2019-03-21 15:24:54 -07:00
|
|
|
//! Config program
|
|
|
|
|
2019-08-14 15:54:31 -07:00
|
|
|
use crate::ConfigKeys;
|
2019-07-08 16:33:56 -07:00
|
|
|
use bincode::deserialize;
|
2019-03-21 15:24:54 -07:00
|
|
|
use log::*;
|
|
|
|
use solana_sdk::account::KeyedAccount;
|
2019-03-23 20:12:27 -07:00
|
|
|
use solana_sdk::instruction::InstructionError;
|
2020-02-05 12:48:30 -08:00
|
|
|
use solana_sdk::program_utils::{limited_deserialize, next_keyed_account};
|
2019-03-21 15:24:54 -07:00
|
|
|
use solana_sdk::pubkey::Pubkey;
|
|
|
|
|
|
|
|
pub fn process_instruction(
|
|
|
|
_program_id: &Pubkey,
|
2020-01-22 17:54:06 -08:00
|
|
|
keyed_accounts: &[KeyedAccount],
|
2019-03-21 15:24:54 -07:00
|
|
|
data: &[u8],
|
|
|
|
) -> Result<(), InstructionError> {
|
2019-10-23 19:56:07 -07:00
|
|
|
let key_list: ConfigKeys = limited_deserialize(data)?;
|
2020-01-22 09:11:56 -08:00
|
|
|
let keyed_accounts_iter = &mut keyed_accounts.iter();
|
2019-10-15 13:35:42 -07:00
|
|
|
let config_keyed_account = &mut next_keyed_account(keyed_accounts_iter)?;
|
2020-01-22 09:11:56 -08:00
|
|
|
let current_data: ConfigKeys = {
|
|
|
|
let config_account = config_keyed_account.try_account_ref_mut()?;
|
|
|
|
deserialize(&config_account.data).map_err(|err| {
|
2019-12-24 18:01:21 -08:00
|
|
|
error!(
|
|
|
|
"Unable to deserialize account[0]: {:?} (len={}): {:?}",
|
2020-01-22 09:11:56 -08:00
|
|
|
config_account.data,
|
|
|
|
config_account.data.len(),
|
2019-12-24 18:01:21 -08:00
|
|
|
err
|
|
|
|
);
|
2019-10-15 13:35:42 -07:00
|
|
|
InstructionError::InvalidAccountData
|
2020-01-22 09:11:56 -08:00
|
|
|
})?
|
|
|
|
};
|
2019-07-10 01:00:49 -07:00
|
|
|
let current_signer_keys: Vec<Pubkey> = current_data
|
|
|
|
.keys
|
|
|
|
.iter()
|
|
|
|
.filter(|(_, is_signer)| *is_signer)
|
|
|
|
.map(|(pubkey, _)| *pubkey)
|
|
|
|
.collect();
|
|
|
|
|
|
|
|
if current_signer_keys.is_empty() {
|
2019-11-20 10:12:43 -08:00
|
|
|
// Config account keypair must be a signer on account initialization,
|
2019-07-10 01:00:49 -07:00
|
|
|
// or when no signers specified in Config data
|
2019-10-15 13:35:42 -07:00
|
|
|
if config_keyed_account.signer_key().is_none() {
|
2019-07-10 01:00:49 -07:00
|
|
|
error!("account[0].signer_key().is_none()");
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-07-10 01:00:49 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-09 12:37:18 -07:00
|
|
|
let mut counter = 0;
|
2019-10-15 13:35:42 -07:00
|
|
|
for (signer, _) in key_list.keys.iter().filter(|(_, is_signer)| *is_signer) {
|
2019-07-09 12:37:18 -07:00
|
|
|
counter += 1;
|
2019-10-15 13:35:42 -07:00
|
|
|
if signer != config_keyed_account.unsigned_key() {
|
|
|
|
let signer_account = keyed_accounts_iter.next();
|
2019-07-10 01:00:49 -07:00
|
|
|
if signer_account.is_none() {
|
|
|
|
error!("account {:?} is not in account list", signer);
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-07-10 01:00:49 -07:00
|
|
|
}
|
|
|
|
let signer_key = signer_account.unwrap().signer_key();
|
|
|
|
if signer_key.is_none() {
|
|
|
|
error!("account {:?} signer_key().is_none()", signer);
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-07-10 01:00:49 -07:00
|
|
|
}
|
|
|
|
if signer_key.unwrap() != signer {
|
|
|
|
error!(
|
|
|
|
"account[{:?}].signer_key() does not match Config data)",
|
2019-10-15 13:35:42 -07:00
|
|
|
counter + 1
|
2019-07-10 01:00:49 -07:00
|
|
|
);
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-07-10 01:00:49 -07:00
|
|
|
}
|
|
|
|
// If Config account is already initialized, update signatures must match Config data
|
|
|
|
if !current_data.keys.is_empty()
|
|
|
|
&& current_signer_keys
|
|
|
|
.iter()
|
|
|
|
.find(|&pubkey| pubkey == signer)
|
|
|
|
.is_none()
|
|
|
|
{
|
|
|
|
error!("account {:?} is not in stored signer list", signer);
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-07-10 01:00:49 -07:00
|
|
|
}
|
2019-10-15 13:35:42 -07:00
|
|
|
} else if config_keyed_account.signer_key().is_none() {
|
2019-07-09 12:37:18 -07:00
|
|
|
error!("account[0].signer_key().is_none()");
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-07-09 12:37:18 -07:00
|
|
|
}
|
|
|
|
}
|
2019-07-08 16:33:56 -07:00
|
|
|
|
2019-07-10 01:00:49 -07:00
|
|
|
// Check for Config data signers not present in incoming account update
|
|
|
|
if current_signer_keys.len() > counter {
|
|
|
|
error!(
|
|
|
|
"too few signers: {:?}; expected: {:?}",
|
|
|
|
counter,
|
|
|
|
current_signer_keys.len()
|
|
|
|
);
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::MissingRequiredSignature);
|
2019-07-10 01:00:49 -07:00
|
|
|
}
|
|
|
|
|
2020-01-22 09:11:56 -08:00
|
|
|
if config_keyed_account.data_len()? < data.len() {
|
2019-03-21 15:24:54 -07:00
|
|
|
error!("instruction data too large");
|
2019-10-02 18:04:18 -07:00
|
|
|
return Err(InstructionError::InvalidInstructionData);
|
2019-03-21 15:24:54 -07:00
|
|
|
}
|
|
|
|
|
Maintenance : simplify a few patterns, remove unneeded dependencies (#8137)
* Simplify a few pattern matches
* Removing unneeded dependencies, upgrading internal version #s
net-shaper: Removing log, semver, serde_derive
bench-tps: Removing serde, serde_derive
banking-bench: Removing solana
ledger-tool: Removing bincode, serde, serde_derive
librapay: Removing solana, language_e2e_tests
log-analyzer: Removing log, semver, serde_derive
exchange: Removing solana
core: Removing crc, memmap, symlink, untrusted
perf: Removing serde_derive
genesis: Removing hex, serde_derive
sdk-c: Removing sha2
sys-tuner: Removing semver
bench-exchange: Removing bincode, bs58, env_logger, serde, serde_derive, untrusted, ws
btc_spv_bin: Removing serde_json
btc_spv: Removing chrono
bpf_loader: Removing serde
ledger: Removing dlopen, dlopen_derive, serde_derive
move_loader: Removing byteorder, libc, language_e2e_tests
ownable: Removing serde, serde_derive
client: Removing rand
archiver-utils: Removing rand_chacha
validator: Removing serde_json, tempfile
param_passing_dep: Removing solana
failure: Removing log
vest: Removing log
vote-signer: Removing bs58, serde
local-cluster: Removing symlink
keygen: Removing rpassword
install: Removing bs58, log
upload-perf: Removing log
runtime: Removing serde_json
stake: Removing rand
* Add modified Cargo.lock
* fixup! Simplify a few pattern matches
* fixup! Simplify a few pattern matches
2020-02-06 09:02:38 -08:00
|
|
|
config_keyed_account.try_account_ref_mut()?.data[..data.len()].copy_from_slice(&data);
|
2019-03-21 15:24:54 -07:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
2019-12-04 19:24:12 -08:00
|
|
|
mod tests {
|
|
|
|
use super::*;
|
|
|
|
use crate::{config_instruction, get_config_data, id, ConfigKeys, ConfigState};
|
|
|
|
use bincode::serialized_size;
|
|
|
|
use serde_derive::{Deserialize, Serialize};
|
|
|
|
use solana_sdk::{
|
|
|
|
account::{create_keyed_is_signer_accounts, Account},
|
2020-02-20 13:28:55 -08:00
|
|
|
signature::{Keypair, Signer},
|
2019-12-04 19:24:12 -08:00
|
|
|
system_instruction::SystemInstruction,
|
|
|
|
};
|
2020-01-22 09:11:56 -08:00
|
|
|
use std::cell::RefCell;
|
2019-12-04 19:24:12 -08:00
|
|
|
|
|
|
|
#[derive(Serialize, Deserialize, Debug, PartialEq)]
|
|
|
|
struct MyConfig {
|
|
|
|
pub item: u64,
|
|
|
|
}
|
|
|
|
impl Default for MyConfig {
|
|
|
|
fn default() -> Self {
|
2020-05-15 09:35:43 -07:00
|
|
|
Self { item: 123_456_789 }
|
2019-12-04 19:24:12 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
impl MyConfig {
|
|
|
|
pub fn new(item: u64) -> Self {
|
|
|
|
Self { item }
|
|
|
|
}
|
|
|
|
pub fn deserialize(input: &[u8]) -> Option<Self> {
|
|
|
|
deserialize(input).ok()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl ConfigState for MyConfig {
|
|
|
|
fn max_space() -> u64 {
|
|
|
|
serialized_size(&Self::default()).unwrap()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-22 09:11:56 -08:00
|
|
|
fn create_config_account(keys: Vec<(Pubkey, bool)>) -> (Keypair, RefCell<Account>) {
|
2019-12-04 19:24:12 -08:00
|
|
|
let from_pubkey = Pubkey::new_rand();
|
|
|
|
let config_keypair = Keypair::new();
|
|
|
|
let config_pubkey = config_keypair.pubkey();
|
|
|
|
|
|
|
|
let instructions =
|
|
|
|
config_instruction::create_account::<MyConfig>(&from_pubkey, &config_pubkey, 1, keys);
|
|
|
|
|
|
|
|
let system_instruction = limited_deserialize(&instructions[0].data).unwrap();
|
|
|
|
let space = match system_instruction {
|
|
|
|
SystemInstruction::CreateAccount {
|
|
|
|
lamports: _,
|
|
|
|
space,
|
|
|
|
program_id: _,
|
|
|
|
} => space,
|
|
|
|
_ => panic!("Not a CreateAccount system instruction"),
|
|
|
|
};
|
2020-01-22 17:54:06 -08:00
|
|
|
let config_account = RefCell::new(Account {
|
2019-12-04 19:24:12 -08:00
|
|
|
data: vec![0; space as usize],
|
|
|
|
..Account::default()
|
2020-01-22 09:11:56 -08:00
|
|
|
});
|
2020-01-22 17:54:06 -08:00
|
|
|
let accounts = vec![(&config_pubkey, true, &config_account)];
|
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instructions[1].data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Ok(())
|
|
|
|
);
|
|
|
|
|
|
|
|
(config_keypair, config_account)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_process_create_ok() {
|
|
|
|
solana_logger::setup();
|
|
|
|
let keys = vec![];
|
2020-05-15 09:35:43 -07:00
|
|
|
let (_, config_account) = create_config_account(keys);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
|
|
|
Some(MyConfig::default()),
|
2020-01-22 09:11:56 -08:00
|
|
|
deserialize(get_config_data(&config_account.borrow().data).unwrap()).ok()
|
2019-12-04 19:24:12 -08:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_process_store_ok() {
|
|
|
|
solana_logger::setup();
|
|
|
|
let keys = vec![];
|
2020-01-22 17:54:06 -08:00
|
|
|
let (config_keypair, config_account) = create_config_account(keys.clone());
|
2019-12-04 19:24:12 -08:00
|
|
|
let config_pubkey = config_keypair.pubkey();
|
|
|
|
let my_config = MyConfig::new(42);
|
|
|
|
|
2020-05-15 09:35:43 -07:00
|
|
|
let instruction = config_instruction::store(&config_pubkey, true, keys, &my_config);
|
2020-01-22 17:54:06 -08:00
|
|
|
let accounts = vec![(&config_pubkey, true, &config_account)];
|
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instruction.data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Ok(())
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
Some(my_config),
|
2020-01-22 09:11:56 -08:00
|
|
|
deserialize(get_config_data(&config_account.borrow().data).unwrap()).ok()
|
2019-12-04 19:24:12 -08:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_process_store_fail_instruction_data_too_large() {
|
|
|
|
solana_logger::setup();
|
|
|
|
let keys = vec![];
|
2020-01-22 17:54:06 -08:00
|
|
|
let (config_keypair, config_account) = create_config_account(keys.clone());
|
2019-12-04 19:24:12 -08:00
|
|
|
let config_pubkey = config_keypair.pubkey();
|
|
|
|
let my_config = MyConfig::new(42);
|
|
|
|
|
2020-05-15 09:35:43 -07:00
|
|
|
let mut instruction = config_instruction::store(&config_pubkey, true, keys, &my_config);
|
2019-12-04 19:24:12 -08:00
|
|
|
instruction.data = vec![0; 123]; // <-- Replace data with a vector that's too large
|
2020-01-22 17:54:06 -08:00
|
|
|
let accounts = vec![(&config_pubkey, true, &config_account)];
|
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instruction.data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Err(InstructionError::InvalidInstructionData)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_process_store_fail_account0_not_signer() {
|
|
|
|
solana_logger::setup();
|
|
|
|
let keys = vec![];
|
2020-05-15 09:35:43 -07:00
|
|
|
let (config_keypair, config_account) = create_config_account(keys);
|
2019-12-04 19:24:12 -08:00
|
|
|
let config_pubkey = config_keypair.pubkey();
|
|
|
|
let my_config = MyConfig::new(42);
|
|
|
|
|
|
|
|
let mut instruction = config_instruction::store(&config_pubkey, true, vec![], &my_config);
|
|
|
|
instruction.accounts[0].is_signer = false; // <----- not a signer
|
2020-01-22 17:54:06 -08:00
|
|
|
let accounts = vec![(&config_pubkey, false, &config_account)];
|
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instruction.data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Err(InstructionError::MissingRequiredSignature)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_process_store_with_additional_signers() {
|
|
|
|
solana_logger::setup();
|
|
|
|
let pubkey = Pubkey::new_rand();
|
|
|
|
let signer0_pubkey = Pubkey::new_rand();
|
|
|
|
let signer1_pubkey = Pubkey::new_rand();
|
|
|
|
let keys = vec![
|
|
|
|
(pubkey, false),
|
|
|
|
(signer0_pubkey, true),
|
|
|
|
(signer1_pubkey, true),
|
|
|
|
];
|
2020-01-22 17:54:06 -08:00
|
|
|
let (config_keypair, config_account) = create_config_account(keys.clone());
|
2019-12-04 19:24:12 -08:00
|
|
|
let config_pubkey = config_keypair.pubkey();
|
|
|
|
let my_config = MyConfig::new(42);
|
|
|
|
|
|
|
|
let instruction = config_instruction::store(&config_pubkey, true, keys.clone(), &my_config);
|
2020-01-22 17:54:06 -08:00
|
|
|
let signer0_account = RefCell::new(Account::default());
|
|
|
|
let signer1_account = RefCell::new(Account::default());
|
|
|
|
let accounts = vec![
|
|
|
|
(&config_pubkey, true, &config_account),
|
|
|
|
(&signer0_pubkey, true, &signer0_account),
|
|
|
|
(&signer1_pubkey, true, &signer1_account),
|
2019-12-04 19:24:12 -08:00
|
|
|
];
|
2020-01-22 17:54:06 -08:00
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instruction.data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Ok(())
|
|
|
|
);
|
2020-01-22 09:11:56 -08:00
|
|
|
let meta_data: ConfigKeys = deserialize(&config_account.borrow().data).unwrap();
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(meta_data.keys, keys);
|
|
|
|
assert_eq!(
|
|
|
|
Some(my_config),
|
2020-01-22 09:11:56 -08:00
|
|
|
deserialize(get_config_data(&config_account.borrow().data).unwrap()).ok()
|
2019-12-04 19:24:12 -08:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_process_store_without_config_signer() {
|
|
|
|
solana_logger::setup();
|
|
|
|
let pubkey = Pubkey::new_rand();
|
|
|
|
let signer0_pubkey = Pubkey::new_rand();
|
|
|
|
let keys = vec![(pubkey, false), (signer0_pubkey, true)];
|
|
|
|
let (config_keypair, _) = create_config_account(keys.clone());
|
|
|
|
let config_pubkey = config_keypair.pubkey();
|
|
|
|
let my_config = MyConfig::new(42);
|
|
|
|
|
2020-05-15 09:35:43 -07:00
|
|
|
let instruction = config_instruction::store(&config_pubkey, false, keys, &my_config);
|
2020-01-22 17:54:06 -08:00
|
|
|
let signer0_account = RefCell::new(Account::default());
|
|
|
|
let accounts = vec![(&signer0_pubkey, true, &signer0_account)];
|
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instruction.data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Err(InstructionError::InvalidAccountData)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_process_store_with_bad_additional_signer() {
|
|
|
|
solana_logger::setup();
|
|
|
|
let signer0_pubkey = Pubkey::new_rand();
|
|
|
|
let signer1_pubkey = Pubkey::new_rand();
|
2020-01-22 17:54:06 -08:00
|
|
|
let signer0_account = RefCell::new(Account::default());
|
|
|
|
let signer1_account = RefCell::new(Account::default());
|
2019-12-04 19:24:12 -08:00
|
|
|
let keys = vec![(signer0_pubkey, true)];
|
2020-01-22 17:54:06 -08:00
|
|
|
let (config_keypair, config_account) = create_config_account(keys.clone());
|
2019-12-04 19:24:12 -08:00
|
|
|
let config_pubkey = config_keypair.pubkey();
|
|
|
|
let my_config = MyConfig::new(42);
|
|
|
|
|
2020-05-15 09:35:43 -07:00
|
|
|
let instruction = config_instruction::store(&config_pubkey, true, keys, &my_config);
|
2019-12-04 19:24:12 -08:00
|
|
|
|
|
|
|
// Config-data pubkey doesn't match signer
|
2020-01-22 17:54:06 -08:00
|
|
|
let accounts = vec![
|
|
|
|
(&config_pubkey, true, &config_account),
|
|
|
|
(&signer1_pubkey, true, &signer1_account),
|
2019-12-04 19:24:12 -08:00
|
|
|
];
|
2020-01-22 17:54:06 -08:00
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instruction.data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Err(InstructionError::MissingRequiredSignature)
|
|
|
|
);
|
|
|
|
|
|
|
|
// Config-data pubkey not a signer
|
2020-01-22 17:54:06 -08:00
|
|
|
let accounts = vec![
|
|
|
|
(&config_pubkey, true, &config_account),
|
|
|
|
(&signer0_pubkey, false, &signer0_account),
|
2019-12-04 19:24:12 -08:00
|
|
|
];
|
2020-01-22 17:54:06 -08:00
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instruction.data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Err(InstructionError::MissingRequiredSignature)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_config_updates() {
|
|
|
|
solana_logger::setup();
|
|
|
|
let pubkey = Pubkey::new_rand();
|
|
|
|
let signer0_pubkey = Pubkey::new_rand();
|
|
|
|
let signer1_pubkey = Pubkey::new_rand();
|
|
|
|
let signer2_pubkey = Pubkey::new_rand();
|
2020-01-22 17:54:06 -08:00
|
|
|
let signer0_account = RefCell::new(Account::default());
|
|
|
|
let signer1_account = RefCell::new(Account::default());
|
|
|
|
let signer2_account = RefCell::new(Account::default());
|
2019-12-04 19:24:12 -08:00
|
|
|
let keys = vec![
|
|
|
|
(pubkey, false),
|
|
|
|
(signer0_pubkey, true),
|
|
|
|
(signer1_pubkey, true),
|
|
|
|
];
|
2020-01-22 17:54:06 -08:00
|
|
|
let (config_keypair, config_account) = create_config_account(keys.clone());
|
2019-12-04 19:24:12 -08:00
|
|
|
let config_pubkey = config_keypair.pubkey();
|
|
|
|
let my_config = MyConfig::new(42);
|
|
|
|
|
|
|
|
let instruction = config_instruction::store(&config_pubkey, true, keys.clone(), &my_config);
|
2020-01-22 17:54:06 -08:00
|
|
|
let accounts = vec![
|
|
|
|
(&config_pubkey, true, &config_account),
|
|
|
|
(&signer0_pubkey, true, &signer0_account),
|
|
|
|
(&signer1_pubkey, true, &signer1_account),
|
2019-12-04 19:24:12 -08:00
|
|
|
];
|
2020-01-22 17:54:06 -08:00
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instruction.data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Ok(())
|
|
|
|
);
|
|
|
|
|
|
|
|
// Update with expected signatures
|
|
|
|
let new_config = MyConfig::new(84);
|
|
|
|
let instruction =
|
|
|
|
config_instruction::store(&config_pubkey, false, keys.clone(), &new_config);
|
2020-01-22 17:54:06 -08:00
|
|
|
let accounts = vec![
|
|
|
|
(&config_pubkey, false, &config_account),
|
|
|
|
(&signer0_pubkey, true, &signer0_account),
|
|
|
|
(&signer1_pubkey, true, &signer1_account),
|
2019-12-04 19:24:12 -08:00
|
|
|
];
|
2020-01-22 17:54:06 -08:00
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instruction.data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Ok(())
|
|
|
|
);
|
2020-01-22 09:11:56 -08:00
|
|
|
let meta_data: ConfigKeys = deserialize(&config_account.borrow().data).unwrap();
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(meta_data.keys, keys);
|
|
|
|
assert_eq!(
|
|
|
|
new_config,
|
2020-01-22 09:11:56 -08:00
|
|
|
MyConfig::deserialize(get_config_data(&config_account.borrow().data).unwrap()).unwrap()
|
2019-12-04 19:24:12 -08:00
|
|
|
);
|
|
|
|
|
|
|
|
// Attempt update with incomplete signatures
|
|
|
|
let keys = vec![(pubkey, false), (signer0_pubkey, true)];
|
2020-05-15 09:35:43 -07:00
|
|
|
let instruction = config_instruction::store(&config_pubkey, false, keys, &my_config);
|
2020-01-22 17:54:06 -08:00
|
|
|
let accounts = vec![
|
|
|
|
(&config_pubkey, false, &config_account),
|
|
|
|
(&signer0_pubkey, true, &signer0_account),
|
|
|
|
(&signer1_pubkey, false, &signer1_account),
|
2019-12-04 19:24:12 -08:00
|
|
|
];
|
2020-01-22 17:54:06 -08:00
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instruction.data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Err(InstructionError::MissingRequiredSignature)
|
|
|
|
);
|
|
|
|
|
|
|
|
// Attempt update with incorrect signatures
|
|
|
|
let keys = vec![
|
|
|
|
(pubkey, false),
|
|
|
|
(signer0_pubkey, true),
|
|
|
|
(signer2_pubkey, true),
|
|
|
|
];
|
2020-05-15 09:35:43 -07:00
|
|
|
let instruction = config_instruction::store(&config_pubkey, false, keys, &my_config);
|
2020-01-22 17:54:06 -08:00
|
|
|
let accounts = vec![
|
|
|
|
(&config_pubkey, false, &config_account),
|
|
|
|
(&signer0_pubkey, true, &signer0_account),
|
|
|
|
(&signer2_pubkey, true, &signer2_account),
|
2019-12-04 19:24:12 -08:00
|
|
|
];
|
2020-01-22 17:54:06 -08:00
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instruction.data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Err(InstructionError::MissingRequiredSignature)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_config_updates_requiring_config() {
|
|
|
|
solana_logger::setup();
|
|
|
|
let pubkey = Pubkey::new_rand();
|
|
|
|
let signer0_pubkey = Pubkey::new_rand();
|
2020-01-22 17:54:06 -08:00
|
|
|
let signer0_account = RefCell::new(Account::default());
|
2019-12-04 19:24:12 -08:00
|
|
|
let keys = vec![
|
|
|
|
(pubkey, false),
|
|
|
|
(signer0_pubkey, true),
|
|
|
|
(signer0_pubkey, true),
|
|
|
|
]; // Dummy keys for account sizing
|
2020-05-15 09:35:43 -07:00
|
|
|
let (config_keypair, config_account) = create_config_account(keys);
|
2019-12-04 19:24:12 -08:00
|
|
|
let config_pubkey = config_keypair.pubkey();
|
|
|
|
let my_config = MyConfig::new(42);
|
|
|
|
|
|
|
|
let keys = vec![
|
|
|
|
(pubkey, false),
|
|
|
|
(signer0_pubkey, true),
|
|
|
|
(config_keypair.pubkey(), true),
|
|
|
|
];
|
|
|
|
|
|
|
|
let instruction = config_instruction::store(&config_pubkey, true, keys.clone(), &my_config);
|
2020-01-22 17:54:06 -08:00
|
|
|
let accounts = vec![
|
|
|
|
(&config_pubkey, true, &config_account),
|
|
|
|
(&signer0_pubkey, true, &signer0_account),
|
2019-12-04 19:24:12 -08:00
|
|
|
];
|
2020-01-22 17:54:06 -08:00
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instruction.data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Ok(())
|
|
|
|
);
|
|
|
|
|
|
|
|
// Update with expected signatures
|
|
|
|
let new_config = MyConfig::new(84);
|
|
|
|
let instruction =
|
|
|
|
config_instruction::store(&config_pubkey, true, keys.clone(), &new_config);
|
2020-01-22 17:54:06 -08:00
|
|
|
let accounts = vec![
|
|
|
|
(&config_pubkey, true, &config_account),
|
|
|
|
(&signer0_pubkey, true, &signer0_account),
|
2019-12-04 19:24:12 -08:00
|
|
|
];
|
2020-01-22 17:54:06 -08:00
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instruction.data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Ok(())
|
|
|
|
);
|
2020-01-22 09:11:56 -08:00
|
|
|
let meta_data: ConfigKeys = deserialize(&config_account.borrow().data).unwrap();
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(meta_data.keys, keys);
|
|
|
|
assert_eq!(
|
|
|
|
new_config,
|
2020-01-22 09:11:56 -08:00
|
|
|
MyConfig::deserialize(get_config_data(&config_account.borrow().data).unwrap()).unwrap()
|
2019-12-04 19:24:12 -08:00
|
|
|
);
|
|
|
|
|
|
|
|
// Attempt update with incomplete signatures
|
|
|
|
let keys = vec![(pubkey, false), (config_keypair.pubkey(), true)];
|
2020-05-15 09:35:43 -07:00
|
|
|
let instruction = config_instruction::store(&config_pubkey, true, keys, &my_config);
|
2020-01-22 17:54:06 -08:00
|
|
|
let accounts = vec![(&config_pubkey, true, &config_account)];
|
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instruction.data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Err(InstructionError::MissingRequiredSignature)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_config_initialize_no_panic() {
|
|
|
|
let from_pubkey = Pubkey::new_rand();
|
|
|
|
let config_pubkey = Pubkey::new_rand();
|
|
|
|
let instructions =
|
|
|
|
config_instruction::create_account::<MyConfig>(&from_pubkey, &config_pubkey, 1, vec![]);
|
2020-01-22 17:54:06 -08:00
|
|
|
let accounts = vec![];
|
|
|
|
let keyed_accounts = create_keyed_is_signer_accounts(&accounts);
|
2019-12-04 19:24:12 -08:00
|
|
|
assert_eq!(
|
2020-01-22 17:54:06 -08:00
|
|
|
process_instruction(&id(), &keyed_accounts, &instructions[1].data),
|
2019-12-04 19:24:12 -08:00
|
|
|
Err(InstructionError::NotEnoughAccountKeys)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|