mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-05-06 12:38:04 +00:00
73d9ae3284
* trie state cache
* Also cache missing access on read.
* fix comp
* bis
* fix
* use has_lru
* remove local storage cache on size 0.
* No cache.
* local cache only
* trie cache and local cache
* storage cache (with local)
* trie cache no local cache
* Add state access benchmark
* Remove warnings etc
* Add trie cache benchmark
* No extra "clone" required
* Change benchmark to use multiple blocks
* Use patches
* Integrate shitty implementation
* More stuff
* Revert "Merge branch 'master' into trie_state_cache"
This reverts commit 947cd8e6d43fced10e21b76d5b92ffa57b57c318, reversing
changes made to 29ff036463.
* Improve benchmark
* Adapt to latest changes
* Adapt to changes in trie
* Add a test that uses iterator
* Start fixing it
* Remove obsolete file
* Make it compile
* Start rewriting the trie node cache
* More work on the cache
* More docs and code etc
* Make data cache an optional
* Tests
* Remove debug stuff
* Recorder
* Some docs and a simple test for the recorder
* Compile fixes
* Make it compile
* More fixes
* More fixes
* Fix fix fix
* Make sure cache and recorder work together for basic stuff
* Test that data caching and recording works
* Test `TrieDBMut` with caching
* Try something
* Fixes, fixes, fixes
* Forward the recorder
* Make it compile
* Use recorder in more places
* Switch to new `with_optional_recorder` fn
* Refactor and cleanups
* Move `ProvingBackend` tests
* Simplify
* Move over all functionality to the essence
* Fix compilation
* Implement estimate encoded size for StorageProof
* Start using the `cache` everywhere
* Use the cache everywhere
* Fix compilation
* Fix tests
* Adds `TrieBackendBuilder` and enhances the tests
* Ensure that recorder drain checks that values are found as expected
* Switch over to `TrieBackendBuilder`
* Start fixing the problem with child tries and recording
* Fix recording of child tries
* Make it compile
* Overwrite `storage_hash` in `TrieBackend`
* Add `storage_cache` to the benchmarks
* Fix `no_std` build
* Speed up cache lookup
* Extend the state access benchmark to also hash a runtime
* Fix build
* Fix compilation
* Rewrite value cache
* Add lru cache
* Ensure that the cache lru works
* Value cache should not be optional
* Add support for keeping the shared node cache in its bounds
* Make the cache configurable
* Check that the cache respects the bounds
* Adds a new test
* Fixes
* Docs and some renamings
* More docs
* Start using the new recorder
* Fix more code
* Take `self` argument
* Remove warnings
* Fix benchmark
* Fix accounting
* Rip off the state cache
* Start fixing fallout after removing the state cache
* Make it compile after trie changes
* Fix test
* Add some logging
* Some docs
* Some fixups and clean ups
* Fix benchmark
* Remove unneeded file
* Use git for patching
* Make CI happy
* Update primitives/trie/Cargo.toml
Co-authored-by: Koute <koute@users.noreply.github.com>
* Update primitives/state-machine/src/trie_backend.rs
Co-authored-by: cheme <emericchevalier.pro@gmail.com>
* Introduce new `AsTrieBackend` trait
* Make the LocalTrieCache not clonable
* Make it work in no_std and add docs
* Remove duplicate dependency
* Switch to ahash for better performance
* Speedup value cache merge
* Output errors on underflow
* Ensure the internal LRU map doesn't grow too much
* Use const fn to calculate the value cache element size
* Remove cache configuration
* Fix
* Clear the cache in between for more testing
* Try to come up with a failing test case
* Make the test fail
* Fix the child trie recording
* Make everything compile after the changes to trie
* Adapt to latest trie-db changes
* Fix on stable
* Update primitives/trie/src/cache.rs
Co-authored-by: cheme <emericchevalier.pro@gmail.com>
* Fix wrong merge
* Docs
* Fix warnings
* Cargo.lock
* Bump pin-project
* Fix warnings
* Switch to released crate version
* More fixes
* Make clippy and rustdocs happy
* More clippy
* Print error when using deprecated `--state-cache-size`
* 🤦
* Fixes
* Fix storage_hash linkings
* Update client/rpc/src/dev/mod.rs
Co-authored-by: Arkadiy Paronyan <arkady.paronyan@gmail.com>
* Review feedback
* encode bound
* Rework the shared value cache
Instead of using a `u64` to represent the key we now use an `Arc<[u8]>`. This arc is also stored in
some extra `HashSet`. We store the key are in an extra `HashSet` to de-duplicate the keys accross
different storage roots. When the latest key usage is dropped in the lru, we also remove the key
from the `HashSet`.
* Improve of the cache by merging the old and new solution
* FMT
* Please stop coming back all the time :crying:
* Update primitives/trie/src/cache/shared_cache.rs
Co-authored-by: Arkadiy Paronyan <arkady.paronyan@gmail.com>
* Fixes
* Make clippy happy
* Ensure we don't deadlock
* Only use one lock to simplify the code
* Do not depend on `Hasher`
* Fix tests
* FMT
* Clippy 🤦
Co-authored-by: cheme <emericchevalier.pro@gmail.com>
Co-authored-by: Koute <koute@users.noreply.github.com>
Co-authored-by: Arkadiy Paronyan <arkady.paronyan@gmail.com>
245 lines
7.2 KiB
Rust
245 lines
7.2 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) 2020-2022 Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
//! Read-only version of Externalities.
|
|
|
|
use crate::{Backend, StorageKey, StorageValue};
|
|
use codec::Encode;
|
|
use hash_db::Hasher;
|
|
use sp_core::{
|
|
storage::{ChildInfo, StateVersion, TrackedStorageKey},
|
|
traits::Externalities,
|
|
};
|
|
use sp_externalities::MultiRemovalResults;
|
|
use std::{
|
|
any::{Any, TypeId},
|
|
marker::PhantomData,
|
|
};
|
|
|
|
/// Trait for inspecting state in any backend.
|
|
///
|
|
/// Implemented for any backend.
|
|
pub trait InspectState<H: Hasher, B: Backend<H>> {
|
|
/// Inspect state with a closure.
|
|
///
|
|
/// Self will be set as read-only externalities and inspection
|
|
/// closure will be run against it.
|
|
///
|
|
/// Returns the result of the closure.
|
|
fn inspect_state<F: FnOnce() -> R, R>(&self, f: F) -> R;
|
|
}
|
|
|
|
impl<H: Hasher, B: Backend<H>> InspectState<H, B> for B
|
|
where
|
|
H::Out: Encode,
|
|
{
|
|
fn inspect_state<F: FnOnce() -> R, R>(&self, f: F) -> R {
|
|
ReadOnlyExternalities::from(self).execute_with(f)
|
|
}
|
|
}
|
|
|
|
/// Simple read-only externalities for any backend.
|
|
///
|
|
/// To be used in test for state inspection. Will panic if something writes
|
|
/// to the storage.
|
|
#[derive(Debug)]
|
|
pub struct ReadOnlyExternalities<'a, H: Hasher, B: 'a + Backend<H>> {
|
|
backend: &'a B,
|
|
_phantom: PhantomData<H>,
|
|
}
|
|
|
|
impl<'a, H: Hasher, B: 'a + Backend<H>> From<&'a B> for ReadOnlyExternalities<'a, H, B> {
|
|
fn from(backend: &'a B) -> Self {
|
|
ReadOnlyExternalities { backend, _phantom: PhantomData }
|
|
}
|
|
}
|
|
|
|
impl<'a, H: Hasher, B: 'a + Backend<H>> ReadOnlyExternalities<'a, H, B>
|
|
where
|
|
H::Out: Encode,
|
|
{
|
|
/// Execute the given closure while `self` is set as externalities.
|
|
///
|
|
/// Returns the result of the given closure.
|
|
pub fn execute_with<R>(&mut self, f: impl FnOnce() -> R) -> R {
|
|
sp_externalities::set_and_run_with_externalities(self, f)
|
|
}
|
|
}
|
|
|
|
impl<'a, H: Hasher, B: 'a + Backend<H>> Externalities for ReadOnlyExternalities<'a, H, B>
|
|
where
|
|
H::Out: Encode,
|
|
{
|
|
fn set_offchain_storage(&mut self, _key: &[u8], _value: Option<&[u8]>) {
|
|
panic!("Should not be used in read-only externalities!")
|
|
}
|
|
|
|
fn storage(&self, key: &[u8]) -> Option<StorageValue> {
|
|
self.backend
|
|
.storage(key)
|
|
.expect("Backed failed for storage in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn storage_hash(&self, key: &[u8]) -> Option<Vec<u8>> {
|
|
self.backend
|
|
.storage_hash(key)
|
|
.expect("Backed failed for storage_hash in ReadOnlyExternalities")
|
|
.map(|h| h.encode())
|
|
}
|
|
|
|
fn child_storage(&self, child_info: &ChildInfo, key: &[u8]) -> Option<StorageValue> {
|
|
self.backend
|
|
.child_storage(child_info, key)
|
|
.expect("Backed failed for child_storage in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn child_storage_hash(&self, child_info: &ChildInfo, key: &[u8]) -> Option<Vec<u8>> {
|
|
self.backend
|
|
.child_storage_hash(child_info, key)
|
|
.expect("Backed failed for child_storage_hash in ReadOnlyExternalities")
|
|
.map(|h| h.encode())
|
|
}
|
|
|
|
fn next_storage_key(&self, key: &[u8]) -> Option<StorageKey> {
|
|
self.backend
|
|
.next_storage_key(key)
|
|
.expect("Backed failed for next_storage_key in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn next_child_storage_key(&self, child_info: &ChildInfo, key: &[u8]) -> Option<StorageKey> {
|
|
self.backend
|
|
.next_child_storage_key(child_info, key)
|
|
.expect("Backed failed for next_child_storage_key in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn place_storage(&mut self, _key: StorageKey, _maybe_value: Option<StorageValue>) {
|
|
unimplemented!("place_storage not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn place_child_storage(
|
|
&mut self,
|
|
_child_info: &ChildInfo,
|
|
_key: StorageKey,
|
|
_value: Option<StorageValue>,
|
|
) {
|
|
unimplemented!("place_child_storage not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn kill_child_storage(
|
|
&mut self,
|
|
_child_info: &ChildInfo,
|
|
_maybe_limit: Option<u32>,
|
|
_maybe_cursor: Option<&[u8]>,
|
|
) -> MultiRemovalResults {
|
|
unimplemented!("kill_child_storage is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn clear_prefix(
|
|
&mut self,
|
|
_prefix: &[u8],
|
|
_maybe_limit: Option<u32>,
|
|
_maybe_cursor: Option<&[u8]>,
|
|
) -> MultiRemovalResults {
|
|
unimplemented!("clear_prefix is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn clear_child_prefix(
|
|
&mut self,
|
|
_child_info: &ChildInfo,
|
|
_prefix: &[u8],
|
|
_maybe_limit: Option<u32>,
|
|
_maybe_cursor: Option<&[u8]>,
|
|
) -> MultiRemovalResults {
|
|
unimplemented!("clear_child_prefix is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn storage_append(&mut self, _key: Vec<u8>, _value: Vec<u8>) {
|
|
unimplemented!("storage_append is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn storage_root(&mut self, _state_version: StateVersion) -> Vec<u8> {
|
|
unimplemented!("storage_root is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn child_storage_root(
|
|
&mut self,
|
|
_child_info: &ChildInfo,
|
|
_state_version: StateVersion,
|
|
) -> Vec<u8> {
|
|
unimplemented!("child_storage_root is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn storage_start_transaction(&mut self) {
|
|
unimplemented!("Transactions are not supported by ReadOnlyExternalities");
|
|
}
|
|
|
|
fn storage_rollback_transaction(&mut self) -> Result<(), ()> {
|
|
unimplemented!("Transactions are not supported by ReadOnlyExternalities");
|
|
}
|
|
|
|
fn storage_commit_transaction(&mut self) -> Result<(), ()> {
|
|
unimplemented!("Transactions are not supported by ReadOnlyExternalities");
|
|
}
|
|
|
|
fn wipe(&mut self) {}
|
|
|
|
fn commit(&mut self) {}
|
|
|
|
fn read_write_count(&self) -> (u32, u32, u32, u32) {
|
|
unimplemented!("read_write_count is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn reset_read_write_count(&mut self) {
|
|
unimplemented!("reset_read_write_count is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn get_whitelist(&self) -> Vec<TrackedStorageKey> {
|
|
unimplemented!("get_whitelist is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn set_whitelist(&mut self, _: Vec<TrackedStorageKey>) {
|
|
unimplemented!("set_whitelist is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn get_read_and_written_keys(&self) -> Vec<(Vec<u8>, u32, u32, bool)> {
|
|
unimplemented!("get_read_and_written_keys is not supported in ReadOnlyExternalities")
|
|
}
|
|
}
|
|
|
|
impl<'a, H: Hasher, B: 'a + Backend<H>> sp_externalities::ExtensionStore
|
|
for ReadOnlyExternalities<'a, H, B>
|
|
{
|
|
fn extension_by_type_id(&mut self, _type_id: TypeId) -> Option<&mut dyn Any> {
|
|
unimplemented!("extension_by_type_id is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn register_extension_with_type_id(
|
|
&mut self,
|
|
_type_id: TypeId,
|
|
_extension: Box<dyn sp_externalities::Extension>,
|
|
) -> Result<(), sp_externalities::Error> {
|
|
unimplemented!("register_extension_with_type_id is not supported in ReadOnlyExternalities")
|
|
}
|
|
|
|
fn deregister_extension_by_type_id(
|
|
&mut self,
|
|
_type_id: TypeId,
|
|
) -> Result<(), sp_externalities::Error> {
|
|
unimplemented!("deregister_extension_by_type_id is not supported in ReadOnlyExternalities")
|
|
}
|
|
}
|