mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-26 20:27:58 +00:00
25751c0562
* New approach to offchain signing. * Use in im-online * Rewrite to use Account<T> * DRY signing. * Implement send_raw_unsigned_transaction * WiP * Expunge LocalCall * Expunge LocalCall * Fix compilation. * Solve call. * Make it compile again. * Finalize implementation. * Change CreateTransaction * Clear CreateTransaction. * Add price payload * Send raw transaction * Submit signed payload / unsigned transaction (WIP) * Supertrait requirements on T::Signature * Validate signature of payload on an unsigned transaction * Fix encoding - part 1 * Make it compile. * Fix compilation of unsigned validator. * Pass price payload to the transaction * Make block number part of the signed payload * Send signed transaction * Implement all_accounts, any_account * Fix formatting * Implement submit_transaction * Submit signed transaction (ForAll, ForAny) * Fix formatting * Implement CreateSignedTransaction * Move sign and verify to AppCrypto * Sign transaction * Call `use_encoded` * Remove SubmitAndSignTransaction * Implement runtime using new SigningTypes * Adapt offchain example to changes * Fix im-online pallet * Quick fix: rename AuthorityId2 * Fix offchain example tests * Add a comment on why keystore is required in unsigned transaction test * Use UintAuthorityId instead of u64 * WIP * Remove IdentifyAccount from UintAuthorityId * Implement PublicWrapper type * Fix im-online tests * Fix runtime test * Bump spec version * Fix executor tests * Rename ImOnlineAuthId -> ImOnlineAuthorityId and formatting * Fix merge * Documentation * Revert u64 -> UintAuthorityId conversion * Fix string errors * Document public members in offchain module * Introduce SubmitTransaction * Update pallets to use SubmitTransaction * WIP * Use SubmitTransaction in offchain * Use `submit_unsigned_transaction` * Fix tests * Update docs * Remove SigningTypes requirement from `SendTransactionTypes` * Fix tests * Update frame/system/src/offchain.rs Co-Authored-By: Kian Paimani <5588131+kianenigma@users.noreply.github.com> * Update frame/system/src/offchain.rs Co-Authored-By: Kian Paimani <5588131+kianenigma@users.noreply.github.com> * Update frame/example-offchain-worker/src/tests.rs Co-Authored-By: Kian Paimani <5588131+kianenigma@users.noreply.github.com> * Update frame/system/src/offchain.rs Co-Authored-By: Kian Paimani <5588131+kianenigma@users.noreply.github.com> * Update frame/system/src/offchain.rs Co-Authored-By: Kian Paimani <5588131+kianenigma@users.noreply.github.com> * Remove leftover from previous iterations * Change enum to struct * Remove public * Move mock to node/executor/tests * Cleanup test-helpers * Make `application-crypto` `std` feature internal The macros should not generate code that requires that the calling crate has a feature with the name `std` defined. * Revert cargo lock update * Use TestAuthorityId from common * Restore members of account to public * Tidy up imports * Fix benchmarking pallet * Add tests demonstrating ForAll, ForAny on signer * Move definition of AppCrypto in example-offchain-worker from tests to mod::crypto * Cleanup stray comment * Fix ValidTransaction * Re-fix CreateSignedTransaction * Address PR feedback * Add can_sign method to signer * Propagate error * Improve documentation * Fix vec! macro not available * Document SendTransactiontypes * Add some docs. * Split signing examples * Add tests for signing examples * WIP can_sign - PR feedback * WIP * Split for_any / for_all into different calls * Verify payload and signature in test * Fix can_sign implementation * Fix impl_version * Import Box from sp_std * Create issues for TODOs * Ignore doctest. * Add test directly to system. Adjust UintTypes. * Add some tests to account filtering. * Remove code samples and point to example offchain worker * Fix doc links * Fix im-online tests using signatures. Co-authored-by: Tomasz Drwięga <tomasz@parity.io> Co-authored-by: Kian Paimani <5588131+kianenigma@users.noreply.github.com> Co-authored-by: Bastian Köcher <git@kchr.de>
201 lines
6.0 KiB
Rust
201 lines
6.0 KiB
Rust
// Copyright 2018-2020 Parity Technologies (UK) Ltd.
|
|
// This file is part of Substrate.
|
|
|
|
// Substrate is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Substrate is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Substrate. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
use codec::{Encode, Decode};
|
|
use frame_system::offchain::AppCrypto;
|
|
use frame_support::Hashable;
|
|
use sp_state_machine::TestExternalities as CoreTestExternalities;
|
|
use sp_core::{
|
|
NeverNativeValue, NativeOrEncoded,
|
|
crypto::KeyTypeId,
|
|
sr25519::Signature,
|
|
traits::{CodeExecutor, RuntimeCode},
|
|
};
|
|
use sp_runtime::{
|
|
ApplyExtrinsicResult,
|
|
MultiSigner,
|
|
MultiSignature,
|
|
traits::{Header as HeaderT, BlakeTwo256},
|
|
};
|
|
use sc_executor::{NativeExecutor, WasmExecutionMethod};
|
|
use sc_executor::error::Result;
|
|
|
|
use node_executor::Executor;
|
|
use node_runtime::{
|
|
Header, Block, UncheckedExtrinsic, CheckedExtrinsic, Runtime, BuildStorage,
|
|
constants::currency::*,
|
|
};
|
|
use node_primitives::{Hash, BlockNumber};
|
|
use node_testing::keyring::*;
|
|
use sp_externalities::Externalities;
|
|
|
|
pub const TEST_KEY_TYPE_ID: KeyTypeId = KeyTypeId(*b"test");
|
|
|
|
pub mod sr25519 {
|
|
mod app_sr25519 {
|
|
use sp_application_crypto::{app_crypto, sr25519};
|
|
use super::super::TEST_KEY_TYPE_ID;
|
|
app_crypto!(sr25519, TEST_KEY_TYPE_ID);
|
|
}
|
|
|
|
pub type AuthorityId = app_sr25519::Public;
|
|
}
|
|
|
|
pub struct TestAuthorityId;
|
|
impl AppCrypto<MultiSigner, MultiSignature> for TestAuthorityId {
|
|
type RuntimeAppPublic = sr25519::AuthorityId;
|
|
type GenericSignature = Signature;
|
|
type GenericPublic = sp_core::sr25519::Public;
|
|
}
|
|
|
|
/// The wasm runtime code.
|
|
///
|
|
/// `compact` since it is after post-processing with wasm-gc which performs tree-shaking thus
|
|
/// making the binary slimmer. There is a convention to use compact version of the runtime
|
|
/// as canonical. This is why `native_executor_instance` also uses the compact version of the
|
|
/// runtime.
|
|
pub const COMPACT_CODE: &[u8] = node_runtime::WASM_BINARY;
|
|
|
|
pub const GENESIS_HASH: [u8; 32] = [69u8; 32];
|
|
|
|
pub const VERSION: u32 = node_runtime::VERSION.spec_version;
|
|
|
|
pub type TestExternalities<H> = CoreTestExternalities<H, u64>;
|
|
|
|
pub fn sign(xt: CheckedExtrinsic) -> UncheckedExtrinsic {
|
|
node_testing::keyring::sign(xt, VERSION, GENESIS_HASH)
|
|
}
|
|
|
|
pub fn default_transfer_call() -> pallet_balances::Call<Runtime> {
|
|
pallet_balances::Call::transfer::<Runtime>(bob().into(), 69 * DOLLARS)
|
|
}
|
|
|
|
pub fn from_block_number(n: u32) -> Header {
|
|
Header::new(n, Default::default(), Default::default(), [69; 32].into(), Default::default())
|
|
}
|
|
|
|
pub fn executor() -> NativeExecutor<Executor> {
|
|
NativeExecutor::new(WasmExecutionMethod::Interpreted, None, 8)
|
|
}
|
|
|
|
pub fn executor_call<
|
|
R:Decode + Encode + PartialEq,
|
|
NC: FnOnce() -> std::result::Result<R, String> + std::panic::UnwindSafe
|
|
>(
|
|
t: &mut TestExternalities<BlakeTwo256>,
|
|
method: &str,
|
|
data: &[u8],
|
|
use_native: bool,
|
|
native_call: Option<NC>,
|
|
) -> (Result<NativeOrEncoded<R>>, bool) {
|
|
let mut t = t.ext();
|
|
|
|
let code = t.storage(sp_core::storage::well_known_keys::CODE).unwrap();
|
|
let heap_pages = t.storage(sp_core::storage::well_known_keys::HEAP_PAGES);
|
|
let runtime_code = RuntimeCode {
|
|
code_fetcher: &sp_core::traits::WrappedRuntimeCode(code.as_slice().into()),
|
|
hash: sp_core::blake2_256(&code).to_vec(),
|
|
heap_pages: heap_pages.and_then(|hp| Decode::decode(&mut &hp[..]).ok()),
|
|
};
|
|
|
|
executor().call::<R, NC>(
|
|
&mut t,
|
|
&runtime_code,
|
|
method,
|
|
data,
|
|
use_native,
|
|
native_call,
|
|
)
|
|
}
|
|
|
|
pub fn new_test_ext(code: &[u8], support_changes_trie: bool) -> TestExternalities<BlakeTwo256> {
|
|
let mut ext = TestExternalities::new_with_code(
|
|
code,
|
|
node_testing::genesis::config(support_changes_trie, Some(code)).build_storage().unwrap(),
|
|
);
|
|
ext.changes_trie_storage().insert(0, GENESIS_HASH.into(), Default::default());
|
|
ext
|
|
}
|
|
|
|
/// Construct a fake block.
|
|
///
|
|
/// `extrinsics` must be a list of valid extrinsics, i.e. none of the extrinsics for example
|
|
/// can report `ExhaustResources`. Otherwise, this function panics.
|
|
pub fn construct_block(
|
|
env: &mut TestExternalities<BlakeTwo256>,
|
|
number: BlockNumber,
|
|
parent_hash: Hash,
|
|
extrinsics: Vec<CheckedExtrinsic>,
|
|
) -> (Vec<u8>, Hash) {
|
|
use sp_trie::{TrieConfiguration, trie_types::Layout};
|
|
|
|
// sign extrinsics.
|
|
let extrinsics = extrinsics.into_iter().map(sign).collect::<Vec<_>>();
|
|
|
|
// calculate the header fields that we can.
|
|
let extrinsics_root =
|
|
Layout::<BlakeTwo256>::ordered_trie_root(extrinsics.iter().map(Encode::encode))
|
|
.to_fixed_bytes()
|
|
.into();
|
|
|
|
let header = Header {
|
|
parent_hash,
|
|
number,
|
|
extrinsics_root,
|
|
state_root: Default::default(),
|
|
digest: Default::default(),
|
|
};
|
|
|
|
// execute the block to get the real header.
|
|
executor_call::<NeverNativeValue, fn() -> _>(
|
|
env,
|
|
"Core_initialize_block",
|
|
&header.encode(),
|
|
true,
|
|
None,
|
|
).0.unwrap();
|
|
|
|
for extrinsic in extrinsics.iter() {
|
|
// Try to apply the `extrinsic`. It should be valid, in the sense that it passes
|
|
// all pre-inclusion checks.
|
|
let r = executor_call::<NeverNativeValue, fn() -> _>(
|
|
env,
|
|
"BlockBuilder_apply_extrinsic",
|
|
&extrinsic.encode(),
|
|
true,
|
|
None,
|
|
).0.expect("application of an extrinsic failed").into_encoded();
|
|
match ApplyExtrinsicResult::decode(&mut &r[..]).expect("apply result deserialization failed") {
|
|
Ok(_) => {},
|
|
Err(e) => panic!("Applying extrinsic failed: {:?}", e),
|
|
}
|
|
}
|
|
|
|
let header = match executor_call::<NeverNativeValue, fn() -> _>(
|
|
env,
|
|
"BlockBuilder_finalize_block",
|
|
&[0u8;0],
|
|
true,
|
|
None,
|
|
).0.unwrap() {
|
|
NativeOrEncoded::Native(_) => unreachable!(),
|
|
NativeOrEncoded::Encoded(h) => Header::decode(&mut &h[..]).unwrap(),
|
|
};
|
|
|
|
let hash = header.blake2_256();
|
|
(Block { header, extrinsics }.encode(), hash.into())
|
|
}
|