Files
nanoreth/crates/trie/db/tests/trie.rs

757 lines
29 KiB
Rust

#![allow(missing_docs)]
use alloy_consensus::EMPTY_ROOT_HASH;
use alloy_primitives::{hex_literal::hex, keccak256, map::HashMap, Address, B256, U256};
use alloy_rlp::Encodable;
use proptest::{prelude::ProptestConfig, proptest};
use proptest_arbitrary_interop::arb;
use reth_db::{tables, test_utils::TempDatabase, DatabaseEnv};
use reth_db_api::{
cursor::{DbCursorRO, DbCursorRW, DbDupCursorRO},
transaction::{DbTx, DbTxMut},
};
use reth_primitives_traits::{Account, StorageEntry};
use reth_provider::{
providers::ProviderNodeTypes, test_utils::create_test_provider_factory, DatabaseProviderRW,
StorageTrieWriter, TrieWriter,
};
use reth_trie::{
prefix_set::{PrefixSetMut, TriePrefixSets},
test_utils::{state_root, state_root_prehashed, storage_root, storage_root_prehashed},
triehash::KeccakHasher,
updates::StorageTrieUpdates,
BranchNodeCompact, HashBuilder, IntermediateStateRootState, Nibbles, StateRoot,
StateRootProgress, StorageRoot, TrieMask,
};
use reth_trie_db::{DatabaseStateRoot, DatabaseStorageRoot};
use std::{collections::BTreeMap, ops::Mul, str::FromStr, sync::Arc};
fn insert_account(
tx: &impl DbTxMut,
address: Address,
account: Account,
storage: &BTreeMap<B256, U256>,
) {
let hashed_address = keccak256(address);
tx.put::<tables::HashedAccounts>(hashed_address, account).unwrap();
insert_storage(tx, hashed_address, storage);
}
fn insert_storage(tx: &impl DbTxMut, hashed_address: B256, storage: &BTreeMap<B256, U256>) {
for (k, v) in storage {
tx.put::<tables::HashedStorages>(
hashed_address,
StorageEntry { key: keccak256(k), value: *v },
)
.unwrap();
}
}
fn incremental_vs_full_root(inputs: &[&str], modified: &str) {
let factory = create_test_provider_factory();
let tx = factory.provider_rw().unwrap();
let hashed_address = B256::with_last_byte(1);
let mut hashed_storage_cursor =
tx.tx_ref().cursor_dup_write::<tables::HashedStorages>().unwrap();
let data = inputs.iter().map(|x| B256::from_str(x).unwrap());
let value = U256::from(0);
for key in data {
hashed_storage_cursor.upsert(hashed_address, &StorageEntry { key, value }).unwrap();
}
// Generate the intermediate nodes on the receiving end of the channel
let (_, _, trie_updates) =
StorageRoot::from_tx_hashed(tx.tx_ref(), hashed_address).root_with_updates().unwrap();
// 1. Some state transition happens, update the hashed storage to the new value
let modified_key = B256::from_str(modified).unwrap();
let value = U256::from(1);
if hashed_storage_cursor.seek_by_key_subkey(hashed_address, modified_key).unwrap().is_some() {
hashed_storage_cursor.delete_current().unwrap();
}
hashed_storage_cursor
.upsert(hashed_address, &StorageEntry { key: modified_key, value })
.unwrap();
// 2. Calculate full merkle root
let loader = StorageRoot::from_tx_hashed(tx.tx_ref(), hashed_address);
let modified_root = loader.root().unwrap();
// Update the intermediate roots table so that we can run the incremental verification
tx.write_individual_storage_trie_updates(hashed_address, &trie_updates).unwrap();
// 3. Calculate the incremental root
let mut storage_changes = PrefixSetMut::default();
storage_changes.insert(Nibbles::unpack(modified_key));
let loader = StorageRoot::from_tx_hashed(tx.tx_ref(), hashed_address)
.with_prefix_set(storage_changes.freeze());
let incremental_root = loader.root().unwrap();
assert_eq!(modified_root, incremental_root);
}
#[test]
fn branch_node_child_changes() {
incremental_vs_full_root(
&[
"1000000000000000000000000000000000000000000000000000000000000000",
"1100000000000000000000000000000000000000000000000000000000000000",
"1110000000000000000000000000000000000000000000000000000000000000",
"1200000000000000000000000000000000000000000000000000000000000000",
"1220000000000000000000000000000000000000000000000000000000000000",
"1320000000000000000000000000000000000000000000000000000000000000",
],
"1200000000000000000000000000000000000000000000000000000000000000",
);
}
#[test]
fn arbitrary_storage_root() {
proptest!(ProptestConfig::with_cases(10), |(item in arb::<(Address, std::collections::BTreeMap<B256, U256>)>())| {
let (address, storage) = item;
let hashed_address = keccak256(address);
let factory = create_test_provider_factory();
let tx = factory.provider_rw().unwrap();
for (key, value) in &storage {
tx.tx_ref().put::<tables::HashedStorages>(
hashed_address,
StorageEntry { key: keccak256(key), value: *value },
)
.unwrap();
}
tx.commit().unwrap();
let tx = factory.provider_rw().unwrap();
let got = StorageRoot::from_tx(tx.tx_ref(), address).root().unwrap();
let expected = storage_root(storage.into_iter());
assert_eq!(expected, got);
});
}
#[test]
// This ensures we dont add empty accounts to the trie
fn test_empty_account() {
let state: State = BTreeMap::from([
(
Address::random(),
(
Account { nonce: 0, balance: U256::from(0), bytecode_hash: None },
BTreeMap::from([(B256::with_last_byte(0x4), U256::from(12))]),
),
),
(
Address::random(),
(
Account { nonce: 0, balance: U256::from(0), bytecode_hash: None },
BTreeMap::default(),
),
),
(
Address::random(),
(
Account {
nonce: 155,
balance: U256::from(414241124u32),
bytecode_hash: Some(keccak256("test")),
},
BTreeMap::from([
(B256::ZERO, U256::from(3)),
(B256::with_last_byte(2), U256::from(1)),
]),
),
),
]);
test_state_root_with_state(state);
}
#[test]
// This ensures we return an empty root when there are no storage entries
fn test_empty_storage_root() {
let factory = create_test_provider_factory();
let tx = factory.provider_rw().unwrap();
let address = Address::random();
let code = "el buen fla";
let account = Account {
nonce: 155,
balance: U256::from(414241124u32),
bytecode_hash: Some(keccak256(code)),
};
insert_account(tx.tx_ref(), address, account, &Default::default());
tx.commit().unwrap();
let tx = factory.provider_rw().unwrap();
let got = StorageRoot::from_tx(tx.tx_ref(), address).root().unwrap();
assert_eq!(got, EMPTY_ROOT_HASH);
}
#[test]
// This ensures that the walker goes over all the storage slots
fn test_storage_root() {
let factory = create_test_provider_factory();
let tx = factory.provider_rw().unwrap();
let address = Address::random();
let storage =
BTreeMap::from([(B256::ZERO, U256::from(3)), (B256::with_last_byte(2), U256::from(1))]);
let code = "el buen fla";
let account = Account {
nonce: 155,
balance: U256::from(414241124u32),
bytecode_hash: Some(keccak256(code)),
};
insert_account(tx.tx_ref(), address, account, &storage);
tx.commit().unwrap();
let tx = factory.provider_rw().unwrap();
let got = StorageRoot::from_tx(tx.tx_ref(), address).root().unwrap();
assert_eq!(storage_root(storage.into_iter()), got);
}
type State = BTreeMap<Address, (Account, BTreeMap<B256, U256>)>;
#[test]
fn arbitrary_state_root() {
proptest!(
ProptestConfig::with_cases(10), | (state in arb::<State>()) | {
test_state_root_with_state(state);
}
);
}
#[test]
fn arbitrary_state_root_with_progress() {
proptest!(
ProptestConfig::with_cases(10), | (state in arb::<State>()) | {
let hashed_entries_total = state.len() +
state.values().map(|(_, slots)| slots.len()).sum::<usize>();
let factory = create_test_provider_factory();
let tx = factory.provider_rw().unwrap();
for (address, (account, storage)) in &state {
insert_account(tx.tx_ref(), *address, *account, storage)
}
tx.commit().unwrap();
let tx = factory.provider_rw().unwrap();
let expected = state_root(state);
let threshold = 10;
let mut got = None;
let mut hashed_entries_walked = 0;
let mut intermediate_state: Option<Box<IntermediateStateRootState>> = None;
while got.is_none() {
let calculator = StateRoot::from_tx(tx.tx_ref())
.with_threshold(threshold)
.with_intermediate_state(intermediate_state.take().map(|state| *state));
match calculator.root_with_progress().unwrap() {
StateRootProgress::Progress(state, walked, _) => {
intermediate_state = Some(state);
hashed_entries_walked += walked;
},
StateRootProgress::Complete(root, walked, _) => {
got = Some(root);
hashed_entries_walked += walked;
},
};
}
assert_eq!(expected, got.unwrap());
assert_eq!(hashed_entries_total, hashed_entries_walked)
}
);
}
fn test_state_root_with_state(state: State) {
let factory = create_test_provider_factory();
let tx = factory.provider_rw().unwrap();
for (address, (account, storage)) in &state {
insert_account(tx.tx_ref(), *address, *account, storage)
}
tx.commit().unwrap();
let expected = state_root(state);
let tx = factory.provider_rw().unwrap();
let got = StateRoot::from_tx(tx.tx_ref()).root().unwrap();
assert_eq!(expected, got);
}
fn encode_account(account: Account, storage_root: Option<B256>) -> Vec<u8> {
let account = account.into_trie_account(storage_root.unwrap_or(EMPTY_ROOT_HASH));
let mut account_rlp = Vec::with_capacity(account.length());
account.encode(&mut account_rlp);
account_rlp
}
#[test]
fn storage_root_regression() {
let factory = create_test_provider_factory();
let tx = factory.provider_rw().unwrap();
// Some address whose hash starts with 0xB041
let address3 = Address::from_str("16b07afd1c635f77172e842a000ead9a2a222459").unwrap();
let key3 = keccak256(address3);
assert_eq!(key3[0], 0xB0);
assert_eq!(key3[1], 0x41);
let storage = BTreeMap::from(
[
("1200000000000000000000000000000000000000000000000000000000000000", 0x42),
("1400000000000000000000000000000000000000000000000000000000000000", 0x01),
("3000000000000000000000000000000000000000000000000000000000E00000", 0x127a89),
("3000000000000000000000000000000000000000000000000000000000E00001", 0x05),
]
.map(|(slot, val)| (B256::from_str(slot).unwrap(), U256::from(val))),
);
let mut hashed_storage_cursor =
tx.tx_ref().cursor_dup_write::<tables::HashedStorages>().unwrap();
for (hashed_slot, value) in storage.clone() {
hashed_storage_cursor.upsert(key3, &StorageEntry { key: hashed_slot, value }).unwrap();
}
tx.commit().unwrap();
let tx = factory.provider_rw().unwrap();
let account3_storage_root = StorageRoot::from_tx(tx.tx_ref(), address3).root().unwrap();
let expected_root = storage_root_prehashed(storage);
assert_eq!(expected_root, account3_storage_root);
}
#[test]
fn account_and_storage_trie() {
let ether = U256::from(1e18);
let storage = BTreeMap::from(
[
("1200000000000000000000000000000000000000000000000000000000000000", 0x42),
("1400000000000000000000000000000000000000000000000000000000000000", 0x01),
("3000000000000000000000000000000000000000000000000000000000E00000", 0x127a89),
("3000000000000000000000000000000000000000000000000000000000E00001", 0x05),
]
.map(|(slot, val)| (B256::from_str(slot).unwrap(), U256::from(val))),
);
let factory = create_test_provider_factory();
let tx = factory.provider_rw().unwrap();
let mut hashed_account_cursor = tx.tx_ref().cursor_write::<tables::HashedAccounts>().unwrap();
let mut hashed_storage_cursor =
tx.tx_ref().cursor_dup_write::<tables::HashedStorages>().unwrap();
let mut hash_builder = HashBuilder::default();
// Insert first account
let key1 =
B256::from_str("b000000000000000000000000000000000000000000000000000000000000000").unwrap();
let account1 = Account { nonce: 0, balance: U256::from(3).mul(ether), bytecode_hash: None };
hashed_account_cursor.upsert(key1, &account1).unwrap();
hash_builder.add_leaf(Nibbles::unpack(key1), &encode_account(account1, None));
// Some address whose hash starts with 0xB040
let address2 = Address::from_str("7db3e81b72d2695e19764583f6d219dbee0f35ca").unwrap();
let key2 = keccak256(address2);
assert_eq!(key2[0], 0xB0);
assert_eq!(key2[1], 0x40);
let account2 = Account { nonce: 0, balance: ether, ..Default::default() };
hashed_account_cursor.upsert(key2, &account2).unwrap();
hash_builder.add_leaf(Nibbles::unpack(key2), &encode_account(account2, None));
// Some address whose hash starts with 0xB041
let address3 = Address::from_str("16b07afd1c635f77172e842a000ead9a2a222459").unwrap();
let key3 = keccak256(address3);
assert_eq!(key3[0], 0xB0);
assert_eq!(key3[1], 0x41);
let code_hash =
B256::from_str("5be74cad16203c4905c068b012a2e9fb6d19d036c410f16fd177f337541440dd").unwrap();
let account3 =
Account { nonce: 0, balance: U256::from(2).mul(ether), bytecode_hash: Some(code_hash) };
hashed_account_cursor.upsert(key3, &account3).unwrap();
for (hashed_slot, value) in storage {
if hashed_storage_cursor
.seek_by_key_subkey(key3, hashed_slot)
.unwrap()
.filter(|e| e.key == hashed_slot)
.is_some()
{
hashed_storage_cursor.delete_current().unwrap();
}
hashed_storage_cursor.upsert(key3, &StorageEntry { key: hashed_slot, value }).unwrap();
}
let account3_storage_root = StorageRoot::from_tx(tx.tx_ref(), address3).root().unwrap();
hash_builder
.add_leaf(Nibbles::unpack(key3), &encode_account(account3, Some(account3_storage_root)));
let key4a =
B256::from_str("B1A0000000000000000000000000000000000000000000000000000000000000").unwrap();
let account4a = Account { nonce: 0, balance: U256::from(4).mul(ether), ..Default::default() };
hashed_account_cursor.upsert(key4a, &account4a).unwrap();
hash_builder.add_leaf(Nibbles::unpack(key4a), &encode_account(account4a, None));
let key5 =
B256::from_str("B310000000000000000000000000000000000000000000000000000000000000").unwrap();
let account5 = Account { nonce: 0, balance: U256::from(8).mul(ether), ..Default::default() };
hashed_account_cursor.upsert(key5, &account5).unwrap();
hash_builder.add_leaf(Nibbles::unpack(key5), &encode_account(account5, None));
let key6 =
B256::from_str("B340000000000000000000000000000000000000000000000000000000000000").unwrap();
let account6 = Account { nonce: 0, balance: U256::from(1).mul(ether), ..Default::default() };
hashed_account_cursor.upsert(key6, &account6).unwrap();
hash_builder.add_leaf(Nibbles::unpack(key6), &encode_account(account6, None));
// Populate account & storage trie DB tables
let expected_root =
B256::from_str("72861041bc90cd2f93777956f058a545412b56de79af5eb6b8075fe2eabbe015").unwrap();
let computed_expected_root: B256 = triehash::trie_root::<KeccakHasher, _, _, _>([
(key1, encode_account(account1, None)),
(key2, encode_account(account2, None)),
(key3, encode_account(account3, Some(account3_storage_root))),
(key4a, encode_account(account4a, None)),
(key5, encode_account(account5, None)),
(key6, encode_account(account6, None)),
]);
// Check computed trie root to ensure correctness
assert_eq!(computed_expected_root, expected_root);
// Check hash builder root
assert_eq!(hash_builder.root(), computed_expected_root);
// Check state root calculation from scratch
let (root, trie_updates) = StateRoot::from_tx(tx.tx_ref()).root_with_updates().unwrap();
assert_eq!(root, computed_expected_root);
// Check account trie
let account_updates = trie_updates.into_sorted();
let account_updates = account_updates.account_nodes_ref();
assert_eq!(account_updates.len(), 2);
let (nibbles1a, node1a) = account_updates.first().unwrap();
assert_eq!(nibbles1a[..], [0xB]);
assert_eq!(node1a.state_mask, TrieMask::new(0b1011));
assert_eq!(node1a.tree_mask, TrieMask::new(0b0001));
assert_eq!(node1a.hash_mask, TrieMask::new(0b1001));
assert_eq!(node1a.root_hash, None);
assert_eq!(node1a.hashes.len(), 2);
let (nibbles2a, node2a) = account_updates.last().unwrap();
assert_eq!(nibbles2a[..], [0xB, 0x0]);
assert_eq!(node2a.state_mask, TrieMask::new(0b10001));
assert_eq!(node2a.tree_mask, TrieMask::new(0b00000));
assert_eq!(node2a.hash_mask, TrieMask::new(0b10000));
assert_eq!(node2a.root_hash, None);
assert_eq!(node2a.hashes.len(), 1);
// Add an account
// Some address whose hash starts with 0xB1
let address4b = Address::from_str("4f61f2d5ebd991b85aa1677db97307caf5215c91").unwrap();
let key4b = keccak256(address4b);
assert_eq!(key4b.0[0], key4a.0[0]);
let account4b = Account { nonce: 0, balance: U256::from(5).mul(ether), bytecode_hash: None };
hashed_account_cursor.upsert(key4b, &account4b).unwrap();
let mut prefix_set = PrefixSetMut::default();
prefix_set.insert(Nibbles::unpack(key4b));
let expected_state_root =
B256::from_str("8e263cd4eefb0c3cbbb14e5541a66a755cad25bcfab1e10dd9d706263e811b28").unwrap();
let (root, trie_updates) = StateRoot::from_tx(tx.tx_ref())
.with_prefix_sets(TriePrefixSets {
account_prefix_set: prefix_set.freeze(),
..Default::default()
})
.root_with_updates()
.unwrap();
assert_eq!(root, expected_state_root);
let account_updates = trie_updates.into_sorted();
let account_updates = account_updates.account_nodes_ref();
assert_eq!(account_updates.len(), 2);
let (nibbles1b, node1b) = account_updates.first().unwrap();
assert_eq!(nibbles1b[..], [0xB]);
assert_eq!(node1b.state_mask, TrieMask::new(0b1011));
assert_eq!(node1b.tree_mask, TrieMask::new(0b0001));
assert_eq!(node1b.hash_mask, TrieMask::new(0b1011));
assert_eq!(node1b.root_hash, None);
assert_eq!(node1b.hashes.len(), 3);
assert_eq!(node1a.hashes[0], node1b.hashes[0]);
assert_eq!(node1a.hashes[1], node1b.hashes[2]);
let (nibbles2b, node2b) = account_updates.last().unwrap();
assert_eq!(nibbles2b[..], [0xB, 0x0]);
assert_eq!(node2a, node2b);
tx.commit().unwrap();
{
let tx = factory.provider_rw().unwrap();
let mut hashed_account_cursor =
tx.tx_ref().cursor_write::<tables::HashedAccounts>().unwrap();
let account = hashed_account_cursor.seek_exact(key2).unwrap().unwrap();
hashed_account_cursor.delete_current().unwrap();
let mut account_prefix_set = PrefixSetMut::default();
account_prefix_set.insert(Nibbles::unpack(account.0));
let computed_expected_root: B256 = triehash::trie_root::<KeccakHasher, _, _, _>([
(key1, encode_account(account1, None)),
// DELETED: (key2, encode_account(account2, None)),
(key3, encode_account(account3, Some(account3_storage_root))),
(key4a, encode_account(account4a, None)),
(key4b, encode_account(account4b, None)),
(key5, encode_account(account5, None)),
(key6, encode_account(account6, None)),
]);
let (root, trie_updates) = StateRoot::from_tx(tx.tx_ref())
.with_prefix_sets(TriePrefixSets {
account_prefix_set: account_prefix_set.freeze(),
..Default::default()
})
.root_with_updates()
.unwrap();
assert_eq!(root, computed_expected_root);
assert_eq!(
trie_updates.account_nodes_ref().len() + trie_updates.removed_nodes_ref().len(),
1
);
assert_eq!(trie_updates.account_nodes_ref().len(), 1);
let (nibbles1c, node1c) = trie_updates.account_nodes_ref().iter().next().unwrap();
assert_eq!(nibbles1c[..], [0xB]);
assert_eq!(node1c.state_mask, TrieMask::new(0b1011));
assert_eq!(node1c.tree_mask, TrieMask::new(0b0000));
assert_eq!(node1c.hash_mask, TrieMask::new(0b1011));
assert_eq!(node1c.root_hash, None);
assert_eq!(node1c.hashes.len(), 3);
assert_ne!(node1c.hashes[0], node1b.hashes[0]);
assert_eq!(node1c.hashes[1], node1b.hashes[1]);
assert_eq!(node1c.hashes[2], node1b.hashes[2]);
}
{
let tx = factory.provider_rw().unwrap();
let mut hashed_account_cursor =
tx.tx_ref().cursor_write::<tables::HashedAccounts>().unwrap();
let account2 = hashed_account_cursor.seek_exact(key2).unwrap().unwrap();
hashed_account_cursor.delete_current().unwrap();
let account3 = hashed_account_cursor.seek_exact(key3).unwrap().unwrap();
hashed_account_cursor.delete_current().unwrap();
let mut account_prefix_set = PrefixSetMut::default();
account_prefix_set.insert(Nibbles::unpack(account2.0));
account_prefix_set.insert(Nibbles::unpack(account3.0));
let computed_expected_root: B256 = triehash::trie_root::<KeccakHasher, _, _, _>([
(key1, encode_account(account1, None)),
// DELETED: (key2, encode_account(account2, None)),
// DELETED: (key3, encode_account(account3, Some(account3_storage_root))),
(key4a, encode_account(account4a, None)),
(key4b, encode_account(account4b, None)),
(key5, encode_account(account5, None)),
(key6, encode_account(account6, None)),
]);
let (root, trie_updates) = StateRoot::from_tx(tx.tx_ref())
.with_prefix_sets(TriePrefixSets {
account_prefix_set: account_prefix_set.freeze(),
..Default::default()
})
.root_with_updates()
.unwrap();
assert_eq!(root, computed_expected_root);
assert_eq!(
trie_updates.account_nodes_ref().len() + trie_updates.removed_nodes_ref().len(),
1
);
assert!(!trie_updates
.storage_tries_ref()
.iter()
.any(|(_, u)| !u.storage_nodes_ref().is_empty() || !u.removed_nodes_ref().is_empty())); // no storage root update
assert_eq!(trie_updates.account_nodes_ref().len(), 1);
let (nibbles1d, node1d) = trie_updates.account_nodes_ref().iter().next().unwrap();
assert_eq!(nibbles1d[..], [0xB]);
assert_eq!(node1d.state_mask, TrieMask::new(0b1011));
assert_eq!(node1d.tree_mask, TrieMask::new(0b0000));
assert_eq!(node1d.hash_mask, TrieMask::new(0b1010));
assert_eq!(node1d.root_hash, None);
assert_eq!(node1d.hashes.len(), 2);
assert_eq!(node1d.hashes[0], node1b.hashes[1]);
assert_eq!(node1d.hashes[1], node1b.hashes[2]);
}
}
#[test]
fn account_trie_around_extension_node() {
let factory = create_test_provider_factory();
let tx = factory.provider_rw().unwrap();
let expected = extension_node_trie(&tx);
let (got, updates) = StateRoot::from_tx(tx.tx_ref()).root_with_updates().unwrap();
assert_eq!(expected, got);
assert_trie_updates(updates.account_nodes_ref());
}
#[test]
fn account_trie_around_extension_node_with_dbtrie() {
let factory = create_test_provider_factory();
let tx = factory.provider_rw().unwrap();
let expected = extension_node_trie(&tx);
let (got, updates) = StateRoot::from_tx(tx.tx_ref()).root_with_updates().unwrap();
assert_eq!(expected, got);
tx.write_trie_updates(&updates).unwrap();
// read the account updates from the db
let mut accounts_trie = tx.tx_ref().cursor_read::<tables::AccountsTrie>().unwrap();
let walker = accounts_trie.walk(None).unwrap();
let account_updates = walker
.into_iter()
.map(|item| {
let (key, node) = item.unwrap();
(key.0, node)
})
.collect();
assert_trie_updates(&account_updates);
}
proptest! {
#![proptest_config(ProptestConfig {
cases: 128, ..ProptestConfig::default()
})]
#[test]
fn fuzz_state_root_incremental(account_changes: [BTreeMap<B256, U256>; 5]) {
let factory = create_test_provider_factory();
let tx = factory.provider_rw().unwrap();
let mut hashed_account_cursor = tx.tx_ref().cursor_write::<tables::HashedAccounts>().unwrap();
let mut state = BTreeMap::default();
for accounts in account_changes {
let should_generate_changeset = !state.is_empty();
let mut changes = PrefixSetMut::default();
for (hashed_address, balance) in accounts.clone() {
hashed_account_cursor.upsert(hashed_address, &Account { balance, ..Default::default() }).unwrap();
if should_generate_changeset {
changes.insert(Nibbles::unpack(hashed_address));
}
}
let (state_root, trie_updates) = StateRoot::from_tx(tx.tx_ref())
.with_prefix_sets(TriePrefixSets { account_prefix_set: changes.freeze(), ..Default::default() })
.root_with_updates()
.unwrap();
state.append(&mut accounts.clone());
let expected_root = state_root_prehashed(
state.iter().map(|(&key, &balance)| (key, (Account { balance, ..Default::default() }, std::iter::empty())))
);
assert_eq!(expected_root, state_root);
tx.write_trie_updates(&trie_updates).unwrap();
}
}
}
#[test]
fn storage_trie_around_extension_node() {
let factory = create_test_provider_factory();
let tx = factory.provider_rw().unwrap();
let hashed_address = B256::random();
let (expected_root, expected_updates) = extension_node_storage_trie(&tx, hashed_address);
let (got, _, updates) =
StorageRoot::from_tx_hashed(tx.tx_ref(), hashed_address).root_with_updates().unwrap();
assert_eq!(expected_root, got);
assert_eq!(expected_updates, updates);
assert_trie_updates(updates.storage_nodes_ref());
}
fn extension_node_storage_trie<N: ProviderNodeTypes>(
tx: &DatabaseProviderRW<Arc<TempDatabase<DatabaseEnv>>, N>,
hashed_address: B256,
) -> (B256, StorageTrieUpdates) {
let value = U256::from(1);
let mut hashed_storage = tx.tx_ref().cursor_write::<tables::HashedStorages>().unwrap();
let mut hb = HashBuilder::default().with_updates(true);
for key in [
hex!("30af561000000000000000000000000000000000000000000000000000000000"),
hex!("30af569000000000000000000000000000000000000000000000000000000000"),
hex!("30af650000000000000000000000000000000000000000000000000000000000"),
hex!("30af6f0000000000000000000000000000000000000000000000000000000000"),
hex!("30af8f0000000000000000000000000000000000000000000000000000000000"),
hex!("3100000000000000000000000000000000000000000000000000000000000000"),
] {
hashed_storage
.upsert(hashed_address, &StorageEntry { key: B256::new(key), value })
.unwrap();
hb.add_leaf(Nibbles::unpack(key), &alloy_rlp::encode_fixed_size(&value));
}
let root = hb.root();
let (_, updates) = hb.split();
let trie_updates = StorageTrieUpdates::new(updates);
(root, trie_updates)
}
fn extension_node_trie<N: ProviderNodeTypes>(
tx: &DatabaseProviderRW<Arc<TempDatabase<DatabaseEnv>>, N>,
) -> B256 {
let a = Account { nonce: 0, balance: U256::from(1u64), bytecode_hash: Some(B256::random()) };
let val = encode_account(a, None);
let mut hashed_accounts = tx.tx_ref().cursor_write::<tables::HashedAccounts>().unwrap();
let mut hb = HashBuilder::default();
for key in [
hex!("30af561000000000000000000000000000000000000000000000000000000000"),
hex!("30af569000000000000000000000000000000000000000000000000000000000"),
hex!("30af650000000000000000000000000000000000000000000000000000000000"),
hex!("30af6f0000000000000000000000000000000000000000000000000000000000"),
hex!("30af8f0000000000000000000000000000000000000000000000000000000000"),
hex!("3100000000000000000000000000000000000000000000000000000000000000"),
] {
hashed_accounts.upsert(B256::new(key), &a).unwrap();
hb.add_leaf(Nibbles::unpack(key), &val);
}
hb.root()
}
fn assert_trie_updates(account_updates: &HashMap<Nibbles, BranchNodeCompact>) {
assert_eq!(account_updates.len(), 2);
let node = account_updates.get(&[0x3][..]).unwrap();
let expected = BranchNodeCompact::new(0b0011, 0b0001, 0b0000, vec![], None);
assert_eq!(node, &expected);
let node = account_updates.get(&[0x3, 0x0, 0xA, 0xF][..]).unwrap();
assert_eq!(node.state_mask, TrieMask::new(0b101100000));
assert_eq!(node.tree_mask, TrieMask::new(0b000000000));
assert_eq!(node.hash_mask, TrieMask::new(0b001000000));
assert_eq!(node.root_hash, None);
assert_eq!(node.hashes.len(), 1);
}