mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-05-09 12:58:05 +00:00
1a524b8207
* Add Call type to extensible transactions. Cleanup some naming * Merge Resource and BlockExhausted into just Exhausted * Fix * Another fix * Call * Some fixes * Fix srml tests. * Fix all tests. * Refactor crypto so each application of it has its own type. * Introduce new AuthorityProvider API into Aura This will eventually allow for dynamic determination of authority keys and avoid having to set them directly on CLI. * Introduce authority determinator for Babe. Experiment with modular consensus API. * Work in progress to introduce KeyTypeId and avoid polluting API with validator IDs * Finish up drafting imonline * Rework offchain workers API. * Rework API implementation. * Make it compile for wasm, simplify app_crypto. * Fix compilation of im-online. * Fix compilation of im-online. * Fix more compilation errors. * Make it compile. * Fixing tests. * Rewrite `keystore` * Fix session tests * Bring back `TryFrom`'s' * Fix `srml-grandpa` * Fix `srml-aura` * Fix consensus babe * More fixes * Make service generate keys from dev_seed * Build fixes * Remove offchain tests * More fixes and cleanups * Fixes finality grandpa * Fix `consensus-aura` * Fix cli * Fix `node-cli` * Fix chain_spec builder * Fix doc tests * Add authority getter for grandpa. * Test fix * Fixes * Make keystore accessible from the runtime * Move app crypto to its own crate * Update `Cargo.lock` * Make the crypto stuff usable from the runtime * Adds some runtime crypto tests * Use last finalized block for grandpa authority * Fix warning * Adds `SessionKeys` runtime api * Remove `FinalityPair` and `ConsensusPair` * Minor governance tweaks to get it inline with docs. * Make the governance be up to date with the docs. * Build fixes. * Generate the inital session keys * Failing keystore is a hard error * Make babe work again * Fix grandpa * Fix tests * Disable `keystore` in consensus critical stuff * Build fix. * ImOnline supports multiple authorities at once. * Update core/application-crypto/src/ed25519.rs * Merge branch 'master' into gav-in-progress * Remove unneeded code for now. * Some `session` testing * Support querying the public keys * Cleanup offchain * Remove warnings * More cleanup * Apply suggestions from code review Co-Authored-By: Benjamin Kampmann <ben.kampmann@googlemail.com> * More cleanups * JSONRPC API for setting keys. Also, rename traits::KeyStore* -> traits::BareCryptoStore* * Bad merge * Fix integration tests * Fix test build * Test fix * Fixes * Warnings * Another warning * Bump version.
331 lines
9.4 KiB
Rust
331 lines
9.4 KiB
Rust
// Copyright 2017-2019 Parity Technologies (UK) Ltd.
|
|
// This file is part of Substrate.
|
|
|
|
// Substrate is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Substrate is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Substrate. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
//! Testing utilities.
|
|
|
|
use serde::{Serialize, Serializer, Deserialize, de::Error as DeError, Deserializer};
|
|
use std::{fmt::Debug, ops::Deref, fmt};
|
|
use crate::codec::{Codec, Encode, Decode};
|
|
use crate::traits::{
|
|
self, Checkable, Applyable, BlakeTwo256, OpaqueKeys, DispatchError, DispatchResult,
|
|
ValidateUnsigned, SignedExtension, Dispatchable,
|
|
};
|
|
use crate::{generic, KeyTypeId};
|
|
use crate::weights::{GetDispatchInfo, DispatchInfo};
|
|
pub use primitives::H256;
|
|
use primitives::{crypto::{CryptoType, Dummy, key_types, Public}, U256};
|
|
use crate::transaction_validity::TransactionValidity;
|
|
|
|
/// Authority Id
|
|
#[derive(Default, PartialEq, Eq, Clone, Encode, Decode, Debug, Hash, Serialize, Deserialize)]
|
|
pub struct UintAuthorityId(pub u64);
|
|
|
|
impl UintAuthorityId {
|
|
/// Convert this authority id into a public key.
|
|
pub fn to_public_key<T: Public>(&self) -> T {
|
|
let bytes: [u8; 32] = U256::from(self.0).into();
|
|
T::from_slice(&bytes)
|
|
}
|
|
}
|
|
|
|
impl CryptoType for UintAuthorityId {
|
|
type Pair = Dummy;
|
|
}
|
|
|
|
impl AsRef<[u8]> for UintAuthorityId {
|
|
fn as_ref(&self) -> &[u8] {
|
|
unsafe {
|
|
std::slice::from_raw_parts(&self.0 as *const u64 as *const _, std::mem::size_of::<u64>())
|
|
}
|
|
}
|
|
}
|
|
|
|
impl app_crypto::RuntimeAppPublic for UintAuthorityId {
|
|
type Signature = u64;
|
|
|
|
fn all() -> Vec<Self> {
|
|
unimplemented!("`all()` not available for `UintAuthorityId`.")
|
|
}
|
|
|
|
#[cfg(feature = "std")]
|
|
fn generate_pair(_: Option<&str>) -> Self {
|
|
use rand::RngCore;
|
|
UintAuthorityId(rand::thread_rng().next_u64())
|
|
}
|
|
|
|
#[cfg(not(feature = "std"))]
|
|
fn generate_pair(_: Option<&str>) -> Self {
|
|
unimplemented!("`generate_pair` not implemented for `UIntAuthorityId` on `no_std`.")
|
|
}
|
|
|
|
fn sign<M: AsRef<[u8]>>(&self, msg: &M) -> Option<Self::Signature> {
|
|
let mut signature = [0u8; 8];
|
|
msg.as_ref().iter()
|
|
.chain(rstd::iter::repeat(&42u8))
|
|
.take(8)
|
|
.enumerate()
|
|
.for_each(|(i, v)| { signature[i] = *v; });
|
|
|
|
Some(u64::from_le_bytes(signature))
|
|
}
|
|
|
|
fn verify<M: AsRef<[u8]>>(&self, msg: &M, signature: &Self::Signature) -> bool {
|
|
let mut msg_signature = [0u8; 8];
|
|
msg.as_ref().iter()
|
|
.chain(rstd::iter::repeat(&42))
|
|
.take(8)
|
|
.enumerate()
|
|
.for_each(|(i, v)| { msg_signature[i] = *v; });
|
|
|
|
u64::from_le_bytes(msg_signature) == *signature
|
|
}
|
|
}
|
|
|
|
impl OpaqueKeys for UintAuthorityId {
|
|
type KeyTypeIds = std::iter::Cloned<std::slice::Iter<'static, KeyTypeId>>;
|
|
|
|
fn key_ids() -> Self::KeyTypeIds { [key_types::DUMMY].iter().cloned() }
|
|
// Unsafe, i know, but it's test code and it's just there because it's really convenient to
|
|
// keep `UintAuthorityId` as a u64 under the hood.
|
|
fn get_raw(&self, _: KeyTypeId) -> &[u8] {
|
|
unsafe {
|
|
std::slice::from_raw_parts(
|
|
&self.0 as *const _ as *const u8,
|
|
std::mem::size_of::<u64>(),
|
|
)
|
|
}
|
|
}
|
|
fn get<T: Decode>(&self, _: KeyTypeId) -> Option<T> {
|
|
self.0.using_encoded(|mut x| T::decode(&mut x)).ok()
|
|
}
|
|
}
|
|
|
|
/// Digest item
|
|
pub type DigestItem = generic::DigestItem<H256>;
|
|
|
|
/// Header Digest
|
|
pub type Digest = generic::Digest<H256>;
|
|
|
|
/// Block Header
|
|
#[derive(PartialEq, Eq, Clone, Serialize, Debug, Encode, Decode)]
|
|
#[serde(rename_all = "camelCase")]
|
|
#[serde(deny_unknown_fields)]
|
|
pub struct Header {
|
|
/// Parent hash
|
|
pub parent_hash: H256,
|
|
/// Block Number
|
|
pub number: u64,
|
|
/// Post-execution state trie root
|
|
pub state_root: H256,
|
|
/// Merkle root of block's extrinsics
|
|
pub extrinsics_root: H256,
|
|
/// Digest items
|
|
pub digest: Digest,
|
|
}
|
|
|
|
impl traits::Header for Header {
|
|
type Number = u64;
|
|
type Hashing = BlakeTwo256;
|
|
type Hash = H256;
|
|
|
|
fn number(&self) -> &Self::Number { &self.number }
|
|
fn set_number(&mut self, num: Self::Number) { self.number = num }
|
|
|
|
fn extrinsics_root(&self) -> &Self::Hash { &self.extrinsics_root }
|
|
fn set_extrinsics_root(&mut self, root: Self::Hash) { self.extrinsics_root = root }
|
|
|
|
fn state_root(&self) -> &Self::Hash { &self.state_root }
|
|
fn set_state_root(&mut self, root: Self::Hash) { self.state_root = root }
|
|
|
|
fn parent_hash(&self) -> &Self::Hash { &self.parent_hash }
|
|
fn set_parent_hash(&mut self, hash: Self::Hash) { self.parent_hash = hash }
|
|
|
|
fn digest(&self) -> &Digest { &self.digest }
|
|
fn digest_mut(&mut self) -> &mut Digest { &mut self.digest }
|
|
|
|
fn new(
|
|
number: Self::Number,
|
|
extrinsics_root: Self::Hash,
|
|
state_root: Self::Hash,
|
|
parent_hash: Self::Hash,
|
|
digest: Digest,
|
|
) -> Self {
|
|
Header {
|
|
number,
|
|
extrinsics_root,
|
|
state_root,
|
|
parent_hash,
|
|
digest,
|
|
}
|
|
}
|
|
}
|
|
|
|
impl<'a> Deserialize<'a> for Header {
|
|
fn deserialize<D: Deserializer<'a>>(de: D) -> Result<Self, D::Error> {
|
|
let r = <Vec<u8>>::deserialize(de)?;
|
|
Decode::decode(&mut &r[..])
|
|
.map_err(|e| DeError::custom(format!("Invalid value passed into decode: {}", e.what())))
|
|
}
|
|
}
|
|
|
|
/// An opaque extrinsic wrapper type.
|
|
#[derive(PartialEq, Eq, Clone, Debug, Encode, Decode)]
|
|
pub struct ExtrinsicWrapper<Xt>(Xt);
|
|
|
|
impl<Xt> traits::Extrinsic for ExtrinsicWrapper<Xt> {
|
|
type Call = ();
|
|
|
|
fn is_signed(&self) -> Option<bool> {
|
|
None
|
|
}
|
|
}
|
|
|
|
impl<Xt: Encode> serde::Serialize for ExtrinsicWrapper<Xt> {
|
|
fn serialize<S>(&self, seq: S) -> Result<S::Ok, S::Error> where S: ::serde::Serializer {
|
|
self.using_encoded(|bytes| seq.serialize_bytes(bytes))
|
|
}
|
|
}
|
|
|
|
impl<Xt> From<Xt> for ExtrinsicWrapper<Xt> {
|
|
fn from(xt: Xt) -> Self {
|
|
ExtrinsicWrapper(xt)
|
|
}
|
|
}
|
|
|
|
impl<Xt> Deref for ExtrinsicWrapper<Xt> {
|
|
type Target = Xt;
|
|
|
|
fn deref(&self) -> &Self::Target {
|
|
&self.0
|
|
}
|
|
}
|
|
|
|
/// Testing block
|
|
#[derive(PartialEq, Eq, Clone, Serialize, Debug, Encode, Decode)]
|
|
pub struct Block<Xt> {
|
|
/// Block header
|
|
pub header: Header,
|
|
/// List of extrinsics
|
|
pub extrinsics: Vec<Xt>,
|
|
}
|
|
|
|
impl<Xt: 'static + Codec + Sized + Send + Sync + Serialize + Clone + Eq + Debug + traits::Extrinsic> traits::Block for Block<Xt> {
|
|
type Extrinsic = Xt;
|
|
type Header = Header;
|
|
type Hash = <Header as traits::Header>::Hash;
|
|
|
|
fn header(&self) -> &Self::Header {
|
|
&self.header
|
|
}
|
|
fn extrinsics(&self) -> &[Self::Extrinsic] {
|
|
&self.extrinsics[..]
|
|
}
|
|
fn deconstruct(self) -> (Self::Header, Vec<Self::Extrinsic>) {
|
|
(self.header, self.extrinsics)
|
|
}
|
|
fn new(header: Self::Header, extrinsics: Vec<Self::Extrinsic>) -> Self {
|
|
Block { header, extrinsics }
|
|
}
|
|
}
|
|
|
|
impl<'a, Xt> Deserialize<'a> for Block<Xt> where Block<Xt>: Decode {
|
|
fn deserialize<D: Deserializer<'a>>(de: D) -> Result<Self, D::Error> {
|
|
let r = <Vec<u8>>::deserialize(de)?;
|
|
Decode::decode(&mut &r[..])
|
|
.map_err(|e| DeError::custom(format!("Invalid value passed into decode: {}", e.what())))
|
|
}
|
|
}
|
|
|
|
/// Test transaction, tuple of (sender, call, signed_extra)
|
|
/// with index only used if sender is some.
|
|
///
|
|
/// If sender is some then the transaction is signed otherwise it is unsigned.
|
|
#[derive(PartialEq, Eq, Clone, Encode, Decode)]
|
|
pub struct TestXt<Call, Extra>(pub Option<(u64, Extra)>, pub Call);
|
|
|
|
impl<Call, Extra> Serialize for TestXt<Call, Extra> where TestXt<Call, Extra>: Encode {
|
|
fn serialize<S>(&self, seq: S) -> Result<S::Ok, S::Error> where S: Serializer {
|
|
self.using_encoded(|bytes| seq.serialize_bytes(bytes))
|
|
}
|
|
}
|
|
|
|
impl<Call, Extra> Debug for TestXt<Call, Extra> {
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
|
write!(f, "TestXt({:?}, ...)", self.0.as_ref().map(|x| &x.0))
|
|
}
|
|
}
|
|
|
|
impl<Call: Codec + Sync + Send, Context, Extra> Checkable<Context> for TestXt<Call, Extra> {
|
|
type Checked = Self;
|
|
fn check(self, _: &Context) -> Result<Self::Checked, &'static str> { Ok(self) }
|
|
}
|
|
impl<Call: Codec + Sync + Send, Extra> traits::Extrinsic for TestXt<Call, Extra> {
|
|
type Call = Call;
|
|
|
|
fn is_signed(&self) -> Option<bool> {
|
|
Some(self.0.is_some())
|
|
}
|
|
|
|
fn new_unsigned(_c: Call) -> Option<Self> {
|
|
None
|
|
}
|
|
}
|
|
|
|
impl<Origin, Call, Extra> Applyable for TestXt<Call, Extra> where
|
|
Call: 'static + Sized + Send + Sync + Clone + Eq + Codec + Debug + Dispatchable<Origin=Origin>,
|
|
Extra: SignedExtension<AccountId=u64, Call=Call>,
|
|
Origin: From<Option<u64>>
|
|
{
|
|
type AccountId = u64;
|
|
type Call = Call;
|
|
|
|
fn sender(&self) -> Option<&Self::AccountId> { self.0.as_ref().map(|x| &x.0) }
|
|
|
|
/// Checks to see if this is a valid *transaction*. It returns information on it if so.
|
|
fn validate<U: ValidateUnsigned<Call=Self::Call>>(&self,
|
|
_info: DispatchInfo,
|
|
_len: usize,
|
|
) -> TransactionValidity {
|
|
TransactionValidity::Valid(Default::default())
|
|
}
|
|
|
|
/// Executes all necessary logic needed prior to dispatch and deconstructs into function call,
|
|
/// index and sender.
|
|
fn dispatch(self,
|
|
info: DispatchInfo,
|
|
len: usize,
|
|
) -> Result<DispatchResult, DispatchError> {
|
|
let maybe_who = if let Some((who, extra)) = self.0 {
|
|
Extra::pre_dispatch(extra, &who, &self.1, info, len)?;
|
|
Some(who)
|
|
} else {
|
|
Extra::pre_dispatch_unsigned(&self.1, info, len)?;
|
|
None
|
|
};
|
|
Ok(self.1.dispatch(maybe_who.into()))
|
|
}
|
|
}
|
|
|
|
impl<Call: Encode, Extra: Encode> GetDispatchInfo for TestXt<Call, Extra> {
|
|
fn get_dispatch_info(&self) -> DispatchInfo {
|
|
// for testing: weight == size.
|
|
DispatchInfo {
|
|
weight: self.encode().len() as _,
|
|
..Default::default()
|
|
}
|
|
}
|
|
}
|