mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 21:07:18 +00:00
519 lines
20 KiB
Go
519 lines
20 KiB
Go
package blockchain
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"reflect"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/cache/depositcache"
|
|
b "github.com/prysmaticlabs/prysm/beacon-chain/core/blocks"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/feed"
|
|
statefeed "github.com/prysmaticlabs/prysm/beacon-chain/core/feed/state"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/helpers"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/core/state"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/db"
|
|
testDB "github.com/prysmaticlabs/prysm/beacon-chain/db/testing"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/forkchoice/protoarray"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/operations/attestations"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/p2p"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/powchain"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/state/stateV0"
|
|
"github.com/prysmaticlabs/prysm/beacon-chain/state/stategen"
|
|
"github.com/prysmaticlabs/prysm/cmd/beacon-chain/flags"
|
|
protodb "github.com/prysmaticlabs/prysm/proto/beacon/db"
|
|
pb "github.com/prysmaticlabs/prysm/proto/beacon/p2p/v1"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/event"
|
|
"github.com/prysmaticlabs/prysm/shared/interfaces"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/assert"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/require"
|
|
logTest "github.com/sirupsen/logrus/hooks/test"
|
|
"google.golang.org/protobuf/proto"
|
|
)
|
|
|
|
type mockBeaconNode struct {
|
|
stateFeed *event.Feed
|
|
}
|
|
|
|
// StateFeed mocks the same method in the beacon node.
|
|
func (mbn *mockBeaconNode) StateFeed() *event.Feed {
|
|
if mbn.stateFeed == nil {
|
|
mbn.stateFeed = new(event.Feed)
|
|
}
|
|
return mbn.stateFeed
|
|
}
|
|
|
|
type mockBroadcaster struct {
|
|
broadcastCalled bool
|
|
}
|
|
|
|
func (mb *mockBroadcaster) Broadcast(_ context.Context, _ proto.Message) error {
|
|
mb.broadcastCalled = true
|
|
return nil
|
|
}
|
|
|
|
func (mb *mockBroadcaster) BroadcastAttestation(_ context.Context, _ uint64, _ *ethpb.Attestation) error {
|
|
mb.broadcastCalled = true
|
|
return nil
|
|
}
|
|
|
|
var _ p2p.Broadcaster = (*mockBroadcaster)(nil)
|
|
|
|
func setupBeaconChain(t *testing.T, beaconDB db.Database) *Service {
|
|
endpoint := "http://127.0.0.1"
|
|
ctx := context.Background()
|
|
var web3Service *powchain.Service
|
|
var err error
|
|
bState, _ := testutil.DeterministicGenesisState(t, 10)
|
|
pbState, err := stateV0.ProtobufBeaconState(bState.InnerStateUnsafe())
|
|
require.NoError(t, err)
|
|
err = beaconDB.SavePowchainData(ctx, &protodb.ETH1ChainData{
|
|
BeaconState: pbState,
|
|
Trie: &protodb.SparseMerkleTrie{},
|
|
CurrentEth1Data: &protodb.LatestETH1Data{
|
|
BlockHash: make([]byte, 32),
|
|
},
|
|
ChainstartData: &protodb.ChainStartData{
|
|
Eth1Data: ðpb.Eth1Data{
|
|
DepositRoot: make([]byte, 32),
|
|
DepositCount: 0,
|
|
BlockHash: make([]byte, 32),
|
|
},
|
|
},
|
|
DepositContainers: []*protodb.DepositContainer{},
|
|
})
|
|
require.NoError(t, err)
|
|
web3Service, err = powchain.NewService(ctx, &powchain.Web3ServiceConfig{
|
|
BeaconDB: beaconDB,
|
|
HttpEndpoints: []string{endpoint},
|
|
DepositContract: common.Address{},
|
|
})
|
|
require.NoError(t, err, "Unable to set up web3 service")
|
|
|
|
opsService, err := attestations.NewService(ctx, &attestations.Config{Pool: attestations.NewPool()})
|
|
require.NoError(t, err)
|
|
|
|
depositCache, err := depositcache.New()
|
|
require.NoError(t, err)
|
|
|
|
cfg := &Config{
|
|
BeaconBlockBuf: 0,
|
|
BeaconDB: beaconDB,
|
|
DepositCache: depositCache,
|
|
ChainStartFetcher: web3Service,
|
|
P2p: &mockBroadcaster{},
|
|
StateNotifier: &mockBeaconNode{},
|
|
AttPool: attestations.NewPool(),
|
|
StateGen: stategen.New(beaconDB),
|
|
ForkChoiceStore: protoarray.New(0, 0, params.BeaconConfig().ZeroHash),
|
|
OpsService: opsService,
|
|
}
|
|
|
|
// Safe a state in stategen to purposes of testing a service stop / shutdown.
|
|
require.NoError(t, cfg.StateGen.SaveState(ctx, bytesutil.ToBytes32(bState.FinalizedCheckpoint().Root), bState))
|
|
|
|
chainService, err := NewService(ctx, cfg)
|
|
require.NoError(t, err, "Unable to setup chain service")
|
|
chainService.genesisTime = time.Unix(1, 0) // non-zero time
|
|
|
|
return chainService
|
|
}
|
|
|
|
func TestChainStartStop_Initialized(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
ctx := context.Background()
|
|
beaconDB := testDB.SetupDB(t)
|
|
|
|
chainService := setupBeaconChain(t, beaconDB)
|
|
|
|
genesisBlk := testutil.NewBeaconBlock()
|
|
blkRoot, err := genesisBlk.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconDB.SaveBlock(ctx, interfaces.WrappedPhase0SignedBeaconBlock(genesisBlk)))
|
|
s, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
require.NoError(t, s.SetSlot(1))
|
|
require.NoError(t, beaconDB.SaveState(ctx, s, blkRoot))
|
|
require.NoError(t, beaconDB.SaveHeadBlockRoot(ctx, blkRoot))
|
|
require.NoError(t, beaconDB.SaveGenesisBlockRoot(ctx, blkRoot))
|
|
require.NoError(t, beaconDB.SaveJustifiedCheckpoint(ctx, ðpb.Checkpoint{Root: blkRoot[:]}))
|
|
require.NoError(t, beaconDB.SaveFinalizedCheckpoint(ctx, ðpb.Checkpoint{Root: blkRoot[:]}))
|
|
|
|
// Test the start function.
|
|
chainService.Start()
|
|
|
|
require.NoError(t, chainService.Stop(), "Unable to stop chain service")
|
|
|
|
// The context should have been canceled.
|
|
assert.Equal(t, context.Canceled, chainService.ctx.Err(), "Context was not canceled")
|
|
require.LogsContain(t, hook, "data already exists")
|
|
}
|
|
|
|
func TestChainStartStop_GenesisZeroHashes(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
ctx := context.Background()
|
|
beaconDB := testDB.SetupDB(t)
|
|
|
|
chainService := setupBeaconChain(t, beaconDB)
|
|
|
|
genesisBlk := testutil.NewBeaconBlock()
|
|
blkRoot, err := genesisBlk.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconDB.SaveBlock(ctx, interfaces.WrappedPhase0SignedBeaconBlock(genesisBlk)))
|
|
s, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconDB.SaveState(ctx, s, blkRoot))
|
|
require.NoError(t, beaconDB.SaveGenesisBlockRoot(ctx, blkRoot))
|
|
require.NoError(t, beaconDB.SaveJustifiedCheckpoint(ctx, ðpb.Checkpoint{Root: params.BeaconConfig().ZeroHash[:]}))
|
|
|
|
// Test the start function.
|
|
chainService.Start()
|
|
|
|
require.NoError(t, chainService.Stop(), "Unable to stop chain service")
|
|
|
|
// The context should have been canceled.
|
|
assert.Equal(t, context.Canceled, chainService.ctx.Err(), "Context was not canceled")
|
|
require.LogsContain(t, hook, "data already exists")
|
|
}
|
|
|
|
func TestChainService_InitializeBeaconChain(t *testing.T) {
|
|
helpers.ClearCache()
|
|
beaconDB := testDB.SetupDB(t)
|
|
ctx := context.Background()
|
|
|
|
bc := setupBeaconChain(t, beaconDB)
|
|
var err error
|
|
|
|
// Set up 10 deposits pre chain start for validators to register
|
|
count := uint64(10)
|
|
deposits, _, err := testutil.DeterministicDepositsAndKeys(count)
|
|
require.NoError(t, err)
|
|
trie, _, err := testutil.DepositTrieFromDeposits(deposits)
|
|
require.NoError(t, err)
|
|
hashTreeRoot := trie.HashTreeRoot()
|
|
genState, err := state.EmptyGenesisState()
|
|
require.NoError(t, err)
|
|
err = genState.SetEth1Data(ðpb.Eth1Data{
|
|
DepositRoot: hashTreeRoot[:],
|
|
DepositCount: uint64(len(deposits)),
|
|
BlockHash: make([]byte, 32),
|
|
})
|
|
require.NoError(t, err)
|
|
genState, err = b.ProcessPreGenesisDeposits(ctx, genState, deposits)
|
|
require.NoError(t, err)
|
|
|
|
_, err = bc.initializeBeaconChain(ctx, time.Unix(0, 0), genState, ðpb.Eth1Data{DepositRoot: hashTreeRoot[:], BlockHash: make([]byte, 32)})
|
|
require.NoError(t, err)
|
|
|
|
_, err = bc.HeadState(ctx)
|
|
assert.NoError(t, err)
|
|
headBlk, err := bc.HeadBlock(ctx)
|
|
require.NoError(t, err)
|
|
if headBlk == nil {
|
|
t.Error("Head state can't be nil after initialize beacon chain")
|
|
}
|
|
r, err := bc.HeadRoot(ctx)
|
|
require.NoError(t, err)
|
|
if bytesutil.ToBytes32(r) == params.BeaconConfig().ZeroHash {
|
|
t.Error("Canonical root for slot 0 can't be zeros after initialize beacon chain")
|
|
}
|
|
}
|
|
|
|
func TestChainService_CorrectGenesisRoots(t *testing.T) {
|
|
ctx := context.Background()
|
|
beaconDB := testDB.SetupDB(t)
|
|
|
|
chainService := setupBeaconChain(t, beaconDB)
|
|
|
|
genesisBlk := testutil.NewBeaconBlock()
|
|
blkRoot, err := genesisBlk.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconDB.SaveBlock(ctx, interfaces.WrappedPhase0SignedBeaconBlock(genesisBlk)))
|
|
s, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
require.NoError(t, s.SetSlot(0))
|
|
require.NoError(t, beaconDB.SaveState(ctx, s, blkRoot))
|
|
require.NoError(t, beaconDB.SaveHeadBlockRoot(ctx, blkRoot))
|
|
require.NoError(t, beaconDB.SaveGenesisBlockRoot(ctx, blkRoot))
|
|
require.NoError(t, beaconDB.SaveFinalizedCheckpoint(ctx, ðpb.Checkpoint{Root: blkRoot[:]}))
|
|
|
|
// Test the start function.
|
|
chainService.Start()
|
|
|
|
require.DeepEqual(t, blkRoot[:], chainService.finalizedCheckpt.Root, "Finalize Checkpoint root is incorrect")
|
|
require.DeepEqual(t, params.BeaconConfig().ZeroHash[:], chainService.justifiedCheckpt.Root, "Justified Checkpoint root is incorrect")
|
|
|
|
require.NoError(t, chainService.Stop(), "Unable to stop chain service")
|
|
|
|
}
|
|
|
|
func TestChainService_InitializeChainInfo(t *testing.T) {
|
|
beaconDB := testDB.SetupDB(t)
|
|
ctx := context.Background()
|
|
|
|
genesis := testutil.NewBeaconBlock()
|
|
genesisRoot, err := genesis.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconDB.SaveGenesisBlockRoot(ctx, genesisRoot))
|
|
require.NoError(t, beaconDB.SaveBlock(ctx, interfaces.WrappedPhase0SignedBeaconBlock(genesis)))
|
|
|
|
finalizedSlot := params.BeaconConfig().SlotsPerEpoch*2 + 1
|
|
headBlock := testutil.NewBeaconBlock()
|
|
headBlock.Block.Slot = finalizedSlot
|
|
headBlock.Block.ParentRoot = bytesutil.PadTo(genesisRoot[:], 32)
|
|
headState, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
require.NoError(t, headState.SetSlot(finalizedSlot))
|
|
require.NoError(t, headState.SetGenesisValidatorRoot(params.BeaconConfig().ZeroHash[:]))
|
|
headRoot, err := headBlock.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconDB.SaveState(ctx, headState, headRoot))
|
|
require.NoError(t, beaconDB.SaveState(ctx, headState, genesisRoot))
|
|
require.NoError(t, beaconDB.SaveBlock(ctx, interfaces.WrappedPhase0SignedBeaconBlock(headBlock)))
|
|
require.NoError(t, beaconDB.SaveFinalizedCheckpoint(ctx, ðpb.Checkpoint{Epoch: helpers.SlotToEpoch(finalizedSlot), Root: headRoot[:]}))
|
|
c := &Service{cfg: &Config{BeaconDB: beaconDB, StateGen: stategen.New(beaconDB)}}
|
|
require.NoError(t, c.initializeChainInfo(ctx))
|
|
headBlk, err := c.HeadBlock(ctx)
|
|
require.NoError(t, err)
|
|
assert.DeepEqual(t, headBlock, headBlk.Proto(), "Head block incorrect")
|
|
s, err := c.HeadState(ctx)
|
|
require.NoError(t, err)
|
|
assert.DeepSSZEqual(t, headState.InnerStateUnsafe(), s.InnerStateUnsafe(), "Head state incorrect")
|
|
assert.Equal(t, c.HeadSlot(), headBlock.Block.Slot, "Head slot incorrect")
|
|
r, err := c.HeadRoot(context.Background())
|
|
require.NoError(t, err)
|
|
if !bytes.Equal(headRoot[:], r) {
|
|
t.Error("head slot incorrect")
|
|
}
|
|
assert.Equal(t, genesisRoot, c.genesisRoot, "Genesis block root incorrect")
|
|
}
|
|
|
|
func TestChainService_InitializeChainInfo_SetHeadAtGenesis(t *testing.T) {
|
|
beaconDB := testDB.SetupDB(t)
|
|
ctx := context.Background()
|
|
|
|
genesis := testutil.NewBeaconBlock()
|
|
genesisRoot, err := genesis.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconDB.SaveGenesisBlockRoot(ctx, genesisRoot))
|
|
require.NoError(t, beaconDB.SaveBlock(ctx, interfaces.WrappedPhase0SignedBeaconBlock(genesis)))
|
|
|
|
finalizedSlot := params.BeaconConfig().SlotsPerEpoch*2 + 1
|
|
headBlock := testutil.NewBeaconBlock()
|
|
headBlock.Block.Slot = finalizedSlot
|
|
headBlock.Block.ParentRoot = bytesutil.PadTo(genesisRoot[:], 32)
|
|
headState, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
require.NoError(t, headState.SetSlot(finalizedSlot))
|
|
require.NoError(t, headState.SetGenesisValidatorRoot(params.BeaconConfig().ZeroHash[:]))
|
|
headRoot, err := headBlock.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconDB.SaveState(ctx, headState, headRoot))
|
|
require.NoError(t, beaconDB.SaveState(ctx, headState, genesisRoot))
|
|
require.NoError(t, beaconDB.SaveBlock(ctx, interfaces.WrappedPhase0SignedBeaconBlock(headBlock)))
|
|
c := &Service{cfg: &Config{BeaconDB: beaconDB, StateGen: stategen.New(beaconDB)}}
|
|
require.NoError(t, c.initializeChainInfo(ctx))
|
|
s, err := c.HeadState(ctx)
|
|
require.NoError(t, err)
|
|
assert.DeepSSZEqual(t, headState.InnerStateUnsafe(), s.InnerStateUnsafe(), "Head state incorrect")
|
|
assert.Equal(t, genesisRoot, c.genesisRoot, "Genesis block root incorrect")
|
|
assert.DeepEqual(t, genesis, c.head.block.Proto())
|
|
}
|
|
|
|
func TestChainService_InitializeChainInfo_HeadSync(t *testing.T) {
|
|
resetFlags := flags.Get()
|
|
flags.Init(&flags.GlobalFlags{
|
|
HeadSync: true,
|
|
})
|
|
defer func() {
|
|
flags.Init(resetFlags)
|
|
}()
|
|
|
|
hook := logTest.NewGlobal()
|
|
finalizedSlot := params.BeaconConfig().SlotsPerEpoch*2 + 1
|
|
beaconDB := testDB.SetupDB(t)
|
|
ctx := context.Background()
|
|
|
|
genesisBlock := testutil.NewBeaconBlock()
|
|
genesisRoot, err := genesisBlock.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconDB.SaveGenesisBlockRoot(ctx, genesisRoot))
|
|
require.NoError(t, beaconDB.SaveBlock(ctx, interfaces.WrappedPhase0SignedBeaconBlock(genesisBlock)))
|
|
|
|
finalizedBlock := testutil.NewBeaconBlock()
|
|
finalizedBlock.Block.Slot = finalizedSlot
|
|
finalizedBlock.Block.ParentRoot = genesisRoot[:]
|
|
finalizedRoot, err := finalizedBlock.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconDB.SaveBlock(ctx, interfaces.WrappedPhase0SignedBeaconBlock(finalizedBlock)))
|
|
|
|
// Set head slot close to the finalization point, no head sync is triggered.
|
|
headBlock := testutil.NewBeaconBlock()
|
|
headBlock.Block.Slot = finalizedSlot + params.BeaconConfig().SlotsPerEpoch*5
|
|
headBlock.Block.ParentRoot = finalizedRoot[:]
|
|
headRoot, err := headBlock.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconDB.SaveBlock(ctx, interfaces.WrappedPhase0SignedBeaconBlock(headBlock)))
|
|
|
|
headState, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
require.NoError(t, headState.SetSlot(headBlock.Block.Slot))
|
|
require.NoError(t, headState.SetGenesisValidatorRoot(params.BeaconConfig().ZeroHash[:]))
|
|
require.NoError(t, beaconDB.SaveState(ctx, headState, genesisRoot))
|
|
require.NoError(t, beaconDB.SaveState(ctx, headState, finalizedRoot))
|
|
require.NoError(t, beaconDB.SaveState(ctx, headState, headRoot))
|
|
require.NoError(t, beaconDB.SaveHeadBlockRoot(ctx, headRoot))
|
|
require.NoError(t, beaconDB.SaveFinalizedCheckpoint(ctx, ðpb.Checkpoint{
|
|
Epoch: helpers.SlotToEpoch(finalizedBlock.Block.Slot),
|
|
Root: finalizedRoot[:],
|
|
}))
|
|
|
|
c := &Service{cfg: &Config{BeaconDB: beaconDB, StateGen: stategen.New(beaconDB)}}
|
|
|
|
require.NoError(t, c.initializeChainInfo(ctx))
|
|
s, err := c.HeadState(ctx)
|
|
require.NoError(t, err)
|
|
assert.DeepSSZEqual(t, headState.InnerStateUnsafe(), s.InnerStateUnsafe(), "Head state incorrect")
|
|
assert.Equal(t, genesisRoot, c.genesisRoot, "Genesis block root incorrect")
|
|
// Since head sync is not triggered, chain is initialized to the last finalization checkpoint.
|
|
assert.DeepEqual(t, finalizedBlock, c.head.block.Proto())
|
|
assert.LogsContain(t, hook, "resetting head from the checkpoint ('--head-sync' flag is ignored)")
|
|
assert.LogsDoNotContain(t, hook, "Regenerating state from the last checkpoint at slot")
|
|
|
|
// Set head slot far beyond the finalization point, head sync should be triggered.
|
|
headBlock = testutil.NewBeaconBlock()
|
|
headBlock.Block.Slot = finalizedSlot + params.BeaconConfig().SlotsPerEpoch*headSyncMinEpochsAfterCheckpoint
|
|
headBlock.Block.ParentRoot = finalizedRoot[:]
|
|
headRoot, err = headBlock.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
require.NoError(t, beaconDB.SaveBlock(ctx, interfaces.WrappedPhase0SignedBeaconBlock(headBlock)))
|
|
require.NoError(t, beaconDB.SaveState(ctx, headState, headRoot))
|
|
require.NoError(t, beaconDB.SaveHeadBlockRoot(ctx, headRoot))
|
|
|
|
hook.Reset()
|
|
require.NoError(t, c.initializeChainInfo(ctx))
|
|
s, err = c.HeadState(ctx)
|
|
require.NoError(t, err)
|
|
assert.DeepSSZEqual(t, headState.InnerStateUnsafe(), s.InnerStateUnsafe(), "Head state incorrect")
|
|
assert.Equal(t, genesisRoot, c.genesisRoot, "Genesis block root incorrect")
|
|
// Head slot is far beyond the latest finalized checkpoint, head sync is triggered.
|
|
assert.DeepEqual(t, headBlock, c.head.block.Proto())
|
|
assert.LogsContain(t, hook, "Regenerating state from the last checkpoint at slot 225")
|
|
assert.LogsDoNotContain(t, hook, "resetting head from the checkpoint ('--head-sync' flag is ignored)")
|
|
}
|
|
|
|
func TestChainService_SaveHeadNoDB(t *testing.T) {
|
|
beaconDB := testDB.SetupDB(t)
|
|
ctx := context.Background()
|
|
s := &Service{
|
|
cfg: &Config{BeaconDB: beaconDB, StateGen: stategen.New(beaconDB)},
|
|
}
|
|
blk := testutil.NewBeaconBlock()
|
|
blk.Block.Slot = 1
|
|
r, err := blk.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
newState, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
require.NoError(t, s.cfg.StateGen.SaveState(ctx, r, newState))
|
|
require.NoError(t, s.saveHeadNoDB(ctx, interfaces.WrappedPhase0SignedBeaconBlock(blk), r, newState))
|
|
|
|
newB, err := s.cfg.BeaconDB.HeadBlock(ctx)
|
|
require.NoError(t, err)
|
|
if reflect.DeepEqual(newB, blk) {
|
|
t.Error("head block should not be equal")
|
|
}
|
|
}
|
|
|
|
func TestHasBlock_ForkChoiceAndDB(t *testing.T) {
|
|
ctx := context.Background()
|
|
beaconDB := testDB.SetupDB(t)
|
|
s := &Service{
|
|
cfg: &Config{ForkChoiceStore: protoarray.New(0, 0, [32]byte{}), BeaconDB: beaconDB},
|
|
finalizedCheckpt: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
}
|
|
block := testutil.NewBeaconBlock()
|
|
r, err := block.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
beaconState, err := testutil.NewBeaconState()
|
|
require.NoError(t, err)
|
|
require.NoError(t, s.insertBlockAndAttestationsToForkChoiceStore(ctx, interfaces.WrappedPhase0SignedBeaconBlock(block).Block(), r, beaconState))
|
|
|
|
assert.Equal(t, false, s.hasBlock(ctx, [32]byte{}), "Should not have block")
|
|
assert.Equal(t, true, s.hasBlock(ctx, r), "Should have block")
|
|
}
|
|
|
|
func TestServiceStop_SaveCachedBlocks(t *testing.T) {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
beaconDB := testDB.SetupDB(t)
|
|
s := &Service{
|
|
cfg: &Config{BeaconDB: beaconDB, StateGen: stategen.New(beaconDB)},
|
|
ctx: ctx,
|
|
cancel: cancel,
|
|
initSyncBlocks: make(map[[32]byte]interfaces.SignedBeaconBlock),
|
|
}
|
|
block := testutil.NewBeaconBlock()
|
|
r, err := block.Block.HashTreeRoot()
|
|
require.NoError(t, err)
|
|
s.saveInitSyncBlock(r, interfaces.WrappedPhase0SignedBeaconBlock(block))
|
|
require.NoError(t, s.Stop())
|
|
require.Equal(t, true, s.cfg.BeaconDB.HasBlock(ctx, r))
|
|
}
|
|
|
|
func TestProcessChainStartTime_ReceivedFeed(t *testing.T) {
|
|
beaconDB := testDB.SetupDB(t)
|
|
service := setupBeaconChain(t, beaconDB)
|
|
stateChannel := make(chan *feed.Event, 1)
|
|
stateSub := service.cfg.StateNotifier.StateFeed().Subscribe(stateChannel)
|
|
defer stateSub.Unsubscribe()
|
|
service.processChainStartTime(context.Background(), time.Now())
|
|
|
|
stateEvent := <-stateChannel
|
|
require.Equal(t, int(stateEvent.Type), statefeed.Initialized)
|
|
_, ok := stateEvent.Data.(*statefeed.InitializedData)
|
|
require.Equal(t, true, ok)
|
|
}
|
|
|
|
func BenchmarkHasBlockDB(b *testing.B) {
|
|
beaconDB := testDB.SetupDB(b)
|
|
ctx := context.Background()
|
|
s := &Service{
|
|
cfg: &Config{BeaconDB: beaconDB},
|
|
}
|
|
block := testutil.NewBeaconBlock()
|
|
require.NoError(b, s.cfg.BeaconDB.SaveBlock(ctx, interfaces.WrappedPhase0SignedBeaconBlock(block)))
|
|
r, err := block.Block.HashTreeRoot()
|
|
require.NoError(b, err)
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
require.Equal(b, true, s.cfg.BeaconDB.HasBlock(ctx, r), "Block is not in DB")
|
|
}
|
|
}
|
|
|
|
func BenchmarkHasBlockForkChoiceStore(b *testing.B) {
|
|
ctx := context.Background()
|
|
beaconDB := testDB.SetupDB(b)
|
|
s := &Service{
|
|
cfg: &Config{ForkChoiceStore: protoarray.New(0, 0, [32]byte{}), BeaconDB: beaconDB},
|
|
finalizedCheckpt: ðpb.Checkpoint{Root: make([]byte, 32)},
|
|
}
|
|
block := ðpb.SignedBeaconBlock{Block: ðpb.BeaconBlock{Body: ðpb.BeaconBlockBody{}}}
|
|
r, err := block.Block.HashTreeRoot()
|
|
require.NoError(b, err)
|
|
bs := &pb.BeaconState{FinalizedCheckpoint: ðpb.Checkpoint{Root: make([]byte, 32)}, CurrentJustifiedCheckpoint: ðpb.Checkpoint{Root: make([]byte, 32)}}
|
|
beaconState, err := stateV0.InitializeFromProto(bs)
|
|
require.NoError(b, err)
|
|
require.NoError(b, s.insertBlockAndAttestationsToForkChoiceStore(ctx, interfaces.WrappedPhase0SignedBeaconBlock(block).Block(), r, beaconState))
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
require.Equal(b, true, s.cfg.ForkChoiceStore.HasNode(r), "Block is not in fork choice store")
|
|
}
|
|
}
|