-
Notifications
You must be signed in to change notification settings - Fork 123
feat(ethexe/network): use proptest instead of custom mock #5359
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from 1 commit
1d5d011
14ebd80
facfee9
7f8feb2
aaa02ad
b64c45b
841ce76
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Please, remove or rewrite proptests. The only property we want to test is relationship between era index in snapshot and message itself |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -326,16 +326,18 @@ impl ValidatorTopic { | |
| #[cfg(test)] | ||
| mod tests { | ||
| use super::*; | ||
| use crate::utils::tests::arb_value; | ||
| use assert_matches::assert_matches; | ||
| use ethexe_common::{ | ||
| Announce, | ||
| ecdsa::SignedData, | ||
| gear_core::{message::ReplyCode, rpc::ReplyInfo}, | ||
| injected::Promise, | ||
| mock::Mock, | ||
| network::{SignedValidatorMessage, ValidatorMessage}, | ||
| }; | ||
| use gsigner::secp256k1::{Secp256k1SignerExt, Signer}; | ||
| use gsigner::secp256k1::{PrivateKey, Secp256k1SignerExt, Signer}; | ||
| use nonempty::{NonEmpty, nonempty}; | ||
| use proptest::{prelude::*, test_runner::Config as ProptestConfig}; | ||
|
|
||
| const CHAIN_HEAD_ERA: u64 = 10; | ||
|
|
||
|
|
@@ -357,24 +359,25 @@ mod tests { | |
| ) | ||
| } | ||
|
|
||
| fn new_validator_message(era_index: u64) -> VerifiedValidatorMessage { | ||
| let signer = Signer::memory(); | ||
| let pub_key = signer.generate().unwrap(); | ||
|
|
||
| signer | ||
| .signed_data( | ||
| pub_key, | ||
| ValidatorMessage { | ||
| era_index, | ||
| payload: Announce::mock(()), | ||
| }, | ||
| None, | ||
| ) | ||
| fn validator_message_from_private_key( | ||
| private_key: PrivateKey, | ||
| era_index: u64, | ||
| payload: Announce, | ||
| ) -> VerifiedValidatorMessage { | ||
| SignedData::create(&private_key, ValidatorMessage { era_index, payload }) | ||
| .map(SignedValidatorMessage::from) | ||
| .unwrap() | ||
| .into_verified() | ||
| } | ||
|
|
||
| fn new_validator_message(era_index: u64) -> VerifiedValidatorMessage { | ||
| validator_message_from_private_key( | ||
| PrivateKey::random(), | ||
| era_index, | ||
| arb_value::<Announce>(()), | ||
| ) | ||
| } | ||
|
|
||
| fn signed_promise() -> SignedPromise { | ||
| let signer = Signer::memory(); | ||
| let pub_key = signer.generate().unwrap(); | ||
|
|
@@ -390,6 +393,133 @@ mod tests { | |
| signer.signed_message(pub_key, promise, None).unwrap() | ||
| } | ||
|
|
||
| fn private_key_strategy() -> impl Strategy<Value = PrivateKey> { | ||
| any::<[u8; 32]>().prop_filter_map("valid secp256k1 private key", |seed| { | ||
| PrivateKey::from_seed(seed).ok() | ||
| }) | ||
| } | ||
|
|
||
| fn distinct_private_keys() -> impl Strategy<Value = (PrivateKey, PrivateKey)> { | ||
| (private_key_strategy(), private_key_strategy()).prop_filter( | ||
| "distinct validator addresses", | ||
| |(message_key, next_key)| { | ||
| message_key.public_key().to_address() != next_key.public_key().to_address() | ||
| }, | ||
| ) | ||
| } | ||
|
|
||
| proptest! { | ||
| #![proptest_config(ProptestConfig::with_cases(64))] | ||
|
|
||
| #[test] | ||
| fn proptest_current_era_messages_from_current_validators_are_accepted( | ||
| private_key in private_key_strategy(), | ||
| payload in any::<Announce>(), | ||
| ) { | ||
| let message = validator_message_from_private_key(private_key, CHAIN_HEAD_ERA, payload); | ||
| let expected = message.clone(); | ||
| let mut alice = new_topic(nonempty![expected.address()]); | ||
|
|
||
| let (acceptance, verified_msg) = | ||
| alice.verify_validator_message(PeerId::random(), message); | ||
|
|
||
| prop_assert!(matches!(acceptance, MessageAcceptance::Accept)); | ||
| prop_assert_eq!(verified_msg, Some(expected)); | ||
| prop_assert_eq!(alice.cached_messages.len(), 0); | ||
| prop_assert_eq!(alice.next_message(), None); | ||
| } | ||
|
|
||
| #[test] | ||
| fn proptest_next_era_messages_from_next_validators_are_cached_and_released_once( | ||
| private_key in private_key_strategy(), | ||
| payload in any::<Announce>(), | ||
| ) { | ||
| let message = | ||
| validator_message_from_private_key(private_key, CHAIN_HEAD_ERA + 1, payload); | ||
| let expected = message.clone(); | ||
| let snapshot = ValidatorListSnapshot { | ||
| current_era_index: CHAIN_HEAD_ERA, | ||
| current_validators: nonempty![Address::default()].into(), | ||
| next_validators: Some(nonempty![expected.address()].into()), | ||
| }; | ||
| let mut alice = ValidatorTopic::new(peer_score::Handle::new_test(), Arc::new(snapshot)); | ||
|
|
||
| let (acceptance, verified_msg) = | ||
| alice.verify_validator_message(PeerId::random(), message); | ||
|
|
||
| prop_assert!(matches!(acceptance, MessageAcceptance::Ignore)); | ||
| prop_assert_eq!(verified_msg, None); | ||
| prop_assert_eq!(alice.cached_messages.len(), 1); | ||
|
|
||
| alice.on_new_snapshot(new_snapshot(CHAIN_HEAD_ERA + 1, nonempty![expected.address()])); | ||
|
|
||
| prop_assert_eq!(alice.cached_messages.len(), 0); | ||
| prop_assert_eq!(alice.next_message(), Some(expected)); | ||
| prop_assert_eq!(alice.next_message(), None); | ||
| } | ||
|
|
||
| #[test] | ||
| fn proptest_too_old_messages_are_rejected( | ||
| private_key in private_key_strategy(), | ||
| payload in any::<Announce>(), | ||
| era_index in 0u64..(CHAIN_HEAD_ERA - 1), | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The property test |
||
| ) { | ||
| let message = validator_message_from_private_key(private_key, era_index, payload); | ||
| let mut alice = new_topic(nonempty![message.address()]); | ||
|
|
||
| let (acceptance, verified_msg) = | ||
| alice.verify_validator_message(PeerId::random(), message); | ||
|
|
||
| prop_assert!(matches!(acceptance, MessageAcceptance::Reject)); | ||
| prop_assert_eq!(verified_msg, None); | ||
| prop_assert_eq!(alice.cached_messages.len(), 0); | ||
| prop_assert_eq!(alice.next_message(), None); | ||
| } | ||
|
|
||
| #[test] | ||
| fn proptest_too_new_messages_are_rejected( | ||
| private_key in private_key_strategy(), | ||
| payload in any::<Announce>(), | ||
| era_index in (CHAIN_HEAD_ERA + 2)..(CHAIN_HEAD_ERA + 102), | ||
| ) { | ||
| let message = validator_message_from_private_key(private_key, era_index, payload); | ||
| let mut alice = new_topic(nonempty![message.address()]); | ||
|
|
||
| let (acceptance, verified_msg) = | ||
| alice.verify_validator_message(PeerId::random(), message); | ||
|
|
||
| prop_assert!(matches!(acceptance, MessageAcceptance::Reject)); | ||
| prop_assert_eq!(verified_msg, None); | ||
| prop_assert_eq!(alice.cached_messages.len(), 0); | ||
| prop_assert_eq!(alice.next_message(), None); | ||
| } | ||
|
|
||
| #[test] | ||
| fn proptest_next_era_messages_from_non_next_validators_are_rejected( | ||
| keys in distinct_private_keys(), | ||
| payload in any::<Announce>(), | ||
| ) { | ||
| let (message_key, next_key) = keys; | ||
| let message = | ||
| validator_message_from_private_key(message_key, CHAIN_HEAD_ERA + 1, payload); | ||
| let next_address = next_key.public_key().to_address(); | ||
| let snapshot = ValidatorListSnapshot { | ||
| current_era_index: CHAIN_HEAD_ERA, | ||
| current_validators: nonempty![next_address].into(), | ||
| next_validators: Some(nonempty![next_address].into()), | ||
| }; | ||
| let mut alice = ValidatorTopic::new(peer_score::Handle::new_test(), Arc::new(snapshot)); | ||
|
|
||
| let (acceptance, verified_msg) = | ||
| alice.verify_validator_message(PeerId::random(), message); | ||
|
|
||
| prop_assert!(matches!(acceptance, MessageAcceptance::Reject)); | ||
| prop_assert_eq!(verified_msg, None); | ||
| prop_assert_eq!(alice.cached_messages.len(), 0); | ||
| prop_assert_eq!(alice.next_message(), None); | ||
| } | ||
| } | ||
|
|
||
| #[test] | ||
| fn too_old_era() { | ||
| let bob_message = new_validator_message(CHAIN_HEAD_ERA - 2); | ||
|
|
||
Uh oh!
There was an error while loading. Please reload this page.