mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-07 22:54:17 -05:00
* Ran gopls modernize to fix everything go run golang.org/x/tools/gopls/internal/analysis/modernize/cmd/modernize@latest -fix -test ./... * Override rules_go provided dependency for golang.org/x/tools to v0.38.0. To update this, checked out rules_go, then ran `bazel run //go/tools/releaser -- upgrade-dep -mirror=false org_golang_x_tools` and copied the patches. * Fix buildtag violations and ignore buildtag violations in external * Introduce modernize analyzer package. * Add modernize "any" analyzer. * Fix violations of any analyzer * Add modernize "appendclipped" analyzer. * Fix violations of appendclipped * Add modernize "bloop" analyzer. * Add modernize "fmtappendf" analyzer. * Add modernize "forvar" analyzer. * Add modernize "mapsloop" analyzer. * Add modernize "minmax" analyzer. * Fix violations of minmax analyzer * Add modernize "omitzero" analyzer. * Add modernize "rangeint" analyzer. * Fix violations of rangeint. * Add modernize "reflecttypefor" analyzer. * Fix violations of reflecttypefor analyzer. * Add modernize "slicescontains" analyzer. * Add modernize "slicessort" analyzer. * Add modernize "slicesdelete" analyzer. This is disabled by default for now. See https://go.dev/issue/73686. * Add modernize "stringscutprefix" analyzer. * Add modernize "stringsbuilder" analyzer. * Fix violations of stringsbuilder analyzer. * Add modernize "stringsseq" analyzer. * Add modernize "testingcontext" analyzer. * Add modernize "waitgroup" analyzer. * Changelog fragment * gofmt * gazelle * Add modernize "newexpr" analyzer. * Disable newexpr until go1.26 * Add more details in WORKSPACE on how to update the override * @nalepae feedback on min() * gofmt * Fix violations of forvar
197 lines
5.7 KiB
Go
197 lines
5.7 KiB
Go
package transition
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/OffchainLabs/prysm/v7/beacon-chain/core/time"
|
|
state_native "github.com/OffchainLabs/prysm/v7/beacon-chain/state/state-native"
|
|
"github.com/OffchainLabs/prysm/v7/consensus-types/blocks"
|
|
"github.com/OffchainLabs/prysm/v7/consensus-types/primitives"
|
|
ethpb "github.com/OffchainLabs/prysm/v7/proto/prysm/v1alpha1"
|
|
"github.com/OffchainLabs/prysm/v7/testing/require"
|
|
fuzz "github.com/google/gofuzz"
|
|
)
|
|
|
|
func TestFuzzExecuteStateTransition_1000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
ctx := t.Context()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
sb := ðpb.SignedBeaconBlock{}
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for range 1000 {
|
|
fuzzer.Fuzz(state)
|
|
fuzzer.Fuzz(sb)
|
|
if sb.Block == nil || sb.Block.Body == nil {
|
|
continue
|
|
}
|
|
wsb, err := blocks.NewSignedBeaconBlock(sb)
|
|
require.NoError(t, err)
|
|
s, err := ExecuteStateTransition(ctx, state, wsb)
|
|
if err != nil && s != nil {
|
|
t.Fatalf("state should be nil on err. found: %v on error: %v for state: %v and signed block: %v", s, err, state, sb)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestFuzzCalculateStateRoot_1000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
ctx := t.Context()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
sb := ðpb.SignedBeaconBlock{}
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for range 1000 {
|
|
fuzzer.Fuzz(state)
|
|
fuzzer.Fuzz(sb)
|
|
if sb.Block == nil || sb.Block.Body == nil {
|
|
continue
|
|
}
|
|
wsb, err := blocks.NewSignedBeaconBlock(sb)
|
|
require.NoError(t, err)
|
|
stateRoot, err := CalculateStateRoot(ctx, state, wsb)
|
|
if err != nil && stateRoot != [32]byte{} {
|
|
t.Fatalf("state root should be empty on err. found: %v on error: %v for signed block: %v", stateRoot, err, sb)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestFuzzProcessSlot_1000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
ctx := t.Context()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for range 1000 {
|
|
fuzzer.Fuzz(state)
|
|
s, err := ProcessSlot(ctx, state)
|
|
if err != nil && s != nil {
|
|
t.Fatalf("state should be nil on err. found: %v on error: %v for state: %v", s, err, state)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestFuzzProcessSlots_1000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
ctx := t.Context()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
slot := primitives.Slot(0)
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for range 1000 {
|
|
fuzzer.Fuzz(state)
|
|
fuzzer.Fuzz(&slot)
|
|
s, err := ProcessSlots(ctx, state, slot)
|
|
if err != nil && s != nil {
|
|
t.Fatalf("state should be nil on err. found: %v on error: %v for state: %v", s, err, state)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestFuzzprocessOperationsNoVerify_1000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
ctx := t.Context()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
bb := ðpb.BeaconBlock{}
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for range 1000 {
|
|
fuzzer.Fuzz(state)
|
|
fuzzer.Fuzz(bb)
|
|
if bb.Body == nil {
|
|
continue
|
|
}
|
|
wb, err := blocks.NewBeaconBlock(bb)
|
|
require.NoError(t, err)
|
|
s, err := ProcessOperationsNoVerifyAttsSigs(ctx, state, wb)
|
|
if err != nil && s != nil {
|
|
t.Fatalf("state should be nil on err. found: %v on error: %v for block body: %v", s, err, bb)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestFuzzverifyOperationLengths_10000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
bb := ðpb.BeaconBlock{}
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for range 10000 {
|
|
fuzzer.Fuzz(state)
|
|
fuzzer.Fuzz(bb)
|
|
if bb.Body == nil {
|
|
continue
|
|
}
|
|
wb, err := blocks.NewBeaconBlock(bb)
|
|
require.NoError(t, err)
|
|
_, err = VerifyOperationLengths(t.Context(), state, wb)
|
|
_ = err
|
|
}
|
|
}
|
|
|
|
func TestFuzzCanProcessEpoch_10000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for range 10000 {
|
|
fuzzer.Fuzz(state)
|
|
time.CanProcessEpoch(state)
|
|
}
|
|
}
|
|
|
|
func TestFuzzProcessEpochPrecompute_1000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
ctx := t.Context()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for range 1000 {
|
|
fuzzer.Fuzz(state)
|
|
s, err := ProcessEpochPrecompute(ctx, state)
|
|
if err != nil && s != nil {
|
|
t.Fatalf("state should be nil on err. found: %v on error: %v for state: %v", s, err, state)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestFuzzProcessBlockForStateRoot_1000(t *testing.T) {
|
|
SkipSlotCache.Disable()
|
|
defer SkipSlotCache.Enable()
|
|
ctx := t.Context()
|
|
state, err := state_native.InitializeFromProtoUnsafePhase0(ðpb.BeaconState{})
|
|
require.NoError(t, err)
|
|
sb := ðpb.SignedBeaconBlock{}
|
|
fuzzer := fuzz.NewWithSeed(0)
|
|
fuzzer.NilChance(0.1)
|
|
for range 1000 {
|
|
fuzzer.Fuzz(state)
|
|
fuzzer.Fuzz(sb)
|
|
if sb.Block == nil || sb.Block.Body == nil || sb.Block.Body.Eth1Data == nil {
|
|
continue
|
|
}
|
|
wsb, err := blocks.NewSignedBeaconBlock(sb)
|
|
require.NoError(t, err)
|
|
s, err := ProcessBlockForStateRoot(ctx, state, wsb)
|
|
if err != nil && s != nil {
|
|
t.Fatalf("state should be nil on err. found: %v on error: %v for signed block: %v", s, err, sb)
|
|
}
|
|
}
|
|
}
|