Skip to content
Snippets Groups Projects

Compare revisions

Changes are shown as if the source revision was being merged into the target revision. Learn more about comparing revisions.

Source

Select target project
No results found

Target

Select target project
  • nodes/rust/duniter-v2s
  • llaq/lc-core-substrate
  • pini-gh/duniter-v2s
  • vincentux/duniter-v2s
  • mildred/duniter-v2s
  • d0p1/duniter-v2s
  • bgallois/duniter-v2s
  • Nicolas80/duniter-v2s
8 results
Show changes
Commits on Source (36)
Showing
with 541 additions and 238 deletions
......@@ -38,7 +38,7 @@ check_labels:
- ./scripts/check_labels.sh $CI_MERGE_REQUEST_LABELS $CI_MERGE_REQUEST_MILESTONE
.env:
image: paritytech/ci-linux:production
image: paritytech/ci-linux:1.68.2-buster
tags:
- dind
......
# Contributing
Before contributing, please make sure that your development environment is properly configured by following this tutorial :
Before contributing, please make sure that your development environment is properly configured by following this tutorial:
[Setting up your development environment]
Sign-ups on our gitlab are disabled. If you would like to contribute, please ask for its creation on [the technical forum].
Sign-ups on our gitlab are disabled. If you would like to contribute, please ask for an account on [the technical forum].
When contributing to this repository, please first discuss the change you wish to make via issue or
via [the technical forum] before making a change.
......@@ -13,13 +13,15 @@ Please note we have a specific workflow, please follow it in all your interactio
## Developer documentation
Please read [Developer documentation] before contribute.
Please read [Developer documentation] before contributing.
## Workflow
- If there is an unassigned issue about the thing you want to contribute to, assign the issue to yourself.
- Create a branch based on `master` and prefixed with your nickname. Give your branch a short name indicating the subject.
- Create an MR from your branch to `master`.
- Never contribute to a branch of another contributor! If the contributor makes a `git rebase` your commit will be lost!
- Create an MR from your branch to `master`. Prefix the title with `Draft: ` until it's ready to be merged.
- If the MR is related to an issue, mention the issue in the description using the `#42` syntax.
- Never push to a branch of another contributor! If the contributor makes a `git rebase` your commit will be lost!
- Before you push your commit:
- Apply formatters (rustfmt and prettier) and linter (clippy)
- Document your code
......@@ -30,14 +32,15 @@ Please read [Developer documentation] before contribute.
1. Ensure you rebased your branch on the latest `master` commit to avoid any merge conflicts.
1. Ensure that you respect the [commit naming conventions].
1. Ensure that all automated tests pass with the `cargo test` command.
1. Ensure that the code is well formated `cargo fmt` and comply with the good practices `cargo clippy`. If you have been working on tests, check everything with `cargo clippy --all --tests`.
1. Ensure that the code is well formatted `cargo fmt` and complies with the good practices `cargo clippy`. If you have been working on tests, check everything with `cargo clippy --all --tests`.
1. Update the documentation with details of changes to the interface, this includes new environment variables, exposed ports, useful file locations and container parameters.
1. Push your branch on the gitlab and create a merge request. Briefly explain the purpose of your contribution in the description of the merge request.
1. Tag a Duniter reviewer so they will review your contribution. If you still have no news after several weeks, tag another reviewer or/and talk about your contribution on [the technical forum].
1. Mark the MR as ready (or remove the `Draft: ` prefix) only when you think it can be reviewed or merged.
1. Assign a Duniter reviewer so they will review your contribution. If you still have no news after several weeks, ask explicitly for a review, or tag another reviewer or/and talk about your contribution on [the technical forum].
## List of Duniter's reviewers
- @librelois
- @HugoTrentesaux
- @tuxmain
[commit naming conventions]: ./docs/dev/git-conventions.md#naming-commits
......
......@@ -877,21 +877,26 @@ dependencies = [
"pallet-babe",
"pallet-balances",
"pallet-certification",
"pallet-collective",
"pallet-duniter-account",
"pallet-duniter-wot",
"pallet-grandpa",
"pallet-identity",
"pallet-im-online",
"pallet-membership",
"pallet-multisig",
"pallet-oneshot-account",
"pallet-preimage",
"pallet-provide-randomness",
"pallet-proxy",
"pallet-scheduler",
"pallet-session",
"pallet-session-benchmarking",
"pallet-timestamp",
"pallet-treasury",
"pallet-universal-dividend",
"pallet-upgrade-origin",
"pallet-utility",
"parity-scale-codec",
"scale-info",
"serde",
......@@ -2578,6 +2583,7 @@ dependencies = [
"pallet-proxy",
"pallet-scheduler",
"pallet-session",
"pallet-session-benchmarking",
"pallet-sudo",
"pallet-timestamp",
"pallet-transaction-payment",
......@@ -5234,6 +5240,7 @@ dependencies = [
"serde",
"sp-core",
"sp-io",
"sp-keystore",
"sp-runtime",
"sp-std",
]
......@@ -5351,6 +5358,7 @@ dependencies = [
"frame-benchmarking",
"frame-support",
"frame-system",
"pallet-balances",
"parity-scale-codec",
"scale-info",
"sp-core",
......@@ -5411,6 +5419,26 @@ dependencies = [
"sp-trie",
]
[[package]]
name = "pallet-session-benchmarking"
version = "4.0.0-dev"
dependencies = [
"frame-benchmarking",
"frame-support",
"frame-system",
"pallet-authority-members",
"pallet-balances",
"pallet-session",
"pallet-timestamp",
"parity-scale-codec",
"scale-info",
"sp-core",
"sp-io",
"sp-runtime",
"sp-session",
"sp-std",
]
[[package]]
name = "pallet-sudo"
version = "4.0.0-dev"
......
......@@ -205,6 +205,7 @@ yamux = { opt-level = 3 }
zeroize = { opt-level = 3 }
[profile.release]
lto = "thin"
# Substrate runtime requires unwinding.
panic = "unwind"
......
......@@ -21,8 +21,7 @@ RUN test -x build/duniter || \
ARG threads=1
RUN test -x build/duniter || \
( \
CARGO_PROFILE_RELEASE_LTO="true" \
cargo build --release -j $threads && \
cargo build --release -j $threads && \
mkdir -p build && \
mv target/release/duniter build/ \
)
......
......@@ -13,7 +13,7 @@ through on-chain governance mechanisms.
## User calls
There are **68** user calls from **21** pallets.
There are **69** user calls from **21** pallets.
### Scheduler - 2
......@@ -652,12 +652,23 @@ change sufficient ref count for given key
### Membership - 42
#### renew_membership - 3
#### claim_membership - 1
<details><summary><code>renew_membership(maybe_idty_id)</code></summary>
<details><summary><code>claim_membership()</code></summary>
```rust
```
</details>
claim pending membership to become actual memberhip
the requested membership must fullfill requirements
#### renew_membership - 2
<details><summary><code>renew_membership()</code></summary>
```rust
maybe_idty_id: Option<T::IdtyId>
```
</details>
......@@ -666,7 +677,7 @@ extend the validity period of an active membership
### Cert - 43
#### add_cert - 1
#### add_cert - 0
<details><summary><code>add_cert(issuer, receiver)</code></summary>
......@@ -683,9 +694,9 @@ Add a new certification or renew an existing one
The origin must be allow to certify.
### SmithsMembership - 52
### SmithMembership - 52
#### request_membership - 1
#### request_membership - 0
<details><summary><code>request_membership(metadata)</code></summary>
......@@ -698,37 +709,34 @@ metadata: T::MetaData
submit a membership request (must have a declared identity)
(only available for sub wot, automatic for main wot)
#### claim_membership - 2
#### claim_membership - 1
<details><summary><code>claim_membership(maybe_idty_id)</code></summary>
<details><summary><code>claim_membership()</code></summary>
```rust
maybe_idty_id: Option<T::IdtyId>
```
</details>
claim that the previously requested membership fullfills the requirements
(only available for sub wot, automatic for main wot)
claim pending membership to become actual memberhip
the requested membership must fullfill requirements
#### renew_membership - 3
#### renew_membership - 2
<details><summary><code>renew_membership(maybe_idty_id)</code></summary>
<details><summary><code>renew_membership()</code></summary>
```rust
maybe_idty_id: Option<T::IdtyId>
```
</details>
extend the validity period of an active membership
#### revoke_membership - 4
#### revoke_membership - 3
<details><summary><code>revoke_membership(maybe_idty_id)</code></summary>
<details><summary><code>revoke_membership()</code></summary>
```rust
maybe_idty_id: Option<T::IdtyId>
```
</details>
......@@ -736,9 +744,9 @@ maybe_idty_id: Option<T::IdtyId>
revoke an active membership
(only available for sub wot, automatic for main wot)
### SmithsCert - 53
### SmithCert - 53
#### add_cert - 1
#### add_cert - 0
<details><summary><code>add_cert(issuer, receiver)</code></summary>
......@@ -1353,7 +1361,7 @@ May only be called from `T::RejectOrigin`.
## Root calls
There are **26** root calls from **12** pallets.
There are **22** root calls from **10** pallets.
### System - 0
......@@ -1637,38 +1645,9 @@ names: Vec<IdtyName>
remove identity names from storage
### Membership - 42
#### force_request_membership - 0
<details><summary><code>force_request_membership(idty_id, metadata)</code></summary>
```rust
idty_id: T::IdtyId
metadata: T::MetaData
```
</details>
request membership without checks
### Cert - 43
#### force_add_cert - 0
<details><summary><code>force_add_cert(issuer, receiver, verify_rules)</code></summary>
```rust
issuer: T::IdtyIndex
receiver: T::IdtyIndex
verify_rules: bool
```
</details>
add a certification without checks (only root)
#### del_cert - 2
#### del_cert - 1
<details><summary><code>del_cert(issuer, receiver)</code></summary>
......@@ -1681,7 +1660,7 @@ receiver: T::IdtyIndex
remove a certification (only root)
#### remove_all_certs_received_by - 3
#### remove_all_certs_received_by - 2
<details><summary><code>remove_all_certs_received_by(idty_index)</code></summary>
......@@ -1693,38 +1672,9 @@ idty_index: T::IdtyIndex
remove all certifications received by an identity (only root)
### SmithsMembership - 52
### SmithCert - 53
#### force_request_membership - 0
<details><summary><code>force_request_membership(idty_id, metadata)</code></summary>
```rust
idty_id: T::IdtyId
metadata: T::MetaData
```
</details>
request membership without checks
### SmithsCert - 53
#### force_add_cert - 0
<details><summary><code>force_add_cert(issuer, receiver, verify_rules)</code></summary>
```rust
issuer: T::IdtyIndex
receiver: T::IdtyIndex
verify_rules: bool
```
</details>
add a certification without checks (only root)
#### del_cert - 2
#### del_cert - 1
<details><summary><code>del_cert(issuer, receiver)</code></summary>
......@@ -1737,7 +1687,7 @@ receiver: T::IdtyIndex
remove a certification (only root)
#### remove_all_certs_received_by - 3
#### remove_all_certs_received_by - 2
<details><summary><code>remove_all_certs_received_by(idty_index)</code></summary>
......@@ -1774,7 +1724,7 @@ The dispatch origin for this call must be _Root_.
## Disabled calls
There are **7** disabled calls from **3** pallets.
There are **6** disabled calls from **3** pallets.
### System - 0
......@@ -1844,7 +1794,7 @@ usually means being a stash account).
### Membership - 42
#### request_membership - 1
#### request_membership - 0
<details><summary><code>request_membership(metadata)</code></summary>
......@@ -1857,25 +1807,11 @@ metadata: T::MetaData
submit a membership request (must have a declared identity)
(only available for sub wot, automatic for main wot)
#### claim_membership - 2
<details><summary><code>claim_membership(maybe_idty_id)</code></summary>
```rust
maybe_idty_id: Option<T::IdtyId>
```
</details>
claim that the previously requested membership fullfills the requirements
(only available for sub wot, automatic for main wot)
#### revoke_membership - 4
#### revoke_membership - 3
<details><summary><code>revoke_membership(maybe_idty_id)</code></summary>
<details><summary><code>revoke_membership()</code></summary>
```rust
maybe_idty_id: Option<T::IdtyId>
```
</details>
......
......@@ -14,21 +14,35 @@ The cross compiled binary is generated here: `target/armv7-unknown-linux-gnueab
## How to benchmarks weights of a Call/Hook/Pallet
1. Create the benchmarking tests, see commit 31057e37be471e3f27d18c63818d57cc907b4b4f for a
1. Create the benchmarking tests. See commit f5f2ae969ac592ba9957b0e40e18d6e4b0048473 for a
complete real example.
2. Run the benchmark test on your local machine:
`cargo test -p <pallet> --features runtime-benchmarks`
```
cargo test -p <pallet> --features runtime-benchmarks
```
3. If the benchmark tests compiles and pass, compile the binary with benchmarks on your local
machine: `cargo build --release --features runtime-benchmarks`
4. Run the benchmarks on your local machine (to test if it work with a real runtime). The command
is: `duniter benchmark pallet --chain=CURRENCY-dev --steps=50 --repeat=20 --pallet=pallet_universal_dividend --extrinsic=* --execution=wasm --wasm-execution=compiled --heap-pages=4096 --header=./file_header.txt --output=.`
5. If it worked, use the generated file content to create or update the `WeightInfo` trait and the `()` dummy implementation. Then use the `WeightInfo` tarit in the real code of the pallet. See 79e0fd4bf3b0579279fc957da5e2fdfc6d8a17fa for a
complete real example.
machine:
```
cargo build --release --features runtime-benchmarks
```
4. Run the benchmarks on your local machine (to test if it work with a real runtime). See 0d1232cd0d8b5809e1586b48376f8952cebc0d27 for a complete real example. The command is:
```
duniter benchmark pallet --chain=CHAINSPEC --steps=50 --repeat=20 --pallet=<pallet> --extrinsic=* --execution=wasm --wasm-execution=compiled --heap-pages=4096 --header=./file_header.txt --output=./runtime/common/src/weights/
```
5. Use the generated file content to create the `WeightInfo` trait and the `()` dummy implementation in `pallets/<pallet>/src/weights.rs`. Then use the `WeightInfo` trait in the real code of the pallet. See 62dcc17f2c0b922e883fbc6337a9e7da97fc3218 for a complete real example.
6. Redo steps `3.` and `4.` on the reference machine.
7. Put the generated file on `runtime/common/src/weights` and use it in the runtimes configuration.
See cee7c3b2763ba402e807f126534d9cd39a8bd025 for a complete real example.
Note 1: You *must* replace `CURRENCY` by the currency type, or for ĞDev use directly `--chain=dev`.
7. Use the `runtime/common/src/weights/pallet_<pallet>.rs` generated on the reference machine in the runtimes configuration. See af62a3b9cfc42d6653b3a957836f58540c18e65a for a complete real example.
Note 1: Use relevant chainspec for the benchmarks in place of `CHAINSPEC`. For example `--chain=gdev-benchmark` has already created identities that can be confirmed by pallet identity
Note 2: If the reference machine does not support wasmtime, you should replace `--wasm-execution=compiled`
by `--wasm-execution=interpreted-i-know-what-i-do`.
......@@ -39,7 +53,7 @@ by `--wasm-execution=interpreted-i-know-what-i-do`.
2. Run base block benchmarks command:
```
./duniter benchmark overhead --chain=gdev --execution=wasm --wasm-execution=interpreted-i-know-what-i-do --weight-path=. --warmup=10 --repeat=100
duniter benchmark overhead --chain=gdev --execution=wasm --wasm-execution=interpreted-i-know-what-i-do --weight-path=. --warmup=10 --repeat=100
```
3. Copy the generated file `block_weights.rs` in the codebase in folder `runtime/common/src/weights/`.
......@@ -52,7 +66,7 @@ by `--wasm-execution=interpreted-i-know-what-i-do`.
3. Run storage benchmarks command, example:
```
./duniter benchmark storage -d=/mnt/ssd1/duniter-v2s/t1 --chain=gdev --mul=2 --weight-path=. --state-version=1
duniter benchmark storage -d=/mnt/ssd1/duniter-v2s/t1 --chain=gdev --mul=2 --weight-path=. --state-version=1
```
4. Copy the generated file `paritydb_weights.rs` in the codebase in folder `runtime/common/src/weights/`.
......
......@@ -12,30 +12,36 @@ See [nginx reverse proxy](./nginx_reverse_proxy.md).
## Join the Smith WoT
- add polkadot webextension to be able to authentificate with your account.
- Go to [any node with polkadotjs ui](https://gdev.1000i100.fr/dev-ui/?rpc=wss://gdev.1000i100.fr/ws)
- Ask to join Smith WoT (you need to already be in the main WoT)
- developer > extrinsics > YOUR_SMITH_ACCOUNT > smithMembership > requestMemberShip(metadata)
Only members of the smith WoT can author blocks. This WoT is a subset of the main WoT, hence before joining it you need to join the main WoT.
1. Create an SSH bridge from your computer to your server: `ssh -L 9945:localhost:9945 SSH_USER@YOUR_SERVER`
2. Install PolkadotJS browser extension. It will manage your private keys and known pubkeys safely.
3. Go to [a PolkadotJS web UI](https://polkadot.js.org/apps/?rpc=ws://127.0.0.1/ws:9945). (it's not the same thing as the browser extension)
- If using another port or address, change it accordingly in the left panel.
4. In the UI: developer > RPC call > author > rotateKeys() and copy the result in clipboard
5. In the UI: developer > extrinsics > YOUR_SMITH_ACCOUNT > smithMembership > requestMembership(metadata)
- add your p2p endpoint (optional)
- add your session key (follow point 1 to 4 from Validate blocks > Generate and publish your session key)
- Send the query
- Await smith certification : developer > extrinsics > CERTIFIER_SMITH_ACCOUNT > smithCert > addCert(receiver)
- add your session keys
- send the query
6. Wait 48h to ensure your node keeps sync (**both** best **and** finalized block numbers must increase every 6s)
7. Await at least 3 smith certifications. Members of the smith WoT can certify you with this extrinsic:
- In the UI: developer > extrinsics > CERTIFIER_SMITH_ACCOUNT > smithCert > addCert(receiver)
- This is not automatic, you can ask for certs on the forum or the Matrix chatroom.
8. In the UI: developer > extrinsics > YOUR_SMITH_ACCOUNT > smithMembership > claimMembership(maybe_idty_id)
- maybe_idty_id can be left empty since your identity id will be infered from your account address.
When you have at least 3 certifications, your'in!
All extrinsics can be sent while connected to any Duniter node, but the RPC calls need a direct connection to your server. As some RPC calls should not be publicly callable for security reasons, the only ways to call them is from the server localhost or using an SSH bridge or other kind of secure tunnel.
rotateKeys can be called anytime you want. Then you have to call setSessionKeys with the new keys.
## Validate blocks (blacksmith work)
- Generate and publish your session keys
1. create an ssh bridge from your desktop/laptop to your server : `ssh -L 9945:localhost:9945 SSH_USER@YOUR_SERVER`
2. In your browser go to [polkadotjs : ws://localhost:9945](https://polkadot.js.org/apps/?rpc=ws%3A%2F%2Flocalhost%3A9945#/explorer)
3. In the UI : developer > appel RPC > author > rotateKey() and copy the result in clipboard
4. In the UI : developer > extrinsics > YOUR_SMITH_ACCOUNT > authorityMembers > setSessionKeys(keys) then paste your session keys and run the query.
5. In the UI : developer > extrinsics > YOUR_SMITH_ACCOUNT > authorityMembers > claimMembership(keys)
6. **wait 48h to verify you keep sync**
- Join
- In the UI : developer > extrinsics > YOUR_SMITH_ACCOUNT > authorityMembers > goOnline()
If you're not able to monitor, reboot, act on your node, goOffline() to avoid penality to the blockchain and to you.
Once all the previous steps are completed, you can start to actually author blocks.
1. In the UI: developer > extrinsics > YOUR_SMITH_ACCOUNT > authorityMembers > goOnline()
2. Every less than 2 months, make the RPC call author.rotateKeys then the extrinsic authorityMembers.setSessionKeys.
If you're not able to monitor, reboot, act on your node, goOffline() to avoid penalty to the blockchain and to you. It will take effect after 2h, so please do it in advance if you plan to disconnect your server soon. goOnline can always be called after this, but after 100 days without authoring blocks you will loose your smith membership.
## Upgrade your node with minimal interruption
......
......@@ -5,11 +5,21 @@ Feature: Identity creation
# - account creation fees (3 ĞD)
# - existential deposit (2 ĞD)
# - transaction fees (below 1 ĞD)
When alice sends 6 ĞD to ferdie
When alice sends 6 ĞD to dave
When bob sends 6 ĞD to eve
# alice last certification is counted from block zero
# then next cert can be done after cert_period
# then next cert can be done after cert_period, which is 15
When 15 block later
When alice creates identity for ferdie
Then ferdie identity should be created
When ferdie confirms his identity with pseudo "Ferdie"
Then ferdie identity should be confirmed
When alice creates identity for dave
Then dave identity should be created
Then dave should be certified by alice
When dave confirms his identity with pseudo "dave"
Then dave identity should be confirmed
When 3 block later
When bob certifies dave
When charlie certifies dave
Then dave should be certified by bob
Then dave should be certified by charlie
When 3 block later
When eve validates dave identity
Then dave identity should be validated
......@@ -44,8 +44,8 @@
"smith_cert_validity_period": 1000,
"smith_membership_period": 1000,
"smith_pending_membership_period": 500,
"smiths_wot_first_cert_issuable_on": 20,
"smiths_wot_min_cert_for_membership": 2,
"smith_wot_first_cert_issuable_on": 20,
"smith_wot_min_cert_for_membership": 2,
"wot_first_cert_issuable_on": 20,
"wot_min_cert_for_create_idty_right": 2,
"wot_min_cert_for_membership": 2
......
......@@ -47,8 +47,8 @@
"smith_cert_validity_period": 1000,
"smith_membership_period": 1000,
"smith_pending_membership_period": 500,
"smiths_wot_first_cert_issuable_on": 20,
"smiths_wot_min_cert_for_membership": 2,
"smith_wot_first_cert_issuable_on": 20,
"smith_wot_min_cert_for_membership": 2,
"wot_first_cert_issuable_on": 20,
"wot_min_cert_for_create_idty_right": 2,
"wot_min_cert_for_membership": 2
......
......@@ -72,8 +72,27 @@ pub async fn confirm_identity(client: &Client, from: AccountKeyring, pseudo: Str
Ok(())
}
// get identity value from account keyring name
pub async fn get_identity_value(world: &mut DuniterWorld, account: String) -> Result<IdtyValue> {
pub async fn validate_identity(client: &Client, from: AccountKeyring, to: u32) -> Result<()> {
let from = PairSigner::new(from.pair());
let _events = create_block_with_extrinsic(
client,
client
.tx()
.create_signed(
&gdev::tx().identity().validate_identity(to),
&from,
BaseExtrinsicParamsBuilder::new(),
)
.await?,
)
.await?;
Ok(())
}
// get identity index from account keyring name
pub async fn get_identity_index(world: &mut DuniterWorld, account: String) -> Result<u32> {
let account = AccountKeyring::from_str(&account)
.expect("unknown account")
.to_account_id();
......@@ -84,6 +103,12 @@ pub async fn get_identity_value(world: &mut DuniterWorld, account: String) -> Re
.ok_or_else(|| anyhow::anyhow!("identity {} has no associated index", account))
.unwrap();
Ok(identity_index)
}
// get identity value from account keyring name
pub async fn get_identity_value(world: &mut DuniterWorld, account: String) -> Result<IdtyValue> {
let identity_index = get_identity_index(world, account).await.unwrap();
let identity_value = world
.read(&gdev::storage().identity().identities(identity_index))
.await?
......
......@@ -21,7 +21,10 @@ pub mod cert;
pub mod identity;
pub mod oneshot;
#[subxt::subxt(runtime_metadata_path = "../resources/metadata.scale")]
#[subxt::subxt(
runtime_metadata_path = "../resources/metadata.scale",
derive_for_all_types = "Eq, PartialEq"
)]
pub mod gdev {}
use anyhow::anyhow;
......
......@@ -313,6 +313,15 @@ async fn confirm_identity(world: &mut DuniterWorld, from: String, pseudo: String
common::identity::confirm_identity(world.client(), from, pseudo).await
}
#[when(regex = r#"([a-zA-Z]+) validates ([a-zA-Z]+) identity"#)]
async fn validate_identity(world: &mut DuniterWorld, from: String, to: String) -> Result<()> {
// input names to keyrings
let from = AccountKeyring::from_str(&from).expect("unknown from");
let to: u32 = common::identity::get_identity_index(world, to).await?;
common::identity::validate_identity(world.client(), from, to).await
}
// ===== then ====
#[then(regex = r"([a-zA-Z]+) should have (\d+) (ĞD|cĞD)")]
......@@ -416,7 +425,7 @@ async fn should_be_certified_by(
.await?;
// look for certification by issuer/receiver pair
match issuers.binary_search_by(|(issuer_, _)| issuer_index.cmp(issuer_)) {
match issuers.binary_search_by(|(issuer_, _)| issuer_.cmp(&issuer_index)) {
Ok(_) => Ok(()),
Err(_) => Err(anyhow::anyhow!(
"no certification found from {} to {}: {:?}",
......@@ -430,28 +439,30 @@ async fn should_be_certified_by(
use gdev::runtime_types::pallet_identity::types::IdtyStatus;
#[then(regex = r"([a-zA-Z]+) identity should be created")]
async fn identity_should_be_created(world: &mut DuniterWorld, receiver: String) -> Result<()> {
let identity_value = common::identity::get_identity_value(world, receiver).await?;
// status from string
impl FromStr for IdtyStatus {
type Err = String;
match identity_value.status {
IdtyStatus::Created => Ok(()),
IdtyStatus::ConfirmedByOwner | IdtyStatus::Validated => {
Err(anyhow::anyhow!("status not created").into())
fn from_str(input: &str) -> std::result::Result<IdtyStatus, String> {
match input {
"created" => Ok(IdtyStatus::Created),
"confirmed" => Ok(IdtyStatus::ConfirmedByOwner),
"validated" => Ok(IdtyStatus::Validated),
_ => Err(format!("'{input}' does not match a status")),
}
}
}
#[then(regex = r"([a-zA-Z]+) identity should be confirmed")]
async fn identity_should_be_confirmed(world: &mut DuniterWorld, name: String) -> Result<()> {
#[then(regex = r"([a-zA-Z]+) identity should be ([a-zA-Z ]+)")]
async fn identity_status_should_be(
world: &mut DuniterWorld,
name: String,
status: String,
) -> Result<()> {
let identity_value = common::identity::get_identity_value(world, name).await?;
match identity_value.status {
IdtyStatus::ConfirmedByOwner => Ok(()),
IdtyStatus::Created | IdtyStatus::Validated => {
Err(anyhow::anyhow!("status not confirmed by owner").into())
}
}
let expected_status = IdtyStatus::from_str(&status)?;
assert_eq!(identity_value.status, expected_status);
Ok(())
}
// ============================================================
......
......@@ -19,10 +19,10 @@ use common_runtime::constants::*;
use common_runtime::entities::IdtyData;
use common_runtime::*;
use gdev_runtime::{
opaque::SessionKeys, AccountConfig, AccountId, AuthorityMembersConfig, BabeConfig,
BalancesConfig, CertConfig, GenesisConfig, IdentityConfig, ImOnlineId, MembershipConfig,
ParametersConfig, SessionConfig, SmithsCertConfig, SmithsMembershipConfig, SudoConfig,
SystemConfig, TechnicalCommitteeConfig, UniversalDividendConfig, WASM_BINARY,
opaque::SessionKeys, AccountConfig, AccountId, AuthorityMembersConfig, BabeConfig, CertConfig,
GenesisConfig, IdentityConfig, ImOnlineId, MembershipConfig, ParametersConfig, SessionConfig,
SmithCertConfig, SmithMembershipConfig, SudoConfig, SystemConfig, TechnicalCommitteeConfig,
UniversalDividendConfig, WASM_BINARY,
};
use sc_service::ChainType;
use sp_authority_discovery::AuthorityId as AuthorityDiscoveryId;
......@@ -34,8 +34,8 @@ use std::collections::BTreeMap;
pub type AuthorityKeys = (
AccountId,
BabeId,
GrandpaId,
BabeId,
ImOnlineId,
AuthorityDiscoveryId,
);
......@@ -53,16 +53,51 @@ const TOKEN_SYMBOL: &str = "ĞD";
pub fn get_authority_keys_from_seed(s: &str) -> AuthorityKeys {
(
get_account_id_from_seed::<sr25519::Public>(s),
get_from_seed::<BabeId>(s),
get_from_seed::<GrandpaId>(s),
get_from_seed::<BabeId>(s),
get_from_seed::<ImOnlineId>(s),
get_from_seed::<AuthorityDiscoveryId>(s),
)
}
/// Generate session keys
fn get_session_keys_from_seed(s: &str) -> SessionKeys {
let authority_keys = get_authority_keys_from_seed(s);
session_keys(
authority_keys.1,
authority_keys.2,
authority_keys.3,
authority_keys.4,
)
}
/// get environment variable
fn get_env_u32(env_var_name: &'static str, default_value: u32) -> u32 {
std::env::var(env_var_name)
.map_or(Ok(default_value), |s| s.parse())
.unwrap_or_else(|_| panic!("{} must be a number", env_var_name))
}
/// make session keys struct
fn session_keys(
grandpa: GrandpaId,
babe: BabeId,
im_online: ImOnlineId,
authority_discovery: AuthorityDiscoveryId,
) -> SessionKeys {
SessionKeys {
grandpa,
babe,
im_online,
authority_discovery,
}
}
/// generate development chainspec with Alice validator
pub fn development_chain_spec() -> Result<ChainSpec, String> {
let wasm_binary = WASM_BINARY.ok_or_else(|| "Development wasm not available".to_string())?;
// custom genesis
if std::env::var("DUNITER_GENESIS_CONFIG").is_ok() {
super::gen_genesis_data::generate_genesis_data(
|genesis_data| {
......@@ -71,7 +106,9 @@ pub fn development_chain_spec() -> Result<ChainSpec, String> {
"Development",
// ID
"gdev",
// chain type
sc_service::ChainType::Development,
// constructor
move || genesis_data_to_gdev_genesis_conf(genesis_data.clone(), wasm_binary),
// Bootnodes
vec![],
......@@ -95,21 +132,25 @@ pub fn development_chain_spec() -> Result<ChainSpec, String> {
None,
)
},
Some(get_authority_keys_from_seed("Alice").encode()),
Some(get_session_keys_from_seed("Alice").encode()),
)
} else {
}
// generated genesis
else {
Ok(ChainSpec::from_genesis(
// Name
"Development",
// ID
"gdev",
// chain type
ChainType::Development,
// constructor
move || {
gen_genesis_for_local_chain(
wasm_binary,
// Initial authorities len
1,
// Initial smiths members len
// Initial smith members len
3,
// Inital identities len
4,
......@@ -142,6 +183,54 @@ pub fn development_chain_spec() -> Result<ChainSpec, String> {
}
}
/// generate chainspecs used for benchmarks
pub fn benchmark_chain_spec() -> Result<ChainSpec, String> {
let wasm_binary = WASM_BINARY.ok_or_else(|| "Development wasm not available".to_string())?;
Ok(ChainSpec::from_genesis(
// Name
"Development",
// ID
"gdev-benchmark",
ChainType::Development,
move || {
gen_genesis_for_benchmark_chain(
wasm_binary,
// Initial authorities len
1,
// Initial smiths members len
3,
// Inital identities len
4,
// Sudo account
get_account_id_from_seed::<sr25519::Public>("Alice"),
true,
)
},
// Bootnodes
vec![],
// Telemetry
None,
// Protocol ID
None,
//Fork ID
None,
// Properties
Some(
serde_json::json!({
"tokenDecimals": TOKEN_DECIMALS,
"tokenSymbol": TOKEN_SYMBOL,
})
.as_object()
.expect("must be a map")
.clone(),
),
// Extensions
None,
))
}
/// generate live network chainspecs
pub fn gen_live_conf() -> Result<ChainSpec, String> {
let wasm_binary = WASM_BINARY.ok_or_else(|| "wasm not available".to_string())?;
......@@ -186,6 +275,7 @@ pub fn gen_live_conf() -> Result<ChainSpec, String> {
)
}
/// generate local network chainspects
pub fn local_testnet_config(
initial_authorities_len: usize,
initial_smiths_len: usize,
......@@ -236,6 +326,7 @@ pub fn local_testnet_config(
))
}
/// generate genesis
fn gen_genesis_for_local_chain(
wasm_binary: &[u8],
initial_authorities_len: usize,
......@@ -309,8 +400,8 @@ fn gen_genesis_for_local_chain(
smith_cert_validity_period,
smith_membership_period,
smith_pending_membership_period: 500,
smiths_wot_first_cert_issuable_on: 20,
smiths_wot_min_cert_for_membership: 2,
smith_wot_first_cert_issuable_on: 20,
smith_wot_min_cert_for_membership: 2,
wot_first_cert_issuable_on: 20,
wot_min_cert_for_create_idty_right: 2,
wot_min_cert_for_membership: 2,
......@@ -324,9 +415,7 @@ fn gen_genesis_for_local_chain(
.map(|(i, keys)| (i as u32 + 1, (keys.0.clone(), i < initial_authorities_len)))
.collect(),
},
balances: BalancesConfig {
balances: Default::default(),
},
balances: Default::default(),
babe: BabeConfig {
authorities: Vec::with_capacity(0),
epoch_config: Some(BABE_GENESIS_EPOCH_CONFIG),
......@@ -383,12 +472,12 @@ fn gen_genesis_for_local_chain(
apply_cert_period_at_genesis: false,
certs_by_receiver: clique_wot(initial_identities.len()),
},
smiths_membership: SmithsMembershipConfig {
smith_membership: SmithMembershipConfig {
memberships: (1..=initial_smiths_len)
.map(|i| (i as u32, MembershipData { expire_on: 0 }))
.collect(),
},
smiths_cert: SmithsCertConfig {
smith_cert: SmithCertConfig {
apply_cert_period_at_genesis: false,
certs_by_receiver: clique_wot(initial_smiths_len),
},
......@@ -401,26 +490,195 @@ fn gen_genesis_for_local_chain(
}
}
fn get_env_u32(env_var_name: &'static str, default_value: u32) -> u32 {
std::env::var(env_var_name)
.map_or(Ok(default_value), |s| s.parse())
.unwrap_or_else(|_| panic!("{} must be a number", env_var_name))
}
/// genesis used for benchmark
/// contain identities prepared for testing
fn gen_genesis_for_benchmark_chain(
wasm_binary: &[u8],
initial_authorities_len: usize,
initial_smiths_len: usize,
initial_identities_len: usize,
root_key: AccountId,
_enable_println: bool,
) -> gdev_runtime::GenesisConfig {
assert!(initial_identities_len <= 6);
assert!(initial_smiths_len <= initial_identities_len);
assert!(initial_authorities_len <= initial_smiths_len);
fn session_keys(
babe: BabeId,
grandpa: GrandpaId,
im_online: ImOnlineId,
authority_discovery: AuthorityDiscoveryId,
) -> SessionKeys {
SessionKeys {
babe,
grandpa,
im_online,
authority_discovery,
let babe_epoch_duration = get_env_u32("DUNITER_BABE_EPOCH_DURATION", 30) as u64;
let cert_validity_period = get_env_u32("DUNITER_CERT_VALIDITY_PERIOD", 1_000);
let first_ud = 1_000;
let membership_period = get_env_u32("DUNITER_MEMBERSHIP_PERIOD", 1_000);
let smith_cert_validity_period = get_env_u32("DUNITER_SMITH_CERT_VALIDITY_PERIOD", 1_000);
let smith_membership_period = get_env_u32("DUNITER_SMITH_MEMBERSHIP_PERIOD", 1_000);
let ud_creation_period = get_env_u32("DUNITER_UD_CREATION_PERIOD", 10);
let ud_reeval_period = get_env_u32("DUNITER_UD_REEEVAL_PERIOD", 200);
let initial_smiths = (0..initial_smiths_len)
.map(|i| get_authority_keys_from_seed(NAMES[i]))
.collect::<Vec<AuthorityKeys>>();
let initial_identities = (0..initial_identities_len)
.map(|i| {
(
IdtyName::from(NAMES[i]),
get_account_id_from_seed::<sr25519::Public>(NAMES[i]),
)
})
.collect::<BTreeMap<IdtyName, AccountId>>();
gdev_runtime::GenesisConfig {
system: SystemConfig {
// Add Wasm runtime to storage.
code: wasm_binary.to_vec(),
},
account: AccountConfig {
accounts: initial_identities
.iter()
.enumerate()
.map(|(i, (_, owner_key))| {
(
owner_key.clone(),
GenesisAccountData {
random_id: H256(blake2_256(&(i as u32, owner_key).encode())),
balance: first_ud,
is_identity: true,
},
)
})
.collect(),
},
parameters: ParametersConfig {
parameters: GenesisParameters {
babe_epoch_duration,
cert_period: 15,
cert_max_by_issuer: 10,
cert_min_received_cert_to_issue_cert: 2,
cert_validity_period,
idty_confirm_period: 40,
idty_creation_period: 50,
membership_period,
pending_membership_period: 500,
ud_creation_period,
ud_reeval_period,
smith_cert_period: 15,
smith_cert_max_by_issuer: 8,
smith_cert_min_received_cert_to_issue_cert: 2,
smith_cert_validity_period,
smith_membership_period,
smith_pending_membership_period: 500,
smith_wot_first_cert_issuable_on: 20,
smith_wot_min_cert_for_membership: 2,
wot_first_cert_issuable_on: 20,
wot_min_cert_for_create_idty_right: 2,
wot_min_cert_for_membership: 2,
},
},
authority_discovery: Default::default(),
authority_members: AuthorityMembersConfig {
initial_authorities: initial_smiths
.iter()
.enumerate()
.map(|(i, keys)| (i as u32 + 1, (keys.0.clone(), i < initial_authorities_len)))
.collect(),
},
balances: Default::default(),
babe: BabeConfig {
authorities: Vec::with_capacity(0),
epoch_config: Some(BABE_GENESIS_EPOCH_CONFIG),
},
grandpa: Default::default(),
im_online: Default::default(),
session: SessionConfig {
keys: initial_smiths
.iter()
.map(|x| {
(
x.0.clone(),
x.0.clone(),
session_keys(x.1.clone(), x.2.clone(), x.3.clone(), x.4.clone()),
)
})
.collect::<Vec<_>>(),
},
sudo: SudoConfig {
// Assign network admin rights.
key: Some(root_key),
},
technical_committee: TechnicalCommitteeConfig {
members: initial_smiths
.iter()
.map(|x| x.0.clone())
.collect::<Vec<_>>(),
..Default::default()
},
identity: IdentityConfig {
identities: initial_identities
.iter()
.enumerate()
.map(|(i, (name, owner_key))| {
if i != initial_identities_len - 1 {
GenesisIdty {
index: i as u32 + 1,
name: name.clone(),
value: IdtyValue {
data: IdtyData::new(),
next_creatable_identity_on: Default::default(),
old_owner_key: None,
owner_key: owner_key.clone(),
removable_on: 0,
status: IdtyStatus::Validated,
},
}
} else {
GenesisIdty {
index: i as u32 + 1,
name: name.clone(),
value: IdtyValue {
data: IdtyData::new(),
next_creatable_identity_on: Default::default(),
old_owner_key: None,
owner_key: owner_key.clone(),
removable_on: 0,
status: IdtyStatus::Created,
},
}
}
})
.collect(),
},
membership: MembershipConfig {
memberships: (1..=initial_identities.len())
.filter_map(|i| {
if i != initial_identities_len {
Some((i as u32, MembershipData { expire_on: 0 }))
} else {
None
}
})
.collect(),
},
cert: CertConfig {
apply_cert_period_at_genesis: false,
certs_by_receiver: clique_wot(initial_identities.len()),
},
smith_membership: SmithMembershipConfig {
memberships: (1..=initial_smiths_len)
.map(|i| (i as u32, MembershipData { expire_on: 0 }))
.collect(),
},
smith_cert: SmithCertConfig {
apply_cert_period_at_genesis: false,
certs_by_receiver: clique_wot(initial_smiths_len),
},
universal_dividend: UniversalDividendConfig {
first_reeval: 100,
first_ud,
initial_monetary_mass: initial_identities_len as u64 * first_ud,
},
treasury: Default::default(),
}
}
/// custom genesis
fn genesis_data_to_gdev_genesis_conf(
genesis_data: super::gen_genesis_data::GenesisData<GenesisParameters, SessionKeys>,
wasm_binary: &[u8],
......@@ -436,8 +694,8 @@ fn genesis_data_to_gdev_genesis_conf(
memberships,
parameters,
session_keys_map,
smiths_certs_by_receiver,
smiths_memberships,
smith_certs_by_receiver,
smith_memberships,
sudo_key,
technical_committee_members,
} = genesis_data;
......@@ -456,7 +714,7 @@ fn genesis_data_to_gdev_genesis_conf(
balances: Default::default(),
babe: BabeConfig {
authorities: Vec::with_capacity(0),
epoch_config: Some(common_runtime::constants::BABE_GENESIS_EPOCH_CONFIG),
epoch_config: Some(BABE_GENESIS_EPOCH_CONFIG),
},
grandpa: Default::default(),
im_online: Default::default(),
......@@ -475,14 +733,14 @@ fn genesis_data_to_gdev_genesis_conf(
identities: identities
.into_iter()
.enumerate()
.map(|(i, (name, pubkey))| common_runtime::GenesisIdty {
.map(|(i, (name, owner_key))| GenesisIdty {
index: i as u32 + 1,
name: common_runtime::IdtyName::from(name.as_str()),
value: common_runtime::IdtyValue {
data: IdtyData::new(),
next_creatable_identity_on: 0,
old_owner_key: None,
owner_key: pubkey,
owner_key,
removable_on: 0,
status: IdtyStatus::Validated,
},
......@@ -494,12 +752,12 @@ fn genesis_data_to_gdev_genesis_conf(
certs_by_receiver,
},
membership: MembershipConfig { memberships },
smiths_cert: SmithsCertConfig {
smith_cert: SmithCertConfig {
apply_cert_period_at_genesis: true,
certs_by_receiver: smiths_certs_by_receiver,
certs_by_receiver: smith_certs_by_receiver,
},
smiths_membership: SmithsMembershipConfig {
memberships: smiths_memberships,
smith_membership: SmithMembershipConfig {
memberships: smith_memberships,
},
universal_dividend: UniversalDividendConfig {
first_reeval: first_ud_reeval,
......
......@@ -35,8 +35,8 @@ pub struct GenesisData<Parameters: DeserializeOwned, SessionKeys: Decode> {
pub memberships: BTreeMap<u32, MembershipData>,
pub parameters: Parameters,
pub session_keys_map: BTreeMap<AccountId, SessionKeys>,
pub smiths_certs_by_receiver: BTreeMap<u32, BTreeMap<u32, Option<u32>>>,
pub smiths_memberships: BTreeMap<u32, MembershipData>,
pub smith_certs_by_receiver: BTreeMap<u32, BTreeMap<u32, Option<u32>>>,
pub smith_memberships: BTreeMap<u32, MembershipData>,
pub sudo_key: Option<AccountId>,
pub technical_committee_members: Vec<AccountId>,
}
......@@ -271,8 +271,8 @@ where
let mut initial_authorities = BTreeMap::new();
let mut online_authorities_counter = 0;
let mut session_keys_map = BTreeMap::new();
let mut smiths_memberships = BTreeMap::new();
let mut smiths_certs_by_receiver = BTreeMap::new();
let mut smith_memberships = BTreeMap::new();
let mut smith_certs_by_receiver = BTreeMap::new();
for (idty_name, smith_data) in smith_identities {
let idty_index = idty_index_of
.get(&idty_name)
......@@ -294,7 +294,11 @@ where
return Err("session_keys field forbidden".to_owned());
}
if *idty_index == 1 {
// online authority
initial_authorities.insert(1, (identity.pubkey.clone(), true));
} else {
// authority but offline
initial_authorities.insert(*idty_index, (identity.pubkey.clone(), false));
}
} else {
initial_authorities.insert(
......@@ -319,11 +323,9 @@ where
fake_session_keys_bytes
//vec![initial_authorities.len() as u8; std::mem::size_of::<SK>()]
};
session_keys_map.insert(
identity.pubkey.clone(),
SK::decode(&mut &session_keys_bytes[..])
.map_err(|_| format!("invalid session keys for idty {}", &idty_name))?,
);
let session_keys = SK::decode(&mut &session_keys_bytes[..])
.map_err(|_| format!("invalid session keys for idty {}", &idty_name))?;
session_keys_map.insert(identity.pubkey.clone(), session_keys);
// Certifications
let mut receiver_certs = BTreeMap::new();
......@@ -334,10 +336,10 @@ where
.ok_or(format!("Identity '{}' not exist", issuer))?;
receiver_certs.insert(*issuer_index, maybe_expire_on);
}
smiths_certs_by_receiver.insert(*idty_index, receiver_certs);
smith_certs_by_receiver.insert(*idty_index, receiver_certs);
// Memberships
smiths_memberships.insert(
smith_memberships.insert(
*idty_index,
MembershipData {
expire_on: genesis_smith_memberships_expire_on,
......@@ -345,17 +347,17 @@ where
);
}
// Verify smiths certifications coherence
if smiths_certs_by_receiver.len() < smiths_memberships.len() {
// Verify smith certifications coherence
if smith_certs_by_receiver.len() < smith_memberships.len() {
return Err(format!(
"{} smith identities has not received any smiths certifications",
smiths_memberships.len() - smiths_certs_by_receiver.len()
"{} smith identities have not received any smith certification",
smith_memberships.len() - smith_certs_by_receiver.len()
));
}
for (idty_index, receiver_certs) in &smiths_certs_by_receiver {
for (idty_index, receiver_certs) in &smith_certs_by_receiver {
if receiver_certs.len() < genesis_smith_certs_min_received as usize {
return Err(format!(
"Identity n°{} has received only {}/{} smiths certifications)",
"Identity n°{} has received only {}/{} smith certifications)",
idty_index,
receiver_certs.len(),
genesis_smith_certs_min_received
......@@ -378,8 +380,8 @@ where
memberships,
parameters,
session_keys_map,
smiths_certs_by_receiver,
smiths_memberships,
smith_certs_by_receiver,
smith_memberships,
sudo_key,
technical_committee_members,
};
......
......@@ -21,7 +21,7 @@ use common_runtime::*;
use gtest_runtime::{
opaque::SessionKeys, AccountConfig, AccountId, AuthorityMembersConfig, BabeConfig,
BalancesConfig, CertConfig, GenesisConfig, IdentityConfig, IdtyValue, ImOnlineId,
MembershipConfig, SessionConfig, SmithsCertConfig, SmithsMembershipConfig, SudoConfig,
MembershipConfig, SessionConfig, SmithCertConfig, SmithMembershipConfig, SudoConfig,
SystemConfig, TechnicalCommitteeConfig, UniversalDividendConfig, WASM_BINARY,
};
use sc_service::ChainType;
......@@ -72,7 +72,7 @@ pub fn development_chain_spec() -> Result<ChainSpec, String> {
wasm_binary,
// Initial authorities len
1,
// Initial smiths members len
// Initial smith members len
3,
// Inital identities len
4,
......@@ -275,7 +275,7 @@ fn gen_genesis_for_local_chain(
apply_cert_period_at_genesis: false,
certs_by_receiver: clique_wot(initial_identities.len()),
},
smiths_membership: SmithsMembershipConfig {
smith_membership: SmithMembershipConfig {
memberships: (1..=initial_smiths_len)
.map(|i| {
(
......@@ -287,7 +287,7 @@ fn gen_genesis_for_local_chain(
})
.collect(),
},
smiths_cert: SmithsCertConfig {
smith_cert: SmithCertConfig {
apply_cert_period_at_genesis: false,
certs_by_receiver: clique_wot(initial_smiths_len),
},
......
......@@ -105,6 +105,8 @@ impl SubstrateCli for Cli {
"gdev" => Box::new(chain_spec::gdev::ChainSpec::from_json_bytes(
&include_bytes!("../specs/gdev-raw.json")[..],
)?),
#[cfg(feature = "gdev")]
"gdev-benchmark" => Box::new(chain_spec::gdev::benchmark_chain_spec()?),
#[cfg(feature = "gtest")]
"gtest_dev" => Box::new(chain_spec::gtest::development_chain_spec()?),
#[cfg(feature = "gtest")]
......
......@@ -99,12 +99,16 @@ impl GenSessionKeysCmd {
}
let mut buffer = [0; 32];
// grandpa
buffer.copy_from_slice(&public_keys_bytes[..32]);
println!("grandpa: {}", AccountId32::new(buffer));
// babe
buffer.copy_from_slice(&public_keys_bytes[32..64]);
println!("babe: {}", AccountId32::new(buffer));
// im_online
buffer.copy_from_slice(&public_keys_bytes[64..96]);
println!("im_online: {}", AccountId32::new(buffer));
// authority discovery
buffer.copy_from_slice(&public_keys_bytes[96..]);
println!("authority_discovery: {}", AccountId32::new(buffer));
......
......@@ -20,4 +20,5 @@ These pallets are at the core of Duniter/Ğ1 currency
- **`duniter-test-parameters`** Test parameters only used in ĞDev to allow tweaking parameters more easily.
- **`oneshot-account`** Oneshot accounts are light accounts only used once for anonimity or convenience use case.
- **`provide-randomness`** Lets blockchain users ask for a verifiable random number.
- **`session-benchmarking`** Benchmarks the session pallet.
- **`upgrade-origin`** Allows some origins to dispatch a call as root.
\ No newline at end of file