Go to file
Noah Gundotra 9fe87ded65
ac: bump rust version (#3985)
2023-01-19 10:44:41 -05:00
.github Governance: Cleanup drive space before executing build (#3818) 2022-11-16 18:29:14 +00:00
account-compression ac: bump rust version (#3985) 2023-01-19 10:44:41 -05:00
associated-token-account Update repo to `edition = "2021"` (#3900) 2022-12-13 23:46:26 +01:00
binary-option build(deps): bump certifi in /binary-option/client (#3885) 2022-12-14 19:55:49 +01:00
binary-oracle-pair Update repo to `edition = "2021"` (#3900) 2022-12-13 23:46:26 +01:00
ci ci: Add exception for tokio (#3966) 2023-01-10 00:05:27 +01:00
docs build(deps): bump json5 and babel-loader in /docs (#3951) 2023-01-03 00:10:30 +01:00
examples examples: Use txs instead of set_account in token test (#3969) 2023-01-10 23:46:07 +01:00
farms Update quick_start.md (#3816) 2022-11-14 15:47:06 +01:00
feature-proposal Update repo to `edition = "2021"` (#3900) 2022-12-13 23:46:26 +01:00
governance Governance: Allow token owner to revoke their own membership (#3976) 2023-01-17 22:45:09 +00:00
instruction-padding/program Update repo to `edition = "2021"` (#3900) 2022-12-13 23:46:26 +01:00
libraries Update repo to `edition = "2021"` (#3900) 2022-12-13 23:46:26 +01:00
managed-token Update repo to `edition = "2021"` (#3900) 2022-12-13 23:46:26 +01:00
memo build(deps): bump json5 from 2.2.1 to 2.2.3 in /memo/js (#3954) 2023-01-03 18:23:30 +01:00
name-service Update repo to `edition = "2021"` (#3900) 2022-12-13 23:46:26 +01:00
record/program Update repo to `edition = "2021"` (#3900) 2022-12-13 23:46:26 +01:00
shared-memory Update repo to `edition = "2021"` (#3900) 2022-12-13 23:46:26 +01:00
stake-pool stake-pool: Refresh blockhash more in another test (#3982) 2023-01-18 22:40:20 +01:00
stateless-asks Update repo to `edition = "2021"` (#3900) 2022-12-13 23:46:26 +01:00
token token-js: Bump version for release (#3968) 2023-01-10 22:38:34 +01:00
token-lending Update repo to `edition = "2021"` (#3900) 2022-12-13 23:46:26 +01:00
token-swap build(deps-dev): bump eslint from 7.32.0 to 8.31.0 in /token-swap/js (#3950) 2023-01-04 01:00:59 +01:00
token-upgrade Update repo to `edition = "2021"` (#3900) 2022-12-13 23:46:26 +01:00
utils Update repo to `edition = "2021"` (#3900) 2022-12-13 23:46:26 +01:00
.gitignore farms: Add trade governance (#2635) 2021-12-22 18:50:36 -06:00
.mergify.yml CI: Add status-failure and status-pending check to be sure that all steps are run (#1966) 2021-06-25 21:02:24 +02:00
Anchor.toml update solana to 1.14.10 (#3872) 2022-12-06 12:59:00 +09:00
Cargo.lock build(deps): bump bzip2 from 0.4.3 to 0.4.4 (#3970) 2023-01-11 14:36:39 +01:00
Cargo.toml example: Token transfer with PDA (#3965) 2023-01-10 13:41:41 +01:00
LICENSE Update contributors (#42) 2020-06-17 14:12:46 -07:00
README.md Update readme release directions (#3811) 2022-11-11 00:18:39 -07:00
SECURITY.md Rework method for reporting security problems (#3959) 2023-01-04 12:22:58 -08:00
cbindgen.sh Move c header generation out of build.rs 2020-08-27 23:32:07 -07:00
coverage.sh libraries tests p2 (#2699) 2022-01-05 17:23:09 -05:00
patch.crates-io.sh chore: get solana version from different cargo files (#3962) 2023-01-05 21:02:37 +08:00
rust-toolchain.toml Update rust to 1.60, solana to 1.11.6 (#3492) 2022-08-18 12:16:02 -07:00
update-solana-dependencies.sh ci: Add clap-v3-utils to patch and update scripts (#3610) 2022-09-15 22:20:41 +02:00

README.md

Build status

Solana Program Library

The Solana Program Library (SPL) is a collection of on-chain programs targeting the Sealevel parallel runtime. These programs are tested against Solana's implementation of Sealevel, solana-runtime, and deployed to its mainnet. As others implement Sealevel, we will graciously accept patches to ensure the programs here are portable across all implementations.

For more information see the SPL documentation and the Token TypeDocs.

Development

Environment Setup

  1. Install the latest Solana tools.
  2. Install the latest Rust stable. If you already have Rust, run rustup update to get the latest version.
  3. Install the libudev development package for your distribution (libudev-dev on Debian-derived distros, libudev-devel on Redhat-derived).

Build

Build on-chain programs

# To build all on-chain programs
$ cargo build-sbf

# To build a specific on-chain program
$ cd <program_name>/program
$ cargo build-sbf

Build clients

# To build all clients
$ cargo build

# To build a specific client
$ cd <program_name>/cli
$ cargo build

Test

Unit tests contained within all projects can be run with:

$ cargo test      # <-- runs host-based tests
$ cargo test-sbf  # <-- runs BPF program tests

To run a specific program's tests, such as SPL Token:

$ cd token/program
$ cargo test      # <-- runs host-based tests
$ cargo test-sbf  # <-- runs BPF program tests

Integration testing may be performed via the per-project .js bindings. See the token program's js project for an example.

Common Issues

Solutions to a few issues you might run into are mentioned here.

  1. Failed to open: ../../deploy/spl_<program-name>.so

    Update your Rust and Cargo to the latest versions and re-run cargo build-sbf in the relevant <program-name> directory, or run it at the repository root to rebuild all on-chain programs.

  2. Error while loading shared libraries. (libssl.so.1.1)

    A working solution was mentioned here. Install libssl.

    wget http://nz2.archive.ubuntu.com/ubuntu/pool/main/o/openssl/libssl1.1_1.1.1l-1ubuntu1.2_amd64.deb
    sudo dpkg -i libssl1.1_1.1.1l-1ubuntu1.2_amd64.deb
    
  3. CPU or Memory usage at 100%

    This is to be expected while building some of the programs in this library. The simplest solution is to add the --jobs 1 flag to the build commands to limit the number of parallel jobs to 1 and check if that fixes the issue. Although this will mean much longer build times.

Clippy

$ cargo clippy

Coverage

$ ./coverage.sh  # Help wanted! Coverage build currently fails on MacOS due to an XCode `grcov` mismatch...

MacOS

You may need to pin your grcov version, and then rustup with the apple-darwin nightly toolchain:

$ cargo install grcov --version 0.6.1
$ rustup toolchain install nightly-x86_64-apple-darwin

Release Process

SPL programs are currently tagged and released manually. Each program is versioned independently of the others, with all new development occurring on master. Once a program is tested and deemed ready for release:

Bump Version

  • Increment the version number in the program's Cargo.toml
  • Run cargo build-sbf <program> to build binary. Note the location of the generated spl_<program>.so for attaching to the Github release.
  • Open a PR with these version changes and merge after passing CI.

Create Github tag

Program tags are of the form <program>-vX.Y.Z. Create the new tag at the version-bump commit and push to the solana-program-library repository, eg:

$ git tag token-v1.0.0 b24bfe7
$ git push upstream --tags

Publish Github release

  • Go to GitHub Releases UI
  • Click "Draft new release", and enter the new tag in the "Tag version" box.
  • Title the release "SPL vX.Y.Z", complete the description, and attach the spl_<program>.so binary
  • Click "Publish release"

Publish to Crates.io

Navigate to the program directory and run cargo package to test the build. Then run cargo publish.

Disclaimer

All claims, content, designs, algorithms, estimates, roadmaps, specifications, and performance measurements described in this project are done with the Solana Foundation's ("SF") best efforts. It is up to the reader to check and validate their accuracy and truthfulness. Furthermore nothing in this project constitutes a solicitation for investment.

Any content produced by SF or developer resources that SF provides, are for educational and inspiration purposes only. SF does not encourage, induce or sanction the deployment, integration or use of any such applications (including the code comprising the Solana blockchain protocol) in violation of applicable laws or regulations and hereby prohibits any such deployment, integration or use. This includes use of any such applications by the reader (a) in violation of export control or sanctions laws of the United States or any other applicable jurisdiction, (b) if the reader is located in or ordinarily resident in a country or territory subject to comprehensive sanctions administered by the U.S. Office of Foreign Assets Control (OFAC), or (c) if the reader is or is working on behalf of a Specially Designated National (SDN) or a person subject to similar blocking or denied party prohibitions.

The reader should be aware that U.S. export control and sanctions laws prohibit U.S. persons (and other persons that are subject to such laws) from transacting with persons in certain countries and territories or that are on the SDN list. As a project based primarily on open-source software, it is possible that such sanctioned persons may nevertheless bypass prohibitions, obtain the code comprising the Solana blockchain protocol (or other project code or applications) and deploy, integrate, or otherwise use it. Accordingly, there is a risk to individuals that other persons using the Solana blockchain protocol may be sanctioned persons and that transactions with such persons would be a violation of U.S. export controls and sanctions law. This risk applies to individuals, organizations, and other ecosystem participants that deploy, integrate, or use the Solana blockchain protocol code directly (e.g., as a node operator), and individuals that transact on the Solana blockchain through light clients, third party interfaces, and/or wallet software.