mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-15 19:02:42 +00:00
* some blob reprocessing work
* remove ForceBlockLookup
* reorder enum match arms in sync manager
* a lot more reprocessing work
* impl logic for triggerng blob lookups along with block lookups
* deal with rpc blobs in groups per block in the da checker. don't cache missing blob ids in the da checker.
* make single block lookup generic
* more work
* add delayed processing logic and combine some requests
* start fixing some compile errors
* fix compilation in main block lookup mod
* much work
* get things compiling
* parent blob lookups
* fix compile
* revert red/stevie changes
* fix up sync manager delay message logic
* add peer usefulness enum
* should remove lookup refactor
* consolidate retry error handling
* improve peer scoring during certain failures in parent lookups
* improve retry code
* drop parent lookup if either req has a peer disconnect during download
* refactor single block processed method
* processing peer refactor
* smol bugfix
* fix some todos
* fix lints
* fix lints
* fix compile in lookup tests
* fix lints
* fix lints
* fix existing block lookup tests
* renamings
* fix after merge
* cargo fmt
* compilation fix in beacon chain tests
* fix
* refactor lookup tests to work with multiple forks and response types
* make tests into macros
* wrap availability check error
* fix compile after merge
* add random blobs
* start fixing up lookup verify error handling
* some bug fixes and the start of deneb only tests
* make tests work for all forks
* track information about peer source
* error refactoring
* improve peer scoring
* fix test compilation
* make sure blobs are sent for processing after stream termination, delete copied tests
* add some tests and fix a bug
* smol bugfixes and moar tests
* add tests and fix some things
* compile after merge
* lots of refactoring
* retry on invalid block/blob
* merge unknown parent messages before current slot lookup
* get tests compiling
* penalize blob peer on invalid blobs
* Check disk on in-memory cache miss
* Update beacon_node/beacon_chain/src/data_availability_checker/overflow_lru_cache.rs
* Update beacon_node/network/src/sync/network_context.rs
Co-authored-by: Divma <26765164+divagant-martian@users.noreply.github.com>
* fix bug in matching blocks and blobs in range sync
* pr feedback
* fix conflicts
* upgrade logs from warn to crit when we receive incorrect response in range
* synced_and_connected_within_tolerance -> should_search_for_block
* remove todo
* add data gas used and update excess data gas to u64
* Fix Broken Overflow Tests
* payload verification with commitments
* fix merge conflicts
* restore payload file
* Restore payload file
* remove todo
* add max blob commitments per block
* c-kzg lib update
* Fix ef tests
* Abstract over minimal/mainnet spec in kzg crate
* Start integrating new KZG
* checkpoint sync without alignment
* checkpoint sync without alignment
* add import
* add import
* query for checkpoint state by slot rather than state root (teku doesn't serve by state root)
* query for checkpoint state by slot rather than state root (teku doesn't serve by state root)
* loosen check
* get state first and query by most recent block root
* Revert "loosen check"
This reverts commit 069d13dd63.
* get state first and query by most recent block root
* merge max blobs change
* simplify delay logic
* rename unknown parent sync message variants
* rename parameter, block_slot -> slot
* add some docs to the lookup module
* use interval instead of sleep
* drop request if blocks and blobs requests both return `None` for `Id`
* clean up `find_single_lookup` logic
* add lookup source enum
* clean up `find_single_lookup` logic
* add docs to find_single_lookup_request
* move LookupSource our of param where unnecessary
* remove unnecessary todo
* query for block by `state.latest_block_header.slot`
* fix lint
* fix merge transition ef tests
* fix test
* fix test
* fix observed blob sidecars test
* Add some metrics (#33)
* fix protocol limits for blobs by root
* Update Engine API for 1:1 Structure Method
* make beacon chain tests to fix devnet 6 changes
* get ckzg working and fix some tests
* fix remaining tests
* fix lints
* Fix KZG linking issues
* remove unused dep
* lockfile
* test fixes
* remove dbgs
* remove unwrap
* cleanup tx generator
* small fixes
* fixing fixes
* more self reivew
* more self review
* refactor genesis header initialization
* refactor mock el instantiations
* fix compile
* fix network test, make sure they run for each fork
* pr feedback
* fix last test (hopefully)
---------
Co-authored-by: Pawan Dhananjay <pawandhananjay@gmail.com>
Co-authored-by: Mark Mackey <mark@sigmaprime.io>
Co-authored-by: Divma <26765164+divagant-martian@users.noreply.github.com>
Co-authored-by: Michael Sproul <michael@sigmaprime.io>
667 lines
22 KiB
Rust
667 lines
22 KiB
Rust
use crate::execution_engine::{
|
|
ExecutionEngine, GenericExecutionEngine, ACCOUNT1, ACCOUNT2, KEYSTORE_PASSWORD, PRIVATE_KEYS,
|
|
};
|
|
use crate::transactions::transactions;
|
|
use ethers_providers::Middleware;
|
|
use execution_layer::{
|
|
BuilderParams, ChainHealth, ExecutionLayer, PayloadAttributes, PayloadStatus,
|
|
};
|
|
use fork_choice::ForkchoiceUpdateParameters;
|
|
use reqwest::{header::CONTENT_TYPE, Client};
|
|
use sensitive_url::SensitiveUrl;
|
|
use serde_json::{json, Value};
|
|
use std::sync::Arc;
|
|
use std::time::{Duration, Instant, SystemTime, UNIX_EPOCH};
|
|
use task_executor::TaskExecutor;
|
|
use tokio::time::sleep;
|
|
use types::{
|
|
Address, ChainSpec, EthSpec, ExecutionBlockHash, ExecutionPayload, ExecutionPayloadHeader,
|
|
ForkName, FullPayload, Hash256, MainnetEthSpec, PublicKeyBytes, Slot, Uint256,
|
|
};
|
|
const EXECUTION_ENGINE_START_TIMEOUT: Duration = Duration::from_secs(30);
|
|
|
|
struct ExecutionPair<E, T: EthSpec> {
|
|
/// The Lighthouse `ExecutionLayer` struct, connected to the `execution_engine` via HTTP.
|
|
execution_layer: ExecutionLayer<T>,
|
|
/// A handle to external EE process, once this is dropped the process will be killed.
|
|
#[allow(dead_code)]
|
|
execution_engine: ExecutionEngine<E>,
|
|
}
|
|
|
|
/// A rig that holds two EE processes for testing.
|
|
///
|
|
/// There are two EEs held here so that we can test out-of-order application of payloads, and other
|
|
/// edge-cases.
|
|
pub struct TestRig<E, T: EthSpec = MainnetEthSpec> {
|
|
#[allow(dead_code)]
|
|
runtime: Arc<tokio::runtime::Runtime>,
|
|
ee_a: ExecutionPair<E, T>,
|
|
ee_b: ExecutionPair<E, T>,
|
|
spec: ChainSpec,
|
|
_runtime_shutdown: exit_future::Signal,
|
|
}
|
|
|
|
/// Import a private key into the execution engine and unlock it so that we can
|
|
/// make transactions with the corresponding account.
|
|
async fn import_and_unlock(http_url: SensitiveUrl, priv_keys: &[&str], password: &str) {
|
|
for priv_key in priv_keys {
|
|
let body = json!(
|
|
{
|
|
"jsonrpc":"2.0",
|
|
"method":"personal_importRawKey",
|
|
"params":[priv_key, password],
|
|
"id":1
|
|
}
|
|
);
|
|
|
|
let client = Client::builder().build().unwrap();
|
|
let request = client
|
|
.post(http_url.full.clone())
|
|
.header(CONTENT_TYPE, "application/json")
|
|
.json(&body);
|
|
|
|
let response: Value = request
|
|
.send()
|
|
.await
|
|
.unwrap()
|
|
.error_for_status()
|
|
.unwrap()
|
|
.json()
|
|
.await
|
|
.unwrap();
|
|
|
|
let account = response.get("result").unwrap().as_str().unwrap();
|
|
|
|
let body = json!(
|
|
{
|
|
"jsonrpc":"2.0",
|
|
"method":"personal_unlockAccount",
|
|
"params":[account, password],
|
|
"id":1
|
|
}
|
|
);
|
|
|
|
let request = client
|
|
.post(http_url.full.clone())
|
|
.header(CONTENT_TYPE, "application/json")
|
|
.json(&body);
|
|
|
|
let _response: Value = request
|
|
.send()
|
|
.await
|
|
.unwrap()
|
|
.error_for_status()
|
|
.unwrap()
|
|
.json()
|
|
.await
|
|
.unwrap();
|
|
}
|
|
}
|
|
|
|
impl<E: GenericExecutionEngine> TestRig<E> {
|
|
pub fn new(generic_engine: E) -> Self {
|
|
let log = logging::test_logger();
|
|
let runtime = Arc::new(
|
|
tokio::runtime::Builder::new_multi_thread()
|
|
.enable_all()
|
|
.build()
|
|
.unwrap(),
|
|
);
|
|
let (runtime_shutdown, exit) = exit_future::signal();
|
|
let (shutdown_tx, _) = futures::channel::mpsc::channel(1);
|
|
let executor = TaskExecutor::new(Arc::downgrade(&runtime), exit, log.clone(), shutdown_tx);
|
|
let mut spec = MainnetEthSpec::default_spec();
|
|
spec.terminal_total_difficulty = Uint256::zero();
|
|
|
|
let fee_recipient = None;
|
|
|
|
let ee_a = {
|
|
let execution_engine = ExecutionEngine::new(generic_engine.clone());
|
|
let urls = vec![execution_engine.http_auth_url()];
|
|
|
|
let config = execution_layer::Config {
|
|
execution_endpoints: urls,
|
|
secret_files: vec![],
|
|
suggested_fee_recipient: Some(Address::repeat_byte(42)),
|
|
default_datadir: execution_engine.datadir(),
|
|
..Default::default()
|
|
};
|
|
let execution_layer =
|
|
ExecutionLayer::from_config(config, executor.clone(), log.clone()).unwrap();
|
|
ExecutionPair {
|
|
execution_engine,
|
|
execution_layer,
|
|
}
|
|
};
|
|
|
|
let ee_b = {
|
|
let execution_engine = ExecutionEngine::new(generic_engine);
|
|
let urls = vec![execution_engine.http_auth_url()];
|
|
|
|
let config = execution_layer::Config {
|
|
execution_endpoints: urls,
|
|
secret_files: vec![],
|
|
suggested_fee_recipient: fee_recipient,
|
|
default_datadir: execution_engine.datadir(),
|
|
..Default::default()
|
|
};
|
|
let execution_layer =
|
|
ExecutionLayer::from_config(config, executor, log.clone()).unwrap();
|
|
ExecutionPair {
|
|
execution_engine,
|
|
execution_layer,
|
|
}
|
|
};
|
|
|
|
Self {
|
|
runtime,
|
|
ee_a,
|
|
ee_b,
|
|
spec,
|
|
_runtime_shutdown: runtime_shutdown,
|
|
}
|
|
}
|
|
|
|
pub fn perform_tests_blocking(&self) {
|
|
self.runtime
|
|
.handle()
|
|
.block_on(async { self.perform_tests().await });
|
|
}
|
|
|
|
pub async fn wait_until_synced(&self) {
|
|
let start_instant = Instant::now();
|
|
|
|
for pair in [&self.ee_a, &self.ee_b] {
|
|
loop {
|
|
// Run the routine to check for online nodes.
|
|
pair.execution_layer.watchdog_task().await;
|
|
|
|
if pair.execution_layer.is_synced().await {
|
|
break;
|
|
} else if start_instant + EXECUTION_ENGINE_START_TIMEOUT > Instant::now() {
|
|
sleep(Duration::from_millis(500)).await;
|
|
} else {
|
|
panic!("timeout waiting for execution engines to come online")
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
pub async fn perform_tests(&self) {
|
|
self.wait_until_synced().await;
|
|
|
|
// Import and unlock all private keys to sign transactions
|
|
let _ = futures::future::join_all([&self.ee_a, &self.ee_b].iter().map(|ee| {
|
|
import_and_unlock(
|
|
ee.execution_engine.http_url(),
|
|
&PRIVATE_KEYS,
|
|
KEYSTORE_PASSWORD,
|
|
)
|
|
}))
|
|
.await;
|
|
|
|
// We hardcode the accounts here since some EEs start with a default unlocked account
|
|
let account1 = ethers_core::types::Address::from_slice(&hex::decode(ACCOUNT1).unwrap());
|
|
let account2 = ethers_core::types::Address::from_slice(&hex::decode(ACCOUNT2).unwrap());
|
|
|
|
/*
|
|
* Check the transition config endpoint.
|
|
*/
|
|
for ee in [&self.ee_a, &self.ee_b] {
|
|
ee.execution_layer
|
|
.exchange_transition_configuration(&self.spec)
|
|
.await
|
|
.unwrap();
|
|
}
|
|
|
|
/*
|
|
* Read the terminal block hash from both pairs, check it's equal.
|
|
*/
|
|
|
|
let terminal_pow_block_hash = self
|
|
.ee_a
|
|
.execution_layer
|
|
.get_terminal_pow_block_hash(&self.spec, timestamp_now())
|
|
.await
|
|
.unwrap()
|
|
.unwrap();
|
|
|
|
assert_eq!(
|
|
terminal_pow_block_hash,
|
|
self.ee_b
|
|
.execution_layer
|
|
.get_terminal_pow_block_hash(&self.spec, timestamp_now())
|
|
.await
|
|
.unwrap()
|
|
.unwrap()
|
|
);
|
|
|
|
// Submit transactions before getting payload
|
|
let txs = transactions::<MainnetEthSpec>(account1, account2);
|
|
let mut pending_txs = Vec::new();
|
|
for tx in txs.clone().into_iter() {
|
|
let pending_tx = self
|
|
.ee_a
|
|
.execution_engine
|
|
.provider
|
|
.send_transaction(tx, None)
|
|
.await
|
|
.unwrap();
|
|
pending_txs.push(pending_tx);
|
|
}
|
|
|
|
/*
|
|
* Execution Engine A:
|
|
*
|
|
* Produce a valid payload atop the terminal block.
|
|
*/
|
|
|
|
let parent_hash = terminal_pow_block_hash;
|
|
let timestamp = timestamp_now();
|
|
let prev_randao = Hash256::zero();
|
|
let head_root = Hash256::zero();
|
|
let justified_block_hash = ExecutionBlockHash::zero();
|
|
let finalized_block_hash = ExecutionBlockHash::zero();
|
|
let forkchoice_update_params = ForkchoiceUpdateParameters {
|
|
head_root,
|
|
head_hash: Some(parent_hash),
|
|
justified_hash: Some(justified_block_hash),
|
|
finalized_hash: Some(finalized_block_hash),
|
|
};
|
|
let proposer_index = 0;
|
|
|
|
// To save sending proposer preparation data, just set the fee recipient
|
|
// to the fee recipient configured for EE A.
|
|
let prepared = self
|
|
.ee_a
|
|
.execution_layer
|
|
.insert_proposer(
|
|
Slot::new(1), // Insert proposer for the next slot
|
|
head_root,
|
|
proposer_index,
|
|
// TODO: think about how to test different forks
|
|
PayloadAttributes::new(timestamp, prev_randao, Address::repeat_byte(42), None),
|
|
)
|
|
.await;
|
|
|
|
assert!(!prepared, "Inserting proposer for the first time");
|
|
|
|
// Make a fcu call with the PayloadAttributes that we inserted previously
|
|
let prepare = self
|
|
.ee_a
|
|
.execution_layer
|
|
.notify_forkchoice_updated(
|
|
parent_hash,
|
|
justified_block_hash,
|
|
finalized_block_hash,
|
|
Slot::new(0),
|
|
Hash256::zero(),
|
|
)
|
|
.await
|
|
.unwrap();
|
|
|
|
assert_eq!(prepare, PayloadStatus::Valid);
|
|
|
|
// Add a delay to give the EE sufficient time to pack the
|
|
// submitted transactions into a payload.
|
|
// This is required when running on under resourced nodes and
|
|
// in CI.
|
|
sleep(Duration::from_secs(3)).await;
|
|
|
|
let builder_params = BuilderParams {
|
|
pubkey: PublicKeyBytes::empty(),
|
|
slot: Slot::new(0),
|
|
chain_health: ChainHealth::Healthy,
|
|
};
|
|
let suggested_fee_recipient = self
|
|
.ee_a
|
|
.execution_layer
|
|
.get_suggested_fee_recipient(proposer_index)
|
|
.await;
|
|
let payload_attributes =
|
|
PayloadAttributes::new(timestamp, prev_randao, suggested_fee_recipient, None);
|
|
let valid_payload = self
|
|
.ee_a
|
|
.execution_layer
|
|
.get_payload::<FullPayload<MainnetEthSpec>>(
|
|
parent_hash,
|
|
&payload_attributes,
|
|
forkchoice_update_params,
|
|
builder_params,
|
|
// FIXME: think about how to test other forks
|
|
ForkName::Merge,
|
|
&self.spec,
|
|
)
|
|
.await
|
|
.unwrap()
|
|
.to_payload()
|
|
.execution_payload();
|
|
assert_eq!(valid_payload.transactions().len(), pending_txs.len());
|
|
|
|
/*
|
|
* Execution Engine A:
|
|
*
|
|
* Indicate that the payload is the head of the chain, before submitting a
|
|
* `notify_new_payload`.
|
|
*/
|
|
let head_block_hash = valid_payload.block_hash();
|
|
let finalized_block_hash = ExecutionBlockHash::zero();
|
|
let slot = Slot::new(42);
|
|
let head_block_root = Hash256::repeat_byte(42);
|
|
let status = self
|
|
.ee_a
|
|
.execution_layer
|
|
.notify_forkchoice_updated(
|
|
head_block_hash,
|
|
justified_block_hash,
|
|
finalized_block_hash,
|
|
slot,
|
|
head_block_root,
|
|
)
|
|
.await
|
|
.unwrap();
|
|
assert_eq!(status, PayloadStatus::Syncing);
|
|
|
|
/*
|
|
* Execution Engine A:
|
|
*
|
|
* Provide the valid payload back to the EE again.
|
|
*/
|
|
|
|
let status = self
|
|
.ee_a
|
|
.execution_layer
|
|
.notify_new_payload(&valid_payload, None)
|
|
.await
|
|
.unwrap();
|
|
assert_eq!(status, PayloadStatus::Valid);
|
|
check_payload_reconstruction(&self.ee_a, &valid_payload).await;
|
|
|
|
/*
|
|
* Execution Engine A:
|
|
*
|
|
* Indicate that the payload is the head of the chain.
|
|
*
|
|
* Do not provide payload attributes (we'll test that later).
|
|
*/
|
|
let head_block_hash = valid_payload.block_hash();
|
|
let finalized_block_hash = ExecutionBlockHash::zero();
|
|
let slot = Slot::new(42);
|
|
let head_block_root = Hash256::repeat_byte(42);
|
|
let status = self
|
|
.ee_a
|
|
.execution_layer
|
|
.notify_forkchoice_updated(
|
|
head_block_hash,
|
|
justified_block_hash,
|
|
finalized_block_hash,
|
|
slot,
|
|
head_block_root,
|
|
)
|
|
.await
|
|
.unwrap();
|
|
assert_eq!(status, PayloadStatus::Valid);
|
|
|
|
// Verify that all submitted txs were successful
|
|
for pending_tx in pending_txs {
|
|
let tx_receipt = pending_tx.await.unwrap().unwrap();
|
|
assert_eq!(
|
|
tx_receipt.status,
|
|
Some(1.into()),
|
|
"Tx index {} has invalid status ",
|
|
tx_receipt.transaction_index
|
|
);
|
|
}
|
|
|
|
/*
|
|
* Execution Engine A:
|
|
*
|
|
* Provide an invalidated payload to the EE.
|
|
*/
|
|
|
|
let mut invalid_payload = valid_payload.clone();
|
|
*invalid_payload.prev_randao_mut() = Hash256::from_low_u64_be(42);
|
|
let status = self
|
|
.ee_a
|
|
.execution_layer
|
|
.notify_new_payload(&invalid_payload, None)
|
|
.await
|
|
.unwrap();
|
|
assert!(matches!(
|
|
status,
|
|
PayloadStatus::InvalidBlockHash { .. }
|
|
// Geth is returning `INVALID` with a `null` LVH to indicate it
|
|
// does not know the invalid ancestor.
|
|
| PayloadStatus::Invalid {
|
|
latest_valid_hash: None,
|
|
..
|
|
}
|
|
));
|
|
|
|
/*
|
|
* Execution Engine A:
|
|
*
|
|
* Produce another payload atop the previous one.
|
|
*/
|
|
|
|
let parent_hash = valid_payload.block_hash();
|
|
let timestamp = valid_payload.timestamp() + 1;
|
|
let prev_randao = Hash256::zero();
|
|
let proposer_index = 0;
|
|
let builder_params = BuilderParams {
|
|
pubkey: PublicKeyBytes::empty(),
|
|
slot: Slot::new(0),
|
|
chain_health: ChainHealth::Healthy,
|
|
};
|
|
let suggested_fee_recipient = self
|
|
.ee_a
|
|
.execution_layer
|
|
.get_suggested_fee_recipient(proposer_index)
|
|
.await;
|
|
let payload_attributes =
|
|
PayloadAttributes::new(timestamp, prev_randao, suggested_fee_recipient, None);
|
|
let second_payload = self
|
|
.ee_a
|
|
.execution_layer
|
|
.get_payload::<FullPayload<MainnetEthSpec>>(
|
|
parent_hash,
|
|
&payload_attributes,
|
|
forkchoice_update_params,
|
|
builder_params,
|
|
// FIXME: think about how to test other forks
|
|
ForkName::Merge,
|
|
&self.spec,
|
|
)
|
|
.await
|
|
.unwrap()
|
|
.to_payload()
|
|
.execution_payload();
|
|
|
|
/*
|
|
* Execution Engine A:
|
|
*
|
|
* Provide the second payload back to the EE again.
|
|
*/
|
|
|
|
let status = self
|
|
.ee_a
|
|
.execution_layer
|
|
.notify_new_payload(&second_payload, None)
|
|
.await
|
|
.unwrap();
|
|
assert_eq!(status, PayloadStatus::Valid);
|
|
check_payload_reconstruction(&self.ee_a, &second_payload).await;
|
|
|
|
/*
|
|
* Execution Engine A:
|
|
*
|
|
* Indicate that the payload is the head of the chain, providing payload attributes.
|
|
*/
|
|
let head_block_hash = valid_payload.block_hash();
|
|
let finalized_block_hash = ExecutionBlockHash::zero();
|
|
// TODO: think about how to handle different forks
|
|
// To save sending proposer preparation data, just set the fee recipient
|
|
// to the fee recipient configured for EE A.
|
|
let payload_attributes =
|
|
PayloadAttributes::new(timestamp, prev_randao, Address::repeat_byte(42), None);
|
|
let slot = Slot::new(42);
|
|
let head_block_root = Hash256::repeat_byte(100);
|
|
let validator_index = 0;
|
|
self.ee_a
|
|
.execution_layer
|
|
.insert_proposer(slot, head_block_root, validator_index, payload_attributes)
|
|
.await;
|
|
let status = self
|
|
.ee_a
|
|
.execution_layer
|
|
.notify_forkchoice_updated(
|
|
head_block_hash,
|
|
justified_block_hash,
|
|
finalized_block_hash,
|
|
slot,
|
|
head_block_root,
|
|
)
|
|
.await
|
|
.unwrap();
|
|
assert_eq!(status, PayloadStatus::Valid);
|
|
|
|
/*
|
|
* Execution Engine B:
|
|
*
|
|
* Provide the second payload, without providing the first.
|
|
*/
|
|
let status = self
|
|
.ee_b
|
|
.execution_layer
|
|
.notify_new_payload(&second_payload, None)
|
|
.await
|
|
.unwrap();
|
|
// TODO: we should remove the `Accepted` status here once Geth fixes it
|
|
assert!(matches!(
|
|
status,
|
|
PayloadStatus::Syncing | PayloadStatus::Accepted
|
|
));
|
|
|
|
/*
|
|
* Execution Engine B:
|
|
*
|
|
* Set the second payload as the head, without providing payload attributes.
|
|
*/
|
|
let head_block_hash = second_payload.block_hash();
|
|
let finalized_block_hash = ExecutionBlockHash::zero();
|
|
let slot = Slot::new(42);
|
|
let head_block_root = Hash256::repeat_byte(42);
|
|
let status = self
|
|
.ee_b
|
|
.execution_layer
|
|
.notify_forkchoice_updated(
|
|
head_block_hash,
|
|
justified_block_hash,
|
|
finalized_block_hash,
|
|
slot,
|
|
head_block_root,
|
|
)
|
|
.await
|
|
.unwrap();
|
|
assert_eq!(status, PayloadStatus::Syncing);
|
|
|
|
/*
|
|
* Execution Engine B:
|
|
*
|
|
* Provide the first payload to the EE.
|
|
*/
|
|
|
|
let status = self
|
|
.ee_b
|
|
.execution_layer
|
|
.notify_new_payload(&valid_payload, None)
|
|
.await
|
|
.unwrap();
|
|
assert_eq!(status, PayloadStatus::Valid);
|
|
check_payload_reconstruction(&self.ee_b, &valid_payload).await;
|
|
|
|
/*
|
|
* Execution Engine B:
|
|
*
|
|
* Provide the second payload, now the first has been provided.
|
|
*/
|
|
let status = self
|
|
.ee_b
|
|
.execution_layer
|
|
.notify_new_payload(&second_payload, None)
|
|
.await
|
|
.unwrap();
|
|
assert_eq!(status, PayloadStatus::Valid);
|
|
check_payload_reconstruction(&self.ee_b, &second_payload).await;
|
|
|
|
/*
|
|
* Execution Engine B:
|
|
*
|
|
* Set the second payload as the head, without providing payload attributes.
|
|
*/
|
|
let head_block_hash = second_payload.block_hash();
|
|
let finalized_block_hash = ExecutionBlockHash::zero();
|
|
let slot = Slot::new(42);
|
|
let head_block_root = Hash256::repeat_byte(42);
|
|
let status = self
|
|
.ee_b
|
|
.execution_layer
|
|
.notify_forkchoice_updated(
|
|
head_block_hash,
|
|
justified_block_hash,
|
|
finalized_block_hash,
|
|
slot,
|
|
head_block_root,
|
|
)
|
|
.await
|
|
.unwrap();
|
|
assert_eq!(status, PayloadStatus::Valid);
|
|
}
|
|
}
|
|
|
|
/// Check that the given payload can be re-constructed by fetching it from the EE.
|
|
///
|
|
/// Panic if payload reconstruction fails.
|
|
async fn check_payload_reconstruction<E: GenericExecutionEngine>(
|
|
ee: &ExecutionPair<E, MainnetEthSpec>,
|
|
payload: &ExecutionPayload<MainnetEthSpec>,
|
|
) {
|
|
// check via legacy eth_getBlockByHash
|
|
let reconstructed = ee
|
|
.execution_layer
|
|
.get_payload_by_hash_legacy(payload.block_hash(), payload.fork_name())
|
|
.await
|
|
.unwrap()
|
|
.unwrap();
|
|
assert_eq!(reconstructed, *payload);
|
|
// also check via payload bodies method
|
|
let capabilities = ee
|
|
.execution_layer
|
|
.get_engine_capabilities(None)
|
|
.await
|
|
.unwrap();
|
|
assert!(
|
|
// if the engine doesn't have these capabilities, we need to update the client in our tests
|
|
capabilities.get_payload_bodies_by_hash_v1 && capabilities.get_payload_bodies_by_range_v1,
|
|
"Testing engine does not support payload bodies methods"
|
|
);
|
|
let mut bodies = ee
|
|
.execution_layer
|
|
.get_payload_bodies_by_hash(vec![payload.block_hash()])
|
|
.await
|
|
.unwrap();
|
|
assert_eq!(bodies.len(), 1);
|
|
let body = bodies.pop().unwrap().unwrap();
|
|
let header = ExecutionPayloadHeader::from(payload.to_ref());
|
|
let reconstructed_from_body = body.to_payload(header).unwrap();
|
|
assert_eq!(reconstructed_from_body, *payload);
|
|
}
|
|
|
|
/// Returns the duration since the unix epoch.
|
|
pub fn timestamp_now() -> u64 {
|
|
SystemTime::now()
|
|
.duration_since(UNIX_EPOCH)
|
|
.unwrap_or_else(|_| Duration::from_secs(0))
|
|
.as_secs()
|
|
}
|