Upgrade ethereum types (#10670)

* cargo upgrade "ethereum-types" --all --allow-prerelease

* [ethash] fix compilation errors

* [ethkey] fix compilation errors

* [journaldb] fix compilation errors

* [dir] fix compilation errors

* [ethabi] update to 0.7

* wip

* [eip-712] fix compilation errors

* [ethjson] fix compilation errors

* [Cargo.toml] add TODO to remove patches

* [ethstore] fix compilation errors

* use patched keccak-hash with new primitive-types

* wip

* [ethcore-network-devp2p] fix compilation errors

* [vm] fix compilation errors

* [common-types, evm, wasm] fix compilation errors

* [ethcore-db] Require AsRef instead of Deref for keys

* [ethcore-blockchain] fix some compilation errors

* [blooms-db] fix compilation errors

Thanks a lot @dvdplm :)

* we don't need no rlp ethereum feature

* [ethcore] fix some compilation errors

* [parity-ipfs-api] fix compilation error

* [ethcore-light] fix compilation errors

* [Cargo.lock] update parity-common

* [ethcore-private-tx] fix some compilation errors

* wip

* [ethcore-private-tx] fix compilation errors

* [parity-updater] fix compilation errors

* [parity-rpc] fix compilation errors

* [parity-bin] fix other compilation errors

* update to new ethereum-types

* update keccak-hash

* [fastmap] fix compilation in tests

* [blooms-db] fix compilation in tests

* [common-types] fix compilation in tests

* [triehash-ethereum] fix compilation in tests

* [ethkey] fix compilation in tests

* [pwasm-run-test] fix compilation errors

* [wasm] fix compilation errors

* [ethjson] fix compilation in tests

* [eip-712] fix compilation in tests

* [ethcore-blockchain] fix compilation in tests

* [ethstore] fix compilation in tests

* [ethstore-accounts] fix compilation in tests

* [parity-hash-fetch] fix compilation in tests

* [parity-whisper] fix compilation in tests

* [ethcore-miner] fix compilation in tests

* [ethcore-network-devp2p] fix compilation in tests

* [*] upgrade rand to 0.6

* [evm] get rid of num-bigint conversions

* [ethcore] downgrade trie-standardmap and criterion

* [ethcore] fix some warnings

* [ethcore] fix compilation in tests

* [evmbin] fix compilation in tests

* [updater] fix compilation in tests

* [ethash] fix compilation in tests

* [ethcore-secretstore] fix compilation in tests

* [ethcore-sync] fix compilation in tests

* [parity-rpc] fix compilation in tests

* [ethcore] finally fix compilation in tests

FUCK YEAH!!!

* [ethstore] lazy_static is unused

* [ethcore] fix test

* fix up bad merge

* [Cargo.toml] remove unused patches

* [*] replace some git dependencies with crates.io

* [Cargo.toml] remove unused lazy_static

* [*] clean up

* [ethcore] fix transaction_filter_deprecated test

* [private-tx] fix serialization tests

* fix more serialization tests

* [ethkey] fix smoky test

* [rpc] fix tests, please?

* [ethcore] remove commented out code

* Apply suggestions from code review

Co-Authored-By: Tomasz Drwięga <tomusdrw@users.noreply.github.com>

* [ethstore] remove unused dev-dependency

* [ethcore] remove resolved TODO

* [*] resolve keccak-hash TODO

* [*] s/Address::default()/Address::zero()

* [rpc] remove Subscribers::new_test

* [rpc] remove EthPubSubClient::new_test

* [ethcore] use trie-standardmap from crates.io

* [dir] fix db_root_path

* [ethcore] simplify snapshot::tests::helpers::fill_storage

* Apply suggestions from code review

Co-Authored-By: David <dvdplm@gmail.com>

* [ethcore-secretstore] resolve TODO in serialization

* [ethcore-network-devp2p] resolve TODO in save_key

* [Cargo.lock] update triehash

* [*] use ethabi from crates.io

* [ethkey] use secp256k1 from master branch

* [Cargo.lock] update eth-secp256k1
This commit is contained in:
Andronik Ordian 2019-06-03 15:36:21 +02:00 committed by David
parent 33d3bfae8b
commit dae5d75dd6
274 changed files with 2718 additions and 2275 deletions

586
Cargo.lock generated

File diff suppressed because it is too large Load Diff

View File

@ -45,11 +45,11 @@ ethcore-network = { path = "util/network" }
ethcore-private-tx = { path = "ethcore/private-tx" } ethcore-private-tx = { path = "ethcore/private-tx" }
ethcore-service = { path = "ethcore/service" } ethcore-service = { path = "ethcore/service" }
ethcore-sync = { path = "ethcore/sync" } ethcore-sync = { path = "ethcore/sync" }
ethereum-types = "0.4" ethereum-types = "0.6.0"
ethkey = { path = "accounts/ethkey" } ethkey = { path = "accounts/ethkey" }
ethstore = { path = "accounts/ethstore" } ethstore = { path = "accounts/ethstore" }
node-filter = { path = "ethcore/node-filter" } node-filter = { path = "ethcore/node-filter" }
rlp = { version = "0.3.0", features = ["ethereum"] } rlp = "0.4.0"
cli-signer= { path = "cli-signer" } cli-signer= { path = "cli-signer" }
parity-daemonize = "0.3" parity-daemonize = "0.3"
parity-hash-fetch = { path = "updater/hash-fetch" } parity-hash-fetch = { path = "updater/hash-fetch" }
@ -63,7 +63,7 @@ parity-whisper = { path = "whisper" }
parity-path = "0.1" parity-path = "0.1"
dir = { path = "util/dir" } dir = { path = "util/dir" }
panic_hook = { path = "util/panic-hook" } panic_hook = { path = "util/panic-hook" }
keccak-hash = "0.1" keccak-hash = "0.2.0"
migration-rocksdb = { path = "util/migration-rocksdb" } migration-rocksdb = { path = "util/migration-rocksdb" }
kvdb = "0.1" kvdb = "0.1"
kvdb-rocksdb = "0.1.3" kvdb-rocksdb = "0.1.3"
@ -81,7 +81,6 @@ pretty_assertions = "0.1"
ipnetwork = "0.12.6" ipnetwork = "0.12.6"
tempdir = "0.3" tempdir = "0.3"
fake-fetch = { path = "util/fake-fetch" } fake-fetch = { path = "util/fake-fetch" }
lazy_static = "1.2.0"
[target.'cfg(windows)'.dependencies] [target.'cfg(windows)'.dependencies]
winapi = { version = "0.3.4", features = ["winsock2", "winuser", "shellapi"] } winapi = { version = "0.3.4", features = ["winsock2", "winuser", "shellapi"] }

View File

@ -17,5 +17,5 @@ serde_derive = "1.0"
serde_json = "1.0" serde_json = "1.0"
[dev-dependencies] [dev-dependencies]
ethereum-types = "0.4" ethereum-types = "0.6.0"
tempdir = "0.3" tempdir = "0.3"

View File

@ -8,13 +8,13 @@ byteorder = "1.0"
edit-distance = "2.0" edit-distance = "2.0"
parity-crypto = "0.4.0" parity-crypto = "0.4.0"
eth-secp256k1 = { git = "https://github.com/paritytech/rust-secp256k1" } eth-secp256k1 = { git = "https://github.com/paritytech/rust-secp256k1" }
ethereum-types = "0.4" ethereum-types = "0.6.0"
lazy_static = "1.0" lazy_static = "1.0"
log = "0.4" log = "0.4"
memzero = { path = "../../util/memzero" } memzero = { path = "../../util/memzero" }
parity-wordlist = "1.2" parity-wordlist = "1.2"
quick-error = "1.2.2" quick-error = "1.2.2"
rand = "0.4" rand = "0.6"
rustc-hex = "1.0" rustc-hex = "1.0"
serde = "1.0" serde = "1.0"
serde_derive = "1.0" serde_derive = "1.0"

View File

@ -47,7 +47,7 @@ impl Generator for BrainPrefix {
for _ in 0..self.iterations { for _ in 0..self.iterations {
let phrase = wordlist::random_phrase(self.no_of_words); let phrase = wordlist::random_phrase(self.no_of_words);
let keypair = Brain::new(phrase.clone()).generate().unwrap(); let keypair = Brain::new(phrase.clone()).generate().unwrap();
if keypair.address().starts_with(&self.prefix) { if keypair.address().as_ref().starts_with(&self.prefix) {
self.last_phrase = phrase; self.last_phrase = phrase;
return Ok(keypair) return Ok(keypair)
} }
@ -65,6 +65,6 @@ mod tests {
fn prefix_generator() { fn prefix_generator() {
let prefix = vec![0x00u8]; let prefix = vec![0x00u8];
let keypair = BrainPrefix::new(prefix.clone(), usize::max_value(), 12).generate().unwrap(); let keypair = BrainPrefix::new(prefix.clone(), usize::max_value(), 12).generate().unwrap();
assert!(keypair.address().starts_with(&prefix)); assert!(keypair.address().as_bytes().starts_with(&prefix));
} }
} }

View File

@ -57,7 +57,7 @@ pub mod ecdh {
}; };
let publ = key::PublicKey::from_slice(context, &pdata)?; let publ = key::PublicKey::from_slice(context, &pdata)?;
let sec = key::SecretKey::from_slice(context, &secret)?; let sec = key::SecretKey::from_slice(context, secret.as_bytes())?;
let shared = ecdh::SharedSecret::new_raw(context, &publ, &sec); let shared = ecdh::SharedSecret::new_raw(context, &publ, &sec);
Secret::from_unsafe_slice(&shared[0..32]) Secret::from_unsafe_slice(&shared[0..32])
@ -89,12 +89,12 @@ pub mod ecies {
msg[0] = 0x04u8; msg[0] = 0x04u8;
{ {
let msgd = &mut msg[1..]; let msgd = &mut msg[1..];
msgd[0..64].copy_from_slice(r.public()); msgd[0..64].copy_from_slice(r.public().as_bytes());
let iv = H128::random(); let iv = H128::random();
msgd[64..80].copy_from_slice(&iv); msgd[64..80].copy_from_slice(iv.as_bytes());
{ {
let cipher = &mut msgd[(64 + 16)..(64 + 16 + plain.len())]; let cipher = &mut msgd[(64 + 16)..(64 + 16 + plain.len())];
aes::encrypt_128_ctr(ekey, &iv, plain, cipher)?; aes::encrypt_128_ctr(ekey, iv.as_bytes(), plain, cipher)?;
} }
let mut hmac = hmac::Signer::with(&mkey); let mut hmac = hmac::Signer::with(&mkey);
{ {
@ -156,7 +156,7 @@ pub mod ecies {
let mut hasher = digest::Hasher::sha256(); let mut hasher = digest::Hasher::sha256();
let ctrs = [(ctr >> 24) as u8, (ctr >> 16) as u8, (ctr >> 8) as u8, ctr as u8]; let ctrs = [(ctr >> 24) as u8, (ctr >> 16) as u8, (ctr >> 8) as u8, ctr as u8];
hasher.update(&ctrs); hasher.update(&ctrs);
hasher.update(secret); hasher.update(secret.as_bytes());
hasher.update(s1); hasher.update(s1);
let d = hasher.finish(); let d = hasher.finish();
&mut dest[written..(written + 32)].copy_from_slice(&d); &mut dest[written..(written + 32)].copy_from_slice(&d);

View File

@ -64,7 +64,7 @@ impl Label for H256 {
fn len() -> usize { 32 } fn len() -> usize { 32 }
fn store(&self, target: &mut [u8]) { fn store(&self, target: &mut [u8]) {
self.copy_to(&mut target[0..32]); (&mut target[0..32]).copy_from_slice(self.as_bytes());
} }
} }
@ -180,7 +180,7 @@ impl ExtendedKeyPair {
pub fn with_seed(seed: &[u8]) -> Result<ExtendedKeyPair, DerivationError> { pub fn with_seed(seed: &[u8]) -> Result<ExtendedKeyPair, DerivationError> {
let (master_key, chain_code) = derivation::seed_pair(seed); let (master_key, chain_code) = derivation::seed_pair(seed);
Ok(ExtendedKeyPair::with_secret( Ok(ExtendedKeyPair::with_secret(
Secret::from_unsafe_slice(&*master_key).map_err(|_| DerivationError::InvalidSeed)?, Secret::from_unsafe_slice(master_key.as_bytes()).map_err(|_| DerivationError::InvalidSeed)?,
chain_code, chain_code,
)) ))
} }
@ -208,12 +208,13 @@ impl ExtendedKeyPair {
// https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki // https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki
mod derivation { mod derivation {
use parity_crypto::hmac; use parity_crypto::hmac;
use ethereum_types::{U256, U512, H512, H256}; use ethereum_types::{BigEndianHash, U256, U512, H512, H256};
use secp256k1::key::{SecretKey, PublicKey}; use secp256k1::key::{SecretKey, PublicKey};
use SECP256K1; use SECP256K1;
use keccak; use keccak;
use math::curve_order; use math::curve_order;
use super::{Label, Derivation}; use super::{Label, Derivation};
use std::convert::TryInto;
#[derive(Debug)] #[derive(Debug)]
pub enum Error { pub enum Error {
@ -237,18 +238,18 @@ mod derivation {
} }
fn hmac_pair(data: &[u8], private_key: H256, chain_code: H256) -> (H256, H256) { fn hmac_pair(data: &[u8], private_key: H256, chain_code: H256) -> (H256, H256) {
let private: U256 = private_key.into(); let private: U256 = private_key.into_uint();
// produces 512-bit derived hmac (I) // produces 512-bit derived hmac (I)
let skey = hmac::SigKey::sha512(&*chain_code); let skey = hmac::SigKey::sha512(chain_code.as_bytes());
let i_512 = hmac::sign(&skey, &data[..]); let i_512 = hmac::sign(&skey, &data[..]);
// left most 256 bits are later added to original private key // left most 256 bits are later added to original private key
let hmac_key: U256 = H256::from_slice(&i_512[0..32]).into(); let hmac_key: U256 = H256::from_slice(&i_512[0..32]).into_uint();
// right most 256 bits are new chain code for later derivations // right most 256 bits are new chain code for later derivations
let next_chain_code = H256::from(&i_512[32..64]); let next_chain_code = H256::from_slice(&i_512[32..64]);
let child_key = private_add(hmac_key, private).into(); let child_key = BigEndianHash::from_uint(&private_add(hmac_key, private));
(child_key, next_chain_code) (child_key, next_chain_code)
} }
@ -257,7 +258,7 @@ mod derivation {
fn private_soft<T>(private_key: H256, chain_code: H256, index: T) -> (H256, H256) where T: Label { fn private_soft<T>(private_key: H256, chain_code: H256, index: T) -> (H256, H256) where T: Label {
let mut data = vec![0u8; 33 + T::len()]; let mut data = vec![0u8; 33 + T::len()];
let sec_private = SecretKey::from_slice(&SECP256K1, &*private_key) let sec_private = SecretKey::from_slice(&SECP256K1, private_key.as_bytes())
.expect("Caller should provide valid private key"); .expect("Caller should provide valid private key");
let sec_public = PublicKey::from_secret_key(&SECP256K1, &sec_private) let sec_public = PublicKey::from_secret_key(&SECP256K1, &sec_private)
.expect("Caller should provide valid private key"); .expect("Caller should provide valid private key");
@ -276,7 +277,7 @@ mod derivation {
// corresponding public keys of the original and derived private keys // corresponding public keys of the original and derived private keys
fn private_hard<T>(private_key: H256, chain_code: H256, index: T) -> (H256, H256) where T: Label { fn private_hard<T>(private_key: H256, chain_code: H256, index: T) -> (H256, H256) where T: Label {
let mut data: Vec<u8> = vec![0u8; 33 + T::len()]; let mut data: Vec<u8> = vec![0u8; 33 + T::len()];
let private: U256 = private_key.into(); let private: U256 = private_key.into_uint();
// 0x00 (padding) -- private_key -- index // 0x00 (padding) -- private_key -- index
// 0 -- 1..33 -- 33..end // 0 -- 1..33 -- 33..end
@ -293,9 +294,8 @@ mod derivation {
// todo: surely can be optimized // todo: surely can be optimized
fn modulo(u1: U512, u2: U256) -> U256 { fn modulo(u1: U512, u2: U256) -> U256 {
let dv = u1 / U512::from(u2); let m = u1 % U512::from(u2);
let md = u1 - (dv * U512::from(u2)); m.try_into().expect("U512 modulo U256 should fit into U256; qed")
md.into()
} }
pub fn public<T>(public_key: H512, chain_code: H256, derivation: Derivation<T>) -> Result<(H512, H256), Error> where T: Label { pub fn public<T>(public_key: H512, chain_code: H256, derivation: Derivation<T>) -> Result<(H512, H256), Error> where T: Label {
@ -306,7 +306,7 @@ mod derivation {
let mut public_sec_raw = [0u8; 65]; let mut public_sec_raw = [0u8; 65];
public_sec_raw[0] = 4; public_sec_raw[0] = 4;
public_sec_raw[1..65].copy_from_slice(&*public_key); public_sec_raw[1..65].copy_from_slice(public_key.as_bytes());
let public_sec = PublicKey::from_slice(&SECP256K1, &public_sec_raw).map_err(|_| Error::InvalidPoint)?; let public_sec = PublicKey::from_slice(&SECP256K1, &public_sec_raw).map_err(|_| Error::InvalidPoint)?;
let public_serialized = public_sec.serialize_vec(&SECP256K1, true); let public_serialized = public_sec.serialize_vec(&SECP256K1, true);
@ -317,15 +317,15 @@ mod derivation {
index.store(&mut data[33..(33 + T::len())]); index.store(&mut data[33..(33 + T::len())]);
// HMAC512SHA produces [derived private(256); new chain code(256)] // HMAC512SHA produces [derived private(256); new chain code(256)]
let skey = hmac::SigKey::sha512(&*chain_code); let skey = hmac::SigKey::sha512(chain_code.as_bytes());
let i_512 = hmac::sign(&skey, &data[..]); let i_512 = hmac::sign(&skey, &data[..]);
let new_private = H256::from(&i_512[0..32]); let new_private = H256::from_slice(&i_512[0..32]);
let new_chain_code = H256::from(&i_512[32..64]); let new_chain_code = H256::from_slice(&i_512[32..64]);
// Generated private key can (extremely rarely) be out of secp256k1 key field // Generated private key can (extremely rarely) be out of secp256k1 key field
if curve_order() <= new_private.clone().into() { return Err(Error::MissingIndex); } if curve_order() <= new_private.into_uint() { return Err(Error::MissingIndex); }
let new_private_sec = SecretKey::from_slice(&SECP256K1, &*new_private) let new_private_sec = SecretKey::from_slice(&SECP256K1, new_private.as_bytes())
.expect("Private key belongs to the field [0..CURVE_ORDER) (checked above); So initializing can never fail; qed"); .expect("Private key belongs to the field [0..CURVE_ORDER) (checked above); So initializing can never fail; qed");
let mut new_public = PublicKey::from_secret_key(&SECP256K1, &new_private_sec) let mut new_public = PublicKey::from_secret_key(&SECP256K1, &new_private_sec)
.expect("Valid private key produces valid public key"); .expect("Valid private key produces valid public key");
@ -337,7 +337,7 @@ mod derivation {
let serialized = new_public.serialize_vec(&SECP256K1, false); let serialized = new_public.serialize_vec(&SECP256K1, false);
Ok(( Ok((
H512::from(&serialized[1..65]), H512::from_slice(&serialized[1..65]),
new_chain_code, new_chain_code,
)) ))
} }
@ -348,18 +348,18 @@ mod derivation {
pub fn chain_code(secret: H256) -> H256 { pub fn chain_code(secret: H256) -> H256 {
// 10,000 rounds of sha3 // 10,000 rounds of sha3
let mut running_sha3 = sha3(&*secret); let mut running_sha3 = sha3(secret.as_bytes());
for _ in 0..99999 { running_sha3 = sha3(&*running_sha3); } for _ in 0..99999 { running_sha3 = sha3(running_sha3.as_bytes()); }
running_sha3 running_sha3
} }
pub fn point(secret: H256) -> Result<H512, Error> { pub fn point(secret: H256) -> Result<H512, Error> {
let sec = SecretKey::from_slice(&SECP256K1, &*secret) let sec = SecretKey::from_slice(&SECP256K1, secret.as_bytes())
.map_err(|_| Error::InvalidPoint)?; .map_err(|_| Error::InvalidPoint)?;
let public_sec = PublicKey::from_secret_key(&SECP256K1, &sec) let public_sec = PublicKey::from_secret_key(&SECP256K1, &sec)
.map_err(|_| Error::InvalidPoint)?; .map_err(|_| Error::InvalidPoint)?;
let serialized = public_sec.serialize_vec(&SECP256K1, false); let serialized = public_sec.serialize_vec(&SECP256K1, false);
Ok(H512::from(&serialized[1..65])) Ok(H512::from_slice(&serialized[1..65]))
} }
pub fn seed_pair(seed: &[u8]) -> (H256, H256) { pub fn seed_pair(seed: &[u8]) -> (H256, H256) {
@ -378,12 +378,13 @@ mod tests {
use super::{ExtendedSecret, ExtendedPublic, ExtendedKeyPair}; use super::{ExtendedSecret, ExtendedPublic, ExtendedKeyPair};
use secret::Secret; use secret::Secret;
use std::str::FromStr; use std::str::FromStr;
use ethereum_types::{H128, H256}; use ethereum_types::{H128, H256, H512};
use super::{derivation, Derivation}; use super::{derivation, Derivation};
fn master_chain_basic() -> (H256, H256) { fn master_chain_basic() -> (H256, H256) {
let seed = H128::from_str("000102030405060708090a0b0c0d0e0f") let seed = H128::from_str("000102030405060708090a0b0c0d0e0f")
.expect("Seed should be valid H128") .expect("Seed should be valid H128")
.as_bytes()
.to_vec(); .to_vec();
derivation::seed_pair(&*seed) derivation::seed_pair(&*seed)
@ -399,27 +400,39 @@ mod tests {
#[test] #[test]
fn smoky() { fn smoky() {
let secret = Secret::from_str("a100df7a048e50ed308ea696dc600215098141cb391e9527329df289f9383f65").unwrap(); let secret = Secret::from_str("a100df7a048e50ed308ea696dc600215098141cb391e9527329df289f9383f65").unwrap();
let extended_secret = ExtendedSecret::with_code(secret.clone(), 0u64.into()); let extended_secret = ExtendedSecret::with_code(secret.clone(), H256::zero());
// hardened // hardened
assert_eq!(&**extended_secret.as_raw(), &*secret); assert_eq!(&**extended_secret.as_raw(), &*secret);
assert_eq!(&**extended_secret.derive(2147483648.into()).as_raw(), &"0927453daed47839608e414a3738dfad10aed17c459bbd9ab53f89b026c834b6".into()); assert_eq!(
assert_eq!(&**extended_secret.derive(2147483649.into()).as_raw(), &"44238b6a29c6dcbe9b401364141ba11e2198c289a5fed243a1c11af35c19dc0f".into()); **extended_secret.derive(2147483648.into()).as_raw(),
H256::from_str("0927453daed47839608e414a3738dfad10aed17c459bbd9ab53f89b026c834b6").unwrap(),
);
assert_eq!(
**extended_secret.derive(2147483649.into()).as_raw(),
H256::from_str("44238b6a29c6dcbe9b401364141ba11e2198c289a5fed243a1c11af35c19dc0f").unwrap(),
);
// normal // normal
assert_eq!(&**extended_secret.derive(0.into()).as_raw(), &"bf6a74e3f7b36fc4c96a1e12f31abc817f9f5904f5a8fc27713163d1f0b713f6".into()); assert_eq!(**extended_secret.derive(0.into()).as_raw(), H256::from_str("bf6a74e3f7b36fc4c96a1e12f31abc817f9f5904f5a8fc27713163d1f0b713f6").unwrap());
assert_eq!(&**extended_secret.derive(1.into()).as_raw(), &"bd4fca9eb1f9c201e9448c1eecd66e302d68d4d313ce895b8c134f512205c1bc".into()); assert_eq!(**extended_secret.derive(1.into()).as_raw(), H256::from_str("bd4fca9eb1f9c201e9448c1eecd66e302d68d4d313ce895b8c134f512205c1bc").unwrap());
assert_eq!(&**extended_secret.derive(2.into()).as_raw(), &"86932b542d6cab4d9c65490c7ef502d89ecc0e2a5f4852157649e3251e2a3268".into()); assert_eq!(**extended_secret.derive(2.into()).as_raw(), H256::from_str("86932b542d6cab4d9c65490c7ef502d89ecc0e2a5f4852157649e3251e2a3268").unwrap());
let extended_public = ExtendedPublic::from_secret(&extended_secret).expect("Extended public should be created"); let extended_public = ExtendedPublic::from_secret(&extended_secret).expect("Extended public should be created");
let derived_public = extended_public.derive(0.into()).expect("First derivation of public should succeed"); let derived_public = extended_public.derive(0.into()).expect("First derivation of public should succeed");
assert_eq!(&*derived_public.public(), &"f7b3244c96688f92372bfd4def26dc4151529747bab9f188a4ad34e141d47bd66522ff048bc6f19a0a4429b04318b1a8796c000265b4fa200dae5f6dda92dd94".into()); assert_eq!(
*derived_public.public(),
H512::from_str("f7b3244c96688f92372bfd4def26dc4151529747bab9f188a4ad34e141d47bd66522ff048bc6f19a0a4429b04318b1a8796c000265b4fa200dae5f6dda92dd94").unwrap(),
);
let keypair = ExtendedKeyPair::with_secret( let keypair = ExtendedKeyPair::with_secret(
Secret::from_str("a100df7a048e50ed308ea696dc600215098141cb391e9527329df289f9383f65").unwrap(), Secret::from_str("a100df7a048e50ed308ea696dc600215098141cb391e9527329df289f9383f65").unwrap(),
064.into(), H256::from_low_u64_be(64),
);
assert_eq!(
**keypair.derive(2147483648u32.into()).expect("Derivation of keypair should succeed").secret().as_raw(),
H256::from_str("edef54414c03196557cf73774bc97a645c9a1df2164ed34f0c2a78d1375a930c").unwrap(),
); );
assert_eq!(&**keypair.derive(2147483648u32.into()).expect("Derivation of keypair should succeed").secret().as_raw(), &"edef54414c03196557cf73774bc97a645c9a1df2164ed34f0c2a78d1375a930c".into());
} }
#[test] #[test]
@ -427,7 +440,7 @@ mod tests {
let secret = Secret::from_str("a100df7a048e50ed308ea696dc600215098141cb391e9527329df289f9383f65").unwrap(); let secret = Secret::from_str("a100df7a048e50ed308ea696dc600215098141cb391e9527329df289f9383f65").unwrap();
let derivation_secret = H256::from_str("51eaf04f9dbbc1417dc97e789edd0c37ecda88bac490434e367ea81b71b7b015").unwrap(); let derivation_secret = H256::from_str("51eaf04f9dbbc1417dc97e789edd0c37ecda88bac490434e367ea81b71b7b015").unwrap();
let extended_secret = ExtendedSecret::with_code(secret.clone(), 0u64.into()); let extended_secret = ExtendedSecret::with_code(secret.clone(), H256::zero());
let extended_public = ExtendedPublic::from_secret(&extended_secret).expect("Extended public should be created"); let extended_public = ExtendedPublic::from_secret(&extended_secret).expect("Extended public should be created");
let derived_secret0 = extended_secret.derive(Derivation::Soft(derivation_secret)); let derived_secret0 = extended_secret.derive(Derivation::Soft(derivation_secret));
@ -442,15 +455,18 @@ mod tests {
fn h256_hard() { fn h256_hard() {
let secret = Secret::from_str("a100df7a048e50ed308ea696dc600215098141cb391e9527329df289f9383f65").unwrap(); let secret = Secret::from_str("a100df7a048e50ed308ea696dc600215098141cb391e9527329df289f9383f65").unwrap();
let derivation_secret = H256::from_str("51eaf04f9dbbc1417dc97e789edd0c37ecda88bac490434e367ea81b71b7b015").unwrap(); let derivation_secret = H256::from_str("51eaf04f9dbbc1417dc97e789edd0c37ecda88bac490434e367ea81b71b7b015").unwrap();
let extended_secret = ExtendedSecret::with_code(secret.clone(), 1u64.into()); let extended_secret = ExtendedSecret::with_code(secret.clone(), H256::from_low_u64_be(1));
assert_eq!(&**extended_secret.derive(Derivation::Hard(derivation_secret)).as_raw(), &"2bc2d696fb744d77ff813b4a1ef0ad64e1e5188b622c54ba917acc5ebc7c5486".into()); assert_eq!(
**extended_secret.derive(Derivation::Hard(derivation_secret)).as_raw(),
H256::from_str("2bc2d696fb744d77ff813b4a1ef0ad64e1e5188b622c54ba917acc5ebc7c5486").unwrap(),
);
} }
#[test] #[test]
fn match_() { fn match_() {
let secret = Secret::from_str("a100df7a048e50ed308ea696dc600215098141cb391e9527329df289f9383f65").unwrap(); let secret = Secret::from_str("a100df7a048e50ed308ea696dc600215098141cb391e9527329df289f9383f65").unwrap();
let extended_secret = ExtendedSecret::with_code(secret.clone(), 1.into()); let extended_secret = ExtendedSecret::with_code(secret.clone(), H256::from_low_u64_be(1));
let extended_public = ExtendedPublic::from_secret(&extended_secret).expect("Extended public should be created"); let extended_public = ExtendedPublic::from_secret(&extended_secret).expect("Extended public should be created");
let derived_secret0 = extended_secret.derive(0.into()); let derived_secret0 = extended_secret.derive(0.into());
@ -465,6 +481,7 @@ mod tests {
fn test_seeds() { fn test_seeds() {
let seed = H128::from_str("000102030405060708090a0b0c0d0e0f") let seed = H128::from_str("000102030405060708090a0b0c0d0e0f")
.expect("Seed should be valid H128") .expect("Seed should be valid H128")
.as_bytes()
.to_vec(); .to_vec();
// private key from bitcoin test vector // private key from bitcoin test vector

View File

@ -16,14 +16,13 @@
use std::fmt; use std::fmt;
use secp256k1::key; use secp256k1::key;
use rustc_hex::ToHex;
use keccak::Keccak256;
use super::{Secret, Public, Address, SECP256K1, Error}; use super::{Secret, Public, Address, SECP256K1, Error};
use parity_crypto::Keccak256 as _;
pub fn public_to_address(public: &Public) -> Address { pub fn public_to_address(public: &Public) -> Address {
let hash = public.keccak256(); let hash = public.keccak256();
let mut result = Address::default(); let mut result = Address::zero();
result.copy_from_slice(&hash[12..]); result.as_bytes_mut().copy_from_slice(&hash[12..]);
result result
} }
@ -36,9 +35,9 @@ pub struct KeyPair {
impl fmt::Display for KeyPair { impl fmt::Display for KeyPair {
fn fmt(&self, f: &mut fmt::Formatter) -> Result<(), fmt::Error> { fn fmt(&self, f: &mut fmt::Formatter) -> Result<(), fmt::Error> {
writeln!(f, "secret: {}", self.secret.to_hex())?; writeln!(f, "secret: {:x}", self.secret)?;
writeln!(f, "public: {}", self.public.to_hex())?; writeln!(f, "public: {:x}", self.public)?;
write!(f, "address: {}", self.address().to_hex()) write!(f, "address: {:x}", self.address())
} }
} }
@ -51,7 +50,7 @@ impl KeyPair {
let serialized = pub_key.serialize_vec(context, false); let serialized = pub_key.serialize_vec(context, false);
let mut public = Public::default(); let mut public = Public::default();
public.copy_from_slice(&serialized[1..65]); public.as_bytes_mut().copy_from_slice(&serialized[1..65]);
let keypair = KeyPair { let keypair = KeyPair {
secret: secret, secret: secret,
@ -70,7 +69,7 @@ impl KeyPair {
let serialized = publ.serialize_vec(context, false); let serialized = publ.serialize_vec(context, false);
let secret = Secret::from(sec); let secret = Secret::from(sec);
let mut public = Public::default(); let mut public = Public::default();
public.copy_from_slice(&serialized[1..65]); public.as_bytes_mut().copy_from_slice(&serialized[1..65]);
KeyPair { KeyPair {
secret: secret, secret: secret,

View File

@ -17,7 +17,7 @@
use super::{SECP256K1, Public, Secret, Error}; use super::{SECP256K1, Public, Secret, Error};
use secp256k1::key; use secp256k1::key;
use secp256k1::constants::{GENERATOR_X, GENERATOR_Y, CURVE_ORDER}; use secp256k1::constants::{GENERATOR_X, GENERATOR_Y, CURVE_ORDER};
use ethereum_types::{U256, H256}; use ethereum_types::{BigEndianHash as _, U256, H256};
/// Whether the public key is valid. /// Whether the public key is valid.
pub fn public_is_valid(public: &Public) -> bool { pub fn public_is_valid(public: &Public) -> bool {
@ -78,7 +78,7 @@ pub fn generation_point() -> Public {
/// Return secp256k1 elliptic curve order /// Return secp256k1 elliptic curve order
pub fn curve_order() -> U256 { pub fn curve_order() -> U256 {
H256::from_slice(&CURVE_ORDER).into() H256::from_slice(&CURVE_ORDER).into_uint()
} }
fn to_secp256k1_public(public: &Public) -> Result<key::PublicKey, Error> { fn to_secp256k1_public(public: &Public) -> Result<key::PublicKey, Error> {
@ -93,7 +93,7 @@ fn to_secp256k1_public(public: &Public) -> Result<key::PublicKey, Error> {
fn set_public(public: &mut Public, key_public: &key::PublicKey) { fn set_public(public: &mut Public, key_public: &key::PublicKey) {
let key_public_serialized = key_public.serialize_vec(&SECP256K1, false); let key_public_serialized = key_public.serialize_vec(&SECP256K1, false);
public.copy_from_slice(&key_public_serialized[1..65]); public.as_bytes_mut().copy_from_slice(&key_public_serialized[1..65]);
} }
#[cfg(test)] #[cfg(test)]

View File

@ -37,7 +37,7 @@ impl Generator for Prefix {
fn generate(&mut self) -> Result<KeyPair, Error> { fn generate(&mut self) -> Result<KeyPair, Error> {
for _ in 0..self.iterations { for _ in 0..self.iterations {
let keypair = Random.generate()?; let keypair = Random.generate()?;
if keypair.address().starts_with(&self.prefix) { if keypair.address().as_ref().starts_with(&self.prefix) {
return Ok(keypair) return Ok(keypair)
} }
} }
@ -54,6 +54,6 @@ mod tests {
fn prefix_generator() { fn prefix_generator() {
let prefix = vec![0xffu8]; let prefix = vec![0xffu8];
let keypair = Prefix::new(prefix.clone(), usize::max_value()).generate().unwrap(); let keypair = Prefix::new(prefix.clone(), usize::max_value()).generate().unwrap();
assert!(keypair.address().starts_with(&prefix)); assert!(keypair.address().as_bytes().starts_with(&prefix));
} }
} }

View File

@ -14,7 +14,7 @@
// You should have received a copy of the GNU General Public License // You should have received a copy of the GNU General Public License
// along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>. // along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>.
use rand::os::OsRng; use rand::rngs::OsRng;
use super::{Generator, KeyPair, SECP256K1}; use super::{Generator, KeyPair, SECP256K1};
/// Randomly generates new keypair, instantiating the RNG each time. /// Randomly generates new keypair, instantiating the RNG each time.

View File

@ -59,14 +59,14 @@ impl Secret {
if key.len() != 32 { if key.len() != 32 {
return None return None
} }
let mut h = H256::default(); let mut h = H256::zero();
h.copy_from_slice(&key[0..32]); h.as_bytes_mut().copy_from_slice(&key[0..32]);
Some(Secret { inner: Memzero::from(h) }) Some(Secret { inner: Memzero::from(h) })
} }
/// Creates zero key, which is invalid for crypto operations, but valid for math operation. /// Creates zero key, which is invalid for crypto operations, but valid for math operation.
pub fn zero() -> Self { pub fn zero() -> Self {
Secret { inner: Memzero::from(H256::default()) } Secret { inner: Memzero::from(H256::zero()) }
} }
/// Imports and validates the key. /// Imports and validates the key.

View File

@ -68,24 +68,44 @@ impl Signature {
/// Create a signature object from the sig. /// Create a signature object from the sig.
pub fn from_rsv(r: &H256, s: &H256, v: u8) -> Self { pub fn from_rsv(r: &H256, s: &H256, v: u8) -> Self {
let mut sig = [0u8; 65]; let mut sig = [0u8; 65];
sig[0..32].copy_from_slice(&r); sig[0..32].copy_from_slice(r.as_ref());
sig[32..64].copy_from_slice(&s); sig[32..64].copy_from_slice(s.as_ref());
sig[64] = v; sig[64] = v;
Signature(sig) Signature(sig)
} }
/// Check if this is a "low" signature. /// Check if this is a "low" signature.
pub fn is_low_s(&self) -> bool { pub fn is_low_s(&self) -> bool {
H256::from_slice(self.s()) <= "7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF5D576E7357A4501DDFE92F46681B20A0".into() // "7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF5D576E7357A4501DDFE92F46681B20A0"
const MASK: H256 = H256([
0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
0x5D, 0x57, 0x6E, 0x73, 0x57, 0xA4, 0x50, 0x1D,
0xDF, 0xE9, 0x2F, 0x46, 0x68, 0x1B, 0x20, 0xA0,
]);
H256::from_slice(self.s()) <= MASK
} }
/// Check if each component of the signature is in range. /// Check if each component of the signature is in range.
pub fn is_valid(&self) -> bool { pub fn is_valid(&self) -> bool {
// "fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141"
const MASK: H256 = H256([
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe,
0xba, 0xae, 0xdc, 0xe6, 0xaf, 0x48, 0xa0, 0x3b,
0xbf, 0xd2, 0x5e, 0x8c, 0xd0, 0x36, 0x41, 0x41,
]);
const ONE: H256 = H256([
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01,
]);
let r = H256::from_slice(self.r());
let s = H256::from_slice(self.s());
self.v() <= 1 && self.v() <= 1 &&
H256::from_slice(self.r()) < "fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141".into() && r < MASK && r >= ONE &&
H256::from_slice(self.r()) >= 1.into() && s < MASK && s >= ONE
H256::from_slice(self.s()) < "fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141".into() &&
H256::from_slice(self.s()) >= 1.into()
} }
} }
@ -190,7 +210,7 @@ impl DerefMut for Signature {
pub fn sign(secret: &Secret, message: &Message) -> Result<Signature, Error> { pub fn sign(secret: &Secret, message: &Message) -> Result<Signature, Error> {
let context = &SECP256K1; let context = &SECP256K1;
let sec = SecretKey::from_slice(context, &secret)?; let sec = SecretKey::from_slice(context, secret.as_ref())?;
let s = context.sign_recoverable(&SecpMessage::from_slice(&message[..])?, &sec)?; let s = context.sign_recoverable(&SecpMessage::from_slice(&message[..])?, &sec)?;
let (rec_id, data) = s.serialize_compact(context); let (rec_id, data) = s.serialize_compact(context);
let mut data_arr = [0; 65]; let mut data_arr = [0; 65];
@ -208,7 +228,7 @@ pub fn verify_public(public: &Public, signature: &Signature, message: &Message)
let pdata: [u8; 65] = { let pdata: [u8; 65] = {
let mut temp = [4u8; 65]; let mut temp = [4u8; 65];
temp[1..65].copy_from_slice(&**public); temp[1..65].copy_from_slice(public.as_bytes());
temp temp
}; };
@ -233,7 +253,7 @@ pub fn recover(signature: &Signature, message: &Message) -> Result<Public, Error
let serialized = pubkey.serialize_vec(context, false); let serialized = pubkey.serialize_vec(context, false);
let mut public = Public::default(); let mut public = Public::default();
public.copy_from_slice(&serialized[1..65]); public.as_bytes_mut().copy_from_slice(&serialized[1..65]);
Ok(public) Ok(public)
} }

View File

@ -6,7 +6,7 @@ authors = ["Parity Technologies <admin@parity.io>"]
[dependencies] [dependencies]
log = "0.4" log = "0.4"
libc = "0.2" libc = "0.2"
rand = "0.4" rand = "0.6"
ethkey = { path = "../ethkey" } ethkey = { path = "../ethkey" }
serde = "1.0" serde = "1.0"
serde_json = "1.0" serde_json = "1.0"
@ -17,12 +17,11 @@ time = "0.1.34"
itertools = "0.5" itertools = "0.5"
parking_lot = "0.7" parking_lot = "0.7"
parity-crypto = "0.4.0" parity-crypto = "0.4.0"
ethereum-types = "0.4" ethereum-types = "0.6.0"
dir = { path = "../../util/dir" } dir = { path = "../../util/dir" }
smallvec = "0.6" smallvec = "0.6"
parity-wordlist = "1.0" parity-wordlist = "1.0"
tempdir = "0.3" tempdir = "0.3"
lazy_static = "1.2.0"
[dev-dependencies] [dev-dependencies]
matches = "0.1" matches = "0.1"

View File

@ -21,4 +21,4 @@ path = "src/main.rs"
doc = false doc = false
[dev-dependencies] [dev-dependencies]
tempdir = "0.3.5" tempdir = "0.3"

View File

@ -74,7 +74,7 @@ impl From<Crypto> for String {
impl Crypto { impl Crypto {
/// Encrypt account secret /// Encrypt account secret
pub fn with_secret(secret: &Secret, password: &Password, iterations: u32) -> Result<Self, crypto::Error> { pub fn with_secret(secret: &Secret, password: &Password, iterations: u32) -> Result<Self, crypto::Error> {
Crypto::with_plain(&*secret, password, iterations) Crypto::with_plain(secret.as_ref(), password, iterations)
} }
/// Encrypt custom plain data /// Encrypt custom plain data

View File

@ -68,7 +68,7 @@ impl KeyDirectory for MemoryDirectory {
fn unique_repr(&self) -> Result<u64, Error> { fn unique_repr(&self) -> Result<u64, Error> {
let mut val = 0u64; let mut val = 0u64;
let accounts = self.accounts.read(); let accounts = self.accounts.read();
for acc in accounts.keys() { val = val ^ acc.low_u64() } for acc in accounts.keys() { val = val ^ acc.to_low_u64_be() }
Ok(val) Ok(val)
} }
} }

View File

@ -1084,7 +1084,7 @@ mod tests {
SecretVaultRef::Root, SecretVaultRef::Root,
&address, &address,
&"test".into(), &"test".into(),
Derivation::HardHash(H256::from(0)), Derivation::HardHash(H256::zero()),
).unwrap(); ).unwrap();
// there should be 2 accounts in the store // there should be 2 accounts in the store

View File

@ -36,8 +36,6 @@ extern crate ethereum_types;
extern crate ethkey as _ethkey; extern crate ethkey as _ethkey;
extern crate parity_wordlist; extern crate parity_wordlist;
#[macro_use]
extern crate lazy_static;
#[macro_use] #[macro_use]
extern crate log; extern crate log;
#[macro_use] #[macro_use]

View File

@ -14,7 +14,7 @@
// You should have received a copy of the GNU General Public License // You should have received a copy of the GNU General Public License
// along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>. // along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>.
use rand::{Rng, OsRng}; use rand::{Rng, RngCore, rngs::OsRng, distributions::Alphanumeric};
pub trait Random { pub trait Random {
fn random() -> Self where Self: Sized; fn random() -> Self where Self: Sized;
@ -41,5 +41,5 @@ impl Random for [u8; 32] {
/// Generate a random string of given length. /// Generate a random string of given length.
pub fn random_string(length: usize) -> String { pub fn random_string(length: usize) -> String {
let mut rng = OsRng::new().expect("Not able to operate without random source."); let mut rng = OsRng::new().expect("Not able to operate without random source.");
rng.gen_ascii_chars().take(length).collect() rng.sample_iter(&Alphanumeric).take(length).collect()
} }

View File

@ -16,6 +16,7 @@
extern crate rand; extern crate rand;
extern crate ethstore; extern crate ethstore;
extern crate ethereum_types;
mod util; mod util;
@ -23,6 +24,8 @@ use ethstore::{EthStore, SimpleSecretStore, SecretVaultRef, StoreAccountRef};
use ethstore::ethkey::{Random, Generator, Secret, KeyPair, verify_address}; use ethstore::ethkey::{Random, Generator, Secret, KeyPair, verify_address};
use ethstore::accounts_dir::RootDiskDirectory; use ethstore::accounts_dir::RootDiskDirectory;
use util::TransientDir; use util::TransientDir;
use ethereum_types::Address;
use std::str::FromStr;
#[test] #[test]
fn secret_store_create() { fn secret_store_create() {
@ -114,9 +117,9 @@ fn secret_store_laod_geth_files() {
let dir = RootDiskDirectory::at(test_path()); let dir = RootDiskDirectory::at(test_path());
let store = EthStore::open(Box::new(dir)).unwrap(); let store = EthStore::open(Box::new(dir)).unwrap();
assert_eq!(store.accounts().unwrap(), vec![ assert_eq!(store.accounts().unwrap(), vec![
StoreAccountRef::root("3f49624084b67849c7b4e805c5988c21a430f9d9".into()), StoreAccountRef::root(Address::from_str("3f49624084b67849c7b4e805c5988c21a430f9d9").unwrap()),
StoreAccountRef::root("5ba4dcf897e97c2bdf8315b9ef26c13c085988cf".into()), StoreAccountRef::root(Address::from_str("5ba4dcf897e97c2bdf8315b9ef26c13c085988cf").unwrap()),
StoreAccountRef::root("63121b431a52f8043c16fcf0d1df9cb7b5f66649".into()), StoreAccountRef::root(Address::from_str("63121b431a52f8043c16fcf0d1df9cb7b5f66649").unwrap()),
]); ]);
} }
@ -125,8 +128,8 @@ fn secret_store_load_pat_files() {
let dir = RootDiskDirectory::at(pat_path()); let dir = RootDiskDirectory::at(pat_path());
let store = EthStore::open(Box::new(dir)).unwrap(); let store = EthStore::open(Box::new(dir)).unwrap();
assert_eq!(store.accounts().unwrap(), vec![ assert_eq!(store.accounts().unwrap(), vec![
StoreAccountRef::root("3f49624084b67849c7b4e805c5988c21a430f9d9".into()), StoreAccountRef::root(Address::from_str("3f49624084b67849c7b4e805c5988c21a430f9d9").unwrap()),
StoreAccountRef::root("5ba4dcf897e97c2bdf8315b9ef26c13c085988cf".into()), StoreAccountRef::root(Address::from_str("5ba4dcf897e97c2bdf8315b9ef26c13c085988cf").unwrap()),
]); ]);
} }
@ -140,8 +143,8 @@ fn test_decrypting_files_with_short_ciphertext() {
let store = EthStore::open(Box::new(dir)).unwrap(); let store = EthStore::open(Box::new(dir)).unwrap();
let accounts = store.accounts().unwrap(); let accounts = store.accounts().unwrap();
assert_eq!(accounts, vec![ assert_eq!(accounts, vec![
StoreAccountRef::root("31e9d1e6d844bd3a536800ef8d8be6a9975db509".into()), StoreAccountRef::root(Address::from_str("31e9d1e6d844bd3a536800ef8d8be6a9975db509").unwrap()),
StoreAccountRef::root("d1e64e5480bfaf733ba7d48712decb8227797a4e".into()), StoreAccountRef::root(Address::from_str("d1e64e5480bfaf733ba7d48712decb8227797a4e").unwrap()),
]); ]);
let message = Default::default(); let message = Default::default();

View File

@ -16,7 +16,7 @@
use std::path::PathBuf; use std::path::PathBuf;
use std::{env, fs}; use std::{env, fs};
use rand::{Rng, OsRng}; use rand::{RngCore, rngs::OsRng};
use ethstore::accounts_dir::{KeyDirectory, RootDiskDirectory}; use ethstore::accounts_dir::{KeyDirectory, RootDiskDirectory};
use ethstore::{Error, SafeAccount}; use ethstore::{Error, SafeAccount};

View File

@ -528,7 +528,7 @@ mod tests {
let derived_addr = ap.derive_account( let derived_addr = ap.derive_account(
&kp.address(), &kp.address(),
None, None,
Derivation::SoftHash(H256::from(999)), Derivation::SoftHash(H256::from_low_u64_be(999)),
false, false,
).expect("Derivation should not fail"); ).expect("Derivation should not fail");
@ -546,7 +546,7 @@ mod tests {
let derived_addr = ap.derive_account( let derived_addr = ap.derive_account(
&kp.address(), &kp.address(),
None, None,
Derivation::SoftHash(H256::from(999)), Derivation::SoftHash(H256::from_low_u64_be(999)),
true, true,
).expect("Derivation should not fail"); ).expect("Derivation should not fail");
@ -567,7 +567,7 @@ mod tests {
let derived_addr = ap.derive_account( let derived_addr = ap.derive_account(
&kp.address(), &kp.address(),
None, None,
Derivation::SoftHash(H256::from(1999)), Derivation::SoftHash(H256::from_low_u64_be(1999)),
true, true,
).expect("Derivation should not fail"); ).expect("Derivation should not fail");
ap.unlock_account_permanently(derived_addr, "base".into()) ap.unlock_account_permanently(derived_addr, "base".into())
@ -579,7 +579,7 @@ mod tests {
let signed_msg2 = ap.sign_derived( let signed_msg2 = ap.sign_derived(
&kp.address(), &kp.address(),
None, None,
Derivation::SoftHash(H256::from(1999)), Derivation::SoftHash(H256::from_low_u64_be(1999)),
msg, msg,
).expect("Derived signing with existing unlocked account should not fail"); ).expect("Derived signing with existing unlocked account should not fail");

View File

@ -153,7 +153,7 @@ impl<K: hash::Hash + Eq, V> DiskMap<K, V> {
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
use super::AddressBook; use super::{AddressBook, Address};
use std::collections::HashMap; use std::collections::HashMap;
use tempdir::TempDir; use tempdir::TempDir;
use crate::account_data::AccountMeta; use crate::account_data::AccountMeta;
@ -162,12 +162,12 @@ mod tests {
fn should_save_and_reload_address_book() { fn should_save_and_reload_address_book() {
let tempdir = TempDir::new("").unwrap(); let tempdir = TempDir::new("").unwrap();
let mut b = AddressBook::new(tempdir.path()); let mut b = AddressBook::new(tempdir.path());
b.set_name(1.into(), "One".to_owned()); b.set_name(Address::from_low_u64_be(1), "One".to_owned());
b.set_meta(1.into(), "{1:1}".to_owned()); b.set_meta(Address::from_low_u64_be(1), "{1:1}".to_owned());
let b = AddressBook::new(tempdir.path()); let b = AddressBook::new(tempdir.path());
assert_eq!(b.get(), vec![ assert_eq!(b.get(), vec![
(1, AccountMeta {name: "One".to_owned(), meta: "{1:1}".to_owned(), uuid: None}) (Address::from_low_u64_be(1), AccountMeta {name: "One".to_owned(), meta: "{1:1}".to_owned(), uuid: None})
].into_iter().map(|(a, b)| (a.into(), b)).collect::<HashMap<_, _>>()); ].into_iter().collect::<HashMap<_, _>>());
} }
#[test] #[test]
@ -175,15 +175,15 @@ mod tests {
let tempdir = TempDir::new("").unwrap(); let tempdir = TempDir::new("").unwrap();
let mut b = AddressBook::new(tempdir.path()); let mut b = AddressBook::new(tempdir.path());
b.set_name(1.into(), "One".to_owned()); b.set_name(Address::from_low_u64_be(1), "One".to_owned());
b.set_name(2.into(), "Two".to_owned()); b.set_name(Address::from_low_u64_be(2), "Two".to_owned());
b.set_name(3.into(), "Three".to_owned()); b.set_name(Address::from_low_u64_be(3), "Three".to_owned());
b.remove(2.into()); b.remove(Address::from_low_u64_be(2).into());
let b = AddressBook::new(tempdir.path()); let b = AddressBook::new(tempdir.path());
assert_eq!(b.get(), vec![ assert_eq!(b.get(), vec![
(1, AccountMeta{name: "One".to_owned(), meta: "{}".to_owned(), uuid: None}), (Address::from_low_u64_be(1), AccountMeta{name: "One".to_owned(), meta: "{}".to_owned(), uuid: None}),
(3, AccountMeta{name: "Three".to_owned(), meta: "{}".to_owned(), uuid: None}), (Address::from_low_u64_be(3), AccountMeta{name: "Three".to_owned(), meta: "{}".to_owned(), uuid: None}),
].into_iter().map(|(a, b)| (a.into(), b)).collect::<HashMap<_, _>>()); ].into_iter().collect::<HashMap<_, _>>());
} }
} }

View File

@ -7,7 +7,7 @@ name = "cli-signer"
version = "1.4.0" version = "1.4.0"
[dependencies] [dependencies]
ethereum-types = "0.4" ethereum-types = "0.6.0"
futures = "0.1" futures = "0.1"
rpassword = "1.0" rpassword = "1.0"
parity-rpc = { path = "../rpc" } parity-rpc = { path = "../rpc" }

View File

@ -7,7 +7,7 @@ name = "parity-rpc-client"
version = "1.4.0" version = "1.4.0"
[dependencies] [dependencies]
ethereum-types = "0.4" ethereum-types = "0.6.0"
futures = "0.1" futures = "0.1"
log = "0.4" log = "0.4"
serde = "1.0" serde = "1.0"
@ -18,4 +18,4 @@ parking_lot = "0.7"
jsonrpc-core = "10.0.1" jsonrpc-core = "10.0.1"
jsonrpc-ws-server = "10.0.1" jsonrpc-ws-server = "10.0.1"
parity-rpc = { path = "../../rpc" } parity-rpc = { path = "../../rpc" }
keccak-hash = "0.1" keccak-hash = "0.2.0"

View File

@ -6,8 +6,8 @@ authors = ["Parity Technologies <admin@parity.io>"]
[dependencies] [dependencies]
crunchy = "0.1.0" crunchy = "0.1.0"
either = "1.0.0" either = "1.0.0"
ethereum-types = "0.4" ethereum-types = "0.6.0"
keccak-hash = "0.1" keccak-hash = "0.2.0"
log = "0.4" log = "0.4"
memmap = "0.6" memmap = "0.6"
parking_lot = "0.7" parking_lot = "0.7"

View File

@ -52,14 +52,14 @@ mod progpow;
pub use cache::{NodeCacheBuilder, OptimizeFor}; pub use cache::{NodeCacheBuilder, OptimizeFor};
pub use compute::{ProofOfWork, quick_get_difficulty, slow_hash_block_number}; pub use compute::{ProofOfWork, quick_get_difficulty, slow_hash_block_number};
use compute::Light; use compute::Light;
use ethereum_types::{U256, U512}; use ethereum_types::{BigEndianHash, U256, U512};
use keccak::H256; use keccak::H256;
use parking_lot::Mutex; use parking_lot::Mutex;
pub use seed_compute::SeedHashCompute; pub use seed_compute::SeedHashCompute;
pub use shared::ETHASH_EPOCH_LENGTH; pub use shared::ETHASH_EPOCH_LENGTH;
use std::mem; use std::mem;
use std::path::{Path, PathBuf}; use std::path::{Path, PathBuf};
use std::convert::TryFrom;
use std::sync::Arc; use std::sync::Arc;
struct LightCache { struct LightCache {
@ -161,12 +161,12 @@ impl EthashManager {
/// Convert an Ethash boundary to its original difficulty. Basically just `f(x) = 2^256 / x`. /// Convert an Ethash boundary to its original difficulty. Basically just `f(x) = 2^256 / x`.
pub fn boundary_to_difficulty(boundary: &ethereum_types::H256) -> U256 { pub fn boundary_to_difficulty(boundary: &ethereum_types::H256) -> U256 {
difficulty_to_boundary_aux(&**boundary) difficulty_to_boundary_aux(&boundary.into_uint())
} }
/// Convert an Ethash difficulty to the target boundary. Basically just `f(x) = 2^256 / x`. /// Convert an Ethash difficulty to the target boundary. Basically just `f(x) = 2^256 / x`.
pub fn difficulty_to_boundary(difficulty: &U256) -> ethereum_types::H256 { pub fn difficulty_to_boundary(difficulty: &U256) -> ethereum_types::H256 {
difficulty_to_boundary_aux(difficulty).into() BigEndianHash::from_uint(&difficulty_to_boundary_aux(difficulty))
} }
fn difficulty_to_boundary_aux<T: Into<U512>>(difficulty: T) -> ethereum_types::U256 { fn difficulty_to_boundary_aux<T: Into<U512>>(difficulty: T) -> ethereum_types::U256 {
@ -177,8 +177,8 @@ fn difficulty_to_boundary_aux<T: Into<U512>>(difficulty: T) -> ethereum_types::U
if difficulty == U512::one() { if difficulty == U512::one() {
U256::max_value() U256::max_value()
} else { } else {
// difficulty > 1, so result should never overflow 256 bits const PROOF: &str = "difficulty > 1, so result never overflows 256 bits; qed";
U256::from((U512::one() << 256) / difficulty) U256::try_from((U512::one() << 256) / difficulty).expect(PROOF)
} }
} }
@ -203,10 +203,10 @@ fn test_lru() {
#[test] #[test]
fn test_difficulty_to_boundary() { fn test_difficulty_to_boundary() {
use ethereum_types::H256; use ethereum_types::{H256, BigEndianHash};
use std::str::FromStr; use std::str::FromStr;
assert_eq!(difficulty_to_boundary(&U256::from(1)), H256::from(U256::max_value())); assert_eq!(difficulty_to_boundary(&U256::from(1)), BigEndianHash::from_uint(&U256::max_value()));
assert_eq!(difficulty_to_boundary(&U256::from(2)), H256::from_str("8000000000000000000000000000000000000000000000000000000000000000").unwrap()); assert_eq!(difficulty_to_boundary(&U256::from(2)), H256::from_str("8000000000000000000000000000000000000000000000000000000000000000").unwrap());
assert_eq!(difficulty_to_boundary(&U256::from(4)), H256::from_str("4000000000000000000000000000000000000000000000000000000000000000").unwrap()); assert_eq!(difficulty_to_boundary(&U256::from(4)), H256::from_str("4000000000000000000000000000000000000000000000000000000000000000").unwrap());
assert_eq!(difficulty_to_boundary(&U256::from(32)), H256::from_str("0800000000000000000000000000000000000000000000000000000000000000").unwrap()); assert_eq!(difficulty_to_boundary(&U256::from(32)), H256::from_str("0800000000000000000000000000000000000000000000000000000000000000").unwrap());
@ -220,9 +220,18 @@ fn test_difficulty_to_boundary_regression() {
// https://github.com/paritytech/parity-ethereum/issues/8397 // https://github.com/paritytech/parity-ethereum/issues/8397
for difficulty in 1..9 { for difficulty in 1..9 {
assert_eq!(U256::from(difficulty), boundary_to_difficulty(&difficulty_to_boundary(&difficulty.into()))); assert_eq!(U256::from(difficulty), boundary_to_difficulty(&difficulty_to_boundary(&difficulty.into())));
assert_eq!(H256::from(difficulty), difficulty_to_boundary(&boundary_to_difficulty(&difficulty.into()))); assert_eq!(
assert_eq!(U256::from(difficulty), boundary_to_difficulty(&boundary_to_difficulty(&difficulty.into()).into())); H256::from_low_u64_be(difficulty),
assert_eq!(H256::from(difficulty), difficulty_to_boundary(&difficulty_to_boundary(&difficulty.into()).into())); difficulty_to_boundary(&boundary_to_difficulty(&H256::from_low_u64_be(difficulty))),
);
assert_eq!(
U256::from(difficulty),
boundary_to_difficulty(&BigEndianHash::from_uint(&boundary_to_difficulty(&H256::from_low_u64_be(difficulty)))),
);
assert_eq!(
H256::from_low_u64_be(difficulty),
difficulty_to_boundary(&difficulty_to_boundary(&difficulty.into()).into_uint()),
);
} }
} }
@ -235,5 +244,5 @@ fn test_difficulty_to_boundary_panics_on_zero() {
#[test] #[test]
#[should_panic] #[should_panic]
fn test_boundary_to_difficulty_panics_on_zero() { fn test_boundary_to_difficulty_panics_on_zero() {
boundary_to_difficulty(&ethereum_types::H256::from(0)); boundary_to_difficulty(&ethereum_types::H256::zero());
} }

View File

@ -15,9 +15,9 @@ common-types = { path = "types" }
crossbeam = "0.4" crossbeam = "0.4"
derive_more = "0.14.0" derive_more = "0.14.0"
env_logger = { version = "0.5", optional = true } env_logger = { version = "0.5", optional = true }
ethabi = "6.0" ethabi = "8.0"
ethabi-contract = "6.0" ethabi-contract = "8.0"
ethabi-derive = "6.0" ethabi-derive = "8.0"
ethash = { path = "../ethash" } ethash = { path = "../ethash" }
ethcore-blockchain = { path = "./blockchain" } ethcore-blockchain = { path = "./blockchain" }
ethcore-bloom-journal = { path = "../util/bloom" } ethcore-bloom-journal = { path = "../util/bloom" }
@ -26,7 +26,7 @@ ethcore-db = { path = "./db" }
ethcore-io = { path = "../util/io" } ethcore-io = { path = "../util/io" }
ethcore-miner = { path = "../miner" } ethcore-miner = { path = "../miner" }
ethcore-stratum = { path = "../miner/stratum", optional = true } ethcore-stratum = { path = "../miner/stratum", optional = true }
ethereum-types = "0.4" ethereum-types = "0.6.0"
ethjson = { path = "../json" } ethjson = { path = "../json" }
ethkey = { path = "../accounts/ethkey" } ethkey = { path = "../accounts/ethkey" }
evm = { path = "evm" } evm = { path = "evm" }
@ -35,7 +35,7 @@ hash-db = "0.11.0"
heapsize = "0.4" heapsize = "0.4"
itertools = "0.5" itertools = "0.5"
journaldb = { path = "../util/journaldb" } journaldb = { path = "../util/journaldb" }
keccak-hash = "0.1" keccak-hash = "0.2.0"
keccak-hasher = { path = "../util/keccak-hasher" } keccak-hasher = { path = "../util/keccak-hasher" }
kvdb = "0.1" kvdb = "0.1"
kvdb-memorydb = "0.1" kvdb-memorydb = "0.1"
@ -55,9 +55,9 @@ parity-snappy = "0.1"
parking_lot = "0.7" parking_lot = "0.7"
trie-db = "0.11.0" trie-db = "0.11.0"
patricia-trie-ethereum = { path = "../util/patricia-trie-ethereum" } patricia-trie-ethereum = { path = "../util/patricia-trie-ethereum" }
rand = "0.4" rand = "0.6"
rayon = "1.0" rayon = "1.0"
rlp = { version = "0.3.0", features = ["ethereum"] } rlp = "0.4.0"
rlp_derive = { path = "../util/rlp-derive" } rlp_derive = { path = "../util/rlp-derive" }
rustc-hex = "1.0" rustc-hex = "1.0"
serde = "1.0" serde = "1.0"
@ -71,6 +71,7 @@ unexpected = { path = "../util/unexpected" }
using_queue = { path = "../miner/using-queue" } using_queue = { path = "../miner/using-queue" }
vm = { path = "vm" } vm = { path = "vm" }
wasm = { path = "wasm" } wasm = { path = "wasm" }
rand_xorshift = "0.1.1"
[dev-dependencies] [dev-dependencies]
blooms-db = { path = "../util/blooms-db" } blooms-db = { path = "../util/blooms-db" }
@ -82,7 +83,7 @@ kvdb-rocksdb = "0.1.3"
parity-runtime = { path = "../util/runtime" } parity-runtime = { path = "../util/runtime" }
rlp_compress = { path = "../util/rlp-compress" } rlp_compress = { path = "../util/rlp-compress" }
tempdir = "0.3" tempdir = "0.3"
trie-standardmap = "0.1" trie-standardmap = "0.12.3"
[features] [features]
parity = ["work-notify", "price-info", "stratum"] parity = ["work-notify", "price-info", "stratum"]

View File

@ -12,7 +12,7 @@ ansi_term = "0.10"
blooms-db = { path = "../../util/blooms-db" } blooms-db = { path = "../../util/blooms-db" }
common-types = { path = "../types" } common-types = { path = "../types" }
ethcore-db = { path = "../db" } ethcore-db = { path = "../db" }
ethereum-types = "0.4" ethereum-types = "0.6.0"
heapsize = "0.4" heapsize = "0.4"
itertools = "0.5" itertools = "0.5"
kvdb = "0.1" kvdb = "0.1"
@ -20,14 +20,14 @@ log = "0.4"
parity-bytes = "0.1" parity-bytes = "0.1"
parking_lot = "0.7" parking_lot = "0.7"
rayon = "1.0" rayon = "1.0"
rlp = { version = "0.3.0", features = ["ethereum"] } rlp = "0.4.0"
rlp_compress = { path = "../../util/rlp-compress" } rlp_compress = { path = "../../util/rlp-compress" }
rlp_derive = { path = "../../util/rlp-derive" } rlp_derive = { path = "../../util/rlp-derive" }
[dev-dependencies] [dev-dependencies]
env_logger = "0.5" env_logger = "0.5"
ethkey = { path = "../../accounts/ethkey" } ethkey = { path = "../../accounts/ethkey" }
keccak-hash = "0.1" keccak-hash = "0.2.0"
rustc-hex = "1.0" rustc-hex = "1.0"
tempdir = "0.3" tempdir = "0.3"
kvdb-memorydb = "0.1" kvdb-memorydb = "0.1"

View File

@ -284,7 +284,7 @@ impl BlockProvider for BlockChain {
} }
// Read from DB and populate cache // Read from DB and populate cache
let b = self.db.key_value().get(db::COL_HEADERS, hash) let b = self.db.key_value().get(db::COL_HEADERS, hash.as_bytes())
.expect("Low level database error when fetching block header data. Some issue with disk?")?; .expect("Low level database error when fetching block header data. Some issue with disk?")?;
let header = encoded::Header::new(decompress(&b, blocks_swapper()).into_vec()); let header = encoded::Header::new(decompress(&b, blocks_swapper()).into_vec());
@ -314,7 +314,7 @@ impl BlockProvider for BlockChain {
} }
// Read from DB and populate cache // Read from DB and populate cache
let b = self.db.key_value().get(db::COL_BODIES, hash) let b = self.db.key_value().get(db::COL_BODIES, hash.as_bytes())
.expect("Low level database error when fetching block body data. Some issue with disk?")?; .expect("Low level database error when fetching block body data. Some issue with disk?")?;
let body = encoded::Body::new(decompress(&b, blocks_swapper()).into_vec()); let body = encoded::Body::new(decompress(&b, blocks_swapper()).into_vec());
@ -469,7 +469,7 @@ impl<'a> Iterator for AncestryWithMetadataIter<'a> {
}) })
}, },
_ => { _ => {
self.current = H256::default(); self.current = H256::zero();
None None
}, },
} }
@ -572,13 +572,13 @@ impl BlockChain {
}; };
let mut batch = DBTransaction::new(); let mut batch = DBTransaction::new();
batch.put(db::COL_HEADERS, &hash, block.header_rlp().as_raw()); batch.put(db::COL_HEADERS, hash.as_bytes(), block.header_rlp().as_raw());
batch.put(db::COL_BODIES, &hash, &Self::block_to_body(genesis)); batch.put(db::COL_BODIES, hash.as_bytes(), &Self::block_to_body(genesis));
batch.write(db::COL_EXTRA, &hash, &details); batch.write(db::COL_EXTRA, &hash, &details);
batch.write(db::COL_EXTRA, &header.number(), &hash); batch.write(db::COL_EXTRA, &header.number(), &hash);
batch.put(db::COL_EXTRA, b"best", &hash); batch.put(db::COL_EXTRA, b"best", hash.as_bytes());
bc.db.key_value().write(batch).expect("Low level database error when fetching 'best' block. Some issue with disk?"); bc.db.key_value().write(batch).expect("Low level database error when fetching 'best' block. Some issue with disk?");
hash hash
} }
@ -639,7 +639,7 @@ impl BlockChain {
if hash != bc.genesis_hash() { if hash != bc.genesis_hash() {
trace!("First block calculated: {:?}", hash); trace!("First block calculated: {:?}", hash);
let mut batch = db.key_value().transaction(); let mut batch = db.key_value().transaction();
batch.put(db::COL_EXTRA, b"first", &hash); batch.put(db::COL_EXTRA, b"first", hash.as_bytes());
db.key_value().write(batch).expect("Low level database error when writing 'first' block. Some issue with disk?"); db.key_value().write(batch).expect("Low level database error when writing 'first' block. Some issue with disk?");
bc.first_block = Some(hash); bc.first_block = Some(hash);
} }
@ -788,8 +788,8 @@ impl BlockChain {
let compressed_body = compress(&Self::block_to_body(block.raw()), blocks_swapper()); let compressed_body = compress(&Self::block_to_body(block.raw()), blocks_swapper());
// store block in db // store block in db
batch.put(db::COL_HEADERS, &hash, &compressed_header); batch.put(db::COL_HEADERS, hash.as_bytes(), &compressed_header);
batch.put(db::COL_BODIES, &hash, &compressed_body); batch.put(db::COL_BODIES, hash.as_bytes(), &compressed_body);
let maybe_parent = self.block_details(&block_parent_hash); let maybe_parent = self.block_details(&block_parent_hash);
@ -932,7 +932,7 @@ impl BlockChain {
*pending_best_ancient_block = Some(None); *pending_best_ancient_block = Some(None);
} else if block_number > ancient_number { } else if block_number > ancient_number {
trace!(target: "blockchain", "Updating the best ancient block to {}.", block_number); trace!(target: "blockchain", "Updating the best ancient block to {}.", block_number);
batch.put(db::COL_EXTRA, b"ancient", &block_hash); batch.put(db::COL_EXTRA, b"ancient", block_hash.as_bytes());
*pending_best_ancient_block = Some(Some(BestAncientBlock { *pending_best_ancient_block = Some(Some(BestAncientBlock {
hash: *block_hash, hash: *block_hash,
number: block_number, number: block_number,
@ -1072,8 +1072,8 @@ impl BlockChain {
let compressed_body = compress(&Self::block_to_body(block.raw()), blocks_swapper()); let compressed_body = compress(&Self::block_to_body(block.raw()), blocks_swapper());
// store block in db // store block in db
batch.put(db::COL_HEADERS, &hash, &compressed_header); batch.put(db::COL_HEADERS, hash.as_bytes(), &compressed_header);
batch.put(db::COL_BODIES, &hash, &compressed_body); batch.put(db::COL_BODIES, hash.as_bytes(), &compressed_body);
let info = self.block_info(&block.header_view(), route, &extras); let info = self.block_info(&block.header_view(), route, &extras);
@ -1172,7 +1172,7 @@ impl BlockChain {
{ {
let mut best_block = self.pending_best_block.write(); let mut best_block = self.pending_best_block.write();
if is_best && update.info.location != BlockLocation::Branch { if is_best && update.info.location != BlockLocation::Branch {
batch.put(db::COL_EXTRA, b"best", &update.info.hash); batch.put(db::COL_EXTRA, b"best", update.info.hash.as_bytes());
*best_block = Some(BestBlock { *best_block = Some(BestBlock {
total_difficulty: update.info.total_difficulty, total_difficulty: update.info.total_difficulty,
header: update.block.decode_header(), header: update.block.decode_header(),
@ -1259,7 +1259,7 @@ impl BlockChain {
current: if self.is_known(&first) { current: if self.is_known(&first) {
first first
} else { } else {
H256::default() // zero hash H256::zero() // zero hash
}, },
chain: self chain: self
} }
@ -1571,6 +1571,7 @@ mod tests {
use keccak_hash::keccak; use keccak_hash::keccak;
use rustc_hex::FromHex; use rustc_hex::FromHex;
use tempdir::TempDir; use tempdir::TempDir;
use std::str::FromStr;
struct TestBlockChainDB { struct TestBlockChainDB {
_blooms_dir: TempDir, _blooms_dir: TempDir,
@ -1629,8 +1630,6 @@ mod tests {
} }
fn insert_block_batch(batch: &mut DBTransaction, bc: &BlockChain, block: encoded::Block, receipts: Vec<Receipt>) -> ImportRoute { fn insert_block_batch(batch: &mut DBTransaction, bc: &BlockChain, block: encoded::Block, receipts: Vec<Receipt>) -> ImportRoute {
use crate::ExtrasInsert;
let fork_choice = { let fork_choice = {
let header = block.header_view(); let header = block.header_view();
let parent_hash = header.parent_hash(); let parent_hash = header.parent_hash();
@ -2057,7 +2056,7 @@ mod tests {
fn find_transaction_by_hash() { fn find_transaction_by_hash() {
let genesis = "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".from_hex().unwrap(); let genesis = "f901fcf901f7a00000000000000000000000000000000000000000000000000000000000000000a01dcc4de8dec75d7aab85b567b6ccd41ad312451b948a7413f0a142fd40d49347948888f1f195afa192cfee860698584c030f4c9db1a0af81e09f8c46ca322193edfda764fa7e88e81923f802f1d325ec0b0308ac2cd0a056e81f171bcc55a6ff8345e692c0f86e5b48e01b996cadc001622fb5e363b421a056e81f171bcc55a6ff8345e692c0f86e5b48e01b996cadc001622fb5e363b421b9010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000830200008083023e38808454c98c8142a056e81f171bcc55a6ff8345e692c0f86e5b48e01b996cadc001622fb5e363b421880102030405060708c0c0".from_hex().unwrap();
let b1 = "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".from_hex().unwrap(); let b1 = "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".from_hex().unwrap();
let b1_hash: H256 = "f53f268d23a71e85c7d6d83a9504298712b84c1a2ba220441c86eeda0bf0b6e3".into(); let b1_hash = H256::from_str("f53f268d23a71e85c7d6d83a9504298712b84c1a2ba220441c86eeda0bf0b6e3").unwrap();
let db = new_db(); let db = new_db();
let bc = new_chain(encoded::Block::new(genesis), db.clone()); let bc = new_chain(encoded::Block::new(genesis), db.clone());
@ -2130,7 +2129,7 @@ mod tests {
let db = new_db(); let db = new_db();
let bc = new_chain(genesis.last().encoded(), db.clone()); let bc = new_chain(genesis.last().encoded(), db.clone());
insert_block(&db, &bc, b1.last().encoded(), vec![Receipt { insert_block(&db, &bc, b1.last().encoded(), vec![Receipt {
outcome: TransactionOutcome::StateRoot(H256::default()), outcome: TransactionOutcome::StateRoot(H256::zero()),
gas_used: 10_000.into(), gas_used: 10_000.into(),
log_bloom: Default::default(), log_bloom: Default::default(),
logs: vec![ logs: vec![
@ -2139,7 +2138,7 @@ mod tests {
], ],
}, },
Receipt { Receipt {
outcome: TransactionOutcome::StateRoot(H256::default()), outcome: TransactionOutcome::StateRoot(H256::zero()),
gas_used: 10_000.into(), gas_used: 10_000.into(),
log_bloom: Default::default(), log_bloom: Default::default(),
logs: vec![ logs: vec![
@ -2148,7 +2147,7 @@ mod tests {
}]); }]);
insert_block(&db, &bc, b2.last().encoded(), vec![ insert_block(&db, &bc, b2.last().encoded(), vec![
Receipt { Receipt {
outcome: TransactionOutcome::StateRoot(H256::default()), outcome: TransactionOutcome::StateRoot(H256::zero()),
gas_used: 10_000.into(), gas_used: 10_000.into(),
log_bloom: Default::default(), log_bloom: Default::default(),
logs: vec![ logs: vec![
@ -2158,7 +2157,7 @@ mod tests {
]); ]);
insert_block(&db, &bc, b3.last().encoded(), vec![ insert_block(&db, &bc, b3.last().encoded(), vec![
Receipt { Receipt {
outcome: TransactionOutcome::StateRoot(H256::default()), outcome: TransactionOutcome::StateRoot(H256::zero()),
gas_used: 10_000.into(), gas_used: 10_000.into(),
log_bloom: Default::default(), log_bloom: Default::default(),
logs: vec![ logs: vec![
@ -2237,11 +2236,11 @@ mod tests {
#[test] #[test]
fn test_bloom_filter_simple() { fn test_bloom_filter_simple() {
let bloom_b1: Bloom = "00000020000000000000000000000000000000000000000002000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000400000000000000000000002000".into(); let bloom_b1 = Bloom::from_str("00000020000000000000000000000000000000000000000002000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000400000000000000000000002000").unwrap();
let bloom_b2: Bloom = "00000000000000000000000000000000000000000000020000001000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000008000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000".into(); let bloom_b2 = Bloom::from_str("00000000000000000000000000000000000000000000020000001000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000008000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000").unwrap();
let bloom_ba: Bloom = "00000000000000000000000000000000000000000000020000000800000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000008000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000".into(); let bloom_ba = Bloom::from_str("00000000000000000000000000000000000000000000020000000800000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000008000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000").unwrap();
let genesis = BlockBuilder::genesis(); let genesis = BlockBuilder::genesis();
let b1 = genesis.add_block_with(|| BlockOptions { let b1 = genesis.add_block_with(|| BlockOptions {
@ -2305,11 +2304,11 @@ mod tests {
#[test] #[test]
fn test_insert_unordered() { fn test_insert_unordered() {
let bloom_b1: Bloom = "00000020000000000000000000000000000000000000000002000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000400000000000000000000002000".into(); let bloom_b1 = Bloom::from_str("00000020000000000000000000000000000000000000000002000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000400000000000000000000002000").unwrap();
let bloom_b2: Bloom = "00000000000000000000000000000000000000000000020000001000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000008000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000".into(); let bloom_b2 = Bloom::from_str("00000000000000000000000000000000000000000000020000001000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000008000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000").unwrap();
let bloom_b3: Bloom = "00000000000000000000000000000000000000000000020000000800000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000008000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000".into(); let bloom_b3 = Bloom::from_str("00000000000000000000000000000000000000000000020000000800000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000008000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000").unwrap();
let genesis = BlockBuilder::genesis(); let genesis = BlockBuilder::genesis();
let b1 = genesis.add_block_with_bloom(bloom_b1); let b1 = genesis.add_block_with_bloom(bloom_b1);

View File

@ -68,7 +68,7 @@ impl From<BlockInfo> for ImportRoute {
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
use ethereum_types::{H256, U256}; use ethereum_types::{U256, BigEndianHash};
use crate::block_info::{BlockInfo, BlockLocation, BranchBecomingCanonChainData}; use crate::block_info::{BlockInfo, BlockLocation, BranchBecomingCanonChainData};
use super::ImportRoute; use super::ImportRoute;
@ -84,7 +84,7 @@ mod tests {
#[test] #[test]
fn import_route_branch() { fn import_route_branch() {
let info = BlockInfo { let info = BlockInfo {
hash: H256::from(U256::from(1)), hash: BigEndianHash::from_uint(&U256::from(1)),
number: 0, number: 0,
total_difficulty: U256::from(0), total_difficulty: U256::from(0),
location: BlockLocation::Branch, location: BlockLocation::Branch,
@ -93,14 +93,14 @@ mod tests {
assert_eq!(ImportRoute::from(info), ImportRoute { assert_eq!(ImportRoute::from(info), ImportRoute {
retracted: vec![], retracted: vec![],
enacted: vec![], enacted: vec![],
omitted: vec![H256::from(U256::from(1))], omitted: vec![BigEndianHash::from_uint(&U256::from(1))],
}); });
} }
#[test] #[test]
fn import_route_canon_chain() { fn import_route_canon_chain() {
let info = BlockInfo { let info = BlockInfo {
hash: H256::from(U256::from(1)), hash: BigEndianHash::from_uint(&U256::from(1)),
number: 0, number: 0,
total_difficulty: U256::from(0), total_difficulty: U256::from(0),
location: BlockLocation::CanonChain, location: BlockLocation::CanonChain,
@ -108,7 +108,7 @@ mod tests {
assert_eq!(ImportRoute::from(info), ImportRoute { assert_eq!(ImportRoute::from(info), ImportRoute {
retracted: vec![], retracted: vec![],
enacted: vec![H256::from(U256::from(1))], enacted: vec![BigEndianHash::from_uint(&U256::from(1))],
omitted: vec![], omitted: vec![],
}); });
} }
@ -116,19 +116,19 @@ mod tests {
#[test] #[test]
fn import_route_branch_becoming_canon_chain() { fn import_route_branch_becoming_canon_chain() {
let info = BlockInfo { let info = BlockInfo {
hash: H256::from(U256::from(2)), hash: BigEndianHash::from_uint(&U256::from(2)),
number: 0, number: 0,
total_difficulty: U256::from(0), total_difficulty: U256::from(0),
location: BlockLocation::BranchBecomingCanonChain(BranchBecomingCanonChainData { location: BlockLocation::BranchBecomingCanonChain(BranchBecomingCanonChainData {
ancestor: H256::from(U256::from(0)), ancestor: BigEndianHash::from_uint(&U256::from(0)),
enacted: vec![H256::from(U256::from(1))], enacted: vec![BigEndianHash::from_uint(&U256::from(1))],
retracted: vec![H256::from(U256::from(3)), H256::from(U256::from(4))], retracted: vec![BigEndianHash::from_uint(&U256::from(3)), BigEndianHash::from_uint(&U256::from(4))],
}) })
}; };
assert_eq!(ImportRoute::from(info), ImportRoute { assert_eq!(ImportRoute::from(info), ImportRoute {
retracted: vec![H256::from(U256::from(3)), H256::from(U256::from(4))], retracted: vec![BigEndianHash::from_uint(&U256::from(3)), BigEndianHash::from_uint(&U256::from(4))],
enacted: vec![H256::from(U256::from(1)), H256::from(U256::from(2))], enacted: vec![BigEndianHash::from_uint(&U256::from(1)), BigEndianHash::from_uint(&U256::from(2))],
omitted: vec![], omitted: vec![],
}); });
} }

View File

@ -7,5 +7,5 @@ edition = "2018"
[dependencies] [dependencies]
types = { path = "../types", package = "common-types" } types = { path = "../types", package = "common-types" }
ethereum-types = "0.4" ethereum-types = "0.6.0"
bytes = { version = "0.1", package = "parity-bytes" } bytes = { version = "0.1", package = "parity-bytes" }

View File

@ -9,9 +9,9 @@ edition = "2018"
[dependencies] [dependencies]
common-types = { path = "../types" } common-types = { path = "../types" }
ethereum-types = "0.4" ethereum-types = "0.6.0"
heapsize = "0.4" heapsize = "0.4"
kvdb = "0.1" kvdb = "0.1"
parking_lot = "0.7" parking_lot = "0.7"
rlp = { version = "0.3.0", features = ["ethereum"] } rlp = "0.4.0"
rlp_derive = { path = "../../util/rlp-derive" } rlp_derive = { path = "../../util/rlp-derive" }

View File

@ -16,7 +16,7 @@
//! Database utilities and definitions. //! Database utilities and definitions.
use std::ops::Deref; use std::convert::AsRef;
use std::hash::Hash; use std::hash::Hash;
use std::collections::HashMap; use std::collections::HashMap;
use parking_lot::RwLock; use parking_lot::RwLock;
@ -82,7 +82,7 @@ impl<K, V> Cache<K, V> for HashMap<K, V> where K: Hash + Eq {
/// Should be used to get database key associated with given value. /// Should be used to get database key associated with given value.
pub trait Key<T> { pub trait Key<T> {
/// The db key associated with this value. /// The db key associated with this value.
type Target: Deref<Target = [u8]>; type Target: AsRef<[u8]>;
/// Returns db key. /// Returns db key.
fn key(&self) -> Self::Target; fn key(&self) -> Self::Target;
@ -91,16 +91,16 @@ pub trait Key<T> {
/// Should be used to write value into database. /// Should be used to write value into database.
pub trait Writable { pub trait Writable {
/// Writes the value into the database. /// Writes the value into the database.
fn write<T, R>(&mut self, col: Option<u32>, key: &Key<T, Target = R>, value: &T) where T: rlp::Encodable, R: Deref<Target = [u8]>; fn write<T, R>(&mut self, col: Option<u32>, key: &Key<T, Target = R>, value: &T) where T: rlp::Encodable, R: AsRef<[u8]>;
/// Deletes key from the databse. /// Deletes key from the databse.
fn delete<T, R>(&mut self, col: Option<u32>, key: &Key<T, Target = R>) where T: rlp::Encodable, R: Deref<Target = [u8]>; fn delete<T, R>(&mut self, col: Option<u32>, key: &Key<T, Target = R>) where T: rlp::Encodable, R: AsRef<[u8]>;
/// Writes the value into the database and updates the cache. /// Writes the value into the database and updates the cache.
fn write_with_cache<K, T, R>(&mut self, col: Option<u32>, cache: &mut Cache<K, T>, key: K, value: T, policy: CacheUpdatePolicy) where fn write_with_cache<K, T, R>(&mut self, col: Option<u32>, cache: &mut Cache<K, T>, key: K, value: T, policy: CacheUpdatePolicy) where
K: Key<T, Target = R> + Hash + Eq, K: Key<T, Target = R> + Hash + Eq,
T: rlp::Encodable, T: rlp::Encodable,
R: Deref<Target = [u8]> { R: AsRef<[u8]> {
self.write(col, &key, &value); self.write(col, &key, &value);
match policy { match policy {
CacheUpdatePolicy::Overwrite => { CacheUpdatePolicy::Overwrite => {
@ -116,7 +116,7 @@ pub trait Writable {
fn extend_with_cache<K, T, R>(&mut self, col: Option<u32>, cache: &mut Cache<K, T>, values: HashMap<K, T>, policy: CacheUpdatePolicy) where fn extend_with_cache<K, T, R>(&mut self, col: Option<u32>, cache: &mut Cache<K, T>, values: HashMap<K, T>, policy: CacheUpdatePolicy) where
K: Key<T, Target = R> + Hash + Eq, K: Key<T, Target = R> + Hash + Eq,
T: rlp::Encodable, T: rlp::Encodable,
R: Deref<Target = [u8]> { R: AsRef<[u8]> {
match policy { match policy {
CacheUpdatePolicy::Overwrite => { CacheUpdatePolicy::Overwrite => {
for (key, value) in values { for (key, value) in values {
@ -137,7 +137,7 @@ pub trait Writable {
fn extend_with_option_cache<K, T, R>(&mut self, col: Option<u32>, cache: &mut Cache<K, Option<T>>, values: HashMap<K, Option<T>>, policy: CacheUpdatePolicy) where fn extend_with_option_cache<K, T, R>(&mut self, col: Option<u32>, cache: &mut Cache<K, Option<T>>, values: HashMap<K, Option<T>>, policy: CacheUpdatePolicy) where
K: Key<T, Target = R> + Hash + Eq, K: Key<T, Target = R> + Hash + Eq,
T: rlp::Encodable, T: rlp::Encodable,
R: Deref<Target = [u8]> { R: AsRef<[u8]> {
match policy { match policy {
CacheUpdatePolicy::Overwrite => { CacheUpdatePolicy::Overwrite => {
for (key, value) in values { for (key, value) in values {
@ -167,7 +167,7 @@ pub trait Readable {
/// Returns value for given key. /// Returns value for given key.
fn read<T, R>(&self, col: Option<u32>, key: &Key<T, Target = R>) -> Option<T> where fn read<T, R>(&self, col: Option<u32>, key: &Key<T, Target = R>) -> Option<T> where
T: rlp::Decodable, T: rlp::Decodable,
R: Deref<Target = [u8]>; R: AsRef<[u8]>;
/// Returns value for given key either in cache or in database. /// Returns value for given key either in cache or in database.
fn read_with_cache<K, T, C>(&self, col: Option<u32>, cache: &RwLock<C>, key: &K) -> Option<T> where fn read_with_cache<K, T, C>(&self, col: Option<u32>, cache: &RwLock<C>, key: &K) -> Option<T> where
@ -189,12 +189,12 @@ pub trait Readable {
} }
/// Returns true if given value exists. /// Returns true if given value exists.
fn exists<T, R>(&self, col: Option<u32>, key: &Key<T, Target = R>) -> bool where R: Deref<Target= [u8]>; fn exists<T, R>(&self, col: Option<u32>, key: &Key<T, Target = R>) -> bool where R: AsRef<[u8]>;
/// Returns true if given value exists either in cache or in database. /// Returns true if given value exists either in cache or in database.
fn exists_with_cache<K, T, R, C>(&self, col: Option<u32>, cache: &RwLock<C>, key: &K) -> bool where fn exists_with_cache<K, T, R, C>(&self, col: Option<u32>, cache: &RwLock<C>, key: &K) -> bool where
K: Eq + Hash + Key<T, Target = R>, K: Eq + Hash + Key<T, Target = R>,
R: Deref<Target = [u8]>, R: AsRef<[u8]>,
C: Cache<K, T> { C: Cache<K, T> {
{ {
let read = cache.read(); let read = cache.read();
@ -208,31 +208,31 @@ pub trait Readable {
} }
impl Writable for DBTransaction { impl Writable for DBTransaction {
fn write<T, R>(&mut self, col: Option<u32>, key: &Key<T, Target = R>, value: &T) where T: rlp::Encodable, R: Deref<Target = [u8]> { fn write<T, R>(&mut self, col: Option<u32>, key: &Key<T, Target = R>, value: &T) where T: rlp::Encodable, R: AsRef<[u8]> {
self.put(col, &key.key(), &rlp::encode(value)); self.put(col, key.key().as_ref(), &rlp::encode(value));
} }
fn delete<T, R>(&mut self, col: Option<u32>, key: &Key<T, Target = R>) where T: rlp::Encodable, R: Deref<Target = [u8]> { fn delete<T, R>(&mut self, col: Option<u32>, key: &Key<T, Target = R>) where T: rlp::Encodable, R: AsRef<[u8]> {
self.delete(col, &key.key()); self.delete(col, key.key().as_ref());
} }
} }
impl<KVDB: KeyValueDB + ?Sized> Readable for KVDB { impl<KVDB: KeyValueDB + ?Sized> Readable for KVDB {
fn read<T, R>(&self, col: Option<u32>, key: &Key<T, Target = R>) -> Option<T> fn read<T, R>(&self, col: Option<u32>, key: &Key<T, Target = R>) -> Option<T>
where T: rlp::Decodable, R: Deref<Target = [u8]> { where T: rlp::Decodable, R: AsRef<[u8]> {
self.get(col, &key.key()) self.get(col, key.key().as_ref())
.expect(&format!("db get failed, key: {:?}", &key.key() as &[u8])) .expect(&format!("db get failed, key: {:?}", key.key().as_ref()))
.map(|v| rlp::decode(&v).expect("decode db value failed") ) .map(|v| rlp::decode(&v).expect("decode db value failed") )
} }
fn exists<T, R>(&self, col: Option<u32>, key: &Key<T, Target = R>) -> bool where R: Deref<Target = [u8]> { fn exists<T, R>(&self, col: Option<u32>, key: &Key<T, Target = R>) -> bool where R: AsRef<[u8]> {
let result = self.get(col, &key.key()); let result = self.get(col, key.key().as_ref());
match result { match result {
Ok(v) => v.is_some(), Ok(v) => v.is_some(),
Err(err) => { Err(err) => {
panic!("db get failed, key: {:?}, err: {:?}", &key.key() as &[u8], err); panic!("db get failed, key: {:?}, err: {:?}", key.key().as_ref(), err);
} }
} }
} }

View File

@ -17,7 +17,7 @@
//! Blockchain DB extras. //! Blockchain DB extras.
use std::io::Write; use std::io::Write;
use std::ops; use std::convert::AsRef;
use common_types::BlockNumber; use common_types::BlockNumber;
use common_types::engines::epoch::Transition as EpochTransition; use common_types::engines::epoch::Transition as EpochTransition;
@ -49,19 +49,17 @@ pub enum ExtrasIndex {
fn with_index(hash: &H256, i: ExtrasIndex) -> H264 { fn with_index(hash: &H256, i: ExtrasIndex) -> H264 {
let mut result = H264::default(); let mut result = H264::default();
result[0] = i as u8; result.as_bytes_mut()[0] = i as u8;
(*result)[1..].clone_from_slice(hash); result.as_bytes_mut()[1..].clone_from_slice(hash.as_bytes());
result result
} }
/// Wrapper for block number used as a DB key. /// Wrapper for block number used as a DB key.
pub struct BlockNumberKey([u8; 5]); pub struct BlockNumberKey([u8; 5]);
impl ops::Deref for BlockNumberKey { impl AsRef<[u8]> for BlockNumberKey {
type Target = [u8]; fn as_ref(&self) -> &[u8] {
&self.0[..]
fn deref(&self) -> &Self::Target {
&self.0
} }
} }
@ -123,10 +121,8 @@ pub const EPOCH_KEY_PREFIX: &'static [u8; DB_PREFIX_LEN] = &[
/// Epoch transitions key /// Epoch transitions key
pub struct EpochTransitionsKey([u8; EPOCH_KEY_LEN]); pub struct EpochTransitionsKey([u8; EPOCH_KEY_LEN]);
impl ops::Deref for EpochTransitionsKey { impl AsRef<[u8]> for EpochTransitionsKey {
type Target = [u8]; fn as_ref(&self) -> &[u8] { &self.0[..] }
fn deref(&self) -> &[u8] { &self.0[..] }
} }
impl Key<EpochTransitions> for u64 { impl Key<EpochTransitions> for u64 {

View File

@ -6,15 +6,14 @@ authors = ["Parity Technologies <admin@parity.io>"]
[dependencies] [dependencies]
bit-set = "0.4" bit-set = "0.4"
parity-bytes = "0.1" parity-bytes = "0.1"
ethereum-types = "0.4" ethereum-types = "0.6.0"
heapsize = "0.4" heapsize = "0.4"
lazy_static = "1.0" lazy_static = "1.0"
log = "0.4" log = "0.4"
vm = { path = "../vm" } vm = { path = "../vm" }
keccak-hash = "0.1" keccak-hash = "0.2.0"
parking_lot = "0.7" parking_lot = "0.7"
memory-cache = { path = "../../util/memory-cache" } memory-cache = { path = "../../util/memory-cache" }
num-bigint = "0.2"
[dev-dependencies] [dev-dependencies]
rustc-hex = "1.0" rustc-hex = "1.0"

View File

@ -15,7 +15,7 @@
// along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>. // along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>.
use std::cmp; use std::cmp;
use ethereum_types::{U256, H256}; use ethereum_types::{BigEndianHash, U256};
use super::u256_to_address; use super::u256_to_address;
use {evm, vm}; use {evm, vm};
@ -121,12 +121,12 @@ impl<Gas: evm::CostType> Gasometer<Gas> {
Request::Gas(Gas::from(1)) Request::Gas(Gas::from(1))
}, },
instructions::SSTORE => { instructions::SSTORE => {
let address = H256::from(stack.peek(0)); let address = BigEndianHash::from_uint(stack.peek(0));
let newval = stack.peek(1); let newval = stack.peek(1);
let val = U256::from(&*ext.storage_at(&address)?); let val = ext.storage_at(&address)?.into_uint();
let gas = if schedule.eip1283 { let gas = if schedule.eip1283 {
let orig = U256::from(&*ext.initial_storage_at(&address)?); let orig = ext.initial_storage_at(&address)?.into_uint();
calculate_eip1283_sstore_gas(schedule, &orig, &val, &newval) calculate_eip1283_sstore_gas(schedule, &orig, &val, &newval)
} else { } else {
if val.is_zero() && !newval.is_zero() { if val.is_zero() && !newval.is_zero() {

View File

@ -26,10 +26,11 @@ mod shared_cache;
use std::marker::PhantomData; use std::marker::PhantomData;
use std::{cmp, mem}; use std::{cmp, mem};
use std::sync::Arc; use std::sync::Arc;
use std::convert::TryFrom;
use hash::keccak; use hash::keccak;
use bytes::Bytes; use bytes::Bytes;
use ethereum_types::{U256, H256, Address}; use ethereum_types::{U256, U512, H256, Address, BigEndianHash};
use num_bigint::BigUint;
use vm::{ use vm::{
self, ActionParams, ParamsType, ActionValue, CallType, MessageCallResult, self, ActionParams, ParamsType, ActionValue, CallType, MessageCallResult,
@ -62,17 +63,6 @@ const TWO_POW_96: U256 = U256([0, 0x100000000, 0, 0]); //0x1 00000000 00000000 0
const TWO_POW_224: U256 = U256([0, 0, 0, 0x100000000]); //0x1 00000000 00000000 00000000 00000000 00000000 00000000 00000000 const TWO_POW_224: U256 = U256([0, 0, 0, 0x100000000]); //0x1 00000000 00000000 00000000 00000000 00000000 00000000 00000000
const TWO_POW_248: U256 = U256([0, 0, 0, 0x100000000000000]); //0x1 00000000 00000000 00000000 00000000 00000000 00000000 00000000 000000 const TWO_POW_248: U256 = U256([0, 0, 0, 0x100000000000000]); //0x1 00000000 00000000 00000000 00000000 00000000 00000000 00000000 000000
fn to_biguint(x: U256) -> BigUint {
let mut bytes = [0u8; 32];
x.to_little_endian(&mut bytes);
BigUint::from_bytes_le(&bytes)
}
fn from_biguint(x: BigUint) -> U256 {
let bytes = x.to_bytes_le();
U256::from_little_endian(&bytes)
}
/// Abstraction over raw vector of Bytes. Easier state management of PC. /// Abstraction over raw vector of Bytes. Easier state management of PC.
struct CodeReader { struct CodeReader {
position: ProgramCounter, position: ProgramCounter,
@ -520,7 +510,7 @@ impl<Cost: CostType> Interpreter<Cost> {
let init_size = self.stack.pop_back(); let init_size = self.stack.pop_back();
let address_scheme = match instruction { let address_scheme = match instruction {
instructions::CREATE => CreateContractAddress::FromSenderAndNonce, instructions::CREATE => CreateContractAddress::FromSenderAndNonce,
instructions::CREATE2 => CreateContractAddress::FromSenderSaltAndCodeHash(self.stack.pop_back().into()), instructions::CREATE2 => CreateContractAddress::FromSenderSaltAndCodeHash(BigEndianHash::from_uint(&self.stack.pop_back())),
_ => unreachable!("instruction can only be CREATE/CREATE2 checked above; qed"), _ => unreachable!("instruction can only be CREATE/CREATE2 checked above; qed"),
}; };
@ -677,7 +667,7 @@ impl<Cost: CostType> Interpreter<Cost> {
let size = self.stack.pop_back(); let size = self.stack.pop_back();
let topics = self.stack.pop_n(no_of_topics) let topics = self.stack.pop_n(no_of_topics)
.iter() .iter()
.map(H256::from) .map(BigEndianHash::from_uint)
.collect(); .collect();
ext.log(topics, self.mem.read_slice(offset, size))?; ext.log(topics, self.mem.read_slice(offset, size))?;
}, },
@ -714,21 +704,21 @@ impl<Cost: CostType> Interpreter<Cost> {
let offset = self.stack.pop_back(); let offset = self.stack.pop_back();
let size = self.stack.pop_back(); let size = self.stack.pop_back();
let k = keccak(self.mem.read_slice(offset, size)); let k = keccak(self.mem.read_slice(offset, size));
self.stack.push(U256::from(&*k)); self.stack.push(k.into_uint());
}, },
instructions::SLOAD => { instructions::SLOAD => {
let key = H256::from(&self.stack.pop_back()); let key = BigEndianHash::from_uint(&self.stack.pop_back());
let word = U256::from(&*ext.storage_at(&key)?); let word = ext.storage_at(&key)?.into_uint();
self.stack.push(word); self.stack.push(word);
}, },
instructions::SSTORE => { instructions::SSTORE => {
let address = H256::from(&self.stack.pop_back()); let address = BigEndianHash::from_uint(&self.stack.pop_back());
let val = self.stack.pop_back(); let val = self.stack.pop_back();
let current_val = U256::from(&*ext.storage_at(&address)?); let current_val = ext.storage_at(&address)?.into_uint();
// Increase refund for clear // Increase refund for clear
if ext.schedule().eip1283 { if ext.schedule().eip1283 {
let original_val = U256::from(&*ext.initial_storage_at(&address)?); let original_val = ext.initial_storage_at(&address)?.into_uint();
gasometer::handle_eip1283_sstore_clears_refund(ext, &original_val, &current_val, &val); gasometer::handle_eip1283_sstore_clears_refund(ext, &original_val, &current_val, &val);
} else { } else {
if !current_val.is_zero() && val.is_zero() { if !current_val.is_zero() && val.is_zero() {
@ -736,7 +726,7 @@ impl<Cost: CostType> Interpreter<Cost> {
ext.add_sstore_refund(sstore_clears_schedule); ext.add_sstore_refund(sstore_clears_schedule);
} }
} }
ext.set_storage(address, H256::from(&val))?; ext.set_storage(address, BigEndianHash::from_uint(&val))?;
}, },
instructions::PC => { instructions::PC => {
self.stack.push(U256::from(self.reader.position - 1)); self.stack.push(U256::from(self.reader.position - 1));
@ -797,7 +787,7 @@ impl<Cost: CostType> Interpreter<Cost> {
instructions::EXTCODEHASH => { instructions::EXTCODEHASH => {
let address = u256_to_address(&self.stack.pop_back()); let address = u256_to_address(&self.stack.pop_back());
let hash = ext.extcodehash(&address)?.unwrap_or_else(H256::zero); let hash = ext.extcodehash(&address)?.unwrap_or_else(H256::zero);
self.stack.push(U256::from(hash)); self.stack.push(hash.into_uint());
}, },
instructions::CALLDATACOPY => { instructions::CALLDATACOPY => {
Self::copy_data_to_memory(&mut self.mem, &mut self.stack, &self.params.data.as_ref().map_or_else(|| &[] as &[u8], |d| &*d as &[u8])); Self::copy_data_to_memory(&mut self.mem, &mut self.stack, &self.params.data.as_ref().map_or_else(|| &[] as &[u8], |d| &*d as &[u8]));
@ -831,7 +821,7 @@ impl<Cost: CostType> Interpreter<Cost> {
instructions::BLOCKHASH => { instructions::BLOCKHASH => {
let block_number = self.stack.pop_back(); let block_number = self.stack.pop_back();
let block_hash = ext.blockhash(&block_number); let block_hash = ext.blockhash(&block_number);
self.stack.push(U256::from(&*block_hash)); self.stack.push(block_hash.into_uint());
}, },
instructions::COINBASE => { instructions::COINBASE => {
self.stack.push(address_to_u256(ext.env_info().author.clone())); self.stack.push(address_to_u256(ext.env_info().author.clone()));
@ -1021,12 +1011,12 @@ impl<Cost: CostType> Interpreter<Cost> {
let c = self.stack.pop_back(); let c = self.stack.pop_back();
self.stack.push(if !c.is_zero() { self.stack.push(if !c.is_zero() {
let a_num = to_biguint(a); let a_512 = U512::from(a);
let b_num = to_biguint(b); let b_512 = U512::from(b);
let c_num = to_biguint(c); let c_512 = U512::from(c);
let res = a_num + b_num; let res = a_512 + b_512;
let x = res % c_num; let x = res % c_512;
from_biguint(x) U256::try_from(x).expect("U512 % U256 fits U256; qed")
} else { } else {
U256::zero() U256::zero()
}); });
@ -1037,12 +1027,12 @@ impl<Cost: CostType> Interpreter<Cost> {
let c = self.stack.pop_back(); let c = self.stack.pop_back();
self.stack.push(if !c.is_zero() { self.stack.push(if !c.is_zero() {
let a_num = to_biguint(a); let a_512 = U512::from(a);
let b_num = to_biguint(b); let b_512 = U512::from(b);
let c_num = to_biguint(c); let c_512 = U512::from(c);
let res = a_num * b_num; let res = a_512 * b_512;
let x = res % c_num; let x = res % c_512;
from_biguint(x) U256::try_from(x).expect("U512 % U256 fits U256; qed")
} else { } else {
U256::zero() U256::zero()
}); });
@ -1182,12 +1172,13 @@ fn set_sign(value: U256, sign: bool) -> U256 {
#[inline] #[inline]
fn u256_to_address(value: &U256) -> Address { fn u256_to_address(value: &U256) -> Address {
Address::from(H256::from(value)) let addr: H256 = BigEndianHash::from_uint(value);
Address::from(addr)
} }
#[inline] #[inline]
fn address_to_u256(value: Address) -> U256 { fn address_to_u256(value: Address) -> U256 {
U256::from(&*H256::from(value)) H256::from(value).into_uint()
} }
#[cfg(test)] #[cfg(test)]
@ -1198,6 +1189,7 @@ mod tests {
use factory::Factory; use factory::Factory;
use vm::{self, Exec, ActionParams, ActionValue}; use vm::{self, Exec, ActionParams, ActionValue};
use vm::tests::{FakeExt, test_finalize}; use vm::tests::{FakeExt, test_finalize};
use ethereum_types::Address;
fn interpreter(params: ActionParams, ext: &vm::Ext) -> Box<Exec> { fn interpreter(params: ActionParams, ext: &vm::Ext) -> Box<Exec> {
Factory::new(VMType::Interpreter, 1).create(params, ext.schedule(), ext.depth()) Factory::new(VMType::Interpreter, 1).create(params, ext.schedule(), ext.depth())
@ -1208,13 +1200,13 @@ mod tests {
let code = "7feeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff006000527faaffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffaa6020526000620f120660406000601773945304eb96065b2a98b57a48a06ae28d285a71b56101f4f1600055".from_hex().unwrap(); let code = "7feeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff006000527faaffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffaa6020526000620f120660406000601773945304eb96065b2a98b57a48a06ae28d285a71b56101f4f1600055".from_hex().unwrap();
let mut params = ActionParams::default(); let mut params = ActionParams::default();
params.address = 5.into(); params.address = Address::from_low_u64_be(5);
params.gas = 300_000.into(); params.gas = 300_000.into();
params.gas_price = 1.into(); params.gas_price = 1.into();
params.value = ActionValue::Transfer(100_000.into()); params.value = ActionValue::Transfer(100_000.into());
params.code = Some(Arc::new(code)); params.code = Some(Arc::new(code));
let mut ext = FakeExt::new(); let mut ext = FakeExt::new();
ext.balances.insert(5.into(), 1_000_000_000.into()); ext.balances.insert(Address::from_low_u64_be(5), 1_000_000_000.into());
ext.tracing = true; ext.tracing = true;
let gas_left = { let gas_left = {
@ -1231,12 +1223,12 @@ mod tests {
let code = "6001600160000360003e00".from_hex().unwrap(); let code = "6001600160000360003e00".from_hex().unwrap();
let mut params = ActionParams::default(); let mut params = ActionParams::default();
params.address = 5.into(); params.address = Address::from_low_u64_be(5);
params.gas = 300_000.into(); params.gas = 300_000.into();
params.gas_price = 1.into(); params.gas_price = 1.into();
params.code = Some(Arc::new(code)); params.code = Some(Arc::new(code));
let mut ext = FakeExt::new_byzantium(); let mut ext = FakeExt::new_byzantium();
ext.balances.insert(5.into(), 1_000_000_000.into()); ext.balances.insert(Address::from_low_u64_be(5), 1_000_000_000.into());
ext.tracing = true; ext.tracing = true;
let err = { let err = {

View File

@ -24,7 +24,6 @@ extern crate vm;
extern crate keccak_hash as hash; extern crate keccak_hash as hash;
extern crate memory_cache; extern crate memory_cache;
extern crate parity_bytes as bytes; extern crate parity_bytes as bytes;
extern crate num_bigint;
#[macro_use] #[macro_use]
extern crate lazy_static; extern crate lazy_static;

View File

@ -239,7 +239,7 @@ fn test_blockhash(factory: super::Factory) {
}; };
assert_eq!(gas_left, U256::from(79_974)); assert_eq!(gas_left, U256::from(79_974));
assert_eq!(ext.store.get(&H256::new()).unwrap(), &blockhash); assert_eq!(ext.store.get(&H256::zero()).unwrap(), &blockhash);
} }
evm_test!{test_calldataload: test_calldataload_int} evm_test!{test_calldataload: test_calldataload_int}
@ -726,8 +726,8 @@ evm_test!{test_calls: test_calls_int}
fn test_calls(factory: super::Factory) { fn test_calls(factory: super::Factory) {
let code = "600054602d57600160005560006000600060006050610998610100f160006000600060006050610998610100f25b".from_hex().unwrap(); let code = "600054602d57600160005560006000600060006050610998610100f160006000600060006050610998610100f25b".from_hex().unwrap();
let address = Address::from(0x155); let address = Address::from_low_u64_be(0x155);
let code_address = Address::from(0x998); let code_address = Address::from_low_u64_be(0x998);
let mut params = ActionParams::default(); let mut params = ActionParams::default();
params.gas = U256::from(150_000); params.gas = U256::from(150_000);
params.code = Some(Arc::new(code)); params.code = Some(Arc::new(code));
@ -772,7 +772,7 @@ evm_test!{test_create_in_staticcall: test_create_in_staticcall_int}
fn test_create_in_staticcall(factory: super::Factory) { fn test_create_in_staticcall(factory: super::Factory) {
let code = "600060006064f000".from_hex().unwrap(); let code = "600060006064f000".from_hex().unwrap();
let address = Address::from(0x155); let address = Address::from_low_u64_be(0x155);
let mut params = ActionParams::default(); let mut params = ActionParams::default();
params.gas = U256::from(100_000); params.gas = U256::from(100_000);
params.code = Some(Arc::new(code)); params.code = Some(Arc::new(code));
@ -1066,5 +1066,5 @@ fn assert_set_contains<T : Debug + Eq + PartialEq + Hash>(set: &HashSet<T>, val:
} }
fn assert_store(ext: &FakeExt, pos: u64, val: &str) { fn assert_store(ext: &FakeExt, pos: u64, val: &str) {
assert_eq!(ext.store.get(&H256::from(pos)).unwrap(), &H256::from_str(val).unwrap()); assert_eq!(ext.store.get(&H256::from_low_u64_be(pos)).unwrap(), &H256::from_str(val).unwrap());
} }

View File

@ -13,7 +13,7 @@ common-types = { path = "../types" }
ethcore = { path = ".."} ethcore = { path = ".."}
ethcore-db = { path = "../db" } ethcore-db = { path = "../db" }
ethcore-blockchain = { path = "../blockchain" } ethcore-blockchain = { path = "../blockchain" }
ethereum-types = "0.4" ethereum-types = "0.6.0"
memory-db = "0.11.0" memory-db = "0.11.0"
trie-db = "0.11.0" trie-db = "0.11.0"
patricia-trie-ethereum = { path = "../../util/patricia-trie-ethereum" } patricia-trie-ethereum = { path = "../../util/patricia-trie-ethereum" }
@ -25,18 +25,18 @@ heapsize = "0.4"
vm = { path = "../vm" } vm = { path = "../vm" }
fastmap = { path = "../../util/fastmap" } fastmap = { path = "../../util/fastmap" }
failsafe = { version = "0.3.0", default-features = false, features = ["parking_lot_mutex"] } failsafe = { version = "0.3.0", default-features = false, features = ["parking_lot_mutex"] }
rlp = { version = "0.3.0", features = ["ethereum"] } rlp = "0.4.0"
rlp_derive = { path = "../../util/rlp-derive" } rlp_derive = { path = "../../util/rlp-derive" }
smallvec = "0.6" smallvec = "0.6"
futures = "0.1" futures = "0.1"
rand = "0.4" rand = "0.6"
itertools = "0.5" itertools = "0.5"
bincode = "0.8.0" bincode = "0.8.0"
serde = "1.0" serde = "1.0"
serde_derive = "1.0" serde_derive = "1.0"
parking_lot = "0.7" parking_lot = "0.7"
stats = { path = "../../util/stats" } stats = { path = "../../util/stats" }
keccak-hash = "0.1" keccak-hash = "0.2.0"
keccak-hasher = { path = "../../util/keccak-hasher" } keccak-hasher = { path = "../../util/keccak-hasher" }
triehash-ethereum = { version = "0.2", path = "../../util/triehash-ethereum" } triehash-ethereum = { version = "0.2", path = "../../util/triehash-ethereum" }
kvdb = "0.1" kvdb = "0.1"

View File

@ -104,7 +104,7 @@ pub fn build<F>(cht_num: u64, mut fetcher: F) -> Option<CHT<MemoryDB<KeccakHashe
let last_num = start_number(cht_num + 1) - 1; let last_num = start_number(cht_num + 1) - 1;
let mut id = BlockId::Number(last_num); let mut id = BlockId::Number(last_num);
let mut root = H256::default(); let mut root = H256::zero();
{ {
let mut t = TrieDBMut::new(&mut db, &mut root); let mut t = TrieDBMut::new(&mut db, &mut root);

View File

@ -154,8 +154,11 @@ fn pending_transition_key(block_hash: H256) -> H264 {
let mut key = H264::default(); let mut key = H264::default();
key[0] = LEADING; {
key.0[1..].copy_from_slice(&block_hash.0[..]); let bytes = key.as_bytes_mut();
bytes[0] = LEADING;
bytes[1..].copy_from_slice(block_hash.as_bytes());
}
key key
} }
@ -165,8 +168,11 @@ fn transition_key(block_hash: H256) -> H264 {
let mut key = H264::default(); let mut key = H264::default();
key[0] = LEADING; {
key.0[1..].copy_from_slice(&block_hash.0[..]); let bytes = key.as_bytes_mut();
bytes[0] = LEADING;
bytes[1..].copy_from_slice(block_hash.as_bytes());
}
key key
} }
@ -237,7 +243,7 @@ impl HeaderChain {
for c in &entry.candidates { for c in &entry.candidates {
let key = transition_key(c.hash); let key = transition_key(c.hash);
if let Some(proof) = db.get(col, &*key)? { if let Some(proof) = db.get(col, key.as_bytes())? {
live_epoch_proofs.insert(c.hash, EpochTransition { live_epoch_proofs.insert(c.hash, EpochTransition {
block_hash: c.hash, block_hash: c.hash,
block_number: cur_number, block_number: cur_number,
@ -431,7 +437,7 @@ impl HeaderChain {
} }
if let Some(transition) = transition { if let Some(transition) = transition {
transaction.put(self.col, &*transition_key(hash), &transition.proof); transaction.put(self.col, transition_key(hash).as_bytes(), &transition.proof);
self.live_epoch_proofs.write().insert(hash, transition); self.live_epoch_proofs.write().insert(hash, transition);
} }
@ -508,10 +514,10 @@ impl HeaderChain {
for ancient in &era_entry.candidates { for ancient in &era_entry.candidates {
let maybe_transition = live_epoch_proofs.remove(&ancient.hash); let maybe_transition = live_epoch_proofs.remove(&ancient.hash);
if let Some(epoch_transition) = maybe_transition { if let Some(epoch_transition) = maybe_transition {
transaction.delete(self.col, &*transition_key(ancient.hash)); transaction.delete(self.col, transition_key(ancient.hash).as_bytes());
if ancient.hash == era_entry.canonical_hash { if ancient.hash == era_entry.canonical_hash {
last_canonical_transition = match self.db.get(self.col, &ancient.hash) { last_canonical_transition = match self.db.get(self.col, ancient.hash.as_bytes()) {
Err(e) => { Err(e) => {
warn!(target: "chain", "Error reading from DB: {}\n warn!(target: "chain", "Error reading from DB: {}\n
", e); ", e);
@ -526,7 +532,7 @@ impl HeaderChain {
} }
} }
transaction.delete(self.col, &ancient.hash); transaction.delete(self.col, ancient.hash.as_bytes());
} }
let canon = &era_entry.candidates[0]; let canon = &era_entry.candidates[0];
@ -647,7 +653,7 @@ impl HeaderChain {
match cache.block_header(&hash) { match cache.block_header(&hash) {
Some(header) => Some(header), Some(header) => Some(header),
None => { None => {
match self.db.get(self.col, &hash) { match self.db.get(self.col, hash.as_bytes()) {
Ok(db_value) => { Ok(db_value) => {
db_value.map(|x| x.into_vec()).map(encoded::Header::new) db_value.map(|x| x.into_vec()).map(encoded::Header::new)
.and_then(|header| { .and_then(|header| {
@ -772,7 +778,7 @@ impl HeaderChain {
/// Get block status. /// Get block status.
pub fn status(&self, hash: &H256) -> BlockStatus { pub fn status(&self, hash: &H256) -> BlockStatus {
if self.db.get(self.col, hash).ok().map_or(false, |x| x.is_some()) { if self.db.get(self.col, hash.as_bytes()).ok().map_or(false, |x| x.is_some()) {
BlockStatus::InChain BlockStatus::InChain
} else { } else {
BlockStatus::Unknown BlockStatus::Unknown
@ -782,13 +788,13 @@ impl HeaderChain {
/// Insert a pending transition. /// Insert a pending transition.
pub fn insert_pending_transition(&self, batch: &mut DBTransaction, hash: H256, t: &PendingEpochTransition) { pub fn insert_pending_transition(&self, batch: &mut DBTransaction, hash: H256, t: &PendingEpochTransition) {
let key = pending_transition_key(hash); let key = pending_transition_key(hash);
batch.put(self.col, &*key, &*::rlp::encode(t)); batch.put(self.col, key.as_bytes(), &*::rlp::encode(t));
} }
/// Get pending transition for a specific block hash. /// Get pending transition for a specific block hash.
pub fn pending_transition(&self, hash: H256) -> Option<PendingEpochTransition> { pub fn pending_transition(&self, hash: H256) -> Option<PendingEpochTransition> {
let key = pending_transition_key(hash); let key = pending_transition_key(hash);
match self.db.get(self.col, &*key) { match self.db.get(self.col, key.as_bytes()) {
Ok(db_fetch) => db_fetch.map(|bytes| ::rlp::decode(&bytes).expect("decoding value from db failed")), Ok(db_fetch) => db_fetch.map(|bytes| ::rlp::decode(&bytes).expect("decoding value from db failed")),
Err(e) => { Err(e) => {
warn!(target: "chain", "Error reading from database: {}", e); warn!(target: "chain", "Error reading from database: {}", e);

View File

@ -382,7 +382,7 @@ mod tests {
protocol_version: 1, protocol_version: 1,
network_id: 1, network_id: 1,
head_td: U256::default(), head_td: U256::default(),
head_hash: H256::default(), head_hash: H256::zero(),
head_num: 10, head_num: 10,
genesis_hash: H256::zero(), genesis_hash: H256::zero(),
last_head: None, last_head: None,
@ -417,7 +417,7 @@ mod tests {
protocol_version: 1, protocol_version: 1,
network_id: 1, network_id: 1,
head_td: U256::default(), head_td: U256::default(),
head_hash: H256::default(), head_hash: H256::zero(),
head_num: 10, head_num: 10,
genesis_hash: H256::zero(), genesis_hash: H256::zero(),
last_head: None, last_head: None,
@ -452,7 +452,7 @@ mod tests {
protocol_version: 1, protocol_version: 1,
network_id: 1, network_id: 1,
head_td: U256::default(), head_td: U256::default(),
head_hash: H256::default(), head_hash: H256::zero(),
head_num: 10, head_num: 10,
genesis_hash: H256::zero(), genesis_hash: H256::zero(),
last_head: None, last_head: None,
@ -550,7 +550,7 @@ mod tests {
protocol_version: 1, protocol_version: 1,
network_id: 1, network_id: 1,
head_td: U256::default(), head_td: U256::default(),
head_hash: H256::default(), head_hash: H256::zero(),
head_num: 10, head_num: 10,
genesis_hash: H256::zero(), genesis_hash: H256::zero(),
last_head: None, last_head: None,

View File

@ -22,7 +22,7 @@ use common_types::encoded;
use common_types::ids::BlockId; use common_types::ids::BlockId;
use common_types::transaction::{Action, PendingTransaction}; use common_types::transaction::{Action, PendingTransaction};
use ethcore::client::{EachBlockWith, TestBlockChainClient}; use ethcore::client::{EachBlockWith, TestBlockChainClient};
use ethereum_types::{H256, U256, Address}; use ethereum_types::{H256, U256, Address, BigEndianHash};
use net::context::IoContext; use net::context::IoContext;
use net::load_timer::MOVING_SAMPLE_SIZE; use net::load_timer::MOVING_SAMPLE_SIZE;
use net::status::{Capabilities, Status}; use net::status::{Capabilities, Status};
@ -158,7 +158,7 @@ impl Provider for TestProvider {
fn contract_code(&self, req: request::CompleteCodeRequest) -> Option<request::CodeResponse> { fn contract_code(&self, req: request::CompleteCodeRequest) -> Option<request::CodeResponse> {
Some(CodeResponse { Some(CodeResponse {
code: req.block_hash.iter().chain(req.code_hash.iter()).cloned().collect(), code: req.block_hash.as_bytes().iter().chain(req.code_hash.as_bytes().iter()).cloned().collect(),
}) })
} }
@ -261,7 +261,7 @@ fn genesis_mismatch() {
let (provider, proto) = setup(capabilities); let (provider, proto) = setup(capabilities);
let mut status = status(provider.client.chain_info()); let mut status = status(provider.client.chain_info());
status.genesis_hash = H256::default(); status.genesis_hash = H256::zero();
let packet_body = write_handshake(&status, &capabilities, &proto); let packet_body = write_handshake(&status, &capabilities, &proto);
@ -472,16 +472,16 @@ fn get_state_proofs() {
} }
let req_id = 112; let req_id = 112;
let key1: H256 = U256::from(11223344).into(); let key1: H256 = BigEndianHash::from_uint(&U256::from(11223344));
let key2: H256 = U256::from(99988887).into(); let key2: H256 = BigEndianHash::from_uint(&U256::from(99988887));
let mut builder = Builder::default(); let mut builder = Builder::default();
builder.push(Request::Account(IncompleteAccountRequest { builder.push(Request::Account(IncompleteAccountRequest {
block_hash: H256::default().into(), block_hash: H256::zero().into(),
address_hash: key1.into(), address_hash: key1.into(),
})).unwrap(); })).unwrap();
builder.push(Request::Storage(IncompleteStorageRequest { builder.push(Request::Storage(IncompleteStorageRequest {
block_hash: H256::default().into(), block_hash: H256::zero().into(),
address_hash: key1.into(), address_hash: key1.into(),
key_hash: key2.into(), key_hash: key2.into(),
})).unwrap(); })).unwrap();
@ -492,11 +492,11 @@ fn get_state_proofs() {
let response = { let response = {
let responses = vec![ let responses = vec![
Response::Account(provider.account_proof(CompleteAccountRequest { Response::Account(provider.account_proof(CompleteAccountRequest {
block_hash: H256::default(), block_hash: H256::zero(),
address_hash: key1, address_hash: key1,
}).unwrap()), }).unwrap()),
Response::Storage(provider.storage_proof(CompleteStorageRequest { Response::Storage(provider.storage_proof(CompleteStorageRequest {
block_hash: H256::default(), block_hash: H256::zero(),
address_hash: key1, address_hash: key1,
key_hash: key2, key_hash: key2,
}).unwrap()), }).unwrap()),
@ -529,8 +529,8 @@ fn get_contract_code() {
} }
let req_id = 112; let req_id = 112;
let key1: H256 = U256::from(11223344).into(); let key1: H256 = BigEndianHash::from_uint(&U256::from(11223344));
let key2: H256 = U256::from(99988887).into(); let key2: H256 = BigEndianHash::from_uint(&U256::from(99988887));
let request = Request::Code(IncompleteCodeRequest { let request = Request::Code(IncompleteCodeRequest {
block_hash: key1.into(), block_hash: key1.into(),
@ -541,7 +541,7 @@ fn get_contract_code() {
let request_body = make_packet(req_id, &requests); let request_body = make_packet(req_id, &requests);
let response = { let response = {
let response = vec![Response::Code(CodeResponse { let response = vec![Response::Code(CodeResponse {
code: key1.iter().chain(key2.iter()).cloned().collect(), code: key1.as_bytes().iter().chain(key2.as_bytes().iter()).cloned().collect(),
})]; })];
let new_creds = *flow_params.limit() - flow_params.compute_cost_multi(requests.requests()).unwrap(); let new_creds = *flow_params.limit() - flow_params.compute_cost_multi(requests.requests()).unwrap();
@ -616,9 +616,9 @@ fn proof_of_execution() {
let req_id = 112; let req_id = 112;
let mut request = Request::Execution(request::IncompleteExecutionRequest { let mut request = Request::Execution(request::IncompleteExecutionRequest {
block_hash: H256::default().into(), block_hash: H256::zero().into(),
from: Address::default(), from: Address::zero(),
action: Action::Call(Address::default()), action: Action::Call(Address::zero()),
gas: 100.into(), gas: 100.into(),
gas_price: 0.into(), gas_price: 0.into(),
value: 0.into(), value: 0.into(),
@ -755,7 +755,7 @@ fn get_transaction_index() {
} }
let req_id = 112; let req_id = 112;
let key1: H256 = U256::from(11223344).into(); let key1: H256 = BigEndianHash::from_uint(&U256::from(11223344));
let request = Request::TransactionIndex(IncompleteTransactionIndexRequest { let request = Request::TransactionIndex(IncompleteTransactionIndexRequest {
hash: key1.into(), hash: key1.into(),

View File

@ -983,7 +983,7 @@ impl Account {
let mut db = journaldb::new_memory_db(); let mut db = journaldb::new_memory_db();
for node in proof { db.insert(&node[..]); } for node in proof { db.insert(&node[..]); }
match TrieDB::new(&db, &state_root).and_then(|t| t.get(&keccak(&self.address)))? { match TrieDB::new(&db, &state_root).and_then(|t| t.get(keccak(&self.address).as_bytes()))? {
Some(val) => { Some(val) => {
let rlp = Rlp::new(&val); let rlp = Rlp::new(&val);
Ok(Some(BasicAccount { Ok(Some(BasicAccount {
@ -1162,7 +1162,7 @@ mod tests {
#[test] #[test]
fn check_header_with_ancestors() { fn check_header_with_ancestors() {
let mut last_header_hash = H256::default(); let mut last_header_hash = H256::zero();
let mut headers = (0..11).map(|num| { let mut headers = (0..11).map(|num| {
let mut header = Header::new(); let mut header = Header::new();
header.set_number(num); header.set_number(num);
@ -1278,7 +1278,7 @@ mod tests {
fn check_state_proof() { fn check_state_proof() {
use rlp::RlpStream; use rlp::RlpStream;
let mut root = H256::default(); let mut root = H256::zero();
let mut db = journaldb::new_memory_db(); let mut db = journaldb::new_memory_db();
let mut header = Header::new(); let mut header = Header::new();
header.set_number(123_456); header.set_number(123_456);
@ -1298,17 +1298,17 @@ mod tests {
let mut trie = SecTrieDBMut::new(&mut db, &mut root); let mut trie = SecTrieDBMut::new(&mut db, &mut root);
for _ in 0..100 { for _ in 0..100 {
let address = Address::random(); let address = Address::random();
trie.insert(&*address, &rand_acc()).unwrap(); trie.insert(address.as_bytes(), &rand_acc()).unwrap();
} }
trie.insert(&*addr, &rand_acc()).unwrap(); trie.insert(addr.as_bytes(), &rand_acc()).unwrap();
} }
let proof = { let proof = {
let trie = SecTrieDB::new(&db, &root).unwrap(); let trie = SecTrieDB::new(&db, &root).unwrap();
let mut recorder = Recorder::new(); let mut recorder = Recorder::new();
trie.get_with(&*addr, &mut recorder).unwrap().unwrap(); trie.get_with(addr.as_bytes(), &mut recorder).unwrap().unwrap();
recorder.drain().into_iter().map(|r| r.data).collect::<Vec<_>>() recorder.drain().into_iter().map(|r| r.data).collect::<Vec<_>>()
}; };

View File

@ -117,9 +117,9 @@ fn dummy_status() -> Status {
protocol_version: 1, protocol_version: 1,
network_id: 999, network_id: 999,
head_td: 1.into(), head_td: 1.into(),
head_hash: H256::default(), head_hash: H256::zero(),
head_num: 1359, head_num: 1359,
genesis_hash: H256::default(), genesis_hash: H256::zero(),
last_head: None, last_head: None,
} }
} }
@ -138,7 +138,7 @@ fn detects_hangup() {
let on_demand = Harness::create().service; let on_demand = Harness::create().service;
let result = on_demand.request_raw( let result = on_demand.request_raw(
&Context::NoOp, &Context::NoOp,
vec![request::HeaderByHash(H256::default().into()).into()], vec![request::HeaderByHash(H256::zero().into()).into()],
); );
assert_eq!(on_demand.pending.read().len(), 1); assert_eq!(on_demand.pending.read().len(), 1);
@ -199,7 +199,7 @@ fn no_capabilities() {
let _recv = harness.service.request_raw( let _recv = harness.service.request_raw(
&Context::NoOp, &Context::NoOp,
vec![request::HeaderByHash(H256::default().into()).into()] vec![request::HeaderByHash(H256::zero().into()).into()]
).unwrap(); ).unwrap();
assert_eq!(harness.service.pending.read().len(), 1); assert_eq!(harness.service.pending.read().len(), 1);
@ -395,7 +395,7 @@ fn wrong_kind() {
let _recv = harness.service.request_raw( let _recv = harness.service.request_raw(
&Context::NoOp, &Context::NoOp,
vec![request::HeaderByHash(H256::default().into()).into()] vec![request::HeaderByHash(H256::zero().into()).into()]
).unwrap(); ).unwrap();
assert_eq!(harness.service.pending.read().len(), 1); assert_eq!(harness.service.pending.read().len(), 1);

View File

@ -395,7 +395,7 @@ mod tests {
#[test] #[test]
fn queued_senders() { fn queued_senders() {
let sender = Address::default(); let sender = Address::zero();
let mut txq = TransactionQueue::default(); let mut txq = TransactionQueue::default();
let tx = Transaction::default().fake_sign(sender); let tx = Transaction::default().fake_sign(sender);
@ -411,7 +411,7 @@ mod tests {
#[test] #[test]
fn next_nonce() { fn next_nonce() {
let sender = Address::default(); let sender = Address::zero();
let mut txq = TransactionQueue::default(); let mut txq = TransactionQueue::default();
for i in (0..5).chain(10..15) { for i in (0..5).chain(10..15) {
@ -442,7 +442,7 @@ mod tests {
#[test] #[test]
fn current_to_future() { fn current_to_future() {
let sender = Address::default(); let sender = Address::zero();
let mut txq = TransactionQueue::default(); let mut txq = TransactionQueue::default();
for i in 5..10 { for i in 5..10 {
@ -485,7 +485,7 @@ mod tests {
#[test] #[test]
fn conditional() { fn conditional() {
let mut txq = TransactionQueue::default(); let mut txq = TransactionQueue::default();
let sender = Address::default(); let sender = Address::zero();
for i in 0..5 { for i in 0..5 {
let mut tx = Transaction::default(); let mut tx = Transaction::default();
@ -507,7 +507,7 @@ mod tests {
#[test] #[test]
fn cull_from_future() { fn cull_from_future() {
let sender = Address::default(); let sender = Address::zero();
let mut txq = TransactionQueue::default(); let mut txq = TransactionQueue::default();
for i in (0..1).chain(3..10) { for i in (0..1).chain(3..10) {
@ -527,7 +527,7 @@ mod tests {
#[test] #[test]
fn import_old() { fn import_old() {
let sender = Address::default(); let sender = Address::zero();
let mut txq = TransactionQueue::default(); let mut txq = TransactionQueue::default();
let mut tx_a = Transaction::default(); let mut tx_a = Transaction::default();
@ -544,7 +544,7 @@ mod tests {
#[test] #[test]
fn replace_is_removed() { fn replace_is_removed() {
let sender = Address::default(); let sender = Address::zero();
let mut txq = TransactionQueue::default(); let mut txq = TransactionQueue::default();
let tx_b: PendingTransaction = Transaction::default().fake_sign(sender).into(); let tx_b: PendingTransaction = Transaction::default().fake_sign(sender).into();
@ -564,7 +564,7 @@ mod tests {
#[test] #[test]
fn future_transactions() { fn future_transactions() {
let sender = Address::default(); let sender = Address::zero();
let mut txq = TransactionQueue::default(); let mut txq = TransactionQueue::default();
for i in (0..1).chain(3..10) { for i in (0..1).chain(3..10) {

View File

@ -220,7 +220,7 @@ mod tests {
num: 100.into(), num: 100.into(),
})).unwrap(); })).unwrap();
builder.push(Request::Receipts(IncompleteReceiptsRequest { builder.push(Request::Receipts(IncompleteReceiptsRequest {
hash: H256::default().into(), hash: H256::zero().into(),
})).unwrap(); })).unwrap();
} }
@ -267,7 +267,7 @@ mod tests {
})).unwrap(); })).unwrap();
let mut batch = builder.build(); let mut batch = builder.build();
batch.requests[1].fill(|_req_idx, _out_idx| Ok(Output::Hash(42.into()))); batch.requests[1].fill(|_req_idx, _out_idx| Ok(Output::Hash(H256::from_low_u64_be(42))));
assert!(batch.next_complete().is_some()); assert!(batch.next_complete().is_some());
batch.answered += 1; batch.answered += 1;
@ -289,7 +289,7 @@ mod tests {
assert!(batch.next_complete().is_some()); assert!(batch.next_complete().is_some());
let hdr_proof_res = header_proof::Response { let hdr_proof_res = header_proof::Response {
proof: vec![], proof: vec![],
hash: 12.into(), hash: H256::from_low_u64_be(12),
td: 21.into(), td: 21.into(),
}; };
batch.supply_response_unchecked(&hdr_proof_res); batch.supply_response_unchecked(&hdr_proof_res);
@ -308,7 +308,7 @@ mod tests {
})).unwrap(); })).unwrap();
let mut batch = builder.build(); let mut batch = builder.build();
batch.requests[1].fill(|_req_idx, _out_idx| Ok(Output::Hash(42.into()))); batch.requests[1].fill(|_req_idx, _out_idx| Ok(Output::Hash(H256::from_low_u64_be(42))));
assert!(batch.next_complete().is_some()); assert!(batch.next_complete().is_some());
batch.answered += 1; batch.answered += 1;

View File

@ -1648,7 +1648,7 @@ mod tests {
#[test] #[test]
fn hash_or_number_roundtrip() { fn hash_or_number_roundtrip() {
let hash = HashOrNumber::Hash(H256::default()); let hash = HashOrNumber::Hash(H256::zero());
let number = HashOrNumber::Number(5); let number = HashOrNumber::Number(5);
check_roundtrip(hash); check_roundtrip(hash);
@ -1808,7 +1808,7 @@ mod tests {
let full_req = Request::Storage(req.clone()); let full_req = Request::Storage(req.clone());
let res = StorageResponse { let res = StorageResponse {
proof: vec![vec![1, 2, 3], vec![4, 5, 6]], proof: vec![vec![1, 2, 3], vec![4, 5, 6]],
value: H256::default(), value: H256::zero(),
}; };
let full_res = Response::Storage(res.clone()); let full_res = Response::Storage(res.clone());
@ -1909,7 +1909,7 @@ mod tests {
code_hash: Default::default(), code_hash: Default::default(),
storage_root: Default::default() storage_root: Default::default()
}), }),
Response::Storage(StorageResponse { proof: vec![], value: H256::default() }), Response::Storage(StorageResponse { proof: vec![], value: H256::zero() }),
Response::Code(CodeResponse { code: vec![1, 2, 3, 4, 5] }), Response::Code(CodeResponse { code: vec![1, 2, 3, 4, 5] }),
Response::Execution(ExecutionResponse { items: vec![] }), Response::Execution(ExecutionResponse { items: vec![] }),
]; ];

View File

@ -10,12 +10,12 @@ authors = ["Parity Technologies <admin@parity.io>"]
ethcore = { path = ".."} ethcore = { path = ".."}
ethcore-network = { path = "../../util/network" } ethcore-network = { path = "../../util/network" }
ethcore-network-devp2p = { path = "../../util/network-devp2p" } ethcore-network-devp2p = { path = "../../util/network-devp2p" }
ethereum-types = "0.4" ethereum-types = "0.6.0"
log = "0.4" log = "0.4"
parking_lot = "0.7" parking_lot = "0.7"
ethabi = "6.0" ethabi = "8.0"
ethabi-derive = "6.0" ethabi-derive = "8.0"
ethabi-contract = "6.0" ethabi-contract = "8.0"
lru-cache = "0.1" lru-cache = "0.1"
[dev-dependencies] [dev-dependencies]

View File

@ -135,11 +135,13 @@ mod test {
use io::IoChannel; use io::IoChannel;
use super::NodeFilter; use super::NodeFilter;
use tempdir::TempDir; use tempdir::TempDir;
use ethereum_types::Address;
use std::str::FromStr;
/// Contract code: https://gist.github.com/arkpar/467dbcc73cbb85b0997a7a10ffa0695f /// Contract code: https://gist.github.com/arkpar/467dbcc73cbb85b0997a7a10ffa0695f
#[test] #[test]
fn node_filter() { fn node_filter() {
let contract_addr = "0000000000000000000000000000000000000005".into(); let contract_addr = Address::from_str("0000000000000000000000000000000000000005").unwrap();
let data = include_bytes!("../res/node_filter.json"); let data = include_bytes!("../res/node_filter.json");
let tempdir = TempDir::new("").unwrap(); let tempdir = TempDir::new("").unwrap();
let spec = Spec::load(&tempdir.path(), &data[..]).unwrap(); let spec = Spec::load(&tempdir.path(), &data[..]).unwrap();
@ -153,11 +155,11 @@ mod test {
IoChannel::disconnected(), IoChannel::disconnected(),
).unwrap(); ).unwrap();
let filter = NodeFilter::new(Arc::downgrade(&client) as Weak<BlockChainClient>, contract_addr); let filter = NodeFilter::new(Arc::downgrade(&client) as Weak<BlockChainClient>, contract_addr);
let self1: NodeId = "00000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000002".into(); let self1 = NodeId::from_str("00000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000002").unwrap();
let self2: NodeId = "00000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000003".into(); let self2 = NodeId::from_str("00000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000003").unwrap();
let node1: NodeId = "00000000000000000000000000000000000000000000000000000000000000110000000000000000000000000000000000000000000000000000000000000012".into(); let node1 = NodeId::from_str("00000000000000000000000000000000000000000000000000000000000000110000000000000000000000000000000000000000000000000000000000000012").unwrap();
let node2: NodeId = "00000000000000000000000000000000000000000000000000000000000000210000000000000000000000000000000000000000000000000000000000000022".into(); let node2 = NodeId::from_str("00000000000000000000000000000000000000000000000000000000000000210000000000000000000000000000000000000000000000000000000000000022").unwrap();
let nodex: NodeId = "77000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000".into(); let nodex = NodeId::from_str("77000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000").unwrap();
assert!(filter.connection_allowed(&self1, &node1, ConnectionDirection::Inbound)); assert!(filter.connection_allowed(&self1, &node1, ConnectionDirection::Inbound));
assert!(filter.connection_allowed(&self1, &nodex, ConnectionDirection::Inbound)); assert!(filter.connection_allowed(&self1, &nodex, ConnectionDirection::Inbound));

View File

@ -8,20 +8,20 @@ authors = ["Parity Technologies <admin@parity.io>"]
[dependencies] [dependencies]
common-types = { path = "../types" } common-types = { path = "../types" }
derive_more = "0.14.0" derive_more = "0.14.0"
ethabi = "6.0" ethabi = "8.0"
ethabi-contract = "6.0" ethabi-contract = "8.0"
ethabi-derive = "6.0" ethabi-derive = "8.0"
ethcore = { path = ".." } ethcore = { path = ".." }
ethcore-call-contract = { path = "../call-contract" } ethcore-call-contract = { path = "../call-contract" }
ethcore-io = { path = "../../util/io" } ethcore-io = { path = "../../util/io" }
ethcore-miner = { path = "../../miner" } ethcore-miner = { path = "../../miner" }
ethereum-types = "0.4" ethereum-types = "0.6.0"
ethjson = { path = "../../json" } ethjson = { path = "../../json" }
ethkey = { path = "../../accounts/ethkey" } ethkey = { path = "../../accounts/ethkey" }
fetch = { path = "../../util/fetch" } fetch = { path = "../../util/fetch" }
futures = "0.1" futures = "0.1"
heapsize = "0.4" heapsize = "0.4"
keccak-hash = "0.1.2" keccak-hash = "0.2.0"
log = "0.4" log = "0.4"
parity-bytes = "0.1" parity-bytes = "0.1"
parity-crypto = "0.4.0" parity-crypto = "0.4.0"
@ -29,7 +29,7 @@ parking_lot = "0.7"
trie-db = "0.11.0" trie-db = "0.11.0"
patricia-trie-ethereum = { path = "../../util/patricia-trie-ethereum" } patricia-trie-ethereum = { path = "../../util/patricia-trie-ethereum" }
rand = "0.3" rand = "0.3"
rlp = { version = "0.3.0", features = ["ethereum"] } rlp = "0.4.0"
rlp_derive = { path = "../../util/rlp-derive" } rlp_derive = { path = "../../util/rlp-derive" }
rustc-hex = "1.0" rustc-hex = "1.0"
serde = "1.0" serde = "1.0"

View File

@ -114,7 +114,7 @@ impl SecretStoreEncryptor {
let requester = self.config.key_server_account.ok_or_else(|| Error::KeyServerAccountNotSet)?; let requester = self.config.key_server_account.ok_or_else(|| Error::KeyServerAccountNotSet)?;
// key id in SS is H256 && we have H160 here => expand with assitional zeros // key id in SS is H256 && we have H160 here => expand with assitional zeros
let contract_address_extended: H256 = contract_address.into(); let contract_address_extended: H256 = (*contract_address).into();
let base_url = self.config.base_url.clone().ok_or_else(|| Error::KeyServerNotSet)?; let base_url = self.config.base_url.clone().ok_or_else(|| Error::KeyServerNotSet)?;
// prepare request url // prepare request url
@ -156,7 +156,7 @@ impl SecretStoreEncryptor {
let decrypted_key = Public::from_slice(&decrypted_bytes); let decrypted_key = Public::from_slice(&decrypted_bytes);
// and now take x coordinate of Public as a key // and now take x coordinate of Public as a key
let key: Bytes = (*decrypted_key)[..INIT_VEC_LEN].into(); let key: Bytes = decrypted_key.as_bytes()[..INIT_VEC_LEN].into();
// cache the key in the session and clear expired sessions // cache the key in the session and clear expired sessions
self.sessions.lock().insert(*contract_address, EncryptionSession{ self.sessions.lock().insert(*contract_address, EncryptionSession{
@ -212,11 +212,11 @@ impl Encryptor for SecretStoreEncryptor {
}?; }?;
// encrypt data // encrypt data
let mut cypher = Vec::with_capacity(plain_data.len() + initialisation_vector.len()); let mut cypher = Vec::with_capacity(plain_data.len() + initialisation_vector.as_bytes().len());
cypher.extend(repeat(0).take(plain_data.len())); cypher.extend(repeat(0).take(plain_data.len()));
crypto::aes::encrypt_128_ctr(&key, initialisation_vector, plain_data, &mut cypher) crypto::aes::encrypt_128_ctr(&key, initialisation_vector.as_bytes(), plain_data, &mut cypher)
.map_err(|e| Error::Encrypt(e.to_string()))?; .map_err(|e| Error::Encrypt(e.to_string()))?;
cypher.extend_from_slice(&initialisation_vector); cypher.extend_from_slice(&initialisation_vector.as_bytes());
Ok(cypher) Ok(cypher)
} }

View File

@ -29,15 +29,15 @@ use_contract!(keys_acl_contract, "res/keys_acl.json");
/// Returns the address (of the contract), that corresponds to the key /// Returns the address (of the contract), that corresponds to the key
pub fn key_to_address(key: &H256) -> Address { pub fn key_to_address(key: &H256) -> Address {
Address::from_slice(&key.to_vec()[..10]) Address::from_slice(&key.as_bytes()[..10])
} }
/// Returns the key from the key server associated with the contract /// Returns the key from the key server associated with the contract
pub fn address_to_key(contract_address: &Address) -> H256 { pub fn address_to_key(contract_address: &Address) -> H256 {
// Current solution uses contract address extended with 0 as id // Current solution uses contract address extended with 0 as id
let contract_address_extended: H256 = contract_address.into(); let contract_address_extended: H256 = (*contract_address).into();
H256::from_slice(&contract_address_extended) H256::from_slice(contract_address_extended.as_bytes())
} }
/// Trait for keys server keys provider. /// Trait for keys server keys provider.
@ -118,7 +118,7 @@ impl Default for StoringKeyProvider {
fn default() -> Self { fn default() -> Self {
StoringKeyProvider { StoringKeyProvider {
available_keys: RwLock::new(None), available_keys: RwLock::new(None),
key_server_account: Some(Address::default()), key_server_account: Some(Address::zero()),
} }
} }
} }

View File

@ -80,7 +80,7 @@ pub use log::{Logging, TransactionLog, ValidatorLog, PrivateTxStatus, FileLogsSe
use std::sync::{Arc, Weak}; use std::sync::{Arc, Weak};
use std::collections::{HashMap, HashSet, BTreeMap}; use std::collections::{HashMap, HashSet, BTreeMap};
use ethereum_types::{H128, H256, U256, Address}; use ethereum_types::{H128, H256, U256, Address, BigEndianHash};
use hash::keccak; use hash::keccak;
use rlp::*; use rlp::*;
use parking_lot::RwLock; use parking_lot::RwLock;
@ -285,9 +285,10 @@ impl Provider {
/// Calculate hash from united private state and contract nonce /// Calculate hash from united private state and contract nonce
pub fn calculate_state_hash(&self, state: &Bytes, nonce: U256) -> H256 { pub fn calculate_state_hash(&self, state: &Bytes, nonce: U256) -> H256 {
let state_hash = keccak(state); let state_hash = keccak(state);
let nonce_h256: H256 = BigEndianHash::from_uint(&nonce);
let mut state_buf = [0u8; 64]; let mut state_buf = [0u8; 64];
state_buf[..32].clone_from_slice(&state_hash); state_buf[..32].clone_from_slice(state_hash.as_bytes());
state_buf[32..].clone_from_slice(&H256::from(nonce)); state_buf[32..].clone_from_slice(nonce_h256.as_bytes());
keccak(&state_buf.as_ref()) keccak(&state_buf.as_ref())
} }
@ -481,13 +482,13 @@ impl Provider {
fn iv_from_transaction(transaction: &SignedTransaction) -> H128 { fn iv_from_transaction(transaction: &SignedTransaction) -> H128 {
let nonce = keccak(&transaction.nonce.rlp_bytes()); let nonce = keccak(&transaction.nonce.rlp_bytes());
let (iv, _) = nonce.split_at(INIT_VEC_LEN); let (iv, _) = nonce.as_bytes().split_at(INIT_VEC_LEN);
H128::from_slice(iv) H128::from_slice(iv)
} }
fn iv_from_address(contract_address: &Address) -> H128 { fn iv_from_address(contract_address: &Address) -> H128 {
let address = keccak(&contract_address.rlp_bytes()); let address = keccak(&contract_address.rlp_bytes());
let (iv, _) = address.split_at(INIT_VEC_LEN); let (iv, _) = address.as_bytes().split_at(INIT_VEC_LEN);
H128::from_slice(iv) H128::from_slice(iv)
} }
@ -536,8 +537,8 @@ impl Provider {
// Sort the storage to guarantee the order for all parties // Sort the storage to guarantee the order for all parties
let sorted_storage: BTreeMap<&H256, &H256> = storage.iter().collect(); let sorted_storage: BTreeMap<&H256, &H256> = storage.iter().collect();
for (key, value) in sorted_storage { for (key, value) in sorted_storage {
raw.extend_from_slice(key); raw.extend_from_slice(key.as_bytes());
raw.extend_from_slice(value); raw.extend_from_slice(value.as_bytes());
}; };
raw raw
} }
@ -621,8 +622,8 @@ impl Provider {
v[31] = s.v(); v[31] = s.v();
v v
}).collect::<Vec<[u8; 32]>>(), }).collect::<Vec<[u8; 32]>>(),
signatures.iter().map(|s| s.r()).collect::<Vec<&[u8]>>(), signatures.iter().map(|s| H256::from_slice(s.r())).collect::<Vec<H256>>(),
signatures.iter().map(|s| s.s()).collect::<Vec<&[u8]>>() signatures.iter().map(|s| H256::from_slice(s.s())).collect::<Vec<H256>>(),
) )
} }

View File

@ -292,10 +292,11 @@ impl Drop for Logging {
mod tests { mod tests {
use serde_json; use serde_json;
use error::Error; use error::Error;
use ethereum_types::H256; use ethereum_types::{H256, Address};
use std::collections::{HashMap, BTreeMap}; use std::collections::{HashMap, BTreeMap};
use std::sync::Arc; use std::sync::Arc;
use std::time::{SystemTime, Duration}; use std::time::{SystemTime, Duration};
use std::str::FromStr;
use types::transaction::Transaction; use types::transaction::Transaction;
use parking_lot::RwLock; use parking_lot::RwLock;
use super::{TransactionLog, Logging, PrivateTxStatus, LogsSerializer, ValidatorLog}; use super::{TransactionLog, Logging, PrivateTxStatus, LogsSerializer, ValidatorLog};
@ -360,8 +361,8 @@ mod tests {
let logger = Logging::new(Arc::new(StringLogSerializer::new("".into()))); let logger = Logging::new(Arc::new(StringLogSerializer::new("".into())));
let private_tx = Transaction::default(); let private_tx = Transaction::default();
let hash = private_tx.hash(None); let hash = private_tx.hash(None);
logger.private_tx_created(&hash, &vec!["0x82a978b3f5962a5b0957d9ee9eef472ee55b42f1".into()]); logger.private_tx_created(&hash, &vec![Address::from_str("82a978b3f5962a5b0957d9ee9eef472ee55b42f1").unwrap()]);
logger.signature_added(&hash, &"0x82a978b3f5962a5b0957d9ee9eef472ee55b42f1".into()); logger.signature_added(&hash, &Address::from_str("82a978b3f5962a5b0957d9ee9eef472ee55b42f1").unwrap());
logger.tx_deployed(&hash, &hash); logger.tx_deployed(&hash, &hash);
let tx_log = logger.tx_log(&hash).unwrap(); let tx_log = logger.tx_log(&hash).unwrap();
assert_eq!(tx_log.status, PrivateTxStatus::Deployed); assert_eq!(tx_log.status, PrivateTxStatus::Deployed);
@ -371,35 +372,35 @@ mod tests {
fn serialization() { fn serialization() {
let current_timestamp = SystemTime::now(); let current_timestamp = SystemTime::now();
let initial_validator_log = ValidatorLog { let initial_validator_log = ValidatorLog {
account: "0x82a978b3f5962a5b0957d9ee9eef472ee55b42f1".into(), account: Address::from_str("82a978b3f5962a5b0957d9ee9eef472ee55b42f1").unwrap(),
validation_timestamp: Some(current_timestamp.checked_add(Duration::from_secs(1)).unwrap()), validation_timestamp: Some(current_timestamp.checked_add(Duration::from_secs(1)).unwrap()),
}; };
let initial_log = TransactionLog { let initial_log = TransactionLog {
tx_hash: "0x64f648ca7ae7f4138014f860ae56164d8d5732969b1cea54d8be9d144d8aa6f6".into(), tx_hash: H256::from_str("64f648ca7ae7f4138014f860ae56164d8d5732969b1cea54d8be9d144d8aa6f6").unwrap(),
status: PrivateTxStatus::Deployed, status: PrivateTxStatus::Deployed,
creation_timestamp: current_timestamp, creation_timestamp: current_timestamp,
validators: vec![initial_validator_log], validators: vec![initial_validator_log],
deployment_timestamp: Some(current_timestamp.checked_add(Duration::from_secs(2)).unwrap()), deployment_timestamp: Some(current_timestamp.checked_add(Duration::from_secs(2)).unwrap()),
public_tx_hash: Some("0x69b9c691ede7993effbcc88911c309af1c82be67b04b3882dd446b808ae146da".into()), public_tx_hash: Some(H256::from_str("69b9c691ede7993effbcc88911c309af1c82be67b04b3882dd446b808ae146da").unwrap()),
}; };
let serializer = Arc::new(StringLogSerializer::new(serde_json::to_string(&vec![initial_log.clone()]).unwrap())); let serializer = Arc::new(StringLogSerializer::new(serde_json::to_string(&vec![initial_log.clone()]).unwrap()));
let logger = Logging::new(serializer.clone()); let logger = Logging::new(serializer.clone());
let hash: H256 = "0x63c715e88f7291e66069302f6fcbb4f28a19ef5d7cbd1832d0c01e221c0061c6".into(); let hash = H256::from_str("63c715e88f7291e66069302f6fcbb4f28a19ef5d7cbd1832d0c01e221c0061c6").unwrap();
logger.private_tx_created(&hash, &vec!["0x7ffbe3512782069be388f41be4d8eb350672d3a5".into()]); logger.private_tx_created(&hash, &vec![Address::from_str("7ffbe3512782069be388f41be4d8eb350672d3a5").unwrap()]);
logger.signature_added(&hash, &"0x7ffbe3512782069be388f41be4d8eb350672d3a5".into()); logger.signature_added(&hash, &Address::from_str("7ffbe3512782069be388f41be4d8eb350672d3a5").unwrap());
logger.tx_deployed(&hash, &"0xde2209a8635b9cab9eceb67928b217c70ab53f6498e5144492ec01e6f43547d7".into()); logger.tx_deployed(&hash, &H256::from_str("de2209a8635b9cab9eceb67928b217c70ab53f6498e5144492ec01e6f43547d7").unwrap());
drop(logger); drop(logger);
let added_validator_log = ValidatorLog { let added_validator_log = ValidatorLog {
account: "0x7ffbe3512782069be388f41be4d8eb350672d3a5".into(), account: Address::from_str("7ffbe3512782069be388f41be4d8eb350672d3a5").unwrap(),
validation_timestamp: Some(current_timestamp.checked_add(Duration::from_secs(7)).unwrap()), validation_timestamp: Some(current_timestamp.checked_add(Duration::from_secs(7)).unwrap()),
}; };
let added_log = TransactionLog { let added_log = TransactionLog {
tx_hash: "0x63c715e88f7291e66069302f6fcbb4f28a19ef5d7cbd1832d0c01e221c0061c6".into(), tx_hash: H256::from_str("63c715e88f7291e66069302f6fcbb4f28a19ef5d7cbd1832d0c01e221c0061c6").unwrap(),
status: PrivateTxStatus::Deployed, status: PrivateTxStatus::Deployed,
creation_timestamp: current_timestamp.checked_add(Duration::from_secs(6)).unwrap(), creation_timestamp: current_timestamp.checked_add(Duration::from_secs(6)).unwrap(),
validators: vec![added_validator_log], validators: vec![added_validator_log],
deployment_timestamp: Some(current_timestamp.checked_add(Duration::from_secs(8)).unwrap()), deployment_timestamp: Some(current_timestamp.checked_add(Duration::from_secs(8)).unwrap()),
public_tx_hash: Some("0xde2209a8635b9cab9eceb67928b217c70ab53f6498e5144492ec01e6f43547d7".into()), public_tx_hash: Some(H256::from_str("de2209a8635b9cab9eceb67928b217c70ab53f6498e5144492ec01e6f43547d7").unwrap()),
}; };
let should_be_final = vec![added_log, initial_log]; let should_be_final = vec![added_log, initial_log];
let deserialized_logs: Vec<TransactionLog> = serde_json::from_str(&serializer.log()).unwrap(); let deserialized_logs: Vec<TransactionLog> = serde_json::from_str(&serializer.log()).unwrap();

View File

@ -14,7 +14,7 @@
// You should have received a copy of the GNU General Public License // You should have received a copy of the GNU General Public License
// along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>. // along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>.
use ethereum_types::{H256, U256, Address}; use ethereum_types::{H256, U256, Address, BigEndianHash};
use bytes::Bytes; use bytes::Bytes;
use hash::keccak; use hash::keccak;
use rlp::Encodable; use rlp::Encodable;
@ -38,7 +38,7 @@ impl PrivateTransaction {
PrivateTransaction { PrivateTransaction {
encrypted, encrypted,
contract, contract,
hash: 0.into(), hash: H256::zero(),
}.compute_hash() }.compute_hash()
} }
@ -87,7 +87,7 @@ impl SignedPrivateTransaction {
r: sig.r().into(), r: sig.r().into(),
s: sig.s().into(), s: sig.s().into(),
v: add_chain_replay_protection(sig.v() as u64, chain_id), v: add_chain_replay_protection(sig.v() as u64, chain_id),
hash: 0.into(), hash: H256::zero(),
}.compute_hash() }.compute_hash()
} }
@ -100,7 +100,11 @@ impl SignedPrivateTransaction {
/// Construct a signature object from the sig. /// Construct a signature object from the sig.
pub fn signature(&self) -> Signature { pub fn signature(&self) -> Signature {
Signature::from_rsv(&self.r.into(), &self.s.into(), self.standard_v()) Signature::from_rsv(
&BigEndianHash::from_uint(&self.r),
&BigEndianHash::from_uint(&self.s),
self.standard_v(),
)
} }
/// Get the hash of of the original transaction. /// Get the hash of of the original transaction.

View File

@ -231,7 +231,7 @@ fn call_other_private_contract() {
trace!("Creating private contract B"); trace!("Creating private contract B");
// Build constructor data // Build constructor data
let mut deploy_data = "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".to_string(); let mut deploy_data = "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".to_string();
deploy_data.push_str(&address_a.to_vec().to_hex()); deploy_data.push_str(&address_a.as_bytes().to_vec().to_hex());
let private_contract_b_test = deploy_data.from_hex().unwrap(); let private_contract_b_test = deploy_data.from_hex().unwrap();
let mut private_create_tx2 = Transaction::default(); let mut private_create_tx2 = Transaction::default();
private_create_tx2.action = Action::Create; private_create_tx2.action = Action::Create;

View File

@ -11,7 +11,7 @@ ethcore-blockchain = { path = "../blockchain" }
ethcore-io = { path = "../../util/io" } ethcore-io = { path = "../../util/io" }
ethcore-private-tx = { path = "../private-tx" } ethcore-private-tx = { path = "../private-tx" }
ethcore-sync = { path = "../sync" } ethcore-sync = { path = "../sync" }
ethereum-types = "0.4" ethereum-types = "0.6.0"
kvdb = "0.1" kvdb = "0.1"
log = "0.4" log = "0.4"
trace-time = "0.1" trace-time = "0.1"

View File

@ -31,8 +31,8 @@ use ethereum_types::Address;
fn combine_key<'a>(address_hash: &'a H256, key: &'a H256) -> H256 { fn combine_key<'a>(address_hash: &'a H256, key: &'a H256) -> H256 {
let mut dst = key.clone(); let mut dst = key.clone();
{ {
let last_src: &[u8] = &*address_hash; let last_src: &[u8] = address_hash.as_bytes();
let last_dst: &mut [u8] = &mut *dst; let last_dst: &mut [u8] = dst.as_bytes_mut();
for (k, a) in last_dst[12..].iter_mut().zip(&last_src[12..]) { for (k, a) in last_dst[12..].iter_mut().zip(&last_src[12..]) {
*k ^= *a *k ^= *a
} }

View File

@ -603,7 +603,7 @@ mod tests {
db, db,
parent, parent,
last_hashes, last_hashes,
Address::new(), Address::zero(),
(3141562.into(), 31415620.into()), (3141562.into(), 31415620.into()),
vec![], vec![],
false, false,

View File

@ -95,7 +95,7 @@ impl Pricer for ModexpPricer {
// read lengths as U256 here for accurate gas calculation. // read lengths as U256 here for accurate gas calculation.
let mut read_len = || { let mut read_len = || {
reader.read_exact(&mut buf[..]).expect("reading from zero-extended memory cannot fail; qed"); reader.read_exact(&mut buf[..]).expect("reading from zero-extended memory cannot fail; qed");
U256::from(H256::from_slice(&buf[..])) U256::from_big_endian(&buf[..])
}; };
let base_len = read_len(); let base_len = read_len();
let exp_len = read_len(); let exp_len = read_len();
@ -118,7 +118,7 @@ impl Pricer for ModexpPricer {
let mut reader = input[(96 + base_len as usize)..].chain(io::repeat(0)); let mut reader = input[(96 + base_len as usize)..].chain(io::repeat(0));
let len = min(exp_len, 32) as usize; let len = min(exp_len, 32) as usize;
reader.read_exact(&mut buf[(32 - len)..]).expect("reading from zero-extended memory cannot fail; qed"); reader.read_exact(&mut buf[(32 - len)..]).expect("reading from zero-extended memory cannot fail; qed");
U256::from(H256::from_slice(&buf[..])) U256::from_big_endian(&buf[..])
}; };
let adjusted_exp_len = Self::adjusted_exp_len(exp_len, exp_low); let adjusted_exp_len = Self::adjusted_exp_len(exp_len, exp_low);
@ -286,7 +286,7 @@ impl Impl for EcRecover {
if let Ok(p) = ec_recover(&s, &hash) { if let Ok(p) = ec_recover(&s, &hash) {
let r = keccak(p); let r = keccak(p);
output.write(0, &[0; 12]); output.write(0, &[0; 12]);
output.write(12, &r[12..r.len()]); output.write(12, &r.as_bytes()[12..]);
} }
} }

View File

@ -33,7 +33,7 @@ use itertools::Itertools;
use journaldb; use journaldb;
use kvdb::{DBValue, KeyValueDB, DBTransaction}; use kvdb::{DBValue, KeyValueDB, DBTransaction};
use parking_lot::{Mutex, RwLock}; use parking_lot::{Mutex, RwLock};
use rand::OsRng; use rand::rngs::OsRng;
use types::transaction::{self, LocalizedTransaction, UnverifiedTransaction, SignedTransaction, Action}; use types::transaction::{self, LocalizedTransaction, UnverifiedTransaction, SignedTransaction, Action};
use trie::{TrieSpec, TrieFactory, Trie}; use trie::{TrieSpec, TrieFactory, Trie};
use types::ancestry_action::AncestryAction; use types::ancestry_action::AncestryAction;
@ -456,7 +456,7 @@ impl Importer {
{ {
trace_time!("import_old_block"); trace_time!("import_old_block");
// verify the block, passing the chain for updating the epoch verifier. // verify the block, passing the chain for updating the epoch verifier.
let mut rng = OsRng::new()?; let mut rng = OsRng::new().map_err(|e| format!("{}", e))?;
self.ancient_verifier.verify(&mut rng, &unverified.header, &chain)?; self.ancient_verifier.verify(&mut rng, &unverified.header, &chain)?;
// Commit results // Commit results
@ -908,12 +908,12 @@ impl Client {
let hashes = self.last_hashes.read(); let hashes = self.last_hashes.read();
if hashes.front().map_or(false, |h| h == parent_hash) { if hashes.front().map_or(false, |h| h == parent_hash) {
let mut res = Vec::from(hashes.clone()); let mut res = Vec::from(hashes.clone());
res.resize(256, H256::default()); res.resize(256, H256::zero());
return Arc::new(res); return Arc::new(res);
} }
} }
let mut last_hashes = LastHashes::new(); let mut last_hashes = LastHashes::new();
last_hashes.resize(256, H256::default()); last_hashes.resize(256, H256::zero());
last_hashes[0] = parent_hash.clone(); last_hashes[0] = parent_hash.clone();
let chain = self.chain.read(); let chain = self.chain.read();
for i in 0..255 { for i in 0..255 {
@ -1223,7 +1223,7 @@ impl Client {
// transaction for calling contracts from services like engine. // transaction for calling contracts from services like engine.
// from the null sender, with 50M gas. // from the null sender, with 50M gas.
fn contract_call_tx(&self, block_id: BlockId, address: Address, data: Bytes) -> SignedTransaction { fn contract_call_tx(&self, block_id: BlockId, address: Address, data: Bytes) -> SignedTransaction {
let from = Address::default(); let from = Address::zero();
transaction::Transaction { transaction::Transaction {
nonce: self.nonce(&from, block_id).unwrap_or_else(|| self.engine.account_start_nonce(0)), nonce: self.nonce(&from, block_id).unwrap_or_else(|| self.engine.account_start_nonce(0)),
action: Action::Call(address), action: Action::Call(address),
@ -1341,8 +1341,8 @@ impl BlockChainReset for Client {
best_block_hash = current_header.parent_hash(); best_block_hash = current_header.parent_hash();
let (number, hash) = (current_header.number(), current_header.hash()); let (number, hash) = (current_header.number(), current_header.hash());
batch.delete(::db::COL_HEADERS, &hash); batch.delete(::db::COL_HEADERS, hash.as_bytes());
batch.delete(::db::COL_BODIES, &hash); batch.delete(::db::COL_BODIES, hash.as_bytes());
Writable::delete::<BlockDetails, H264> Writable::delete::<BlockDetails, H264>
(&mut batch, ::db::COL_EXTRA, &hash); (&mut batch, ::db::COL_EXTRA, &hash);
Writable::delete::<H256, BlockNumberKey> Writable::delete::<H256, BlockNumberKey>
@ -1375,7 +1375,7 @@ impl BlockChainReset for Client {
&best_block_details &best_block_details
); );
// update the new best block hash // update the new best block hash
batch.put(::db::COL_EXTRA, b"best", &best_block_hash); batch.put(::db::COL_EXTRA, b"best", best_block_hash.as_bytes());
self.db.read() self.db.read()
.key_value() .key_value()
@ -1822,7 +1822,7 @@ impl BlockChainClient for Client {
}; };
if let Some(after) = after { if let Some(after) = after {
if let Err(e) = iter.seek(after) { if let Err(e) = iter.seek(after.as_bytes()) {
trace!(target: "fatdb", "list_accounts: Couldn't seek the DB: {:?}", e); trace!(target: "fatdb", "list_accounts: Couldn't seek the DB: {:?}", e);
} else { } else {
// Position the iterator after the `after` element // Position the iterator after the `after` element
@ -1870,7 +1870,7 @@ impl BlockChainClient for Client {
}; };
if let Some(after) = after { if let Some(after) = after {
if let Err(e) = iter.seek(after) { if let Err(e) = iter.seek(after.as_bytes()) {
trace!(target: "fatdb", "list_storage: Couldn't seek the DB: {:?}", e); trace!(target: "fatdb", "list_storage: Couldn't seek the DB: {:?}", e);
} else { } else {
// Position the iterator after the `after` element // Position the iterator after the `after` element
@ -2592,6 +2592,7 @@ fn transaction_receipt(
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
use ethereum_types::{H256, Address};
#[test] #[test]
fn should_not_cache_details_before_commit() { fn should_not_cache_details_before_commit() {
@ -2667,19 +2668,19 @@ mod tests {
use types::transaction::{Transaction, LocalizedTransaction, Action}; use types::transaction::{Transaction, LocalizedTransaction, Action};
// given // given
let key = KeyPair::from_secret_slice(&keccak("test")).unwrap(); let key = KeyPair::from_secret_slice(keccak("test").as_bytes()).unwrap();
let secret = key.secret(); let secret = key.secret();
let machine = ::ethereum::new_frontier_test_machine(); let machine = ::ethereum::new_frontier_test_machine();
let block_number = 1; let block_number = 1;
let block_hash = 5.into(); let block_hash = H256::from_low_u64_be(5);
let state_root = 99.into(); let state_root = H256::from_low_u64_be(99);
let gas_used = 10.into(); let gas_used = 10.into();
let raw_tx = Transaction { let raw_tx = Transaction {
nonce: 0.into(), nonce: 0.into(),
gas_price: 0.into(), gas_price: 0.into(),
gas: 21000.into(), gas: 21000.into(),
action: Action::Call(10.into()), action: Action::Call(Address::from_low_u64_be(10)),
value: 0.into(), value: 0.into(),
data: vec![], data: vec![],
}; };
@ -2692,11 +2693,11 @@ mod tests {
cached_sender: Some(tx1.sender()), cached_sender: Some(tx1.sender()),
}; };
let logs = vec![LogEntry { let logs = vec![LogEntry {
address: 5.into(), address: Address::from_low_u64_be(5),
topics: vec![], topics: vec![],
data: vec![], data: vec![],
}, LogEntry { }, LogEntry {
address: 15.into(), address: Address::from_low_u64_be(15),
topics: vec![], topics: vec![],
data: vec![], data: vec![],
}]; }];

View File

@ -204,7 +204,7 @@ impl<'a> EvmTestClient<'a> {
author: *genesis.author(), author: *genesis.author(),
timestamp: genesis.timestamp(), timestamp: genesis.timestamp(),
difficulty: *genesis.difficulty(), difficulty: *genesis.difficulty(),
last_hashes: Arc::new([H256::default(); 256].to_vec()), last_hashes: Arc::new([H256::zero(); 256].to_vec()),
gas_used: 0.into(), gas_used: 0.into(),
gas_limit: *genesis.gas_limit(), gas_limit: *genesis.gas_limit(),
}; };

View File

@ -16,6 +16,7 @@
//! Test client. //! Test client.
use std::str::FromStr;
use std::sync::atomic::{AtomicBool, AtomicUsize, Ordering as AtomicOrder}; use std::sync::atomic::{AtomicBool, AtomicUsize, Ordering as AtomicOrder};
use std::sync::Arc; use std::sync::Arc;
use std::collections::{HashMap, BTreeMap}; use std::collections::{HashMap, BTreeMap};
@ -167,9 +168,9 @@ impl TestBlockChainClient {
let mut client = TestBlockChainClient { let mut client = TestBlockChainClient {
blocks: RwLock::new(HashMap::new()), blocks: RwLock::new(HashMap::new()),
numbers: RwLock::new(HashMap::new()), numbers: RwLock::new(HashMap::new()),
genesis_hash: H256::new(), genesis_hash: H256::zero(),
extra_data: extra_data, extra_data: extra_data,
last_hash: RwLock::new(H256::new()), last_hash: RwLock::new(H256::zero()),
difficulty: RwLock::new(spec.genesis_header().difficulty().clone()), difficulty: RwLock::new(spec.genesis_header().difficulty().clone()),
balances: RwLock::new(HashMap::new()), balances: RwLock::new(HashMap::new()),
nonces: RwLock::new(HashMap::new()), nonces: RwLock::new(HashMap::new()),
@ -326,7 +327,7 @@ impl TestBlockChainClient {
pub fn corrupt_block_parent(&self, n: BlockNumber) { pub fn corrupt_block_parent(&self, n: BlockNumber) {
let hash = self.block_hash(BlockId::Number(n)).unwrap(); let hash = self.block_hash(BlockId::Number(n)).unwrap();
let mut header: Header = self.block_header(BlockId::Number(n)).unwrap().decode().expect("decoding failed"); let mut header: Header = self.block_header(BlockId::Number(n)).unwrap().decode().expect("decoding failed");
header.set_parent_hash(H256::from(42)); header.set_parent_hash(H256::from_low_u64_be(42));
let mut rlp = RlpStream::new_list(3); let mut rlp = RlpStream::new_list(3);
rlp.append(&header); rlp.append(&header);
rlp.append_raw(&::rlp::NULL_RLP, 1); rlp.append_raw(&::rlp::NULL_RLP, 1);
@ -432,7 +433,7 @@ impl ScheduleInfo for TestBlockChainClient {
impl ImportSealedBlock for TestBlockChainClient { impl ImportSealedBlock for TestBlockChainClient {
fn import_sealed_block(&self, _block: SealedBlock) -> EthcoreResult<H256> { fn import_sealed_block(&self, _block: SealedBlock) -> EthcoreResult<H256> {
Ok(H256::default()) Ok(H256::zero())
} }
} }
@ -661,7 +662,15 @@ impl BlockChainClient for TestBlockChainClient {
} }
fn replay_block_transactions(&self, _block: BlockId, _analytics: CallAnalytics) -> Result<Box<Iterator<Item = (H256, Executed)>>, CallError> { fn replay_block_transactions(&self, _block: BlockId, _analytics: CallAnalytics) -> Result<Box<Iterator<Item = (H256, Executed)>>, CallError> {
Ok(Box::new(self.traces.read().clone().unwrap().into_iter().map(|t| t.transaction_hash.unwrap_or(H256::new())).zip(self.execution_result.read().clone().unwrap().into_iter()))) Ok(Box::new(
self.traces
.read()
.clone()
.unwrap()
.into_iter()
.map(|t| t.transaction_hash.unwrap_or_default())
.zip(self.execution_result.read().clone().unwrap().into_iter())
))
} }
fn block_total_difficulty(&self, _id: BlockId) -> Option<U256> { fn block_total_difficulty(&self, _id: BlockId) -> Option<U256> {
@ -685,7 +694,8 @@ impl BlockChainClient for TestBlockChainClient {
fn storage_at(&self, address: &Address, position: &H256, state: StateOrBlock) -> Option<H256> { fn storage_at(&self, address: &Address, position: &H256, state: StateOrBlock) -> Option<H256> {
match state { match state {
StateOrBlock::Block(BlockId::Latest) => Some(self.storage.read().get(&(address.clone(), position.clone())).cloned().unwrap_or_else(H256::new)), StateOrBlock::Block(BlockId::Latest) =>
Some(self.storage.read().get(&(address.clone(), position.clone())).cloned().unwrap_or_default()),
_ => None, _ => None,
} }
} }
@ -773,7 +783,7 @@ impl BlockChainClient for TestBlockChainClient {
// works only if blocks are one after another 1 -> 2 -> 3 // works only if blocks are one after another 1 -> 2 -> 3
fn tree_route(&self, from: &H256, to: &H256) -> Option<TreeRoute> { fn tree_route(&self, from: &H256, to: &H256) -> Option<TreeRoute> {
Some(TreeRoute { Some(TreeRoute {
ancestor: H256::new(), ancestor: H256::zero(),
index: 0, index: 0,
blocks: { blocks: {
let numbers_read = self.numbers.read(); let numbers_read = self.numbers.read();
@ -808,7 +818,7 @@ impl BlockChainClient for TestBlockChainClient {
// TODO: returns just hashes instead of node state rlp(?) // TODO: returns just hashes instead of node state rlp(?)
fn state_data(&self, hash: &H256) -> Option<Bytes> { fn state_data(&self, hash: &H256) -> Option<Bytes> {
// starts with 'f' ? // starts with 'f' ?
if *hash > H256::from("f000000000000000000000000000000000000000000000000000000000000000") { if *hash > H256::from_str("f000000000000000000000000000000000000000000000000000000000000000").unwrap() {
let mut rlp = RlpStream::new(); let mut rlp = RlpStream::new();
rlp.append(&hash.clone()); rlp.append(&hash.clone());
return Some(rlp.out()); return Some(rlp.out());
@ -818,7 +828,7 @@ impl BlockChainClient for TestBlockChainClient {
fn block_receipts(&self, hash: &H256) -> Option<BlockReceipts> { fn block_receipts(&self, hash: &H256) -> Option<BlockReceipts> {
// starts with 'f' ? // starts with 'f' ?
if *hash > H256::from("f000000000000000000000000000000000000000000000000000000000000000") { if *hash > H256::from_str("f000000000000000000000000000000000000000000000000000000000000000").unwrap() {
let receipt = BlockReceipts::new(vec![Receipt::new( let receipt = BlockReceipts::new(vec![Receipt::new(
TransactionOutcome::StateRoot(H256::zero()), TransactionOutcome::StateRoot(H256::zero()),
U256::zero(), U256::zero(),

View File

@ -212,7 +212,7 @@ struct EpochManager {
impl EpochManager { impl EpochManager {
fn blank() -> Self { fn blank() -> Self {
EpochManager { EpochManager {
epoch_transition_hash: H256::default(), epoch_transition_hash: H256::zero(),
epoch_transition_number: 0, epoch_transition_number: 0,
finality_checker: RollingFinality::blank(Vec::new()), finality_checker: RollingFinality::blank(Vec::new()),
force: true, force: true,
@ -502,7 +502,7 @@ impl super::EpochVerifier<EthereumMachine> for EpochVerifier {
fn header_seal_hash(header: &Header, empty_steps_rlp: Option<&[u8]>) -> H256 { fn header_seal_hash(header: &Header, empty_steps_rlp: Option<&[u8]>) -> H256 {
match empty_steps_rlp { match empty_steps_rlp {
Some(empty_steps_rlp) => { Some(empty_steps_rlp) => {
let mut message = header.bare_hash().to_vec(); let mut message = header.bare_hash().as_bytes().to_vec();
message.extend_from_slice(empty_steps_rlp); message.extend_from_slice(empty_steps_rlp);
keccak(message) keccak(message)
}, },
@ -1170,7 +1170,7 @@ impl Engine<EthereumMachine> for AuthorityRound {
let mut fields = vec![ let mut fields = vec![
encode(&step), encode(&step),
encode(&(&H520::from(signature) as &[u8])), encode(&(H520::from(signature).as_bytes())),
]; ];
if let Some(empty_steps_rlp) = empty_steps_rlp { if let Some(empty_steps_rlp) = empty_steps_rlp {
@ -2138,7 +2138,7 @@ mod tests {
let signature = tap.sign(addr1, Some("1".into()), header.bare_hash()).unwrap(); let signature = tap.sign(addr1, Some("1".into()), header.bare_hash()).unwrap();
// empty step with invalid step // empty step with invalid step
let empty_steps = vec![SealedEmptyStep { signature: 0.into(), step: 2 }]; let empty_steps = vec![SealedEmptyStep { signature: H520::zero(), step: 2 }];
set_empty_steps_seal(&mut header, 2, &signature, &empty_steps); set_empty_steps_seal(&mut header, 2, &signature, &empty_steps);
assert_insufficient_proof( assert_insufficient_proof(
@ -2147,7 +2147,7 @@ mod tests {
); );
// empty step with invalid signature // empty step with invalid signature
let empty_steps = vec![SealedEmptyStep { signature: 0.into(), step: 1 }]; let empty_steps = vec![SealedEmptyStep { signature: H520::zero(), step: 1 }];
set_empty_steps_seal(&mut header, 2, &signature, &empty_steps); set_empty_steps_seal(&mut header, 2, &signature, &empty_steps);
assert_insufficient_proof( assert_insufficient_proof(
@ -2289,7 +2289,7 @@ mod tests {
p.maximum_empty_steps = 0; p.maximum_empty_steps = 0;
}); });
let parent_hash: H256 = 1.into(); let parent_hash = H256::from_low_u64_be(1);
let signature = H520::default(); let signature = H520::default();
let step = |step: u64| EmptyStep { let step = |step: u64| EmptyStep {
step, step,

View File

@ -113,7 +113,7 @@ impl Engine<EthereumMachine> for BasicAuthority {
if self.validators.contains(header.parent_hash(), author) { if self.validators.contains(header.parent_hash(), author) {
// account should be pernamently unlocked, otherwise sealing will fail // account should be pernamently unlocked, otherwise sealing will fail
if let Ok(signature) = self.sign(header.bare_hash()) { if let Ok(signature) = self.sign(header.bare_hash()) {
return Seal::Regular(vec![::rlp::encode(&(&H520::from(signature) as &[u8]))]); return Seal::Regular(vec![::rlp::encode(&(H520::from(signature).as_bytes()))]);
} else { } else {
trace!(target: "basicauthority", "generate_seal: FAIL: accounts secret key unavailable"); trace!(target: "basicauthority", "generate_seal: FAIL: accounts secret key unavailable");
} }

View File

@ -177,8 +177,9 @@ pub fn apply_block_rewards<M: Machine>(
#[cfg(test)] #[cfg(test)]
mod test { mod test {
use std::str::FromStr;
use client::PrepareOpenBlock; use client::PrepareOpenBlock;
use ethereum_types::U256; use ethereum_types::{U256, Address};
use spec::Spec; use spec::Spec;
use test_helpers::generate_dummy_client_with_spec; use test_helpers::generate_dummy_client_with_spec;
@ -193,12 +194,12 @@ mod test {
// the spec has a block reward contract defined at the given address // the spec has a block reward contract defined at the given address
let block_reward_contract = BlockRewardContract::new_from_address( let block_reward_contract = BlockRewardContract::new_from_address(
"0000000000000000000000000000000000000042".into(), Address::from_str("0000000000000000000000000000000000000042").unwrap(),
); );
let mut call = |to, data| { let mut call = |to, data| {
let mut block = client.prepare_open_block( let mut block = client.prepare_open_block(
"0000000000000000000000000000000000000001".into(), Address::from_str("0000000000000000000000000000000000000001").unwrap(),
(3141562.into(), 31415620.into()), (3141562.into(), 31415620.into()),
vec![], vec![],
).unwrap(); ).unwrap();
@ -223,16 +224,16 @@ mod test {
// the contract rewards (1000 + kind) for each benefactor // the contract rewards (1000 + kind) for each benefactor
let beneficiaries = vec![ let beneficiaries = vec![
("0000000000000000000000000000000000000033".into(), RewardKind::Author), (Address::from_str("0000000000000000000000000000000000000033").unwrap(), RewardKind::Author),
("0000000000000000000000000000000000000034".into(), RewardKind::Uncle(1)), (Address::from_str("0000000000000000000000000000000000000034").unwrap(), RewardKind::Uncle(1)),
("0000000000000000000000000000000000000035".into(), RewardKind::EmptyStep), (Address::from_str("0000000000000000000000000000000000000035").unwrap(), RewardKind::EmptyStep),
]; ];
let rewards = block_reward_contract.reward(&beneficiaries, &mut call).unwrap(); let rewards = block_reward_contract.reward(&beneficiaries, &mut call).unwrap();
let expected = vec![ let expected = vec![
("0000000000000000000000000000000000000033".into(), U256::from(1000)), (Address::from_str("0000000000000000000000000000000000000033").unwrap(), U256::from(1000)),
("0000000000000000000000000000000000000034".into(), U256::from(1000 + 101)), (Address::from_str("0000000000000000000000000000000000000034").unwrap(), U256::from(1000 + 101)),
("0000000000000000000000000000000000000035".into(), U256::from(1000 + 2)), (Address::from_str("0000000000000000000000000000000000000035").unwrap(), U256::from(1000 + 2)),
]; ];
assert_eq!(expected, rewards); assert_eq!(expected, rewards);

View File

@ -194,7 +194,7 @@ impl CliqueBlockState {
Err(BlockError::InvalidSealArity(Mismatch { expected: 2, found: decoded_seal.len() }))? Err(BlockError::InvalidSealArity(Mismatch { expected: 2, found: decoded_seal.len() }))?
} }
let nonce: H64 = decoded_seal[1].into(); let nonce = H64::from_slice(decoded_seal[1]);
self.update_signers_on_vote(VoteType::from_nonce(nonce)?, creator, *header.author(), header.number())?; self.update_signers_on_vote(VoteType::from_nonce(nonce)?, creator, *header.author(), header.number())?;
} }

View File

@ -570,7 +570,7 @@ impl Engine<EthereumMachine> for Clique {
if is_checkpoint && *header.author() != NULL_AUTHOR { if is_checkpoint && *header.author() != NULL_AUTHOR {
return Err(EngineError::CliqueWrongAuthorCheckpoint(Mismatch { return Err(EngineError::CliqueWrongAuthorCheckpoint(Mismatch {
expected: 0.into(), expected: H160::zero(),
found: *header.author(), found: *header.author(),
}))?; }))?;
} }
@ -583,8 +583,8 @@ impl Engine<EthereumMachine> for Clique {
}))? }))?
} }
let mixhash: H256 = seal_fields[0].into(); let mixhash = H256::from_slice(seal_fields[0]);
let nonce: H64 = seal_fields[1].into(); let nonce = H64::from_slice(seal_fields[1]);
// Nonce must be 0x00..0 or 0xff..f // Nonce must be 0x00..0 or 0xff..f
if nonce != NONCE_DROP_VOTE && nonce != NONCE_AUTH_VOTE { if nonce != NONCE_DROP_VOTE && nonce != NONCE_AUTH_VOTE {

View File

@ -70,10 +70,10 @@ impl CliqueTester {
let mut extra_data = vec![0; VANITY_LENGTH]; let mut extra_data = vec![0; VANITY_LENGTH];
for &signer in SIGNER_TAGS.iter() { for &signer in SIGNER_TAGS.iter() {
let secret = Secret::from(H256::from(signer as u64)); let secret = Secret::from(H256::from_low_u64_be(signer as u64));
let keypair = KeyPair::from_secret(secret).unwrap(); let keypair = KeyPair::from_secret(secret).unwrap();
if initial_signers.contains(&signer) { if initial_signers.contains(&signer) {
extra_data.extend(&*keypair.address()); extra_data.extend(keypair.address().as_bytes());
} }
signers.insert(signer, keypair); signers.insert(signer, keypair);
} }
@ -151,7 +151,7 @@ impl CliqueTester {
CliqueBlockType::Checkpoint => { CliqueBlockType::Checkpoint => {
let signers = self.clique.state(&last_header).unwrap().signers().clone(); let signers = self.clique.state(&last_header).unwrap().signers().clone();
for signer in signers { for signer in signers {
extra_data.extend(&*signer); extra_data.extend(signer.as_bytes());
} }
} }
CliqueBlockType::Vote(v) => seal = v.as_rlp(), CliqueBlockType::Vote(v) => seal = v.as_rlp(),

View File

@ -102,7 +102,7 @@ pub fn extract_signers(header: &Header) -> Result<BTreeSet<Address>, Error> {
.map(|i| { .map(|i| {
let start = i * ADDRESS_LENGTH; let start = i * ADDRESS_LENGTH;
let end = start + ADDRESS_LENGTH; let end = start + ADDRESS_LENGTH;
signers_raw[start..end].into() Address::from_slice(&signers_raw[start..end])
}) })
.collect(); .collect();
@ -111,5 +111,5 @@ pub fn extract_signers(header: &Header) -> Result<BTreeSet<Address>, Error> {
/// Retrieve `null_seal` /// Retrieve `null_seal`
pub fn null_seal() -> Vec<Vec<u8>> { pub fn null_seal() -> Vec<Vec<u8>> {
vec![encode(&NULL_MIXHASH.to_vec()), encode(&NULL_NONCE.to_vec())] vec![encode(&NULL_MIXHASH.as_bytes().to_vec()), encode(&NULL_NONCE.as_bytes().to_vec())]
} }

View File

@ -108,7 +108,7 @@ mod tests {
let db = spec.ensure_db_good(get_temp_state_db(), &Default::default()).unwrap(); let db = spec.ensure_db_good(get_temp_state_db(), &Default::default()).unwrap();
let genesis_header = spec.genesis_header(); let genesis_header = spec.genesis_header();
let last_hashes = Arc::new(vec![genesis_header.hash()]); let last_hashes = Arc::new(vec![genesis_header.hash()]);
let b = OpenBlock::new(engine, Default::default(), false, db, &genesis_header, last_hashes, Address::default(), (3141562.into(), 31415620.into()), vec![], false, None).unwrap(); let b = OpenBlock::new(engine, Default::default(), false, db, &genesis_header, last_hashes, Address::zero(), (3141562.into(), 31415620.into()), vec![], false, None).unwrap();
let b = b.close_and_lock().unwrap(); let b = b.close_and_lock().unwrap();
if let Seal::Regular(seal) = engine.generate_seal(&b, &genesis_header) { if let Seal::Regular(seal) = engine.generate_seal(&b, &genesis_header) {
assert!(b.try_seal(engine, seal).is_ok()); assert!(b.try_seal(engine, seal).is_ok());

View File

@ -175,7 +175,7 @@ mod tests {
// Check a block that is a bit in future, reject it but don't report the validator. // Check a block that is a bit in future, reject it but don't report the validator.
let mut header = Header::default(); let mut header = Header::default();
let seal = vec![encode(&4u8), encode(&(&H520::default() as &[u8]))]; let seal = vec![encode(&4u8), encode(&H520::zero().as_bytes())];
header.set_seal(seal); header.set_seal(seal);
header.set_author(v1); header.set_author(v1);
header.set_number(2); header.set_number(2);
@ -186,7 +186,7 @@ mod tests {
// Now create one that is more in future. That one should be rejected and validator should be reported. // Now create one that is more in future. That one should be rejected and validator should be reported.
let mut header = Header::default(); let mut header = Header::default();
let seal = vec![encode(&8u8), encode(&(&H520::default() as &[u8]))]; let seal = vec![encode(&8u8), encode(&H520::zero().as_bytes())];
header.set_seal(seal); header.set_seal(seal);
header.set_author(v1); header.set_author(v1);
header.set_number(2); header.set_number(2);

View File

@ -106,7 +106,7 @@ fn check_first_proof(machine: &EthereumMachine, contract_address: Address, old_h
timestamp: old_header.timestamp(), timestamp: old_header.timestamp(),
last_hashes: { last_hashes: {
// this will break if we don't inclue all 256 last hashes. // this will break if we don't inclue all 256 last hashes.
let mut last_hashes: Vec<_> = (0..256).map(|_| H256::default()).collect(); let mut last_hashes: Vec<_> = (0..256).map(|_| H256::zero()).collect();
last_hashes[255] = *old_header.parent_hash(); last_hashes[255] = *old_header.parent_hash();
Arc::new(last_hashes) Arc::new(last_hashes)
}, },
@ -117,7 +117,7 @@ fn check_first_proof(machine: &EthereumMachine, contract_address: Address, old_h
let number = old_header.number(); let number = old_header.number();
let (data, decoder) = validator_set::functions::get_validators::call(); let (data, decoder) = validator_set::functions::get_validators::call();
let from = Address::default(); let from = Address::zero();
let tx = Transaction { let tx = Transaction {
nonce: machine.account_start_nonce(number), nonce: machine.account_start_nonce(number),
action: Action::Call(contract_address), action: Action::Call(contract_address),
@ -516,7 +516,7 @@ mod tests {
nonce: 2.into(), nonce: 2.into(),
gas_price: 0.into(), gas_price: 0.into(),
gas: 21000.into(), gas: 21000.into(),
action: Action::Call(Address::default()), action: Action::Call(Address::zero()),
value: 0.into(), value: 0.into(),
data: Vec::new(), data: Vec::new(),
}.sign(&s0, Some(chain_id)); }.sign(&s0, Some(chain_id));

View File

@ -324,7 +324,7 @@ impl Engine<EthereumMachine> for Arc<Ethash> {
let difficulty = ethash::boundary_to_difficulty(&H256(quick_get_difficulty( let difficulty = ethash::boundary_to_difficulty(&H256(quick_get_difficulty(
&header.bare_hash().0, &header.bare_hash().0,
seal.nonce.low_u64(), seal.nonce.to_low_u64_be(),
&seal.mix_hash.0, &seal.mix_hash.0,
header.number() >= self.ethash_params.progpow_transition header.number() >= self.ethash_params.progpow_transition
))); )));
@ -339,14 +339,14 @@ impl Engine<EthereumMachine> for Arc<Ethash> {
fn verify_block_unordered(&self, header: &Header) -> Result<(), Error> { fn verify_block_unordered(&self, header: &Header) -> Result<(), Error> {
let seal = Seal::parse_seal(header.seal())?; let seal = Seal::parse_seal(header.seal())?;
let result = self.pow.compute_light(header.number() as u64, &header.bare_hash().0, seal.nonce.low_u64()); let result = self.pow.compute_light(header.number() as u64, &header.bare_hash().0, seal.nonce.to_low_u64_be());
let mix = H256(result.mix_hash); let mix = H256(result.mix_hash);
let difficulty = ethash::boundary_to_difficulty(&H256(result.value)); let difficulty = ethash::boundary_to_difficulty(&H256(result.value));
trace!(target: "miner", "num: {num}, seed: {seed}, h: {h}, non: {non}, mix: {mix}, res: {res}", trace!(target: "miner", "num: {num}, seed: {seed}, h: {h}, non: {non}, mix: {mix}, res: {res}",
num = header.number() as u64, num = header.number() as u64,
seed = H256(slow_hash_block_number(header.number() as u64)), seed = H256(slow_hash_block_number(header.number() as u64)),
h = header.bare_hash(), h = header.bare_hash(),
non = seal.nonce.low_u64(), non = seal.nonce.to_low_u64_be(),
mix = H256(result.mix_hash), mix = H256(result.mix_hash),
res = H256(result.value)); res = H256(result.value));
if mix != seal.mix_hash { if mix != seal.mix_hash {
@ -591,7 +591,7 @@ mod tests {
let last_hashes = Arc::new(vec![genesis_header.hash()]); let last_hashes = Arc::new(vec![genesis_header.hash()]);
let mut b = OpenBlock::new(engine, Default::default(), false, db, &genesis_header, last_hashes, Address::zero(), (3141562.into(), 31415620.into()), vec![], false, None).unwrap(); let mut b = OpenBlock::new(engine, Default::default(), false, db, &genesis_header, last_hashes, Address::zero(), (3141562.into(), 31415620.into()), vec![], false, None).unwrap();
let mut uncle = Header::new(); let mut uncle = Header::new();
let uncle_author: Address = "ef2d6d194084c2de36e0dabfce45d046b37d1106".into(); let uncle_author = Address::from_str("ef2d6d194084c2de36e0dabfce45d046b37d1106").unwrap();
uncle.set_author(uncle_author); uncle.set_author(uncle_author);
b.push_uncle(uncle).unwrap(); b.push_uncle(uncle).unwrap();
@ -610,8 +610,8 @@ mod tests {
let b = OpenBlock::new(engine, Default::default(), false, db, &genesis_header, last_hashes, Address::zero(), (3141562.into(), 31415620.into()), vec![], false, None).unwrap(); let b = OpenBlock::new(engine, Default::default(), false, db, &genesis_header, last_hashes, Address::zero(), (3141562.into(), 31415620.into()), vec![], false, None).unwrap();
let b = b.close().unwrap(); let b = b.close().unwrap();
let ubi_contract: Address = "00efdd5883ec628983e9063c7d969fe268bbf310".into(); let ubi_contract = Address::from_str("00efdd5883ec628983e9063c7d969fe268bbf310").unwrap();
let dev_contract: Address = "00756cf8159095948496617f5fb17ed95059f536".into(); let dev_contract = Address::from_str("00756cf8159095948496617f5fb17ed95059f536").unwrap();
assert_eq!(b.state.balance(&Address::zero()).unwrap(), U256::from_str("d8d726b7177a80000").unwrap()); assert_eq!(b.state.balance(&Address::zero()).unwrap(), U256::from_str("d8d726b7177a80000").unwrap());
assert_eq!(b.state.balance(&ubi_contract).unwrap(), U256::from_str("2b5e3af16b1880000").unwrap()); assert_eq!(b.state.balance(&ubi_contract).unwrap(), U256::from_str("2b5e3af16b1880000").unwrap());
assert_eq!(b.state.balance(&dev_contract).unwrap(), U256::from_str("c249fdd327780000").unwrap()); assert_eq!(b.state.balance(&dev_contract).unwrap(), U256::from_str("c249fdd327780000").unwrap());
@ -721,7 +721,7 @@ mod tests {
fn can_do_proof_of_work_unordered_verification_fail() { fn can_do_proof_of_work_unordered_verification_fail() {
let engine = test_spec().engine; let engine = test_spec().engine;
let mut header: Header = Header::default(); let mut header: Header = Header::default();
header.set_seal(vec![rlp::encode(&H256::from("b251bd2e0283d0658f2cadfdc8ca619b5de94eca5742725e2e757dd13ed7503d")), rlp::encode(&H64::zero())]); header.set_seal(vec![rlp::encode(&H256::from_str("b251bd2e0283d0658f2cadfdc8ca619b5de94eca5742725e2e757dd13ed7503d").unwrap()), rlp::encode(&H64::zero())]);
header.set_difficulty(U256::from_str("ffffffffffffffffffffffffffffffffffffffffffffaaaaaaaaaaaaaaaaaaaa").unwrap()); header.set_difficulty(U256::from_str("ffffffffffffffffffffffffffffffffffffffffffffaaaaaaaaaaaaaaaaaaaa").unwrap());
let verify_result = engine.verify_block_unordered(&header); let verify_result = engine.verify_block_unordered(&header);
@ -914,7 +914,7 @@ mod tests {
let tempdir = TempDir::new("").unwrap(); let tempdir = TempDir::new("").unwrap();
let ethash = Ethash::new(tempdir.path(), ethparams, machine, None); let ethash = Ethash::new(tempdir.path(), ethparams, machine, None);
let mut header = Header::default(); let mut header = Header::default();
header.set_seal(vec![rlp::encode(&H256::from("b251bd2e0283d0658f2cadfdc8ca619b5de94eca5742725e2e757dd13ed7503d")), rlp::encode(&H64::zero())]); header.set_seal(vec![rlp::encode(&H256::from_str("b251bd2e0283d0658f2cadfdc8ca619b5de94eca5742725e2e757dd13ed7503d").unwrap()), rlp::encode(&H64::zero())]);
let info = ethash.extra_info(&header); let info = ethash.extra_info(&header);
assert_eq!(info["nonce"], "0x0000000000000000"); assert_eq!(info["nonce"], "0x0000000000000000");
assert_eq!(info["mixHash"], "0xb251bd2e0283d0658f2cadfdc8ca619b5de94eca5742725e2e757dd13ed7503d"); assert_eq!(info["mixHash"], "0xb251bd2e0283d0658f2cadfdc8ca619b5de94eca5742725e2e757dd13ed7503d");

View File

@ -187,7 +187,8 @@ pub fn new_kovan_wasm_test_machine() -> EthereumMachine { load_machine(include_b
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
use ethereum_types::U256; use std::str::FromStr;
use ethereum_types::{U256, H256, Address};
use state::*; use state::*;
use super::*; use super::*;
use test_helpers::get_temp_state_db; use test_helpers::get_temp_state_db;
@ -201,21 +202,21 @@ mod tests {
let genesis_header = spec.genesis_header(); let genesis_header = spec.genesis_header();
let db = spec.ensure_db_good(get_temp_state_db(), &Default::default()).unwrap(); let db = spec.ensure_db_good(get_temp_state_db(), &Default::default()).unwrap();
let s = State::from_existing(db, genesis_header.state_root().clone(), engine.account_start_nonce(0), Default::default()).unwrap(); let s = State::from_existing(db, genesis_header.state_root().clone(), engine.account_start_nonce(0), Default::default()).unwrap();
assert_eq!(s.balance(&"0000000000000000000000000000000000000001".into()).unwrap(), 1u64.into()); assert_eq!(s.balance(&Address::from_str("0000000000000000000000000000000000000001").unwrap()).unwrap(), 1u64.into());
assert_eq!(s.balance(&"0000000000000000000000000000000000000002".into()).unwrap(), 1u64.into()); assert_eq!(s.balance(&Address::from_str("0000000000000000000000000000000000000002").unwrap()).unwrap(), 1u64.into());
assert_eq!(s.balance(&"0000000000000000000000000000000000000003".into()).unwrap(), 1u64.into()); assert_eq!(s.balance(&Address::from_str("0000000000000000000000000000000000000003").unwrap()).unwrap(), 1u64.into());
assert_eq!(s.balance(&"0000000000000000000000000000000000000004".into()).unwrap(), 1u64.into()); assert_eq!(s.balance(&Address::from_str("0000000000000000000000000000000000000004").unwrap()).unwrap(), 1u64.into());
assert_eq!(s.balance(&"102e61f5d8f9bc71d0ad4a084df4e65e05ce0e1c".into()).unwrap(), U256::from(1u64) << 200); assert_eq!(s.balance(&Address::from_str("102e61f5d8f9bc71d0ad4a084df4e65e05ce0e1c").unwrap()).unwrap(), U256::from(1u64) << 200);
assert_eq!(s.balance(&"0000000000000000000000000000000000000000".into()).unwrap(), 0u64.into()); assert_eq!(s.balance(&Address::from_str("0000000000000000000000000000000000000000").unwrap()).unwrap(), 0u64.into());
} }
#[test] #[test]
fn morden() { fn morden() {
let morden = new_morden(&::std::env::temp_dir()); let morden = new_morden(&::std::env::temp_dir());
assert_eq!(morden.state_root(), "f3f4696bbf3b3b07775128eb7a3763279a394e382130f27c21e70233e04946a9".into()); assert_eq!(morden.state_root(), H256::from_str("f3f4696bbf3b3b07775128eb7a3763279a394e382130f27c21e70233e04946a9").unwrap());
let genesis = morden.genesis_block(); let genesis = morden.genesis_block();
assert_eq!(view!(BlockView, &genesis).header_view().hash(), "0cd786a2425d16f152c658316c423e6ce1181e15c3295826d7c9904cba9ce303".into()); assert_eq!(view!(BlockView, &genesis).header_view().hash(), H256::from_str("0cd786a2425d16f152c658316c423e6ce1181e15c3295826d7c9904cba9ce303").unwrap());
let _ = morden.engine; let _ = morden.engine;
} }
@ -224,9 +225,9 @@ mod tests {
fn frontier() { fn frontier() {
let frontier = new_foundation(&::std::env::temp_dir()); let frontier = new_foundation(&::std::env::temp_dir());
assert_eq!(frontier.state_root(), "d7f8974fb5ac78d9ac099b9ad5018bedc2ce0a72dad1827a1709da30580f0544".into()); assert_eq!(frontier.state_root(), H256::from_str("d7f8974fb5ac78d9ac099b9ad5018bedc2ce0a72dad1827a1709da30580f0544").unwrap());
let genesis = frontier.genesis_block(); let genesis = frontier.genesis_block();
assert_eq!(view!(BlockView, &genesis).header_view().hash(), "d4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3".into()); assert_eq!(view!(BlockView, &genesis).header_view().hash(), H256::from_str("d4e56740f876aef8c010b86a40d5f56745a118d0906a34e69aec8c0db1cb8fa3").unwrap());
let _ = frontier.engine; let _ = frontier.engine;
} }

View File

@ -16,6 +16,7 @@
//! Transaction Execution environment. //! Transaction Execution environment.
use std::cmp; use std::cmp;
use std::convert::TryFrom;
use std::sync::Arc; use std::sync::Arc;
use hash::keccak; use hash::keccak;
use ethereum_types::{H256, U256, U512, Address}; use ethereum_types::{H256, U256, U512, Address};
@ -858,7 +859,7 @@ impl<'a, B: 'a + StateBackend> Executive<'a, B> {
if !schedule.keep_unsigned_nonce || !t.is_unsigned() { if !schedule.keep_unsigned_nonce || !t.is_unsigned() {
self.state.inc_nonce(&sender)?; self.state.inc_nonce(&sender)?;
} }
self.state.sub_balance(&sender, &U256::from(gas_cost), &mut substate.to_cleanup_mode(&schedule))?; self.state.sub_balance(&sender, &U256::try_from(gas_cost).expect("Total cost (value + gas_cost) is lower than max allowed balance (U256); gas_cost has to fit U256; qed"), &mut substate.to_cleanup_mode(&schedule))?;
let (result, output) = match t.action { let (result, output) = match t.action {
Action::Create => { Action::Create => {
@ -1174,7 +1175,7 @@ mod tests {
use rustc_hex::FromHex; use rustc_hex::FromHex;
use ethkey::{Generator, Random}; use ethkey::{Generator, Random};
use super::*; use super::*;
use ethereum_types::{H256, U256, U512, Address}; use ethereum_types::{H256, U256, U512, Address, BigEndianHash};
use vm::{ActionParams, ActionValue, CallType, EnvInfo, CreateContractAddress}; use vm::{ActionParams, ActionValue, CallType, EnvInfo, CreateContractAddress};
use evm::{Factory, VMType}; use evm::{Factory, VMType};
use error::ExecutionError; use error::ExecutionError;
@ -1229,7 +1230,7 @@ mod tests {
}; };
assert_eq!(gas_left, U256::from(79_975)); assert_eq!(gas_left, U256::from(79_975));
assert_eq!(state.storage_at(&address, &H256::new()).unwrap(), H256::from(&U256::from(0xf9u64))); assert_eq!(state.storage_at(&address, &H256::zero()).unwrap(), BigEndianHash::from_uint(&U256::from(0xf9u64)));
assert_eq!(state.balance(&sender).unwrap(), U256::from(0xf9)); assert_eq!(state.balance(&sender).unwrap(), U256::from(0xf9));
assert_eq!(state.balance(&address).unwrap(), U256::from(0x7)); assert_eq!(state.balance(&address).unwrap(), U256::from(0x7));
assert_eq!(substate.contracts_created.len(), 0); assert_eq!(substate.contracts_created.len(), 0);
@ -1331,8 +1332,8 @@ mod tests {
assert_eq!(tracer.drain(), vec![FlatTrace { assert_eq!(tracer.drain(), vec![FlatTrace {
action: trace::Action::Call(trace::Call { action: trace::Action::Call(trace::Call {
from: "4444444444444444444444444444444444444444".into(), from: Address::from_str("4444444444444444444444444444444444444444").unwrap(),
to: "5555555555555555555555555555555555555555".into(), to: Address::from_str("5555555555555555555555555555555555555555").unwrap(),
value: 100.into(), value: 100.into(),
gas: 100_000.into(), gas: 100_000.into(),
input: vec![], input: vec![],
@ -1346,8 +1347,8 @@ mod tests {
trace_address: Default::default() trace_address: Default::default()
}, FlatTrace { }, FlatTrace {
action: trace::Action::Call(trace::Call { action: trace::Action::Call(trace::Call {
from: "5555555555555555555555555555555555555555".into(), from: Address::from_str("5555555555555555555555555555555555555555").unwrap(),
to: "0000000000000000000000000000000000000003".into(), to: Address::from_str("0000000000000000000000000000000000000003").unwrap(),
value: 1.into(), value: 1.into(),
gas: 66560.into(), gas: 66560.into(),
input: vec![], input: vec![],
@ -1421,8 +1422,8 @@ mod tests {
trace_address: Default::default(), trace_address: Default::default(),
subtraces: 1, subtraces: 1,
action: trace::Action::Call(trace::Call { action: trace::Action::Call(trace::Call {
from: "cd1722f3947def4cf144679da39c4c32bdc35681".into(), from: Address::from_str("cd1722f3947def4cf144679da39c4c32bdc35681").unwrap(),
to: "b010143a42d5980c7e5ef0e4a4416dc098a4fed3".into(), to: Address::from_str("b010143a42d5980c7e5ef0e4a4416dc098a4fed3").unwrap(),
value: 100.into(), value: 100.into(),
gas: 100000.into(), gas: 100000.into(),
input: vec![], input: vec![],
@ -1436,7 +1437,7 @@ mod tests {
trace_address: vec![0].into_iter().collect(), trace_address: vec![0].into_iter().collect(),
subtraces: 0, subtraces: 0,
action: trace::Action::Create(trace::Create { action: trace::Action::Create(trace::Create {
from: "b010143a42d5980c7e5ef0e4a4416dc098a4fed3".into(), from: Address::from_str("b010143a42d5980c7e5ef0e4a4416dc098a4fed3").unwrap(),
value: 23.into(), value: 23.into(),
gas: 67979.into(), gas: 67979.into(),
init: vec![96, 16, 128, 96, 12, 96, 0, 57, 96, 0, 243, 0, 96, 0, 53, 84, 21, 96, 9, 87, 0, 91, 96, 32, 53, 96, 0, 53, 85] init: vec![96, 16, 128, 96, 12, 96, 0, 57, 96, 0, 243, 0, 96, 0, 53, 84, 21, 96, 9, 87, 0, 91, 96, 32, 53, 96, 0, 53, 85]
@ -1537,8 +1538,8 @@ mod tests {
trace_address: Default::default(), trace_address: Default::default(),
subtraces: 1, subtraces: 1,
action: trace::Action::Call(trace::Call { action: trace::Action::Call(trace::Call {
from: "cd1722f3947def4cf144679da39c4c32bdc35681".into(), from: Address::from_str("cd1722f3947def4cf144679da39c4c32bdc35681").unwrap(),
to: "b010143a42d5980c7e5ef0e4a4416dc098a4fed3".into(), to: Address::from_str("b010143a42d5980c7e5ef0e4a4416dc098a4fed3").unwrap(),
value: 100.into(), value: 100.into(),
gas: 100_000.into(), gas: 100_000.into(),
input: vec![], input: vec![],
@ -1552,7 +1553,7 @@ mod tests {
trace_address: vec![0].into_iter().collect(), trace_address: vec![0].into_iter().collect(),
subtraces: 0, subtraces: 0,
action: trace::Action::Create(trace::Create { action: trace::Action::Create(trace::Create {
from: "b010143a42d5980c7e5ef0e4a4416dc098a4fed3".into(), from: Address::from_str("b010143a42d5980c7e5ef0e4a4416dc098a4fed3").unwrap(),
value: 23.into(), value: 23.into(),
gas: 66_917.into(), gas: 66_917.into(),
init: vec![0x60, 0x01, 0x60, 0x00, 0xfd] init: vec![0x60, 0x01, 0x60, 0x00, 0xfd]
@ -1803,7 +1804,13 @@ mod tests {
}; };
assert_eq!(gas_left, U256::from(73_237)); assert_eq!(gas_left, U256::from(73_237));
assert_eq!(state.storage_at(&address_a, &H256::from(&U256::from(0x23))).unwrap(), H256::from(&U256::from(1))); assert_eq!(
state.storage_at(
&address_a,
&BigEndianHash::from_uint(&U256::from(0x23)),
).unwrap(),
BigEndianHash::from_uint(&U256::from(1)),
);
} }
// test is incorrect, mk // test is incorrect, mk
@ -1848,8 +1855,8 @@ mod tests {
}; };
assert_eq!(gas_left, U256::from(59_870)); assert_eq!(gas_left, U256::from(59_870));
assert_eq!(state.storage_at(&address, &H256::from(&U256::zero())).unwrap(), H256::from(&U256::from(1))); assert_eq!(state.storage_at(&address, &BigEndianHash::from_uint(&U256::zero())).unwrap(), BigEndianHash::from_uint(&U256::from(1)));
assert_eq!(state.storage_at(&address, &H256::from(&U256::one())).unwrap(), H256::from(&U256::from(1))); assert_eq!(state.storage_at(&address, &BigEndianHash::from_uint(&U256::one())).unwrap(), BigEndianHash::from_uint(&U256::from(1)));
} }
// test is incorrect, mk // test is incorrect, mk
@ -1890,7 +1897,7 @@ mod tests {
assert_eq!(state.balance(&sender).unwrap(), U256::from(1)); assert_eq!(state.balance(&sender).unwrap(), U256::from(1));
assert_eq!(state.balance(&contract).unwrap(), U256::from(17)); assert_eq!(state.balance(&contract).unwrap(), U256::from(17));
assert_eq!(state.nonce(&sender).unwrap(), U256::from(1)); assert_eq!(state.nonce(&sender).unwrap(), U256::from(1));
assert_eq!(state.storage_at(&contract, &H256::new()).unwrap(), H256::from(&U256::from(1))); assert_eq!(state.storage_at(&contract, &H256::zero()).unwrap(), BigEndianHash::from_uint(&U256::from(1)));
} }
evm_test!{test_transact_invalid_nonce: test_transact_invalid_nonce_int} evm_test!{test_transact_invalid_nonce: test_transact_invalid_nonce_int}
@ -2059,17 +2066,17 @@ mod tests {
assert_eq!(result, U256::from(1)); assert_eq!(result, U256::from(1));
assert_eq!(output[..], returns[..]); assert_eq!(output[..], returns[..]);
assert_eq!(state.storage_at(&contract_address, &H256::from(&U256::zero())).unwrap(), H256::from(&U256::from(0))); assert_eq!(state.storage_at(&contract_address, &H256::zero()).unwrap(), H256::zero());
} }
evm_test!{test_eip1283: test_eip1283_int} evm_test!{test_eip1283: test_eip1283_int}
fn test_eip1283(factory: Factory) { fn test_eip1283(factory: Factory) {
let x1 = Address::from(0x1000); let x1 = Address::from_low_u64_be(0x1000);
let x2 = Address::from(0x1001); let x2 = Address::from_low_u64_be(0x1001);
let y1 = Address::from(0x2001); let y1 = Address::from_low_u64_be(0x2001);
let y2 = Address::from(0x2002); let y2 = Address::from_low_u64_be(0x2002);
let operating_address = Address::from(0); let operating_address = Address::zero();
let k = H256::new(); let k = H256::zero();
let mut state = get_temp_state_with_factory(factory.clone()); let mut state = get_temp_state_with_factory(factory.clone());
state.new_contract(&x1, U256::zero(), U256::from(1)).unwrap(); state.new_contract(&x1, U256::zero(), U256::from(1)).unwrap();
@ -2085,7 +2092,7 @@ mod tests {
let machine = ::ethereum::new_constantinople_test_machine(); let machine = ::ethereum::new_constantinople_test_machine();
let schedule = machine.schedule(info.number); let schedule = machine.schedule(info.number);
assert_eq!(state.storage_at(&operating_address, &k).unwrap(), H256::from(U256::from(0))); assert_eq!(state.storage_at(&operating_address, &k).unwrap(), BigEndianHash::from_uint(&U256::from(0)));
// Test a call via top-level -> y1 -> x1 // Test a call via top-level -> y1 -> x1
let (FinalizationResult { gas_left, .. }, refund, gas) = { let (FinalizationResult { gas_left, .. }, refund, gas) = {
let gas = U256::from(0xffffffffffu64); let gas = U256::from(0xffffffffffu64);
@ -2103,7 +2110,7 @@ mod tests {
assert_eq!(gas_used, U256::from(41860)); assert_eq!(gas_used, U256::from(41860));
assert_eq!(refund, 19800); assert_eq!(refund, 19800);
assert_eq!(state.storage_at(&operating_address, &k).unwrap(), H256::from(U256::from(1))); assert_eq!(state.storage_at(&operating_address, &k).unwrap(), BigEndianHash::from_uint(&U256::from(1)));
// Test a call via top-level -> y2 -> x2 // Test a call via top-level -> y2 -> x2
let (FinalizationResult { gas_left, .. }, refund, gas) = { let (FinalizationResult { gas_left, .. }, refund, gas) = {
let gas = U256::from(0xffffffffffu64); let gas = U256::from(0xffffffffffu64);

View File

@ -17,7 +17,7 @@
//! Transaction Execution environment. //! Transaction Execution environment.
use std::cmp; use std::cmp;
use std::sync::Arc; use std::sync::Arc;
use ethereum_types::{H256, U256, Address}; use ethereum_types::{H256, U256, Address, BigEndianHash};
use bytes::Bytes; use bytes::Bytes;
use state::{Backend as StateBackend, State, Substate, CleanupMode}; use state::{Backend as StateBackend, State, Substate, CleanupMode};
use machine::EthereumMachine as Machine; use machine::EthereumMachine as Machine;
@ -166,6 +166,7 @@ impl<'a, T: 'a, V: 'a, B: 'a> Ext for Externalities<'a, T, V, B>
Ok((code, hash)) => (code, hash), Ok((code, hash)) => (code, hash),
Err(_) => return H256::zero(), Err(_) => return H256::zero(),
}; };
let data: H256 = BigEndianHash::from_uint(number);
let params = ActionParams { let params = ActionParams {
sender: self.origin_info.address.clone(), sender: self.origin_info.address.clone(),
@ -177,7 +178,7 @@ impl<'a, T: 'a, V: 'a, B: 'a> Ext for Externalities<'a, T, V, B>
gas_price: 0.into(), gas_price: 0.into(),
code: code, code: code,
code_hash: code_hash, code_hash: code_hash,
data: Some(H256::from(number).to_vec()), data: Some(data.as_bytes().to_vec()),
call_type: CallType::Call, call_type: CallType::Call,
params_type: vm::ParamsType::Separate, params_type: vm::ParamsType::Separate,
}; };
@ -185,8 +186,8 @@ impl<'a, T: 'a, V: 'a, B: 'a> Ext for Externalities<'a, T, V, B>
let mut ex = Executive::new(self.state, self.env_info, self.machine, self.schedule); let mut ex = Executive::new(self.state, self.env_info, self.machine, self.schedule);
let r = ex.call_with_crossbeam(params, self.substate, self.stack_depth + 1, self.tracer, self.vm_tracer); let r = ex.call_with_crossbeam(params, self.substate, self.stack_depth + 1, self.tracer, self.vm_tracer);
let output = match &r { let output = match &r {
Ok(ref r) => H256::from(&r.return_data[..32]), Ok(ref r) => H256::from_slice(&r.return_data[..32]),
_ => H256::new(), _ => H256::zero(),
}; };
trace!("ext: blockhash contract({}) -> {:?}({}) self.env_info.number={}\n", number, r, output, self.env_info.number); trace!("ext: blockhash contract({}) -> {:?}({}) self.env_info.number={}\n", number, r, output, self.env_info.number);
output output
@ -428,6 +429,7 @@ mod tests {
use test_helpers::get_temp_state; use test_helpers::get_temp_state;
use super::*; use super::*;
use trace::{NoopTracer, NoopVMTracer}; use trace::{NoopTracer, NoopVMTracer};
use std::str::FromStr;
fn get_test_origin() -> OriginInfo { fn get_test_origin() -> OriginInfo {
OriginInfo { OriginInfo {
@ -441,7 +443,7 @@ mod tests {
fn get_test_env_info() -> EnvInfo { fn get_test_env_info() -> EnvInfo {
EnvInfo { EnvInfo {
number: 100, number: 100,
author: 0.into(), author: Address::from_low_u64_be(0),
timestamp: 0, timestamp: 0,
difficulty: 0.into(), difficulty: 0.into(),
last_hashes: Arc::new(vec![]), last_hashes: Arc::new(vec![]),
@ -509,7 +511,7 @@ mod tests {
#[test] #[test]
fn can_return_block_hash() { fn can_return_block_hash() {
let test_hash = H256::from("afafafafafafafafafafafbcbcbcbcbcbcbcbcbcbeeeeeeeeeeeeedddddddddd"); let test_hash = H256::from_str("afafafafafafafafafafafbcbcbcbcbcbcbcbcbcbeeeeeeeeeeeeedddddddddd").unwrap();
let test_env_number = 0x120001; let test_env_number = 0x120001;
let mut setup = TestSetup::new(); let mut setup = TestSetup::new();
@ -546,11 +548,11 @@ mod tests {
// this should panic because we have no balance on any account // this should panic because we have no balance on any account
ext.call( ext.call(
&"0000000000000000000000000000000000000000000000000000000000120000".parse::<U256>().unwrap(), &"0000000000000000000000000000000000000000000000000000000000120000".parse::<U256>().unwrap(),
&Address::new(), &Address::zero(),
&Address::new(), &Address::zero(),
Some("0000000000000000000000000000000000000000000000000000000000150000".parse::<U256>().unwrap()), Some("0000000000000000000000000000000000000000000000000000000000150000".parse::<U256>().unwrap()),
&[], &[],
&Address::new(), &Address::zero(),
CallType::Call, CallType::Call,
false, false,
).ok().unwrap(); ).ok().unwrap();
@ -559,7 +561,7 @@ mod tests {
#[test] #[test]
fn can_log() { fn can_log() {
let log_data = vec![120u8, 110u8]; let log_data = vec![120u8, 110u8];
let log_topics = vec![H256::from("af0fa234a6af46afa23faf23bcbc1c1cb4bcb7bcbe7e7e7ee3ee2edddddddddd")]; let log_topics = vec![H256::from_str("af0fa234a6af46afa23faf23bcbc1c1cb4bcb7bcbe7e7e7ee3ee2edddddddddd").unwrap()];
let mut setup = TestSetup::new(); let mut setup = TestSetup::new();
let state = &mut setup.state; let state = &mut setup.state;
@ -577,7 +579,7 @@ mod tests {
#[test] #[test]
fn can_suicide() { fn can_suicide() {
let refund_account = &Address::new(); let refund_account = &Address::zero();
let mut setup = TestSetup::new(); let mut setup = TestSetup::new();
let state = &mut setup.state; let state = &mut setup.state;
@ -627,7 +629,7 @@ mod tests {
let address = { let address = {
let mut ext = Externalities::new(state, &setup.env_info, &setup.machine, &setup.schedule, 0, 0, &origin_info, &mut setup.sub_state, OutputPolicy::InitContract, &mut tracer, &mut vm_tracer, false); let mut ext = Externalities::new(state, &setup.env_info, &setup.machine, &setup.schedule, 0, 0, &origin_info, &mut setup.sub_state, OutputPolicy::InitContract, &mut tracer, &mut vm_tracer, false);
match ext.create(&U256::max_value(), &U256::zero(), &[], CreateContractAddress::FromSenderSaltAndCodeHash(H256::default()), false) { match ext.create(&U256::max_value(), &U256::zero(), &[], CreateContractAddress::FromSenderSaltAndCodeHash(H256::zero()), false) {
Ok(ContractCreateResult::Created(address, _)) => address, Ok(ContractCreateResult::Created(address, _)) => address,
_ => panic!("Test create failed; expected Created, got Failed/Reverted."), _ => panic!("Test create failed; expected Created, got Failed/Reverted."),
} }

View File

@ -35,6 +35,7 @@ use ethtrie;
use rlp::RlpStream; use rlp::RlpStream;
use hash::keccak; use hash::keccak;
use machine::EthereumMachine as Machine; use machine::EthereumMachine as Machine;
use ethereum_types::BigEndianHash;
use super::HookType; use super::HookType;
@ -339,8 +340,8 @@ fn do_json_test_for<H: FnMut(&str, HookType)>(vm_type: &VMType, json_data: &[u8]
for (k, v) in account.storage { for (k, v) in account.storage {
let key: U256 = k.into(); let key: U256 = k.into();
let value: U256 = v.into(); let value: U256 = v.into();
let found_storage = try_fail!(state.storage_at(&address, &From::from(key))); let found_storage = try_fail!(state.storage_at(&address, &BigEndianHash::from_uint(&key)));
fail_unless(found_storage == From::from(value), "storage is incorrect"); fail_unless(found_storage == BigEndianHash::from_uint(&value), "storage is incorrect");
} }
} }

View File

@ -111,6 +111,7 @@ macro_rules! test {
} }
} }
/// Declares a test
#[macro_export] #[macro_export]
macro_rules! declare_test { macro_rules! declare_test {
(skip => $arr: expr, $id: ident, $name: expr) => { (skip => $arr: expr, $id: ident, $name: expr) => {

View File

@ -35,7 +35,7 @@ fn test_trie<H: FnMut(&str, HookType)>(json: &[u8], trie: TrieSpec, start_stop_h
start_stop_hook(&name, HookType::OnStart); start_stop_hook(&name, HookType::OnStart);
let mut memdb = journaldb::new_memory_db(); let mut memdb = journaldb::new_memory_db();
let mut root = H256::default(); let mut root = H256::zero();
let mut t = factory.create(&mut memdb, &mut root); let mut t = factory.create(&mut memdb, &mut root);
for (key, value) in test.input.data.into_iter() { for (key, value) in test.input.data.into_iter() {

View File

@ -107,6 +107,8 @@ extern crate using_queue;
extern crate vm; extern crate vm;
extern crate wasm; extern crate wasm;
#[cfg(test)]
extern crate rand_xorshift;
#[cfg(test)] #[cfg(test)]
extern crate ethcore_accounts as accounts; extern crate ethcore_accounts as accounts;
#[cfg(feature = "stratum")] #[cfg(feature = "stratum")]

View File

@ -60,7 +60,7 @@ impl From<::ethjson::spec::EthashParams> for EthashExtensions {
EthashExtensions { EthashExtensions {
homestead_transition: p.homestead_transition.map_or(0, Into::into), homestead_transition: p.homestead_transition.map_or(0, Into::into),
dao_hardfork_transition: p.dao_hardfork_transition.map_or(u64::max_value(), Into::into), dao_hardfork_transition: p.dao_hardfork_transition.map_or(u64::max_value(), Into::into),
dao_hardfork_beneficiary: p.dao_hardfork_beneficiary.map_or_else(Address::new, Into::into), dao_hardfork_beneficiary: p.dao_hardfork_beneficiary.map_or_else(Address::zero, Into::into),
dao_hardfork_accounts: p.dao_hardfork_accounts.unwrap_or_else(Vec::new).into_iter().map(Into::into).collect(), dao_hardfork_accounts: p.dao_hardfork_accounts.unwrap_or_else(Vec::new).into_iter().map(Into::into).collect(),
} }
} }
@ -203,7 +203,7 @@ impl EthereumMachine {
block, block,
params.eip210_contract_address, params.eip210_contract_address,
params.eip210_contract_gas, params.eip210_contract_gas,
Some(parent_hash.to_vec()), Some(parent_hash.as_bytes().to_vec()),
)?; )?;
} }
Ok(()) Ok(())
@ -462,12 +462,13 @@ fn round_block_gas_limit(gas_limit: U256, lower_limit: U256, upper_limit: U256)
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
use super::*; use super::*;
use std::str::FromStr;
fn get_default_ethash_extensions() -> EthashExtensions { fn get_default_ethash_extensions() -> EthashExtensions {
EthashExtensions { EthashExtensions {
homestead_transition: 1150000, homestead_transition: 1150000,
dao_hardfork_transition: u64::max_value(), dao_hardfork_transition: u64::max_value(),
dao_hardfork_beneficiary: "0000000000000000000000000000000000000001".into(), dao_hardfork_beneficiary: Address::from_str("0000000000000000000000000000000000000001").unwrap(),
dao_hardfork_accounts: Vec::new(), dao_hardfork_accounts: Vec::new(),
} }
} }

View File

@ -1499,7 +1499,7 @@ mod tests {
// when new block is imported // when new block is imported
let client = generate_dummy_client(2); let client = generate_dummy_client(2);
let imported = [0.into()]; let imported = [H256::zero()];
let empty = &[]; let empty = &[];
miner.chain_new_blocks(&*client, &imported, empty, &imported, empty, false); miner.chain_new_blocks(&*client, &imported, empty, &imported, empty, false);
@ -1745,7 +1745,6 @@ mod tests {
#[cfg(feature = "price-info")] #[cfg(feature = "price-info")]
fn dynamic_gas_pricer() -> GasPricer { fn dynamic_gas_pricer() -> GasPricer {
use std::time::Duration;
use parity_runtime::Executor; use parity_runtime::Executor;
use fetch::Client as FetchClient; use fetch::Client as FetchClient;
use ethcore_miner::gas_price_calibrator::{GasPriceCalibrator, GasPriceCalibratorOptions}; use ethcore_miner::gas_price_calibrator::{GasPriceCalibrator, GasPriceCalibratorOptions};

View File

@ -21,7 +21,7 @@ use std::net::{SocketAddr, AddrParseError};
use std::fmt; use std::fmt;
use client::{Client, ImportSealedBlock}; use client::{Client, ImportSealedBlock};
use ethereum_types::{H64, H256, clean_0x, U256}; use ethereum_types::{H64, H256, U256};
use ethash::{self, SeedHashCompute}; use ethash::{self, SeedHashCompute};
#[cfg(feature = "work-notify")] #[cfg(feature = "work-notify")]
use ethcore_miner::work_notify::NotifyWork; use ethcore_miner::work_notify::NotifyWork;
@ -47,6 +47,14 @@ pub struct Options {
pub secret: Option<H256>, pub secret: Option<H256>,
} }
fn clean_0x(s: &str) -> &str {
if s.starts_with("0x") {
&s[2..]
} else {
s
}
}
struct SubmitPayload { struct SubmitPayload {
nonce: H64, nonce: H64,
pow_hash: H256, pow_hash: H256,

View File

@ -20,7 +20,7 @@ use std::fmt;
use std::collections::BTreeMap; use std::collections::BTreeMap;
use itertools::Itertools; use itertools::Itertools;
use hash::{keccak}; use hash::{keccak};
use ethereum_types::{H256, U256}; use ethereum_types::{H256, U256, BigEndianHash};
use hash_db::HashDB; use hash_db::HashDB;
use kvdb::DBValue; use kvdb::DBValue;
use keccak_hasher::KeccakHasher; use keccak_hasher::KeccakHasher;
@ -73,7 +73,7 @@ impl PodAccount {
let mut stream = RlpStream::new_list(4); let mut stream = RlpStream::new_list(4);
stream.append(&self.nonce); stream.append(&self.nonce);
stream.append(&self.balance); stream.append(&self.balance);
stream.append(&sec_trie_root(self.storage.iter().map(|(k, v)| (k, rlp::encode(&U256::from(&**v)))))); stream.append(&sec_trie_root(self.storage.iter().map(|(k, v)| (k, rlp::encode(&v.into_uint())))));
stream.append(&keccak(&self.code.as_ref().unwrap_or(&vec![]))); stream.append(&keccak(&self.code.as_ref().unwrap_or(&vec![])));
stream.out() stream.out()
} }
@ -84,10 +84,10 @@ impl PodAccount {
Some(ref c) if !c.is_empty() => { db.insert(c); } Some(ref c) if !c.is_empty() => { db.insert(c); }
_ => {} _ => {}
} }
let mut r = H256::new(); let mut r = H256::zero();
let mut t = factory.create(db, &mut r); let mut t = factory.create(db, &mut r);
for (k, v) in &self.storage { for (k, v) in &self.storage {
if let Err(e) = t.insert(k, &rlp::encode(&U256::from(&**v))) { if let Err(e) = t.insert(k.as_bytes(), &rlp::encode(&v.into_uint())) {
warn!("Encountered potential DB corruption: {}", e); warn!("Encountered potential DB corruption: {}", e);
} }
} }
@ -103,7 +103,7 @@ impl From<ethjson::blockchain::Account> for PodAccount {
storage: a.storage.into_iter().map(|(key, value)| { storage: a.storage.into_iter().map(|(key, value)| {
let key: U256 = key.into(); let key: U256 = key.into();
let value: U256 = value.into(); let value: U256 = value.into();
(H256::from(key), H256::from(value)) (BigEndianHash::from_uint(&key), BigEndianHash::from_uint(&value))
}).collect(), }).collect(),
} }
} }
@ -118,7 +118,7 @@ impl From<ethjson::spec::Account> for PodAccount {
storage: a.storage.map_or_else(BTreeMap::new, |s| s.into_iter().map(|(key, value)| { storage: a.storage.map_or_else(BTreeMap::new, |s| s.into_iter().map(|(key, value)| {
let key: U256 = key.into(); let key: U256 = key.into();
let value: U256 = value.into(); let value: U256 = value.into();
(H256::from(key), H256::from(value)) (BigEndianHash::from_uint(&key), BigEndianHash::from_uint(&value))
}).collect()), }).collect()),
} }
} }
@ -130,7 +130,7 @@ impl fmt::Display for PodAccount {
self.balance, self.balance,
self.nonce, self.nonce,
self.code.as_ref().map_or(0, |c| c.len()), self.code.as_ref().map_or(0, |c| c.len()),
self.code.as_ref().map_or_else(H256::new, |c| keccak(c)), self.code.as_ref().map_or_else(H256::zero, |c| keccak(c)),
self.storage.len(), self.storage.len(),
) )
} }
@ -154,7 +154,7 @@ pub fn diff_pod(pre: Option<&PodAccount>, post: Option<&PodAccount>) -> Option<A
}), }),
(Some(pre), Some(post)) => { (Some(pre), Some(post)) => {
let storage: Vec<_> = pre.storage.keys().merge(post.storage.keys()) let storage: Vec<_> = pre.storage.keys().merge(post.storage.keys())
.filter(|k| pre.storage.get(k).unwrap_or(&H256::new()) != post.storage.get(k).unwrap_or(&H256::new())) .filter(|k| pre.storage.get(k).unwrap_or(&H256::zero()) != post.storage.get(k).unwrap_or(&H256::zero()))
.collect(); .collect();
let r = AccountDiff { let r = AccountDiff {
balance: Diff::new(pre.balance, post.balance), balance: Diff::new(pre.balance, post.balance),
@ -165,8 +165,8 @@ pub fn diff_pod(pre: Option<&PodAccount>, post: Option<&PodAccount>) -> Option<A
}, },
storage: storage.into_iter().map(|k| storage: storage.into_iter().map(|k|
(k.clone(), Diff::new( (k.clone(), Diff::new(
pre.storage.get(k).cloned().unwrap_or_else(H256::new), pre.storage.get(k).cloned().unwrap_or_else(H256::zero),
post.storage.get(k).cloned().unwrap_or_else(H256::new) post.storage.get(k).cloned().unwrap_or_else(H256::zero)
))).collect(), ))).collect(),
}; };
if r.balance.is_same() && r.nonce.is_same() && r.code.is_same() && r.storage.is_empty() { if r.balance.is_same() && r.nonce.is_same() && r.code.is_same() && r.storage.is_empty() {
@ -184,6 +184,7 @@ mod test {
use std::collections::BTreeMap; use std::collections::BTreeMap;
use types::account_diff::*; use types::account_diff::*;
use super::{PodAccount, diff_pod}; use super::{PodAccount, diff_pod};
use ethereum_types::H256;
#[test] #[test]
fn existence() { fn existence() {
@ -227,24 +228,40 @@ mod test {
balance: 0.into(), balance: 0.into(),
nonce: 0.into(), nonce: 0.into(),
code: Some(vec![]), code: Some(vec![]),
storage: map_into![1 => 1, 2 => 2, 3 => 3, 4 => 4, 5 => 0, 6 => 0, 7 => 0] storage: map![
H256::from_low_u64_be(1) => H256::from_low_u64_be(1),
H256::from_low_u64_be(2) => H256::from_low_u64_be(2),
H256::from_low_u64_be(3) => H256::from_low_u64_be(3),
H256::from_low_u64_be(4) => H256::from_low_u64_be(4),
H256::from_low_u64_be(5) => H256::from_low_u64_be(0),
H256::from_low_u64_be(6) => H256::from_low_u64_be(0),
H256::from_low_u64_be(7) => H256::from_low_u64_be(0)
],
}; };
let b = PodAccount { let b = PodAccount {
balance: 0.into(), balance: 0.into(),
nonce: 0.into(), nonce: 0.into(),
code: Some(vec![]), code: Some(vec![]),
storage: map_into![1 => 1, 2 => 3, 3 => 0, 5 => 0, 7 => 7, 8 => 0, 9 => 9] storage: map![
H256::from_low_u64_be(1) => H256::from_low_u64_be(1),
H256::from_low_u64_be(2) => H256::from_low_u64_be(3),
H256::from_low_u64_be(3) => H256::from_low_u64_be(0),
H256::from_low_u64_be(5) => H256::from_low_u64_be(0),
H256::from_low_u64_be(7) => H256::from_low_u64_be(7),
H256::from_low_u64_be(8) => H256::from_low_u64_be(0),
H256::from_low_u64_be(9) => H256::from_low_u64_be(9)
]
}; };
assert_eq!(diff_pod(Some(&a), Some(&b)), Some(AccountDiff { assert_eq!(diff_pod(Some(&a), Some(&b)), Some(AccountDiff {
balance: Diff::Same, balance: Diff::Same,
nonce: Diff::Same, nonce: Diff::Same,
code: Diff::Same, code: Diff::Same,
storage: map![ storage: map![
2.into() => Diff::new(2.into(), 3.into()), H256::from_low_u64_be(2) => Diff::new(H256::from_low_u64_be(2), H256::from_low_u64_be(3)),
3.into() => Diff::new(3.into(), 0.into()), H256::from_low_u64_be(3) => Diff::new(H256::from_low_u64_be(3), H256::from_low_u64_be(0)),
4.into() => Diff::new(4.into(), 0.into()), H256::from_low_u64_be(4) => Diff::new(H256::from_low_u64_be(4), H256::from_low_u64_be(0)),
7.into() => Diff::new(0.into(), 7.into()), H256::from_low_u64_be(7) => Diff::new(H256::from_low_u64_be(0), H256::from_low_u64_be(7)),
9.into() => Diff::new(0.into(), 9.into()) H256::from_low_u64_be(9) => Diff::new(H256::from_low_u64_be(0), H256::from_low_u64_be(9))
], ],
})); }));
} }

View File

@ -90,12 +90,12 @@ mod test {
use types::state_diff::*; use types::state_diff::*;
use types::account_diff::*; use types::account_diff::*;
use pod_account::PodAccount; use pod_account::PodAccount;
use super::PodState; use super::{PodState, Address};
#[test] #[test]
fn create_delete() { fn create_delete() {
let a = PodState::from(map![ let a = PodState::from(map![
1.into() => PodAccount { Address::from_low_u64_be(1) => PodAccount {
balance: 69.into(), balance: 69.into(),
nonce: 0.into(), nonce: 0.into(),
code: Some(Vec::new()), code: Some(Vec::new()),
@ -103,7 +103,7 @@ mod test {
} }
]); ]);
assert_eq!(super::diff_pod(&a, &PodState::new()), StateDiff { raw: map![ assert_eq!(super::diff_pod(&a, &PodState::new()), StateDiff { raw: map![
1.into() => AccountDiff{ Address::from_low_u64_be(1) => AccountDiff{
balance: Diff::Died(69.into()), balance: Diff::Died(69.into()),
nonce: Diff::Died(0.into()), nonce: Diff::Died(0.into()),
code: Diff::Died(vec![]), code: Diff::Died(vec![]),
@ -111,7 +111,7 @@ mod test {
} }
]}); ]});
assert_eq!(super::diff_pod(&PodState::new(), &a), StateDiff{ raw: map![ assert_eq!(super::diff_pod(&PodState::new(), &a), StateDiff{ raw: map![
1.into() => AccountDiff{ Address::from_low_u64_be(1) => AccountDiff{
balance: Diff::Born(69.into()), balance: Diff::Born(69.into()),
nonce: Diff::Born(0.into()), nonce: Diff::Born(0.into()),
code: Diff::Born(vec![]), code: Diff::Born(vec![]),
@ -123,7 +123,7 @@ mod test {
#[test] #[test]
fn create_delete_with_unchanged() { fn create_delete_with_unchanged() {
let a = PodState::from(map![ let a = PodState::from(map![
1.into() => PodAccount { Address::from_low_u64_be(1) => PodAccount {
balance: 69.into(), balance: 69.into(),
nonce: 0.into(), nonce: 0.into(),
code: Some(Vec::new()), code: Some(Vec::new()),
@ -131,13 +131,13 @@ mod test {
} }
]); ]);
let b = PodState::from(map![ let b = PodState::from(map![
1.into() => PodAccount { Address::from_low_u64_be(1) => PodAccount {
balance: 69.into(), balance: 69.into(),
nonce: 0.into(), nonce: 0.into(),
code: Some(Vec::new()), code: Some(Vec::new()),
storage: map![], storage: map![],
}, },
2.into() => PodAccount { Address::from_low_u64_be(2) => PodAccount {
balance: 69.into(), balance: 69.into(),
nonce: 0.into(), nonce: 0.into(),
code: Some(Vec::new()), code: Some(Vec::new()),
@ -145,7 +145,7 @@ mod test {
} }
]); ]);
assert_eq!(super::diff_pod(&a, &b), StateDiff { raw: map![ assert_eq!(super::diff_pod(&a, &b), StateDiff { raw: map![
2.into() => AccountDiff{ Address::from_low_u64_be(2) => AccountDiff{
balance: Diff::Born(69.into()), balance: Diff::Born(69.into()),
nonce: Diff::Born(0.into()), nonce: Diff::Born(0.into()),
code: Diff::Born(vec![]), code: Diff::Born(vec![]),
@ -153,7 +153,7 @@ mod test {
} }
]}); ]});
assert_eq!(super::diff_pod(&b, &a), StateDiff { raw: map![ assert_eq!(super::diff_pod(&b, &a), StateDiff { raw: map![
2.into() => AccountDiff{ Address::from_low_u64_be(2) => AccountDiff{
balance: Diff::Died(69.into()), balance: Diff::Died(69.into()),
nonce: Diff::Died(0.into()), nonce: Diff::Died(0.into()),
code: Diff::Died(vec![]), code: Diff::Died(vec![]),
@ -165,13 +165,13 @@ mod test {
#[test] #[test]
fn change_with_unchanged() { fn change_with_unchanged() {
let a = PodState::from(map![ let a = PodState::from(map![
1.into() => PodAccount { Address::from_low_u64_be(1) => PodAccount {
balance: 69.into(), balance: 69.into(),
nonce: 0.into(), nonce: 0.into(),
code: Some(Vec::new()), code: Some(Vec::new()),
storage: map![], storage: map![],
}, },
2.into() => PodAccount { Address::from_low_u64_be(2) => PodAccount {
balance: 69.into(), balance: 69.into(),
nonce: 0.into(), nonce: 0.into(),
code: Some(Vec::new()), code: Some(Vec::new()),
@ -179,13 +179,13 @@ mod test {
} }
]); ]);
let b = PodState::from(map![ let b = PodState::from(map![
1.into() => PodAccount { Address::from_low_u64_be(1) => PodAccount {
balance: 69.into(), balance: 69.into(),
nonce: 1.into(), nonce: 1.into(),
code: Some(Vec::new()), code: Some(Vec::new()),
storage: map![], storage: map![],
}, },
2.into() => PodAccount { Address::from_low_u64_be(2) => PodAccount {
balance: 69.into(), balance: 69.into(),
nonce: 0.into(), nonce: 0.into(),
code: Some(Vec::new()), code: Some(Vec::new()),
@ -193,7 +193,7 @@ mod test {
} }
]); ]);
assert_eq!(super::diff_pod(&a, &b), StateDiff { raw: map![ assert_eq!(super::diff_pod(&a, &b), StateDiff { raw: map![
1.into() => AccountDiff{ Address::from_low_u64_be(1) => AccountDiff{
balance: Diff::Same, balance: Diff::Same,
nonce: Diff::Changed(0.into(), 1.into()), nonce: Diff::Changed(0.into(), 1.into()),
code: Diff::Same, code: Diff::Same,

View File

@ -350,6 +350,6 @@ mod tests {
#[test] #[test]
fn encoding_empty_acc() { fn encoding_empty_acc() {
let mut db = get_temp_state_db(); let mut db = get_temp_state_db();
assert_eq!(from_fat_rlp(&mut AccountDBMut::new(db.as_hash_db_mut(), &Address::default()), Rlp::new(&::rlp::NULL_RLP), H256::zero()).unwrap(), (ACC_EMPTY, None)); assert_eq!(from_fat_rlp(&mut AccountDBMut::new(db.as_hash_db_mut(), &Address::zero()), Rlp::new(&::rlp::NULL_RLP), H256::zero()).unwrap(), (ACC_EMPTY, None));
} }
} }

View File

@ -152,7 +152,7 @@ mod tests {
let encoded = encode_block(&b); let encoded = encode_block(&b);
let abridged = AbridgedBlock::from_block_view(&view!(BlockView, &encoded)); let abridged = AbridgedBlock::from_block_view(&view!(BlockView, &encoded));
assert_eq!(abridged.to_block(H256::new(), 0, receipts_root).unwrap(), b); assert_eq!(abridged.to_block(H256::zero(), 0, receipts_root).unwrap(), b);
} }
#[test] #[test]
@ -163,7 +163,7 @@ mod tests {
let encoded = encode_block(&b); let encoded = encode_block(&b);
let abridged = AbridgedBlock::from_block_view(&view!(BlockView, &encoded)); let abridged = AbridgedBlock::from_block_view(&view!(BlockView, &encoded));
assert_eq!(abridged.to_block(H256::new(), 2, receipts_root).unwrap(), b); assert_eq!(abridged.to_block(H256::zero(), 2, receipts_root).unwrap(), b);
} }
#[test] #[test]
@ -177,7 +177,7 @@ mod tests {
gas: U256::from(50_000), gas: U256::from(50_000),
value: U256::from(1), value: U256::from(1),
data: b"Hello!".to_vec() data: b"Hello!".to_vec()
}.fake_sign(Address::from(0x69)); }.fake_sign(Address::from_low_u64_be(0x69));
let t2 = Transaction { let t2 = Transaction {
action: Action::Create, action: Action::Create,
@ -186,7 +186,7 @@ mod tests {
gas: U256::from(300000), gas: U256::from(300000),
value: U256::from(1000000000), value: U256::from(1000000000),
data: "Eep!".into(), data: "Eep!".into(),
}.fake_sign(Address::from(0x55)); }.fake_sign(Address::from_low_u64_be(0x55));
b.transactions.push(t1.into()); b.transactions.push(t1.into());
b.transactions.push(t2.into()); b.transactions.push(t2.into());
@ -199,6 +199,6 @@ mod tests {
let encoded = encode_block(&b); let encoded = encode_block(&b);
let abridged = AbridgedBlock::from_block_view(&view!(BlockView, &encoded[..])); let abridged = AbridgedBlock::from_block_view(&view!(BlockView, &encoded[..]));
assert_eq!(abridged.to_block(H256::new(), 0, receipts_root).unwrap(), b); assert_eq!(abridged.to_block(H256::zero(), 0, receipts_root).unwrap(), b);
} }
} }

View File

@ -34,7 +34,7 @@ use ethereum_types::H256;
use kvdb::KeyValueDB; use kvdb::KeyValueDB;
use bytes::Bytes; use bytes::Bytes;
use rlp::{RlpStream, Rlp}; use rlp::{RlpStream, Rlp};
use rand::OsRng; use rand::rngs::OsRng;
use types::encoded; use types::encoded;
/// Snapshot creation and restoration for PoW chains. /// Snapshot creation and restoration for PoW chains.
@ -210,7 +210,7 @@ impl PowRebuilder {
Ok(PowRebuilder { Ok(PowRebuilder {
chain: chain, chain: chain,
db: db, db: db,
rng: OsRng::new()?, rng: OsRng::new().map_err(|e| format!("{}", e))?,
disconnected: Vec::new(), disconnected: Vec::new(),
best_number: manifest.block_number, best_number: manifest.block_number,
best_hash: manifest.block_hash, best_hash: manifest.block_hash,

View File

@ -51,7 +51,7 @@ use super::state_db::StateDB;
use super::state::Account as StateAccount; use super::state::Account as StateAccount;
use crossbeam::scope; use crossbeam::scope;
use rand::{Rng, OsRng}; use rand::{Rng, rngs::OsRng};
pub use self::error::Error; pub use self::error::Error;
@ -411,7 +411,7 @@ impl StateRebuilder {
let mut pairs = Vec::with_capacity(rlp.item_count()?); let mut pairs = Vec::with_capacity(rlp.item_count()?);
// initialize the pairs vector with empty values so we have slots to write into. // initialize the pairs vector with empty values so we have slots to write into.
pairs.resize(rlp.item_count()?, (H256::new(), Vec::new())); pairs.resize(rlp.item_count()?, (H256::zero(), Vec::new()));
let status = rebuild_accounts( let status = rebuild_accounts(
self.db.as_hash_db_mut(), self.db.as_hash_db_mut(),
@ -450,9 +450,9 @@ impl StateRebuilder {
if !flag.load(Ordering::SeqCst) { return Err(Error::RestorationAborted.into()) } if !flag.load(Ordering::SeqCst) { return Err(Error::RestorationAborted.into()) }
if &thin_rlp[..] != &empty_rlp[..] { if &thin_rlp[..] != &empty_rlp[..] {
self.bloom.set(&*hash); self.bloom.set(hash.as_bytes());
} }
account_trie.insert(&hash, &thin_rlp)?; account_trie.insert(hash.as_bytes(), &thin_rlp)?;
} }
} }

View File

@ -928,9 +928,9 @@ mod tests {
version: 2, version: 2,
state_hashes: state_hashes.clone(), state_hashes: state_hashes.clone(),
block_hashes: block_hashes.clone(), block_hashes: block_hashes.clone(),
state_root: H256::default(), state_root: H256::zero(),
block_number: 100000, block_number: 100000,
block_hash: H256::default(), block_hash: H256::zero(),
}, },
pruning: Algorithm::Archive, pruning: Algorithm::Archive,
db: restoration_db_handler(db_config).open(&tempdir.path().to_owned()).unwrap(), db: restoration_db_handler(db_config).open(&tempdir.path().to_owned()).unwrap(),

View File

@ -124,7 +124,7 @@ pub fn fill_storage(mut db: AccountDBMut, root: &mut H256, seed: &mut H256) {
SecTrieDBMut::from_existing(&mut db, root).unwrap() SecTrieDBMut::from_existing(&mut db, root).unwrap()
}; };
for (k, v) in map.make_with(seed) { for (k, v) in map.make_with(&mut seed.to_fixed_bytes()) {
trie.insert(&k, &v).unwrap(); trie.insert(&k, &v).unwrap();
} }
} }
@ -157,7 +157,6 @@ pub fn restore(
genesis: &[u8], genesis: &[u8],
) -> Result<(), ::error::Error> { ) -> Result<(), ::error::Error> {
use std::sync::atomic::AtomicBool; use std::sync::atomic::AtomicBool;
use snappy;
let flag = AtomicBool::new(true); let flag = AtomicBool::new(true);
let components = engine.snapshot_components().unwrap(); let components = engine.snapshot_components().unwrap();

View File

@ -126,7 +126,7 @@ fn make_chain(accounts: Arc<AccountProvider>, blocks_beyond: usize, transitions:
nonce: *nonce, nonce: *nonce,
gas_price: 1.into(), gas_price: 1.into(),
gas: 21_000.into(), gas: 21_000.into(),
action: Action::Call(Address::new()), action: Action::Call(Address::zero()),
value: 1.into(), value: 1.into(),
data: Vec::new(), data: Vec::new(),
}.sign(&*RICH_SECRET, client.signing_chain_id()); }.sign(&*RICH_SECRET, client.signing_chain_id());

View File

@ -119,7 +119,7 @@ fn checks_flag() {
let mut stream = RlpStream::new_list(5); let mut stream = RlpStream::new_list(5);
stream.append(&100u64) stream.append(&100u64)
.append(&H256::default()) .append(&H256::zero())
.append(&(!0u64)); .append(&(!0u64));
stream.append_empty_data().append_empty_data(); stream.append_empty_data().append_empty_data();
@ -137,7 +137,7 @@ fn checks_flag() {
block_hashes: Vec::new(), block_hashes: Vec::new(),
state_root: ::hash::KECCAK_NULL_RLP, state_root: ::hash::KECCAK_NULL_RLP,
block_number: 102, block_number: 102,
block_hash: H256::default(), block_hash: H256::zero(),
}; };
let mut rebuilder = SNAPSHOT_MODE.rebuilder(chain, db.clone(), &manifest).unwrap(); let mut rebuilder = SNAPSHOT_MODE.rebuilder(chain, db.clone(), &manifest).unwrap();

View File

@ -28,18 +28,21 @@ use super::helpers::StateProducer;
use error::Error; use error::Error;
use rand::{XorShiftRng, SeedableRng}; use rand::SeedableRng;
use rand_xorshift::XorShiftRng;
use ethereum_types::H256; use ethereum_types::H256;
use journaldb::{self, Algorithm}; use journaldb::{self, Algorithm};
use kvdb_rocksdb::{Database, DatabaseConfig}; use kvdb_rocksdb::{Database, DatabaseConfig};
use parking_lot::Mutex; use parking_lot::Mutex;
use tempdir::TempDir; use tempdir::TempDir;
const RNG_SEED: [u8; 16] = [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16];
#[test] #[test]
fn snap_and_restore() { fn snap_and_restore() {
use hash_db::HashDB; use hash_db::HashDB;
let mut producer = StateProducer::new(); let mut producer = StateProducer::new();
let mut rng = XorShiftRng::from_seed([1, 2, 3, 4]); let mut rng = XorShiftRng::from_seed(RNG_SEED);
let mut old_db = journaldb::new_memory_db(); let mut old_db = journaldb::new_memory_db();
let db_cfg = DatabaseConfig::with_columns(::db::NUM_COLUMNS); let db_cfg = DatabaseConfig::with_columns(::db::NUM_COLUMNS);
@ -65,7 +68,7 @@ fn snap_and_restore() {
block_hashes: Vec::new(), block_hashes: Vec::new(),
state_root: state_root, state_root: state_root,
block_number: 1000, block_number: 1000,
block_hash: H256::default(), block_hash: H256::zero(),
}).unwrap(); }).unwrap();
let db_path = tempdir.path().join("db"); let db_path = tempdir.path().join("db");
@ -84,7 +87,7 @@ fn snap_and_restore() {
} }
assert_eq!(rebuilder.state_root(), state_root); assert_eq!(rebuilder.state_root(), state_root);
rebuilder.finalize(1000, H256::default()).unwrap(); rebuilder.finalize(1000, H256::zero()).unwrap();
new_db new_db
}; };
@ -157,7 +160,7 @@ fn get_code_from_prev_chunk() {
#[test] #[test]
fn checks_flag() { fn checks_flag() {
let mut producer = StateProducer::new(); let mut producer = StateProducer::new();
let mut rng = XorShiftRng::from_seed([5, 6, 7, 8]); let mut rng = XorShiftRng::from_seed(RNG_SEED);
let mut old_db = journaldb::new_memory_db(); let mut old_db = journaldb::new_memory_db();
let db_cfg = DatabaseConfig::with_columns(::db::NUM_COLUMNS); let db_cfg = DatabaseConfig::with_columns(::db::NUM_COLUMNS);
@ -179,7 +182,7 @@ fn checks_flag() {
block_hashes: Vec::new(), block_hashes: Vec::new(),
state_root: state_root, state_root: state_root,
block_number: 0, block_number: 0,
block_hash: H256::default(), block_hash: H256::zero(),
}).unwrap(); }).unwrap();
let tempdir = TempDir::new("").unwrap(); let tempdir = TempDir::new("").unwrap();

View File

@ -123,7 +123,7 @@ mod tests {
use client::{ChainNotify, NewBlocks, ChainRoute}; use client::{ChainNotify, NewBlocks, ChainRoute};
use ethereum_types::{H256, U256}; use ethereum_types::{H256, U256, BigEndianHash};
use std::collections::HashMap; use std::collections::HashMap;
use std::time::Duration; use std::time::Duration;
@ -151,7 +151,7 @@ mod tests {
fn harness(numbers: Vec<u64>, period: u64, history: u64, expected: Option<u64>) { fn harness(numbers: Vec<u64>, period: u64, history: u64, expected: Option<u64>) {
const DURATION_ZERO: Duration = Duration::from_millis(0); const DURATION_ZERO: Duration = Duration::from_millis(0);
let hashes: Vec<_> = numbers.clone().into_iter().map(|x| H256::from(U256::from(x))).collect(); let hashes: Vec<_> = numbers.clone().into_iter().map(|x| BigEndianHash::from_uint(&U256::from(x))).collect();
let map = hashes.clone().into_iter().zip(numbers).collect(); let map = hashes.clone().into_iter().zip(numbers).collect();
let watcher = Watcher { let watcher = Watcher {

Some files were not shown because too many files have changed in this diff Show More