mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-05-07 17:48:01 +00:00
3aa4bfacfc
* Asyncify sign_with * Asyncify generate/get keys * Complete BareCryptoStore asyncification * Cleanup * Rebase * Add Proxy * Inject keystore proxy into extensions * Implement some methods * Await on send * Cleanup * Send result over the oneshot channel sender * Process one future at a time * Fix cargo stuff * Asyncify sr25519_vrf_sign * Cherry-pick and fix changes * Introduce SyncCryptoStore * SQUASH ME WITH THE first commit * Implement into SyncCryptoStore * Implement BareCryptoStore for KeystoreProxyAdapter * authority-discovery * AURA * BABE * finality-grandpa * offchain-workers * benchmarking-cli * sp_io * test-utils * application-crypto * Extensions and RPC * Client Service * bin * Update cargo.lock * Implement BareCryptoStore on proxy directly * Simplify proxy setup * Fix authority-discover * Pass async keystore to authority-discovery * Fix tests * Use async keystore in authority-discovery * Rename BareCryptoStore to CryptoStore * WIP * Remote mutable borrow in CryptoStore trait * Implement Keystore with backends * Remove Proxy implementation * Fix service builder and keystore user-crates * Fix tests * Rework authority-discovery after refactoring * futures::select! * Fix multiple mut borrows in authority-discovery * Merge fixes * Require sync * Restore Cargo.lock * PR feedback - round 1 * Remove Keystore and use LocalKeystore directly Also renamed KeystoreParams to KeystoreContainer * Join * Remove sync requirement * Fix keystore tests * Fix tests * client/authority-discovery: Remove event stream dynamic dispatching With authority-discovery moving from a poll based future to an `async` future Rust has difficulties propagating the `Sync` trade through the generated state machine. Instead of using dynamic dispatching, use a trait parameter to specify the DHT event stream. * Make it compile * Fix submit_transaction * Fix block_on issue * Use await in async context * Fix manual seal keystore * Fix authoring_blocks test * fix aura authoring_blocks * Try to fix tests for auth-discovery * client/authority-discovery: Fix lookup_throttling test * client/authority-discovery: Fix triggers_dht_get_query test * Fix epoch_authorship_works * client/authority-discovery: Remove timing assumption in unit test * client/authority-discovery: Revert changes to termination test * PR feedback * Remove deadcode and mark test code * Fix test_sync * Use the correct keyring type * Return when from_service stream is closed * Convert SyncCryptoStore to a trait * Fix line width * Fix line width - take 2 * Remove unused import * Fix keystore instantiation * PR feedback * Remove KeystoreContainer * Revert "Remove KeystoreContainer" This reverts commit ea4a37c7d74f9772b93d974e05e4498af6192730. * Take a ref of keystore * Move keystore to dev-dependencies * Address some PR feedback * Missed one * Pass keystore reference - take 2 * client/finality-grandpa: Use `Arc<dyn CryptoStore>` instead of SyncXXX Instead of using `SyncCryptoStorePtr` within `client/finality-grandpa`, which is a type alias for `Arc<dyn SyncCryptoStore>`, use `Arc<dyn CryptoStore>`. Benefits are: 1. No additional mental overhead of a `SyncCryptoStorePtr`. 2. Ability for new code to use the asynchronous methods of `CryptoStore` instead of the synchronous `SyncCryptoStore` methods within `client/finality-granpa` without the need for larger refactorings. Note: This commit uses `Arc<dyn CryptoStore>` instead of `CryptoStorePtr`, as I find the type signature more descriptive. This is subjective and in no way required. * Remove SyncCryptoStorePtr * Remove KeystoreContainer & SyncCryptoStorePtr * PR feedback * *: Use CryptoStorePtr whereever possible * *: Define SyncCryptoStore as a pure extension trait of CryptoStore * Follow up to SyncCryptoStore extension trait * Adjust docs for SyncCryptoStore as Ben suggested * Cleanup unnecessary requirements * sp-keystore * Use async_std::task::block_on in keystore * Fix block_on std requirement * Update primitives/keystore/src/lib.rs Co-authored-by: Max Inden <mail@max-inden.de> * Fix wasm build * Remove unused var * Fix wasm compilation - take 2 * Revert async-std in keystore * Fix indent * Fix version and copyright * Cleanup feature = "std" * Auth Discovery: Ignore if from_service is cloed * Max's suggestion * Revert async-std usage for block_on * Address PR feedback * Fix example offchain worker build * Address PR feedback * Update Cargo.lock * Move unused methods to test helper functions * Restore accidentally deleted cargo.lock files * Fix unused imports Co-authored-by: Max Inden <mail@max-inden.de> Co-authored-by: Shawn Tabrizi <shawntabrizi@gmail.com>
397 lines
12 KiB
Rust
397 lines
12 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) 2020 Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
use crate::*;
|
|
use std::sync::Arc;
|
|
use codec::{Encode, Decode};
|
|
use frame_support::{
|
|
assert_ok, impl_outer_origin, parameter_types,
|
|
weights::Weight,
|
|
};
|
|
use sp_core::{
|
|
H256,
|
|
offchain::{OffchainExt, TransactionPoolExt, testing},
|
|
sr25519::Signature,
|
|
};
|
|
|
|
use sp_keystore::{
|
|
{KeystoreExt, SyncCryptoStore},
|
|
testing::KeyStore,
|
|
};
|
|
use sp_runtime::{
|
|
Perbill, RuntimeAppPublic,
|
|
testing::{Header, TestXt},
|
|
traits::{
|
|
BlakeTwo256, IdentityLookup, Extrinsic as ExtrinsicT,
|
|
IdentifyAccount, Verify,
|
|
},
|
|
};
|
|
|
|
impl_outer_origin! {
|
|
pub enum Origin for Test where system = frame_system {}
|
|
}
|
|
|
|
// For testing the module, we construct most of a mock runtime. This means
|
|
// first constructing a configuration type (`Test`) which `impl`s each of the
|
|
// configuration traits of modules we want to use.
|
|
#[derive(Clone, Eq, PartialEq, Encode, Decode)]
|
|
pub struct Test;
|
|
parameter_types! {
|
|
pub const BlockHashCount: u64 = 250;
|
|
pub const MaximumBlockWeight: Weight = 1024;
|
|
pub const MaximumBlockLength: u32 = 2 * 1024;
|
|
pub const AvailableBlockRatio: Perbill = Perbill::one();
|
|
}
|
|
impl frame_system::Trait for Test {
|
|
type BaseCallFilter = ();
|
|
type Origin = Origin;
|
|
type Call = ();
|
|
type Index = u64;
|
|
type BlockNumber = u64;
|
|
type Hash = H256;
|
|
type Hashing = BlakeTwo256;
|
|
type AccountId = sp_core::sr25519::Public;
|
|
type Lookup = IdentityLookup<Self::AccountId>;
|
|
type Header = Header;
|
|
type Event = ();
|
|
type BlockHashCount = BlockHashCount;
|
|
type MaximumBlockWeight = MaximumBlockWeight;
|
|
type DbWeight = ();
|
|
type BlockExecutionWeight = ();
|
|
type ExtrinsicBaseWeight = ();
|
|
type MaximumExtrinsicWeight = MaximumBlockWeight;
|
|
type MaximumBlockLength = MaximumBlockLength;
|
|
type AvailableBlockRatio = AvailableBlockRatio;
|
|
type Version = ();
|
|
type PalletInfo = ();
|
|
type AccountData = ();
|
|
type OnNewAccount = ();
|
|
type OnKilledAccount = ();
|
|
type SystemWeightInfo = ();
|
|
}
|
|
|
|
type Extrinsic = TestXt<Call<Test>, ()>;
|
|
type AccountId = <<Signature as Verify>::Signer as IdentifyAccount>::AccountId;
|
|
|
|
impl frame_system::offchain::SigningTypes for Test {
|
|
type Public = <Signature as Verify>::Signer;
|
|
type Signature = Signature;
|
|
}
|
|
|
|
impl<LocalCall> frame_system::offchain::SendTransactionTypes<LocalCall> for Test where
|
|
Call<Test>: From<LocalCall>,
|
|
{
|
|
type OverarchingCall = Call<Test>;
|
|
type Extrinsic = Extrinsic;
|
|
}
|
|
|
|
impl<LocalCall> frame_system::offchain::CreateSignedTransaction<LocalCall> for Test where
|
|
Call<Test>: From<LocalCall>,
|
|
{
|
|
fn create_transaction<C: frame_system::offchain::AppCrypto<Self::Public, Self::Signature>>(
|
|
call: Call<Test>,
|
|
_public: <Signature as Verify>::Signer,
|
|
_account: AccountId,
|
|
nonce: u64,
|
|
) -> Option<(Call<Test>, <Extrinsic as ExtrinsicT>::SignaturePayload)> {
|
|
Some((call, (nonce, ())))
|
|
}
|
|
}
|
|
|
|
parameter_types! {
|
|
pub const GracePeriod: u64 = 5;
|
|
pub const UnsignedInterval: u64 = 128;
|
|
pub const UnsignedPriority: u64 = 1 << 20;
|
|
}
|
|
|
|
impl Trait for Test {
|
|
type Event = ();
|
|
type AuthorityId = crypto::TestAuthId;
|
|
type Call = Call<Test>;
|
|
type GracePeriod = GracePeriod;
|
|
type UnsignedInterval = UnsignedInterval;
|
|
type UnsignedPriority = UnsignedPriority;
|
|
}
|
|
|
|
type Example = Module<Test>;
|
|
|
|
#[test]
|
|
fn it_aggregates_the_price() {
|
|
sp_io::TestExternalities::default().execute_with(|| {
|
|
assert_eq!(Example::average_price(), None);
|
|
|
|
assert_ok!(Example::submit_price(Origin::signed(Default::default()), 27));
|
|
assert_eq!(Example::average_price(), Some(27));
|
|
|
|
assert_ok!(Example::submit_price(Origin::signed(Default::default()), 43));
|
|
assert_eq!(Example::average_price(), Some(35));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn should_make_http_call_and_parse_result() {
|
|
let (offchain, state) = testing::TestOffchainExt::new();
|
|
let mut t = sp_io::TestExternalities::default();
|
|
t.register_extension(OffchainExt::new(offchain));
|
|
|
|
price_oracle_response(&mut state.write());
|
|
|
|
t.execute_with(|| {
|
|
// when
|
|
let price = Example::fetch_price().unwrap();
|
|
// then
|
|
assert_eq!(price, 15523);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn knows_how_to_mock_several_http_calls() {
|
|
let (offchain, state) = testing::TestOffchainExt::new();
|
|
let mut t = sp_io::TestExternalities::default();
|
|
t.register_extension(OffchainExt::new(offchain));
|
|
|
|
{
|
|
let mut state = state.write();
|
|
state.expect_request(testing::PendingRequest {
|
|
method: "GET".into(),
|
|
uri: "https://min-api.cryptocompare.com/data/price?fsym=BTC&tsyms=USD".into(),
|
|
response: Some(br#"{"USD": 1}"#.to_vec()),
|
|
sent: true,
|
|
..Default::default()
|
|
});
|
|
|
|
state.expect_request(testing::PendingRequest {
|
|
method: "GET".into(),
|
|
uri: "https://min-api.cryptocompare.com/data/price?fsym=BTC&tsyms=USD".into(),
|
|
response: Some(br#"{"USD": 2}"#.to_vec()),
|
|
sent: true,
|
|
..Default::default()
|
|
});
|
|
|
|
state.expect_request(testing::PendingRequest {
|
|
method: "GET".into(),
|
|
uri: "https://min-api.cryptocompare.com/data/price?fsym=BTC&tsyms=USD".into(),
|
|
response: Some(br#"{"USD": 3}"#.to_vec()),
|
|
sent: true,
|
|
..Default::default()
|
|
});
|
|
}
|
|
|
|
|
|
t.execute_with(|| {
|
|
let price1 = Example::fetch_price().unwrap();
|
|
let price2 = Example::fetch_price().unwrap();
|
|
let price3 = Example::fetch_price().unwrap();
|
|
|
|
assert_eq!(price1, 100);
|
|
assert_eq!(price2, 200);
|
|
assert_eq!(price3, 300);
|
|
})
|
|
|
|
}
|
|
|
|
#[test]
|
|
fn should_submit_signed_transaction_on_chain() {
|
|
const PHRASE: &str = "news slush supreme milk chapter athlete soap sausage put clutch what kitten";
|
|
|
|
let (offchain, offchain_state) = testing::TestOffchainExt::new();
|
|
let (pool, pool_state) = testing::TestTransactionPoolExt::new();
|
|
let keystore = KeyStore::new();
|
|
SyncCryptoStore::sr25519_generate_new(
|
|
&keystore,
|
|
crate::crypto::Public::ID,
|
|
Some(&format!("{}/hunter1", PHRASE))
|
|
).unwrap();
|
|
|
|
|
|
let mut t = sp_io::TestExternalities::default();
|
|
t.register_extension(OffchainExt::new(offchain));
|
|
t.register_extension(TransactionPoolExt::new(pool));
|
|
t.register_extension(KeystoreExt(Arc::new(keystore)));
|
|
|
|
price_oracle_response(&mut offchain_state.write());
|
|
|
|
t.execute_with(|| {
|
|
// when
|
|
Example::fetch_price_and_send_signed().unwrap();
|
|
// then
|
|
let tx = pool_state.write().transactions.pop().unwrap();
|
|
assert!(pool_state.read().transactions.is_empty());
|
|
let tx = Extrinsic::decode(&mut &*tx).unwrap();
|
|
assert_eq!(tx.signature.unwrap().0, 0);
|
|
assert_eq!(tx.call, Call::submit_price(15523));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn should_submit_unsigned_transaction_on_chain_for_any_account() {
|
|
const PHRASE: &str = "news slush supreme milk chapter athlete soap sausage put clutch what kitten";
|
|
let (offchain, offchain_state) = testing::TestOffchainExt::new();
|
|
let (pool, pool_state) = testing::TestTransactionPoolExt::new();
|
|
|
|
let keystore = KeyStore::new();
|
|
|
|
SyncCryptoStore::sr25519_generate_new(
|
|
&keystore,
|
|
crate::crypto::Public::ID,
|
|
Some(&format!("{}/hunter1", PHRASE))
|
|
).unwrap();
|
|
|
|
let public_key = SyncCryptoStore::sr25519_public_keys(&keystore, crate::crypto::Public::ID)
|
|
.get(0)
|
|
.unwrap()
|
|
.clone();
|
|
|
|
let mut t = sp_io::TestExternalities::default();
|
|
t.register_extension(OffchainExt::new(offchain));
|
|
t.register_extension(TransactionPoolExt::new(pool));
|
|
t.register_extension(KeystoreExt(Arc::new(keystore)));
|
|
|
|
price_oracle_response(&mut offchain_state.write());
|
|
|
|
let price_payload = PricePayload {
|
|
block_number: 1,
|
|
price: 15523,
|
|
public: <Test as SigningTypes>::Public::from(public_key),
|
|
};
|
|
|
|
// let signature = price_payload.sign::<crypto::TestAuthId>().unwrap();
|
|
t.execute_with(|| {
|
|
// when
|
|
Example::fetch_price_and_send_unsigned_for_any_account(1).unwrap();
|
|
// then
|
|
let tx = pool_state.write().transactions.pop().unwrap();
|
|
let tx = Extrinsic::decode(&mut &*tx).unwrap();
|
|
assert_eq!(tx.signature, None);
|
|
if let Call::submit_price_unsigned_with_signed_payload(body, signature) = tx.call {
|
|
assert_eq!(body, price_payload);
|
|
|
|
let signature_valid = <PricePayload<
|
|
<Test as SigningTypes>::Public,
|
|
<Test as frame_system::Trait>::BlockNumber
|
|
> as SignedPayload<Test>>::verify::<crypto::TestAuthId>(&price_payload, signature);
|
|
|
|
assert!(signature_valid);
|
|
}
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn should_submit_unsigned_transaction_on_chain_for_all_accounts() {
|
|
const PHRASE: &str = "news slush supreme milk chapter athlete soap sausage put clutch what kitten";
|
|
let (offchain, offchain_state) = testing::TestOffchainExt::new();
|
|
let (pool, pool_state) = testing::TestTransactionPoolExt::new();
|
|
|
|
let keystore = KeyStore::new();
|
|
|
|
SyncCryptoStore::sr25519_generate_new(
|
|
&keystore,
|
|
crate::crypto::Public::ID,
|
|
Some(&format!("{}/hunter1", PHRASE))
|
|
).unwrap();
|
|
|
|
let public_key = SyncCryptoStore::sr25519_public_keys(&keystore, crate::crypto::Public::ID)
|
|
.get(0)
|
|
.unwrap()
|
|
.clone();
|
|
|
|
let mut t = sp_io::TestExternalities::default();
|
|
t.register_extension(OffchainExt::new(offchain));
|
|
t.register_extension(TransactionPoolExt::new(pool));
|
|
t.register_extension(KeystoreExt(Arc::new(keystore)));
|
|
|
|
price_oracle_response(&mut offchain_state.write());
|
|
|
|
let price_payload = PricePayload {
|
|
block_number: 1,
|
|
price: 15523,
|
|
public: <Test as SigningTypes>::Public::from(public_key),
|
|
};
|
|
|
|
// let signature = price_payload.sign::<crypto::TestAuthId>().unwrap();
|
|
t.execute_with(|| {
|
|
// when
|
|
Example::fetch_price_and_send_unsigned_for_all_accounts(1).unwrap();
|
|
// then
|
|
let tx = pool_state.write().transactions.pop().unwrap();
|
|
let tx = Extrinsic::decode(&mut &*tx).unwrap();
|
|
assert_eq!(tx.signature, None);
|
|
if let Call::submit_price_unsigned_with_signed_payload(body, signature) = tx.call {
|
|
assert_eq!(body, price_payload);
|
|
|
|
let signature_valid = <PricePayload<
|
|
<Test as SigningTypes>::Public,
|
|
<Test as frame_system::Trait>::BlockNumber
|
|
> as SignedPayload<Test>>::verify::<crypto::TestAuthId>(&price_payload, signature);
|
|
|
|
assert!(signature_valid);
|
|
}
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn should_submit_raw_unsigned_transaction_on_chain() {
|
|
let (offchain, offchain_state) = testing::TestOffchainExt::new();
|
|
let (pool, pool_state) = testing::TestTransactionPoolExt::new();
|
|
|
|
let keystore = KeyStore::new();
|
|
|
|
let mut t = sp_io::TestExternalities::default();
|
|
t.register_extension(OffchainExt::new(offchain));
|
|
t.register_extension(TransactionPoolExt::new(pool));
|
|
t.register_extension(KeystoreExt(Arc::new(keystore)));
|
|
|
|
price_oracle_response(&mut offchain_state.write());
|
|
|
|
t.execute_with(|| {
|
|
// when
|
|
Example::fetch_price_and_send_raw_unsigned(1).unwrap();
|
|
// then
|
|
let tx = pool_state.write().transactions.pop().unwrap();
|
|
assert!(pool_state.read().transactions.is_empty());
|
|
let tx = Extrinsic::decode(&mut &*tx).unwrap();
|
|
assert_eq!(tx.signature, None);
|
|
assert_eq!(tx.call, Call::submit_price_unsigned(1, 15523));
|
|
});
|
|
}
|
|
|
|
fn price_oracle_response(state: &mut testing::OffchainState) {
|
|
state.expect_request(testing::PendingRequest {
|
|
method: "GET".into(),
|
|
uri: "https://min-api.cryptocompare.com/data/price?fsym=BTC&tsyms=USD".into(),
|
|
response: Some(br#"{"USD": 155.23}"#.to_vec()),
|
|
sent: true,
|
|
..Default::default()
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn parse_price_works() {
|
|
let test_data = vec![
|
|
("{\"USD\":6536.92}", Some(653692)),
|
|
("{\"USD\":65.92}", Some(6592)),
|
|
("{\"USD\":6536.924565}", Some(653692)),
|
|
("{\"USD\":6536}", Some(653600)),
|
|
("{\"USD2\":6536}", None),
|
|
("{\"USD\":\"6432\"}", None),
|
|
];
|
|
|
|
for (json, expected) in test_data {
|
|
assert_eq!(expected, Example::parse_price(json));
|
|
}
|
|
}
|