solana/drone/src/drone.rs

435 lines
14 KiB
Rust
Raw Normal View History

2018-06-19 23:51:04 -07:00
//! The `drone` module provides an object for launching a Solana Drone,
2019-03-05 16:28:14 -08:00
//! which is the custodian of any remaining lamports in a mint.
2018-06-19 23:51:04 -07:00
//! The Solana Drone builds and send airdrop transactions,
//! checking requests against a request cap for a given time time_slice
//! and (to come) an IP rate limit.
use bincode::{deserialize, serialize};
use byteorder::{ByteOrder, LittleEndian};
use bytes::{Bytes, BytesMut};
use log::*;
2018-12-14 20:39:10 -08:00
use serde_derive::{Deserialize, Serialize};
2018-11-16 08:45:59 -08:00
use solana_metrics;
use solana_metrics::influxdb;
2018-11-16 08:04:46 -08:00
use solana_sdk::hash::Hash;
use solana_sdk::packet::PACKET_DATA_SIZE;
use solana_sdk::pubkey::Pubkey;
2018-11-16 08:04:46 -08:00
use solana_sdk::signature::Keypair;
2018-12-03 13:32:31 -08:00
use solana_sdk::system_instruction::SystemInstruction;
use solana_sdk::system_program;
2018-11-16 08:04:46 -08:00
use solana_sdk::transaction::Transaction;
2018-06-19 21:39:53 -07:00
use std::io;
2018-06-19 23:51:04 -07:00
use std::io::{Error, ErrorKind};
use std::net::{IpAddr, Ipv4Addr, SocketAddr, TcpStream};
use std::sync::mpsc::Sender;
use std::sync::{Arc, Mutex};
use std::thread;
2018-06-19 21:39:53 -07:00
use std::time::Duration;
use tokio;
use tokio::net::TcpListener;
use tokio::prelude::{Future, Read, Sink, Stream, Write};
use tokio_codec::{BytesCodec, Decoder};
2018-11-16 08:04:46 -08:00
#[macro_export]
macro_rules! socketaddr {
($ip:expr, $port:expr) => {
SocketAddr::from((Ipv4Addr::from($ip), $port))
};
($str:expr) => {{
let a: SocketAddr = $str.parse().unwrap();
a
}};
}
2018-06-19 21:39:53 -07:00
2018-06-19 23:51:04 -07:00
pub const TIME_SLICE: u64 = 60;
pub const REQUEST_CAP: u64 = 500_000_000;
2018-07-18 12:38:18 -07:00
pub const DRONE_PORT: u16 = 9900;
2018-06-19 21:39:53 -07:00
#[derive(Serialize, Deserialize, Debug, Clone, Copy)]
2018-06-19 21:39:53 -07:00
pub enum DroneRequest {
2018-06-19 23:51:04 -07:00
GetAirdrop {
2019-03-05 16:28:14 -08:00
lamports: u64,
to: Pubkey,
2019-03-02 10:25:16 -08:00
blockhash: Hash,
2018-06-19 23:51:04 -07:00
},
2018-06-19 21:39:53 -07:00
}
pub struct Drone {
2018-08-09 07:56:04 -07:00
mint_keypair: Keypair,
2018-06-19 21:39:53 -07:00
ip_cache: Vec<IpAddr>,
2018-06-19 23:51:04 -07:00
pub time_slice: Duration,
2018-06-19 21:39:53 -07:00
request_cap: u64,
2018-06-19 23:51:04 -07:00
pub request_current: u64,
2018-06-19 21:39:53 -07:00
}
impl Drone {
pub fn new(
2018-08-09 07:56:04 -07:00
mint_keypair: Keypair,
2018-06-19 21:39:53 -07:00
time_input: Option<u64>,
request_cap_input: Option<u64>,
) -> Drone {
let time_slice = match time_input {
Some(time) => Duration::new(time, 0),
2018-06-19 23:51:04 -07:00
None => Duration::new(TIME_SLICE, 0),
2018-06-19 21:39:53 -07:00
};
let request_cap = match request_cap_input {
Some(cap) => cap,
2018-06-19 23:51:04 -07:00
None => REQUEST_CAP,
2018-06-19 21:39:53 -07:00
};
Drone {
mint_keypair,
ip_cache: Vec::new(),
time_slice,
request_cap,
request_current: 0,
}
}
2018-06-21 22:11:24 -07:00
pub fn check_request_limit(&mut self, request_amount: u64) -> bool {
(self.request_current + request_amount) <= self.request_cap
2018-06-19 23:51:04 -07:00
}
pub fn clear_request_count(&mut self) {
self.request_current = 0;
}
2018-06-19 21:39:53 -07:00
pub fn add_ip_to_cache(&mut self, ip: IpAddr) {
self.ip_cache.push(ip);
}
pub fn clear_ip_cache(&mut self) {
self.ip_cache.clear();
}
pub fn build_airdrop_transaction(
&mut self,
req: DroneRequest,
) -> Result<Transaction, io::Error> {
trace!("build_airdrop_transaction: {:?}", req);
match req {
2018-06-21 22:11:24 -07:00
DroneRequest::GetAirdrop {
2019-03-05 16:28:14 -08:00
lamports,
to,
2019-03-02 10:25:16 -08:00
blockhash,
2018-06-21 22:11:24 -07:00
} => {
2019-03-05 16:28:14 -08:00
if self.check_request_limit(lamports) {
self.request_current += lamports;
2018-11-16 08:45:59 -08:00
solana_metrics::submit(
influxdb::Point::new("drone")
.add_tag("op", influxdb::Value::String("airdrop".to_string()))
2019-03-05 16:28:14 -08:00
.add_field("request_amount", influxdb::Value::Integer(lamports as i64))
.add_field(
"request_current",
influxdb::Value::Integer(self.request_current as i64),
)
.to_owned(),
);
2019-03-05 16:28:14 -08:00
info!("Requesting airdrop of {} to {:?}", lamports, to);
2018-11-16 08:04:46 -08:00
let create_instruction = SystemInstruction::CreateAccount {
2019-03-05 16:28:14 -08:00
lamports,
2018-11-16 08:04:46 -08:00
space: 0,
program_id: system_program::id(),
2018-11-16 08:04:46 -08:00
};
2019-03-15 09:02:28 -07:00
let mut transaction = Transaction::new_signed(
2018-11-16 08:04:46 -08:00
&self.mint_keypair,
&[to],
&system_program::id(),
2018-11-16 08:04:46 -08:00
&create_instruction,
2019-03-02 10:25:16 -08:00
blockhash,
2018-11-16 08:04:46 -08:00
0, /*fee*/
);
2019-03-02 10:25:16 -08:00
transaction.sign(&[&self.mint_keypair], blockhash);
2018-11-16 08:04:46 -08:00
Ok(transaction)
} else {
Err(Error::new(ErrorKind::Other, "token limit reached"))
}
2018-06-19 21:39:53 -07:00
}
}
}
pub fn process_drone_request(&mut self, bytes: &BytesMut) -> Result<Bytes, io::Error> {
let req: DroneRequest = deserialize(bytes).or_else(|err| {
Err(io::Error::new(
io::ErrorKind::Other,
format!("deserialize packet in drone: {:?}", err),
))
})?;
info!("Airdrop transaction requested...{:?}", req);
let res = self.build_airdrop_transaction(req);
match res {
Ok(tx) => {
let response_vec = bincode::serialize(&tx).or_else(|err| {
Err(io::Error::new(
io::ErrorKind::Other,
format!("deserialize packet in drone: {:?}", err),
))
})?;
let mut response_vec_with_length = vec![0; 2];
LittleEndian::write_u16(&mut response_vec_with_length, response_vec.len() as u16);
response_vec_with_length.extend_from_slice(&response_vec);
let response_bytes = Bytes::from(response_vec_with_length);
info!("Airdrop transaction granted");
Ok(response_bytes)
}
Err(err) => {
warn!("Airdrop transaction failed: {:?}", err);
Err(err)
}
}
}
2018-06-19 21:39:53 -07:00
}
2018-07-05 21:40:09 -07:00
impl Drop for Drone {
fn drop(&mut self) {
2018-11-16 08:45:59 -08:00
solana_metrics::flush();
2018-07-05 21:40:09 -07:00
}
}
pub fn request_airdrop_transaction(
drone_addr: &SocketAddr,
id: &Pubkey,
2019-03-05 16:28:14 -08:00
lamports: u64,
2019-03-02 10:25:16 -08:00
blockhash: Hash,
) -> Result<Transaction, Error> {
info!(
2019-03-05 16:28:14 -08:00
"request_airdrop_transaction: drone_addr={} id={} lamports={} blockhash={}",
drone_addr, id, lamports, blockhash
);
// TODO: make this async tokio client
let mut stream = TcpStream::connect_timeout(drone_addr, Duration::new(3, 0))?;
stream.set_read_timeout(Some(Duration::new(10, 0)))?;
let req = DroneRequest::GetAirdrop {
2019-03-05 16:28:14 -08:00
lamports,
2019-03-02 10:25:16 -08:00
blockhash,
to: *id,
};
let req = serialize(&req).expect("serialize drone request");
stream.write_all(&req)?;
// Read length of transaction
let mut buffer = [0; 2];
stream.read_exact(&mut buffer).or_else(|err| {
info!(
"request_airdrop_transaction: buffer length read_exact error: {:?}",
err
);
Err(Error::new(ErrorKind::Other, "Airdrop failed"))
})?;
let transaction_length = LittleEndian::read_u16(&buffer) as usize;
if transaction_length >= PACKET_DATA_SIZE {
Err(Error::new(
ErrorKind::Other,
format!(
"request_airdrop_transaction: invalid transaction_length from drone: {}",
transaction_length
),
))?;
}
// Read the transaction
let mut buffer = Vec::new();
buffer.resize(transaction_length, 0);
stream.read_exact(&mut buffer).or_else(|err| {
info!(
"request_airdrop_transaction: buffer read_exact error: {:?}",
err
);
Err(Error::new(ErrorKind::Other, "Airdrop failed"))
})?;
let transaction: Transaction = deserialize(&buffer).or_else(|err| {
Err(Error::new(
ErrorKind::Other,
format!("request_airdrop_transaction deserialize failure: {:?}", err),
))
})?;
Ok(transaction)
}
// For integration tests. Listens on random open port and reports port to Sender.
pub fn run_local_drone(mint_keypair: Keypair, sender: Sender<SocketAddr>) {
thread::spawn(move || {
let drone_addr = socketaddr!(0, 0);
let drone = Arc::new(Mutex::new(Drone::new(mint_keypair, None, None)));
let socket = TcpListener::bind(&drone_addr).unwrap();
sender.send(socket.local_addr().unwrap()).unwrap();
info!("Drone started. Listening on: {}", drone_addr);
let done = socket
.incoming()
.map_err(|e| debug!("failed to accept socket; error = {:?}", e))
.for_each(move |socket| {
let drone2 = drone.clone();
let framed = BytesCodec::new().framed(socket);
let (writer, reader) = framed.split();
let processor = reader.and_then(move |bytes| {
let response_bytes = drone2
.lock()
.unwrap()
.process_drone_request(&bytes)
.unwrap();
trace!("Airdrop response_bytes: {:?}", response_bytes.to_vec());
Ok(response_bytes)
});
let server = writer
.send_all(processor.or_else(|err| {
Err(io::Error::new(
io::ErrorKind::Other,
format!("Drone response: {:?}", err),
))
}))
.then(|_| Ok(()));
tokio::spawn(server)
});
tokio::run(done);
});
}
2018-06-19 21:39:53 -07:00
#[cfg(test)]
mod tests {
2018-12-14 15:34:17 -08:00
use super::*;
use bytes::BufMut;
2018-11-16 08:04:46 -08:00
use solana_sdk::signature::{Keypair, KeypairUtil};
2018-06-19 21:39:53 -07:00
use std::time::Duration;
2018-06-19 23:51:04 -07:00
#[test]
2018-06-21 19:41:47 -07:00
fn test_check_request_limit() {
2018-08-09 07:56:04 -07:00
let keypair = Keypair::new();
let mut drone = Drone::new(keypair, None, Some(3));
2018-06-21 22:11:24 -07:00
assert!(drone.check_request_limit(1));
drone.request_current = 3;
assert!(!drone.check_request_limit(1));
2018-06-19 23:51:04 -07:00
}
#[test]
fn test_clear_request_count() {
2018-08-09 07:56:04 -07:00
let keypair = Keypair::new();
let mut drone = Drone::new(keypair, None, None);
2018-06-19 23:51:04 -07:00
drone.request_current = drone.request_current + 256;
assert_eq!(drone.request_current, 256);
2018-06-19 23:51:04 -07:00
drone.clear_request_count();
assert_eq!(drone.request_current, 0);
2018-06-19 23:51:04 -07:00
}
2018-06-19 21:39:53 -07:00
#[test]
fn test_add_ip_to_cache() {
2018-08-09 07:56:04 -07:00
let keypair = Keypair::new();
let mut drone = Drone::new(keypair, None, None);
2018-06-19 21:39:53 -07:00
let ip = "127.0.0.1".parse().expect("create IpAddr from string");
assert_eq!(drone.ip_cache.len(), 0);
drone.add_ip_to_cache(ip);
assert_eq!(drone.ip_cache.len(), 1);
assert!(drone.ip_cache.contains(&ip));
}
#[test]
fn test_clear_ip_cache() {
2018-08-09 07:56:04 -07:00
let keypair = Keypair::new();
let mut drone = Drone::new(keypair, None, None);
2018-06-19 21:39:53 -07:00
let ip = "127.0.0.1".parse().expect("create IpAddr from string");
assert_eq!(drone.ip_cache.len(), 0);
drone.add_ip_to_cache(ip);
assert_eq!(drone.ip_cache.len(), 1);
drone.clear_ip_cache();
assert_eq!(drone.ip_cache.len(), 0);
assert!(drone.ip_cache.is_empty());
}
#[test]
fn test_drone_default_init() {
2018-08-09 07:56:04 -07:00
let keypair = Keypair::new();
2018-06-19 21:39:53 -07:00
let time_slice: Option<u64> = None;
let request_cap: Option<u64> = None;
let drone = Drone::new(keypair, time_slice, request_cap);
2018-06-19 21:39:53 -07:00
assert_eq!(drone.time_slice, Duration::new(TIME_SLICE, 0));
assert_eq!(drone.request_cap, REQUEST_CAP);
}
#[test]
fn test_drone_build_airdrop_transaction() {
let to = Keypair::new().pubkey();
2019-03-02 10:25:16 -08:00
let blockhash = Hash::default();
let request = DroneRequest::GetAirdrop {
2019-03-05 16:28:14 -08:00
lamports: 2,
to,
2019-03-02 10:25:16 -08:00
blockhash,
2018-07-20 16:19:00 -07:00
};
let mint = Keypair::new();
let mint_pubkey = mint.pubkey();
let mut drone = Drone::new(mint, None, None);
let tx = drone.build_airdrop_transaction(request).unwrap();
assert_eq!(tx.signatures.len(), 1);
assert_eq!(tx.account_keys, vec![mint_pubkey, to]);
2019-03-02 10:25:16 -08:00
assert_eq!(tx.recent_blockhash, blockhash);
assert_eq!(tx.program_ids, vec![system_program::id()]);
assert_eq!(tx.instructions.len(), 1);
let instruction: SystemInstruction = deserialize(&tx.instructions[0].data).unwrap();
assert_eq!(
instruction,
SystemInstruction::CreateAccount {
2019-03-05 16:28:14 -08:00
lamports: 2,
space: 0,
program_id: Pubkey::default()
}
);
2018-06-19 21:39:53 -07:00
let mint = Keypair::new();
drone = Drone::new(mint, None, Some(1));
let tx = drone.build_airdrop_transaction(request);
assert!(tx.is_err());
2018-06-19 21:39:53 -07:00
}
#[test]
fn test_process_drone_request() {
let to = Keypair::new().pubkey();
2019-03-02 10:25:16 -08:00
let blockhash = Hash::new(&to.as_ref());
2019-03-05 16:28:14 -08:00
let lamports = 50;
let req = DroneRequest::GetAirdrop {
2019-03-05 16:28:14 -08:00
lamports,
2019-03-02 10:25:16 -08:00
blockhash,
to,
};
let req = serialize(&req).unwrap();
let mut bytes = BytesMut::with_capacity(req.len());
bytes.put(&req[..]);
let keypair = Keypair::new();
let expected_instruction = SystemInstruction::CreateAccount {
2019-03-05 16:28:14 -08:00
lamports,
space: 0,
program_id: system_program::id(),
};
2019-03-15 09:02:28 -07:00
let mut expected_tx = Transaction::new_signed(
&keypair,
&[to],
&system_program::id(),
&expected_instruction,
2019-03-02 10:25:16 -08:00
blockhash,
0,
);
2019-03-02 10:25:16 -08:00
expected_tx.sign(&[&keypair], blockhash);
let expected_bytes = serialize(&expected_tx).unwrap();
let mut expected_vec_with_length = vec![0; 2];
LittleEndian::write_u16(&mut expected_vec_with_length, expected_bytes.len() as u16);
expected_vec_with_length.extend_from_slice(&expected_bytes);
let mut drone = Drone::new(keypair, None, None);
let response = drone.process_drone_request(&bytes);
let response_vec = response.unwrap().to_vec();
assert_eq!(expected_vec_with_length, response_vec);
let mut bad_bytes = BytesMut::with_capacity(9);
bad_bytes.put("bad bytes");
assert!(drone.process_drone_request(&bad_bytes).is_err());
}
2018-06-19 21:39:53 -07:00
}