use super::*; use crate::bls_setting::BlsSetting; use crate::case_result::compare_beacon_state_results_without_caches; use crate::decode::{ssz_decode_file, ssz_decode_file_with, ssz_decode_state, yaml_decode_file}; use crate::testing_spec; use crate::type_name::TypeName; use serde_derive::Deserialize; use state_processing::per_block_processing::{ errors::BlockProcessingError, process_block_header, process_execution_payload, process_operations::{ altair, base, process_attester_slashings, process_deposits, process_exits, process_proposer_slashings, }, process_sync_aggregate, VerifyBlockRoot, VerifySignatures, }; use std::fmt::Debug; use std::path::Path; use types::{ Attestation, AttesterSlashing, BeaconBlock, BeaconState, ChainSpec, Deposit, EthSpec, ExecutionPayload, ForkName, ProposerSlashing, SignedVoluntaryExit, SyncAggregate, }; #[derive(Debug, Clone, Default, Deserialize)] struct Metadata { description: Option, bls_setting: Option, } #[derive(Debug, Clone, Deserialize)] struct ExecutionMetadata { execution_valid: bool, } #[derive(Debug, Clone)] pub struct Operations> { metadata: Metadata, execution_metadata: Option, pub pre: BeaconState, pub operation: Option, pub post: Option>, } pub trait Operation: TypeName + Debug + Sync + Sized { fn handler_name() -> String { Self::name().to_lowercase() } fn filename() -> String { format!("{}.ssz_snappy", Self::handler_name()) } fn is_enabled_for_fork(_fork_name: ForkName) -> bool { true } fn decode(path: &Path, spec: &ChainSpec) -> Result; fn apply_to( &self, state: &mut BeaconState, spec: &ChainSpec, _: &Operations, ) -> Result<(), BlockProcessingError>; } impl Operation for Attestation { fn decode(path: &Path, _spec: &ChainSpec) -> Result { ssz_decode_file(path) } fn apply_to( &self, state: &mut BeaconState, spec: &ChainSpec, _: &Operations, ) -> Result<(), BlockProcessingError> { let proposer_index = state.get_beacon_proposer_index(state.slot(), spec)? as u64; match state { BeaconState::Base(_) => { base::process_attestations(state, &[self.clone()], VerifySignatures::True, spec) } BeaconState::Altair(_) | BeaconState::Merge(_) => altair::process_attestation( state, self, 0, proposer_index, VerifySignatures::True, spec, ), } } } impl Operation for AttesterSlashing { fn handler_name() -> String { "attester_slashing".into() } fn decode(path: &Path, _spec: &ChainSpec) -> Result { ssz_decode_file(path) } fn apply_to( &self, state: &mut BeaconState, spec: &ChainSpec, _: &Operations, ) -> Result<(), BlockProcessingError> { process_attester_slashings(state, &[self.clone()], VerifySignatures::True, spec) } } impl Operation for Deposit { fn decode(path: &Path, _spec: &ChainSpec) -> Result { ssz_decode_file(path) } fn apply_to( &self, state: &mut BeaconState, spec: &ChainSpec, _: &Operations, ) -> Result<(), BlockProcessingError> { process_deposits(state, &[self.clone()], spec) } } impl Operation for ProposerSlashing { fn handler_name() -> String { "proposer_slashing".into() } fn decode(path: &Path, _spec: &ChainSpec) -> Result { ssz_decode_file(path) } fn apply_to( &self, state: &mut BeaconState, spec: &ChainSpec, _: &Operations, ) -> Result<(), BlockProcessingError> { process_proposer_slashings(state, &[self.clone()], VerifySignatures::True, spec) } } impl Operation for SignedVoluntaryExit { fn handler_name() -> String { "voluntary_exit".into() } fn decode(path: &Path, _spec: &ChainSpec) -> Result { ssz_decode_file(path) } fn apply_to( &self, state: &mut BeaconState, spec: &ChainSpec, _: &Operations, ) -> Result<(), BlockProcessingError> { process_exits(state, &[self.clone()], VerifySignatures::True, spec) } } impl Operation for BeaconBlock { fn handler_name() -> String { "block_header".into() } fn filename() -> String { "block.ssz_snappy".into() } fn decode(path: &Path, spec: &ChainSpec) -> Result { ssz_decode_file_with(path, |bytes| BeaconBlock::from_ssz_bytes(bytes, spec)) } fn apply_to( &self, state: &mut BeaconState, spec: &ChainSpec, _: &Operations, ) -> Result<(), BlockProcessingError> { process_block_header(state, self.to_ref(), VerifyBlockRoot::True, spec)?; Ok(()) } } impl Operation for SyncAggregate { fn handler_name() -> String { "sync_aggregate".into() } fn filename() -> String { "sync_aggregate.ssz_snappy".into() } fn is_enabled_for_fork(fork_name: ForkName) -> bool { fork_name != ForkName::Base } fn decode(path: &Path, _spec: &ChainSpec) -> Result { ssz_decode_file(path) } fn apply_to( &self, state: &mut BeaconState, spec: &ChainSpec, _: &Operations, ) -> Result<(), BlockProcessingError> { let proposer_index = state.get_beacon_proposer_index(state.slot(), spec)? as u64; process_sync_aggregate(state, self, proposer_index, VerifySignatures::True, spec) } } impl Operation for ExecutionPayload { fn handler_name() -> String { "execution_payload".into() } fn filename() -> String { "execution_payload.ssz_snappy".into() } fn is_enabled_for_fork(fork_name: ForkName) -> bool { fork_name != ForkName::Base && fork_name != ForkName::Altair } fn decode(path: &Path, _spec: &ChainSpec) -> Result { ssz_decode_file(path) } fn apply_to( &self, state: &mut BeaconState, spec: &ChainSpec, extra: &Operations, ) -> Result<(), BlockProcessingError> { let valid = extra .execution_metadata .as_ref() .map_or(false, |e| e.execution_valid); if valid { process_execution_payload(state, self, spec) } else { Err(BlockProcessingError::ExecutionInvalid) } } } impl> LoadCase for Operations { fn load_from_dir(path: &Path, fork_name: ForkName) -> Result { let spec = &testing_spec::(fork_name); let metadata_path = path.join("meta.yaml"); let metadata: Metadata = if metadata_path.is_file() { yaml_decode_file(&metadata_path)? } else { Metadata::default() }; // For execution payloads only. let execution_yaml_path = path.join("execution.yaml"); let execution_metadata = if execution_yaml_path.is_file() { Some(yaml_decode_file(&execution_yaml_path)?) } else { None }; let pre = ssz_decode_state(&path.join("pre.ssz_snappy"), spec)?; // Check BLS setting here before SSZ deserialization, as most types require signatures // to be valid. let (operation, bls_error) = if metadata.bls_setting.unwrap_or_default().check().is_ok() { match O::decode(&path.join(O::filename()), spec) { Ok(op) => (Some(op), None), Err(Error::InvalidBLSInput(error)) => (None, Some(error)), Err(e) => return Err(e), } } else { (None, None) }; let post_filename = path.join("post.ssz_snappy"); let post = if post_filename.is_file() { if let Some(bls_error) = bls_error { panic!("input is unexpectedly invalid: {}", bls_error); } Some(ssz_decode_state(&post_filename, spec)?) } else { None }; Ok(Self { metadata, execution_metadata, pre, operation, post, }) } } impl> Case for Operations { fn description(&self) -> String { self.metadata.description.clone().unwrap_or_default() } fn is_enabled_for_fork(fork_name: ForkName) -> bool { O::is_enabled_for_fork(fork_name) } fn result(&self, _case_index: usize, fork_name: ForkName) -> Result<(), Error> { let spec = &testing_spec::(fork_name); let mut state = self.pre.clone(); let mut expected = self.post.clone(); // Processing requires the committee caches. state .build_all_committee_caches(spec) .expect("committee caches OK"); let mut result = self .operation .as_ref() .ok_or(Error::SkippedBls)? .apply_to(&mut state, spec, self) .map(|()| state); compare_beacon_state_results_without_caches(&mut result, &mut expected) } }