mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-03 00:31:50 +00:00
## Issue Addressed Closes #1504 Closes #1505 Replaces #1703 Closes #1707 ## Proposed Changes * Update BLST and Milagro to versions compatible with BLSv4 spec * Update Lighthouse to spec v1.0.0-rc.0, and update EF test vectors * Use the v1.0.0 constants for `MainnetEthSpec`. * Rename `InteropEthSpec` -> `V012LegacyEthSpec` * Change all constants to suit the mainnet `v0.12.3` specification (i.e., Medalla). * Deprecate the `--spec` flag for the `lighthouse` binary * This value is now obtained from the `config_name` field of the `YamlConfig`. * Built in testnet YAML files have been updated. * Ignore the `--spec` value, if supplied, log a warning that it will be deprecated * `lcli` still has the spec flag, that's fine because it's dev tooling. * Remove the `E: EthSpec` from `YamlConfig` * This means we need to deser the genesis `BeaconState` on-demand, but this is fine. * Swap the old "minimal", "mainnet" strings over to the new `EthSpecId` enum. * Always require a `CONFIG_NAME` field in `YamlConfig` (it used to have a default). ## Additional Info Lots of breaking changes, do not merge! ~~We will likely need a Lighthouse v0.4.0 branch, and possibly a long-term v0.3.0 branch to keep Medalla alive~~. Co-authored-by: Kirk Baird <baird.k@outlook.com> Co-authored-by: Paul Hauner <paul@paulhauner.com>
52 lines
1.5 KiB
Rust
52 lines
1.5 KiB
Rust
use super::*;
|
|
use crate::case_result::compare_result;
|
|
use crate::cases::common::BlsCase;
|
|
use bls::SecretKey;
|
|
use serde_derive::Deserialize;
|
|
use types::Hash256;
|
|
|
|
#[derive(Debug, Clone, Deserialize)]
|
|
pub struct BlsSignInput {
|
|
pub privkey: String,
|
|
pub message: String,
|
|
}
|
|
|
|
#[derive(Debug, Clone, Deserialize)]
|
|
pub struct BlsSign {
|
|
pub input: BlsSignInput,
|
|
pub output: Option<String>,
|
|
}
|
|
|
|
impl BlsCase for BlsSign {}
|
|
|
|
impl Case for BlsSign {
|
|
fn result(&self, _case_index: usize) -> Result<(), Error> {
|
|
// Convert private_key and message to required types
|
|
let sk = hex::decode(&self.input.privkey[2..])
|
|
.map_err(|e| Error::FailedToParseTest(format!("{:?}", e)))?;
|
|
|
|
assert_eq!(sk.len(), 32);
|
|
|
|
let sk = match SecretKey::deserialize(&sk) {
|
|
Ok(sk) => sk,
|
|
Err(_) if self.output.is_none() => {
|
|
return Ok(());
|
|
}
|
|
Err(e) => return Err(Error::FailedToParseTest(format!("{:?}", e))),
|
|
};
|
|
let msg = hex::decode(&self.input.message[2..])
|
|
.map_err(|e| Error::FailedToParseTest(format!("{:?}", e)))?;
|
|
|
|
let signature = sk.sign(Hash256::from_slice(&msg));
|
|
|
|
let decoded = self
|
|
.output
|
|
.as_ref()
|
|
.map(|output| hex::decode(&output[2..]))
|
|
.transpose()
|
|
.map_err(|e| Error::FailedToParseTest(format!("{:?}", e)))?;
|
|
|
|
compare_result::<Vec<u8>, Vec<u8>>(&Ok(signature.serialize().to_vec()), &decoded)
|
|
}
|
|
}
|