2021-11-17 10:35:07 -08:00
|
|
|
use solana_program_runtime::{ic_msg, invoke_context::InvokeContext};
|
2021-10-25 13:58:18 -07:00
|
|
|
use solana_sdk::{
|
2021-04-22 11:53:06 -07:00
|
|
|
account::{ReadableAccount, WritableAccount},
|
|
|
|
account_utils::State as AccountUtilsState,
|
2021-11-16 15:01:00 -08:00
|
|
|
feature_set::{self, nonce_must_be_writable},
|
2021-02-16 09:26:59 -08:00
|
|
|
instruction::{checked_add, InstructionError},
|
2021-10-25 13:58:18 -07:00
|
|
|
keyed_account::KeyedAccount,
|
2020-03-03 18:39:09 -08:00
|
|
|
nonce::{self, state::Versions, State},
|
2019-12-07 11:54:10 -08:00
|
|
|
pubkey::Pubkey,
|
2021-06-01 16:25:53 -07:00
|
|
|
system_instruction::{nonce_to_instruction_error, NonceError},
|
2021-07-27 16:34:21 -07:00
|
|
|
sysvar::rent::Rent,
|
2019-12-07 11:54:10 -08:00
|
|
|
};
|
2020-10-26 09:14:57 -07:00
|
|
|
use std::collections::HashSet;
|
2019-12-07 11:54:10 -08:00
|
|
|
|
2020-10-26 09:14:57 -07:00
|
|
|
pub trait NonceKeyedAccount {
|
2020-01-22 15:31:39 -08:00
|
|
|
fn advance_nonce_account(
|
2020-01-22 17:54:06 -08:00
|
|
|
&self,
|
2019-12-07 11:54:10 -08:00
|
|
|
signers: &HashSet<Pubkey>,
|
2021-12-02 09:47:16 -08:00
|
|
|
invoke_context: &InvokeContext,
|
2019-12-07 11:54:10 -08:00
|
|
|
) -> Result<(), InstructionError>;
|
2020-01-22 15:31:39 -08:00
|
|
|
fn withdraw_nonce_account(
|
2020-01-22 17:54:06 -08:00
|
|
|
&self,
|
2019-12-07 11:54:10 -08:00
|
|
|
lamports: u64,
|
2020-01-22 17:54:06 -08:00
|
|
|
to: &KeyedAccount,
|
2019-12-07 11:54:10 -08:00
|
|
|
rent: &Rent,
|
|
|
|
signers: &HashSet<Pubkey>,
|
2021-12-02 09:47:16 -08:00
|
|
|
invoke_context: &InvokeContext,
|
2019-12-07 11:54:10 -08:00
|
|
|
) -> Result<(), InstructionError>;
|
2020-01-22 15:31:39 -08:00
|
|
|
fn initialize_nonce_account(
|
2020-01-22 17:54:06 -08:00
|
|
|
&self,
|
2019-12-17 06:34:21 -08:00
|
|
|
nonce_authority: &Pubkey,
|
2019-12-08 09:16:55 -08:00
|
|
|
rent: &Rent,
|
2021-12-02 09:47:16 -08:00
|
|
|
invoke_context: &InvokeContext,
|
2019-12-08 09:16:55 -08:00
|
|
|
) -> Result<(), InstructionError>;
|
2020-01-22 15:31:39 -08:00
|
|
|
fn authorize_nonce_account(
|
2020-01-22 17:54:06 -08:00
|
|
|
&self,
|
2019-12-17 06:34:21 -08:00
|
|
|
nonce_authority: &Pubkey,
|
|
|
|
signers: &HashSet<Pubkey>,
|
2021-12-02 09:47:16 -08:00
|
|
|
invoke_context: &InvokeContext,
|
2019-12-17 06:34:21 -08:00
|
|
|
) -> Result<(), InstructionError>;
|
2019-12-07 11:54:10 -08:00
|
|
|
}
|
|
|
|
|
2020-10-26 09:14:57 -07:00
|
|
|
impl<'a> NonceKeyedAccount for KeyedAccount<'a> {
|
2020-01-22 15:31:39 -08:00
|
|
|
fn advance_nonce_account(
|
2020-01-22 17:54:06 -08:00
|
|
|
&self,
|
2019-12-07 11:54:10 -08:00
|
|
|
signers: &HashSet<Pubkey>,
|
2021-12-02 09:47:16 -08:00
|
|
|
invoke_context: &InvokeContext,
|
2019-12-07 11:54:10 -08:00
|
|
|
) -> Result<(), InstructionError> {
|
2021-06-01 16:25:53 -07:00
|
|
|
let merge_nonce_error_into_system_error = invoke_context
|
2021-12-03 03:15:22 -08:00
|
|
|
.feature_set
|
|
|
|
.is_active(&feature_set::merge_nonce_error_into_system_error::id());
|
2021-11-16 15:01:00 -08:00
|
|
|
|
2021-12-03 03:15:22 -08:00
|
|
|
if invoke_context
|
|
|
|
.feature_set
|
|
|
|
.is_active(&nonce_must_be_writable::id())
|
|
|
|
&& !self.is_writable()
|
|
|
|
{
|
2021-11-16 15:01:00 -08:00
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Advance nonce account: Account {} must be writeable",
|
|
|
|
self.unsigned_key()
|
|
|
|
);
|
|
|
|
return Err(InstructionError::InvalidArgument);
|
|
|
|
}
|
|
|
|
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(self)?.convert_to_current();
|
2020-03-04 08:51:48 -08:00
|
|
|
match state {
|
|
|
|
State::Initialized(data) => {
|
|
|
|
if !signers.contains(&data.authority) {
|
2021-03-02 21:44:25 -08:00
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Advance nonce account: Account {} must be a signer",
|
|
|
|
data.authority
|
|
|
|
);
|
2019-12-17 06:34:21 -08:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
|
|
|
}
|
2021-12-03 03:15:22 -08:00
|
|
|
let recent_blockhash = invoke_context.blockhash;
|
2020-03-04 11:01:32 -08:00
|
|
|
if data.blockhash == recent_blockhash {
|
2021-03-02 21:44:25 -08:00
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Advance nonce account: nonce can only advance once per slot"
|
|
|
|
);
|
2021-06-01 16:25:53 -07:00
|
|
|
return Err(nonce_to_instruction_error(
|
|
|
|
NonceError::NotExpired,
|
|
|
|
merge_nonce_error_into_system_error,
|
|
|
|
));
|
2019-12-07 11:54:10 -08:00
|
|
|
}
|
|
|
|
|
2021-10-22 14:32:40 -07:00
|
|
|
let new_data = nonce::state::Data::new(
|
|
|
|
data.authority,
|
|
|
|
recent_blockhash,
|
2021-12-03 03:15:22 -08:00
|
|
|
invoke_context.lamports_per_signature,
|
2021-10-22 14:32:40 -07:00
|
|
|
);
|
2020-03-04 08:51:48 -08:00
|
|
|
self.set_state(&Versions::new_current(State::Initialized(new_data)))
|
|
|
|
}
|
2021-03-02 21:44:25 -08:00
|
|
|
_ => {
|
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Advance nonce account: Account {} state is invalid",
|
|
|
|
self.unsigned_key()
|
|
|
|
);
|
2021-06-01 16:25:53 -07:00
|
|
|
Err(nonce_to_instruction_error(
|
|
|
|
NonceError::BadAccountState,
|
|
|
|
merge_nonce_error_into_system_error,
|
|
|
|
))
|
2021-03-02 21:44:25 -08:00
|
|
|
}
|
2020-03-04 08:51:48 -08:00
|
|
|
}
|
2019-12-07 11:54:10 -08:00
|
|
|
}
|
|
|
|
|
2020-01-22 15:31:39 -08:00
|
|
|
fn withdraw_nonce_account(
|
2020-01-22 17:54:06 -08:00
|
|
|
&self,
|
2019-12-07 11:54:10 -08:00
|
|
|
lamports: u64,
|
2020-01-22 17:54:06 -08:00
|
|
|
to: &KeyedAccount,
|
2019-12-07 11:54:10 -08:00
|
|
|
rent: &Rent,
|
|
|
|
signers: &HashSet<Pubkey>,
|
2021-12-02 09:47:16 -08:00
|
|
|
invoke_context: &InvokeContext,
|
2019-12-07 11:54:10 -08:00
|
|
|
) -> Result<(), InstructionError> {
|
2021-06-01 16:25:53 -07:00
|
|
|
let merge_nonce_error_into_system_error = invoke_context
|
2021-12-03 03:15:22 -08:00
|
|
|
.feature_set
|
|
|
|
.is_active(&feature_set::merge_nonce_error_into_system_error::id());
|
2021-11-16 15:01:00 -08:00
|
|
|
|
2021-12-03 03:15:22 -08:00
|
|
|
if invoke_context
|
|
|
|
.feature_set
|
|
|
|
.is_active(&nonce_must_be_writable::id())
|
|
|
|
&& !self.is_writable()
|
|
|
|
{
|
2021-11-16 15:01:00 -08:00
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Withdraw nonce account: Account {} must be writeable",
|
|
|
|
self.unsigned_key()
|
|
|
|
);
|
|
|
|
return Err(InstructionError::InvalidArgument);
|
|
|
|
}
|
|
|
|
|
2020-03-03 18:39:09 -08:00
|
|
|
let signer = match AccountUtilsState::<Versions>::state(self)?.convert_to_current() {
|
2020-03-03 17:00:39 -08:00
|
|
|
State::Uninitialized => {
|
2020-01-22 09:11:56 -08:00
|
|
|
if lamports > self.lamports()? {
|
2021-03-02 21:44:25 -08:00
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Withdraw nonce account: insufficient lamports {}, need {}",
|
|
|
|
self.lamports()?,
|
|
|
|
lamports,
|
|
|
|
);
|
2019-12-07 11:54:10 -08:00
|
|
|
return Err(InstructionError::InsufficientFunds);
|
|
|
|
}
|
2019-12-17 06:34:21 -08:00
|
|
|
*self.unsigned_key()
|
2019-12-07 11:54:10 -08:00
|
|
|
}
|
2020-03-04 08:51:48 -08:00
|
|
|
State::Initialized(ref data) => {
|
2020-01-22 09:11:56 -08:00
|
|
|
if lamports == self.lamports()? {
|
2021-12-03 03:15:22 -08:00
|
|
|
if data.blockhash == invoke_context.blockhash {
|
2021-03-02 21:44:25 -08:00
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Withdraw nonce account: nonce can only advance once per slot"
|
|
|
|
);
|
2021-06-01 16:25:53 -07:00
|
|
|
return Err(nonce_to_instruction_error(
|
|
|
|
NonceError::NotExpired,
|
|
|
|
merge_nonce_error_into_system_error,
|
|
|
|
));
|
2019-12-07 11:54:10 -08:00
|
|
|
}
|
2020-12-21 14:44:00 -08:00
|
|
|
self.set_state(&Versions::new_current(State::Uninitialized))?;
|
2019-12-07 11:54:10 -08:00
|
|
|
} else {
|
2020-01-22 09:11:56 -08:00
|
|
|
let min_balance = rent.minimum_balance(self.data_len()?);
|
2021-03-02 21:44:25 -08:00
|
|
|
let amount = checked_add(lamports, min_balance)?;
|
|
|
|
if amount > self.lamports()? {
|
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Withdraw nonce account: insufficient lamports {}, need {}",
|
|
|
|
self.lamports()?,
|
|
|
|
amount,
|
|
|
|
);
|
2019-12-07 11:54:10 -08:00
|
|
|
return Err(InstructionError::InsufficientFunds);
|
|
|
|
}
|
|
|
|
}
|
2020-03-04 08:51:48 -08:00
|
|
|
data.authority
|
2019-12-07 11:54:10 -08:00
|
|
|
}
|
2019-12-17 06:34:21 -08:00
|
|
|
};
|
|
|
|
|
|
|
|
if !signers.contains(&signer) {
|
2021-03-02 21:44:25 -08:00
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Withdraw nonce account: Account {} must sign",
|
|
|
|
signer
|
|
|
|
);
|
2019-12-17 06:34:21 -08:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-12-07 11:54:10 -08:00
|
|
|
}
|
|
|
|
|
2021-04-22 11:53:06 -07:00
|
|
|
let nonce_balance = self.try_account_ref_mut()?.lamports();
|
|
|
|
self.try_account_ref_mut()?.set_lamports(
|
|
|
|
nonce_balance
|
|
|
|
.checked_sub(lamports)
|
|
|
|
.ok_or(InstructionError::ArithmeticOverflow)?,
|
|
|
|
);
|
|
|
|
let to_balance = to.try_account_ref_mut()?.lamports();
|
|
|
|
to.try_account_ref_mut()?.set_lamports(
|
|
|
|
to_balance
|
|
|
|
.checked_add(lamports)
|
|
|
|
.ok_or(InstructionError::ArithmeticOverflow)?,
|
|
|
|
);
|
2019-12-07 11:54:10 -08:00
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
2019-12-08 09:16:55 -08:00
|
|
|
|
2020-01-22 15:31:39 -08:00
|
|
|
fn initialize_nonce_account(
|
2020-01-22 17:54:06 -08:00
|
|
|
&self,
|
2019-12-17 06:34:21 -08:00
|
|
|
nonce_authority: &Pubkey,
|
2019-12-08 09:16:55 -08:00
|
|
|
rent: &Rent,
|
2021-12-02 09:47:16 -08:00
|
|
|
invoke_context: &InvokeContext,
|
2019-12-08 09:16:55 -08:00
|
|
|
) -> Result<(), InstructionError> {
|
2021-06-01 16:25:53 -07:00
|
|
|
let merge_nonce_error_into_system_error = invoke_context
|
2021-12-03 03:15:22 -08:00
|
|
|
.feature_set
|
|
|
|
.is_active(&feature_set::merge_nonce_error_into_system_error::id());
|
2021-11-16 15:01:00 -08:00
|
|
|
|
2021-12-03 03:15:22 -08:00
|
|
|
if invoke_context
|
|
|
|
.feature_set
|
|
|
|
.is_active(&nonce_must_be_writable::id())
|
|
|
|
&& !self.is_writable()
|
|
|
|
{
|
2021-11-16 15:01:00 -08:00
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Initialize nonce account: Account {} must be writeable",
|
|
|
|
self.unsigned_key()
|
|
|
|
);
|
|
|
|
return Err(InstructionError::InvalidArgument);
|
|
|
|
}
|
|
|
|
|
2020-03-04 08:51:48 -08:00
|
|
|
match AccountUtilsState::<Versions>::state(self)?.convert_to_current() {
|
2020-03-03 17:00:39 -08:00
|
|
|
State::Uninitialized => {
|
2020-01-22 09:11:56 -08:00
|
|
|
let min_balance = rent.minimum_balance(self.data_len()?);
|
|
|
|
if self.lamports()? < min_balance {
|
2021-03-02 21:44:25 -08:00
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Initialize nonce account: insufficient lamports {}, need {}",
|
|
|
|
self.lamports()?,
|
|
|
|
min_balance
|
|
|
|
);
|
2019-12-08 09:16:55 -08:00
|
|
|
return Err(InstructionError::InsufficientFunds);
|
|
|
|
}
|
2021-10-22 14:32:40 -07:00
|
|
|
let data = nonce::state::Data::new(
|
|
|
|
*nonce_authority,
|
2021-12-03 03:15:22 -08:00
|
|
|
invoke_context.blockhash,
|
|
|
|
invoke_context.lamports_per_signature,
|
2021-10-22 14:32:40 -07:00
|
|
|
);
|
2020-03-04 08:51:48 -08:00
|
|
|
self.set_state(&Versions::new_current(State::Initialized(data)))
|
2019-12-08 09:16:55 -08:00
|
|
|
}
|
2021-03-02 21:44:25 -08:00
|
|
|
_ => {
|
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Initialize nonce account: Account {} state is invalid",
|
|
|
|
self.unsigned_key()
|
|
|
|
);
|
2021-06-01 16:25:53 -07:00
|
|
|
Err(nonce_to_instruction_error(
|
|
|
|
NonceError::BadAccountState,
|
|
|
|
merge_nonce_error_into_system_error,
|
|
|
|
))
|
2021-03-02 21:44:25 -08:00
|
|
|
}
|
2020-03-04 08:51:48 -08:00
|
|
|
}
|
2019-12-08 09:16:55 -08:00
|
|
|
}
|
2019-12-17 06:34:21 -08:00
|
|
|
|
2020-01-22 15:31:39 -08:00
|
|
|
fn authorize_nonce_account(
|
2020-01-22 17:54:06 -08:00
|
|
|
&self,
|
2019-12-17 06:34:21 -08:00
|
|
|
nonce_authority: &Pubkey,
|
|
|
|
signers: &HashSet<Pubkey>,
|
2021-12-02 09:47:16 -08:00
|
|
|
invoke_context: &InvokeContext,
|
2019-12-17 06:34:21 -08:00
|
|
|
) -> Result<(), InstructionError> {
|
2021-06-01 16:25:53 -07:00
|
|
|
let merge_nonce_error_into_system_error = invoke_context
|
2021-12-03 03:15:22 -08:00
|
|
|
.feature_set
|
|
|
|
.is_active(&feature_set::merge_nonce_error_into_system_error::id());
|
2021-11-16 15:01:00 -08:00
|
|
|
|
2021-12-03 03:15:22 -08:00
|
|
|
if invoke_context
|
|
|
|
.feature_set
|
|
|
|
.is_active(&nonce_must_be_writable::id())
|
|
|
|
&& !self.is_writable()
|
|
|
|
{
|
2021-11-16 15:01:00 -08:00
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Authorize nonce account: Account {} must be writeable",
|
|
|
|
self.unsigned_key()
|
|
|
|
);
|
|
|
|
return Err(InstructionError::InvalidArgument);
|
|
|
|
}
|
|
|
|
|
2020-03-03 18:39:09 -08:00
|
|
|
match AccountUtilsState::<Versions>::state(self)?.convert_to_current() {
|
2020-03-04 08:51:48 -08:00
|
|
|
State::Initialized(data) => {
|
|
|
|
if !signers.contains(&data.authority) {
|
2021-03-02 21:44:25 -08:00
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Authorize nonce account: Account {} must sign",
|
|
|
|
data.authority
|
|
|
|
);
|
2019-12-17 06:34:21 -08:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
|
|
|
}
|
2021-10-22 14:32:40 -07:00
|
|
|
let new_data = nonce::state::Data::new(
|
|
|
|
*nonce_authority,
|
|
|
|
data.blockhash,
|
|
|
|
data.get_lamports_per_signature(),
|
|
|
|
);
|
2020-03-04 08:51:48 -08:00
|
|
|
self.set_state(&Versions::new_current(State::Initialized(new_data)))
|
2019-12-17 06:34:21 -08:00
|
|
|
}
|
2021-03-02 21:44:25 -08:00
|
|
|
_ => {
|
|
|
|
ic_msg!(
|
|
|
|
invoke_context,
|
|
|
|
"Authorize nonce account: Account {} state is invalid",
|
|
|
|
self.unsigned_key()
|
|
|
|
);
|
2021-06-01 16:25:53 -07:00
|
|
|
Err(nonce_to_instruction_error(
|
|
|
|
NonceError::BadAccountState,
|
|
|
|
merge_nonce_error_into_system_error,
|
|
|
|
))
|
2021-03-02 21:44:25 -08:00
|
|
|
}
|
2019-12-17 06:34:21 -08:00
|
|
|
}
|
|
|
|
}
|
2019-12-07 11:54:10 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod test {
|
|
|
|
use super::*;
|
2021-12-02 09:47:16 -08:00
|
|
|
use solana_program_runtime::invoke_context::InvokeContext;
|
2021-10-25 13:58:18 -07:00
|
|
|
use solana_sdk::{
|
2021-04-22 13:04:55 -07:00
|
|
|
account::ReadableAccount,
|
2020-03-03 18:39:09 -08:00
|
|
|
account_utils::State as AccountUtilsState,
|
2021-10-25 13:58:18 -07:00
|
|
|
hash::{hash, Hash},
|
2020-10-26 09:14:57 -07:00
|
|
|
keyed_account::KeyedAccount,
|
2020-03-03 17:00:39 -08:00
|
|
|
nonce::{self, State},
|
2021-11-04 13:47:32 -07:00
|
|
|
nonce_account::{create_account, verify_nonce_account},
|
2021-06-01 16:25:53 -07:00
|
|
|
system_instruction::SystemError,
|
2019-12-07 11:54:10 -08:00
|
|
|
};
|
2021-10-25 13:58:18 -07:00
|
|
|
|
|
|
|
fn with_test_keyed_account<F>(lamports: u64, signer: bool, f: F)
|
|
|
|
where
|
|
|
|
F: Fn(&KeyedAccount),
|
|
|
|
{
|
|
|
|
let pubkey = Pubkey::new_unique();
|
|
|
|
let account = create_account(lamports);
|
|
|
|
let keyed_account = KeyedAccount::new(&pubkey, signer, &account);
|
|
|
|
f(&keyed_account)
|
|
|
|
}
|
2021-07-29 01:50:20 -07:00
|
|
|
|
2021-10-22 14:32:40 -07:00
|
|
|
fn create_test_blockhash(seed: usize) -> (Hash, u64) {
|
2021-07-29 01:50:20 -07:00
|
|
|
(
|
|
|
|
hash(&bincode::serialize(&seed).unwrap()),
|
2021-10-22 14:32:40 -07:00
|
|
|
(seed as u64).saturating_mul(100),
|
2021-07-29 01:50:20 -07:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2021-12-02 09:47:16 -08:00
|
|
|
fn create_invoke_context_with_blockhash<'a>(seed: usize) -> InvokeContext<'a> {
|
|
|
|
let mut invoke_context = InvokeContext::new_mock(&[], &[]);
|
2021-10-22 14:32:40 -07:00
|
|
|
let (blockhash, lamports_per_signature) = create_test_blockhash(seed);
|
2021-12-03 03:15:22 -08:00
|
|
|
invoke_context.blockhash = blockhash;
|
|
|
|
invoke_context.lamports_per_signature = lamports_per_signature;
|
2021-07-29 01:50:20 -07:00
|
|
|
invoke_context
|
|
|
|
}
|
2019-12-07 11:54:10 -08:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn default_is_uninitialized() {
|
2020-03-03 17:00:39 -08:00
|
|
|
assert_eq!(State::default(), State::Uninitialized)
|
2019-12-07 11:54:10 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn keyed_account_expected_behavior() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-07 11:54:10 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |keyed_account| {
|
2020-03-04 08:51:48 -08:00
|
|
|
let data = nonce::state::Data {
|
|
|
|
authority: *keyed_account.unsigned_key(),
|
|
|
|
..nonce::state::Data::default()
|
|
|
|
};
|
2019-12-07 11:54:10 -08:00
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*keyed_account.signer_key().unwrap());
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(keyed_account)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2019-12-07 11:54:10 -08:00
|
|
|
// New is in Uninitialzed state
|
2020-03-03 17:00:39 -08:00
|
|
|
assert_eq!(state, State::Uninitialized);
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(95);
|
2020-05-15 09:35:43 -07:00
|
|
|
let authorized = keyed_account.unsigned_key();
|
2019-12-07 11:54:10 -08:00
|
|
|
keyed_account
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(authorized, &rent, &invoke_context)
|
2019-12-07 11:54:10 -08:00
|
|
|
.unwrap();
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(keyed_account)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2021-10-22 14:32:40 -07:00
|
|
|
let data = nonce::state::Data::new(
|
|
|
|
data.authority,
|
2021-12-03 03:15:22 -08:00
|
|
|
invoke_context.blockhash,
|
|
|
|
invoke_context.lamports_per_signature,
|
2021-10-22 14:32:40 -07:00
|
|
|
);
|
2019-12-07 11:54:10 -08:00
|
|
|
// First nonce instruction drives state from Uninitialized to Initialized
|
2020-03-05 06:40:26 -08:00
|
|
|
assert_eq!(state, State::Initialized(data.clone()));
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(63);
|
2020-01-03 16:34:58 -08:00
|
|
|
keyed_account
|
2021-07-29 01:50:20 -07:00
|
|
|
.advance_nonce_account(&signers, &invoke_context)
|
2020-01-03 16:34:58 -08:00
|
|
|
.unwrap();
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(keyed_account)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2021-10-22 14:32:40 -07:00
|
|
|
let data = nonce::state::Data::new(
|
|
|
|
data.authority,
|
2021-12-03 03:15:22 -08:00
|
|
|
invoke_context.blockhash,
|
|
|
|
invoke_context.lamports_per_signature,
|
2021-10-22 14:32:40 -07:00
|
|
|
);
|
2019-12-07 11:54:10 -08:00
|
|
|
// Second nonce instruction consumes and replaces stored nonce
|
2020-03-05 06:40:26 -08:00
|
|
|
assert_eq!(state, State::Initialized(data.clone()));
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(31);
|
2020-01-03 16:34:58 -08:00
|
|
|
keyed_account
|
2021-07-29 01:50:20 -07:00
|
|
|
.advance_nonce_account(&signers, &invoke_context)
|
2020-01-03 16:34:58 -08:00
|
|
|
.unwrap();
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(keyed_account)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2021-10-22 14:32:40 -07:00
|
|
|
let data = nonce::state::Data::new(
|
|
|
|
data.authority,
|
2021-12-03 03:15:22 -08:00
|
|
|
invoke_context.blockhash,
|
|
|
|
invoke_context.lamports_per_signature,
|
2021-10-22 14:32:40 -07:00
|
|
|
);
|
2019-12-07 11:54:10 -08:00
|
|
|
// Third nonce instruction for fun and profit
|
2020-05-15 09:35:43 -07:00
|
|
|
assert_eq!(state, State::Initialized(data));
|
2020-01-22 17:54:06 -08:00
|
|
|
with_test_keyed_account(42, false, |to_keyed| {
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(0);
|
2021-04-30 11:16:58 -07:00
|
|
|
let withdraw_lamports = keyed_account.account.borrow().lamports();
|
2020-01-22 09:11:56 -08:00
|
|
|
let expect_nonce_lamports =
|
2021-04-30 11:16:58 -07:00
|
|
|
keyed_account.account.borrow().lamports() - withdraw_lamports;
|
|
|
|
let expect_to_lamports = to_keyed.account.borrow().lamports() + withdraw_lamports;
|
2019-12-07 11:54:10 -08:00
|
|
|
keyed_account
|
2020-01-22 15:31:39 -08:00
|
|
|
.withdraw_nonce_account(
|
2019-12-07 11:54:10 -08:00
|
|
|
withdraw_lamports,
|
2021-06-18 06:34:46 -07:00
|
|
|
to_keyed,
|
2019-12-07 11:54:10 -08:00
|
|
|
&rent,
|
|
|
|
&signers,
|
2021-07-29 01:50:20 -07:00
|
|
|
&invoke_context,
|
2019-12-07 11:54:10 -08:00
|
|
|
)
|
|
|
|
.unwrap();
|
2020-03-03 17:00:39 -08:00
|
|
|
// Empties Account balance
|
2020-01-22 09:11:56 -08:00
|
|
|
assert_eq!(
|
2021-04-30 11:16:58 -07:00
|
|
|
keyed_account.account.borrow().lamports(),
|
2020-01-22 09:11:56 -08:00
|
|
|
expect_nonce_lamports
|
|
|
|
);
|
2020-03-03 17:00:39 -08:00
|
|
|
// Account balance goes to `to`
|
2021-04-30 11:16:58 -07:00
|
|
|
assert_eq!(to_keyed.account.borrow().lamports(), expect_to_lamports);
|
2020-12-21 14:44:00 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(keyed_account)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
|
|
|
// Empty balance deinitializes data
|
|
|
|
assert_eq!(state, State::Uninitialized);
|
2019-12-07 11:54:10 -08:00
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn nonce_inx_initialized_account_not_signer_fail() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-07 11:54:10 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |nonce_account| {
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(31);
|
2020-05-15 09:35:43 -07:00
|
|
|
let authority = *nonce_account.unsigned_key();
|
2019-12-07 11:54:10 -08:00
|
|
|
nonce_account
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(&authority, &rent, &invoke_context)
|
2019-12-07 11:54:10 -08:00
|
|
|
.unwrap();
|
2021-04-23 13:59:13 -07:00
|
|
|
let pubkey = *nonce_account.account.borrow().owner();
|
2020-01-22 17:54:06 -08:00
|
|
|
let nonce_account = KeyedAccount::new(&pubkey, false, nonce_account.account);
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(&nonce_account)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2021-10-22 14:32:40 -07:00
|
|
|
let data = nonce::state::Data::new(
|
2020-03-04 08:51:48 -08:00
|
|
|
authority,
|
2021-12-03 03:15:22 -08:00
|
|
|
invoke_context.blockhash,
|
|
|
|
invoke_context.lamports_per_signature,
|
2021-10-22 14:32:40 -07:00
|
|
|
);
|
2020-03-04 08:51:48 -08:00
|
|
|
assert_eq!(state, State::Initialized(data));
|
2019-12-07 11:54:10 -08:00
|
|
|
let signers = HashSet::new();
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(0);
|
2019-12-07 11:54:10 -08:00
|
|
|
|
2021-07-29 01:50:20 -07:00
|
|
|
let result = nonce_account.advance_nonce_account(&signers, &invoke_context);
|
|
|
|
assert_eq!(result, Err(InstructionError::MissingRequiredSignature),);
|
2019-12-07 11:54:10 -08:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn nonce_inx_too_early_fail() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-07 11:54:10 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |keyed_account| {
|
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*keyed_account.signer_key().unwrap());
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(63);
|
2020-05-15 09:35:43 -07:00
|
|
|
let authorized = *keyed_account.unsigned_key();
|
2019-12-07 11:54:10 -08:00
|
|
|
keyed_account
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(&authorized, &rent, &invoke_context)
|
2019-12-07 11:54:10 -08:00
|
|
|
.unwrap();
|
2021-07-29 01:50:20 -07:00
|
|
|
let result = keyed_account.advance_nonce_account(&signers, &invoke_context);
|
2021-06-01 16:25:53 -07:00
|
|
|
assert_eq!(result, Err(SystemError::NonceBlockhashNotExpired.into()));
|
2019-12-07 11:54:10 -08:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
2019-12-08 09:16:55 -08:00
|
|
|
fn nonce_inx_uninitialized_account_fail() {
|
2019-12-07 11:54:10 -08:00
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-08 09:16:55 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |keyed_account| {
|
2019-12-07 11:54:10 -08:00
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*keyed_account.signer_key().unwrap());
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(63);
|
|
|
|
let result = keyed_account.advance_nonce_account(&signers, &invoke_context);
|
2021-06-01 16:25:53 -07:00
|
|
|
assert_eq!(result, Err(InstructionError::InvalidAccountData));
|
2019-12-07 11:54:10 -08:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-12-17 06:34:21 -08:00
|
|
|
#[test]
|
|
|
|
fn nonce_inx_independent_nonce_authority_ok() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-17 06:34:21 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |nonce_account| {
|
|
|
|
with_test_keyed_account(42, true, |nonce_authority| {
|
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*nonce_account.signer_key().unwrap());
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(63);
|
2020-05-15 09:35:43 -07:00
|
|
|
let authorized = *nonce_authority.unsigned_key();
|
2019-12-17 06:34:21 -08:00
|
|
|
nonce_account
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(&authorized, &rent, &invoke_context)
|
2019-12-17 06:34:21 -08:00
|
|
|
.unwrap();
|
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*nonce_authority.signer_key().unwrap());
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(31);
|
|
|
|
let result = nonce_account.advance_nonce_account(&signers, &invoke_context);
|
2019-12-17 06:34:21 -08:00
|
|
|
assert_eq!(result, Ok(()));
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn nonce_inx_no_nonce_authority_sig_fail() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-17 06:34:21 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |nonce_account| {
|
|
|
|
with_test_keyed_account(42, false, |nonce_authority| {
|
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*nonce_account.signer_key().unwrap());
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(63);
|
2020-05-15 09:35:43 -07:00
|
|
|
let authorized = *nonce_authority.unsigned_key();
|
2019-12-17 06:34:21 -08:00
|
|
|
nonce_account
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(&authorized, &rent, &invoke_context)
|
2019-12-17 06:34:21 -08:00
|
|
|
.unwrap();
|
2021-07-29 01:50:20 -07:00
|
|
|
let result = nonce_account.advance_nonce_account(&signers, &invoke_context);
|
2019-12-17 06:34:21 -08:00
|
|
|
assert_eq!(result, Err(InstructionError::MissingRequiredSignature),);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2019-12-07 11:54:10 -08:00
|
|
|
#[test]
|
|
|
|
fn withdraw_inx_unintialized_acc_ok() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-07 11:54:10 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |nonce_keyed| {
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(nonce_keyed)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2020-03-03 17:00:39 -08:00
|
|
|
assert_eq!(state, State::Uninitialized);
|
2020-01-22 17:54:06 -08:00
|
|
|
with_test_keyed_account(42, false, |to_keyed| {
|
2019-12-07 11:54:10 -08:00
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*nonce_keyed.signer_key().unwrap());
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(0);
|
2021-04-30 11:16:58 -07:00
|
|
|
let withdraw_lamports = nonce_keyed.account.borrow().lamports();
|
2020-01-22 09:11:56 -08:00
|
|
|
let expect_nonce_lamports =
|
2021-04-30 11:16:58 -07:00
|
|
|
nonce_keyed.account.borrow().lamports() - withdraw_lamports;
|
|
|
|
let expect_to_lamports = to_keyed.account.borrow().lamports() + withdraw_lamports;
|
2019-12-07 11:54:10 -08:00
|
|
|
nonce_keyed
|
2020-01-22 15:31:39 -08:00
|
|
|
.withdraw_nonce_account(
|
2019-12-07 11:54:10 -08:00
|
|
|
withdraw_lamports,
|
2021-06-18 06:34:46 -07:00
|
|
|
to_keyed,
|
2019-12-07 11:54:10 -08:00
|
|
|
&rent,
|
|
|
|
&signers,
|
2021-07-29 01:50:20 -07:00
|
|
|
&invoke_context,
|
2019-12-07 11:54:10 -08:00
|
|
|
)
|
|
|
|
.unwrap();
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(nonce_keyed)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2019-12-07 11:54:10 -08:00
|
|
|
// Withdraw instruction...
|
2020-03-03 17:00:39 -08:00
|
|
|
// Deinitializes Account state
|
|
|
|
assert_eq!(state, State::Uninitialized);
|
|
|
|
// Empties Account balance
|
2021-04-22 13:04:55 -07:00
|
|
|
assert_eq!(
|
|
|
|
nonce_keyed.account.borrow().lamports(),
|
|
|
|
expect_nonce_lamports
|
|
|
|
);
|
2020-03-03 17:00:39 -08:00
|
|
|
// Account balance goes to `to`
|
2021-04-22 13:04:55 -07:00
|
|
|
assert_eq!(to_keyed.account.borrow().lamports(), expect_to_lamports);
|
2019-12-07 11:54:10 -08:00
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn withdraw_inx_unintialized_acc_unsigned_fail() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-07 11:54:10 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, false, |nonce_keyed| {
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(nonce_keyed)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2020-03-03 17:00:39 -08:00
|
|
|
assert_eq!(state, State::Uninitialized);
|
2020-01-22 17:54:06 -08:00
|
|
|
with_test_keyed_account(42, false, |to_keyed| {
|
2019-12-07 11:54:10 -08:00
|
|
|
let signers = HashSet::new();
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(0);
|
2021-04-30 11:16:58 -07:00
|
|
|
let lamports = nonce_keyed.account.borrow().lamports();
|
2020-01-22 15:31:39 -08:00
|
|
|
let result = nonce_keyed.withdraw_nonce_account(
|
2020-01-22 09:11:56 -08:00
|
|
|
lamports,
|
2021-06-18 06:34:46 -07:00
|
|
|
to_keyed,
|
2019-12-07 11:54:10 -08:00
|
|
|
&rent,
|
|
|
|
&signers,
|
2021-07-29 01:50:20 -07:00
|
|
|
&invoke_context,
|
2019-12-07 11:54:10 -08:00
|
|
|
);
|
|
|
|
assert_eq!(result, Err(InstructionError::MissingRequiredSignature),);
|
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn withdraw_inx_unintialized_acc_insuff_funds_fail() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-07 11:54:10 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |nonce_keyed| {
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(nonce_keyed)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2020-03-03 17:00:39 -08:00
|
|
|
assert_eq!(state, State::Uninitialized);
|
2020-01-22 17:54:06 -08:00
|
|
|
with_test_keyed_account(42, false, |to_keyed| {
|
2019-12-07 11:54:10 -08:00
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*nonce_keyed.signer_key().unwrap());
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(0);
|
2021-04-30 11:16:58 -07:00
|
|
|
let lamports = nonce_keyed.account.borrow().lamports() + 1;
|
2020-01-22 15:31:39 -08:00
|
|
|
let result = nonce_keyed.withdraw_nonce_account(
|
2020-01-22 09:11:56 -08:00
|
|
|
lamports,
|
2021-06-18 06:34:46 -07:00
|
|
|
to_keyed,
|
2019-12-07 11:54:10 -08:00
|
|
|
&rent,
|
|
|
|
&signers,
|
2021-07-29 01:50:20 -07:00
|
|
|
&invoke_context,
|
2019-12-07 11:54:10 -08:00
|
|
|
);
|
|
|
|
assert_eq!(result, Err(InstructionError::InsufficientFunds));
|
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn withdraw_inx_uninitialized_acc_two_withdraws_ok() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-07 11:54:10 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |nonce_keyed| {
|
2020-01-22 17:54:06 -08:00
|
|
|
with_test_keyed_account(42, false, |to_keyed| {
|
2019-12-07 11:54:10 -08:00
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*nonce_keyed.signer_key().unwrap());
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(0);
|
2021-04-30 11:16:58 -07:00
|
|
|
let withdraw_lamports = nonce_keyed.account.borrow().lamports() / 2;
|
2020-01-22 09:11:56 -08:00
|
|
|
let nonce_expect_lamports =
|
2021-04-30 11:16:58 -07:00
|
|
|
nonce_keyed.account.borrow().lamports() - withdraw_lamports;
|
|
|
|
let to_expect_lamports = to_keyed.account.borrow().lamports() + withdraw_lamports;
|
2019-12-07 11:54:10 -08:00
|
|
|
nonce_keyed
|
2020-01-22 15:31:39 -08:00
|
|
|
.withdraw_nonce_account(
|
2019-12-07 11:54:10 -08:00
|
|
|
withdraw_lamports,
|
2021-06-18 06:34:46 -07:00
|
|
|
to_keyed,
|
2019-12-07 11:54:10 -08:00
|
|
|
&rent,
|
|
|
|
&signers,
|
2021-07-29 01:50:20 -07:00
|
|
|
&invoke_context,
|
2019-12-07 11:54:10 -08:00
|
|
|
)
|
|
|
|
.unwrap();
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(nonce_keyed)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2020-03-03 17:00:39 -08:00
|
|
|
assert_eq!(state, State::Uninitialized);
|
2021-04-30 11:16:58 -07:00
|
|
|
assert_eq!(
|
|
|
|
nonce_keyed.account.borrow().lamports(),
|
|
|
|
nonce_expect_lamports
|
|
|
|
);
|
|
|
|
assert_eq!(to_keyed.account.borrow().lamports(), to_expect_lamports);
|
|
|
|
let withdraw_lamports = nonce_keyed.account.borrow().lamports();
|
2020-01-22 09:11:56 -08:00
|
|
|
let nonce_expect_lamports =
|
2021-04-30 11:16:58 -07:00
|
|
|
nonce_keyed.account.borrow().lamports() - withdraw_lamports;
|
|
|
|
let to_expect_lamports = to_keyed.account.borrow().lamports() + withdraw_lamports;
|
2019-12-07 11:54:10 -08:00
|
|
|
nonce_keyed
|
2020-01-22 15:31:39 -08:00
|
|
|
.withdraw_nonce_account(
|
2019-12-07 11:54:10 -08:00
|
|
|
withdraw_lamports,
|
2021-06-18 06:34:46 -07:00
|
|
|
to_keyed,
|
2019-12-07 11:54:10 -08:00
|
|
|
&rent,
|
|
|
|
&signers,
|
2021-07-29 01:50:20 -07:00
|
|
|
&invoke_context,
|
2019-12-07 11:54:10 -08:00
|
|
|
)
|
|
|
|
.unwrap();
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(nonce_keyed)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2020-03-03 17:00:39 -08:00
|
|
|
assert_eq!(state, State::Uninitialized);
|
2021-04-30 11:16:58 -07:00
|
|
|
assert_eq!(
|
|
|
|
nonce_keyed.account.borrow().lamports(),
|
|
|
|
nonce_expect_lamports
|
|
|
|
);
|
|
|
|
assert_eq!(to_keyed.account.borrow().lamports(), to_expect_lamports);
|
2019-12-07 11:54:10 -08:00
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn withdraw_inx_initialized_acc_two_withdraws_ok() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-07 11:54:10 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |nonce_keyed| {
|
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*nonce_keyed.signer_key().unwrap());
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(31);
|
2020-05-15 09:35:43 -07:00
|
|
|
let authority = *nonce_keyed.unsigned_key();
|
2019-12-17 06:34:21 -08:00
|
|
|
nonce_keyed
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(&authority, &rent, &invoke_context)
|
2019-12-17 06:34:21 -08:00
|
|
|
.unwrap();
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(nonce_keyed)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2021-10-22 14:32:40 -07:00
|
|
|
let data = nonce::state::Data::new(
|
2020-03-04 08:51:48 -08:00
|
|
|
authority,
|
2021-12-03 03:15:22 -08:00
|
|
|
invoke_context.blockhash,
|
|
|
|
invoke_context.lamports_per_signature,
|
2021-10-22 14:32:40 -07:00
|
|
|
);
|
2020-03-05 06:40:26 -08:00
|
|
|
assert_eq!(state, State::Initialized(data.clone()));
|
2020-01-22 17:54:06 -08:00
|
|
|
with_test_keyed_account(42, false, |to_keyed| {
|
2021-04-30 11:16:58 -07:00
|
|
|
let withdraw_lamports = nonce_keyed.account.borrow().lamports() - min_lamports;
|
2020-01-22 09:11:56 -08:00
|
|
|
let nonce_expect_lamports =
|
2021-04-30 11:16:58 -07:00
|
|
|
nonce_keyed.account.borrow().lamports() - withdraw_lamports;
|
|
|
|
let to_expect_lamports = to_keyed.account.borrow().lamports() + withdraw_lamports;
|
2019-12-07 11:54:10 -08:00
|
|
|
nonce_keyed
|
2020-01-22 15:31:39 -08:00
|
|
|
.withdraw_nonce_account(
|
2019-12-07 11:54:10 -08:00
|
|
|
withdraw_lamports,
|
2021-06-18 06:34:46 -07:00
|
|
|
to_keyed,
|
2019-12-07 11:54:10 -08:00
|
|
|
&rent,
|
|
|
|
&signers,
|
2021-07-29 01:50:20 -07:00
|
|
|
&invoke_context,
|
2019-12-07 11:54:10 -08:00
|
|
|
)
|
|
|
|
.unwrap();
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(nonce_keyed)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2021-10-22 14:32:40 -07:00
|
|
|
let data = nonce::state::Data::new(
|
|
|
|
data.authority,
|
2021-12-03 03:15:22 -08:00
|
|
|
invoke_context.blockhash,
|
|
|
|
invoke_context.lamports_per_signature,
|
2021-10-22 14:32:40 -07:00
|
|
|
);
|
2020-03-04 08:51:48 -08:00
|
|
|
assert_eq!(state, State::Initialized(data));
|
2021-04-30 11:16:58 -07:00
|
|
|
assert_eq!(
|
|
|
|
nonce_keyed.account.borrow().lamports(),
|
|
|
|
nonce_expect_lamports
|
|
|
|
);
|
|
|
|
assert_eq!(to_keyed.account.borrow().lamports(), to_expect_lamports);
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(0);
|
2021-04-30 11:16:58 -07:00
|
|
|
let withdraw_lamports = nonce_keyed.account.borrow().lamports();
|
2020-01-22 09:11:56 -08:00
|
|
|
let nonce_expect_lamports =
|
2021-04-30 11:16:58 -07:00
|
|
|
nonce_keyed.account.borrow().lamports() - withdraw_lamports;
|
|
|
|
let to_expect_lamports = to_keyed.account.borrow().lamports() + withdraw_lamports;
|
2019-12-07 11:54:10 -08:00
|
|
|
nonce_keyed
|
2020-01-22 15:31:39 -08:00
|
|
|
.withdraw_nonce_account(
|
2019-12-07 11:54:10 -08:00
|
|
|
withdraw_lamports,
|
2021-06-18 06:34:46 -07:00
|
|
|
to_keyed,
|
2019-12-07 11:54:10 -08:00
|
|
|
&rent,
|
|
|
|
&signers,
|
2021-07-29 01:50:20 -07:00
|
|
|
&invoke_context,
|
2019-12-07 11:54:10 -08:00
|
|
|
)
|
|
|
|
.unwrap();
|
2020-12-21 14:44:00 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(nonce_keyed)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
|
|
|
assert_eq!(state, State::Uninitialized);
|
2021-04-30 11:16:58 -07:00
|
|
|
assert_eq!(
|
|
|
|
nonce_keyed.account.borrow().lamports(),
|
|
|
|
nonce_expect_lamports
|
|
|
|
);
|
|
|
|
assert_eq!(to_keyed.account.borrow().lamports(), to_expect_lamports);
|
2019-12-07 11:54:10 -08:00
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn withdraw_inx_initialized_acc_nonce_too_early_fail() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-07 11:54:10 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |nonce_keyed| {
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(0);
|
2020-05-15 09:35:43 -07:00
|
|
|
let authorized = *nonce_keyed.unsigned_key();
|
2019-12-17 06:34:21 -08:00
|
|
|
nonce_keyed
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(&authorized, &rent, &invoke_context)
|
2019-12-17 06:34:21 -08:00
|
|
|
.unwrap();
|
2020-01-22 17:54:06 -08:00
|
|
|
with_test_keyed_account(42, false, |to_keyed| {
|
2019-12-07 11:54:10 -08:00
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*nonce_keyed.signer_key().unwrap());
|
2021-04-30 11:16:58 -07:00
|
|
|
let withdraw_lamports = nonce_keyed.account.borrow().lamports();
|
2020-01-22 15:31:39 -08:00
|
|
|
let result = nonce_keyed.withdraw_nonce_account(
|
2019-12-07 11:54:10 -08:00
|
|
|
withdraw_lamports,
|
2021-06-18 06:34:46 -07:00
|
|
|
to_keyed,
|
2019-12-07 11:54:10 -08:00
|
|
|
&rent,
|
|
|
|
&signers,
|
2021-07-29 01:50:20 -07:00
|
|
|
&invoke_context,
|
2019-12-07 11:54:10 -08:00
|
|
|
);
|
2021-06-01 16:25:53 -07:00
|
|
|
assert_eq!(result, Err(SystemError::NonceBlockhashNotExpired.into()));
|
2019-12-07 11:54:10 -08:00
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn withdraw_inx_initialized_acc_insuff_funds_fail() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-07 11:54:10 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |nonce_keyed| {
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(95);
|
2020-05-15 09:35:43 -07:00
|
|
|
let authorized = *nonce_keyed.unsigned_key();
|
2019-12-17 06:34:21 -08:00
|
|
|
nonce_keyed
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(&authorized, &rent, &invoke_context)
|
2019-12-17 06:34:21 -08:00
|
|
|
.unwrap();
|
2020-01-22 17:54:06 -08:00
|
|
|
with_test_keyed_account(42, false, |to_keyed| {
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(63);
|
2019-12-07 11:54:10 -08:00
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*nonce_keyed.signer_key().unwrap());
|
2021-04-30 11:16:58 -07:00
|
|
|
let withdraw_lamports = nonce_keyed.account.borrow().lamports() + 1;
|
2020-01-22 15:31:39 -08:00
|
|
|
let result = nonce_keyed.withdraw_nonce_account(
|
2019-12-07 11:54:10 -08:00
|
|
|
withdraw_lamports,
|
2021-06-18 06:34:46 -07:00
|
|
|
to_keyed,
|
2019-12-07 11:54:10 -08:00
|
|
|
&rent,
|
|
|
|
&signers,
|
2021-07-29 01:50:20 -07:00
|
|
|
&invoke_context,
|
2019-12-07 11:54:10 -08:00
|
|
|
);
|
|
|
|
assert_eq!(result, Err(InstructionError::InsufficientFunds));
|
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn withdraw_inx_initialized_acc_insuff_rent_fail() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-07 11:54:10 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |nonce_keyed| {
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(95);
|
2020-05-15 09:35:43 -07:00
|
|
|
let authorized = *nonce_keyed.unsigned_key();
|
2019-12-17 06:34:21 -08:00
|
|
|
nonce_keyed
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(&authorized, &rent, &invoke_context)
|
2019-12-17 06:34:21 -08:00
|
|
|
.unwrap();
|
2020-01-22 17:54:06 -08:00
|
|
|
with_test_keyed_account(42, false, |to_keyed| {
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(63);
|
2019-12-07 11:54:10 -08:00
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*nonce_keyed.signer_key().unwrap());
|
2021-04-30 11:16:58 -07:00
|
|
|
let withdraw_lamports = nonce_keyed.account.borrow().lamports() - min_lamports + 1;
|
2020-01-22 15:31:39 -08:00
|
|
|
let result = nonce_keyed.withdraw_nonce_account(
|
2019-12-07 11:54:10 -08:00
|
|
|
withdraw_lamports,
|
2021-06-18 06:34:46 -07:00
|
|
|
to_keyed,
|
2019-12-07 11:54:10 -08:00
|
|
|
&rent,
|
|
|
|
&signers,
|
2021-07-29 01:50:20 -07:00
|
|
|
&invoke_context,
|
2019-12-07 11:54:10 -08:00
|
|
|
);
|
|
|
|
assert_eq!(result, Err(InstructionError::InsufficientFunds));
|
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
2019-12-08 09:16:55 -08:00
|
|
|
|
2021-02-17 17:37:13 -08:00
|
|
|
#[test]
|
|
|
|
fn withdraw_inx_overflow() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
|
|
|
with_test_keyed_account(min_lamports + 42, true, |nonce_keyed| {
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(95);
|
2021-02-17 17:37:13 -08:00
|
|
|
let authorized = *nonce_keyed.unsigned_key();
|
|
|
|
nonce_keyed
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(&authorized, &rent, &invoke_context)
|
2021-02-17 17:37:13 -08:00
|
|
|
.unwrap();
|
|
|
|
with_test_keyed_account(55, false, |to_keyed| {
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(63);
|
2021-02-17 17:37:13 -08:00
|
|
|
let mut signers = HashSet::new();
|
|
|
|
signers.insert(*nonce_keyed.signer_key().unwrap());
|
|
|
|
let withdraw_lamports = u64::MAX - 54;
|
|
|
|
let result = nonce_keyed.withdraw_nonce_account(
|
|
|
|
withdraw_lamports,
|
2021-06-18 06:34:46 -07:00
|
|
|
to_keyed,
|
2021-02-17 17:37:13 -08:00
|
|
|
&rent,
|
|
|
|
&signers,
|
2021-07-29 01:50:20 -07:00
|
|
|
&invoke_context,
|
2021-02-17 17:37:13 -08:00
|
|
|
);
|
|
|
|
assert_eq!(result, Err(InstructionError::InsufficientFunds));
|
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-12-08 09:16:55 -08:00
|
|
|
#[test]
|
|
|
|
fn initialize_inx_ok() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-08 09:16:55 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |keyed_account| {
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(keyed_account)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2020-03-03 17:00:39 -08:00
|
|
|
assert_eq!(state, State::Uninitialized);
|
2019-12-08 09:16:55 -08:00
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*keyed_account.signer_key().unwrap());
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(0);
|
2020-05-15 09:35:43 -07:00
|
|
|
let authority = *keyed_account.unsigned_key();
|
2021-07-29 01:50:20 -07:00
|
|
|
let result = keyed_account.initialize_nonce_account(&authority, &rent, &invoke_context);
|
2021-10-22 14:32:40 -07:00
|
|
|
let data = nonce::state::Data::new(
|
2020-03-04 08:51:48 -08:00
|
|
|
authority,
|
2021-12-03 03:15:22 -08:00
|
|
|
invoke_context.blockhash,
|
|
|
|
invoke_context.lamports_per_signature,
|
2021-10-22 14:32:40 -07:00
|
|
|
);
|
2019-12-08 09:16:55 -08:00
|
|
|
assert_eq!(result, Ok(()));
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(keyed_account)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2020-03-04 08:51:48 -08:00
|
|
|
assert_eq!(state, State::Initialized(data));
|
2019-12-08 09:16:55 -08:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn initialize_inx_initialized_account_fail() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-08 09:16:55 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |keyed_account| {
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(31);
|
2020-05-15 09:35:43 -07:00
|
|
|
let authorized = *keyed_account.unsigned_key();
|
2019-12-08 09:16:55 -08:00
|
|
|
keyed_account
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(&authorized, &rent, &invoke_context)
|
2019-12-08 09:16:55 -08:00
|
|
|
.unwrap();
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(0);
|
|
|
|
let result =
|
|
|
|
keyed_account.initialize_nonce_account(&authorized, &rent, &invoke_context);
|
2021-06-01 16:25:53 -07:00
|
|
|
assert_eq!(result, Err(InstructionError::InvalidAccountData));
|
2019-12-08 09:16:55 -08:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn initialize_inx_uninitialized_acc_insuff_funds_fail() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-08 09:16:55 -08:00
|
|
|
with_test_keyed_account(min_lamports - 42, true, |keyed_account| {
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(63);
|
2020-05-15 09:35:43 -07:00
|
|
|
let authorized = *keyed_account.unsigned_key();
|
2021-07-29 01:50:20 -07:00
|
|
|
let result =
|
|
|
|
keyed_account.initialize_nonce_account(&authorized, &rent, &invoke_context);
|
2019-12-08 09:16:55 -08:00
|
|
|
assert_eq!(result, Err(InstructionError::InsufficientFunds));
|
|
|
|
})
|
|
|
|
}
|
2019-12-17 06:34:21 -08:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn authorize_inx_ok() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-17 06:34:21 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |nonce_account| {
|
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*nonce_account.signer_key().unwrap());
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(31);
|
2020-05-15 09:35:43 -07:00
|
|
|
let authorized = *nonce_account.unsigned_key();
|
2019-12-17 06:34:21 -08:00
|
|
|
nonce_account
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(&authorized, &rent, &invoke_context)
|
2019-12-17 06:34:21 -08:00
|
|
|
.unwrap();
|
2020-03-04 08:51:48 -08:00
|
|
|
let authority = Pubkey::default();
|
2021-10-22 14:32:40 -07:00
|
|
|
let data = nonce::state::Data::new(
|
2020-03-04 08:51:48 -08:00
|
|
|
authority,
|
2021-12-03 03:15:22 -08:00
|
|
|
invoke_context.blockhash,
|
|
|
|
invoke_context.lamports_per_signature,
|
2021-10-22 14:32:40 -07:00
|
|
|
);
|
2021-03-02 21:44:25 -08:00
|
|
|
let result = nonce_account.authorize_nonce_account(
|
|
|
|
&Pubkey::default(),
|
|
|
|
&signers,
|
2021-07-29 01:50:20 -07:00
|
|
|
&invoke_context,
|
2021-03-02 21:44:25 -08:00
|
|
|
);
|
2019-12-17 06:34:21 -08:00
|
|
|
assert_eq!(result, Ok(()));
|
2020-03-03 18:39:09 -08:00
|
|
|
let state = AccountUtilsState::<Versions>::state(nonce_account)
|
|
|
|
.unwrap()
|
|
|
|
.convert_to_current();
|
2020-03-04 08:51:48 -08:00
|
|
|
assert_eq!(state, State::Initialized(data));
|
2019-12-17 06:34:21 -08:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn authorize_inx_uninitialized_state_fail() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-17 06:34:21 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |nonce_account| {
|
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*nonce_account.signer_key().unwrap());
|
2021-03-02 21:44:25 -08:00
|
|
|
let result = nonce_account.authorize_nonce_account(
|
|
|
|
&Pubkey::default(),
|
|
|
|
&signers,
|
2021-12-02 09:47:16 -08:00
|
|
|
&InvokeContext::new_mock(&[], &[]),
|
2021-03-02 21:44:25 -08:00
|
|
|
);
|
2021-06-01 16:25:53 -07:00
|
|
|
assert_eq!(result, Err(InstructionError::InvalidAccountData));
|
2019-12-17 06:34:21 -08:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn authorize_inx_bad_authority_fail() {
|
|
|
|
let rent = Rent {
|
|
|
|
lamports_per_byte_year: 42,
|
|
|
|
..Rent::default()
|
|
|
|
};
|
2020-03-03 17:00:39 -08:00
|
|
|
let min_lamports = rent.minimum_balance(State::size());
|
2019-12-17 06:34:21 -08:00
|
|
|
with_test_keyed_account(min_lamports + 42, true, |nonce_account| {
|
|
|
|
let mut signers = HashSet::new();
|
2020-06-08 17:38:14 -07:00
|
|
|
signers.insert(*nonce_account.signer_key().unwrap());
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(31);
|
2019-12-17 06:34:21 -08:00
|
|
|
let authorized = &Pubkey::default().clone();
|
|
|
|
nonce_account
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(authorized, &rent, &invoke_context)
|
2019-12-17 06:34:21 -08:00
|
|
|
.unwrap();
|
2021-03-02 21:44:25 -08:00
|
|
|
let result = nonce_account.authorize_nonce_account(
|
|
|
|
&Pubkey::default(),
|
|
|
|
&signers,
|
2021-07-29 01:50:20 -07:00
|
|
|
&invoke_context,
|
2021-03-02 21:44:25 -08:00
|
|
|
);
|
2019-12-17 06:34:21 -08:00
|
|
|
assert_eq!(result, Err(InstructionError::MissingRequiredSignature));
|
|
|
|
})
|
|
|
|
}
|
2020-10-26 09:14:57 -07:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn verify_nonce_ok() {
|
|
|
|
with_test_keyed_account(42, true, |nonce_account| {
|
|
|
|
let mut signers = HashSet::new();
|
|
|
|
signers.insert(nonce_account.signer_key().unwrap());
|
|
|
|
let state: State = nonce_account.state().unwrap();
|
|
|
|
// New is in Uninitialzed state
|
|
|
|
assert_eq!(state, State::Uninitialized);
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(0);
|
2020-10-26 09:14:57 -07:00
|
|
|
let authorized = nonce_account.unsigned_key();
|
|
|
|
nonce_account
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(authorized, &Rent::free(), &invoke_context)
|
2020-10-26 09:14:57 -07:00
|
|
|
.unwrap();
|
|
|
|
assert!(verify_nonce_account(
|
|
|
|
&nonce_account.account.borrow(),
|
2021-12-03 03:15:22 -08:00
|
|
|
&invoke_context.blockhash,
|
2020-10-26 09:14:57 -07:00
|
|
|
));
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn verify_nonce_bad_acc_state_fail() {
|
|
|
|
with_test_keyed_account(42, true, |nonce_account| {
|
|
|
|
assert!(!verify_nonce_account(
|
|
|
|
&nonce_account.account.borrow(),
|
|
|
|
&Hash::default()
|
|
|
|
));
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn verify_nonce_bad_query_hash_fail() {
|
|
|
|
with_test_keyed_account(42, true, |nonce_account| {
|
|
|
|
let mut signers = HashSet::new();
|
|
|
|
signers.insert(nonce_account.signer_key().unwrap());
|
|
|
|
let state: State = nonce_account.state().unwrap();
|
|
|
|
// New is in Uninitialzed state
|
|
|
|
assert_eq!(state, State::Uninitialized);
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(0);
|
2020-10-26 09:14:57 -07:00
|
|
|
let authorized = nonce_account.unsigned_key();
|
|
|
|
nonce_account
|
2021-07-29 01:50:20 -07:00
|
|
|
.initialize_nonce_account(authorized, &Rent::free(), &invoke_context)
|
2020-10-26 09:14:57 -07:00
|
|
|
.unwrap();
|
2021-07-29 01:50:20 -07:00
|
|
|
let invoke_context = create_invoke_context_with_blockhash(1);
|
2020-10-26 09:14:57 -07:00
|
|
|
assert!(!verify_nonce_account(
|
|
|
|
&nonce_account.account.borrow(),
|
2021-12-03 03:15:22 -08:00
|
|
|
&invoke_context.blockhash,
|
2020-10-26 09:14:57 -07:00
|
|
|
));
|
|
|
|
});
|
|
|
|
}
|
2019-12-07 11:54:10 -08:00
|
|
|
}
|