mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-11 04:31:51 +00:00
338 lines
10 KiB
Rust
338 lines
10 KiB
Rust
#![cfg(test)]
|
|
|
|
use beacon_chain::{BeaconChain, BeaconChainTypes};
|
|
use node_test_rig::{
|
|
environment::{Environment, EnvironmentBuilder},
|
|
LocalBeaconNode,
|
|
};
|
|
use remote_beacon_node::BeaconBlockPublishStatus;
|
|
use std::sync::Arc;
|
|
use tree_hash::{SignedRoot, TreeHash};
|
|
use types::{
|
|
test_utils::generate_deterministic_keypair, BeaconBlock, ChainSpec, Domain, Epoch, EthSpec,
|
|
MinimalEthSpec, RelativeEpoch, Signature, Slot,
|
|
};
|
|
|
|
type E = MinimalEthSpec;
|
|
|
|
fn build_env() -> Environment<E> {
|
|
EnvironmentBuilder::minimal()
|
|
.null_logger()
|
|
.expect("should build env logger")
|
|
.single_thread_tokio_runtime()
|
|
.expect("should start tokio runtime")
|
|
.build()
|
|
.expect("environment should build")
|
|
}
|
|
|
|
/// Returns the randao reveal for the given slot (assuming the given `beacon_chain` uses
|
|
/// deterministic keypairs).
|
|
fn get_randao_reveal<T: BeaconChainTypes>(
|
|
beacon_chain: Arc<BeaconChain<T>>,
|
|
slot: Slot,
|
|
spec: &ChainSpec,
|
|
) -> Signature {
|
|
let fork = beacon_chain.head().beacon_state.fork.clone();
|
|
let proposer_index = beacon_chain
|
|
.block_proposer(slot)
|
|
.expect("should get proposer index");
|
|
let keypair = generate_deterministic_keypair(proposer_index);
|
|
let epoch = slot.epoch(E::slots_per_epoch());
|
|
let message = epoch.tree_hash_root();
|
|
let domain = spec.get_domain(epoch, Domain::Randao, &fork);
|
|
Signature::new(&message, domain, &keypair.sk)
|
|
}
|
|
|
|
/// Signs the given block (assuming the given `beacon_chain` uses deterministic keypairs).
|
|
fn sign_block<T: BeaconChainTypes>(
|
|
beacon_chain: Arc<BeaconChain<T>>,
|
|
block: &mut BeaconBlock<T::EthSpec>,
|
|
spec: &ChainSpec,
|
|
) {
|
|
let fork = beacon_chain.head().beacon_state.fork.clone();
|
|
let proposer_index = beacon_chain
|
|
.block_proposer(block.slot)
|
|
.expect("should get proposer index");
|
|
let keypair = generate_deterministic_keypair(proposer_index);
|
|
let epoch = block.slot.epoch(E::slots_per_epoch());
|
|
let message = block.signed_root();
|
|
let domain = spec.get_domain(epoch, Domain::BeaconProposer, &fork);
|
|
block.signature = Signature::new(&message, domain, &keypair.sk);
|
|
}
|
|
|
|
#[test]
|
|
fn validator_duties() {
|
|
let mut env = build_env();
|
|
|
|
let spec = &E::default_spec();
|
|
|
|
let node = LocalBeaconNode::production(env.core_context());
|
|
let remote_node = node.remote_node().expect("should produce remote node");
|
|
|
|
let beacon_chain = node
|
|
.client
|
|
.beacon_chain()
|
|
.expect("client should have beacon chain");
|
|
|
|
let epoch = Epoch::new(0);
|
|
|
|
let validators = beacon_chain
|
|
.head()
|
|
.beacon_state
|
|
.validators
|
|
.iter()
|
|
.map(|v| v.pubkey.clone())
|
|
.collect::<Vec<_>>();
|
|
|
|
let duties = env
|
|
.runtime()
|
|
.block_on(remote_node.http.validator().get_duties(epoch, &validators))
|
|
.expect("should fetch block from http api");
|
|
|
|
assert_eq!(
|
|
validators.len(),
|
|
duties.len(),
|
|
"there should be a duty for each validator"
|
|
);
|
|
|
|
let state = beacon_chain.head().beacon_state.clone();
|
|
|
|
validators
|
|
.iter()
|
|
.zip(duties.iter())
|
|
.for_each(|(validator, duty)| {
|
|
assert_eq!(*validator, duty.validator_pubkey, "pubkey should match");
|
|
|
|
let validator_index = state
|
|
.get_validator_index(validator)
|
|
.expect("should have pubkey cache")
|
|
.expect("pubkey should exist");
|
|
|
|
let attestation_duty = state
|
|
.get_attestation_duties(validator_index, RelativeEpoch::Current)
|
|
.expect("should have attestation duties cache")
|
|
.expect("should have attestation duties");
|
|
|
|
assert_eq!(
|
|
Some(attestation_duty.slot),
|
|
duty.attestation_slot,
|
|
"attestation slot should match"
|
|
);
|
|
|
|
assert_eq!(
|
|
Some(attestation_duty.shard),
|
|
duty.attestation_shard,
|
|
"attestation shard should match"
|
|
);
|
|
|
|
if let Some(slot) = duty.block_proposal_slot {
|
|
let expected_proposer = state
|
|
.get_beacon_proposer_index(slot, RelativeEpoch::Current, spec)
|
|
.expect("should know proposer");
|
|
assert_eq!(
|
|
expected_proposer, validator_index,
|
|
"should get correct proposal slot"
|
|
);
|
|
} else {
|
|
epoch.slot_iter(E::slots_per_epoch()).for_each(|slot| {
|
|
let slot_proposer = state
|
|
.get_beacon_proposer_index(slot, RelativeEpoch::Current, spec)
|
|
.expect("should know proposer");
|
|
assert!(
|
|
slot_proposer != validator_index,
|
|
"validator should not have proposal slot in this epoch"
|
|
)
|
|
})
|
|
}
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn validator_block_post() {
|
|
let mut env = build_env();
|
|
|
|
let spec = &E::default_spec();
|
|
|
|
let node = LocalBeaconNode::production(env.core_context());
|
|
let remote_node = node.remote_node().expect("should produce remote node");
|
|
|
|
let beacon_chain = node
|
|
.client
|
|
.beacon_chain()
|
|
.expect("client should have beacon chain");
|
|
|
|
let slot = Slot::new(1);
|
|
let randao_reveal = get_randao_reveal(beacon_chain.clone(), slot, spec);
|
|
|
|
let mut block = env
|
|
.runtime()
|
|
.block_on(
|
|
remote_node
|
|
.http
|
|
.validator()
|
|
.produce_block(slot, randao_reveal.clone()),
|
|
)
|
|
.expect("should fetch block from http api");
|
|
|
|
// Try publishing the block without a signature, ensure it is flagged as invalid.
|
|
let publish_status = env
|
|
.runtime()
|
|
.block_on(remote_node.http.validator().publish_block(block.clone()))
|
|
.expect("should publish block");
|
|
assert!(
|
|
!publish_status.is_valid(),
|
|
"the unsigned published block should not be valid"
|
|
);
|
|
|
|
sign_block(beacon_chain.clone(), &mut block, spec);
|
|
let block_root = block.canonical_root();
|
|
|
|
let publish_status = env
|
|
.runtime()
|
|
.block_on(remote_node.http.validator().publish_block(block.clone()))
|
|
.expect("should publish block");
|
|
assert_eq!(
|
|
publish_status,
|
|
BeaconBlockPublishStatus::Valid,
|
|
"the signed published block should be valid"
|
|
);
|
|
|
|
let head = env
|
|
.runtime()
|
|
.block_on(remote_node.http.beacon().get_head())
|
|
.expect("should get head");
|
|
|
|
assert_eq!(
|
|
head.block_root, block_root,
|
|
"the published block should become the head block"
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn validator_block_get() {
|
|
let mut env = build_env();
|
|
|
|
let spec = &E::default_spec();
|
|
|
|
let node = LocalBeaconNode::production(env.core_context());
|
|
let remote_node = node.remote_node().expect("should produce remote node");
|
|
|
|
let beacon_chain = node
|
|
.client
|
|
.beacon_chain()
|
|
.expect("client should have beacon chain");
|
|
|
|
let slot = Slot::new(1);
|
|
let randao_reveal = get_randao_reveal(beacon_chain.clone(), slot, spec);
|
|
|
|
let block = env
|
|
.runtime()
|
|
.block_on(
|
|
remote_node
|
|
.http
|
|
.validator()
|
|
.produce_block(slot, randao_reveal.clone()),
|
|
)
|
|
.expect("should fetch block from http api");
|
|
|
|
let (expected_block, _state) = node
|
|
.client
|
|
.beacon_chain()
|
|
.expect("client should have beacon chain")
|
|
.produce_block(randao_reveal, slot)
|
|
.expect("should produce block");
|
|
|
|
assert_eq!(
|
|
block, expected_block,
|
|
"the block returned from the API should be as expected"
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn beacon_state() {
|
|
let mut env = build_env();
|
|
|
|
let node = LocalBeaconNode::production(env.core_context());
|
|
let remote_node = node.remote_node().expect("should produce remote node");
|
|
|
|
let (state_by_slot, root) = env
|
|
.runtime()
|
|
.block_on(remote_node.http.beacon().get_state_by_slot(Slot::new(0)))
|
|
.expect("should fetch state from http api");
|
|
|
|
let (state_by_root, root_2) = env
|
|
.runtime()
|
|
.block_on(remote_node.http.beacon().get_state_by_root(root))
|
|
.expect("should fetch state from http api");
|
|
|
|
let mut db_state = node
|
|
.client
|
|
.beacon_chain()
|
|
.expect("client should have beacon chain")
|
|
.state_at_slot(Slot::new(0))
|
|
.expect("should find state");
|
|
db_state.drop_all_caches();
|
|
|
|
assert_eq!(
|
|
root, root_2,
|
|
"the two roots returned from the api should be identical"
|
|
);
|
|
assert_eq!(
|
|
root,
|
|
db_state.canonical_root(),
|
|
"root from database should match that from the API"
|
|
);
|
|
assert_eq!(
|
|
state_by_slot, db_state,
|
|
"genesis state by slot from api should match that from the DB"
|
|
);
|
|
assert_eq!(
|
|
state_by_root, db_state,
|
|
"genesis state by root from api should match that from the DB"
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn beacon_block() {
|
|
let mut env = build_env();
|
|
|
|
let node = LocalBeaconNode::production(env.core_context());
|
|
let remote_node = node.remote_node().expect("should produce remote node");
|
|
|
|
let (block_by_slot, root) = env
|
|
.runtime()
|
|
.block_on(remote_node.http.beacon().get_block_by_slot(Slot::new(0)))
|
|
.expect("should fetch block from http api");
|
|
|
|
let (block_by_root, root_2) = env
|
|
.runtime()
|
|
.block_on(remote_node.http.beacon().get_block_by_root(root))
|
|
.expect("should fetch block from http api");
|
|
|
|
let db_block = node
|
|
.client
|
|
.beacon_chain()
|
|
.expect("client should have beacon chain")
|
|
.block_at_slot(Slot::new(0))
|
|
.expect("should find block")
|
|
.expect("block should not be none");
|
|
|
|
assert_eq!(
|
|
root, root_2,
|
|
"the two roots returned from the api should be identical"
|
|
);
|
|
assert_eq!(
|
|
root,
|
|
db_block.canonical_root(),
|
|
"root from database should match that from the API"
|
|
);
|
|
assert_eq!(
|
|
block_by_slot, db_block,
|
|
"genesis block by slot from api should match that from the DB"
|
|
);
|
|
assert_eq!(
|
|
block_by_root, db_block,
|
|
"genesis block by root from api should match that from the DB"
|
|
);
|
|
}
|