mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-28 06:17:56 +00:00
25751c0562
* New approach to offchain signing. * Use in im-online * Rewrite to use Account<T> * DRY signing. * Implement send_raw_unsigned_transaction * WiP * Expunge LocalCall * Expunge LocalCall * Fix compilation. * Solve call. * Make it compile again. * Finalize implementation. * Change CreateTransaction * Clear CreateTransaction. * Add price payload * Send raw transaction * Submit signed payload / unsigned transaction (WIP) * Supertrait requirements on T::Signature * Validate signature of payload on an unsigned transaction * Fix encoding - part 1 * Make it compile. * Fix compilation of unsigned validator. * Pass price payload to the transaction * Make block number part of the signed payload * Send signed transaction * Implement all_accounts, any_account * Fix formatting * Implement submit_transaction * Submit signed transaction (ForAll, ForAny) * Fix formatting * Implement CreateSignedTransaction * Move sign and verify to AppCrypto * Sign transaction * Call `use_encoded` * Remove SubmitAndSignTransaction * Implement runtime using new SigningTypes * Adapt offchain example to changes * Fix im-online pallet * Quick fix: rename AuthorityId2 * Fix offchain example tests * Add a comment on why keystore is required in unsigned transaction test * Use UintAuthorityId instead of u64 * WIP * Remove IdentifyAccount from UintAuthorityId * Implement PublicWrapper type * Fix im-online tests * Fix runtime test * Bump spec version * Fix executor tests * Rename ImOnlineAuthId -> ImOnlineAuthorityId and formatting * Fix merge * Documentation * Revert u64 -> UintAuthorityId conversion * Fix string errors * Document public members in offchain module * Introduce SubmitTransaction * Update pallets to use SubmitTransaction * WIP * Use SubmitTransaction in offchain * Use `submit_unsigned_transaction` * Fix tests * Update docs * Remove SigningTypes requirement from `SendTransactionTypes` * Fix tests * Update frame/system/src/offchain.rs Co-Authored-By: Kian Paimani <5588131+kianenigma@users.noreply.github.com> * Update frame/system/src/offchain.rs Co-Authored-By: Kian Paimani <5588131+kianenigma@users.noreply.github.com> * Update frame/example-offchain-worker/src/tests.rs Co-Authored-By: Kian Paimani <5588131+kianenigma@users.noreply.github.com> * Update frame/system/src/offchain.rs Co-Authored-By: Kian Paimani <5588131+kianenigma@users.noreply.github.com> * Update frame/system/src/offchain.rs Co-Authored-By: Kian Paimani <5588131+kianenigma@users.noreply.github.com> * Remove leftover from previous iterations * Change enum to struct * Remove public * Move mock to node/executor/tests * Cleanup test-helpers * Make `application-crypto` `std` feature internal The macros should not generate code that requires that the calling crate has a feature with the name `std` defined. * Revert cargo lock update * Use TestAuthorityId from common * Restore members of account to public * Tidy up imports * Fix benchmarking pallet * Add tests demonstrating ForAll, ForAny on signer * Move definition of AppCrypto in example-offchain-worker from tests to mod::crypto * Cleanup stray comment * Fix ValidTransaction * Re-fix CreateSignedTransaction * Address PR feedback * Add can_sign method to signer * Propagate error * Improve documentation * Fix vec! macro not available * Document SendTransactiontypes * Add some docs. * Split signing examples * Add tests for signing examples * WIP can_sign - PR feedback * WIP * Split for_any / for_all into different calls * Verify payload and signature in test * Fix can_sign implementation * Fix impl_version * Import Box from sp_std * Create issues for TODOs * Ignore doctest. * Add test directly to system. Adjust UintTypes. * Add some tests to account filtering. * Remove code samples and point to example offchain worker * Fix doc links * Fix im-online tests using signatures. Co-authored-by: Tomasz Drwięga <tomasz@parity.io> Co-authored-by: Kian Paimani <5588131+kianenigma@users.noreply.github.com> Co-authored-by: Bastian Köcher <git@kchr.de>
395 lines
11 KiB
Rust
395 lines
11 KiB
Rust
// Copyright 2017-2020 Parity Technologies (UK) Ltd.
|
|
// This file is part of Substrate.
|
|
|
|
// Substrate is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Substrate is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Substrate. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
//! Testing utilities.
|
|
|
|
use serde::{Serialize, Serializer, Deserialize, de::Error as DeError, Deserializer};
|
|
use std::{fmt::{self, Debug}, ops::Deref, cell::RefCell};
|
|
use crate::codec::{Codec, Encode, Decode};
|
|
use crate::traits::{
|
|
self, Checkable, Applyable, BlakeTwo256, OpaqueKeys,
|
|
SignedExtension, Dispatchable, DispatchInfoOf,
|
|
};
|
|
use crate::traits::ValidateUnsigned;
|
|
use crate::{generic, KeyTypeId, ApplyExtrinsicResult};
|
|
pub use sp_core::{H256, sr25519};
|
|
use sp_core::{crypto::{CryptoType, Dummy, key_types, Public}, U256};
|
|
use crate::transaction_validity::{TransactionValidity, TransactionValidityError, TransactionSource};
|
|
|
|
/// A dummy type which can be used instead of regular cryptographic primitives.
|
|
///
|
|
/// 1. Wraps a `u64` `AccountId` and is able to `IdentifyAccount`.
|
|
/// 2. Can be converted to any `Public` key.
|
|
/// 3. Implements `RuntimeAppPublic` so it can be used instead of regular application-specific
|
|
/// crypto.
|
|
#[derive(Default, PartialEq, Eq, Clone, Encode, Decode, Debug, Hash, Serialize, Deserialize, PartialOrd, Ord)]
|
|
pub struct UintAuthorityId(pub u64);
|
|
|
|
impl From<u64> for UintAuthorityId {
|
|
fn from(id: u64) -> Self {
|
|
UintAuthorityId(id)
|
|
}
|
|
}
|
|
|
|
impl From<UintAuthorityId> for u64 {
|
|
fn from(id: UintAuthorityId) -> u64 {
|
|
id.0
|
|
}
|
|
}
|
|
|
|
impl UintAuthorityId {
|
|
/// Convert this authority id into a public key.
|
|
pub fn to_public_key<T: Public>(&self) -> T {
|
|
let bytes: [u8; 32] = U256::from(self.0).into();
|
|
T::from_slice(&bytes)
|
|
}
|
|
}
|
|
|
|
impl CryptoType for UintAuthorityId {
|
|
type Pair = Dummy;
|
|
}
|
|
|
|
impl AsRef<[u8]> for UintAuthorityId {
|
|
fn as_ref(&self) -> &[u8] {
|
|
// Unsafe, i know, but it's test code and it's just there because it's really convenient to
|
|
// keep `UintAuthorityId` as a u64 under the hood.
|
|
unsafe {
|
|
std::slice::from_raw_parts(&self.0 as *const u64 as *const _, std::mem::size_of::<u64>())
|
|
}
|
|
}
|
|
}
|
|
|
|
thread_local! {
|
|
/// A list of all UintAuthorityId keys returned to the runtime.
|
|
static ALL_KEYS: RefCell<Vec<UintAuthorityId>> = RefCell::new(vec![]);
|
|
}
|
|
|
|
impl UintAuthorityId {
|
|
/// Set the list of keys returned by the runtime call for all keys of that type.
|
|
pub fn set_all_keys<T: Into<UintAuthorityId>>(keys: impl IntoIterator<Item=T>) {
|
|
ALL_KEYS.with(|l| *l.borrow_mut() = keys.into_iter().map(Into::into).collect())
|
|
}
|
|
}
|
|
|
|
impl sp_application_crypto::RuntimeAppPublic for UintAuthorityId {
|
|
const ID: KeyTypeId = key_types::DUMMY;
|
|
|
|
type Signature = TestSignature;
|
|
|
|
fn all() -> Vec<Self> {
|
|
ALL_KEYS.with(|l| l.borrow().clone())
|
|
}
|
|
|
|
fn generate_pair(_: Option<Vec<u8>>) -> Self {
|
|
use rand::RngCore;
|
|
UintAuthorityId(rand::thread_rng().next_u64())
|
|
}
|
|
|
|
fn sign<M: AsRef<[u8]>>(&self, msg: &M) -> Option<Self::Signature> {
|
|
Some(TestSignature(self.0, msg.as_ref().to_vec()))
|
|
}
|
|
|
|
fn verify<M: AsRef<[u8]>>(&self, msg: &M, signature: &Self::Signature) -> bool {
|
|
traits::Verify::verify(signature, msg.as_ref(), &self.0)
|
|
}
|
|
|
|
fn to_raw_vec(&self) -> Vec<u8> {
|
|
AsRef::<[u8]>::as_ref(self).to_vec()
|
|
}
|
|
}
|
|
|
|
impl OpaqueKeys for UintAuthorityId {
|
|
type KeyTypeIdProviders = ();
|
|
|
|
fn key_ids() -> &'static [KeyTypeId] {
|
|
&[key_types::DUMMY]
|
|
}
|
|
|
|
fn get_raw(&self, _: KeyTypeId) -> &[u8] {
|
|
self.as_ref()
|
|
}
|
|
|
|
fn get<T: Decode>(&self, _: KeyTypeId) -> Option<T> {
|
|
self.using_encoded(|mut x| T::decode(&mut x)).ok()
|
|
}
|
|
}
|
|
|
|
impl crate::BoundToRuntimeAppPublic for UintAuthorityId {
|
|
type Public = Self;
|
|
}
|
|
|
|
impl traits::IdentifyAccount for UintAuthorityId {
|
|
type AccountId = u64;
|
|
|
|
fn into_account(self) -> Self::AccountId {
|
|
self.0
|
|
}
|
|
}
|
|
|
|
/// A dummy signature type, to match `UintAuthorityId`.
|
|
#[derive(Eq, PartialEq, Clone, Debug, Hash, Serialize, Deserialize, Encode, Decode)]
|
|
pub struct TestSignature(pub u64, pub Vec<u8>);
|
|
|
|
impl traits::Verify for TestSignature {
|
|
type Signer = UintAuthorityId;
|
|
|
|
fn verify<L: traits::Lazy<[u8]>>(&self, mut msg: L, signer: &u64) -> bool {
|
|
signer == &self.0 && msg.get() == &self.1[..]
|
|
}
|
|
}
|
|
|
|
/// Digest item
|
|
pub type DigestItem = generic::DigestItem<H256>;
|
|
|
|
/// Header Digest
|
|
pub type Digest = generic::Digest<H256>;
|
|
|
|
/// Block Header
|
|
#[derive(PartialEq, Eq, Clone, Serialize, Debug, Encode, Decode, Default, parity_util_mem::MallocSizeOf)]
|
|
#[serde(rename_all = "camelCase")]
|
|
#[serde(deny_unknown_fields)]
|
|
pub struct Header {
|
|
/// Parent hash
|
|
pub parent_hash: H256,
|
|
/// Block Number
|
|
pub number: u64,
|
|
/// Post-execution state trie root
|
|
pub state_root: H256,
|
|
/// Merkle root of block's extrinsics
|
|
pub extrinsics_root: H256,
|
|
/// Digest items
|
|
pub digest: Digest,
|
|
}
|
|
|
|
impl traits::Header for Header {
|
|
type Number = u64;
|
|
type Hashing = BlakeTwo256;
|
|
type Hash = H256;
|
|
|
|
fn number(&self) -> &Self::Number { &self.number }
|
|
fn set_number(&mut self, num: Self::Number) { self.number = num }
|
|
|
|
fn extrinsics_root(&self) -> &Self::Hash { &self.extrinsics_root }
|
|
fn set_extrinsics_root(&mut self, root: Self::Hash) { self.extrinsics_root = root }
|
|
|
|
fn state_root(&self) -> &Self::Hash { &self.state_root }
|
|
fn set_state_root(&mut self, root: Self::Hash) { self.state_root = root }
|
|
|
|
fn parent_hash(&self) -> &Self::Hash { &self.parent_hash }
|
|
fn set_parent_hash(&mut self, hash: Self::Hash) { self.parent_hash = hash }
|
|
|
|
fn digest(&self) -> &Digest { &self.digest }
|
|
fn digest_mut(&mut self) -> &mut Digest { &mut self.digest }
|
|
|
|
fn new(
|
|
number: Self::Number,
|
|
extrinsics_root: Self::Hash,
|
|
state_root: Self::Hash,
|
|
parent_hash: Self::Hash,
|
|
digest: Digest,
|
|
) -> Self {
|
|
Header {
|
|
number,
|
|
extrinsics_root,
|
|
state_root,
|
|
parent_hash,
|
|
digest,
|
|
}
|
|
}
|
|
}
|
|
|
|
impl Header {
|
|
/// A new header with the given number and default hash for all other fields.
|
|
pub fn new_from_number(number: <Self as traits::Header>::Number) -> Self {
|
|
Self {
|
|
number,
|
|
..Default::default()
|
|
}
|
|
}
|
|
}
|
|
|
|
impl<'a> Deserialize<'a> for Header {
|
|
fn deserialize<D: Deserializer<'a>>(de: D) -> Result<Self, D::Error> {
|
|
let r = <Vec<u8>>::deserialize(de)?;
|
|
Decode::decode(&mut &r[..])
|
|
.map_err(|e| DeError::custom(format!("Invalid value passed into decode: {}", e.what())))
|
|
}
|
|
}
|
|
|
|
/// An opaque extrinsic wrapper type.
|
|
#[derive(PartialEq, Eq, Clone, Debug, Encode, Decode, parity_util_mem::MallocSizeOf)]
|
|
pub struct ExtrinsicWrapper<Xt>(Xt);
|
|
|
|
impl<Xt> traits::Extrinsic for ExtrinsicWrapper<Xt>
|
|
where Xt: parity_util_mem::MallocSizeOf
|
|
{
|
|
type Call = ();
|
|
type SignaturePayload = ();
|
|
|
|
fn is_signed(&self) -> Option<bool> {
|
|
None
|
|
}
|
|
}
|
|
|
|
impl<Xt: Encode> serde::Serialize for ExtrinsicWrapper<Xt> {
|
|
fn serialize<S>(&self, seq: S) -> Result<S::Ok, S::Error> where S: ::serde::Serializer {
|
|
self.using_encoded(|bytes| seq.serialize_bytes(bytes))
|
|
}
|
|
}
|
|
|
|
impl<Xt> From<Xt> for ExtrinsicWrapper<Xt> {
|
|
fn from(xt: Xt) -> Self {
|
|
ExtrinsicWrapper(xt)
|
|
}
|
|
}
|
|
|
|
impl<Xt> Deref for ExtrinsicWrapper<Xt> {
|
|
type Target = Xt;
|
|
|
|
fn deref(&self) -> &Self::Target {
|
|
&self.0
|
|
}
|
|
}
|
|
|
|
/// Testing block
|
|
#[derive(PartialEq, Eq, Clone, Serialize, Debug, Encode, Decode, parity_util_mem::MallocSizeOf)]
|
|
pub struct Block<Xt> {
|
|
/// Block header
|
|
pub header: Header,
|
|
/// List of extrinsics
|
|
pub extrinsics: Vec<Xt>,
|
|
}
|
|
|
|
impl<Xt: 'static + Codec + Sized + Send + Sync + Serialize + Clone + Eq + Debug + traits::Extrinsic> traits::Block
|
|
for Block<Xt>
|
|
{
|
|
type Extrinsic = Xt;
|
|
type Header = Header;
|
|
type Hash = <Header as traits::Header>::Hash;
|
|
|
|
fn header(&self) -> &Self::Header {
|
|
&self.header
|
|
}
|
|
fn extrinsics(&self) -> &[Self::Extrinsic] {
|
|
&self.extrinsics[..]
|
|
}
|
|
fn deconstruct(self) -> (Self::Header, Vec<Self::Extrinsic>) {
|
|
(self.header, self.extrinsics)
|
|
}
|
|
fn new(header: Self::Header, extrinsics: Vec<Self::Extrinsic>) -> Self {
|
|
Block { header, extrinsics }
|
|
}
|
|
fn encode_from(header: &Self::Header, extrinsics: &[Self::Extrinsic]) -> Vec<u8> {
|
|
(header, extrinsics).encode()
|
|
}
|
|
}
|
|
|
|
impl<'a, Xt> Deserialize<'a> for Block<Xt> where Block<Xt>: Decode {
|
|
fn deserialize<D: Deserializer<'a>>(de: D) -> Result<Self, D::Error> {
|
|
let r = <Vec<u8>>::deserialize(de)?;
|
|
Decode::decode(&mut &r[..])
|
|
.map_err(|e| DeError::custom(format!("Invalid value passed into decode: {}", e.what())))
|
|
}
|
|
}
|
|
|
|
/// Test transaction, tuple of (sender, call, signed_extra)
|
|
/// with index only used if sender is some.
|
|
///
|
|
/// If sender is some then the transaction is signed otherwise it is unsigned.
|
|
#[derive(PartialEq, Eq, Clone, Encode, Decode)]
|
|
pub struct TestXt<Call, Extra> {
|
|
/// Signature of the extrinsic.
|
|
pub signature: Option<(u64, Extra)>,
|
|
/// Call of the extrinsic.
|
|
pub call: Call,
|
|
}
|
|
|
|
impl<Call, Extra> TestXt<Call, Extra> {
|
|
/// Create a new `TextXt`.
|
|
pub fn new(call: Call, signature: Option<(u64, Extra)>) -> Self {
|
|
Self { call, signature }
|
|
}
|
|
}
|
|
|
|
// Non-opaque extrinsics always 0.
|
|
parity_util_mem::malloc_size_of_is_0!(any: TestXt<Call, Extra>);
|
|
|
|
impl<Call, Extra> Serialize for TestXt<Call, Extra> where TestXt<Call, Extra>: Encode {
|
|
fn serialize<S>(&self, seq: S) -> Result<S::Ok, S::Error> where S: Serializer {
|
|
self.using_encoded(|bytes| seq.serialize_bytes(bytes))
|
|
}
|
|
}
|
|
|
|
impl<Call, Extra> Debug for TestXt<Call, Extra> {
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
|
write!(f, "TestXt({:?}, ...)", self.signature.as_ref().map(|x| &x.0))
|
|
}
|
|
}
|
|
|
|
impl<Call: Codec + Sync + Send, Context, Extra> Checkable<Context> for TestXt<Call, Extra> {
|
|
type Checked = Self;
|
|
fn check(self, _: &Context) -> Result<Self::Checked, TransactionValidityError> { Ok(self) }
|
|
}
|
|
|
|
impl<Call: Codec + Sync + Send, Extra> traits::Extrinsic for TestXt<Call, Extra> {
|
|
type Call = Call;
|
|
type SignaturePayload = (u64, Extra);
|
|
|
|
fn is_signed(&self) -> Option<bool> {
|
|
Some(self.signature.is_some())
|
|
}
|
|
|
|
fn new(c: Call, sig: Option<Self::SignaturePayload>) -> Option<Self> {
|
|
Some(TestXt { signature: sig, call: c })
|
|
}
|
|
}
|
|
|
|
impl<Origin, Call, Extra> Applyable for TestXt<Call, Extra> where
|
|
Call: 'static + Sized + Send + Sync + Clone + Eq + Codec + Debug + Dispatchable<Origin=Origin>,
|
|
Extra: SignedExtension<AccountId=u64, Call=Call>,
|
|
Origin: From<Option<u64>>,
|
|
{
|
|
type Call = Call;
|
|
|
|
/// Checks to see if this is a valid *transaction*. It returns information on it if so.
|
|
fn validate<U: ValidateUnsigned<Call=Self::Call>>(
|
|
&self,
|
|
_source: TransactionSource,
|
|
_info: &DispatchInfoOf<Self::Call>,
|
|
_len: usize,
|
|
) -> TransactionValidity {
|
|
Ok(Default::default())
|
|
}
|
|
|
|
/// Executes all necessary logic needed prior to dispatch and deconstructs into function call,
|
|
/// index and sender.
|
|
fn apply<U: ValidateUnsigned<Call=Self::Call>>(
|
|
self,
|
|
info: &DispatchInfoOf<Self::Call>,
|
|
len: usize,
|
|
) -> ApplyExtrinsicResult {
|
|
let maybe_who = if let Some((who, extra)) = self.signature {
|
|
Extra::pre_dispatch(extra, &who, &self.call, info, len)?;
|
|
Some(who)
|
|
} else {
|
|
Extra::pre_dispatch_unsigned(&self.call, info, len)?;
|
|
None
|
|
};
|
|
|
|
Ok(self.call.dispatch(maybe_who.into()).map(|_| ()).map_err(|e| e.error))
|
|
}
|
|
}
|