mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-05-02 03:02:54 -04:00
* rewrite of ProposeExit # Conflicts: # validator/accounts/v2/accounts_exit.go * translate todos to English * use node client to calculate current epoch * resolve dependency cycle * add missing dependencies * changed required epochs error message * fix ProposeExit tests * remove unused metrics * simplify public-keys flag name * organize CLI function * fix incorrect list of exited keys * fix formatting of non-exited keys * add exit root to span attributes * use errors instead of logs * log info when all exits failed * do not log stack trace for non-critical errors * modify test asserts * use standard way of displaying errors * remove todo * add missing function to wallet mock * gazelle * gazelle after stash * move creating clients to separate function * gazelle
550 lines
17 KiB
Go
550 lines
17 KiB
Go
package client
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/gogo/protobuf/types"
|
|
"github.com/golang/mock/gomock"
|
|
lru "github.com/hashicorp/golang-lru"
|
|
ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1"
|
|
slashpb "github.com/prysmaticlabs/prysm/proto/slashing"
|
|
validatorpb "github.com/prysmaticlabs/prysm/proto/validator/accounts/v2"
|
|
"github.com/prysmaticlabs/prysm/shared/bls"
|
|
"github.com/prysmaticlabs/prysm/shared/featureconfig"
|
|
"github.com/prysmaticlabs/prysm/shared/mock"
|
|
"github.com/prysmaticlabs/prysm/shared/params"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/assert"
|
|
"github.com/prysmaticlabs/prysm/shared/testutil/require"
|
|
testing2 "github.com/prysmaticlabs/prysm/validator/db/testing"
|
|
logTest "github.com/sirupsen/logrus/hooks/test"
|
|
)
|
|
|
|
type mocks struct {
|
|
validatorClient *mock.MockBeaconNodeValidatorClient
|
|
nodeClient *mock.MockNodeClient
|
|
signExitFunc func(context.Context, *validatorpb.SignRequest) (bls.Signature, error)
|
|
}
|
|
|
|
type mockSignature struct{}
|
|
|
|
func (mockSignature) Verify(bls.PublicKey, []byte) bool {
|
|
return true
|
|
}
|
|
func (mockSignature) AggregateVerify([]bls.PublicKey, [][32]byte) bool {
|
|
return true
|
|
}
|
|
func (mockSignature) FastAggregateVerify([]bls.PublicKey, [32]byte) bool {
|
|
return true
|
|
}
|
|
func (mockSignature) Marshal() []byte {
|
|
return make([]byte, 32)
|
|
}
|
|
func (m mockSignature) Copy() bls.Signature {
|
|
return m
|
|
}
|
|
|
|
func setup(t *testing.T) (*validator, *mocks, func()) {
|
|
valDB := testing2.SetupDB(t, [][48]byte{validatorPubKey})
|
|
ctrl := gomock.NewController(t)
|
|
m := &mocks{
|
|
validatorClient: mock.NewMockBeaconNodeValidatorClient(ctrl),
|
|
nodeClient: mock.NewMockNodeClient(ctrl),
|
|
signExitFunc: func(ctx context.Context, req *validatorpb.SignRequest) (bls.Signature, error) {
|
|
return mockSignature{}, nil
|
|
},
|
|
}
|
|
|
|
aggregatedSlotCommitteeIDCache, err := lru.New(int(params.BeaconConfig().MaxCommitteesPerSlot))
|
|
require.NoError(t, err)
|
|
cleanMap := make(map[uint64]uint64)
|
|
cleanMap[0] = params.BeaconConfig().FarFutureEpoch
|
|
clean := &slashpb.AttestationHistory{
|
|
TargetToSource: cleanMap,
|
|
}
|
|
attHistoryByPubKey := make(map[[48]byte]*slashpb.AttestationHistory)
|
|
attHistoryByPubKey[validatorPubKey] = clean
|
|
|
|
validator := &validator{
|
|
db: valDB,
|
|
validatorClient: m.validatorClient,
|
|
keyManager: testKeyManager,
|
|
graffiti: []byte{},
|
|
attLogs: make(map[[32]byte]*attSubmitted),
|
|
aggregatedSlotCommitteeIDCache: aggregatedSlotCommitteeIDCache,
|
|
attesterHistoryByPubKey: attHistoryByPubKey,
|
|
}
|
|
|
|
return validator, m, ctrl.Finish
|
|
}
|
|
|
|
func TestProposeBlock_DoesNotProposeGenesisBlock(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
validator, _, finish := setup(t)
|
|
defer finish()
|
|
validator.ProposeBlock(context.Background(), 0, validatorPubKey)
|
|
|
|
require.LogsContain(t, hook, "Assigned to genesis slot, skipping proposal")
|
|
}
|
|
|
|
func TestProposeBlock_DomainDataFailed(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
validator, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), // epoch
|
|
).Return(nil /*response*/, errors.New("uh oh"))
|
|
|
|
validator.ProposeBlock(context.Background(), 1, validatorPubKey)
|
|
require.LogsContain(t, hook, "Failed to sign randao reveal")
|
|
}
|
|
|
|
func TestProposeBlock_DomainDataIsNil(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
validator, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), // epoch
|
|
).Return(nil /*response*/, nil)
|
|
|
|
validator.ProposeBlock(context.Background(), 1, validatorPubKey)
|
|
require.LogsContain(t, hook, domainDataErr)
|
|
}
|
|
|
|
func TestProposeBlock_RequestBlockFailed(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
validator, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), // epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().GetBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), // block request
|
|
).Return(nil /*response*/, errors.New("uh oh"))
|
|
|
|
validator.ProposeBlock(context.Background(), 1, validatorPubKey)
|
|
require.LogsContain(t, hook, "Failed to request block from beacon node")
|
|
}
|
|
|
|
func TestProposeBlock_ProposeBlockFailed(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
validator, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), //epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().GetBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(),
|
|
).Return(testutil.NewBeaconBlock().Block, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), //epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().ProposeBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.AssignableToTypeOf(ðpb.SignedBeaconBlock{}),
|
|
).Return(nil /*response*/, errors.New("uh oh"))
|
|
|
|
validator.ProposeBlock(context.Background(), 1, validatorPubKey)
|
|
require.LogsContain(t, hook, "Failed to propose block")
|
|
}
|
|
|
|
func TestProposeBlock_BlocksDoubleProposal(t *testing.T) {
|
|
cfg := &featureconfig.Flags{
|
|
LocalProtection: true,
|
|
}
|
|
reset := featureconfig.InitWithReset(cfg)
|
|
defer reset()
|
|
hook := logTest.NewGlobal()
|
|
validator, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), //epoch
|
|
).Times(2).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().GetBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(),
|
|
).Times(2).Return(testutil.NewBeaconBlock().Block, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), //epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().ProposeBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.AssignableToTypeOf(ðpb.SignedBeaconBlock{}),
|
|
).Return(ðpb.ProposeResponse{BlockRoot: make([]byte, 32)}, nil /*error*/)
|
|
|
|
slot := params.BeaconConfig().SlotsPerEpoch*5 + 2
|
|
validator.ProposeBlock(context.Background(), slot, validatorPubKey)
|
|
require.LogsDoNotContain(t, hook, failedPreBlockSignLocalErr)
|
|
|
|
validator.ProposeBlock(context.Background(), slot, validatorPubKey)
|
|
require.LogsContain(t, hook, failedPreBlockSignLocalErr)
|
|
}
|
|
|
|
func TestProposeBlock_BlocksDoubleProposal_After54KEpochs(t *testing.T) {
|
|
cfg := &featureconfig.Flags{
|
|
LocalProtection: true,
|
|
}
|
|
reset := featureconfig.InitWithReset(cfg)
|
|
defer reset()
|
|
hook := logTest.NewGlobal()
|
|
validator, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), //epoch
|
|
).Times(2).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().GetBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(),
|
|
).Times(2).Return(testutil.NewBeaconBlock().Block, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), //epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().ProposeBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.AssignableToTypeOf(ðpb.SignedBeaconBlock{}),
|
|
).Return(ðpb.ProposeResponse{BlockRoot: make([]byte, 32)}, nil /*error*/)
|
|
|
|
farFuture := (params.BeaconConfig().WeakSubjectivityPeriod + 9) * params.BeaconConfig().SlotsPerEpoch
|
|
validator.ProposeBlock(context.Background(), farFuture, validatorPubKey)
|
|
require.LogsDoNotContain(t, hook, failedPreBlockSignLocalErr)
|
|
|
|
validator.ProposeBlock(context.Background(), farFuture, validatorPubKey)
|
|
require.LogsContain(t, hook, failedPreBlockSignLocalErr)
|
|
}
|
|
|
|
func TestProposeBlock_AllowsPastProposals(t *testing.T) {
|
|
cfg := &featureconfig.Flags{
|
|
LocalProtection: true,
|
|
}
|
|
reset := featureconfig.InitWithReset(cfg)
|
|
defer reset()
|
|
hook := logTest.NewGlobal()
|
|
validator, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), //epoch
|
|
).Times(2).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
farAhead := (params.BeaconConfig().WeakSubjectivityPeriod + 9) * params.BeaconConfig().SlotsPerEpoch
|
|
blk := testutil.NewBeaconBlock()
|
|
blk.Block.Slot = farAhead
|
|
m.validatorClient.EXPECT().GetBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(),
|
|
).Return(blk.Block, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), //epoch
|
|
).Times(2).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().ProposeBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.AssignableToTypeOf(ðpb.SignedBeaconBlock{}),
|
|
).Times(2).Return(ðpb.ProposeResponse{BlockRoot: make([]byte, 32)}, nil /*error*/)
|
|
|
|
validator.ProposeBlock(context.Background(), farAhead, validatorPubKey)
|
|
require.LogsDoNotContain(t, hook, failedPreBlockSignLocalErr)
|
|
|
|
past := (params.BeaconConfig().WeakSubjectivityPeriod - 400) * params.BeaconConfig().SlotsPerEpoch
|
|
blk2 := testutil.NewBeaconBlock()
|
|
blk2.Block.Slot = past
|
|
m.validatorClient.EXPECT().GetBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(),
|
|
).Return(blk2.Block, nil /*err*/)
|
|
validator.ProposeBlock(context.Background(), past, validatorPubKey)
|
|
require.LogsDoNotContain(t, hook, failedPreBlockSignLocalErr)
|
|
}
|
|
|
|
func TestProposeBlock_AllowsSameEpoch(t *testing.T) {
|
|
cfg := &featureconfig.Flags{
|
|
LocalProtection: true,
|
|
}
|
|
reset := featureconfig.InitWithReset(cfg)
|
|
defer reset()
|
|
hook := logTest.NewGlobal()
|
|
validator, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), //epoch
|
|
).Times(2).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
farAhead := (params.BeaconConfig().WeakSubjectivityPeriod + 9) * params.BeaconConfig().SlotsPerEpoch
|
|
blk := testutil.NewBeaconBlock()
|
|
blk.Block.Slot = farAhead
|
|
m.validatorClient.EXPECT().GetBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(),
|
|
).Return(blk.Block, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), //epoch
|
|
).Times(2).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().ProposeBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.AssignableToTypeOf(ðpb.SignedBeaconBlock{}),
|
|
).Times(2).Return(ðpb.ProposeResponse{BlockRoot: make([]byte, 32)}, nil /*error*/)
|
|
|
|
pubKey := validatorPubKey
|
|
validator.ProposeBlock(context.Background(), farAhead, pubKey)
|
|
require.LogsDoNotContain(t, hook, failedPreBlockSignLocalErr)
|
|
|
|
blk2 := testutil.NewBeaconBlock()
|
|
blk2.Block.Slot = farAhead - 4
|
|
m.validatorClient.EXPECT().GetBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(),
|
|
).Return(blk2.Block, nil /*err*/)
|
|
|
|
validator.ProposeBlock(context.Background(), farAhead-4, pubKey)
|
|
require.LogsDoNotContain(t, hook, failedPreBlockSignLocalErr)
|
|
}
|
|
|
|
func TestProposeBlock_BroadcastsBlock(t *testing.T) {
|
|
validator, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), //epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().GetBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(),
|
|
).Return(testutil.NewBeaconBlock().Block, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), //epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().ProposeBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.AssignableToTypeOf(ðpb.SignedBeaconBlock{}),
|
|
).Return(ðpb.ProposeResponse{BlockRoot: make([]byte, 32)}, nil /*error*/)
|
|
|
|
validator.ProposeBlock(context.Background(), 1, validatorPubKey)
|
|
}
|
|
|
|
func TestProposeBlock_BroadcastsBlock_WithGraffiti(t *testing.T) {
|
|
validator, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
validator.graffiti = []byte("12345678901234567890123456789012")
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), //epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
blk := testutil.NewBeaconBlock()
|
|
blk.Block.Body.Graffiti = validator.graffiti
|
|
m.validatorClient.EXPECT().GetBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(),
|
|
).Return(blk.Block, nil /*err*/)
|
|
|
|
m.validatorClient.EXPECT().DomainData(
|
|
gomock.Any(), // ctx
|
|
gomock.Any(), //epoch
|
|
).Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil /*err*/)
|
|
|
|
var sentBlock *ethpb.SignedBeaconBlock
|
|
|
|
m.validatorClient.EXPECT().ProposeBlock(
|
|
gomock.Any(), // ctx
|
|
gomock.AssignableToTypeOf(ðpb.SignedBeaconBlock{}),
|
|
).DoAndReturn(func(ctx context.Context, block *ethpb.SignedBeaconBlock) (*ethpb.ProposeResponse, error) {
|
|
sentBlock = block
|
|
return ðpb.ProposeResponse{BlockRoot: make([]byte, 32)}, nil
|
|
})
|
|
|
|
validator.ProposeBlock(context.Background(), 1, validatorPubKey)
|
|
assert.Equal(t, string(validator.graffiti), string(sentBlock.Block.Body.Graffiti))
|
|
}
|
|
|
|
func TestProposeExit_ValidatorIndexFailed(t *testing.T) {
|
|
_, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().ValidatorIndex(
|
|
gomock.Any(),
|
|
gomock.Any(),
|
|
).Return(nil, errors.New("uh oh"))
|
|
|
|
err := ProposeExit(context.Background(), m.validatorClient, m.nodeClient, m.signExitFunc, validatorPubKey[:])
|
|
assert.NotNil(t, err)
|
|
assert.ErrorContains(t, "uh oh", err)
|
|
assert.ErrorContains(t, "gRPC call to get validator index failed", err)
|
|
}
|
|
|
|
func TestProposeExit_GetGenesisFailed(t *testing.T) {
|
|
_, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().
|
|
ValidatorIndex(gomock.Any(), gomock.Any()).
|
|
Return(nil, nil)
|
|
|
|
m.nodeClient.EXPECT().
|
|
GetGenesis(gomock.Any(), gomock.Any()).
|
|
Return(nil, errors.New("uh oh"))
|
|
|
|
err := ProposeExit(context.Background(), m.validatorClient, m.nodeClient, m.signExitFunc, validatorPubKey[:])
|
|
assert.NotNil(t, err)
|
|
assert.ErrorContains(t, "uh oh", err)
|
|
assert.ErrorContains(t, "gRPC call to get genesis time failed", err)
|
|
}
|
|
|
|
func TestProposeExit_DomainDataFailed(t *testing.T) {
|
|
_, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().
|
|
ValidatorIndex(gomock.Any(), gomock.Any()).
|
|
Return(ðpb.ValidatorIndexResponse{Index: 1}, nil)
|
|
|
|
// Any time in the past will suffice
|
|
genesisTime := &types.Timestamp{
|
|
Seconds: time.Date(2020, 1, 1, 0, 0, 0, 0, time.UTC).Unix(),
|
|
}
|
|
|
|
m.nodeClient.EXPECT().
|
|
GetGenesis(gomock.Any(), gomock.Any()).
|
|
Return(ðpb.Genesis{GenesisTime: genesisTime}, nil)
|
|
|
|
m.validatorClient.EXPECT().
|
|
DomainData(gomock.Any(), gomock.Any()).
|
|
Return(nil, errors.New("uh oh"))
|
|
|
|
err := ProposeExit(context.Background(), m.validatorClient, m.nodeClient, m.signExitFunc, validatorPubKey[:])
|
|
assert.NotNil(t, err)
|
|
assert.ErrorContains(t, domainDataErr, err)
|
|
assert.ErrorContains(t, "uh oh", err)
|
|
assert.ErrorContains(t, "failed to sign voluntary exit", err)
|
|
}
|
|
|
|
func TestProposeExit_DomainDataIsNil(t *testing.T) {
|
|
_, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().
|
|
ValidatorIndex(gomock.Any(), gomock.Any()).
|
|
Return(ðpb.ValidatorIndexResponse{Index: 1}, nil)
|
|
|
|
// Any time in the past will suffice
|
|
genesisTime := &types.Timestamp{
|
|
Seconds: time.Date(2020, 1, 1, 0, 0, 0, 0, time.UTC).Unix(),
|
|
}
|
|
|
|
m.nodeClient.EXPECT().
|
|
GetGenesis(gomock.Any(), gomock.Any()).
|
|
Return(ðpb.Genesis{GenesisTime: genesisTime}, nil)
|
|
|
|
m.validatorClient.EXPECT().
|
|
DomainData(gomock.Any(), gomock.Any()).
|
|
Return(nil, nil)
|
|
|
|
err := ProposeExit(context.Background(), m.validatorClient, m.nodeClient, m.signExitFunc, validatorPubKey[:])
|
|
assert.NotNil(t, err)
|
|
assert.ErrorContains(t, domainDataErr, err)
|
|
assert.ErrorContains(t, "failed to sign voluntary exit", err)
|
|
}
|
|
|
|
func TestProposeBlock_ProposeExitFailed(t *testing.T) {
|
|
_, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().
|
|
ValidatorIndex(gomock.Any(), gomock.Any()).
|
|
Return(ðpb.ValidatorIndexResponse{Index: 1}, nil)
|
|
|
|
// Any time in the past will suffice
|
|
genesisTime := &types.Timestamp{
|
|
Seconds: time.Date(2020, 1, 1, 0, 0, 0, 0, time.UTC).Unix(),
|
|
}
|
|
|
|
m.nodeClient.EXPECT().
|
|
GetGenesis(gomock.Any(), gomock.Any()).
|
|
Return(ðpb.Genesis{GenesisTime: genesisTime}, nil)
|
|
|
|
m.validatorClient.EXPECT().
|
|
DomainData(gomock.Any(), gomock.Any()).
|
|
Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil)
|
|
|
|
m.validatorClient.EXPECT().
|
|
ProposeExit(gomock.Any(), gomock.AssignableToTypeOf(ðpb.SignedVoluntaryExit{})).
|
|
Return(nil, errors.New("uh oh"))
|
|
|
|
err := ProposeExit(context.Background(), m.validatorClient, m.nodeClient, m.signExitFunc, validatorPubKey[:])
|
|
assert.NotNil(t, err)
|
|
assert.ErrorContains(t, "uh oh", err)
|
|
assert.ErrorContains(t, "failed to propose voluntary exit", err)
|
|
}
|
|
|
|
func TestProposeExit_BroadcastsBlock(t *testing.T) {
|
|
_, m, finish := setup(t)
|
|
defer finish()
|
|
|
|
m.validatorClient.EXPECT().
|
|
ValidatorIndex(gomock.Any(), gomock.Any()).
|
|
Return(ðpb.ValidatorIndexResponse{Index: 1}, nil)
|
|
|
|
// Any time in the past will suffice
|
|
genesisTime := &types.Timestamp{
|
|
Seconds: time.Date(2020, 1, 1, 0, 0, 0, 0, time.UTC).Unix(),
|
|
}
|
|
|
|
m.nodeClient.EXPECT().
|
|
GetGenesis(gomock.Any(), gomock.Any()).
|
|
Return(ðpb.Genesis{GenesisTime: genesisTime}, nil)
|
|
|
|
m.validatorClient.EXPECT().
|
|
DomainData(gomock.Any(), gomock.Any()).
|
|
Return(ðpb.DomainResponse{SignatureDomain: make([]byte, 32)}, nil)
|
|
|
|
m.validatorClient.EXPECT().
|
|
ProposeExit(gomock.Any(), gomock.AssignableToTypeOf(ðpb.SignedVoluntaryExit{})).
|
|
Return(ðpb.ProposeExitResponse{}, nil)
|
|
|
|
assert.NoError(t, ProposeExit(context.Background(), m.validatorClient, m.nodeClient, m.signExitFunc, validatorPubKey[:]))
|
|
}
|