2022-04-11 10:00:39 +00:00
|
|
|
import
|
|
|
|
std/tables,
|
|
|
|
stew/byteutils,
|
|
|
|
chronicles,
|
|
|
|
unittest2,
|
|
|
|
nimcrypto,
|
|
|
|
chronos,
|
2022-07-18 04:34:42 +00:00
|
|
|
"."/[test_env, helper, types],
|
2022-04-11 10:00:39 +00:00
|
|
|
../../../nimbus/transaction,
|
|
|
|
../../../nimbus/rpc/rpc_types,
|
|
|
|
../../../nimbus/merge/mergeutils
|
|
|
|
|
|
|
|
const
|
|
|
|
prevRandaoContractAddr = hexToByteArray[20]("0000000000000000000000000000000000000316")
|
|
|
|
|
2022-06-17 00:53:33 +00:00
|
|
|
proc `==`(a: Option[BlockHash], b: Option[Hash256]): bool =
|
2022-07-04 05:35:03 +00:00
|
|
|
if a.isNone and b.isNone:
|
|
|
|
return true
|
|
|
|
if a.isSome and b.isSome:
|
|
|
|
return a.get() == b.get().data.BlockHash
|
2022-06-17 00:53:33 +00:00
|
|
|
|
|
|
|
template testFCU(res, cond: untyped, validHash: Option[Hash256], id = none(PayloadID)) =
|
|
|
|
testCond res.isOk
|
|
|
|
let s = res.get()
|
|
|
|
testCond s.payloadStatus.status == PayloadExecutionStatus.cond:
|
|
|
|
error "Unexpected FCU status", expect=PayloadExecutionStatus.cond, get=s.payloadStatus.status
|
|
|
|
testCond s.payloadStatus.latestValidHash == validHash:
|
|
|
|
error "Unexpected FCU latestValidHash", expect=validHash, get=s.payloadStatus.latestValidHash
|
|
|
|
testCond s.payloadId == id:
|
|
|
|
error "Unexpected FCU payloadID", expect=id, get=s.payloadId
|
|
|
|
|
|
|
|
template testFCU(res, cond: untyped) =
|
|
|
|
testCond res.isOk
|
|
|
|
let s = res.get()
|
|
|
|
testCond s.payloadStatus.status == PayloadExecutionStatus.cond:
|
|
|
|
error "Unexpected FCU status", expect=PayloadExecutionStatus.cond, get=s.payloadStatus.status
|
|
|
|
|
|
|
|
template testNP(res, cond: untyped, validHash = none(Hash256)) =
|
|
|
|
testCond res.isOk
|
|
|
|
let s = res.get()
|
|
|
|
testCond s.status == PayloadExecutionStatus.cond:
|
|
|
|
error "Unexpected NewPayload status", expect=PayloadExecutionStatus.cond, get=s.status
|
|
|
|
testCond s.latestValidHash == validHash:
|
|
|
|
error "Unexpected NewPayload latestValidHash", expect=validHash, get=s.latestValidHash
|
|
|
|
|
|
|
|
template testNPEither(res, cond: untyped, validHash = none(Hash256)) =
|
|
|
|
testCond res.isOk
|
|
|
|
let s = res.get()
|
|
|
|
testCond s.status in cond:
|
|
|
|
error "Unexpected NewPayload status", expect=cond, get=s.status
|
|
|
|
testCond s.latestValidHash == validHash:
|
|
|
|
error "Unexpected NewPayload latestValidHash", expect=validHash, get=s.latestValidHash
|
|
|
|
|
2022-06-27 05:26:03 +00:00
|
|
|
template testLatestHeader(client: untyped, expectedHash: BlockHash) =
|
|
|
|
var lastHeader: EthBlockHeader
|
|
|
|
var hRes = client.latestHeader(lastHeader)
|
|
|
|
testCond hRes.isOk:
|
|
|
|
error "unable to get latest header", msg=hRes.error
|
|
|
|
|
|
|
|
let lastHash = BlockHash lastHeader.blockHash.data
|
|
|
|
# Latest block header available via Eth RPC should not have changed at this point
|
|
|
|
testCond lastHash == expectedHash:
|
|
|
|
error "latest block header incorrect",
|
2022-07-04 05:35:03 +00:00
|
|
|
expect = expectedHash,
|
|
|
|
get = lastHash
|
2022-06-27 05:26:03 +00:00
|
|
|
|
2022-06-17 00:53:33 +00:00
|
|
|
proc sendTx(t: TestEnv, recipient: EthAddress, val: UInt256, data: openArray[byte] = []): bool =
|
|
|
|
t.tx = t.makeNextTransaction(recipient, val, data)
|
|
|
|
let rr = t.rpcClient.sendTransaction(t.tx)
|
|
|
|
if rr.isErr:
|
|
|
|
error "Unable to send transaction", msg=rr.error
|
|
|
|
return false
|
|
|
|
return true
|
|
|
|
|
|
|
|
proc sendTx(t: TestEnv, val: UInt256): bool =
|
|
|
|
t.sendTx(prevRandaoContractAddr, val)
|
2022-04-20 07:57:50 +00:00
|
|
|
|
2022-04-11 10:00:39 +00:00
|
|
|
# Invalid Terminal Block in ForkchoiceUpdated:
|
|
|
|
# Client must reject ForkchoiceUpdated directives if the referenced HeadBlockHash does not meet the TTD requirement.
|
2022-04-20 07:57:50 +00:00
|
|
|
proc invalidTerminalBlockForkchoiceUpdated(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
2022-04-11 10:00:39 +00:00
|
|
|
let
|
|
|
|
gHash = Web3BlockHash t.gHeader.blockHash.data
|
|
|
|
forkchoiceState = ForkchoiceStateV1(
|
|
|
|
headBlockHash: gHash,
|
|
|
|
safeBlockHash: gHash,
|
|
|
|
finalizedBlockHash: gHash,
|
|
|
|
)
|
|
|
|
|
|
|
|
let res = t.rpcClient.forkchoiceUpdatedV1(forkchoiceState)
|
|
|
|
# Execution specification:
|
2022-05-29 04:23:03 +00:00
|
|
|
# {payloadStatus: {status: INVALID, latestValidHash=0x00..00}, payloadId: null}
|
2022-04-11 10:00:39 +00:00
|
|
|
# either obtained from the Payload validation process or as a result of validating a PoW block referenced by forkchoiceState.headBlockHash
|
|
|
|
|
2022-06-17 00:53:33 +00:00
|
|
|
testFCU(res, invalid, some(Hash256()))
|
2022-04-11 10:00:39 +00:00
|
|
|
# ValidationError is not validated since it can be either null or a string message
|
|
|
|
|
2022-05-29 04:23:03 +00:00
|
|
|
# Check that PoW chain progresses
|
|
|
|
testCond t.verifyPoWProgress(t.gHeader.blockHash)
|
|
|
|
|
2022-04-11 10:00:39 +00:00
|
|
|
# Invalid GetPayload Under PoW: Client must reject GetPayload directives under PoW.
|
2022-04-20 07:57:50 +00:00
|
|
|
proc invalidGetPayloadUnderPoW(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
2022-04-11 10:00:39 +00:00
|
|
|
# We start in PoW and try to get an invalid Payload, which should produce an error but nothing should be disrupted.
|
|
|
|
let id = PayloadID [1.byte, 2,3,4,5,6,7,8]
|
|
|
|
let res = t.rpcClient.getPayloadV1(id)
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond res.isErr
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
# Check that PoW chain progresses
|
|
|
|
testCond t.verifyPoWProgress(t.gHeader.blockHash)
|
|
|
|
|
2022-04-11 10:00:39 +00:00
|
|
|
# Invalid Terminal Block in NewPayload:
|
|
|
|
# Client must reject NewPayload directives if the referenced ParentHash does not meet the TTD requirement.
|
2022-04-20 07:57:50 +00:00
|
|
|
proc invalidTerminalBlockNewPayload(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
2022-04-11 10:00:39 +00:00
|
|
|
let gBlock = t.gHeader
|
|
|
|
let payload = ExecutableData(
|
|
|
|
parentHash: gBlock.blockHash,
|
|
|
|
stateRoot: gBlock.stateRoot,
|
|
|
|
receiptsRoot: BLANK_ROOT_HASH,
|
|
|
|
number: 1,
|
|
|
|
gasLimit: gBlock.gasLimit,
|
|
|
|
gasUsed: 0,
|
|
|
|
timestamp: gBlock.timestamp + 1.seconds,
|
|
|
|
baseFeePerGas:gBlock.baseFee
|
|
|
|
)
|
|
|
|
let hashedPayload = customizePayload(payload, CustomPayload())
|
|
|
|
let res = t.rpcClient.newPayloadV1(hashedPayload)
|
|
|
|
|
|
|
|
# Execution specification:
|
2022-06-17 00:53:33 +00:00
|
|
|
# {status: INVALID, latestValidHash=0x00..00}
|
2022-04-11 10:00:39 +00:00
|
|
|
# if terminal block conditions are not satisfied
|
2022-06-17 00:53:33 +00:00
|
|
|
testNP(res, invalid, some(Hash256()))
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
# Check that PoW chain progresses
|
|
|
|
testCond t.verifyPoWProgress(t.gHeader.blockHash)
|
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
proc unknownHeadBlockHash(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
var randomHash: Hash256
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond nimcrypto.randomBytes(randomHash.data) == 32
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
let clMock = t.clMock
|
|
|
|
let forkchoiceStateUnknownHeadHash = ForkchoiceStateV1(
|
|
|
|
headBlockHash: BlockHash randomHash.data,
|
|
|
|
safeBlockHash: clMock.latestForkchoice.finalizedBlockHash,
|
|
|
|
finalizedBlockHash: clMock.latestForkchoice.finalizedBlockHash,
|
|
|
|
)
|
|
|
|
|
|
|
|
var res = t.rpcClient.forkchoiceUpdatedV1(forkchoiceStateUnknownHeadHash)
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond res.isOk
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
let s = res.get()
|
|
|
|
# Execution specification::
|
|
|
|
# - {payloadStatus: {status: SYNCING, latestValidHash: null, validationError: null}, payloadId: null}
|
|
|
|
# if forkchoiceState.headBlockHash references an unknown payload or a payload that can't be validated
|
|
|
|
# because requisite data for the validation is missing
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond s.payloadStatus.status == PayloadExecutionStatus.syncing
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Test again using PayloadAttributes, should also return SYNCING and no PayloadID
|
|
|
|
let timestamp = uint64 clMock.latestExecutedPayload.timestamp
|
|
|
|
let payloadAttr = PayloadAttributesV1(
|
|
|
|
timestamp: Quantity(timestamp + 1)
|
|
|
|
)
|
|
|
|
|
|
|
|
res = t.rpcClient.forkchoiceUpdatedV1(forkchoiceStateUnknownHeadHash, some(payloadAttr))
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond res.isOk
|
|
|
|
testCond s.payloadStatus.status == PayloadExecutionStatus.syncing
|
|
|
|
testCond s.payloadId.isNone
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
proc unknownSafeBlockHash(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Produce blocks before starting the test
|
|
|
|
let produce5BlockRes = t.clMock.produceBlocks(5, BlockProcessCallbacks())
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond produce5BlockRes
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
let produceSingleBlockRes = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
# Run test after a new payload has been broadcast
|
|
|
|
onNewPayloadBroadcast: proc(): bool =
|
|
|
|
# Generate a random SafeBlock hash
|
|
|
|
var randomSafeBlockHash: Hash256
|
|
|
|
doAssert nimcrypto.randomBytes(randomSafeBlockHash.data) == 32
|
|
|
|
|
|
|
|
# Send forkchoiceUpdated with random SafeBlockHash
|
|
|
|
let forkchoiceStateUnknownSafeHash = ForkchoiceStateV1(
|
|
|
|
headBlockHash: clMock.latestExecutedPayload.blockHash,
|
|
|
|
safeBlockHash: BlockHash randomSafeBlockHash.data,
|
|
|
|
finalizedBlockHash: clMock.latestForkchoice.finalizedBlockHash,
|
|
|
|
)
|
|
|
|
# Execution specification:
|
|
|
|
# - This value MUST be either equal to or an ancestor of headBlockHash
|
|
|
|
let res = client.forkchoiceUpdatedV1(forkchoiceStateUnknownSafeHash)
|
|
|
|
return res.isErr
|
|
|
|
))
|
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond produceSingleBlockRes
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
proc unknownFinalizedBlockHash(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Produce blocks before starting the test
|
|
|
|
let produce5BlockRes = t.clMock.produceBlocks(5, BlockProcessCallbacks())
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond produce5BlockRes
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
let produceSingleBlockRes = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
# Run test after a new payload has been broadcast
|
|
|
|
onNewPayloadBroadcast: proc(): bool =
|
|
|
|
# Generate a random SafeBlock hash
|
|
|
|
var randomFinalBlockHash: Hash256
|
|
|
|
doAssert nimcrypto.randomBytes(randomFinalBlockHash.data) == 32
|
|
|
|
|
|
|
|
# Send forkchoiceUpdated with random SafeBlockHash
|
|
|
|
let forkchoiceStateUnknownFinalizedHash = ForkchoiceStateV1(
|
|
|
|
headBlockHash: clMock.latestExecutedPayload.blockHash,
|
|
|
|
safeBlockHash: clMock.latestForkchoice.safeBlockHash,
|
|
|
|
finalizedBlockHash: BlockHash randomFinalBlockHash.data,
|
|
|
|
)
|
|
|
|
# Execution specification:
|
|
|
|
# - This value MUST be either equal to or an ancestor of headBlockHash
|
|
|
|
var res = client.forkchoiceUpdatedV1(forkchoiceStateUnknownFinalizedHash)
|
|
|
|
if res.isOk:
|
|
|
|
return false
|
|
|
|
|
|
|
|
# Test again using PayloadAttributes, should also return INVALID and no PayloadID
|
|
|
|
let timestamp = uint64 clMock.latestExecutedPayload.timestamp
|
|
|
|
let payloadAttr = PayloadAttributesV1(
|
|
|
|
timestamp: Quantity(timestamp + 1)
|
|
|
|
)
|
|
|
|
res = client.forkchoiceUpdatedV1(forkchoiceStateUnknownFinalizedHash, some(payloadAttr))
|
|
|
|
return res.isErr
|
|
|
|
))
|
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond produceSingleBlockRes
|
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
# Send an inconsistent ForkchoiceState with a known payload that belongs to a side chain as head, safe or finalized.
|
|
|
|
type
|
|
|
|
Inconsistency {.pure.} = enum
|
|
|
|
Head
|
|
|
|
Safe
|
|
|
|
Finalized
|
|
|
|
|
|
|
|
PayloadList = ref object
|
|
|
|
canonicalPayloads : seq[ExecutableData]
|
|
|
|
alternativePayloads: seq[ExecutableData]
|
|
|
|
|
2022-06-13 09:42:01 +00:00
|
|
|
template inconsistentForkchoiceStateGen(procname: untyped, inconsistency: Inconsistency) =
|
2022-06-01 13:32:07 +00:00
|
|
|
proc procName(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
|
|
|
|
|
|
|
var pList = PayloadList()
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
|
|
|
|
# Produce blocks before starting the test
|
|
|
|
let produceBlockRes = clMock.produceBlocks(3, BlockProcessCallbacks(
|
|
|
|
onGetPayload: proc(): bool =
|
|
|
|
# Generate and send an alternative side chain
|
|
|
|
var customData = CustomPayload(
|
|
|
|
extraData: some(@[0x01.byte])
|
|
|
|
)
|
|
|
|
|
|
|
|
if pList.alternativePayloads.len > 0:
|
|
|
|
customData.parentHash = some(pList.alternativePayloads[^1].blockHash)
|
|
|
|
|
|
|
|
let executableData = toExecutableData(clMock.latestPayloadBuilt)
|
|
|
|
let alternativePayload = customizePayload(executableData, customData)
|
|
|
|
pList.alternativePayloads.add(alternativePayload.toExecutableData)
|
|
|
|
|
|
|
|
let latestCanonicalPayload = toExecutableData(clMock.latestPayloadBuilt)
|
|
|
|
pList.canonicalPayloads.add(latestCanonicalPayload)
|
|
|
|
|
|
|
|
# Send the alternative payload
|
|
|
|
let res = client.newPayloadV1(alternativePayload)
|
|
|
|
if res.isErr:
|
|
|
|
return false
|
|
|
|
|
|
|
|
let s = res.get()
|
|
|
|
s.status == PayloadExecutionStatus.valid or s.status == PayloadExecutionStatus.accepted
|
|
|
|
))
|
|
|
|
|
|
|
|
testCond produceBlockRes
|
|
|
|
|
|
|
|
# Send the invalid ForkchoiceStates
|
|
|
|
let len = pList.alternativePayloads.len
|
|
|
|
var inconsistentFcU = ForkchoiceStateV1(
|
|
|
|
headBlockHash: Web3BlockHash pList.canonicalPayloads[len-1].blockHash.data,
|
|
|
|
safeBlockHash: Web3BlockHash pList.canonicalPayloads[len-2].blockHash.data,
|
|
|
|
finalizedBlockHash: Web3BlockHash pList.canonicalPayloads[len-3].blockHash.data,
|
|
|
|
)
|
|
|
|
|
|
|
|
when inconsistency == Inconsistency.Head:
|
|
|
|
inconsistentFcU.headBlockHash = Web3BlockHash pList.alternativePayloads[len-1].blockHash.data
|
|
|
|
elif inconsistency == Inconsistency.Safe:
|
|
|
|
inconsistentFcU.safeBlockHash = Web3BlockHash pList.alternativePayloads[len-2].blockHash.data
|
|
|
|
else:
|
|
|
|
inconsistentFcU.finalizedBlockHash = Web3BlockHash pList.alternativePayloads[len-3].blockHash.data
|
|
|
|
|
|
|
|
var r = client.forkchoiceUpdatedV1(inconsistentFcU)
|
|
|
|
testCond r.isErr
|
|
|
|
|
|
|
|
# Return to the canonical chain
|
|
|
|
r = client.forkchoiceUpdatedV1(clMock.latestForkchoice)
|
|
|
|
testCond r.isOk
|
|
|
|
let s = r.get()
|
|
|
|
testCond s.payloadStatus.status == PayloadExecutionStatus.valid
|
|
|
|
|
|
|
|
inconsistentForkchoiceStateGen(inconsistentForkchoiceState1, Inconsistency.Head)
|
|
|
|
inconsistentForkchoiceStateGen(inconsistentForkchoiceState2, Inconsistency.Safe)
|
|
|
|
inconsistentForkchoiceStateGen(inconsistentForkchoiceState3, Inconsistency.Finalized)
|
|
|
|
|
|
|
|
# Verify behavior on a forkchoiceUpdated with invalid payload attributes
|
2022-06-13 09:42:01 +00:00
|
|
|
template invalidPayloadAttributesGen(procname: untyped, syncingCond: bool) =
|
2022-06-01 13:32:07 +00:00
|
|
|
proc procName(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
|
|
|
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
|
|
|
|
# Produce blocks before starting the test
|
|
|
|
var produceBlockRes = clMock.produceBlocks(5, BlockProcessCallbacks())
|
|
|
|
testCond produceBlockRes
|
|
|
|
|
|
|
|
# Send a forkchoiceUpdated with invalid PayloadAttributes
|
|
|
|
produceBlockRes = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
onNewPayloadBroadcast: proc(): bool =
|
|
|
|
# Try to apply the new payload with invalid attributes
|
|
|
|
var blockHash: Hash256
|
|
|
|
when syncingCond:
|
|
|
|
# Setting a random hash will put the client into `SYNCING`
|
|
|
|
doAssert nimcrypto.randomBytes(blockHash.data) == 32
|
|
|
|
else:
|
|
|
|
# Set the block hash to the next payload that was broadcasted
|
|
|
|
blockHash = hash256(clMock.latestPayloadBuilt.blockHash)
|
|
|
|
|
|
|
|
let fcu = ForkchoiceStateV1(
|
|
|
|
headBlockHash: Web3BlockHash blockHash.data,
|
|
|
|
safeBlockHash: Web3BlockHash blockHash.data,
|
|
|
|
finalizedBlockHash: Web3BlockHash blockHash.data,
|
|
|
|
)
|
|
|
|
|
|
|
|
let attr = PayloadAttributesV1()
|
|
|
|
|
|
|
|
# 0) Check headBlock is known and there is no missing data, if not respond with SYNCING
|
|
|
|
# 1) Check headBlock is VALID, if not respond with INVALID
|
|
|
|
# 2) Apply forkchoiceState
|
|
|
|
# 3) Check payloadAttributes, if invalid respond with error: code: Invalid payload attributes
|
|
|
|
# 4) Start payload build process and respond with VALID
|
|
|
|
when syncingCond:
|
|
|
|
# If we are SYNCING, the outcome should be SYNCING regardless of the validity of the payload atttributes
|
|
|
|
let r = client.forkchoiceUpdatedV1(fcu, some(attr))
|
2022-07-04 12:31:41 +00:00
|
|
|
testFCU(r, syncing)
|
2022-06-01 13:32:07 +00:00
|
|
|
else:
|
|
|
|
let r = client.forkchoiceUpdatedV1(fcu, some(attr))
|
2022-07-04 12:31:41 +00:00
|
|
|
testCond r.isOk:
|
|
|
|
error "Unexpected error", msg = r.error
|
2022-06-01 13:32:07 +00:00
|
|
|
|
|
|
|
# Check that the forkchoice was applied, regardless of the error
|
2022-06-27 05:26:03 +00:00
|
|
|
testLatestHeader(client, BlockHash blockHash.data)
|
2022-06-01 13:32:07 +00:00
|
|
|
return true
|
|
|
|
))
|
|
|
|
|
|
|
|
testCond produceBlockRes
|
|
|
|
|
|
|
|
invalidPayloadAttributesGen(invalidPayloadAttributes1, false)
|
|
|
|
invalidPayloadAttributesGen(invalidPayloadAttributes2, true)
|
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
proc preTTDFinalizedBlockHash(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond ok
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Produce blocks before starting the test
|
|
|
|
let produce5BlockRes = t.clMock.produceBlocks(5, BlockProcessCallbacks())
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond produce5BlockRes
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
let
|
|
|
|
gHash = Web3BlockHash t.gHeader.blockHash.data
|
|
|
|
forkchoiceState = ForkchoiceStateV1(
|
|
|
|
headBlockHash: gHash,
|
|
|
|
safeBlockHash: gHash,
|
|
|
|
finalizedBlockHash: gHash,
|
|
|
|
)
|
|
|
|
client = t.rpcClient
|
|
|
|
clMock = t.clMock
|
|
|
|
|
|
|
|
var res = client.forkchoiceUpdatedV1(forkchoiceState)
|
2022-06-17 00:53:33 +00:00
|
|
|
testFCU(res, invalid, some(Hash256()))
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
res = client.forkchoiceUpdatedV1(clMock.latestForkchoice)
|
2022-06-17 00:53:33 +00:00
|
|
|
testFCU(res, valid)
|
2022-04-20 07:57:50 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
# Corrupt the hash of a valid payload, client should reject the payload.
|
|
|
|
# All possible scenarios:
|
|
|
|
# (fcU)
|
|
|
|
# ┌────────┐ ┌────────────────────────┐
|
|
|
|
# │ HEAD │◄───────┤ Bad Hash (!Sync,!Side) │
|
|
|
|
# └────┬───┘ └────────────────────────┘
|
|
|
|
# │
|
|
|
|
# │
|
|
|
|
# ┌────▼───┐ ┌────────────────────────┐
|
|
|
|
# │ HEAD-1 │◄───────┤ Bad Hash (!Sync, Side) │
|
|
|
|
# └────┬───┘ └────────────────────────┘
|
|
|
|
# │
|
|
|
|
#
|
|
|
|
#
|
|
|
|
# (fcU)
|
|
|
|
# ******************** ┌───────────────────────┐
|
|
|
|
# * (Unknown) HEAD *◄─┤ Bad Hash (Sync,!Side) │
|
|
|
|
# ******************** └───────────────────────┘
|
|
|
|
# │
|
|
|
|
# │
|
|
|
|
# ┌────▼───┐ ┌───────────────────────┐
|
|
|
|
# │ HEAD-1 │◄───────────┤ Bad Hash (Sync, Side) │
|
|
|
|
# └────┬───┘ └───────────────────────┘
|
|
|
|
# │
|
|
|
|
#
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
type
|
|
|
|
Shadow = ref object
|
|
|
|
hash: Hash256
|
|
|
|
|
2022-06-13 09:42:01 +00:00
|
|
|
template badHashOnNewPayloadGen(procname: untyped, syncingCond: bool, sideChain: bool) =
|
2022-06-01 13:32:07 +00:00
|
|
|
proc procName(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
|
|
|
|
|
|
|
# Produce blocks before starting the test
|
|
|
|
let produce5BlockRes = t.clMock.produceBlocks(5, BlockProcessCallbacks())
|
|
|
|
testCond produce5BlockRes
|
|
|
|
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
let shadow = Shadow()
|
|
|
|
|
|
|
|
var produceSingleBlockRes = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
# Run test after the new payload has been obtained
|
|
|
|
onGetPayload: proc(): bool =
|
|
|
|
# Alter hash on the payload and send it to client, should produce an error
|
|
|
|
var alteredPayload = clMock.latestPayloadBuilt
|
|
|
|
var invalidPayloadHash = hash256(alteredPayload.blockHash)
|
|
|
|
let lastByte = int invalidPayloadHash.data[^1]
|
|
|
|
invalidPayloadHash.data[^1] = byte(not lastByte)
|
|
|
|
shadow.hash = invalidPayloadHash
|
|
|
|
alteredPayload.blockHash = BlockHash invalidPayloadHash.data
|
|
|
|
|
|
|
|
when not syncingCond and sideChain:
|
|
|
|
# We alter the payload by setting the parent to a known past block in the
|
|
|
|
# canonical chain, which makes this payload a side chain payload, and also an invalid block hash
|
|
|
|
# (because we did not update the block hash appropriately)
|
|
|
|
alteredPayload.parentHash = Web3BlockHash clMock.latestHeader.parentHash.data
|
|
|
|
elif syncingCond:
|
|
|
|
# We need to send an fcU to put the client in SYNCING state.
|
|
|
|
var randomHeadBlock: Hash256
|
|
|
|
doAssert nimcrypto.randomBytes(randomHeadBlock.data) == 32
|
|
|
|
|
|
|
|
let latestHeaderHash = clMock.latestHeader.blockHash
|
|
|
|
let fcU = ForkchoiceStateV1(
|
|
|
|
headBlockHash: Web3BlockHash randomHeadBlock.data,
|
|
|
|
safeBlockHash: Web3BlockHash latestHeaderHash.data,
|
|
|
|
finalizedBlockHash: Web3BlockHash latestHeaderHash.data
|
|
|
|
)
|
|
|
|
|
|
|
|
let r = client.forkchoiceUpdatedV1(fcU)
|
|
|
|
if r.isErr:
|
|
|
|
return false
|
|
|
|
let z = r.get()
|
|
|
|
if z.payloadStatus.status != PayloadExecutionStatus.syncing:
|
|
|
|
return false
|
|
|
|
|
|
|
|
when sidechain:
|
|
|
|
# Syncing and sidechain, the caonincal head is an unknown payload to us,
|
|
|
|
# but this specific bad hash payload is in theory part of a side chain.
|
|
|
|
# Therefore the parent we use is the head hash.
|
|
|
|
alteredPayload.parentHash = Web3BlockHash latestHeaderHash.data
|
|
|
|
else:
|
|
|
|
# The invalid bad-hash payload points to the unknown head, but we know it is
|
|
|
|
# indeed canonical because the head was set using forkchoiceUpdated.
|
|
|
|
alteredPayload.parentHash = Web3BlockHash randomHeadBlock.data
|
|
|
|
|
|
|
|
let res = client.newPayloadV1(alteredPayload)
|
|
|
|
# Execution specification::
|
|
|
|
# - {status: INVALID_BLOCK_HASH, latestValidHash: null, validationError: null} if the blockHash validation has failed
|
|
|
|
if res.isErr:
|
|
|
|
return false
|
|
|
|
let s = res.get()
|
|
|
|
if s.status != PayloadExecutionStatus.invalid_block_hash:
|
|
|
|
return false
|
|
|
|
s.latestValidHash.isNone
|
|
|
|
))
|
|
|
|
testCond produceSingleBlockRes
|
|
|
|
|
|
|
|
# Lastly, attempt to build on top of the invalid payload
|
|
|
|
produceSingleBlockRes = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
# Run test after the new payload has been obtained
|
|
|
|
onGetPayload: proc(): bool =
|
|
|
|
let payload = toExecutableData(clMock.latestPayloadBuilt)
|
|
|
|
let alteredPayload = customizePayload(payload, CustomPayload(
|
|
|
|
parentHash: some(shadow.hash),
|
|
|
|
))
|
|
|
|
let res = client.newPayloadV1(alteredPayload)
|
|
|
|
if res.isErr:
|
|
|
|
return false
|
|
|
|
# Response status can be ACCEPTED (since parent payload could have been thrown out by the client)
|
|
|
|
# or INVALID (client still has the payload and can verify that this payload is incorrectly building on top of it),
|
|
|
|
# but a VALID response is incorrect.
|
|
|
|
let s = res.get()
|
|
|
|
s.status != PayloadExecutionStatus.valid
|
|
|
|
))
|
|
|
|
testCond produceSingleBlockRes
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
badHashOnNewPayloadGen(badHashOnNewPayload1, false, false)
|
|
|
|
badHashOnNewPayloadGen(badHashOnNewPayload2, true, false)
|
|
|
|
badHashOnNewPayloadGen(badHashOnNewPayload3, false, true)
|
|
|
|
badHashOnNewPayloadGen(badHashOnNewPayload4, true, true)
|
2022-04-20 07:57:50 +00:00
|
|
|
|
|
|
|
proc parentHashOnExecPayload(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond ok
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Produce blocks before starting the test
|
|
|
|
let produce5BlockRes = t.clMock.produceBlocks(5, BlockProcessCallbacks())
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond produce5BlockRes
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
var produceSingleBlockRes = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
# Run test after the new payload has been obtained
|
|
|
|
onGetPayload: proc(): bool =
|
|
|
|
# Alter hash on the payload and send it to client, should produce an error
|
|
|
|
var alteredPayload = clMock.latestPayloadBuilt
|
|
|
|
alteredPayload.blockHash = alteredPayload.parentHash
|
|
|
|
let res = client.newPayloadV1(alteredPayload)
|
|
|
|
if res.isErr:
|
|
|
|
return false
|
|
|
|
# Execution specification::
|
|
|
|
# - {status: INVALID_BLOCK_HASH, latestValidHash: null, validationError: null} if the blockHash validation has failed
|
|
|
|
let s = res.get()
|
|
|
|
s.status == PayloadExecutionStatus.invalid_block_hash
|
|
|
|
))
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond produceSingleBlockRes
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-17 00:53:33 +00:00
|
|
|
# Attempt to re-org to a chain containing an invalid transition payload
|
|
|
|
proc invalidTransitionPayload(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
|
|
|
# Wait until TTD is reached by main client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
|
|
|
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
|
|
|
|
# Produce two blocks before trying to re-org
|
|
|
|
t.nonce = 2 # Initial PoW chain already contains 2 transactions
|
|
|
|
var pbRes = clMock.produceBlocks(2, BlockProcessCallbacks(
|
|
|
|
onPayloadProducerSelected: proc(): bool =
|
|
|
|
t.sendTx(1.u256)
|
|
|
|
))
|
|
|
|
|
|
|
|
testCond pbRes
|
|
|
|
|
|
|
|
# Introduce the invalid transition payload
|
|
|
|
pbRes = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
# This is being done in the middle of the block building
|
|
|
|
# process simply to be able to re-org back.
|
|
|
|
onGetPayload: proc(): bool =
|
|
|
|
let basePayload = clMock.executedPayloadHistory[clMock.posBlockNumber]
|
|
|
|
let alteredPayload = generateInvalidPayload(basePayload, InvalidStateRoot)
|
|
|
|
|
|
|
|
let res = client.newPayloadV1(alteredPayload)
|
|
|
|
let cond = {PayloadExecutionStatus.invalid, PayloadExecutionStatus.accepted}
|
|
|
|
testNPEither(res, cond, some(Hash256()))
|
|
|
|
|
|
|
|
let rr = client.forkchoiceUpdatedV1(
|
|
|
|
ForkchoiceStateV1(headBlockHash: alteredPayload.blockHash)
|
|
|
|
)
|
|
|
|
testFCU(rr, invalid, some(Hash256()))
|
|
|
|
|
2022-06-27 05:26:03 +00:00
|
|
|
testLatestHeader(client, clMock.latestExecutedPayload.blockHash)
|
|
|
|
return true
|
2022-06-17 00:53:33 +00:00
|
|
|
))
|
|
|
|
|
|
|
|
testCond pbRes
|
|
|
|
|
2022-06-13 09:42:01 +00:00
|
|
|
template invalidPayloadTestCaseGen(procName: untyped, payloadField: InvalidPayloadField, emptyTxs: bool = false) =
|
|
|
|
proc procName(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
|
|
|
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
|
2022-06-17 00:53:33 +00:00
|
|
|
template txProc(): bool =
|
2022-06-13 09:42:01 +00:00
|
|
|
when not emptyTxs:
|
2022-06-17 00:53:33 +00:00
|
|
|
t.sendTx(0.u256)
|
|
|
|
else:
|
|
|
|
true
|
2022-06-13 09:42:01 +00:00
|
|
|
|
|
|
|
# Produce blocks before starting the test
|
|
|
|
var pbRes = clMock.produceBlocks(5, BlockProcessCallbacks(
|
|
|
|
# Make sure at least one transaction is included in each block
|
|
|
|
onPayloadProducerSelected: proc(): bool =
|
|
|
|
txProc()
|
|
|
|
))
|
|
|
|
|
|
|
|
testCond pbRes
|
|
|
|
|
|
|
|
let invalidPayload = Shadow()
|
|
|
|
|
|
|
|
pbRes = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
# Make sure at least one transaction is included in the payload
|
|
|
|
onPayloadProducerSelected: proc(): bool =
|
|
|
|
txProc()
|
|
|
|
,
|
|
|
|
# Run test after the new payload has been obtained
|
|
|
|
onGetPayload: proc(): bool =
|
|
|
|
# Alter the payload while maintaining a valid hash and send it to the client, should produce an error
|
|
|
|
|
|
|
|
# We need at least one transaction for most test cases to work
|
|
|
|
when not emptyTxs:
|
|
|
|
if clMock.latestPayloadBuilt.transactions.len == 0:
|
|
|
|
# But if the payload has no transactions, the test is invalid
|
|
|
|
error "No transactions in the base payload"
|
|
|
|
return false
|
|
|
|
|
2022-06-17 00:53:33 +00:00
|
|
|
let alteredPayload = generateInvalidPayload(clMock.latestPayloadBuilt, payloadField, t.vaultKey)
|
2022-06-13 09:42:01 +00:00
|
|
|
invalidPayload.hash = hash256(alteredPayload.blockHash)
|
|
|
|
|
|
|
|
# Depending on the field we modified, we expect a different status
|
|
|
|
let rr = client.newPayloadV1(alteredPayload)
|
|
|
|
if rr.isErr:
|
|
|
|
error "unable to send altered payload", msg=rr.error
|
|
|
|
return false
|
|
|
|
let s = rr.get()
|
|
|
|
|
|
|
|
when payloadField == InvalidParentHash:
|
|
|
|
# Execution specification::
|
|
|
|
# {status: ACCEPTED, latestValidHash: null, validationError: null} if the following conditions are met:
|
|
|
|
# - the blockHash of the payload is valid
|
|
|
|
# - the payload doesn't extend the canonical chain
|
|
|
|
# - the payload hasn't been fully validated
|
|
|
|
# {status: SYNCING, latestValidHash: null, validationError: null}
|
|
|
|
# if the payload extends the canonical chain and requisite data for its validation is missing
|
|
|
|
# (the client can assume the payload extends the canonical because the linking payload could be missing)
|
|
|
|
if s.status notin {PayloadExecutionStatus.syncing, PayloadExecutionStatus.accepted}:
|
|
|
|
error "newPayloadV1 status expect syncing or accepted", get=s.status
|
|
|
|
return false
|
|
|
|
|
|
|
|
if s.latestValidHash.isSome:
|
|
|
|
error "newPayloadV1 latestValidHash not empty"
|
|
|
|
return false
|
|
|
|
else:
|
|
|
|
if s.status != PayloadExecutionStatus.invalid:
|
|
|
|
error "newPayloadV1 status expect invalid", get=s.status
|
|
|
|
return false
|
|
|
|
|
|
|
|
if s.latestValidHash.isNone:
|
|
|
|
return false
|
|
|
|
|
|
|
|
let latestValidHash = s.latestValidHash.get
|
|
|
|
if latestValidHash != alteredPayload.parentHash:
|
|
|
|
error "latestValidHash is not the same with parentHash",
|
2022-07-04 05:35:03 +00:00
|
|
|
expected = alteredPayload.parentHash, get = latestValidHash
|
2022-06-13 09:42:01 +00:00
|
|
|
return false
|
|
|
|
|
|
|
|
# Send the forkchoiceUpdated with a reference to the invalid payload.
|
|
|
|
let fcState = ForkchoiceStateV1(
|
|
|
|
headBlockHash: alteredPayload.blockHash,
|
|
|
|
safeBlockHash: alteredPayload.blockHash,
|
|
|
|
finalizedBlockHash: alteredPayload.blockHash,
|
|
|
|
)
|
|
|
|
|
|
|
|
let timestamp = Quantity(alteredPayload.timestamp.int64 + 1)
|
|
|
|
let payloadAttr = PayloadAttributesV1(timestamp: timestamp)
|
|
|
|
|
|
|
|
# Execution specification:
|
|
|
|
# {payloadStatus: {status: INVALID, latestValidHash: null, validationError: errorMessage | null}, payloadId: null}
|
|
|
|
# obtained from the Payload validation process if the payload is deemed INVALID
|
|
|
|
let rs = client.forkchoiceUpdatedV1(fcState, some(payloadAttr))
|
|
|
|
# Execution specification:
|
|
|
|
# {payloadStatus: {status: INVALID, latestValidHash: null, validationError: errorMessage | null}, payloadId: null}
|
|
|
|
# obtained from the Payload validation process if the payload is deemed INVALID
|
|
|
|
# Note: SYNCING/ACCEPTED is acceptable here as long as the block produced after this test is produced successfully
|
|
|
|
if rs.isErr:
|
|
|
|
error "unable to send altered payload", msg=rs.error
|
|
|
|
return false
|
|
|
|
|
|
|
|
let z = rs.get()
|
|
|
|
if z.payloadStatus.status notin {PayloadExecutionStatus.syncing, PayloadExecutionStatus.accepted, PayloadExecutionStatus.invalid}:
|
|
|
|
return false
|
|
|
|
|
|
|
|
# Finally, attempt to fetch the invalid payload using the JSON-RPC endpoint
|
|
|
|
var header: BlockHeader
|
|
|
|
let rp = client.headerByHash(alteredPayload.blockHash.hash256, header)
|
|
|
|
rp.isErr
|
|
|
|
))
|
|
|
|
|
|
|
|
testCond pbRes
|
|
|
|
|
|
|
|
# Lastly, attempt to build on top of the invalid payload
|
|
|
|
let psb = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
# Run test after the new payload has been obtained
|
|
|
|
onGetPayload: proc(): bool =
|
|
|
|
let alteredPayload = customizePayload(clMock.latestPayloadBuilt.toExecutableData, CustomPayload(
|
|
|
|
parentHash: some(invalidPayload.hash),
|
|
|
|
))
|
|
|
|
|
|
|
|
info "Sending customized NewPayload: ParentHash",
|
2022-07-04 05:35:03 +00:00
|
|
|
fromHash=clMock.latestPayloadBuilt.parentHash, toHash=invalidPayload.hash
|
2022-06-13 09:42:01 +00:00
|
|
|
# Response status can be ACCEPTED (since parent payload could have been thrown out by the client)
|
|
|
|
# or SYNCING (parent payload is thrown out and also client assumes that the parent is part of canonical chain)
|
|
|
|
# or INVALID (client still has the payload and can verify that this payload is incorrectly building on top of it),
|
|
|
|
# but a VALID response is incorrect.
|
|
|
|
let rr = client.newPayloadV1(alteredPayload)
|
|
|
|
if rr.isErr:
|
|
|
|
error "unable to send altered payload", msg=rr.error
|
|
|
|
return false
|
|
|
|
|
|
|
|
let z = rr.get()
|
|
|
|
z.status in {PayloadExecutionStatus.syncing, PayloadExecutionStatus.accepted, PayloadExecutionStatus.invalid}
|
|
|
|
))
|
|
|
|
|
|
|
|
testCond psb
|
|
|
|
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload1, InvalidParentHash)
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload2, InvalidStateRoot)
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload3, InvalidStateRoot, true)
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload4, InvalidReceiptsRoot)
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload5, InvalidNumber)
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload6, InvalidGasLimit)
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload7, InvalidGasUsed)
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload8, InvalidTimestamp)
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload9, InvalidPrevRandao)
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload10, RemoveTransaction)
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload11, InvalidTransactionSignature)
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload12, InvalidTransactionNonce)
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload13, InvalidTransactionGasPrice)
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload14, InvalidTransactionGas)
|
|
|
|
invalidPayloadTestCaseGen(invalidPayload15, InvalidTransactionValue)
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Test to verify Block information available at the Eth RPC after NewPayload
|
2022-06-13 09:42:01 +00:00
|
|
|
template blockStatusExecPayloadGen(procname: untyped, transitionBlock: bool) =
|
2022-06-01 13:32:07 +00:00
|
|
|
proc procName(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
|
|
|
|
|
|
|
# Produce blocks before starting the test, only if we are not testing the transition block
|
|
|
|
when not transitionBlock:
|
|
|
|
let produce5BlockRes = t.clMock.produceBlocks(5, BlockProcessCallbacks())
|
|
|
|
testCond produce5BlockRes
|
|
|
|
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
let shadow = Shadow()
|
|
|
|
|
|
|
|
var produceSingleBlockRes = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
onPayloadProducerSelected: proc(): bool =
|
|
|
|
var address: EthAddress
|
2022-06-17 00:53:33 +00:00
|
|
|
testCond t.sendTx(address, 1.u256)
|
|
|
|
shadow.hash = rlpHash(t.tx)
|
2022-06-01 13:32:07 +00:00
|
|
|
return true
|
|
|
|
,
|
|
|
|
onNewPayloadBroadcast: proc(): bool =
|
2022-06-27 05:26:03 +00:00
|
|
|
testLatestHeader(client, clMock.latestForkchoice.headBlockHash)
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
let nRes = client.blockNumber()
|
|
|
|
if nRes.isErr:
|
|
|
|
error "Unable to get latest block number", msg=nRes.error
|
|
|
|
return false
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
# Latest block number available via Eth RPC should not have changed at this point
|
|
|
|
let latestNumber = nRes.get
|
|
|
|
if latestNumber != clMock.latestHeadNumber:
|
|
|
|
error "latest block number incorrect after newPayload",
|
|
|
|
expected=clMock.latestHeadNumber,
|
|
|
|
get=latestNumber
|
|
|
|
return false
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
# Check that the receipt for the transaction we just sent is still not available
|
|
|
|
let rr = client.txReceipt(shadow.hash)
|
|
|
|
if rr.isOk:
|
|
|
|
error "not expecting receipt"
|
|
|
|
return false
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
return true
|
|
|
|
))
|
|
|
|
testCond produceSingleBlockRes
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
blockStatusExecPayloadGen(blockStatusExecPayload1, false)
|
|
|
|
blockStatusExecPayloadGen(blockStatusExecPayload2, true)
|
2022-04-20 07:57:50 +00:00
|
|
|
|
2022-06-27 13:18:54 +00:00
|
|
|
type
|
|
|
|
MissingAncestorShadow = ref object
|
|
|
|
cA: ExecutionPayloadV1
|
|
|
|
n: int
|
|
|
|
altChainPayloads: seq[ExecutionPayloadV1]
|
|
|
|
|
|
|
|
# Attempt to re-org to a chain which at some point contains an unknown payload which is also invalid.
|
|
|
|
# Then reveal the invalid payload and expect that the client rejects it and rejects forkchoice updated calls to this chain.
|
|
|
|
# The invalid_index parameter determines how many payloads apart is the common ancestor from the block that invalidates the chain,
|
|
|
|
# with a value of 1 meaning that the immediate payload after the common ancestor will be invalid.
|
|
|
|
template invalidMissingAncestorReOrgGen(procName: untyped,
|
|
|
|
invalid_index: int, payloadField: InvalidPayloadField, p2psync: bool, emptyTxs: bool) =
|
|
|
|
|
|
|
|
proc procName(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
|
|
|
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
|
|
|
|
# Produce blocks before starting the test
|
|
|
|
testCond clMock.produceBlocks(5, BlockProcessCallbacks())
|
|
|
|
|
|
|
|
let shadow = MissingAncestorShadow(
|
|
|
|
# Save the common ancestor
|
|
|
|
cA: clMock.latestPayloadBuilt,
|
|
|
|
|
|
|
|
# Amount of blocks to deviate starting from the common ancestor
|
|
|
|
n: 10,
|
|
|
|
|
|
|
|
# Slice to save the alternate B chain
|
|
|
|
altChainPayloads: @[]
|
|
|
|
)
|
|
|
|
|
|
|
|
# Append the common ancestor
|
|
|
|
shadow.altChainPayloads.add shadow.cA
|
|
|
|
|
|
|
|
# Produce blocks but at the same time create an alternate chain which contains an invalid payload at some point (INV_P)
|
|
|
|
# CommonAncestor◄─▲── P1 ◄─ P2 ◄─ P3 ◄─ ... ◄─ Pn
|
|
|
|
# │
|
|
|
|
# └── P1' ◄─ P2' ◄─ ... ◄─ INV_P ◄─ ... ◄─ Pn'
|
|
|
|
var pbRes = clMock.produceBlocks(shadow.n, BlockProcessCallbacks(
|
|
|
|
onPayloadProducerSelected: proc(): bool =
|
|
|
|
# Function to send at least one transaction each block produced.
|
|
|
|
# Empty Txs Payload with invalid stateRoot discovered an issue in geth sync, hence this is customizable.
|
|
|
|
when not emptyTxs:
|
|
|
|
# Send the transaction to the prevRandaoContractAddr
|
|
|
|
t.sendTx(1.u256)
|
|
|
|
return true
|
|
|
|
,
|
|
|
|
onGetPayload: proc(): bool =
|
|
|
|
# Insert extraData to ensure we deviate from the main payload, which contains empty extradata
|
|
|
|
var alternatePayload = customizePayload(clMock.latestPayloadBuilt, CustomPayload(
|
|
|
|
parentHash: some(shadow.altChainPayloads[^1].blockHash.hash256),
|
|
|
|
extraData: some(@[1.byte]),
|
|
|
|
))
|
|
|
|
|
|
|
|
if shadow.altChainPayloads.len == invalid_index:
|
|
|
|
alternatePayload = generateInvalidPayload(alternatePayload, payloadField)
|
|
|
|
|
|
|
|
shadow.altChainPayloads.add alternatePayload
|
|
|
|
return true
|
|
|
|
))
|
|
|
|
testCond pbRes
|
|
|
|
|
|
|
|
pbRes = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
# Note: We perform the test in the middle of payload creation by the CL Mock, in order to be able to
|
|
|
|
# re-org back into this chain and use the new payload without issues.
|
|
|
|
onGetPayload: proc(): bool =
|
|
|
|
# Now let's send the alternate chain to the client using newPayload/sync
|
|
|
|
for i in 1..shadow.n:
|
|
|
|
# Send the payload
|
|
|
|
var payloadValidStr = "VALID"
|
|
|
|
if i == invalid_index:
|
|
|
|
payloadValidStr = "INVALID"
|
|
|
|
elif i > invalid_index:
|
|
|
|
payloadValidStr = "VALID with INVALID ancestor"
|
|
|
|
|
|
|
|
info "Invalid chain payload",
|
2022-07-04 05:35:03 +00:00
|
|
|
i = i,
|
|
|
|
payloadValidStr = payloadValidStr,
|
|
|
|
hash = shadow.altChainPayloads[i].blockHash
|
2022-06-27 13:18:54 +00:00
|
|
|
|
|
|
|
let rr = client.newPayloadV1(shadow.altChainPayloads[i])
|
|
|
|
testCond rr.isOk
|
|
|
|
|
|
|
|
let rs = client.forkchoiceUpdatedV1(ForkchoiceStateV1(
|
|
|
|
headBlockHash: shadow.altChainPayloads[i].blockHash,
|
|
|
|
safeBlockHash: shadow.altChainPayloads[i].blockHash
|
|
|
|
))
|
|
|
|
|
|
|
|
if i == invalid_index:
|
|
|
|
# If this is the first payload after the common ancestor, and this is the payload we invalidated,
|
|
|
|
# then we have all the information to determine that this payload is invalid.
|
|
|
|
testNP(rr, invalid, some(shadow.altChainPayloads[i-1].blockHash.hash256))
|
|
|
|
elif i > invalid_index:
|
|
|
|
# We have already sent the invalid payload, but the client could've discarded it.
|
|
|
|
# In reality the CL will not get to this point because it will have already received the `INVALID`
|
|
|
|
# response from the previous payload.
|
|
|
|
let cond = {PayloadExecutionStatus.accepted, PayloadExecutionStatus.syncing, PayloadExecutionStatus.invalid}
|
2022-07-04 05:35:03 +00:00
|
|
|
testNPEither(rr, cond)
|
2022-06-27 13:18:54 +00:00
|
|
|
else:
|
|
|
|
# This is one of the payloads before the invalid one, therefore is valid.
|
2022-07-04 05:35:03 +00:00
|
|
|
let latestValidHash = some(shadow.altChainPayloads[i].blockHash.hash256)
|
|
|
|
testNP(rr, valid, latestValidHash)
|
|
|
|
testFCU(rs, valid, latestValidHash)
|
2022-06-27 13:18:54 +00:00
|
|
|
|
|
|
|
|
|
|
|
# Resend the latest correct fcU
|
|
|
|
let rx = client.forkchoiceUpdatedV1(clMock.latestForkchoice)
|
2022-07-04 05:35:03 +00:00
|
|
|
testCond rx.isOk:
|
|
|
|
error "Unexpected error ", msg=rx.error
|
2022-06-27 13:18:54 +00:00
|
|
|
|
|
|
|
# After this point, the CL Mock will send the next payload of the canonical chain
|
|
|
|
return true
|
|
|
|
))
|
|
|
|
|
|
|
|
testCond pbRes
|
|
|
|
|
|
|
|
invalidMissingAncestorReOrgGen(invalidMissingAncestor1, 1, InvalidStateRoot, false, true)
|
|
|
|
invalidMissingAncestorReOrgGen(invalidMissingAncestor2, 9, InvalidStateRoot, false, true)
|
|
|
|
invalidMissingAncestorReOrgGen(invalidMissingAncestor3, 10, InvalidStateRoot, false, true)
|
|
|
|
|
2022-06-13 09:42:01 +00:00
|
|
|
template blockStatusHeadBlockGen(procname: untyped, transitionBlock: bool) =
|
2022-06-01 13:32:07 +00:00
|
|
|
proc procName(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
# Produce blocks before starting the test, only if we are not testing the transition block
|
|
|
|
when not transitionBlock:
|
|
|
|
let produce5BlockRes = t.clMock.produceBlocks(5, BlockProcessCallbacks())
|
|
|
|
testCond produce5BlockRes
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
let shadow = Shadow()
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
var produceSingleBlockRes = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
onPayloadProducerSelected: proc(): bool =
|
|
|
|
var address: EthAddress
|
2022-06-17 00:53:33 +00:00
|
|
|
testCond t.sendTx(address, 1.u256)
|
|
|
|
shadow.hash = rlpHash(t.tx)
|
2022-06-01 13:32:07 +00:00
|
|
|
return true
|
|
|
|
,
|
|
|
|
# Run test after a forkchoice with new HeadBlockHash has been broadcasted
|
|
|
|
onForkchoiceBroadcast: proc(): bool =
|
2022-06-27 05:26:03 +00:00
|
|
|
testLatestHeader(client, clMock.latestForkchoice.headBlockHash)
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
let rr = client.txReceipt(shadow.hash)
|
|
|
|
if rr.isErr:
|
|
|
|
error "unable to get transaction receipt"
|
|
|
|
return false
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
return true
|
|
|
|
))
|
|
|
|
testCond produceSingleBlockRes
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
blockStatusHeadBlockGen(blockStatusHeadBlock1, false)
|
|
|
|
blockStatusHeadBlockGen(blockStatusHeadBlock2, true)
|
2022-04-20 07:57:50 +00:00
|
|
|
|
2022-06-27 04:15:23 +00:00
|
|
|
proc blockStatusSafeBlock(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-27 04:15:23 +00:00
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-27 04:15:23 +00:00
|
|
|
# On PoW mode, `safe` tag shall return error.
|
|
|
|
var header: EthBlockHeader
|
|
|
|
var rr = client.namedHeader("safe", header)
|
|
|
|
testCond rr.isErr
|
2022-06-01 13:32:07 +00:00
|
|
|
|
2022-06-27 04:15:23 +00:00
|
|
|
# Wait until this client catches up with latest PoS Block
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
2022-06-01 13:32:07 +00:00
|
|
|
|
2022-06-27 04:15:23 +00:00
|
|
|
# First ForkchoiceUpdated sent was equal to 0x00..00, `safe` should return error now
|
|
|
|
rr = client.namedHeader("safe", header)
|
|
|
|
testCond rr.isErr
|
2022-06-01 13:32:07 +00:00
|
|
|
|
2022-06-27 04:15:23 +00:00
|
|
|
let pbres = clMock.produceBlocks(3, BlockProcessCallbacks(
|
|
|
|
# Run test after a forkchoice with new SafeBlockHash has been broadcasted
|
|
|
|
onSafeBlockChange: proc(): bool =
|
|
|
|
var header: EthBlockHeader
|
|
|
|
let rr = client.namedHeader("safe", header)
|
|
|
|
testCond rr.isOk
|
|
|
|
let safeBlockHash = hash256(clMock.latestForkchoice.safeBlockHash)
|
|
|
|
header.blockHash == safeBlockHash
|
|
|
|
))
|
2022-06-01 13:32:07 +00:00
|
|
|
|
2022-06-27 04:15:23 +00:00
|
|
|
testCond pbres
|
2022-06-01 13:32:07 +00:00
|
|
|
|
2022-06-27 04:15:23 +00:00
|
|
|
proc blockStatusFinalizedBlock(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
2022-06-01 13:32:07 +00:00
|
|
|
|
2022-06-27 04:15:23 +00:00
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
2022-06-01 13:32:07 +00:00
|
|
|
|
2022-06-27 04:15:23 +00:00
|
|
|
# On PoW mode, `finalized` tag shall return error.
|
|
|
|
var header: EthBlockHeader
|
|
|
|
var rr = client.namedHeader("finalized", header)
|
|
|
|
testCond rr.isErr
|
2022-06-01 13:32:07 +00:00
|
|
|
|
2022-06-27 04:15:23 +00:00
|
|
|
# Wait until this client catches up with latest PoS Block
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
2022-06-01 13:32:07 +00:00
|
|
|
|
2022-06-27 04:15:23 +00:00
|
|
|
# First ForkchoiceUpdated sent was equal to 0x00..00, `finalized` should return error now
|
|
|
|
rr = client.namedHeader("finalized", header)
|
|
|
|
testCond rr.isErr
|
2022-06-01 13:32:07 +00:00
|
|
|
|
2022-06-27 04:15:23 +00:00
|
|
|
let pbres = clMock.produceBlocks(3, BlockProcessCallbacks(
|
|
|
|
# Run test after a forkchoice with new FinalizedBlockHash has been broadcasted
|
|
|
|
onFinalizedBlockChange: proc(): bool =
|
|
|
|
var header: EthBlockHeader
|
|
|
|
let rr = client.namedHeader("finalized", header)
|
|
|
|
testCond rr.isOk
|
|
|
|
let finalizedBlockHash = hash256(clMock.latestForkchoice.finalizedBlockHash)
|
|
|
|
header.blockHash == finalizedBlockHash
|
|
|
|
))
|
2022-06-01 13:32:07 +00:00
|
|
|
|
2022-06-27 04:15:23 +00:00
|
|
|
testCond pbres
|
2022-04-20 07:57:50 +00:00
|
|
|
|
|
|
|
proc blockStatusReorg(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond ok
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Produce blocks before starting the test
|
|
|
|
let produce5BlockRes = t.clMock.produceBlocks(5, BlockProcessCallbacks())
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond produce5BlockRes
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
var produceSingleBlockRes = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
# Run test after a forkchoice with new HeadBlockHash has been broadcasted
|
2022-06-01 13:32:07 +00:00
|
|
|
onForkchoiceBroadcast: proc(): bool =
|
2022-04-11 10:00:39 +00:00
|
|
|
# Verify the client is serving the latest HeadBlock
|
|
|
|
var currHeader: EthBlockHeader
|
|
|
|
var hRes = client.latestHeader(currHeader)
|
|
|
|
if hRes.isErr:
|
|
|
|
error "unable to get latest header", msg=hRes.error
|
|
|
|
return false
|
|
|
|
|
|
|
|
var currHash = BlockHash currHeader.blockHash.data
|
|
|
|
if currHash != clMock.latestForkchoice.headBlockHash or
|
|
|
|
currHash == clMock.latestForkchoice.safeBlockHash or
|
|
|
|
currHash == clMock.latestForkchoice.finalizedBlockHash:
|
2022-07-04 05:35:03 +00:00
|
|
|
error "latest block header doesn't match HeadBlock hash", hash=currHash
|
2022-04-11 10:00:39 +00:00
|
|
|
return false
|
|
|
|
|
|
|
|
# Reorg back to the previous block (FinalizedBlock)
|
|
|
|
let reorgForkchoice = ForkchoiceStateV1(
|
|
|
|
headBlockHash: clMock.latestForkchoice.finalizedBlockHash,
|
|
|
|
safeBlockHash: clMock.latestForkchoice.finalizedBlockHash,
|
|
|
|
finalizedBlockHash: clMock.latestForkchoice.finalizedBlockHash
|
|
|
|
)
|
|
|
|
|
|
|
|
var res = client.forkchoiceUpdatedV1(reorgForkchoice)
|
|
|
|
if res.isErr:
|
|
|
|
error "Could not send forkchoiceUpdatedV1", msg=res.error
|
|
|
|
return false
|
|
|
|
|
|
|
|
var s = res.get()
|
|
|
|
if s.payloadStatus.status != PayloadExecutionStatus.valid:
|
|
|
|
error "Incorrect status returned after a HeadBlockHash reorg", status=s.payloadStatus.status
|
|
|
|
return false
|
|
|
|
|
|
|
|
if s.payloadStatus.latestValidHash.isNone:
|
|
|
|
error "Cannot get latestValidHash from payloadStatus"
|
|
|
|
return false
|
|
|
|
|
|
|
|
var latestValidHash = s.payloadStatus.latestValidHash.get
|
|
|
|
if latestValidHash != reorgForkchoice.headBlockHash:
|
|
|
|
error "Incorrect latestValidHash returned after a HeadBlockHash reorg",
|
2022-07-04 05:35:03 +00:00
|
|
|
expected=reorgForkchoice.headBlockHash,
|
|
|
|
get=latestValidHash
|
2022-04-11 10:00:39 +00:00
|
|
|
return false
|
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
# testCond that we reorg to the previous block
|
2022-06-27 05:26:03 +00:00
|
|
|
testLatestHeader(client, reorgForkchoice.headBlockHash)
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Send the HeadBlock again to leave everything back the way it was
|
|
|
|
res = client.forkchoiceUpdatedV1(clMock.latestForkchoice)
|
|
|
|
if res.isErr:
|
|
|
|
error "Could not send forkchoiceUpdatedV1", msg=res.error
|
|
|
|
return false
|
|
|
|
|
|
|
|
s = res.get()
|
|
|
|
if s.payloadStatus.status != PayloadExecutionStatus.valid:
|
|
|
|
error "Incorrect status returned after a HeadBlockHash reorg",
|
|
|
|
status=s.payloadStatus.status
|
|
|
|
return false
|
|
|
|
|
|
|
|
if s.payloadStatus.latestValidHash.isNone:
|
|
|
|
error "Cannot get latestValidHash from payloadStatus"
|
|
|
|
return false
|
|
|
|
|
|
|
|
latestValidHash = s.payloadStatus.latestValidHash.get
|
|
|
|
if latestValidHash != clMock.latestForkchoice.headBlockHash:
|
|
|
|
error "Incorrect latestValidHash returned after a HeadBlockHash reorg",
|
2022-07-04 05:35:03 +00:00
|
|
|
expected=clMock.latestForkchoice.headBlockHash,
|
|
|
|
get=latestValidHash
|
2022-04-11 10:00:39 +00:00
|
|
|
return false
|
|
|
|
return true
|
|
|
|
))
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond produceSingleBlockRes
|
|
|
|
|
|
|
|
proc reExecPayloads(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Wait until this client catches up with latest PoS
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond ok
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# How many Payloads we are going to re-execute
|
|
|
|
var payloadReExecCount = 10
|
|
|
|
|
|
|
|
# Create those blocks
|
|
|
|
let produceBlockRes = t.clMock.produceBlocks(payloadReExecCount, BlockProcessCallbacks())
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond produceBlockRes
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Re-execute the payloads
|
|
|
|
let client = t.rpcClient
|
|
|
|
var hRes = client.blockNumber()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond hRes.isOk:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "unable to get blockNumber", msg=hRes.error
|
|
|
|
|
|
|
|
let lastBlock = int(hRes.get)
|
|
|
|
info "Started re-executing payloads at block", number=lastBlock
|
|
|
|
|
|
|
|
let
|
|
|
|
clMock = t.clMock
|
|
|
|
start = lastBlock - payloadReExecCount + 1
|
|
|
|
|
|
|
|
for i in start..lastBlock:
|
|
|
|
if clMock.executedPayloadHistory.hasKey(uint64 i):
|
|
|
|
let payload = clMock.executedPayloadHistory[uint64 i]
|
|
|
|
let res = client.newPayloadV1(payload)
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond res.isOk:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "FAIL (%s): Unable to re-execute valid payload", msg=res.error
|
|
|
|
|
|
|
|
let s = res.get()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond s.status == PayloadExecutionStatus.valid:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "Unexpected status after re-execute valid payload", status=s.status
|
|
|
|
else:
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond true:
|
|
|
|
error "(test issue) Payload does not exist", index=i
|
|
|
|
|
|
|
|
proc multipleNewCanonicalPayloads(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond ok
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Produce blocks before starting the test
|
|
|
|
let produce5BlockRes = t.clMock.produceBlocks(5, BlockProcessCallbacks())
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond produce5BlockRes
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
var produceSingleBlockRes = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
# Run test after a new payload has been obtained
|
|
|
|
onGetPayload: proc(): bool =
|
|
|
|
let payloadCount = 80
|
|
|
|
let basePayload = toExecutableData(clMock.latestPayloadBuilt)
|
|
|
|
var newPrevRandao: Hash256
|
|
|
|
|
|
|
|
# Fabricate and send multiple new payloads by changing the PrevRandao field
|
|
|
|
for i in 0..<payloadCount:
|
|
|
|
doAssert nimcrypto.randomBytes(newPrevRandao.data) == 32
|
|
|
|
let newPayload = customizePayload(basePayload, CustomPayload(
|
|
|
|
prevRandao: some(newPrevRandao)
|
|
|
|
))
|
|
|
|
|
|
|
|
let res = client.newPayloadV1(newPayload)
|
|
|
|
if res.isErr:
|
|
|
|
error "Unable to send new valid payload extending canonical chain", msg=res.error
|
|
|
|
return false
|
|
|
|
|
|
|
|
let s = res.get()
|
|
|
|
if s.status != PayloadExecutionStatus.valid:
|
|
|
|
error "Unexpected status after trying to send new valid payload extending canonical chain",
|
|
|
|
status=s.status
|
|
|
|
return false
|
|
|
|
return true
|
|
|
|
))
|
2022-06-01 13:32:07 +00:00
|
|
|
# At the end the clMocker continues to try to execute fcU with the original payload, which should not fail
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond produceSingleBlockRes
|
|
|
|
|
|
|
|
proc outOfOrderPayloads(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond ok
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# First prepare payloads on a first client, which will also contain multiple transactions
|
|
|
|
|
|
|
|
# We will be also verifying that the transactions are correctly interpreted in the canonical chain,
|
|
|
|
# prepare a random account to receive funds.
|
|
|
|
const
|
|
|
|
amountPerTx = 1000.u256
|
|
|
|
txPerPayload = 20
|
|
|
|
payloadCount = 10
|
|
|
|
|
|
|
|
var recipient: EthAddress
|
|
|
|
doAssert nimcrypto.randomBytes(recipient) == 20
|
|
|
|
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
var produceBlockRes = clMock.produceBlocks(payloadCount, BlockProcessCallbacks(
|
2022-06-01 13:32:07 +00:00
|
|
|
# We send the transactions after we got the Payload ID, before the clMocker gets the prepared Payload
|
2022-04-11 10:00:39 +00:00
|
|
|
onPayloadProducerSelected: proc(): bool =
|
|
|
|
for i in 0..<txPerPayload:
|
2022-06-17 00:53:33 +00:00
|
|
|
testCond t.sendTx(recipient, amountPerTx)
|
2022-04-11 10:00:39 +00:00
|
|
|
return true
|
|
|
|
))
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond produceBlockRes
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
let expectedBalance = amountPerTx * u256(payloadCount*txPerPayload)
|
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
# testCond balance on this first client
|
2022-04-11 10:00:39 +00:00
|
|
|
let balRes = client.balanceAt(recipient)
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond balRes.isOk:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "Error while getting balance of funded account"
|
|
|
|
|
|
|
|
let bal = balRes.get()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond expectedBalance == bal
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# TODO: this section need multiple client
|
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
# Test that performing a re-org back into a previous block of the canonical chain does not produce errors and the chain
|
|
|
|
# is still capable of progressing.
|
|
|
|
proc reorgBack(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
|
|
|
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
|
2022-07-04 12:31:41 +00:00
|
|
|
testCond clMock.produceSingleBlock(BlockProcessCallbacks())
|
2022-06-01 13:32:07 +00:00
|
|
|
|
|
|
|
# We are going to reorg back to this previous hash several times
|
|
|
|
let previousHash = clMock.latestForkchoice.headBlockHash
|
|
|
|
|
|
|
|
# Produce blocks before starting the test (So we don't try to reorg back to the genesis block)
|
|
|
|
let r2 = clMock.produceBlocks(5, BlockProcessCallbacks(
|
|
|
|
onForkchoiceBroadcast: proc(): bool =
|
|
|
|
# Send a fcU with the HeadBlockHash pointing back to the previous block
|
|
|
|
let forkchoiceUpdatedBack = ForkchoiceStateV1(
|
|
|
|
headBlockHash: previousHash,
|
|
|
|
safeBlockHash: previousHash,
|
|
|
|
finalizedBlockHash: previousHash,
|
|
|
|
)
|
|
|
|
|
|
|
|
# It is only expected that the client does not produce an error and the CL Mocker is able to progress after the re-org
|
|
|
|
let r = client.forkchoiceUpdatedV1(forkchoiceUpdatedBack)
|
2022-07-04 12:31:41 +00:00
|
|
|
testCond r.isOk:
|
2022-06-27 09:49:51 +00:00
|
|
|
error "failed to reorg back", msg = r.error
|
|
|
|
return true
|
2022-06-01 13:32:07 +00:00
|
|
|
))
|
|
|
|
testCond r2
|
|
|
|
|
|
|
|
# Verify that the client is pointing to the latest payload sent
|
2022-06-27 05:26:03 +00:00
|
|
|
testLatestHeader(client, clMock.latestPayloadBuilt.blockHash)
|
2022-06-01 13:32:07 +00:00
|
|
|
|
|
|
|
# Test that performs a re-org back to the canonical chain after re-org to syncing/unavailable chain.
|
|
|
|
type
|
|
|
|
SideChainList = ref object
|
|
|
|
sidechainPayloads: seq[ExecutionPayloadV1]
|
|
|
|
|
|
|
|
proc reorgBackFromSyncing(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
|
|
|
testCond ok
|
|
|
|
|
|
|
|
# Produce an alternative chain
|
|
|
|
let pList = SideChainList()
|
|
|
|
let clMock = t.clMock
|
|
|
|
let client = t.rpcClient
|
|
|
|
|
|
|
|
let r1 = clMock.produceBlocks(10, BlockProcessCallbacks(
|
|
|
|
onGetPayload: proc(): bool =
|
|
|
|
# Generate an alternative payload by simply adding extraData to the block
|
|
|
|
var altParentHash = clMock.latestPayloadBuilt.parentHash
|
|
|
|
|
|
|
|
if pList.sidechainPayloads.len > 0:
|
|
|
|
altParentHash = pList.sidechainPayloads[^1].blockHash
|
|
|
|
|
|
|
|
let executableData = toExecutableData(clMock.latestPayloadBuilt)
|
|
|
|
let altPayload = customizePayload(executableData,
|
|
|
|
CustomPayload(
|
|
|
|
parentHash: some(altParentHash.hash256),
|
|
|
|
extraData: some(@[0x01.byte]),
|
|
|
|
))
|
|
|
|
|
|
|
|
pList.sidechainPayloads.add(altPayload)
|
|
|
|
return true
|
|
|
|
))
|
|
|
|
|
|
|
|
testCond r1
|
|
|
|
|
|
|
|
|
|
|
|
# Produce blocks before starting the test (So we don't try to reorg back to the genesis block)
|
|
|
|
let r2= clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
onGetPayload: proc(): bool =
|
|
|
|
let r = client.newPayloadV1(pList.sidechainPayloads[^1])
|
|
|
|
if r.isErr:
|
|
|
|
return false
|
|
|
|
let s = r.get()
|
|
|
|
if s.status notin {PayloadExecutionStatus.syncing, PayloadExecutionStatus.accepted}:
|
|
|
|
return false
|
|
|
|
|
|
|
|
# We are going to send one of the alternative payloads and fcU to it
|
|
|
|
let len = pList.sidechainPayloads.len
|
|
|
|
let forkchoiceUpdatedBack = ForkchoiceStateV1(
|
|
|
|
headBlockHash: pList.sidechainPayloads[len-1].blockHash,
|
|
|
|
safeBlockHash: pList.sidechainPayloads[len-2].blockHash,
|
|
|
|
finalizedBlockHash: pList.sidechainPayloads[len-3].blockHash,
|
|
|
|
)
|
|
|
|
|
|
|
|
# It is only expected that the client does not produce an error and the CL Mocker is able to progress after the re-org
|
|
|
|
let res = client.forkchoiceUpdatedV1(forkchoiceUpdatedBack)
|
|
|
|
if res.isErr:
|
|
|
|
return false
|
|
|
|
|
|
|
|
let rs = res.get()
|
|
|
|
if rs.payloadStatus.status != PayloadExecutionStatus.syncing:
|
|
|
|
return false
|
|
|
|
|
|
|
|
rs.payloadStatus.latestValidHash.isNone
|
|
|
|
# After this, the clMocker will continue and try to re-org to canonical chain once again
|
|
|
|
# clMocker will fail the test if this is not possible, so nothing left to do.
|
|
|
|
))
|
|
|
|
|
|
|
|
testCond r2
|
|
|
|
|
2022-06-27 05:26:03 +00:00
|
|
|
type
|
|
|
|
TxReorgShadow = ref object
|
|
|
|
noTxnPayload: ExecutionPayloadV1
|
|
|
|
txHash: Hash256
|
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
proc transactionReorg(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
2022-04-11 10:00:39 +00:00
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond ok
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Produce blocks before starting the test
|
2022-06-17 00:53:33 +00:00
|
|
|
testCond t.clMock.produceBlocks(5, BlockProcessCallbacks())
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
# Create transactions that modify the state in order to testCond after the reorg.
|
2022-04-11 10:00:39 +00:00
|
|
|
const
|
|
|
|
txCount = 5
|
|
|
|
contractAddr = hexToByteArray[20]("0000000000000000000000000000000000000317")
|
|
|
|
|
|
|
|
let
|
|
|
|
client = t.rpcClient
|
|
|
|
clMock = t.clMock
|
2022-06-27 05:26:03 +00:00
|
|
|
shadow = TxReorgShadow()
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
for i in 0..<txCount:
|
2022-06-27 05:26:03 +00:00
|
|
|
# Generate two payloads, one with the transaction and the other one without it
|
|
|
|
let pbres = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
onPayloadProducerSelected: proc(): bool =
|
|
|
|
# At this point we have not broadcast the transaction,
|
|
|
|
# therefore any payload we get should not contain any transactions
|
|
|
|
if not clMock.getNextPayloadID(): return false
|
|
|
|
if not clMock.getNextPayload(): return false
|
|
|
|
|
|
|
|
shadow.noTxnPayload = clMock.latestPayloadBuilt
|
|
|
|
if shadow.noTxnPayload.transactions.len != 0:
|
|
|
|
error "Empty payload contains transactions"
|
|
|
|
return false
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-27 05:26:03 +00:00
|
|
|
# At this point we can broadcast the transaction and it will be included in the next payload
|
|
|
|
# Data is the key where a `1` will be stored
|
|
|
|
let data = i.u256
|
|
|
|
testCond t.sendTx(contractAddr, 0.u256, data.toBytesBE)
|
|
|
|
shadow.txHash = rlpHash(t.tx)
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-27 05:26:03 +00:00
|
|
|
# Get the receipt
|
|
|
|
let rr = client.txReceipt(shadow.txHash)
|
|
|
|
if rr.isOk:
|
|
|
|
error "Receipt obtained before tx included in block"
|
|
|
|
return false
|
|
|
|
return true
|
|
|
|
,
|
|
|
|
onGetPayload: proc(): bool =
|
|
|
|
# Check that indeed the payload contains the transaction
|
|
|
|
if not txInPayload(clMock.latestPayloadBuilt, shadow.txHash):
|
|
|
|
error "Payload built does not contain the transaction"
|
|
|
|
return false
|
|
|
|
return true
|
|
|
|
,
|
|
|
|
onForkchoiceBroadcast: proc(): bool =
|
|
|
|
# Transaction is now in the head of the canonical chain, re-org and verify it's removed
|
|
|
|
var rr = client.txReceipt(shadow.txHash)
|
|
|
|
if rr.isErr:
|
|
|
|
error "Unable to obtain transaction receipt"
|
|
|
|
return false
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-27 05:26:03 +00:00
|
|
|
if shadow.noTxnPayload.parentHash != clMock.latestPayloadBuilt.parentHash:
|
|
|
|
error "Incorrect parent hash for payloads",
|
2022-07-04 05:35:03 +00:00
|
|
|
get = shadow.noTxnPayload.parentHash,
|
|
|
|
expect = clMock.latestPayloadBuilt.parentHash
|
2022-06-27 05:26:03 +00:00
|
|
|
return false
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-27 05:26:03 +00:00
|
|
|
if shadow.noTxnPayload.blockHash == clMock.latestPayloadBuilt.blockHash:
|
|
|
|
error "Incorrect hash for payloads",
|
2022-07-04 05:35:03 +00:00
|
|
|
get = shadow.noTxnPayload.blockHash,
|
|
|
|
expect = clMock.latestPayloadBuilt.blockHash
|
2022-06-27 05:26:03 +00:00
|
|
|
return false
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-27 05:26:03 +00:00
|
|
|
let rz = client.newPayloadV1(shadow.noTxnPayload)
|
|
|
|
testNP(rz, valid, some(hash256(shadow.noTxnPayload.blockHash)))
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-27 05:26:03 +00:00
|
|
|
let rx = client.forkchoiceUpdatedV1(ForkchoiceStateV1(
|
|
|
|
headBlockHash: shadow.noTxnPayload.blockHash,
|
|
|
|
safeBlockHash: clMock.latestForkchoice.safeBlockHash,
|
|
|
|
finalizedBlockHash: clMock.latestForkchoice.finalizedBlockHash
|
|
|
|
))
|
|
|
|
testFCU(rx, valid)
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-27 05:26:03 +00:00
|
|
|
testLatestHeader(client, shadow.noTxnPayload.blockHash)
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-27 05:26:03 +00:00
|
|
|
let rk = client.txReceipt(shadow.txHash)
|
|
|
|
if rk.isOk:
|
|
|
|
error "Receipt was obtained when the tx had been re-org'd out"
|
|
|
|
return false
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-27 05:26:03 +00:00
|
|
|
# Re-org back
|
|
|
|
let ry = clMock.broadcastForkchoiceUpdated(clMock.latestForkchoice)
|
|
|
|
ry.isOk
|
|
|
|
))
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-27 05:26:03 +00:00
|
|
|
testCond pbres
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
proc testCondPrevRandaoValue(t: TestEnv, expectedPrevRandao: Hash256, blockNumber: uint64): bool =
|
2022-04-11 10:00:39 +00:00
|
|
|
let storageKey = blockNumber.u256
|
|
|
|
let client = t.rpcClient
|
|
|
|
|
|
|
|
let res = client.storageAt(prevRandaoContractAddr, storageKey)
|
|
|
|
if res.isErr:
|
|
|
|
error "Unable to get storage", msg=res.error
|
|
|
|
return false
|
|
|
|
|
|
|
|
let opcodeValueAtBlock = Hash256(data: res.get().toBytesBE)
|
|
|
|
if opcodeValueAtBlock != expectedPrevRandao:
|
|
|
|
error "Storage does not match prevRandao",
|
2022-07-04 05:35:03 +00:00
|
|
|
expected=expectedPrevRandao.data,
|
|
|
|
get=opcodeValueAtBlock
|
2022-04-11 10:00:39 +00:00
|
|
|
return false
|
|
|
|
true
|
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
proc sidechainReorg(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
2022-04-11 10:00:39 +00:00
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond ok
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Produce blocks before starting the test
|
2022-06-17 00:53:33 +00:00
|
|
|
testCond t.clMock.produceBlocks(5, BlockProcessCallbacks())
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
let
|
|
|
|
client = t.rpcClient
|
|
|
|
clMock = t.clMock
|
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
# Produce two payloads, send fcU with first payload, testCond transaction outcome, then reorg, testCond transaction outcome again
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# This single transaction will change its outcome based on the payload
|
2022-06-17 00:53:33 +00:00
|
|
|
testCond t.sendTx(0.u256)
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
let singleBlockRes = clMock.produceSingleBlock(BlockProcessCallbacks(
|
|
|
|
onNewPayloadBroadcast: proc(): bool =
|
2022-06-01 13:32:07 +00:00
|
|
|
# At this point the clMocker has a payload that will result in a specific outcome,
|
2022-04-11 10:00:39 +00:00
|
|
|
# we can produce an alternative payload, send it, fcU to it, and verify the changes
|
|
|
|
var alternativePrevRandao: Hash256
|
|
|
|
doAssert nimcrypto.randomBytes(alternativePrevRandao.data) == 32
|
|
|
|
|
2022-06-01 13:32:07 +00:00
|
|
|
let timestamp = Quantity toUnix(clMock.latestHeader.timestamp + 1.seconds)
|
2022-04-11 10:00:39 +00:00
|
|
|
let payloadAttributes = PayloadAttributesV1(
|
|
|
|
timestamp: timestamp,
|
|
|
|
prevRandao: FixedBytes[32] alternativePrevRandao.data,
|
|
|
|
suggestedFeeRecipient: Address clMock.nextFeeRecipient,
|
|
|
|
)
|
|
|
|
|
|
|
|
var res = client.forkchoiceUpdatedV1(clMock.latestForkchoice, some(payloadAttributes))
|
|
|
|
if res.isErr:
|
|
|
|
error "Could not send forkchoiceUpdatedV1", msg=res.error
|
|
|
|
return false
|
|
|
|
|
|
|
|
let s = res.get()
|
|
|
|
let rr = client.getPayloadV1(s.payloadID.get())
|
|
|
|
if rr.isErr:
|
|
|
|
error "Could not get alternative payload", msg=rr.error
|
|
|
|
return false
|
|
|
|
|
|
|
|
let alternativePayload = rr.get()
|
|
|
|
if alternativePayload.transactions.len == 0:
|
|
|
|
error "alternative payload does not contain the prevRandao opcode tx"
|
|
|
|
return false
|
|
|
|
|
|
|
|
let rx = client.newPayloadV1(alternativePayload)
|
|
|
|
if rx.isErr:
|
|
|
|
error "Could not send alternative payload", msg=rx.error
|
|
|
|
return false
|
|
|
|
|
|
|
|
let alternativePayloadStatus = rx.get()
|
|
|
|
if alternativePayloadStatus.status != PayloadExecutionStatus.valid:
|
|
|
|
error "Alternative payload response returned Status!=VALID",
|
|
|
|
status=alternativePayloadStatus.status
|
|
|
|
return false
|
|
|
|
|
|
|
|
# We sent the alternative payload, fcU to it
|
|
|
|
let alternativeHeader = toBlockHeader(alternativePayload)
|
|
|
|
let rHash = BlockHash alternativeHeader.blockHash.data
|
|
|
|
let alternativeFcU = ForkchoiceStateV1(
|
|
|
|
headBlockHash: rHash,
|
|
|
|
safeBlockHash: clMock.latestForkchoice.safeBlockHash,
|
|
|
|
finalizedBlockHash: clMock.latestForkchoice.finalizedBlockHash
|
|
|
|
)
|
|
|
|
|
|
|
|
res = client.forkchoiceUpdatedV1(alternativeFcU)
|
|
|
|
if res.isErr:
|
|
|
|
error "Could not send alternative fcU", msg=res.error
|
|
|
|
return false
|
|
|
|
|
|
|
|
let alternativeFcUResp = res.get()
|
|
|
|
if alternativeFcUResp.payloadStatus.status != PayloadExecutionStatus.valid:
|
|
|
|
error "Alternative fcU response returned Status!=VALID",
|
|
|
|
status=alternativeFcUResp.payloadStatus.status
|
|
|
|
return false
|
|
|
|
|
|
|
|
# PrevRandao should be the alternative prevRandao we sent
|
2022-04-20 07:57:50 +00:00
|
|
|
return testCondPrevRandaoValue(t, alternativePrevRandao, uint64 alternativePayload.blockNumber)
|
2022-04-11 10:00:39 +00:00
|
|
|
))
|
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond singleBlockRes
|
2022-06-01 13:32:07 +00:00
|
|
|
# The reorg actually happens after the clMocker continues,
|
2022-04-11 10:00:39 +00:00
|
|
|
# verify here that the reorg was successful
|
2022-06-01 13:32:07 +00:00
|
|
|
let latestBlockNum = clMock.latestHeadNumber.uint64
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond testCondPrevRandaoValue(t, clMock.prevRandaoHistory[latestBlockNum], latestBlockNum)
|
|
|
|
|
|
|
|
proc suggestedFeeRecipient(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor t.clMock.waitForTTD()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond ok
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Amount of transactions to send
|
|
|
|
const
|
|
|
|
txCount = 20
|
|
|
|
|
|
|
|
# Verify that, in a block with transactions, fees are accrued by the suggestedFeeRecipient
|
|
|
|
var feeRecipient: EthAddress
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond nimcrypto.randomBytes(feeRecipient) == 20
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
let
|
|
|
|
client = t.rpcClient
|
|
|
|
clMock = t.clMock
|
|
|
|
|
|
|
|
# Send multiple transactions
|
|
|
|
for i in 0..<txCount:
|
|
|
|
# Empty self tx
|
2022-06-17 00:53:33 +00:00
|
|
|
discard t.sendTx(vaultAccountAddr, 0.u256)
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Produce the next block with the fee recipient set
|
|
|
|
clMock.nextFeeRecipient = feeRecipient
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond clMock.produceSingleBlock(BlockProcessCallbacks())
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
# Calculate the fees and testCond that they match the balance of the fee recipient
|
2022-04-11 10:00:39 +00:00
|
|
|
var blockIncluded: EthBlock
|
|
|
|
var rr = client.latestBlock(blockIncluded)
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond rr.isOk:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "unable to get latest block", msg=rr.error
|
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond blockIncluded.txs.len == txCount:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "not all transactions were included in block",
|
|
|
|
expected=txCount,
|
|
|
|
get=blockIncluded.txs.len
|
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond blockIncluded.header.coinbase == feeRecipient:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "feeRecipient was not set as coinbase",
|
2022-07-04 05:35:03 +00:00
|
|
|
expected=feeRecipient,
|
|
|
|
get=blockIncluded.header.coinbase
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
var feeRecipientFees = 0.u256
|
|
|
|
for tx in blockIncluded.txs:
|
|
|
|
let effGasTip = tx.effectiveGasTip(blockIncluded.header.fee)
|
|
|
|
let tr = client.txReceipt(rlpHash(tx))
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond tr.isOk:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "unable to obtain receipt", msg=tr.error
|
|
|
|
|
|
|
|
let rec = tr.get()
|
|
|
|
let gasUsed = UInt256.fromHex(rec.gasUsed.string)
|
|
|
|
feeRecipientFees = feeRecipientFees + effGasTip.u256 * gasUsed
|
|
|
|
|
|
|
|
var br = client.balanceAt(feeRecipient)
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond br.isOk
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
var feeRecipientBalance = br.get()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond feeRecipientBalance == feeRecipientFees:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "balance does not match fees",
|
|
|
|
feeRecipientBalance, feeRecipientFees
|
|
|
|
|
|
|
|
# Produce another block without txns and get the balance again
|
|
|
|
clMock.nextFeeRecipient = feeRecipient
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond clMock.produceSingleBlock(BlockProcessCallbacks())
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
br = client.balanceAt(feeRecipient)
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond br.isOk
|
2022-04-11 10:00:39 +00:00
|
|
|
feeRecipientBalance = br.get()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond feeRecipientBalance == feeRecipientFees:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "balance does not match fees",
|
|
|
|
feeRecipientBalance, feeRecipientFees
|
|
|
|
|
2022-06-17 00:53:33 +00:00
|
|
|
proc sendTxAsync(t: TestEnv): Future[void] {.async.} =
|
2022-05-29 04:23:03 +00:00
|
|
|
let
|
|
|
|
clMock = t.clMock
|
2022-06-14 06:04:12 +00:00
|
|
|
period = chronos.milliseconds(500)
|
2022-05-29 04:23:03 +00:00
|
|
|
|
|
|
|
while not clMock.ttdReached:
|
|
|
|
await sleepAsync(period)
|
2022-06-17 00:53:33 +00:00
|
|
|
discard t.sendTx(0.u256)
|
2022-05-29 04:23:03 +00:00
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
proc prevRandaoOpcodeTx(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.OK
|
|
|
|
|
2022-04-11 10:00:39 +00:00
|
|
|
let
|
|
|
|
client = t.rpcClient
|
|
|
|
clMock = t.clMock
|
2022-06-17 00:53:33 +00:00
|
|
|
sendTxFuture = sendTxAsync(t)
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Wait until TTD is reached by this client
|
|
|
|
let ok = waitFor clMock.waitForTTD()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond ok
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Ideally all blocks up until TTD must have a DIFFICULTY opcode tx in it
|
|
|
|
let nr = client.blockNumber()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond nr.isOk:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "Unable to get latest block number", msg=nr.error
|
|
|
|
|
|
|
|
let ttdBlockNumber = nr.get()
|
|
|
|
|
|
|
|
# Start
|
|
|
|
for i in ttdBlockNumber..ttdBlockNumber:
|
2022-04-20 07:57:50 +00:00
|
|
|
# First testCond that the block actually contained the transaction
|
2022-04-11 10:00:39 +00:00
|
|
|
var blk: EthBlock
|
|
|
|
let res = client.blockByNumber(i, blk)
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond res.isOk:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "Unable to get block", msg=res.error
|
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond blk.txs.len > 0:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "(Test issue) no transactions went in block"
|
|
|
|
|
|
|
|
let storageKey = i.u256
|
|
|
|
let rr = client.storageAt(prevRandaoContractAddr, storageKey)
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond rr.isOk:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "Unable to get storage", msg=rr.error
|
|
|
|
|
|
|
|
let opcodeValueAtBlock = rr.get()
|
2022-04-20 07:57:50 +00:00
|
|
|
testCond opcodeValueAtBlock == 2.u256:
|
2022-04-11 10:00:39 +00:00
|
|
|
error "Incorrect difficulty value in block",
|
|
|
|
expect=2,
|
|
|
|
get=opcodeValueAtBlock
|
|
|
|
|
2022-06-14 06:04:12 +00:00
|
|
|
# Send transactions now past TTD, the value of the storage in these blocks must match the prevRandao value
|
|
|
|
type
|
|
|
|
ShadowTx = ref object
|
|
|
|
currentTxIndex: int
|
|
|
|
txs: seq[Transaction]
|
|
|
|
|
|
|
|
let shadow = ShadowTx(currentTxIndex: 0)
|
|
|
|
|
2022-06-13 09:42:01 +00:00
|
|
|
let produceBlockRes = clMock.produceBlocks(10, BlockProcessCallbacks(
|
2022-06-14 06:04:12 +00:00
|
|
|
onPayloadProducerSelected: proc(): bool =
|
2022-06-17 00:53:33 +00:00
|
|
|
testCond t.sendTx(0.u256)
|
|
|
|
shadow.txs.add t.tx
|
2022-06-14 06:04:12 +00:00
|
|
|
inc shadow.currentTxIndex
|
|
|
|
return true
|
|
|
|
,
|
|
|
|
onForkchoiceBroadcast: proc(): bool =
|
|
|
|
# Check the transaction tracing, which is client specific
|
|
|
|
let expectedPrevRandao = clMock.prevRandaoHistory[clMock.latestHeadNumber + 1'u64]
|
|
|
|
let res = debugPrevRandaoTransaction(client, shadow.txs[shadow.currentTxIndex-1], expectedPrevRandao)
|
|
|
|
if res.isErr:
|
|
|
|
error "unable to debug prev randao", msg=res.error
|
|
|
|
return false
|
|
|
|
return true
|
|
|
|
))
|
|
|
|
|
2022-08-04 05:06:31 +00:00
|
|
|
testCond produceBlockRes
|
|
|
|
|
2022-06-14 06:04:12 +00:00
|
|
|
let rr = client.blockNumber()
|
|
|
|
testCond rr.isOk:
|
|
|
|
error "Unable to get latest block number"
|
|
|
|
|
|
|
|
let lastBlockNumber = rr.get()
|
|
|
|
for i in ttdBlockNumber + 1 ..< lastBlockNumber:
|
|
|
|
let expectedPrevRandao = UInt256.fromBytesBE(clMock.prevRandaoHistory[i].data)
|
|
|
|
let storageKey = i.u256
|
|
|
|
|
|
|
|
let rz = client.storageAt(prevRandaoContractAddr, storageKey)
|
|
|
|
testCond rz.isOk:
|
|
|
|
error "Unable to get storage", msg=rz.error
|
|
|
|
|
|
|
|
let storage = rz.get()
|
|
|
|
testCond storage == expectedPrevRandao:
|
2022-07-04 05:35:03 +00:00
|
|
|
error "Unexpected storage", expected=expectedPrevRandao, get=storage
|
2022-06-14 06:04:12 +00:00
|
|
|
|
2022-04-20 07:57:50 +00:00
|
|
|
proc postMergeSync(t: TestEnv): TestStatus =
|
|
|
|
result = TestStatus.SKIPPED
|
2022-04-11 10:00:39 +00:00
|
|
|
# TODO: need multiple client
|
|
|
|
|
|
|
|
const engineTestList* = [
|
2022-06-01 13:32:07 +00:00
|
|
|
# Engine API Negative Test Cases
|
|
|
|
TestSpec(
|
2022-04-11 10:00:39 +00:00
|
|
|
name: "Invalid Terminal Block in ForkchoiceUpdated",
|
|
|
|
run: invalidTerminalBlockForkchoiceUpdated,
|
|
|
|
ttd: 1000000
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid GetPayload Under PoW",
|
|
|
|
run: invalidGetPayloadUnderPoW,
|
|
|
|
ttd: 1000000
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid Terminal Block in NewPayload",
|
|
|
|
run: invalidTerminalBlockNewPayload,
|
|
|
|
ttd: 1000000,
|
|
|
|
),
|
2022-06-01 13:32:07 +00:00
|
|
|
TestSpec(
|
|
|
|
name: "Inconsistent Head in ForkchoiceState",
|
|
|
|
run: inconsistentForkchoiceState1,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Inconsistent Safe in ForkchoiceState",
|
|
|
|
run: inconsistentForkchoiceState2,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Inconsistent Finalized in ForkchoiceState",
|
|
|
|
run: inconsistentForkchoiceState3,
|
|
|
|
),
|
2022-04-11 10:00:39 +00:00
|
|
|
TestSpec(
|
|
|
|
name: "Unknown HeadBlockHash",
|
|
|
|
run: unknownHeadBlockHash,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Unknown SafeBlockHash",
|
|
|
|
run: unknownSafeBlockHash,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Unknown FinalizedBlockHash",
|
|
|
|
run: unknownFinalizedBlockHash,
|
|
|
|
),
|
2022-06-01 13:32:07 +00:00
|
|
|
TestSpec(
|
|
|
|
name: "ForkchoiceUpdated Invalid Payload Attributes",
|
|
|
|
run: invalidPayloadAttributes1,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "ForkchoiceUpdated Invalid Payload Attributes (Syncing)",
|
|
|
|
run: invalidPayloadAttributes2,
|
|
|
|
),
|
2022-04-11 10:00:39 +00:00
|
|
|
TestSpec(
|
|
|
|
name: "Pre-TTD ForkchoiceUpdated After PoS Switch",
|
|
|
|
run: preTTDFinalizedBlockHash,
|
|
|
|
ttd: 2,
|
|
|
|
),
|
2022-06-01 13:32:07 +00:00
|
|
|
# Invalid Payload Tests
|
2022-04-11 10:00:39 +00:00
|
|
|
TestSpec(
|
|
|
|
name: "Bad Hash on NewPayload",
|
2022-06-01 13:32:07 +00:00
|
|
|
run: badHashOnNewPayload1,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Bad Hash on NewPayload Syncing",
|
|
|
|
run: badHashOnNewPayload2,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Bad Hash on NewPayload Side Chain",
|
|
|
|
run: badHashOnNewPayload3,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Bad Hash on NewPayload Side Chain Syncing",
|
|
|
|
run: badHashOnNewPayload4,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "ParentHash==BlockHash on NewPayload",
|
|
|
|
run: parentHashOnExecPayload,
|
|
|
|
),
|
2022-06-17 00:53:33 +00:00
|
|
|
TestSpec(
|
|
|
|
name: "Invalid Transition Payload",
|
|
|
|
run: invalidTransitionPayload,
|
|
|
|
ttd: 393504,
|
|
|
|
chainFile: "blocks_2_td_393504.rlp",
|
|
|
|
),
|
2022-04-20 07:57:50 +00:00
|
|
|
TestSpec(
|
2022-04-11 10:00:39 +00:00
|
|
|
name: "Invalid ParentHash NewPayload",
|
2022-06-13 09:42:01 +00:00
|
|
|
run: invalidPayload1,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid StateRoot NewPayload",
|
2022-06-13 09:42:01 +00:00
|
|
|
run: invalidPayload2,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid StateRoot NewPayload, Empty Transactions",
|
|
|
|
run: invalidPayload3,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid ReceiptsRoot NewPayload",
|
2022-06-13 09:42:01 +00:00
|
|
|
run: invalidPayload4,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid Number NewPayload",
|
2022-06-13 09:42:01 +00:00
|
|
|
run: invalidPayload5,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid GasLimit NewPayload",
|
2022-06-13 09:42:01 +00:00
|
|
|
run: invalidPayload6,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid GasUsed NewPayload",
|
2022-06-13 09:42:01 +00:00
|
|
|
run: invalidPayload7,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid Timestamp NewPayload",
|
2022-06-13 09:42:01 +00:00
|
|
|
run: invalidPayload8,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid PrevRandao NewPayload",
|
2022-06-13 09:42:01 +00:00
|
|
|
run: invalidPayload9,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid Incomplete Transactions NewPayload",
|
2022-06-13 09:42:01 +00:00
|
|
|
run: invalidPayload10,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid Transaction Signature NewPayload",
|
2022-06-13 09:42:01 +00:00
|
|
|
run: invalidPayload11,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid Transaction Nonce NewPayload",
|
2022-06-13 09:42:01 +00:00
|
|
|
run: invalidPayload12,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid Transaction GasPrice NewPayload",
|
2022-06-13 09:42:01 +00:00
|
|
|
run: invalidPayload13,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid Transaction Gas NewPayload",
|
2022-06-13 09:42:01 +00:00
|
|
|
run: invalidPayload14,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid Transaction Value NewPayload",
|
2022-06-13 09:42:01 +00:00
|
|
|
run: invalidPayload15,
|
2022-04-20 07:57:50 +00:00
|
|
|
),
|
2022-04-11 10:00:39 +00:00
|
|
|
|
2022-06-27 13:18:54 +00:00
|
|
|
# Invalid Ancestor Re-Org Tests (Reveal via newPayload)
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid Ancestor Chain Re-Org, Invalid StateRoot, Invalid P1', Reveal using newPayload",
|
|
|
|
slotsToFinalized: 20,
|
|
|
|
run: invalidMissingAncestor1,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid Ancestor Chain Re-Org, Invalid StateRoot, Invalid P9', Reveal using newPayload",
|
|
|
|
slotsToFinalized: 20,
|
|
|
|
run: invalidMissingAncestor2,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Invalid Ancestor Chain Re-Org, Invalid StateRoot, Invalid P10', Reveal using newPayload",
|
|
|
|
slotsToFinalized: 20,
|
|
|
|
run: invalidMissingAncestor3,
|
|
|
|
),
|
|
|
|
|
2022-04-11 10:00:39 +00:00
|
|
|
# Eth RPC Status on ForkchoiceUpdated Events
|
2022-07-04 12:31:41 +00:00
|
|
|
TestSpec(
|
2022-04-11 10:00:39 +00:00
|
|
|
name: "Latest Block after NewPayload",
|
2022-06-01 13:32:07 +00:00
|
|
|
run: blockStatusExecPayload1,
|
|
|
|
),
|
2022-07-04 12:31:41 +00:00
|
|
|
TestSpec(
|
2022-06-01 13:32:07 +00:00
|
|
|
name: "Latest Block after NewPayload (Transition Block)",
|
|
|
|
run: blockStatusExecPayload2,
|
|
|
|
ttd: 5,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Latest Block after New HeadBlock",
|
2022-06-01 13:32:07 +00:00
|
|
|
run: blockStatusHeadBlock1,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Latest Block after New HeadBlock (Transition Block)",
|
|
|
|
run: blockStatusHeadBlock2,
|
|
|
|
ttd: 5,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
2022-06-27 04:15:23 +00:00
|
|
|
name: "safe Block after New SafeBlockHash",
|
|
|
|
run: blockStatusSafeBlock,
|
2022-06-01 13:32:07 +00:00
|
|
|
ttd: 5,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
2022-06-27 04:15:23 +00:00
|
|
|
name: "finalized Block after New FinalizedBlockHash",
|
|
|
|
run: blockStatusFinalizedBlock,
|
2022-06-01 13:32:07 +00:00
|
|
|
ttd: 5,
|
2022-04-11 10:00:39 +00:00
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Latest Block after Reorg",
|
|
|
|
run: blockStatusReorg,
|
|
|
|
),
|
|
|
|
|
|
|
|
# Payload Tests
|
|
|
|
TestSpec(
|
|
|
|
name: "Re-Execute Payload",
|
|
|
|
run: reExecPayloads,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Multiple New Payloads Extending Canonical Chain",
|
|
|
|
run: multipleNewCanonicalPayloads,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Out of Order Payload Execution",
|
|
|
|
run: outOfOrderPayloads,
|
|
|
|
),
|
|
|
|
|
|
|
|
# Transaction Reorg using Engine API
|
|
|
|
TestSpec(
|
|
|
|
name: "Transaction Reorg",
|
|
|
|
run: transactionReorg,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Sidechain Reorg",
|
|
|
|
run: sidechainReorg,
|
|
|
|
),
|
2022-06-01 13:32:07 +00:00
|
|
|
TestSpec(
|
|
|
|
name: "Re-Org Back into Canonical Chain",
|
|
|
|
run: reorgBack,
|
|
|
|
),
|
|
|
|
TestSpec(
|
|
|
|
name: "Re-Org Back to Canonical Chain From Syncing Chain",
|
|
|
|
run: reorgBackFromSyncing,
|
|
|
|
),
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Suggested Fee Recipient in Payload creation
|
|
|
|
TestSpec(
|
|
|
|
name: "Suggested Fee Recipient Test",
|
|
|
|
run: suggestedFeeRecipient,
|
2022-06-01 13:32:07 +00:00
|
|
|
),
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# PrevRandao opcode tests
|
2022-04-20 07:57:50 +00:00
|
|
|
TestSpec(
|
|
|
|
name: "PrevRandao Opcode Transactions",
|
|
|
|
run: prevRandaoOpcodeTx,
|
|
|
|
ttd: 10,
|
|
|
|
),
|
2022-04-11 10:00:39 +00:00
|
|
|
|
|
|
|
# Multi-Client Sync tests
|
|
|
|
TestSpec(
|
|
|
|
name: "Sync Client Post Merge",
|
|
|
|
run: postMergeSync,
|
|
|
|
ttd: 10,
|
|
|
|
)
|
|
|
|
]
|