Wire up ePBS SSE events and fix envelope availability (#9199)

Co-Authored-By: Jimmy Chen <jchen.tc@gmail.com>
This commit is contained in:
Jimmy Chen
2026-04-28 10:59:01 +02:00
committed by GitHub
parent 919c996c18
commit 280e2f1d53
5 changed files with 251 additions and 11 deletions

View File

@@ -10,8 +10,8 @@ use std::sync::Arc;
use types::data::FixedBlobSidecarList;
use types::test_utils::TestRandom;
use types::{
BlobSidecar, DataColumnSidecar, DataColumnSidecarFulu, DataColumnSidecarGloas, EthSpec,
MinimalEthSpec, Slot,
BlobSidecar, DataColumnSidecar, DataColumnSidecarFulu, DataColumnSidecarGloas, Domain, EthSpec,
MinimalEthSpec, PayloadAttestationData, PayloadAttestationMessage, SignedRoot, Slot,
};
type E = MinimalEthSpec;
@@ -258,3 +258,177 @@ async fn head_event_on_block_import() {
panic!("Expected Head event, got {:?}", head_event);
}
}
/// Verifies that `execution_payload_gossip` fires at gossip verification time, and
/// `execution_payload` + `execution_payload_available` fire at import time.
#[tokio::test]
async fn execution_payload_envelope_events() {
if !fork_name_from_env().is_some_and(|f| f.gloas_enabled()) {
return;
}
let harness = BeaconChainHarness::builder(E::default())
.default_spec()
.deterministic_keypairs(64)
.fresh_ephemeral_store()
.mock_execution_layer()
.build();
harness.extend_to_slot(Slot::new(1)).await;
let state = harness.get_current_state();
let target_slot = Slot::new(2);
harness.advance_slot();
let (block_contents, opt_envelope, _new_state) =
harness.make_block_with_envelope(state, target_slot).await;
let block_root = block_contents.0.canonical_root();
harness
.process_block(target_slot, block_root, block_contents)
.await
.expect("block should be processed");
let signed_envelope = opt_envelope.expect("Gloas block should produce an envelope");
let event_handler = harness.chain.event_handler.as_ref().unwrap();
let mut gossip_receiver = event_handler.subscribe_execution_payload_gossip();
let mut payload_receiver = event_handler.subscribe_execution_payload();
let mut available_receiver = event_handler.subscribe_execution_payload_available();
// Stage 1: gossip verification fires execution_payload_gossip only.
let gossip_verified = harness
.chain
.verify_envelope_for_gossip(Arc::new(signed_envelope))
.await
.expect("envelope gossip verification should succeed");
let gossip_event = gossip_receiver
.try_recv()
.expect("should receive execution_payload_gossip after gossip verification");
if let EventKind::ExecutionPayloadGossip(sse) = gossip_event {
assert_eq!(sse.slot, target_slot);
assert_eq!(sse.block_root, block_root);
} else {
panic!(
"Expected ExecutionPayloadGossip event, got {:?}",
gossip_event
);
}
assert!(payload_receiver.try_recv().is_err());
assert!(available_receiver.try_recv().is_err());
// Stage 2: import fires execution_payload and execution_payload_available.
harness
.chain
.process_execution_payload_envelope(
block_root,
gossip_verified,
beacon_chain::NotifyExecutionLayer::Yes,
types::BlockImportSource::Gossip,
#[allow(clippy::result_large_err)]
|| Ok(()),
)
.await
.expect("envelope import should succeed");
let payload_event = payload_receiver
.try_recv()
.expect("should receive execution_payload after import");
if let EventKind::ExecutionPayload(sse) = payload_event {
assert_eq!(sse.slot, target_slot);
assert_eq!(sse.block_root, block_root);
} else {
panic!("Expected ExecutionPayload event, got {:?}", payload_event);
}
let available_event = available_receiver
.try_recv()
.expect("should receive execution_payload_available after import");
if let EventKind::ExecutionPayloadAvailable(sse) = available_event {
assert_eq!(sse.slot, target_slot);
assert_eq!(sse.block_root, block_root);
} else {
panic!(
"Expected ExecutionPayloadAvailable event, got {:?}",
available_event
);
}
assert!(
gossip_receiver.try_recv().is_err(),
"no extra gossip events should fire during import"
);
}
/// Verifies that a `payload_attestation_message` event is emitted when a payload attestation
/// message passes gossip verification.
#[tokio::test]
async fn payload_attestation_message_event_on_gossip_verification() {
if !fork_name_from_env().is_some_and(|f| f.gloas_enabled()) {
return;
}
let harness = BeaconChainHarness::builder(E::default())
.default_spec()
.deterministic_keypairs(64)
.fresh_ephemeral_store()
.mock_execution_layer()
.build();
// Advance chain to have a valid head block.
let target_slot = Slot::new(1);
harness.extend_to_slot(target_slot).await;
let head = harness.chain.canonical_head.cached_head();
let head_state = &head.snapshot.beacon_state;
// Get a PTC member for this slot.
let ptc = head_state
.get_ptc(target_slot, &harness.spec)
.expect("should get PTC");
let validator_index = *ptc.0.first().expect("PTC should have at least one member") as u64;
// Sign a payload attestation.
let target_epoch = target_slot.epoch(E::slots_per_epoch());
let domain = harness.spec.get_domain(
target_epoch,
Domain::PTCAttester,
&head_state.fork(),
head_state.genesis_validators_root(),
);
let data = PayloadAttestationData {
beacon_block_root: head.head_block_root(),
slot: target_slot,
payload_present: true,
blob_data_available: true,
};
let message = data.signing_root(domain);
let signature = harness.validator_keypairs[validator_index as usize]
.sk
.sign(message);
let msg = PayloadAttestationMessage {
validator_index,
data: data.clone(),
signature: signature.clone(),
};
// Subscribe before verification.
let event_handler = harness.chain.event_handler.as_ref().unwrap();
let mut receiver = event_handler.subscribe_payload_attestation_message();
// Verify the attestation through the gossip path.
harness
.chain
.verify_payload_attestation_message_for_gossip(msg)
.expect("verification should succeed");
// Assert the event was emitted.
let event = receiver.try_recv().expect("should receive event");
if let EventKind::PayloadAttestationMessage(versioned) = event {
assert_eq!(versioned.data.validator_index, validator_index);
assert_eq!(versioned.data.data, data);
} else {
panic!("Expected PayloadAttestationMessage event, got {:?}", event);
}
}