chore: gitignore simulation scripts and data

Untrack simulation-specific scripts (sim_*, local_sim_*, fix_*, init_ah_staking).
Files remain on disk for local use but won't be pushed to repo.
Mainnet tools (ah_upgrade, rc_upgrade, assign_coretime, set_ah_client_active) stay tracked.
This commit is contained in:
2026-02-19 23:00:56 +03:00
parent d465e7b14d
commit 665e48f47f
8 changed files with 6 additions and 2469 deletions
+6
View File
@@ -4,6 +4,12 @@
.DS_Store
.env*
chainspecs/
# Simulation scripts and data (local mainnet sim)
vendor/pezkuwi-subxt/subxt/examples/sim_*
vendor/pezkuwi-subxt/subxt/examples/local_sim_*
vendor/pezkuwi-subxt/subxt/examples/fix_*
vendor/pezkuwi-subxt/subxt/examples/init_ah_staking.rs
.idea
.local
.lycheecache
-199
View File
@@ -1,199 +0,0 @@
//! Fix MinerPages storage on AH (2 → 32) via sudo XCM
//!
//! MinerPages=2 causes OCW to mine only the last 2 of 32 snapshot pages,
//! missing all voter data in page 0, resulting in WrongWinnerCount.
//!
//! Run:
//! SUDO_MNEMONIC="..." cargo run --release -p pezkuwi-subxt --example fix_miner_pages
#![allow(missing_docs)]
use pezkuwi_subxt::dynamic::Value;
use pezkuwi_subxt::{OnlineClient, PezkuwiConfig};
use pezkuwi_subxt_signer::bip39::Mnemonic;
use pezkuwi_subxt_signer::sr25519::Keypair;
use std::str::FromStr;
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
println!("=== FIX MinerPages: 2 → 32 on AH ===\n");
// Connect to RC
let rc_url =
std::env::var("RC_RPC").unwrap_or_else(|_| "ws://127.0.0.1:9944".to_string());
let rc_api = OnlineClient::<PezkuwiConfig>::from_url(&rc_url).await?;
println!("RC connected: spec {}", rc_api.runtime_version().spec_version);
// Connect to AH (for verification)
let ah_url =
std::env::var("AH_RPC").unwrap_or_else(|_| "ws://127.0.0.1:40944".to_string());
let ah_api = OnlineClient::<PezkuwiConfig>::from_url(&ah_url).await?;
println!("AH connected: spec {}", ah_api.runtime_version().spec_version);
// Sudo keypair
let mnemonic_str =
std::env::var("SUDO_MNEMONIC").expect("SUDO_MNEMONIC environment variable required");
let mnemonic = Mnemonic::from_str(&mnemonic_str)?;
let sudo_keypair = Keypair::from_phrase(&mnemonic, None)?;
println!("Sudo: {}\n", sudo_keypair.public_key().to_account_id());
// Storage key for MinerPages: twox_128(":MinerPages:")
// parameter_types! { pub storage MinerPages: u32 = 2; }
// Key = twox_128(b":MinerPages:") = 16 bytes
let miner_pages_key: Vec<u8> = {
let data = b":MinerPages:";
// Use xxhash via pezsp_crypto_hashing
pezsp_crypto_hashing::twox_128(data).to_vec()
};
println!("MinerPages storage key: 0x{}", hex::encode(&miner_pages_key));
// Check current value on AH
let current_val = match ah_api
.storage()
.at_latest()
.await?
.fetch_raw(miner_pages_key.clone())
.await
{
Ok(data) => data,
Err(_) => vec![],
};
if current_val.is_empty() {
println!("Current MinerPages: not set (default = 2)");
} else if current_val.len() >= 4 {
let val = u32::from_le_bytes(current_val[..4].try_into().unwrap());
println!("Current MinerPages: {}", val);
if val == 32 {
println!("Already set to 32 — nothing to do.");
return Ok(());
}
}
// Encode System.set_storage call for AH
// System pallet index = 0 (always first)
// set_storage call index = 1 (System::set_storage)
// items: Vec<(Vec<u8>, Vec<u8>)>
//
// SCALE encoding:
// [pallet_idx: u8][call_idx: u8][compact_len: compact<u32>]
// [compact_key_len][key_bytes][compact_val_len][val_bytes]
let new_value: u32 = 32;
let value_bytes = new_value.to_le_bytes(); // [0x20, 0x00, 0x00, 0x00]
let mut encoded_call: Vec<u8> = Vec::new();
// Pallet System = index 0
encoded_call.push(0u8);
// Call set_storage = call_index 4
encoded_call.push(4u8);
// Vec length = 1 item (compact encoding: 1 << 2 | 0 = 4)
encoded_call.push(4u8); // compact(1)
// Key: compact length (16 bytes) = 16 << 2 | 0 = 64
encoded_call.push(64u8); // compact(16)
encoded_call.extend_from_slice(&miner_pages_key);
// Value: compact length (4 bytes) = 4 << 2 | 0 = 16
encoded_call.push(16u8); // compact(4)
encoded_call.extend_from_slice(&value_bytes);
println!(
"\nEncoded call ({} bytes): 0x{}",
encoded_call.len(),
hex::encode(&encoded_call)
);
// Build XCM message
let message = Value::unnamed_variant(
"V3",
vec![Value::unnamed_composite(vec![
Value::named_variant(
"UnpaidExecution",
[
("weight_limit", Value::unnamed_variant("Unlimited", vec![])),
("check_origin", Value::unnamed_variant("None", vec![])),
],
),
Value::named_variant(
"Transact",
[
("origin_kind", Value::unnamed_variant("Superuser", vec![])),
(
"require_weight_at_most",
Value::named_composite([
("ref_time", Value::u128(5_000_000_000u128)),
("proof_size", Value::u128(500_000u128)),
]),
),
("call", Value::from_bytes(&encoded_call)),
],
),
])],
);
// Destination: V3 { parents: 0, interior: X1(Teyrchain(1000)) }
let dest_val = Value::unnamed_variant(
"V3",
vec![Value::named_composite([
("parents", Value::u128(0)),
(
"interior",
Value::unnamed_variant(
"X1",
vec![Value::unnamed_variant(
"Teyrchain",
vec![Value::u128(1000)],
)],
),
),
])],
);
let xcm_send = pezkuwi_subxt::dynamic::tx("XcmPallet", "send", vec![dest_val, message]);
let sudo_tx = pezkuwi_subxt::dynamic::tx("Sudo", "sudo", vec![xcm_send.into_value()]);
println!("Submitting sudo(XcmPallet.send(AH, Transact(system.set_storage)))...");
let progress = rc_api
.tx()
.sign_and_submit_then_watch_default(&sudo_tx, &sudo_keypair)
.await?;
let events = progress.wait_for_finalized_success().await?;
let sent = events
.iter()
.flatten()
.any(|e| e.pallet_name() == "XcmPallet" && e.variant_name() == "Sent");
if sent {
println!(" [OK] XCM Sent");
} else {
println!(" [WARN] No XcmPallet::Sent event found");
for ev in events.iter().flatten() {
println!(" Event: {}::{}", ev.pallet_name(), ev.variant_name());
}
}
// Wait for DMP processing
println!("\nWaiting 30s for DMP processing...");
tokio::time::sleep(std::time::Duration::from_secs(30)).await;
// Verify new value
let new_val = match ah_api
.storage()
.at_latest()
.await?
.fetch_raw(miner_pages_key)
.await
{
Ok(data) => data,
Err(_) => vec![],
};
if new_val.len() >= 4 {
let val = u32::from_le_bytes(new_val[..4].try_into().unwrap());
println!("New MinerPages value: {}", val);
if val == 32 {
println!("\n✅ SUCCESS: MinerPages = 32");
} else {
println!("\n❌ UNEXPECTED: MinerPages = {} (expected 32)", val);
}
} else {
println!("❌ FAIL: MinerPages still not set (empty storage)");
}
Ok(())
}
-453
View File
@@ -1,453 +0,0 @@
//! Initialize AH Staking-Async with Validator Data
//!
//! This script populates the AH staking-async pallet with validator data
//! for the local mainnet simulation. Without this, AH cannot plan new eras
//! or send validator sets back to RC.
//!
//! Steps:
//! 1. Give Bob balance on AH (via XCM from RC)
//! 2. Alice + Bob: bond on AH directly
//! 3. Alice + Bob: validate on AH directly
//! 4. set_validator_count(2) via XCM Transact (root on AH)
//! 5. force_new_era() via XCM Transact (root on AH)
//!
//! Run:
//! SUDO_MNEMONIC="..." cargo run --release -p pezkuwi-subxt --example init_ah_staking
//!
//! Optional:
//! RC_RPC="ws://127.0.0.1:9944" (default)
//! AH_RPC="ws://127.0.0.1:40944" (default)
#![allow(missing_docs)]
use pezkuwi_subxt::dynamic::Value;
use pezkuwi_subxt::tx::TxStatus;
use pezkuwi_subxt::{OnlineClient, PezkuwiConfig};
use pezkuwi_subxt_signer::bip39::Mnemonic;
use pezkuwi_subxt_signer::sr25519::Keypair;
use std::str::FromStr;
const HEZ: u128 = 1_000_000_000_000_000_000; // 10^18
const AH_PARA_ID: u32 = 1000;
const ALICE_PUBKEY: [u8; 32] = [
0xd4, 0x35, 0x93, 0xc7, 0x15, 0xfd, 0xd3, 0x1c, 0x61, 0x14, 0x1a, 0xbd, 0x04, 0xa9, 0x9f,
0xd6, 0x82, 0x2c, 0x85, 0x58, 0x85, 0x4c, 0xcd, 0xe3, 0x9a, 0x56, 0x84, 0xe7, 0xa5, 0x6d,
0xa2, 0x7d,
];
const BOB_PUBKEY: [u8; 32] = [
0x8e, 0xaf, 0x04, 0x15, 0x16, 0x87, 0x73, 0x63, 0x26, 0xc9, 0xfe, 0xa1, 0x7e, 0x25, 0xfc,
0x52, 0x87, 0x61, 0x36, 0x93, 0xc9, 0x12, 0x90, 0x9c, 0xb2, 0x26, 0xaa, 0x47, 0x94, 0xf2,
0x6a, 0x48,
];
/// AH pallet indices
const AH_BALANCES: u8 = 10;
const AH_STAKING: u8 = 80;
/// SCALE Compact<u128> encoding
fn encode_compact_u128(buf: &mut Vec<u8>, val: u128) {
if val < 64 {
buf.push((val as u8) << 2);
} else if val < 16384 {
let v = ((val as u16) << 2) | 0x01;
buf.extend_from_slice(&v.to_le_bytes());
} else if val < (1u128 << 30) {
let v = ((val as u32) << 2) | 0x02;
buf.extend_from_slice(&v.to_le_bytes());
} else {
let bytes = val.to_le_bytes();
let len = 16 - val.leading_zeros() as usize / 8;
let len = if len == 0 { 1 } else { len };
buf.push(((len as u8 - 4) << 2) | 0x03);
buf.extend_from_slice(&bytes[..len]);
}
}
/// Encode Balances::force_set_balance(who, #[compact] new_free)
fn encode_force_set_balance(account: &[u8; 32], amount: u128) -> Vec<u8> {
let mut data = Vec::new();
data.push(AH_BALANCES);
data.push(8); // call_index for force_set_balance
// MultiAddress::Id
data.push(0x00);
data.extend_from_slice(account);
encode_compact_u128(&mut data, amount);
data
}
/// Encode Staking::set_validator_count(#[compact] new)
fn encode_set_validator_count(count: u32) -> Vec<u8> {
let mut data = Vec::new();
data.push(AH_STAKING);
data.push(9); // call_index for set_validator_count
encode_compact_u128(&mut data, count as u128);
data
}
/// Encode Staking::force_new_era()
fn encode_force_new_era() -> Vec<u8> {
let mut data = Vec::new();
data.push(AH_STAKING);
data.push(13); // call_index for force_new_era
data
}
/// Build XCM V3 dest + message for a teyrchain transact
fn build_xcm_transact(para_id: u32, encoded_call: &[u8]) -> (Value, Value) {
let dest = Value::unnamed_variant(
"V3",
vec![Value::named_composite([
("parents", Value::u128(0)),
(
"interior",
Value::unnamed_variant(
"X1",
vec![Value::unnamed_variant(
"Teyrchain",
vec![Value::u128(para_id as u128)],
)],
),
),
])],
);
let message = Value::unnamed_variant(
"V3",
vec![Value::unnamed_composite(vec![
Value::named_variant(
"UnpaidExecution",
[
("weight_limit", Value::unnamed_variant("Unlimited", vec![])),
("check_origin", Value::unnamed_variant("None", vec![])),
],
),
Value::named_variant(
"Transact",
[
("origin_kind", Value::unnamed_variant("Superuser", vec![])),
(
"require_weight_at_most",
Value::named_composite([
("ref_time", Value::u128(5_000_000_000u128)),
("proof_size", Value::u128(500_000u128)),
]),
),
("call", Value::from_bytes(encoded_call)),
],
),
])],
);
(dest, message)
}
/// Send XCM via sudo on relay chain
async fn sudo_xcm_send(
api: &OnlineClient<PezkuwiConfig>,
sudo: &Keypair,
dest: Value,
message: Value,
label: &str,
) -> Result<bool, Box<dyn std::error::Error>> {
let xcm_send = pezkuwi_subxt::dynamic::tx("XcmPallet", "send", vec![dest, message]);
let sudo_tx = pezkuwi_subxt::dynamic::tx("Sudo", "sudo", vec![xcm_send.into_value()]);
let progress = api
.tx()
.sign_and_submit_then_watch_default(&sudo_tx, sudo)
.await?;
let events = progress.wait_for_finalized_success().await?;
let mut sent = false;
for event in events.iter() {
let event = event?;
if event.pallet_name() == "XcmPallet" && event.variant_name() == "Sent" {
sent = true;
}
}
if sent {
println!(" [OK] {}", label);
} else {
println!(" [WARN] {} - no XcmPallet::Sent event", label);
}
Ok(sent)
}
/// Wait for a tx on AH
async fn wait_ah_tx(
mut progress: pezkuwi_subxt::tx::TxProgress<PezkuwiConfig, OnlineClient<PezkuwiConfig>>,
label: &str,
) -> Result<bool, Box<dyn std::error::Error>> {
loop {
let status = progress.next().await;
match status {
Some(Ok(TxStatus::InBestBlock(details))) => {
match details.wait_for_success().await {
Ok(events) => {
let mut ok = false;
for ev in events.iter().flatten() {
if ev.pallet_name() == "System" && ev.variant_name() == "ExtrinsicSuccess" {
ok = true;
}
}
if ok {
println!(" [OK] {}", label);
} else {
println!(" [WARN] {} - no ExtrinsicSuccess", label);
}
return Ok(ok);
},
Err(e) => {
println!(" [FAIL] {} - dispatch error: {}", label, e);
return Ok(false);
},
}
},
Some(Ok(TxStatus::Error { message })) => {
println!(" [FAIL] {} - TX error: {}", label, message);
return Ok(false);
},
Some(Ok(TxStatus::Invalid { message })) => {
println!(" [FAIL] {} - TX invalid: {}", label, message);
return Ok(false);
},
Some(Ok(TxStatus::Dropped { message })) => {
println!(" [FAIL] {} - TX dropped: {}", label, message);
return Ok(false);
},
Some(Err(e)) => {
println!(" [FAIL] {} - stream error: {}", label, e);
return Ok(false);
},
None => {
println!(" [FAIL] {} - stream ended", label);
return Ok(false);
},
_ => {},
}
}
}
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
println!("=== INITIALIZE AH STAKING-ASYNC ===\n");
let rc_url =
std::env::var("RC_RPC").unwrap_or_else(|_| "ws://127.0.0.1:9944".to_string());
let ah_url =
std::env::var("AH_RPC").unwrap_or_else(|_| "ws://127.0.0.1:40944".to_string());
// Connect to RC
let rc_api = OnlineClient::<PezkuwiConfig>::from_url(&rc_url).await?;
println!("RC connected: {}", rc_url);
// Connect to AH
let ah_api = OnlineClient::<PezkuwiConfig>::from_url(&ah_url).await?;
println!("AH connected: {}\n", ah_url);
// Load sudo key
let mnemonic_str =
std::env::var("SUDO_MNEMONIC").expect("SUDO_MNEMONIC environment variable required");
let mnemonic = Mnemonic::from_str(&mnemonic_str)?;
let sudo = Keypair::from_phrase(&mnemonic, None)?;
// Alice and Bob keypairs (dev accounts)
let alice =
Keypair::from_uri(&pezkuwi_subxt_signer::SecretUri::from_str("//Alice").unwrap())
.unwrap();
let bob = Keypair::from_uri(&pezkuwi_subxt_signer::SecretUri::from_str("//Bob").unwrap())
.unwrap();
println!("Sudo: {}", sudo.public_key().to_account_id());
println!("Alice: {}", alice.public_key().to_account_id());
println!("Bob: {}\n", bob.public_key().to_account_id());
// =========================================================
// STEP 1: Give Bob balance on AH (Alice already has from local_sim_setup)
// =========================================================
println!("--- Step 1: Set Bob balance on AH via XCM ---");
let bob_balance_call = encode_force_set_balance(&BOB_PUBKEY, 100_000 * HEZ);
let (dest, msg) = build_xcm_transact(AH_PARA_ID, &bob_balance_call);
sudo_xcm_send(&rc_api, &sudo, dest, msg, "Bob 100K HEZ on AH").await?;
// Wait for XCM to be processed
println!(" Waiting 24s for DMP processing...");
tokio::time::sleep(std::time::Duration::from_secs(24)).await;
// =========================================================
// STEP 2: Alice bonds on AH
// =========================================================
println!("\n--- Step 2: Alice bonds 10K HEZ on AH ---");
let bond_amount = 10_000 * HEZ;
let alice_bond = pezkuwi_subxt::dynamic::tx(
"Staking",
"bond",
vec![
Value::u128(bond_amount),
// RewardDestination::Staked = 0
Value::unnamed_variant("Staked", vec![]),
],
);
let progress = ah_api
.tx()
.sign_and_submit_then_watch_default(&alice_bond, &alice)
.await?;
wait_ah_tx(progress, "Alice bond").await?;
// =========================================================
// STEP 3: Bob bonds on AH
// =========================================================
println!("\n--- Step 3: Bob bonds 10K HEZ on AH ---");
let bob_bond = pezkuwi_subxt::dynamic::tx(
"Staking",
"bond",
vec![
Value::u128(bond_amount),
Value::unnamed_variant("Staked", vec![]),
],
);
let progress = ah_api
.tx()
.sign_and_submit_then_watch_default(&bob_bond, &bob)
.await?;
wait_ah_tx(progress, "Bob bond").await?;
// =========================================================
// STEP 4: Alice validates on AH
// =========================================================
println!("\n--- Step 4: Alice validates on AH ---");
let alice_validate = pezkuwi_subxt::dynamic::tx(
"Staking",
"validate",
vec![Value::named_composite([
// ValidatorPrefs { commission: Perbill(0), blocked: false }
("commission", Value::u128(0)),
("blocked", Value::bool(false)),
])],
);
let progress = ah_api
.tx()
.sign_and_submit_then_watch_default(&alice_validate, &alice)
.await?;
wait_ah_tx(progress, "Alice validate").await?;
// =========================================================
// STEP 5: Bob validates on AH
// =========================================================
println!("\n--- Step 5: Bob validates on AH ---");
let bob_validate = pezkuwi_subxt::dynamic::tx(
"Staking",
"validate",
vec![Value::named_composite([
("commission", Value::u128(0)),
("blocked", Value::bool(false)),
])],
);
let progress = ah_api
.tx()
.sign_and_submit_then_watch_default(&bob_validate, &bob)
.await?;
wait_ah_tx(progress, "Bob validate").await?;
// =========================================================
// STEP 6: set_validator_count(2) via XCM
// =========================================================
println!("\n--- Step 6: set_validator_count(2) via XCM ---");
let svc_call = encode_set_validator_count(2);
let (dest, msg) = build_xcm_transact(AH_PARA_ID, &svc_call);
sudo_xcm_send(&rc_api, &sudo, dest, msg, "ValidatorCount = 2").await?;
// =========================================================
// STEP 7: force_new_era via XCM
// =========================================================
println!("\n--- Step 7: force_new_era via XCM ---");
let fne_call = encode_force_new_era();
let (dest, msg) = build_xcm_transact(AH_PARA_ID, &fne_call);
sudo_xcm_send(&rc_api, &sudo, dest, msg, "ForceEra = ForceNew").await?;
// Wait for XCM processing
println!("\n Waiting 24s for XCM processing...");
tokio::time::sleep(std::time::Duration::from_secs(24)).await;
// =========================================================
// VERIFY
// =========================================================
println!("\n--- Verification ---");
// Check AH Staking::ValidatorCount
let vc_key: Vec<u8> = pezsp_crypto_hashing::twox_128(b"Staking")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"ValidatorCount").iter())
.copied()
.collect();
let vc = ah_api
.storage()
.at_latest()
.await?
.fetch_raw(vc_key)
.await?;
if !vc.is_empty() {
let count = u32::from_le_bytes(vc[..4].try_into().unwrap_or([0; 4]));
println!(" ValidatorCount: {}", count);
} else {
println!(" ValidatorCount: None (NOT SET!)");
}
// Check ForceEra
let fe_key: Vec<u8> = pezsp_crypto_hashing::twox_128(b"Staking")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"ForceEra").iter())
.copied()
.collect();
let fe = ah_api
.storage()
.at_latest()
.await?
.fetch_raw(fe_key)
.await?;
if !fe.is_empty() {
let modes = ["NotForcing", "ForceNew", "ForceNone", "ForceAlways"];
let mode = fe[0] as usize;
println!(
" ForceEra: {} ({})",
modes.get(mode).unwrap_or(&"Unknown"),
mode
);
}
// Check Bonded (Alice)
let bonded_prefix: Vec<u8> = pezsp_crypto_hashing::twox_128(b"Staking")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"Bonded").iter())
.copied()
.collect();
let alice_hash = pezsp_crypto_hashing::blake2_128(&ALICE_PUBKEY);
let mut alice_bonded_key = bonded_prefix.clone();
alice_bonded_key.extend_from_slice(&alice_hash);
alice_bonded_key.extend_from_slice(&ALICE_PUBKEY);
let alice_bonded = ah_api
.storage()
.at_latest()
.await?
.fetch_raw(alice_bonded_key)
.await?;
println!(" Alice bonded: {}", !alice_bonded.is_empty());
println!("\n=== INITIALIZATION COMPLETE ===");
println!("\nNext: Wait for AH to plan a new era and send validator set to RC.");
println!("Monitor with: AH ActiveEra, RC StakingAhClient::ValidatorSet");
Ok(())
}
-341
View File
@@ -1,341 +0,0 @@
//! Local Mainnet Simulation Setup
//!
//! Replicates mainnet sudo operations on the local simulation:
//! 1. RC: Set balances for test accounts (Founder, Alice, Bob, TestWallet)
//! 2. AH (via XCM): Set NominationPools config (MinJoinBond, MinCreateBond)
//! 3. AH (via XCM): Set Founder and Alice balances
//! 4. People (via XCM): Set Founder balance + create Nfts Collection 0 for Tiki
//!
//! Run:
//! SUDO_MNEMONIC="..." cargo run --release -p pezkuwi-subxt --example local_sim_setup
#![allow(missing_docs)]
use pezkuwi_subxt::dynamic::Value;
use pezkuwi_subxt::{OnlineClient, PezkuwiConfig};
use pezkuwi_subxt_signer::bip39::Mnemonic;
use pezkuwi_subxt_signer::sr25519::Keypair;
use std::str::FromStr;
const HEZ: u128 = 1_000_000_000_000_000_000; // 10^18
const AH_PARA_ID: u32 = 1000;
const PEOPLE_PARA_ID: u32 = 1004;
// Known public keys
const FOUNDER_PUBKEY: [u8; 32] = [
0x28, 0x92, 0x5e, 0xd8, 0xb4, 0xc0, 0xc9, 0x54, 0x02, 0xb3, 0x15, 0x63, 0x25, 0x1f, 0xd3,
0x18, 0x41, 0x43, 0x51, 0x11, 0x4b, 0x1c, 0x77, 0x97, 0xee, 0x78, 0x86, 0x66, 0xd2, 0x7d,
0x63, 0x05,
];
const ALICE_PUBKEY: [u8; 32] = [
0xd4, 0x35, 0x93, 0xc7, 0x15, 0xfd, 0xd3, 0x1c, 0x61, 0x14, 0x1a, 0xbd, 0x04, 0xa9, 0x9f,
0xd6, 0x82, 0x2c, 0x85, 0x58, 0x85, 0x4c, 0xcd, 0xe3, 0x9a, 0x56, 0x84, 0xe7, 0xa5, 0x6d,
0xa2, 0x7d,
];
const BOB_PUBKEY: [u8; 32] = [
0x8e, 0xaf, 0x04, 0x15, 0x16, 0x87, 0x73, 0x63, 0x26, 0xc9, 0xfe, 0xa1, 0x7e, 0x25, 0xfc,
0x52, 0x87, 0x61, 0x36, 0x93, 0xc9, 0x12, 0x90, 0x9c, 0xb2, 0x26, 0xaa, 0x47, 0x94, 0xf2,
0x6a, 0x48,
];
const TEST_WALLET_PUBKEY: [u8; 32] = [
0x3e, 0x2e, 0xb6, 0x2a, 0x8a, 0x77, 0xf5, 0xfc, 0x15, 0xfd, 0x3d, 0x4c, 0x6d, 0xa5, 0x3f,
0xa6, 0xdb, 0xf9, 0x0c, 0x15, 0xd3, 0xa0, 0xd1, 0xc8, 0x8c, 0x3b, 0x1d, 0xfc, 0xe2, 0xd7,
0x1e, 0x63,
];
/// Pallet indices (from construct_runtime!)
const AH_BALANCES: u8 = 10;
const AH_NOMINATION_POOLS: u8 = 81;
const PEOPLE_BALANCES: u8 = 10;
const PEOPLE_NFTS: u8 = 60;
/// Build XCM V3 dest + message for a teyrchain transact
fn build_xcm_transact(para_id: u32, encoded_call: &[u8]) -> (Value, Value) {
let dest = Value::unnamed_variant(
"V3",
vec![Value::named_composite([
("parents", Value::u128(0)),
(
"interior",
Value::unnamed_variant(
"X1",
vec![Value::unnamed_variant(
"Teyrchain",
vec![Value::u128(para_id as u128)],
)],
),
),
])],
);
let message = Value::unnamed_variant(
"V3",
vec![Value::unnamed_composite(vec![
Value::named_variant(
"UnpaidExecution",
[
("weight_limit", Value::unnamed_variant("Unlimited", vec![])),
("check_origin", Value::unnamed_variant("None", vec![])),
],
),
Value::named_variant(
"Transact",
[
("origin_kind", Value::unnamed_variant("Superuser", vec![])),
(
"require_weight_at_most",
Value::named_composite([
("ref_time", Value::u128(5_000_000_000u128)),
("proof_size", Value::u128(500_000u128)),
]),
),
("call", Value::from_bytes(encoded_call)),
],
),
])],
);
(dest, message)
}
/// Send XCM via sudo on relay chain
async fn sudo_xcm_send(
api: &OnlineClient<PezkuwiConfig>,
sudo: &Keypair,
dest: Value,
message: Value,
) -> Result<bool, Box<dyn std::error::Error>> {
let xcm_send = pezkuwi_subxt::dynamic::tx("XcmPallet", "send", vec![dest, message]);
let sudo_tx =
pezkuwi_subxt::dynamic::tx("Sudo", "sudo", vec![xcm_send.into_value()]);
let progress = api
.tx()
.sign_and_submit_then_watch_default(&sudo_tx, sudo)
.await?;
let events = progress.wait_for_finalized_success().await?;
let mut sent = false;
for event in events.iter() {
let event = event?;
if event.pallet_name() == "XcmPallet" && event.variant_name() == "Sent" {
sent = true;
}
}
Ok(sent)
}
/// SCALE Compact<u128> encoding
fn encode_compact_u128(buf: &mut Vec<u8>, val: u128) {
if val < 64 {
buf.push((val as u8) << 2);
} else if val < 16384 {
let v = ((val as u16) << 2) | 0x01;
buf.extend_from_slice(&v.to_le_bytes());
} else if val < (1u128 << 30) {
let v = ((val as u32) << 2) | 0x02;
buf.extend_from_slice(&v.to_le_bytes());
} else {
// BigInteger mode
let bytes = val.to_le_bytes();
let len = 16 - val.leading_zeros() as usize / 8;
let len = if len == 0 { 1 } else { len };
buf.push(((len as u8 - 4) << 2) | 0x03);
buf.extend_from_slice(&bytes[..len]);
}
}
/// Encode Balances::force_set_balance(who, #[compact] new_free)
/// call_index = 8, amount is compact-encoded
fn encode_force_set_balance(pallet: u8, account: &[u8; 32], amount: u128) -> Vec<u8> {
let mut data = Vec::new();
data.push(pallet);
data.push(8); // force_set_balance call_index
data.push(0x00); // MultiAddress::Id
data.extend_from_slice(account);
encode_compact_u128(&mut data, amount);
data
}
/// Encode NominationPools::set_configs (call_index=11)
/// ConfigOp: Noop=0, Set(val)=1, Remove=2
/// Balance values are plain u128 LE (NOT compact)
fn encode_set_configs(pallet: u8, min_join: u128, min_create: u128) -> Vec<u8> {
let mut data = Vec::new();
data.push(pallet);
data.push(11); // set_configs call_index
// min_join_bond: ConfigOp::Set(Balance)
data.push(1); // Set variant
data.extend_from_slice(&min_join.to_le_bytes());
// min_create_bond: ConfigOp::Set(Balance)
data.push(1); // Set variant
data.extend_from_slice(&min_create.to_le_bytes());
// max_pools: ConfigOp<u32>::Noop
data.push(0);
// max_members: ConfigOp<u32>::Noop
data.push(0);
// max_members_per_pool: ConfigOp<u32>::Noop
data.push(0);
// global_max_commission: ConfigOp<Perbill>::Noop
data.push(0);
data
}
/// Encode Nfts::force_create(owner, config) - call_index=1
/// CollectionConfig { settings: u64, max_supply: Option<u32>, mint_settings: MintSettings }
/// MintSettings { mint_type: Issuer, price: None, start_block: None, end_block: None,
/// default_item_settings: u64 }
fn encode_nfts_force_create(pallet: u8, owner: &[u8; 32]) -> Vec<u8> {
let mut data = Vec::new();
data.push(pallet);
data.push(1); // force_create call_index
// owner: MultiAddress::Id
data.push(0x00);
data.extend_from_slice(owner);
// CollectionConfig:
// settings: CollectionSettings = BitFlags<CollectionSetting> as u64 = 0 (all_enabled)
data.extend_from_slice(&0u64.to_le_bytes());
// max_supply: Option<u32> = None
data.push(0x00);
// mint_settings.mint_type: MintType::Issuer = variant 0
data.push(0x00);
// mint_settings.price: Option<Balance> = None
data.push(0x00);
// mint_settings.start_block: Option<BlockNumber> = None
data.push(0x00);
// mint_settings.end_block: Option<BlockNumber> = None
data.push(0x00);
// mint_settings.default_item_settings: ItemSettings = BitFlags<ItemSetting> as u64 = 0
data.extend_from_slice(&0u64.to_le_bytes());
data
}
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
println!("╔═══════════════════════════════════════════════════════╗");
println!("║ LOCAL SIM SETUP - Mainnet Duplication ║");
println!("╚═══════════════════════════════════════════════════════╝\n");
let rc_url =
std::env::var("RC_RPC").unwrap_or_else(|_| "ws://127.0.0.1:9944".to_string());
let api = OnlineClient::<PezkuwiConfig>::from_url(&rc_url).await?;
println!("Connected to RC: {}", rc_url);
let mnemonic_str =
std::env::var("SUDO_MNEMONIC").expect("SUDO_MNEMONIC environment variable required");
let mnemonic = Mnemonic::from_str(&mnemonic_str)?;
let sudo_keypair = Keypair::from_phrase(&mnemonic, None)?;
println!("Sudo: {}\n", sudo_keypair.public_key().to_account_id());
// ─── STEP 1: Set balances on RC ───
println!("=== STEP 1: Set balances on RC ===");
let accounts: &[(&str, &[u8; 32], u128)] = &[
("Founder", &FOUNDER_PUBKEY, 1_000_000 * HEZ),
("Alice", &ALICE_PUBKEY, 100_000 * HEZ),
("Bob", &BOB_PUBKEY, 10_000 * HEZ),
("TestWallet", &TEST_WALLET_PUBKEY, 10_000 * HEZ),
];
for (name, pubkey, amount) in accounts {
let sudo_tx = pezkuwi_subxt::dynamic::tx(
"Sudo",
"sudo",
vec![pezkuwi_subxt::dynamic::tx(
"Balances",
"force_set_balance",
vec![
Value::unnamed_variant("Id", vec![Value::from_bytes(*pubkey)]),
Value::u128(*amount),
],
)
.into_value()],
);
let progress = api
.tx()
.sign_and_submit_then_watch_default(&sudo_tx, &sudo_keypair)
.await?;
let _events = progress.wait_for_finalized_success().await?;
println!(" {}: {} HEZ [OK]", name, amount / HEZ);
}
// ─── STEP 2: AH NominationPools config via XCM ───
println!("\n=== STEP 2: AH NominationPools config ===");
let set_configs_data = encode_set_configs(
AH_NOMINATION_POOLS,
10 * HEZ, // MinJoinBond = 10 HEZ
100 * HEZ, // MinCreateBond = 100 HEZ
);
println!(" set_configs encoded: {} bytes", set_configs_data.len());
let (dest, msg) = build_xcm_transact(AH_PARA_ID, &set_configs_data);
let sent = sudo_xcm_send(&api, &sudo_keypair, dest, msg).await?;
println!(
" MinJoinBond=10 HEZ, MinCreateBond=100 HEZ: {}",
if sent { "XCM Sent!" } else { "WARN: no Sent event" }
);
// ─── STEP 3: AH balances via XCM ───
println!("\n=== STEP 3: AH balances via XCM ===");
let ah_balances: &[(&str, &[u8; 32], u128)] = &[
("Founder", &FOUNDER_PUBKEY, 1_000_000 * HEZ),
("Alice", &ALICE_PUBKEY, 100_000 * HEZ),
];
for (name, pubkey, amount) in ah_balances {
let data = encode_force_set_balance(AH_BALANCES, pubkey, *amount);
let (dest, msg) = build_xcm_transact(AH_PARA_ID, &data);
let sent = sudo_xcm_send(&api, &sudo_keypair, dest, msg).await?;
println!(
" AH {}: {} HEZ [{}]",
name,
amount / HEZ,
if sent { "OK" } else { "WARN" }
);
}
// ─── STEP 4: People Chain setup via XCM ───
println!("\n=== STEP 4: People Chain setup ===");
// Founder balance
let people_balance_data =
encode_force_set_balance(PEOPLE_BALANCES, &FOUNDER_PUBKEY, 100_000 * HEZ);
let (dest, msg) = build_xcm_transact(PEOPLE_PARA_ID, &people_balance_data);
let sent = sudo_xcm_send(&api, &sudo_keypair, dest, msg).await?;
println!(
" People Founder: 100,000 HEZ [{}]",
if sent { "OK" } else { "WARN" }
);
// Nfts Collection 0 (for Tiki)
let nfts_data = encode_nfts_force_create(PEOPLE_NFTS, &FOUNDER_PUBKEY);
println!(" Nfts.force_create encoded: {} bytes", nfts_data.len());
let (dest, msg) = build_xcm_transact(PEOPLE_PARA_ID, &nfts_data);
let sent = sudo_xcm_send(&api, &sudo_keypair, dest, msg).await?;
println!(
" Nfts Collection 0: [{}]",
if sent { "OK" } else { "WARN" }
);
// ─── SUMMARY ───
println!("\n╔═══════════════════════════════════════════════════════╗");
println!("║ SETUP COMPLETE ║");
println!("╠═══════════════════════════════════════════════════════╣");
println!("║ RC: Founder=1M, Alice=100K, Bob=10K, Test=10K HEZ ║");
println!("║ AH: MinJoin=10, MinCreate=100 HEZ ║");
println!("║ Founder=1M, Alice=100K HEZ ║");
println!("║ People: Founder=100K HEZ, Nfts Collection 0 ║");
println!("╚═══════════════════════════════════════════════════════╝");
Ok(())
}
@@ -1,269 +0,0 @@
//! Fix stuck era on AH — v2 (correct storage keys)
//!
//! The era is stuck because:
//! - CurrentEra=1, ActiveEra=0 → is_planning()=Some(1)
//! - The first election produced empty validator set (no stakers at election time)
//! - RC never activated it → AH can't advance
//!
//! Fix strategy:
//! 1. Use system.killStorage to DELETE CurrentEra key (makes is_planning()=None)
//! 2. Call Staking.force_new_era() to trigger new election
//! Both via XCM Transact from RC.
//!
//! Run:
//! SUDO_MNEMONIC="..." cargo run --release -p pezkuwi-subxt --example sim_fix_stuck_era_v2
#![allow(missing_docs)]
use pezkuwi_subxt::dynamic::Value;
use pezkuwi_subxt::{OnlineClient, PezkuwiConfig};
use pezkuwi_subxt_signer::bip39::Mnemonic;
use pezkuwi_subxt_signer::sr25519::Keypair;
use std::str::FromStr;
fn build_xcm_transact(para_id: u32, encoded_call: &[u8]) -> (Value, Value) {
let dest = Value::unnamed_variant(
"V3",
vec![Value::named_composite([
("parents", Value::u128(0)),
(
"interior",
Value::unnamed_variant(
"X1",
vec![Value::unnamed_variant(
"Teyrchain",
vec![Value::u128(para_id as u128)],
)],
),
),
])],
);
let message = Value::unnamed_variant(
"V3",
vec![Value::unnamed_composite(vec![
Value::named_variant(
"UnpaidExecution",
[
("weight_limit", Value::unnamed_variant("Unlimited", vec![])),
("check_origin", Value::unnamed_variant("None", vec![])),
],
),
Value::named_variant(
"Transact",
[
("origin_kind", Value::unnamed_variant("Superuser", vec![])),
(
"require_weight_at_most",
Value::named_composite([
("ref_time", Value::u128(5_000_000_000u128)),
("proof_size", Value::u128(500_000u128)),
]),
),
("call", Value::from_bytes(encoded_call)),
],
),
])],
);
(dest, message)
}
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
println!("=== FIX STUCK ERA ON AH — V2 ===\n");
let rc_url = std::env::var("RC_RPC").unwrap_or_else(|_| "ws://127.0.0.1:9944".to_string());
let ah_url = std::env::var("AH_RPC").unwrap_or_else(|_| "ws://127.0.0.1:40944".to_string());
// First, connect to AH to get the correct storage key from metadata
println!("--- Step 1: Get correct CurrentEra storage key from AH metadata ---");
let ah_api = OnlineClient::<PezkuwiConfig>::from_url(&ah_url).await?;
// Use the metadata to get the correct storage key for Staking.CurrentEra
let current_era_key = {
let metadata = ah_api.metadata();
let pallet = metadata.pallet_by_name("Staking").expect("Staking pallet exists");
let entry = pallet
.storage()
.expect("storage exists")
.entry_by_name("CurrentEra")
.expect("CurrentEra exists");
// Build the key: twox_128(pallet_prefix) + twox_128(entry_name)
let mut key = Vec::new();
key.extend_from_slice(&pezsp_crypto_hashing::twox_128(
pallet.name().as_bytes(),
));
key.extend_from_slice(&pezsp_crypto_hashing::twox_128(
entry.name().as_bytes(),
));
println!(
" Pallet name in metadata: {:?}",
pallet.name()
);
println!(
" Entry name in metadata: {:?}",
entry.name()
);
println!(" Storage key: 0x{}", hex::encode(&key));
key
};
// Verify the key works by querying current value
let storage = ah_api.storage().at_latest().await?;
let addr = pezkuwi_subxt::dynamic::storage::<(), Value>("Staking", "CurrentEra");
match storage.entry(addr) {
Ok(entry) => match entry.try_fetch(()).await {
Ok(Some(val)) => println!(" Current value: {:?}", val.decode()),
Ok(None) => println!(" Current value: None"),
_ => {},
},
_ => {},
}
// Also get ForceEra key
let force_era_key = {
let metadata = ah_api.metadata();
let pallet = metadata.pallet_by_name("Staking").expect("Staking pallet exists");
let entry = pallet
.storage()
.expect("storage exists")
.entry_by_name("ForceEra")
.expect("ForceEra exists");
let mut key = Vec::new();
key.extend_from_slice(&pezsp_crypto_hashing::twox_128(
pallet.name().as_bytes(),
));
key.extend_from_slice(&pezsp_crypto_hashing::twox_128(
entry.name().as_bytes(),
));
println!(" ForceEra key: 0x{}", hex::encode(&key));
key
};
// Connect to RC
println!("\n--- Step 2: Connect to RC and prepare fix ---");
let rc_api = OnlineClient::<PezkuwiConfig>::from_url(&rc_url).await?;
let mnemonic_str =
std::env::var("SUDO_MNEMONIC").expect("SUDO_MNEMONIC environment variable required");
let sudo = Keypair::from_phrase(
&Mnemonic::from_str(&mnemonic_str)?,
None,
)?;
// Build the fix: utility.batch_all([
// system.setStorage([(current_era_key, 0x00000000)]), // CurrentEra = Some(0)
// system.setStorage([(force_era_key, 0x01)]) // ForceEra = ForceNew
// ])
// Wait — we need to set CurrentEra storage value to u32=0 (4 bytes), NOT Option<u32>
// The StorageValue OptionQuery stores just the raw type, Option wrapping is done at decode
println!("\n--- Step 3: Build and send fix via XCM ---");
// Approach: Use system.setStorage to set CurrentEra=0 and ForceEra=ForceNew
let mut call_bytes = Vec::new();
// System pallet index on AH = 0, setStorage call_index = 4
// NOTE: call_index 1 = set_heap_pages (WRONG!), 4 = set_storage (CORRECT)
call_bytes.push(0u8); // System pallet index
call_bytes.push(4u8); // setStorage call index (#[pezpallet::call_index(4)])
// items: Vec<(Vec<u8>, Vec<u8>)>, 2 items
encode_compact_u32(&mut call_bytes, 2); // compact(2)
// Item 1: CurrentEra = 0 (raw u32 LE, NOT Option-wrapped)
encode_compact_u32(&mut call_bytes, current_era_key.len() as u32);
call_bytes.extend_from_slice(&current_era_key);
let current_era_value: Vec<u8> = vec![0x00, 0x00, 0x00, 0x00]; // u32 LE = 0
encode_compact_u32(&mut call_bytes, current_era_value.len() as u32);
call_bytes.extend_from_slice(&current_era_value);
// Item 2: ForceEra = ForceNew (0x01)
encode_compact_u32(&mut call_bytes, force_era_key.len() as u32);
call_bytes.extend_from_slice(&force_era_key);
let force_era_value: Vec<u8> = vec![0x01]; // Forcing::ForceNew
encode_compact_u32(&mut call_bytes, force_era_value.len() as u32);
call_bytes.extend_from_slice(&force_era_value);
println!("Encoded call ({} bytes): 0x{}", call_bytes.len(), hex::encode(&call_bytes));
println!(" CurrentEra value: 0x{} (raw u32=0)", hex::encode(&current_era_value));
println!(" ForceEra value: 0x{} (ForceNew)", hex::encode(&force_era_value));
// Send via XCM
let (dest, msg) = build_xcm_transact(1000, &call_bytes);
let xcm_send = pezkuwi_subxt::dynamic::tx("XcmPallet", "send", vec![dest, msg]);
let sudo_tx = pezkuwi_subxt::dynamic::tx("Sudo", "sudo", vec![xcm_send.into_value()]);
println!("\nSending XCM Transact to AH...");
let events = rc_api
.tx()
.sign_and_submit_then_watch_default(&sudo_tx, &sudo)
.await?
.wait_for_finalized_success()
.await?;
let sent = events
.iter()
.flatten()
.any(|e| e.pallet_name() == "XcmPallet" && e.variant_name() == "Sent");
println!(
" [{}] setStorage(CurrentEra=0, ForceEra=ForceNew)",
if sent { "OK" } else { "WARN" }
);
// Wait and verify
println!("\nWaiting 15 seconds for DMP processing...");
tokio::time::sleep(std::time::Duration::from_secs(15)).await;
let ah_api2 = OnlineClient::<PezkuwiConfig>::from_url(&ah_url).await?;
let storage2 = ah_api2.storage().at_latest().await?;
let addr = pezkuwi_subxt::dynamic::storage::<(), Value>("Staking", "CurrentEra");
match storage2.entry(addr) {
Ok(entry) => match entry.try_fetch(()).await {
Ok(Some(val)) => println!("CurrentEra after fix: {:?}", val.decode()),
Ok(None) => println!("CurrentEra after fix: None"),
_ => {},
},
_ => {},
}
let addr = pezkuwi_subxt::dynamic::storage::<(), Value>("Staking", "ForceEra");
match storage2.entry(addr) {
Ok(entry) => match entry.try_fetch(()).await {
Ok(Some(val)) => println!("ForceEra after fix: {:?}", val.decode()),
Ok(None) => println!("ForceEra after fix: None"),
_ => {},
},
_ => {},
}
let addr = pezkuwi_subxt::dynamic::storage::<(), Value>("Staking", "ActiveEra");
match storage2.entry(addr) {
Ok(entry) => match entry.try_fetch(()).await {
Ok(Some(val)) => println!("ActiveEra: {:?}", val.decode()),
Ok(None) => println!("ActiveEra: None"),
_ => {},
},
_ => {},
}
println!("\n=== FIX V2 SENT ===");
println!("Monitor AH logs for:");
println!(" 1. 'planned None' (CurrentEra cleared)");
println!(" 2. Election starting (MBE phases)");
println!(" 3. 'Sending new validator set of size 2' (Alice+Bob)");
Ok(())
}
fn encode_compact_u32(buf: &mut Vec<u8>, val: u32) {
if val < 64 {
buf.push((val as u8) << 2);
} else if val < 16384 {
let v = ((val as u16) << 2) | 0x01;
buf.extend_from_slice(&v.to_le_bytes());
} else {
let v = (val << 2) | 0x02;
buf.extend_from_slice(&v.to_le_bytes());
}
}
-850
View File
@@ -1,850 +0,0 @@
//! Full Simulation Setup — Mainnet Simulation Initialization
//!
//! Uses REAL validator stash keys (from wallet file) on the local mainnet simulation.
//!
//! Phase 1: Fund validator stash accounts + test wallets on AH (via XCM)
//! Phase 2: Staking config via XCM (ValidatorCount, min bonds, pool configs)
//! Phase 3: Validators bond + validate on AH (direct tx, real stash keys)
//! Phase 4: Test wallets bond + nominate validators
//! Phase 5: NominationPool — Test06 creates, Test07-10 join
//! Phase 6: Fund People Chain + referrals
//! Phase 7: Force new era
//! Phase 8: Verify state
//!
//! Run:
//! SUDO_MNEMONIC="..." WALLETS_FILE="/path/to/wallets.json" \
//! cargo run --release -p pezkuwi-subxt --example sim_full_setup
//!
//! Optional:
//! RC_RPC="ws://127.0.0.1:9944"
//! AH_RPC="ws://127.0.0.1:40944"
//! PEOPLE_RPC="ws://127.0.0.1:41944"
#![allow(missing_docs)]
use pezkuwi_subxt::dynamic::Value;
use pezkuwi_subxt::tx::TxStatus;
use pezkuwi_subxt::{OnlineClient, PezkuwiConfig};
use pezkuwi_subxt_signer::bip39::Mnemonic;
use pezkuwi_subxt_signer::sr25519::Keypair;
use pezkuwi_subxt_signer::SecretUri;
use std::str::FromStr;
/// Load a keypair from the wallets JSON array by wallet name
fn wallet_keypair(wallets: &[serde_json::Value], name: &str) -> Keypair {
let wallet = wallets
.iter()
.find(|w| w["name"].as_str() == Some(name))
.unwrap_or_else(|| panic!("Wallet '{}' not found in wallets file", name));
let seed = wallet["seed_phrase"]
.as_str()
.unwrap_or_else(|| panic!("Wallet '{}' has no seed_phrase", name));
let mnemonic = Mnemonic::from_str(seed).unwrap_or_else(|e| {
panic!("Invalid mnemonic for '{}': {}", name, e)
});
Keypair::from_phrase(&mnemonic, None).unwrap_or_else(|e| {
panic!("Failed to create keypair for '{}': {}", name, e)
})
}
const HEZ: u128 = 1_000_000_000_000; // 10^12 — pezkuwichain_runtime_constants::currency::UNITS
const AH_PARA_ID: u32 = 1000;
const PEOPLE_PARA_ID: u32 = 1004;
// AH pallet indices
const AH_BALANCES: u8 = 10;
const AH_STAKING: u8 = 80;
const AH_NOM_POOLS: u8 = 81;
// People pallet indices
const PEOPLE_BALANCES: u8 = 10;
const PEOPLE_REFERRAL: u8 = 52;
/// SCALE Compact<u128>
fn encode_compact_u128(buf: &mut Vec<u8>, val: u128) {
if val < 64 {
buf.push((val as u8) << 2);
} else if val < 16384 {
let v = ((val as u16) << 2) | 0x01;
buf.extend_from_slice(&v.to_le_bytes());
} else if val < (1u128 << 30) {
let v = ((val as u32) << 2) | 0x02;
buf.extend_from_slice(&v.to_le_bytes());
} else {
let bytes = val.to_le_bytes();
let len = 16 - val.leading_zeros() as usize / 8;
let len = if len == 0 { 1 } else { len };
buf.push(((len as u8 - 4) << 2) | 0x03);
buf.extend_from_slice(&bytes[..len]);
}
}
/// SCALE Compact<u32>
fn encode_compact_u32(buf: &mut Vec<u8>, val: u32) {
encode_compact_u128(buf, val as u128);
}
/// Encode Balances::force_set_balance(who, amount)
fn encode_force_set_balance(pallet: u8, account: &[u8; 32], amount: u128) -> Vec<u8> {
let mut data = Vec::new();
data.push(pallet);
data.push(8); // call_index
data.push(0x00); // MultiAddress::Id
data.extend_from_slice(account);
encode_compact_u128(&mut data, amount);
data
}
/// Encode Staking::set_validator_count(new)
fn encode_set_validator_count(count: u32) -> Vec<u8> {
let mut data = Vec::new();
data.push(AH_STAKING);
data.push(9);
encode_compact_u32(&mut data, count);
data
}
/// Encode Staking::force_new_era()
fn encode_force_new_era() -> Vec<u8> {
vec![AH_STAKING, 13]
}
/// Encode Staking::set_staking_configs(...)
/// All params are ConfigOp<T> where Noop=0, Set=1(value), Remove=2
/// Balance values are plain u128 LE (NOT compact)
fn encode_set_staking_configs(
min_nominator_bond: Option<u128>,
min_validator_bond: Option<u128>,
) -> Vec<u8> {
let mut data = Vec::new();
data.push(AH_STAKING);
data.push(22); // call_index for set_staking_configs
// min_nominator_bond: ConfigOp<Balance>
match min_nominator_bond {
Some(v) => {
data.push(1); // Set
data.extend_from_slice(&v.to_le_bytes());
},
None => data.push(0), // Noop
}
// min_validator_bond: ConfigOp<Balance>
match min_validator_bond {
Some(v) => {
data.push(1);
data.extend_from_slice(&v.to_le_bytes());
},
None => data.push(0),
}
// max_nominator_count: Noop
data.push(0);
// max_validator_count: Noop
data.push(0);
// chill_threshold: Noop
data.push(0);
// min_commission: Noop
data.push(0);
// max_staked_rewards: Noop
data.push(0);
data
}
/// Encode NominationPools::set_configs(min_join, min_create, ...)
/// Balance values are plain u128 LE (NOT compact)
fn encode_pool_set_configs(min_join: u128, min_create: u128) -> Vec<u8> {
let mut data = Vec::new();
data.push(AH_NOM_POOLS);
data.push(11); // call_index for set_configs
// min_join_bond: Set(value)
data.push(1);
data.extend_from_slice(&min_join.to_le_bytes());
// min_create_bond: Set(value)
data.push(1);
data.extend_from_slice(&min_create.to_le_bytes());
// max_pools: Noop
data.push(0);
// max_members: Noop
data.push(0);
// max_members_per_pool: Noop
data.push(0);
// global_max_commission: Noop
data.push(0);
data
}
/// Encode Referral::force_confirm_referral(referrer, referred)
fn encode_force_confirm_referral(referrer: &[u8; 32], referred: &[u8; 32]) -> Vec<u8> {
let mut data = Vec::new();
data.push(PEOPLE_REFERRAL);
data.push(1); // call_index for force_confirm_referral
data.extend_from_slice(referrer);
data.extend_from_slice(referred);
data
}
/// Build XCM V3 transact
fn build_xcm_transact(para_id: u32, encoded_call: &[u8]) -> (Value, Value) {
let dest = Value::unnamed_variant(
"V3",
vec![Value::named_composite([
("parents", Value::u128(0)),
(
"interior",
Value::unnamed_variant(
"X1",
vec![Value::unnamed_variant(
"Teyrchain",
vec![Value::u128(para_id as u128)],
)],
),
),
])],
);
let message = Value::unnamed_variant(
"V3",
vec![Value::unnamed_composite(vec![
Value::named_variant(
"UnpaidExecution",
[
("weight_limit", Value::unnamed_variant("Unlimited", vec![])),
("check_origin", Value::unnamed_variant("None", vec![])),
],
),
Value::named_variant(
"Transact",
[
("origin_kind", Value::unnamed_variant("Superuser", vec![])),
(
"require_weight_at_most",
Value::named_composite([
("ref_time", Value::u128(5_000_000_000u128)),
("proof_size", Value::u128(500_000u128)),
]),
),
("call", Value::from_bytes(encoded_call)),
],
),
])],
);
(dest, message)
}
/// Send sudo XCM
async fn sudo_xcm(
api: &OnlineClient<PezkuwiConfig>,
sudo: &Keypair,
para_id: u32,
encoded_call: &[u8],
label: &str,
) -> Result<(), Box<dyn std::error::Error>> {
let (dest, msg) = build_xcm_transact(para_id, encoded_call);
let xcm_send = pezkuwi_subxt::dynamic::tx("XcmPallet", "send", vec![dest, msg]);
let sudo_tx = pezkuwi_subxt::dynamic::tx("Sudo", "sudo", vec![xcm_send.into_value()]);
let progress = api
.tx()
.sign_and_submit_then_watch_default(&sudo_tx, sudo)
.await?;
let events = progress.wait_for_finalized_success().await?;
let sent = events
.iter()
.flatten()
.any(|e| e.pallet_name() == "XcmPallet" && e.variant_name() == "Sent");
if sent {
println!(" [OK] {}", label);
} else {
println!(" [WARN] {} — no Sent event", label);
}
Ok(())
}
/// Submit AH tx with retry on priority/nonce/invalid errors
async fn submit_ah_tx(
api: &OnlineClient<PezkuwiConfig>,
tx: &pezkuwi_subxt::tx::DynamicPayload,
signer: &Keypair,
label: &str,
) -> Result<bool, Box<dyn std::error::Error>> {
for attempt in 0..5 {
if attempt > 0 {
// Wait one block before retry (nonce race condition)
tokio::time::sleep(std::time::Duration::from_secs(12)).await;
}
match api.tx().sign_and_submit_then_watch_default(tx, signer).await {
Ok(progress) => return wait_tx(progress, label).await,
Err(e) => {
let msg = format!("{}", e);
if msg.contains("Priority") || msg.contains("priority") ||
msg.contains("Invalid Transaction") || msg.contains("1010")
{
println!(
" [RETRY] {}{} (attempt {}/5)",
label,
if msg.contains("1010") { "nonce race" } else { "priority" },
attempt + 1
);
continue;
}
println!(" [FAIL] {}{}", label, e);
return Ok(false);
},
}
}
println!(" [FAIL] {} — max retries exceeded", label);
Ok(false)
}
/// Wait for AH tx result
async fn wait_tx(
mut progress: pezkuwi_subxt::tx::TxProgress<PezkuwiConfig, OnlineClient<PezkuwiConfig>>,
label: &str,
) -> Result<bool, Box<dyn std::error::Error>> {
loop {
match progress.next().await {
Some(Ok(TxStatus::InBestBlock(details))) => match details.wait_for_success().await {
Ok(_) => {
println!(" [OK] {}", label);
return Ok(true);
},
Err(e) => {
let err_str = format!("{:?}", e);
println!(" [FAIL] {}{}", label, e);
if err_str.contains("DispatchError") {
println!(" [DEBUG] Raw error: {}", err_str);
}
return Ok(false);
},
},
Some(Ok(TxStatus::Error { message })) |
Some(Ok(TxStatus::Invalid { message })) |
Some(Ok(TxStatus::Dropped { message })) => {
println!(" [FAIL] {}{}", label, message);
return Ok(false);
},
Some(Err(e)) => {
println!(" [FAIL] {}{}", label, e);
return Ok(false);
},
None => {
println!(" [FAIL] {} — stream ended", label);
return Ok(false);
},
_ => {},
}
}
}
/// Poll AH balance for an account until nonzero or timeout (seconds)
async fn poll_ah_balance(
api: &OnlineClient<PezkuwiConfig>,
account: &[u8; 32],
timeout_secs: u64,
) -> Result<u128, Box<dyn std::error::Error>> {
let start = std::time::Instant::now();
loop {
let storage = api.storage().at_latest().await?;
let mut key: Vec<u8> = pezsp_crypto_hashing::twox_128(b"System")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"Account").iter())
.copied()
.collect();
key.extend_from_slice(&pezsp_crypto_hashing::blake2_128(account));
key.extend_from_slice(account);
let data = storage.fetch_raw(key).await?;
// AccountInfo layout: nonce(4) + consumers(4) + providers(4) + sufficients(4)
// + AccountData { free(16), reserved(16), frozen(16), flags(16) }
if data.len() >= 32 {
let offset = 16; // skip nonce+consumers+providers+sufficients
let free = u128::from_le_bytes(data[offset..offset + 16].try_into().unwrap());
if free > 0 {
return Ok(free);
}
}
if start.elapsed().as_secs() >= timeout_secs {
return Ok(0);
}
tokio::time::sleep(std::time::Duration::from_secs(6)).await;
}
}
/// Check if an account is already bonded on AH
/// Note: Bonded storage uses Twox64Concat hasher (NOT Blake2_128Concat)
async fn is_bonded(
api: &OnlineClient<PezkuwiConfig>,
account: &[u8; 32],
) -> Result<bool, Box<dyn std::error::Error>> {
let storage = api.storage().at_latest().await?;
let mut key: Vec<u8> = pezsp_crypto_hashing::twox_128(b"Staking")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"Bonded").iter())
.copied()
.collect();
// Twox64Concat: twox_64(account) ++ account
let hash = pezsp_crypto_hashing::twox_64(account);
key.extend_from_slice(&hash);
key.extend_from_slice(account);
// fetch_raw returns NoValueFound when key doesn't exist — that means "not bonded"
match storage.fetch_raw(key).await {
Ok(data) => Ok(!data.is_empty()),
Err(_) => Ok(false),
}
}
/// Generate test keypair from derivation path
fn test_keypair(n: u32) -> Keypair {
let uri = format!("//Test{}", n);
Keypair::from_uri(&SecretUri::from_str(&uri).unwrap()).unwrap()
}
fn pubkey_bytes(kp: &Keypair) -> [u8; 32] {
let id = kp.public_key().to_account_id();
let bytes = id.0;
bytes
}
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
println!("=== FULL SIMULATION SETUP ===\n");
let rc_url = std::env::var("RC_RPC").unwrap_or_else(|_| "ws://127.0.0.1:9944".to_string());
let ah_url =
std::env::var("AH_RPC").unwrap_or_else(|_| "ws://127.0.0.1:40944".to_string());
let _people_url =
std::env::var("PEOPLE_RPC").unwrap_or_else(|_| "ws://127.0.0.1:41944".to_string());
let rc_api = OnlineClient::<PezkuwiConfig>::from_url(&rc_url).await?;
let ah_api = OnlineClient::<PezkuwiConfig>::from_url(&ah_url).await?;
println!("RC: {} (spec {})", rc_url, rc_api.runtime_version().spec_version);
println!("AH: {} (spec {})\n", ah_url, ah_api.runtime_version().spec_version);
let mnemonic_str =
std::env::var("SUDO_MNEMONIC").expect("SUDO_MNEMONIC environment variable required");
let sudo = Keypair::from_phrase(&Mnemonic::from_str(&mnemonic_str)?, None)?;
// Load real validator stash keys from wallet file
let wallets_path = std::env::var("WALLETS_FILE")
.unwrap_or_else(|_| "/home/mamostehp/res/MAINNET_WALLETS_20260128_235407.json".to_string());
let wallets_json: serde_json::Value =
serde_json::from_str(&std::fs::read_to_string(&wallets_path)?)?;
let wallets_arr = wallets_json["wallets"]
.as_array()
.expect("wallets.json must contain a 'wallets' array");
let val1 = wallet_keypair(wallets_arr, "Validator_01_Stash");
let val2 = wallet_keypair(wallets_arr, "Validator_02_Stash");
let val1_pub = pubkey_bytes(&val1);
let val2_pub = pubkey_bytes(&val2);
// Generate 10 test wallets
let test_wallets: Vec<(Keypair, [u8; 32])> = (1..=10)
.map(|i| {
let kp = test_keypair(i);
let pub_bytes = pubkey_bytes(&kp);
(kp, pub_bytes)
})
.collect();
println!("Val01: {}", val1.public_key().to_account_id());
println!("Val02: {}", val2.public_key().to_account_id());
for (i, (kp, _)) in test_wallets.iter().enumerate() {
println!("Test{:02}: {}", i + 1, kp.public_key().to_account_id());
}
// =========================================================
// PHASE 1: Fund all accounts on AH via XCM
// =========================================================
println!("\n========== PHASE 1: Fund AH Accounts ==========");
// Validator stash accounts: 100K HEZ each
sudo_xcm(
&rc_api,
&sudo,
AH_PARA_ID,
&encode_force_set_balance(AH_BALANCES, &val1_pub, 100_000 * HEZ),
"Val01 100K HEZ on AH",
)
.await?;
sudo_xcm(
&rc_api,
&sudo,
AH_PARA_ID,
&encode_force_set_balance(AH_BALANCES, &val2_pub, 100_000 * HEZ),
"Val02 100K HEZ on AH",
)
.await?;
// 10 test wallets: 20K HEZ each
for (i, (_, pub_bytes)) in test_wallets.iter().enumerate() {
sudo_xcm(
&rc_api,
&sudo,
AH_PARA_ID,
&encode_force_set_balance(AH_BALANCES, pub_bytes, 20_000 * HEZ),
&format!("Test{:02} 20K HEZ on AH", i + 1),
)
.await?;
}
// Wait for DMP processing, verify Val01 balance on AH
println!("\n Waiting for DMP processing (polling Val01 balance on AH)...");
let val1_balance = poll_ah_balance(&ah_api, &val1_pub, 120).await?;
if val1_balance == 0 {
println!(" [FATAL] Val01 has 0 balance on AH after 120s — DMP not processed. Aborting.");
return Ok(());
}
println!(" [OK] Val01 AH balance: {} HEZ", val1_balance / HEZ);
// =========================================================
// PHASE 2: Staking config via XCM (root operations)
// =========================================================
println!("\n========== PHASE 2: Staking Config ==========");
// Set staking configs: min_nominator_bond=100 HEZ, min_validator_bond=1000 HEZ
sudo_xcm(
&rc_api,
&sudo,
AH_PARA_ID,
&encode_set_staking_configs(Some(100 * HEZ), Some(1_000 * HEZ)),
"Staking configs (min_nom=100, min_val=1000 HEZ)",
)
.await?;
// Set validator count = 2
sudo_xcm(
&rc_api,
&sudo,
AH_PARA_ID,
&encode_set_validator_count(2),
"ValidatorCount = 2",
)
.await?;
// NominationPools config: MinJoin=10 HEZ, MinCreate=100 HEZ
sudo_xcm(
&rc_api,
&sudo,
AH_PARA_ID,
&encode_pool_set_configs(10 * HEZ, 100 * HEZ),
"NominationPools config (MinJoin=10, MinCreate=100 HEZ)",
)
.await?;
println!("\n Waiting 30s for DMP processing...");
tokio::time::sleep(std::time::Duration::from_secs(30)).await;
// =========================================================
// PHASE 3: Bond + Validate (Val01 & Val02 directly on AH)
// =========================================================
println!("\n========== PHASE 3: Validators Bond + Validate ==========");
let bond_amount = 50_000 * HEZ;
// Check if already bonded (idempotency for re-runs)
let val1_already_bonded = is_bonded(&ah_api, &val1_pub).await?;
let val2_already_bonded = is_bonded(&ah_api, &val2_pub).await?;
if val1_already_bonded {
println!(" [SKIP] Val01 already bonded — skipping bond");
} else {
let tx = pezkuwi_subxt::dynamic::tx(
"Staking",
"bond",
vec![Value::u128(bond_amount), Value::unnamed_variant("Staked", vec![])],
);
submit_ah_tx(&ah_api, &tx, &val1, "Val01 bond 50K HEZ").await?;
}
// Always try validate (idempotent — will fail harmlessly if already validating)
let tx = pezkuwi_subxt::dynamic::tx(
"Staking",
"validate",
vec![Value::named_composite([
("commission", Value::u128(0)),
("blocked", Value::bool(false)),
])],
);
submit_ah_tx(&ah_api, &tx, &val1, "Val01 validate").await?;
if val2_already_bonded {
println!(" [SKIP] Val02 already bonded — skipping bond");
} else {
let tx = pezkuwi_subxt::dynamic::tx(
"Staking",
"bond",
vec![Value::u128(bond_amount), Value::unnamed_variant("Staked", vec![])],
);
submit_ah_tx(&ah_api, &tx, &val2, "Val02 bond 50K HEZ").await?;
}
// Always try validate
let tx = pezkuwi_subxt::dynamic::tx(
"Staking",
"validate",
vec![Value::named_composite([
("commission", Value::u128(0)),
("blocked", Value::bool(false)),
])],
);
submit_ah_tx(&ah_api, &tx, &val2, "Val02 validate").await?;
// =========================================================
// PHASE 4: Test wallets nominate validators
// =========================================================
println!("\n========== PHASE 4: Test Wallets Nominate ==========");
// Test1-5: bond + nominate both validators
for i in 0..5 {
let (kp, pub_bytes) = &test_wallets[i];
let nom_amount = 5_000 * HEZ;
if is_bonded(&ah_api, pub_bytes).await? {
println!(" [SKIP] Test{:02} already bonded — skipping bond", i + 1);
} else {
// Bond
let tx = pezkuwi_subxt::dynamic::tx(
"Staking",
"bond",
vec![Value::u128(nom_amount), Value::unnamed_variant("Staked", vec![])],
);
submit_ah_tx(&ah_api, &tx, kp, &format!("Test{:02} bond 5K HEZ", i + 1)).await?;
}
// Always try nominate (idempotent — will update if already nominating)
let tx = pezkuwi_subxt::dynamic::tx(
"Staking",
"nominate",
vec![Value::unnamed_composite(vec![
Value::unnamed_variant(
"Id",
vec![Value::from_bytes(&val1_pub)],
),
Value::unnamed_variant(
"Id",
vec![Value::from_bytes(&val2_pub)],
),
])],
);
submit_ah_tx(&ah_api, &tx, kp, &format!("Test{:02} nominate Val01+Val02", i + 1)).await?;
}
// =========================================================
// PHASE 5: NominationPool — Test6 creates, Test7-10 join
// =========================================================
println!("\n========== PHASE 5: Nomination Pool ==========");
let (pool_creator, pool_creator_pub) = &test_wallets[5]; // Test06
// Check if pool already exists (LastPoolId storage)
let pool_key: Vec<u8> = pezsp_crypto_hashing::twox_128(b"NominationPools")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"LastPoolId").iter())
.copied()
.collect();
let pool_exists = match ah_api.storage().at_latest().await?.fetch_raw(pool_key).await {
Ok(d) if !d.is_empty() && d.len() >= 4 => {
let id = u32::from_le_bytes(d[..4].try_into().unwrap());
id >= 1
},
_ => false,
};
if pool_exists {
println!(" [SKIP] Pool already exists — skipping create+join");
} else {
// Test06 creates pool with 1000 HEZ
let tx = pezkuwi_subxt::dynamic::tx(
"NominationPools",
"create",
vec![
Value::u128(1_000 * HEZ), // amount
Value::unnamed_variant("Id", vec![Value::from_bytes(pool_creator_pub)]), // root
Value::unnamed_variant("Id", vec![Value::from_bytes(pool_creator_pub)]), // nominator
Value::unnamed_variant("Id", vec![Value::from_bytes(pool_creator_pub)]), // bouncer
],
);
submit_ah_tx(&ah_api, &tx, pool_creator, "Test06 create pool (1000 HEZ)").await?;
// Pool nominate Val01
let tx = pezkuwi_subxt::dynamic::tx(
"NominationPools",
"nominate",
vec![
Value::u128(1), // pool_id
Value::unnamed_composite(vec![Value::from_bytes(&val1_pub)]),
],
);
submit_ah_tx(&ah_api, &tx, pool_creator, "Pool 1 nominate Val01").await?;
// Test07-10 join pool
for i in 6..10 {
let (kp, _) = &test_wallets[i];
let tx = pezkuwi_subxt::dynamic::tx(
"NominationPools",
"join",
vec![
Value::u128(500 * HEZ), // amount
Value::u128(1), // pool_id
],
);
submit_ah_tx(&ah_api, &tx, kp, &format!("Test{:02} join pool 1 (500 HEZ)", i + 1))
.await?;
}
}
// =========================================================
// PHASE 6: Fund People Chain + Referrals
// =========================================================
println!("\n========== PHASE 6: People Chain + Referrals ==========");
// Fund test wallets on People Chain
for (i, (_, pub_bytes)) in test_wallets.iter().enumerate() {
sudo_xcm(
&rc_api,
&sudo,
PEOPLE_PARA_ID,
&encode_force_set_balance(PEOPLE_BALANCES, pub_bytes, 1_000 * HEZ),
&format!("Test{:02} 1K HEZ on People", i + 1),
)
.await?;
}
println!("\n Waiting 30s for DMP processing...");
tokio::time::sleep(std::time::Duration::from_secs(30)).await;
// Referral chain: Test01 refers Test02, Test02 refers Test03, etc.
// Using force_confirm_referral via XCM (root) since KYC not setup in sim
for i in 0..9 {
let referrer_pub = &test_wallets[i].1;
let referred_pub = &test_wallets[i + 1].1;
sudo_xcm(
&rc_api,
&sudo,
PEOPLE_PARA_ID,
&encode_force_confirm_referral(referrer_pub, referred_pub),
&format!("Test{:02} refers Test{:02}", i + 1, i + 2),
)
.await?;
}
// =========================================================
// PHASE 7: Force new era to trigger validator set flow
// =========================================================
println!("\n========== PHASE 7: Trigger Era Rotation ==========");
sudo_xcm(
&rc_api,
&sudo,
AH_PARA_ID,
&encode_force_new_era(),
"ForceEra = ForceNew on AH",
)
.await?;
println!("\n Waiting 30s for era planning...");
tokio::time::sleep(std::time::Duration::from_secs(30)).await;
// =========================================================
// PHASE 8: Verify
// =========================================================
println!("\n========== VERIFICATION ==========");
let storage = ah_api.storage().at_latest().await?;
// ValidatorCount
let key: Vec<u8> = pezsp_crypto_hashing::twox_128(b"Staking")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"ValidatorCount").iter())
.copied()
.collect();
let data = storage.fetch_raw(key).await?;
if data.len() >= 4 {
let n = u32::from_le_bytes(data[..4].try_into().unwrap());
println!(" AH ValidatorCount: {}", n);
} else {
println!(" AH ValidatorCount: NOT SET");
}
// ForceEra
let key: Vec<u8> = pezsp_crypto_hashing::twox_128(b"Staking")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"ForceEra").iter())
.copied()
.collect();
let data = storage.fetch_raw(key).await?;
if !data.is_empty() {
let modes = ["NotForcing", "ForceNew", "ForceNone", "ForceAlways"];
println!(
" AH ForceEra: {}",
modes.get(data[0] as usize).unwrap_or(&"?")
);
}
// ActiveEra
let key: Vec<u8> = pezsp_crypto_hashing::twox_128(b"Staking")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"ActiveEra").iter())
.copied()
.collect();
let data = storage.fetch_raw(key).await?;
if data.len() >= 4 {
let era = u32::from_le_bytes(data[..4].try_into().unwrap());
println!(" AH ActiveEra: {}", era);
}
// CurrentEra
let key: Vec<u8> = pezsp_crypto_hashing::twox_128(b"Staking")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"CurrentEra").iter())
.copied()
.collect();
let data = storage.fetch_raw(key).await?;
if data.len() >= 4 {
let era = u32::from_le_bytes(data[..4].try_into().unwrap());
println!(" AH CurrentEra: {}", era);
}
// Bonded check (Twox64Concat hasher)
let bonded_prefix: Vec<u8> = pezsp_crypto_hashing::twox_128(b"Staking")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"Bonded").iter())
.copied()
.collect();
let mut val1_key = bonded_prefix.clone();
val1_key.extend_from_slice(&pezsp_crypto_hashing::twox_64(&val1_pub));
val1_key.extend_from_slice(&val1_pub);
let val1_bonded = match storage.fetch_raw(val1_key).await {
Ok(d) => !d.is_empty(),
Err(_) => false,
};
println!(" Val01 bonded: {}", val1_bonded);
let mut val2_key = bonded_prefix;
val2_key.extend_from_slice(&pezsp_crypto_hashing::twox_64(&val2_pub));
val2_key.extend_from_slice(&val2_pub);
let val2_bonded = match storage.fetch_raw(val2_key).await {
Ok(d) => !d.is_empty(),
Err(_) => false,
};
println!(" Val02 bonded: {}", val2_bonded);
println!("\n=== SETUP COMPLETE ===");
println!("\nExpected flow:");
println!(" 1. AH staking plans new era → sends ValidatorSet to RC via XCM");
println!(" 2. RC receives ValidatorSet → stores it");
println!(" 3. RC session end → sends SessionReport with activation_timestamp to AH");
println!(" 4. AH ActiveEra advances");
println!("\nMonitor: watch AH ActiveEra, RC StakingAhClient::ValidatorSet");
println!("If era doesn't advance after 5+ sessions, investigate AH staking election.");
Ok(())
}
-87
View File
@@ -1,87 +0,0 @@
//! Query AH staking state using subxt dynamic storage API
//!
//! Run:
//! cargo run --release -p pezkuwi-subxt --example sim_query_state
#![allow(missing_docs)]
use pezkuwi_subxt::dynamic::Value;
use pezkuwi_subxt::{OnlineClient, PezkuwiConfig};
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
let ah_url = std::env::var("AH_RPC").unwrap_or_else(|_| "ws://127.0.0.1:40944".to_string());
let api = OnlineClient::<PezkuwiConfig>::from_url(&ah_url).await?;
println!("=== AH STAKING STATE ===\n");
let storage = api.storage().at_latest().await?;
let items = [
("Staking", "CurrentEra"),
("Staking", "ActiveEra"),
("Staking", "ForceEra"),
("Staking", "ValidatorCount"),
("Staking", "CounterForValidators"),
("Staking", "CounterForNominators"),
("Staking", "NextElectionPage"),
("Staking", "OutgoingValidatorSet"),
("Staking", "ElectableStashes"),
("Staking", "BondedEras"),
("Staking", "MinimumValidatorCount"),
];
for (pallet, name) in &items {
let addr = pezkuwi_subxt::dynamic::storage::<(), Value>(*pallet, *name);
match storage.entry(addr) {
Ok(entry) => match entry.try_fetch(()).await {
Ok(Some(val)) => {
let decoded = val.decode();
println!("{}.{} = {:?}", pallet, name, decoded);
},
Ok(None) => println!("{}.{} = None", pallet, name),
Err(e) => println!("{}.{} = <fetch error: {}>", pallet, name, e),
},
Err(e) => println!("{}.{} = <entry error: {}>", pallet, name, e),
}
}
println!();
let mbe_items = [
("MultiBlockElection", "CurrentPhase"),
("MultiBlockElection", "Round"),
];
for (pallet, name) in &mbe_items {
let addr = pezkuwi_subxt::dynamic::storage::<(), Value>(*pallet, *name);
match storage.entry(addr) {
Ok(entry) => match entry.try_fetch(()).await {
Ok(Some(val)) => println!("{}.{} = {:?}", pallet, name, val.decode()),
Ok(None) => println!("{}.{} = None", pallet, name),
Err(e) => println!("{}.{} = <fetch error: {}>", pallet, name, e),
},
Err(e) => println!("{}.{} = <entry error: {}>", pallet, name, e),
}
}
println!();
let rc_items = [
("StakingRcClient", "LastSessionReportEndingIndex"),
("StakingRcClient", "Mode"),
];
for (pallet, name) in &rc_items {
let addr = pezkuwi_subxt::dynamic::storage::<(), Value>(*pallet, *name);
match storage.entry(addr) {
Ok(entry) => match entry.try_fetch(()).await {
Ok(Some(val)) => println!("{}.{} = {:?}", pallet, name, val.decode()),
Ok(None) => println!("{}.{} = None", pallet, name),
Err(e) => println!("{}.{} = <fetch error: {}>", pallet, name, e),
},
Err(e) => println!("{}.{} = <entry error: {}>", pallet, name, e),
}
}
Ok(())
}
@@ -1,270 +0,0 @@
//! Reset MBE election on AH: ForceRotateRound + ForceNew
//!
//! When the snapshot was taken with stale data (e.g. only 1 validator),
//! the election cycles forever with WrongWinnerCount. This script:
//! 1. Calls manage(ForceRotateRound) to kill the current round and snapshot
//! 2. Calls Staking.force_new_era() to trigger a fresh election with new snapshot
//!
//! Run:
//! SUDO_MNEMONIC="..." cargo run --release -p pezkuwi-subxt --example sim_reset_election
#![allow(missing_docs)]
use pezkuwi_subxt::dynamic::Value;
use pezkuwi_subxt::{OnlineClient, PezkuwiConfig};
use pezkuwi_subxt_signer::bip39::Mnemonic;
use pezkuwi_subxt_signer::sr25519::Keypair;
use std::str::FromStr;
fn build_xcm_transact(para_id: u32, encoded_call: &[u8]) -> (Value, Value) {
let dest = Value::unnamed_variant(
"V3",
vec![Value::named_composite([
("parents", Value::u128(0)),
(
"interior",
Value::unnamed_variant(
"X1",
vec![Value::unnamed_variant(
"Teyrchain",
vec![Value::u128(para_id as u128)],
)],
),
),
])],
);
let message = Value::unnamed_variant(
"V3",
vec![Value::unnamed_composite(vec![
Value::named_variant(
"UnpaidExecution",
[
("weight_limit", Value::unnamed_variant("Unlimited", vec![])),
("check_origin", Value::unnamed_variant("None", vec![])),
],
),
Value::named_variant(
"Transact",
[
("origin_kind", Value::unnamed_variant("Superuser", vec![])),
(
"require_weight_at_most",
Value::named_composite([
("ref_time", Value::u128(5_000_000_000u128)),
("proof_size", Value::u128(500_000u128)),
]),
),
("call", Value::from_bytes(encoded_call)),
],
),
])],
);
(dest, message)
}
async fn sudo_xcm(
api: &OnlineClient<PezkuwiConfig>,
sudo: &Keypair,
para_id: u32,
encoded_call: &[u8],
label: &str,
) -> Result<(), Box<dyn std::error::Error>> {
let (dest, msg) = build_xcm_transact(para_id, encoded_call);
let xcm_send = pezkuwi_subxt::dynamic::tx("XcmPallet", "send", vec![dest, msg]);
let sudo_tx = pezkuwi_subxt::dynamic::tx("Sudo", "sudo", vec![xcm_send.into_value()]);
let progress = api
.tx()
.sign_and_submit_then_watch_default(&sudo_tx, sudo)
.await?;
let events = progress.wait_for_finalized_success().await?;
let sent = events
.iter()
.flatten()
.any(|e| e.pallet_name() == "XcmPallet" && e.variant_name() == "Sent");
if sent {
println!(" [OK] {}", label);
} else {
println!(" [WARN] {} — no Sent event", label);
for ev in events.iter().flatten() {
println!(" Event: {}::{}", ev.pallet_name(), ev.variant_name());
}
}
Ok(())
}
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
println!("=== RESET MBE ELECTION ON AH ===\n");
let rc_url =
std::env::var("RC_RPC").unwrap_or_else(|_| "ws://127.0.0.1:9944".to_string());
let rc_api = OnlineClient::<PezkuwiConfig>::from_url(&rc_url).await?;
println!("RC connected: spec {}", rc_api.runtime_version().spec_version);
let ah_url =
std::env::var("AH_RPC").unwrap_or_else(|_| "ws://127.0.0.1:40944".to_string());
let ah_api = OnlineClient::<PezkuwiConfig>::from_url(&ah_url).await?;
println!("AH connected: spec {}", ah_api.runtime_version().spec_version);
let mnemonic_str =
std::env::var("SUDO_MNEMONIC").expect("SUDO_MNEMONIC environment variable required");
let mnemonic = Mnemonic::from_str(&mnemonic_str)?;
let sudo_keypair = Keypair::from_phrase(&mnemonic, None)?;
println!("Sudo: {}\n", sudo_keypair.public_key().to_account_id());
// Check current MBE state
let phase_key: Vec<u8> = pezsp_crypto_hashing::twox_128(b"MultiBlockElection")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"CurrentPhase").iter())
.copied()
.collect();
let phase_val = match ah_api
.storage()
.at_latest()
.await?
.fetch_raw(phase_key)
.await
{
Ok(data) => data,
Err(_) => vec![],
};
println!("Current phase raw: 0x{}", hex::encode(&phase_val));
// Step 1: ForceRotateRound
// MultiBlockElection pallet index = 85
// manage call_index = 0
// ManagerOperation::ForceRotateRound = variant 0
println!("\n--- Step 1: ForceRotateRound ---");
let force_rotate_call: Vec<u8> = vec![85, 0, 0]; // [pallet=85, call=0, variant=0]
sudo_xcm(
&rc_api,
&sudo_keypair,
1000,
&force_rotate_call,
"manage(ForceRotateRound)",
)
.await?;
println!("Waiting 30s for DMP processing...");
tokio::time::sleep(std::time::Duration::from_secs(30)).await;
// Verify phase is now Off
let phase_key2: Vec<u8> = pezsp_crypto_hashing::twox_128(b"MultiBlockElection")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"CurrentPhase").iter())
.copied()
.collect();
let phase_val2 = match ah_api
.storage()
.at_latest()
.await?
.fetch_raw(phase_key2)
.await
{
Ok(data) => data,
Err(_) => vec![],
};
println!("Phase after ForceRotateRound: 0x{}", hex::encode(&phase_val2));
// Step 2: force_new_era via XCM to AH Staking
println!("\n--- Step 2: ForceEra = ForceNew ---");
// Staking pallet index on AH
let staking_idx: u8 = {
// Look up from runtime: Staking = 80
80
};
// force_new_era call_index needs to be checked
// For now, we use the sim_full_setup approach: set ForceEra storage directly
// ForceEra key: twox128(Staking) + twox128(ForceEra)
let force_era_key: Vec<u8> = pezsp_crypto_hashing::twox_128(b"Staking")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"ForceEra").iter())
.copied()
.collect();
// ForceNew = variant index 2 in Forcing enum
// enum Forcing { NotForcing=0, ForceNew=1, ForceNone=2, ForceAlways=3 }
// Actually, let me check: from sim_full_setup output "ForceEra: ForceNew" was set.
// In the SCALE encoding: ForceNew = 1
let force_new_value: Vec<u8> = vec![1u8]; // ForceNew = variant index 1
// Encode system.set_storage call
let mut set_storage_call: Vec<u8> = Vec::new();
set_storage_call.push(0u8); // System pallet = 0
set_storage_call.push(4u8); // set_storage call_index = 4
set_storage_call.push(4u8); // compact(1) = 1 item
// Key
set_storage_call.push((force_era_key.len() as u8) << 2); // compact(32) = 128
set_storage_call.extend_from_slice(&force_era_key);
// Value
set_storage_call.push((force_new_value.len() as u8) << 2); // compact(1) = 4
set_storage_call.extend_from_slice(&force_new_value);
println!("ForceEra key: 0x{}", hex::encode(&force_era_key));
println!(
"Encoded call ({} bytes): 0x{}",
set_storage_call.len(),
hex::encode(&set_storage_call)
);
sudo_xcm(
&rc_api,
&sudo_keypair,
1000,
&set_storage_call,
"system.set_storage(ForceEra = ForceNew)",
)
.await?;
println!("Waiting 30s for DMP processing...");
tokio::time::sleep(std::time::Duration::from_secs(30)).await;
// Verify
let force_era_val = match ah_api
.storage()
.at_latest()
.await?
.fetch_raw(force_era_key)
.await
{
Ok(data) => data,
Err(_) => vec![],
};
let force_era_str = if force_era_val.is_empty() {
"empty (default NotForcing)"
} else {
match force_era_val[0] {
0 => "NotForcing",
1 => "ForceNew",
2 => "ForceNone",
3 => "ForceAlways",
_ => "Unknown",
}
};
println!("ForceEra: {}", force_era_str);
// Check validators
let cv_key: Vec<u8> = pezsp_crypto_hashing::twox_128(b"Staking")
.iter()
.chain(pezsp_crypto_hashing::twox_128(b"CounterForValidators").iter())
.copied()
.collect();
let cv_val = match ah_api.storage().at_latest().await?.fetch_raw(cv_key).await {
Ok(data) => data,
Err(_) => vec![],
};
if cv_val.len() >= 4 {
let count = u32::from_le_bytes(cv_val[..4].try_into().unwrap());
println!("CounterForValidators: {}", count);
}
println!("\n=== DONE ===");
println!("Next: AH will take a new snapshot at session boundary with 2 validators.");
println!("Then: MBE election should produce a valid 2-winner solution.");
println!("Monitor: sim_query_state → watch CurrentPhase and ActiveEra");
Ok(())
}