1
// This file is part of Substrate.
2

            
3
// Copyright (C) Parity Technologies (UK) Ltd.
4
// SPDX-License-Identifier: Apache-2.0
5

            
6
// Licensed under the Apache License, Version 2.0 (the "License");
7
// you may not use this file except in compliance with the License.
8
// You may obtain a copy of the License at
9
//
10
// 	http://www.apache.org/licenses/LICENSE-2.0
11
//
12
// Unless required by applicable law or agreed to in writing, software
13
// distributed under the License is distributed on an "AS IS" BASIS,
14
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15
// See the License for the specific language governing permissions and
16
// limitations under the License.
17

            
18
//! Substrate state machine implementation.
19

            
20
#![warn(missing_docs)]
21
#![cfg_attr(not(feature = "std"), no_std)]
22

            
23
extern crate alloc;
24

            
25
pub mod backend;
26
#[cfg(feature = "std")]
27
mod basic;
28
mod error;
29
mod ext;
30
#[cfg(feature = "fuzzing")]
31
pub mod fuzzing;
32
#[cfg(feature = "std")]
33
mod in_memory_backend;
34
pub(crate) mod overlayed_changes;
35
#[cfg(feature = "std")]
36
mod read_only;
37
mod stats;
38
#[cfg(feature = "std")]
39
mod testing;
40
mod trie_backend;
41
mod trie_backend_essence;
42

            
43
pub use trie_backend::TrieCacheProvider;
44

            
45
#[cfg(feature = "std")]
46
pub use std_reexport::*;
47

            
48
#[cfg(feature = "std")]
49
pub use execution::*;
50
#[cfg(feature = "std")]
51
pub use log::{debug, error as log_error, warn};
52
#[cfg(feature = "std")]
53
pub use tracing::trace;
54

            
55
/// In no_std we skip logs for state_machine, this macro
56
/// is a noops.
57
#[cfg(not(feature = "std"))]
58
#[macro_export]
59
macro_rules! warn {
60
	(target: $target:expr, $message:expr $( , $arg:ident )* $( , )?) => {
61
		{
62
			$(
63
				let _ = &$arg;
64
			)*
65
		}
66
	};
67
	($message:expr, $( $arg:expr, )*) => {
68
		{
69
			$(
70
				let _ = &$arg;
71
			)*
72
		}
73
	};
74
}
75

            
76
/// In no_std we skip logs for state_machine, this macro
77
/// is a noops.
78
#[cfg(not(feature = "std"))]
79
#[macro_export]
80
macro_rules! debug {
81
	(target: $target:expr, $message:expr $( , $arg:ident )* $( , )?) => {
82
		{
83
			$(
84
				let _ = &$arg;
85
			)*
86
		}
87
	};
88
}
89

            
90
/// In no_std we skip logs for state_machine, this macro
91
/// is a noops.
92
#[cfg(not(feature = "std"))]
93
#[macro_export]
94
macro_rules! trace {
95
	(target: $target:expr, $($arg:tt)+) => {
96
		()
97
	};
98
	($($arg:tt)+) => {
99
		()
100
	};
101
}
102

            
103
/// In no_std we skip logs for state_machine, this macro
104
/// is a noops.
105
#[cfg(not(feature = "std"))]
106
#[macro_export]
107
macro_rules! log_error {
108
	(target: $target:expr, $($arg:tt)+) => {
109
		()
110
	};
111
	($($arg:tt)+) => {
112
		()
113
	};
114
}
115

            
116
/// Default error type to use with state machine trie backend.
117
#[cfg(feature = "std")]
118
pub type DefaultError = String;
119
/// Error type to use with state machine trie backend.
120
#[cfg(not(feature = "std"))]
121
#[derive(Debug, Default, Clone, Copy, Eq, PartialEq)]
122
pub struct DefaultError;
123

            
124
#[cfg(not(feature = "std"))]
125
impl core::fmt::Display for DefaultError {
126
	fn fmt(&self, f: &mut core::fmt::Formatter) -> core::fmt::Result {
127
		write!(f, "DefaultError")
128
	}
129
}
130

            
131
pub use crate::{
132
	backend::{Backend, BackendTransaction, IterArgs, KeysIter, PairsIter, StorageIterator},
133
	error::{Error, ExecutionError},
134
	ext::Ext,
135
	overlayed_changes::{
136
		ChildStorageCollection, IndexOperation, OffchainChangesCollection,
137
		OffchainOverlayedChanges, OverlayedChanges, StorageChanges, StorageCollection, StorageKey,
138
		StorageValue,
139
	},
140
	stats::{StateMachineStats, UsageInfo, UsageUnit},
141
	trie_backend::{TrieBackend, TrieBackendBuilder},
142
	trie_backend_essence::{Storage, TrieBackendStorage},
143
};
144

            
145
#[cfg(feature = "std")]
146
mod std_reexport {
147
	pub use crate::{
148
		basic::BasicExternalities,
149
		in_memory_backend::new_in_mem,
150
		read_only::{InspectState, ReadOnlyExternalities},
151
		testing::TestExternalities,
152
		trie_backend::create_proof_check_backend,
153
	};
154
	pub use sp_trie::{
155
		trie_types::{TrieDBMutV0, TrieDBMutV1},
156
		CompactProof, DBValue, LayoutV0, LayoutV1, MemoryDB, StorageProof, TrieMut,
157
	};
158
}
159

            
160
#[cfg(feature = "std")]
161
mod execution {
162
	use crate::backend::AsTrieBackend;
163

            
164
	use super::*;
165
	use codec::Codec;
166
	use hash_db::Hasher;
167
	use smallvec::SmallVec;
168
	use sp_core::{
169
		hexdisplay::HexDisplay,
170
		storage::{ChildInfo, ChildType, PrefixedStorageKey},
171
		traits::{CallContext, CodeExecutor, RuntimeCode},
172
	};
173
	use sp_externalities::Extensions;
174
	use sp_trie::PrefixedMemoryDB;
175
	use std::collections::{HashMap, HashSet};
176

            
177
	pub(crate) type CallResult<E> = Result<Vec<u8>, E>;
178

            
179
	/// Default handler of the execution manager.
180
	pub type DefaultHandler<E> = fn(CallResult<E>, CallResult<E>) -> CallResult<E>;
181

            
182
	/// Trie backend with in-memory storage.
183
	pub type InMemoryBackend<H> = TrieBackend<PrefixedMemoryDB<H>, H>;
184

            
185
	/// Storage backend trust level.
186
	#[derive(Debug, Clone)]
187
	pub enum BackendTrustLevel {
188
		/// Panics from trusted backends are considered justified, and never caught.
189
		Trusted,
190
		/// Panics from untrusted backend are caught and interpreted as runtime error.
191
		/// Untrusted backend may be missing some parts of the trie, so panics are not considered
192
		/// fatal.
193
		Untrusted,
194
	}
195

            
196
	/// The substrate state machine.
197
	pub struct StateMachine<'a, B, H, Exec>
198
	where
199
		H: Hasher,
200
		B: Backend<H>,
201
	{
202
		backend: &'a B,
203
		exec: &'a Exec,
204
		method: &'a str,
205
		call_data: &'a [u8],
206
		overlay: &'a mut OverlayedChanges<H>,
207
		extensions: &'a mut Extensions,
208
		runtime_code: &'a RuntimeCode<'a>,
209
		stats: StateMachineStats,
210
		/// The hash of the block the state machine will be executed on.
211
		///
212
		/// Used for logging.
213
		parent_hash: Option<H::Out>,
214
		context: CallContext,
215
	}
216

            
217
	impl<'a, B, H, Exec> Drop for StateMachine<'a, B, H, Exec>
218
	where
219
		H: Hasher,
220
		B: Backend<H>,
221
	{
222
		fn drop(&mut self) {
223
			self.backend.register_overlay_stats(&self.stats);
224
		}
225
	}
226

            
227
	impl<'a, B, H, Exec> StateMachine<'a, B, H, Exec>
228
	where
229
		H: Hasher,
230
		H::Out: Ord + 'static + codec::Codec,
231
		Exec: CodeExecutor + Clone + 'static,
232
		B: Backend<H>,
233
	{
234
		/// Creates new substrate state machine.
235
		pub fn new(
236
			backend: &'a B,
237
			overlay: &'a mut OverlayedChanges<H>,
238
			exec: &'a Exec,
239
			method: &'a str,
240
			call_data: &'a [u8],
241
			extensions: &'a mut Extensions,
242
			runtime_code: &'a RuntimeCode,
243
			context: CallContext,
244
		) -> Self {
245
			Self {
246
				backend,
247
				exec,
248
				method,
249
				call_data,
250
				extensions,
251
				overlay,
252
				runtime_code,
253
				stats: StateMachineStats::default(),
254
				parent_hash: None,
255
				context,
256
			}
257
		}
258

            
259
		/// Set the given `parent_hash` as the hash of the parent block.
260
		///
261
		/// This will be used for improved logging.
262
		pub fn set_parent_hash(mut self, parent_hash: H::Out) -> Self {
263
			self.parent_hash = Some(parent_hash);
264
			self
265
		}
266

            
267
		/// Execute a call using the given state backend, overlayed changes, and call executor.
268
		///
269
		/// On an error, no prospective changes are written to the overlay.
270
		///
271
		/// Note: changes to code will be in place if this call is made again. For running partial
272
		/// blocks (e.g. a transaction at a time), ensure a different method is used.
273
		///
274
		/// Returns the SCALE encoded result of the executed function.
275
		pub fn execute(&mut self) -> Result<Vec<u8>, Box<dyn Error>> {
276
			self.overlay
277
				.enter_runtime()
278
				.expect("StateMachine is never called from the runtime; qed");
279

            
280
			let mut ext = Ext::new(self.overlay, self.backend, Some(self.extensions));
281

            
282
			let ext_id = ext.id;
283

            
284
			trace!(
285
				target: "state",
286
				ext_id = %HexDisplay::from(&ext_id.to_le_bytes()),
287
				method = %self.method,
288
				parent_hash = %self.parent_hash.map(|h| format!("{:?}", h)).unwrap_or_else(|| String::from("None")),
289
				input = ?HexDisplay::from(&self.call_data),
290
				"Call",
291
			);
292

            
293
			let result = self
294
				.exec
295
				.call(&mut ext, self.runtime_code, self.method, self.call_data, self.context)
296
				.0;
297

            
298
			self.overlay
299
				.exit_runtime()
300
				.expect("Runtime is not able to call this function in the overlay; qed");
301

            
302
			trace!(
303
				target: "state",
304
				ext_id = %HexDisplay::from(&ext_id.to_le_bytes()),
305
				?result,
306
				"Return",
307
			);
308

            
309
			result.map_err(|e| Box::new(e) as Box<_>)
310
		}
311
	}
312

            
313
	/// Prove execution using the given state backend, overlayed changes, and call executor.
314
	pub fn prove_execution<B, H, Exec>(
315
		backend: &mut B,
316
		overlay: &mut OverlayedChanges<H>,
317
		exec: &Exec,
318
		method: &str,
319
		call_data: &[u8],
320
		runtime_code: &RuntimeCode,
321
	) -> Result<(Vec<u8>, StorageProof), Box<dyn Error>>
322
	where
323
		B: AsTrieBackend<H>,
324
		H: Hasher,
325
		H::Out: Ord + 'static + codec::Codec,
326
		Exec: CodeExecutor + Clone + 'static,
327
	{
328
		let trie_backend = backend.as_trie_backend();
329
		prove_execution_on_trie_backend::<_, _, _>(
330
			trie_backend,
331
			overlay,
332
			exec,
333
			method,
334
			call_data,
335
			runtime_code,
336
			&mut Default::default(),
337
		)
338
	}
339

            
340
	/// Prove execution using the given trie backend, overlayed changes, and call executor.
341
	/// Produces a state-backend-specific "transaction" which can be used to apply the changes
342
	/// to the backing store, such as the disk.
343
	/// Execution proof is the set of all 'touched' storage DBValues from the backend.
344
	///
345
	/// On an error, no prospective changes are written to the overlay.
346
	///
347
	/// Note: changes to code will be in place if this call is made again. For running partial
348
	/// blocks (e.g. a transaction at a time), ensure a different method is used.
349
	pub fn prove_execution_on_trie_backend<S, H, Exec>(
350
		trie_backend: &TrieBackend<S, H>,
351
		overlay: &mut OverlayedChanges<H>,
352
		exec: &Exec,
353
		method: &str,
354
		call_data: &[u8],
355
		runtime_code: &RuntimeCode,
356
		extensions: &mut Extensions,
357
	) -> Result<(Vec<u8>, StorageProof), Box<dyn Error>>
358
	where
359
		S: trie_backend_essence::TrieBackendStorage<H>,
360
		H: Hasher,
361
		H::Out: Ord + 'static + codec::Codec,
362
		Exec: CodeExecutor + 'static + Clone,
363
	{
364
		let proving_backend =
365
			TrieBackendBuilder::wrap(trie_backend).with_recorder(Default::default()).build();
366

            
367
		let result = StateMachine::<_, H, Exec>::new(
368
			&proving_backend,
369
			overlay,
370
			exec,
371
			method,
372
			call_data,
373
			extensions,
374
			runtime_code,
375
			CallContext::Offchain,
376
		)
377
		.execute()?;
378

            
379
		let proof = proving_backend
380
			.extract_proof()
381
			.expect("A recorder was set and thus, a storage proof can be extracted; qed");
382

            
383
		Ok((result, proof))
384
	}
385

            
386
	/// Check execution proof, generated by `prove_execution` call.
387
	pub fn execution_proof_check<H, Exec>(
388
		root: H::Out,
389
		proof: StorageProof,
390
		overlay: &mut OverlayedChanges<H>,
391
		exec: &Exec,
392
		method: &str,
393
		call_data: &[u8],
394
		runtime_code: &RuntimeCode,
395
	) -> Result<Vec<u8>, Box<dyn Error>>
396
	where
397
		H: Hasher + 'static,
398
		Exec: CodeExecutor + Clone + 'static,
399
		H::Out: Ord + 'static + codec::Codec,
400
	{
401
		let trie_backend = create_proof_check_backend::<H>(root, proof)?;
402
		execution_proof_check_on_trie_backend::<_, _>(
403
			&trie_backend,
404
			overlay,
405
			exec,
406
			method,
407
			call_data,
408
			runtime_code,
409
		)
410
	}
411

            
412
	/// Check execution proof on proving backend, generated by `prove_execution` call.
413
	pub fn execution_proof_check_on_trie_backend<H, Exec>(
414
		trie_backend: &TrieBackend<MemoryDB<H>, H>,
415
		overlay: &mut OverlayedChanges<H>,
416
		exec: &Exec,
417
		method: &str,
418
		call_data: &[u8],
419
		runtime_code: &RuntimeCode,
420
	) -> Result<Vec<u8>, Box<dyn Error>>
421
	where
422
		H: Hasher,
423
		H::Out: Ord + 'static + codec::Codec,
424
		Exec: CodeExecutor + Clone + 'static,
425
	{
426
		StateMachine::<_, H, Exec>::new(
427
			trie_backend,
428
			overlay,
429
			exec,
430
			method,
431
			call_data,
432
			&mut Extensions::default(),
433
			runtime_code,
434
			CallContext::Offchain,
435
		)
436
		.execute()
437
	}
438

            
439
	/// Generate storage read proof.
440
	pub fn prove_read<B, H, I>(backend: B, keys: I) -> Result<StorageProof, Box<dyn Error>>
441
	where
442
		B: AsTrieBackend<H>,
443
		H: Hasher,
444
		H::Out: Ord + Codec,
445
		I: IntoIterator,
446
		I::Item: AsRef<[u8]>,
447
	{
448
		let trie_backend = backend.as_trie_backend();
449
		prove_read_on_trie_backend(trie_backend, keys)
450
	}
451

            
452
	/// State machine only allows a single level
453
	/// of child trie.
454
	pub const MAX_NESTED_TRIE_DEPTH: usize = 2;
455

            
456
	/// Multiple key value state.
457
	/// States are ordered by root storage key.
458
	#[derive(PartialEq, Eq, Clone)]
459
	pub struct KeyValueStates(pub Vec<KeyValueStorageLevel>);
460

            
461
	/// A key value state at any storage level.
462
	#[derive(PartialEq, Eq, Clone)]
463
	pub struct KeyValueStorageLevel {
464
		/// State root of the level, for
465
		/// top trie it is as an empty byte array.
466
		pub state_root: Vec<u8>,
467
		/// Storage of parents, empty for top root or
468
		/// when exporting (building proof).
469
		pub parent_storage_keys: Vec<Vec<u8>>,
470
		/// Pair of key and values from this state.
471
		pub key_values: Vec<(Vec<u8>, Vec<u8>)>,
472
	}
473

            
474
	impl<I> From<I> for KeyValueStates
475
	where
476
		I: IntoIterator<Item = (Vec<u8>, (Vec<(Vec<u8>, Vec<u8>)>, Vec<Vec<u8>>))>,
477
	{
478
		fn from(b: I) -> Self {
479
			let mut result = Vec::new();
480
			for (state_root, (key_values, storage_paths)) in b.into_iter() {
481
				result.push(KeyValueStorageLevel {
482
					state_root,
483
					key_values,
484
					parent_storage_keys: storage_paths,
485
				})
486
			}
487
			KeyValueStates(result)
488
		}
489
	}
490

            
491
	impl KeyValueStates {
492
		/// Return total number of key values in states.
493
		pub fn len(&self) -> usize {
494
			self.0.iter().fold(0, |nb, state| nb + state.key_values.len())
495
		}
496

            
497
		/// Update last keys accessed from this state.
498
		pub fn update_last_key(
499
			&self,
500
			stopped_at: usize,
501
			last: &mut SmallVec<[Vec<u8>; 2]>,
502
		) -> bool {
503
			if stopped_at == 0 || stopped_at > MAX_NESTED_TRIE_DEPTH {
504
				return false
505
			}
506
			match stopped_at {
507
				1 => {
508
					let top_last =
509
						self.0.get(0).and_then(|s| s.key_values.last().map(|kv| kv.0.clone()));
510
					if let Some(top_last) = top_last {
511
						match last.len() {
512
							0 => {
513
								last.push(top_last);
514
								return true
515
							},
516
							2 => {
517
								last.pop();
518
							},
519
							_ => (),
520
						}
521
						// update top trie access.
522
						last[0] = top_last;
523
						return true
524
					} else {
525
						// No change in top trie accesses.
526
						// Indicates end of reading of a child trie.
527
						last.truncate(1);
528
						return true
529
					}
530
				},
531
				2 => {
532
					let top_last =
533
						self.0.get(0).and_then(|s| s.key_values.last().map(|kv| kv.0.clone()));
534
					let child_last =
535
						self.0.last().and_then(|s| s.key_values.last().map(|kv| kv.0.clone()));
536

            
537
					if let Some(child_last) = child_last {
538
						if last.is_empty() {
539
							if let Some(top_last) = top_last {
540
								last.push(top_last)
541
							} else {
542
								return false
543
							}
544
						} else if let Some(top_last) = top_last {
545
							last[0] = top_last;
546
						}
547
						if last.len() == 2 {
548
							last.pop();
549
						}
550
						last.push(child_last);
551
						return true
552
					} else {
553
						// stopped at level 2 so child last is define.
554
						return false
555
					}
556
				},
557
				_ => (),
558
			}
559
			false
560
		}
561
	}
562

            
563
	/// Generate range storage read proof, with child tries
564
	/// content.
565
	/// A size limit is applied to the proof with the
566
	/// exception that `start_at` and its following element
567
	/// are always part of the proof.
568
	/// If a key different than `start_at` is a child trie root,
569
	/// the child trie content will be included in the proof.
570
	pub fn prove_range_read_with_child_with_size<B, H>(
571
		backend: B,
572
		size_limit: usize,
573
		start_at: &[Vec<u8>],
574
	) -> Result<(StorageProof, u32), Box<dyn Error>>
575
	where
576
		B: AsTrieBackend<H>,
577
		H: Hasher,
578
		H::Out: Ord + Codec,
579
	{
580
		let trie_backend = backend.as_trie_backend();
581
		prove_range_read_with_child_with_size_on_trie_backend(trie_backend, size_limit, start_at)
582
	}
583

            
584
	/// Generate range storage read proof, with child tries
585
	/// content.
586
	/// See `prove_range_read_with_child_with_size`.
587
	pub fn prove_range_read_with_child_with_size_on_trie_backend<S, H>(
588
		trie_backend: &TrieBackend<S, H>,
589
		size_limit: usize,
590
		start_at: &[Vec<u8>],
591
	) -> Result<(StorageProof, u32), Box<dyn Error>>
592
	where
593
		S: trie_backend_essence::TrieBackendStorage<H>,
594
		H: Hasher,
595
		H::Out: Ord + Codec,
596
	{
597
		if start_at.len() > MAX_NESTED_TRIE_DEPTH {
598
			return Err(Box::new("Invalid start of range."))
599
		}
600

            
601
		let recorder = sp_trie::recorder::Recorder::default();
602
		let proving_backend =
603
			TrieBackendBuilder::wrap(trie_backend).with_recorder(recorder.clone()).build();
604
		let mut count = 0;
605

            
606
		let mut child_roots = HashSet::new();
607
		let (mut child_key, mut start_at) = if start_at.len() == 2 {
608
			let storage_key = start_at.get(0).expect("Checked length.").clone();
609
			if let Some(state_root) = proving_backend
610
				.storage(&storage_key)
611
				.map_err(|e| Box::new(e) as Box<dyn Error>)?
612
			{
613
				child_roots.insert(state_root);
614
			} else {
615
				return Err(Box::new("Invalid range start child trie key."))
616
			}
617

            
618
			(Some(storage_key), start_at.get(1).cloned())
619
		} else {
620
			(None, start_at.get(0).cloned())
621
		};
622

            
623
		loop {
624
			let (child_info, depth) = if let Some(storage_key) = child_key.as_ref() {
625
				let storage_key = PrefixedStorageKey::new_ref(storage_key);
626
				(
627
					Some(match ChildType::from_prefixed_key(storage_key) {
628
						Some((ChildType::ParentKeyId, storage_key)) =>
629
							ChildInfo::new_default(storage_key),
630
						None => return Err(Box::new("Invalid range start child trie key.")),
631
					}),
632
					2,
633
				)
634
			} else {
635
				(None, 1)
636
			};
637

            
638
			let start_at_ref = start_at.as_ref().map(AsRef::as_ref);
639
			let mut switch_child_key = None;
640
			let mut iter = proving_backend
641
				.pairs(IterArgs {
642
					child_info,
643
					start_at: start_at_ref,
644
					start_at_exclusive: true,
645
					..IterArgs::default()
646
				})
647
				.map_err(|e| Box::new(e) as Box<dyn Error>)?;
648

            
649
			while let Some(item) = iter.next() {
650
				let (key, value) = item.map_err(|e| Box::new(e) as Box<dyn Error>)?;
651

            
652
				if depth < MAX_NESTED_TRIE_DEPTH &&
653
					sp_core::storage::well_known_keys::is_child_storage_key(key.as_slice())
654
				{
655
					count += 1;
656
					// do not add two child trie with same root
657
					if !child_roots.contains(value.as_slice()) {
658
						child_roots.insert(value);
659
						switch_child_key = Some(key);
660
						break
661
					}
662
				} else if recorder.estimate_encoded_size() <= size_limit {
663
					count += 1;
664
				} else {
665
					break
666
				}
667
			}
668

            
669
			let completed = iter.was_complete();
670

            
671
			if switch_child_key.is_none() {
672
				if depth == 1 {
673
					break
674
				} else if completed {
675
					start_at = child_key.take();
676
				} else {
677
					break
678
				}
679
			} else {
680
				child_key = switch_child_key;
681
				start_at = None;
682
			}
683
		}
684

            
685
		let proof = proving_backend
686
			.extract_proof()
687
			.expect("A recorder was set and thus, a storage proof can be extracted; qed");
688
		Ok((proof, count))
689
	}
690

            
691
	/// Generate range storage read proof.
692
	pub fn prove_range_read_with_size<B, H>(
693
		backend: B,
694
		child_info: Option<&ChildInfo>,
695
		prefix: Option<&[u8]>,
696
		size_limit: usize,
697
		start_at: Option<&[u8]>,
698
	) -> Result<(StorageProof, u32), Box<dyn Error>>
699
	where
700
		B: AsTrieBackend<H>,
701
		H: Hasher,
702
		H::Out: Ord + Codec,
703
	{
704
		let trie_backend = backend.as_trie_backend();
705
		prove_range_read_with_size_on_trie_backend(
706
			trie_backend,
707
			child_info,
708
			prefix,
709
			size_limit,
710
			start_at,
711
		)
712
	}
713

            
714
	/// Generate range storage read proof on an existing trie backend.
715
	pub fn prove_range_read_with_size_on_trie_backend<S, H>(
716
		trie_backend: &TrieBackend<S, H>,
717
		child_info: Option<&ChildInfo>,
718
		prefix: Option<&[u8]>,
719
		size_limit: usize,
720
		start_at: Option<&[u8]>,
721
	) -> Result<(StorageProof, u32), Box<dyn Error>>
722
	where
723
		S: trie_backend_essence::TrieBackendStorage<H>,
724
		H: Hasher,
725
		H::Out: Ord + Codec,
726
	{
727
		let recorder = sp_trie::recorder::Recorder::default();
728
		let proving_backend =
729
			TrieBackendBuilder::wrap(trie_backend).with_recorder(recorder.clone()).build();
730
		let mut count = 0;
731
		let iter = proving_backend
732
			// NOTE: Even though the loop below doesn't use these values
733
			//       this *must* fetch both the keys and the values so that
734
			//       the proof is correct.
735
			.pairs(IterArgs {
736
				child_info: child_info.cloned(),
737
				prefix,
738
				start_at,
739
				..IterArgs::default()
740
			})
741
			.map_err(|e| Box::new(e) as Box<dyn Error>)?;
742

            
743
		for item in iter {
744
			item.map_err(|e| Box::new(e) as Box<dyn Error>)?;
745
			if count == 0 || recorder.estimate_encoded_size() <= size_limit {
746
				count += 1;
747
			} else {
748
				break
749
			}
750
		}
751

            
752
		let proof = proving_backend
753
			.extract_proof()
754
			.expect("A recorder was set and thus, a storage proof can be extracted; qed");
755
		Ok((proof, count))
756
	}
757

            
758
	/// Generate child storage read proof.
759
	pub fn prove_child_read<B, H, I>(
760
		backend: B,
761
		child_info: &ChildInfo,
762
		keys: I,
763
	) -> Result<StorageProof, Box<dyn Error>>
764
	where
765
		B: AsTrieBackend<H>,
766
		H: Hasher,
767
		H::Out: Ord + Codec,
768
		I: IntoIterator,
769
		I::Item: AsRef<[u8]>,
770
	{
771
		let trie_backend = backend.as_trie_backend();
772
		prove_child_read_on_trie_backend(trie_backend, child_info, keys)
773
	}
774

            
775
	/// Generate storage read proof on pre-created trie backend.
776
	pub fn prove_read_on_trie_backend<S, H, I>(
777
		trie_backend: &TrieBackend<S, H>,
778
		keys: I,
779
	) -> Result<StorageProof, Box<dyn Error>>
780
	where
781
		S: trie_backend_essence::TrieBackendStorage<H>,
782
		H: Hasher,
783
		H::Out: Ord + Codec,
784
		I: IntoIterator,
785
		I::Item: AsRef<[u8]>,
786
	{
787
		let proving_backend =
788
			TrieBackendBuilder::wrap(trie_backend).with_recorder(Default::default()).build();
789
		for key in keys.into_iter() {
790
			proving_backend
791
				.storage(key.as_ref())
792
				.map_err(|e| Box::new(e) as Box<dyn Error>)?;
793
		}
794

            
795
		Ok(proving_backend
796
			.extract_proof()
797
			.expect("A recorder was set and thus, a storage proof can be extracted; qed"))
798
	}
799

            
800
	/// Generate storage read proof on pre-created trie backend.
801
	pub fn prove_child_read_on_trie_backend<S, H, I>(
802
		trie_backend: &TrieBackend<S, H>,
803
		child_info: &ChildInfo,
804
		keys: I,
805
	) -> Result<StorageProof, Box<dyn Error>>
806
	where
807
		S: trie_backend_essence::TrieBackendStorage<H>,
808
		H: Hasher,
809
		H::Out: Ord + Codec,
810
		I: IntoIterator,
811
		I::Item: AsRef<[u8]>,
812
	{
813
		let proving_backend =
814
			TrieBackendBuilder::wrap(trie_backend).with_recorder(Default::default()).build();
815
		for key in keys.into_iter() {
816
			proving_backend
817
				.child_storage(child_info, key.as_ref())
818
				.map_err(|e| Box::new(e) as Box<dyn Error>)?;
819
		}
820

            
821
		Ok(proving_backend
822
			.extract_proof()
823
			.expect("A recorder was set and thus, a storage proof can be extracted; qed"))
824
	}
825

            
826
	/// Check storage read proof, generated by `prove_read` call.
827
	pub fn read_proof_check<H, I>(
828
		root: H::Out,
829
		proof: StorageProof,
830
		keys: I,
831
	) -> Result<HashMap<Vec<u8>, Option<Vec<u8>>>, Box<dyn Error>>
832
	where
833
		H: Hasher + 'static,
834
		H::Out: Ord + Codec,
835
		I: IntoIterator,
836
		I::Item: AsRef<[u8]>,
837
	{
838
		let proving_backend = create_proof_check_backend::<H>(root, proof)?;
839
		let mut result = HashMap::new();
840
		for key in keys.into_iter() {
841
			let value = read_proof_check_on_proving_backend(&proving_backend, key.as_ref())?;
842
			result.insert(key.as_ref().to_vec(), value);
843
		}
844
		Ok(result)
845
	}
846

            
847
	/// Check storage range proof with child trie included, generated by
848
	/// `prove_range_read_with_child_with_size` call.
849
	///
850
	/// Returns key values contents and the depth of the pending state iteration
851
	/// (0 if completed).
852
	pub fn read_range_proof_check_with_child<H>(
853
		root: H::Out,
854
		proof: StorageProof,
855
		start_at: &[Vec<u8>],
856
	) -> Result<(KeyValueStates, usize), Box<dyn Error>>
857
	where
858
		H: Hasher + 'static,
859
		H::Out: Ord + Codec,
860
	{
861
		let proving_backend = create_proof_check_backend::<H>(root, proof)?;
862
		read_range_proof_check_with_child_on_proving_backend(&proving_backend, start_at)
863
	}
864

            
865
	/// Check child storage range proof, generated by `prove_range_read_with_size` call.
866
	pub fn read_range_proof_check<H>(
867
		root: H::Out,
868
		proof: StorageProof,
869
		child_info: Option<&ChildInfo>,
870
		prefix: Option<&[u8]>,
871
		count: Option<u32>,
872
		start_at: Option<&[u8]>,
873
	) -> Result<(Vec<(Vec<u8>, Vec<u8>)>, bool), Box<dyn Error>>
874
	where
875
		H: Hasher + 'static,
876
		H::Out: Ord + Codec,
877
	{
878
		let proving_backend = create_proof_check_backend::<H>(root, proof)?;
879
		read_range_proof_check_on_proving_backend(
880
			&proving_backend,
881
			child_info,
882
			prefix,
883
			count,
884
			start_at,
885
		)
886
	}
887

            
888
	/// Check child storage read proof, generated by `prove_child_read` call.
889
	pub fn read_child_proof_check<H, I>(
890
		root: H::Out,
891
		proof: StorageProof,
892
		child_info: &ChildInfo,
893
		keys: I,
894
	) -> Result<HashMap<Vec<u8>, Option<Vec<u8>>>, Box<dyn Error>>
895
	where
896
		H: Hasher + 'static,
897
		H::Out: Ord + Codec,
898
		I: IntoIterator,
899
		I::Item: AsRef<[u8]>,
900
	{
901
		let proving_backend = create_proof_check_backend::<H>(root, proof)?;
902
		let mut result = HashMap::new();
903
		for key in keys.into_iter() {
904
			let value = read_child_proof_check_on_proving_backend(
905
				&proving_backend,
906
				child_info,
907
				key.as_ref(),
908
			)?;
909
			result.insert(key.as_ref().to_vec(), value);
910
		}
911
		Ok(result)
912
	}
913

            
914
	/// Check storage read proof on pre-created proving backend.
915
	pub fn read_proof_check_on_proving_backend<H>(
916
		proving_backend: &TrieBackend<MemoryDB<H>, H>,
917
		key: &[u8],
918
	) -> Result<Option<Vec<u8>>, Box<dyn Error>>
919
	where
920
		H: Hasher,
921
		H::Out: Ord + Codec,
922
	{
923
		proving_backend.storage(key).map_err(|e| Box::new(e) as Box<dyn Error>)
924
	}
925

            
926
	/// Check child storage read proof on pre-created proving backend.
927
	pub fn read_child_proof_check_on_proving_backend<H>(
928
		proving_backend: &TrieBackend<MemoryDB<H>, H>,
929
		child_info: &ChildInfo,
930
		key: &[u8],
931
	) -> Result<Option<Vec<u8>>, Box<dyn Error>>
932
	where
933
		H: Hasher,
934
		H::Out: Ord + Codec,
935
	{
936
		proving_backend
937
			.child_storage(child_info, key)
938
			.map_err(|e| Box::new(e) as Box<dyn Error>)
939
	}
940

            
941
	/// Check storage range proof on pre-created proving backend.
942
	///
943
	/// Returns a vector with the read `key => value` pairs and a `bool` that is set to `true` when
944
	/// all `key => value` pairs could be read and no more are left.
945
	pub fn read_range_proof_check_on_proving_backend<H>(
946
		proving_backend: &TrieBackend<MemoryDB<H>, H>,
947
		child_info: Option<&ChildInfo>,
948
		prefix: Option<&[u8]>,
949
		count: Option<u32>,
950
		start_at: Option<&[u8]>,
951
	) -> Result<(Vec<(Vec<u8>, Vec<u8>)>, bool), Box<dyn Error>>
952
	where
953
		H: Hasher,
954
		H::Out: Ord + Codec,
955
	{
956
		let mut values = Vec::new();
957
		let mut iter = proving_backend
958
			.pairs(IterArgs {
959
				child_info: child_info.cloned(),
960
				prefix,
961
				start_at,
962
				stop_on_incomplete_database: true,
963
				..IterArgs::default()
964
			})
965
			.map_err(|e| Box::new(e) as Box<dyn Error>)?;
966

            
967
		while let Some(item) = iter.next() {
968
			let (key, value) = item.map_err(|e| Box::new(e) as Box<dyn Error>)?;
969
			values.push((key, value));
970
			if !count.as_ref().map_or(true, |c| (values.len() as u32) < *c) {
971
				break
972
			}
973
		}
974

            
975
		Ok((values, iter.was_complete()))
976
	}
977

            
978
	/// Check storage range proof on pre-created proving backend.
979
	///
980
	/// See `read_range_proof_check_with_child`.
981
	pub fn read_range_proof_check_with_child_on_proving_backend<H>(
982
		proving_backend: &TrieBackend<MemoryDB<H>, H>,
983
		start_at: &[Vec<u8>],
984
	) -> Result<(KeyValueStates, usize), Box<dyn Error>>
985
	where
986
		H: Hasher,
987
		H::Out: Ord + Codec,
988
	{
989
		let mut result = vec![KeyValueStorageLevel {
990
			state_root: Default::default(),
991
			key_values: Default::default(),
992
			parent_storage_keys: Default::default(),
993
		}];
994
		if start_at.len() > MAX_NESTED_TRIE_DEPTH {
995
			return Err(Box::new("Invalid start of range."))
996
		}
997

            
998
		let mut child_roots = HashSet::new();
999
		let (mut child_key, mut start_at) = if start_at.len() == 2 {
			let storage_key = start_at.get(0).expect("Checked length.").clone();
			let child_key = if let Some(state_root) = proving_backend
				.storage(&storage_key)
				.map_err(|e| Box::new(e) as Box<dyn Error>)?
			{
				child_roots.insert(state_root.clone());
				Some((storage_key, state_root))
			} else {
				return Err(Box::new("Invalid range start child trie key."))
			};
			(child_key, start_at.get(1).cloned())
		} else {
			(None, start_at.get(0).cloned())
		};
		let completed = loop {
			let (child_info, depth) = if let Some((storage_key, state_root)) = child_key.as_ref() {
				result.push(KeyValueStorageLevel {
					state_root: state_root.clone(),
					key_values: Default::default(),
					parent_storage_keys: Default::default(),
				});
				let storage_key = PrefixedStorageKey::new_ref(storage_key);
				(
					Some(match ChildType::from_prefixed_key(storage_key) {
						Some((ChildType::ParentKeyId, storage_key)) =>
							ChildInfo::new_default(storage_key),
						None => return Err(Box::new("Invalid range start child trie key.")),
					}),
					2,
				)
			} else {
				(None, 1)
			};
			let values = if child_info.is_some() {
				&mut result.last_mut().expect("Added above").key_values
			} else {
				&mut result[0].key_values
			};
			let start_at_ref = start_at.as_ref().map(AsRef::as_ref);
			let mut switch_child_key = None;
			let mut iter = proving_backend
				.pairs(IterArgs {
					child_info,
					start_at: start_at_ref,
					start_at_exclusive: true,
					stop_on_incomplete_database: true,
					..IterArgs::default()
				})
				.map_err(|e| Box::new(e) as Box<dyn Error>)?;
			while let Some(item) = iter.next() {
				let (key, value) = item.map_err(|e| Box::new(e) as Box<dyn Error>)?;
				values.push((key.to_vec(), value.to_vec()));
				if depth < MAX_NESTED_TRIE_DEPTH &&
					sp_core::storage::well_known_keys::is_child_storage_key(key.as_slice())
				{
					// Do not add two chid trie with same root.
					if !child_roots.contains(value.as_slice()) {
						child_roots.insert(value.clone());
						switch_child_key = Some((key, value));
						break
					}
				}
			}
			let completed = iter.was_complete();
			if switch_child_key.is_none() {
				if !completed {
					break depth
				}
				if depth == 1 {
					break 0
				} else {
					start_at = child_key.take().map(|entry| entry.0);
				}
			} else {
				child_key = switch_child_key;
				start_at = None;
			}
		};
		Ok((KeyValueStates(result), completed))
	}
}
#[cfg(test)]
mod tests {
	use super::{backend::AsTrieBackend, ext::Ext, *};
	use crate::{execution::CallResult, in_memory_backend::new_in_mem};
	use assert_matches::assert_matches;
	use codec::Encode;
	use sp_core::{
		map,
		storage::{ChildInfo, StateVersion},
		traits::{CallContext, CodeExecutor, Externalities, RuntimeCode},
		H256,
	};
	use sp_runtime::traits::BlakeTwo256;
	use sp_trie::{
		trie_types::{TrieDBMutBuilderV0, TrieDBMutBuilderV1},
		KeySpacedDBMut, PrefixedMemoryDB,
	};
	use std::collections::{BTreeMap, HashMap};
	#[derive(Clone)]
	struct DummyCodeExecutor {
		native_available: bool,
		native_succeeds: bool,
		fallback_succeeds: bool,
	}
	impl CodeExecutor for DummyCodeExecutor {
		type Error = u8;
		fn call(
			&self,
			ext: &mut dyn Externalities,
			_: &RuntimeCode,
			_method: &str,
			_data: &[u8],
			_: CallContext,
		) -> (CallResult<Self::Error>, bool) {
			let using_native = self.native_available;
			match (using_native, self.native_succeeds, self.fallback_succeeds) {
				(true, true, _) | (false, _, true) => (
					Ok(vec![
						ext.storage(b"value1").unwrap()[0] + ext.storage(b"value2").unwrap()[0],
					]),
					using_native,
				),
				_ => (Err(0), using_native),
			}
		}
	}
	impl sp_core::traits::ReadRuntimeVersion for DummyCodeExecutor {
		fn read_runtime_version(
			&self,
			_: &[u8],
			_: &mut dyn Externalities,
		) -> std::result::Result<Vec<u8>, String> {
			unimplemented!("Not required in tests.")
		}
	}
	#[test]
	fn execute_works() {
		execute_works_inner(StateVersion::V0);
		execute_works_inner(StateVersion::V1);
	}
	fn execute_works_inner(state_version: StateVersion) {
		let backend = trie_backend::tests::test_trie(state_version, None, None);
		let mut overlayed_changes = Default::default();
		let wasm_code = RuntimeCode::empty();
		let mut execution_extensions = &mut Default::default();
		let mut state_machine = StateMachine::new(
			&backend,
			&mut overlayed_changes,
			&DummyCodeExecutor {
				native_available: true,
				native_succeeds: true,
				fallback_succeeds: true,
			},
			"test",
			&[],
			&mut execution_extensions,
			&wasm_code,
			CallContext::Offchain,
		);
		assert_eq!(state_machine.execute().unwrap(), vec![66]);
	}
	#[test]
	fn execute_works_with_native_else_wasm() {
		execute_works_with_native_else_wasm_inner(StateVersion::V0);
		execute_works_with_native_else_wasm_inner(StateVersion::V1);
	}
	fn execute_works_with_native_else_wasm_inner(state_version: StateVersion) {
		let backend = trie_backend::tests::test_trie(state_version, None, None);
		let mut overlayed_changes = Default::default();
		let wasm_code = RuntimeCode::empty();
		let mut execution_extensions = &mut Default::default();
		let mut state_machine = StateMachine::new(
			&backend,
			&mut overlayed_changes,
			&DummyCodeExecutor {
				native_available: true,
				native_succeeds: true,
				fallback_succeeds: true,
			},
			"test",
			&[],
			&mut execution_extensions,
			&wasm_code,
			CallContext::Offchain,
		);
		assert_eq!(state_machine.execute().unwrap(), vec![66]);
	}
	#[test]
	fn prove_execution_and_proof_check_works() {
		prove_execution_and_proof_check_works_inner(StateVersion::V0);
		prove_execution_and_proof_check_works_inner(StateVersion::V1);
	}
	fn prove_execution_and_proof_check_works_inner(state_version: StateVersion) {
		let executor = DummyCodeExecutor {
			native_available: true,
			native_succeeds: true,
			fallback_succeeds: true,
		};
		// fetch execution proof from 'remote' full node
		let mut remote_backend = trie_backend::tests::test_trie(state_version, None, None);
		let remote_root = remote_backend.storage_root(std::iter::empty(), state_version).0;
		let (remote_result, remote_proof) = prove_execution(
			&mut remote_backend,
			&mut Default::default(),
			&executor,
			"test",
			&[],
			&RuntimeCode::empty(),
		)
		.unwrap();
		// check proof locally
		let local_result = execution_proof_check::<BlakeTwo256, _>(
			remote_root,
			remote_proof,
			&mut Default::default(),
			&executor,
			"test",
			&[],
			&RuntimeCode::empty(),
		)
		.unwrap();
		// check that both results are correct
		assert_eq!(remote_result, vec![66]);
		assert_eq!(remote_result, local_result);
	}
	#[test]
	fn clear_prefix_in_ext_works() {
		let initial: BTreeMap<_, _> = map![
			b"aaa".to_vec() => b"0".to_vec(),
			b"abb".to_vec() => b"1".to_vec(),
			b"abc".to_vec() => b"2".to_vec(),
			b"bbb".to_vec() => b"3".to_vec()
		];
		let state = InMemoryBackend::<BlakeTwo256>::from((initial, StateVersion::default()));
		let backend = state.as_trie_backend();
		let mut overlay = OverlayedChanges::default();
		overlay.set_storage(b"aba".to_vec(), Some(b"1312".to_vec()));
		overlay.set_storage(b"bab".to_vec(), Some(b"228".to_vec()));
		overlay.start_transaction();
		overlay.set_storage(b"abd".to_vec(), Some(b"69".to_vec()));
		overlay.set_storage(b"bbd".to_vec(), Some(b"42".to_vec()));
		let overlay_limit = overlay.clone();
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			let _ = ext.clear_prefix(b"ab", None, None);
		}
		overlay.commit_transaction().unwrap();
		assert_eq!(
			overlay
				.changes_mut()
				.map(|(k, v)| (k.clone(), v.value().cloned()))
				.collect::<HashMap<_, _>>(),
			map![
				b"abc".to_vec() => None,
				b"abb".to_vec() => None,
				b"aba".to_vec() => None,
				b"abd".to_vec() => None,
				b"bab".to_vec() => Some(b"228".to_vec()),
				b"bbd".to_vec() => Some(b"42".to_vec())
			],
		);
		let mut overlay = overlay_limit;
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			assert_matches!(
				ext.clear_prefix(b"ab", Some(1), None).deconstruct(),
				(Some(_), 1, 3, 1)
			);
		}
		overlay.commit_transaction().unwrap();
		assert_eq!(
			overlay
				.changes_mut()
				.map(|(k, v)| (k.clone(), v.value().cloned()))
				.collect::<HashMap<_, _>>(),
			map![
				b"abb".to_vec() => None,
				b"aba".to_vec() => None,
				b"abd".to_vec() => None,
				b"bab".to_vec() => Some(b"228".to_vec()),
				b"bbd".to_vec() => Some(b"42".to_vec())
			],
		);
	}
	#[test]
	fn limited_child_kill_works() {
		let child_info = ChildInfo::new_default(b"sub1");
		let initial: HashMap<_, BTreeMap<_, _>> = map![
			Some(child_info.clone()) => map![
				b"a".to_vec() => b"0".to_vec(),
				b"b".to_vec() => b"1".to_vec(),
				b"c".to_vec() => b"2".to_vec(),
				b"d".to_vec() => b"3".to_vec()
			],
		];
		let backend = InMemoryBackend::<BlakeTwo256>::from((initial, StateVersion::default()));
		let mut overlay = OverlayedChanges::default();
		overlay.set_child_storage(&child_info, b"1".to_vec(), Some(b"1312".to_vec()));
		overlay.set_child_storage(&child_info, b"2".to_vec(), Some(b"1312".to_vec()));
		overlay.set_child_storage(&child_info, b"3".to_vec(), Some(b"1312".to_vec()));
		overlay.set_child_storage(&child_info, b"4".to_vec(), Some(b"1312".to_vec()));
		{
			let mut ext = Ext::new(&mut overlay, &backend, None);
			let r = ext.kill_child_storage(&child_info, Some(2), None);
			assert_matches!(r.deconstruct(), (Some(_), 2, 6, 2));
		}
		assert_eq!(
			overlay
				.children_mut()
				.flat_map(|(iter, _child_info)| iter)
				.map(|(k, v)| (k.clone(), v.value()))
				.collect::<BTreeMap<_, _>>(),
			map![
				b"1".to_vec() => None,
				b"2".to_vec() => None,
				b"3".to_vec() => None,
				b"4".to_vec() => None,
				b"a".to_vec() => None,
				b"b".to_vec() => None,
			],
		);
	}
	#[test]
	fn limited_child_kill_off_by_one_works() {
		let child_info = ChildInfo::new_default(b"sub1");
		let initial: HashMap<_, BTreeMap<_, _>> = map![
			Some(child_info.clone()) => map![
				b"a".to_vec() => b"0".to_vec(),
				b"b".to_vec() => b"1".to_vec(),
				b"c".to_vec() => b"2".to_vec(),
				b"d".to_vec() => b"3".to_vec()
			],
		];
		let backend = InMemoryBackend::<BlakeTwo256>::from((initial, StateVersion::default()));
		let mut overlay = OverlayedChanges::default();
		let mut ext = Ext::new(&mut overlay, &backend, None);
		let r = ext.kill_child_storage(&child_info, Some(0), None).deconstruct();
		assert_matches!(r, (Some(_), 0, 0, 0));
		let r = ext
			.kill_child_storage(&child_info, Some(1), r.0.as_ref().map(|x| &x[..]))
			.deconstruct();
		assert_matches!(r, (Some(_), 1, 1, 1));
		let r = ext
			.kill_child_storage(&child_info, Some(4), r.0.as_ref().map(|x| &x[..]))
			.deconstruct();
		// Only 3 items remaining to remove
		assert_matches!(r, (None, 3, 3, 3));
		let r = ext.kill_child_storage(&child_info, Some(1), None).deconstruct();
		assert_matches!(r, (Some(_), 0, 0, 1));
	}
	#[test]
	fn limited_child_kill_off_by_one_works_without_limit() {
		let child_info = ChildInfo::new_default(b"sub1");
		let initial: HashMap<_, BTreeMap<_, _>> = map![
			Some(child_info.clone()) => map![
				b"a".to_vec() => b"0".to_vec(),
				b"b".to_vec() => b"1".to_vec(),
				b"c".to_vec() => b"2".to_vec(),
				b"d".to_vec() => b"3".to_vec()
			],
		];
		let backend = InMemoryBackend::<BlakeTwo256>::from((initial, StateVersion::default()));
		let mut overlay = OverlayedChanges::default();
		let mut ext = Ext::new(&mut overlay, &backend, None);
		assert_eq!(ext.kill_child_storage(&child_info, None, None).deconstruct(), (None, 4, 4, 4));
	}
	#[test]
	fn set_child_storage_works() {
		let child_info = ChildInfo::new_default(b"sub1");
		let child_info = &child_info;
		let state = new_in_mem::<BlakeTwo256>();
		let backend = state.as_trie_backend();
		let mut overlay = OverlayedChanges::default();
		let mut ext = Ext::new(&mut overlay, backend, None);
		ext.set_child_storage(child_info, b"abc".to_vec(), b"def".to_vec());
		assert_eq!(ext.child_storage(child_info, b"abc"), Some(b"def".to_vec()));
		let _ = ext.kill_child_storage(child_info, None, None);
		assert_eq!(ext.child_storage(child_info, b"abc"), None);
	}
	#[test]
	fn append_storage_works() {
		let reference_data = vec![b"data1".to_vec(), b"2".to_vec(), b"D3".to_vec(), b"d4".to_vec()];
		let key = b"key".to_vec();
		let state = new_in_mem::<BlakeTwo256>();
		let backend = state.as_trie_backend();
		let mut overlay = OverlayedChanges::default();
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			ext.storage_append(key.clone(), reference_data[0].encode());
			assert_eq!(ext.storage(key.as_slice()), Some(vec![reference_data[0].clone()].encode()));
		}
		overlay.start_transaction();
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			for i in reference_data.iter().skip(1) {
				ext.storage_append(key.clone(), i.encode());
			}
			assert_eq!(ext.storage(key.as_slice()), Some(reference_data.encode()));
		}
		overlay.rollback_transaction().unwrap();
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			assert_eq!(ext.storage(key.as_slice()), Some(vec![reference_data[0].clone()].encode()));
		}
	}
	// Test that we can append twice to a key, then perform a remove operation.
	// The test checks specifically that the append is merged with its parent transaction
	// on commit.
	#[test]
	fn commit_merges_append_with_parent() {
		#[derive(codec::Encode, codec::Decode)]
		enum Item {
			Item1,
			Item2,
		}
		let key = b"events".to_vec();
		let state = new_in_mem::<BlakeTwo256>();
		let backend = state.as_trie_backend();
		let mut overlay = OverlayedChanges::default();
		// Append first item
		overlay.start_transaction();
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			ext.clear_storage(key.as_slice());
			ext.storage_append(key.clone(), Item::Item1.encode());
		}
		// Append second item
		overlay.start_transaction();
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			assert_eq!(ext.storage(key.as_slice()), Some(vec![Item::Item1].encode()));
			ext.storage_append(key.clone(), Item::Item2.encode());
			assert_eq!(ext.storage(key.as_slice()), Some(vec![Item::Item1, Item::Item2].encode()),);
		}
		// Remove item
		overlay.start_transaction();
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			ext.place_storage(key.clone(), None);
			assert_eq!(ext.storage(key.as_slice()), None);
		}
		// Remove gets commited and merged into previous transaction
		overlay.commit_transaction().unwrap();
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			assert_eq!(ext.storage(key.as_slice()), None,);
		}
		// Remove gets rolled back, we should see the initial append again.
		overlay.rollback_transaction().unwrap();
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			assert_eq!(ext.storage(key.as_slice()), Some(vec![Item::Item1].encode()));
		}
		overlay.commit_transaction().unwrap();
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			assert_eq!(ext.storage(key.as_slice()), Some(vec![Item::Item1].encode()));
		}
	}
	#[test]
	fn remove_with_append_then_rollback_appended_then_append_again() {
		#[derive(codec::Encode, codec::Decode)]
		enum Item {
			InitializationItem,
			DiscardedItem,
			CommittedItem,
		}
		let key = b"events".to_vec();
		let state = new_in_mem::<BlakeTwo256>();
		let backend = state.as_trie_backend();
		let mut overlay = OverlayedChanges::default();
		// For example, block initialization with event.
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			ext.clear_storage(key.as_slice());
			ext.storage_append(key.clone(), Item::InitializationItem.encode());
		}
		overlay.start_transaction();
		// For example, first transaction resulted in panic during block building
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			assert_eq!(ext.storage(key.as_slice()), Some(vec![Item::InitializationItem].encode()));
			ext.storage_append(key.clone(), Item::DiscardedItem.encode());
			assert_eq!(
				ext.storage(key.as_slice()),
				Some(vec![Item::InitializationItem, Item::DiscardedItem].encode()),
			);
		}
		overlay.rollback_transaction().unwrap();
		// Then we apply next transaction which is valid this time.
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			assert_eq!(ext.storage(key.as_slice()), Some(vec![Item::InitializationItem].encode()));
			ext.storage_append(key.clone(), Item::CommittedItem.encode());
			assert_eq!(
				ext.storage(key.as_slice()),
				Some(vec![Item::InitializationItem, Item::CommittedItem].encode()),
			);
		}
		overlay.start_transaction();
		// Then only initialization item and second (committed) item should persist.
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			assert_eq!(
				ext.storage(key.as_slice()),
				Some(vec![Item::InitializationItem, Item::CommittedItem].encode()),
			);
		}
	}
	fn test_compact(remote_proof: StorageProof, remote_root: &sp_core::H256) -> StorageProof {
		let compact_remote_proof =
			remote_proof.into_compact_proof::<BlakeTwo256>(*remote_root).unwrap();
		compact_remote_proof
			.to_storage_proof::<BlakeTwo256>(Some(remote_root))
			.unwrap()
			.0
	}
	#[test]
	fn prove_read_and_proof_check_works() {
		prove_read_and_proof_check_works_inner(StateVersion::V0);
		prove_read_and_proof_check_works_inner(StateVersion::V1);
	}
	fn prove_read_and_proof_check_works_inner(state_version: StateVersion) {
		let child_info = ChildInfo::new_default(b"sub1");
		let missing_child_info = ChildInfo::new_default(b"sub1sub2"); // key will include other child root to proof.
		let child_info = &child_info;
		let missing_child_info = &missing_child_info;
		// fetch read proof from 'remote' full node
		let remote_backend = trie_backend::tests::test_trie(state_version, None, None);
		let remote_root = remote_backend.storage_root(std::iter::empty(), state_version).0;
		let remote_proof = prove_read(remote_backend, &[b"value2"]).unwrap();
		let remote_proof = test_compact(remote_proof, &remote_root);
		// check proof locally
		let local_result1 =
			read_proof_check::<BlakeTwo256, _>(remote_root, remote_proof.clone(), &[b"value2"])
				.unwrap();
		let local_result2 =
			read_proof_check::<BlakeTwo256, _>(remote_root, remote_proof, &[&[0xff]]).is_ok();
		// check that results are correct
		assert_eq!(
			local_result1.into_iter().collect::<Vec<_>>(),
			vec![(b"value2".to_vec(), Some(vec![24]))],
		);
		assert_eq!(local_result2, false);
		// on child trie
		let remote_backend = trie_backend::tests::test_trie(state_version, None, None);
		let remote_root = remote_backend.storage_root(std::iter::empty(), state_version).0;
		let remote_proof = prove_child_read(remote_backend, child_info, &[b"value3"]).unwrap();
		let remote_proof = test_compact(remote_proof, &remote_root);
		let local_result1 = read_child_proof_check::<BlakeTwo256, _>(
			remote_root,
			remote_proof.clone(),
			child_info,
			&[b"value3"],
		)
		.unwrap();
		let local_result2 = read_child_proof_check::<BlakeTwo256, _>(
			remote_root,
			remote_proof.clone(),
			child_info,
			&[b"value2"],
		)
		.unwrap();
		let local_result3 = read_child_proof_check::<BlakeTwo256, _>(
			remote_root,
			remote_proof,
			missing_child_info,
			&[b"dummy"],
		)
		.unwrap();
		assert_eq!(
			local_result1.into_iter().collect::<Vec<_>>(),
			vec![(b"value3".to_vec(), Some(vec![142; 33]))],
		);
		assert_eq!(local_result2.into_iter().collect::<Vec<_>>(), vec![(b"value2".to_vec(), None)]);
		assert_eq!(local_result3.into_iter().collect::<Vec<_>>(), vec![(b"dummy".to_vec(), None)]);
	}
	#[test]
	fn child_read_compact_stress_test() {
		use rand::{rngs::SmallRng, RngCore, SeedableRng};
		let mut storage: HashMap<Option<ChildInfo>, BTreeMap<StorageKey, StorageValue>> =
			Default::default();
		let mut seed = [0; 32];
		for i in 0..50u32 {
			let mut child_infos = Vec::new();
			let seed_partial = &mut seed[0..4];
			seed_partial.copy_from_slice(&i.to_be_bytes()[..]);
			let mut rand = SmallRng::from_seed(seed);
			let nb_child_trie = rand.next_u32() as usize % 25;
			for _ in 0..nb_child_trie {
				let key_len = 1 + (rand.next_u32() % 10);
				let mut key = vec![0; key_len as usize];
				rand.fill_bytes(&mut key[..]);
				let child_info = ChildInfo::new_default(key.as_slice());
				let nb_item = 1 + rand.next_u32() % 25;
				let mut items = BTreeMap::new();
				for item in 0..nb_item {
					let key_len = 1 + (rand.next_u32() % 10);
					let mut key = vec![0; key_len as usize];
					rand.fill_bytes(&mut key[..]);
					let value = vec![item as u8; item as usize + 28];
					items.insert(key, value);
				}
				child_infos.push(child_info.clone());
				storage.insert(Some(child_info), items);
			}
			let trie: InMemoryBackend<BlakeTwo256> =
				(storage.clone(), StateVersion::default()).into();
			let trie_root = *trie.root();
			let backend = TrieBackendBuilder::wrap(&trie).with_recorder(Default::default()).build();
			let mut queries = Vec::new();
			for c in 0..(5 + nb_child_trie / 2) {
				// random existing query
				let child_info = if c < 5 {
					// 4 missing child trie
					let key_len = 1 + (rand.next_u32() % 10);
					let mut key = vec![0; key_len as usize];
					rand.fill_bytes(&mut key[..]);
					ChildInfo::new_default(key.as_slice())
				} else {
					child_infos[rand.next_u32() as usize % nb_child_trie].clone()
				};
				if let Some(values) = storage.get(&Some(child_info.clone())) {
					for _ in 0..(1 + values.len() / 2) {
						let ix = rand.next_u32() as usize % values.len();
						for (i, (key, value)) in values.iter().enumerate() {
							if i == ix {
								assert_eq!(
									&backend
										.child_storage(&child_info, key.as_slice())
										.unwrap()
										.unwrap(),
									value
								);
								queries.push((
									child_info.clone(),
									key.clone(),
									Some(value.clone()),
								));
								break
							}
						}
					}
				}
				for _ in 0..4 {
					let key_len = 1 + (rand.next_u32() % 10);
					let mut key = vec![0; key_len as usize];
					rand.fill_bytes(&mut key[..]);
					let result = backend.child_storage(&child_info, key.as_slice()).unwrap();
					queries.push((child_info.clone(), key, result));
				}
			}
			let storage_proof = backend.extract_proof().expect("Failed to extract proof");
			let remote_proof = test_compact(storage_proof, &trie_root);
			let proof_check =
				create_proof_check_backend::<BlakeTwo256>(trie_root, remote_proof).unwrap();
			for (child_info, key, expected) in queries {
				assert_eq!(
					proof_check.child_storage(&child_info, key.as_slice()).unwrap(),
					expected,
				);
			}
		}
	}
	#[test]
	fn prove_read_with_size_limit_works() {
		let state_version = StateVersion::V0;
		let remote_backend = trie_backend::tests::test_trie(state_version, None, None);
		let remote_root = remote_backend.storage_root(::std::iter::empty(), state_version).0;
		let (proof, count) =
			prove_range_read_with_size(remote_backend, None, None, 0, None).unwrap();
		// Always contains at least some nodes.
		assert_eq!(proof.to_memory_db::<BlakeTwo256>().drain().len(), 3);
		assert_eq!(count, 1);
		assert_eq!(proof.encoded_size(), 443);
		let remote_backend = trie_backend::tests::test_trie(state_version, None, None);
		let (proof, count) =
			prove_range_read_with_size(remote_backend, None, None, 800, Some(&[])).unwrap();
		assert_eq!(proof.to_memory_db::<BlakeTwo256>().drain().len(), 9);
		assert_eq!(count, 85);
		assert_eq!(proof.encoded_size(), 857);
		let (results, completed) = read_range_proof_check::<BlakeTwo256>(
			remote_root,
			proof.clone(),
			None,
			None,
			Some(count),
			None,
		)
		.unwrap();
		assert_eq!(results.len() as u32, count);
		assert_eq!(completed, false);
		// When checking without count limit, proof may actually contain extra values.
		let (results, completed) =
			read_range_proof_check::<BlakeTwo256>(remote_root, proof, None, None, None, None)
				.unwrap();
		assert_eq!(results.len() as u32, 101);
		assert_eq!(completed, false);
		let remote_backend = trie_backend::tests::test_trie(state_version, None, None);
		let (proof, count) =
			prove_range_read_with_size(remote_backend, None, None, 50000, Some(&[])).unwrap();
		assert_eq!(proof.to_memory_db::<BlakeTwo256>().drain().len(), 11);
		assert_eq!(count, 132);
		assert_eq!(proof.encoded_size(), 990);
		let (results, completed) =
			read_range_proof_check::<BlakeTwo256>(remote_root, proof, None, None, None, None)
				.unwrap();
		assert_eq!(results.len() as u32, count);
		assert_eq!(completed, true);
	}
	#[test]
	fn prove_read_with_size_limit_proof_size() {
		let mut root = H256::default();
		let mut mdb = PrefixedMemoryDB::<BlakeTwo256>::default();
		{
			let mut mdb = KeySpacedDBMut::new(&mut mdb, b"");
			let mut trie = TrieDBMutBuilderV1::new(&mut mdb, &mut root).build();
			trie.insert(b"value1", &[123; 1]).unwrap();
			trie.insert(b"value2", &[123; 10]).unwrap();
			trie.insert(b"value3", &[123; 100]).unwrap();
			trie.insert(b"value4", &[123; 1000]).unwrap();
		}
		let remote_backend: TrieBackend<PrefixedMemoryDB<BlakeTwo256>, BlakeTwo256> =
			TrieBackendBuilder::new(mdb, root)
				.with_optional_cache(None)
				.with_optional_recorder(None)
				.build();
		let (proof, count) =
			prove_range_read_with_size(remote_backend, None, None, 1000, None).unwrap();
		assert_eq!(proof.encoded_size(), 1267);
		assert_eq!(count, 3);
	}
	#[test]
	fn inner_state_versioning_switch_proofs() {
		let mut state_version = StateVersion::V0;
		let (mut mdb, mut root) = trie_backend::tests::test_db(state_version);
		{
			let mut trie = TrieDBMutBuilderV0::from_existing(&mut mdb, &mut root).build();
			trie.insert(b"foo", vec![1u8; 1_000].as_slice()) // big inner hash
				.expect("insert failed");
			trie.insert(b"foo2", vec![3u8; 16].as_slice()) // no inner hash
				.expect("insert failed");
			trie.insert(b"foo222", vec![5u8; 100].as_slice()) // inner hash
				.expect("insert failed");
		}
		let check_proof = |mdb, root, state_version| -> StorageProof {
			let remote_backend = TrieBackendBuilder::new(mdb, root).build();
			let remote_root = remote_backend.storage_root(std::iter::empty(), state_version).0;
			let remote_proof = prove_read(remote_backend, &[b"foo222"]).unwrap();
			// check proof locally
			let local_result1 =
				read_proof_check::<BlakeTwo256, _>(remote_root, remote_proof.clone(), &[b"foo222"])
					.unwrap();
			// check that results are correct
			assert_eq!(
				local_result1.into_iter().collect::<Vec<_>>(),
				vec![(b"foo222".to_vec(), Some(vec![5u8; 100]))],
			);
			remote_proof
		};
		let remote_proof = check_proof(mdb.clone(), root, state_version);
		// check full values in proof
		assert!(remote_proof.encode().len() > 1_100);
		assert!(remote_proof.encoded_size() > 1_100);
		let root1 = root;
		// do switch
		state_version = StateVersion::V1;
		{
			let mut trie = TrieDBMutBuilderV1::from_existing(&mut mdb, &mut root).build();
			trie.insert(b"foo222", vec![5u8; 100].as_slice()) // inner hash
				.expect("insert failed");
			// update with same value do change
			trie.insert(b"foo", vec![1u8; 1000].as_slice()) // inner hash
				.expect("insert failed");
		}
		let root3 = root;
		assert!(root1 != root3);
		let remote_proof = check_proof(mdb.clone(), root, state_version);
		// nodes foo is replaced by its hashed value form.
		assert!(remote_proof.encode().len() < 1000);
		assert!(remote_proof.encoded_size() < 1000);
		assert_eq!(remote_proof.encode().len(), remote_proof.encoded_size());
	}
	#[test]
	fn prove_range_with_child_works() {
		let state_version = StateVersion::V0;
		let remote_backend = trie_backend::tests::test_trie(state_version, None, None);
		let remote_root = remote_backend.storage_root(std::iter::empty(), state_version).0;
		let mut start_at = smallvec::SmallVec::<[Vec<u8>; 2]>::new();
		let trie_backend = remote_backend.as_trie_backend();
		let max_iter = 1000;
		let mut nb_loop = 0;
		loop {
			nb_loop += 1;
			if max_iter == nb_loop {
				panic!("Too many loop in prove range");
			}
			let (proof, count) = prove_range_read_with_child_with_size_on_trie_backend(
				trie_backend,
				1,
				start_at.as_slice(),
			)
			.unwrap();
			// Always contains at least some nodes.
			assert!(proof.to_memory_db::<BlakeTwo256>().drain().len() > 0);
			assert!(count < 3); // when doing child we include parent and first child key.
			let (result, completed_depth) = read_range_proof_check_with_child::<BlakeTwo256>(
				remote_root,
				proof.clone(),
				start_at.as_slice(),
			)
			.unwrap();
			if completed_depth == 0 {
				break
			}
			assert!(result.update_last_key(completed_depth, &mut start_at));
		}
		assert_eq!(nb_loop, 10);
	}
	#[test]
	fn compact_multiple_child_trie() {
		let size_no_inner_hash = compact_multiple_child_trie_inner(StateVersion::V0);
		let size_inner_hash = compact_multiple_child_trie_inner(StateVersion::V1);
		assert!(size_inner_hash < size_no_inner_hash);
	}
	fn compact_multiple_child_trie_inner(state_version: StateVersion) -> usize {
		// this root will be queried
		let child_info1 = ChildInfo::new_default(b"sub1");
		// this root will not be include in proof
		let child_info2 = ChildInfo::new_default(b"sub2");
		// this root will be include in proof
		let child_info3 = ChildInfo::new_default(b"sub");
		let remote_backend = trie_backend::tests::test_trie(state_version, None, None);
		let long_vec: Vec<u8> = (0..1024usize).map(|_| 8u8).collect();
		let (remote_root, transaction) = remote_backend.full_storage_root(
			std::iter::empty(),
			vec![
				(
					&child_info1,
					vec![
						// a inner hashable node
						(&b"k"[..], Some(&long_vec[..])),
						// need to ensure this is not an inline node
						// otherwise we do not know what is accessed when
						// storing proof.
						(&b"key1"[..], Some(&vec![5u8; 32][..])),
						(&b"key2"[..], Some(&b"val3"[..])),
					]
					.into_iter(),
				),
				(
					&child_info2,
					vec![(&b"key3"[..], Some(&b"val4"[..])), (&b"key4"[..], Some(&b"val5"[..]))]
						.into_iter(),
				),
				(
					&child_info3,
					vec![(&b"key5"[..], Some(&b"val6"[..])), (&b"key6"[..], Some(&b"val7"[..]))]
						.into_iter(),
				),
			]
			.into_iter(),
			state_version,
		);
		let mut remote_storage = remote_backend.backend_storage().clone();
		remote_storage.consolidate(transaction);
		let remote_backend = TrieBackendBuilder::new(remote_storage, remote_root).build();
		let remote_proof = prove_child_read(remote_backend, &child_info1, &[b"key1"]).unwrap();
		let size = remote_proof.encoded_size();
		let remote_proof = test_compact(remote_proof, &remote_root);
		let local_result1 = read_child_proof_check::<BlakeTwo256, _>(
			remote_root,
			remote_proof,
			&child_info1,
			&[b"key1"],
		)
		.unwrap();
		assert_eq!(local_result1.len(), 1);
		assert_eq!(local_result1.get(&b"key1"[..]), Some(&Some(vec![5u8; 32])));
		size
	}
	#[test]
	fn child_storage_uuid() {
		let state_version = StateVersion::V0;
		let child_info_1 = ChildInfo::new_default(b"sub_test1");
		let child_info_2 = ChildInfo::new_default(b"sub_test2");
		use crate::trie_backend::tests::test_trie;
		let mut overlay = OverlayedChanges::default();
		let mut transaction = {
			let backend = test_trie(state_version, None, None);
			let mut ext = Ext::new(&mut overlay, &backend, None);
			ext.set_child_storage(&child_info_1, b"abc".to_vec(), b"def".to_vec());
			ext.set_child_storage(&child_info_2, b"abc".to_vec(), b"def".to_vec());
			ext.storage_root(state_version);
			overlay.drain_storage_changes(&backend, state_version).unwrap().transaction
		};
		let mut duplicate = false;
		for (k, (value, rc)) in transaction.drain().iter() {
			// look for a key inserted twice: transaction rc is 2
			if *rc == 2 {
				duplicate = true;
				println!("test duplicate for {:?} {:?}", k, value);
			}
		}
		assert!(!duplicate);
	}
	#[test]
	fn set_storage_empty_allowed() {
		let initial: BTreeMap<_, _> = map![
			b"aaa".to_vec() => b"0".to_vec(),
			b"bbb".to_vec() => b"".to_vec()
		];
		let state = InMemoryBackend::<BlakeTwo256>::from((initial, StateVersion::default()));
		let backend = state.as_trie_backend();
		let mut overlay = OverlayedChanges::default();
		overlay.start_transaction();
		overlay.set_storage(b"ccc".to_vec(), Some(b"".to_vec()));
		assert_eq!(overlay.storage(b"ccc"), Some(Some(&[][..])));
		overlay.commit_transaction().unwrap();
		overlay.start_transaction();
		assert_eq!(overlay.storage(b"ccc"), Some(Some(&[][..])));
		assert_eq!(overlay.storage(b"bbb"), None);
		{
			let mut ext = Ext::new(&mut overlay, backend, None);
			assert_eq!(ext.storage(b"bbb"), Some(vec![]));
			assert_eq!(ext.storage(b"ccc"), Some(vec![]));
			ext.clear_storage(b"ccc");
			assert_eq!(ext.storage(b"ccc"), None);
		}
		overlay.commit_transaction().unwrap();
		assert_eq!(overlay.storage(b"ccc"), Some(None));
	}
}