Skip to content

Commit 049f754

Browse files
committed
Update beacon tests
1 parent 6850c47 commit 049f754

File tree

2 files changed

+36
-25
lines changed

2 files changed

+36
-25
lines changed

beacon_node/beacon_chain/src/lib.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ pub use beacon_fork_choice_store::{BeaconForkChoiceStore, Error as ForkChoiceSto
7878
pub use block_verification::{
7979
build_blob_data_column_sidecars, get_block_root, BlockError, ExecutionPayloadError,
8080
ExecutionPendingBlock, GossipVerifiedBlock, IntoExecutionPendingBlock, IntoGossipVerifiedBlock,
81-
PayloadVerificationOutcome, PayloadVerificationStatus,
81+
InvalidSignature, PayloadVerificationOutcome, PayloadVerificationStatus,
8282
};
8383
pub use block_verification_types::AvailabilityPendingExecutedBlock;
8484
pub use block_verification_types::ExecutedBlock;

beacon_node/beacon_chain/tests/block_verification.rs

Lines changed: 35 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ use beacon_chain::{
99
};
1010
use beacon_chain::{
1111
BeaconSnapshot, BlockError, ChainConfig, ChainSegmentResult, IntoExecutionPendingBlock,
12-
NotifyExecutionLayer,
12+
InvalidSignature, NotifyExecutionLayer,
1313
};
1414
use logging::test_logger;
1515
use slasher::{Config as SlasherConfig, Slasher};
@@ -436,7 +436,7 @@ async fn assert_invalid_signature(
436436
.process_chain_segment(blocks, NotifyExecutionLayer::Yes)
437437
.await
438438
.into_block_error(),
439-
Err(BlockError::InvalidSignature)
439+
Err(BlockError::InvalidSignature(InvalidSignature::Unknown))
440440
),
441441
"should not import chain segment with an invalid {} signature",
442442
item
@@ -478,7 +478,12 @@ async fn assert_invalid_signature(
478478
)
479479
.await;
480480
assert!(
481-
matches!(process_res, Err(BlockError::InvalidSignature)),
481+
matches!(
482+
process_res,
483+
Err(BlockError::InvalidSignature(
484+
InvalidSignature::BlockBodySignatures
485+
))
486+
),
482487
"should not import individual block with an invalid {} signature, got: {:?}",
483488
item,
484489
process_res
@@ -534,21 +539,25 @@ async fn invalid_signature_gossip_block() {
534539
.into_block_error()
535540
.expect("should import all blocks prior to the one being tested");
536541
let signed_block = SignedBeaconBlock::from_block(block, junk_signature());
542+
let process_res = harness
543+
.chain
544+
.process_block(
545+
signed_block.canonical_root(),
546+
Arc::new(signed_block),
547+
NotifyExecutionLayer::Yes,
548+
BlockImportSource::Lookup,
549+
|| Ok(()),
550+
)
551+
.await;
537552
assert!(
538553
matches!(
539-
harness
540-
.chain
541-
.process_block(
542-
signed_block.canonical_root(),
543-
Arc::new(signed_block),
544-
NotifyExecutionLayer::Yes,
545-
BlockImportSource::Lookup,
546-
|| Ok(()),
547-
)
548-
.await,
549-
Err(BlockError::InvalidSignature)
554+
process_res,
555+
Err(BlockError::InvalidSignature(
556+
InvalidSignature::ProposerSignature
557+
))
550558
),
551-
"should not import individual block with an invalid gossip signature",
559+
"should not import individual block with an invalid gossip signature, got: {:?}",
560+
process_res
552561
);
553562
}
554563
}
@@ -576,16 +585,18 @@ async fn invalid_signature_block_proposal() {
576585
})
577586
.collect::<Vec<_>>();
578587
// Ensure the block will be rejected if imported in a chain segment.
588+
let process_res = harness
589+
.chain
590+
.process_chain_segment(blocks, NotifyExecutionLayer::Yes)
591+
.await
592+
.into_block_error();
579593
assert!(
580594
matches!(
581-
harness
582-
.chain
583-
.process_chain_segment(blocks, NotifyExecutionLayer::Yes)
584-
.await
585-
.into_block_error(),
586-
Err(BlockError::InvalidSignature)
595+
process_res,
596+
Err(BlockError::InvalidSignature(InvalidSignature::Unknown))
587597
),
588-
"should not import chain segment with an invalid block signature",
598+
"should not import chain segment with an invalid block signature, got: {:?}",
599+
process_res
589600
);
590601
}
591602
}
@@ -879,7 +890,7 @@ async fn invalid_signature_deposit() {
879890
.process_chain_segment(blocks, NotifyExecutionLayer::Yes)
880891
.await
881892
.into_block_error(),
882-
Err(BlockError::InvalidSignature)
893+
Err(BlockError::InvalidSignature(InvalidSignature::Unknown))
883894
),
884895
"should not throw an invalid signature error for a bad deposit signature"
885896
);
@@ -1075,7 +1086,7 @@ async fn block_gossip_verification() {
10751086
)))
10761087
.await
10771088
),
1078-
BlockError::ProposalSignatureInvalid
1089+
BlockError::InvalidSignature(InvalidSignature::ProposerSignature)
10791090
),
10801091
"should not import a block with an invalid proposal signature"
10811092
);

0 commit comments

Comments
 (0)