33
44import
55 stew/ ptrops, stew/ ranges/ ptr_arith, chronicles,
6+ ../ beacon_chain/ networking/ network_metadata,
67 ../ beacon_chain/ spec/ datatypes/ phase0,
78 ../ beacon_chain/ spec/ [
89 beaconstate, eth2_ssz_serialization, forks, validator, state_transition,
@@ -102,7 +103,7 @@ proc nfuzz_attestation(input: openArray[byte], xoutput: ptr byte,
102103proc nfuzz_attester_slashing (input: openArray [byte ], xoutput: ptr byte ,
103104 xoutput_size: ptr uint , disable_bls: bool ): bool {.exportc , raises : [FuzzCrashError , Defect ].} =
104105 decodeAndProcess (AttesterSlashingInput ):
105- process_attester_slashing (defaultRuntimeConfig , data.state, data.attesterSlashing, flags, cache).isOk
106+ process_attester_slashing (mainnetMetadata.cfg , data.state, data.attesterSlashing, flags, cache).isOk
106107
107108proc nfuzz_block (input: openArray [byte ], xoutput: ptr byte ,
108109 xoutput_size: ptr uint , disable_bls: bool ): bool {.exportc , raises : [FuzzCrashError , Defect ].} =
@@ -126,7 +127,7 @@ proc nfuzz_block(input: openArray[byte], xoutput: ptr byte,
126127
127128 decodeAndProcess (BlockInput ):
128129 state_transition (
129- defaultRuntimeConfig , data, data.beaconBlock, flags, noRollback).isOk
130+ mainnetMetadata.cfg , data, data.beaconBlock, flags, noRollback).isOk
130131
131132proc nfuzz_block_header (input: openArray [byte ], xoutput: ptr byte ,
132133 xoutput_size: ptr uint , disable_bls: bool ): bool {.exportc , raises : [FuzzCrashError , Defect ].} =
@@ -136,17 +137,17 @@ proc nfuzz_block_header(input: openArray[byte], xoutput: ptr byte,
136137proc nfuzz_deposit (input: openArray [byte ], xoutput: ptr byte ,
137138 xoutput_size: ptr uint , disable_bls: bool ): bool {.exportc , raises : [FuzzCrashError , Defect ].} =
138139 decodeAndProcess (DepositInput ):
139- process_deposit (defaultRuntimeConfig , data.state, data.deposit, flags).isOk
140+ process_deposit (mainnetMetadata.cfg , data.state, data.deposit, flags).isOk
140141
141142proc nfuzz_proposer_slashing (input: openArray [byte ], xoutput: ptr byte ,
142143 xoutput_size: ptr uint , disable_bls: bool ): bool {.exportc , raises : [FuzzCrashError , Defect ].} =
143144 decodeAndProcess (ProposerSlashingInput ):
144- process_proposer_slashing (defaultRuntimeConfig , data.state, data.proposerSlashing, flags, cache).isOk
145+ process_proposer_slashing (mainnetMetadata.cfg , data.state, data.proposerSlashing, flags, cache).isOk
145146
146147proc nfuzz_voluntary_exit (input: openArray [byte ], xoutput: ptr byte ,
147148 xoutput_size: ptr uint , disable_bls: bool ): bool {.exportc , raises : [FuzzCrashError , Defect ].} =
148149 decodeAndProcess (VoluntaryExitInput ):
149- process_voluntary_exit (defaultRuntimeConfig , data.state, data.exit, flags, cache).isOk
150+ process_voluntary_exit (mainnetMetadata.cfg , data.state, data.exit, flags, cache).isOk
150151
151152# Note: Could also accept raw input pointer and access list_size + seed here.
152153# However, list_size needs to be known also outside this proc to allocate xoutput.
0 commit comments