mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-26 08:47:57 +00:00
f37927d37d
* start to try and implement noop * txs as input * better comment * Add transfer reaping * rename to avoid filter matching * Update base weights based on results * fix priority * fix logic on reaping transfer * Update bin/node/bench/src/import.rs Co-authored-by: Nikolay Volf <nikvolf@gmail.com> * Update bin/node/bench/src/main.rs Co-authored-by: Nikolay Volf <nikvolf@gmail.com> * add back size type (in-progress) * bring back size type with custom * update comment * nit * block type then size * Use `transfer_keep_alive` Co-authored-by: Nikolay Volf <nikvolf@gmail.com>
241 lines
8.5 KiB
Rust
241 lines
8.5 KiB
Rust
// Copyright 2018-2020 Parity Technologies (UK) Ltd.
|
|
// This file is part of Substrate.
|
|
|
|
// Substrate is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Substrate is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Substrate. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
use node_runtime::{
|
|
Executive, Indices, Runtime, UncheckedExtrinsic,
|
|
};
|
|
use sp_application_crypto::AppKey;
|
|
use sp_core::testing::KeyStore;
|
|
use sp_core::{
|
|
offchain::{
|
|
TransactionPoolExt,
|
|
testing::TestTransactionPoolExt,
|
|
},
|
|
traits::KeystoreExt,
|
|
};
|
|
use frame_system::{
|
|
offchain::{
|
|
Signer,
|
|
SubmitTransaction,
|
|
SendSignedTransaction,
|
|
}
|
|
};
|
|
use codec::Decode;
|
|
|
|
pub mod common;
|
|
use self::common::*;
|
|
|
|
#[test]
|
|
fn should_submit_unsigned_transaction() {
|
|
let mut t = new_test_ext(COMPACT_CODE, false);
|
|
let (pool, state) = TestTransactionPoolExt::new();
|
|
t.register_extension(TransactionPoolExt::new(pool));
|
|
|
|
t.execute_with(|| {
|
|
let signature = Default::default();
|
|
let heartbeat_data = pallet_im_online::Heartbeat {
|
|
block_number: 1,
|
|
network_state: Default::default(),
|
|
session_index: 1,
|
|
authority_index: 0,
|
|
validators_len: 0,
|
|
};
|
|
|
|
let call = pallet_im_online::Call::heartbeat(heartbeat_data, signature);
|
|
SubmitTransaction::<Runtime, pallet_im_online::Call<Runtime>>::submit_unsigned_transaction(call.into())
|
|
.unwrap();
|
|
|
|
assert_eq!(state.read().transactions.len(), 1)
|
|
});
|
|
}
|
|
|
|
const PHRASE: &str = "news slush supreme milk chapter athlete soap sausage put clutch what kitten";
|
|
|
|
#[test]
|
|
fn should_submit_signed_transaction() {
|
|
let mut t = new_test_ext(COMPACT_CODE, false);
|
|
let (pool, state) = TestTransactionPoolExt::new();
|
|
t.register_extension(TransactionPoolExt::new(pool));
|
|
|
|
let keystore = KeyStore::new();
|
|
keystore.write().sr25519_generate_new(sr25519::AuthorityId::ID, Some(&format!("{}/hunter1", PHRASE))).unwrap();
|
|
keystore.write().sr25519_generate_new(sr25519::AuthorityId::ID, Some(&format!("{}/hunter2", PHRASE))).unwrap();
|
|
keystore.write().sr25519_generate_new(sr25519::AuthorityId::ID, Some(&format!("{}/hunter3", PHRASE))).unwrap();
|
|
t.register_extension(KeystoreExt(keystore));
|
|
|
|
t.execute_with(|| {
|
|
let results = Signer::<Runtime, TestAuthorityId>::all_accounts()
|
|
.send_signed_transaction(|_| {
|
|
pallet_balances::Call::transfer(Default::default(), Default::default())
|
|
});
|
|
|
|
let len = results.len();
|
|
assert_eq!(len, 3);
|
|
assert_eq!(results.into_iter().filter_map(|x| x.1.ok()).count(), len);
|
|
assert_eq!(state.read().transactions.len(), len);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn should_submit_signed_twice_from_the_same_account() {
|
|
let mut t = new_test_ext(COMPACT_CODE, false);
|
|
let (pool, state) = TestTransactionPoolExt::new();
|
|
t.register_extension(TransactionPoolExt::new(pool));
|
|
|
|
let keystore = KeyStore::new();
|
|
keystore.write().sr25519_generate_new(sr25519::AuthorityId::ID, Some(&format!("{}/hunter1", PHRASE))).unwrap();
|
|
keystore.write().sr25519_generate_new(sr25519::AuthorityId::ID, Some(&format!("{}/hunter2", PHRASE))).unwrap();
|
|
t.register_extension(KeystoreExt(keystore));
|
|
|
|
t.execute_with(|| {
|
|
let result = Signer::<Runtime, TestAuthorityId>::any_account()
|
|
.send_signed_transaction(|_| {
|
|
pallet_balances::Call::transfer(Default::default(), Default::default())
|
|
});
|
|
|
|
assert!(result.is_some());
|
|
assert_eq!(state.read().transactions.len(), 1);
|
|
|
|
// submit another one from the same account. The nonce should be incremented.
|
|
let result = Signer::<Runtime, TestAuthorityId>::any_account()
|
|
.send_signed_transaction(|_| {
|
|
pallet_balances::Call::transfer(Default::default(), Default::default())
|
|
});
|
|
|
|
assert!(result.is_some());
|
|
assert_eq!(state.read().transactions.len(), 2);
|
|
|
|
// now check that the transaction nonces are not equal
|
|
let s = state.read();
|
|
fn nonce(tx: UncheckedExtrinsic) -> frame_system::CheckNonce<Runtime> {
|
|
let extra = tx.signature.unwrap().2;
|
|
extra.3
|
|
}
|
|
let nonce1 = nonce(UncheckedExtrinsic::decode(&mut &*s.transactions[0]).unwrap());
|
|
let nonce2 = nonce(UncheckedExtrinsic::decode(&mut &*s.transactions[1]).unwrap());
|
|
assert!(
|
|
nonce1 != nonce2,
|
|
"Transactions should have different nonces. Got: {:?}", nonce1
|
|
);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn should_submit_signed_twice_from_all_accounts() {
|
|
let mut t = new_test_ext(COMPACT_CODE, false);
|
|
let (pool, state) = TestTransactionPoolExt::new();
|
|
t.register_extension(TransactionPoolExt::new(pool));
|
|
|
|
let keystore = KeyStore::new();
|
|
keystore.write().sr25519_generate_new(sr25519::AuthorityId::ID, Some(&format!("{}/hunter1", PHRASE))).unwrap();
|
|
keystore.write().sr25519_generate_new(sr25519::AuthorityId::ID, Some(&format!("{}/hunter2", PHRASE))).unwrap();
|
|
t.register_extension(KeystoreExt(keystore));
|
|
|
|
t.execute_with(|| {
|
|
let results = Signer::<Runtime, TestAuthorityId>::all_accounts()
|
|
.send_signed_transaction(|_| {
|
|
pallet_balances::Call::transfer(Default::default(), Default::default())
|
|
});
|
|
|
|
let len = results.len();
|
|
assert_eq!(len, 2);
|
|
assert_eq!(results.into_iter().filter_map(|x| x.1.ok()).count(), len);
|
|
assert_eq!(state.read().transactions.len(), 2);
|
|
|
|
// submit another one from the same account. The nonce should be incremented.
|
|
let results = Signer::<Runtime, TestAuthorityId>::all_accounts()
|
|
.send_signed_transaction(|_| {
|
|
pallet_balances::Call::transfer(Default::default(), Default::default())
|
|
});
|
|
|
|
let len = results.len();
|
|
assert_eq!(len, 2);
|
|
assert_eq!(results.into_iter().filter_map(|x| x.1.ok()).count(), len);
|
|
assert_eq!(state.read().transactions.len(), 4);
|
|
|
|
// now check that the transaction nonces are not equal
|
|
let s = state.read();
|
|
fn nonce(tx: UncheckedExtrinsic) -> frame_system::CheckNonce<Runtime> {
|
|
let extra = tx.signature.unwrap().2;
|
|
extra.3
|
|
}
|
|
let nonce1 = nonce(UncheckedExtrinsic::decode(&mut &*s.transactions[0]).unwrap());
|
|
let nonce2 = nonce(UncheckedExtrinsic::decode(&mut &*s.transactions[1]).unwrap());
|
|
let nonce3 = nonce(UncheckedExtrinsic::decode(&mut &*s.transactions[2]).unwrap());
|
|
let nonce4 = nonce(UncheckedExtrinsic::decode(&mut &*s.transactions[3]).unwrap());
|
|
assert!(
|
|
nonce1 != nonce3,
|
|
"Transactions should have different nonces. Got: 1st tx nonce: {:?}, 2nd nonce: {:?}", nonce1, nonce3
|
|
);
|
|
assert!(
|
|
nonce2 != nonce4,
|
|
"Transactions should have different nonces. Got: 1st tx nonce: {:?}, 2nd tx nonce: {:?}", nonce2, nonce4
|
|
);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn submitted_transaction_should_be_valid() {
|
|
use codec::Encode;
|
|
use frame_support::storage::StorageMap;
|
|
use sp_runtime::transaction_validity::{ValidTransaction, TransactionSource};
|
|
use sp_runtime::traits::StaticLookup;
|
|
|
|
let mut t = new_test_ext(COMPACT_CODE, false);
|
|
let (pool, state) = TestTransactionPoolExt::new();
|
|
t.register_extension(TransactionPoolExt::new(pool));
|
|
|
|
let keystore = KeyStore::new();
|
|
keystore.write().sr25519_generate_new(sr25519::AuthorityId::ID, Some(&format!("{}/hunter1", PHRASE))).unwrap();
|
|
t.register_extension(KeystoreExt(keystore));
|
|
|
|
t.execute_with(|| {
|
|
let results = Signer::<Runtime, TestAuthorityId>::all_accounts()
|
|
.send_signed_transaction(|_| {
|
|
pallet_balances::Call::transfer(Default::default(), Default::default())
|
|
});
|
|
let len = results.len();
|
|
assert_eq!(len, 1);
|
|
assert_eq!(results.into_iter().filter_map(|x| x.1.ok()).count(), len);
|
|
});
|
|
|
|
// check that transaction is valid, but reset environment storage,
|
|
// since CreateTransaction increments the nonce
|
|
let tx0 = state.read().transactions[0].clone();
|
|
let mut t = new_test_ext(COMPACT_CODE, false);
|
|
t.execute_with(|| {
|
|
let source = TransactionSource::External;
|
|
let extrinsic = UncheckedExtrinsic::decode(&mut &*tx0).unwrap();
|
|
// add balance to the account
|
|
let author = extrinsic.signature.clone().unwrap().0;
|
|
let address = Indices::lookup(author).unwrap();
|
|
let data = pallet_balances::AccountData { free: 5_000_000_000_000, ..Default::default() };
|
|
let account = frame_system::AccountInfo { nonce: 0u32, refcount: 0u8, data };
|
|
<frame_system::Account<Runtime>>::insert(&address, account);
|
|
|
|
// check validity
|
|
let res = Executive::validate_transaction(source, extrinsic);
|
|
|
|
assert_eq!(res.unwrap(), ValidTransaction {
|
|
priority: 1_410_740_000_000,
|
|
requires: vec![],
|
|
provides: vec![(address, 0).encode()],
|
|
longevity: 128,
|
|
propagate: true,
|
|
});
|
|
});
|
|
}
|