mirror of
https://github.com/sigp/lighthouse.git
synced 2026-04-30 19:23:50 +00:00
Wire up ePBS SSE events and fix envelope availability (#9199)
Co-Authored-By: Jimmy Chen <jchen.tc@gmail.com>
This commit is contained in:
@@ -10,8 +10,8 @@ use std::sync::Arc;
|
||||
use types::data::FixedBlobSidecarList;
|
||||
use types::test_utils::TestRandom;
|
||||
use types::{
|
||||
BlobSidecar, DataColumnSidecar, DataColumnSidecarFulu, DataColumnSidecarGloas, EthSpec,
|
||||
MinimalEthSpec, Slot,
|
||||
BlobSidecar, DataColumnSidecar, DataColumnSidecarFulu, DataColumnSidecarGloas, Domain, EthSpec,
|
||||
MinimalEthSpec, PayloadAttestationData, PayloadAttestationMessage, SignedRoot, Slot,
|
||||
};
|
||||
|
||||
type E = MinimalEthSpec;
|
||||
@@ -258,3 +258,177 @@ async fn head_event_on_block_import() {
|
||||
panic!("Expected Head event, got {:?}", head_event);
|
||||
}
|
||||
}
|
||||
|
||||
/// Verifies that `execution_payload_gossip` fires at gossip verification time, and
|
||||
/// `execution_payload` + `execution_payload_available` fire at import time.
|
||||
#[tokio::test]
|
||||
async fn execution_payload_envelope_events() {
|
||||
if !fork_name_from_env().is_some_and(|f| f.gloas_enabled()) {
|
||||
return;
|
||||
}
|
||||
|
||||
let harness = BeaconChainHarness::builder(E::default())
|
||||
.default_spec()
|
||||
.deterministic_keypairs(64)
|
||||
.fresh_ephemeral_store()
|
||||
.mock_execution_layer()
|
||||
.build();
|
||||
|
||||
harness.extend_to_slot(Slot::new(1)).await;
|
||||
|
||||
let state = harness.get_current_state();
|
||||
let target_slot = Slot::new(2);
|
||||
harness.advance_slot();
|
||||
let (block_contents, opt_envelope, _new_state) =
|
||||
harness.make_block_with_envelope(state, target_slot).await;
|
||||
|
||||
let block_root = block_contents.0.canonical_root();
|
||||
|
||||
harness
|
||||
.process_block(target_slot, block_root, block_contents)
|
||||
.await
|
||||
.expect("block should be processed");
|
||||
|
||||
let signed_envelope = opt_envelope.expect("Gloas block should produce an envelope");
|
||||
|
||||
let event_handler = harness.chain.event_handler.as_ref().unwrap();
|
||||
let mut gossip_receiver = event_handler.subscribe_execution_payload_gossip();
|
||||
let mut payload_receiver = event_handler.subscribe_execution_payload();
|
||||
let mut available_receiver = event_handler.subscribe_execution_payload_available();
|
||||
|
||||
// Stage 1: gossip verification fires execution_payload_gossip only.
|
||||
let gossip_verified = harness
|
||||
.chain
|
||||
.verify_envelope_for_gossip(Arc::new(signed_envelope))
|
||||
.await
|
||||
.expect("envelope gossip verification should succeed");
|
||||
|
||||
let gossip_event = gossip_receiver
|
||||
.try_recv()
|
||||
.expect("should receive execution_payload_gossip after gossip verification");
|
||||
if let EventKind::ExecutionPayloadGossip(sse) = gossip_event {
|
||||
assert_eq!(sse.slot, target_slot);
|
||||
assert_eq!(sse.block_root, block_root);
|
||||
} else {
|
||||
panic!(
|
||||
"Expected ExecutionPayloadGossip event, got {:?}",
|
||||
gossip_event
|
||||
);
|
||||
}
|
||||
assert!(payload_receiver.try_recv().is_err());
|
||||
assert!(available_receiver.try_recv().is_err());
|
||||
|
||||
// Stage 2: import fires execution_payload and execution_payload_available.
|
||||
harness
|
||||
.chain
|
||||
.process_execution_payload_envelope(
|
||||
block_root,
|
||||
gossip_verified,
|
||||
beacon_chain::NotifyExecutionLayer::Yes,
|
||||
types::BlockImportSource::Gossip,
|
||||
#[allow(clippy::result_large_err)]
|
||||
|| Ok(()),
|
||||
)
|
||||
.await
|
||||
.expect("envelope import should succeed");
|
||||
|
||||
let payload_event = payload_receiver
|
||||
.try_recv()
|
||||
.expect("should receive execution_payload after import");
|
||||
if let EventKind::ExecutionPayload(sse) = payload_event {
|
||||
assert_eq!(sse.slot, target_slot);
|
||||
assert_eq!(sse.block_root, block_root);
|
||||
} else {
|
||||
panic!("Expected ExecutionPayload event, got {:?}", payload_event);
|
||||
}
|
||||
|
||||
let available_event = available_receiver
|
||||
.try_recv()
|
||||
.expect("should receive execution_payload_available after import");
|
||||
if let EventKind::ExecutionPayloadAvailable(sse) = available_event {
|
||||
assert_eq!(sse.slot, target_slot);
|
||||
assert_eq!(sse.block_root, block_root);
|
||||
} else {
|
||||
panic!(
|
||||
"Expected ExecutionPayloadAvailable event, got {:?}",
|
||||
available_event
|
||||
);
|
||||
}
|
||||
|
||||
assert!(
|
||||
gossip_receiver.try_recv().is_err(),
|
||||
"no extra gossip events should fire during import"
|
||||
);
|
||||
}
|
||||
|
||||
/// Verifies that a `payload_attestation_message` event is emitted when a payload attestation
|
||||
/// message passes gossip verification.
|
||||
#[tokio::test]
|
||||
async fn payload_attestation_message_event_on_gossip_verification() {
|
||||
if !fork_name_from_env().is_some_and(|f| f.gloas_enabled()) {
|
||||
return;
|
||||
}
|
||||
|
||||
let harness = BeaconChainHarness::builder(E::default())
|
||||
.default_spec()
|
||||
.deterministic_keypairs(64)
|
||||
.fresh_ephemeral_store()
|
||||
.mock_execution_layer()
|
||||
.build();
|
||||
|
||||
// Advance chain to have a valid head block.
|
||||
let target_slot = Slot::new(1);
|
||||
harness.extend_to_slot(target_slot).await;
|
||||
|
||||
let head = harness.chain.canonical_head.cached_head();
|
||||
let head_state = &head.snapshot.beacon_state;
|
||||
|
||||
// Get a PTC member for this slot.
|
||||
let ptc = head_state
|
||||
.get_ptc(target_slot, &harness.spec)
|
||||
.expect("should get PTC");
|
||||
let validator_index = *ptc.0.first().expect("PTC should have at least one member") as u64;
|
||||
|
||||
// Sign a payload attestation.
|
||||
let target_epoch = target_slot.epoch(E::slots_per_epoch());
|
||||
let domain = harness.spec.get_domain(
|
||||
target_epoch,
|
||||
Domain::PTCAttester,
|
||||
&head_state.fork(),
|
||||
head_state.genesis_validators_root(),
|
||||
);
|
||||
let data = PayloadAttestationData {
|
||||
beacon_block_root: head.head_block_root(),
|
||||
slot: target_slot,
|
||||
payload_present: true,
|
||||
blob_data_available: true,
|
||||
};
|
||||
let message = data.signing_root(domain);
|
||||
let signature = harness.validator_keypairs[validator_index as usize]
|
||||
.sk
|
||||
.sign(message);
|
||||
let msg = PayloadAttestationMessage {
|
||||
validator_index,
|
||||
data: data.clone(),
|
||||
signature: signature.clone(),
|
||||
};
|
||||
|
||||
// Subscribe before verification.
|
||||
let event_handler = harness.chain.event_handler.as_ref().unwrap();
|
||||
let mut receiver = event_handler.subscribe_payload_attestation_message();
|
||||
|
||||
// Verify the attestation through the gossip path.
|
||||
harness
|
||||
.chain
|
||||
.verify_payload_attestation_message_for_gossip(msg)
|
||||
.expect("verification should succeed");
|
||||
|
||||
// Assert the event was emitted.
|
||||
let event = receiver.try_recv().expect("should receive event");
|
||||
if let EventKind::PayloadAttestationMessage(versioned) = event {
|
||||
assert_eq!(versioned.data.validator_index, validator_index);
|
||||
assert_eq!(versioned.data.data, data);
|
||||
} else {
|
||||
panic!("Expected PayloadAttestationMessage event, got {:?}", event);
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user