mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-09 15:37:56 -05:00
* first version - broken * working proto changes * resolve review remarks * fix goimport issues * fix service issues * first logic version-broken * first running version - no new tests * fix validator client test * add wait group to goroutines * remove unused var in function call * fix review remarks and tests * merge master changes and fix conflicts * gazzele fix * fix prestonvanloon requested changes * merge and some of terenc3t remarks addressed * _,pk bug fix in log * fix account file name suffix and filter not active validator out * merge with master and fix missing parameters * run over all public keys in hasvalidators * add test for error when no all the validators has index in the db and hasvalidators is called * fix runner tests fail due to timing issues * goimports * smaller sleep time in proposer tests * fix UpdateAssignments loging * fix goimports * added && false commented TestUpdateAssignments_DoesNothingWhenNotEpochStartAndAlreadyExistingAssignments * hasvalidators without missing publickeys list * fix some of prestone review remarks * fixes for prestone comments * review changes applied * expect context call in TestWaitForActivation_ValidatorOriginallyExists * changed hasvalidators to return true if one validator exists * fix init problem to getkeys * hasvalidators requiers all validators to be in db * validator attest assignments update * fix ap var name * Change name to hasallvalidators * fix tests * update script, fix any vs all validator calls * fix wait for activation * filter validator * reuse the reply block * fix imports * Remove dup * better lookup of active validators * better filter active vlaidators, still need to fix committee assignment tests * lint * use activated keys * fix for postchainstart * fix logging * move state transitions * hasanyvalidator and hasallvalidators * fix tests with updatechainhead missing * add tests * fix TestCommitteeAssignment_OK * fix test * fix validator tests * fix TestCommitteeAssignment_multipleKeys_OK and TestWaitForActivation_ValidatorOriginallyExists * fix goimports * removed unused param from assignment * change string(pk) to hex.EncodeString(pk) fix change requests * add inactive validator status to assignments * fix logging mess due to multi validator setup * set no assignment to debug level * log assignments every epoch * logging fixes * fixed runtime by using the right assignments * correct activation request * fix the validator panic * correct assignment * fix test fail and waitforactivation * performance log issue fix * fix goimports * add log message with truncated pk for attest * add truncated pk to attest and propose logs * Add comment to script, change 9 to 8 * Update assignment log * Add comment, report number of assignments * Use WithError, add validator as field, merge block proposal log * Update validator_propose.go * fix * use entry.String() * fix fmt
102 lines
3.0 KiB
Go
102 lines
3.0 KiB
Go
package client
|
|
|
|
import (
|
|
"context"
|
|
"crypto/rand"
|
|
"encoding/hex"
|
|
"os"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/prysmaticlabs/prysm/shared"
|
|
"github.com/prysmaticlabs/prysm/shared/keystore"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil"
|
|
"github.com/prysmaticlabs/prysm/validator/accounts"
|
|
logTest "github.com/sirupsen/logrus/hooks/test"
|
|
)
|
|
|
|
var _ = shared.Service(&ValidatorService{})
|
|
var validatorKey *keystore.Key
|
|
var keyMap map[string]*keystore.Key
|
|
var keyMapThreeValidators map[string]*keystore.Key
|
|
|
|
func TestMain(m *testing.M) {
|
|
keyMap = make(map[string]*keystore.Key)
|
|
keyMapThreeValidators = make(map[string]*keystore.Key)
|
|
dir := testutil.TempDir() + "/keystore1"
|
|
defer os.RemoveAll(dir)
|
|
accounts.NewValidatorAccount(dir, "1234")
|
|
validatorKey, _ = keystore.NewKey(rand.Reader)
|
|
keyMap[hex.EncodeToString(validatorKey.PublicKey.Marshal())] = validatorKey
|
|
keyMapThreeValidators[hex.EncodeToString(validatorKey.PublicKey.Marshal())] = validatorKey
|
|
validatorKey2, _ := keystore.NewKey(rand.Reader)
|
|
keyMapThreeValidators[hex.EncodeToString(validatorKey.PublicKey.Marshal())] = validatorKey2
|
|
validatorKey3, _ := keystore.NewKey(rand.Reader)
|
|
keyMapThreeValidators[hex.EncodeToString(validatorKey.PublicKey.Marshal())] = validatorKey3
|
|
os.Exit(m.Run())
|
|
}
|
|
|
|
func TestStop_CancelsContext(t *testing.T) {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
vs := &ValidatorService{
|
|
ctx: ctx,
|
|
cancel: cancel,
|
|
}
|
|
|
|
if err := vs.Stop(); err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
select {
|
|
case <-time.After(1 * time.Second):
|
|
t.Error("ctx not cancelled within 1s")
|
|
case <-vs.ctx.Done():
|
|
}
|
|
}
|
|
|
|
func TestLifecycle(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
// Use cancelled context so that the run function exits immediately..
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
cancel()
|
|
validatorService := &ValidatorService{
|
|
ctx: ctx,
|
|
cancel: cancel,
|
|
endpoint: "merkle tries",
|
|
withCert: "alice.crt",
|
|
keys: keyMap,
|
|
}
|
|
validatorService.Start()
|
|
if err := validatorService.Stop(); err != nil {
|
|
t.Fatalf("Could not stop service: %v", err)
|
|
}
|
|
testutil.AssertLogsContain(t, hook, "Stopping service")
|
|
}
|
|
|
|
func TestLifecycle_Insecure(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
// Use cancelled context so that the run function exits immediately.
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
cancel()
|
|
validatorService := &ValidatorService{
|
|
ctx: ctx,
|
|
cancel: cancel,
|
|
endpoint: "merkle tries",
|
|
keys: keyMap,
|
|
}
|
|
validatorService.Start()
|
|
testutil.AssertLogsContain(t, hook, "You are using an insecure gRPC connection")
|
|
if err := validatorService.Stop(); err != nil {
|
|
t.Fatalf("Could not stop service: %v", err)
|
|
}
|
|
testutil.AssertLogsContain(t, hook, "Stopping service")
|
|
}
|
|
|
|
func TestStatus_NoConnectionError(t *testing.T) {
|
|
validatorService := &ValidatorService{}
|
|
if err := validatorService.Status(); !strings.Contains(err.Error(), "no connection") {
|
|
t.Errorf("Expected status check to fail if no connection is found, received: %v", err)
|
|
}
|
|
}
|