mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 21:07:18 +00:00
74101612ce
* first working implementation * assertions tests * adds to requires * merges assert and require tests into a single suite * gazelle * Merge branch 'merge-assert-require-tests' into assert-logs-contains-move-to-assertions * gazelle * updates references * fixes build issue * Merge branch 'master' into assert-logs-contains-move-to-assertions * Merge refs/heads/master into assert-logs-contains-move-to-assertions * Merge branch 'master' into assert-logs-contains-move-to-assertions * fixes build issue * Merge branch 'assert-logs-contains-move-to-assertions' of github.com:prysmaticlabs/prysm into assert-logs-contains-move-to-assertions * Merge refs/heads/master into assert-logs-contains-move-to-assertions * Merge refs/heads/master into assert-logs-contains-move-to-assertions
126 lines
3.5 KiB
Go
126 lines
3.5 KiB
Go
package client
|
|
|
|
import (
|
|
"context"
|
|
"os"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/prysmaticlabs/prysm/shared"
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/keystore"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/assert"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/require"
|
|
v1 "github.com/prysmaticlabs/prysm/validator/accounts/v1"
|
|
keymanager "github.com/prysmaticlabs/prysm/validator/keymanager/v1"
|
|
logTest "github.com/sirupsen/logrus/hooks/test"
|
|
)
|
|
|
|
var _ = shared.Service(&ValidatorService{})
|
|
var validatorKey *keystore.Key
|
|
var validatorPubKey [48]byte
|
|
var keyMap map[[48]byte]*keystore.Key
|
|
var keyMapThreeValidators map[[48]byte]*keystore.Key
|
|
var testKeyManager keymanager.KeyManager
|
|
var testKeyManagerThreeValidators keymanager.KeyManager
|
|
|
|
func keySetup() {
|
|
keyMap = make(map[[48]byte]*keystore.Key)
|
|
keyMapThreeValidators = make(map[[48]byte]*keystore.Key)
|
|
|
|
var err error
|
|
validatorKey, err = keystore.NewKey()
|
|
if err != nil {
|
|
log.WithError(err).Debug("Cannot create key")
|
|
}
|
|
copy(validatorPubKey[:], validatorKey.PublicKey.Marshal())
|
|
keyMap[validatorPubKey] = validatorKey
|
|
|
|
sks := make([]bls.SecretKey, 1)
|
|
sks[0] = validatorKey.SecretKey
|
|
testKeyManager = keymanager.NewDirect(sks)
|
|
|
|
sks = make([]bls.SecretKey, 3)
|
|
for i := 0; i < 3; i++ {
|
|
vKey, err := keystore.NewKey()
|
|
if err != nil {
|
|
log.WithError(err).Debug("Cannot create key")
|
|
}
|
|
var pubKey [48]byte
|
|
copy(pubKey[:], vKey.PublicKey.Marshal())
|
|
keyMapThreeValidators[pubKey] = vKey
|
|
sks[i] = vKey.SecretKey
|
|
}
|
|
testKeyManagerThreeValidators = keymanager.NewDirect(sks)
|
|
}
|
|
|
|
func TestMain(m *testing.M) {
|
|
dir := testutil.TempDir() + "/keystore1"
|
|
defer func() {
|
|
if err := os.RemoveAll(dir); err != nil {
|
|
log.WithError(err).Debug("Cannot remove keystore folder")
|
|
}
|
|
}()
|
|
if err := v1.NewValidatorAccount(dir, "1234"); err != nil {
|
|
log.WithError(err).Debug("Cannot create validator account")
|
|
}
|
|
keySetup()
|
|
os.Exit(m.Run())
|
|
}
|
|
|
|
func TestStop_CancelsContext(t *testing.T) {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
vs := &ValidatorService{
|
|
ctx: ctx,
|
|
cancel: cancel,
|
|
}
|
|
|
|
assert.NoError(t, vs.Stop())
|
|
|
|
select {
|
|
case <-time.After(1 * time.Second):
|
|
t.Error("Context not canceled within 1s")
|
|
case <-vs.ctx.Done():
|
|
}
|
|
}
|
|
|
|
func TestLifecycle(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
// Use canceled context so that the run function exits immediately..
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
cancel()
|
|
validatorService := &ValidatorService{
|
|
ctx: ctx,
|
|
cancel: cancel,
|
|
endpoint: "merkle tries",
|
|
withCert: "alice.crt",
|
|
keyManager: keymanager.NewDirect(nil),
|
|
}
|
|
validatorService.Start()
|
|
require.NoError(t, validatorService.Stop(), "Could not stop service")
|
|
require.LogsContain(t, hook, "Stopping service")
|
|
}
|
|
|
|
func TestLifecycle_Insecure(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
// Use canceled context so that the run function exits immediately.
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
cancel()
|
|
validatorService := &ValidatorService{
|
|
ctx: ctx,
|
|
cancel: cancel,
|
|
endpoint: "merkle tries",
|
|
keyManager: keymanager.NewDirect(nil),
|
|
}
|
|
validatorService.Start()
|
|
require.LogsContain(t, hook, "You are using an insecure gRPC connection")
|
|
require.NoError(t, validatorService.Stop(), "Could not stop service")
|
|
require.LogsContain(t, hook, "Stopping service")
|
|
}
|
|
|
|
func TestStatus_NoConnectionError(t *testing.T) {
|
|
validatorService := &ValidatorService{}
|
|
assert.ErrorContains(t, "no connection", validatorService.Status())
|
|
}
|