mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-26 13:27:57 +00:00
9deea5d251
* receive_delivery_proof benchmarks * fix compilation * Update modules/message-lane/src/benchmarking.rs Co-authored-by: Hernando Castano <HCastano@users.noreply.github.com> * Update modules/message-lane/src/benchmarking.rs Co-authored-by: Hernando Castano <HCastano@users.noreply.github.com> * Update modules/message-lane/src/benchmarking.rs Co-authored-by: Hernando Castano <HCastano@users.noreply.github.com> * Update modules/message-lane/src/benchmarking.rs Co-authored-by: Hernando Castano <HCastano@users.noreply.github.com> * Update modules/message-lane/src/benchmarking.rs Co-authored-by: Hernando Castano <HCastano@users.noreply.github.com> Co-authored-by: Hernando Castano <HCastano@users.noreply.github.com>
192 lines
7.5 KiB
Rust
192 lines
7.5 KiB
Rust
// Copyright 2019-2020 Parity Technologies (UK) Ltd.
|
|
// This file is part of Parity Bridges Common.
|
|
|
|
// Parity Bridges Common is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Parity Bridges Common is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Parity Bridges Common. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
//! Everything required to run benchmarks of message-lanes, based on
|
|
//! `bridge_runtime_common::messages` implementation.
|
|
|
|
#![cfg(feature = "runtime-benchmarks")]
|
|
|
|
use crate::messages::{
|
|
source::FromBridgedChainMessagesDeliveryProof, target::FromBridgedChainMessagesProof, AccountIdOf, BalanceOf,
|
|
BridgedChain, HashOf, MessageBridge, ThisChain,
|
|
};
|
|
|
|
use bp_message_lane::{LaneId, MessageData, MessageKey, MessagePayload};
|
|
use codec::Encode;
|
|
use ed25519_dalek::{PublicKey, SecretKey, Signer, KEYPAIR_LENGTH, SECRET_KEY_LENGTH};
|
|
use frame_support::weights::Weight;
|
|
use pallet_message_lane::benchmarking::{MessageDeliveryProofParams, MessageProofParams};
|
|
use sp_core::Hasher;
|
|
use sp_runtime::traits::Header;
|
|
use sp_std::prelude::*;
|
|
use sp_trie::{read_trie_value_with, trie_types::TrieDBMut, Layout, MemoryDB, Recorder, StorageProof, TrieMut};
|
|
|
|
/// Generate ed25519 signature to be used in `pallet_brdige_call_dispatch::CallOrigin::TargetAccount`.
|
|
///
|
|
/// Returns public key of the signer and the signature itself.
|
|
pub fn ed25519_sign(target_call: &impl Encode, source_account_id: &impl Encode) -> ([u8; 32], [u8; 64]) {
|
|
// key from the repo example (https://docs.rs/ed25519-dalek/1.0.1/ed25519_dalek/struct.SecretKey.html)
|
|
let target_secret = SecretKey::from_bytes(&[
|
|
157, 097, 177, 157, 239, 253, 090, 096, 186, 132, 074, 244, 146, 236, 044, 196, 068, 073, 197, 105, 123, 050,
|
|
105, 025, 112, 059, 172, 003, 028, 174, 127, 096,
|
|
])
|
|
.expect("harcoded key is valid");
|
|
let target_public: PublicKey = (&target_secret).into();
|
|
|
|
let mut target_pair_bytes = [0u8; KEYPAIR_LENGTH];
|
|
target_pair_bytes[..SECRET_KEY_LENGTH].copy_from_slice(&target_secret.to_bytes());
|
|
target_pair_bytes[SECRET_KEY_LENGTH..].copy_from_slice(&target_public.to_bytes());
|
|
let target_pair = ed25519_dalek::Keypair::from_bytes(&target_pair_bytes).expect("hardcoded pair is valid");
|
|
|
|
let mut signature_message = Vec::new();
|
|
target_call.encode_to(&mut signature_message);
|
|
source_account_id.encode_to(&mut signature_message);
|
|
let target_origin_signature = target_pair
|
|
.try_sign(&signature_message)
|
|
.expect("Ed25519 try_sign should not fail in benchmarks");
|
|
|
|
(target_public.to_bytes(), target_origin_signature.to_bytes())
|
|
}
|
|
|
|
/// Prepare proof of messages for the `receive_messages_proof` call.
|
|
pub fn prepare_message_proof<B, H, R, MM, ML, MH>(
|
|
params: MessageProofParams,
|
|
make_bridged_message_storage_key: MM,
|
|
make_bridged_outbound_lane_data_key: ML,
|
|
make_bridged_header: MH,
|
|
message_dispatch_weight: Weight,
|
|
message_payload: MessagePayload,
|
|
) -> (FromBridgedChainMessagesProof<B>, Weight)
|
|
where
|
|
B: MessageBridge,
|
|
H: Hasher,
|
|
R: pallet_substrate_bridge::Config,
|
|
<R::BridgedChain as bp_runtime::Chain>::Hash: Into<HashOf<BridgedChain<B>>>,
|
|
MM: Fn(MessageKey) -> Vec<u8>,
|
|
ML: Fn(LaneId) -> Vec<u8>,
|
|
MH: Fn(H::Out) -> <R::BridgedChain as bp_runtime::Chain>::Header,
|
|
{
|
|
// prepare Bridged chain storage with messages and (optionally) outbound lane state
|
|
let message_count = params
|
|
.message_nonces
|
|
.end()
|
|
.saturating_sub(*params.message_nonces.start())
|
|
+ 1;
|
|
let mut storage_keys = Vec::with_capacity(message_count as usize + 1);
|
|
let mut root = Default::default();
|
|
let mut mdb = MemoryDB::default();
|
|
{
|
|
let mut trie = TrieDBMut::<H>::new(&mut mdb, &mut root);
|
|
|
|
// insert messages
|
|
for nonce in params.message_nonces.clone() {
|
|
let message_key = MessageKey {
|
|
lane_id: params.lane,
|
|
nonce,
|
|
};
|
|
let message_data = MessageData {
|
|
fee: BalanceOf::<BridgedChain<B>>::from(0),
|
|
payload: message_payload.clone(),
|
|
};
|
|
let storage_key = make_bridged_message_storage_key(message_key);
|
|
trie.insert(&storage_key, &message_data.encode())
|
|
.map_err(|_| "TrieMut::insert has failed")
|
|
.expect("TrieMut::insert should not fail in benchmarks");
|
|
storage_keys.push(storage_key);
|
|
}
|
|
|
|
// insert outbound lane state
|
|
if let Some(outbound_lane_data) = params.outbound_lane_data {
|
|
let storage_key = make_bridged_outbound_lane_data_key(params.lane);
|
|
trie.insert(&storage_key, &outbound_lane_data.encode())
|
|
.map_err(|_| "TrieMut::insert has failed")
|
|
.expect("TrieMut::insert should not fail in benchmarks");
|
|
storage_keys.push(storage_key);
|
|
}
|
|
}
|
|
|
|
// generate storage proof to be delivered to This chain
|
|
let mut proof_recorder = Recorder::<H::Out>::new();
|
|
for storage_key in storage_keys {
|
|
read_trie_value_with::<Layout<H>, _, _>(&mdb, &root, &storage_key, &mut proof_recorder)
|
|
.map_err(|_| "read_trie_value_with has failed")
|
|
.expect("read_trie_value_with should not fail in benchmarks");
|
|
}
|
|
let storage_proof = proof_recorder.drain().into_iter().map(|n| n.data.to_vec()).collect();
|
|
|
|
// prepare Bridged chain header and insert it into the Substrate pallet
|
|
let bridged_header = make_bridged_header(root);
|
|
let bridged_header_hash = bridged_header.hash();
|
|
pallet_substrate_bridge::initialize_for_benchmarks::<R>(bridged_header);
|
|
|
|
(
|
|
(
|
|
bridged_header_hash.into(),
|
|
StorageProof::new(storage_proof),
|
|
params.lane,
|
|
*params.message_nonces.start(),
|
|
*params.message_nonces.end(),
|
|
),
|
|
message_dispatch_weight
|
|
.checked_mul(message_count)
|
|
.expect("too many messages requested by benchmark"),
|
|
)
|
|
}
|
|
|
|
/// Prepare proof of messages delivery for the `receive_messages_delivery_proof` call.
|
|
pub fn prepare_message_delivery_proof<B, H, R, ML, MH>(
|
|
params: MessageDeliveryProofParams<AccountIdOf<ThisChain<B>>>,
|
|
make_bridged_inbound_lane_data_key: ML,
|
|
make_bridged_header: MH,
|
|
) -> FromBridgedChainMessagesDeliveryProof<B>
|
|
where
|
|
B: MessageBridge,
|
|
H: Hasher,
|
|
R: pallet_substrate_bridge::Config,
|
|
<R::BridgedChain as bp_runtime::Chain>::Hash: Into<HashOf<BridgedChain<B>>>,
|
|
ML: Fn(LaneId) -> Vec<u8>,
|
|
MH: Fn(H::Out) -> <R::BridgedChain as bp_runtime::Chain>::Header,
|
|
{
|
|
// prepare Bridged chain storage with inbound lane state
|
|
let storage_key = make_bridged_inbound_lane_data_key(params.lane);
|
|
let mut root = Default::default();
|
|
let mut mdb = MemoryDB::default();
|
|
{
|
|
let mut trie = TrieDBMut::<H>::new(&mut mdb, &mut root);
|
|
trie.insert(&storage_key, ¶ms.inbound_lane_data.encode())
|
|
.map_err(|_| "TrieMut::insert has failed")
|
|
.expect("TrieMut::insert should not fail in benchmarks");
|
|
}
|
|
|
|
// generate storage proof to be delivered to This chain
|
|
let mut proof_recorder = Recorder::<H::Out>::new();
|
|
read_trie_value_with::<Layout<H>, _, _>(&mdb, &root, &storage_key, &mut proof_recorder)
|
|
.map_err(|_| "read_trie_value_with has failed")
|
|
.expect("read_trie_value_with should not fail in benchmarks");
|
|
let storage_proof = proof_recorder.drain().into_iter().map(|n| n.data.to_vec()).collect();
|
|
|
|
// prepare Bridged chain header and insert it into the Substrate pallet
|
|
let bridged_header = make_bridged_header(root);
|
|
let bridged_header_hash = bridged_header.hash();
|
|
pallet_substrate_bridge::initialize_for_benchmarks::<R>(bridged_header);
|
|
|
|
(
|
|
bridged_header_hash.into(),
|
|
StorageProof::new(storage_proof),
|
|
params.lane,
|
|
)
|
|
}
|