mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-27 05:38:55 +00:00
b742511193
* validator count * fix build errors * fix test error * randao mixes * active indices * lastReceivedMerkleIndex * redundant conversions * eth1FollowDistance * refs * fix compile error * slasher * validator * revert changes to lastReceivedMerkleIndex * remove todo * fix references test * fix committee test * Revert "validator count" This reverts commit 19b376e39914b88b620a113215daa539e3e66758. # Conflicts: # beacon-chain/rpc/beacon/validators.go * Revert "fix build errors" This reverts commit f4acd6e9776c899a0523df10b64e55783b44c451. * Revert "fix test error" This reverts commit 2a5c9eec63e4546139220c71fe3c07ad92bed3b6. * Revert "randao mixes" This reverts commit 2863f9c24dd8cfc44ffce16321f68ef3b793e9a2. * Revert "active indices" This reverts commit 6e8385f3956a08ef9c8980b5343365a1bee48542. * Revert "refs" This reverts commit c64a153f67cd26daa58c3bf5f911da05d41cfb5d. * Revert "fix references test" This reverts commit fe773b55a6f8cc38c6c5c1f96615fdb8bbd4397d. * Revert "fix committee test" This reverts commit 7a0931c4487707e3eaf75a592415577f04253772. * fix compilation errors * Revert "slasher" This reverts commit 8b34137931cff1e6cdffeaf65e1ef07eefdea647. * trieutil * some int() simplifications * fix deepsource issues * removed redundant fmt.Sprint Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
530 lines
16 KiB
Go
530 lines
16 KiB
Go
package validator
|
|
|
|
import (
|
|
"context"
|
|
"sync"
|
|
"testing"
|
|
"time"
|
|
|
|
ptypes "github.com/gogo/protobuf/types"
|
|
"github.com/golang/mock/gomock"
|
|
ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1"
|
|
mockChain "github.com/prysmaticlabs/prysm/beacon-chain/blockchain/testing"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/cache/depositcache"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/feed"
|
|
statefeed "github.com/prysmaticlabs/prysm/beacon-chain/core/feed/state"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
dbutil "github.com/prysmaticlabs/prysm/beacon-chain/db/testing"
|
|
mockPOW "github.com/prysmaticlabs/prysm/beacon-chain/powchain/testing"
|
|
stateTrie "github.com/prysmaticlabs/prysm/beacon-chain/state"
|
|
mockSync "github.com/prysmaticlabs/prysm/beacon-chain/sync/initial-sync/testing"
|
|
pbp2p "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1"
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/event"
|
|
"github.com/prysmaticlabs/prysm/shared/mock"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/assert"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/require"
|
|
"github.com/prysmaticlabs/prysm/shared/trieutil"
|
|
logTest "github.com/sirupsen/logrus/hooks/test"
|
|
)
|
|
|
|
func TestValidatorIndex_OK(t *testing.T) {
|
|
db, _ := dbutil.SetupDB(t)
|
|
ctx := context.Background()
|
|
st := testutil.NewBeaconState()
|
|
require.NoError(t, db.SaveState(ctx, st.Copy(), [32]byte{}))
|
|
|
|
pubKey := pubKey(1)
|
|
|
|
err := st.SetValidators([]*ethpb.Validator{{PublicKey: pubKey}})
|
|
require.NoError(t, err)
|
|
|
|
Server := &Server{
|
|
BeaconDB: db,
|
|
HeadFetcher: &mockChain.ChainService{State: st},
|
|
}
|
|
|
|
req := ðpb.ValidatorIndexRequest{
|
|
PublicKey: pubKey,
|
|
}
|
|
_, err = Server.ValidatorIndex(context.Background(), req)
|
|
assert.NoError(t, err, "Could not get validator index")
|
|
}
|
|
|
|
func TestWaitForActivation_ContextClosed(t *testing.T) {
|
|
db, _ := dbutil.SetupDB(t)
|
|
ctx := context.Background()
|
|
|
|
beaconState, err := stateTrie.InitializeFromProto(&pbp2p.BeaconState{
|
|
Slot: 0,
|
|
Validators: []*ethpb.Validator{},
|
|
})
|
|
require.NoError(t, err)
|
|
block := testutil.NewBeaconBlock()
|
|
require.NoError(t, db.SaveBlock(ctx, block), "Could not save genesis block")
|
|
genesisRoot, err := block.Block.HashTreeRoot()
|
|
require.NoError(t, err, "Could not get signing root")
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
depositCache, err := depositcache.New()
|
|
require.NoError(t, err)
|
|
|
|
vs := &Server{
|
|
BeaconDB: db,
|
|
Ctx: ctx,
|
|
ChainStartFetcher: &mockPOW.POWChain{},
|
|
BlockFetcher: &mockPOW.POWChain{},
|
|
Eth1InfoFetcher: &mockPOW.POWChain{},
|
|
CanonicalStateChan: make(chan *pbp2p.BeaconState, 1),
|
|
DepositFetcher: depositCache,
|
|
HeadFetcher: &mockChain.ChainService{State: beaconState, Root: genesisRoot[:]},
|
|
}
|
|
req := ðpb.ValidatorActivationRequest{
|
|
PublicKeys: [][]byte{pubKey(1)},
|
|
}
|
|
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
mockChainStream := mock.NewMockBeaconNodeValidator_WaitForActivationServer(ctrl)
|
|
mockChainStream.EXPECT().Context().Return(context.Background())
|
|
mockChainStream.EXPECT().Send(gomock.Any()).Return(nil)
|
|
mockChainStream.EXPECT().Context().Return(context.Background())
|
|
exitRoutine := make(chan bool)
|
|
go func(tt *testing.T) {
|
|
want := "context canceled"
|
|
assert.ErrorContains(tt, want, vs.WaitForActivation(req, mockChainStream))
|
|
<-exitRoutine
|
|
}(t)
|
|
cancel()
|
|
exitRoutine <- true
|
|
}
|
|
|
|
func TestWaitForActivation_ValidatorOriginallyExists(t *testing.T) {
|
|
db, _ := dbutil.SetupDB(t)
|
|
// This test breaks if it doesnt use mainnet config
|
|
params.SetupTestConfigCleanup(t)
|
|
params.OverrideBeaconConfig(params.MainnetConfig())
|
|
ctx := context.Background()
|
|
|
|
priv1 := bls.RandKey()
|
|
priv2 := bls.RandKey()
|
|
|
|
pubKey1 := priv1.PublicKey().Marshal()
|
|
pubKey2 := priv2.PublicKey().Marshal()
|
|
|
|
beaconState := &pbp2p.BeaconState{
|
|
Slot: 4000,
|
|
Validators: []*ethpb.Validator{
|
|
{
|
|
ActivationEpoch: 0,
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
PublicKey: pubKey1,
|
|
WithdrawalCredentials: make([]byte, 32),
|
|
},
|
|
},
|
|
}
|
|
block := testutil.NewBeaconBlock()
|
|
genesisRoot, err := block.Block.HashTreeRoot()
|
|
require.NoError(t, err, "Could not get signing root")
|
|
depData := ðpb.Deposit_Data{
|
|
PublicKey: pubKey1,
|
|
WithdrawalCredentials: bytesutil.PadTo([]byte("hey"), 32),
|
|
Signature: make([]byte, 96),
|
|
}
|
|
domain, err := helpers.ComputeDomain(params.BeaconConfig().DomainDeposit, nil, nil)
|
|
require.NoError(t, err)
|
|
signingRoot, err := helpers.ComputeSigningRoot(depData, domain)
|
|
require.NoError(t, err)
|
|
depData.Signature = priv1.Sign(signingRoot[:]).Marshal()
|
|
|
|
deposit := ðpb.Deposit{
|
|
Data: depData,
|
|
}
|
|
depositTrie, err := trieutil.NewTrie(params.BeaconConfig().DepositContractTreeDepth)
|
|
require.NoError(t, err, "Could not setup deposit trie")
|
|
depositCache, err := depositcache.New()
|
|
require.NoError(t, err)
|
|
|
|
depositCache.InsertDeposit(ctx, deposit, 10 /*blockNum*/, 0, depositTrie.Root())
|
|
trie, err := stateTrie.InitializeFromProtoUnsafe(beaconState)
|
|
require.NoError(t, err)
|
|
vs := &Server{
|
|
BeaconDB: db,
|
|
Ctx: context.Background(),
|
|
CanonicalStateChan: make(chan *pbp2p.BeaconState, 1),
|
|
ChainStartFetcher: &mockPOW.POWChain{},
|
|
BlockFetcher: &mockPOW.POWChain{},
|
|
Eth1InfoFetcher: &mockPOW.POWChain{},
|
|
DepositFetcher: depositCache,
|
|
HeadFetcher: &mockChain.ChainService{State: trie, Root: genesisRoot[:]},
|
|
}
|
|
req := ðpb.ValidatorActivationRequest{
|
|
PublicKeys: [][]byte{pubKey1, pubKey2},
|
|
}
|
|
ctrl := gomock.NewController(t)
|
|
|
|
defer ctrl.Finish()
|
|
mockChainStream := mock.NewMockBeaconNodeValidator_WaitForActivationServer(ctrl)
|
|
mockChainStream.EXPECT().Context().Return(context.Background())
|
|
mockChainStream.EXPECT().Send(
|
|
ðpb.ValidatorActivationResponse{
|
|
Statuses: []*ethpb.ValidatorActivationResponse_Status{
|
|
{
|
|
PublicKey: pubKey1,
|
|
Status: ðpb.ValidatorStatusResponse{
|
|
Status: ethpb.ValidatorStatus_ACTIVE,
|
|
},
|
|
Index: 0,
|
|
},
|
|
{
|
|
PublicKey: pubKey2,
|
|
Status: ðpb.ValidatorStatusResponse{
|
|
ActivationEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
},
|
|
Index: nonExistentIndex,
|
|
},
|
|
},
|
|
},
|
|
).Return(nil)
|
|
|
|
require.NoError(t, vs.WaitForActivation(req, mockChainStream), "Could not setup wait for activation stream")
|
|
}
|
|
|
|
func TestWaitForActivation_MultipleStatuses(t *testing.T) {
|
|
db, _ := dbutil.SetupDB(t)
|
|
|
|
priv1 := bls.RandKey()
|
|
priv2 := bls.RandKey()
|
|
priv3 := bls.RandKey()
|
|
|
|
pubKey1 := priv1.PublicKey().Marshal()
|
|
pubKey2 := priv2.PublicKey().Marshal()
|
|
pubKey3 := priv3.PublicKey().Marshal()
|
|
|
|
beaconState := &pbp2p.BeaconState{
|
|
Slot: 4000,
|
|
Validators: []*ethpb.Validator{
|
|
{
|
|
PublicKey: pubKey1,
|
|
ActivationEpoch: 1,
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
},
|
|
{
|
|
PublicKey: pubKey2,
|
|
ActivationEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
ActivationEligibilityEpoch: 6,
|
|
ExitEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
},
|
|
{
|
|
PublicKey: pubKey3,
|
|
ActivationEpoch: 0,
|
|
ActivationEligibilityEpoch: 0,
|
|
ExitEpoch: 0,
|
|
},
|
|
},
|
|
}
|
|
block := testutil.NewBeaconBlock()
|
|
genesisRoot, err := block.Block.HashTreeRoot()
|
|
require.NoError(t, err, "Could not get signing root")
|
|
trie, err := stateTrie.InitializeFromProtoUnsafe(beaconState)
|
|
require.NoError(t, err)
|
|
vs := &Server{
|
|
BeaconDB: db,
|
|
Ctx: context.Background(),
|
|
CanonicalStateChan: make(chan *pbp2p.BeaconState, 1),
|
|
ChainStartFetcher: &mockPOW.POWChain{},
|
|
HeadFetcher: &mockChain.ChainService{State: trie, Root: genesisRoot[:]},
|
|
}
|
|
req := ðpb.ValidatorActivationRequest{
|
|
PublicKeys: [][]byte{pubKey1, pubKey2, pubKey3},
|
|
}
|
|
ctrl := gomock.NewController(t)
|
|
|
|
defer ctrl.Finish()
|
|
mockChainStream := mock.NewMockBeaconNodeValidator_WaitForActivationServer(ctrl)
|
|
mockChainStream.EXPECT().Context().Return(context.Background())
|
|
mockChainStream.EXPECT().Send(
|
|
ðpb.ValidatorActivationResponse{
|
|
Statuses: []*ethpb.ValidatorActivationResponse_Status{
|
|
{
|
|
PublicKey: pubKey1,
|
|
Status: ðpb.ValidatorStatusResponse{
|
|
Status: ethpb.ValidatorStatus_ACTIVE,
|
|
ActivationEpoch: 1,
|
|
},
|
|
Index: 0,
|
|
},
|
|
{
|
|
PublicKey: pubKey2,
|
|
Status: ðpb.ValidatorStatusResponse{
|
|
Status: ethpb.ValidatorStatus_PENDING,
|
|
ActivationEpoch: params.BeaconConfig().FarFutureEpoch,
|
|
PositionInActivationQueue: 1,
|
|
},
|
|
Index: 1,
|
|
},
|
|
{
|
|
PublicKey: pubKey3,
|
|
Status: ðpb.ValidatorStatusResponse{
|
|
Status: ethpb.ValidatorStatus_EXITED,
|
|
},
|
|
Index: 2,
|
|
},
|
|
},
|
|
},
|
|
).Return(nil)
|
|
|
|
require.NoError(t, vs.WaitForActivation(req, mockChainStream), "Could not setup wait for activation stream")
|
|
}
|
|
|
|
func TestWaitForChainStart_ContextClosed(t *testing.T) {
|
|
db, _ := dbutil.SetupDB(t)
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
chainService := &mockChain.ChainService{}
|
|
Server := &Server{
|
|
Ctx: ctx,
|
|
ChainStartFetcher: &mockPOW.FaultyMockPOWChain{
|
|
ChainFeed: new(event.Feed),
|
|
},
|
|
StateNotifier: chainService.StateNotifier(),
|
|
BeaconDB: db,
|
|
HeadFetcher: chainService,
|
|
}
|
|
|
|
exitRoutine := make(chan bool)
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
mockStream := mock.NewMockBeaconNodeValidator_WaitForChainStartServer(ctrl)
|
|
mockStream.EXPECT().Context().Return(ctx)
|
|
go func(tt *testing.T) {
|
|
err := Server.WaitForChainStart(&ptypes.Empty{}, mockStream)
|
|
assert.ErrorContains(tt, "Context canceled", err)
|
|
<-exitRoutine
|
|
}(t)
|
|
cancel()
|
|
exitRoutine <- true
|
|
}
|
|
|
|
func TestWaitForChainStart_AlreadyStarted(t *testing.T) {
|
|
db, _ := dbutil.SetupDB(t)
|
|
ctx := context.Background()
|
|
headBlockRoot := [32]byte{0x01, 0x02}
|
|
trie := testutil.NewBeaconState()
|
|
require.NoError(t, trie.SetSlot(3))
|
|
require.NoError(t, db.SaveState(ctx, trie, headBlockRoot))
|
|
require.NoError(t, db.SaveHeadBlockRoot(ctx, headBlockRoot))
|
|
|
|
chainService := &mockChain.ChainService{State: trie}
|
|
Server := &Server{
|
|
Ctx: context.Background(),
|
|
ChainStartFetcher: &mockPOW.POWChain{
|
|
ChainFeed: new(event.Feed),
|
|
},
|
|
BeaconDB: db,
|
|
StateNotifier: chainService.StateNotifier(),
|
|
HeadFetcher: chainService,
|
|
}
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
mockStream := mock.NewMockBeaconNodeValidator_WaitForChainStartServer(ctrl)
|
|
mockStream.EXPECT().Send(
|
|
ðpb.ChainStartResponse{
|
|
Started: true,
|
|
GenesisTime: uint64(time.Unix(0, 0).Unix()),
|
|
},
|
|
).Return(nil)
|
|
mockStream.EXPECT().Context().Return(context.Background())
|
|
assert.NoError(t, Server.WaitForChainStart(&ptypes.Empty{}, mockStream), "Could not call RPC method")
|
|
}
|
|
|
|
func TestWaitForChainStart_HeadStateDoesNotExist(t *testing.T) {
|
|
db, _ := dbutil.SetupDB(t)
|
|
genesisValidatorRoot := [32]byte{0x01, 0x02}
|
|
|
|
// Set head state to nil
|
|
chainService := &mockChain.ChainService{State: nil}
|
|
notifier := chainService.StateNotifier()
|
|
Server := &Server{
|
|
Ctx: context.Background(),
|
|
ChainStartFetcher: &mockPOW.POWChain{
|
|
ChainFeed: new(event.Feed),
|
|
},
|
|
BeaconDB: db,
|
|
StateNotifier: chainService.StateNotifier(),
|
|
HeadFetcher: chainService,
|
|
}
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
mockStream := mock.NewMockBeaconNodeValidator_WaitForChainStartServer(ctrl)
|
|
mockStream.EXPECT().Context().Return(context.Background())
|
|
|
|
wg := new(sync.WaitGroup)
|
|
wg.Add(1)
|
|
go func() {
|
|
assert.NoError(t, Server.WaitForChainStart(&ptypes.Empty{}, mockStream), "Could not call RPC method")
|
|
wg.Done()
|
|
}()
|
|
// Simulate a late state initialization event, so that
|
|
// method is able to handle race condition here.
|
|
notifier.StateFeed().Send(&feed.Event{
|
|
Type: statefeed.Initialized,
|
|
Data: &statefeed.InitializedData{
|
|
StartTime: time.Unix(0, 0),
|
|
GenesisValidatorsRoot: genesisValidatorRoot[:],
|
|
},
|
|
})
|
|
testutil.WaitTimeout(wg, time.Second)
|
|
}
|
|
|
|
func TestWaitForChainStart_NotStartedThenLogFired(t *testing.T) {
|
|
db, _ := dbutil.SetupDB(t)
|
|
|
|
hook := logTest.NewGlobal()
|
|
chainService := &mockChain.ChainService{}
|
|
Server := &Server{
|
|
Ctx: context.Background(),
|
|
ChainStartFetcher: &mockPOW.FaultyMockPOWChain{
|
|
ChainFeed: new(event.Feed),
|
|
},
|
|
BeaconDB: db,
|
|
StateNotifier: chainService.StateNotifier(),
|
|
HeadFetcher: chainService,
|
|
}
|
|
exitRoutine := make(chan bool)
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
mockStream := mock.NewMockBeaconNodeValidator_WaitForChainStartServer(ctrl)
|
|
mockStream.EXPECT().Send(
|
|
ðpb.ChainStartResponse{
|
|
Started: true,
|
|
GenesisTime: uint64(time.Unix(0, 0).Unix()),
|
|
},
|
|
).Return(nil)
|
|
mockStream.EXPECT().Context().Return(context.Background())
|
|
go func(tt *testing.T) {
|
|
assert.NoError(tt, Server.WaitForChainStart(&ptypes.Empty{}, mockStream))
|
|
<-exitRoutine
|
|
}(t)
|
|
|
|
// Send in a loop to ensure it is delivered (busy wait for the service to subscribe to the state feed).
|
|
for sent := 0; sent == 0; {
|
|
sent = Server.StateNotifier.StateFeed().Send(&feed.Event{
|
|
Type: statefeed.ChainStarted,
|
|
Data: &statefeed.ChainStartedData{
|
|
StartTime: time.Unix(0, 0),
|
|
},
|
|
})
|
|
}
|
|
|
|
exitRoutine <- true
|
|
require.LogsContain(t, hook, "Sending genesis time")
|
|
}
|
|
|
|
func TestWaitForSynced_ContextClosed(t *testing.T) {
|
|
db, _ := dbutil.SetupDB(t)
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
chainService := &mockChain.ChainService{}
|
|
Server := &Server{
|
|
Ctx: ctx,
|
|
ChainStartFetcher: &mockPOW.FaultyMockPOWChain{
|
|
ChainFeed: new(event.Feed),
|
|
},
|
|
StateNotifier: chainService.StateNotifier(),
|
|
BeaconDB: db,
|
|
HeadFetcher: chainService,
|
|
}
|
|
|
|
exitRoutine := make(chan bool)
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
mockStream := mock.NewMockBeaconNodeValidator_WaitForSyncedServer(ctrl)
|
|
mockStream.EXPECT().Context().Return(context.Background())
|
|
go func(tt *testing.T) {
|
|
err := Server.WaitForSynced(&ptypes.Empty{}, mockStream)
|
|
assert.ErrorContains(tt, "Context canceled", err)
|
|
<-exitRoutine
|
|
}(t)
|
|
cancel()
|
|
exitRoutine <- true
|
|
}
|
|
|
|
func TestWaitForSynced_AlreadySynced(t *testing.T) {
|
|
db, _ := dbutil.SetupDB(t)
|
|
ctx := context.Background()
|
|
headBlockRoot := [32]byte{0x01, 0x02}
|
|
trie := testutil.NewBeaconState()
|
|
require.NoError(t, trie.SetSlot(3))
|
|
require.NoError(t, db.SaveState(ctx, trie, headBlockRoot))
|
|
require.NoError(t, db.SaveHeadBlockRoot(ctx, headBlockRoot))
|
|
|
|
chainService := &mockChain.ChainService{State: trie}
|
|
Server := &Server{
|
|
Ctx: context.Background(),
|
|
ChainStartFetcher: &mockPOW.POWChain{
|
|
ChainFeed: new(event.Feed),
|
|
},
|
|
BeaconDB: db,
|
|
StateNotifier: chainService.StateNotifier(),
|
|
HeadFetcher: chainService,
|
|
SyncChecker: &mockSync.Sync{IsSyncing: false},
|
|
}
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
mockStream := mock.NewMockBeaconNodeValidator_WaitForSyncedServer(ctrl)
|
|
mockStream.EXPECT().Send(
|
|
ðpb.SyncedResponse{
|
|
Synced: true,
|
|
GenesisTime: uint64(time.Unix(0, 0).Unix()),
|
|
},
|
|
).Return(nil)
|
|
mockStream.EXPECT().Context().Return(context.Background())
|
|
assert.NoError(t, Server.WaitForSynced(&ptypes.Empty{}, mockStream), "Could not call RPC method")
|
|
}
|
|
|
|
func TestWaitForSynced_NotStartedThenLogFired(t *testing.T) {
|
|
db, _ := dbutil.SetupDB(t)
|
|
|
|
hook := logTest.NewGlobal()
|
|
chainService := &mockChain.ChainService{}
|
|
Server := &Server{
|
|
Ctx: context.Background(),
|
|
ChainStartFetcher: &mockPOW.FaultyMockPOWChain{
|
|
ChainFeed: new(event.Feed),
|
|
},
|
|
BeaconDB: db,
|
|
StateNotifier: chainService.StateNotifier(),
|
|
HeadFetcher: chainService,
|
|
}
|
|
exitRoutine := make(chan bool)
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
mockStream := mock.NewMockBeaconNodeValidator_WaitForSyncedServer(ctrl)
|
|
mockStream.EXPECT().Send(
|
|
ðpb.SyncedResponse{
|
|
Synced: true,
|
|
GenesisTime: uint64(time.Unix(0, 0).Unix()),
|
|
},
|
|
).Return(nil)
|
|
mockStream.EXPECT().Context().Return(context.Background())
|
|
go func(tt *testing.T) {
|
|
assert.NoError(tt, Server.WaitForSynced(&ptypes.Empty{}, mockStream), "Could not call RPC method")
|
|
<-exitRoutine
|
|
}(t)
|
|
|
|
// Send in a loop to ensure it is delivered (busy wait for the service to subscribe to the state feed).
|
|
for sent := 0; sent == 0; {
|
|
sent = Server.StateNotifier.StateFeed().Send(&feed.Event{
|
|
Type: statefeed.Synced,
|
|
Data: &statefeed.SyncedData{
|
|
StartTime: time.Unix(0, 0),
|
|
},
|
|
})
|
|
}
|
|
|
|
exitRoutine <- true
|
|
require.LogsContain(t, hook, "Sending genesis time")
|
|
}
|