// Copyright 2021 Axiom-Team // // This file is part of Duniter-v2S. // // Duniter-v2S is free software: you can redistribute it and/or modify // it under the terms of the GNU Affero General Public License as published by // the Free Software Foundation, version 3 of the License. // // Duniter-v2S is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with Duniter-v2S. If not, see <https://www.gnu.org/licenses/>. use super::*; use common_runtime::constants::*; use common_runtime::entities::IdtyData; use common_runtime::*; use gtest_runtime::{ opaque::SessionKeys, AccountConfig, AccountId, AuthorityMembersConfig, BabeConfig, CertConfig, GenesisConfig, IdentityConfig, ImOnlineId, MembershipConfig, SessionConfig, SmithCertConfig, SmithMembershipConfig, SudoConfig, SystemConfig, TechnicalCommitteeConfig, UniversalDividendConfig, WASM_BINARY, }; use sc_service::ChainType; use sp_authority_discovery::AuthorityId as AuthorityDiscoveryId; use sp_consensus_babe::AuthorityId as BabeId; use sp_core::{blake2_256, sr25519, Encode, H256}; use sp_finality_grandpa::AuthorityId as GrandpaId; use sp_membership::MembershipData; use std::collections::BTreeMap; pub type AuthorityKeys = ( AccountId, GrandpaId, BabeId, ImOnlineId, AuthorityDiscoveryId, ); pub type ChainSpec = sc_service::GenericChainSpec<GenesisConfig>; const TOKEN_DECIMALS: usize = 2; const TOKEN_SYMBOL: &str = "ĞT"; // The URL for the telemetry server. // const STAGING_TELEMETRY_URL: &str = "wss://telemetry.polkadot.io/submit/"; /// Generate an authority keys. pub fn get_authority_keys_from_seed(s: &str) -> AuthorityKeys { ( get_account_id_from_seed::<sr25519::Public>(s), get_from_seed::<GrandpaId>(s), get_from_seed::<BabeId>(s), get_from_seed::<ImOnlineId>(s), get_from_seed::<AuthorityDiscoveryId>(s), ) } /// Generate session keys fn get_session_keys_from_seed(s: &str) -> SessionKeys { let authority_keys = get_authority_keys_from_seed(s); session_keys( authority_keys.1, authority_keys.2, authority_keys.3, authority_keys.4, ) } /// make session keys struct fn session_keys( grandpa: GrandpaId, babe: BabeId, im_online: ImOnlineId, authority_discovery: AuthorityDiscoveryId, ) -> SessionKeys { SessionKeys { grandpa, babe, im_online, authority_discovery, } } /// generate development chainspec with Alice validator pub fn development_chain_spec() -> Result<ChainSpec, String> { let wasm_binary = WASM_BINARY.ok_or_else(|| "wasm not available".to_string())?; // custom genesis when DUNITER_GTEST_GENESIS is set if let Ok(genesis_json_path) = std::env::var("DUNITER_GTEST_GENESIS") { // log log::info!("loading genesis from {genesis_json_path}"); // return chainspecs Ok(ChainSpec::from_genesis( // Name "ĞTest Development", // ID "gtest_dev", // chain type sc_service::ChainType::Development, // genesis config constructor move || { super::gtest_genesis::build_genesis( // path of json genesis &genesis_json_path, // wasm binary wasm_binary, // replace authority by Alice Some(get_session_keys_from_seed("Alice").encode()), ) .expect("genesis building failed") }, // Bootnodes vec![], // Telemetry None, // Protocol ID None, //Fork ID None, // Properties Some( serde_json::json!({ "tokenDecimals": TOKEN_DECIMALS, "tokenSymbol": TOKEN_SYMBOL, }) .as_object() .expect("must be a map") .clone(), ), // Extensions None, )) } else { // log log::info!("generating genesis"); // generated genesis Ok(ChainSpec::from_genesis( // Name "ĞTest Development", // ID "gtest_dev", // chain type ChainType::Development, // constructor move || { gen_genesis_for_local_chain( wasm_binary, // Initial authorities len 1, // Initial smith members len 3, // Inital identities len 4, // Sudo account get_account_id_from_seed::<sr25519::Public>("Alice"), true, ) }, // Bootnodes vec![], // Telemetry None, // Protocol ID None, //Fork ID None, // Properties Some( serde_json::json!({ "tokenDecimals": TOKEN_DECIMALS, "tokenSymbol": TOKEN_SYMBOL, }) .as_object() .expect("must be a map") .clone(), ), // Extensions None, )) } } pub fn local_testnet_config( initial_authorities_len: usize, initial_smiths_len: usize, initial_identities_len: usize, ) -> Result<ChainSpec, String> { let wasm_binary = WASM_BINARY.ok_or_else(|| "wasm not available".to_string())?; Ok(ChainSpec::from_genesis( // Name "ĞTest Local Testnet", // ID "gtest_local", ChainType::Local, move || { gen_genesis_for_local_chain( wasm_binary, // Initial authorities len initial_authorities_len, // Initial smiths len, initial_smiths_len, // Initial identities len initial_identities_len, // Sudo account get_account_id_from_seed::<sr25519::Public>("Alice"), true, ) }, // Bootnodes vec![], // Telemetry None, // Protocol ID None, //Fork ID None, // Properties Some( serde_json::json!({ "tokenDecimals": TOKEN_DECIMALS, "tokenSymbol": TOKEN_SYMBOL, }) .as_object() .expect("must be a map") .clone(), ), // Extensions None, )) } fn gen_genesis_for_local_chain( wasm_binary: &[u8], initial_authorities_len: usize, initial_smiths_len: usize, initial_identities_len: usize, root_key: AccountId, _enable_println: bool, ) -> GenesisConfig { assert!(initial_identities_len <= 6); assert!(initial_smiths_len <= initial_identities_len); assert!(initial_authorities_len <= initial_smiths_len); let first_ud = 1_000; let initial_smiths = (0..initial_smiths_len) .map(|i| get_authority_keys_from_seed(NAMES[i])) .collect::<Vec<AuthorityKeys>>(); let initial_identities = (0..initial_identities_len) .map(|i| { ( IdtyName::from(NAMES[i]), get_account_id_from_seed::<sr25519::Public>(NAMES[i]), ) }) .collect::<BTreeMap<IdtyName, AccountId>>(); GenesisConfig { system: SystemConfig { // Add Wasm runtime to storage. code: wasm_binary.to_vec(), }, account: AccountConfig { accounts: initial_identities .iter() .enumerate() .map(|(i, (_, owner_key))| { ( owner_key.clone(), GenesisAccountData { random_id: H256(blake2_256(&(i as u32, owner_key).encode())), balance: first_ud, is_identity: true, }, ) }) .collect(), }, authority_discovery: Default::default(), authority_members: AuthorityMembersConfig { initial_authorities: initial_smiths .iter() .enumerate() .map(|(i, keys)| (i as u32 + 1, (keys.0.clone(), true))) .collect(), }, balances: Default::default(), babe: BabeConfig { authorities: Vec::with_capacity(0), epoch_config: Some(BABE_GENESIS_EPOCH_CONFIG), }, grandpa: Default::default(), im_online: Default::default(), session: SessionConfig { keys: initial_smiths .iter() .map(|x| { ( x.0.clone(), x.0.clone(), session_keys(x.1.clone(), x.2.clone(), x.3.clone(), x.4.clone()), ) }) .collect::<Vec<_>>(), }, sudo: SudoConfig { // Assign network admin rights. key: Some(root_key), }, technical_committee: TechnicalCommitteeConfig { members: initial_smiths .iter() .map(|x| x.0.clone()) .collect::<Vec<_>>(), ..Default::default() }, identity: IdentityConfig { identities: initial_identities .iter() .enumerate() .map(|(i, (name, owner_key))| common_runtime::GenesisIdty { index: i as u32 + 1, name: name.clone(), value: IdtyValue { data: IdtyData::new(), next_creatable_identity_on: Default::default(), old_owner_key: None, owner_key: owner_key.clone(), removable_on: 0, status: IdtyStatus::Validated, }, }) .collect(), }, membership: MembershipConfig { memberships: (1..=initial_identities.len()) .map(|i| { ( i as u32, MembershipData { expire_on: gtest_runtime::MembershipPeriod::get(), }, ) }) .collect(), }, cert: CertConfig { apply_cert_period_at_genesis: false, certs_by_receiver: clique_wot(initial_identities.len()), }, smith_membership: SmithMembershipConfig { memberships: (1..=initial_smiths_len) .map(|i| { ( i as u32, MembershipData { expire_on: gtest_runtime::SmithMembershipPeriod::get(), }, ) }) .collect(), }, smith_cert: SmithCertConfig { apply_cert_period_at_genesis: false, certs_by_receiver: clique_wot(initial_smiths_len), }, universal_dividend: UniversalDividendConfig { first_reeval: 100, first_ud: 1_000, initial_monetary_mass: 0, }, treasury: Default::default(), } }