lighthouse/testing/ef_tests/src/decode.rs

100 lines
3.2 KiB
Rust
Raw Normal View History

2019-09-04 03:03:44 +00:00
use super::*;
use fs2::FileExt;
use snap::raw::Decoder;
use std::fs::{self};
use std::io::Write;
2019-09-04 03:03:44 +00:00
use std::path::Path;
use std::path::PathBuf;
use types::{BeaconState, EthSpec};
/// See `log_file_access` for details.
const ACCESSED_FILE_LOG_FILENAME: &str = ".accessed_file_log.txt";
/// Writes `path` to a file that contains a log of all files accessed during testing.
///
/// That log file might later be used to ensure that all spec tests were accessed and none were
/// accidentally missed.
pub fn log_file_access<P: AsRef<Path>>(file_accessed: P) {
let passed_test_list_path =
PathBuf::from(env!("CARGO_MANIFEST_DIR")).join(ACCESSED_FILE_LOG_FILENAME);
let mut file = fs::OpenOptions::new()
.append(true)
.create(true)
.open(passed_test_list_path)
.expect("should open file");
file.lock_exclusive().expect("unable to lock file");
writeln!(&mut file, "{:?}", file_accessed.as_ref()).expect("should write to file");
file.unlock().expect("unable to unlock file");
}
2019-09-04 03:03:44 +00:00
pub fn yaml_decode<T: serde::de::DeserializeOwned>(string: &str) -> Result<T, Error> {
serde_yaml::from_str(string).map_err(|e| Error::FailedToParseTest(format!("{:?}", e)))
}
pub fn yaml_decode_file<T: serde::de::DeserializeOwned>(path: &Path) -> Result<T, Error> {
log_file_access(path);
2019-09-04 03:03:44 +00:00
fs::read_to_string(path)
.map_err(|e| {
Error::FailedToParseTest(format!("Unable to load {}: {:?}", path.display(), e))
})
.and_then(|s| yaml_decode(&s))
}
/// Decode a Snappy encoded file.
///
/// Files in the EF tests are unframed, so we need to use `snap::raw::Decoder`.
pub fn snappy_decode_file(path: &Path) -> Result<Vec<u8>, Error> {
log_file_access(path);
let bytes = fs::read(path).map_err(|e| {
Error::FailedToParseTest(format!("Unable to load {}: {:?}", path.display(), e))
})?;
let mut decoder = Decoder::new();
decoder.decompress_vec(&bytes).map_err(|e| {
Error::FailedToParseTest(format!(
"Error decoding snappy encoding for {}: {:?}",
path.display(),
e
))
})
}
pub fn ssz_decode_file_with<T, F>(path: &Path, f: F) -> Result<T, Error>
where
F: FnOnce(&[u8]) -> Result<T, ssz::DecodeError>,
{
log_file_access(path);
let bytes = snappy_decode_file(path)?;
f(&bytes).map_err(|e| {
match e {
// NOTE: this is a bit hacky, but seemingly better than the alternatives
ssz::DecodeError::BytesInvalid(message)
if message.contains("Blst") || message.contains("Milagro") =>
{
Error::InvalidBLSInput(message)
}
e => Error::FailedToParseTest(format!(
"Unable to parse SSZ at {}: {:?}",
path.display(),
e
)),
}
})
}
2019-09-04 03:03:44 +00:00
pub fn ssz_decode_file<T: ssz::Decode>(path: &Path) -> Result<T, Error> {
log_file_access(path);
ssz_decode_file_with(path, T::from_ssz_bytes)
}
pub fn ssz_decode_state<E: EthSpec>(
path: &Path,
spec: &ChainSpec,
) -> Result<BeaconState<E>, Error> {
log_file_access(path);
ssz_decode_file_with(path, |bytes| BeaconState::from_ssz_bytes(bytes, spec))
2019-09-04 03:03:44 +00:00
}