mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-26 13:27:57 +00:00
3aa4bfacfc
* Asyncify sign_with * Asyncify generate/get keys * Complete BareCryptoStore asyncification * Cleanup * Rebase * Add Proxy * Inject keystore proxy into extensions * Implement some methods * Await on send * Cleanup * Send result over the oneshot channel sender * Process one future at a time * Fix cargo stuff * Asyncify sr25519_vrf_sign * Cherry-pick and fix changes * Introduce SyncCryptoStore * SQUASH ME WITH THE first commit * Implement into SyncCryptoStore * Implement BareCryptoStore for KeystoreProxyAdapter * authority-discovery * AURA * BABE * finality-grandpa * offchain-workers * benchmarking-cli * sp_io * test-utils * application-crypto * Extensions and RPC * Client Service * bin * Update cargo.lock * Implement BareCryptoStore on proxy directly * Simplify proxy setup * Fix authority-discover * Pass async keystore to authority-discovery * Fix tests * Use async keystore in authority-discovery * Rename BareCryptoStore to CryptoStore * WIP * Remote mutable borrow in CryptoStore trait * Implement Keystore with backends * Remove Proxy implementation * Fix service builder and keystore user-crates * Fix tests * Rework authority-discovery after refactoring * futures::select! * Fix multiple mut borrows in authority-discovery * Merge fixes * Require sync * Restore Cargo.lock * PR feedback - round 1 * Remove Keystore and use LocalKeystore directly Also renamed KeystoreParams to KeystoreContainer * Join * Remove sync requirement * Fix keystore tests * Fix tests * client/authority-discovery: Remove event stream dynamic dispatching With authority-discovery moving from a poll based future to an `async` future Rust has difficulties propagating the `Sync` trade through the generated state machine. Instead of using dynamic dispatching, use a trait parameter to specify the DHT event stream. * Make it compile * Fix submit_transaction * Fix block_on issue * Use await in async context * Fix manual seal keystore * Fix authoring_blocks test * fix aura authoring_blocks * Try to fix tests for auth-discovery * client/authority-discovery: Fix lookup_throttling test * client/authority-discovery: Fix triggers_dht_get_query test * Fix epoch_authorship_works * client/authority-discovery: Remove timing assumption in unit test * client/authority-discovery: Revert changes to termination test * PR feedback * Remove deadcode and mark test code * Fix test_sync * Use the correct keyring type * Return when from_service stream is closed * Convert SyncCryptoStore to a trait * Fix line width * Fix line width - take 2 * Remove unused import * Fix keystore instantiation * PR feedback * Remove KeystoreContainer * Revert "Remove KeystoreContainer" This reverts commit ea4a37c7d74f9772b93d974e05e4498af6192730. * Take a ref of keystore * Move keystore to dev-dependencies * Address some PR feedback * Missed one * Pass keystore reference - take 2 * client/finality-grandpa: Use `Arc<dyn CryptoStore>` instead of SyncXXX Instead of using `SyncCryptoStorePtr` within `client/finality-grandpa`, which is a type alias for `Arc<dyn SyncCryptoStore>`, use `Arc<dyn CryptoStore>`. Benefits are: 1. No additional mental overhead of a `SyncCryptoStorePtr`. 2. Ability for new code to use the asynchronous methods of `CryptoStore` instead of the synchronous `SyncCryptoStore` methods within `client/finality-granpa` without the need for larger refactorings. Note: This commit uses `Arc<dyn CryptoStore>` instead of `CryptoStorePtr`, as I find the type signature more descriptive. This is subjective and in no way required. * Remove SyncCryptoStorePtr * Remove KeystoreContainer & SyncCryptoStorePtr * PR feedback * *: Use CryptoStorePtr whereever possible * *: Define SyncCryptoStore as a pure extension trait of CryptoStore * Follow up to SyncCryptoStore extension trait * Adjust docs for SyncCryptoStore as Ben suggested * Cleanup unnecessary requirements * sp-keystore * Use async_std::task::block_on in keystore * Fix block_on std requirement * Update primitives/keystore/src/lib.rs Co-authored-by: Max Inden <mail@max-inden.de> * Fix wasm build * Remove unused var * Fix wasm compilation - take 2 * Revert async-std in keystore * Fix indent * Fix version and copyright * Cleanup feature = "std" * Auth Discovery: Ignore if from_service is cloed * Max's suggestion * Revert async-std usage for block_on * Address PR feedback * Fix example offchain worker build * Address PR feedback * Update Cargo.lock * Move unused methods to test helper functions * Restore accidentally deleted cargo.lock files * Fix unused imports Co-authored-by: Max Inden <mail@max-inden.de> Co-authored-by: Shawn Tabrizi <shawntabrizi@gmail.com>
155 lines
4.3 KiB
Rust
155 lines
4.3 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) 2019-2020 Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
//! Types that should only be used for testing!
|
|
|
|
use crate::crypto::KeyTypeId;
|
|
|
|
/// Key type for generic Ed25519 key.
|
|
pub const ED25519: KeyTypeId = KeyTypeId(*b"ed25");
|
|
/// Key type for generic Sr 25519 key.
|
|
pub const SR25519: KeyTypeId = KeyTypeId(*b"sr25");
|
|
/// Key type for generic Sr 25519 key.
|
|
pub const ECDSA: KeyTypeId = KeyTypeId(*b"ecds");
|
|
|
|
/// Macro for exporting functions from wasm in with the expected signature for using it with the
|
|
/// wasm executor. This is useful for tests where you need to call a function in wasm.
|
|
///
|
|
/// The input parameters are expected to be SCALE encoded and will be automatically decoded for you.
|
|
/// The output value is also SCALE encoded when returned back to the host.
|
|
///
|
|
/// The functions are feature-gated with `#[cfg(not(feature = "std"))]`, so they are only available
|
|
/// from within wasm.
|
|
///
|
|
/// # Example
|
|
///
|
|
/// ```
|
|
/// # use sp_core::wasm_export_functions;
|
|
///
|
|
/// wasm_export_functions! {
|
|
/// fn test_in_wasm(value: bool, another_value: Vec<u8>) -> bool {
|
|
/// value && another_value.is_empty()
|
|
/// }
|
|
///
|
|
/// fn without_return_value() {
|
|
/// // do something
|
|
/// }
|
|
/// }
|
|
/// ```
|
|
#[macro_export]
|
|
macro_rules! wasm_export_functions {
|
|
(
|
|
$(
|
|
fn $name:ident (
|
|
$( $arg_name:ident: $arg_ty:ty ),* $(,)?
|
|
) $( -> $ret_ty:ty )? { $( $fn_impl:tt )* }
|
|
)*
|
|
) => {
|
|
$(
|
|
$crate::wasm_export_functions! {
|
|
@IMPL
|
|
fn $name (
|
|
$( $arg_name: $arg_ty ),*
|
|
) $( -> $ret_ty )? { $( $fn_impl )* }
|
|
}
|
|
)*
|
|
};
|
|
(@IMPL
|
|
fn $name:ident (
|
|
$( $arg_name:ident: $arg_ty:ty ),*
|
|
) { $( $fn_impl:tt )* }
|
|
) => {
|
|
#[no_mangle]
|
|
#[allow(unreachable_code)]
|
|
#[cfg(not(feature = "std"))]
|
|
pub fn $name(input_data: *mut u8, input_len: usize) -> u64 {
|
|
let input: &[u8] = if input_len == 0 {
|
|
&[0u8; 0]
|
|
} else {
|
|
unsafe {
|
|
$crate::sp_std::slice::from_raw_parts(input_data, input_len)
|
|
}
|
|
};
|
|
|
|
{
|
|
let ($( $arg_name ),*) : ($( $arg_ty ),*) = $crate::Decode::decode(
|
|
&mut &input[..],
|
|
).expect("Input data is correctly encoded");
|
|
|
|
$( $fn_impl )*
|
|
}
|
|
|
|
$crate::to_substrate_wasm_fn_return_value(&())
|
|
}
|
|
};
|
|
(@IMPL
|
|
fn $name:ident (
|
|
$( $arg_name:ident: $arg_ty:ty ),*
|
|
) $( -> $ret_ty:ty )? { $( $fn_impl:tt )* }
|
|
) => {
|
|
#[no_mangle]
|
|
#[allow(unreachable_code)]
|
|
#[cfg(not(feature = "std"))]
|
|
pub fn $name(input_data: *mut u8, input_len: usize) -> u64 {
|
|
let input: &[u8] = if input_len == 0 {
|
|
&[0u8; 0]
|
|
} else {
|
|
unsafe {
|
|
$crate::sp_std::slice::from_raw_parts(input_data, input_len)
|
|
}
|
|
};
|
|
|
|
let output $( : $ret_ty )? = {
|
|
let ($( $arg_name ),*) : ($( $arg_ty ),*) = $crate::Decode::decode(
|
|
&mut &input[..],
|
|
).expect("Input data is correctly encoded");
|
|
|
|
$( $fn_impl )*
|
|
};
|
|
|
|
$crate::to_substrate_wasm_fn_return_value(&output)
|
|
}
|
|
};
|
|
}
|
|
|
|
/// A task executor that can be used in tests.
|
|
///
|
|
/// Internally this just wraps a `ThreadPool` with a pool size of `8`. This
|
|
/// should ensure that we have enough threads in tests for spawning blocking futures.
|
|
#[cfg(feature = "std")]
|
|
#[derive(Clone)]
|
|
pub struct TaskExecutor(futures::executor::ThreadPool);
|
|
|
|
#[cfg(feature = "std")]
|
|
impl TaskExecutor {
|
|
/// Create a new instance of `Self`.
|
|
pub fn new() -> Self {
|
|
let mut builder = futures::executor::ThreadPoolBuilder::new();
|
|
Self(builder.pool_size(8).create().expect("Failed to create thread pool"))
|
|
}
|
|
}
|
|
|
|
#[cfg(feature = "std")]
|
|
impl crate::traits::SpawnNamed for TaskExecutor {
|
|
fn spawn_blocking(&self, _: &'static str, future: futures::future::BoxFuture<'static, ()>) {
|
|
self.0.spawn_ok(future);
|
|
}
|
|
fn spawn(&self, _: &'static str, future: futures::future::BoxFuture<'static, ()>) {
|
|
self.0.spawn_ok(future);
|
|
}
|
|
}
|