mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-05-06 04:28:01 +00:00
4c651637f2
* starting * Updated from other branch. * setting flag * flag in storage struct * fix flagging to access and insert. * added todo to fix * also missing serialize meta to storage proof * extract meta. * Isolate old trie layout. * failing test that requires storing in meta when old hash scheme is used. * old hash compatibility * Db migrate. * runing tests with both states when interesting. * fix chain spec test with serde default. * export state (missing trie function). * Pending using new branch, lacking genericity on layout resolution. * extract and set global meta * Update to branch 4 * fix iterator with root flag (no longer insert node). * fix trie root hashing of root * complete basic backend. * Remove old_hash meta from proof that do not use inner_hashing. * fix trie test for empty (force layout on empty deltas). * Root update fix. * debug on meta * Use trie key iteration that do not include value in proofs. * switch default test ext to use inner hash. * small integration test, and fix tx cache mgmt in ext. test failing * Proof scenario at state-machine level. * trace for db upgrade * try different param * act more like iter_from. * Bigger batches. * Update trie dependency. * drafting codec changes and refact * before removing unused branch no value alt hashing. more work todo rename all flag var to alt_hash, and remove extrinsic replace by storage query at every storage_root call. * alt hashing only for branch with value. * fix trie tests * Hash of value include the encoded size. * removing fields(broken) * fix trie_stream to also include value length in inner hash. * triedbmut only using alt type if inner hashing. * trie_stream to also only use alt hashing type when actually alt hashing. * Refactor meta state, logic should work with change of trie treshold. * Remove NoMeta variant. * Remove state_hashed trigger specific functions. * pending switching to using threshold, new storage root api does not make much sense. * refactoring to use state from backend (not possible payload changes). * Applying from previous state * Remove default from storage, genesis need a special build. * rem empty space * Catch problem: when using triedb with default: we should not revert nodes: otherwhise thing as trie codec cannot decode-encode without changing state. * fix compilation * Right logic to avoid switch on reencode when default layout. * Clean up some todos * remove trie meta from root upstream * update upstream and fix benches. * split some long lines. * UPdate trie crate to work with new design. * Finish update to refactored upstream. * update to latest triedb changes. * Clean up. * fix executor test. * rust fmt from master. * rust format. * rustfmt * fix * start host function driven versioning * update state-machine part * still need access to state version from runtime * state hash in mem: wrong * direction likely correct, but passing call to code exec for genesis init seem awkward. * state version serialize in runtime, wrong approach, just initialize it with no threshold for core api < 4 seems more proper. * stateversion from runtime version (core api >= 4). * update trie, fix tests * unused import * clean some TODOs * Require RuntimeVersionOf for executor * use RuntimeVersionOf to resolve genesis state version. * update runtime version test * fix state-machine tests * TODO * Use runtime version from storage wasm with fast sync. * rustfmt * fmt * fix test * revert useless changes. * clean some unused changes * fmt * removing useless trait function. * remove remaining reference to state_hash * fix some imports * Follow chain state version management. * trie update, fix and constant threshold for trie layouts. * update deps * Update to latest trie pr changes. * fix benches * Verify proof requires right layout. * update trie_root * Update trie deps to latest * Update to latest trie versioning * Removing patch * update lock * extrinsic for sc-service-test using layout v0. * Adding RuntimeVersionOf to CallExecutor works. * fmt * error when resolving version and no wasm in storage. * use existing utils to instantiate runtime code. * Patch to delay runtime switch. * Revert "Patch to delay runtime switch." This reverts commit 67e55fee468f1a0cda853f5362b22e0d775786da. * useless closure * remove remaining state_hash variables. * Remove outdated comment * useless inner hash * fmt * fmt and opt-in feature to apply state change. * feature gate core version, use new test feature for node and test node * Use a 'State' api version instead of Core one. * fix merge of test function * use blake macro. * Fix state api (require declaring the api in runtime). * Opt out feature, fix macro for io to select a given version instead of latest. * run test nodes on new state. * fix * Apply review change (docs and error). * fmt * use explicit runtime_interface in doc test * fix ui test * fix doc test * fmt * use default for path and specname when resolving version. * small review related changes. * doc value size requirement. * rename old_state feature * Remove macro changes * feature rename * state version as host function parameter * remove flag for client api * fix tests * switch storage chain proof to V1 * host functions, pass by state version enum * use WrappedRuntimeCode * start * state_version in runtime version * rust fmt * Update storage proof of max size. * fix runtime version rpc test * right intent of convert from compat * fix doc test * fix doc test * split proof * decode without replay, and remove some reexports. * Decode with compatibility by default. * switch state_version to u8. And remove RuntimeVersionBasis. * test * use api when reading embedded version * fix decode with apis * extract core version instead * test fix * unused import * review changes. Co-authored-by: kianenigma <kian@parity.io>
219 lines
6.8 KiB
Rust
219 lines
6.8 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) 2020-2021 Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
//! Read-only version of Externalities.
|
|
|
|
use crate::{Backend, StorageKey, StorageValue};
|
|
use codec::Encode;
|
|
use hash_db::Hasher;
|
|
use sp_core::{
|
|
storage::{ChildInfo, StateVersion, TrackedStorageKey},
|
|
traits::Externalities,
|
|
Blake2Hasher,
|
|
};
|
|
use std::{
|
|
any::{Any, TypeId},
|
|
marker::PhantomData,
|
|
};
|
|
|
|
/// Trait for inspecting state in any backend.
|
|
///
|
|
/// Implemented for any backend.
|
|
pub trait InspectState<H: Hasher, B: Backend<H>> {
|
|
/// Inspect state with a closure.
|
|
///
|
|
/// Self will be set as read-only externalities and inspection
|
|
/// closure will be run against it.
|
|
///
|
|
/// Returns the result of the closure.
|
|
fn inspect_state<F: FnOnce() -> R, R>(&self, f: F) -> R;
|
|
}
|
|
|
|
impl<H: Hasher, B: Backend<H>> InspectState<H, B> for B {
|
|
fn inspect_state<F: FnOnce() -> R, R>(&self, f: F) -> R {
|
|
ReadOnlyExternalities::from(self).execute_with(f)
|
|
}
|
|
}
|
|
|
|
/// Simple read-only externalities for any backend.
|
|
///
|
|
/// To be used in test for state inspection. Will panic if something writes
|
|
/// to the storage.
|
|
#[derive(Debug)]
|
|
pub struct ReadOnlyExternalities<'a, H: Hasher, B: 'a + Backend<H>> {
|
|
backend: &'a B,
|
|
_phantom: PhantomData<H>,
|
|
}
|
|
|
|
impl<'a, H: Hasher, B: 'a + Backend<H>> From<&'a B> for ReadOnlyExternalities<'a, H, B> {
|
|
fn from(backend: &'a B) -> Self {
|
|
ReadOnlyExternalities { backend, _phantom: PhantomData }
|
|
}
|
|
}
|
|
|
|
impl<'a, H: Hasher, B: 'a + Backend<H>> ReadOnlyExternalities<'a, H, B> {
|
|
/// Execute the given closure while `self` is set as externalities.
|
|
///
|
|
/// Returns the result of the given closure.
|
|
pub fn execute_with<R>(&mut self, f: impl FnOnce() -> R) -> R {
|
|
sp_externalities::set_and_run_with_externalities(self, f)
|
|
}
|
|
}
|
|
|
|
impl<'a, H: Hasher, B: 'a + Backend<H>> Externalities for ReadOnlyExternalities<'a, H, B> {
|
|
fn set_offchain_storage(&mut self, _key: &[u8], _value: Option<&[u8]>) {
|
|
panic!("Should not be used in read-only externalities!")
|
|
}
|
|
|
|
fn storage(&self, key: &[u8]) -> Option<StorageValue> {
|
|
self.backend
|
|
.storage(key)
|
|
.expect("Backed failed for storage in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn storage_hash(&self, key: &[u8]) -> Option<Vec<u8>> {
|
|
self.storage(key).map(|v| Blake2Hasher::hash(&v).encode())
|
|
}
|
|
|
|
fn child_storage(&self, child_info: &ChildInfo, key: &[u8]) -> Option<StorageValue> {
|
|
self.backend
|
|
.child_storage(child_info, key)
|
|
.expect("Backed failed for child_storage in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn child_storage_hash(&self, child_info: &ChildInfo, key: &[u8]) -> Option<Vec<u8>> {
|
|
self.child_storage(child_info, key).map(|v| Blake2Hasher::hash(&v).encode())
|
|
}
|
|
|
|
fn next_storage_key(&self, key: &[u8]) -> Option<StorageKey> {
|
|
self.backend
|
|
.next_storage_key(key)
|
|
.expect("Backed failed for next_storage_key in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn next_child_storage_key(&self, child_info: &ChildInfo, key: &[u8]) -> Option<StorageKey> {
|
|
self.backend
|
|
.next_child_storage_key(child_info, key)
|
|
.expect("Backed failed for next_child_storage_key in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn place_storage(&mut self, _key: StorageKey, _maybe_value: Option<StorageValue>) {
|
|
unimplemented!("place_storage not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn place_child_storage(
|
|
&mut self,
|
|
_child_info: &ChildInfo,
|
|
_key: StorageKey,
|
|
_value: Option<StorageValue>,
|
|
) {
|
|
unimplemented!("place_child_storage not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn kill_child_storage(&mut self, _child_info: &ChildInfo, _limit: Option<u32>) -> (bool, u32) {
|
|
unimplemented!("kill_child_storage is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn clear_prefix(&mut self, _prefix: &[u8], _limit: Option<u32>) -> (bool, u32) {
|
|
unimplemented!("clear_prefix is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn clear_child_prefix(
|
|
&mut self,
|
|
_child_info: &ChildInfo,
|
|
_prefix: &[u8],
|
|
_limit: Option<u32>,
|
|
) -> (bool, u32) {
|
|
unimplemented!("clear_child_prefix is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn storage_append(&mut self, _key: Vec<u8>, _value: Vec<u8>) {
|
|
unimplemented!("storage_append is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn storage_root(&mut self, _state_version: StateVersion) -> Vec<u8> {
|
|
unimplemented!("storage_root is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn child_storage_root(
|
|
&mut self,
|
|
_child_info: &ChildInfo,
|
|
_state_version: StateVersion,
|
|
) -> Vec<u8> {
|
|
unimplemented!("child_storage_root is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn storage_start_transaction(&mut self) {
|
|
unimplemented!("Transactions are not supported by ReadOnlyExternalities");
|
|
}
|
|
|
|
fn storage_rollback_transaction(&mut self) -> Result<(), ()> {
|
|
unimplemented!("Transactions are not supported by ReadOnlyExternalities");
|
|
}
|
|
|
|
fn storage_commit_transaction(&mut self) -> Result<(), ()> {
|
|
unimplemented!("Transactions are not supported by ReadOnlyExternalities");
|
|
}
|
|
|
|
fn wipe(&mut self) {}
|
|
|
|
fn commit(&mut self) {}
|
|
|
|
fn read_write_count(&self) -> (u32, u32, u32, u32) {
|
|
unimplemented!("read_write_count is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn reset_read_write_count(&mut self) {
|
|
unimplemented!("reset_read_write_count is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn get_whitelist(&self) -> Vec<TrackedStorageKey> {
|
|
unimplemented!("get_whitelist is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn set_whitelist(&mut self, _: Vec<TrackedStorageKey>) {
|
|
unimplemented!("set_whitelist is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn get_read_and_written_keys(&self) -> Vec<(Vec<u8>, u32, u32, bool)> {
|
|
unimplemented!("get_read_and_written_keys is not supported in ReadOnlyExternalities")
|
|
}
|
|
}
|
|
|
|
impl<'a, H: Hasher, B: 'a + Backend<H>> sp_externalities::ExtensionStore
|
|
for ReadOnlyExternalities<'a, H, B>
|
|
{
|
|
fn extension_by_type_id(&mut self, _type_id: TypeId) -> Option<&mut dyn Any> {
|
|
unimplemented!("extension_by_type_id is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn register_extension_with_type_id(
|
|
&mut self,
|
|
_type_id: TypeId,
|
|
_extension: Box<dyn sp_externalities::Extension>,
|
|
) -> Result<(), sp_externalities::Error> {
|
|
unimplemented!("register_extension_with_type_id is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn deregister_extension_by_type_id(
|
|
&mut self,
|
|
_type_id: TypeId,
|
|
) -> Result<(), sp_externalities::Error> {
|
|
unimplemented!("deregister_extension_by_type_id is not supported in ReadOnlyExternalities")
|
|
}
|
|
}
|