2019-03-21 15:24:54 -07:00
|
|
|
//! Config program
|
|
|
|
|
2019-08-14 15:54:31 -07:00
|
|
|
use crate::ConfigKeys;
|
2019-07-08 16:33:56 -07:00
|
|
|
use bincode::deserialize;
|
2019-03-21 15:24:54 -07:00
|
|
|
use log::*;
|
|
|
|
use solana_sdk::account::KeyedAccount;
|
2019-03-23 20:12:27 -07:00
|
|
|
use solana_sdk::instruction::InstructionError;
|
2019-03-21 15:24:54 -07:00
|
|
|
use solana_sdk::pubkey::Pubkey;
|
|
|
|
|
|
|
|
pub fn process_instruction(
|
|
|
|
_program_id: &Pubkey,
|
|
|
|
keyed_accounts: &mut [KeyedAccount],
|
|
|
|
data: &[u8],
|
|
|
|
) -> Result<(), InstructionError> {
|
2019-07-09 12:37:18 -07:00
|
|
|
let key_list: ConfigKeys = deserialize(data).map_err(|err| {
|
|
|
|
error!("Invalid ConfigKeys data: {:?} {:?}", data, err);
|
|
|
|
InstructionError::InvalidInstructionData
|
|
|
|
})?;
|
2019-07-10 01:00:49 -07:00
|
|
|
|
|
|
|
let current_data: ConfigKeys = deserialize(&keyed_accounts[0].account.data).map_err(|err| {
|
|
|
|
error!("Invalid data in account[0]: {:?} {:?}", data, err);
|
|
|
|
InstructionError::InvalidAccountData
|
|
|
|
})?;
|
|
|
|
let current_signer_keys: Vec<Pubkey> = current_data
|
|
|
|
.keys
|
|
|
|
.iter()
|
|
|
|
.filter(|(_, is_signer)| *is_signer)
|
|
|
|
.map(|(pubkey, _)| *pubkey)
|
|
|
|
.collect();
|
|
|
|
|
|
|
|
if current_signer_keys.is_empty() {
|
|
|
|
// Config account keypair must be a signer on account initilization,
|
|
|
|
// or when no signers specified in Config data
|
|
|
|
if keyed_accounts[0].signer_key().is_none() {
|
|
|
|
error!("account[0].signer_key().is_none()");
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-07-10 01:00:49 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-09 12:37:18 -07:00
|
|
|
let mut counter = 0;
|
2019-07-08 16:33:56 -07:00
|
|
|
for (i, (signer, _)) in key_list
|
|
|
|
.keys
|
|
|
|
.iter()
|
|
|
|
.filter(|(_, is_signer)| *is_signer)
|
|
|
|
.enumerate()
|
|
|
|
{
|
2019-07-09 12:37:18 -07:00
|
|
|
counter += 1;
|
2019-07-10 01:00:49 -07:00
|
|
|
if signer != keyed_accounts[0].unsigned_key() {
|
|
|
|
let account_index = i + 1;
|
|
|
|
let signer_account = keyed_accounts.get(account_index);
|
|
|
|
if signer_account.is_none() {
|
|
|
|
error!("account {:?} is not in account list", signer);
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-07-10 01:00:49 -07:00
|
|
|
}
|
|
|
|
let signer_key = signer_account.unwrap().signer_key();
|
|
|
|
if signer_key.is_none() {
|
|
|
|
error!("account {:?} signer_key().is_none()", signer);
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-07-10 01:00:49 -07:00
|
|
|
}
|
|
|
|
if signer_key.unwrap() != signer {
|
|
|
|
error!(
|
|
|
|
"account[{:?}].signer_key() does not match Config data)",
|
|
|
|
account_index
|
|
|
|
);
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-07-10 01:00:49 -07:00
|
|
|
}
|
|
|
|
// If Config account is already initialized, update signatures must match Config data
|
|
|
|
if !current_data.keys.is_empty()
|
|
|
|
&& current_signer_keys
|
|
|
|
.iter()
|
|
|
|
.find(|&pubkey| pubkey == signer)
|
|
|
|
.is_none()
|
|
|
|
{
|
|
|
|
error!("account {:?} is not in stored signer list", signer);
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-07-10 01:00:49 -07:00
|
|
|
}
|
|
|
|
} else if keyed_accounts[0].signer_key().is_none() {
|
2019-07-09 12:37:18 -07:00
|
|
|
error!("account[0].signer_key().is_none()");
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-07-09 12:37:18 -07:00
|
|
|
}
|
|
|
|
}
|
2019-07-08 16:33:56 -07:00
|
|
|
|
2019-07-10 01:00:49 -07:00
|
|
|
// Check for Config data signers not present in incoming account update
|
|
|
|
if current_signer_keys.len() > counter {
|
|
|
|
error!(
|
|
|
|
"too few signers: {:?}; expected: {:?}",
|
|
|
|
counter,
|
|
|
|
current_signer_keys.len()
|
|
|
|
);
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-07-10 01:00:49 -07:00
|
|
|
}
|
|
|
|
|
2019-05-12 22:47:12 -07:00
|
|
|
if keyed_accounts[0].account.data.len() < data.len() {
|
2019-03-21 15:24:54 -07:00
|
|
|
error!("instruction data too large");
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::InvalidInstructionData);
|
2019-03-21 15:24:54 -07:00
|
|
|
}
|
|
|
|
|
2019-07-08 16:33:56 -07:00
|
|
|
keyed_accounts[0].account.data[0..data.len()].copy_from_slice(&data);
|
2019-03-21 15:24:54 -07:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
2019-08-14 15:54:31 -07:00
|
|
|
mod tests {}
|