features.Init(&features.Flags{EnableNativeState: false})
|
|
}
|
|
|
|
func TestBeaconState_HashTreeRoot_FieldTrie(t *testing.T) {
|
|
testState, _ := util.DeterministicGenesisState(t, 64)
|
|
|
|
type test struct {
|
|
name string
|
|
stateModify func(state.BeaconState) (state.BeaconState, error)
|
|
error string
|
|
}
|
|
initTests := []test{
|
|
{
|
|
name: "unchanged state",
|
|
stateModify: func(beaconState state.BeaconState) (state.BeaconState, error) {
|
|
return beaconState, nil
|
|
},
|
|
error: "",
|
|
},
|
|
{
|
|
name: "different slot",
|
|
stateModify: func(beaconState state.BeaconState) (state.BeaconState, error) {
|
|
if err := beaconState.SetSlot(5); err != nil {
|
|
return nil, err
|
|
}
|
|
return beaconState, nil
|
|
},
|
|
error: "",
|
|
},
|
|
{
|
|
name: "different validator balance",
|
|
stateModify: func(beaconState state.BeaconState) (state.BeaconState, error) {
|
|
val, err := beaconState.ValidatorAtIndex(5)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
val.EffectiveBalance = params.BeaconConfig().MaxEffectiveBalance - params.BeaconConfig().EffectiveBalanceIncrement
|
|
if err := beaconState.UpdateValidatorAtIndex(5, val); err != nil {
|
|
return nil, err
|
|
}
|
|
return beaconState, nil
|
|
},
|
|
error: "",
|
|
},
|
|
}
|
|
|
|
var err error
|
|
var oldHTR []byte
|
|
for _, tt := range initTests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
testState, err = tt.stateModify(testState)
|
|
assert.NoError(t, err)
|
|
root, err := testState.HashTreeRoot(context.Background())
|
|
if err == nil && tt.error != "" {
|
|
t.Errorf("Expected error, expected %v, recevied %v", tt.error, err)
|
|
}
|
|
features.Init(&features.Flags{EnableNativeState: true})
|
|
pbState, err := statenative.ProtobufBeaconStatePhase0(testState.InnerStateUnsafe())
|
|
require.NoError(t, err)
|
|
genericHTR, err := pbState.HashTreeRoot()
|
|
if err == nil && tt.error != "" {
|
|
t.Errorf("Expected error, expected %v, recevied %v", tt.error, err)
|
|
}
|
|
assert.DeepNotEqual(t, []byte{}, root[:], "Received empty hash tree root")
|
|
assert.DeepEqual(t, genericHTR[:], root[:], "Expected hash tree root to match generic")
|
|
if len(oldHTR) != 0 && bytes.Equal(root[:], oldHTR) {
|
|
t.Errorf("Expected HTR to change, received %#x == old %#x", root, oldHTR)
|
|
}
|
|
oldHTR = root[:]
|
|
features.Init(&features.Flags{EnableNativeState: false})
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestBeaconState_AppendValidator_DoesntMutateCopy(t *testing.T) {
|
|
st0, err := util.NewBeaconState()
|
|
require.NoError(t, err)
|
|
st1 := st0.Copy()
|
|
originalCount := st1.NumValidators()
|
|
|
|
val := ðpb.Validator{Slashed: true}
|
|
assert.NoError(t, st0.AppendValidator(val))
|
|
assert.Equal(t, originalCount, st1.NumValidators(), "st1 NumValidators mutated")
|
|
_, ok := st1.ValidatorIndexByPubkey(bytesutil.ToBytes48(val.PublicKey))
|
|
assert.Equal(t, false, ok, "Expected no validator index to be present in st1 for the newly inserted pubkey")
|
|
}
|
|
|
|
func TestBeaconState_ValidatorMutation_Phase0(t *testing.T) {
|
|
testState, _ := util.DeterministicGenesisState(t, 400)
|
|
pbState, err := statenative.ProtobufBeaconStatePhase0(testState.InnerStateUnsafe())
|
|
require.NoError(t, err)
|
|
testState, err = statenative.InitializeFromProtoPhase0(pbState)
|
|
require.NoError(t, err)
|
|
|
|
_, err = testState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
// Reset tries
|
|
require.NoError(t, testState.UpdateValidatorAtIndex(200, new(ethpb.Validator)))
|
|
_, err = testState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
newState1 := testState.Copy()
|
|
_ = testState.Copy()
|
|
|
|
require.NoError(t, testState.UpdateValidatorAtIndex(15, ðpb.Validator{
|
|
PublicKey: make([]byte, 48),
|
|
WithdrawalCredentials: make([]byte, 32),
|
|
EffectiveBalance: 1111,
|
|
Slashed: false,
|
|
ActivationEligibilityEpoch: 1112,
|
|
ActivationEpoch: 1114,
|
|
ExitEpoch: 1116,
|
|
WithdrawableEpoch: 1117,
|
|
}))
|
|
|
|
rt, err := testState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
features.Init(&features.Flags{EnableNativeState: true})
|
|
pbState, err = statenative.ProtobufBeaconStatePhase0(testState.InnerStateUnsafe())
|
|
require.NoError(t, err)
|
|
|
|
copiedTestState, err := statenative.InitializeFromProtoPhase0(pbState)
|
|
require.NoError(t, err)
|
|
|
|
rt2, err := copiedTestState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, rt, rt2)
|
|
|
|
require.NoError(t, newState1.UpdateValidatorAtIndex(150, ðpb.Validator{
|
|
PublicKey: make([]byte, 48),
|
|
WithdrawalCredentials: make([]byte, 32),
|
|
EffectiveBalance: 2111,
|
|
Slashed: false,
|
|
ActivationEligibilityEpoch: 2112,
|
|
ActivationEpoch: 2114,
|
|
ExitEpoch: 2116,
|
|
WithdrawableEpoch: 2117,
|
|
}))
|
|
|
|
rt, err = newState1.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
pbState, err = statenative.ProtobufBeaconStatePhase0(newState1.InnerStateUnsafe())
|
|
require.NoError(t, err)
|
|
|
|
copiedTestState, err = statenative.InitializeFromProtoPhase0(pbState)
|
|
require.NoError(t, err)
|
|
|
|
rt2, err = copiedTestState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, rt, rt2)
|
|
}
|
|
|
|
func TestBeaconState_ValidatorMutation_Altair(t *testing.T) {
|
|
features.Init(&features.Flags{EnableNativeState: true})
|
|
testState, _ := util.DeterministicGenesisStateAltair(t, 400)
|
|
pbState, err := statenative.ProtobufBeaconStateAltair(testState.InnerStateUnsafe())
|
|
require.NoError(t, err)
|
|
testState, err = statenative.InitializeFromProtoAltair(pbState)
|
|
require.NoError(t, err)
|
|
|
|
_, err = testState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
// Reset tries
|
|
require.NoError(t, testState.UpdateValidatorAtIndex(200, new(ethpb.Validator)))
|
|
_, err = testState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
newState1 := testState.Copy()
|
|
_ = testState.Copy()
|
|
|
|
require.NoError(t, testState.UpdateValidatorAtIndex(15, ðpb.Validator{
|
|
PublicKey: make([]byte, 48),
|
|
WithdrawalCredentials: make([]byte, 32),
|
|
EffectiveBalance: 1111,
|
|
Slashed: false,
|
|
ActivationEligibilityEpoch: 1112,
|
|
ActivationEpoch: 1114,
|
|
ExitEpoch: 1116,
|
|
WithdrawableEpoch: 1117,
|
|
}))
|
|
|
|
rt, err := testState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
pbState, err = statenative.ProtobufBeaconStateAltair(testState.InnerStateUnsafe())
|
|
require.NoError(t, err)
|
|
|
|
copiedTestState, err := statenative.InitializeFromProtoAltair(pbState)
|
|
require.NoError(t, err)
|
|
|
|
rt2, err := copiedTestState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, rt, rt2)
|
|
|
|
require.NoError(t, newState1.UpdateValidatorAtIndex(150, ðpb.Validator{
|
|
PublicKey: make([]byte, 48),
|
|
WithdrawalCredentials: make([]byte, 32),
|
|
EffectiveBalance: 2111,
|
|
Slashed: false,
|
|
ActivationEligibilityEpoch: 2112,
|
|
ActivationEpoch: 2114,
|
|
ExitEpoch: 2116,
|
|
WithdrawableEpoch: 2117,
|
|
}))
|
|
|
|
rt, err = newState1.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
pbState, err = statenative.ProtobufBeaconStateAltair(newState1.InnerStateUnsafe())
|
|
require.NoError(t, err)
|
|
|
|
copiedTestState, err = statenative.InitializeFromProtoAltair(pbState)
|
|
require.NoError(t, err)
|
|
|
|
rt2, err = copiedTestState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, rt, rt2)
|
|
features.Init(&features.Flags{EnableNativeState: false})
|
|
}
|
|
|
|
func TestBeaconState_ValidatorMutation_Bellatrix(t *testing.T) {
|
|
features.Init(&features.Flags{EnableNativeState: true})
|
|
testState, _ := util.DeterministicGenesisStateBellatrix(t, 400)
|
|
pbState, err := statenative.ProtobufBeaconStateBellatrix(testState.InnerStateUnsafe())
|
|
require.NoError(t, err)
|
|
testState, err = statenative.InitializeFromProtoBellatrix(pbState)
|
|
require.NoError(t, err)
|
|
|
|
_, err = testState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
// Reset tries
|
|
require.NoError(t, testState.UpdateValidatorAtIndex(200, new(ethpb.Validator)))
|
|
_, err = testState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
newState1 := testState.Copy()
|
|
_ = testState.Copy()
|
|
|
|
require.NoError(t, testState.UpdateValidatorAtIndex(15, ðpb.Validator{
|
|
PublicKey: make([]byte, 48),
|
|
WithdrawalCredentials: make([]byte, 32),
|
|
EffectiveBalance: 1111,
|
|
Slashed: false,
|
|
ActivationEligibilityEpoch: 1112,
|
|
ActivationEpoch: 1114,
|
|
ExitEpoch: 1116,
|
|
WithdrawableEpoch: 1117,
|
|
}))
|
|
|
|
rt, err := testState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
pbState, err = statenative.ProtobufBeaconStateBellatrix(testState.InnerStateUnsafe())
|
|
require.NoError(t, err)
|
|
|
|
copiedTestState, err := statenative.InitializeFromProtoBellatrix(pbState)
|
|
require.NoError(t, err)
|
|
|
|
rt2, err := copiedTestState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, rt, rt2)
|
|
|
|
require.NoError(t, newState1.UpdateValidatorAtIndex(150, ðpb.Validator{
|
|
PublicKey: make([]byte, 48),
|
|
WithdrawalCredentials: make([]byte, 32),
|
|
EffectiveBalance: 2111,
|
|
Slashed: false,
|
|
ActivationEligibilityEpoch: 2112,
|
|
ActivationEpoch: 2114,
|
|
ExitEpoch: 2116,
|
|
WithdrawableEpoch: 2117,
|
|
}))
|
|
|
|
rt, err = newState1.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
pbState, err = statenative.ProtobufBeaconStateBellatrix(newState1.InnerStateUnsafe())
|
|
require.NoError(t, err)
|
|
|
|
copiedTestState, err = statenative.InitializeFromProtoBellatrix(pbState)
|
|
require.NoError(t, err)
|
|
|
|
rt2, err = copiedTestState.HashTreeRoot(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, rt, rt2)
|
|
features.Init(&features.Flags{EnableNativeState: false})
|
|
}
|