@@ -146,9 +146,9 @@ func TestHandler_HandleMalfeasanceProof(t *testing.T) {
146146 err := h .HandleMalfeasanceProof (context .Background (), "peer" , codec .MustEncode (gossip ))
147147 require .NoError (t , err )
148148
149- malProof , err := identities . GetMalfeasanceProof ( h . db , nodeID )
150- require .NoError (t , err )
151- require .NotEqual (t , gossip .MalfeasanceProof , * malProof )
149+ var blob sql. Blob
150+ require .NoError (t , identities . LoadMalfeasanceBlob ( context . Background (), h . db , nodeID . Bytes (), & blob ) )
151+ require .Equal (t , codec . MustEncode ( & gossip .MalfeasanceProof ), blob . Bytes )
152152 })
153153
154154 t .Run ("new proof is noop" , func (t * testing.T ) {
@@ -187,9 +187,10 @@ func TestHandler_HandleMalfeasanceProof(t *testing.T) {
187187 err := h .HandleMalfeasanceProof (context .Background (), "peer" , codec .MustEncode (gossip ))
188188 require .ErrorIs (t , ErrKnownProof , err )
189189
190- malProof , err := identities .GetMalfeasanceProof (h .db , nodeID )
191- require .NoError (t , err )
192- malProof .SetReceived (time.Time {})
190+ var blob sql.Blob
191+ require .NoError (t , identities .LoadMalfeasanceBlob (context .Background (), h .db , nodeID .Bytes (), & blob ))
192+ malProof := & wire.MalfeasanceProof {}
193+ codec .MustDecode (blob .Bytes , malProof )
193194 require .Equal (t , proof , malProof )
194195 })
195196}
@@ -318,19 +319,15 @@ func TestHandler_HandleSyncedMalfeasanceProof(t *testing.T) {
318319 Data : & wire.AtxProof {},
319320 },
320321 }
322+ proofBytes := codec .MustEncode (proof )
321323
322324 h .mockTrt .EXPECT ().OnMalfeasance (nodeID )
323- err := h .HandleSyncedMalfeasanceProof (
324- context .Background (),
325- types .Hash32 (nodeID ),
326- "peer" ,
327- codec .MustEncode (proof ),
328- )
325+ err := h .HandleSyncedMalfeasanceProof (context .Background (), types .Hash32 (nodeID ), "peer" , proofBytes )
329326 require .NoError (t , err )
330327
331- malProof , err := identities . GetMalfeasanceProof ( h . db , nodeID )
332- require .NoError (t , err )
333- require .NotEqual (t , proof , * malProof )
328+ var blob sql. Blob
329+ require .NoError (t , identities . LoadMalfeasanceBlob ( context . Background (), h . db , nodeID . Bytes (), & blob ) )
330+ require .Equal (t , proofBytes , blob . Bytes )
334331 })
335332
336333 t .Run ("new proof is noop" , func (t * testing.T ) {
@@ -344,7 +341,8 @@ func TestHandler_HandleSyncedMalfeasanceProof(t *testing.T) {
344341 Data : & wire.BallotProof {},
345342 },
346343 }
347- identities .SetMalicious (h .db , nodeID , codec .MustEncode (proof ), time .Now ())
344+ proofBytes := codec .MustEncode (proof )
345+ identities .SetMalicious (h .db , nodeID , proofBytes , time .Now ())
348346
349347 ctrl := gomock .NewController (t )
350348 handler := NewMockHandlerV1 (ctrl )
@@ -363,18 +361,14 @@ func TestHandler_HandleSyncedMalfeasanceProof(t *testing.T) {
363361 Data : & wire.AtxProof {},
364362 },
365363 }
364+ newProofBytes := codec .MustEncode (newProof )
365+ require .NotEqual (t , proofBytes , newProofBytes )
366366
367- err := h .HandleSyncedMalfeasanceProof (
368- context .Background (),
369- types .Hash32 (nodeID ),
370- "peer" ,
371- codec .MustEncode (newProof ),
372- )
367+ err := h .HandleSyncedMalfeasanceProof (context .Background (), types .Hash32 (nodeID ), "peer" , newProofBytes )
373368 require .ErrorIs (t , ErrKnownProof , err )
374369
375- malProof , err := identities .GetMalfeasanceProof (h .db , nodeID )
376- require .NoError (t , err )
377- malProof .SetReceived (time.Time {})
378- require .Equal (t , proof , malProof )
370+ var blob sql.Blob
371+ require .NoError (t , identities .LoadMalfeasanceBlob (context .Background (), h .db , nodeID .Bytes (), & blob ))
372+ require .Equal (t , proofBytes , blob .Bytes )
379373 })
380374}
0 commit comments