Skip to content
Snippets Groups Projects
Select Git revision
  • cf8948710f1313ad2b6b4c7b1e220de650e38009
  • master default protected
  • network/gdev-800 protected
  • cgeek/issue-297-cpu
  • gdev-800-tests
  • update-docker-compose-rpc-squid-names
  • fix-252
  • 1000i100-test
  • hugo/tmp-0.9.1
  • network/gdev-803 protected
  • hugo/endpoint-gossip
  • network/gdev-802 protected
  • hugo/distance-precompute
  • network/gdev-900 protected
  • tuxmain/anonymous-tx
  • debug/podman
  • hugo/195-doc
  • hugo/195-graphql-schema
  • hugo-tmp-dockerfile-cache
  • release/client-800.2 protected
  • release/runtime-800 protected
  • gdev-900-0.10.1 protected
  • gdev-900-0.10.0 protected
  • gdev-900-0.9.2 protected
  • gdev-800-0.8.0 protected
  • gdev-900-0.9.1 protected
  • gdev-900-0.9.0 protected
  • gdev-803 protected
  • gdev-802 protected
  • runtime-801 protected
  • gdev-800 protected
  • runtime-800-bis protected
  • runtime-800 protected
  • runtime-800-backup protected
  • runtime-701 protected
  • runtime-700 protected
  • runtime-600 protected
  • runtime-500 protected
  • v0.4.1 protected
  • runtime-401 protected
  • v0.4.0 protected
41 results

replay-block.md

Blame
  • smith.rs 8.19 KiB
    use crate::*;
    
    use std::ops::Deref;
    
    type SessionKeys = [u8; 128];
    #[cfg(feature = "gdev")]
    type SmithMembershipMetaData =
    	runtime::runtime_types::common_runtime::entities::SmithMembershipMetaData<SessionKeys>;
    
    /// define smith subcommands
    #[derive(Clone, Default, Debug, clap::Parser)]
    pub enum Subcommand {
    	/// Request smith membership
    	Request { endpoint: String },
    	/// Emit a smith certification
    	Cert { to: u32 },
    	/// Claim smith membership
    	Claim,
    	/// Renew smith membership
    	Renew,
    	/// go online
    	GoOnline,
    	/// go offline
    	#[default]
    	GoOffline,
    	/// Rotate and set session keys
    	UpdateKeys,
    	/// set sudo keys
    	SudoSetKey { new_key: AccountId },
    	/// List upcoming expirations that require an action
    	ShowExpire {
    		/// Show certs that expire within less than this number of blocks
    		#[clap(short, long, default_value_t = 100800)]
    		blocks: u32,
    		/// Show authorities that should rotate keys within less than this number of sessions
    		#[clap(short, long, default_value_t = 100)]
    		sessions: u32,
    	},
    	/// List online authorities
    	ShowOnline,
    	/// count of smith member
    	MemberCount,
    }
    
    /// handle smith commands
    pub async fn handle_command(data: Data, command: Subcommand) -> anyhow::Result<()> {
    	let mut data = data.build_client().await?;
    	match command {
    		Subcommand::Request { endpoint } => {
    			request_smith_membership(&data, endpoint).await?;
    		}
    		Subcommand::Claim => {
    			claim_smith_membership(&data).await?;
    		}
    		Subcommand::Renew => {
    			renew_smith_membership(&data).await?;
    		}
    		Subcommand::GoOnline => {
    			go_online(&data).await?;
    		}
    		Subcommand::GoOffline => {
    			go_offline(&data).await?;
    		}
    		Subcommand::Cert { to } => {
    			data = data.fetch_idty_index().await?;
    			cert(&data, to).await?
    		}
    		Subcommand::UpdateKeys => {
    			update_session_keys(&data).await?;
    		}
    		Subcommand::SudoSetKey { new_key } => {
    			data = data.build_client().await?;
    			commands::sudo::set_key(&data, new_key).await?;
    		}
    		Subcommand::ShowExpire { blocks, sessions } => {
    			data = data.build_client().await?.build_indexer().await?;
    			commands::expire::monitor_expirations(&data, blocks, sessions).await?
    		}
    		Subcommand::ShowOnline => {
    			data = data.build_client().await?;
    			online(&data).await?
    		}
    		Subcommand::MemberCount => {
    			println!(
    				"smith member count: {:?}",
    				data.client()
    					.storage()
    					.fetch(
    						&runtime::storage()
    							.smith_membership()
    							.counter_for_membership(),
    						None,
    					)
    					.await?
    			)
    		}
    	};
    
    	Ok(())
    }
    
    /// rotate session keys
    /// (needs to be connected to unsafe RPC)
    pub async fn rotate_keys(client: &Client) -> Result<SessionKeys, anyhow::Error> {
    	client
    		.rpc()
    		.rotate_keys()
    		.await
    		.map_err(|e| {
    			anyhow!(
    				"Please make sure you are connected to your validator node with the unsafe RPC \
    				 API enabled {e}"
    			)
    		})?
    		.deref()
    		.try_into()
    		.map_err(|e| anyhow!("Session keys have wrong length: {:?}", e))
    }
    
    /// request smith membership
    pub async fn request_smith_membership(data: &Data, endpoint: String) -> Result<(), anyhow::Error> {
    	let session_keys = rotate_keys(data.client()).await?;
    	let metadata = SmithMembershipMetaData {
    		session_keys,
    		owner_key: data.address(),
    		p2p_endpoint: endpoint,
    	};
    	let progress = data
    		.client()
    		.tx()
    		.sign_and_submit_then_watch(
    			&runtime::tx()
    				.smith_membership()
    				.request_membership(metadata),
    			&PairSigner::new(data.keypair()),
    			BaseExtrinsicParamsBuilder::new(),
    		)
    		.await?;
    
    	if data.args.no_wait {
    		return Ok(());
    	}
    	let events = track_progress(progress).await?;
    	let request = events.find_first::<runtime::smith_membership::events::MembershipRequested>()?;
    	if let Some(event) = request {
    		println!("{event:?}");
    	}
    	Ok(())
    }
    
    /// set session keys
    pub async fn set_session_keys(
    	data: &Data,
    	session_keys: SessionKeys,
    ) -> Result<TxProgress, subxt::Error> {
    	data.client()
    		.tx()
    		.sign_and_submit_then_watch(
    			&runtime::tx()
    				.authority_members()
    				.set_session_keys(session_keys),
    			&PairSigner::new(data.keypair()),
    			BaseExtrinsicParamsBuilder::new(),
    		)
    		.await
    }
    
    /// update session keys
    pub async fn update_session_keys(data: &Data) -> Result<(), GcliError> {
    	let session_keys = rotate_keys(data.client()).await?;
    	let progress = set_session_keys(data, session_keys).await?;
    
    	if data.args.no_wait {
    		return Ok(());
    	}
    	let _ = track_progress(progress).await?; // TODO
    	Ok(())
    }
    
    /// submit go_online
    pub async fn go_online(data: &Data) -> Result<(), GcliError> {
    	if data
    		.client()
    		.storage()
    		.fetch(
    			&runtime::storage().session().next_keys(data.address()),
    			None,
    		)
    		.await?
    		.is_none()
    	{
    		return Err(GcliError::Logic(
    			"This account has not set session keys!".to_string(),
    		));
    	}
    
    	submit_call_and_look_event::<
    		runtime::authority_members::events::MemberGoOnline,
    		StaticTxPayload<runtime::authority_members::calls::GoOnline>,
    	>(data, &runtime::tx().authority_members().go_online())
    	.await
    	.map_err(|e| e.into())
    }
    
    /// claim smith membership
    pub async fn claim_smith_membership(data: &Data) -> Result<(), subxt::Error> {
    	submit_call_and_look_event::<
    		runtime::smith_membership::events::MembershipAcquired,
    		StaticTxPayload<runtime::smith_membership::calls::ClaimMembership>,
    	>(data, &runtime::tx().smith_membership().claim_membership())
    	.await
    }
    
    /// renew smith membership
    pub async fn renew_smith_membership(data: &Data) -> Result<(), subxt::Error> {
    	submit_call_and_look_event::<
    		runtime::smith_membership::events::MembershipRenewed,
    		StaticTxPayload<runtime::smith_membership::calls::RenewMembership>,
    	>(data, &runtime::tx().smith_membership().renew_membership())
    	.await
    }
    
    /// submit go_offline
    pub async fn go_offline(data: &Data) -> Result<(), subxt::Error> {
    	submit_call_and_look_event::<
    		runtime::authority_members::events::MemberGoOffline,
    		StaticTxPayload<runtime::authority_members::calls::GoOffline>,
    	>(data, &runtime::tx().authority_members().go_offline())
    	.await
    }
    
    /// get online authorities
    pub async fn online(data: &Data) -> Result<(), anyhow::Error> {
    	let client = data.client();
    	let indexer = data.indexer.clone();
    
    	let parent_hash = client
    		.clone()
    		.storage()
    		.fetch(&runtime::storage().system().parent_hash(), None)
    		.await?
    		.unwrap();
    
    	let mut identity_cache = cache::IdentityCache::new(client.clone(), indexer);
    
    	let online_authorities = client
    		.storage()
    		.fetch(
    			&runtime::storage().authority_members().online_authorities(),
    			Some(parent_hash),
    		)
    		.await?
    		.unwrap_or_default();
    
    	println!("Online:");
    	for identity_id in online_authorities {
    		println!(
    			"  {}",
    			identity_cache
    				.fetch_identity(identity_id, parent_hash)
    				.await
    				.unwrap_or_else(|_| format!("{identity_id}"))
    		);
    	}
    
    	let incoming_authorities = client
    		.storage()
    		.fetch(
    			&runtime::storage()
    				.authority_members()
    				.incoming_authorities(),
    			Some(parent_hash),
    		)
    		.await?
    		.unwrap_or_default();
    
    	println!("Incoming:");
    	for identity_id in incoming_authorities {
    		println!(
    			"  {}",
    			identity_cache
    				.fetch_identity(identity_id, parent_hash)
    				.await
    				.unwrap_or_else(|_| format!("{identity_id}"))
    		);
    	}
    
    	let outgoing_authorities = client
    		.storage()
    		.fetch(
    			&runtime::storage()
    				.authority_members()
    				.outgoing_authorities(),
    			Some(parent_hash),
    		)
    		.await?
    		.unwrap_or_default();
    
    	println!("Outgoing:");
    	for identity_id in outgoing_authorities {
    		println!(
    			"  {}",
    			identity_cache
    				.fetch_identity(identity_id, parent_hash)
    				.await
    				.unwrap_or_else(|_| format!("{identity_id}"))
    		);
    	}
    
    	Ok(())
    }
    
    /// submit a certification and track progress
    pub async fn cert(data: &Data, receiver: u32) -> Result<(), anyhow::Error> {
    	let progress = data
    		.client()
    		.tx()
    		.sign_and_submit_then_watch(
    			&runtime::tx()
    				.smith_cert()
    				.add_cert(data.idty_index(), receiver),
    			&PairSigner::new(data.keypair()),
    			BaseExtrinsicParamsBuilder::new(),
    		)
    		.await?;
    
    	if data.args.no_wait {
    		return Ok(());
    	}
    	let events = track_progress(progress).await?;
    
    	// look for the expected event
    	let new_cert_event = events.find_first::<runtime::smith_cert::events::NewCert>()?;
    	let renew_cert_event = events.find_first::<runtime::smith_cert::events::RenewedCert>()?;
    
    	if let Some(event) = new_cert_event {
    		println!("{event:?}");
    	}
    	if let Some(event) = renew_cert_event {
    		println!("{event:?}");
    	}
    
    	Ok(())
    }