Go to file
Ryo Onodera 015058e0b7
Reduce ~2 GBs mem by avoiding another overalloc. (#14806)
* Reduce few GBs mem by avoiding another overalloc.

* Use x.len() for the last item from chunks()
2021-01-25 04:27:47 +00:00
.buildkite
.github
.travis
account-decoder
accounts-bench
banking-bench
banks-client
banks-interface Use optimistic confirmation in getSignatureStatuses, and various downstream client methods (#14430) 2021-01-15 16:05:05 +00:00
banks-server Use optimistic confirmation in getSignatureStatuses, and various downstream client methods (#14430) 2021-01-15 16:05:05 +00:00
bench-exchange
bench-streamer
bench-tps
ci Upgrade to Rust v1.49.0 2021-01-23 19:16:36 -08:00
clap-utils Upgrade to Rust v1.49.0 2021-01-23 19:16:36 -08:00
cli CLI: Reinstate logging, disabled by default 2021-01-23 02:41:40 +00:00
cli-config Cli: promote commitment to a global arg + config.yml (#14684) 2021-01-20 09:48:10 -07:00
cli-output cli-output: Genericize `writeln_name_value()` 2021-01-21 15:45:05 -07:00
client Upgrade to Rust v1.49.0 2021-01-23 19:16:36 -08:00
core removes redundant epoch stakes cache in retransmit (#14781) 2021-01-24 21:15:09 +00:00
crate-features
docs Improve documentation of sendTransaction (#14770) 2021-01-23 09:51:25 +00:00
dos
download-utils Add solana-test-validator --warp-slot argument 2021-01-22 21:17:02 -08:00
explorer Added BRZ token on explorer token registry 2021-01-23 11:41:55 -08:00
faucet
frozen-abi Upgrade to Rust v1.49.0 2021-01-23 19:16:36 -08:00
genesis
gossip
install
keygen
ledger Upgrade to Rust v1.49.0 2021-01-23 19:16:36 -08:00
ledger-tool Upgrade to Rust v1.49.0 2021-01-23 19:16:36 -08:00
local-cluster Add solana-test-validator --warp-slot argument 2021-01-22 21:17:02 -08:00
log-analyzer
logger
measure Make it possible to opt-out jemalloc for heaptrack (#14634) 2021-01-18 20:58:52 +09:00
merkle-root-bench speed up merkle calculation (#14710) 2021-01-22 09:21:50 -06:00
merkle-tree
metrics Upgrade to Rust v1.49.0 2021-01-23 19:16:36 -08:00
multinode-demo typo (#14774) 2021-01-22 13:36:26 -06:00
net net/gce.sh: Add cusom RAM arg instead of doubling default with tmpfs 2021-01-15 16:10:39 -07:00
net-shaper
net-utils
notifier Generalize notification handling 2021-01-19 11:01:08 -08:00
perf Reduce ~2 GBs mem by avoiding another overalloc. (#14806) 2021-01-25 04:27:47 +00:00
poh-bench
program-test Track account writable deescalation (#14626) 2021-01-22 15:28:01 -08:00
programs Upgrade sha2 to 0.9.3 (#14746) 2021-01-22 22:25:22 -08:00
ramp-tps
rayon-threadlimit
remote-wallet
runtime Partial clean (#14800) 2021-01-24 09:50:19 -08:00
scripts Upgrade to Rust v1.49.0 2021-01-23 19:16:36 -08:00
sdk Upgrade to Rust v1.49.0 2021-01-23 19:16:36 -08:00
stake-accounts
stake-monitor
stake-o-matic Retry more 2021-01-22 19:45:58 -08:00
storage-bigtable Upgrade to Rust v1.49.0 2021-01-23 19:16:36 -08:00
storage-proto Upgrade to Rust v1.49.0 2021-01-23 19:16:36 -08:00
streamer
sys-tuner
system-test
tokens Use optimistic confirmation in getSignatureStatuses, and various downstream client methods (#14430) 2021-01-15 16:05:05 +00:00
transaction-status `solana decode-transaction` no longer panics on unsanitary transactions 2021-01-20 23:59:32 -08:00
upload-perf
validator Add solana-test-validator --warp-slot argument 2021-01-22 21:17:02 -08:00
version
watchtower Add --minimum-validator-identity-balance 2021-01-18 02:18:54 +00:00
web3.js chore: bump semantic-release from 17.3.4 to 17.3.6 in /web3.js (#14740) 2021-01-21 09:54:55 +00:00
.clippy.toml
.codecov.yml
.gitignore
.mergify.yml
.travis.yml
CONTRIBUTING.md
Cargo.lock Upgrade sha2 to 0.9.3 (#14746) 2021-01-22 22:25:22 -08:00
Cargo.toml speed up merkle calculation (#14710) 2021-01-22 09:21:50 -06:00
LICENSE
README.md
RELEASE.md
cargo
cargo-build-bpf
cargo-test-bpf
fetch-perf-libs.sh
fetch-spl.sh
run.sh
test-abi.sh

README.md

Solana

Solana crate Solana documentation Build status codecov

Building

1. Install rustc, cargo and rustfmt.

$ curl https://sh.rustup.rs -sSf | sh
$ source $HOME/.cargo/env
$ rustup component add rustfmt

Please sure you are always using the latest stable rust version by running:

$ rustup update

On Linux systems you may need to install libssl-dev, pkg-config, zlib1g-dev, etc. On Ubuntu:

$ sudo apt-get update
$ sudo apt-get install libssl-dev libudev-dev pkg-config zlib1g-dev llvm clang make

2. Download the source code.

$ git clone https://github.com/solana-labs/solana.git
$ cd solana

3. Build.

$ cargo build

4. Run a minimal local cluster.

$ ./run.sh

Testing

Run the test suite:

$ cargo test

Starting a local testnet

Start your own testnet locally, instructions are in the online docs.

Accessing the remote development cluster

  • devnet - stable public cluster for development accessible via devnet.solana.com. Runs 24/7. Learn more about the public clusters

Benchmarking

First install the nightly build of rustc. cargo bench requires use of the unstable features only available in the nightly build.

$ rustup install nightly

Run the benchmarks:

$ cargo +nightly bench

Release Process

The release process for this project is described here.

Code coverage

To generate code coverage statistics:

$ scripts/coverage.sh
$ open target/cov/lcov-local/index.html

Why coverage? While most see coverage as a code quality metric, we see it primarily as a developer productivity metric. When a developer makes a change to the codebase, presumably it's a solution to some problem. Our unit-test suite is how we encode the set of problems the codebase solves. Running the test suite should indicate that your change didn't infringe on anyone else's solutions. Adding a test protects your solution from future changes. Say you don't understand why a line of code exists, try deleting it and running the unit-tests. The nearest test failure should tell you what problem was solved by that code. If no test fails, go ahead and submit a Pull Request that asks, "what problem is solved by this code?" On the other hand, if a test does fail and you can think of a better way to solve the same problem, a Pull Request with your solution would most certainly be welcome! Likewise, if rewriting a test can better communicate what code it's protecting, please send us that patch!

Disclaimer

All claims, content, designs, algorithms, estimates, roadmaps, specifications, and performance measurements described in this project are done with the Solana Foundation's ("SF") best efforts. It is up to the reader to check and validate their accuracy and truthfulness. Furthermore nothing in this project constitutes a solicitation for investment.

Any content produced by SF or developer resources that SF provides, are for educational and inspiration purposes only. SF does not encourage, induce or sanction the deployment, integration or use of any such applications (including the code comprising the Solana blockchain protocol) in violation of applicable laws or regulations and hereby prohibits any such deployment, integration or use. This includes use of any such applications by the reader (a) in violation of export control or sanctions laws of the United States or any other applicable jurisdiction, (b) if the reader is located in or ordinarily resident in a country or territory subject to comprehensive sanctions administered by the U.S. Office of Foreign Assets Control (OFAC), or (c) if the reader is or is working on behalf of a Specially Designated National (SDN) or a person subject to similar blocking or denied party prohibitions.

The reader should be aware that U.S. export control and sanctions laws prohibit U.S. persons (and other persons that are subject to such laws) from transacting with persons in certain countries and territories or that are on the SDN list. As a project based primarily on open-source software, it is possible that such sanctioned persons may nevertheless bypass prohibitions, obtain the code comprising the Solana blockchain protocol (or other project code or applications) and deploy, integrate, or otherwise use it. Accordingly, there is a risk to individuals that other persons using the Solana blockchain protocol may be sanctioned persons and that transactions with such persons would be a violation of U.S. export controls and sanctions law. This risk applies to individuals, organizations, and other ecosystem participants that deploy, integrate, or use the Solana blockchain protocol code directly (e.g., as a node operator), and individuals that transact on the Solana blockchain through light clients, third party interfaces, and/or wallet software.