mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-14 18:32:42 +00:00
Merge branch 'unstable' into electra-alpha7
This commit is contained in:
@@ -505,8 +505,8 @@ impl<E: EthSpec> Tester<E> {
|
||||
}
|
||||
Err(_) => GossipVerifiedBlob::__assumed_valid(blob_sidecar),
|
||||
};
|
||||
let result = self
|
||||
.block_on_dangerous(self.harness.chain.process_gossip_blob(blob, || Ok(())))?;
|
||||
let result =
|
||||
self.block_on_dangerous(self.harness.chain.process_gossip_blob(blob))?;
|
||||
if valid {
|
||||
assert!(result.is_ok());
|
||||
}
|
||||
|
||||
@@ -11,6 +11,7 @@ types = { workspace = true }
|
||||
tempfile = { workspace = true }
|
||||
eth2 = { workspace = true }
|
||||
validator_client = { workspace = true }
|
||||
beacon_node_fallback = { workspace = true }
|
||||
validator_dir = { workspace = true, features = ["insecure_keys"] }
|
||||
sensitive_url = { workspace = true }
|
||||
execution_layer = { workspace = true }
|
||||
|
||||
@@ -16,12 +16,13 @@ use validator_client::ProductionValidatorClient;
|
||||
use validator_dir::insecure_keys::build_deterministic_validator_dirs;
|
||||
|
||||
pub use beacon_node::{ClientConfig, ClientGenesis, ProductionClient};
|
||||
pub use beacon_node_fallback::ApiTopic;
|
||||
pub use environment;
|
||||
pub use eth2;
|
||||
pub use execution_layer::test_utils::{
|
||||
Config as MockServerConfig, MockExecutionConfig, MockServer,
|
||||
};
|
||||
pub use validator_client::{ApiTopic, Config as ValidatorConfig};
|
||||
pub use validator_client::Config as ValidatorConfig;
|
||||
|
||||
/// The global timeout for HTTP requests to the beacon node.
|
||||
const HTTP_TIMEOUT: Duration = Duration::from_secs(8);
|
||||
@@ -103,8 +104,6 @@ pub fn testing_client_config() -> ClientConfig {
|
||||
client_config.http_api.enabled = true;
|
||||
client_config.http_api.listen_port = 0;
|
||||
|
||||
client_config.dummy_eth1_backend = true;
|
||||
|
||||
let now = SystemTime::now()
|
||||
.duration_since(UNIX_EPOCH)
|
||||
.expect("should get system time")
|
||||
|
||||
@@ -175,7 +175,8 @@ pub fn run_basic_sim(matches: &ArgMatches) -> Result<(), String> {
|
||||
executor.spawn(
|
||||
async move {
|
||||
let mut validator_config = testing_validator_config();
|
||||
validator_config.fee_recipient = Some(SUGGESTED_FEE_RECIPIENT.into());
|
||||
validator_config.validator_store.fee_recipient =
|
||||
Some(SUGGESTED_FEE_RECIPIENT.into());
|
||||
println!("Adding validator client {}", i);
|
||||
|
||||
// Enable broadcast on every 4th node.
|
||||
|
||||
@@ -178,7 +178,8 @@ pub fn run_fallback_sim(matches: &ArgMatches) -> Result<(), String> {
|
||||
executor.spawn(
|
||||
async move {
|
||||
let mut validator_config = testing_validator_config();
|
||||
validator_config.fee_recipient = Some(SUGGESTED_FEE_RECIPIENT.into());
|
||||
validator_config.validator_store.fee_recipient =
|
||||
Some(SUGGESTED_FEE_RECIPIENT.into());
|
||||
println!("Adding validator client {}", i);
|
||||
network_1
|
||||
.add_validator_client_with_fallbacks(
|
||||
|
||||
@@ -15,7 +15,6 @@ tempfile = { workspace = true }
|
||||
tokio = { workspace = true }
|
||||
reqwest = { workspace = true }
|
||||
url = { workspace = true }
|
||||
validator_client = { workspace = true }
|
||||
slot_clock = { workspace = true }
|
||||
futures = { workspace = true }
|
||||
task_executor = { workspace = true }
|
||||
@@ -28,3 +27,6 @@ serde_json = { workspace = true }
|
||||
zip = { workspace = true }
|
||||
parking_lot = { workspace = true }
|
||||
logging = { workspace = true }
|
||||
initialized_validators = { workspace = true }
|
||||
slashing_protection = { workspace = true }
|
||||
validator_store = { workspace = true }
|
||||
|
||||
@@ -22,10 +22,14 @@ mod tests {
|
||||
};
|
||||
use eth2_keystore::KeystoreBuilder;
|
||||
use eth2_network_config::Eth2NetworkConfig;
|
||||
use initialized_validators::{
|
||||
load_pem_certificate, load_pkcs12_identity, InitializedValidators,
|
||||
};
|
||||
use logging::test_logger;
|
||||
use parking_lot::Mutex;
|
||||
use reqwest::Client;
|
||||
use serde::Serialize;
|
||||
use slashing_protection::{SlashingDatabase, SLASHING_PROTECTION_FILENAME};
|
||||
use slot_clock::{SlotClock, TestingSlotClock};
|
||||
use std::env;
|
||||
use std::fmt::Debug;
|
||||
@@ -41,13 +45,7 @@ mod tests {
|
||||
use tokio::time::sleep;
|
||||
use types::{attestation::AttestationBase, *};
|
||||
use url::Url;
|
||||
use validator_client::{
|
||||
initialized_validators::{
|
||||
load_pem_certificate, load_pkcs12_identity, InitializedValidators,
|
||||
},
|
||||
validator_store::{Error as ValidatorStoreError, ValidatorStore},
|
||||
SlashingDatabase, SLASHING_PROTECTION_FILENAME,
|
||||
};
|
||||
use validator_store::{Error as ValidatorStoreError, ValidatorStore};
|
||||
|
||||
/// If the we are unable to reach the Web3Signer HTTP API within this time out then we will
|
||||
/// assume it failed to start.
|
||||
@@ -322,7 +320,7 @@ mod tests {
|
||||
let log = test_logger();
|
||||
let validator_dir = TempDir::new().unwrap();
|
||||
|
||||
let config = validator_client::Config::default();
|
||||
let config = initialized_validators::Config::default();
|
||||
let validator_definitions = ValidatorDefinitions::from(validator_definitions);
|
||||
let initialized_validators = InitializedValidators::from_definitions(
|
||||
validator_definitions,
|
||||
@@ -354,7 +352,7 @@ mod tests {
|
||||
|
||||
let slot_clock =
|
||||
TestingSlotClock::new(Slot::new(0), Duration::from_secs(0), Duration::from_secs(1));
|
||||
let config = validator_client::Config {
|
||||
let config = validator_store::Config {
|
||||
enable_web3signer_slashing_protection: slashing_protection_config.local,
|
||||
..Default::default()
|
||||
};
|
||||
|
||||
Reference in New Issue
Block a user