mirror of
https://github.com/status-im/nimbus-eth2.git
synced 2025-01-25 22:11:06 +00:00
a7a65bce42
* reorganize ssz dependencies This PR continues the work in https://github.com/status-im/nimbus-eth2/pull/2646, https://github.com/status-im/nimbus-eth2/pull/2779 as well as past issues with serialization and type, to disentangle SSZ from eth2 and at the same time simplify imports and exports with a structured approach. The principal idea here is that when a library wants to introduce SSZ support, they do so via 3 files: * `ssz_codecs` which imports and reexports `codecs` - this covers the basic byte conversions and ensures no overloads get lost * `xxx_merkleization` imports and exports `merkleization` to specialize and get access to `hash_tree_root` and friends * `xxx_ssz_serialization` imports and exports `ssz_serialization` to specialize ssz for a specific library Those that need to interact with SSZ always import the `xxx_` versions of the modules and never `ssz` itself so as to keep imports simple and safe. This is similar to how the REST / JSON-RPC serializers are structured in that someone wanting to serialize spec types to REST-JSON will import `eth2_rest_serialization` and nothing else. * split up ssz into a core library that is independendent of eth2 types * rename `bytes_reader` to `codec` to highlight that it contains coding and decoding of bytes and native ssz types * remove tricky List init overload that causes compile issues * get rid of top-level ssz import * reenable merkleization tests * move some "standard" json serializers to spec * remove `ValidatorIndex` serialization for now * remove test_ssz_merkleization * add tests for over/underlong byte sequences * fix broken seq[byte] test - seq[byte] is not an SSZ type There are a few things this PR doesn't solve: * like #2646 this PR is weak on how to handle root and other dontSerialize fields that "sometimes" should be computed - the same problem appears in REST / JSON-RPC etc * Fix a build problem on macOS * Another way to fix the macOS builds Co-authored-by: Zahary Karadjov <zahary@gmail.com>
114 lines
3.3 KiB
Nim
114 lines
3.3 KiB
Nim
# beacon_chain
|
|
# Copyright (c) 2018-2021 Status Research & Development GmbH
|
|
# Licensed and distributed under either of
|
|
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
|
|
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
# Mocking attestations
|
|
# ---------------------------------------------------------------
|
|
|
|
import
|
|
# Standard library
|
|
intsets,
|
|
# Status
|
|
chronicles,
|
|
# Specs
|
|
../../beacon_chain/spec/datatypes/phase0,
|
|
../../beacon_chain/spec/[beaconstate, helpers, validator, signatures],
|
|
# Mocking procs
|
|
./mock_blocks,
|
|
./mock_validator_keys
|
|
|
|
proc mockAttestationData(
|
|
state: phase0.BeaconState,
|
|
slot: Slot,
|
|
index: uint64): AttestationData =
|
|
doAssert state.slot >= slot
|
|
|
|
if slot == state.slot:
|
|
result.beacon_block_root = mockBlockForNextSlot(state).message.parent_root
|
|
else:
|
|
result.beacon_block_root = get_block_root_at_slot(state, slot)
|
|
|
|
let current_epoch_start_slot = state.get_current_epoch().compute_start_slot_at_epoch()
|
|
let epoch_boundary_root = block:
|
|
if slot < current_epoch_start_slot:
|
|
get_block_root(state, get_previous_epoch(state))
|
|
elif slot == current_epoch_start_slot:
|
|
result.beacon_block_root
|
|
else:
|
|
get_block_root(state, get_current_epoch(state))
|
|
|
|
if slot < current_epoch_start_slot:
|
|
result.source = state.previous_justified_checkpoint
|
|
else:
|
|
result.source = state.current_justified_checkpoint
|
|
|
|
let target_epoch = compute_epoch_at_slot(slot)
|
|
|
|
result.slot = slot
|
|
result.index = index
|
|
|
|
result.target = Checkpoint(
|
|
epoch: target_epoch, root: epoch_boundary_root
|
|
)
|
|
|
|
proc signMockAttestation*(state: phase0.BeaconState, attestation: var Attestation) =
|
|
var cache = StateCache()
|
|
|
|
var agg {.noInit.}: AggregateSignature
|
|
var first_iter = true # Can't do while loop on hashset
|
|
for validator_index in get_attesting_indices(
|
|
state,
|
|
attestation.data,
|
|
attestation.aggregation_bits,
|
|
cache
|
|
):
|
|
let sig = get_attestation_signature(
|
|
state.fork, state.genesis_validators_root, attestation.data,
|
|
MockPrivKeys[validator_index]
|
|
)
|
|
if first_iter:
|
|
agg.init(sig)
|
|
first_iter = false
|
|
else:
|
|
agg.aggregate(sig)
|
|
|
|
if first_iter != true:
|
|
attestation.signature = agg.finish().toValidatorSig()
|
|
# Otherwise no participants so zero sig
|
|
|
|
proc mockAttestationImpl(
|
|
state: phase0.BeaconState,
|
|
slot: Slot): Attestation =
|
|
|
|
var cache = StateCache()
|
|
|
|
let
|
|
beacon_committee = get_beacon_committee(
|
|
state,
|
|
result.data.slot,
|
|
result.data.index.CommitteeIndex,
|
|
cache
|
|
)
|
|
committee_size = beacon_committee.len
|
|
|
|
result.data = mockAttestationData(state, slot, 0)
|
|
result.aggregation_bits = init(CommitteeValidatorsBits, committee_size)
|
|
|
|
# fillAggregateAttestation
|
|
for i in 0 ..< beacon_committee.len:
|
|
result.aggregation_bits[i] = true
|
|
|
|
signMockAttestation(state, result)
|
|
|
|
proc mockAttestation*(
|
|
state: phase0.BeaconState): Attestation =
|
|
mockAttestationImpl(state, state.slot)
|
|
|
|
proc mockAttestation*(
|
|
state: phase0.BeaconState,
|
|
slot: Slot): Attestation =
|
|
mockAttestationImpl(state, slot)
|