mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-26 16:57:58 +00:00
5d81f23f8f
* First reworking of fungibles API * New API and docs * More fungible::* API improvements * New ref-counting logic for old API * Missing files * Fixes * Use the new transfer logic * Use fungibles for the dispatchables * Use shelve/restore names * Locking works with total balance. * repotting and removal * Separate Holds from Reserves * Introduce freezes * Missing files * Tests for freezing * Fix hold+freeze combo * More tests * Fee-free dispatchable for upgrading accounts * Benchmarks and a few fixes * Another test * Docs and refactor to avoid blanket impls * Repot * Fit out ItemOf fully * Add events to Balanced traits * Introduced events into Hold traits * Fix Assets pallet tests * Assets benchmarks pass * Missing files and fixes * Fixes * Fixes * Benchmarks fixes * Fix balance benchmarks * Formatting * Expose fungible sub modules * Move NIS to fungible API * Fix broken impl and add test * Fix tests * API for `transfer_and_hold` * Use composite APIs * Formatting * Upgraded event * Fixes * Fixes * Fixes * Fixes * Repot tests and some fixed * Fix some bits * Fix dust tests * Rename `set_balance` - `Balances::set_balance` becomes `Balances::force_set_balance` - `Unbalanced::set_balance` becomes `Unbalances::write_balance` * becomes * Move dust handling to fungibles API * Formatting * Fixes and more refactoring * Fixes * Fixes * Fixes * Fixes * Fixes * Fixes * Fixes * Fixes * Fixes * Use reducible_balance for better correctness on fees * Reducing hold to zero should remove entry. * Add test * Docs * Update frame/support/src/traits/tokens/fungibles/hold.rs Co-authored-by: Muharem Ismailov <ismailov.m.h@gmail.com> * Update frame/support/src/traits/tokens/fungibles/regular.rs Co-authored-by: Muharem Ismailov <ismailov.m.h@gmail.com> * Update frame/support/src/traits/tokens/fungible/hold.rs Co-authored-by: Muharem Ismailov <ismailov.m.h@gmail.com> * Update frame/support/src/traits/tokens/fungible/regular.rs Co-authored-by: Muharem Ismailov <ismailov.m.h@gmail.com> * Docs * Docs * Docs * Fix NIS benchmarks * Doc comment * Remove post_mutation * Fix some tests * Fix some grumbles * Enumify bool args to fungible(s) functions * Fix up assets and balances * Formatting * Fix contracts * Fix tests & benchmarks build * Typify minted boolean arg * Typify on_hold boolean arg; renames * Fix numerous tests * Fix dependency issue * Privatize dangerous API mutate_account * Fix contracts (@alext - please check this commit) * Remove println * Fix tests for contracts * Fix broken rename * Fix broken rename * Fix broken rename * Docs * Update frame/support/src/traits/tokens/fungible/hold.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * remove from_ref_time * Update frame/executive/src/lib.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Update frame/executive/src/lib.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Reenable test * Update frame/support/src/traits/tokens/fungibles/hold.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Update frame/support/src/traits/tokens/fungible/hold.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Update frame/support/src/traits/tokens/fungible/hold.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Update frame/support/src/traits/tokens/fungible/hold.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Update frame/support/src/traits/tokens/currency.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Update frame/lottery/src/tests.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Update frame/support/src/traits/tokens/fungible/mod.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Update frame/support/src/traits/tokens/fungible/regular.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Update frame/support/src/traits/tokens/fungibles/freeze.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Update frame/support/src/traits/tokens/fungible/regular.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Update frame/support/src/traits/tokens/fungibles/hold.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Update frame/support/src/traits/tokens/fungibles/hold.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Update frame/support/src/traits/tokens/fungibles/hold.rs Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> * Rename UnwantedRemoval to UnwantedAccountRemoval * Docs * Formatting * Update frame/balances/src/lib.rs Co-authored-by: Oliver Tale-Yazdi <oliver.tale-yazdi@parity.io> * Update primitives/runtime/src/lib.rs Co-authored-by: Keith Yeung <kungfukeith11@gmail.com> * handle_raw_dust oes nothing * Formatting * Fixes * Grumble * Fixes * Add test * Add test * Tests for reducible_balance * Fixes * Fix Salary * Fixes * Disable broken test * Disable nicely * Fixes * Fixes * Fixes * Rename some events * Fix nomination pools breakage * Add compatibility stub for transfer tx * Reinstate a safely compatible version of Balances set_balance * Fixes * Grumble * Update frame/nis/src/lib.rs Co-authored-by: Kian Paimani <5588131+kianenigma@users.noreply.github.com> * ".git/.scripts/commands/bench/bench.sh" pallet dev pallet_balances * disable flakey tests * Update frame/balances/src/lib.rs Co-authored-by: Kian Paimani <5588131+kianenigma@users.noreply.github.com> * Grumbles * Grumble --------- Co-authored-by: Muharem Ismailov <ismailov.m.h@gmail.com> Co-authored-by: Alexander Theißen <alex.theissen@me.com> Co-authored-by: Anthony Alaribe <anthonyalaribe@gmail.com> Co-authored-by: Oliver Tale-Yazdi <oliver.tale-yazdi@parity.io> Co-authored-by: Keith Yeung <kungfukeith11@gmail.com> Co-authored-by: Kian Paimani <5588131+kianenigma@users.noreply.github.com> Co-authored-by: command-bot <>
280 lines
9.1 KiB
Rust
280 lines
9.1 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
use codec::Decode;
|
|
use frame_system::offchain::{SendSignedTransaction, Signer, SubmitTransaction};
|
|
use kitchensink_runtime::{Executive, Indices, Runtime, UncheckedExtrinsic};
|
|
use sp_application_crypto::AppKey;
|
|
use sp_core::offchain::{testing::TestTransactionPoolExt, TransactionPoolExt};
|
|
use sp_keyring::sr25519::Keyring::Alice;
|
|
use sp_keystore::{testing::MemoryKeystore, Keystore, KeystoreExt};
|
|
use std::sync::Arc;
|
|
|
|
pub mod common;
|
|
use self::common::*;
|
|
|
|
#[test]
|
|
fn should_submit_unsigned_transaction() {
|
|
let mut t = new_test_ext(compact_code_unwrap());
|
|
let (pool, state) = TestTransactionPoolExt::new();
|
|
t.register_extension(TransactionPoolExt::new(pool));
|
|
|
|
t.execute_with(|| {
|
|
let signature =
|
|
pallet_im_online::sr25519::AuthoritySignature::try_from(vec![0; 64]).unwrap();
|
|
let heartbeat_data = pallet_im_online::Heartbeat {
|
|
block_number: 1,
|
|
network_state: Default::default(),
|
|
session_index: 1,
|
|
authority_index: 0,
|
|
validators_len: 0,
|
|
};
|
|
|
|
let call = pallet_im_online::Call::heartbeat { heartbeat: heartbeat_data, signature };
|
|
SubmitTransaction::<Runtime, pallet_im_online::Call<Runtime>>::submit_unsigned_transaction(
|
|
call.into(),
|
|
)
|
|
.unwrap();
|
|
|
|
assert_eq!(state.read().transactions.len(), 1)
|
|
});
|
|
}
|
|
|
|
const PHRASE: &str = "news slush supreme milk chapter athlete soap sausage put clutch what kitten";
|
|
|
|
#[test]
|
|
fn should_submit_signed_transaction() {
|
|
let mut t = new_test_ext(compact_code_unwrap());
|
|
let (pool, state) = TestTransactionPoolExt::new();
|
|
t.register_extension(TransactionPoolExt::new(pool));
|
|
|
|
let keystore = MemoryKeystore::new();
|
|
Keystore::sr25519_generate_new(
|
|
&keystore,
|
|
sr25519::AuthorityId::ID,
|
|
Some(&format!("{}/hunter1", PHRASE)),
|
|
)
|
|
.unwrap();
|
|
Keystore::sr25519_generate_new(
|
|
&keystore,
|
|
sr25519::AuthorityId::ID,
|
|
Some(&format!("{}/hunter2", PHRASE)),
|
|
)
|
|
.unwrap();
|
|
Keystore::sr25519_generate_new(
|
|
&keystore,
|
|
sr25519::AuthorityId::ID,
|
|
Some(&format!("{}/hunter3", PHRASE)),
|
|
)
|
|
.unwrap();
|
|
t.register_extension(KeystoreExt(Arc::new(keystore)));
|
|
|
|
t.execute_with(|| {
|
|
let results =
|
|
Signer::<Runtime, TestAuthorityId>::all_accounts().send_signed_transaction(|_| {
|
|
pallet_balances::Call::transfer_allow_death {
|
|
dest: Alice.to_account_id().into(),
|
|
value: Default::default(),
|
|
}
|
|
});
|
|
|
|
let len = results.len();
|
|
assert_eq!(len, 3);
|
|
assert_eq!(results.into_iter().filter_map(|x| x.1.ok()).count(), len);
|
|
assert_eq!(state.read().transactions.len(), len);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn should_submit_signed_twice_from_the_same_account() {
|
|
let mut t = new_test_ext(compact_code_unwrap());
|
|
let (pool, state) = TestTransactionPoolExt::new();
|
|
t.register_extension(TransactionPoolExt::new(pool));
|
|
|
|
let keystore = MemoryKeystore::new();
|
|
Keystore::sr25519_generate_new(
|
|
&keystore,
|
|
sr25519::AuthorityId::ID,
|
|
Some(&format!("{}/hunter1", PHRASE)),
|
|
)
|
|
.unwrap();
|
|
Keystore::sr25519_generate_new(
|
|
&keystore,
|
|
sr25519::AuthorityId::ID,
|
|
Some(&format!("{}/hunter2", PHRASE)),
|
|
)
|
|
.unwrap();
|
|
t.register_extension(KeystoreExt(Arc::new(keystore)));
|
|
|
|
t.execute_with(|| {
|
|
let result =
|
|
Signer::<Runtime, TestAuthorityId>::any_account().send_signed_transaction(|_| {
|
|
pallet_balances::Call::transfer_allow_death {
|
|
dest: Alice.to_account_id().into(),
|
|
value: Default::default(),
|
|
}
|
|
});
|
|
|
|
assert!(result.is_some());
|
|
assert_eq!(state.read().transactions.len(), 1);
|
|
|
|
// submit another one from the same account. The nonce should be incremented.
|
|
let result =
|
|
Signer::<Runtime, TestAuthorityId>::any_account().send_signed_transaction(|_| {
|
|
pallet_balances::Call::transfer_allow_death {
|
|
dest: Alice.to_account_id().into(),
|
|
value: Default::default(),
|
|
}
|
|
});
|
|
|
|
assert!(result.is_some());
|
|
assert_eq!(state.read().transactions.len(), 2);
|
|
|
|
// now check that the transaction nonces are not equal
|
|
let s = state.read();
|
|
fn nonce(tx: UncheckedExtrinsic) -> frame_system::CheckNonce<Runtime> {
|
|
let extra = tx.signature.unwrap().2;
|
|
extra.5
|
|
}
|
|
let nonce1 = nonce(UncheckedExtrinsic::decode(&mut &*s.transactions[0]).unwrap());
|
|
let nonce2 = nonce(UncheckedExtrinsic::decode(&mut &*s.transactions[1]).unwrap());
|
|
assert!(nonce1 != nonce2, "Transactions should have different nonces. Got: {:?}", nonce1);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn should_submit_signed_twice_from_all_accounts() {
|
|
let mut t = new_test_ext(compact_code_unwrap());
|
|
let (pool, state) = TestTransactionPoolExt::new();
|
|
t.register_extension(TransactionPoolExt::new(pool));
|
|
|
|
let keystore = MemoryKeystore::new();
|
|
keystore
|
|
.sr25519_generate_new(sr25519::AuthorityId::ID, Some(&format!("{}/hunter1", PHRASE)))
|
|
.unwrap();
|
|
keystore
|
|
.sr25519_generate_new(sr25519::AuthorityId::ID, Some(&format!("{}/hunter2", PHRASE)))
|
|
.unwrap();
|
|
t.register_extension(KeystoreExt(Arc::new(keystore)));
|
|
|
|
t.execute_with(|| {
|
|
let results = Signer::<Runtime, TestAuthorityId>::all_accounts()
|
|
.send_signed_transaction(|_| {
|
|
pallet_balances::Call::transfer_allow_death { dest: Alice.to_account_id().into(), value: Default::default() }
|
|
});
|
|
|
|
let len = results.len();
|
|
assert_eq!(len, 2);
|
|
assert_eq!(results.into_iter().filter_map(|x| x.1.ok()).count(), len);
|
|
assert_eq!(state.read().transactions.len(), 2);
|
|
|
|
// submit another one from the same account. The nonce should be incremented.
|
|
let results = Signer::<Runtime, TestAuthorityId>::all_accounts()
|
|
.send_signed_transaction(|_| {
|
|
pallet_balances::Call::transfer_allow_death { dest: Alice.to_account_id().into(), value: Default::default() }
|
|
});
|
|
|
|
let len = results.len();
|
|
assert_eq!(len, 2);
|
|
assert_eq!(results.into_iter().filter_map(|x| x.1.ok()).count(), len);
|
|
assert_eq!(state.read().transactions.len(), 4);
|
|
|
|
// now check that the transaction nonces are not equal
|
|
let s = state.read();
|
|
fn nonce(tx: UncheckedExtrinsic) -> frame_system::CheckNonce<Runtime> {
|
|
let extra = tx.signature.unwrap().2;
|
|
extra.5
|
|
}
|
|
let nonce1 = nonce(UncheckedExtrinsic::decode(&mut &*s.transactions[0]).unwrap());
|
|
let nonce2 = nonce(UncheckedExtrinsic::decode(&mut &*s.transactions[1]).unwrap());
|
|
let nonce3 = nonce(UncheckedExtrinsic::decode(&mut &*s.transactions[2]).unwrap());
|
|
let nonce4 = nonce(UncheckedExtrinsic::decode(&mut &*s.transactions[3]).unwrap());
|
|
assert!(
|
|
nonce1 != nonce3,
|
|
"Transactions should have different nonces. Got: 1st tx nonce: {:?}, 2nd nonce: {:?}", nonce1, nonce3
|
|
);
|
|
assert!(
|
|
nonce2 != nonce4,
|
|
"Transactions should have different nonces. Got: 1st tx nonce: {:?}, 2nd tx nonce: {:?}", nonce2, nonce4
|
|
);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn submitted_transaction_should_be_valid() {
|
|
use codec::Encode;
|
|
use sp_runtime::{
|
|
traits::StaticLookup,
|
|
transaction_validity::{TransactionSource, TransactionTag},
|
|
};
|
|
|
|
let mut t = new_test_ext(compact_code_unwrap());
|
|
let (pool, state) = TestTransactionPoolExt::new();
|
|
t.register_extension(TransactionPoolExt::new(pool));
|
|
|
|
let keystore = MemoryKeystore::new();
|
|
Keystore::sr25519_generate_new(
|
|
&keystore,
|
|
sr25519::AuthorityId::ID,
|
|
Some(&format!("{}/hunter1", PHRASE)),
|
|
)
|
|
.unwrap();
|
|
t.register_extension(KeystoreExt(Arc::new(keystore)));
|
|
|
|
t.execute_with(|| {
|
|
let results =
|
|
Signer::<Runtime, TestAuthorityId>::all_accounts().send_signed_transaction(|_| {
|
|
pallet_balances::Call::transfer_allow_death {
|
|
dest: Alice.to_account_id().into(),
|
|
value: Default::default(),
|
|
}
|
|
});
|
|
let len = results.len();
|
|
assert_eq!(len, 1);
|
|
assert_eq!(results.into_iter().filter_map(|x| x.1.ok()).count(), len);
|
|
});
|
|
|
|
// check that transaction is valid, but reset environment storage,
|
|
// since CreateTransaction increments the nonce
|
|
let tx0 = state.read().transactions[0].clone();
|
|
let mut t = new_test_ext(compact_code_unwrap());
|
|
t.execute_with(|| {
|
|
let source = TransactionSource::External;
|
|
let extrinsic = UncheckedExtrinsic::decode(&mut &*tx0).unwrap();
|
|
// add balance to the account
|
|
let author = extrinsic.signature.clone().unwrap().0;
|
|
let address = Indices::lookup(author).unwrap();
|
|
let data = pallet_balances::AccountData { free: 5_000_000_000_000, ..Default::default() };
|
|
let account = frame_system::AccountInfo { data, ..Default::default() };
|
|
<frame_system::Account<Runtime>>::insert(&address, account);
|
|
|
|
// check validity
|
|
let res = Executive::validate_transaction(
|
|
source,
|
|
extrinsic,
|
|
frame_system::BlockHash::<Runtime>::get(0),
|
|
)
|
|
.unwrap();
|
|
|
|
// We ignore res.priority since this number can change based on updates to weights and such.
|
|
assert_eq!(res.requires, Vec::<TransactionTag>::new());
|
|
assert_eq!(res.provides, vec![(address, 0).encode()]);
|
|
assert_eq!(res.longevity, 2047);
|
|
assert_eq!(res.propagate, true);
|
|
});
|
|
}
|