mirror of
https://github.com/sigp/lighthouse.git
synced 2026-05-07 08:52:54 +00:00
Remove leftover files
This commit is contained in:
53
.github/workflows/test-suite.yml
vendored
53
.github/workflows/test-suite.yml
vendored
@@ -247,61 +247,8 @@ jobs:
|
|||||||
with:
|
with:
|
||||||
channel: stable
|
channel: stable
|
||||||
cache-target: release
|
cache-target: release
|
||||||
<<<<<<< HEAD
|
|
||||||
- name: Install Foundry (anvil)
|
|
||||||
uses: foundry-rs/foundry-toolchain@v1
|
|
||||||
with:
|
|
||||||
version: nightly-ca67d15f4abd46394b324c50e21e66f306a1162d
|
|
||||||
- name: Run the beacon chain sim and go through the merge transition
|
|
||||||
run: cargo run --release --bin simulator eth1-sim --post-merge
|
|
||||||
no-eth1-simulator-ubuntu:
|
|
||||||
name: no-eth1-simulator-ubuntu
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
- name: Run the beacon chain sim without an eth1 connection
|
|
||||||
run: cargo run --release --bin simulator no-eth1-sim
|
|
||||||
fallback-simulator-ubuntu:
|
|
||||||
name: fallback-simulator-ubuntu
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
needs: cargo-fmt
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v3
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
run: rustup update stable
|
|
||||||
- name: Install Protoc
|
|
||||||
uses: arduino/setup-protoc@e52d9eb8f7b63115df1ac544a1376fdbf5a39612
|
|
||||||
with:
|
|
||||||
repo-token: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
- name: Install Foundry (anvil)
|
|
||||||
uses: foundry-rs/foundry-toolchain@v1
|
|
||||||
- name: Run the fallback simulator
|
|
||||||
run: cargo run --release --bin simulator fallback-sim
|
|
||||||
syncing-simulator-ubuntu:
|
|
||||||
name: syncing-simulator-ubuntu
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
- name: Install Foundry (anvil)
|
|
||||||
uses: foundry-rs/foundry-toolchain@v1
|
|
||||||
with:
|
|
||||||
version: nightly-ca67d15f4abd46394b324c50e21e66f306a1162d
|
|
||||||
- name: Run the syncing simulator
|
|
||||||
run: cargo run --release --bin simulator syncing-sim
|
|
||||||
=======
|
|
||||||
- name: Run a beacon chain sim which tests VC fallback behaviour
|
- name: Run a beacon chain sim which tests VC fallback behaviour
|
||||||
run: cargo run --release --bin simulator fallback-sim
|
run: cargo run --release --bin simulator fallback-sim
|
||||||
>>>>>>> unstable
|
|
||||||
doppelganger-protection-test:
|
doppelganger-protection-test:
|
||||||
name: doppelganger-protection-test
|
name: doppelganger-protection-test
|
||||||
runs-on: ${{ github.repository == 'sigp/lighthouse' && fromJson('["self-hosted", "linux", "CI", "small"]') || 'ubuntu-latest' }}
|
runs-on: ${{ github.repository == 'sigp/lighthouse' && fromJson('["self-hosted", "linux", "CI", "small"]') || 'ubuntu-latest' }}
|
||||||
|
|||||||
475
.github/workflows/test-suite.yml.orig
vendored
475
.github/workflows/test-suite.yml.orig
vendored
@@ -1,475 +0,0 @@
|
|||||||
name: test-suite
|
|
||||||
|
|
||||||
on:
|
|
||||||
push:
|
|
||||||
branches:
|
|
||||||
- stable
|
|
||||||
- staging
|
|
||||||
- trying
|
|
||||||
- 'pr/*'
|
|
||||||
pull_request:
|
|
||||||
merge_group:
|
|
||||||
|
|
||||||
concurrency:
|
|
||||||
group: ${{ github.workflow }}-${{ github.ref }}
|
|
||||||
cancel-in-progress: true
|
|
||||||
|
|
||||||
env:
|
|
||||||
# Deny warnings in CI
|
|
||||||
# Disable debug info (see https://github.com/sigp/lighthouse/issues/4005)
|
|
||||||
RUSTFLAGS: "-D warnings -C debuginfo=0"
|
|
||||||
# Prevent Github API rate limiting.
|
|
||||||
LIGHTHOUSE_GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
# Enable self-hosted runners for the sigp repo only.
|
|
||||||
SELF_HOSTED_RUNNERS: ${{ github.repository == 'sigp/lighthouse' }}
|
|
||||||
# Self-hosted runners need to reference a different host for `./watch` tests.
|
|
||||||
WATCH_HOST: ${{ github.repository == 'sigp/lighthouse' && 'host.docker.internal' || 'localhost' }}
|
|
||||||
# Disable incremental compilation
|
|
||||||
CARGO_INCREMENTAL: 0
|
|
||||||
# Enable portable to prevent issues with caching `blst` for the wrong CPU type
|
|
||||||
TEST_FEATURES: portable
|
|
||||||
jobs:
|
|
||||||
target-branch-check:
|
|
||||||
name: target-branch-check
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
if: github.event_name == 'pull_request' || github.event_name == 'merge_group'
|
|
||||||
steps:
|
|
||||||
- name: Check that the pull request is not targeting the stable branch
|
|
||||||
run: test ${{ github.base_ref }} != "stable"
|
|
||||||
release-tests-ubuntu:
|
|
||||||
name: release-tests-ubuntu
|
|
||||||
# Use self-hosted runners only on the sigp repo.
|
|
||||||
runs-on: ${{ github.repository == 'sigp/lighthouse' && fromJson('["self-hosted", "linux", "CI", "large"]') || 'ubuntu-latest' }}
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'false'
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
bins: cargo-nextest
|
|
||||||
env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
- name: Install Foundry (anvil)
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'false'
|
|
||||||
uses: foundry-rs/foundry-toolchain@v1
|
|
||||||
with:
|
|
||||||
version: nightly-ca67d15f4abd46394b324c50e21e66f306a1162d
|
|
||||||
- name: Run tests in release
|
|
||||||
run: make nextest-release
|
|
||||||
- name: Show cache stats
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'true'
|
|
||||||
run: sccache --show-stats
|
|
||||||
release-tests-windows:
|
|
||||||
name: release-tests-windows
|
|
||||||
runs-on: ${{ github.repository == 'sigp/lighthouse' && fromJson('["self-hosted", "windows", "CI"]') || 'windows-2019' }}
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'false'
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
bins: cargo-nextest
|
|
||||||
env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
- name: Install Foundry (anvil)
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'false'
|
|
||||||
uses: foundry-rs/foundry-toolchain@v1
|
|
||||||
with:
|
|
||||||
version: nightly-ca67d15f4abd46394b324c50e21e66f306a1162d
|
|
||||||
- name: Install make
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'false'
|
|
||||||
run: choco install -y make
|
|
||||||
# - uses: KyleMayes/install-llvm-action@v1
|
|
||||||
# if: env.SELF_HOSTED_RUNNERS == 'false'
|
|
||||||
# with:
|
|
||||||
# version: "16.0"
|
|
||||||
# directory: ${{ runner.temp }}/llvm
|
|
||||||
- name: Set LIBCLANG_PATH
|
|
||||||
run: echo "LIBCLANG_PATH=$((gcm clang).source -replace "clang.exe")" >> $env:GITHUB_ENV
|
|
||||||
- name: Run tests in release
|
|
||||||
run: make nextest-release
|
|
||||||
- name: Show cache stats
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'true'
|
|
||||||
run: sccache --show-stats
|
|
||||||
beacon-chain-tests:
|
|
||||||
name: beacon-chain-tests
|
|
||||||
# Use self-hosted runners only on the sigp repo.
|
|
||||||
runs-on: ${{ github.repository == 'sigp/lighthouse' && fromJson('["self-hosted", "linux", "CI", "large"]') || 'ubuntu-latest' }}
|
|
||||||
env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'false'
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
bins: cargo-nextest
|
|
||||||
- name: Run beacon_chain tests for all known forks
|
|
||||||
run: make test-beacon-chain
|
|
||||||
- name: Show cache stats
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'true'
|
|
||||||
run: sccache --show-stats
|
|
||||||
op-pool-tests:
|
|
||||||
name: op-pool-tests
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
bins: cargo-nextest
|
|
||||||
- name: Run operation_pool tests for all known forks
|
|
||||||
run: make test-op-pool
|
|
||||||
network-tests:
|
|
||||||
name: network-tests
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
bins: cargo-nextest
|
|
||||||
- name: Run network tests for all known forks
|
|
||||||
run: make test-network
|
|
||||||
slasher-tests:
|
|
||||||
name: slasher-tests
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
bins: cargo-nextest
|
|
||||||
- name: Run slasher tests for all supported backends
|
|
||||||
run: make test-slasher
|
|
||||||
debug-tests-ubuntu:
|
|
||||||
name: debug-tests-ubuntu
|
|
||||||
# Use self-hosted runners only on the sigp repo.
|
|
||||||
runs-on: ${{ github.repository == 'sigp/lighthouse' && fromJson('["self-hosted", "linux", "CI", "large"]') || 'ubuntu-latest' }}
|
|
||||||
env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'false'
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
bins: cargo-nextest
|
|
||||||
- name: Install Foundry (anvil)
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'false'
|
|
||||||
uses: foundry-rs/foundry-toolchain@v1
|
|
||||||
with:
|
|
||||||
version: nightly-ca67d15f4abd46394b324c50e21e66f306a1162d
|
|
||||||
- name: Run tests in debug
|
|
||||||
run: make nextest-debug
|
|
||||||
- name: Show cache stats
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'true'
|
|
||||||
run: sccache --show-stats
|
|
||||||
state-transition-vectors-ubuntu:
|
|
||||||
name: state-transition-vectors-ubuntu
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
- name: Run state_transition_vectors in release.
|
|
||||||
run: make run-state-transition-tests
|
|
||||||
ef-tests-ubuntu:
|
|
||||||
name: ef-tests-ubuntu
|
|
||||||
# Use self-hosted runners only on the sigp repo.
|
|
||||||
runs-on: ${{ github.repository == 'sigp/lighthouse' && fromJson('["self-hosted", "linux", "CI", "small"]') || 'ubuntu-latest' }}
|
|
||||||
env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'false'
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
bins: cargo-nextest
|
|
||||||
- name: Run consensus-spec-tests with blst and fake_crypto
|
|
||||||
run: make nextest-ef
|
|
||||||
- name: Show cache stats
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'true'
|
|
||||||
run: sccache --show-stats
|
|
||||||
dockerfile-ubuntu:
|
|
||||||
name: dockerfile-ubuntu
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Build the root Dockerfile
|
|
||||||
run: docker build --build-arg FEATURES=portable -t lighthouse:local .
|
|
||||||
- name: Test the built image
|
|
||||||
run: docker run -t lighthouse:local lighthouse --version
|
|
||||||
basic-simulator-ubuntu:
|
|
||||||
name: basic-simulator-ubuntu
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
- name: Run a basic beacon chain sim that starts from Bellatrix
|
|
||||||
run: cargo run --release --bin simulator basic-sim
|
|
||||||
fallback-simulator-ubuntu:
|
|
||||||
name: fallback-simulator-ubuntu
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
<<<<<<< HEAD
|
|
||||||
- name: Install Foundry (anvil)
|
|
||||||
uses: foundry-rs/foundry-toolchain@v1
|
|
||||||
with:
|
|
||||||
version: nightly-ca67d15f4abd46394b324c50e21e66f306a1162d
|
|
||||||
- name: Run the beacon chain sim and go through the merge transition
|
|
||||||
run: cargo run --release --bin simulator eth1-sim --post-merge
|
|
||||||
no-eth1-simulator-ubuntu:
|
|
||||||
name: no-eth1-simulator-ubuntu
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
- name: Run the beacon chain sim without an eth1 connection
|
|
||||||
run: cargo run --release --bin simulator no-eth1-sim
|
|
||||||
fallback-simulator-ubuntu:
|
|
||||||
name: fallback-simulator-ubuntu
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
needs: cargo-fmt
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v3
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
run: rustup update stable
|
|
||||||
- name: Install Protoc
|
|
||||||
uses: arduino/setup-protoc@e52d9eb8f7b63115df1ac544a1376fdbf5a39612
|
|
||||||
with:
|
|
||||||
repo-token: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
- name: Install Foundry (anvil)
|
|
||||||
uses: foundry-rs/foundry-toolchain@v1
|
|
||||||
- name: Run the fallback simulator
|
|
||||||
run: cargo run --release --bin simulator fallback-sim
|
|
||||||
syncing-simulator-ubuntu:
|
|
||||||
name: syncing-simulator-ubuntu
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
- name: Install Foundry (anvil)
|
|
||||||
uses: foundry-rs/foundry-toolchain@v1
|
|
||||||
with:
|
|
||||||
version: nightly-ca67d15f4abd46394b324c50e21e66f306a1162d
|
|
||||||
- name: Run the syncing simulator
|
|
||||||
run: cargo run --release --bin simulator syncing-sim
|
|
||||||
=======
|
|
||||||
- name: Run a beacon chain sim which tests VC fallback behaviour
|
|
||||||
run: cargo run --release --bin simulator fallback-sim
|
|
||||||
>>>>>>> unstable
|
|
||||||
doppelganger-protection-test:
|
|
||||||
name: doppelganger-protection-test
|
|
||||||
runs-on: ${{ github.repository == 'sigp/lighthouse' && fromJson('["self-hosted", "linux", "CI", "small"]') || 'ubuntu-latest' }}
|
|
||||||
env:
|
|
||||||
# Enable portable to prevent issues with caching `blst` for the wrong CPU type
|
|
||||||
FEATURES: jemalloc,portable
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'false'
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
- name: Install geth
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'false'
|
|
||||||
run: |
|
|
||||||
sudo add-apt-repository -y ppa:ethereum/ethereum
|
|
||||||
sudo apt-get update
|
|
||||||
sudo apt-get install ethereum
|
|
||||||
- name: Install lighthouse
|
|
||||||
run: |
|
|
||||||
make
|
|
||||||
- name: Install lcli
|
|
||||||
# TODO: uncomment after the version of lcli in https://github.com/sigp/lighthouse/pull/5137
|
|
||||||
# is installed on the runners
|
|
||||||
# if: env.SELF_HOSTED_RUNNERS == 'false'
|
|
||||||
run: make install-lcli
|
|
||||||
- name: Run the doppelganger protection failure test script
|
|
||||||
run: |
|
|
||||||
cd scripts/tests
|
|
||||||
./doppelganger_protection.sh failure genesis.json
|
|
||||||
- name: Run the doppelganger protection success test script
|
|
||||||
run: |
|
|
||||||
cd scripts/tests
|
|
||||||
./doppelganger_protection.sh success genesis.json
|
|
||||||
execution-engine-integration-ubuntu:
|
|
||||||
name: execution-engine-integration-ubuntu
|
|
||||||
runs-on: ${{ github.repository == 'sigp/lighthouse' && fromJson('["self-hosted", "linux", "CI", "small"]') || 'ubuntu-latest' }}
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'false'
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
cache: false
|
|
||||||
env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
- name: Add go compiler to $PATH
|
|
||||||
if: env.SELF_HOSTED_RUNNERS == 'true'
|
|
||||||
run: echo "/usr/local/go/bin" >> $GITHUB_PATH
|
|
||||||
- name: Run exec engine integration tests in release
|
|
||||||
run: make test-exec-engine
|
|
||||||
check-code:
|
|
||||||
name: check-code
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
env:
|
|
||||||
CARGO_INCREMENTAL: 1
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
components: rustfmt,clippy
|
|
||||||
bins: cargo-audit
|
|
||||||
- name: Check formatting with cargo fmt
|
|
||||||
run: make cargo-fmt
|
|
||||||
- name: Lint code for quality and style with Clippy
|
|
||||||
run: make lint
|
|
||||||
- name: Certify Cargo.lock freshness
|
|
||||||
run: git diff --exit-code Cargo.lock
|
|
||||||
- name: Typecheck benchmark code without running it
|
|
||||||
run: make check-benches
|
|
||||||
- name: Validate state_processing feature arbitrary-fuzz
|
|
||||||
run: make arbitrary-fuzz
|
|
||||||
- name: Run cargo audit
|
|
||||||
run: make audit-CI
|
|
||||||
- name: Run cargo vendor to make sure dependencies can be vendored for packaging, reproducibility and archival purpose
|
|
||||||
run: CARGO_HOME=$(readlink -f $HOME) make vendor
|
|
||||||
check-msrv:
|
|
||||||
name: check-msrv
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Install Rust at Minimum Supported Rust Version (MSRV)
|
|
||||||
run: |
|
|
||||||
metadata=$(cargo metadata --no-deps --format-version 1)
|
|
||||||
msrv=$(echo $metadata | jq -r '.packages | map(select(.name == "lighthouse")) | .[0].rust_version')
|
|
||||||
rustup override set $msrv
|
|
||||||
- name: Run cargo check
|
|
||||||
run: cargo check --workspace
|
|
||||||
cargo-udeps:
|
|
||||||
name: cargo-udeps
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of nightly Rust
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: nightly
|
|
||||||
bins: cargo-udeps
|
|
||||||
cache: false
|
|
||||||
env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
- name: Create Cargo config dir
|
|
||||||
run: mkdir -p .cargo
|
|
||||||
- name: Install custom Cargo config
|
|
||||||
run: cp -f .github/custom/config.toml .cargo/config.toml
|
|
||||||
- name: Run cargo udeps to identify unused crates in the dependency graph
|
|
||||||
run: make udeps
|
|
||||||
env:
|
|
||||||
# Allow warnings on Nightly
|
|
||||||
RUSTFLAGS: ""
|
|
||||||
compile-with-beta-compiler:
|
|
||||||
name: compile-with-beta-compiler
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Install dependencies
|
|
||||||
run: sudo apt update && sudo apt install -y git gcc g++ make cmake pkg-config llvm-dev libclang-dev clang
|
|
||||||
- name: Use Rust beta
|
|
||||||
run: rustup override set beta
|
|
||||||
- name: Run make
|
|
||||||
run: make
|
|
||||||
cli-check:
|
|
||||||
name: cli-check
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Get latest version of stable Rust
|
|
||||||
uses: moonrepo/setup-rust@v1
|
|
||||||
with:
|
|
||||||
channel: stable
|
|
||||||
cache-target: release
|
|
||||||
- name: Run Makefile to trigger the bash script
|
|
||||||
run: make cli
|
|
||||||
# This job succeeds ONLY IF all others succeed. It is used by the merge queue to determine whether
|
|
||||||
# a PR is safe to merge. New jobs should be added here.
|
|
||||||
test-suite-success:
|
|
||||||
name: test-suite-success
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
needs: [
|
|
||||||
'target-branch-check',
|
|
||||||
'release-tests-ubuntu',
|
|
||||||
'release-tests-windows',
|
|
||||||
'beacon-chain-tests',
|
|
||||||
'op-pool-tests',
|
|
||||||
'network-tests',
|
|
||||||
'slasher-tests',
|
|
||||||
'debug-tests-ubuntu',
|
|
||||||
'state-transition-vectors-ubuntu',
|
|
||||||
'ef-tests-ubuntu',
|
|
||||||
'dockerfile-ubuntu',
|
|
||||||
'basic-simulator-ubuntu',
|
|
||||||
'fallback-simulator-ubuntu',
|
|
||||||
'doppelganger-protection-test',
|
|
||||||
'execution-engine-integration-ubuntu',
|
|
||||||
'check-code',
|
|
||||||
'check-msrv',
|
|
||||||
'cargo-udeps',
|
|
||||||
'compile-with-beta-compiler',
|
|
||||||
'cli-check',
|
|
||||||
]
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- name: Check that success job is dependent on all others
|
|
||||||
run: ./scripts/ci/check-success-job.sh ./.github/workflows/test-suite.yml test-suite-success
|
|
||||||
@@ -1,705 +0,0 @@
|
|||||||
use validator_client::{config::DEFAULT_WEB3SIGNER_KEEP_ALIVE, ApiTopic, BeaconNodeSyncDistanceTiers, Config};
|
|
||||||
|
|
||||||
use crate::exec::CommandLineTestExec;
|
|
||||||
use bls::{Keypair, PublicKeyBytes};
|
|
||||||
use std::fs::File;
|
|
||||||
use std::io::Write;
|
|
||||||
use std::net::IpAddr;
|
|
||||||
use std::path::PathBuf;
|
|
||||||
use std::process::Command;
|
|
||||||
use std::str::FromStr;
|
|
||||||
use std::string::ToString;
|
|
||||||
use std::time::Duration;
|
|
||||||
use tempfile::TempDir;
|
|
||||||
use types::{Address, Slot};
|
|
||||||
|
|
||||||
/// Returns the `lighthouse validator_client` command.
|
|
||||||
fn base_cmd() -> Command {
|
|
||||||
let lighthouse_bin = env!("CARGO_BIN_EXE_lighthouse");
|
|
||||||
let path = lighthouse_bin
|
|
||||||
.parse::<PathBuf>()
|
|
||||||
.expect("should parse CARGO_TARGET_DIR");
|
|
||||||
|
|
||||||
let mut cmd = Command::new(path);
|
|
||||||
cmd.arg("validator_client");
|
|
||||||
cmd
|
|
||||||
}
|
|
||||||
|
|
||||||
// Wrapper around `Command` for easier Command Line Testing.
|
|
||||||
struct CommandLineTest {
|
|
||||||
cmd: Command,
|
|
||||||
}
|
|
||||||
impl CommandLineTest {
|
|
||||||
fn new() -> CommandLineTest {
|
|
||||||
let base_cmd = base_cmd();
|
|
||||||
CommandLineTest { cmd: base_cmd }
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl CommandLineTestExec for CommandLineTest {
|
|
||||||
type Config = Config;
|
|
||||||
|
|
||||||
fn cmd_mut(&mut self) -> &mut Command {
|
|
||||||
&mut self.cmd
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn datadir_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config_and_dir(|config, dir| {
|
|
||||||
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
||||||
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validators_and_secrets_dir_flags() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validators-dir", dir.path().join("validators").to_str())
|
|
||||||
.flag("secrets-dir", dir.path().join("secrets").to_str())
|
|
||||||
.run_with_no_datadir()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
||||||
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validators_dir_alias_flags() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validator-dir", dir.path().join("validators").to_str())
|
|
||||||
.flag("secrets-dir", dir.path().join("secrets").to_str())
|
|
||||||
.run_with_no_datadir()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
||||||
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn beacon_nodes_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"beacon-nodes",
|
|
||||||
Some("http://localhost:1001,https://project:secret@infura.io/"),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_nodes[0].full.to_string(),
|
|
||||||
"http://localhost:1001/"
|
|
||||||
);
|
|
||||||
assert_eq!(config.beacon_nodes[0].to_string(), "http://localhost:1001/");
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_nodes[1].full.to_string(),
|
|
||||||
"https://project:secret@infura.io/"
|
|
||||||
);
|
|
||||||
assert_eq!(config.beacon_nodes[1].to_string(), "https://infura.io/");
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn disable_auto_discover_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-auto-discover", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.disable_auto_discover));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn init_slashing_protections_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("init-slashing-protection", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.init_slashing_protection));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn use_long_timeouts_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("use-long-timeouts", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.use_long_timeouts));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn beacon_nodes_tls_certs_flag() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"beacon-nodes-tls-certs",
|
|
||||||
Some(
|
|
||||||
vec![
|
|
||||||
dir.path().join("certificate.crt").to_str().unwrap(),
|
|
||||||
dir.path().join("certificate2.crt").to_str().unwrap(),
|
|
||||||
]
|
|
||||||
.join(",")
|
|
||||||
.as_str(),
|
|
||||||
),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_nodes_tls_certs,
|
|
||||||
Some(vec![
|
|
||||||
dir.path().join("certificate.crt"),
|
|
||||||
dir.path().join("certificate2.crt")
|
|
||||||
])
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for Graffiti flags.
|
|
||||||
#[test]
|
|
||||||
fn graffiti_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("graffiti", Some("nice-graffiti"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.graffiti.unwrap().to_string(),
|
|
||||||
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn graffiti_file_flag() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
let mut file = File::create(dir.path().join("graffiti.txt")).expect("Unable to create file");
|
|
||||||
let new_key = Keypair::random();
|
|
||||||
let pubkeybytes = PublicKeyBytes::from(new_key.pk);
|
|
||||||
let contents = "default:nice-graffiti";
|
|
||||||
file.write_all(contents.as_bytes())
|
|
||||||
.expect("Unable to write to file");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"graffiti-file",
|
|
||||||
dir.path().join("graffiti.txt").as_os_str().to_str(),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
// Public key not present so load default.
|
|
||||||
assert_eq!(
|
|
||||||
config
|
|
||||||
.graffiti_file
|
|
||||||
.clone()
|
|
||||||
.unwrap()
|
|
||||||
.load_graffiti(&pubkeybytes)
|
|
||||||
.unwrap()
|
|
||||||
.unwrap()
|
|
||||||
.to_string(),
|
|
||||||
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn graffiti_file_with_pk_flag() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
let mut file = File::create(dir.path().join("graffiti.txt")).expect("Unable to create file");
|
|
||||||
let new_key = Keypair::random();
|
|
||||||
let pubkeybytes = PublicKeyBytes::from(new_key.pk);
|
|
||||||
let contents = format!("{}:nice-graffiti", pubkeybytes.to_string());
|
|
||||||
file.write_all(contents.as_bytes())
|
|
||||||
.expect("Unable to write to file");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"graffiti-file",
|
|
||||||
dir.path().join("graffiti.txt").as_os_str().to_str(),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config
|
|
||||||
.graffiti_file
|
|
||||||
.clone()
|
|
||||||
.unwrap()
|
|
||||||
.load_graffiti(&pubkeybytes)
|
|
||||||
.unwrap()
|
|
||||||
.unwrap()
|
|
||||||
.to_string(),
|
|
||||||
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for suggested-fee-recipient flags.
|
|
||||||
#[test]
|
|
||||||
fn fee_recipient_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"suggested-fee-recipient",
|
|
||||||
Some("0x00000000219ab540356cbb839cbe05303d7705fa"),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.fee_recipient,
|
|
||||||
Some(Address::from_str("0x00000000219ab540356cbb839cbe05303d7705fa").unwrap())
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for HTTP flags.
|
|
||||||
#[test]
|
|
||||||
fn http_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_api.enabled));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_address_flag() {
|
|
||||||
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-address", Some("127.0.0.99"))
|
|
||||||
.flag("unencrypted-http-transport", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_address_ipv6_flag() {
|
|
||||||
let addr = "::1".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-address", Some("::1"))
|
|
||||||
.flag("unencrypted-http-transport", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
#[should_panic]
|
|
||||||
fn missing_unencrypted_http_transport_flag() {
|
|
||||||
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-address", Some("127.0.0.99"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_port_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-port", Some("9090"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_port, 9090));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_origin_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-allow-origin", Some("http://localhost:9009"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.http_api.allow_origin,
|
|
||||||
Some("http://localhost:9009".to_string())
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_origin_all_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-allow-origin", Some("*"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.allow_origin, Some("*".to_string())));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_keystore_export_default() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.http_api.allow_keystore_export));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_keystore_export_present() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-allow-keystore-export", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_api.allow_keystore_export));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_store_keystore_passwords_in_secrets_dir_default() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.http_api.store_passwords_in_secrets_dir));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_store_keystore_passwords_in_secrets_dir_present() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-store-passwords-in-secrets-dir", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_api.store_passwords_in_secrets_dir));
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for Metrics flags.
|
|
||||||
#[test]
|
|
||||||
fn metrics_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_metrics.enabled));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_address_flag() {
|
|
||||||
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-address", Some("127.0.0.99"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_address_ipv6_flag() {
|
|
||||||
let addr = "::1".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-address", Some("::1"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_port_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-port", Some("9090"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.listen_port, 9090));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_allow_origin_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-allow-origin", Some("http://localhost:9009"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.http_metrics.allow_origin,
|
|
||||||
Some("http://localhost:9009".to_string())
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_allow_origin_all_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-allow-origin", Some("*"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.allow_origin, Some("*".to_string())));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
pub fn malloc_tuning_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-malloc-tuning", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.allocator_metrics_enabled, false));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
pub fn malloc_tuning_default() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.allocator_metrics_enabled, true));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn doppelganger_protection_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("enable-doppelganger-protection", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.enable_doppelganger_protection));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_doppelganger_protection_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.enable_doppelganger_protection));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn produce_block_v3_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("produce-block-v3", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.produce_block_v3));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn no_produce_block_v3_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.produce_block_v3));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn no_gas_limit_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.gas_limit.is_none()));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn gas_limit_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("gas-limit", Some("600"))
|
|
||||||
.flag("builder-proposals", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.gas_limit, Some(600)));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("builder-proposals", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn builder_boost_factor_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("builder-boost-factor", Some("150"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.builder_boost_factor, Some(150)));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_builder_boost_factor_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.builder_boost_factor, None));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn prefer_builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("prefer-builder-proposals", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.prefer_builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_prefer_builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.prefer_builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_builder_registration_timestamp_override_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.builder_registration_timestamp_override.is_none()));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn builder_registration_timestamp_override_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("builder-registration-timestamp-override", Some("100"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.builder_registration_timestamp_override, Some(100))
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn monitoring_endpoint() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("monitoring-endpoint", Some("http://example:8000"))
|
|
||||||
.flag("monitoring-endpoint-period", Some("30"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
let api_conf = config.monitoring_api.as_ref().unwrap();
|
|
||||||
assert_eq!(api_conf.monitoring_endpoint.as_str(), "http://example:8000");
|
|
||||||
assert_eq!(api_conf.update_period_secs, Some(30));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn disable_run_on_all_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-run-on-all", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![]);
|
|
||||||
});
|
|
||||||
// --broadcast flag takes precedence
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-run-on-all", None)
|
|
||||||
.flag("broadcast", Some("attestations"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::Attestations]);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn no_broadcast_flag() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::Subscriptions]);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn broadcast_flag() {
|
|
||||||
// "none" variant
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("none"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![]);
|
|
||||||
});
|
|
||||||
// "none" with other values is ignored
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("none,sync-committee"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::SyncCommittee]);
|
|
||||||
});
|
|
||||||
// Other valid variants
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("blocks, subscriptions"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.broadcast_topics,
|
|
||||||
vec![ApiTopic::Blocks, ApiTopic::Subscriptions],
|
|
||||||
);
|
|
||||||
});
|
|
||||||
// Omitted "subscription" overrides default
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("attestations"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::Attestations]);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Tests for validator fallback flags.
|
|
||||||
#[test]
|
|
||||||
fn beacon_nodes_sync_tolerances_flag_default() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_node_fallback.sync_tolerances,
|
|
||||||
BeaconNodeSyncDistanceTiers::default()
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn beacon_nodes_sync_tolerances_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("beacon-nodes-sync-tolerances", Some("4,4,4"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_node_fallback.sync_tolerances,
|
|
||||||
BeaconNodeSyncDistanceTiers {
|
|
||||||
synced: Slot::new(4),
|
|
||||||
small: Slot::new(8),
|
|
||||||
medium: Slot::new(12),
|
|
||||||
}
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
#[should_panic(expected = "Unknown API topic")]
|
|
||||||
fn wrong_broadcast_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("foo, subscriptions"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.broadcast_topics,
|
|
||||||
vec![ApiTopic::Blocks, ApiTopic::Subscriptions],
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn latency_measurement_service() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert!(config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("latency-measurement-service", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("latency-measurement-service", Some("true"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("latency-measurement-service", Some("false"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(!config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_registration_batch_size() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert_eq!(config.validator_registration_batch_size, 500);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validator-registration-batch-size", Some("100"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.validator_registration_batch_size, 100);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
#[should_panic]
|
|
||||||
fn validator_registration_batch_size_zero_value() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validator-registration-batch-size", Some("0"))
|
|
||||||
.run();
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_disable_web3_signer_slashing_protection_default() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert!(config.enable_web3signer_slashing_protection);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_disable_web3_signer_slashing_protection() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-slashing-protection-web3signer", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(!config.enable_web3signer_slashing_protection);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_web3_signer_keep_alive_default() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.web3_signer_keep_alive_timeout,
|
|
||||||
DEFAULT_WEB3SIGNER_KEEP_ALIVE
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_web3_signer_keep_alive_override() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("web3-signer-keep-alive-timeout", Some("1000"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.web3_signer_keep_alive_timeout,
|
|
||||||
Some(Duration::from_secs(1))
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
@@ -1,655 +0,0 @@
|
|||||||
use validator_client::{ApiTopic, Config};
|
|
||||||
|
|
||||||
use crate::exec::CommandLineTestExec;
|
|
||||||
use bls::{Keypair, PublicKeyBytes};
|
|
||||||
use std::fs::File;
|
|
||||||
use std::io::Write;
|
|
||||||
use std::net::IpAddr;
|
|
||||||
use std::path::PathBuf;
|
|
||||||
use std::process::Command;
|
|
||||||
use std::str::FromStr;
|
|
||||||
use std::string::ToString;
|
|
||||||
use tempfile::TempDir;
|
|
||||||
use types::Address;
|
|
||||||
|
|
||||||
/// Returns the `lighthouse validator_client` command.
|
|
||||||
fn base_cmd() -> Command {
|
|
||||||
let lighthouse_bin = env!("CARGO_BIN_EXE_lighthouse");
|
|
||||||
let path = lighthouse_bin
|
|
||||||
.parse::<PathBuf>()
|
|
||||||
.expect("should parse CARGO_TARGET_DIR");
|
|
||||||
|
|
||||||
let mut cmd = Command::new(path);
|
|
||||||
cmd.arg("validator_client");
|
|
||||||
cmd
|
|
||||||
}
|
|
||||||
|
|
||||||
// Wrapper around `Command` for easier Command Line Testing.
|
|
||||||
struct CommandLineTest {
|
|
||||||
cmd: Command,
|
|
||||||
}
|
|
||||||
impl CommandLineTest {
|
|
||||||
fn new() -> CommandLineTest {
|
|
||||||
let base_cmd = base_cmd();
|
|
||||||
CommandLineTest { cmd: base_cmd }
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl CommandLineTestExec for CommandLineTest {
|
|
||||||
type Config = Config;
|
|
||||||
|
|
||||||
fn cmd_mut(&mut self) -> &mut Command {
|
|
||||||
&mut self.cmd
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn datadir_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config_and_dir(|config, dir| {
|
|
||||||
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
||||||
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validators_and_secrets_dir_flags() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validators-dir", dir.path().join("validators").to_str())
|
|
||||||
.flag("secrets-dir", dir.path().join("secrets").to_str())
|
|
||||||
.run_with_no_datadir()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
||||||
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validators_dir_alias_flags() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validator-dir", dir.path().join("validators").to_str())
|
|
||||||
.flag("secrets-dir", dir.path().join("secrets").to_str())
|
|
||||||
.run_with_no_datadir()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
||||||
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn beacon_nodes_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"beacon-nodes",
|
|
||||||
Some("http://localhost:1001,https://project:secret@infura.io/"),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_nodes[0].full.to_string(),
|
|
||||||
"http://localhost:1001/"
|
|
||||||
);
|
|
||||||
assert_eq!(config.beacon_nodes[0].to_string(), "http://localhost:1001/");
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_nodes[1].full.to_string(),
|
|
||||||
"https://project:secret@infura.io/"
|
|
||||||
);
|
|
||||||
assert_eq!(config.beacon_nodes[1].to_string(), "https://infura.io/");
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn disable_auto_discover_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-auto-discover", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.disable_auto_discover));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn init_slashing_protections_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("init-slashing-protection", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.init_slashing_protection));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn use_long_timeouts_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("use-long-timeouts", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.use_long_timeouts));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn beacon_nodes_tls_certs_flag() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"beacon-nodes-tls-certs",
|
|
||||||
Some(
|
|
||||||
vec![
|
|
||||||
dir.path().join("certificate.crt").to_str().unwrap(),
|
|
||||||
dir.path().join("certificate2.crt").to_str().unwrap(),
|
|
||||||
]
|
|
||||||
.join(",")
|
|
||||||
.as_str(),
|
|
||||||
),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_nodes_tls_certs,
|
|
||||||
Some(vec![
|
|
||||||
dir.path().join("certificate.crt"),
|
|
||||||
dir.path().join("certificate2.crt")
|
|
||||||
])
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for Graffiti flags.
|
|
||||||
#[test]
|
|
||||||
fn graffiti_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("graffiti", Some("nice-graffiti"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.graffiti.unwrap().to_string(),
|
|
||||||
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn graffiti_file_flag() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
let mut file = File::create(dir.path().join("graffiti.txt")).expect("Unable to create file");
|
|
||||||
let new_key = Keypair::random();
|
|
||||||
let pubkeybytes = PublicKeyBytes::from(new_key.pk);
|
|
||||||
let contents = "default:nice-graffiti";
|
|
||||||
file.write_all(contents.as_bytes())
|
|
||||||
.expect("Unable to write to file");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"graffiti-file",
|
|
||||||
dir.path().join("graffiti.txt").as_os_str().to_str(),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
// Public key not present so load default.
|
|
||||||
assert_eq!(
|
|
||||||
config
|
|
||||||
.graffiti_file
|
|
||||||
.clone()
|
|
||||||
.unwrap()
|
|
||||||
.load_graffiti(&pubkeybytes)
|
|
||||||
.unwrap()
|
|
||||||
.unwrap()
|
|
||||||
.to_string(),
|
|
||||||
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn graffiti_file_with_pk_flag() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
let mut file = File::create(dir.path().join("graffiti.txt")).expect("Unable to create file");
|
|
||||||
let new_key = Keypair::random();
|
|
||||||
let pubkeybytes = PublicKeyBytes::from(new_key.pk);
|
|
||||||
let contents = format!("{}:nice-graffiti", pubkeybytes.to_string());
|
|
||||||
file.write_all(contents.as_bytes())
|
|
||||||
.expect("Unable to write to file");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"graffiti-file",
|
|
||||||
dir.path().join("graffiti.txt").as_os_str().to_str(),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config
|
|
||||||
.graffiti_file
|
|
||||||
.clone()
|
|
||||||
.unwrap()
|
|
||||||
.load_graffiti(&pubkeybytes)
|
|
||||||
.unwrap()
|
|
||||||
.unwrap()
|
|
||||||
.to_string(),
|
|
||||||
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for suggested-fee-recipient flags.
|
|
||||||
#[test]
|
|
||||||
fn fee_recipient_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"suggested-fee-recipient",
|
|
||||||
Some("0x00000000219ab540356cbb839cbe05303d7705fa"),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.fee_recipient,
|
|
||||||
Some(Address::from_str("0x00000000219ab540356cbb839cbe05303d7705fa").unwrap())
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for HTTP flags.
|
|
||||||
#[test]
|
|
||||||
fn http_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_api.enabled));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_address_flag() {
|
|
||||||
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-address", Some("127.0.0.99"))
|
|
||||||
.flag("unencrypted-http-transport", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_address_ipv6_flag() {
|
|
||||||
let addr = "::1".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-address", Some("::1"))
|
|
||||||
.flag("unencrypted-http-transport", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
#[should_panic]
|
|
||||||
fn missing_unencrypted_http_transport_flag() {
|
|
||||||
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-address", Some("127.0.0.99"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_port_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-port", Some("9090"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_port, 9090));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_origin_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-allow-origin", Some("http://localhost:9009"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.http_api.allow_origin,
|
|
||||||
Some("http://localhost:9009".to_string())
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_origin_all_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-allow-origin", Some("*"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.allow_origin, Some("*".to_string())));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_keystore_export_default() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.http_api.allow_keystore_export));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_keystore_export_present() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-allow-keystore-export", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_api.allow_keystore_export));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_store_keystore_passwords_in_secrets_dir_default() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.http_api.store_passwords_in_secrets_dir));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_store_keystore_passwords_in_secrets_dir_present() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-store-passwords-in-secrets-dir", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_api.store_passwords_in_secrets_dir));
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for Metrics flags.
|
|
||||||
#[test]
|
|
||||||
fn metrics_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_metrics.enabled));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_address_flag() {
|
|
||||||
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-address", Some("127.0.0.99"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_address_ipv6_flag() {
|
|
||||||
let addr = "::1".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-address", Some("::1"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_port_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-port", Some("9090"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.listen_port, 9090));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_allow_origin_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-allow-origin", Some("http://localhost:9009"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.http_metrics.allow_origin,
|
|
||||||
Some("http://localhost:9009".to_string())
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_allow_origin_all_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-allow-origin", Some("*"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.allow_origin, Some("*".to_string())));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
pub fn malloc_tuning_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-malloc-tuning", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.allocator_metrics_enabled, false));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
pub fn malloc_tuning_default() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.allocator_metrics_enabled, true));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn doppelganger_protection_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("enable-doppelganger-protection", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.enable_doppelganger_protection));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_doppelganger_protection_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.enable_doppelganger_protection));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn produce_block_v3_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("produce-block-v3", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.produce_block_v3));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn no_produce_block_v3_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.produce_block_v3));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn no_gas_limit_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.gas_limit.is_none()));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn gas_limit_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("gas-limit", Some("600"))
|
|
||||||
.flag("builder-proposals", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.gas_limit, Some(600)));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("builder-proposals", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn builder_boost_factor_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("builder-boost-factor", Some("150"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.builder_boost_factor, Some(150)));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_builder_boost_factor_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.builder_boost_factor, None));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn prefer_builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("prefer-builder-proposals", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.prefer_builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_prefer_builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.prefer_builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_builder_registration_timestamp_override_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.builder_registration_timestamp_override.is_none()));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn builder_registration_timestamp_override_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("builder-registration-timestamp-override", Some("100"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.builder_registration_timestamp_override, Some(100))
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn monitoring_endpoint() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("monitoring-endpoint", Some("http://example:8000"))
|
|
||||||
.flag("monitoring-endpoint-period", Some("30"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
let api_conf = config.monitoring_api.as_ref().unwrap();
|
|
||||||
assert_eq!(api_conf.monitoring_endpoint.as_str(), "http://example:8000");
|
|
||||||
assert_eq!(api_conf.update_period_secs, Some(30));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn disable_run_on_all_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-run-on-all", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![]);
|
|
||||||
});
|
|
||||||
// --broadcast flag takes precedence
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-run-on-all", None)
|
|
||||||
.flag("broadcast", Some("attestations"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::Attestations]);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn no_broadcast_flag() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::Subscriptions]);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn broadcast_flag() {
|
|
||||||
// "none" variant
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("none"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![]);
|
|
||||||
});
|
|
||||||
// "none" with other values is ignored
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("none,sync-committee"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::SyncCommittee]);
|
|
||||||
});
|
|
||||||
// Other valid variants
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("blocks, subscriptions"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.broadcast_topics,
|
|
||||||
vec![ApiTopic::Blocks, ApiTopic::Subscriptions],
|
|
||||||
);
|
|
||||||
});
|
|
||||||
// Omitted "subscription" overrides default
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("attestations"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::Attestations]);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
#[should_panic(expected = "Unknown API topic")]
|
|
||||||
fn wrong_broadcast_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("foo, subscriptions"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.broadcast_topics,
|
|
||||||
vec![ApiTopic::Blocks, ApiTopic::Subscriptions],
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn latency_measurement_service() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert!(config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("latency-measurement-service", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("latency-measurement-service", Some("true"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("latency-measurement-service", Some("false"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(!config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_registration_batch_size() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert_eq!(config.validator_registration_batch_size, 500);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validator-registration-batch-size", Some("100"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.validator_registration_batch_size, 100);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
#[should_panic]
|
|
||||||
fn validator_registration_batch_size_zero_value() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validator-registration-batch-size", Some("0"))
|
|
||||||
.run();
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_disable_web3_signer_slashing_protection_default() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert!(config.enable_web3signer_slashing_protection);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_disable_web3_signer_slashing_protection() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-slashing-protection-web3signer", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(!config.enable_web3signer_slashing_protection);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
@@ -1,681 +0,0 @@
|
|||||||
use validator_client::{ApiTopic, BeaconNodeSyncDistanceTiers, Config};
|
|
||||||
|
|
||||||
use crate::exec::CommandLineTestExec;
|
|
||||||
use bls::{Keypair, PublicKeyBytes};
|
|
||||||
use std::fs::File;
|
|
||||||
use std::io::Write;
|
|
||||||
use std::net::IpAddr;
|
|
||||||
use std::path::PathBuf;
|
|
||||||
use std::process::Command;
|
|
||||||
use std::str::FromStr;
|
|
||||||
use std::string::ToString;
|
|
||||||
use tempfile::TempDir;
|
|
||||||
use types::{Address, Slot};
|
|
||||||
|
|
||||||
/// Returns the `lighthouse validator_client` command.
|
|
||||||
fn base_cmd() -> Command {
|
|
||||||
let lighthouse_bin = env!("CARGO_BIN_EXE_lighthouse");
|
|
||||||
let path = lighthouse_bin
|
|
||||||
.parse::<PathBuf>()
|
|
||||||
.expect("should parse CARGO_TARGET_DIR");
|
|
||||||
|
|
||||||
let mut cmd = Command::new(path);
|
|
||||||
cmd.arg("validator_client");
|
|
||||||
cmd
|
|
||||||
}
|
|
||||||
|
|
||||||
// Wrapper around `Command` for easier Command Line Testing.
|
|
||||||
struct CommandLineTest {
|
|
||||||
cmd: Command,
|
|
||||||
}
|
|
||||||
impl CommandLineTest {
|
|
||||||
fn new() -> CommandLineTest {
|
|
||||||
let base_cmd = base_cmd();
|
|
||||||
CommandLineTest { cmd: base_cmd }
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl CommandLineTestExec for CommandLineTest {
|
|
||||||
type Config = Config;
|
|
||||||
|
|
||||||
fn cmd_mut(&mut self) -> &mut Command {
|
|
||||||
&mut self.cmd
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn datadir_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config_and_dir(|config, dir| {
|
|
||||||
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
||||||
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validators_and_secrets_dir_flags() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validators-dir", dir.path().join("validators").to_str())
|
|
||||||
.flag("secrets-dir", dir.path().join("secrets").to_str())
|
|
||||||
.run_with_no_datadir()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
||||||
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validators_dir_alias_flags() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validator-dir", dir.path().join("validators").to_str())
|
|
||||||
.flag("secrets-dir", dir.path().join("secrets").to_str())
|
|
||||||
.run_with_no_datadir()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
||||||
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn beacon_nodes_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"beacon-nodes",
|
|
||||||
Some("http://localhost:1001,https://project:secret@infura.io/"),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_nodes[0].full.to_string(),
|
|
||||||
"http://localhost:1001/"
|
|
||||||
);
|
|
||||||
assert_eq!(config.beacon_nodes[0].to_string(), "http://localhost:1001/");
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_nodes[1].full.to_string(),
|
|
||||||
"https://project:secret@infura.io/"
|
|
||||||
);
|
|
||||||
assert_eq!(config.beacon_nodes[1].to_string(), "https://infura.io/");
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn disable_auto_discover_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-auto-discover", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.disable_auto_discover));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn init_slashing_protections_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("init-slashing-protection", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.init_slashing_protection));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn use_long_timeouts_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("use-long-timeouts", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.use_long_timeouts));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn beacon_nodes_tls_certs_flag() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"beacon-nodes-tls-certs",
|
|
||||||
Some(
|
|
||||||
vec![
|
|
||||||
dir.path().join("certificate.crt").to_str().unwrap(),
|
|
||||||
dir.path().join("certificate2.crt").to_str().unwrap(),
|
|
||||||
]
|
|
||||||
.join(",")
|
|
||||||
.as_str(),
|
|
||||||
),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_nodes_tls_certs,
|
|
||||||
Some(vec![
|
|
||||||
dir.path().join("certificate.crt"),
|
|
||||||
dir.path().join("certificate2.crt")
|
|
||||||
])
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for Graffiti flags.
|
|
||||||
#[test]
|
|
||||||
fn graffiti_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("graffiti", Some("nice-graffiti"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.graffiti.unwrap().to_string(),
|
|
||||||
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn graffiti_file_flag() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
let mut file = File::create(dir.path().join("graffiti.txt")).expect("Unable to create file");
|
|
||||||
let new_key = Keypair::random();
|
|
||||||
let pubkeybytes = PublicKeyBytes::from(new_key.pk);
|
|
||||||
let contents = "default:nice-graffiti";
|
|
||||||
file.write_all(contents.as_bytes())
|
|
||||||
.expect("Unable to write to file");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"graffiti-file",
|
|
||||||
dir.path().join("graffiti.txt").as_os_str().to_str(),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
// Public key not present so load default.
|
|
||||||
assert_eq!(
|
|
||||||
config
|
|
||||||
.graffiti_file
|
|
||||||
.clone()
|
|
||||||
.unwrap()
|
|
||||||
.load_graffiti(&pubkeybytes)
|
|
||||||
.unwrap()
|
|
||||||
.unwrap()
|
|
||||||
.to_string(),
|
|
||||||
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn graffiti_file_with_pk_flag() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
let mut file = File::create(dir.path().join("graffiti.txt")).expect("Unable to create file");
|
|
||||||
let new_key = Keypair::random();
|
|
||||||
let pubkeybytes = PublicKeyBytes::from(new_key.pk);
|
|
||||||
let contents = format!("{}:nice-graffiti", pubkeybytes.to_string());
|
|
||||||
file.write_all(contents.as_bytes())
|
|
||||||
.expect("Unable to write to file");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"graffiti-file",
|
|
||||||
dir.path().join("graffiti.txt").as_os_str().to_str(),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config
|
|
||||||
.graffiti_file
|
|
||||||
.clone()
|
|
||||||
.unwrap()
|
|
||||||
.load_graffiti(&pubkeybytes)
|
|
||||||
.unwrap()
|
|
||||||
.unwrap()
|
|
||||||
.to_string(),
|
|
||||||
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for suggested-fee-recipient flags.
|
|
||||||
#[test]
|
|
||||||
fn fee_recipient_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"suggested-fee-recipient",
|
|
||||||
Some("0x00000000219ab540356cbb839cbe05303d7705fa"),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.fee_recipient,
|
|
||||||
Some(Address::from_str("0x00000000219ab540356cbb839cbe05303d7705fa").unwrap())
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for HTTP flags.
|
|
||||||
#[test]
|
|
||||||
fn http_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_api.enabled));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_address_flag() {
|
|
||||||
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-address", Some("127.0.0.99"))
|
|
||||||
.flag("unencrypted-http-transport", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_address_ipv6_flag() {
|
|
||||||
let addr = "::1".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-address", Some("::1"))
|
|
||||||
.flag("unencrypted-http-transport", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
#[should_panic]
|
|
||||||
fn missing_unencrypted_http_transport_flag() {
|
|
||||||
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-address", Some("127.0.0.99"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_port_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-port", Some("9090"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_port, 9090));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_origin_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-allow-origin", Some("http://localhost:9009"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.http_api.allow_origin,
|
|
||||||
Some("http://localhost:9009".to_string())
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_origin_all_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-allow-origin", Some("*"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.allow_origin, Some("*".to_string())));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_keystore_export_default() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.http_api.allow_keystore_export));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_keystore_export_present() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-allow-keystore-export", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_api.allow_keystore_export));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_store_keystore_passwords_in_secrets_dir_default() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.http_api.store_passwords_in_secrets_dir));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_store_keystore_passwords_in_secrets_dir_present() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-store-passwords-in-secrets-dir", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_api.store_passwords_in_secrets_dir));
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for Metrics flags.
|
|
||||||
#[test]
|
|
||||||
fn metrics_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_metrics.enabled));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_address_flag() {
|
|
||||||
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-address", Some("127.0.0.99"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_address_ipv6_flag() {
|
|
||||||
let addr = "::1".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-address", Some("::1"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_port_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-port", Some("9090"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.listen_port, 9090));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_allow_origin_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-allow-origin", Some("http://localhost:9009"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.http_metrics.allow_origin,
|
|
||||||
Some("http://localhost:9009".to_string())
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_allow_origin_all_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-allow-origin", Some("*"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.allow_origin, Some("*".to_string())));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
pub fn malloc_tuning_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-malloc-tuning", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.allocator_metrics_enabled, false));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
pub fn malloc_tuning_default() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.allocator_metrics_enabled, true));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn doppelganger_protection_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("enable-doppelganger-protection", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.enable_doppelganger_protection));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_doppelganger_protection_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.enable_doppelganger_protection));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn produce_block_v3_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("produce-block-v3", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.produce_block_v3));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn no_produce_block_v3_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.produce_block_v3));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn no_gas_limit_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.gas_limit.is_none()));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn gas_limit_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("gas-limit", Some("600"))
|
|
||||||
.flag("builder-proposals", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.gas_limit, Some(600)));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("builder-proposals", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn builder_boost_factor_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("builder-boost-factor", Some("150"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.builder_boost_factor, Some(150)));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_builder_boost_factor_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.builder_boost_factor, None));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn prefer_builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("prefer-builder-proposals", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.prefer_builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_prefer_builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.prefer_builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_builder_registration_timestamp_override_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.builder_registration_timestamp_override.is_none()));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn builder_registration_timestamp_override_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("builder-registration-timestamp-override", Some("100"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.builder_registration_timestamp_override, Some(100))
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn monitoring_endpoint() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("monitoring-endpoint", Some("http://example:8000"))
|
|
||||||
.flag("monitoring-endpoint-period", Some("30"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
let api_conf = config.monitoring_api.as_ref().unwrap();
|
|
||||||
assert_eq!(api_conf.monitoring_endpoint.as_str(), "http://example:8000");
|
|
||||||
assert_eq!(api_conf.update_period_secs, Some(30));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn disable_run_on_all_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-run-on-all", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![]);
|
|
||||||
});
|
|
||||||
// --broadcast flag takes precedence
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-run-on-all", None)
|
|
||||||
.flag("broadcast", Some("attestations"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::Attestations]);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn no_broadcast_flag() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::Subscriptions]);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn broadcast_flag() {
|
|
||||||
// "none" variant
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("none"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![]);
|
|
||||||
});
|
|
||||||
// "none" with other values is ignored
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("none,sync-committee"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::SyncCommittee]);
|
|
||||||
});
|
|
||||||
// Other valid variants
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("blocks, subscriptions"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.broadcast_topics,
|
|
||||||
vec![ApiTopic::Blocks, ApiTopic::Subscriptions],
|
|
||||||
);
|
|
||||||
});
|
|
||||||
// Omitted "subscription" overrides default
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("attestations"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::Attestations]);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Tests for validator fallback flags.
|
|
||||||
#[test]
|
|
||||||
fn beacon_nodes_sync_tolerances_flag_default() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_node_fallback.sync_tolerances,
|
|
||||||
BeaconNodeSyncDistanceTiers::default()
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn beacon_nodes_sync_tolerances_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("beacon-nodes-sync-tolerances", Some("4,4,4"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_node_fallback.sync_tolerances,
|
|
||||||
BeaconNodeSyncDistanceTiers {
|
|
||||||
synced: Slot::new(4),
|
|
||||||
small: Slot::new(8),
|
|
||||||
medium: Slot::new(12),
|
|
||||||
}
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
#[should_panic(expected = "Unknown API topic")]
|
|
||||||
fn wrong_broadcast_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("foo, subscriptions"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.broadcast_topics,
|
|
||||||
vec![ApiTopic::Blocks, ApiTopic::Subscriptions],
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn latency_measurement_service() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert!(config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("latency-measurement-service", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("latency-measurement-service", Some("true"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("latency-measurement-service", Some("false"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(!config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_registration_batch_size() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert_eq!(config.validator_registration_batch_size, 500);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validator-registration-batch-size", Some("100"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.validator_registration_batch_size, 100);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
#[should_panic]
|
|
||||||
fn validator_registration_batch_size_zero_value() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validator-registration-batch-size", Some("0"))
|
|
||||||
.run();
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_disable_web3_signer_slashing_protection_default() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert!(config.enable_web3signer_slashing_protection);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_disable_web3_signer_slashing_protection() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-slashing-protection-web3signer", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(!config.enable_web3signer_slashing_protection);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
@@ -1,679 +0,0 @@
|
|||||||
use validator_client::{config::DEFAULT_WEB3SIGNER_KEEP_ALIVE, ApiTopic, Config};
|
|
||||||
|
|
||||||
use crate::exec::CommandLineTestExec;
|
|
||||||
use bls::{Keypair, PublicKeyBytes};
|
|
||||||
use std::fs::File;
|
|
||||||
use std::io::Write;
|
|
||||||
use std::net::IpAddr;
|
|
||||||
use std::path::PathBuf;
|
|
||||||
use std::process::Command;
|
|
||||||
use std::str::FromStr;
|
|
||||||
use std::string::ToString;
|
|
||||||
use std::time::Duration;
|
|
||||||
use tempfile::TempDir;
|
|
||||||
use types::Address;
|
|
||||||
|
|
||||||
/// Returns the `lighthouse validator_client` command.
|
|
||||||
fn base_cmd() -> Command {
|
|
||||||
let lighthouse_bin = env!("CARGO_BIN_EXE_lighthouse");
|
|
||||||
let path = lighthouse_bin
|
|
||||||
.parse::<PathBuf>()
|
|
||||||
.expect("should parse CARGO_TARGET_DIR");
|
|
||||||
|
|
||||||
let mut cmd = Command::new(path);
|
|
||||||
cmd.arg("validator_client");
|
|
||||||
cmd
|
|
||||||
}
|
|
||||||
|
|
||||||
// Wrapper around `Command` for easier Command Line Testing.
|
|
||||||
struct CommandLineTest {
|
|
||||||
cmd: Command,
|
|
||||||
}
|
|
||||||
impl CommandLineTest {
|
|
||||||
fn new() -> CommandLineTest {
|
|
||||||
let base_cmd = base_cmd();
|
|
||||||
CommandLineTest { cmd: base_cmd }
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl CommandLineTestExec for CommandLineTest {
|
|
||||||
type Config = Config;
|
|
||||||
|
|
||||||
fn cmd_mut(&mut self) -> &mut Command {
|
|
||||||
&mut self.cmd
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn datadir_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config_and_dir(|config, dir| {
|
|
||||||
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
||||||
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validators_and_secrets_dir_flags() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validators-dir", dir.path().join("validators").to_str())
|
|
||||||
.flag("secrets-dir", dir.path().join("secrets").to_str())
|
|
||||||
.run_with_no_datadir()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
||||||
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validators_dir_alias_flags() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validator-dir", dir.path().join("validators").to_str())
|
|
||||||
.flag("secrets-dir", dir.path().join("secrets").to_str())
|
|
||||||
.run_with_no_datadir()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.validator_dir, dir.path().join("validators"));
|
|
||||||
assert_eq!(config.secrets_dir, dir.path().join("secrets"));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn beacon_nodes_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"beacon-nodes",
|
|
||||||
Some("http://localhost:1001,https://project:secret@infura.io/"),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_nodes[0].full.to_string(),
|
|
||||||
"http://localhost:1001/"
|
|
||||||
);
|
|
||||||
assert_eq!(config.beacon_nodes[0].to_string(), "http://localhost:1001/");
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_nodes[1].full.to_string(),
|
|
||||||
"https://project:secret@infura.io/"
|
|
||||||
);
|
|
||||||
assert_eq!(config.beacon_nodes[1].to_string(), "https://infura.io/");
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn disable_auto_discover_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-auto-discover", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.disable_auto_discover));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn init_slashing_protections_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("init-slashing-protection", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.init_slashing_protection));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn use_long_timeouts_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("use-long-timeouts", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.use_long_timeouts));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn beacon_nodes_tls_certs_flag() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"beacon-nodes-tls-certs",
|
|
||||||
Some(
|
|
||||||
vec![
|
|
||||||
dir.path().join("certificate.crt").to_str().unwrap(),
|
|
||||||
dir.path().join("certificate2.crt").to_str().unwrap(),
|
|
||||||
]
|
|
||||||
.join(",")
|
|
||||||
.as_str(),
|
|
||||||
),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.beacon_nodes_tls_certs,
|
|
||||||
Some(vec![
|
|
||||||
dir.path().join("certificate.crt"),
|
|
||||||
dir.path().join("certificate2.crt")
|
|
||||||
])
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for Graffiti flags.
|
|
||||||
#[test]
|
|
||||||
fn graffiti_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("graffiti", Some("nice-graffiti"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.graffiti.unwrap().to_string(),
|
|
||||||
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn graffiti_file_flag() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
let mut file = File::create(dir.path().join("graffiti.txt")).expect("Unable to create file");
|
|
||||||
let new_key = Keypair::random();
|
|
||||||
let pubkeybytes = PublicKeyBytes::from(new_key.pk);
|
|
||||||
let contents = "default:nice-graffiti";
|
|
||||||
file.write_all(contents.as_bytes())
|
|
||||||
.expect("Unable to write to file");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"graffiti-file",
|
|
||||||
dir.path().join("graffiti.txt").as_os_str().to_str(),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
// Public key not present so load default.
|
|
||||||
assert_eq!(
|
|
||||||
config
|
|
||||||
.graffiti_file
|
|
||||||
.clone()
|
|
||||||
.unwrap()
|
|
||||||
.load_graffiti(&pubkeybytes)
|
|
||||||
.unwrap()
|
|
||||||
.unwrap()
|
|
||||||
.to_string(),
|
|
||||||
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn graffiti_file_with_pk_flag() {
|
|
||||||
let dir = TempDir::new().expect("Unable to create temporary directory");
|
|
||||||
let mut file = File::create(dir.path().join("graffiti.txt")).expect("Unable to create file");
|
|
||||||
let new_key = Keypair::random();
|
|
||||||
let pubkeybytes = PublicKeyBytes::from(new_key.pk);
|
|
||||||
let contents = format!("{}:nice-graffiti", pubkeybytes.to_string());
|
|
||||||
file.write_all(contents.as_bytes())
|
|
||||||
.expect("Unable to write to file");
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"graffiti-file",
|
|
||||||
dir.path().join("graffiti.txt").as_os_str().to_str(),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config
|
|
||||||
.graffiti_file
|
|
||||||
.clone()
|
|
||||||
.unwrap()
|
|
||||||
.load_graffiti(&pubkeybytes)
|
|
||||||
.unwrap()
|
|
||||||
.unwrap()
|
|
||||||
.to_string(),
|
|
||||||
"0x6e6963652d677261666669746900000000000000000000000000000000000000"
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for suggested-fee-recipient flags.
|
|
||||||
#[test]
|
|
||||||
fn fee_recipient_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag(
|
|
||||||
"suggested-fee-recipient",
|
|
||||||
Some("0x00000000219ab540356cbb839cbe05303d7705fa"),
|
|
||||||
)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.fee_recipient,
|
|
||||||
Some(Address::from_str("0x00000000219ab540356cbb839cbe05303d7705fa").unwrap())
|
|
||||||
)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for HTTP flags.
|
|
||||||
#[test]
|
|
||||||
fn http_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_api.enabled));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_address_flag() {
|
|
||||||
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-address", Some("127.0.0.99"))
|
|
||||||
.flag("unencrypted-http-transport", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_address_ipv6_flag() {
|
|
||||||
let addr = "::1".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-address", Some("::1"))
|
|
||||||
.flag("unencrypted-http-transport", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
#[should_panic]
|
|
||||||
fn missing_unencrypted_http_transport_flag() {
|
|
||||||
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-address", Some("127.0.0.99"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_port_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-port", Some("9090"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.listen_port, 9090));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_origin_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-allow-origin", Some("http://localhost:9009"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.http_api.allow_origin,
|
|
||||||
Some("http://localhost:9009".to_string())
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_origin_all_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-allow-origin", Some("*"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_api.allow_origin, Some("*".to_string())));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_keystore_export_default() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.http_api.allow_keystore_export));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_allow_keystore_export_present() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-allow-keystore-export", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_api.allow_keystore_export));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_store_keystore_passwords_in_secrets_dir_default() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.http_api.store_passwords_in_secrets_dir));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn http_store_keystore_passwords_in_secrets_dir_present() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("http", None)
|
|
||||||
.flag("http-store-passwords-in-secrets-dir", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_api.store_passwords_in_secrets_dir));
|
|
||||||
}
|
|
||||||
|
|
||||||
// Tests for Metrics flags.
|
|
||||||
#[test]
|
|
||||||
fn metrics_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.http_metrics.enabled));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_address_flag() {
|
|
||||||
let addr = "127.0.0.99".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-address", Some("127.0.0.99"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_address_ipv6_flag() {
|
|
||||||
let addr = "::1".parse::<IpAddr>().unwrap();
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-address", Some("::1"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.listen_addr, addr));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_port_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-port", Some("9090"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.listen_port, 9090));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_allow_origin_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-allow-origin", Some("http://localhost:9009"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.http_metrics.allow_origin,
|
|
||||||
Some("http://localhost:9009".to_string())
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn metrics_allow_origin_all_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("metrics", None)
|
|
||||||
.flag("metrics-allow-origin", Some("*"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.allow_origin, Some("*".to_string())));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
pub fn malloc_tuning_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-malloc-tuning", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.allocator_metrics_enabled, false));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
pub fn malloc_tuning_default() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.http_metrics.allocator_metrics_enabled, true));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn doppelganger_protection_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("enable-doppelganger-protection", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.enable_doppelganger_protection));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_doppelganger_protection_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.enable_doppelganger_protection));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn produce_block_v3_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("produce-block-v3", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.produce_block_v3));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn no_produce_block_v3_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.produce_block_v3));
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn no_gas_limit_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.gas_limit.is_none()));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn gas_limit_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("gas-limit", Some("600"))
|
|
||||||
.flag("builder-proposals", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.gas_limit, Some(600)));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("builder-proposals", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn builder_boost_factor_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("builder-boost-factor", Some("150"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.builder_boost_factor, Some(150)));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_builder_boost_factor_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert_eq!(config.builder_boost_factor, None));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn prefer_builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("prefer-builder-proposals", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.prefer_builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_prefer_builder_proposals_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(!config.prefer_builder_proposals));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn no_builder_registration_timestamp_override_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.run()
|
|
||||||
.with_config(|config| assert!(config.builder_registration_timestamp_override.is_none()));
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn builder_registration_timestamp_override_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("builder-registration-timestamp-override", Some("100"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.builder_registration_timestamp_override, Some(100))
|
|
||||||
});
|
|
||||||
}
|
|
||||||
#[test]
|
|
||||||
fn monitoring_endpoint() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("monitoring-endpoint", Some("http://example:8000"))
|
|
||||||
.flag("monitoring-endpoint-period", Some("30"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
let api_conf = config.monitoring_api.as_ref().unwrap();
|
|
||||||
assert_eq!(api_conf.monitoring_endpoint.as_str(), "http://example:8000");
|
|
||||||
assert_eq!(api_conf.update_period_secs, Some(30));
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn disable_run_on_all_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-run-on-all", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![]);
|
|
||||||
});
|
|
||||||
// --broadcast flag takes precedence
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-run-on-all", None)
|
|
||||||
.flag("broadcast", Some("attestations"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::Attestations]);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn no_broadcast_flag() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::Subscriptions]);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn broadcast_flag() {
|
|
||||||
// "none" variant
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("none"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![]);
|
|
||||||
});
|
|
||||||
// "none" with other values is ignored
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("none,sync-committee"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::SyncCommittee]);
|
|
||||||
});
|
|
||||||
// Other valid variants
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("blocks, subscriptions"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.broadcast_topics,
|
|
||||||
vec![ApiTopic::Blocks, ApiTopic::Subscriptions],
|
|
||||||
);
|
|
||||||
});
|
|
||||||
// Omitted "subscription" overrides default
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("attestations"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.broadcast_topics, vec![ApiTopic::Attestations]);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
#[should_panic(expected = "Unknown API topic")]
|
|
||||||
fn wrong_broadcast_flag() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("broadcast", Some("foo, subscriptions"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.broadcast_topics,
|
|
||||||
vec![ApiTopic::Blocks, ApiTopic::Subscriptions],
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn latency_measurement_service() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert!(config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("latency-measurement-service", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("latency-measurement-service", Some("true"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("latency-measurement-service", Some("false"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(!config.enable_latency_measurement_service);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_registration_batch_size() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert_eq!(config.validator_registration_batch_size, 500);
|
|
||||||
});
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validator-registration-batch-size", Some("100"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(config.validator_registration_batch_size, 100);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
#[should_panic]
|
|
||||||
fn validator_registration_batch_size_zero_value() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("validator-registration-batch-size", Some("0"))
|
|
||||||
.run();
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_disable_web3_signer_slashing_protection_default() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert!(config.enable_web3signer_slashing_protection);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_disable_web3_signer_slashing_protection() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("disable-slashing-protection-web3signer", None)
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert!(!config.enable_web3signer_slashing_protection);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_web3_signer_keep_alive_default() {
|
|
||||||
CommandLineTest::new().run().with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.web3_signer_keep_alive_timeout,
|
|
||||||
DEFAULT_WEB3SIGNER_KEEP_ALIVE
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn validator_web3_signer_keep_alive_override() {
|
|
||||||
CommandLineTest::new()
|
|
||||||
.flag("web3-signer-keep-alive-timeout", Some("1000"))
|
|
||||||
.run()
|
|
||||||
.with_config(|config| {
|
|
||||||
assert_eq!(
|
|
||||||
config.web3_signer_keep_alive_timeout,
|
|
||||||
Some(Duration::from_secs(1))
|
|
||||||
);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
Reference in New Issue
Block a user