solana/core/src/rpc.rs

876 lines
31 KiB
Rust
Raw Normal View History

//! The `rpc` module implements the Solana RPC interface.
2018-08-10 16:05:23 -07:00
2019-03-18 14:18:43 -07:00
use crate::bank_forks::BankForks;
2018-12-07 19:16:27 -08:00
use crate::cluster_info::ClusterInfo;
use crate::contact_info::ContactInfo;
2018-12-07 19:16:27 -08:00
use crate::packet::PACKET_DATA_SIZE;
use crate::storage_stage::StorageState;
use bincode::{deserialize, serialize};
2019-03-18 14:18:43 -07:00
use jsonrpc_core::{Error, Metadata, Result};
use jsonrpc_derive::rpc;
use solana_drone::drone::request_airdrop_transaction;
use solana_runtime::bank::Bank;
use solana_sdk::account::Account;
use solana_sdk::fee_calculator::FeeCalculator;
use solana_sdk::pubkey::Pubkey;
2018-12-03 10:26:28 -08:00
use solana_sdk::signature::Signature;
2019-04-05 18:07:30 -07:00
use solana_sdk::transaction::{self, Transaction};
use solana_vote_api::vote_state::VoteState;
2018-08-22 10:53:24 -07:00
use std::net::{SocketAddr, UdpSocket};
use std::sync::atomic::{AtomicBool, Ordering};
use std::sync::{Arc, RwLock};
2019-02-17 10:01:21 -08:00
use std::thread::sleep;
use std::time::{Duration, Instant};
2018-08-10 16:05:23 -07:00
2019-03-06 09:26:12 -08:00
#[derive(Debug, Clone)]
pub struct JsonRpcConfig {
pub enable_fullnode_exit: bool, // Enable the 'fullnodeExit' command
2019-03-06 09:26:12 -08:00
pub drone_addr: Option<SocketAddr>,
}
impl Default for JsonRpcConfig {
fn default() -> Self {
Self {
enable_fullnode_exit: false,
2019-03-06 09:26:12 -08:00
drone_addr: None,
}
}
}
2019-02-17 09:29:08 -08:00
#[derive(Clone)]
pub struct JsonRpcRequestProcessor {
2019-03-18 14:18:43 -07:00
bank_forks: Arc<RwLock<BankForks>>,
2019-02-17 09:29:08 -08:00
storage_state: StorageState,
config: JsonRpcConfig,
fullnode_exit: Arc<AtomicBool>,
2018-08-14 17:03:48 -07:00
}
2019-02-17 09:29:08 -08:00
impl JsonRpcRequestProcessor {
fn bank(&self) -> Arc<Bank> {
2019-03-18 14:18:43 -07:00
self.bank_forks.read().unwrap().working_bank()
2019-02-20 21:23:44 -08:00
}
pub fn new(
storage_state: StorageState,
config: JsonRpcConfig,
2019-03-18 14:18:43 -07:00
bank_forks: Arc<RwLock<BankForks>>,
2019-03-04 16:21:33 -08:00
fullnode_exit: &Arc<AtomicBool>,
) -> Self {
2019-02-17 09:29:08 -08:00
JsonRpcRequestProcessor {
2019-03-18 14:18:43 -07:00
bank_forks,
storage_state,
config,
2019-03-04 16:21:33 -08:00
fullnode_exit: fullnode_exit.clone(),
}
}
pub fn get_account_info(&self, pubkey: &Pubkey) -> Result<Account> {
2019-03-18 14:18:43 -07:00
self.bank()
2019-02-17 09:29:08 -08:00
.get_account(&pubkey)
.ok_or_else(Error::invalid_request)
}
2019-02-26 12:25:46 -08:00
2019-03-18 14:18:43 -07:00
pub fn get_balance(&self, pubkey: &Pubkey) -> u64 {
self.bank().get_balance(&pubkey)
2019-02-17 09:29:08 -08:00
}
2019-02-26 12:25:46 -08:00
fn get_recent_blockhash(&self) -> (String, FeeCalculator) {
(
self.bank().confirmed_last_blockhash().to_string(),
self.bank().fee_calculator.clone(),
)
2019-02-17 09:29:08 -08:00
}
2019-02-26 12:25:46 -08:00
pub fn get_signature_status(&self, signature: Signature) -> Option<transaction::Result<()>> {
self.get_signature_confirmation_status(signature)
.map(|x| x.1)
}
pub fn get_signature_confirmations(&self, signature: Signature) -> Option<usize> {
self.get_signature_confirmation_status(signature)
.map(|x| x.0)
}
pub fn get_signature_confirmation_status(
&self,
signature: Signature,
) -> Option<(usize, transaction::Result<()>)> {
self.bank().get_signature_confirmation_status(&signature)
2019-02-17 09:29:08 -08:00
}
2019-02-26 12:25:46 -08:00
2019-02-17 09:29:08 -08:00
fn get_transaction_count(&self) -> Result<u64> {
2019-03-18 14:18:43 -07:00
Ok(self.bank().transaction_count() as u64)
2019-02-17 09:29:08 -08:00
}
2019-02-26 12:25:46 -08:00
fn get_epoch_vote_accounts(&self) -> Result<Vec<(Pubkey, u64, VoteState)>> {
let bank = self.bank();
Ok(bank
.epoch_vote_accounts(bank.get_stakers_epoch(bank.slot()))
.ok_or_else(Error::invalid_request)?
.iter()
.map(|(k, (s, a))| (*k, *s, VoteState::from(a).unwrap_or_default()))
.collect::<Vec<_>>())
}
2019-03-02 10:25:16 -08:00
fn get_storage_blockhash(&self) -> Result<String> {
Ok(self.storage_state.get_storage_blockhash().to_string())
}
2019-02-26 12:25:46 -08:00
fn get_storage_slot(&self) -> Result<u64> {
Ok(self.storage_state.get_slot())
2019-02-17 09:29:08 -08:00
}
2019-02-26 12:25:46 -08:00
fn get_storage_pubkeys_for_slot(&self, slot: u64) -> Result<Vec<Pubkey>> {
Ok(self.storage_state.get_pubkeys_for_slot(slot))
2019-02-17 09:29:08 -08:00
}
pub fn fullnode_exit(&self) -> Result<bool> {
if self.config.enable_fullnode_exit {
warn!("fullnode_exit request...");
self.fullnode_exit.store(true, Ordering::Relaxed);
Ok(true)
} else {
debug!("fullnode_exit ignored");
Ok(false)
}
}
2019-02-17 09:29:08 -08:00
}
fn get_tpu_addr(cluster_info: &Arc<RwLock<ClusterInfo>>) -> Result<SocketAddr> {
2019-03-08 17:23:07 -08:00
let contact_info = cluster_info.read().unwrap().my_data();
Ok(contact_info.tpu)
}
2018-08-14 17:03:48 -07:00
2019-02-17 09:29:08 -08:00
fn verify_pubkey(input: String) -> Result<Pubkey> {
input.parse().map_err(|_e| Error::invalid_request())
2019-02-17 09:29:08 -08:00
}
2018-08-14 17:03:48 -07:00
2019-02-17 09:29:08 -08:00
fn verify_signature(input: &str) -> Result<Signature> {
input.parse().map_err(|_e| Error::invalid_request())
2018-08-14 17:03:48 -07:00
}
2018-08-10 16:05:23 -07:00
#[derive(Clone)]
pub struct Meta {
pub request_processor: Arc<RwLock<JsonRpcRequestProcessor>>,
pub cluster_info: Arc<RwLock<ClusterInfo>>,
2018-08-10 16:05:23 -07:00
}
impl Metadata for Meta {}
#[derive(Serialize, Deserialize, Clone, Debug)]
pub struct RpcContactInfo {
/// Base58 id
pub id: String,
/// Gossip port
pub gossip: Option<SocketAddr>,
/// Tpu port
pub tpu: Option<SocketAddr>,
/// JSON RPC port
pub rpc: Option<SocketAddr>,
}
2019-04-05 11:20:22 -07:00
#[rpc(server)]
pub trait RpcSol {
type Metadata;
2018-08-10 16:05:23 -07:00
#[rpc(meta, name = "confirmTransaction")]
fn confirm_transaction(&self, _: Self::Metadata, _: String) -> Result<bool>;
2018-08-10 16:05:23 -07:00
#[rpc(meta, name = "getAccountInfo")]
fn get_account_info(&self, _: Self::Metadata, _: String) -> Result<Account>;
2018-09-20 22:27:06 -07:00
#[rpc(meta, name = "getBalance")]
fn get_balance(&self, _: Self::Metadata, _: String) -> Result<u64>;
2018-08-14 17:03:48 -07:00
#[rpc(meta, name = "getClusterNodes")]
fn get_cluster_nodes(&self, _: Self::Metadata) -> Result<Vec<RpcContactInfo>>;
2019-03-02 10:25:16 -08:00
#[rpc(meta, name = "getRecentBlockhash")]
fn get_recent_blockhash(&self, _: Self::Metadata) -> Result<(String, FeeCalculator)>;
2018-08-13 11:52:37 -07:00
#[rpc(meta, name = "getSignatureStatus")]
2019-04-05 18:07:30 -07:00
fn get_signature_status(
&self,
_: Self::Metadata,
_: String,
) -> Result<Option<transaction::Result<()>>>;
2018-09-26 17:12:40 -07:00
#[rpc(meta, name = "getTransactionCount")]
fn get_transaction_count(&self, _: Self::Metadata) -> Result<u64>;
2018-08-10 16:05:23 -07:00
#[rpc(meta, name = "requestAirdrop")]
fn request_airdrop(&self, _: Self::Metadata, _: String, _: u64) -> Result<String>;
2018-08-22 10:54:37 -07:00
#[rpc(meta, name = "sendTransaction")]
fn send_transaction(&self, _: Self::Metadata, _: Vec<u8>) -> Result<String>;
#[rpc(meta, name = "getSlotLeader")]
fn get_slot_leader(&self, _: Self::Metadata) -> Result<String>;
#[rpc(meta, name = "getEpochVoteAccounts")]
fn get_epoch_vote_accounts(&self, _: Self::Metadata) -> Result<Vec<(Pubkey, u64, VoteState)>>;
2019-03-02 10:25:16 -08:00
#[rpc(meta, name = "getStorageBlockhash")]
fn get_storage_blockhash(&self, _: Self::Metadata) -> Result<String>;
#[rpc(meta, name = "getStorageSlot")]
fn get_storage_slot(&self, _: Self::Metadata) -> Result<u64>;
#[rpc(meta, name = "getStoragePubkeysForSlot")]
fn get_storage_pubkeys_for_slot(&self, _: Self::Metadata, _: u64) -> Result<Vec<Pubkey>>;
#[rpc(meta, name = "fullnodeExit")]
fn fullnode_exit(&self, _: Self::Metadata) -> Result<bool>;
#[rpc(meta, name = "getNumBlocksSinceSignatureConfirmation")]
fn get_num_blocks_since_signature_confirmation(
&self,
_: Self::Metadata,
_: String,
2019-04-05 18:07:30 -07:00
) -> Result<Option<usize>>;
#[rpc(meta, name = "getSignatureConfirmation")]
fn get_signature_confirmation(
&self,
_: Self::Metadata,
_: String,
2019-04-05 18:07:30 -07:00
) -> Result<Option<(usize, transaction::Result<()>)>>;
2018-08-10 16:05:23 -07:00
}
pub struct RpcSolImpl;
impl RpcSol for RpcSolImpl {
type Metadata = Meta;
fn confirm_transaction(&self, meta: Self::Metadata, id: String) -> Result<bool> {
debug!("confirm_transaction rpc request received: {:?}", id);
2019-04-05 18:07:30 -07:00
self.get_signature_status(meta, id).map(|status_option| {
if status_option.is_none() {
return false;
}
status_option.unwrap().is_ok()
})
2018-08-10 16:05:23 -07:00
}
2018-09-26 17:12:40 -07:00
2018-09-20 22:27:06 -07:00
fn get_account_info(&self, meta: Self::Metadata, id: String) -> Result<Account> {
debug!("get_account_info rpc request received: {:?}", id);
2018-10-15 10:01:40 -07:00
let pubkey = verify_pubkey(id)?;
meta.request_processor
.read()
.unwrap()
.get_account_info(&pubkey)
2018-09-20 22:27:06 -07:00
}
2019-02-26 12:25:46 -08:00
fn get_balance(&self, meta: Self::Metadata, id: String) -> Result<u64> {
debug!("get_balance rpc request received: {:?}", id);
2018-10-15 10:01:40 -07:00
let pubkey = verify_pubkey(id)?;
2019-03-18 14:18:43 -07:00
Ok(meta.request_processor.read().unwrap().get_balance(&pubkey))
2018-08-10 16:05:23 -07:00
}
2019-02-26 12:25:46 -08:00
fn get_cluster_nodes(&self, meta: Self::Metadata) -> Result<Vec<RpcContactInfo>> {
let cluster_info = meta.cluster_info.read().unwrap();
fn valid_address_or_none(addr: &SocketAddr) -> Option<SocketAddr> {
if ContactInfo::is_valid_address(addr) {
Some(*addr)
} else {
None
}
}
Ok(cluster_info
.all_peers()
.iter()
.filter_map(|(contact_info, _)| {
if ContactInfo::is_valid_address(&contact_info.gossip) {
Some(RpcContactInfo {
id: contact_info.id.to_string(),
gossip: Some(contact_info.gossip),
tpu: valid_address_or_none(&contact_info.tpu),
rpc: valid_address_or_none(&contact_info.rpc),
})
} else {
None // Exclude spy nodes
}
})
.collect())
}
fn get_recent_blockhash(&self, meta: Self::Metadata) -> Result<(String, FeeCalculator)> {
debug!("get_recent_blockhash rpc request received");
2019-03-18 14:18:43 -07:00
Ok(meta
.request_processor
2019-03-02 10:20:10 -08:00
.read()
.unwrap()
2019-03-18 14:18:43 -07:00
.get_recent_blockhash())
2018-08-13 11:52:37 -07:00
}
2019-02-26 12:25:46 -08:00
2019-04-05 18:07:30 -07:00
fn get_signature_status(
&self,
meta: Self::Metadata,
id: String,
) -> Result<Option<transaction::Result<()>>> {
self.get_signature_confirmation(meta, id)
.map(|res| res.map(|x| x.1))
}
fn get_num_blocks_since_signature_confirmation(
&self,
meta: Self::Metadata,
id: String,
2019-04-05 18:07:30 -07:00
) -> Result<Option<usize>> {
self.get_signature_confirmation(meta, id)
.map(|res| res.map(|x| x.0))
}
fn get_signature_confirmation(
&self,
meta: Self::Metadata,
id: String,
2019-04-05 18:07:30 -07:00
) -> Result<Option<(usize, transaction::Result<()>)>> {
debug!("get_signature_confirmation rpc request received: {:?}", id);
let signature = verify_signature(&id)?;
2019-04-05 18:07:30 -07:00
Ok(meta
.request_processor
.read()
.unwrap()
2019-04-05 18:07:30 -07:00
.get_signature_confirmation_status(signature))
2018-09-26 17:12:40 -07:00
}
2019-02-26 12:25:46 -08:00
2018-08-10 16:05:23 -07:00
fn get_transaction_count(&self, meta: Self::Metadata) -> Result<u64> {
debug!("get_transaction_count rpc request received");
meta.request_processor
.read()
.unwrap()
.get_transaction_count()
2018-08-14 17:03:48 -07:00
}
2019-02-26 12:25:46 -08:00
2019-03-05 16:28:14 -08:00
fn request_airdrop(&self, meta: Self::Metadata, id: String, lamports: u64) -> Result<String> {
trace!("request_airdrop id={} lamports={}", id, lamports);
2019-03-06 09:26:12 -08:00
let drone_addr = meta
.request_processor
.read()
.unwrap()
.config
.drone_addr
.ok_or_else(Error::invalid_request)?;
2018-10-15 10:01:40 -07:00
let pubkey = verify_pubkey(id)?;
2019-03-02 10:25:16 -08:00
let blockhash = meta
2019-03-02 10:20:10 -08:00
.request_processor
.read()
.unwrap()
2019-03-18 14:18:43 -07:00
.bank()
2019-04-12 14:38:30 -07:00
.confirmed_last_blockhash();
2019-03-06 09:26:12 -08:00
let transaction = request_airdrop_transaction(&drone_addr, &pubkey, lamports, blockhash)
.map_err(|err| {
info!("request_airdrop_transaction failed: {:?}", err);
Error::internal_error()
})?;;
let data = serialize(&transaction).map_err(|err| {
info!("request_airdrop: serialize error: {:?}", err);
Error::internal_error()
})?;
2018-10-15 10:01:40 -07:00
let transactions_socket = UdpSocket::bind("0.0.0.0:0").unwrap();
let transactions_addr = get_tpu_addr(&meta.cluster_info)?;
transactions_socket
.send_to(&data, transactions_addr)
.map_err(|err| {
info!("request_airdrop: send_to error: {:?}", err);
Error::internal_error()
})?;
let signature = transaction.signatures[0];
let now = Instant::now();
let mut signature_status;
loop {
signature_status = meta
.request_processor
.read()
.unwrap()
.get_signature_status(signature);
if signature_status == Some(Ok(())) {
info!("airdrop signature ok");
return Ok(signature.to_string());
} else if now.elapsed().as_secs() > 5 {
info!("airdrop signature timeout");
return Err(Error::internal_error());
}
sleep(Duration::from_millis(100));
}
2018-08-22 10:54:37 -07:00
}
2019-02-26 12:25:46 -08:00
2018-08-22 10:53:24 -07:00
fn send_transaction(&self, meta: Self::Metadata, data: Vec<u8>) -> Result<String> {
let tx: Transaction = deserialize(&data).map_err(|err| {
info!("send_transaction: deserialize error: {:?}", err);
Error::invalid_request()
})?;
if data.len() >= PACKET_DATA_SIZE {
info!(
"send_transaction: transaction too large: {} bytes (max: {} bytes)",
data.len(),
PACKET_DATA_SIZE
);
return Err(Error::invalid_request());
}
2018-08-22 10:53:24 -07:00
let transactions_socket = UdpSocket::bind("0.0.0.0:0").unwrap();
let transactions_addr = get_tpu_addr(&meta.cluster_info)?;
trace!("send_transaction: leader is {:?}", &transactions_addr);
2018-08-22 10:53:24 -07:00
transactions_socket
.send_to(&data, transactions_addr)
.map_err(|err| {
info!("send_transaction: send_to error: {:?}", err);
Error::internal_error()
})?;
let signature = tx.signatures[0].to_string();
trace!(
"send_transaction: sent {} bytes, signature={}",
data.len(),
signature
);
Ok(signature)
2018-08-22 10:53:24 -07:00
}
2019-02-26 12:25:46 -08:00
fn get_slot_leader(&self, meta: Self::Metadata) -> Result<String> {
let cluster_info = meta.cluster_info.read().unwrap();
let leader_data_option = cluster_info.leader_data();
Ok(leader_data_option
.and_then(|leader_data| Some(leader_data.id))
.unwrap_or_default()
.to_string())
}
fn get_epoch_vote_accounts(
&self,
meta: Self::Metadata,
) -> Result<Vec<(Pubkey, u64, VoteState)>> {
meta.request_processor
.read()
.unwrap()
.get_epoch_vote_accounts()
}
2019-03-02 10:25:16 -08:00
fn get_storage_blockhash(&self, meta: Self::Metadata) -> Result<String> {
meta.request_processor
.read()
.unwrap()
2019-03-02 10:25:16 -08:00
.get_storage_blockhash()
}
2019-02-26 12:25:46 -08:00
fn get_storage_slot(&self, meta: Self::Metadata) -> Result<u64> {
meta.request_processor.read().unwrap().get_storage_slot()
}
2019-02-26 12:25:46 -08:00
fn get_storage_pubkeys_for_slot(&self, meta: Self::Metadata, slot: u64) -> Result<Vec<Pubkey>> {
meta.request_processor
.read()
.unwrap()
.get_storage_pubkeys_for_slot(slot)
}
fn fullnode_exit(&self, meta: Self::Metadata) -> Result<bool> {
meta.request_processor.read().unwrap().fullnode_exit()
}
2018-08-14 17:03:48 -07:00
}
2019-02-26 12:25:46 -08:00
2018-08-13 10:24:39 -07:00
#[cfg(test)]
mod tests {
use super::*;
2019-03-08 17:23:07 -08:00
use crate::contact_info::ContactInfo;
use crate::genesis_utils::{create_genesis_block, GenesisBlockInfo};
use jsonrpc_core::{MetaIoHandler, Response};
2018-11-16 08:04:46 -08:00
use solana_sdk::hash::{hash, Hash};
2019-04-05 18:07:30 -07:00
use solana_sdk::instruction::InstructionError;
2018-12-03 10:26:28 -08:00
use solana_sdk::signature::{Keypair, KeypairUtil};
use solana_sdk::system_transaction;
2019-04-05 18:07:30 -07:00
use solana_sdk::transaction::TransactionError;
use std::thread;
2018-08-13 10:24:39 -07:00
fn start_rpc_handler_with_tx(
pubkey: &Pubkey,
) -> (MetaIoHandler<Meta>, Meta, Hash, Keypair, Pubkey) {
2019-03-18 14:18:43 -07:00
let (bank_forks, alice) = new_bank_forks();
let bank = bank_forks.read().unwrap().working_bank();
let exit = Arc::new(AtomicBool::new(false));
2018-08-14 17:03:48 -07:00
2019-04-12 14:38:30 -07:00
let blockhash = bank.confirmed_last_blockhash();
let tx = system_transaction::transfer(&alice, pubkey, 20, blockhash);
2018-08-14 17:03:48 -07:00
bank.process_transaction(&tx).expect("process transaction");
let tx = system_transaction::transfer(&alice, &alice.pubkey(), 20, blockhash);
2019-04-05 18:07:30 -07:00
let _ = bank.process_transaction(&tx);
let request_processor = Arc::new(RwLock::new(JsonRpcRequestProcessor::new(
StorageState::default(),
JsonRpcConfig::default(),
2019-03-18 14:18:43 -07:00
bank_forks,
2019-03-04 16:21:33 -08:00
&exit,
)));
let cluster_info = Arc::new(RwLock::new(ClusterInfo::new_with_invalid_keypair(
2019-03-08 17:23:07 -08:00
ContactInfo::default(),
)));
2019-03-08 17:23:07 -08:00
let leader = ContactInfo::new_with_socketaddr(&socketaddr!("127.0.0.1:1234"));
cluster_info.write().unwrap().insert_info(leader.clone());
2018-08-13 10:24:39 -07:00
let mut io = MetaIoHandler::default();
let rpc = RpcSolImpl;
io.extend_with(rpc.to_delegate());
2018-08-22 10:54:37 -07:00
let meta = Meta {
request_processor,
cluster_info,
2018-08-22 10:54:37 -07:00
};
(io, meta, blockhash, alice, leader.id)
2018-10-15 10:01:40 -07:00
}
#[test]
fn test_rpc_request_processor_new() {
let bob_pubkey = Pubkey::new_rand();
let exit = Arc::new(AtomicBool::new(false));
2019-03-18 14:18:43 -07:00
let (bank_forks, alice) = new_bank_forks();
let bank = bank_forks.read().unwrap().working_bank();
let request_processor = JsonRpcRequestProcessor::new(
StorageState::default(),
JsonRpcConfig::default(),
bank_forks,
&exit,
);
2018-10-15 10:01:40 -07:00
thread::spawn(move || {
2019-04-12 14:38:30 -07:00
let blockhash = bank.confirmed_last_blockhash();
let tx = system_transaction::transfer(&alice, &bob_pubkey, 20, blockhash);
2019-02-20 21:23:44 -08:00
bank.process_transaction(&tx).expect("process transaction");
})
.join()
2018-10-15 10:01:40 -07:00
.unwrap();
assert_eq!(request_processor.get_transaction_count().unwrap(), 1);
}
#[test]
fn test_rpc_get_balance() {
let bob_pubkey = Pubkey::new_rand();
let (io, meta, _blockhash, _alice, _leader_pubkey) = start_rpc_handler_with_tx(&bob_pubkey);
2018-08-14 17:03:48 -07:00
2018-08-13 10:24:39 -07:00
let req = format!(
2018-08-15 11:41:39 -07:00
r#"{{"jsonrpc":"2.0","id":1,"method":"getBalance","params":["{}"]}}"#,
2018-08-13 10:24:39 -07:00
bob_pubkey
);
2018-10-15 10:01:40 -07:00
let res = io.handle_request_sync(&req, meta);
2018-08-20 14:20:20 -07:00
let expected = format!(r#"{{"jsonrpc":"2.0","result":20,"id":1}}"#);
2018-08-13 10:24:39 -07:00
let expected: Response =
2018-08-14 17:03:48 -07:00
serde_json::from_str(&expected).expect("expected response deserialization");
2018-08-13 10:24:39 -07:00
let result: Response = serde_json::from_str(&res.expect("actual response"))
.expect("actual response deserialization");
assert_eq!(expected, result);
2018-10-15 10:01:40 -07:00
}
#[test]
fn test_rpc_get_cluster_nodes() {
let bob_pubkey = Pubkey::new_rand();
let (io, meta, _blockhash, _alice, leader_pubkey) = start_rpc_handler_with_tx(&bob_pubkey);
let req = format!(r#"{{"jsonrpc":"2.0","id":1,"method":"getClusterNodes"}}"#);
let res = io.handle_request_sync(&req, meta);
let result: Response = serde_json::from_str(&res.expect("actual response"))
.expect("actual response deserialization");
let expected = format!(
r#"{{"jsonrpc":"2.0","result":[{{"id": "{}", "gossip": "127.0.0.1:1235", "tpu": "127.0.0.1:1234", "rpc": "127.0.0.1:8899"}}],"id":1}}"#,
leader_pubkey,
);
let expected: Response =
serde_json::from_str(&expected).expect("expected response deserialization");
assert_eq!(expected, result);
}
#[test]
fn test_rpc_get_slot_leader() {
let bob_pubkey = Pubkey::new_rand();
let (io, meta, _blockhash, _alice, _leader_pubkey) = start_rpc_handler_with_tx(&bob_pubkey);
let req = format!(r#"{{"jsonrpc":"2.0","id":1,"method":"getSlotLeader"}}"#);
let res = io.handle_request_sync(&req, meta);
let expected =
format!(r#"{{"jsonrpc":"2.0","result":"11111111111111111111111111111111","id":1}}"#);
let expected: Response =
serde_json::from_str(&expected).expect("expected response deserialization");
let result: Response = serde_json::from_str(&res.expect("actual response"))
.expect("actual response deserialization");
assert_eq!(expected, result);
}
2018-10-15 10:01:40 -07:00
#[test]
fn test_rpc_get_tx_count() {
let bob_pubkey = Pubkey::new_rand();
let (io, meta, _blockhash, _alice, _leader_pubkey) = start_rpc_handler_with_tx(&bob_pubkey);
2018-08-13 10:24:39 -07:00
2018-08-15 11:41:39 -07:00
let req = format!(r#"{{"jsonrpc":"2.0","id":1,"method":"getTransactionCount"}}"#);
2018-10-15 10:01:40 -07:00
let res = io.handle_request_sync(&req, meta);
2018-08-14 17:03:48 -07:00
let expected = format!(r#"{{"jsonrpc":"2.0","result":1,"id":1}}"#);
let expected: Response =
serde_json::from_str(&expected).expect("expected response deserialization");
let result: Response = serde_json::from_str(&res.expect("actual response"))
2018-08-13 10:24:39 -07:00
.expect("actual response deserialization");
2018-08-14 17:03:48 -07:00
assert_eq!(expected, result);
2018-10-15 10:01:40 -07:00
}
#[test]
fn test_rpc_get_account_info() {
let bob_pubkey = Pubkey::new_rand();
let (io, meta, _blockhash, _alice, _leader_pubkey) = start_rpc_handler_with_tx(&bob_pubkey);
2018-09-20 13:20:37 -07:00
let req = format!(
2018-09-20 14:51:17 -07:00
r#"{{"jsonrpc":"2.0","id":1,"method":"getAccountInfo","params":["{}"]}}"#,
2018-09-20 13:20:37 -07:00
bob_pubkey
);
2018-10-15 10:01:40 -07:00
let res = io.handle_request_sync(&req, meta);
2018-09-20 13:20:37 -07:00
let expected = r#"{
"jsonrpc":"2.0",
"result":{
"owner": [0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],
2019-03-05 16:28:14 -08:00
"lamports": 20,
"data": [],
"executable": false
2018-09-20 13:20:37 -07:00
},
"id":1}
"#;
let expected: Response =
serde_json::from_str(&expected).expect("expected response deserialization");
2018-10-15 10:01:40 -07:00
let result: Response = serde_json::from_str(&res.expect("actual response"))
.expect("actual response deserialization");
assert_eq!(expected, result);
}
2018-09-20 13:20:37 -07:00
2018-10-15 10:01:40 -07:00
#[test]
fn test_rpc_confirm_tx() {
let bob_pubkey = Pubkey::new_rand();
let (io, meta, blockhash, alice, _leader_pubkey) = start_rpc_handler_with_tx(&bob_pubkey);
let tx = system_transaction::transfer(&alice, &bob_pubkey, 20, blockhash);
2018-10-15 10:01:40 -07:00
let req = format!(
r#"{{"jsonrpc":"2.0","id":1,"method":"confirmTransaction","params":["{}"]}}"#,
tx.signatures[0]
2018-10-15 10:01:40 -07:00
);
let res = io.handle_request_sync(&req, meta);
let expected = format!(r#"{{"jsonrpc":"2.0","result":true,"id":1}}"#);
let expected: Response =
serde_json::from_str(&expected).expect("expected response deserialization");
2018-09-20 13:20:37 -07:00
let result: Response = serde_json::from_str(&res.expect("actual response"))
.expect("actual response deserialization");
assert_eq!(expected, result);
2018-08-13 10:24:39 -07:00
}
2018-10-15 10:01:40 -07:00
2018-08-13 10:24:39 -07:00
#[test]
2018-10-15 10:01:40 -07:00
fn test_rpc_get_signature_status() {
let bob_pubkey = Pubkey::new_rand();
let (io, meta, blockhash, alice, _leader_pubkey) = start_rpc_handler_with_tx(&bob_pubkey);
let tx = system_transaction::transfer(&alice, &bob_pubkey, 20, blockhash);
2018-10-15 10:01:40 -07:00
let req = format!(
r#"{{"jsonrpc":"2.0","id":1,"method":"getSignatureStatus","params":["{}"]}}"#,
tx.signatures[0]
2018-10-15 10:01:40 -07:00
);
let res = io.handle_request_sync(&req, meta.clone());
2019-04-05 18:07:30 -07:00
let expected_res: Option<transaction::Result<()>> = Some(Ok(()));
let expected = json!({
"jsonrpc": "2.0",
"result": expected_res,
"id": 1
});
2018-10-15 10:01:40 -07:00
let expected: Response =
2019-04-05 18:07:30 -07:00
serde_json::from_value(expected).expect("expected response deserialization");
2018-10-15 10:01:40 -07:00
let result: Response = serde_json::from_str(&res.expect("actual response"))
.expect("actual response deserialization");
assert_eq!(expected, result);
2018-08-13 10:24:39 -07:00
2018-10-15 10:01:40 -07:00
// Test getSignatureStatus request on unprocessed tx
let tx = system_transaction::transfer(&alice, &bob_pubkey, 10, blockhash);
2018-10-15 10:01:40 -07:00
let req = format!(
r#"{{"jsonrpc":"2.0","id":1,"method":"getSignatureStatus","params":["{}"]}}"#,
tx.signatures[0]
2018-10-15 10:01:40 -07:00
);
2019-04-05 18:07:30 -07:00
let res = io.handle_request_sync(&req, meta.clone());
let expected_res: Option<String> = None;
let expected = json!({
"jsonrpc": "2.0",
"result": expected_res,
"id": 1
});
let expected: Response =
serde_json::from_value(expected).expect("expected response deserialization");
let result: Response = serde_json::from_str(&res.expect("actual response"))
.expect("actual response deserialization");
assert_eq!(expected, result);
// Test getSignatureStatus request on a TransactionError
let tx = system_transaction::transfer(&alice, &alice.pubkey(), 20, blockhash);
2019-04-05 18:07:30 -07:00
let req = format!(
r#"{{"jsonrpc":"2.0","id":1,"method":"getSignatureStatus","params":["{}"]}}"#,
tx.signatures[0]
);
2018-10-15 10:01:40 -07:00
let res = io.handle_request_sync(&req, meta);
2019-04-05 18:07:30 -07:00
let expected_res: Option<transaction::Result<()>> = Some(Err(
TransactionError::InstructionError(0, InstructionError::DuplicateAccountIndex),
));
let expected = json!({
"jsonrpc": "2.0",
"result": expected_res,
"id": 1
});
2018-08-13 10:24:39 -07:00
let expected: Response =
2019-04-05 18:07:30 -07:00
serde_json::from_value(expected).expect("expected response deserialization");
2018-10-15 10:01:40 -07:00
let result: Response = serde_json::from_str(&res.expect("actual response"))
.expect("actual response deserialization");
assert_eq!(expected, result);
}
#[test]
2019-03-02 10:25:16 -08:00
fn test_rpc_get_recent_blockhash() {
let bob_pubkey = Pubkey::new_rand();
let (io, meta, blockhash, _alice, _leader_pubkey) = start_rpc_handler_with_tx(&bob_pubkey);
2018-10-15 10:01:40 -07:00
2019-03-02 10:25:16 -08:00
let req = format!(r#"{{"jsonrpc":"2.0","id":1,"method":"getRecentBlockhash"}}"#);
2018-10-15 10:01:40 -07:00
let res = io.handle_request_sync(&req, meta);
let expected = format!(
r#"{{"jsonrpc":"2.0","result":["{}", {{"lamportsPerSignature": 0}}],"id":1}}"#,
blockhash
);
2018-10-15 10:01:40 -07:00
let expected: Response =
serde_json::from_str(&expected).expect("expected response deserialization");
2018-08-13 10:24:39 -07:00
let result: Response = serde_json::from_str(&res.expect("actual response"))
.expect("actual response deserialization");
assert_eq!(expected, result);
}
2018-10-15 10:01:40 -07:00
2018-08-13 10:24:39 -07:00
#[test]
fn test_rpc_fail_request_airdrop() {
let bob_pubkey = Pubkey::new_rand();
let (io, meta, _blockhash, _alice, _leader_pubkey) = start_rpc_handler_with_tx(&bob_pubkey);
2018-10-15 10:01:40 -07:00
2019-03-06 09:26:12 -08:00
// Expect internal error because no drone is available
2018-10-15 10:01:40 -07:00
let req = format!(
r#"{{"jsonrpc":"2.0","id":1,"method":"requestAirdrop","params":["{}", 50]}}"#,
bob_pubkey
);
let res = io.handle_request_sync(&req, meta);
let expected =
2019-03-06 09:26:12 -08:00
r#"{"jsonrpc":"2.0","error":{"code":-32600,"message":"Invalid request"},"id":1}"#;
2018-10-15 10:01:40 -07:00
let expected: Response =
serde_json::from_str(expected).expect("expected response deserialization");
let result: Response = serde_json::from_str(&res.expect("actual response"))
.expect("actual response deserialization");
assert_eq!(expected, result);
}
#[test]
fn test_rpc_send_bad_tx() {
let exit = Arc::new(AtomicBool::new(false));
2018-08-13 10:24:39 -07:00
let mut io = MetaIoHandler::default();
let rpc = RpcSolImpl;
io.extend_with(rpc.to_delegate());
let meta = Meta {
request_processor: {
2019-03-18 14:18:43 -07:00
let request_processor = JsonRpcRequestProcessor::new(
StorageState::default(),
JsonRpcConfig::default(),
2019-03-18 14:18:43 -07:00
new_bank_forks().0,
2019-03-04 16:21:33 -08:00
&exit,
);
Arc::new(RwLock::new(request_processor))
},
cluster_info: Arc::new(RwLock::new(ClusterInfo::new_with_invalid_keypair(
2019-03-08 17:23:07 -08:00
ContactInfo::default(),
))),
2018-08-13 10:24:39 -07:00
};
2018-10-15 10:01:40 -07:00
let req =
r#"{"jsonrpc":"2.0","id":1,"method":"sendTransaction","params":[[0,0,0,0,0,0,0,0]]}"#;
let res = io.handle_request_sync(req, meta.clone());
2018-08-13 10:24:39 -07:00
let expected =
r#"{"jsonrpc":"2.0","error":{"code":-32600,"message":"Invalid request"},"id":1}"#;
let expected: Response =
serde_json::from_str(expected).expect("expected response deserialization");
let result: Response = serde_json::from_str(&res.expect("actual response"))
.expect("actual response deserialization");
assert_eq!(expected, result);
}
2018-10-15 10:01:40 -07:00
#[test]
fn test_rpc_get_tpu_addr() {
let cluster_info = Arc::new(RwLock::new(ClusterInfo::new_with_invalid_keypair(
2019-03-08 17:23:07 -08:00
ContactInfo::new_with_socketaddr(&socketaddr!("127.0.0.1:1234")),
)));
assert_eq!(
get_tpu_addr(&cluster_info),
Ok(socketaddr!("127.0.0.1:1234"))
);
}
2018-10-15 10:01:40 -07:00
#[test]
fn test_rpc_verify_pubkey() {
let pubkey = Pubkey::new_rand();
2018-10-15 10:01:40 -07:00
assert_eq!(verify_pubkey(pubkey.to_string()).unwrap(), pubkey);
let bad_pubkey = "a1b2c3d4";
assert_eq!(
verify_pubkey(bad_pubkey.to_string()),
Err(Error::invalid_request())
);
}
#[test]
fn test_rpc_verify_signature() {
let tx = system_transaction::transfer(&Keypair::new(), &Pubkey::new_rand(), 20, hash(&[0]));
2018-10-15 10:01:40 -07:00
assert_eq!(
verify_signature(&tx.signatures[0].to_string()).unwrap(),
tx.signatures[0]
2018-10-15 10:01:40 -07:00
);
let bad_signature = "a1b2c3d4";
assert_eq!(
verify_signature(&bad_signature.to_string()),
2018-10-15 10:01:40 -07:00
Err(Error::invalid_request())
);
}
2019-03-18 14:18:43 -07:00
fn new_bank_forks() -> (Arc<RwLock<BankForks>>, Keypair) {
let GenesisBlockInfo {
genesis_block,
mint_keypair,
..
} = create_genesis_block(10_000);
let bank = Bank::new(&genesis_block);
2019-03-18 14:18:43 -07:00
(
Arc::new(RwLock::new(BankForks::new(bank.slot(), bank))),
mint_keypair,
2019-03-18 14:18:43 -07:00
)
}
#[test]
fn test_rpc_request_processor_config_default_trait_fullnode_exit_fails() {
let exit = Arc::new(AtomicBool::new(false));
2019-03-18 14:18:43 -07:00
let request_processor = JsonRpcRequestProcessor::new(
StorageState::default(),
JsonRpcConfig::default(),
new_bank_forks().0,
&exit,
);
2019-03-03 22:03:36 -08:00
assert_eq!(request_processor.fullnode_exit(), Ok(false));
assert_eq!(exit.load(Ordering::Relaxed), false);
}
#[test]
fn test_rpc_request_processor_allow_fullnode_exit_config() {
let exit = Arc::new(AtomicBool::new(false));
let mut config = JsonRpcConfig::default();
config.enable_fullnode_exit = true;
2019-03-18 14:18:43 -07:00
let request_processor = JsonRpcRequestProcessor::new(
StorageState::default(),
config,
new_bank_forks().0,
&exit,
);
2019-03-03 22:03:36 -08:00
assert_eq!(request_processor.fullnode_exit(), Ok(true));
assert_eq!(exit.load(Ordering::Relaxed), true);
}
2018-08-13 10:24:39 -07:00
}