nimbus-eth2/tests/mocking/mock_attestations.nim
Jacek Sieka a7a65bce42
disentangle eth2 types from the ssz library (#2785)
* reorganize ssz dependencies

This PR continues the work in
https://github.com/status-im/nimbus-eth2/pull/2646,
https://github.com/status-im/nimbus-eth2/pull/2779 as well as past
issues with serialization and type, to disentangle SSZ from eth2 and at
the same time simplify imports and exports with a structured approach.

The principal idea here is that when a library wants to introduce SSZ
support, they do so via 3 files:

* `ssz_codecs` which imports and reexports `codecs` - this covers the
basic byte conversions and ensures no overloads get lost
* `xxx_merkleization` imports and exports `merkleization` to specialize
and get access to `hash_tree_root` and friends
* `xxx_ssz_serialization` imports and exports `ssz_serialization` to
specialize ssz for a specific library

Those that need to interact with SSZ always import the `xxx_` versions
of the modules and never `ssz` itself so as to keep imports simple and
safe.

This is similar to how the REST / JSON-RPC serializers are structured in
that someone wanting to serialize spec types to REST-JSON will import
`eth2_rest_serialization` and nothing else.

* split up ssz into a core library that is independendent of eth2 types
* rename `bytes_reader` to `codec` to highlight that it contains coding
and decoding of bytes and native ssz types
* remove tricky List init overload that causes compile issues
* get rid of top-level ssz import
* reenable merkleization tests
* move some "standard" json serializers to spec
* remove `ValidatorIndex` serialization for now
* remove test_ssz_merkleization
* add tests for over/underlong byte sequences
* fix broken seq[byte] test - seq[byte] is not an SSZ type

There are a few things this PR doesn't solve:

* like #2646 this PR is weak on how to handle root and other
dontSerialize fields that "sometimes" should be computed - the same
problem appears in REST / JSON-RPC etc

* Fix a build problem on macOS

* Another way to fix the macOS builds

Co-authored-by: Zahary Karadjov <zahary@gmail.com>
2021-08-18 20:57:58 +02:00

114 lines
3.3 KiB
Nim

# beacon_chain
# Copyright (c) 2018-2021 Status Research & Development GmbH
# Licensed and distributed under either of
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
# at your option. This file may not be copied, modified, or distributed except according to those terms.
# Mocking attestations
# ---------------------------------------------------------------
import
# Standard library
intsets,
# Status
chronicles,
# Specs
../../beacon_chain/spec/datatypes/phase0,
../../beacon_chain/spec/[beaconstate, helpers, validator, signatures],
# Mocking procs
./mock_blocks,
./mock_validator_keys
proc mockAttestationData(
state: phase0.BeaconState,
slot: Slot,
index: uint64): AttestationData =
doAssert state.slot >= slot
if slot == state.slot:
result.beacon_block_root = mockBlockForNextSlot(state).message.parent_root
else:
result.beacon_block_root = get_block_root_at_slot(state, slot)
let current_epoch_start_slot = state.get_current_epoch().compute_start_slot_at_epoch()
let epoch_boundary_root = block:
if slot < current_epoch_start_slot:
get_block_root(state, get_previous_epoch(state))
elif slot == current_epoch_start_slot:
result.beacon_block_root
else:
get_block_root(state, get_current_epoch(state))
if slot < current_epoch_start_slot:
result.source = state.previous_justified_checkpoint
else:
result.source = state.current_justified_checkpoint
let target_epoch = compute_epoch_at_slot(slot)
result.slot = slot
result.index = index
result.target = Checkpoint(
epoch: target_epoch, root: epoch_boundary_root
)
proc signMockAttestation*(state: phase0.BeaconState, attestation: var Attestation) =
var cache = StateCache()
var agg {.noInit.}: AggregateSignature
var first_iter = true # Can't do while loop on hashset
for validator_index in get_attesting_indices(
state,
attestation.data,
attestation.aggregation_bits,
cache
):
let sig = get_attestation_signature(
state.fork, state.genesis_validators_root, attestation.data,
MockPrivKeys[validator_index]
)
if first_iter:
agg.init(sig)
first_iter = false
else:
agg.aggregate(sig)
if first_iter != true:
attestation.signature = agg.finish().toValidatorSig()
# Otherwise no participants so zero sig
proc mockAttestationImpl(
state: phase0.BeaconState,
slot: Slot): Attestation =
var cache = StateCache()
let
beacon_committee = get_beacon_committee(
state,
result.data.slot,
result.data.index.CommitteeIndex,
cache
)
committee_size = beacon_committee.len
result.data = mockAttestationData(state, slot, 0)
result.aggregation_bits = init(CommitteeValidatorsBits, committee_size)
# fillAggregateAttestation
for i in 0 ..< beacon_committee.len:
result.aggregation_bits[i] = true
signMockAttestation(state, result)
proc mockAttestation*(
state: phase0.BeaconState): Attestation =
mockAttestationImpl(state, state.slot)
proc mockAttestation*(
state: phase0.BeaconState,
slot: Slot): Attestation =
mockAttestationImpl(state, slot)