Skip to content

Commit fa32137

Browse files
authored
[TT-2008] allow to pass pre/post contract deployment hooks (#1661)
1 parent 1e85367 commit fa32137

20 files changed

+708
-77
lines changed

.github/workflows/seth-test.yml

+25-5
Original file line numberDiff line numberDiff line change
@@ -12,41 +12,61 @@ jobs:
1212
- regex: TestSmoke
1313
network-type: Geth
1414
url: "ws://localhost:8546"
15+
extra_flags: "-race"
1516
- regex: TestSmoke
1617
network-type: Anvil
1718
url: "http://localhost:8545"
19+
extra_flags: "-race"
1820
- regex: TestAPI
1921
network-type: Geth
2022
url: "ws://localhost:8546"
23+
extra_flags: "-race"
2124
- regex: TestAPI
2225
network-type: Anvil
2326
url: "http://localhost:8545"
27+
extra_flags: "-race"
2428
- regex: TestTrace
2529
network-type: Geth
2630
url: "ws://localhost:8546"
31+
extra_flags: "-race"
2732
- regex: TestTrace
2833
network-type: Anvil
2934
url: "http://localhost:8545"
35+
extra_flags: "-race"
3036
- regex: TestCLI
3137
network-type: Geth
3238
url: "ws://localhost:8546"
39+
extra_flags: "-race"
3340
- regex: TestCLI
3441
network-type: Anvil
3542
url: "http://localhost:8545"
43+
extra_flags: "-race"
3644
# TODO: wasn't stable before, fix if possible
3745
# - regex: TestGasBumping
3846
# network-type: Geth
3947
# url: "ws://localhost:8546"
4048
# - regex: TestGasBumping
4149
# network-type: Anvil
4250
# url: "http://localhost:8545"
43-
- regex: "'TestContractMap|TestGasEstimator|TestRPCHealthCheck|TestUtil|TestContract|TestConfig'"
51+
# Some test config tests use Simualted Backend, which is not has data races...
52+
- regex: "'TestConfig'"
4453
network-type: Geth
4554
url: "ws://localhost:8546"
55+
extra_flags: "''"
4656
# TODO: still expects Geth WS URL for some reason
47-
# - regex: "'TestContractMap|TestGasEstimator|TestRPCHealthCheck|TestUtil|TestContract|TestConfig'"
48-
# network-type: Anvil
49-
# url: "http://localhost:8545"
57+
- regex: "'TestConfig'"
58+
network-type: Anvil
59+
url: "http://localhost:8545"
60+
extra_flags: "''"
61+
- regex: "'TestContractMap|TestGasEstimator|TestRPCHealthCheck|TestUtil|TestContract'"
62+
network-type: Geth
63+
url: "ws://localhost:8546"
64+
extra_flags: "-race"
65+
# TODO: still expects Geth WS URL for some reason
66+
- regex: "'TestContractMap|TestGasEstimator|TestRPCHealthCheck|TestUtil|TestContract'"
67+
network-type: Anvil
68+
url: "http://localhost:8545"
69+
extra_flags: "-race"
5070
defaults:
5171
run:
5272
working-directory: seth
@@ -86,4 +106,4 @@ jobs:
86106
just-version: '1.39.0'
87107
- name: Run tests
88108
run: |
89-
devbox run -- just seth-test ${{ matrix.test.network-type }} ${{ matrix.test.url }} ${{ matrix.test.regex }}
109+
devbox run -- just seth-test ${{ matrix.test.network-type }} ${{ matrix.test.url }} ${{ matrix.test.regex }} ${{ matrix.test.extra_flags}}

book/src/libs/seth.md

+79-2
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Reliable and debug-friendly Ethereum client
6565
- [x] CLI to manipulate test keys
6666
- [x] Simple manual gas price estimation
6767
- [ ] Fail over client logic
68-
- [ ] Decode collided event hashes
68+
- [x] Decode collided event hashes
6969
- [x] Tracing support (4byte)
7070
- [x] Tracing support (callTracer)
7171
- [ ] Tracing support (prestate)
@@ -262,7 +262,53 @@ if err != nil {
262262
log.Fatal(err)
263263
}
264264
```
265-
This can be useful if you already have a config, but want to modify it slightly. It can also be useful if you read TOML config with multiple `Networks` and you want to specify which one you want to use.
265+
This can be useful if you already have a config, but want to modify it slightly. This approach will only work if you pass it the full config, since it will not apply any defaults. It can also be useful if you read TOML config with multiple `Networks` and you want to specify which one you want to use. Although for that use case it's better to make use of the following approach:
266+
```go
267+
// assuming that "readSethNetworks" knows how to read the TOML file and convert it to []*seth.Network
268+
/* example content of networks.toml:
269+
[[networks]]
270+
name = "Anvil"
271+
dial_timeout = "1m"
272+
transaction_timeout = "30s"
273+
urls_secret = ["ws://localhost:8545"]
274+
transfer_gas_fee = 21_000
275+
gas_limit = 10_000_000
276+
# legacy transactions
277+
gas_price = 1_000_000_000
278+
# EIP-1559 transactions
279+
# disabled as it makes some of our tests fail
280+
# eip_1559_dynamic_fees = true
281+
gas_fee_cap = 1_000_000_000
282+
gas_tip_cap = 1_000_000_000
283+
284+
[[networks]]
285+
name = "Geth"
286+
dial_timeout = "1m"
287+
transaction_timeout = "30s"
288+
urls_secret = ["ws://localhost:8546"]
289+
transfer_gas_fee = 21_000
290+
gas_limit = 8_000_000
291+
# legacy transactions
292+
gas_price = 1_000_000_000
293+
# EIP-1559 transactions
294+
# disabled as it makes some of our tests fail
295+
# eip_1559_dynamic_fees = true
296+
gas_fee_cap = 10_000_000_000
297+
gas_tip_cap = 3_000_000_000
298+
*/
299+
networks, err := readSethNetworks("networks.toml")
300+
if err != nil {
301+
log.Fatal(err)
302+
}
303+
304+
client, err := NewClientBuilderWithConfig(&existingConfig).
305+
UseNetworkWithName("Anvil"). // or alternatively use UseNetworkWithChainId (if you defined it for you network)
306+
Build()
307+
308+
if err != nil {
309+
log.Fatal(err)
310+
}
311+
```
266312

267313
### Simulated Backend
268314

@@ -325,6 +371,37 @@ _ = client
325371
> to mine a new block and have your transactions processed. The best way to do it is having a goroutine running in the background
326372
> that either mines at specific intervals or when it receives a message on channel.
327373
374+
### Hooks
375+
Seth supports pre/post operation hooks for two functions:
376+
* `DeployContract()`
377+
* `Decode` (also `DecodeTx`)
378+
379+
As the name suggest each will be executed before and after mentioned operation. By default, no hooks are set. Adding hooks doesn't influence retry/gas bumping logic.
380+
381+
You can either set hooks directly on the `seth.Config` object (not recommended) or pass them to the `ClientBuilder`:
382+
```go
383+
// assuming backend is the simulated backend, to show how we can speed up contract deployments by calling `Commit()` right after deploying the contract
384+
hooks := seth.Hooks{
385+
ContractDeployment: seth.ContractDeploymentHooks{
386+
Post: func(client *seth.Client, tx *types.Transaction) error {
387+
backend.Commit()
388+
return nil
389+
},
390+
},
391+
}
392+
393+
client, err := builder.
394+
WithNetworkName("simulated").
395+
WithHooks(hooks).
396+
WithEthClient(backend.Client()).
397+
WithPrivateKeys([]string{"ac0974bec39a17e36ba4a6b4d238ff944bacb478cbed5efcae784d7bf4f2ff80"}).
398+
Build()
399+
400+
if err != nil {
401+
log.Fatal(err)
402+
}
403+
```
404+
328405
### Supported env vars
329406

330407
Some crucial data is stored in env vars, create `.envrc` and use `source .envrc`, or use `direnv`

framework/clclient/client.go

+2
Original file line numberDiff line numberDiff line change
@@ -1241,6 +1241,8 @@ func (c *ChainlinkClient) GetForwarders() (*Forwarders, *http.Response, error) {
12411241
return response, resp.RawResponse, err
12421242
}
12431243

1244+
// NewETHKey generates a new Ethereum key pair and encrypts the private key using the provided password.
1245+
// It returns the encrypted key in JSON format and the corresponding Ethereum address, or an error if the process fails.
12441246
func NewETHKey(password string) ([]byte, common.Address, error) {
12451247
privateKey, err := ecdsa.GenerateKey(crypto.S256(), rand.Reader)
12461248
var address common.Address

framework/config.go

+2
Original file line numberDiff line numberDiff line change
@@ -238,6 +238,8 @@ func (d *JSONStrDuration) UnmarshalJSON(b []byte) error {
238238
}
239239
}
240240

241+
// MustParseDuration parses a duration string in Go's format and returns the corresponding time.Duration.
242+
// It panics if the string cannot be parsed, ensuring that the caller receives a valid duration.
241243
func MustParseDuration(s string) time.Duration {
242244
d, err := time.ParseDuration(s)
243245
if err != nil {

havoc/chaos.go

+5
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,9 @@ type ChaosOpts struct {
5353
Remove bool
5454
}
5555

56+
// NewChaos creates a new Chaos instance based on the provided options.
57+
// It requires a client, a chaos object, and a logger to function properly.
58+
// This function is essential for initializing chaos experiments in a Kubernetes environment.
5659
func NewChaos(opts ChaosOpts) (*Chaos, error) {
5760
if opts.Client == nil {
5861
return nil, errors.New("client is required")
@@ -161,6 +164,8 @@ func (c *Chaos) Resume(ctx context.Context) error {
161164
return nil
162165
}
163166

167+
// Delete stops the chaos operation, updates its status, and removes the chaos object if specified.
168+
// It notifies listeners of the operation's completion and handles any errors encountered during the process.
164169
func (c *Chaos) Delete(ctx context.Context) error {
165170
defer func() {
166171
// Cancel the monitoring goroutine

havoc/range_grafana_annotator.go

+2
Original file line numberDiff line numberDiff line change
@@ -150,4 +150,6 @@ func (l RangeGrafanaAnnotator) OnChaosEnded(chaos Chaos) {
150150
l.chaosMap[chaos.GetChaosName()] = res.ID
151151
}
152152

153+
// OnChaosStatusUnknown handles the event when the status of a chaos experiment is unknown.
154+
// It allows listeners to respond appropriately to this specific status change in the chaos lifecycle.
153155
func (l RangeGrafanaAnnotator) OnChaosStatusUnknown(chaos Chaos) {}

havoc/single_line_grafana_annotator.go

+2
Original file line numberDiff line numberDiff line change
@@ -134,4 +134,6 @@ func (l SingleLineGrafanaAnnotator) OnChaosEnded(chaos Chaos) {
134134
l.logger.Debug().Any("GrafanaResponse", resp.String()).Msg("Annotated chaos experiment end")
135135
}
136136

137+
// OnChaosStatusUnknown handles the event when the status of a chaos experiment is unknown.
138+
// It allows listeners to respond appropriately to this specific status change in the chaos lifecycle.
137139
func (l SingleLineGrafanaAnnotator) OnChaosStatusUnknown(chaos Chaos) {}

havoc/template.go

+12
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,9 @@ type PodPartitionCfg struct {
4545
ExperimentCreateDelay time.Duration
4646
}
4747

48+
// RunPodPartition initiates a network partition chaos experiment on specified pods.
49+
// It configures the experiment based on the provided PodPartitionCfg and executes it.
50+
// This function is useful for testing the resilience of applications under network partition scenarios.
4851
func (cr *NamespaceScopedChaosRunner) RunPodPartition(ctx context.Context, cfg PodPartitionCfg) (*Chaos, error) {
4952
experiment, err := NewChaos(ChaosOpts{
5053
Object: &v1alpha1.NetworkChaos{
@@ -115,6 +118,9 @@ type PodDelayCfg struct {
115118
ExperimentCreateDelay time.Duration
116119
}
117120

121+
// RunPodDelay initiates a network delay chaos experiment on specified pods.
122+
// It configures the delay parameters and applies them to the targeted namespace.
123+
// This function is useful for testing the resilience of applications under network latency conditions.
118124
func (cr *NamespaceScopedChaosRunner) RunPodDelay(ctx context.Context, cfg PodDelayCfg) (*Chaos, error) {
119125
experiment, err := NewChaos(ChaosOpts{
120126
Object: &v1alpha1.NetworkChaos{
@@ -174,6 +180,9 @@ type PodFailCfg struct {
174180
ExperimentCreateDelay time.Duration
175181
}
176182

183+
// RunPodFail initiates a pod failure experiment based on the provided configuration.
184+
// It creates a Chaos object that simulates pod failures for a specified duration,
185+
// allowing users to test the resilience of their applications under failure conditions.
177186
func (cr *NamespaceScopedChaosRunner) RunPodFail(ctx context.Context, cfg PodFailCfg) (*Chaos, error) {
178187
experiment, err := NewChaos(ChaosOpts{
179188
Description: cfg.Description,
@@ -233,6 +242,9 @@ type NodeCPUStressConfig struct {
233242
ExperimentCreateDelay time.Duration
234243
}
235244

245+
// RunPodStressCPU initiates a CPU stress test on specified pods within a namespace.
246+
// It creates a scheduled chaos experiment that applies CPU load based on the provided configuration.
247+
// This function is useful for testing the resilience of applications under CPU stress conditions.
236248
func (cr *NamespaceScopedChaosRunner) RunPodStressCPU(ctx context.Context, cfg NodeCPUStressConfig) (*Chaos, error) {
237249
experiment, err := NewChaos(ChaosOpts{
238250
Description: cfg.Description,

justfile

+2-2
Original file line numberDiff line numberDiff line change
@@ -120,9 +120,9 @@ seth-Geth:
120120
geth --graphql --http --http.api admin,debug,web3,eth,txpool,personal,miner,net --http.corsdomain "*" --ws --ws.api admin,debug,web3,eth,txpool,personal,miner,net --ws.origins "*" --mine --miner.etherbase 0xf39Fd6e51aad88F6F4ce6aB8827279cffFb92266 --unlock f39Fd6e51aad88F6F4ce6aB8827279cffFb92266 --allow-insecure-unlock --datadir ./geth_data --password geth_data/password.txt --nodiscover --vmdebug --networkid 1337 > /dev/null 2>&1 &
121121

122122
# Seth: run Seth tests, example: just seth-test Anvil http://localhost:8545 "TestAPI"
123-
seth-test network url test_regex:
123+
seth-test network url test_regex extra_flags:
124124
@just seth-{{network}}
125-
cd seth && SETH_URL={{url}} SETH_NETWORK={{network}} SETH_ROOT_PRIVATE_KEY=ac0974bec39a17e36ba4a6b4d238ff944bacb478cbed5efcae784d7bf4f2ff80 go test -v -race `go list ./... | grep -v examples` -run "{{test_regex}}" || pkill -f {{network}}
125+
cd seth && SETH_URL={{url}} SETH_NETWORK={{network}} SETH_ROOT_PRIVATE_KEY=ac0974bec39a17e36ba4a6b4d238ff944bacb478cbed5efcae784d7bf4f2ff80 go test -v "{{extra_flags}}" `go list ./... | grep -v examples` -run "{{test_regex}}" || pkill -f {{network}}
126126

127127
# Run pre-commit hooks, build, lint, tidy, check typos
128128
pre-commit:

seth/.changeset/v1.51.2.md

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
- Added optional pre/post contract deployment hooks and pre/post transaction decoding hooks

seth/client.go

+26-3
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,9 @@ const (
3939
// unused by Seth, but used by upstream
4040
ErrNoKeyLoaded = "failed to load private key"
4141

42+
ErrSethConfigIsNil = "seth config is nil"
43+
ErrNetworkIsNil = "no Network is set in the Seth config"
44+
ErrNonceManagerConfigIsNil = "nonce manager config is nil"
4245
ErrReadOnlyWithPrivateKeys = "read-only mode is enabled, but you tried to load private keys"
4346
ErrReadOnlyEphemeralKeys = "ephemeral mode is not supported in read-only mode"
4447
ErrReadOnlyGasBumping = "gas bumping is not supported in read-only mode"
@@ -86,9 +89,8 @@ func NewClientWithConfig(cfg *Config) (*Client, error) {
8689
initDefaultLogging()
8790

8891
if cfg == nil {
89-
return nil, errors.New("seth config cannot be nil")
92+
return nil, errors.New(ErrSethConfigIsNil)
9093
}
91-
9294
if cfgErr := cfg.Validate(); cfgErr != nil {
9395
return nil, cfgErr
9496
}
@@ -179,6 +181,12 @@ func NewClientRaw(
179181
pkeys []*ecdsa.PrivateKey,
180182
opts ...ClientOpt,
181183
) (*Client, error) {
184+
if cfg == nil {
185+
return nil, errors.New(ErrSethConfigIsNil)
186+
}
187+
if cfgErr := cfg.Validate(); cfgErr != nil {
188+
return nil, cfgErr
189+
}
182190
if cfg.ReadOnly && (len(addrs) > 0 || len(pkeys) > 0) {
183191
return nil, errors.New(ErrReadOnlyWithPrivateKeys)
184192
}
@@ -1015,6 +1023,14 @@ func (m *Client) DeployContract(auth *bind.TransactOpts, name string, abi abi.AB
10151023
}
10161024
}
10171025

1026+
if m.Cfg.Hooks != nil && m.Cfg.Hooks.ContractDeployment.Pre != nil {
1027+
if err := m.Cfg.Hooks.ContractDeployment.Pre(auth, name, abi, bytecode, params...); err != nil {
1028+
return DeploymentData{}, errors.Wrap(err, "pre-hook failed")
1029+
}
1030+
} else {
1031+
L.Trace().Msg("No pre-contract deployment hook defined. Skipping")
1032+
}
1033+
10181034
address, tx, contract, err := bind.DeployContract(auth, abi, bytecode, m.Client, params...)
10191035
if err != nil {
10201036
return DeploymentData{}, wrapErrInMessageWithASuggestion(err)
@@ -1031,7 +1047,14 @@ func (m *Client) DeployContract(auth *bind.TransactOpts, name string, abi abi.AB
10311047
m.ContractStore.AddABI(name, abi)
10321048
}
10331049

1034-
// retry is needed both for gas bumping and for waiting for deployment to finish (sometimes there's no code at address the first time we check)
1050+
if m.Cfg.Hooks != nil && m.Cfg.Hooks.ContractDeployment.Post != nil {
1051+
if err := m.Cfg.Hooks.ContractDeployment.Post(m, tx); err != nil {
1052+
return DeploymentData{}, errors.Wrap(err, "post-hook failed")
1053+
}
1054+
} else {
1055+
L.Trace().Msg("No post-contract deployment hook defined. Skipping")
1056+
}
1057+
10351058
if err := retry.Do(
10361059
func() error {
10371060
ctx, cancel := context.WithTimeout(context.Background(), m.Cfg.Network.TxnTimeout.Duration())

0 commit comments

Comments
 (0)