mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-08 21:08:10 -05:00
* Ran gopls modernize to fix everything go run golang.org/x/tools/gopls/internal/analysis/modernize/cmd/modernize@latest -fix -test ./... * Override rules_go provided dependency for golang.org/x/tools to v0.38.0. To update this, checked out rules_go, then ran `bazel run //go/tools/releaser -- upgrade-dep -mirror=false org_golang_x_tools` and copied the patches. * Fix buildtag violations and ignore buildtag violations in external * Introduce modernize analyzer package. * Add modernize "any" analyzer. * Fix violations of any analyzer * Add modernize "appendclipped" analyzer. * Fix violations of appendclipped * Add modernize "bloop" analyzer. * Add modernize "fmtappendf" analyzer. * Add modernize "forvar" analyzer. * Add modernize "mapsloop" analyzer. * Add modernize "minmax" analyzer. * Fix violations of minmax analyzer * Add modernize "omitzero" analyzer. * Add modernize "rangeint" analyzer. * Fix violations of rangeint. * Add modernize "reflecttypefor" analyzer. * Fix violations of reflecttypefor analyzer. * Add modernize "slicescontains" analyzer. * Add modernize "slicessort" analyzer. * Add modernize "slicesdelete" analyzer. This is disabled by default for now. See https://go.dev/issue/73686. * Add modernize "stringscutprefix" analyzer. * Add modernize "stringsbuilder" analyzer. * Fix violations of stringsbuilder analyzer. * Add modernize "stringsseq" analyzer. * Add modernize "testingcontext" analyzer. * Add modernize "waitgroup" analyzer. * Changelog fragment * gofmt * gazelle * Add modernize "newexpr" analyzer. * Disable newexpr until go1.26 * Add more details in WORKSPACE on how to update the override * @nalepae feedback on min() * gofmt * Fix violations of forvar
56 lines
1.3 KiB
Go
56 lines
1.3 KiB
Go
//go:build !fuzz
|
|
|
|
package cache
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/OffchainLabs/prysm/v7/testing/assert"
|
|
"github.com/OffchainLabs/prysm/v7/testing/require"
|
|
fuzz "github.com/google/gofuzz"
|
|
)
|
|
|
|
func TestCommitteeKeyFuzz_OK(t *testing.T) {
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
c := &Committees{}
|
|
|
|
for range 100000 {
|
|
fuzzer.Fuzz(c)
|
|
k, err := committeeKeyFn(c)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, key(c.Seed), k)
|
|
}
|
|
}
|
|
|
|
func TestCommitteeCache_FuzzCommitteesByEpoch(t *testing.T) {
|
|
cache := NewCommitteesCache()
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
c := &Committees{}
|
|
|
|
for range 100000 {
|
|
fuzzer.Fuzz(c)
|
|
require.NoError(t, cache.AddCommitteeShuffledList(t.Context(), c))
|
|
_, err := cache.Committee(t.Context(), 0, c.Seed, 0)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
assert.Equal(t, maxCommitteesCacheSize, len(cache.CommitteeCache.Keys()), "Incorrect key size")
|
|
}
|
|
|
|
func TestCommitteeCache_FuzzActiveIndices(t *testing.T) {
|
|
cache := NewCommitteesCache()
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
c := &Committees{}
|
|
|
|
for range 100000 {
|
|
fuzzer.Fuzz(c)
|
|
require.NoError(t, cache.AddCommitteeShuffledList(t.Context(), c))
|
|
|
|
indices, err := cache.ActiveIndices(t.Context(), c.Seed)
|
|
require.NoError(t, err)
|
|
assert.DeepEqual(t, c.SortedIndices, indices)
|
|
}
|
|
|
|
assert.Equal(t, maxCommitteesCacheSize, len(cache.CommitteeCache.Keys()), "Incorrect key size")
|
|
}
|