mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-05-06 19:38:02 +00:00
308ab4f269
* WiP: HTTP Apis. * Working on the API. * Add docs, clean up the API. * Expose ext_ stuff as well. * Implement HTTP helpers for offchain sr-io. * Remove HTTP stuff. * Revert "Remove HTTP stuff." This reverts commit 7cca029d6ae93c5849b50edfcc6d2c313ba3e5bf. * HTTP apis. * Additional offchain methods. * Make it compile. * Implement wasm-ext boundary of offchain methods. * Add stubs for offchain stuff to prevent panics. * Fix tests. * Addres some more issues. * Introduce typedef, use unsafe from_utf8 * Bump runtime version. * Introduce error to distinguish deadline and io errors. * Add local_storage_cas * Some tests for offchain stuff. * Address more grumbles. * Fix tests compilation. * Fix borked merge. * Improve docs for expected return values from ext functions. * Adding new sign/enrypt/decrypt APIs.
245 lines
6.3 KiB
Rust
245 lines
6.3 KiB
Rust
// Copyright 2019 Parity Technologies (UK) Ltd.
|
|
// This file is part of Substrate.
|
|
|
|
// Substrate is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Substrate is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Substrate. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
//! Offchain Externalities implementation for tests.
|
|
|
|
use std::{
|
|
collections::BTreeMap,
|
|
sync::Arc,
|
|
};
|
|
use parking_lot::RwLock;
|
|
use primitives::offchain::{
|
|
self,
|
|
HttpError,
|
|
HttpRequestId as RequestId,
|
|
HttpRequestStatus as RequestStatus,
|
|
Timestamp,
|
|
CryptoKind,
|
|
CryptoKeyId,
|
|
};
|
|
|
|
/// Pending request.
|
|
#[derive(Debug, Default, PartialEq, Eq)]
|
|
pub struct PendingRequest {
|
|
/// HTTP method
|
|
pub method: String,
|
|
/// URI
|
|
pub uri: String,
|
|
/// Encoded Metadata
|
|
pub meta: Vec<u8>,
|
|
/// Request headers
|
|
pub headers: Vec<(String, String)>,
|
|
/// Request body
|
|
pub body: Vec<u8>,
|
|
/// Has the request been sent already.
|
|
pub sent: bool,
|
|
/// Response body
|
|
pub response: Vec<u8>,
|
|
/// Number of bytes already read from the response body.
|
|
pub read: usize,
|
|
/// Response headers
|
|
pub response_headers: Vec<(String, String)>,
|
|
}
|
|
|
|
/// Internal state of the externalities.
|
|
///
|
|
/// This can be used in tests to respond or assert stuff about interactions.
|
|
#[derive(Debug, Default)]
|
|
pub struct State {
|
|
/// A list of pending requests.
|
|
pub requests: BTreeMap<RequestId, PendingRequest>,
|
|
}
|
|
|
|
impl State {
|
|
/// Asserts that pending request has been submitted and fills it's response.
|
|
pub fn fulfill_pending_request(
|
|
&mut self,
|
|
id: u16,
|
|
expected: PendingRequest,
|
|
response: impl Into<Vec<u8>>,
|
|
response_headers: impl IntoIterator<Item=(String, String)>,
|
|
) {
|
|
match self.requests.get_mut(&RequestId(id)) {
|
|
None => {
|
|
panic!("Missing expected request: {:?}.\n\nAll: {:?}", id, self.requests);
|
|
}
|
|
Some(req) => {
|
|
assert_eq!(
|
|
*req,
|
|
expected,
|
|
);
|
|
req.response = response.into();
|
|
req.response_headers = response_headers.into_iter().collect();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Implementation of offchain externalities used for tests.
|
|
#[derive(Clone, Default, Debug)]
|
|
pub struct TestOffchainExt(pub Arc<RwLock<State>>);
|
|
|
|
impl offchain::Externalities for TestOffchainExt {
|
|
fn submit_transaction(&mut self, _ex: Vec<u8>) -> Result<(), ()> {
|
|
unimplemented!("not needed in tests so far")
|
|
}
|
|
|
|
fn new_crypto_key(&mut self, _crypto: CryptoKind) -> Result<CryptoKeyId, ()> {
|
|
unimplemented!("not needed in tests so far")
|
|
}
|
|
|
|
fn encrypt(&mut self, _key: Option<CryptoKeyId>, _data: &[u8]) -> Result<Vec<u8>, ()> {
|
|
unimplemented!("not needed in tests so far")
|
|
}
|
|
|
|
fn decrypt(&mut self, _key: Option<CryptoKeyId>, _data: &[u8]) -> Result<Vec<u8>, ()> {
|
|
unimplemented!("not needed in tests so far")
|
|
}
|
|
|
|
fn sign(&mut self, _key: Option<CryptoKeyId>, _data: &[u8]) -> Result<Vec<u8>, ()> {
|
|
unimplemented!("not needed in tests so far")
|
|
}
|
|
|
|
fn verify(&mut self, _key: Option<CryptoKeyId>, _msg: &[u8], _signature: &[u8]) -> Result<bool, ()> {
|
|
unimplemented!("not needed in tests so far")
|
|
}
|
|
|
|
fn timestamp(&mut self) -> Timestamp {
|
|
unimplemented!("not needed in tests so far")
|
|
}
|
|
|
|
fn sleep_until(&mut self, _deadline: Timestamp) {
|
|
unimplemented!("not needed in tests so far")
|
|
}
|
|
|
|
fn random_seed(&mut self) -> [u8; 32] {
|
|
unimplemented!("not needed in tests so far")
|
|
}
|
|
|
|
fn local_storage_set(&mut self, _key: &[u8], _value: &[u8]) {
|
|
unimplemented!("not needed in tests so far")
|
|
}
|
|
|
|
fn local_storage_compare_and_set(
|
|
&mut self,
|
|
_key: &[u8],
|
|
_old_value: &[u8],
|
|
_new_value: &[u8]
|
|
) {
|
|
unimplemented!("not needed in tests so far")
|
|
}
|
|
|
|
fn local_storage_get(&mut self, _key: &[u8]) -> Option<Vec<u8>> {
|
|
unimplemented!("not needed in tests so far")
|
|
}
|
|
|
|
fn http_request_start(&mut self, method: &str, uri: &str, meta: &[u8]) -> Result<RequestId, ()> {
|
|
let mut state = self.0.write();
|
|
let id = RequestId(state.requests.len() as u16);
|
|
state.requests.insert(id.clone(), PendingRequest {
|
|
method: method.into(),
|
|
uri: uri.into(),
|
|
meta: meta.into(),
|
|
..Default::default()
|
|
});
|
|
Ok(id)
|
|
}
|
|
|
|
fn http_request_add_header(
|
|
&mut self,
|
|
request_id: RequestId,
|
|
name: &str,
|
|
value: &str,
|
|
) -> Result<(), ()> {
|
|
let mut state = self.0.write();
|
|
if let Some(req) = state.requests.get_mut(&request_id) {
|
|
req.headers.push((name.into(), value.into()));
|
|
Ok(())
|
|
} else {
|
|
Err(())
|
|
}
|
|
}
|
|
|
|
fn http_request_write_body(
|
|
&mut self,
|
|
request_id: RequestId,
|
|
chunk: &[u8],
|
|
_deadline: Option<Timestamp>
|
|
) -> Result<(), HttpError> {
|
|
let mut state = self.0.write();
|
|
if let Some(req) = state.requests.get_mut(&request_id) {
|
|
if chunk.is_empty() {
|
|
req.sent = true;
|
|
}
|
|
req.body.extend(chunk);
|
|
Ok(())
|
|
} else {
|
|
Err(HttpError::IoError)
|
|
}
|
|
}
|
|
|
|
fn http_response_wait(
|
|
&mut self,
|
|
ids: &[RequestId],
|
|
_deadline: Option<Timestamp>,
|
|
) -> Vec<RequestStatus> {
|
|
let state = self.0.read();
|
|
|
|
ids.iter().map(|id| match state.requests.get(id) {
|
|
Some(req) if req.response.is_empty() => RequestStatus::DeadlineReached,
|
|
None => RequestStatus::Unknown,
|
|
_ => RequestStatus::Finished(200),
|
|
}).collect()
|
|
}
|
|
|
|
fn http_response_headers(&mut self, request_id: RequestId) -> Vec<(Vec<u8>, Vec<u8>)> {
|
|
let state = self.0.read();
|
|
if let Some(req) = state.requests.get(&request_id) {
|
|
req.response_headers
|
|
.clone()
|
|
.into_iter()
|
|
.map(|(k, v)| (k.into_bytes(), v.into_bytes()))
|
|
.collect()
|
|
} else {
|
|
Default::default()
|
|
}
|
|
}
|
|
|
|
fn http_response_read_body(
|
|
&mut self,
|
|
request_id: RequestId,
|
|
buffer: &mut [u8],
|
|
_deadline: Option<Timestamp>
|
|
) -> Result<usize, HttpError> {
|
|
let mut state = self.0.write();
|
|
if let Some(req) = state.requests.get_mut(&request_id) {
|
|
if req.read >= req.response.len() {
|
|
// Remove the pending request as per spec.
|
|
state.requests.remove(&request_id);
|
|
Ok(0)
|
|
} else {
|
|
let read = std::cmp::min(buffer.len(), req.response[req.read..].len());
|
|
buffer[0..read].copy_from_slice(&req.response[req.read..read]);
|
|
req.read += read;
|
|
Ok(read)
|
|
}
|
|
} else {
|
|
Err(HttpError::IoError)
|
|
}
|
|
}
|
|
}
|
|
|