Go to file
dependabot[bot] 2759cb860b
Bump sha2 from 0.10.0 to 0.10.1 (#22359)
* Bump sha2 from 0.10.0 to 0.10.1

Bumps [sha2](https://github.com/RustCrypto/hashes) from 0.10.0 to 0.10.1.
- [Release notes](https://github.com/RustCrypto/hashes/releases)
- [Commits](https://github.com/RustCrypto/hashes/compare/sha2-v0.10.0...sha2-v0.10.1)

---
updated-dependencies:
- dependency-name: sha2
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>

* [auto-commit] Update all Cargo lock files

Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: dependabot-buildkite <dependabot-buildkite@noreply.solana.com>
2022-01-08 00:17:32 -07:00
.buildkite
.github
.travis
account-decoder
accounts-bench
accounts-cluster-bench
accountsdb-plugin-interface
accountsdb-plugin-manager
accountsdb-plugin-postgres Add runtime support for address table lookups (#22223) 2022-01-07 11:59:09 +08:00
banking-bench
banks-client
banks-interface
banks-server
bench-streamer
bench-tps
book/src/proposals
bucket_map Shrink disk buckets index record (#21973) 2022-01-07 12:12:36 -06:00
ci Add aarch64-apple-darwin publish tarball step 2022-01-06 23:59:18 -08:00
clap-utils
cli Refactor: Remove `KeyedAccount` from program runtime (#22226) 2022-01-03 23:30:56 +01:00
cli-config
cli-output
client
client-test
core Rename open_with_access_type() to open_with_options() (#22123) 2022-01-07 12:11:43 -08:00
docs Update default --dynamic-port-range values to include some room for additional ports that may be added in the future 2022-01-05 16:50:15 -08:00
dos
download-utils
entry adds bitflags to Packet.Meta 2022-01-04 13:53:40 +00:00
explorer explorer: fix missing logs error for old transactions (#22350) 2022-01-07 00:48:20 +00:00
faucet
frozen-abi Bump sha2 from 0.10.0 to 0.10.1 (#22359) 2022-01-08 00:17:32 -07:00
genesis
genesis-utils
gossip
install Switch from arm64-apple-darwin to aarch64-apple-darwin to align with Rust's target names 2022-01-03 16:54:46 -08:00
keygen
ledger Bump sha2 from 0.10.0 to 0.10.1 (#22359) 2022-01-08 00:17:32 -07:00
ledger-tool Rename open_with_access_type() to open_with_options() (#22123) 2022-01-07 12:11:43 -08:00
local-cluster Rename open_with_access_type() to open_with_options() (#22123) 2022-01-07 12:11:43 -08:00
log-analyzer
logger
measure
merkle-root-bench
merkle-tree
metrics
multinode-demo
net Update metrics subdomain 2022-01-04 20:14:41 -05:00
net-shaper
net-utils
notifier
perf adds bitflags to Packet.Meta 2022-01-04 13:53:40 +00:00
poh
poh-bench
program-runtime Consolidate process instruction execution timings to own struct 2022-01-06 03:56:46 -07:00
program-test Add execute metrics 2022-01-06 03:56:46 -07:00
programs Bump sha2 from 0.10.0 to 0.10.1 (#22359) 2022-01-08 00:17:32 -07:00
rayon-threadlimit
rbpf-cli Refactor: Remove `KeyedAccount` from program runtime (#22226) 2022-01-03 23:30:56 +01:00
remote-wallet Bump hidapi from 1.3.0 to 1.3.2 (#22265) 2022-01-04 10:47:58 -07:00
replica-lib
replica-node Rename open_with_access_type() to open_with_options() (#22123) 2022-01-07 12:11:43 -08:00
rpc [ledger-tool]compare_blocks (#22229) 2022-01-06 14:36:03 +08:00
rpc-test
runtime bank: Add executors cache metrics 2022-01-07 16:53:27 -07:00
scripts Switch from arm64-apple-darwin to aarch64-apple-darwin to align with Rust's target names 2022-01-03 16:54:46 -08:00
sdk Bump sha2 from 0.10.0 to 0.10.1 (#22359) 2022-01-08 00:17:32 -07:00
send-transaction-service
stake-accounts
storage-bigtable [ledger-tool]compare_blocks (#22229) 2022-01-06 14:36:03 +08:00
storage-proto Add runtime support for address table lookups (#22223) 2022-01-07 11:59:09 +08:00
streamer patches bug in recv_mmsg when npkts != nrecv 2022-01-04 21:06:59 +00:00
sys-tuner
system-test
test-validator
tokens
transaction-dos
transaction-status
upload-perf
validator
version
watchtower
web3.js fix: non-deterministic writeable account order (#21724) 2022-01-08 13:38:58 +08:00
zk-token-sdk Don't accidentally commit farf (#22349) 2022-01-06 17:24:33 -07:00
.clippy.toml
.codecov.yml
.gitignore
.mergify.yml
.travis.yml
CONTRIBUTING.md Fix CONTRIBUTING wording (#22291) 2022-01-05 06:27:10 +00:00
Cargo.lock Bump sha2 from 0.10.0 to 0.10.1 (#22359) 2022-01-08 00:17:32 -07:00
Cargo.toml Adapt zk-token-{sdk,proof-program} for use in the monorepo 2022-01-05 08:51:18 -08:00
LICENSE
README.md Remove obsolete M1 setup information 2022-01-04 21:14:13 +00:00
RELEASE.md
SECURITY.md
cargo
cargo-build-bpf
cargo-test-bpf
fetch-perf-libs.sh
fetch-spl.sh
run.sh
test-abi.sh
vercel.json

README.md

Solana

Solana crate Solana documentation Build status codecov

Building

1. Install rustc, cargo and rustfmt.

$ curl https://sh.rustup.rs -sSf | sh
$ source $HOME/.cargo/env
$ rustup component add rustfmt

When building the master branch, please make sure you are using the latest stable rust version by running:

$ rustup update

When building a specific release branch, you should check the rust version in ci/rust-version.sh and if necessary, install that version by running:

$ rustup install VERSION

Note that if this is not the latest rust version on your machine, cargo commands may require an override in order to use the correct version.

On Linux systems you may need to install libssl-dev, pkg-config, zlib1g-dev, etc. On Ubuntu:

$ sudo apt-get update
$ sudo apt-get install libssl-dev libudev-dev pkg-config zlib1g-dev llvm clang make

2. Download the source code.

$ git clone https://github.com/solana-labs/solana.git
$ cd solana

3. Build.

$ cargo build

Testing

Run the test suite:

$ cargo test

Starting a local testnet

Start your own testnet locally, instructions are in the online docs.

Accessing the remote development cluster

  • devnet - stable public cluster for development accessible via devnet.solana.com. Runs 24/7. Learn more about the public clusters

Benchmarking

First, install the nightly build of rustc. cargo bench requires the use of the unstable features only available in the nightly build.

$ rustup install nightly

Run the benchmarks:

$ cargo +nightly bench

Release Process

The release process for this project is described here.

Code coverage

To generate code coverage statistics:

$ scripts/coverage.sh
$ open target/cov/lcov-local/index.html

Why coverage? While most see coverage as a code quality metric, we see it primarily as a developer productivity metric. When a developer makes a change to the codebase, presumably it's a solution to some problem. Our unit-test suite is how we encode the set of problems the codebase solves. Running the test suite should indicate that your change didn't infringe on anyone else's solutions. Adding a test protects your solution from future changes. Say you don't understand why a line of code exists, try deleting it and running the unit-tests. The nearest test failure should tell you what problem was solved by that code. If no test fails, go ahead and submit a Pull Request that asks, "what problem is solved by this code?" On the other hand, if a test does fail and you can think of a better way to solve the same problem, a Pull Request with your solution would most certainly be welcome! Likewise, if rewriting a test can better communicate what code it's protecting, please send us that patch!

Disclaimer

All claims, content, designs, algorithms, estimates, roadmaps, specifications, and performance measurements described in this project are done with the Solana Foundation's ("SF") good faith efforts. It is up to the reader to check and validate their accuracy and truthfulness. Furthermore, nothing in this project constitutes a solicitation for investment.

Any content produced by SF or developer resources that SF provides are for educational and inspirational purposes only. SF does not encourage, induce or sanction the deployment, integration or use of any such applications (including the code comprising the Solana blockchain protocol) in violation of applicable laws or regulations and hereby prohibits any such deployment, integration or use. This includes the use of any such applications by the reader (a) in violation of export control or sanctions laws of the United States or any other applicable jurisdiction, (b) if the reader is located in or ordinarily resident in a country or territory subject to comprehensive sanctions administered by the U.S. Office of Foreign Assets Control (OFAC), or (c) if the reader is or is working on behalf of a Specially Designated National (SDN) or a person subject to similar blocking or denied party prohibitions.

The reader should be aware that U.S. export control and sanctions laws prohibit U.S. persons (and other persons that are subject to such laws) from transacting with persons in certain countries and territories or that are on the SDN list. As a project-based primarily on open-source software, it is possible that such sanctioned persons may nevertheless bypass prohibitions, obtain the code comprising the Solana blockchain protocol (or other project code or applications) and deploy, integrate, or otherwise use it. Accordingly, there is a risk to individuals that other persons using the Solana blockchain protocol may be sanctioned persons and that transactions with such persons would be a violation of U.S. export controls and sanctions law. This risk applies to individuals, organizations, and other ecosystem participants that deploy, integrate, or use the Solana blockchain protocol code directly (e.g., as a node operator), and individuals that transact on the Solana blockchain through light clients, third party interfaces, and/or wallet software.