prysm-pulse/cmd/beacon-chain/execution/options_test.go
terence 5a66807989
Update to V5 (#13622)
* First take at updating everything to v5

* Patch gRPC gateway to use prysm v5

Fix patch

* Update go ssz

---------

Co-authored-by: Preston Van Loon <pvanloon@offchainlabs.com>
2024-02-15 05:46:47 +00:00

102 lines
3.5 KiB
Go

package execution
import (
"flag"
"fmt"
"path/filepath"
"testing"
"github.com/prysmaticlabs/prysm/v5/cmd/beacon-chain/flags"
"github.com/prysmaticlabs/prysm/v5/encoding/bytesutil"
"github.com/prysmaticlabs/prysm/v5/io/file"
"github.com/prysmaticlabs/prysm/v5/testing/assert"
"github.com/prysmaticlabs/prysm/v5/testing/require"
"github.com/urfave/cli/v2"
)
func TestExecutionchainCmd(t *testing.T) {
app := cli.App{}
set := flag.NewFlagSet("test", 0)
set.String(flags.ExecutionEngineEndpoint.Name, "primary", "")
ctx := cli.NewContext(&app, set, nil)
endpoints, err := parseExecutionChainEndpoint(ctx)
require.NoError(t, err)
assert.Equal(t, "primary", endpoints)
}
func Test_parseJWTSecretFromFile(t *testing.T) {
t.Run("no flag value specified leads to nil secret", func(t *testing.T) {
app := cli.App{}
set := flag.NewFlagSet("test", 0)
set.String(flags.ExecutionJWTSecretFlag.Name, "", "")
ctx := cli.NewContext(&app, set, nil)
secret, err := parseJWTSecretFromFile(ctx)
require.NoError(t, err)
require.Equal(t, true, secret == nil)
})
t.Run("flag specified but no file found", func(t *testing.T) {
app := cli.App{}
set := flag.NewFlagSet("test", 0)
set.String(flags.ExecutionJWTSecretFlag.Name, "/tmp/askdjkajsd", "")
ctx := cli.NewContext(&app, set, nil)
_, err := parseJWTSecretFromFile(ctx)
require.ErrorContains(t, "no such file", err)
})
t.Run("empty string in file", func(t *testing.T) {
app := cli.App{}
set := flag.NewFlagSet("test", 0)
fullPath := filepath.Join(t.TempDir(), "foohex")
require.NoError(t, file.WriteFile(fullPath, []byte{}))
set.String(flags.ExecutionJWTSecretFlag.Name, fullPath, "")
ctx := cli.NewContext(&app, set, nil)
_, err := parseJWTSecretFromFile(ctx)
require.ErrorContains(t, "cannot be empty", err)
})
t.Run("less than 32 bytes", func(t *testing.T) {
app := cli.App{}
set := flag.NewFlagSet("test", 0)
fullPath := filepath.Join(t.TempDir(), "foohex")
secret := bytesutil.PadTo([]byte("foo"), 31)
hexData := fmt.Sprintf("%#x", secret)
require.NoError(t, file.WriteFile(fullPath, []byte(hexData)))
set.String(flags.ExecutionJWTSecretFlag.Name, fullPath, "")
ctx := cli.NewContext(&app, set, nil)
_, err := parseJWTSecretFromFile(ctx)
require.ErrorContains(t, "should be a hex string of at least 32 bytes", err)
})
t.Run("bad data", func(t *testing.T) {
app := cli.App{}
set := flag.NewFlagSet("test", 0)
fullPath := filepath.Join(t.TempDir(), "foohex")
secret := []byte("foo")
require.NoError(t, file.WriteFile(fullPath, secret))
set.String(flags.ExecutionJWTSecretFlag.Name, fullPath, "")
ctx := cli.NewContext(&app, set, nil)
_, err := parseJWTSecretFromFile(ctx)
require.ErrorContains(t, "invalid byte", err)
})
t.Run("correct format", func(t *testing.T) {
app := cli.App{}
set := flag.NewFlagSet("test", 0)
fullPath := filepath.Join(t.TempDir(), "foohex")
secret := bytesutil.ToBytes32([]byte("foo"))
secretHex := fmt.Sprintf("%#x", secret)
require.NoError(t, file.WriteFile(fullPath, []byte(secretHex)))
set.String(flags.ExecutionJWTSecretFlag.Name, fullPath, "")
ctx := cli.NewContext(&app, set, nil)
got, err := parseJWTSecretFromFile(ctx)
require.NoError(t, err)
require.DeepEqual(t, secret[:], got)
})
}
func TestPowchainPreregistration_EmptyWeb3Provider(t *testing.T) {
app := cli.App{}
set := flag.NewFlagSet("test", 0)
set.String(flags.ExecutionEngineEndpoint.Name, "", "")
ctx := cli.NewContext(&app, set, nil)
_, err := parseExecutionChainEndpoint(ctx)
assert.ErrorContains(t, "you need to specify", err)
}