/
state_machine_tester.rs
356 lines (317 loc) · 12.7 KB
/
state_machine_tester.rs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
#![allow(dead_code)]
use mithril_common::api_version::APIVersionProvider;
use mithril_common::digesters::ImmutableFileObserver;
use mithril_common::entities::SignerWithStake;
use mithril_common::era::{
adapters::{EraReaderAdapterType, EraReaderDummyAdapter},
EraChecker, EraReader,
};
use mithril_common::era::{EraMarker, SupportedEra};
use mithril_common::BeaconProvider;
use slog::Drain;
use slog_scope::debug;
use std::error::Error as StdError;
use std::fmt::Debug;
use std::{path::PathBuf, sync::Arc, time::Duration};
use thiserror::Error;
use mithril_common::crypto_helper::tests_setup;
use mithril_common::{
chain_observer::FakeObserver,
digesters::{DumbImmutableDigester, DumbImmutableFileObserver},
entities::{Beacon, Epoch},
store::{adapter::MemoryAdapter, StakeStore, StakeStorer},
BeaconProviderImpl,
};
use mithril_signer::{
CertificateHandler, Configuration, MithrilSingleSigner, ProtocolInitializerStore,
ProtocolInitializerStorer, RuntimeError, SignerRunner, SignerServices, SignerState,
StateMachine,
};
use super::FakeAggregator;
type Result<T> = std::result::Result<T, TestError>;
#[derive(Debug, Error)]
pub enum TestError {
#[error("Assertion failed: {0}")]
AssertFailed(String),
#[error("Subsystem error: {0:?}")]
SubsystemError(#[from] Box<dyn StdError + Sync + Send>),
#[error("Value error: {0}")]
ValueError(String),
}
impl From<RuntimeError> for TestError {
fn from(value: RuntimeError) -> Self {
Self::SubsystemError(value.into())
}
}
pub struct StateMachineTester {
state_machine: StateMachine,
immutable_observer: Arc<DumbImmutableFileObserver>,
chain_observer: Arc<FakeObserver>,
certificate_handler: Arc<FakeAggregator>,
protocol_initializer_store: Arc<ProtocolInitializerStore>,
stake_store: Arc<StakeStore>,
era_checker: Arc<EraChecker>,
era_reader_adapter: Arc<EraReaderDummyAdapter>,
comment_no: u32,
_logs_guard: slog_scope::GlobalLoggerGuard,
}
impl Debug for StateMachineTester {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
debug!("Debug called after comment N°{}.", self.comment_no);
write!(f, "DEBUG")
}
}
impl StateMachineTester {
pub async fn init(signers_with_stake: &[SignerWithStake]) -> Result<Self> {
let selected_signer_with_stake = signers_with_stake.first().ok_or_else(|| {
TestError::AssertFailed("there should be at least one signer with stakes".to_string())
})?;
let selected_signer_party_id = selected_signer_with_stake.party_id.clone();
let selected_signer_temp_dir =
tests_setup::setup_temp_directory_for_signer(&selected_signer_party_id, false);
let config = Configuration {
aggregator_endpoint: "http://0.0.0.0:8000".to_string(),
cardano_cli_path: PathBuf::new(),
cardano_node_socket_path: PathBuf::new(),
db_directory: PathBuf::new(),
network: "devnet".to_string(),
network_magic: Some(42),
party_id: Some(selected_signer_party_id),
run_interval: 5000,
data_stores_directory: PathBuf::new(),
store_retention_limit: None,
kes_secret_key_path: selected_signer_temp_dir
.as_ref()
.map(|dir| dir.join("kes.sk")),
operational_certificate_path: selected_signer_temp_dir
.as_ref()
.map(|dir| dir.join("opcert.cert")),
disable_digests_cache: false,
reset_digests_cache: false,
era_reader_adapter_type: EraReaderAdapterType::Bootstrap,
era_reader_adapter_params: None,
};
let decorator = slog_term::PlainDecorator::new(slog_term::TestStdoutWriter);
let drain = slog_term::CompactFormat::new(decorator).build().fuse();
let drain = slog_async::Async::new(drain).build().fuse();
let logs_guard =
slog_scope::set_global_logger(slog::Logger::root(Arc::new(drain), slog::o!()));
let immutable_observer = Arc::new(DumbImmutableFileObserver::new());
immutable_observer.shall_return(Some(1)).await;
let chain_observer = Arc::new(FakeObserver::new(Some(Beacon {
epoch: Epoch(1),
immutable_file_number: 1,
network: "devnet".to_string(),
})));
let beacon_provider = Arc::new(BeaconProviderImpl::new(
chain_observer.clone(),
immutable_observer.clone(),
config.get_network().unwrap(),
));
let certificate_handler = Arc::new(FakeAggregator::new(beacon_provider.clone()));
let digester = Arc::new(DumbImmutableDigester::new("DIGEST", true));
let protocol_initializer_store = Arc::new(ProtocolInitializerStore::new(
Box::new(MemoryAdapter::new(None).unwrap()),
config.store_retention_limit,
));
let single_signer = Arc::new(MithrilSingleSigner::new(
config.party_id.to_owned().unwrap_or_default(),
));
let stake_store = Arc::new(StakeStore::new(
Box::new(MemoryAdapter::new(None).unwrap()),
config.store_retention_limit,
));
let era_reader_adapter = Arc::new(EraReaderDummyAdapter::from_markers(vec![
(EraMarker {
name: SupportedEra::dummy().to_string(),
epoch: Some(Epoch(0)),
}),
]));
let era_reader = Arc::new(EraReader::new(era_reader_adapter.clone()));
let era_epoch_token = era_reader
.read_era_epoch_token(beacon_provider.get_current_beacon().await.unwrap().epoch)
.await
.unwrap();
let era_checker = Arc::new(EraChecker::new(
era_epoch_token.get_current_supported_era().unwrap(),
era_epoch_token.get_current_epoch(),
));
let api_version_provider = Arc::new(APIVersionProvider::new(era_checker.clone()));
let services = SignerServices {
certificate_handler: certificate_handler.clone(),
beacon_provider: beacon_provider.clone(),
chain_observer: chain_observer.clone(),
digester: digester.clone(),
protocol_initializer_store: protocol_initializer_store.clone(),
single_signer: single_signer.clone(),
stake_store: stake_store.clone(),
era_checker: era_checker.clone(),
era_reader,
api_version_provider,
};
// set up stake distribution
chain_observer
.set_signers(signers_with_stake.to_owned())
.await;
let runner = Box::new(SignerRunner::new(config, services));
let state_machine = StateMachine::new(SignerState::Init, runner, Duration::from_secs(5));
Ok(StateMachineTester {
state_machine,
immutable_observer,
chain_observer,
certificate_handler,
protocol_initializer_store,
stake_store,
era_checker,
era_reader_adapter,
comment_no: 0,
_logs_guard: logs_guard,
})
}
fn assert(&mut self, condition: bool, description: String) -> Result<&mut Self> {
if !condition {
Err(TestError::AssertFailed(description))
} else {
Ok(self)
}
}
/// trigger a cycle in the state machine
async fn cycle(&mut self) -> Result<&mut Self> {
self.state_machine.cycle().await?;
Ok(self)
}
/// Is the state machine in `Init` state?
pub fn is_init(&mut self) -> Result<&mut Self> {
self.assert(
self.state_machine.get_state().is_init(),
"state machine shall be in Init state".to_string(),
)
}
/// cycle the state machine and test the resulting state
pub async fn cycle_registered(&mut self) -> Result<&mut Self> {
self.cycle().await?;
self.assert(
self.state_machine.get_state().is_registered(),
format!(
"state machine is in {} state (Registered was expected)",
self.state_machine.get_state()
),
)
}
/// cycle the state machine and test the resulting state
pub async fn cycle_signed(&mut self) -> Result<&mut Self> {
self.cycle().await?;
self.assert(
self.state_machine.get_state().is_signed(),
format!(
"state machine is in {} state (Signed was expected)",
self.state_machine.get_state()
),
)
}
/// cycle the state machine and test the resulting state
pub async fn cycle_unregistered(&mut self) -> Result<&mut Self> {
self.cycle().await?;
self.assert(
self.state_machine.get_state().is_unregistered(),
format!(
"state machine is in {} state (Unregistered was expected)",
self.state_machine.get_state()
),
)
}
/// make the aggregator send the epoch settings from now on
pub async fn aggregator_send_epoch_settings(&mut self) -> &mut Self {
self.certificate_handler.release_epoch_settings().await;
self
}
/// check there is a protocol initializer for the given Epoch
pub async fn check_protocol_initializer(&mut self, epoch: Epoch) -> Result<&mut Self> {
let maybe_protocol_initializer = self
.protocol_initializer_store
.get_protocol_initializer(epoch)
.await
.map_err(|e| TestError::SubsystemError(e.into()))?;
self.assert(maybe_protocol_initializer.is_some(), format!(
"there should be a protocol intializer in store for Epoch {}, here is the last 3 in store: {:?}",
epoch,
self.protocol_initializer_store
.get_last_protocol_initializer(2)
.await
.unwrap(),
))
}
/// check there is a stake for the given Epoch
pub async fn check_stake_store(&mut self, epoch: Epoch) -> Result<&mut Self> {
let maybe_stakes = self
.stake_store
.get_stakes(epoch)
.await
.map_err(|e| TestError::SubsystemError(e.into()))?;
self.assert(
maybe_stakes.is_some(),
format!("there should be stake distribution saved for {epoch:?}"),
)
}
/// increase the immutable file number in the dumb beacon provider
pub async fn increase_immutable(&mut self, increment: u64, expected: u64) -> Result<&mut Self> {
let immutable_number = self
.immutable_observer
.get_last_immutable_number()
.await
.map_err(|e| TestError::SubsystemError(e.into()))?;
let new_immutable = immutable_number + increment;
self.assert(
expected == new_immutable,
format!("expected to increase immutable number up to {expected}, got {new_immutable}"),
)?;
self.immutable_observer
.shall_return(Some(new_immutable))
.await;
Ok(self)
}
/// increase the epoch in the chain observer
pub async fn increase_epoch(&mut self, expected: u64) -> Result<&mut Self> {
let new_epoch = self
.chain_observer
.next_epoch()
.await
.ok_or_else(|| TestError::ValueError("no epoch returned".to_string()))?;
self.assert(
expected == new_epoch,
format!("Epoch increased by 1 to {new_epoch} ({expected} expected)"),
)
}
/// add a comment in the logs
pub fn comment(&mut self, comment: &str) -> &mut Self {
self.comment_no += 1;
debug!("COMMENT {:02} 💬 {}", self.comment_no, comment);
self
}
/// register the signer in the certificate handler
pub async fn register_signers(
&mut self,
signers_with_stake: &[SignerWithStake],
) -> Result<&mut Self> {
for signer_with_stake in signers_with_stake {
self.certificate_handler
.register_signer(&signer_with_stake.to_owned().into())
.await
.map_err(|e| TestError::SubsystemError(e.into()))?;
}
Ok(self)
}
/// Check when the era_checker has been updated
pub async fn check_era_checker_last_updated_at(&mut self, epoch: Epoch) -> Result<&mut Self> {
self.assert(
self.era_checker.current_epoch() == epoch,
format!("The epoch the EraChecker has been the last updated '{}' is different from expected epoch '{}'.", self.era_checker.current_epoch(), epoch)
)
}
/// Set Era markers
pub fn set_era_markers(&mut self, markers: Vec<EraMarker>) -> &mut Self {
debug!("Era markers set: {:?}", markers);
self.era_reader_adapter.set_markers(markers);
self
}
}