Clean up various warnings (#10710)

* Clean up various warnings

* Update beacon-chain/rpc/prysm/v1alpha1/debug/state_test.go

Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com>

* Fix redundant casting genState

Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com>
This commit is contained in:
terencechain
2022-05-18 21:38:04 -07:00
committed by GitHub
parent 1c51f6d1be
commit 092e9e1d19
32 changed files with 112 additions and 117 deletions

View File

@@ -46,10 +46,8 @@ const (
type StateOrBlockId string type StateOrBlockId string
const ( const (
IdFinalized StateOrBlockId = "finalized" IdGenesis StateOrBlockId = "genesis"
IdGenesis StateOrBlockId = "genesis" IdHead StateOrBlockId = "head"
IdHead StateOrBlockId = "head"
IdJustified StateOrBlockId = "justified"
) )
var ErrMalformedHostname = errors.New("hostname must include port, separated by one colon, like example.com:3500") var ErrMalformedHostname = errors.New("hostname must include port, separated by one colon, like example.com:3500")
@@ -60,7 +58,7 @@ func IdFromRoot(r [32]byte) StateOrBlockId {
return StateOrBlockId(fmt.Sprintf("%#x", r)) return StateOrBlockId(fmt.Sprintf("%#x", r))
} }
// IdFromRoot encodes a Slot in the format expected by the API in places where a slot can be used to identify // IdFromSlot encodes a Slot in the format expected by the API in places where a slot can be used to identify
// a BeaconState or SignedBeaconBlock. // a BeaconState or SignedBeaconBlock.
func IdFromSlot(s types.Slot) StateOrBlockId { func IdFromSlot(s types.Slot) StateOrBlockId {
return StateOrBlockId(strconv.FormatUint(uint64(s), 10)) return StateOrBlockId(strconv.FormatUint(uint64(s), 10))

View File

@@ -376,7 +376,7 @@ func (_ *ChainService) HeadGenesisValidatorsRoot() [32]byte {
return [32]byte{} return [32]byte{}
} }
// VerifyBlkDescendant mocks VerifyBlkDescendant and always returns nil. // VerifyFinalizedBlkDescendant mocks VerifyBlkDescendant and always returns nil.
func (s *ChainService) VerifyFinalizedBlkDescendant(_ context.Context, _ [32]byte) error { func (s *ChainService) VerifyFinalizedBlkDescendant(_ context.Context, _ [32]byte) error {
return s.VerifyBlkDescendantErr return s.VerifyBlkDescendantErr
} }
@@ -451,7 +451,7 @@ func (s *ChainService) IsOptimisticForRoot(_ context.Context, _ [32]byte) (bool,
return s.Optimistic, nil return s.Optimistic, nil
} }
// ProcessAttestationsAndUpdateHead mocks the same method in the chain service. // UpdateHead mocks the same method in the chain service.
func (s *ChainService) UpdateHead(_ context.Context) error { return nil } func (s *ChainService) UpdateHead(_ context.Context) error { return nil }
// ReceiveAttesterSlashing mocks the same method in the chain service. // ReceiveAttesterSlashing mocks the same method in the chain service.

View File

@@ -110,7 +110,7 @@ func TestCommitteeCache_CanRotate(t *testing.T) {
sort.Slice(k, func(i, j int) bool { sort.Slice(k, func(i, j int) bool {
return k[i].(string) < k[j].(string) return k[i].(string) < k[j].(string)
}) })
wanted := end - int(maxCommitteesCacheSize) wanted := end - maxCommitteesCacheSize
s := bytesutil.ToBytes32([]byte(strconv.Itoa(wanted))) s := bytesutil.ToBytes32([]byte(strconv.Itoa(wanted)))
assert.Equal(t, key(s), k[0], "incorrect key received for slot 190") assert.Equal(t, key(s), k[0], "incorrect key received for slot 190")

View File

@@ -14,7 +14,7 @@ var ErrNotFoundState = kv.ErrNotFoundState
// ErrNotFoundOriginBlockRoot wraps ErrNotFound for an error specific to the origin block root. // ErrNotFoundOriginBlockRoot wraps ErrNotFound for an error specific to the origin block root.
var ErrNotFoundOriginBlockRoot = kv.ErrNotFoundOriginBlockRoot var ErrNotFoundOriginBlockRoot = kv.ErrNotFoundOriginBlockRoot
// ErrNotFoundOriginBlockRoot wraps ErrNotFound for an error specific to the origin block root. // ErrNotFoundBackfillBlockRoot wraps ErrNotFound for an error specific to the backfill block root.
var ErrNotFoundBackfillBlockRoot = kv.ErrNotFoundBackfillBlockRoot var ErrNotFoundBackfillBlockRoot = kv.ErrNotFoundBackfillBlockRoot
// ErrNotFoundGenesisBlockRoot means no genesis block root was found, indicating the db was not initialized with genesis // ErrNotFoundGenesisBlockRoot means no genesis block root was found, indicating the db was not initialized with genesis

View File

@@ -16,7 +16,7 @@ var ErrNotFoundOriginBlockRoot = errors.Wrap(ErrNotFound, "OriginBlockRoot")
// ErrNotFoundGenesisBlockRoot means no genesis block root was found, indicating the db was not initialized with genesis // ErrNotFoundGenesisBlockRoot means no genesis block root was found, indicating the db was not initialized with genesis
var ErrNotFoundGenesisBlockRoot = errors.Wrap(ErrNotFound, "OriginGenesisRoot") var ErrNotFoundGenesisBlockRoot = errors.Wrap(ErrNotFound, "OriginGenesisRoot")
// ErrNotFoundOriginBlockRoot is an error specifically for the origin block root getter // ErrNotFoundBackfillBlockRoot is an error specifically for the origin block root getter
var ErrNotFoundBackfillBlockRoot = errors.Wrap(ErrNotFound, "BackfillBlockRoot") var ErrNotFoundBackfillBlockRoot = errors.Wrap(ErrNotFound, "BackfillBlockRoot")
// ErrNotFoundFeeRecipient is a not found error specifically for the fee recipient getter // ErrNotFoundFeeRecipient is a not found error specifically for the fee recipient getter

View File

@@ -130,7 +130,7 @@ func TestUpdateSyncCommitteeTrackedVals(t *testing.T) {
func TestNewService(t *testing.T) { func TestNewService(t *testing.T) {
config := &ValidatorMonitorConfig{} config := &ValidatorMonitorConfig{}
tracked := []types.ValidatorIndex{} var tracked []types.ValidatorIndex
ctx := context.Background() ctx := context.Background()
_, err := NewService(ctx, config, tracked) _, err := NewService(ctx, config, tracked)
require.NoError(t, err) require.NoError(t, err)

View File

@@ -2835,50 +2835,50 @@ func TestGetAggregateAttestation(t *testing.T) {
}, },
Signature: sig1, Signature: sig1,
} }
root2_1 := bytesutil.PadTo([]byte("root2_1"), 32) root21 := bytesutil.PadTo([]byte("root2_1"), 32)
sig2_1 := bytesutil.PadTo([]byte("sig2_1"), fieldparams.BLSSignatureLength) sig21 := bytesutil.PadTo([]byte("sig2_1"), fieldparams.BLSSignatureLength)
attSlot2_1 := &ethpbalpha.Attestation{ attslot21 := &ethpbalpha.Attestation{
AggregationBits: []byte{0, 1, 1}, AggregationBits: []byte{0, 1, 1},
Data: &ethpbalpha.AttestationData{ Data: &ethpbalpha.AttestationData{
Slot: 2, Slot: 2,
CommitteeIndex: 2, CommitteeIndex: 2,
BeaconBlockRoot: root2_1, BeaconBlockRoot: root21,
Source: &ethpbalpha.Checkpoint{ Source: &ethpbalpha.Checkpoint{
Epoch: 1, Epoch: 1,
Root: root2_1, Root: root21,
}, },
Target: &ethpbalpha.Checkpoint{ Target: &ethpbalpha.Checkpoint{
Epoch: 1, Epoch: 1,
Root: root2_1, Root: root21,
}, },
}, },
Signature: sig2_1, Signature: sig21,
} }
root2_2 := bytesutil.PadTo([]byte("root2_2"), 32) root22 := bytesutil.PadTo([]byte("root2_2"), 32)
sig2_2 := bytesutil.PadTo([]byte("sig2_2"), fieldparams.BLSSignatureLength) sig22 := bytesutil.PadTo([]byte("sig2_2"), fieldparams.BLSSignatureLength)
attSlot2_2 := &ethpbalpha.Attestation{ attslot22 := &ethpbalpha.Attestation{
AggregationBits: []byte{0, 1, 1, 1}, AggregationBits: []byte{0, 1, 1, 1},
Data: &ethpbalpha.AttestationData{ Data: &ethpbalpha.AttestationData{
Slot: 2, Slot: 2,
CommitteeIndex: 3, CommitteeIndex: 3,
BeaconBlockRoot: root2_2, BeaconBlockRoot: root22,
Source: &ethpbalpha.Checkpoint{ Source: &ethpbalpha.Checkpoint{
Epoch: 1, Epoch: 1,
Root: root2_2, Root: root22,
}, },
Target: &ethpbalpha.Checkpoint{ Target: &ethpbalpha.Checkpoint{
Epoch: 1, Epoch: 1,
Root: root2_2, Root: root22,
}, },
}, },
Signature: sig2_2, Signature: sig22,
} }
vs := &Server{ vs := &Server{
AttestationsPool: &mock.PoolMock{AggregatedAtts: []*ethpbalpha.Attestation{attSlot1, attSlot2_1, attSlot2_2}}, AttestationsPool: &mock.PoolMock{AggregatedAtts: []*ethpbalpha.Attestation{attSlot1, attslot21, attslot22}},
} }
t.Run("OK", func(t *testing.T) { t.Run("OK", func(t *testing.T) {
reqRoot, err := attSlot2_2.Data.HashTreeRoot() reqRoot, err := attslot22.Data.HashTreeRoot()
require.NoError(t, err) require.NoError(t, err)
req := &ethpbv1.AggregateAttestationRequest{ req := &ethpbv1.AggregateAttestationRequest{
AttestationDataRoot: reqRoot[:], AttestationDataRoot: reqRoot[:],
@@ -2889,16 +2889,16 @@ func TestGetAggregateAttestation(t *testing.T) {
require.NotNil(t, att) require.NotNil(t, att)
require.NotNil(t, att.Data) require.NotNil(t, att.Data)
assert.DeepEqual(t, bitfield.Bitlist{0, 1, 1, 1}, att.Data.AggregationBits) assert.DeepEqual(t, bitfield.Bitlist{0, 1, 1, 1}, att.Data.AggregationBits)
assert.DeepEqual(t, sig2_2, att.Data.Signature) assert.DeepEqual(t, sig22, att.Data.Signature)
assert.Equal(t, types.Slot(2), att.Data.Data.Slot) assert.Equal(t, types.Slot(2), att.Data.Data.Slot)
assert.Equal(t, types.CommitteeIndex(3), att.Data.Data.Index) assert.Equal(t, types.CommitteeIndex(3), att.Data.Data.Index)
assert.DeepEqual(t, root2_2, att.Data.Data.BeaconBlockRoot) assert.DeepEqual(t, root22, att.Data.Data.BeaconBlockRoot)
require.NotNil(t, att.Data.Data.Source) require.NotNil(t, att.Data.Data.Source)
assert.Equal(t, types.Epoch(1), att.Data.Data.Source.Epoch) assert.Equal(t, types.Epoch(1), att.Data.Data.Source.Epoch)
assert.DeepEqual(t, root2_2, att.Data.Data.Source.Root) assert.DeepEqual(t, root22, att.Data.Data.Source.Root)
require.NotNil(t, att.Data.Data.Target) require.NotNil(t, att.Data.Data.Target)
assert.Equal(t, types.Epoch(1), att.Data.Data.Target.Epoch) assert.Equal(t, types.Epoch(1), att.Data.Data.Target.Epoch)
assert.DeepEqual(t, root2_2, att.Data.Data.Target.Root) assert.DeepEqual(t, root22, att.Data.Data.Target.Root)
}) })
t.Run("No matching attestation", func(t *testing.T) { t.Run("No matching attestation", func(t *testing.T) {

View File

@@ -50,7 +50,6 @@ go_test(
"//beacon-chain/db/testing:go_default_library", "//beacon-chain/db/testing:go_default_library",
"//beacon-chain/forkchoice/protoarray:go_default_library", "//beacon-chain/forkchoice/protoarray:go_default_library",
"//beacon-chain/p2p/testing:go_default_library", "//beacon-chain/p2p/testing:go_default_library",
"//beacon-chain/state:go_default_library",
"//beacon-chain/state/stategen:go_default_library", "//beacon-chain/state/stategen:go_default_library",
"//beacon-chain/state/stategen/mock:go_default_library", "//beacon-chain/state/stategen/mock:go_default_library",
"//config/fieldparams:go_default_library", "//config/fieldparams:go_default_library",

View File

@@ -7,7 +7,6 @@ import (
mock "github.com/prysmaticlabs/prysm/beacon-chain/blockchain/testing" mock "github.com/prysmaticlabs/prysm/beacon-chain/blockchain/testing"
dbTest "github.com/prysmaticlabs/prysm/beacon-chain/db/testing" dbTest "github.com/prysmaticlabs/prysm/beacon-chain/db/testing"
"github.com/prysmaticlabs/prysm/beacon-chain/state"
"github.com/prysmaticlabs/prysm/beacon-chain/state/stategen" "github.com/prysmaticlabs/prysm/beacon-chain/state/stategen"
mockstategen "github.com/prysmaticlabs/prysm/beacon-chain/state/stategen/mock" mockstategen "github.com/prysmaticlabs/prysm/beacon-chain/state/stategen/mock"
types "github.com/prysmaticlabs/prysm/consensus-types/primitives" types "github.com/prysmaticlabs/prysm/consensus-types/primitives"
@@ -83,10 +82,9 @@ func TestServer_GetBeaconState(t *testing.T) {
Slot: slot + 1, Slot: slot + 1,
}, },
} }
state := state.BeaconState(st)
// since we are requesting a state at a skipped slot, use the same method as stategen // since we are requesting a state at a skipped slot, use the same method as stategen
// to advance to the pre-state for the subsequent slot // to advance to the pre-state for the subsequent slot
state, err = stategen.ReplayProcessSlots(ctx, state, slot+1) state, err := stategen.ReplayProcessSlots(ctx, st, slot+1)
require.NoError(t, err) require.NoError(t, err)
wanted, err = state.MarshalSSZ() wanted, err = state.MarshalSSZ()
require.NoError(t, err) require.NoError(t, err)

View File

@@ -4,7 +4,7 @@ import (
"math/big" "math/big"
) )
// MockGenesisTimeFetcher is a fake implementation of the powchain.ChainInfoFetcher // MockPOWChainInfoFetcher is a fake implementation of the powchain.ChainInfoFetcher
type MockPOWChainInfoFetcher struct { type MockPOWChainInfoFetcher struct {
CurrEndpoint string CurrEndpoint string
CurrError error CurrError error
@@ -12,11 +12,11 @@ type MockPOWChainInfoFetcher struct {
Errors []error Errors []error
} }
func (m *MockPOWChainInfoFetcher) Eth2GenesisPowchainInfo() (uint64, *big.Int) { func (*MockPOWChainInfoFetcher) Eth2GenesisPowchainInfo() (uint64, *big.Int) {
return uint64(0), &big.Int{} return uint64(0), &big.Int{}
} }
func (m *MockPOWChainInfoFetcher) IsConnectedToETH1() bool { func (*MockPOWChainInfoFetcher) IsConnectedToETH1() bool {
return true return true
} }

View File

@@ -134,7 +134,7 @@ func (f *FieldTrie) RecomputeTrie(indices []uint64, elements interface{}) ([32]b
} }
// We remove the duplicates here in order to prevent // We remove the duplicates here in order to prevent
// duplicated insertions into the trie. // duplicated insertions into the trie.
newIndices := []uint64{} var newIndices []uint64
indexExists := make(map[uint64]bool) indexExists := make(map[uint64]bool)
newRoots := make([][32]byte, 0, len(fieldRoots)/iNumOfElems) newRoots := make([][32]byte, 0, len(fieldRoots)/iNumOfElems)
for i, idx := range indices { for i, idx := range indices {

View File

@@ -374,7 +374,7 @@ func handleBalanceSlice(val, indices []uint64, convertAll bool) ([][32]byte, err
if err != nil { if err != nil {
return nil, err return nil, err
} }
roots := [][32]byte{} var roots [][32]byte
for _, idx := range indices { for _, idx := range indices {
// We split the indexes into their relevant groups. Balances // We split the indexes into their relevant groups. Balances
// are compressed according to 4 values -> 1 chunk. // are compressed according to 4 values -> 1 chunk.

View File

@@ -10,7 +10,7 @@ var _ fssz.HashRoot = (HistoricalRoots)([][32]byte{})
var _ fssz.Marshaler = (*HistoricalRoots)(nil) var _ fssz.Marshaler = (*HistoricalRoots)(nil)
var _ fssz.Unmarshaler = (*HistoricalRoots)(nil) var _ fssz.Unmarshaler = (*HistoricalRoots)(nil)
// Byte32 represents a 32 bytes HistoricalRoots object in Ethereum beacon chain consensus. // HistoricalRoots represents a 32 bytes HistoricalRoots object in Ethereum beacon chain consensus.
type HistoricalRoots [][32]byte type HistoricalRoots [][32]byte
// HashTreeRoot returns calculated hash root. // HashTreeRoot returns calculated hash root.

View File

@@ -23,7 +23,7 @@ func NewMockService() *MockStateManager {
} }
} }
// StateByRootIfCachedNoCopy // StateByRootIfCachedNoCopy --
func (_ *MockStateManager) StateByRootIfCachedNoCopy(_ [32]byte) state.BeaconState { func (_ *MockStateManager) StateByRootIfCachedNoCopy(_ [32]byte) state.BeaconState {
panic("implement me") panic("implement me")
} }

View File

@@ -13,14 +13,14 @@ func TestCommitteeIndex_Casting(t *testing.T) {
t.Errorf("Unequal: %v = %v", CommitteeIndex(x1), committeeIdx) t.Errorf("Unequal: %v = %v", CommitteeIndex(x1), committeeIdx)
} }
var x2 float64 = 42.2 var x2 = 42.2
if CommitteeIndex(x2) != committeeIdx { if CommitteeIndex(x2) != committeeIdx {
t.Errorf("Unequal: %v = %v", CommitteeIndex(x2), committeeIdx) t.Errorf("Unequal: %v = %v", CommitteeIndex(x2), committeeIdx)
} }
}) })
t.Run("int", func(t *testing.T) { t.Run("int", func(t *testing.T) {
var x int = 42 var x = 42
if CommitteeIndex(x) != committeeIdx { if CommitteeIndex(x) != committeeIdx {
t.Errorf("Unequal: %v = %v", CommitteeIndex(x), committeeIdx) t.Errorf("Unequal: %v = %v", CommitteeIndex(x), committeeIdx)
} }

View File

@@ -25,14 +25,14 @@ func TestSlot_Casting(t *testing.T) {
t.Errorf("Unequal: %v = %v", types.Slot(x1), slot) t.Errorf("Unequal: %v = %v", types.Slot(x1), slot)
} }
var x2 float64 = 42.2 var x2 = 42.2
if types.Slot(x2) != slot { if types.Slot(x2) != slot {
t.Errorf("Unequal: %v = %v", types.Slot(x2), slot) t.Errorf("Unequal: %v = %v", types.Slot(x2), slot)
} }
}) })
t.Run("int", func(t *testing.T) { t.Run("int", func(t *testing.T) {
var x int = 42 var x = 42
if types.Slot(x) != slot { if types.Slot(x) != slot {
t.Errorf("Unequal: %v = %v", types.Slot(x), slot) t.Errorf("Unequal: %v = %v", types.Slot(x), slot)
} }

View File

@@ -20,14 +20,14 @@ func TestValidatorIndex_Casting(t *testing.T) {
t.Errorf("Unequal: %v = %v", ValidatorIndex(x1), valIdx) t.Errorf("Unequal: %v = %v", ValidatorIndex(x1), valIdx)
} }
var x2 float64 = 42.2 var x2 = 42.2
if ValidatorIndex(x2) != valIdx { if ValidatorIndex(x2) != valIdx {
t.Errorf("Unequal: %v = %v", ValidatorIndex(x2), valIdx) t.Errorf("Unequal: %v = %v", ValidatorIndex(x2), valIdx)
} }
}) })
t.Run("int", func(t *testing.T) { t.Run("int", func(t *testing.T) {
var x int = 42 var x = 42
if ValidatorIndex(x) != valIdx { if ValidatorIndex(x) != valIdx {
t.Errorf("Unequal: %v = %v", ValidatorIndex(x), valIdx) t.Errorf("Unequal: %v = %v", ValidatorIndex(x), valIdx)
} }

View File

@@ -191,7 +191,7 @@ func TestBellatrixBeaconBlock_IsNil(t *testing.T) {
assert.Equal(t, false, wb.IsNil()) assert.Equal(t, false, wb.IsNil())
} }
func TesTBellatrixBeaconBlock_IsBlinded(t *testing.T) { func TestBellatrixBeaconBlock_IsBlinded(t *testing.T) {
wsb, err := wrapper.WrappedBeaconBlock(&ethpb.BeaconBlockBellatrix{}) wsb, err := wrapper.WrappedBeaconBlock(&ethpb.BeaconBlockBellatrix{})
require.NoError(t, err) require.NoError(t, err)
require.Equal(t, false, wsb.IsNil()) require.Equal(t, false, wsb.IsNil())

View File

@@ -4,7 +4,7 @@ import (
"github.com/ethereum/go-ethereum/accounts/abi/bind" "github.com/ethereum/go-ethereum/accounts/abi/bind"
) )
// NewDepositContractcallFromBoundContract creates a new instance of DepositContractCaller, bound to // NewDepositContractCallerFromBoundContract creates a new instance of DepositContractCaller, bound to
// a specific deployed contract. // a specific deployed contract.
func NewDepositContractCallerFromBoundContract(contract *bind.BoundContract) DepositContractCaller { func NewDepositContractCallerFromBoundContract(contract *bind.BoundContract) DepositContractCaller {
return DepositContractCaller{contract: contract} return DepositContractCaller{contract: contract}

View File

@@ -44,7 +44,7 @@ func TestAggregateVerify(t *testing.T) {
func TestAggregateVerify_CompressedSignatures(t *testing.T) { func TestAggregateVerify_CompressedSignatures(t *testing.T) {
pubkeys := make([]common.PublicKey, 0, 100) pubkeys := make([]common.PublicKey, 0, 100)
sigs := make([]common.Signature, 0, 100) sigs := make([]common.Signature, 0, 100)
sigBytes := [][]byte{} var sigBytes [][]byte
var msgs [][32]byte var msgs [][32]byte
for i := 0; i < 100; i++ { for i := 0; i < 100; i++ {
msg := [32]byte{'h', 'e', 'l', 'l', 'o', byte(i)} msg := [32]byte{'h', 'e', 'l', 'l', 'o', byte(i)}

View File

@@ -49,7 +49,7 @@ func TestCopySignatureSet(t *testing.T) {
} }
func TestSignatureBatch_RemoveDuplicates(t *testing.T) { func TestSignatureBatch_RemoveDuplicates(t *testing.T) {
keys := []SecretKey{} var keys []SecretKey
for i := 0; i < 100; i++ { for i := 0; i < 100; i++ {
key, err := RandKey() key, err := RandKey()
assert.NoError(t, err) assert.NoError(t, err)
@@ -73,9 +73,9 @@ func TestSignatureBatch_RemoveDuplicates(t *testing.T) {
chosenKeys := keys[:20] chosenKeys := keys[:20]
msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'} msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'}
signatures := [][]byte{} var signatures [][]byte
messages := [][32]byte{} var messages [][32]byte
pubs := []PublicKey{} var pubs []PublicKey
for _, k := range chosenKeys { for _, k := range chosenKeys {
s := k.Sign(msg[:]) s := k.Sign(msg[:])
signatures = append(signatures, s.Marshal()) signatures = append(signatures, s.Marshal())
@@ -105,9 +105,9 @@ func TestSignatureBatch_RemoveDuplicates(t *testing.T) {
msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'} msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'}
msg1 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '1'} msg1 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '1'}
msg2 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '2'} msg2 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '2'}
signatures := [][]byte{} var signatures [][]byte
messages := [][32]byte{} var messages [][32]byte
pubs := []PublicKey{} var pubs []PublicKey
for _, k := range chosenKeys[:10] { for _, k := range chosenKeys[:10] {
s := k.Sign(msg[:]) s := k.Sign(msg[:])
signatures = append(signatures, s.Marshal()) signatures = append(signatures, s.Marshal())
@@ -149,9 +149,9 @@ func TestSignatureBatch_RemoveDuplicates(t *testing.T) {
msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'} msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'}
msg1 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '1'} msg1 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '1'}
msg2 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '2'} msg2 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '2'}
signatures := [][]byte{} var signatures [][]byte
messages := [][32]byte{} var messages [][32]byte
pubs := []PublicKey{} var pubs []PublicKey
for _, k := range chosenKeys[:10] { for _, k := range chosenKeys[:10] {
s := k.Sign(msg[:]) s := k.Sign(msg[:])
signatures = append(signatures, s.Marshal()) signatures = append(signatures, s.Marshal())
@@ -190,9 +190,9 @@ func TestSignatureBatch_RemoveDuplicates(t *testing.T) {
msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'} msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'}
msg1 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '1'} msg1 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '1'}
msg2 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '2'} msg2 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '2'}
signatures := [][]byte{} var signatures [][]byte
messages := [][32]byte{} var messages [][32]byte
pubs := []PublicKey{} var pubs []PublicKey
for _, k := range chosenKeys[:10] { for _, k := range chosenKeys[:10] {
s := k.Sign(msg[:]) s := k.Sign(msg[:])
signatures = append(signatures, s.Marshal()) signatures = append(signatures, s.Marshal())
@@ -242,9 +242,9 @@ func TestSignatureBatch_RemoveDuplicates(t *testing.T) {
msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'} msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'}
msg1 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '1'} msg1 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '1'}
msg2 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '2'} msg2 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '2'}
signatures := [][]byte{} var signatures [][]byte
messages := [][32]byte{} var messages [][32]byte
pubs := []PublicKey{} var pubs []PublicKey
for _, k := range chosenKeys[:10] { for _, k := range chosenKeys[:10] {
s := k.Sign(msg[:]) s := k.Sign(msg[:])
signatures = append(signatures, s.Marshal()) signatures = append(signatures, s.Marshal())
@@ -328,7 +328,7 @@ func TestSignatureBatch_RemoveDuplicates(t *testing.T) {
} }
func TestSignatureBatch_AggregateBatch(t *testing.T) { func TestSignatureBatch_AggregateBatch(t *testing.T) {
keys := []SecretKey{} var keys []SecretKey
for i := 0; i < 100; i++ { for i := 0; i < 100; i++ {
key, err := RandKey() key, err := RandKey()
assert.NoError(t, err) assert.NoError(t, err)
@@ -353,9 +353,9 @@ func TestSignatureBatch_AggregateBatch(t *testing.T) {
chosenKeys := keys[:20] chosenKeys := keys[:20]
msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'} msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'}
signatures := [][]byte{} var signatures [][]byte
messages := [][32]byte{} var messages [][32]byte
pubs := []PublicKey{} var pubs []PublicKey
for _, k := range chosenKeys { for _, k := range chosenKeys {
s := k.Sign(msg[:]) s := k.Sign(msg[:])
signatures = append(signatures, s.Marshal()) signatures = append(signatures, s.Marshal())
@@ -383,9 +383,9 @@ func TestSignatureBatch_AggregateBatch(t *testing.T) {
chosenKeys := keys[:20] chosenKeys := keys[:20]
msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'} msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'}
signatures := [][]byte{} var signatures [][]byte
messages := [][32]byte{} var messages [][32]byte
pubs := []PublicKey{} var pubs []PublicKey
for _, k := range chosenKeys { for _, k := range chosenKeys {
s := k.Sign(msg[:]) s := k.Sign(msg[:])
signatures = append(signatures, s.Marshal()) signatures = append(signatures, s.Marshal())
@@ -409,9 +409,9 @@ func TestSignatureBatch_AggregateBatch(t *testing.T) {
msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'} msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'}
msg1 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '1'} msg1 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '1'}
msg2 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '2'} msg2 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '2'}
signatures := [][]byte{} var signatures [][]byte
messages := [][32]byte{} var messages [][32]byte
pubs := []PublicKey{} var pubs []PublicKey
for _, k := range chosenKeys[:10] { for _, k := range chosenKeys[:10] {
s := k.Sign(msg[:]) s := k.Sign(msg[:])
signatures = append(signatures, s.Marshal()) signatures = append(signatures, s.Marshal())
@@ -459,9 +459,9 @@ func TestSignatureBatch_AggregateBatch(t *testing.T) {
msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'} msg := [32]byte{'r', 'a', 'n', 'd', 'o', 'm'}
msg1 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '1'} msg1 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '1'}
msg2 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '2'} msg2 := [32]byte{'r', 'a', 'n', 'd', 'o', 'm', '2'}
signatures := [][]byte{} var signatures [][]byte
messages := [][32]byte{} var messages [][32]byte
pubs := []PublicKey{} var pubs []PublicKey
for _, k := range chosenKeys[:10] { for _, k := range chosenKeys[:10] {
s := k.Sign(msg[:]) s := k.Sign(msg[:])
signatures = append(signatures, s.Marshal()) signatures = append(signatures, s.Marshal())
@@ -485,7 +485,7 @@ func TestSignatureBatch_AggregateBatch(t *testing.T) {
messages[15][31] ^= byte(100) messages[15][31] ^= byte(100)
messages[25][31] ^= byte(100) messages[25][31] ^= byte(100)
newSigs := [][]byte{} var newSigs [][]byte
newSigs = append(newSigs, signatures[:5]...) newSigs = append(newSigs, signatures[:5]...)
newSigs = append(newSigs, signatures[6:10]...) newSigs = append(newSigs, signatures[6:10]...)
@@ -504,7 +504,7 @@ func TestSignatureBatch_AggregateBatch(t *testing.T) {
aggSig3, err := AggregateCompressedSignatures(newSigs) aggSig3, err := AggregateCompressedSignatures(newSigs)
assert.NoError(t, err) assert.NoError(t, err)
newPubs := []PublicKey{} var newPubs []PublicKey
newPubs = append(newPubs, pubs[:5]...) newPubs = append(newPubs, pubs[:5]...)
newPubs = append(newPubs, pubs[6:10]...) newPubs = append(newPubs, pubs[6:10]...)

View File

@@ -78,7 +78,7 @@ type LighthouseBeaconNode struct {
enr string enr string
} }
// NewBeaconNode creates and returns a beacon node. // NewLighthouseBeaconNode creates and returns a lighthouse beacon node.
func NewLighthouseBeaconNode(config *e2etypes.E2EConfig, index int, enr string) *LighthouseBeaconNode { func NewLighthouseBeaconNode(config *e2etypes.E2EConfig, index int, enr string) *LighthouseBeaconNode {
return &LighthouseBeaconNode{ return &LighthouseBeaconNode{
config: config, config: config,

View File

@@ -125,9 +125,9 @@ func validatorsParticipating(conns ...*grpc.ClientConn) error {
if err != nil { if err != nil {
return errors.Wrap(err, "failed to get beacon state") return errors.Wrap(err, "failed to get beacon state")
} }
missSrcVals := []uint64{} var missSrcVals []uint64
missTgtVals := []uint64{} var missTgtVals []uint64
missHeadVals := []uint64{} var missHeadVals []uint64
switch obj := st.Data.State.(type) { switch obj := st.Data.State.(type) {
case *eth.BeaconStateContainer_Phase0State: case *eth.BeaconStateContainer_Phase0State:
// Do Nothing // Do Nothing
@@ -273,9 +273,9 @@ func findMissingValidators(participation []byte) ([]uint64, []uint64, []uint64,
sourceFlagIndex := cfg.TimelySourceFlagIndex sourceFlagIndex := cfg.TimelySourceFlagIndex
targetFlagIndex := cfg.TimelyTargetFlagIndex targetFlagIndex := cfg.TimelyTargetFlagIndex
headFlagIndex := cfg.TimelyHeadFlagIndex headFlagIndex := cfg.TimelyHeadFlagIndex
missingSourceValidators := []uint64{} var missingSourceValidators []uint64
missingHeadValidators := []uint64{} var missingHeadValidators []uint64
missingTargetValidators := []uint64{} var missingTargetValidators []uint64
for i, b := range participation { for i, b := range participation {
hasSource, err := altair.HasValidatorFlag(b, sourceFlagIndex) hasSource, err := altair.HasValidatorFlag(b, sourceFlagIndex)
if err != nil { if err != nil {

View File

@@ -78,7 +78,7 @@ func GenerateAttestations(
if err != nil { if err != nil {
return nil, err return nil, err
} }
headState = state.BeaconState(genState) headState = genState
case version.Altair: case version.Altair:
pbState, err := v2.ProtobufBeaconState(bState.CloneInnerState()) pbState, err := v2.ProtobufBeaconState(bState.CloneInnerState())
if err != nil { if err != nil {
@@ -88,7 +88,7 @@ func GenerateAttestations(
if err != nil { if err != nil {
return nil, err return nil, err
} }
headState = state.BeaconState(genState) headState = genState
default: default:
return nil, errors.New("state type isn't supported") return nil, errors.New("state type isn't supported")
} }

View File

@@ -12,7 +12,7 @@ import (
ethpbservice "github.com/prysmaticlabs/prysm/proto/eth/service" ethpbservice "github.com/prysmaticlabs/prysm/proto/eth/service"
) )
// Deletes the accounts that the user requests to be deleted from the wallet. // Delete the accounts that the user requests to be deleted from the wallet.
func (acm *AccountsCLIManager) Delete(ctx context.Context) error { func (acm *AccountsCLIManager) Delete(ctx context.Context) error {
rawPublicKeys := make([][]byte, len(acm.filteredPubKeys)) rawPublicKeys := make([][]byte, len(acm.filteredPubKeys))
formattedPubKeys := make([]string, len(acm.filteredPubKeys)) formattedPubKeys := make([]string, len(acm.filteredPubKeys))

View File

@@ -82,7 +82,7 @@ func TestUpdateLogAggregateStats(t *testing.T) {
if i == len(responses)-1 { // Handle last log. if i == len(responses)-1 { // Handle last log.
hook = logTest.NewGlobal() hook = logTest.NewGlobal()
} }
v.UpdateLogAggregateStats(val, types.Slot(params.BeaconConfig().SlotsPerEpoch*types.Slot(i+1))) v.UpdateLogAggregateStats(val, params.BeaconConfig().SlotsPerEpoch*types.Slot(i+1))
} }
require.LogsContain(t, hook, "msg=\"Previous epoch aggregated voting summary\" attestationInclusionPct=\"67%\" "+ require.LogsContain(t, hook, "msg=\"Previous epoch aggregated voting summary\" attestationInclusionPct=\"67%\" "+

View File

@@ -241,7 +241,7 @@ func (v *ValidatorService) Status() error {
return nil return nil
} }
// UseInteropKeys returns the useInteropKeys flag. // InteropKeysConfig returns the useInteropKeys flag.
func (v *ValidatorService) InteropKeysConfig() *local.InteropKeymanagerConfig { func (v *ValidatorService) InteropKeysConfig() *local.InteropKeymanagerConfig {
return v.interopKeysConfig return v.interopKeysConfig
} }

View File

@@ -62,7 +62,7 @@ func (fv *FakeValidator) Done() {
fv.DoneCalled = true fv.DoneCalled = true
} }
// WaitForWalletInitialization for mocking. // WaitForKeymanagerInitialization for mocking.
func (fv *FakeValidator) WaitForKeymanagerInitialization(_ context.Context) error { func (fv *FakeValidator) WaitForKeymanagerInitialization(_ context.Context) error {
fv.WaitForWalletInitializationCalled = true fv.WaitForWalletInitializationCalled = true
return nil return nil

View File

@@ -170,12 +170,12 @@ func MapProposerSlashing(slashing *ethpb.ProposerSlashing) (*ProposerSlashing, e
return nil, errors.Wrap(err, "could not map signed header 2") return nil, errors.Wrap(err, "could not map signed header 2")
} }
return &ProposerSlashing{ return &ProposerSlashing{
SignedHeader_1: signedHeader1, Signedheader1: signedHeader1,
SignedHeader_2: signedHeader2, Signedheader2: signedHeader2,
}, nil }, nil
} }
// MapAttesterSlashing maps the eth2.AttesterSlashing proto to the Web3Signer spec. // MapSignedBeaconBlockHeader maps the eth2.AttesterSlashing proto to the Web3Signer spec.
func MapSignedBeaconBlockHeader(signedHeader *ethpb.SignedBeaconBlockHeader) (*SignedBeaconBlockHeader, error) { func MapSignedBeaconBlockHeader(signedHeader *ethpb.SignedBeaconBlockHeader) (*SignedBeaconBlockHeader, error) {
if signedHeader == nil { if signedHeader == nil {
return nil, fmt.Errorf("signed beacon block header is nil") return nil, fmt.Errorf("signed beacon block header is nil")
@@ -217,8 +217,8 @@ func MapAttesterSlashing(slashing *ethpb.AttesterSlashing) (*AttesterSlashing, e
return nil, errors.Wrap(err, "could not map attestation 2") return nil, errors.Wrap(err, "could not map attestation 2")
} }
return &AttesterSlashing{ return &AttesterSlashing{
Attestation_1: attestation1, Attestation1: attestation1,
Attestation_2: attestation2, Attestation2: attestation2,
}, nil }, nil
} }

View File

@@ -195,8 +195,8 @@ func TestMapAttesterSlashing(t *testing.T) {
}, },
}, },
want: &v1.AttesterSlashing{ want: &v1.AttesterSlashing{
Attestation_1: mock.MockIndexedAttestation(), Attestation1: mock.MockIndexedAttestation(),
Attestation_2: mock.MockIndexedAttestation(), Attestation2: mock.MockIndexedAttestation(),
}, },
wantErr: false, wantErr: false,
}, },
@@ -208,8 +208,8 @@ func TestMapAttesterSlashing(t *testing.T) {
t.Errorf("MapAttesterSlashing() error = %v, wantErr %v", err, tt.wantErr) t.Errorf("MapAttesterSlashing() error = %v, wantErr %v", err, tt.wantErr)
return return
} }
if !reflect.DeepEqual(got.Attestation_1, tt.want.Attestation_1) { if !reflect.DeepEqual(got.Attestation1, tt.want.Attestation1) {
t.Errorf("MapAttesterSlashing() got = %v, want %v", got.Attestation_1, tt.want.Attestation_1) t.Errorf("MapAttesterSlashing() got = %v, want %v", got.Attestation1, tt.want.Attestation1)
} }
}) })
} }

View File

@@ -633,7 +633,7 @@ func MockBeaconBlockAltair() *v1.BeaconBlockAltair {
Graffiti: hexutil.Encode(make([]byte, 32)), Graffiti: hexutil.Encode(make([]byte, 32)),
ProposerSlashings: []*v1.ProposerSlashing{ ProposerSlashings: []*v1.ProposerSlashing{
{ {
SignedHeader_1: &v1.SignedBeaconBlockHeader{ Signedheader1: &v1.SignedBeaconBlockHeader{
Message: &v1.BeaconBlockHeader{ Message: &v1.BeaconBlockHeader{
Slot: "0", Slot: "0",
ProposerIndex: "0", ProposerIndex: "0",
@@ -643,7 +643,7 @@ func MockBeaconBlockAltair() *v1.BeaconBlockAltair {
}, },
Signature: hexutil.Encode(make([]byte, fieldparams.BLSSignatureLength)), Signature: hexutil.Encode(make([]byte, fieldparams.BLSSignatureLength)),
}, },
SignedHeader_2: &v1.SignedBeaconBlockHeader{ Signedheader2: &v1.SignedBeaconBlockHeader{
Message: &v1.BeaconBlockHeader{ Message: &v1.BeaconBlockHeader{
Slot: "0", Slot: "0",
ProposerIndex: "0", ProposerIndex: "0",
@@ -657,8 +657,8 @@ func MockBeaconBlockAltair() *v1.BeaconBlockAltair {
}, },
AttesterSlashings: []*v1.AttesterSlashing{ AttesterSlashings: []*v1.AttesterSlashing{
{ {
Attestation_1: MockIndexedAttestation(), Attestation1: MockIndexedAttestation(),
Attestation_2: MockIndexedAttestation(), Attestation2: MockIndexedAttestation(),
}, },
}, },
Attestations: []*v1.Attestation{ Attestations: []*v1.Attestation{
@@ -703,7 +703,7 @@ func MockBeaconBlockBody() *v1.BeaconBlockBody {
Graffiti: hexutil.Encode(make([]byte, 32)), Graffiti: hexutil.Encode(make([]byte, 32)),
ProposerSlashings: []*v1.ProposerSlashing{ ProposerSlashings: []*v1.ProposerSlashing{
{ {
SignedHeader_1: &v1.SignedBeaconBlockHeader{ Signedheader1: &v1.SignedBeaconBlockHeader{
Message: &v1.BeaconBlockHeader{ Message: &v1.BeaconBlockHeader{
Slot: "0", Slot: "0",
ProposerIndex: "0", ProposerIndex: "0",
@@ -713,7 +713,7 @@ func MockBeaconBlockBody() *v1.BeaconBlockBody {
}, },
Signature: hexutil.Encode(make([]byte, fieldparams.BLSSignatureLength)), Signature: hexutil.Encode(make([]byte, fieldparams.BLSSignatureLength)),
}, },
SignedHeader_2: &v1.SignedBeaconBlockHeader{ Signedheader2: &v1.SignedBeaconBlockHeader{
Message: &v1.BeaconBlockHeader{ Message: &v1.BeaconBlockHeader{
Slot: "0", Slot: "0",
ProposerIndex: "0", ProposerIndex: "0",
@@ -727,8 +727,8 @@ func MockBeaconBlockBody() *v1.BeaconBlockBody {
}, },
AttesterSlashings: []*v1.AttesterSlashing{ AttesterSlashings: []*v1.AttesterSlashing{
{ {
Attestation_1: MockIndexedAttestation(), Attestation1: MockIndexedAttestation(),
Attestation_2: MockIndexedAttestation(), Attestation2: MockIndexedAttestation(),
}, },
}, },
Attestations: []*v1.Attestation{ Attestations: []*v1.Attestation{

View File

@@ -10,7 +10,7 @@ type AggregationSlotSignRequest struct {
AggregationSlot *AggregationSlot `json:"aggregation_slot" validate:"required"` AggregationSlot *AggregationSlot `json:"aggregation_slot" validate:"required"`
} }
// AggregationSlotSignRequest is a request object for web3signer sign api. // AggregateAndProofSignRequest is a request object for web3signer sign api.
type AggregateAndProofSignRequest struct { type AggregateAndProofSignRequest struct {
Type string `json:"type" validate:"required"` Type string `json:"type" validate:"required"`
ForkInfo *ForkInfo `json:"fork_info" validate:"required"` ForkInfo *ForkInfo `json:"fork_info" validate:"required"`
@@ -183,9 +183,9 @@ type Eth1Data struct {
// ProposerSlashing a sub property of BeaconBlockBody. // ProposerSlashing a sub property of BeaconBlockBody.
type ProposerSlashing struct { type ProposerSlashing struct {
// Prysm uses Header_1 but web3signer uses signed_header_1. // Prysm uses Header_1 but web3signer uses signed_header_1.
SignedHeader_1 *SignedBeaconBlockHeader `json:"signed_header_1"` Signedheader1 *SignedBeaconBlockHeader `json:"signed_header_1"`
// Prysm uses Header_2 but web3signer uses signed_header_2. // Prysm uses Header_2 but web3signer uses signed_header_2.
SignedHeader_2 *SignedBeaconBlockHeader `json:"signed_header_2"` Signedheader2 *SignedBeaconBlockHeader `json:"signed_header_2"`
} }
// SignedBeaconBlockHeader is a sub property of ProposerSlashing. // SignedBeaconBlockHeader is a sub property of ProposerSlashing.
@@ -205,8 +205,8 @@ type BeaconBlockHeader struct {
// AttesterSlashing a sub property of BeaconBlockBody. // AttesterSlashing a sub property of BeaconBlockBody.
type AttesterSlashing struct { type AttesterSlashing struct {
Attestation_1 *IndexedAttestation `json:"attestation_1"` Attestation1 *IndexedAttestation `json:"attestation_1"`
Attestation_2 *IndexedAttestation `json:"attestation_2"` Attestation2 *IndexedAttestation `json:"attestation_2"`
} }
// IndexedAttestation a sub property of AttesterSlashing. // IndexedAttestation a sub property of AttesterSlashing.