2020-12-08 23:18:27 -08:00
|
|
|
use {
|
2021-12-14 12:08:52 -08:00
|
|
|
clap::{crate_name, value_t, value_t_or_exit, values_t_or_exit, App, Arg},
|
2021-10-22 11:15:07 -07:00
|
|
|
log::*,
|
2021-01-21 13:16:40 -08:00
|
|
|
solana_clap_utils::{
|
2021-05-04 00:22:18 -07:00
|
|
|
input_parsers::{pubkey_of, pubkeys_of, value_of},
|
2021-01-21 13:16:40 -08:00
|
|
|
input_validators::{
|
2021-01-21 18:34:51 -08:00
|
|
|
is_pubkey, is_pubkey_or_keypair, is_slot, is_url_or_moniker,
|
|
|
|
normalize_to_url_if_moniker,
|
2021-01-21 13:16:40 -08:00
|
|
|
},
|
|
|
|
},
|
2021-02-05 22:39:23 -08:00
|
|
|
solana_client::rpc_client::RpcClient,
|
2021-08-09 11:32:48 -07:00
|
|
|
solana_core::tower_storage::FileTowerStorage,
|
2020-12-11 20:03:15 -08:00
|
|
|
solana_faucet::faucet::{run_local_faucet_with_port, FAUCET_PORT},
|
2021-06-04 08:23:06 -07:00
|
|
|
solana_rpc::rpc::JsonRpcConfig,
|
2020-12-08 23:18:27 -08:00
|
|
|
solana_sdk::{
|
2021-03-09 13:06:07 -08:00
|
|
|
account::AccountSharedData,
|
2021-02-05 22:39:23 -08:00
|
|
|
clock::Slot,
|
2021-03-17 21:16:04 -07:00
|
|
|
epoch_schedule::{EpochSchedule, MINIMUM_SLOTS_PER_EPOCH},
|
2021-02-05 22:39:23 -08:00
|
|
|
native_token::sol_to_lamports,
|
2020-12-11 20:03:15 -08:00
|
|
|
pubkey::Pubkey,
|
2021-06-09 19:54:13 -07:00
|
|
|
rent::Rent,
|
2020-12-08 23:18:27 -08:00
|
|
|
rpc_port,
|
2020-12-11 20:03:15 -08:00
|
|
|
signature::{read_keypair_file, write_keypair_file, Keypair, Signer},
|
|
|
|
system_program,
|
2020-12-08 23:18:27 -08:00
|
|
|
},
|
2021-07-23 08:25:03 -07:00
|
|
|
solana_streamer::socket::SocketAddrSpace,
|
2021-12-14 21:15:21 -08:00
|
|
|
solana_test_validator::*,
|
2021-02-05 22:39:23 -08:00
|
|
|
solana_validator::{
|
2021-09-22 14:10:35 -07:00
|
|
|
admin_rpc_service, dashboard::Dashboard, ledger_lockfile, lock_ledger, println_name_value,
|
2021-12-14 21:15:21 -08:00
|
|
|
redirect_stderr_to_file,
|
2021-02-05 22:39:23 -08:00
|
|
|
},
|
2020-12-08 23:18:27 -08:00
|
|
|
std::{
|
2021-01-21 13:16:40 -08:00
|
|
|
collections::HashSet,
|
2020-12-15 11:06:03 -08:00
|
|
|
fs, io,
|
2020-12-11 20:03:15 -08:00
|
|
|
net::{IpAddr, Ipv4Addr, SocketAddr},
|
2020-12-15 11:06:03 -08:00
|
|
|
path::{Path, PathBuf},
|
2020-12-08 23:18:27 -08:00
|
|
|
process::exit,
|
2021-06-17 13:51:06 -07:00
|
|
|
sync::{mpsc::channel, Arc, RwLock},
|
2021-03-06 11:53:21 -08:00
|
|
|
time::{Duration, SystemTime, UNIX_EPOCH},
|
2020-12-08 23:18:27 -08:00
|
|
|
},
|
|
|
|
};
|
|
|
|
|
2021-05-04 00:22:18 -07:00
|
|
|
/* 10,000 was derived empirically by watching the size
|
|
|
|
* of the rocksdb/ directory self-limit itself to the
|
|
|
|
* 40MB-150MB range when running `solana-test-validator`
|
|
|
|
*/
|
|
|
|
const DEFAULT_MAX_LEDGER_SHREDS: u64 = 10_000;
|
|
|
|
|
2021-05-27 23:27:59 -07:00
|
|
|
const DEFAULT_FAUCET_SOL: f64 = 1_000_000.;
|
|
|
|
|
2020-12-08 23:18:27 -08:00
|
|
|
#[derive(PartialEq)]
|
|
|
|
enum Output {
|
|
|
|
None,
|
|
|
|
Log,
|
|
|
|
Dashboard,
|
|
|
|
}
|
|
|
|
|
|
|
|
fn main() {
|
|
|
|
let default_rpc_port = rpc_port::DEFAULT_RPC_PORT.to_string();
|
2021-04-14 08:44:43 -07:00
|
|
|
let default_faucet_port = FAUCET_PORT.to_string();
|
2021-05-04 00:22:18 -07:00
|
|
|
let default_limit_ledger_size = DEFAULT_MAX_LEDGER_SHREDS.to_string();
|
2021-05-27 23:27:59 -07:00
|
|
|
let default_faucet_sol = DEFAULT_FAUCET_SOL.to_string();
|
2020-12-08 23:18:27 -08:00
|
|
|
|
2020-12-11 20:03:15 -08:00
|
|
|
let matches = App::new("solana-test-validator")
|
|
|
|
.about("Test Validator")
|
2020-12-08 23:18:27 -08:00
|
|
|
.version(solana_version::version!())
|
|
|
|
.arg({
|
|
|
|
let arg = Arg::with_name("config_file")
|
|
|
|
.short("C")
|
|
|
|
.long("config")
|
|
|
|
.value_name("PATH")
|
|
|
|
.takes_value(true)
|
|
|
|
.help("Configuration file to use");
|
|
|
|
if let Some(ref config_file) = *solana_cli_config::CONFIG_FILE {
|
2021-06-18 06:34:46 -07:00
|
|
|
arg.default_value(config_file)
|
2020-12-08 23:18:27 -08:00
|
|
|
} else {
|
|
|
|
arg
|
|
|
|
}
|
|
|
|
})
|
2021-01-21 13:16:40 -08:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("json_rpc_url")
|
|
|
|
.short("u")
|
|
|
|
.long("url")
|
|
|
|
.value_name("URL_OR_MONIKER")
|
|
|
|
.takes_value(true)
|
|
|
|
.validator(is_url_or_moniker)
|
|
|
|
.help(
|
|
|
|
"URL for Solana's JSON RPC or moniker (or their first letter): \
|
|
|
|
[mainnet-beta, testnet, devnet, localhost]",
|
|
|
|
),
|
|
|
|
)
|
2020-12-08 23:18:27 -08:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("mint_address")
|
|
|
|
.long("mint")
|
|
|
|
.value_name("PUBKEY")
|
|
|
|
.validator(is_pubkey)
|
|
|
|
.takes_value(true)
|
2020-12-11 20:03:15 -08:00
|
|
|
.help(
|
|
|
|
"Address of the mint account that will receive tokens \
|
2021-01-21 13:16:40 -08:00
|
|
|
created at genesis. If the ledger already exists then \
|
|
|
|
this parameter is silently ignored [default: client keypair]",
|
2020-12-11 20:03:15 -08:00
|
|
|
),
|
2020-12-08 23:18:27 -08:00
|
|
|
)
|
|
|
|
.arg(
|
|
|
|
Arg::with_name("ledger_path")
|
|
|
|
.short("l")
|
|
|
|
.long("ledger")
|
|
|
|
.value_name("DIR")
|
|
|
|
.takes_value(true)
|
|
|
|
.required(true)
|
|
|
|
.default_value("test-ledger")
|
|
|
|
.help("Use DIR as ledger location"),
|
|
|
|
)
|
2020-12-15 11:06:03 -08:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("reset")
|
|
|
|
.short("r")
|
|
|
|
.long("reset")
|
|
|
|
.takes_value(false)
|
|
|
|
.help(
|
|
|
|
"Reset the ledger to genesis if it exists. \
|
|
|
|
By default the validator will resume an existing ledger (if present)",
|
|
|
|
),
|
|
|
|
)
|
2020-12-08 23:18:27 -08:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("quiet")
|
|
|
|
.short("q")
|
|
|
|
.long("quiet")
|
|
|
|
.takes_value(false)
|
|
|
|
.conflicts_with("log")
|
2020-12-11 20:03:15 -08:00
|
|
|
.help("Quiet mode: suppress normal output"),
|
2020-12-08 23:18:27 -08:00
|
|
|
)
|
|
|
|
.arg(
|
|
|
|
Arg::with_name("log")
|
|
|
|
.long("log")
|
|
|
|
.takes_value(false)
|
|
|
|
.conflicts_with("quiet")
|
2020-12-11 20:03:15 -08:00
|
|
|
.help("Log mode: stream the validator log"),
|
2020-12-08 23:18:27 -08:00
|
|
|
)
|
2021-04-14 08:44:43 -07:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("faucet_port")
|
|
|
|
.long("faucet-port")
|
|
|
|
.value_name("PORT")
|
|
|
|
.takes_value(true)
|
|
|
|
.default_value(&default_faucet_port)
|
|
|
|
.validator(solana_validator::port_validator)
|
|
|
|
.help("Enable the faucet on this port"),
|
|
|
|
)
|
2020-12-08 23:18:27 -08:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("rpc_port")
|
|
|
|
.long("rpc-port")
|
|
|
|
.value_name("PORT")
|
|
|
|
.takes_value(true)
|
|
|
|
.default_value(&default_rpc_port)
|
|
|
|
.validator(solana_validator::port_validator)
|
2021-02-26 21:42:09 -08:00
|
|
|
.help("Enable JSON RPC on this port, and the next port for the RPC websocket"),
|
2020-12-08 23:18:27 -08:00
|
|
|
)
|
2020-12-11 20:03:15 -08:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("bpf_program")
|
|
|
|
.long("bpf-program")
|
2021-10-25 09:23:53 -07:00
|
|
|
.value_name("ADDRESS_OR_PATH BPF_PROGRAM.SO")
|
2020-12-11 20:03:15 -08:00
|
|
|
.takes_value(true)
|
|
|
|
.number_of_values(2)
|
|
|
|
.multiple(true)
|
2021-01-21 13:16:40 -08:00
|
|
|
.help(
|
|
|
|
"Add a BPF program to the genesis configuration. \
|
2021-10-25 09:23:53 -07:00
|
|
|
If the ledger already exists then this parameter is silently ignored. \
|
|
|
|
First argument can be a public key or path to file that can be parsed as a keypair",
|
2021-01-21 13:16:40 -08:00
|
|
|
),
|
|
|
|
)
|
2021-12-11 13:17:57 -08:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("account")
|
|
|
|
.long("account")
|
|
|
|
.value_name("ADDRESS FILENAME.JSON")
|
|
|
|
.takes_value(true)
|
|
|
|
.number_of_values(2)
|
|
|
|
.multiple(true)
|
|
|
|
.help(
|
|
|
|
"Load an account from the provided JSON file (see `solana account --help` on how to dump \
|
|
|
|
an account to file). Files are searched for relatively to CWD and tests/fixtures. \
|
|
|
|
If the ledger already exists then this parameter is silently ignored",
|
|
|
|
),
|
|
|
|
)
|
2021-02-09 11:02:04 -08:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("no_bpf_jit")
|
|
|
|
.long("no-bpf-jit")
|
|
|
|
.takes_value(false)
|
2021-09-22 14:10:35 -07:00
|
|
|
.help("Disable the just-in-time compiler and instead use the interpreter for BPF. Windows always disables JIT."),
|
2021-02-09 11:02:04 -08:00
|
|
|
)
|
2021-03-17 11:27:48 -07:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("slots_per_epoch")
|
|
|
|
.long("slots-per-epoch")
|
|
|
|
.value_name("SLOTS")
|
2021-03-17 21:16:04 -07:00
|
|
|
.validator(|value| {
|
|
|
|
value
|
|
|
|
.parse::<Slot>()
|
|
|
|
.map_err(|err| format!("error parsing '{}': {}", value, err))
|
|
|
|
.and_then(|slot| {
|
|
|
|
if slot < MINIMUM_SLOTS_PER_EPOCH {
|
|
|
|
Err(format!("value must be >= {}", MINIMUM_SLOTS_PER_EPOCH))
|
|
|
|
} else {
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
2021-03-17 11:27:48 -07:00
|
|
|
.takes_value(true)
|
|
|
|
.help(
|
|
|
|
"Override the number of slots in an epoch. \
|
|
|
|
If the ledger already exists then this parameter is silently ignored",
|
|
|
|
),
|
|
|
|
)
|
2021-04-20 19:40:52 -07:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("gossip_port")
|
|
|
|
.long("gossip-port")
|
|
|
|
.value_name("PORT")
|
|
|
|
.takes_value(true)
|
|
|
|
.help("Gossip port number for the validator"),
|
|
|
|
)
|
|
|
|
.arg(
|
|
|
|
Arg::with_name("gossip_host")
|
|
|
|
.long("gossip-host")
|
|
|
|
.value_name("HOST")
|
|
|
|
.takes_value(true)
|
|
|
|
.validator(solana_net_utils::is_host)
|
|
|
|
.help(
|
|
|
|
"Gossip DNS name or IP address for the validator to advertise in gossip \
|
|
|
|
[default: 127.0.0.1]",
|
|
|
|
),
|
|
|
|
)
|
|
|
|
.arg(
|
|
|
|
Arg::with_name("dynamic_port_range")
|
|
|
|
.long("dynamic-port-range")
|
|
|
|
.value_name("MIN_PORT-MAX_PORT")
|
|
|
|
.takes_value(true)
|
|
|
|
.validator(solana_validator::port_range_validator)
|
|
|
|
.help(
|
|
|
|
"Range to use for dynamically assigned ports \
|
|
|
|
[default: 1024-65535]",
|
|
|
|
),
|
|
|
|
)
|
|
|
|
.arg(
|
|
|
|
Arg::with_name("bind_address")
|
|
|
|
.long("bind-address")
|
|
|
|
.value_name("HOST")
|
|
|
|
.takes_value(true)
|
|
|
|
.validator(solana_net_utils::is_host)
|
|
|
|
.default_value("0.0.0.0")
|
|
|
|
.help("IP address to bind the validator ports [default: 0.0.0.0]"),
|
|
|
|
)
|
2021-01-21 13:16:40 -08:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("clone_account")
|
|
|
|
.long("clone")
|
|
|
|
.short("c")
|
|
|
|
.value_name("ADDRESS")
|
|
|
|
.takes_value(true)
|
|
|
|
.validator(is_pubkey_or_keypair)
|
|
|
|
.multiple(true)
|
|
|
|
.requires("json_rpc_url")
|
|
|
|
.help(
|
|
|
|
"Copy an account from the cluster referenced by the --url argument the \
|
|
|
|
genesis configuration. \
|
|
|
|
If the ledger already exists then this parameter is silently ignored",
|
|
|
|
),
|
2020-12-11 20:03:15 -08:00
|
|
|
)
|
2021-01-21 18:34:51 -08:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("warp_slot")
|
|
|
|
.required(false)
|
|
|
|
.long("warp-slot")
|
|
|
|
.short("w")
|
|
|
|
.takes_value(true)
|
|
|
|
.value_name("WARP_SLOT")
|
|
|
|
.validator(is_slot)
|
|
|
|
.min_values(0)
|
|
|
|
.max_values(1)
|
|
|
|
.help(
|
|
|
|
"Warp the ledger to WARP_SLOT after starting the validator. \
|
|
|
|
If no slot is provided then the current slot of the cluster \
|
|
|
|
referenced by the --url argument will be used",
|
|
|
|
),
|
|
|
|
)
|
2021-05-04 00:22:18 -07:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("limit_ledger_size")
|
|
|
|
.long("limit-ledger-size")
|
|
|
|
.value_name("SHRED_COUNT")
|
|
|
|
.takes_value(true)
|
|
|
|
.default_value(default_limit_ledger_size.as_str())
|
|
|
|
.help("Keep this amount of shreds in root slots."),
|
|
|
|
)
|
2021-05-27 23:27:59 -07:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("faucet_sol")
|
|
|
|
.long("faucet-sol")
|
|
|
|
.takes_value(true)
|
|
|
|
.value_name("SOL")
|
|
|
|
.default_value(default_faucet_sol.as_str())
|
|
|
|
.help(
|
|
|
|
"Give the faucet address this much SOL in genesis. \
|
|
|
|
If the ledger already exists then this parameter is silently ignored",
|
|
|
|
),
|
|
|
|
)
|
2021-12-14 12:08:52 -08:00
|
|
|
.arg(
|
|
|
|
Arg::with_name("accountsdb_plugin_config")
|
|
|
|
.long("accountsdb-plugin-config")
|
|
|
|
.value_name("FILE")
|
|
|
|
.takes_value(true)
|
|
|
|
.multiple(true)
|
|
|
|
.hidden(true)
|
|
|
|
.help("Specify the configuration file for the AccountsDb plugin."),
|
|
|
|
)
|
2020-12-08 23:18:27 -08:00
|
|
|
.get_matches();
|
|
|
|
|
2021-07-27 22:27:11 -07:00
|
|
|
let output = if matches.is_present("quiet") {
|
|
|
|
Output::None
|
|
|
|
} else if matches.is_present("log") {
|
|
|
|
Output::Log
|
|
|
|
} else {
|
|
|
|
Output::Dashboard
|
|
|
|
};
|
|
|
|
|
|
|
|
let ledger_path = value_t_or_exit!(matches, "ledger_path", PathBuf);
|
|
|
|
let reset_ledger = matches.is_present("reset");
|
|
|
|
|
|
|
|
if !ledger_path.exists() {
|
|
|
|
fs::create_dir(&ledger_path).unwrap_or_else(|err| {
|
|
|
|
println!(
|
|
|
|
"Error: Unable to create directory {}: {}",
|
|
|
|
ledger_path.display(),
|
|
|
|
err
|
|
|
|
);
|
|
|
|
exit(1);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2021-09-22 14:10:35 -07:00
|
|
|
let mut ledger_lock = ledger_lockfile(&ledger_path);
|
|
|
|
let _ledger_write_guard = lock_ledger(&ledger_path, &mut ledger_lock);
|
2021-07-27 22:27:11 -07:00
|
|
|
if reset_ledger {
|
|
|
|
remove_directory_contents(&ledger_path).unwrap_or_else(|err| {
|
|
|
|
println!("Error: Unable to remove {}: {}", ledger_path.display(), err);
|
|
|
|
exit(1);
|
|
|
|
})
|
|
|
|
}
|
|
|
|
solana_runtime::snapshot_utils::remove_tmp_snapshot_archives(&ledger_path);
|
|
|
|
|
|
|
|
let validator_log_symlink = ledger_path.join("validator.log");
|
|
|
|
|
2021-09-09 05:12:17 -07:00
|
|
|
let logfile = if output != Output::Log {
|
2021-07-27 22:27:11 -07:00
|
|
|
let validator_log_with_timestamp = format!(
|
|
|
|
"validator-{}.log",
|
|
|
|
SystemTime::now()
|
|
|
|
.duration_since(UNIX_EPOCH)
|
|
|
|
.unwrap()
|
|
|
|
.as_millis()
|
|
|
|
);
|
|
|
|
|
|
|
|
let _ = fs::remove_file(&validator_log_symlink);
|
|
|
|
symlink::symlink_file(&validator_log_with_timestamp, &validator_log_symlink).unwrap();
|
|
|
|
|
|
|
|
Some(
|
|
|
|
ledger_path
|
|
|
|
.join(validator_log_with_timestamp)
|
|
|
|
.into_os_string()
|
|
|
|
.into_string()
|
|
|
|
.unwrap(),
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
|
|
|
let _logger_thread = redirect_stderr_to_file(logfile);
|
|
|
|
|
2021-10-22 11:15:07 -07:00
|
|
|
info!("{} {}", crate_name!(), solana_version::version!());
|
|
|
|
info!("Starting validator with: {:#?}", std::env::args_os());
|
2021-07-27 21:23:45 -07:00
|
|
|
solana_core::validator::report_target_features();
|
|
|
|
|
2021-07-29 12:00:23 -07:00
|
|
|
// TODO: Ideally test-validator should *only* allow private addresses.
|
|
|
|
let socket_addr_space = SocketAddrSpace::new(/*allow_private_addr=*/ true);
|
2020-12-08 23:18:27 -08:00
|
|
|
let cli_config = if let Some(config_file) = matches.value_of("config_file") {
|
|
|
|
solana_cli_config::Config::load(config_file).unwrap_or_default()
|
|
|
|
} else {
|
|
|
|
solana_cli_config::Config::default()
|
|
|
|
};
|
|
|
|
|
2021-01-21 18:34:51 -08:00
|
|
|
let cluster_rpc_client = value_t!(matches, "json_rpc_url", String)
|
|
|
|
.map(normalize_to_url_if_moniker)
|
|
|
|
.map(RpcClient::new);
|
2021-01-21 13:16:40 -08:00
|
|
|
|
2021-05-14 00:56:03 -07:00
|
|
|
let (mint_address, random_mint) = pubkey_of(&matches, "mint_address")
|
|
|
|
.map(|pk| (pk, false))
|
|
|
|
.unwrap_or_else(|| {
|
|
|
|
read_keypair_file(&cli_config.keypair_path)
|
|
|
|
.map(|kp| (kp.pubkey(), false))
|
|
|
|
.unwrap_or_else(|_| (Keypair::new().pubkey(), true))
|
|
|
|
});
|
2020-12-08 23:18:27 -08:00
|
|
|
|
2020-12-11 20:03:15 -08:00
|
|
|
let rpc_port = value_t_or_exit!(matches, "rpc_port", u16);
|
2021-04-14 08:44:43 -07:00
|
|
|
let faucet_port = value_t_or_exit!(matches, "faucet_port", u16);
|
2021-03-17 11:27:48 -07:00
|
|
|
let slots_per_epoch = value_t!(matches, "slots_per_epoch", Slot).ok();
|
2021-04-20 19:40:52 -07:00
|
|
|
let gossip_host = matches.value_of("gossip_host").map(|gossip_host| {
|
|
|
|
solana_net_utils::parse_host(gossip_host).unwrap_or_else(|err| {
|
|
|
|
eprintln!("Failed to parse --gossip-host: {}", err);
|
|
|
|
exit(1);
|
|
|
|
})
|
|
|
|
});
|
|
|
|
let gossip_port = value_t!(matches, "gossip_port", u16).ok();
|
|
|
|
let dynamic_port_range = matches.value_of("dynamic_port_range").map(|port_range| {
|
|
|
|
solana_net_utils::parse_port_range(port_range).unwrap_or_else(|| {
|
|
|
|
eprintln!("Failed to parse --dynamic-port-range");
|
|
|
|
exit(1);
|
|
|
|
})
|
|
|
|
});
|
|
|
|
let bind_address = matches.value_of("bind_address").map(|bind_address| {
|
|
|
|
solana_net_utils::parse_host(bind_address).unwrap_or_else(|err| {
|
|
|
|
eprintln!("Failed to parse --bind-address: {}", err);
|
|
|
|
exit(1);
|
|
|
|
})
|
|
|
|
});
|
2021-02-26 21:42:09 -08:00
|
|
|
|
2020-12-11 20:03:15 -08:00
|
|
|
let faucet_addr = Some(SocketAddr::new(
|
2020-12-30 22:17:24 -08:00
|
|
|
IpAddr::V4(Ipv4Addr::new(0, 0, 0, 0)),
|
2021-04-14 08:44:43 -07:00
|
|
|
faucet_port,
|
2020-12-11 20:03:15 -08:00
|
|
|
));
|
2020-12-08 23:18:27 -08:00
|
|
|
|
2021-12-11 13:17:57 -08:00
|
|
|
let mut programs_to_load = vec![];
|
2020-12-11 20:03:15 -08:00
|
|
|
if let Some(values) = matches.values_of("bpf_program") {
|
|
|
|
let values: Vec<&str> = values.collect::<Vec<_>>();
|
|
|
|
for address_program in values.chunks(2) {
|
|
|
|
match address_program {
|
|
|
|
[address, program] => {
|
2021-10-25 09:23:53 -07:00
|
|
|
let address = address
|
|
|
|
.parse::<Pubkey>()
|
|
|
|
.or_else(|_| read_keypair_file(address).map(|keypair| keypair.pubkey()))
|
|
|
|
.unwrap_or_else(|err| {
|
|
|
|
println!("Error: invalid address {}: {}", address, err);
|
|
|
|
exit(1);
|
|
|
|
});
|
2020-12-08 23:18:27 -08:00
|
|
|
|
2020-12-11 20:03:15 -08:00
|
|
|
let program_path = PathBuf::from(program);
|
|
|
|
if !program_path.exists() {
|
2021-01-28 12:11:53 -08:00
|
|
|
println!(
|
2020-12-11 20:03:15 -08:00
|
|
|
"Error: program file does not exist: {}",
|
|
|
|
program_path.display()
|
|
|
|
);
|
|
|
|
exit(1);
|
|
|
|
}
|
2020-12-08 23:18:27 -08:00
|
|
|
|
2021-12-11 13:17:57 -08:00
|
|
|
programs_to_load.push(ProgramInfo {
|
2020-12-11 20:03:15 -08:00
|
|
|
program_id: address,
|
|
|
|
loader: solana_sdk::bpf_loader::id(),
|
|
|
|
program_path,
|
|
|
|
});
|
|
|
|
}
|
|
|
|
_ => unreachable!(),
|
|
|
|
}
|
|
|
|
}
|
2020-12-08 23:18:27 -08:00
|
|
|
}
|
|
|
|
|
2021-12-11 13:17:57 -08:00
|
|
|
let mut accounts_to_load = vec![];
|
|
|
|
if let Some(values) = matches.values_of("account") {
|
|
|
|
let values: Vec<&str> = values.collect::<Vec<_>>();
|
|
|
|
for address_filename in values.chunks(2) {
|
|
|
|
match address_filename {
|
|
|
|
[address, filename] => {
|
|
|
|
let address = address.parse::<Pubkey>().unwrap_or_else(|err| {
|
|
|
|
println!("Error: invalid address {}: {}", address, err);
|
|
|
|
exit(1);
|
|
|
|
});
|
|
|
|
|
|
|
|
accounts_to_load.push(AccountInfo { address, filename });
|
|
|
|
}
|
|
|
|
_ => unreachable!(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let accounts_to_clone: HashSet<_> = pubkeys_of(&matches, "clone_account")
|
2021-01-21 13:16:40 -08:00
|
|
|
.map(|v| v.into_iter().collect())
|
|
|
|
.unwrap_or_default();
|
|
|
|
|
2021-01-21 18:34:51 -08:00
|
|
|
let warp_slot = if matches.is_present("warp_slot") {
|
|
|
|
Some(match matches.value_of("warp_slot") {
|
|
|
|
Some(_) => value_t_or_exit!(matches, "warp_slot", Slot),
|
|
|
|
None => {
|
|
|
|
cluster_rpc_client.as_ref().unwrap_or_else(|_| {
|
2021-01-28 12:11:53 -08:00
|
|
|
println!("The --url argument must be provided if --warp-slot/-w is used without an explicit slot");
|
2021-01-21 18:34:51 -08:00
|
|
|
exit(1);
|
|
|
|
|
|
|
|
}).get_slot()
|
|
|
|
.unwrap_or_else(|err| {
|
2021-01-28 12:11:53 -08:00
|
|
|
println!("Unable to get current cluster slot: {}", err);
|
2021-01-21 18:34:51 -08:00
|
|
|
exit(1);
|
|
|
|
})
|
|
|
|
}
|
|
|
|
})
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
|
|
|
|
2021-05-27 23:27:59 -07:00
|
|
|
let faucet_lamports = sol_to_lamports(value_of(&matches, "faucet_sol").unwrap());
|
2020-12-11 20:03:15 -08:00
|
|
|
let faucet_keypair_file = ledger_path.join("faucet-keypair.json");
|
|
|
|
if !faucet_keypair_file.exists() {
|
|
|
|
write_keypair_file(&Keypair::new(), faucet_keypair_file.to_str().unwrap()).unwrap_or_else(
|
|
|
|
|err| {
|
2021-01-28 12:11:53 -08:00
|
|
|
println!(
|
2020-12-11 20:03:15 -08:00
|
|
|
"Error: Failed to write {}: {}",
|
|
|
|
faucet_keypair_file.display(),
|
|
|
|
err
|
|
|
|
);
|
|
|
|
exit(1);
|
|
|
|
},
|
|
|
|
);
|
|
|
|
}
|
2021-02-05 22:39:23 -08:00
|
|
|
|
2020-12-11 20:03:15 -08:00
|
|
|
let faucet_keypair =
|
|
|
|
read_keypair_file(faucet_keypair_file.to_str().unwrap()).unwrap_or_else(|err| {
|
2021-01-28 12:11:53 -08:00
|
|
|
println!(
|
2020-12-11 20:03:15 -08:00
|
|
|
"Error: Failed to read {}: {}",
|
|
|
|
faucet_keypair_file.display(),
|
|
|
|
err
|
|
|
|
);
|
|
|
|
exit(1);
|
|
|
|
});
|
2021-02-05 22:39:23 -08:00
|
|
|
let faucet_pubkey = faucet_keypair.pubkey();
|
|
|
|
|
|
|
|
if let Some(faucet_addr) = &faucet_addr {
|
|
|
|
let (sender, receiver) = channel();
|
|
|
|
run_local_faucet_with_port(faucet_keypair, sender, None, faucet_addr.port());
|
|
|
|
let _ = receiver.recv().expect("run faucet").unwrap_or_else(|err| {
|
|
|
|
println!("Error: failed to start faucet: {}", err);
|
|
|
|
exit(1);
|
|
|
|
});
|
|
|
|
}
|
2020-12-11 20:03:15 -08:00
|
|
|
|
2021-03-17 11:01:49 -07:00
|
|
|
if TestValidatorGenesis::ledger_exists(&ledger_path) {
|
|
|
|
for (name, long) in &[
|
|
|
|
("bpf_program", "--bpf-program"),
|
|
|
|
("clone_account", "--clone"),
|
2021-12-11 13:17:57 -08:00
|
|
|
("clone_account_from_file", "--clone-from-file"),
|
2021-03-17 11:01:49 -07:00
|
|
|
("mint_address", "--mint"),
|
2021-03-17 11:27:48 -07:00
|
|
|
("slots_per_epoch", "--slots-per-epoch"),
|
2021-05-27 23:27:59 -07:00
|
|
|
("faucet_sol", "--faucet-sol"),
|
2021-03-17 11:01:49 -07:00
|
|
|
] {
|
|
|
|
if matches.is_present(name) {
|
|
|
|
println!("{} argument ignored, ledger already exists", long);
|
|
|
|
}
|
|
|
|
}
|
2021-05-14 00:56:03 -07:00
|
|
|
} else if random_mint {
|
|
|
|
println_name_value(
|
|
|
|
"\nNotice!",
|
|
|
|
"No wallet available. `solana airdrop` localnet SOL after creating one\n",
|
|
|
|
);
|
2021-03-17 11:01:49 -07:00
|
|
|
}
|
|
|
|
|
2021-02-26 21:42:09 -08:00
|
|
|
let mut genesis = TestValidatorGenesis::default();
|
2021-05-04 00:22:18 -07:00
|
|
|
genesis.max_ledger_shreds = value_of(&matches, "limit_ledger_size");
|
2021-12-03 10:12:22 -08:00
|
|
|
genesis.max_genesis_archive_unpacked_size = Some(u64::MAX);
|
2021-02-05 22:39:23 -08:00
|
|
|
|
2021-08-10 20:16:18 -07:00
|
|
|
let tower_storage = Arc::new(FileTowerStorage::new(ledger_path.clone()));
|
|
|
|
|
2021-06-17 13:51:06 -07:00
|
|
|
let admin_service_cluster_info = Arc::new(RwLock::new(None));
|
2021-02-26 21:42:09 -08:00
|
|
|
admin_rpc_service::run(
|
|
|
|
&ledger_path,
|
|
|
|
admin_rpc_service::AdminRpcRequestMetadata {
|
|
|
|
rpc_addr: Some(SocketAddr::new(
|
|
|
|
IpAddr::V4(Ipv4Addr::new(127, 0, 0, 1)),
|
|
|
|
rpc_port,
|
|
|
|
)),
|
2021-03-04 13:01:11 -08:00
|
|
|
start_progress: genesis.start_progress.clone(),
|
2021-02-26 21:42:09 -08:00
|
|
|
start_time: std::time::SystemTime::now(),
|
|
|
|
validator_exit: genesis.validator_exit.clone(),
|
2021-04-11 20:38:30 -07:00
|
|
|
authorized_voter_keypairs: genesis.authorized_voter_keypairs.clone(),
|
2021-06-17 13:51:06 -07:00
|
|
|
cluster_info: admin_service_cluster_info.clone(),
|
2021-08-10 20:16:18 -07:00
|
|
|
tower_storage: tower_storage.clone(),
|
2021-02-26 21:42:09 -08:00
|
|
|
},
|
|
|
|
);
|
2021-02-05 22:39:23 -08:00
|
|
|
let dashboard = if output == Output::Dashboard {
|
2021-02-26 21:42:09 -08:00
|
|
|
Some(
|
|
|
|
Dashboard::new(
|
|
|
|
&ledger_path,
|
|
|
|
Some(&validator_log_symlink),
|
|
|
|
Some(&mut genesis.validator_exit.write().unwrap()),
|
|
|
|
)
|
|
|
|
.unwrap(),
|
|
|
|
)
|
2021-02-05 22:39:23 -08:00
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
2021-01-14 21:19:08 -08:00
|
|
|
|
2021-02-26 21:42:09 -08:00
|
|
|
genesis
|
|
|
|
.ledger_path(&ledger_path)
|
2021-08-10 20:16:18 -07:00
|
|
|
.tower_storage(tower_storage)
|
2021-02-26 21:42:09 -08:00
|
|
|
.add_account(
|
|
|
|
faucet_pubkey,
|
2021-03-09 13:06:07 -08:00
|
|
|
AccountSharedData::new(faucet_lamports, 0, &system_program::id()),
|
2021-02-26 21:42:09 -08:00
|
|
|
)
|
|
|
|
.rpc_config(JsonRpcConfig {
|
|
|
|
enable_rpc_transaction_history: true,
|
|
|
|
enable_cpi_and_log_storage: true,
|
|
|
|
faucet_addr,
|
|
|
|
..JsonRpcConfig::default()
|
|
|
|
})
|
2021-11-09 03:31:21 -08:00
|
|
|
.bpf_jit(!matches.is_present("no_bpf_jit"))
|
2021-02-26 21:42:09 -08:00
|
|
|
.rpc_port(rpc_port)
|
2021-12-11 13:17:57 -08:00
|
|
|
.add_programs_with_path(&programs_to_load)
|
|
|
|
.add_accounts_from_json_files(&accounts_to_load);
|
2021-01-21 13:16:40 -08:00
|
|
|
|
2021-12-11 13:17:57 -08:00
|
|
|
if !accounts_to_clone.is_empty() {
|
2021-02-26 21:42:09 -08:00
|
|
|
genesis.clone_accounts(
|
2021-12-11 13:17:57 -08:00
|
|
|
accounts_to_clone,
|
2021-02-26 21:42:09 -08:00
|
|
|
cluster_rpc_client
|
|
|
|
.as_ref()
|
|
|
|
.expect("bug: --url argument missing?"),
|
|
|
|
);
|
|
|
|
}
|
2021-01-21 18:34:51 -08:00
|
|
|
|
2021-02-26 21:42:09 -08:00
|
|
|
if let Some(warp_slot) = warp_slot {
|
|
|
|
genesis.warp_slot(warp_slot);
|
|
|
|
}
|
2020-12-08 23:18:27 -08:00
|
|
|
|
2021-03-17 11:27:48 -07:00
|
|
|
if let Some(slots_per_epoch) = slots_per_epoch {
|
|
|
|
genesis.epoch_schedule(EpochSchedule::custom(
|
|
|
|
slots_per_epoch,
|
|
|
|
slots_per_epoch,
|
|
|
|
/* enable_warmup_epochs = */ false,
|
|
|
|
));
|
2021-06-09 19:54:13 -07:00
|
|
|
|
|
|
|
genesis.rent = Rent::with_slots_per_epoch(slots_per_epoch);
|
2021-03-17 11:27:48 -07:00
|
|
|
}
|
|
|
|
|
2021-04-20 19:40:52 -07:00
|
|
|
if let Some(gossip_host) = gossip_host {
|
|
|
|
genesis.gossip_host(gossip_host);
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(gossip_port) = gossip_port {
|
|
|
|
genesis.gossip_port(gossip_port);
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(dynamic_port_range) = dynamic_port_range {
|
|
|
|
genesis.port_range(dynamic_port_range);
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(bind_address) = bind_address {
|
|
|
|
genesis.bind_ip_addr(bind_address);
|
|
|
|
}
|
|
|
|
|
2021-12-14 12:08:52 -08:00
|
|
|
if matches.is_present("accountsdb_plugin_config") {
|
|
|
|
genesis.accountsdb_plugin_config_files = Some(
|
|
|
|
values_t_or_exit!(matches, "accountsdb_plugin_config", String)
|
|
|
|
.into_iter()
|
|
|
|
.map(PathBuf::from)
|
|
|
|
.collect(),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2021-07-23 08:25:03 -07:00
|
|
|
match genesis.start_with_mint_address(mint_address, socket_addr_space) {
|
2021-02-26 21:42:09 -08:00
|
|
|
Ok(test_validator) => {
|
2021-06-17 13:51:06 -07:00
|
|
|
*admin_service_cluster_info.write().unwrap() = Some(test_validator.cluster_info());
|
2021-02-26 21:42:09 -08:00
|
|
|
if let Some(dashboard) = dashboard {
|
2021-03-06 11:53:21 -08:00
|
|
|
dashboard.run(Duration::from_millis(250));
|
2021-02-26 21:42:09 -08:00
|
|
|
}
|
|
|
|
test_validator.join();
|
|
|
|
}
|
2021-02-05 22:39:23 -08:00
|
|
|
Err(err) => {
|
|
|
|
drop(dashboard);
|
|
|
|
println!("Error: failed to start validator: {}", err);
|
2021-01-28 12:11:53 -08:00
|
|
|
exit(1);
|
2020-12-08 23:18:27 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-12-15 11:06:03 -08:00
|
|
|
|
|
|
|
fn remove_directory_contents(ledger_path: &Path) -> Result<(), io::Error> {
|
|
|
|
for entry in fs::read_dir(&ledger_path)? {
|
|
|
|
let entry = entry?;
|
2021-02-26 21:42:09 -08:00
|
|
|
if entry.metadata()?.is_dir() {
|
2020-12-15 11:06:03 -08:00
|
|
|
fs::remove_dir_all(&entry.path())?
|
2021-02-26 21:42:09 -08:00
|
|
|
} else {
|
|
|
|
fs::remove_file(&entry.path())?
|
2020-12-15 11:06:03 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|