2019-08-15 14:35:48 -07:00
|
|
|
use crate::{
|
|
|
|
config, id,
|
2019-09-26 13:29:29 -07:00
|
|
|
stake_state::{Authorized, Lockup, StakeAccount, StakeAuthorize, StakeState},
|
2019-08-15 14:35:48 -07:00
|
|
|
};
|
2019-04-01 16:45:53 -07:00
|
|
|
use bincode::deserialize;
|
|
|
|
use log::*;
|
2019-09-09 18:17:32 -07:00
|
|
|
use num_derive::{FromPrimitive, ToPrimitive};
|
2019-04-01 16:45:53 -07:00
|
|
|
use serde_derive::{Deserialize, Serialize};
|
2019-08-12 20:59:57 -07:00
|
|
|
use solana_sdk::{
|
|
|
|
account::KeyedAccount,
|
|
|
|
instruction::{AccountMeta, Instruction, InstructionError},
|
2019-09-09 18:17:32 -07:00
|
|
|
instruction_processor_utils::DecodeError,
|
2019-08-12 20:59:57 -07:00
|
|
|
pubkey::Pubkey,
|
|
|
|
system_instruction, sysvar,
|
|
|
|
};
|
2019-04-01 16:45:53 -07:00
|
|
|
|
2019-09-09 18:17:32 -07:00
|
|
|
/// Reasons the stake might have had an error
|
|
|
|
#[derive(Serialize, Deserialize, Debug, Clone, PartialEq, FromPrimitive, ToPrimitive)]
|
|
|
|
pub enum StakeError {
|
|
|
|
NoCreditsToRedeem,
|
2019-09-16 17:47:42 -07:00
|
|
|
LockupInForce,
|
2019-09-09 18:17:32 -07:00
|
|
|
}
|
|
|
|
impl<E> DecodeError<E> for StakeError {
|
|
|
|
fn type_of() -> &'static str {
|
|
|
|
"StakeError"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
impl std::fmt::Display for StakeError {
|
|
|
|
fn fmt(&self, f: &mut std::fmt::Formatter) -> std::fmt::Result {
|
|
|
|
match self {
|
|
|
|
StakeError::NoCreditsToRedeem => write!(f, "not enough credits to redeem"),
|
2019-09-16 17:47:42 -07:00
|
|
|
StakeError::LockupInForce => write!(f, "lockup has not yet expired"),
|
2019-09-09 18:17:32 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
impl std::error::Error for StakeError {}
|
|
|
|
|
2019-09-26 13:29:29 -07:00
|
|
|
#[derive(Serialize, Deserialize, Debug, PartialEq, Clone)]
|
2019-04-01 16:45:53 -07:00
|
|
|
pub enum StakeInstruction {
|
2019-09-26 13:29:29 -07:00
|
|
|
/// `Initialize` a stake with Lockup and Authorized information
|
2019-09-04 13:34:09 -07:00
|
|
|
///
|
|
|
|
/// Expects 1 Account:
|
2019-09-26 13:29:29 -07:00
|
|
|
/// 0 - Uninitialized StakeAccount
|
2019-09-04 13:34:09 -07:00
|
|
|
///
|
2019-09-26 13:29:29 -07:00
|
|
|
/// Authorized carries pubkeys that must sign staker transactions
|
|
|
|
/// and withdrawer transactions.
|
|
|
|
/// Lockup carries information about withdrawal restrictions
|
2019-09-04 13:34:09 -07:00
|
|
|
///
|
2019-09-26 13:29:29 -07:00
|
|
|
Initialize(Authorized, Lockup),
|
2019-09-16 17:47:42 -07:00
|
|
|
|
2019-09-26 13:29:29 -07:00
|
|
|
/// Authorize a key to manage stake or withdrawal
|
|
|
|
/// requires Authorized::staker or Authorized::withdrawer
|
|
|
|
/// signature, depending on which key's being updated
|
2019-09-12 19:03:28 -07:00
|
|
|
///
|
|
|
|
/// Expects 1 Account:
|
2019-09-26 13:29:29 -07:00
|
|
|
/// 0 - StakeAccount to be updated with the Pubkey for
|
|
|
|
/// authorization
|
|
|
|
Authorize(Pubkey, StakeAuthorize),
|
|
|
|
|
2019-09-11 09:48:29 -07:00
|
|
|
/// `Delegate` a stake to a particular vote account
|
2019-09-26 13:29:29 -07:00
|
|
|
/// requires Authorized::staker signature
|
2019-05-21 07:32:38 -07:00
|
|
|
///
|
2019-09-11 09:48:29 -07:00
|
|
|
/// Expects 4 Accounts:
|
2019-09-26 13:29:29 -07:00
|
|
|
/// 0 - Initialized StakeAccount to be delegated
|
2019-06-10 12:17:29 -07:00
|
|
|
/// 1 - VoteAccount to which this Stake will be delegated
|
2019-07-12 16:38:15 -07:00
|
|
|
/// 2 - Clock sysvar Account that carries clock bank epoch
|
2019-08-15 14:35:48 -07:00
|
|
|
/// 3 - Config Account that carries stake config
|
2019-06-10 12:17:29 -07:00
|
|
|
///
|
2019-09-11 09:48:29 -07:00
|
|
|
/// The entire balance of the staking account is staked. DelegateStake
|
|
|
|
/// can be called multiple times, but re-delegation is delayed
|
|
|
|
/// by one epoch
|
2019-06-10 12:17:29 -07:00
|
|
|
///
|
2019-09-11 09:48:29 -07:00
|
|
|
DelegateStake,
|
2019-04-01 16:45:53 -07:00
|
|
|
|
|
|
|
/// Redeem credits in the stake account
|
2019-09-26 13:29:29 -07:00
|
|
|
/// requires Authorized::staker signature
|
2019-05-21 07:32:38 -07:00
|
|
|
///
|
2019-09-11 09:48:29 -07:00
|
|
|
/// Expects 5 Accounts:
|
2019-09-26 13:29:29 -07:00
|
|
|
/// 0 - StakeAccount to be updated with rewards
|
2019-06-21 20:43:24 -07:00
|
|
|
/// 1 - VoteAccount to which the Stake is delegated,
|
|
|
|
/// 2 - RewardsPool Stake Account from which to redeem credits
|
2019-07-12 16:38:15 -07:00
|
|
|
/// 3 - Rewards sysvar Account that carries points values
|
2019-08-12 20:59:57 -07:00
|
|
|
/// 4 - StakeHistory sysvar that carries stake warmup/cooldown history
|
2019-04-01 16:45:53 -07:00
|
|
|
RedeemVoteCredits,
|
2019-06-21 22:28:34 -07:00
|
|
|
|
|
|
|
/// Withdraw unstaked lamports from the stake account
|
2019-09-26 13:29:29 -07:00
|
|
|
/// requires Authorized::withdrawer signature
|
2019-06-21 22:28:34 -07:00
|
|
|
///
|
2019-09-11 09:48:29 -07:00
|
|
|
/// Expects 4 Accounts:
|
2019-09-26 13:29:29 -07:00
|
|
|
/// 0 - StakeAccount from which to withdraw
|
2019-06-21 22:28:34 -07:00
|
|
|
/// 1 - System account to which the lamports will be transferred,
|
|
|
|
/// 2 - Syscall Account that carries epoch
|
2019-08-12 20:59:57 -07:00
|
|
|
/// 3 - StakeHistory sysvar that carries stake warmup/cooldown history
|
2019-06-21 22:28:34 -07:00
|
|
|
///
|
|
|
|
/// The u64 is the portion of the Stake account balance to be withdrawn,
|
2019-09-26 13:29:29 -07:00
|
|
|
/// must be <= StakeAccount.lamports - staked lamports.
|
2019-06-21 22:28:34 -07:00
|
|
|
Withdraw(u64),
|
2019-06-21 23:45:03 -07:00
|
|
|
|
|
|
|
/// Deactivates the stake in the account
|
2019-09-26 13:29:29 -07:00
|
|
|
/// requires Authorized::staker signature
|
2019-06-21 23:45:03 -07:00
|
|
|
///
|
2019-09-11 09:48:29 -07:00
|
|
|
/// Expects 3 Accounts:
|
2019-09-26 13:29:29 -07:00
|
|
|
/// 0 - Delegate StakeAccount
|
2019-08-09 12:55:21 -07:00
|
|
|
/// 1 - VoteAccount to which the Stake is delegated
|
|
|
|
/// 2 - Syscall Account that carries epoch
|
2019-09-11 09:48:29 -07:00
|
|
|
///
|
2019-06-21 23:45:03 -07:00
|
|
|
Deactivate,
|
2019-04-01 16:45:53 -07:00
|
|
|
}
|
|
|
|
|
2019-09-04 13:34:09 -07:00
|
|
|
pub fn create_stake_account_with_lockup(
|
|
|
|
from_pubkey: &Pubkey,
|
|
|
|
stake_pubkey: &Pubkey,
|
2019-09-26 13:29:29 -07:00
|
|
|
authorized: &Authorized,
|
|
|
|
lockup: &Lockup,
|
2019-09-29 21:18:15 -07:00
|
|
|
lamports: u64,
|
2019-09-04 13:34:09 -07:00
|
|
|
) -> Vec<Instruction> {
|
|
|
|
vec![
|
2019-09-20 14:10:39 -07:00
|
|
|
system_instruction::create_account(
|
2019-09-04 13:34:09 -07:00
|
|
|
from_pubkey,
|
|
|
|
stake_pubkey,
|
|
|
|
lamports,
|
|
|
|
std::mem::size_of::<StakeState>() as u64,
|
|
|
|
&id(),
|
|
|
|
),
|
|
|
|
Instruction::new(
|
|
|
|
id(),
|
2019-09-26 13:29:29 -07:00
|
|
|
&StakeInstruction::Initialize(*authorized, *lockup),
|
2019-09-04 13:34:09 -07:00
|
|
|
vec![AccountMeta::new(*stake_pubkey, false)],
|
|
|
|
),
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
2019-06-10 12:17:29 -07:00
|
|
|
pub fn create_stake_account(
|
2019-05-23 23:20:04 -07:00
|
|
|
from_pubkey: &Pubkey,
|
2019-09-04 13:34:09 -07:00
|
|
|
stake_pubkey: &Pubkey,
|
2019-09-26 13:29:29 -07:00
|
|
|
authorized: &Authorized,
|
2019-09-29 21:18:15 -07:00
|
|
|
lamports: u64,
|
2019-05-21 07:32:38 -07:00
|
|
|
) -> Vec<Instruction> {
|
2019-09-26 13:29:29 -07:00
|
|
|
create_stake_account_with_lockup(
|
|
|
|
from_pubkey,
|
|
|
|
stake_pubkey,
|
|
|
|
authorized,
|
|
|
|
&Lockup::default(),
|
2019-09-29 21:18:15 -07:00
|
|
|
lamports,
|
2019-09-26 13:29:29 -07:00
|
|
|
)
|
2019-05-21 07:32:38 -07:00
|
|
|
}
|
|
|
|
|
2019-06-10 12:17:29 -07:00
|
|
|
pub fn create_stake_account_and_delegate_stake(
|
|
|
|
from_pubkey: &Pubkey,
|
2019-09-04 13:34:09 -07:00
|
|
|
stake_pubkey: &Pubkey,
|
2019-06-10 12:17:29 -07:00
|
|
|
vote_pubkey: &Pubkey,
|
2019-09-26 13:29:29 -07:00
|
|
|
authorized: &Authorized,
|
2019-09-29 21:18:15 -07:00
|
|
|
lamports: u64,
|
2019-06-10 12:17:29 -07:00
|
|
|
) -> Vec<Instruction> {
|
2019-09-29 21:18:15 -07:00
|
|
|
let mut instructions = create_stake_account(from_pubkey, stake_pubkey, authorized, lamports);
|
|
|
|
instructions.push(delegate_stake(
|
|
|
|
stake_pubkey,
|
|
|
|
&authorized.staker,
|
|
|
|
vote_pubkey,
|
|
|
|
));
|
2019-06-10 12:17:29 -07:00
|
|
|
instructions
|
|
|
|
}
|
|
|
|
|
2019-09-26 13:29:29 -07:00
|
|
|
// for instructions that whose authorized signer may differ from the account's pubkey
|
|
|
|
fn metas_for_authorized_signer(
|
|
|
|
account_pubkey: &Pubkey,
|
|
|
|
authorized_signer: &Pubkey, // currently authorized
|
2019-09-12 19:03:28 -07:00
|
|
|
other_params: &[AccountMeta],
|
|
|
|
) -> Vec<AccountMeta> {
|
2019-09-26 13:29:29 -07:00
|
|
|
let is_own_signer = authorized_signer == account_pubkey;
|
2019-09-12 19:03:28 -07:00
|
|
|
|
2019-09-26 13:29:29 -07:00
|
|
|
// vote account
|
|
|
|
let mut account_metas = vec![AccountMeta::new(*account_pubkey, is_own_signer)];
|
2019-09-12 19:03:28 -07:00
|
|
|
|
|
|
|
for meta in other_params {
|
|
|
|
account_metas.push(meta.clone());
|
|
|
|
}
|
|
|
|
|
|
|
|
// append signer at the end
|
|
|
|
if !is_own_signer {
|
2019-09-30 14:21:29 -07:00
|
|
|
account_metas.push(AccountMeta::new_credit_only(*authorized_signer, true))
|
|
|
|
// signer
|
2019-09-12 19:03:28 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
account_metas
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn authorize(
|
|
|
|
stake_pubkey: &Pubkey,
|
|
|
|
authorized_pubkey: &Pubkey,
|
|
|
|
new_authorized_pubkey: &Pubkey,
|
2019-09-26 13:29:29 -07:00
|
|
|
stake_authorize: StakeAuthorize,
|
2019-09-12 19:03:28 -07:00
|
|
|
) -> Instruction {
|
2019-09-26 13:29:29 -07:00
|
|
|
let account_metas = metas_for_authorized_signer(stake_pubkey, authorized_pubkey, &[]);
|
2019-09-12 19:03:28 -07:00
|
|
|
|
|
|
|
Instruction::new(
|
|
|
|
id(),
|
2019-09-26 13:29:29 -07:00
|
|
|
&StakeInstruction::Authorize(*new_authorized_pubkey, stake_authorize),
|
2019-09-12 19:03:28 -07:00
|
|
|
account_metas,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2019-06-21 20:43:24 -07:00
|
|
|
pub fn redeem_vote_credits(stake_pubkey: &Pubkey, vote_pubkey: &Pubkey) -> Instruction {
|
2019-04-03 08:45:57 -07:00
|
|
|
let account_metas = vec![
|
2019-05-23 23:20:04 -07:00
|
|
|
AccountMeta::new(*stake_pubkey, false),
|
2019-08-09 12:55:21 -07:00
|
|
|
AccountMeta::new_credit_only(*vote_pubkey, false),
|
2019-06-21 20:43:24 -07:00
|
|
|
AccountMeta::new(crate::rewards_pools::random_id(), false),
|
2019-07-12 16:38:15 -07:00
|
|
|
AccountMeta::new_credit_only(sysvar::rewards::id(), false),
|
2019-08-12 20:59:57 -07:00
|
|
|
AccountMeta::new_credit_only(sysvar::stake_history::id(), false),
|
2019-04-03 08:45:57 -07:00
|
|
|
];
|
|
|
|
Instruction::new(id(), &StakeInstruction::RedeemVoteCredits, account_metas)
|
|
|
|
}
|
2019-04-01 16:45:53 -07:00
|
|
|
|
2019-09-29 21:18:15 -07:00
|
|
|
pub fn delegate_stake(
|
|
|
|
stake_pubkey: &Pubkey,
|
|
|
|
authorized_pubkey: &Pubkey,
|
|
|
|
vote_pubkey: &Pubkey,
|
|
|
|
) -> Instruction {
|
|
|
|
let account_metas = metas_for_authorized_signer(
|
|
|
|
stake_pubkey,
|
|
|
|
authorized_pubkey,
|
|
|
|
&[
|
|
|
|
AccountMeta::new_credit_only(*vote_pubkey, false),
|
|
|
|
AccountMeta::new_credit_only(sysvar::clock::id(), false),
|
|
|
|
AccountMeta::new_credit_only(crate::config::id(), false),
|
|
|
|
],
|
|
|
|
);
|
2019-09-11 09:48:29 -07:00
|
|
|
Instruction::new(id(), &StakeInstruction::DelegateStake, account_metas)
|
2019-04-01 16:45:53 -07:00
|
|
|
}
|
|
|
|
|
2019-09-29 21:18:15 -07:00
|
|
|
pub fn withdraw(
|
|
|
|
stake_pubkey: &Pubkey,
|
|
|
|
authorized_pubkey: &Pubkey,
|
|
|
|
to_pubkey: &Pubkey,
|
|
|
|
lamports: u64,
|
|
|
|
) -> Instruction {
|
|
|
|
let account_metas = metas_for_authorized_signer(
|
|
|
|
stake_pubkey,
|
|
|
|
authorized_pubkey,
|
|
|
|
&[
|
|
|
|
AccountMeta::new_credit_only(*to_pubkey, false),
|
|
|
|
AccountMeta::new_credit_only(sysvar::clock::id(), false),
|
|
|
|
AccountMeta::new_credit_only(sysvar::stake_history::id(), false),
|
|
|
|
],
|
|
|
|
);
|
2019-06-21 22:28:34 -07:00
|
|
|
Instruction::new(id(), &StakeInstruction::Withdraw(lamports), account_metas)
|
|
|
|
}
|
|
|
|
|
2019-09-29 21:18:15 -07:00
|
|
|
pub fn deactivate_stake(
|
|
|
|
stake_pubkey: &Pubkey,
|
|
|
|
authorized_pubkey: &Pubkey,
|
|
|
|
vote_pubkey: &Pubkey,
|
|
|
|
) -> Instruction {
|
|
|
|
let account_metas = metas_for_authorized_signer(
|
|
|
|
stake_pubkey,
|
|
|
|
authorized_pubkey,
|
|
|
|
&[
|
|
|
|
AccountMeta::new_credit_only(*vote_pubkey, false),
|
|
|
|
AccountMeta::new_credit_only(sysvar::clock::id(), false),
|
|
|
|
],
|
|
|
|
);
|
2019-06-21 23:45:03 -07:00
|
|
|
Instruction::new(id(), &StakeInstruction::Deactivate, account_metas)
|
|
|
|
}
|
|
|
|
|
2019-04-01 16:45:53 -07:00
|
|
|
pub fn process_instruction(
|
|
|
|
_program_id: &Pubkey,
|
|
|
|
keyed_accounts: &mut [KeyedAccount],
|
|
|
|
data: &[u8],
|
|
|
|
) -> Result<(), InstructionError> {
|
|
|
|
solana_logger::setup();
|
|
|
|
|
|
|
|
trace!("process_instruction: {:?}", data);
|
|
|
|
trace!("keyed_accounts: {:?}", keyed_accounts);
|
|
|
|
|
2019-06-03 09:04:51 -07:00
|
|
|
if keyed_accounts.is_empty() {
|
2019-10-02 18:33:01 -07:00
|
|
|
return Err(InstructionError::InvalidInstructionData);
|
2019-04-01 16:45:53 -07:00
|
|
|
}
|
|
|
|
|
2019-06-03 09:04:51 -07:00
|
|
|
let (me, rest) = &mut keyed_accounts.split_at_mut(1);
|
|
|
|
let me = &mut me[0];
|
2019-04-01 16:45:53 -07:00
|
|
|
|
|
|
|
// TODO: data-driven unpack and dispatch of KeyedAccounts
|
|
|
|
match deserialize(data).map_err(|_| InstructionError::InvalidInstructionData)? {
|
2019-09-26 13:29:29 -07:00
|
|
|
StakeInstruction::Initialize(authorized, lockup) => me.initialize(&authorized, &lockup),
|
|
|
|
StakeInstruction::Authorize(authorized_pubkey, stake_authorize) => {
|
|
|
|
me.authorize(&authorized_pubkey, stake_authorize, &rest)
|
|
|
|
}
|
2019-09-11 09:48:29 -07:00
|
|
|
StakeInstruction::DelegateStake => {
|
2019-09-12 19:03:28 -07:00
|
|
|
if rest.len() < 3 {
|
2019-10-02 18:33:01 -07:00
|
|
|
return Err(InstructionError::InvalidInstructionData);
|
2019-04-01 16:45:53 -07:00
|
|
|
}
|
|
|
|
let vote = &rest[0];
|
2019-06-17 19:34:21 -07:00
|
|
|
|
2019-08-15 14:35:48 -07:00
|
|
|
me.delegate_stake(
|
|
|
|
vote,
|
2019-09-09 16:38:52 -07:00
|
|
|
&sysvar::clock::from_keyed_account(&rest[1])?,
|
2019-08-15 14:35:48 -07:00
|
|
|
&config::from_keyed_account(&rest[2])?,
|
2019-09-12 19:03:28 -07:00
|
|
|
&rest[3..],
|
2019-08-15 14:35:48 -07:00
|
|
|
)
|
2019-04-01 16:45:53 -07:00
|
|
|
}
|
|
|
|
StakeInstruction::RedeemVoteCredits => {
|
2019-08-12 20:59:57 -07:00
|
|
|
if rest.len() != 4 {
|
2019-10-02 18:33:01 -07:00
|
|
|
return Err(InstructionError::InvalidInstructionData);
|
2019-04-01 16:45:53 -07:00
|
|
|
}
|
2019-06-21 20:43:24 -07:00
|
|
|
let (vote, rest) = rest.split_at_mut(1);
|
2019-04-07 21:45:28 -07:00
|
|
|
let vote = &mut vote[0];
|
2019-06-21 20:43:24 -07:00
|
|
|
let (rewards_pool, rest) = rest.split_at_mut(1);
|
|
|
|
let rewards_pool = &mut rewards_pool[0];
|
|
|
|
|
|
|
|
me.redeem_vote_credits(
|
|
|
|
vote,
|
|
|
|
rewards_pool,
|
2019-07-12 16:38:15 -07:00
|
|
|
&sysvar::rewards::from_keyed_account(&rest[0])?,
|
2019-08-12 20:59:57 -07:00
|
|
|
&sysvar::stake_history::from_keyed_account(&rest[1])?,
|
2019-06-21 20:43:24 -07:00
|
|
|
)
|
2019-04-01 16:45:53 -07:00
|
|
|
}
|
2019-06-21 22:28:34 -07:00
|
|
|
StakeInstruction::Withdraw(lamports) => {
|
2019-09-12 19:03:28 -07:00
|
|
|
if rest.len() < 3 {
|
2019-10-02 18:33:01 -07:00
|
|
|
return Err(InstructionError::InvalidInstructionData);
|
2019-06-21 22:28:34 -07:00
|
|
|
}
|
2019-09-12 19:03:28 -07:00
|
|
|
let (to, rest) = &mut rest.split_at_mut(1);
|
2019-06-21 22:28:34 -07:00
|
|
|
let mut to = &mut to[0];
|
|
|
|
|
|
|
|
me.withdraw(
|
|
|
|
lamports,
|
|
|
|
&mut to,
|
2019-09-12 19:03:28 -07:00
|
|
|
&sysvar::clock::from_keyed_account(&rest[0])?,
|
|
|
|
&sysvar::stake_history::from_keyed_account(&rest[1])?,
|
|
|
|
&rest[2..],
|
2019-06-21 22:28:34 -07:00
|
|
|
)
|
|
|
|
}
|
2019-06-21 23:45:03 -07:00
|
|
|
StakeInstruction::Deactivate => {
|
2019-09-12 19:03:28 -07:00
|
|
|
if rest.len() < 2 {
|
2019-10-02 18:33:01 -07:00
|
|
|
return Err(InstructionError::InvalidInstructionData);
|
2019-06-21 23:45:03 -07:00
|
|
|
}
|
2019-08-09 12:55:21 -07:00
|
|
|
let (vote, rest) = rest.split_at_mut(1);
|
|
|
|
let vote = &mut vote[0];
|
2019-06-21 23:45:03 -07:00
|
|
|
|
2019-09-12 19:03:28 -07:00
|
|
|
me.deactivate_stake(
|
|
|
|
vote,
|
|
|
|
&sysvar::clock::from_keyed_account(&rest[0])?,
|
|
|
|
&rest[1..],
|
|
|
|
)
|
2019-06-21 23:45:03 -07:00
|
|
|
}
|
2019-04-01 16:45:53 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
|
|
|
use bincode::serialize;
|
2019-08-12 20:59:57 -07:00
|
|
|
use solana_sdk::{account::Account, sysvar::stake_history::StakeHistory};
|
2019-04-01 16:45:53 -07:00
|
|
|
|
2019-05-07 17:08:49 -07:00
|
|
|
fn process_instruction(instruction: &Instruction) -> Result<(), InstructionError> {
|
2019-06-17 19:34:21 -07:00
|
|
|
let mut accounts: Vec<_> = instruction
|
|
|
|
.accounts
|
|
|
|
.iter()
|
|
|
|
.map(|meta| {
|
2019-07-12 16:38:15 -07:00
|
|
|
if sysvar::clock::check_id(&meta.pubkey) {
|
2019-09-09 16:38:52 -07:00
|
|
|
sysvar::clock::new_account(1, 0, 0, 0, 0)
|
2019-07-12 16:38:15 -07:00
|
|
|
} else if sysvar::rewards::check_id(&meta.pubkey) {
|
|
|
|
sysvar::rewards::create_account(1, 0.0, 0.0)
|
2019-08-12 20:59:57 -07:00
|
|
|
} else if sysvar::stake_history::check_id(&meta.pubkey) {
|
|
|
|
sysvar::stake_history::create_account(1, &StakeHistory::default())
|
2019-08-15 14:35:48 -07:00
|
|
|
} else if config::check_id(&meta.pubkey) {
|
|
|
|
config::create_account(1, &config::Config::default())
|
2019-06-17 19:34:21 -07:00
|
|
|
} else {
|
|
|
|
Account::default()
|
|
|
|
}
|
|
|
|
})
|
|
|
|
.collect();
|
|
|
|
|
2019-05-07 17:08:49 -07:00
|
|
|
{
|
|
|
|
let mut keyed_accounts: Vec<_> = instruction
|
|
|
|
.accounts
|
|
|
|
.iter()
|
|
|
|
.zip(accounts.iter_mut())
|
|
|
|
.map(|(meta, account)| KeyedAccount::new(&meta.pubkey, meta.is_signer, account))
|
|
|
|
.collect();
|
2019-05-31 15:29:21 -07:00
|
|
|
super::process_instruction(&Pubkey::default(), &mut keyed_accounts, &instruction.data)
|
2019-05-07 17:08:49 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_stake_process_instruction() {
|
|
|
|
assert_eq!(
|
2019-08-12 20:59:57 -07:00
|
|
|
process_instruction(&redeem_vote_credits(&Pubkey::default(), &Pubkey::default())),
|
2019-05-07 17:08:49 -07:00
|
|
|
Err(InstructionError::InvalidAccountData),
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2019-09-29 21:18:15 -07:00
|
|
|
process_instruction(&delegate_stake(
|
|
|
|
&Pubkey::default(),
|
|
|
|
&Pubkey::default(),
|
|
|
|
&Pubkey::default()
|
|
|
|
)),
|
2019-05-07 17:08:49 -07:00
|
|
|
Err(InstructionError::InvalidAccountData),
|
|
|
|
);
|
2019-06-21 22:28:34 -07:00
|
|
|
assert_eq!(
|
2019-09-29 21:18:15 -07:00
|
|
|
process_instruction(&withdraw(
|
|
|
|
&Pubkey::default(),
|
|
|
|
&Pubkey::default(),
|
|
|
|
&Pubkey::default(),
|
|
|
|
100
|
|
|
|
)),
|
2019-06-21 22:28:34 -07:00
|
|
|
Err(InstructionError::InvalidAccountData),
|
|
|
|
);
|
2019-06-21 23:45:03 -07:00
|
|
|
assert_eq!(
|
2019-09-29 21:18:15 -07:00
|
|
|
process_instruction(&deactivate_stake(
|
|
|
|
&Pubkey::default(),
|
|
|
|
&Pubkey::default(),
|
|
|
|
&Pubkey::default()
|
|
|
|
)),
|
2019-06-21 23:45:03 -07:00
|
|
|
Err(InstructionError::InvalidAccountData),
|
|
|
|
);
|
2019-05-07 17:08:49 -07:00
|
|
|
}
|
|
|
|
|
2019-04-01 16:45:53 -07:00
|
|
|
#[test]
|
|
|
|
fn test_stake_process_instruction_decode_bail() {
|
|
|
|
// these will not call stake_state, have bogus contents
|
|
|
|
|
2019-09-11 09:48:29 -07:00
|
|
|
// gets the "is_empty()" check
|
|
|
|
assert_eq!(
|
|
|
|
super::process_instruction(
|
|
|
|
&Pubkey::default(),
|
|
|
|
&mut [],
|
2019-09-26 13:29:29 -07:00
|
|
|
&serialize(&StakeInstruction::Initialize(
|
|
|
|
Authorized::default(),
|
|
|
|
Lockup::default()
|
|
|
|
))
|
|
|
|
.unwrap(),
|
2019-09-11 09:48:29 -07:00
|
|
|
),
|
|
|
|
Err(InstructionError::InvalidInstructionData),
|
|
|
|
);
|
|
|
|
|
|
|
|
// gets the first check in delegate, wrong number of accounts
|
2019-04-01 16:45:53 -07:00
|
|
|
assert_eq!(
|
2019-05-07 17:08:49 -07:00
|
|
|
super::process_instruction(
|
2019-04-01 16:45:53 -07:00
|
|
|
&Pubkey::default(),
|
|
|
|
&mut [KeyedAccount::new(
|
|
|
|
&Pubkey::default(),
|
|
|
|
false,
|
|
|
|
&mut Account::default(),
|
|
|
|
)],
|
2019-09-11 09:48:29 -07:00
|
|
|
&serialize(&StakeInstruction::DelegateStake).unwrap(),
|
2019-04-01 16:45:53 -07:00
|
|
|
),
|
|
|
|
Err(InstructionError::InvalidInstructionData),
|
|
|
|
);
|
|
|
|
|
2019-05-07 17:08:49 -07:00
|
|
|
// gets the sub-check for number of args
|
2019-04-01 16:45:53 -07:00
|
|
|
assert_eq!(
|
2019-05-07 17:08:49 -07:00
|
|
|
super::process_instruction(
|
2019-04-01 16:45:53 -07:00
|
|
|
&Pubkey::default(),
|
2019-06-03 09:04:51 -07:00
|
|
|
&mut [KeyedAccount::new(
|
|
|
|
&Pubkey::default(),
|
|
|
|
false,
|
|
|
|
&mut Account::default()
|
|
|
|
),],
|
2019-09-11 09:48:29 -07:00
|
|
|
&serialize(&StakeInstruction::DelegateStake).unwrap(),
|
2019-04-01 16:45:53 -07:00
|
|
|
),
|
|
|
|
Err(InstructionError::InvalidInstructionData),
|
|
|
|
);
|
|
|
|
|
2019-09-11 09:48:29 -07:00
|
|
|
// catches the number of args check
|
2019-04-01 16:45:53 -07:00
|
|
|
assert_eq!(
|
2019-05-07 17:08:49 -07:00
|
|
|
super::process_instruction(
|
2019-04-01 16:45:53 -07:00
|
|
|
&Pubkey::default(),
|
|
|
|
&mut [
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
|
|
|
],
|
|
|
|
&serialize(&StakeInstruction::RedeemVoteCredits).unwrap(),
|
|
|
|
),
|
|
|
|
Err(InstructionError::InvalidInstructionData),
|
|
|
|
);
|
2019-05-07 17:08:49 -07:00
|
|
|
|
2019-09-11 09:48:29 -07:00
|
|
|
// catches the type of args check
|
|
|
|
assert_eq!(
|
|
|
|
super::process_instruction(
|
|
|
|
&Pubkey::default(),
|
|
|
|
&mut [
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
|
|
|
],
|
|
|
|
&serialize(&StakeInstruction::RedeemVoteCredits).unwrap(),
|
|
|
|
),
|
|
|
|
Err(InstructionError::InvalidArgument),
|
|
|
|
);
|
|
|
|
|
2019-06-17 19:34:21 -07:00
|
|
|
// gets the check non-deserialize-able account in delegate_stake
|
2019-05-07 17:08:49 -07:00
|
|
|
assert_eq!(
|
|
|
|
super::process_instruction(
|
|
|
|
&Pubkey::default(),
|
|
|
|
&mut [
|
|
|
|
KeyedAccount::new(&Pubkey::default(), true, &mut Account::default()),
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
2019-06-17 19:34:21 -07:00
|
|
|
KeyedAccount::new(
|
2019-07-12 16:38:15 -07:00
|
|
|
&sysvar::clock::id(),
|
2019-06-17 19:34:21 -07:00
|
|
|
false,
|
2019-09-09 16:38:52 -07:00
|
|
|
&mut sysvar::clock::new_account(1, 0, 0, 0, 0)
|
2019-06-17 19:34:21 -07:00
|
|
|
),
|
2019-08-15 14:35:48 -07:00
|
|
|
KeyedAccount::new(
|
|
|
|
&config::id(),
|
|
|
|
false,
|
|
|
|
&mut config::create_account(1, &config::Config::default())
|
|
|
|
),
|
2019-05-07 17:08:49 -07:00
|
|
|
],
|
2019-09-11 09:48:29 -07:00
|
|
|
&serialize(&StakeInstruction::DelegateStake).unwrap(),
|
2019-05-07 17:08:49 -07:00
|
|
|
),
|
|
|
|
Err(InstructionError::InvalidAccountData),
|
|
|
|
);
|
|
|
|
|
2019-06-21 20:43:24 -07:00
|
|
|
// gets the deserialization checks in redeem_vote_credits
|
2019-05-07 17:08:49 -07:00
|
|
|
assert_eq!(
|
|
|
|
super::process_instruction(
|
|
|
|
&Pubkey::default(),
|
|
|
|
&mut [
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
2019-06-21 20:43:24 -07:00
|
|
|
KeyedAccount::new(
|
2019-07-12 16:38:15 -07:00
|
|
|
&sysvar::rewards::id(),
|
2019-06-21 20:43:24 -07:00
|
|
|
false,
|
2019-07-12 16:38:15 -07:00
|
|
|
&mut sysvar::rewards::create_account(1, 0.0, 0.0)
|
2019-06-21 20:43:24 -07:00
|
|
|
),
|
2019-08-12 20:59:57 -07:00
|
|
|
KeyedAccount::new(
|
|
|
|
&sysvar::stake_history::id(),
|
|
|
|
false,
|
|
|
|
&mut sysvar::stake_history::create_account(1, &StakeHistory::default())
|
|
|
|
),
|
2019-05-07 17:08:49 -07:00
|
|
|
],
|
|
|
|
&serialize(&StakeInstruction::RedeemVoteCredits).unwrap(),
|
|
|
|
),
|
|
|
|
Err(InstructionError::InvalidAccountData),
|
|
|
|
);
|
2019-06-21 22:28:34 -07:00
|
|
|
|
2019-07-12 16:38:15 -07:00
|
|
|
// Tests 3rd keyed account is of correct type (Clock instead of rewards) in withdraw
|
2019-06-21 22:28:34 -07:00
|
|
|
assert_eq!(
|
|
|
|
super::process_instruction(
|
|
|
|
&Pubkey::default(),
|
|
|
|
&mut [
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
|
|
|
KeyedAccount::new(
|
2019-07-12 16:38:15 -07:00
|
|
|
&sysvar::rewards::id(),
|
2019-06-21 22:28:34 -07:00
|
|
|
false,
|
2019-07-12 16:38:15 -07:00
|
|
|
&mut sysvar::rewards::create_account(1, 0.0, 0.0)
|
2019-06-21 22:28:34 -07:00
|
|
|
),
|
2019-08-12 20:59:57 -07:00
|
|
|
KeyedAccount::new(
|
|
|
|
&sysvar::stake_history::id(),
|
|
|
|
false,
|
|
|
|
&mut sysvar::stake_history::create_account(1, &StakeHistory::default())
|
|
|
|
),
|
2019-06-21 22:28:34 -07:00
|
|
|
],
|
|
|
|
&serialize(&StakeInstruction::Withdraw(42)).unwrap(),
|
|
|
|
),
|
|
|
|
Err(InstructionError::InvalidArgument),
|
|
|
|
);
|
|
|
|
|
|
|
|
// Tests correct number of accounts are provided in withdraw
|
|
|
|
assert_eq!(
|
|
|
|
super::process_instruction(
|
|
|
|
&Pubkey::default(),
|
|
|
|
&mut [
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
|
|
|
KeyedAccount::new(
|
2019-07-12 16:38:15 -07:00
|
|
|
&sysvar::clock::id(),
|
2019-06-21 22:28:34 -07:00
|
|
|
false,
|
2019-07-12 16:38:15 -07:00
|
|
|
&mut sysvar::rewards::create_account(1, 0.0, 0.0)
|
2019-06-21 22:28:34 -07:00
|
|
|
),
|
2019-08-12 20:59:57 -07:00
|
|
|
KeyedAccount::new(
|
|
|
|
&sysvar::stake_history::id(),
|
|
|
|
false,
|
|
|
|
&mut sysvar::stake_history::create_account(1, &StakeHistory::default())
|
|
|
|
),
|
2019-06-21 22:28:34 -07:00
|
|
|
],
|
|
|
|
&serialize(&StakeInstruction::Withdraw(42)).unwrap(),
|
|
|
|
),
|
|
|
|
Err(InstructionError::InvalidInstructionData),
|
|
|
|
);
|
2019-06-21 23:45:03 -07:00
|
|
|
|
2019-07-12 16:38:15 -07:00
|
|
|
// Tests 2nd keyed account is of correct type (Clock instead of rewards) in deactivate
|
2019-06-21 23:45:03 -07:00
|
|
|
assert_eq!(
|
|
|
|
super::process_instruction(
|
|
|
|
&Pubkey::default(),
|
|
|
|
&mut [
|
2019-08-09 12:55:21 -07:00
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
2019-06-21 23:45:03 -07:00
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
|
|
|
KeyedAccount::new(
|
2019-07-12 16:38:15 -07:00
|
|
|
&sysvar::rewards::id(),
|
2019-06-21 23:45:03 -07:00
|
|
|
false,
|
2019-07-12 16:38:15 -07:00
|
|
|
&mut sysvar::rewards::create_account(1, 0.0, 0.0)
|
2019-06-21 23:45:03 -07:00
|
|
|
),
|
|
|
|
],
|
|
|
|
&serialize(&StakeInstruction::Deactivate).unwrap(),
|
|
|
|
),
|
|
|
|
Err(InstructionError::InvalidArgument),
|
|
|
|
);
|
|
|
|
|
|
|
|
// Tests correct number of accounts are provided in deactivate
|
|
|
|
assert_eq!(
|
|
|
|
super::process_instruction(
|
|
|
|
&Pubkey::default(),
|
|
|
|
&mut [
|
|
|
|
KeyedAccount::new(&Pubkey::default(), false, &mut Account::default()),
|
|
|
|
KeyedAccount::new(
|
2019-07-12 16:38:15 -07:00
|
|
|
&sysvar::clock::id(),
|
2019-06-21 23:45:03 -07:00
|
|
|
false,
|
2019-07-12 16:38:15 -07:00
|
|
|
&mut sysvar::rewards::create_account(1, 0.0, 0.0)
|
2019-06-21 23:45:03 -07:00
|
|
|
),
|
|
|
|
],
|
|
|
|
&serialize(&StakeInstruction::Deactivate).unwrap(),
|
|
|
|
),
|
|
|
|
Err(InstructionError::InvalidInstructionData),
|
|
|
|
);
|
2019-04-01 16:45:53 -07:00
|
|
|
}
|
|
|
|
|
2019-09-09 18:17:32 -07:00
|
|
|
#[test]
|
|
|
|
fn test_custom_error_decode() {
|
|
|
|
use num_traits::FromPrimitive;
|
|
|
|
fn pretty_err<T>(err: InstructionError) -> String
|
|
|
|
where
|
|
|
|
T: 'static + std::error::Error + DecodeError<T> + FromPrimitive,
|
|
|
|
{
|
|
|
|
if let InstructionError::CustomError(code) = err {
|
|
|
|
let specific_error: T = T::decode_custom_error_to_enum(code).unwrap();
|
|
|
|
format!(
|
|
|
|
"{:?}: {}::{:?} - {}",
|
|
|
|
err,
|
|
|
|
T::type_of(),
|
|
|
|
specific_error,
|
|
|
|
specific_error,
|
|
|
|
)
|
|
|
|
} else {
|
|
|
|
"".to_string()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
assert_eq!(
|
|
|
|
"CustomError(0): StakeError::NoCreditsToRedeem - not enough credits to redeem",
|
|
|
|
pretty_err::<StakeError>(StakeError::NoCreditsToRedeem.into())
|
|
|
|
)
|
|
|
|
}
|
2019-04-01 16:45:53 -07:00
|
|
|
}
|