//! The `rpc` module implements the Solana RPC interface. use crate::{ cluster_info::ClusterInfo, contact_info::ContactInfo, non_circulating_supply::calculate_non_circulating_supply, optimistically_confirmed_bank_tracker::OptimisticallyConfirmedBank, rpc_health::*, send_transaction_service::{SendTransactionService, TransactionInfo}, validator::ValidatorExit, }; use bincode::{config::Options, serialize}; use jsonrpc_core::{types::error, Error, Metadata, Result}; use jsonrpc_derive::rpc; use solana_account_decoder::{ parse_account_data::AccountAdditionalData, parse_token::{ get_token_account_mint, spl_token_id_v2_0, spl_token_v2_0_native_mint, token_amount_to_ui_amount, UiTokenAmount, }, UiAccount, UiAccountData, UiAccountEncoding, UiDataSliceConfig, }; use solana_client::{ rpc_config::*, rpc_custom_error::RpcCustomError, rpc_filter::{Memcmp, MemcmpEncodedBytes, RpcFilterType}, rpc_request::{ TokenAccountsFilter, DELINQUENT_VALIDATOR_SLOT_DISTANCE, MAX_GET_CONFIRMED_BLOCKS_RANGE, MAX_GET_CONFIRMED_SIGNATURES_FOR_ADDRESS2_LIMIT, MAX_GET_CONFIRMED_SIGNATURES_FOR_ADDRESS_SLOT_RANGE, MAX_GET_SIGNATURE_STATUSES_QUERY_ITEMS, MAX_MULTIPLE_ACCOUNTS, NUM_LARGEST_ACCOUNTS, }, rpc_response::Response as RpcResponse, rpc_response::*, }; use solana_faucet::faucet::request_airdrop_transaction; use solana_ledger::{blockstore::Blockstore, blockstore_db::BlockstoreError, get_tmp_ledger_path}; use solana_metrics::inc_new_counter_info; use solana_perf::packet::PACKET_DATA_SIZE; use solana_runtime::{ accounts::AccountAddressFilter, bank::Bank, bank_forks::BankForks, commitment::{BlockCommitmentArray, BlockCommitmentCache, CommitmentSlots}, }; use solana_sdk::{ account::Account, account_utils::StateMut, clock::{Slot, UnixTimestamp}, commitment_config::{CommitmentConfig, CommitmentLevel}, epoch_info::EpochInfo, epoch_schedule::EpochSchedule, hash::Hash, pubkey::Pubkey, signature::Signature, stake_history::StakeHistory, system_instruction, sysvar::stake_history, transaction::{self, Transaction}, }; use solana_stake_program::stake_state::StakeState; use solana_transaction_status::{ EncodedConfirmedBlock, EncodedConfirmedTransaction, TransactionStatus, UiTransactionEncoding, }; use solana_vote_program::vote_state::{VoteState, MAX_LOCKOUT_HISTORY}; use spl_token_v2_0::{ solana_program::program_pack::Pack, state::{Account as TokenAccount, Mint}, }; use std::{ cmp::{max, min}, collections::{HashMap, HashSet}, net::SocketAddr, str::FromStr, sync::{ atomic::{AtomicBool, Ordering}, mpsc::{channel, Receiver, Sender}, Arc, Mutex, RwLock, }, }; use tokio::runtime; pub const MAX_REQUEST_PAYLOAD_SIZE: usize = 50 * (1 << 10); // 50kB pub const PERFORMANCE_SAMPLES_LIMIT: usize = 720; fn new_response(bank: &Bank, value: T) -> RpcResponse { let context = RpcResponseContext { slot: bank.slot() }; Response { context, value } } pub fn is_confirmed_rooted( block_commitment_cache: &BlockCommitmentCache, bank: &Bank, blockstore: &Blockstore, slot: Slot, ) -> bool { slot <= block_commitment_cache.highest_confirmed_root() && (blockstore.is_root(slot) || bank.status_cache_ancestors().contains(&slot)) } #[derive(Debug, Default, Clone)] pub struct JsonRpcConfig { pub enable_validator_exit: bool, pub enable_set_log_filter: bool, pub enable_rpc_transaction_history: bool, pub identity_pubkey: Pubkey, pub faucet_addr: Option, pub health_check_slot_distance: u64, pub enable_bigtable_ledger_storage: bool, pub enable_bigtable_ledger_upload: bool, pub max_multiple_accounts: Option, } #[derive(Clone)] pub struct JsonRpcRequestProcessor { bank_forks: Arc>, block_commitment_cache: Arc>, blockstore: Arc, config: JsonRpcConfig, validator_exit: Arc>>, health: Arc, cluster_info: Arc, genesis_hash: Hash, transaction_sender: Arc>>, runtime_handle: runtime::Handle, bigtable_ledger_storage: Option, optimistically_confirmed_bank: Arc>, } impl Metadata for JsonRpcRequestProcessor {} impl JsonRpcRequestProcessor { fn bank(&self, commitment: Option) -> Arc { debug!("RPC commitment_config: {:?}", commitment); let r_bank_forks = self.bank_forks.read().unwrap(); let commitment_level = match commitment { None => CommitmentLevel::Max, Some(config) => config.commitment, }; if commitment_level == CommitmentLevel::SingleGossip { let bank = self .optimistically_confirmed_bank .read() .unwrap() .bank .clone(); debug!("RPC using optimistically confirmed slot: {:?}", bank.slot()); return bank; } let slot = self .block_commitment_cache .read() .unwrap() .slot_with_commitment(commitment_level); match commitment_level { CommitmentLevel::Recent => { debug!("RPC using the heaviest slot: {:?}", slot); } CommitmentLevel::Root => { debug!("RPC using node root: {:?}", slot); } CommitmentLevel::Single => { debug!("RPC using confirmed slot: {:?}", slot); } CommitmentLevel::Max => { debug!("RPC using block: {:?}", slot); } CommitmentLevel::SingleGossip => unreachable!(), }; r_bank_forks.get(slot).cloned().unwrap_or_else(|| { // We log a warning instead of returning an error, because all known error cases // are due to known bugs that should be fixed instead. // // The slot may not be found as a result of a known bug in snapshot creation, where // the bank at the given slot was not included in the snapshot. // Also, it may occur after an old bank has been purged from BankForks and a new // BlockCommitmentCache has not yet arrived. To make this case impossible, // BlockCommitmentCache should hold an `Arc` everywhere it currently holds // a slot. // // For more information, see https://github.com/solana-labs/solana/issues/11078 warn!( "Bank with {:?} not found at slot: {:?}", commitment_level, slot ); r_bank_forks.root_bank().clone() }) } #[allow(clippy::too_many_arguments)] pub fn new( config: JsonRpcConfig, bank_forks: Arc>, block_commitment_cache: Arc>, blockstore: Arc, validator_exit: Arc>>, health: Arc, cluster_info: Arc, genesis_hash: Hash, runtime: &runtime::Runtime, bigtable_ledger_storage: Option, optimistically_confirmed_bank: Arc>, ) -> (Self, Receiver) { let (sender, receiver) = channel(); ( Self { config, bank_forks, block_commitment_cache, blockstore, validator_exit, health, cluster_info, genesis_hash, transaction_sender: Arc::new(Mutex::new(sender)), runtime_handle: runtime.handle().clone(), bigtable_ledger_storage, optimistically_confirmed_bank, }, receiver, ) } // Useful for unit testing pub fn new_from_bank(bank: &Arc) -> Self { let genesis_hash = bank.hash(); let bank_forks = Arc::new(RwLock::new(BankForks::new_from_banks( &[bank.clone()], bank.slot(), ))); let blockstore = Arc::new(Blockstore::open(&get_tmp_ledger_path!()).unwrap()); let exit = Arc::new(AtomicBool::new(false)); let cluster_info = Arc::new(ClusterInfo::default()); let tpu_address = cluster_info.my_contact_info().tpu; let (sender, receiver) = channel(); SendTransactionService::new(tpu_address, &bank_forks, None, receiver); Self { config: JsonRpcConfig::default(), bank_forks, block_commitment_cache: Arc::new(RwLock::new(BlockCommitmentCache::new( HashMap::new(), 0, CommitmentSlots::new_from_slot(bank.slot()), ))), blockstore, validator_exit: create_validator_exit(&exit), health: Arc::new(RpcHealth::new(cluster_info.clone(), None, 0, exit.clone())), cluster_info, genesis_hash, transaction_sender: Arc::new(Mutex::new(sender)), runtime_handle: runtime::Runtime::new().unwrap().handle().clone(), bigtable_ledger_storage: None, optimistically_confirmed_bank: Arc::new(RwLock::new(OptimisticallyConfirmedBank { bank: bank.clone(), })), } } pub fn get_account_info( &self, pubkey: &Pubkey, config: Option, ) -> Result>> { let config = config.unwrap_or_default(); let bank = self.bank(config.commitment); let encoding = config.encoding.unwrap_or(UiAccountEncoding::Binary); check_slice_and_encoding(&encoding, config.data_slice.is_some())?; let response = get_encoded_account(&bank, pubkey, encoding, config.data_slice)?; Ok(new_response(&bank, response)) } pub fn get_multiple_accounts( &self, pubkeys: Vec, config: Option, ) -> Result>>> { let mut accounts: Vec> = vec![]; let config = config.unwrap_or_default(); let bank = self.bank(config.commitment); let encoding = config.encoding.unwrap_or(UiAccountEncoding::Base64); check_slice_and_encoding(&encoding, config.data_slice.is_some())?; for pubkey in pubkeys { let response_account = get_encoded_account(&bank, &pubkey, encoding.clone(), config.data_slice)?; accounts.push(response_account) } Ok(new_response(&bank, accounts)) } pub fn get_minimum_balance_for_rent_exemption( &self, data_len: usize, commitment: Option, ) -> u64 { self.bank(commitment) .get_minimum_balance_for_rent_exemption(data_len) } pub fn get_program_accounts( &self, program_id: &Pubkey, config: Option, filters: Vec, ) -> Result> { let config = config.unwrap_or_default(); let bank = self.bank(config.commitment); let encoding = config.encoding.unwrap_or(UiAccountEncoding::Binary); let data_slice_config = config.data_slice; check_slice_and_encoding(&encoding, data_slice_config.is_some())?; let keyed_accounts = get_filtered_program_accounts(&bank, program_id, filters); let result = if program_id == &spl_token_id_v2_0() && encoding == UiAccountEncoding::JsonParsed { get_parsed_token_accounts(bank, keyed_accounts).collect() } else { keyed_accounts .map(|(pubkey, account)| RpcKeyedAccount { pubkey: pubkey.to_string(), account: UiAccount::encode( &pubkey, account, encoding.clone(), None, data_slice_config, ), }) .collect() }; Ok(result) } pub fn get_inflation_governor( &self, commitment: Option, ) -> RpcInflationGovernor { self.bank(commitment).inflation().into() } pub fn get_inflation_rate(&self) -> RpcInflationRate { let bank = self.bank(None); let epoch = bank.epoch(); let inflation = bank.inflation(); let slot_in_year = bank.slot_in_year_for_inflation(); RpcInflationRate { total: inflation.total(slot_in_year), validator: inflation.validator(slot_in_year), foundation: inflation.foundation(slot_in_year), epoch, } } pub fn get_epoch_schedule(&self) -> EpochSchedule { // Since epoch schedule data comes from the genesis config, any commitment level should be // fine let bank = self.bank(Some(CommitmentConfig::root())); *bank.epoch_schedule() } pub fn get_balance( &self, pubkey: &Pubkey, commitment: Option, ) -> RpcResponse { let bank = self.bank(commitment); new_response(&bank, bank.get_balance(pubkey)) } fn get_recent_blockhash( &self, commitment: Option, ) -> RpcResponse { let bank = self.bank(commitment); let (blockhash, fee_calculator) = bank.confirmed_last_blockhash(); new_response( &bank, RpcBlockhashFeeCalculator { blockhash: blockhash.to_string(), fee_calculator, }, ) } fn get_fees(&self, commitment: Option) -> RpcResponse { let bank = self.bank(commitment); let (blockhash, fee_calculator) = bank.confirmed_last_blockhash(); let last_valid_slot = bank .get_blockhash_last_valid_slot(&blockhash) .expect("bank blockhash queue should contain blockhash"); new_response( &bank, RpcFees { blockhash: blockhash.to_string(), fee_calculator, last_valid_slot, }, ) } fn get_fee_calculator_for_blockhash( &self, blockhash: &Hash, commitment: Option, ) -> RpcResponse> { let bank = self.bank(commitment); let fee_calculator = bank.get_fee_calculator(blockhash); new_response( &bank, fee_calculator.map(|fee_calculator| RpcFeeCalculator { fee_calculator }), ) } fn get_fee_rate_governor(&self) -> RpcResponse { let bank = self.bank(None); let fee_rate_governor = bank.get_fee_rate_governor(); new_response( &bank, RpcFeeRateGovernor { fee_rate_governor: fee_rate_governor.clone(), }, ) } pub fn confirm_transaction( &self, signature: &Signature, commitment: Option, ) -> RpcResponse { let bank = self.bank(commitment); let status = bank.get_signature_status(signature); match status { Some(status) => new_response(&bank, status.is_ok()), None => new_response(&bank, false), } } fn get_block_commitment(&self, block: Slot) -> RpcBlockCommitment { let r_block_commitment = self.block_commitment_cache.read().unwrap(); RpcBlockCommitment { commitment: r_block_commitment .get_block_commitment(block) .map(|block_commitment| block_commitment.commitment), total_stake: r_block_commitment.total_stake(), } } fn get_slot(&self, commitment: Option) -> u64 { self.bank(commitment).slot() } fn get_slot_leader(&self, commitment: Option) -> String { self.bank(commitment).collector_id().to_string() } fn minimum_ledger_slot(&self) -> Result { match self.blockstore.slot_meta_iterator(0) { Ok(mut metas) => match metas.next() { Some((slot, _meta)) => Ok(slot), None => Err(Error::invalid_request()), }, Err(err) => { warn!("slot_meta_iterator failed: {:?}", err); Err(Error::invalid_request()) } } } fn get_transaction_count(&self, commitment: Option) -> u64 { self.bank(commitment).transaction_count() as u64 } fn get_total_supply(&self, commitment: Option) -> u64 { self.bank(commitment).capitalization() } fn get_largest_accounts( &self, config: Option, ) -> RpcResponse> { let config = config.unwrap_or_default(); let bank = self.bank(config.commitment); let (addresses, address_filter) = if let Some(filter) = config.filter { let non_circulating_supply = calculate_non_circulating_supply(&bank); let addresses = non_circulating_supply.accounts.into_iter().collect(); let address_filter = match filter { RpcLargestAccountsFilter::Circulating => AccountAddressFilter::Exclude, RpcLargestAccountsFilter::NonCirculating => AccountAddressFilter::Include, }; (addresses, address_filter) } else { (HashSet::new(), AccountAddressFilter::Exclude) }; new_response( &bank, bank.get_largest_accounts(NUM_LARGEST_ACCOUNTS, &addresses, address_filter) .into_iter() .map(|(address, lamports)| RpcAccountBalance { address: address.to_string(), lamports, }) .collect(), ) } fn get_supply(&self, commitment: Option) -> RpcResponse { let bank = self.bank(commitment); let non_circulating_supply = calculate_non_circulating_supply(&bank); let total_supply = bank.capitalization(); new_response( &bank, RpcSupply { total: total_supply, circulating: total_supply - non_circulating_supply.lamports, non_circulating: non_circulating_supply.lamports, non_circulating_accounts: non_circulating_supply .accounts .iter() .map(|pubkey| pubkey.to_string()) .collect(), }, ) } fn get_vote_accounts( &self, commitment: Option, ) -> Result { let bank = self.bank(commitment); let vote_accounts = bank.vote_accounts(); let epoch_vote_accounts = bank .epoch_vote_accounts(bank.get_epoch_and_slot_index(bank.slot()).0) .ok_or_else(Error::invalid_request)?; let default_vote_state = VoteState::default(); let (current_vote_accounts, delinquent_vote_accounts): ( Vec, Vec, ) = vote_accounts .iter() .map(|(pubkey, (activated_stake, account))| { let vote_state = account.vote_state(); let vote_state = vote_state.as_ref().unwrap_or(&default_vote_state); let last_vote = if let Some(vote) = vote_state.votes.iter().last() { vote.slot } else { 0 }; RpcVoteAccountInfo { vote_pubkey: (pubkey).to_string(), node_pubkey: vote_state.node_pubkey.to_string(), activated_stake: *activated_stake, commission: vote_state.commission, root_slot: vote_state.root_slot.unwrap_or(0), epoch_credits: vote_state.epoch_credits().clone(), epoch_vote_account: epoch_vote_accounts.contains_key(pubkey), last_vote, } }) .partition(|vote_account_info| { if bank.slot() >= DELINQUENT_VALIDATOR_SLOT_DISTANCE as u64 { vote_account_info.last_vote > bank.slot() - DELINQUENT_VALIDATOR_SLOT_DISTANCE as u64 } else { vote_account_info.last_vote > 0 } }); let delinquent_staked_vote_accounts = delinquent_vote_accounts .into_iter() .filter(|vote_account_info| vote_account_info.activated_stake > 0) .collect::>(); Ok(RpcVoteAccountStatus { current: current_vote_accounts, delinquent: delinquent_staked_vote_accounts, }) } pub fn set_log_filter(&self, filter: String) { if self.config.enable_set_log_filter { solana_logger::setup_with(&filter); } } pub fn validator_exit(&self) -> bool { if self.config.enable_validator_exit { warn!("validator_exit request..."); if let Some(x) = self.validator_exit.write().unwrap().take() { x.exit() } true } else { debug!("validator_exit ignored"); false } } fn check_blockstore_max_root( &self, result: &std::result::Result, slot: Slot, ) -> Result<()> where T: std::fmt::Debug, { if result.is_err() { let err = result.as_ref().unwrap_err(); debug!( "check_blockstore_max_root, slot: {:?}, max root: {:?}, err: {:?}", slot, self.blockstore.max_root(), err ); if slot >= self.blockstore.max_root() { return Err(RpcCustomError::BlockNotAvailable { slot }.into()); } } Ok(()) } fn check_slot_cleaned_up( &self, result: &std::result::Result, slot: Slot, ) -> Result<()> where T: std::fmt::Debug, { if result.is_err() { if let BlockstoreError::SlotCleanedUp = result.as_ref().unwrap_err() { return Err(RpcCustomError::BlockCleanedUp { slot, first_available_block: self .blockstore .get_first_available_block() .unwrap_or_default(), } .into()); } } Ok(()) } pub fn get_confirmed_block( &self, slot: Slot, encoding: Option, ) -> Result> { let encoding = encoding.unwrap_or(UiTransactionEncoding::Json); if self.config.enable_rpc_transaction_history && slot <= self .block_commitment_cache .read() .unwrap() .highest_confirmed_root() { let result = self.blockstore.get_confirmed_block(slot); self.check_blockstore_max_root(&result, slot)?; if result.is_err() { if let Some(bigtable_ledger_storage) = &self.bigtable_ledger_storage { return Ok(self .runtime_handle .block_on(bigtable_ledger_storage.get_confirmed_block(slot)) .ok() .map(|confirmed_block| confirmed_block.encode(encoding))); } } self.check_slot_cleaned_up(&result, slot)?; Ok(result .ok() .map(|confirmed_block| confirmed_block.encode(encoding))) } else { Err(RpcCustomError::BlockNotAvailable { slot }.into()) } } pub fn get_confirmed_blocks( &self, start_slot: Slot, end_slot: Option, ) -> Result> { let end_slot = min( end_slot.unwrap_or(std::u64::MAX), self.block_commitment_cache .read() .unwrap() .highest_confirmed_root(), ); if end_slot < start_slot { return Ok(vec![]); } if end_slot - start_slot > MAX_GET_CONFIRMED_BLOCKS_RANGE { return Err(Error::invalid_params(format!( "Slot range too large; max {}", MAX_GET_CONFIRMED_BLOCKS_RANGE ))); } let lowest_blockstore_slot = self.blockstore.lowest_slot(); if start_slot < lowest_blockstore_slot { // If the starting slot is lower than what's available in blockstore assume the entire // [start_slot..end_slot] can be fetched from BigTable. if let Some(bigtable_ledger_storage) = &self.bigtable_ledger_storage { return Ok(self .runtime_handle .block_on( bigtable_ledger_storage .get_confirmed_blocks(start_slot, (end_slot - start_slot) as usize), ) .unwrap_or_else(|_| vec![])); } } Ok(self .blockstore .rooted_slot_iterator(max(start_slot, lowest_blockstore_slot)) .map_err(|_| Error::internal_error())? .filter(|&slot| slot <= end_slot) .collect()) } pub fn get_confirmed_blocks_with_limit( &self, start_slot: Slot, limit: usize, ) -> Result> { if limit > MAX_GET_CONFIRMED_BLOCKS_RANGE as usize { return Err(Error::invalid_params(format!( "Limit too large; max {}", MAX_GET_CONFIRMED_BLOCKS_RANGE ))); } let lowest_blockstore_slot = self.blockstore.lowest_slot(); if start_slot < lowest_blockstore_slot { // If the starting slot is lower than what's available in blockstore assume the entire // range can be fetched from BigTable. if let Some(bigtable_ledger_storage) = &self.bigtable_ledger_storage { return Ok(self .runtime_handle .block_on(bigtable_ledger_storage.get_confirmed_blocks(start_slot, limit)) .unwrap_or_else(|_| vec![])); } } Ok(self .blockstore .rooted_slot_iterator(max(start_slot, lowest_blockstore_slot)) .map_err(|_| Error::internal_error())? .take(limit) .collect()) } pub fn get_block_time(&self, slot: Slot) -> Result> { if slot <= self .block_commitment_cache .read() .unwrap() .highest_confirmed_root() { let result = self.blockstore.get_block_time(slot); self.check_blockstore_max_root(&result, slot)?; if result.is_err() { if let Some(bigtable_ledger_storage) = &self.bigtable_ledger_storage { return Ok(self .runtime_handle .block_on(bigtable_ledger_storage.get_confirmed_block(slot)) .ok() .and_then(|confirmed_block| confirmed_block.block_time)); } } self.check_slot_cleaned_up(&result, slot)?; Ok(result.ok().unwrap_or(None)) } else { Err(RpcCustomError::BlockNotAvailable { slot }.into()) } } pub fn get_signature_confirmation_status( &self, signature: Signature, commitment: Option, ) -> Option { let bank = self.bank(commitment); let transaction_status = self.get_transaction_status(signature, &bank)?; let confirmations = transaction_status .confirmations .unwrap_or(MAX_LOCKOUT_HISTORY + 1); Some(RpcSignatureConfirmation { confirmations, status: transaction_status.status, }) } pub fn get_signature_status( &self, signature: Signature, commitment: Option, ) -> Option> { let bank = self.bank(commitment); let (_, status) = bank.get_signature_status_slot(&signature)?; Some(status) } pub fn get_signature_statuses( &self, signatures: Vec, config: Option, ) -> Result>>> { let mut statuses: Vec> = vec![]; let search_transaction_history = config .map(|x| x.search_transaction_history) .unwrap_or(false); let bank = self.bank(Some(CommitmentConfig::recent())); for signature in signatures { let status = if let Some(status) = self.get_transaction_status(signature, &bank) { Some(status) } else if self.config.enable_rpc_transaction_history && search_transaction_history { self.blockstore .get_transaction_status(signature) .map_err(|_| Error::internal_error())? .filter(|(slot, _status_meta)| { slot <= &self .block_commitment_cache .read() .unwrap() .highest_confirmed_root() }) .map(|(slot, status_meta)| { let err = status_meta.status.clone().err(); TransactionStatus { slot, status: status_meta.status, confirmations: None, err, } }) .or_else(|| { if let Some(bigtable_ledger_storage) = &self.bigtable_ledger_storage { self.runtime_handle .block_on(bigtable_ledger_storage.get_signature_status(&signature)) .map(Some) .unwrap_or(None) } else { None } }) } else { None }; statuses.push(status); } Ok(new_response(&bank, statuses)) } fn get_transaction_status( &self, signature: Signature, bank: &Arc, ) -> Option { let (slot, status) = bank.get_signature_status_slot(&signature)?; let r_block_commitment_cache = self.block_commitment_cache.read().unwrap(); let confirmations = if r_block_commitment_cache.root() >= slot && is_confirmed_rooted(&r_block_commitment_cache, bank, &self.blockstore, slot) { None } else { r_block_commitment_cache .get_confirmation_count(slot) .or(Some(0)) }; let err = status.clone().err(); Some(TransactionStatus { slot, status, confirmations, err, }) } pub fn get_confirmed_transaction( &self, signature: Signature, encoding: Option, ) -> Option { let encoding = encoding.unwrap_or(UiTransactionEncoding::Json); if self.config.enable_rpc_transaction_history { match self .blockstore .get_confirmed_transaction(signature) .unwrap_or(None) { Some(confirmed_transaction) => { if confirmed_transaction.slot <= self .block_commitment_cache .read() .unwrap() .highest_confirmed_root() { return Some(confirmed_transaction.encode(encoding)); } } None => { if let Some(bigtable_ledger_storage) = &self.bigtable_ledger_storage { return self .runtime_handle .block_on(bigtable_ledger_storage.get_confirmed_transaction(&signature)) .unwrap_or(None) .map(|confirmed| confirmed.encode(encoding)); } } } } None } pub fn get_confirmed_signatures_for_address( &self, pubkey: Pubkey, start_slot: Slot, end_slot: Slot, ) -> Vec { if self.config.enable_rpc_transaction_history { // TODO: Add bigtable_ledger_storage support as a part of // https://github.com/solana-labs/solana/pull/10928 let end_slot = min( end_slot, self.block_commitment_cache .read() .unwrap() .highest_confirmed_root(), ); self.blockstore .get_confirmed_signatures_for_address(pubkey, start_slot, end_slot) .unwrap_or_else(|_| vec![]) } else { vec![] } } pub fn get_confirmed_signatures_for_address2( &self, address: Pubkey, mut before: Option, until: Option, mut limit: usize, ) -> Result> { if self.config.enable_rpc_transaction_history { let highest_confirmed_root = self .block_commitment_cache .read() .unwrap() .highest_confirmed_root(); let mut results = self .blockstore .get_confirmed_signatures_for_address2( address, highest_confirmed_root, before, until, limit, ) .map_err(|err| Error::invalid_params(format!("{}", err)))?; if results.len() < limit { if let Some(bigtable_ledger_storage) = &self.bigtable_ledger_storage { if !results.is_empty() { limit -= results.len(); before = results.last().map(|x| x.signature); } let bigtable_results = self.runtime_handle.block_on( bigtable_ledger_storage.get_confirmed_signatures_for_address( &address, before.as_ref(), until.as_ref(), limit, ), ); match bigtable_results { Ok(bigtable_results) => { results.extend(bigtable_results.into_iter().map(|x| x.0)); } Err(err) => { warn!("{:?}", err); } } } } Ok(results.into_iter().map(|x| x.into()).collect()) } else { Ok(vec![]) } } pub fn get_first_available_block(&self) -> Slot { let slot = self .blockstore .get_first_available_block() .unwrap_or_default(); if let Some(bigtable_ledger_storage) = &self.bigtable_ledger_storage { let bigtable_slot = self .runtime_handle .block_on(bigtable_ledger_storage.get_first_available_block()) .unwrap_or(None) .unwrap_or(slot); if bigtable_slot < slot { return bigtable_slot; } } slot } pub fn get_stake_activation( &self, pubkey: &Pubkey, config: Option, ) -> Result { let config = config.unwrap_or_default(); let bank = self.bank(config.commitment); let epoch = config.epoch.unwrap_or_else(|| bank.epoch()); if bank.epoch().saturating_sub(epoch) > solana_sdk::stake_history::MAX_ENTRIES as u64 { return Err(Error::invalid_params(format!( "Invalid param: epoch {:?} is too far in the past", epoch ))); } if epoch > bank.epoch() { return Err(Error::invalid_params(format!( "Invalid param: epoch {:?} has not yet started", epoch ))); } let stake_account = bank .get_account(pubkey) .ok_or_else(|| Error::invalid_params("Invalid param: account not found".to_string()))?; let stake_state: StakeState = stake_account .state() .map_err(|_| Error::invalid_params("Invalid param: not a stake account".to_string()))?; let delegation = stake_state.delegation().ok_or_else(|| { Error::invalid_params("Invalid param: stake account has not been delegated".to_string()) })?; let stake_history_account = bank .get_account(&stake_history::id()) .ok_or_else(Error::internal_error)?; let stake_history = solana_sdk::account::from_account::(&stake_history_account) .ok_or_else(Error::internal_error)?; let (active, activating, deactivating) = delegation.stake_activating_and_deactivating( epoch, Some(&stake_history), bank.stake_program_v2_enabled(), ); let stake_activation_state = if deactivating > 0 { StakeActivationState::Deactivating } else if activating > 0 { StakeActivationState::Activating } else if active > 0 { StakeActivationState::Active } else { StakeActivationState::Inactive }; let inactive_stake = match stake_activation_state { StakeActivationState::Activating => activating, StakeActivationState::Active => 0, StakeActivationState::Deactivating => delegation.stake.saturating_sub(active), StakeActivationState::Inactive => delegation.stake, }; Ok(RpcStakeActivation { state: stake_activation_state, active, inactive: inactive_stake, }) } pub fn get_token_account_balance( &self, pubkey: &Pubkey, commitment: Option, ) -> Result> { let bank = self.bank(commitment); let account = bank.get_account(pubkey).ok_or_else(|| { Error::invalid_params("Invalid param: could not find account".to_string()) })?; if account.owner != spl_token_id_v2_0() { return Err(Error::invalid_params( "Invalid param: not a v2.0 Token account".to_string(), )); } let token_account = TokenAccount::unpack(&account.data).map_err(|_| { Error::invalid_params("Invalid param: not a v2.0 Token account".to_string()) })?; let mint = &Pubkey::from_str(&token_account.mint.to_string()) .expect("Token account mint should be convertible to Pubkey"); let (_, decimals) = get_mint_owner_and_decimals(&bank, &mint)?; let balance = token_amount_to_ui_amount(token_account.amount, decimals); Ok(new_response(&bank, balance)) } pub fn get_token_supply( &self, mint: &Pubkey, commitment: Option, ) -> Result> { let bank = self.bank(commitment); let mint_account = bank.get_account(mint).ok_or_else(|| { Error::invalid_params("Invalid param: could not find account".to_string()) })?; if mint_account.owner != spl_token_id_v2_0() { return Err(Error::invalid_params( "Invalid param: not a v2.0 Token mint".to_string(), )); } let mint = Mint::unpack(&mint_account.data).map_err(|_| { Error::invalid_params("Invalid param: mint could not be unpacked".to_string()) })?; let supply = token_amount_to_ui_amount(mint.supply, mint.decimals); Ok(new_response(&bank, supply)) } pub fn get_token_largest_accounts( &self, mint: &Pubkey, commitment: Option, ) -> Result>> { let bank = self.bank(commitment); let (mint_owner, decimals) = get_mint_owner_and_decimals(&bank, mint)?; if mint_owner != spl_token_id_v2_0() { return Err(Error::invalid_params( "Invalid param: not a v2.0 Token mint".to_string(), )); } let filters = vec![ // Filter on Mint address RpcFilterType::Memcmp(Memcmp { offset: 0, bytes: MemcmpEncodedBytes::Binary(mint.to_string()), encoding: None, }), // Filter on Token Account state RpcFilterType::DataSize(TokenAccount::get_packed_len() as u64), ]; let mut token_balances: Vec = get_filtered_program_accounts(&bank, &mint_owner, filters) .map(|(address, account)| { let amount = TokenAccount::unpack(&account.data) .map(|account| account.amount) .unwrap_or(0); let amount = token_amount_to_ui_amount(amount, decimals); RpcTokenAccountBalance { address: address.to_string(), amount, } }) .collect(); token_balances.sort_by(|a, b| { a.amount .amount .parse::() .unwrap() .cmp(&b.amount.amount.parse::().unwrap()) .reverse() }); token_balances.truncate(NUM_LARGEST_ACCOUNTS); Ok(new_response(&bank, token_balances)) } pub fn get_token_accounts_by_owner( &self, owner: &Pubkey, token_account_filter: TokenAccountsFilter, config: Option, ) -> Result>> { let config = config.unwrap_or_default(); let bank = self.bank(config.commitment); let encoding = config.encoding.unwrap_or(UiAccountEncoding::Binary); let data_slice_config = config.data_slice; check_slice_and_encoding(&encoding, data_slice_config.is_some())?; let (token_program_id, mint) = get_token_program_id_and_mint(&bank, token_account_filter)?; let mut filters = vec![ // Filter on Owner address RpcFilterType::Memcmp(Memcmp { offset: 32, bytes: MemcmpEncodedBytes::Binary(owner.to_string()), encoding: None, }), // Filter on Token Account state RpcFilterType::DataSize(TokenAccount::get_packed_len() as u64), ]; if let Some(mint) = mint { // Optional filter on Mint address filters.push(RpcFilterType::Memcmp(Memcmp { offset: 0, bytes: MemcmpEncodedBytes::Binary(mint.to_string()), encoding: None, })); } let keyed_accounts = get_filtered_program_accounts(&bank, &token_program_id, filters); let accounts = if encoding == UiAccountEncoding::JsonParsed { get_parsed_token_accounts(bank.clone(), keyed_accounts).collect() } else { keyed_accounts .map(|(pubkey, account)| RpcKeyedAccount { pubkey: pubkey.to_string(), account: UiAccount::encode( &pubkey, account, encoding.clone(), None, data_slice_config, ), }) .collect() }; Ok(new_response(&bank, accounts)) } pub fn get_token_accounts_by_delegate( &self, delegate: &Pubkey, token_account_filter: TokenAccountsFilter, config: Option, ) -> Result>> { let config = config.unwrap_or_default(); let bank = self.bank(config.commitment); let encoding = config.encoding.unwrap_or(UiAccountEncoding::Binary); let data_slice_config = config.data_slice; check_slice_and_encoding(&encoding, data_slice_config.is_some())?; let (token_program_id, mint) = get_token_program_id_and_mint(&bank, token_account_filter)?; let mut filters = vec![ // Filter on Delegate is_some() RpcFilterType::Memcmp(Memcmp { offset: 72, bytes: MemcmpEncodedBytes::Binary( bs58::encode(bincode::serialize(&1u32).unwrap()).into_string(), ), encoding: None, }), // Filter on Delegate address RpcFilterType::Memcmp(Memcmp { offset: 76, bytes: MemcmpEncodedBytes::Binary(delegate.to_string()), encoding: None, }), // Filter on Token Account state RpcFilterType::DataSize(TokenAccount::get_packed_len() as u64), ]; if let Some(mint) = mint { // Optional filter on Mint address filters.push(RpcFilterType::Memcmp(Memcmp { offset: 0, bytes: MemcmpEncodedBytes::Binary(mint.to_string()), encoding: None, })); } let keyed_accounts = get_filtered_program_accounts(&bank, &token_program_id, filters); let accounts = if encoding == UiAccountEncoding::JsonParsed { get_parsed_token_accounts(bank.clone(), keyed_accounts).collect() } else { keyed_accounts .map(|(pubkey, account)| RpcKeyedAccount { pubkey: pubkey.to_string(), account: UiAccount::encode( &pubkey, account, encoding.clone(), None, data_slice_config, ), }) .collect() }; Ok(new_response(&bank, accounts)) } } fn verify_transaction(transaction: &Transaction) -> Result<()> { if transaction.verify().is_err() { return Err(RpcCustomError::TransactionSignatureVerificationFailure.into()); } if let Err(e) = transaction.verify_precompiles() { return Err(RpcCustomError::TransactionPrecompileVerificationFailure(e).into()); } Ok(()) } fn verify_filter(input: &RpcFilterType) -> Result<()> { input .verify() .map_err(|e| Error::invalid_params(format!("Invalid param: {:?}", e))) } fn verify_pubkey(input: String) -> Result { input .parse() .map_err(|e| Error::invalid_params(format!("Invalid param: {:?}", e))) } fn verify_signature(input: &str) -> Result { input .parse() .map_err(|e| Error::invalid_params(format!("Invalid param: {:?}", e))) } fn verify_token_account_filter( token_account_filter: RpcTokenAccountsFilter, ) -> Result { match token_account_filter { RpcTokenAccountsFilter::Mint(mint_str) => { let mint = verify_pubkey(mint_str)?; Ok(TokenAccountsFilter::Mint(mint)) } RpcTokenAccountsFilter::ProgramId(program_id_str) => { let program_id = verify_pubkey(program_id_str)?; Ok(TokenAccountsFilter::ProgramId(program_id)) } } } fn check_slice_and_encoding(encoding: &UiAccountEncoding, data_slice_is_some: bool) -> Result<()> { match encoding { UiAccountEncoding::JsonParsed => { if data_slice_is_some { let message = "Sliced account data can only be encoded using binary (base 58) or base64 encoding." .to_string(); Err(error::Error { code: error::ErrorCode::InvalidRequest, message, data: None, }) } else { Ok(()) } } UiAccountEncoding::Binary | UiAccountEncoding::Base58 | UiAccountEncoding::Base64 | UiAccountEncoding::Base64Zstd => Ok(()), } } fn get_encoded_account( bank: &Arc, pubkey: &Pubkey, encoding: UiAccountEncoding, data_slice: Option, ) -> Result> { let mut response = None; if let Some(account) = bank.get_account(pubkey) { if account.owner == spl_token_id_v2_0() && encoding == UiAccountEncoding::JsonParsed { response = Some(get_parsed_token_account(bank.clone(), pubkey, account)); } else if (encoding == UiAccountEncoding::Binary || encoding == UiAccountEncoding::Base58) && account.data.len() > 128 { let message = "Encoded binary (base 58) data should be less than 128 bytes, please use Base64 encoding.".to_string(); return Err(error::Error { code: error::ErrorCode::InvalidRequest, message, data: None, }); } else { response = Some(UiAccount::encode( pubkey, account, encoding, None, data_slice, )); } } Ok(response) } /// Use a set of filters to get an iterator of keyed program accounts from a bank fn get_filtered_program_accounts( bank: &Arc, program_id: &Pubkey, filters: Vec, ) -> impl Iterator { bank.get_program_accounts(&program_id) .into_iter() .filter(move |(_, account)| { filters.iter().all(|filter_type| match filter_type { RpcFilterType::DataSize(size) => account.data.len() as u64 == *size, RpcFilterType::Memcmp(compare) => compare.bytes_match(&account.data), }) }) } pub(crate) fn get_parsed_token_account( bank: Arc, pubkey: &Pubkey, account: Account, ) -> UiAccount { let additional_data = get_token_account_mint(&account.data) .and_then(|mint_pubkey| get_mint_owner_and_decimals(&bank, &mint_pubkey).ok()) .map(|(_, decimals)| AccountAdditionalData { spl_token_decimals: Some(decimals), }); UiAccount::encode( pubkey, account, UiAccountEncoding::JsonParsed, additional_data, None, ) } pub(crate) fn get_parsed_token_accounts( bank: Arc, keyed_accounts: I, ) -> impl Iterator where I: Iterator, { let mut mint_decimals: HashMap = HashMap::new(); keyed_accounts.filter_map(move |(pubkey, account)| { let additional_data = get_token_account_mint(&account.data).map(|mint_pubkey| { let spl_token_decimals = mint_decimals.get(&mint_pubkey).cloned().or_else(|| { let (_, decimals) = get_mint_owner_and_decimals(&bank, &mint_pubkey).ok()?; mint_decimals.insert(mint_pubkey, decimals); Some(decimals) }); AccountAdditionalData { spl_token_decimals } }); let maybe_encoded_account = UiAccount::encode( &pubkey, account, UiAccountEncoding::JsonParsed, additional_data, None, ); if let UiAccountData::Json(_) = &maybe_encoded_account.data { Some(RpcKeyedAccount { pubkey: pubkey.to_string(), account: maybe_encoded_account, }) } else { None } }) } /// Analyze a passed Pubkey that may be a Token program id or Mint address to determine the program /// id and optional Mint fn get_token_program_id_and_mint( bank: &Arc, token_account_filter: TokenAccountsFilter, ) -> Result<(Pubkey, Option)> { match token_account_filter { TokenAccountsFilter::Mint(mint) => { let (mint_owner, _) = get_mint_owner_and_decimals(&bank, &mint)?; if mint_owner != spl_token_id_v2_0() { return Err(Error::invalid_params( "Invalid param: not a v2.0 Token mint".to_string(), )); } Ok((mint_owner, Some(mint))) } TokenAccountsFilter::ProgramId(program_id) => { if program_id == spl_token_id_v2_0() { Ok((program_id, None)) } else { Err(Error::invalid_params( "Invalid param: unrecognized Token program id".to_string(), )) } } } } /// Analyze a mint Pubkey that may be the native_mint and get the mint-account owner (token /// program_id) and decimals fn get_mint_owner_and_decimals(bank: &Arc, mint: &Pubkey) -> Result<(Pubkey, u8)> { if mint == &spl_token_v2_0_native_mint() { Ok((spl_token_id_v2_0(), spl_token_v2_0::native_mint::DECIMALS)) } else { let mint_account = bank.get_account(mint).ok_or_else(|| { Error::invalid_params("Invalid param: could not find mint".to_string()) })?; let decimals = get_mint_decimals(&mint_account.data)?; Ok((mint_account.owner, decimals)) } } fn get_mint_decimals(data: &[u8]) -> Result { Mint::unpack(data) .map_err(|_| { Error::invalid_params("Invalid param: Token mint could not be unpacked".to_string()) }) .map(|mint| mint.decimals) } #[rpc] pub trait RpcSol { type Metadata; // DEPRECATED #[rpc(meta, name = "confirmTransaction")] fn confirm_transaction( &self, meta: Self::Metadata, signature_str: String, commitment: Option, ) -> Result>; // DEPRECATED #[rpc(meta, name = "getSignatureStatus")] fn get_signature_status( &self, meta: Self::Metadata, signature_str: String, commitment: Option, ) -> Result>>; // DEPRECATED (used by Trust Wallet) #[rpc(meta, name = "getSignatureConfirmation")] fn get_signature_confirmation( &self, meta: Self::Metadata, signature_str: String, commitment: Option, ) -> Result>; #[rpc(meta, name = "getAccountInfo")] fn get_account_info( &self, meta: Self::Metadata, pubkey_str: String, config: Option, ) -> Result>>; #[rpc(meta, name = "getMultipleAccounts")] fn get_multiple_accounts( &self, meta: Self::Metadata, pubkey_strs: Vec, config: Option, ) -> Result>>>; #[rpc(meta, name = "getProgramAccounts")] fn get_program_accounts( &self, meta: Self::Metadata, program_id_str: String, config: Option, ) -> Result>; #[rpc(meta, name = "getMinimumBalanceForRentExemption")] fn get_minimum_balance_for_rent_exemption( &self, meta: Self::Metadata, data_len: usize, commitment: Option, ) -> Result; #[rpc(meta, name = "getInflationGovernor")] fn get_inflation_governor( &self, meta: Self::Metadata, commitment: Option, ) -> Result; #[rpc(meta, name = "getInflationRate")] fn get_inflation_rate(&self, meta: Self::Metadata) -> Result; #[rpc(meta, name = "getEpochSchedule")] fn get_epoch_schedule(&self, meta: Self::Metadata) -> Result; #[rpc(meta, name = "getBalance")] fn get_balance( &self, meta: Self::Metadata, pubkey_str: String, commitment: Option, ) -> Result>; #[rpc(meta, name = "getClusterNodes")] fn get_cluster_nodes(&self, meta: Self::Metadata) -> Result>; #[rpc(meta, name = "getRecentPerformanceSamples")] fn get_recent_performance_samples( &self, meta: Self::Metadata, limit: Option, ) -> Result>; #[rpc(meta, name = "getEpochInfo")] fn get_epoch_info( &self, meta: Self::Metadata, commitment: Option, ) -> Result; #[rpc(meta, name = "getBlockCommitment")] fn get_block_commitment( &self, meta: Self::Metadata, block: Slot, ) -> Result>; #[rpc(meta, name = "getGenesisHash")] fn get_genesis_hash(&self, meta: Self::Metadata) -> Result; #[rpc(meta, name = "getLeaderSchedule")] fn get_leader_schedule( &self, meta: Self::Metadata, slot: Option, commitment: Option, ) -> Result>; #[rpc(meta, name = "getRecentBlockhash")] fn get_recent_blockhash( &self, meta: Self::Metadata, commitment: Option, ) -> Result>; #[rpc(meta, name = "getFees")] fn get_fees( &self, meta: Self::Metadata, commitment: Option, ) -> Result>; #[rpc(meta, name = "getFeeCalculatorForBlockhash")] fn get_fee_calculator_for_blockhash( &self, meta: Self::Metadata, blockhash: String, commitment: Option, ) -> Result>>; #[rpc(meta, name = "getFeeRateGovernor")] fn get_fee_rate_governor( &self, meta: Self::Metadata, ) -> Result>; #[rpc(meta, name = "getSignatureStatuses")] fn get_signature_statuses( &self, meta: Self::Metadata, signature_strs: Vec, config: Option, ) -> Result>>>; #[rpc(meta, name = "getSlot")] fn get_slot(&self, meta: Self::Metadata, commitment: Option) -> Result; #[rpc(meta, name = "getTransactionCount")] fn get_transaction_count( &self, meta: Self::Metadata, commitment: Option, ) -> Result; // DEPRECATED #[rpc(meta, name = "getTotalSupply")] fn get_total_supply( &self, meta: Self::Metadata, commitment: Option, ) -> Result; #[rpc(meta, name = "getLargestAccounts")] fn get_largest_accounts( &self, meta: Self::Metadata, config: Option, ) -> Result>>; #[rpc(meta, name = "getSupply")] fn get_supply( &self, meta: Self::Metadata, commitment: Option, ) -> Result>; #[rpc(meta, name = "requestAirdrop")] fn request_airdrop( &self, meta: Self::Metadata, pubkey_str: String, lamports: u64, commitment: Option, ) -> Result; #[rpc(meta, name = "sendTransaction")] fn send_transaction( &self, meta: Self::Metadata, data: String, config: Option, ) -> Result; #[rpc(meta, name = "simulateTransaction")] fn simulate_transaction( &self, meta: Self::Metadata, data: String, config: Option, ) -> Result>; #[rpc(meta, name = "getSlotLeader")] fn get_slot_leader( &self, meta: Self::Metadata, commitment: Option, ) -> Result; #[rpc(meta, name = "minimumLedgerSlot")] fn minimum_ledger_slot(&self, meta: Self::Metadata) -> Result; #[rpc(meta, name = "getVoteAccounts")] fn get_vote_accounts( &self, meta: Self::Metadata, commitment: Option, ) -> Result; #[rpc(meta, name = "validatorExit")] fn validator_exit(&self, meta: Self::Metadata) -> Result; #[rpc(meta, name = "getIdentity")] fn get_identity(&self, meta: Self::Metadata) -> Result; #[rpc(meta, name = "getVersion")] fn get_version(&self, meta: Self::Metadata) -> Result; #[rpc(meta, name = "setLogFilter")] fn set_log_filter(&self, _meta: Self::Metadata, filter: String) -> Result<()>; #[rpc(meta, name = "getConfirmedBlock")] fn get_confirmed_block( &self, meta: Self::Metadata, slot: Slot, encoding: Option, ) -> Result>; #[rpc(meta, name = "getBlockTime")] fn get_block_time(&self, meta: Self::Metadata, slot: Slot) -> Result>; #[rpc(meta, name = "getConfirmedBlocks")] fn get_confirmed_blocks( &self, meta: Self::Metadata, start_slot: Slot, end_slot: Option, ) -> Result>; #[rpc(meta, name = "getConfirmedBlocksWithLimit")] fn get_confirmed_blocks_with_limit( &self, meta: Self::Metadata, start_slot: Slot, limit: usize, ) -> Result>; #[rpc(meta, name = "getConfirmedTransaction")] fn get_confirmed_transaction( &self, meta: Self::Metadata, signature_str: String, encoding: Option, ) -> Result>; #[rpc(meta, name = "getConfirmedSignaturesForAddress")] fn get_confirmed_signatures_for_address( &self, meta: Self::Metadata, pubkey_str: String, start_slot: Slot, end_slot: Slot, ) -> Result>; #[rpc(meta, name = "getConfirmedSignaturesForAddress2")] fn get_confirmed_signatures_for_address2( &self, meta: Self::Metadata, address: String, config: Option, ) -> Result>; #[rpc(meta, name = "getFirstAvailableBlock")] fn get_first_available_block(&self, meta: Self::Metadata) -> Result; #[rpc(meta, name = "getStakeActivation")] fn get_stake_activation( &self, meta: Self::Metadata, pubkey_str: String, config: Option, ) -> Result; // SPL Token-specific RPC endpoints // See https://github.com/solana-labs/solana-program-library/releases/tag/token-v2.0.0 for // program details #[rpc(meta, name = "getTokenAccountBalance")] fn get_token_account_balance( &self, meta: Self::Metadata, pubkey_str: String, commitment: Option, ) -> Result>; #[rpc(meta, name = "getTokenSupply")] fn get_token_supply( &self, meta: Self::Metadata, mint_str: String, commitment: Option, ) -> Result>; #[rpc(meta, name = "getTokenLargestAccounts")] fn get_token_largest_accounts( &self, meta: Self::Metadata, mint_str: String, commitment: Option, ) -> Result>>; #[rpc(meta, name = "getTokenAccountsByOwner")] fn get_token_accounts_by_owner( &self, meta: Self::Metadata, owner_str: String, token_account_filter: RpcTokenAccountsFilter, config: Option, ) -> Result>>; #[rpc(meta, name = "getTokenAccountsByDelegate")] fn get_token_accounts_by_delegate( &self, meta: Self::Metadata, delegate_str: String, token_account_filter: RpcTokenAccountsFilter, config: Option, ) -> Result>>; } fn _send_transaction( meta: JsonRpcRequestProcessor, transaction: Transaction, wire_transaction: Vec, last_valid_slot: Slot, ) -> Result { if transaction.signatures.is_empty() { return Err(RpcCustomError::TransactionSignatureVerificationFailure.into()); } let signature = transaction.signatures[0]; let transaction_info = TransactionInfo::new(signature, wire_transaction, last_valid_slot); meta.transaction_sender .lock() .unwrap() .send(transaction_info) .unwrap_or_else(|err| warn!("Failed to enqueue transaction: {}", err)); Ok(signature.to_string()) } pub struct RpcSolImpl; impl RpcSol for RpcSolImpl { type Metadata = JsonRpcRequestProcessor; fn confirm_transaction( &self, meta: Self::Metadata, id: String, commitment: Option, ) -> Result> { debug!("confirm_transaction rpc request received: {:?}", id); let signature = verify_signature(&id)?; Ok(meta.confirm_transaction(&signature, commitment)) } fn get_account_info( &self, meta: Self::Metadata, pubkey_str: String, config: Option, ) -> Result>> { debug!("get_account_info rpc request received: {:?}", pubkey_str); let pubkey = verify_pubkey(pubkey_str)?; meta.get_account_info(&pubkey, config) } fn get_multiple_accounts( &self, meta: Self::Metadata, pubkey_strs: Vec, config: Option, ) -> Result>>> { debug!( "get_multiple_accounts rpc request received: {:?}", pubkey_strs.len() ); let max_multiple_accounts = meta .config .max_multiple_accounts .unwrap_or(MAX_MULTIPLE_ACCOUNTS); if pubkey_strs.len() > max_multiple_accounts { return Err(Error::invalid_params(format!( "Too many inputs provided; max {}", max_multiple_accounts ))); } let mut pubkeys: Vec = vec![]; for pubkey_str in pubkey_strs { pubkeys.push(verify_pubkey(pubkey_str)?); } meta.get_multiple_accounts(pubkeys, config) } fn get_minimum_balance_for_rent_exemption( &self, meta: Self::Metadata, data_len: usize, commitment: Option, ) -> Result { debug!( "get_minimum_balance_for_rent_exemption rpc request received: {:?}", data_len ); if data_len as u64 > system_instruction::MAX_PERMITTED_DATA_LENGTH { return Err(Error::invalid_request()); } Ok(meta.get_minimum_balance_for_rent_exemption(data_len, commitment)) } fn get_program_accounts( &self, meta: Self::Metadata, program_id_str: String, config: Option, ) -> Result> { debug!( "get_program_accounts rpc request received: {:?}", program_id_str ); let program_id = verify_pubkey(program_id_str)?; let (config, filters) = if let Some(config) = config { ( Some(config.account_config), config.filters.unwrap_or_default(), ) } else { (None, vec![]) }; for filter in &filters { verify_filter(filter)?; } meta.get_program_accounts(&program_id, config, filters) } fn get_inflation_governor( &self, meta: Self::Metadata, commitment: Option, ) -> Result { debug!("get_inflation_governor rpc request received"); Ok(meta.get_inflation_governor(commitment)) } fn get_inflation_rate(&self, meta: Self::Metadata) -> Result { debug!("get_inflation_rate rpc request received"); Ok(meta.get_inflation_rate()) } fn get_epoch_schedule(&self, meta: Self::Metadata) -> Result { debug!("get_epoch_schedule rpc request received"); Ok(meta.get_epoch_schedule()) } fn get_balance( &self, meta: Self::Metadata, pubkey_str: String, commitment: Option, ) -> Result> { debug!("get_balance rpc request received: {:?}", pubkey_str); let pubkey = verify_pubkey(pubkey_str)?; Ok(meta.get_balance(&pubkey, commitment)) } fn get_recent_performance_samples( &self, meta: Self::Metadata, limit: Option, ) -> Result> { debug!("get_recent_performance_samples request received"); let limit = limit.unwrap_or(PERFORMANCE_SAMPLES_LIMIT); if limit > PERFORMANCE_SAMPLES_LIMIT { return Err(Error::invalid_params(format!( "Invalid limit; max {}", PERFORMANCE_SAMPLES_LIMIT ))); } Ok(meta .blockstore .get_recent_perf_samples(limit) .map_err(|err| { warn!("get_recent_performance_samples failed: {:?}", err); Error::invalid_request() })? .iter() .map(|(slot, sample)| RpcPerfSample { slot: *slot, num_transactions: sample.num_transactions, num_slots: sample.num_slots, sample_period_secs: sample.sample_period_secs, }) .collect()) } fn get_cluster_nodes(&self, meta: Self::Metadata) -> Result> { debug!("get_cluster_nodes rpc request received"); let cluster_info = &meta.cluster_info; fn valid_address_or_none(addr: &SocketAddr) -> Option { if ContactInfo::is_valid_address(addr) { Some(*addr) } else { None } } let my_shred_version = cluster_info.my_shred_version(); Ok(cluster_info .all_peers() .iter() .filter_map(|(contact_info, _)| { if my_shred_version == contact_info.shred_version && ContactInfo::is_valid_address(&contact_info.gossip) { let (version, feature_set) = if let Some(version) = cluster_info.get_node_version(&contact_info.id) { (Some(version.to_string()), Some(version.feature_set)) } else { (None, None) }; Some(RpcContactInfo { pubkey: contact_info.id.to_string(), gossip: Some(contact_info.gossip), tpu: valid_address_or_none(&contact_info.tpu), rpc: valid_address_or_none(&contact_info.rpc), version, feature_set, }) } else { None // Exclude spy nodes } }) .collect()) } fn get_epoch_info( &self, meta: Self::Metadata, commitment: Option, ) -> Result { debug!("get_epoch_info rpc request received"); let bank = meta.bank(commitment); Ok(bank.get_epoch_info()) } fn get_block_commitment( &self, meta: Self::Metadata, block: Slot, ) -> Result> { debug!("get_block_commitment rpc request received"); Ok(meta.get_block_commitment(block)) } fn get_genesis_hash(&self, meta: Self::Metadata) -> Result { debug!("get_genesis_hash rpc request received"); Ok(meta.genesis_hash.to_string()) } fn get_leader_schedule( &self, meta: Self::Metadata, slot: Option, commitment: Option, ) -> Result> { let bank = meta.bank(commitment); let slot = slot.unwrap_or_else(|| bank.slot()); let epoch = bank.epoch_schedule().get_epoch(slot); debug!("get_leader_schedule rpc request received: {:?}", slot); Ok( solana_ledger::leader_schedule_utils::leader_schedule(epoch, &bank).map( |leader_schedule| { let mut map = HashMap::new(); for (slot_index, pubkey) in leader_schedule.get_slot_leaders().iter().enumerate() { let pubkey = pubkey.to_string(); map.entry(pubkey).or_insert_with(Vec::new).push(slot_index); } map }, ), ) } fn get_recent_blockhash( &self, meta: Self::Metadata, commitment: Option, ) -> Result> { debug!("get_recent_blockhash rpc request received"); Ok(meta.get_recent_blockhash(commitment)) } fn get_fees( &self, meta: Self::Metadata, commitment: Option, ) -> Result> { debug!("get_fees rpc request received"); Ok(meta.get_fees(commitment)) } fn get_fee_calculator_for_blockhash( &self, meta: Self::Metadata, blockhash: String, commitment: Option, ) -> Result>> { debug!("get_fee_calculator_for_blockhash rpc request received"); let blockhash = Hash::from_str(&blockhash).map_err(|e| Error::invalid_params(format!("{:?}", e)))?; Ok(meta.get_fee_calculator_for_blockhash(&blockhash, commitment)) } fn get_fee_rate_governor( &self, meta: Self::Metadata, ) -> Result> { debug!("get_fee_rate_governor rpc request received"); Ok(meta.get_fee_rate_governor()) } fn get_signature_confirmation( &self, meta: Self::Metadata, signature_str: String, commitment: Option, ) -> Result> { debug!( "get_signature_confirmation rpc request received: {:?}", signature_str ); let signature = verify_signature(&signature_str)?; Ok(meta.get_signature_confirmation_status(signature, commitment)) } fn get_signature_status( &self, meta: Self::Metadata, signature_str: String, commitment: Option, ) -> Result>> { debug!( "get_signature_status rpc request received: {:?}", signature_str ); let signature = verify_signature(&signature_str)?; Ok(meta.get_signature_status(signature, commitment)) } fn get_signature_statuses( &self, meta: Self::Metadata, signature_strs: Vec, config: Option, ) -> Result>>> { debug!( "get_signature_statuses rpc request received: {:?}", signature_strs.len() ); if signature_strs.len() > MAX_GET_SIGNATURE_STATUSES_QUERY_ITEMS { return Err(Error::invalid_params(format!( "Too many inputs provided; max {}", MAX_GET_SIGNATURE_STATUSES_QUERY_ITEMS ))); } let mut signatures: Vec = vec![]; for signature_str in signature_strs { signatures.push(verify_signature(&signature_str)?); } meta.get_signature_statuses(signatures, config) } fn get_slot(&self, meta: Self::Metadata, commitment: Option) -> Result { debug!("get_slot rpc request received"); Ok(meta.get_slot(commitment)) } fn get_transaction_count( &self, meta: Self::Metadata, commitment: Option, ) -> Result { debug!("get_transaction_count rpc request received"); Ok(meta.get_transaction_count(commitment)) } fn get_total_supply( &self, meta: Self::Metadata, commitment: Option, ) -> Result { debug!("get_total_supply rpc request received"); Ok(meta.get_total_supply(commitment)) } fn get_largest_accounts( &self, meta: Self::Metadata, config: Option, ) -> Result>> { debug!("get_largest_accounts rpc request received"); Ok(meta.get_largest_accounts(config)) } fn get_supply( &self, meta: Self::Metadata, commitment: Option, ) -> Result> { debug!("get_supply rpc request received"); Ok(meta.get_supply(commitment)) } fn request_airdrop( &self, meta: Self::Metadata, pubkey_str: String, lamports: u64, commitment: Option, ) -> Result { debug!("request_airdrop rpc request received"); trace!( "request_airdrop id={} lamports={} commitment: {:?}", pubkey_str, lamports, &commitment ); let faucet_addr = meta.config.faucet_addr.ok_or_else(Error::invalid_request)?; let pubkey = verify_pubkey(pubkey_str)?; let (blockhash, last_valid_slot) = { let bank = meta.bank(commitment); let blockhash = bank.confirmed_last_blockhash().0; ( blockhash, bank.get_blockhash_last_valid_slot(&blockhash).unwrap_or(0), ) }; let transaction = request_airdrop_transaction(&faucet_addr, &pubkey, lamports, blockhash) .map_err(|err| { info!("request_airdrop_transaction failed: {:?}", err); Error::internal_error() })?; let wire_transaction = serialize(&transaction).map_err(|err| { info!("request_airdrop: serialize error: {:?}", err); Error::internal_error() })?; _send_transaction(meta, transaction, wire_transaction, last_valid_slot) } fn send_transaction( &self, meta: Self::Metadata, data: String, config: Option, ) -> Result { debug!("send_transaction rpc request received"); let config = config.unwrap_or_default(); let encoding = config.encoding.unwrap_or(UiTransactionEncoding::Base58); let (wire_transaction, transaction) = deserialize_transaction(data, encoding)?; let bank = &*meta.bank(None); let last_valid_slot = bank .get_blockhash_last_valid_slot(&transaction.message.recent_blockhash) .unwrap_or(0); if !config.skip_preflight { if let Err(e) = verify_transaction(&transaction) { return Err(e); } if meta.health.check() != RpcHealthStatus::Ok { return Err(RpcCustomError::RpcNodeUnhealthy.into()); } let preflight_commitment = config .preflight_commitment .map(|commitment| CommitmentConfig { commitment }); let preflight_bank = &*meta.bank(preflight_commitment); if let (Err(err), logs) = preflight_bank.simulate_transaction(transaction.clone()) { return Err(RpcCustomError::SendTransactionPreflightFailure { message: format!("Transaction simulation failed: {}", err), result: RpcSimulateTransactionResult { err: Some(err), logs: Some(logs), }, } .into()); } } _send_transaction(meta, transaction, wire_transaction, last_valid_slot) } fn simulate_transaction( &self, meta: Self::Metadata, data: String, config: Option, ) -> Result> { debug!("simulate_transaction rpc request received"); let config = config.unwrap_or_default(); let encoding = config.encoding.unwrap_or(UiTransactionEncoding::Base58); let (_, transaction) = deserialize_transaction(data, encoding)?; if config.sig_verify { if let Err(e) = verify_transaction(&transaction) { return Err(e); } } let bank = &*meta.bank(config.commitment); let (result, logs) = bank.simulate_transaction(transaction); Ok(new_response( &bank, RpcSimulateTransactionResult { err: result.err(), logs: Some(logs), }, )) } fn get_slot_leader( &self, meta: Self::Metadata, commitment: Option, ) -> Result { debug!("get_slot_leader rpc request received"); Ok(meta.get_slot_leader(commitment)) } fn minimum_ledger_slot(&self, meta: Self::Metadata) -> Result { debug!("minimum_ledger_slot rpc request received"); meta.minimum_ledger_slot() } fn get_vote_accounts( &self, meta: Self::Metadata, commitment: Option, ) -> Result { debug!("get_vote_accounts rpc request received"); meta.get_vote_accounts(commitment) } fn validator_exit(&self, meta: Self::Metadata) -> Result { debug!("validator_exit rpc request received"); Ok(meta.validator_exit()) } fn get_identity(&self, meta: Self::Metadata) -> Result { debug!("get_identity rpc request received"); Ok(RpcIdentity { identity: meta.config.identity_pubkey.to_string(), }) } fn get_version(&self, _: Self::Metadata) -> Result { debug!("get_version rpc request received"); let version = solana_version::Version::default(); Ok(RpcVersionInfo { solana_core: version.to_string(), feature_set: Some(version.feature_set), }) } fn set_log_filter(&self, meta: Self::Metadata, filter: String) -> Result<()> { debug!("set_log_filter rpc request received"); meta.set_log_filter(filter); Ok(()) } fn get_confirmed_block( &self, meta: Self::Metadata, slot: Slot, encoding: Option, ) -> Result> { debug!("get_confirmed_block rpc request received: {:?}", slot); meta.get_confirmed_block(slot, encoding) } fn get_confirmed_blocks( &self, meta: Self::Metadata, start_slot: Slot, end_slot: Option, ) -> Result> { debug!( "get_confirmed_blocks rpc request received: {}-{:?}", start_slot, end_slot ); meta.get_confirmed_blocks(start_slot, end_slot) } fn get_confirmed_blocks_with_limit( &self, meta: Self::Metadata, start_slot: Slot, limit: usize, ) -> Result> { debug!( "get_confirmed_blocks_with_limit rpc request received: {}-{}", start_slot, limit, ); meta.get_confirmed_blocks_with_limit(start_slot, limit) } fn get_block_time(&self, meta: Self::Metadata, slot: Slot) -> Result> { meta.get_block_time(slot) } fn get_confirmed_transaction( &self, meta: Self::Metadata, signature_str: String, encoding: Option, ) -> Result> { debug!( "get_confirmed_transaction rpc request received: {:?}", signature_str ); let signature = verify_signature(&signature_str)?; Ok(meta.get_confirmed_transaction(signature, encoding)) } fn get_confirmed_signatures_for_address( &self, meta: Self::Metadata, pubkey_str: String, start_slot: Slot, end_slot: Slot, ) -> Result> { debug!( "get_confirmed_signatures_for_address rpc request received: {:?} {:?}-{:?}", pubkey_str, start_slot, end_slot ); let pubkey = verify_pubkey(pubkey_str)?; if end_slot < start_slot { return Err(Error::invalid_params(format!( "start_slot {} must be less than or equal to end_slot {}", start_slot, end_slot ))); } if end_slot - start_slot > MAX_GET_CONFIRMED_SIGNATURES_FOR_ADDRESS_SLOT_RANGE { return Err(Error::invalid_params(format!( "Slot range too large; max {}", MAX_GET_CONFIRMED_SIGNATURES_FOR_ADDRESS_SLOT_RANGE ))); } Ok(meta .get_confirmed_signatures_for_address(pubkey, start_slot, end_slot) .iter() .map(|signature| signature.to_string()) .collect()) } fn get_confirmed_signatures_for_address2( &self, meta: Self::Metadata, address: String, config: Option, ) -> Result> { let address = verify_pubkey(address)?; let config = config.unwrap_or_default(); let before = if let Some(before) = config.before { Some(verify_signature(&before)?) } else { None }; let until = if let Some(until) = config.until { Some(verify_signature(&until)?) } else { None }; let limit = config .limit .unwrap_or(MAX_GET_CONFIRMED_SIGNATURES_FOR_ADDRESS2_LIMIT); if limit == 0 || limit > MAX_GET_CONFIRMED_SIGNATURES_FOR_ADDRESS2_LIMIT { return Err(Error::invalid_params(format!( "Invalid limit; max {}", MAX_GET_CONFIRMED_SIGNATURES_FOR_ADDRESS2_LIMIT ))); } meta.get_confirmed_signatures_for_address2(address, before, until, limit) } fn get_first_available_block(&self, meta: Self::Metadata) -> Result { debug!("get_first_available_block rpc request received"); Ok(meta.get_first_available_block()) } fn get_stake_activation( &self, meta: Self::Metadata, pubkey_str: String, config: Option, ) -> Result { debug!( "get_stake_activation rpc request received: {:?}", pubkey_str ); let pubkey = verify_pubkey(pubkey_str)?; meta.get_stake_activation(&pubkey, config) } fn get_token_account_balance( &self, meta: Self::Metadata, pubkey_str: String, commitment: Option, ) -> Result> { debug!( "get_token_account_balance rpc request received: {:?}", pubkey_str ); let pubkey = verify_pubkey(pubkey_str)?; meta.get_token_account_balance(&pubkey, commitment) } fn get_token_supply( &self, meta: Self::Metadata, mint_str: String, commitment: Option, ) -> Result> { debug!("get_token_supply rpc request received: {:?}", mint_str); let mint = verify_pubkey(mint_str)?; meta.get_token_supply(&mint, commitment) } fn get_token_largest_accounts( &self, meta: Self::Metadata, mint_str: String, commitment: Option, ) -> Result>> { debug!( "get_token_largest_accounts rpc request received: {:?}", mint_str ); let mint = verify_pubkey(mint_str)?; meta.get_token_largest_accounts(&mint, commitment) } fn get_token_accounts_by_owner( &self, meta: Self::Metadata, owner_str: String, token_account_filter: RpcTokenAccountsFilter, config: Option, ) -> Result>> { debug!( "get_token_accounts_by_owner rpc request received: {:?}", owner_str ); let owner = verify_pubkey(owner_str)?; let token_account_filter = verify_token_account_filter(token_account_filter)?; meta.get_token_accounts_by_owner(&owner, token_account_filter, config) } fn get_token_accounts_by_delegate( &self, meta: Self::Metadata, delegate_str: String, token_account_filter: RpcTokenAccountsFilter, config: Option, ) -> Result>> { debug!( "get_token_accounts_by_delegate rpc request received: {:?}", delegate_str ); let delegate = verify_pubkey(delegate_str)?; let token_account_filter = verify_token_account_filter(token_account_filter)?; meta.get_token_accounts_by_delegate(&delegate, token_account_filter, config) } } const WORST_CASE_BASE58_TX: usize = 1683; // Golden, bump if PACKET_DATA_SIZE changes const WORST_CASE_BASE64_TX: usize = 1644; // Golden, bump if PACKET_DATA_SIZE changes fn deserialize_transaction( encoded_transaction: String, encoding: UiTransactionEncoding, ) -> Result<(Vec, Transaction)> { let wire_transaction = match encoding { UiTransactionEncoding::Base58 => { inc_new_counter_info!("rpc-base58_encoded_tx", 1); if encoded_transaction.len() > WORST_CASE_BASE58_TX { return Err(Error::invalid_params(format!( "encoded transaction too large: {} bytes (max: encoded/raw {}/{})", encoded_transaction.len(), WORST_CASE_BASE58_TX, PACKET_DATA_SIZE, ))); } bs58::decode(encoded_transaction) .into_vec() .map_err(|e| Error::invalid_params(format!("{:?}", e)))? } UiTransactionEncoding::Base64 => { inc_new_counter_info!("rpc-base64_encoded_tx", 1); if encoded_transaction.len() > WORST_CASE_BASE64_TX { return Err(Error::invalid_params(format!( "encoded transaction too large: {} bytes (max: encoded/raw {}/{})", encoded_transaction.len(), WORST_CASE_BASE64_TX, PACKET_DATA_SIZE, ))); } base64::decode(encoded_transaction) .map_err(|e| Error::invalid_params(format!("{:?}", e)))? } _ => { return Err(Error::invalid_params(format!( "unsupported transaction encoding: {}. Supported encodings: base58, base64", encoding ))) } }; if wire_transaction.len() > PACKET_DATA_SIZE { let err = format!( "transaction too large: {} bytes (max: {} bytes)", wire_transaction.len(), PACKET_DATA_SIZE ); info!("{}", err); return Err(Error::invalid_params(&err)); } bincode::options() .with_limit(PACKET_DATA_SIZE as u64) .with_fixint_encoding() .allow_trailing_bytes() .deserialize_from(&wire_transaction[..]) .map_err(|err| { info!("transaction deserialize error: {:?}", err); Error::invalid_params(&err.to_string()) }) .map(|transaction| (wire_transaction, transaction)) } pub(crate) fn create_validator_exit(exit: &Arc) -> Arc>> { let mut validator_exit = ValidatorExit::default(); let exit_ = exit.clone(); validator_exit.register_exit(Box::new(move || exit_.store(true, Ordering::Relaxed))); Arc::new(RwLock::new(Some(validator_exit))) } #[cfg(test)] pub mod tests { use super::*; use crate::{ contact_info::ContactInfo, non_circulating_supply::non_circulating_accounts, optimistically_confirmed_bank_tracker::{ BankNotification, OptimisticallyConfirmedBankTracker, }, replay_stage::tests::create_test_transactions_and_populate_blockstore, rpc_subscriptions::RpcSubscriptions, }; use bincode::deserialize; use jsonrpc_core::{ futures::future::Future, ErrorCode, MetaIoHandler, Output, Response, Value, }; use jsonrpc_core_client::transports::local; use solana_client::rpc_filter::{Memcmp, MemcmpEncodedBytes}; use solana_ledger::{ blockstore_meta::PerfSample, blockstore_processor::fill_blockstore_slot_with_ticks, genesis_utils::{create_genesis_config, GenesisConfigInfo}, }; use solana_runtime::{ accounts_background_service::ABSRequestSender, commitment::BlockCommitment, }; use solana_sdk::{ clock::MAX_RECENT_BLOCKHASHES, fee_calculator::DEFAULT_BURN_PERCENT, hash::{hash, Hash}, instruction::InstructionError, message::Message, nonce, rpc_port, signature::{Keypair, Signer}, system_program, system_transaction, timing::slot_duration_from_slots_per_year, transaction::{self, TransactionError}, }; use solana_transaction_status::{ EncodedTransaction, EncodedTransactionWithStatusMeta, UiMessage, }; use solana_vote_program::{ vote_instruction, vote_state::{Vote, VoteInit, MAX_LOCKOUT_HISTORY}, }; use spl_token_v2_0::{ solana_program::{program_option::COption, pubkey::Pubkey as SplTokenPubkey}, state::AccountState as TokenAccountState, state::Mint, }; use std::collections::HashMap; const TEST_MINT_LAMPORTS: u64 = 1_000_000; const TEST_SLOTS_PER_EPOCH: u64 = DELINQUENT_VALIDATOR_SLOT_DISTANCE + 1; struct RpcHandler { io: MetaIoHandler, meta: JsonRpcRequestProcessor, bank: Arc, bank_forks: Arc>, blockhash: Hash, alice: Keypair, leader_pubkey: Pubkey, leader_vote_keypair: Arc, block_commitment_cache: Arc>, confirmed_block_signatures: Vec, } fn start_rpc_handler_with_tx(pubkey: &Pubkey) -> RpcHandler { start_rpc_handler_with_tx_and_blockstore(pubkey, vec![]) } fn start_rpc_handler_with_tx_and_blockstore( pubkey: &Pubkey, blockstore_roots: Vec, ) -> RpcHandler { let (bank_forks, alice, leader_vote_keypair) = new_bank_forks(); let bank = bank_forks.read().unwrap().working_bank(); let ledger_path = get_tmp_ledger_path!(); let blockstore = Blockstore::open(&ledger_path).unwrap(); let blockstore = Arc::new(blockstore); let keypair1 = Keypair::new(); let keypair2 = Keypair::new(); let keypair3 = Keypair::new(); bank.transfer(4, &alice, &keypair2.pubkey()).unwrap(); let confirmed_block_signatures = create_test_transactions_and_populate_blockstore( vec![&alice, &keypair1, &keypair2, &keypair3], 0, bank.clone(), blockstore.clone(), ); let mut commitment_slot0 = BlockCommitment::default(); commitment_slot0.increase_confirmation_stake(2, 9); let mut commitment_slot1 = BlockCommitment::default(); commitment_slot1.increase_confirmation_stake(1, 9); let mut block_commitment: HashMap = HashMap::new(); block_commitment.entry(0).or_insert(commitment_slot0); block_commitment.entry(1).or_insert(commitment_slot1); let block_commitment_cache = Arc::new(RwLock::new(BlockCommitmentCache::new( block_commitment, 10, CommitmentSlots::new_from_slot(bank.slot()), ))); let mut roots = blockstore_roots; if !roots.is_empty() { roots.retain(|&x| x > 0); let mut parent_bank = bank; for (i, root) in roots.iter().enumerate() { let new_bank = Bank::new_from_parent(&parent_bank, parent_bank.collector_id(), *root); parent_bank = bank_forks.write().unwrap().insert(new_bank); let parent = if i > 0 { roots[i - 1] } else { 0 }; fill_blockstore_slot_with_ticks(&blockstore, 5, *root, parent, Hash::default()); } blockstore.set_roots(&roots).unwrap(); let new_bank = Bank::new_from_parent( &parent_bank, parent_bank.collector_id(), roots.iter().max().unwrap() + 1, ); bank_forks.write().unwrap().insert(new_bank); for root in roots.iter() { bank_forks .write() .unwrap() .set_root(*root, &ABSRequestSender::default(), Some(0)); let mut stakes = HashMap::new(); stakes.insert(leader_vote_keypair.pubkey(), (1, Account::default())); let block_time = bank_forks .read() .unwrap() .get(*root) .unwrap() .clock() .unix_timestamp; blockstore.cache_block_time(*root, block_time).unwrap(); } } let bank = bank_forks.read().unwrap().working_bank(); let leader_pubkey = *bank.collector_id(); let exit = Arc::new(AtomicBool::new(false)); let validator_exit = create_validator_exit(&exit); let blockhash = bank.confirmed_last_blockhash().0; let tx = system_transaction::transfer(&alice, pubkey, 20, blockhash); bank.process_transaction(&tx).expect("process transaction"); let tx = system_transaction::transfer(&alice, &non_circulating_accounts()[0], 20, blockhash); bank.process_transaction(&tx).expect("process transaction"); let tx = system_transaction::transfer(&alice, pubkey, std::u64::MAX, blockhash); let _ = bank.process_transaction(&tx); let cluster_info = Arc::new(ClusterInfo::default()); let tpu_address = cluster_info.my_contact_info().tpu; cluster_info.insert_info(ContactInfo::new_with_pubkey_socketaddr( &leader_pubkey, &socketaddr!("127.0.0.1:1234"), )); let sample1 = PerfSample { num_slots: 1, num_transactions: 4, sample_period_secs: 60, }; blockstore .write_perf_sample(0, &sample1) .expect("write to blockstore"); let (meta, receiver) = JsonRpcRequestProcessor::new( JsonRpcConfig { enable_rpc_transaction_history: true, identity_pubkey: *pubkey, ..JsonRpcConfig::default() }, bank_forks.clone(), block_commitment_cache.clone(), blockstore, validator_exit, RpcHealth::stub(), cluster_info.clone(), Hash::default(), &runtime::Runtime::new().unwrap(), None, OptimisticallyConfirmedBank::locked_from_bank_forks_root(&bank_forks), ); SendTransactionService::new(tpu_address, &bank_forks, None, receiver); cluster_info.insert_info(ContactInfo::new_with_pubkey_socketaddr( &leader_pubkey, &socketaddr!("127.0.0.1:1234"), )); let mut io = MetaIoHandler::default(); let rpc = RpcSolImpl; io.extend_with(rpc.to_delegate()); RpcHandler { io, meta, bank, bank_forks, blockhash, alice, leader_pubkey, leader_vote_keypair, block_commitment_cache, confirmed_block_signatures, } } #[test] fn test_rpc_request_processor_new() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let genesis = create_genesis_config(100); let bank = Arc::new(Bank::new(&genesis.genesis_config)); bank.transfer(20, &genesis.mint_keypair, &bob_pubkey) .unwrap(); let request_processor = JsonRpcRequestProcessor::new_from_bank(&bank); assert_eq!(request_processor.get_transaction_count(None), 1); } #[test] fn test_rpc_get_balance() { let genesis = create_genesis_config(20); let mint_pubkey = genesis.mint_keypair.pubkey(); let bank = Arc::new(Bank::new(&genesis.genesis_config)); let meta = JsonRpcRequestProcessor::new_from_bank(&bank); let mut io = MetaIoHandler::default(); io.extend_with(RpcSolImpl.to_delegate()); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getBalance","params":["{}"]}}"#, mint_pubkey ); let res = io.handle_request_sync(&req, meta); let expected = json!({ "jsonrpc": "2.0", "result": { "context":{"slot":0}, "value":20, }, "id": 1, }); let result = serde_json::from_str::(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_get_balance_via_client() { let genesis = create_genesis_config(20); let mint_pubkey = genesis.mint_keypair.pubkey(); let bank = Arc::new(Bank::new(&genesis.genesis_config)); let meta = JsonRpcRequestProcessor::new_from_bank(&bank); let mut io = MetaIoHandler::default(); io.extend_with(RpcSolImpl.to_delegate()); let fut = { let (client, server) = local::connect_with_metadata::(&io, meta); client .get_balance(mint_pubkey.to_string(), None) .join(server) }; let (response, _) = fut.wait().unwrap(); assert_eq!(response.value, 20); } #[test] fn test_rpc_get_cluster_nodes() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, leader_pubkey, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getClusterNodes"}"#; let res = io.handle_request_sync(&req, meta); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let expected = format!( r#"{{"jsonrpc":"2.0","result":[{{"pubkey": "{}", "gossip": "127.0.0.1:1235", "tpu": "127.0.0.1:1234", "rpc": "127.0.0.1:{}", "version": null, "featureSet": null}}],"id":1}}"#, leader_pubkey, rpc_port::DEFAULT_RPC_PORT ); let expected: Response = serde_json::from_str(&expected).expect("expected response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_get_recent_performance_samples() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getRecentPerformanceSamples"}"#; let res = io.handle_request_sync(&req, meta); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let expected = json!({ "jsonrpc": "2.0", "id": 1, "result": [ { "slot": 0, "numSlots": 1, "numTransactions": 4, "samplePeriodSecs": 60 } ], }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_get_recent_performance_samples_invalid_limit() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getRecentPerformanceSamples","params":[10000]}"#; let res = io.handle_request_sync(&req, meta); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let expected = json!({ "jsonrpc": "2.0", "error": { "code": -32602, "message": "Invalid limit; max 720" }, "id": 1 }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_get_slot_leader() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, leader_pubkey, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getSlotLeader"}"#; let res = io.handle_request_sync(&req, meta); let expected = format!(r#"{{"jsonrpc":"2.0","result":"{}","id":1}}"#, leader_pubkey); let expected: Response = serde_json::from_str(&expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_get_tx_count() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let genesis = create_genesis_config(10); let bank = Arc::new(Bank::new(&genesis.genesis_config)); // Add 4 transactions bank.transfer(1, &genesis.mint_keypair, &bob_pubkey) .unwrap(); bank.transfer(2, &genesis.mint_keypair, &bob_pubkey) .unwrap(); bank.transfer(3, &genesis.mint_keypair, &bob_pubkey) .unwrap(); bank.transfer(4, &genesis.mint_keypair, &bob_pubkey) .unwrap(); let meta = JsonRpcRequestProcessor::new_from_bank(&bank); let mut io = MetaIoHandler::default(); io.extend_with(RpcSolImpl.to_delegate()); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getTransactionCount"}"#; let res = io.handle_request_sync(&req, meta); let expected = r#"{"jsonrpc":"2.0","result":4,"id":1}"#; let expected: Response = serde_json::from_str(&expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_minimum_ledger_slot() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"minimumLedgerSlot"}"#; let res = io.handle_request_sync(&req, meta); let expected = r#"{"jsonrpc":"2.0","result":0,"id":1}"#; let expected: Response = serde_json::from_str(&expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_get_total_supply() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getTotalSupply"}"#; let rep = io.handle_request_sync(&req, meta); let res: Response = serde_json::from_str(&rep.expect("actual response")) .expect("actual response deserialization"); let supply: u64 = if let Response::Single(res) = res { if let Output::Success(res) = res { if let Value::Number(num) = res.result { num.as_u64().unwrap() } else { panic!("Expected number"); } } else { panic!("Expected success"); } } else { panic!("Expected single response"); }; assert!(supply >= TEST_MINT_LAMPORTS); } #[test] fn test_get_supply() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getSupply"}"#; let res = io.handle_request_sync(&req, meta); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let supply: RpcSupply = serde_json::from_value(json["result"]["value"].clone()) .expect("actual response deserialization"); assert_eq!(supply.non_circulating, 20); assert!(supply.circulating >= TEST_MINT_LAMPORTS); assert!(supply.total >= TEST_MINT_LAMPORTS + 20); let expected_accounts: Vec = non_circulating_accounts() .iter() .map(|pubkey| pubkey.to_string()) .collect(); assert_eq!( supply.non_circulating_accounts.len(), expected_accounts.len() ); for address in supply.non_circulating_accounts { assert!(expected_accounts.contains(&address)); } } #[test] fn test_get_largest_accounts() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, alice, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getLargestAccounts"}"#; let res = io.handle_request_sync(&req, meta.clone()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let largest_accounts: Vec = serde_json::from_value(json["result"]["value"].clone()) .expect("actual response deserialization"); assert_eq!(largest_accounts.len(), 20); // Get Alice balance let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getBalance","params":["{}"]}}"#, alice.pubkey() ); let res = io.handle_request_sync(&req, meta.clone()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let alice_balance: u64 = serde_json::from_value(json["result"]["value"].clone()) .expect("actual response deserialization"); assert!(largest_accounts.contains(&RpcAccountBalance { address: alice.pubkey().to_string(), lamports: alice_balance, })); // Get Bob balance let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getBalance","params":["{}"]}}"#, bob_pubkey ); let res = io.handle_request_sync(&req, meta.clone()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let bob_balance: u64 = serde_json::from_value(json["result"]["value"].clone()) .expect("actual response deserialization"); assert!(largest_accounts.contains(&RpcAccountBalance { address: bob_pubkey.to_string(), lamports: bob_balance, })); // Test Circulating/NonCirculating Filter let req = r#"{"jsonrpc":"2.0","id":1,"method":"getLargestAccounts","params":[{"filter":"circulating"}]}"#; let res = io.handle_request_sync(&req, meta.clone()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let largest_accounts: Vec = serde_json::from_value(json["result"]["value"].clone()) .expect("actual response deserialization"); assert_eq!(largest_accounts.len(), 20); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getLargestAccounts","params":[{"filter":"nonCirculating"}]}"#; let res = io.handle_request_sync(&req, meta); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let largest_accounts: Vec = serde_json::from_value(json["result"]["value"].clone()) .expect("actual response deserialization"); assert_eq!(largest_accounts.len(), 1); } #[test] fn test_rpc_get_minimum_balance_for_rent_exemption() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let data_len = 50; let RpcHandler { io, meta, bank, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getMinimumBalanceForRentExemption","params":[{}]}}"#, data_len ); let rep = io.handle_request_sync(&req, meta); let res: Response = serde_json::from_str(&rep.expect("actual response")) .expect("actual response deserialization"); let minimum_balance: u64 = if let Response::Single(res) = res { if let Output::Success(res) = res { if let Value::Number(num) = res.result { num.as_u64().unwrap() } else { panic!("Expected number"); } } else { panic!("Expected success"); } } else { panic!("Expected single response"); }; assert_eq!( minimum_balance, bank.get_minimum_balance_for_rent_exemption(data_len) ); } #[test] fn test_rpc_get_inflation() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, bank, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getInflationGovernor"}"#; let rep = io.handle_request_sync(&req, meta.clone()); let res: Response = serde_json::from_str(&rep.expect("actual response")) .expect("actual response deserialization"); let inflation_governor: RpcInflationGovernor = if let Response::Single(res) = res { if let Output::Success(res) = res { serde_json::from_value(res.result).unwrap() } else { panic!("Expected success"); } } else { panic!("Expected single response"); }; let expected_inflation_governor: RpcInflationGovernor = bank.inflation().into(); assert_eq!(inflation_governor, expected_inflation_governor); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getInflationRate"}"#; // Queries current epoch let rep = io.handle_request_sync(&req, meta); let res: Response = serde_json::from_str(&rep.expect("actual response")) .expect("actual response deserialization"); let inflation_rate: RpcInflationRate = if let Response::Single(res) = res { if let Output::Success(res) = res { serde_json::from_value(res.result).unwrap() } else { panic!("Expected success"); } } else { panic!("Expected single response"); }; let inflation = bank.inflation(); let epoch = bank.epoch(); let slot_in_year = bank.slot_in_year_for_inflation(); let expected_inflation_rate = RpcInflationRate { total: inflation.total(slot_in_year), validator: inflation.validator(slot_in_year), foundation: inflation.foundation(slot_in_year), epoch, }; assert_eq!(inflation_rate, expected_inflation_rate); } #[test] fn test_rpc_get_epoch_schedule() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, bank, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getEpochSchedule"}"#; let rep = io.handle_request_sync(&req, meta); let res: Response = serde_json::from_str(&rep.expect("actual response")) .expect("actual response deserialization"); let epoch_schedule: EpochSchedule = if let Response::Single(res) = res { if let Output::Success(res) = res { serde_json::from_value(res.result).unwrap() } else { panic!("Expected success"); } } else { panic!("Expected single response"); }; assert_eq!(epoch_schedule, *bank.epoch_schedule()); } #[test] fn test_rpc_get_leader_schedule() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, bank, .. } = start_rpc_handler_with_tx(&bob_pubkey); for req in [ r#"{"jsonrpc":"2.0","id":1,"method":"getLeaderSchedule", "params": [0]}"#, r#"{"jsonrpc":"2.0","id":1,"method":"getLeaderSchedule"}"#, ] .iter() { let rep = io.handle_request_sync(&req, meta.clone()); let res: Response = serde_json::from_str(&rep.expect("actual response")) .expect("actual response deserialization"); let schedule: Option = if let Response::Single(res) = res { if let Output::Success(res) = res { serde_json::from_value(res.result).unwrap() } else { panic!("Expected success for {}", req); } } else { panic!("Expected single response"); }; let schedule = schedule.expect("leader schedule"); let bob_schedule = schedule .get(&bank.collector_id().to_string()) .expect("leader not in the leader schedule"); assert_eq!( bob_schedule.len(), solana_ledger::leader_schedule_utils::leader_schedule(bank.epoch(), &bank) .unwrap() .get_slot_leaders() .len() ); } let req = r#"{"jsonrpc":"2.0","id":1,"method":"getLeaderSchedule", "params": [42424242]}"#; let rep = io.handle_request_sync(&req, meta); let res: Response = serde_json::from_str(&rep.expect("actual response")) .expect("actual response deserialization"); let schedule: Option = if let Response::Single(res) = res { if let Output::Success(res) = res { serde_json::from_value(res.result).unwrap() } else { panic!("Expected success"); } } else { panic!("Expected single response"); }; assert_eq!(schedule, None); } #[test] fn test_rpc_get_account_info() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, bank, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getAccountInfo","params":["{}"]}}"#, bob_pubkey ); let res = io.handle_request_sync(&req, meta.clone()); let expected = json!({ "jsonrpc": "2.0", "result": { "context":{"slot":0}, "value":{ "owner": "11111111111111111111111111111111", "lamports": 20, "data": "", "executable": false, "rentEpoch": 0 }, }, "id": 1, }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); let address = solana_sdk::pubkey::new_rand(); let data = vec![1, 2, 3, 4, 5]; let mut account = Account::new(42, 5, &Pubkey::default()); account.data = data.clone(); bank.store_account(&address, &account); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getAccountInfo","params":["{}", {{"encoding":"base64"}}]}}"#, address ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!( result["result"]["value"]["data"], json!([base64::encode(&data), "base64"]), ); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getAccountInfo","params":["{}", {{"encoding":"base64", "dataSlice": {{"length": 2, "offset": 1}}}}]}}"#, address ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!( result["result"]["value"]["data"], json!([base64::encode(&data[1..3]), "base64"]), ); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getAccountInfo","params":["{}", {{"encoding":"binary", "dataSlice": {{"length": 2, "offset": 1}}}}]}}"#, address ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!( result["result"]["value"]["data"], bs58::encode(&data[1..3]).into_string(), ); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getAccountInfo","params":["{}", {{"encoding":"jsonParsed", "dataSlice": {{"length": 2, "offset": 1}}}}]}}"#, address ); let res = io.handle_request_sync(&req, meta); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); result["error"].as_object().unwrap(); } #[test] fn test_rpc_get_multiple_accounts() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, bank, .. } = start_rpc_handler_with_tx(&bob_pubkey); let address = Pubkey::new(&[9; 32]); let data = vec![1, 2, 3, 4, 5]; let mut account = Account::new(42, 5, &Pubkey::default()); account.data = data.clone(); bank.store_account(&address, &account); let non_existent_address = Pubkey::new(&[8; 32]); // Test 3 accounts, one non-existent, and one with data let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getMultipleAccounts","params":[["{}", "{}", "{}"]]}}"#, bob_pubkey, non_existent_address, address, ); let res = io.handle_request_sync(&req, meta.clone()); let expected = json!({ "jsonrpc": "2.0", "result": { "context":{"slot":0}, "value":[{ "owner": "11111111111111111111111111111111", "lamports": 20, "data": ["", "base64"], "executable": false, "rentEpoch": 0 }, null, { "owner": "11111111111111111111111111111111", "lamports": 42, "data": [base64::encode(&data), "base64"], "executable": false, "rentEpoch": 0 }], }, "id": 1, }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); // Test config settings still work with multiple accounts let req = format!( r#"{{ "jsonrpc":"2.0","id":1,"method":"getMultipleAccounts","params":[ ["{}", "{}", "{}"], {{"encoding":"base58"}} ] }}"#, bob_pubkey, non_existent_address, address, ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(result["result"]["value"].as_array().unwrap().len(), 3); assert_eq!( result["result"]["value"][2]["data"], json!([bs58::encode(&data).into_string(), "base58"]), ); let req = format!( r#"{{ "jsonrpc":"2.0","id":1,"method":"getMultipleAccounts","params":[ ["{}", "{}", "{}"], {{"encoding":"base64", "dataSlice": {{"length": 2, "offset": 1}}}} ] }}"#, bob_pubkey, non_existent_address, address, ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(result["result"]["value"].as_array().unwrap().len(), 3); assert_eq!( result["result"]["value"][2]["data"], json!([base64::encode(&data[1..3]), "base64"]), ); let req = format!( r#"{{ "jsonrpc":"2.0","id":1,"method":"getMultipleAccounts","params":[ ["{}", "{}", "{}"], {{"encoding":"binary", "dataSlice": {{"length": 2, "offset": 1}}}} ] }}"#, bob_pubkey, non_existent_address, address, ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(result["result"]["value"].as_array().unwrap().len(), 3); assert_eq!( result["result"]["value"][2]["data"], bs58::encode(&data[1..3]).into_string(), ); let req = format!( r#"{{ "jsonrpc":"2.0","id":1,"method":"getMultipleAccounts","params":[ ["{}", "{}", "{}"], {{"encoding":"jsonParsed", "dataSlice": {{"length": 2, "offset": 1}}}} ] }}"#, bob_pubkey, non_existent_address, address, ); let res = io.handle_request_sync(&req, meta); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); result["error"].as_object().unwrap(); } #[test] fn test_rpc_get_program_accounts() { let bob = Keypair::new(); let RpcHandler { io, meta, bank, blockhash, alice, .. } = start_rpc_handler_with_tx(&bob.pubkey()); let new_program_id = solana_sdk::pubkey::new_rand(); let tx = system_transaction::assign(&bob, blockhash, &new_program_id); bank.process_transaction(&tx).unwrap(); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getProgramAccounts","params":["{}"]}}"#, new_program_id ); let res = io.handle_request_sync(&req, meta.clone()); let expected = format!( r#"{{ "jsonrpc":"2.0", "result":[ {{ "pubkey": "{}", "account": {{ "owner": "{}", "lamports": 20, "data": "", "executable": false, "rentEpoch": 0 }} }} ], "id":1}} "#, bob.pubkey(), new_program_id ); let expected: Response = serde_json::from_str(&expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); // Set up nonce accounts to test filters let nonce_keypair0 = Keypair::new(); let instruction = system_instruction::create_nonce_account( &alice.pubkey(), &nonce_keypair0.pubkey(), &bob.pubkey(), 100_000, ); let message = Message::new(&instruction, Some(&alice.pubkey())); let tx = Transaction::new(&[&alice, &nonce_keypair0], message, blockhash); bank.process_transaction(&tx).unwrap(); let nonce_keypair1 = Keypair::new(); let authority = solana_sdk::pubkey::new_rand(); let instruction = system_instruction::create_nonce_account( &alice.pubkey(), &nonce_keypair1.pubkey(), &authority, 100_000, ); let message = Message::new(&instruction, Some(&alice.pubkey())); let tx = Transaction::new(&[&alice, &nonce_keypair1], message, blockhash); bank.process_transaction(&tx).unwrap(); // Test memcmp filter; filter on Initialized state let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getProgramAccounts", "params":["{}",{{"filters": [ {{ "memcmp": {{"offset": 4,"bytes": "{}"}} }} ]}}] }}"#, system_program::id(), bs58::encode(vec![1]).into_string(), ); let res = io.handle_request_sync(&req, meta.clone()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let accounts: Vec = serde_json::from_value(json["result"].clone()) .expect("actual response deserialization"); assert_eq!(accounts.len(), 2); let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getProgramAccounts", "params":["{}",{{"filters": [ {{ "memcmp": {{"offset": 0,"bytes": "{}"}} }} ]}}] }}"#, system_program::id(), bs58::encode(vec![1]).into_string(), ); let res = io.handle_request_sync(&req, meta.clone()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let accounts: Vec = serde_json::from_value(json["result"].clone()) .expect("actual response deserialization"); assert_eq!(accounts.len(), 0); // Test dataSize filter let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getProgramAccounts", "params":["{}",{{"filters": [ {{ "dataSize": {} }} ]}}] }}"#, system_program::id(), nonce::State::size(), ); let res = io.handle_request_sync(&req, meta.clone()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let accounts: Vec = serde_json::from_value(json["result"].clone()) .expect("actual response deserialization"); assert_eq!(accounts.len(), 2); let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getProgramAccounts", "params":["{}",{{"filters": [ {{ "dataSize": 1 }} ]}}] }}"#, system_program::id(), ); let res = io.handle_request_sync(&req, meta.clone()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let accounts: Vec = serde_json::from_value(json["result"].clone()) .expect("actual response deserialization"); assert_eq!(accounts.len(), 0); // Test multiple filters let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getProgramAccounts", "params":["{}",{{"filters": [ {{ "memcmp": {{"offset": 4,"bytes": "{}"}} }}, {{ "memcmp": {{"offset": 8,"bytes": "{}"}} }} ]}}] }}"#, system_program::id(), bs58::encode(vec![1]).into_string(), authority, ); // Filter on Initialized and Nonce authority let res = io.handle_request_sync(&req, meta.clone()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let accounts: Vec = serde_json::from_value(json["result"].clone()) .expect("actual response deserialization"); assert_eq!(accounts.len(), 1); let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getProgramAccounts", "params":["{}",{{"filters": [ {{ "memcmp": {{"offset": 4,"bytes": "{}"}} }}, {{ "dataSize": 1 }} ]}}] }}"#, system_program::id(), bs58::encode(vec![1]).into_string(), ); // Filter on Initialized and non-matching data size let res = io.handle_request_sync(&req, meta); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let accounts: Vec = serde_json::from_value(json["result"].clone()) .expect("actual response deserialization"); assert_eq!(accounts.len(), 0); } #[test] fn test_rpc_simulate_transaction() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, blockhash, alice, bank, .. } = start_rpc_handler_with_tx(&bob_pubkey); let mut tx = system_transaction::transfer(&alice, &bob_pubkey, 1234, blockhash); let tx_serialized_encoded = bs58::encode(serialize(&tx).unwrap()).into_string(); tx.signatures[0] = Signature::default(); let tx_badsig_serialized_encoded = bs58::encode(serialize(&tx).unwrap()).into_string(); bank.freeze(); // Ensure the root bank is frozen, `start_rpc_handler_with_tx()` doesn't do this // Good signature with sigVerify=true let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"simulateTransaction","params":["{}", {{"sigVerify": true}}]}}"#, tx_serialized_encoded, ); let res = io.handle_request_sync(&req, meta.clone()); let expected = json!({ "jsonrpc": "2.0", "result": { "context":{"slot":0}, "value":{"err":null, "logs":[ "Program 11111111111111111111111111111111 invoke [1]", "Program 11111111111111111111111111111111 success" ]} }, "id": 1, }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); // Bad signature with sigVerify=true let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"simulateTransaction","params":["{}", {{"sigVerify": true}}]}}"#, tx_badsig_serialized_encoded, ); let res = io.handle_request_sync(&req, meta.clone()); let expected = json!({ "jsonrpc":"2.0", "error": { "code": -32003, "message": "Transaction signature verification failure" }, "id":1 }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); // Bad signature with sigVerify=false let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"simulateTransaction","params":["{}", {{"sigVerify": false}}]}}"#, tx_serialized_encoded, ); let res = io.handle_request_sync(&req, meta.clone()); let expected = json!({ "jsonrpc": "2.0", "result": { "context":{"slot":0}, "value":{"err":null, "logs":[ "Program 11111111111111111111111111111111 invoke [1]", "Program 11111111111111111111111111111111 success" ]} }, "id": 1, }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); // Bad signature with default sigVerify setting (false) let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"simulateTransaction","params":["{}"]}}"#, tx_serialized_encoded, ); let res = io.handle_request_sync(&req, meta); let expected = json!({ "jsonrpc": "2.0", "result": { "context":{"slot":0}, "value":{"err":null, "logs":[ "Program 11111111111111111111111111111111 invoke [1]", "Program 11111111111111111111111111111111 success" ]} }, "id": 1, }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } #[test] #[should_panic] fn test_rpc_simulate_transaction_panic_on_unfrozen_bank() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, blockhash, alice, bank, .. } = start_rpc_handler_with_tx(&bob_pubkey); let tx = system_transaction::transfer(&alice, &bob_pubkey, 1234, blockhash); let tx_serialized_encoded = bs58::encode(serialize(&tx).unwrap()).into_string(); assert!(!bank.is_frozen()); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"simulateTransaction","params":["{}", {{"sigVerify": true}}]}}"#, tx_serialized_encoded, ); // should panic because `bank` is not frozen let _ = io.handle_request_sync(&req, meta); } #[test] fn test_rpc_confirm_tx() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, blockhash, alice, .. } = start_rpc_handler_with_tx(&bob_pubkey); let tx = system_transaction::transfer(&alice, &bob_pubkey, 20, blockhash); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"confirmTransaction","params":["{}"]}}"#, tx.signatures[0] ); let res = io.handle_request_sync(&req, meta); let expected = json!({ "jsonrpc": "2.0", "result": { "context":{"slot":0}, "value":true, }, "id": 1, }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_get_signature_status() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, blockhash, alice, .. } = start_rpc_handler_with_tx(&bob_pubkey); let tx = system_transaction::transfer(&alice, &bob_pubkey, 20, blockhash); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getSignatureStatus","params":["{}"]}}"#, tx.signatures[0] ); let res = io.handle_request_sync(&req, meta.clone()); let expected_res: Option> = Some(Ok(())); let expected = json!({ "jsonrpc": "2.0", "result": expected_res, "id": 1 }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); // Test getSignatureStatus request on unprocessed tx let tx = system_transaction::transfer(&alice, &bob_pubkey, 10, blockhash); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getSignatureStatus","params":["{}"]}}"#, tx.signatures[0] ); let res = io.handle_request_sync(&req, meta.clone()); let expected_res: Option = None; let expected = json!({ "jsonrpc": "2.0", "result": expected_res, "id": 1 }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); // Test getSignatureStatus request on a TransactionError let tx = system_transaction::transfer(&alice, &bob_pubkey, std::u64::MAX, blockhash); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getSignatureStatus","params":["{}"]}}"#, tx.signatures[0] ); let res = io.handle_request_sync(&req, meta); let expected_res: Option> = Some(Err( TransactionError::InstructionError(0, InstructionError::Custom(1)), )); let expected = json!({ "jsonrpc": "2.0", "result": expected_res, "id": 1 }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_get_signature_statuses() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, blockhash, alice, confirmed_block_signatures, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getSignatureStatuses","params":[["{}"]]}}"#, confirmed_block_signatures[0] ); let res = io.handle_request_sync(&req, meta.clone()); let expected_res: transaction::Result<()> = Ok(()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let result: Option = serde_json::from_value(json["result"]["value"][0].clone()) .expect("actual response deserialization"); let result = result.as_ref().unwrap(); assert_eq!(expected_res, result.status); assert_eq!(None, result.confirmations); // Test getSignatureStatus request on unprocessed tx let tx = system_transaction::transfer(&alice, &bob_pubkey, 10, blockhash); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getSignatureStatuses","params":[["{}"]]}}"#, tx.signatures[0] ); let res = io.handle_request_sync(&req, meta.clone()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let result: Option = serde_json::from_value(json["result"]["value"][0].clone()) .expect("actual response deserialization"); assert!(result.is_none()); // Test getSignatureStatus request on a TransactionError let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getSignatureStatuses","params":[["{}"]]}}"#, confirmed_block_signatures[1] ); let res = io.handle_request_sync(&req, meta); let expected_res: transaction::Result<()> = Err(TransactionError::InstructionError( 0, InstructionError::Custom(1), )); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let result: Option = serde_json::from_value(json["result"]["value"][0].clone()) .expect("actual response deserialization"); assert_eq!(expected_res, result.as_ref().unwrap().status); } #[test] fn test_rpc_get_recent_blockhash() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, blockhash, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getRecentBlockhash"}"#; let res = io.handle_request_sync(&req, meta); let expected = json!({ "jsonrpc": "2.0", "result": { "context":{"slot":0}, "value":{ "blockhash": blockhash.to_string(), "feeCalculator": { "lamportsPerSignature": 0, } }}, "id": 1 }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_get_fees() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, blockhash, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getFees"}"#; let res = io.handle_request_sync(&req, meta); let expected = json!({ "jsonrpc": "2.0", "result": { "context":{"slot":0}, "value":{ "blockhash": blockhash.to_string(), "feeCalculator": { "lamportsPerSignature": 0, }, "lastValidSlot": MAX_RECENT_BLOCKHASHES, }}, "id": 1 }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_get_fee_calculator_for_blockhash() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, bank, .. } = start_rpc_handler_with_tx(&bob_pubkey); let (blockhash, fee_calculator) = bank.last_blockhash_with_fee_calculator(); let fee_calculator = RpcFeeCalculator { fee_calculator }; let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getFeeCalculatorForBlockhash","params":["{:?}"]}}"#, blockhash ); let res = io.handle_request_sync(&req, meta.clone()); let expected = json!({ "jsonrpc": "2.0", "result": { "context":{"slot":0}, "value":fee_calculator, }, "id": 1 }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); // Expired (non-existent) blockhash let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getFeeCalculatorForBlockhash","params":["{:?}"]}}"#, Hash::default() ); let res = io.handle_request_sync(&req, meta); let expected = json!({ "jsonrpc": "2.0", "result": { "context":{"slot":0}, "value":Value::Null, }, "id": 1 }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_get_fee_rate_governor() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getFeeRateGovernor"}"#; let res = io.handle_request_sync(&req, meta); let expected = json!({ "jsonrpc": "2.0", "result": { "context":{"slot":0}, "value":{ "feeRateGovernor": { "burnPercent": DEFAULT_BURN_PERCENT, "maxLamportsPerSignature": 0, "minLamportsPerSignature": 0, "targetLamportsPerSignature": 0, "targetSignaturesPerSlot": 0 } }}, "id": 1 }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_fail_request_airdrop() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, .. } = start_rpc_handler_with_tx(&bob_pubkey); // Expect internal error because no faucet is available let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"requestAirdrop","params":["{}", 50]}}"#, bob_pubkey ); let res = io.handle_request_sync(&req, meta); let expected = r#"{"jsonrpc":"2.0","error":{"code":-32600,"message":"Invalid request"},"id":1}"#; let expected: Response = serde_json::from_str(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_send_bad_tx() { let genesis = create_genesis_config(100); let bank = Arc::new(Bank::new(&genesis.genesis_config)); let meta = JsonRpcRequestProcessor::new_from_bank(&bank); let mut io = MetaIoHandler::default(); let rpc = RpcSolImpl; io.extend_with(rpc.to_delegate()); let req = r#"{"jsonrpc":"2.0","id":1,"method":"sendTransaction","params":["37u9WtQpcm6ULa3Vmu7ySnANv"]}"#; let res = io.handle_request_sync(req, meta); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let error = &json["error"]; assert_eq!(error["code"], ErrorCode::InvalidParams.code()); } #[test] fn test_rpc_send_transaction_preflight() { let exit = Arc::new(AtomicBool::new(false)); let validator_exit = create_validator_exit(&exit); let ledger_path = get_tmp_ledger_path!(); let blockstore = Arc::new(Blockstore::open(&ledger_path).unwrap()); let block_commitment_cache = Arc::new(RwLock::new(BlockCommitmentCache::default())); let (bank_forks, mint_keypair, ..) = new_bank_forks(); let health = RpcHealth::stub(); // Freeze bank 0 to prevent a panic in `run_transaction_simulation()` bank_forks.write().unwrap().get(0).unwrap().freeze(); let mut io = MetaIoHandler::default(); let rpc = RpcSolImpl; io.extend_with(rpc.to_delegate()); let cluster_info = Arc::new(ClusterInfo::new_with_invalid_keypair( ContactInfo::new_with_socketaddr(&socketaddr!("127.0.0.1:1234")), )); let tpu_address = cluster_info.my_contact_info().tpu; let (meta, receiver) = JsonRpcRequestProcessor::new( JsonRpcConfig::default(), bank_forks.clone(), block_commitment_cache, blockstore, validator_exit, health.clone(), cluster_info, Hash::default(), &runtime::Runtime::new().unwrap(), None, OptimisticallyConfirmedBank::locked_from_bank_forks_root(&bank_forks), ); SendTransactionService::new(tpu_address, &bank_forks, None, receiver); let mut bad_transaction = system_transaction::transfer( &mint_keypair, &solana_sdk::pubkey::new_rand(), 42, Hash::default(), ); // sendTransaction will fail because the blockhash is invalid let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"sendTransaction","params":["{}"]}}"#, bs58::encode(serialize(&bad_transaction).unwrap()).into_string() ); let res = io.handle_request_sync(&req, meta.clone()); assert_eq!( res, Some( r#"{"jsonrpc":"2.0","error":{"code":-32002,"message":"Transaction simulation failed: Blockhash not found","data":{"err":"BlockhashNotFound","logs":[]}},"id":1}"#.to_string(), ) ); // sendTransaction will fail due to insanity bad_transaction.message.instructions[0].program_id_index = 0u8; let recent_blockhash = bank_forks.read().unwrap().root_bank().last_blockhash(); bad_transaction.sign(&[&mint_keypair], recent_blockhash); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"sendTransaction","params":["{}"]}}"#, bs58::encode(serialize(&bad_transaction).unwrap()).into_string() ); let res = io.handle_request_sync(&req, meta.clone()); assert_eq!( res, Some( r#"{"jsonrpc":"2.0","error":{"code":-32002,"message":"Transaction simulation failed: Transaction failed to sanitize accounts offsets correctly","data":{"err":"SanitizeFailure","logs":[]}},"id":1}"#.to_string(), ) ); let mut bad_transaction = system_transaction::transfer( &mint_keypair, &solana_sdk::pubkey::new_rand(), 42, recent_blockhash, ); // sendTransaction will fail due to poor node health health.stub_set_health_status(Some(RpcHealthStatus::Behind)); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"sendTransaction","params":["{}"]}}"#, bs58::encode(serialize(&bad_transaction).unwrap()).into_string() ); let res = io.handle_request_sync(&req, meta.clone()); assert_eq!( res, Some( r#"{"jsonrpc":"2.0","error":{"code":-32005,"message":"RPC node is unhealthy"},"id":1}"#.to_string(), ) ); health.stub_set_health_status(None); // sendTransaction will fail due to invalid signature bad_transaction.signatures[0] = Signature::default(); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"sendTransaction","params":["{}"]}}"#, bs58::encode(serialize(&bad_transaction).unwrap()).into_string() ); let res = io.handle_request_sync(&req, meta.clone()); assert_eq!( res, Some( r#"{"jsonrpc":"2.0","error":{"code":-32003,"message":"Transaction signature verification failure"},"id":1}"#.to_string(), ) ); // sendTransaction will now succeed because skipPreflight=true even though it's a bad // transaction let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"sendTransaction","params":["{}", {{"skipPreflight": true}}]}}"#, bs58::encode(serialize(&bad_transaction).unwrap()).into_string() ); let res = io.handle_request_sync(&req, meta.clone()); assert_eq!( res, Some( r#"{"jsonrpc":"2.0","result":"1111111111111111111111111111111111111111111111111111111111111111","id":1}"#.to_string(), ) ); // sendTransaction will fail due to no signer. Skip preflight so signature verification // doesn't catch it bad_transaction.signatures.clear(); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"sendTransaction","params":["{}", {{"skipPreflight": true}}]}}"#, bs58::encode(serialize(&bad_transaction).unwrap()).into_string() ); let res = io.handle_request_sync(&req, meta); assert_eq!( res, Some( r#"{"jsonrpc":"2.0","error":{"code":-32003,"message":"Transaction signature verification failure"},"id":1}"#.to_string(), ) ); } #[test] fn test_rpc_verify_filter() { let filter = RpcFilterType::Memcmp(Memcmp { offset: 0, bytes: MemcmpEncodedBytes::Binary( "13LeFbG6m2EP1fqCj9k66fcXsoTHMMtgr7c78AivUrYD".to_string(), ), encoding: None, }); assert_eq!(verify_filter(&filter), Ok(())); // Invalid base-58 let filter = RpcFilterType::Memcmp(Memcmp { offset: 0, bytes: MemcmpEncodedBytes::Binary("III".to_string()), encoding: None, }); assert!(verify_filter(&filter).is_err()); } #[test] fn test_rpc_verify_pubkey() { let pubkey = solana_sdk::pubkey::new_rand(); assert_eq!(verify_pubkey(pubkey.to_string()).unwrap(), pubkey); let bad_pubkey = "a1b2c3d4"; assert_eq!( verify_pubkey(bad_pubkey.to_string()), Err(Error::invalid_params("Invalid param: WrongSize")) ); } #[test] fn test_rpc_verify_signature() { let tx = system_transaction::transfer( &Keypair::new(), &solana_sdk::pubkey::new_rand(), 20, hash(&[0]), ); assert_eq!( verify_signature(&tx.signatures[0].to_string()).unwrap(), tx.signatures[0] ); let bad_signature = "a1b2c3d4"; assert_eq!( verify_signature(&bad_signature.to_string()), Err(Error::invalid_params("Invalid param: WrongSize")) ); } fn new_bank_forks() -> (Arc>, Keypair, Arc) { let GenesisConfigInfo { mut genesis_config, mint_keypair, voting_keypair, } = create_genesis_config(TEST_MINT_LAMPORTS); genesis_config.rent.lamports_per_byte_year = 50; genesis_config.rent.exemption_threshold = 2.0; genesis_config.epoch_schedule = EpochSchedule::custom(TEST_SLOTS_PER_EPOCH, TEST_SLOTS_PER_EPOCH, false); let bank = Bank::new(&genesis_config); ( Arc::new(RwLock::new(BankForks::new(bank))), mint_keypair, Arc::new(voting_keypair), ) } #[test] fn test_rpc_request_processor_config_default_trait_validator_exit_fails() { let exit = Arc::new(AtomicBool::new(false)); let validator_exit = create_validator_exit(&exit); let ledger_path = get_tmp_ledger_path!(); let blockstore = Arc::new(Blockstore::open(&ledger_path).unwrap()); let block_commitment_cache = Arc::new(RwLock::new(BlockCommitmentCache::default())); let cluster_info = Arc::new(ClusterInfo::default()); let tpu_address = cluster_info.my_contact_info().tpu; let bank_forks = new_bank_forks().0; let (request_processor, receiver) = JsonRpcRequestProcessor::new( JsonRpcConfig::default(), bank_forks.clone(), block_commitment_cache, blockstore, validator_exit, RpcHealth::stub(), cluster_info, Hash::default(), &runtime::Runtime::new().unwrap(), None, OptimisticallyConfirmedBank::locked_from_bank_forks_root(&bank_forks), ); SendTransactionService::new(tpu_address, &bank_forks, None, receiver); assert_eq!(request_processor.validator_exit(), false); assert_eq!(exit.load(Ordering::Relaxed), false); } #[test] fn test_rpc_request_processor_allow_validator_exit_config() { let exit = Arc::new(AtomicBool::new(false)); let validator_exit = create_validator_exit(&exit); let ledger_path = get_tmp_ledger_path!(); let blockstore = Arc::new(Blockstore::open(&ledger_path).unwrap()); let block_commitment_cache = Arc::new(RwLock::new(BlockCommitmentCache::default())); let mut config = JsonRpcConfig::default(); config.enable_validator_exit = true; let bank_forks = new_bank_forks().0; let cluster_info = Arc::new(ClusterInfo::default()); let tpu_address = cluster_info.my_contact_info().tpu; let (request_processor, receiver) = JsonRpcRequestProcessor::new( config, bank_forks.clone(), block_commitment_cache, blockstore, validator_exit, RpcHealth::stub(), cluster_info, Hash::default(), &runtime::Runtime::new().unwrap(), None, OptimisticallyConfirmedBank::locked_from_bank_forks_root(&bank_forks), ); SendTransactionService::new(tpu_address, &bank_forks, None, receiver); assert_eq!(request_processor.validator_exit(), true); assert_eq!(exit.load(Ordering::Relaxed), true); } #[test] fn test_rpc_get_identity() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getIdentity"}"#; let res = io.handle_request_sync(&req, meta); let expected = json!({ "jsonrpc": "2.0", "result": { "identity": bob_pubkey.to_string() }, "id": 1 }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_get_version() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getVersion"}"#; let res = io.handle_request_sync(&req, meta); let version = solana_version::Version::default(); let expected = json!({ "jsonrpc": "2.0", "result": { "solana-core": version.to_string(), "feature-set": version.feature_set, }, "id": 1 }); let expected: Response = serde_json::from_value(expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } #[test] fn test_rpc_processor_get_block_commitment() { let exit = Arc::new(AtomicBool::new(false)); let validator_exit = create_validator_exit(&exit); let bank_forks = new_bank_forks().0; let ledger_path = get_tmp_ledger_path!(); let blockstore = Arc::new(Blockstore::open(&ledger_path).unwrap()); let commitment_slot0 = BlockCommitment::new([8; MAX_LOCKOUT_HISTORY + 1]); let commitment_slot1 = BlockCommitment::new([9; MAX_LOCKOUT_HISTORY + 1]); let mut block_commitment: HashMap = HashMap::new(); block_commitment .entry(0) .or_insert_with(|| commitment_slot0.clone()); block_commitment .entry(1) .or_insert_with(|| commitment_slot1.clone()); let block_commitment_cache = Arc::new(RwLock::new(BlockCommitmentCache::new( block_commitment, 42, CommitmentSlots::new_from_slot(bank_forks.read().unwrap().highest_slot()), ))); let mut config = JsonRpcConfig::default(); config.enable_validator_exit = true; let cluster_info = Arc::new(ClusterInfo::default()); let tpu_address = cluster_info.my_contact_info().tpu; let (request_processor, receiver) = JsonRpcRequestProcessor::new( config, bank_forks.clone(), block_commitment_cache, blockstore, validator_exit, RpcHealth::stub(), cluster_info, Hash::default(), &runtime::Runtime::new().unwrap(), None, OptimisticallyConfirmedBank::locked_from_bank_forks_root(&bank_forks), ); SendTransactionService::new(tpu_address, &bank_forks, None, receiver); assert_eq!( request_processor.get_block_commitment(0), RpcBlockCommitment { commitment: Some(commitment_slot0.commitment), total_stake: 42, } ); assert_eq!( request_processor.get_block_commitment(1), RpcBlockCommitment { commitment: Some(commitment_slot1.commitment), total_stake: 42, } ); assert_eq!( request_processor.get_block_commitment(2), RpcBlockCommitment { commitment: None, total_stake: 42, } ); } #[test] fn test_rpc_get_block_commitment() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, block_commitment_cache, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getBlockCommitment","params":[0]}"#; let res = io.handle_request_sync(&req, meta.clone()); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let RpcBlockCommitment { commitment, total_stake, } = if let Response::Single(res) = result { if let Output::Success(res) = res { serde_json::from_value(res.result).unwrap() } else { panic!("Expected success"); } } else { panic!("Expected single response"); }; assert_eq!( commitment, block_commitment_cache .read() .unwrap() .get_block_commitment(0) .map(|block_commitment| block_commitment.commitment) ); assert_eq!(total_stake, 10); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getBlockCommitment","params":[2]}"#; let res = io.handle_request_sync(&req, meta); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let commitment_response: RpcBlockCommitment = if let Response::Single(res) = result { if let Output::Success(res) = res { serde_json::from_value(res.result).unwrap() } else { panic!("Expected success"); } } else { panic!("Expected single response"); }; assert_eq!(commitment_response.commitment, None); assert_eq!(commitment_response.total_stake, 10); } #[test] fn test_get_confirmed_block() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, confirmed_block_signatures, blockhash, .. } = start_rpc_handler_with_tx(&bob_pubkey); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlock","params":[0]}"#; let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let confirmed_block: Option = serde_json::from_value(result["result"].clone()).unwrap(); let confirmed_block = confirmed_block.unwrap(); assert_eq!(confirmed_block.transactions.len(), 3); for EncodedTransactionWithStatusMeta { transaction, meta } in confirmed_block.transactions.into_iter() { if let EncodedTransaction::Json(transaction) = transaction { if transaction.signatures[0] == confirmed_block_signatures[0].to_string() { let meta = meta.unwrap(); let transaction_recent_blockhash = match transaction.message { UiMessage::Parsed(message) => message.recent_blockhash, UiMessage::Raw(message) => message.recent_blockhash, }; assert_eq!(transaction_recent_blockhash, blockhash.to_string()); assert_eq!(meta.status, Ok(())); assert_eq!(meta.err, None); } else if transaction.signatures[0] == confirmed_block_signatures[1].to_string() { let meta = meta.unwrap(); assert_eq!( meta.err, Some(TransactionError::InstructionError( 0, InstructionError::Custom(1) )) ); assert_eq!( meta.status, Err(TransactionError::InstructionError( 0, InstructionError::Custom(1) )) ); } else { assert_eq!(meta, None); } } } let req = r#"{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlock","params":[0,"binary"]}"#; let res = io.handle_request_sync(&req, meta); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let confirmed_block: Option = serde_json::from_value(result["result"].clone()).unwrap(); let confirmed_block = confirmed_block.unwrap(); assert_eq!(confirmed_block.transactions.len(), 3); for EncodedTransactionWithStatusMeta { transaction, meta } in confirmed_block.transactions.into_iter() { if let EncodedTransaction::LegacyBinary(transaction) = transaction { let decoded_transaction: Transaction = deserialize(&bs58::decode(&transaction).into_vec().unwrap()).unwrap(); if decoded_transaction.signatures[0] == confirmed_block_signatures[0] { let meta = meta.unwrap(); assert_eq!(decoded_transaction.message.recent_blockhash, blockhash); assert_eq!(meta.status, Ok(())); assert_eq!(meta.err, None); } else if decoded_transaction.signatures[0] == confirmed_block_signatures[1] { let meta = meta.unwrap(); assert_eq!( meta.err, Some(TransactionError::InstructionError( 0, InstructionError::Custom(1) )) ); assert_eq!( meta.status, Err(TransactionError::InstructionError( 0, InstructionError::Custom(1) )) ); } else { assert_eq!(meta, None); } } } } #[test] fn test_get_confirmed_blocks() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let roots = vec![0, 1, 3, 4, 8]; let RpcHandler { io, meta, block_commitment_cache, .. } = start_rpc_handler_with_tx_and_blockstore(&bob_pubkey, roots.clone()); block_commitment_cache .write() .unwrap() .set_highest_confirmed_root(8); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlocks","params":[0]}"#; let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let confirmed_blocks: Vec = serde_json::from_value(result["result"].clone()).unwrap(); assert_eq!(confirmed_blocks, roots[1..].to_vec()); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlocks","params":[2]}"#; let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let confirmed_blocks: Vec = serde_json::from_value(result["result"].clone()).unwrap(); assert_eq!(confirmed_blocks, vec![3, 4, 8]); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlocks","params":[0,4]}"#; let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let confirmed_blocks: Vec = serde_json::from_value(result["result"].clone()).unwrap(); assert_eq!(confirmed_blocks, vec![1, 3, 4]); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlocks","params":[0,7]}"#; let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let confirmed_blocks: Vec = serde_json::from_value(result["result"].clone()).unwrap(); assert_eq!(confirmed_blocks, vec![1, 3, 4]); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlocks","params":[9,11]}"#; let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let confirmed_blocks: Vec = serde_json::from_value(result["result"].clone()).unwrap(); assert_eq!(confirmed_blocks, Vec::::new()); block_commitment_cache .write() .unwrap() .set_highest_confirmed_root(std::u64::MAX); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlocks","params":[0,{}]}}"#, MAX_GET_CONFIRMED_BLOCKS_RANGE ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let confirmed_blocks: Vec = serde_json::from_value(result["result"].clone()).unwrap(); assert_eq!(confirmed_blocks, vec![1, 3, 4, 8]); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlocks","params":[0,{}]}}"#, MAX_GET_CONFIRMED_BLOCKS_RANGE + 1 ); let res = io.handle_request_sync(&req, meta); assert_eq!( res, Some( r#"{"jsonrpc":"2.0","error":{"code":-32602,"message":"Slot range too large; max 500000"},"id":1}"#.to_string(), ) ); } #[test] fn test_get_confirmed_blocks_with_limit() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let roots = vec![0, 1, 3, 4, 8]; let RpcHandler { io, meta, block_commitment_cache, .. } = start_rpc_handler_with_tx_and_blockstore(&bob_pubkey, roots); block_commitment_cache .write() .unwrap() .set_highest_confirmed_root(8); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlocksWithLimit","params":[0,500001]}"#; let res = io.handle_request_sync(&req, meta.clone()); assert_eq!( res, Some( r#"{"jsonrpc":"2.0","error":{"code":-32602,"message":"Limit too large; max 500000"},"id":1}"#.to_string(), ) ); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlocksWithLimit","params":[0,0]}"#; let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let confirmed_blocks: Vec = serde_json::from_value(result["result"].clone()).unwrap(); assert!(confirmed_blocks.is_empty()); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlocksWithLimit","params":[2,2]}"#; let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let confirmed_blocks: Vec = serde_json::from_value(result["result"].clone()).unwrap(); assert_eq!(confirmed_blocks, vec![3, 4]); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlocksWithLimit","params":[2,3]}"#; let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let confirmed_blocks: Vec = serde_json::from_value(result["result"].clone()).unwrap(); assert_eq!(confirmed_blocks, vec![3, 4, 8]); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlocksWithLimit","params":[2,500000]}"#; let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let confirmed_blocks: Vec = serde_json::from_value(result["result"].clone()).unwrap(); assert_eq!(confirmed_blocks, vec![3, 4, 8]); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getConfirmedBlocksWithLimit","params":[9,500000]}"#; let res = io.handle_request_sync(&req, meta); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let confirmed_blocks: Vec = serde_json::from_value(result["result"].clone()).unwrap(); assert_eq!(confirmed_blocks, Vec::::new()); } #[test] fn test_get_block_time() { let bob_pubkey = solana_sdk::pubkey::new_rand(); let RpcHandler { io, meta, bank, block_commitment_cache, bank_forks, .. } = start_rpc_handler_with_tx_and_blockstore(&bob_pubkey, vec![1, 2, 3, 4, 5, 6, 7]); let base_timestamp = bank_forks .read() .unwrap() .get(0) .unwrap() .unix_timestamp_from_genesis(); block_commitment_cache .write() .unwrap() .set_highest_confirmed_root(7); let slot_duration = slot_duration_from_slots_per_year(bank.slots_per_year()); let slot = 2; let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getBlockTime","params":[{}]}}"#, slot ); let res = io.handle_request_sync(&req, meta.clone()); let expected = format!(r#"{{"jsonrpc":"2.0","result":{},"id":1}}"#, base_timestamp); let expected: Response = serde_json::from_str(&expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); let slot = 7; let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getBlockTime","params":[{}]}}"#, slot ); let res = io.handle_request_sync(&req, meta.clone()); let expected = format!( r#"{{"jsonrpc":"2.0","result":{},"id":1}}"#, base_timestamp + (5 * slot_duration).as_secs() as i64 ); let expected: Response = serde_json::from_str(&expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); let slot = 12345; let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getBlockTime","params":[{}]}}"#, slot ); let res = io.handle_request_sync(&req, meta); let expected = r#"{"jsonrpc":"2.0","error":{"code":-32004,"message":"Block not available for slot 12345"},"id":1}"#; let expected: Response = serde_json::from_str(&expected).expect("expected response deserialization"); let result: Response = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!(expected, result); } fn advance_block_commitment_cache( block_commitment_cache: &Arc>, bank_forks: &Arc>, ) { let mut new_block_commitment = BlockCommitmentCache::new( HashMap::new(), 0, CommitmentSlots::new_from_slot(bank_forks.read().unwrap().highest_slot()), ); let mut w_block_commitment_cache = block_commitment_cache.write().unwrap(); std::mem::swap(&mut *w_block_commitment_cache, &mut new_block_commitment); } #[test] fn test_get_vote_accounts() { let RpcHandler { io, meta, mut bank, bank_forks, alice, leader_vote_keypair, block_commitment_cache, .. } = start_rpc_handler_with_tx(&solana_sdk::pubkey::new_rand()); assert_eq!(bank.vote_accounts().len(), 1); // Create a vote account with no stake. let alice_vote_keypair = Keypair::new(); let instructions = vote_instruction::create_account( &alice.pubkey(), &alice_vote_keypair.pubkey(), &VoteInit { node_pubkey: alice.pubkey(), authorized_voter: alice_vote_keypair.pubkey(), authorized_withdrawer: alice_vote_keypair.pubkey(), commission: 0, }, bank.get_minimum_balance_for_rent_exemption(VoteState::size_of()), ); let message = Message::new(&instructions, Some(&alice.pubkey())); let transaction = Transaction::new( &[&alice, &alice_vote_keypair], message, bank.last_blockhash(), ); bank.process_transaction(&transaction) .expect("process transaction"); assert_eq!(bank.vote_accounts().len(), 2); // Check getVoteAccounts: the bootstrap validator vote account will be delinquent as it has // stake but has never voted, and the vote account with no stake should not be present. { let req = r#"{"jsonrpc":"2.0","id":1,"method":"getVoteAccounts"}"#; let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let vote_account_status: RpcVoteAccountStatus = serde_json::from_value(result["result"].clone()).unwrap(); assert!(vote_account_status.current.is_empty()); assert_eq!(vote_account_status.delinquent.len(), 1); for vote_account_info in vote_account_status.delinquent { assert_ne!(vote_account_info.activated_stake, 0); } } // Advance bank to the next epoch for _ in 0..TEST_SLOTS_PER_EPOCH { bank.freeze(); // Votes let instructions = [ vote_instruction::vote( &leader_vote_keypair.pubkey(), &leader_vote_keypair.pubkey(), Vote { slots: vec![bank.slot()], hash: bank.hash(), timestamp: None, }, ), vote_instruction::vote( &alice_vote_keypair.pubkey(), &alice_vote_keypair.pubkey(), Vote { slots: vec![bank.slot()], hash: bank.hash(), timestamp: None, }, ), ]; bank = bank_forks.write().unwrap().insert(Bank::new_from_parent( &bank, &Pubkey::default(), bank.slot() + 1, )); advance_block_commitment_cache(&block_commitment_cache, &bank_forks); let transaction = Transaction::new_signed_with_payer( &instructions, Some(&alice.pubkey()), &[&alice, &leader_vote_keypair, &alice_vote_keypair], bank.last_blockhash(), ); bank.process_transaction(&transaction) .expect("process transaction"); } let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getVoteAccounts","params":{}}}"#, json!([CommitmentConfig::recent()]) ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let vote_account_status: RpcVoteAccountStatus = serde_json::from_value(result["result"].clone()).unwrap(); // The vote account with no stake should not be present. assert!(vote_account_status.delinquent.is_empty()); // Both accounts should be active and have voting history. assert_eq!(vote_account_status.current.len(), 2); //let leader_info = &vote_account_status.current[0]; let leader_info = vote_account_status .current .iter() .find(|x| x.vote_pubkey == leader_vote_keypair.pubkey().to_string()) .unwrap(); assert_ne!(leader_info.activated_stake, 0); // Subtract one because the last vote always carries over to the next epoch let expected_credits = TEST_SLOTS_PER_EPOCH - MAX_LOCKOUT_HISTORY as u64 - 1; assert_eq!( leader_info.epoch_credits, vec![ (0, expected_credits, 0), (1, expected_credits + 1, expected_credits) // one vote in current epoch ] ); // Advance bank with no voting bank.freeze(); bank_forks.write().unwrap().insert(Bank::new_from_parent( &bank, &Pubkey::default(), bank.slot() + TEST_SLOTS_PER_EPOCH, )); advance_block_commitment_cache(&block_commitment_cache, &bank_forks); // The leader vote account should now be delinquent, and the other vote account disappears // because it's inactive with no stake { let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getVoteAccounts","params":{}}}"#, json!([CommitmentConfig::recent()]) ); let res = io.handle_request_sync(&req, meta); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let vote_account_status: RpcVoteAccountStatus = serde_json::from_value(result["result"].clone()).unwrap(); assert!(vote_account_status.current.is_empty()); assert_eq!(vote_account_status.delinquent.len(), 1); for vote_account_info in vote_account_status.delinquent { assert_eq!( vote_account_info.vote_pubkey, leader_vote_keypair.pubkey().to_string() ); } } } #[test] fn test_is_confirmed_rooted() { let bank = Arc::new(Bank::default()); let ledger_path = get_tmp_ledger_path!(); let blockstore = Arc::new(Blockstore::open(&ledger_path).unwrap()); blockstore.set_roots(&[0, 1]).unwrap(); // Build BlockCommitmentCache with rooted slots let mut cache0 = BlockCommitment::default(); cache0.increase_rooted_stake(50); let mut cache1 = BlockCommitment::default(); cache1.increase_rooted_stake(40); let mut cache2 = BlockCommitment::default(); cache2.increase_rooted_stake(20); let mut block_commitment = HashMap::new(); block_commitment.entry(1).or_insert(cache0); block_commitment.entry(2).or_insert(cache1); block_commitment.entry(3).or_insert(cache2); let highest_confirmed_root = 1; let block_commitment_cache = BlockCommitmentCache::new( block_commitment, 50, CommitmentSlots { slot: bank.slot(), highest_confirmed_root, ..CommitmentSlots::default() }, ); assert!(is_confirmed_rooted( &block_commitment_cache, &bank, &blockstore, 0 )); assert!(is_confirmed_rooted( &block_commitment_cache, &bank, &blockstore, 1 )); assert!(!is_confirmed_rooted( &block_commitment_cache, &bank, &blockstore, 2 )); assert!(!is_confirmed_rooted( &block_commitment_cache, &bank, &blockstore, 3 )); } #[test] fn test_token_rpcs() { let RpcHandler { io, meta, bank, .. } = start_rpc_handler_with_tx(&solana_sdk::pubkey::new_rand()); let mut account_data = vec![0; TokenAccount::get_packed_len()]; let mint = SplTokenPubkey::new(&[2; 32]); let owner = SplTokenPubkey::new(&[3; 32]); let delegate = SplTokenPubkey::new(&[4; 32]); let token_account = TokenAccount { mint, owner, delegate: COption::Some(delegate), amount: 420, state: TokenAccountState::Initialized, is_native: COption::None, delegated_amount: 30, close_authority: COption::Some(owner), }; TokenAccount::pack(token_account, &mut account_data).unwrap(); let token_account = Account { lamports: 111, data: account_data.to_vec(), owner: spl_token_id_v2_0(), ..Account::default() }; let token_account_pubkey = solana_sdk::pubkey::new_rand(); bank.store_account(&token_account_pubkey, &token_account); // Add the mint let mut mint_data = vec![0; Mint::get_packed_len()]; let mint_state = Mint { mint_authority: COption::Some(owner), supply: 500, decimals: 2, is_initialized: true, freeze_authority: COption::Some(owner), }; Mint::pack(mint_state, &mut mint_data).unwrap(); let mint_account = Account { lamports: 111, data: mint_data.to_vec(), owner: spl_token_id_v2_0(), ..Account::default() }; bank.store_account(&Pubkey::from_str(&mint.to_string()).unwrap(), &mint_account); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getTokenAccountBalance","params":["{}"]}}"#, token_account_pubkey, ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let balance: UiTokenAmount = serde_json::from_value(result["result"]["value"].clone()).unwrap(); let error = f64::EPSILON; assert!((balance.ui_amount - 4.2).abs() < error); assert_eq!(balance.amount, 420.to_string()); assert_eq!(balance.decimals, 2); // Test non-existent token account let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getTokenAccountBalance","params":["{}"]}}"#, solana_sdk::pubkey::new_rand(), ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert!(result.get("error").is_some()); // Test get token supply, pulls supply from mint let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getTokenSupply","params":["{}"]}}"#, mint, ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let supply: UiTokenAmount = serde_json::from_value(result["result"]["value"].clone()).unwrap(); let error = f64::EPSILON; assert!((supply.ui_amount - 5.0).abs() < error); assert_eq!(supply.amount, 500.to_string()); assert_eq!(supply.decimals, 2); // Test non-existent mint address let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getTokenSupply","params":["{}"]}}"#, solana_sdk::pubkey::new_rand(), ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert!(result.get("error").is_some()); // Add another token account with the same owner, delegate, and mint let other_token_account_pubkey = solana_sdk::pubkey::new_rand(); bank.store_account(&other_token_account_pubkey, &token_account); // Add another token account with the same owner and delegate but different mint let mut account_data = vec![0; TokenAccount::get_packed_len()]; let new_mint = SplTokenPubkey::new(&[5; 32]); let token_account = TokenAccount { mint: new_mint, owner, delegate: COption::Some(delegate), amount: 42, state: TokenAccountState::Initialized, is_native: COption::None, delegated_amount: 30, close_authority: COption::Some(owner), }; TokenAccount::pack(token_account, &mut account_data).unwrap(); let token_account = Account { lamports: 111, data: account_data.to_vec(), owner: spl_token_id_v2_0(), ..Account::default() }; let token_with_different_mint_pubkey = solana_sdk::pubkey::new_rand(); bank.store_account(&token_with_different_mint_pubkey, &token_account); // Test getTokenAccountsByOwner with Token program id returns all accounts, regardless of Mint address let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getTokenAccountsByOwner", "params":["{}", {{"programId": "{}"}}] }}"#, owner, spl_token_id_v2_0(), ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let accounts: Vec = serde_json::from_value(result["result"]["value"].clone()).unwrap(); assert_eq!(accounts.len(), 3); // Test getTokenAccountsByOwner with jsonParsed encoding doesn't return accounts with invalid mints let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getTokenAccountsByOwner", "params":["{}", {{"programId": "{}"}}, {{"encoding": "jsonParsed"}}] }}"#, owner, spl_token_id_v2_0(), ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let accounts: Vec = serde_json::from_value(result["result"]["value"].clone()).unwrap(); assert_eq!(accounts.len(), 2); // Test getProgramAccounts with jsonParsed encoding returns mints, but doesn't return accounts with invalid mints let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getProgramAccounts", "params":["{}", {{"encoding": "jsonParsed"}}] }}"#, spl_token_id_v2_0(), ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let accounts: Vec = serde_json::from_value(result["result"].clone()).unwrap(); assert_eq!(accounts.len(), 4); // Test returns only mint accounts let req = format!( r#"{{ "jsonrpc":"2.0", "id":1,"method":"getTokenAccountsByOwner", "params":["{}", {{"mint": "{}"}}] }}"#, owner, mint, ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let accounts: Vec = serde_json::from_value(result["result"]["value"].clone()).unwrap(); assert_eq!(accounts.len(), 2); // Test non-existent Mint/program id let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getTokenAccountsByOwner", "params":["{}", {{"programId": "{}"}}] }}"#, owner, solana_sdk::pubkey::new_rand(), ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert!(result.get("error").is_some()); let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getTokenAccountsByOwner", "params":["{}", {{"mint": "{}"}}] }}"#, owner, solana_sdk::pubkey::new_rand(), ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert!(result.get("error").is_some()); // Test non-existent Owner let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getTokenAccountsByOwner", "params":["{}", {{"programId": "{}"}}] }}"#, solana_sdk::pubkey::new_rand(), spl_token_id_v2_0(), ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let accounts: Vec = serde_json::from_value(result["result"]["value"].clone()).unwrap(); assert!(accounts.is_empty()); // Test getTokenAccountsByDelegate with Token program id returns all accounts, regardless of Mint address let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getTokenAccountsByDelegate", "params":["{}", {{"programId": "{}"}}] }}"#, delegate, spl_token_id_v2_0(), ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let accounts: Vec = serde_json::from_value(result["result"]["value"].clone()).unwrap(); assert_eq!(accounts.len(), 3); // Test returns only mint accounts let req = format!( r#"{{ "jsonrpc":"2.0", "id":1,"method": "getTokenAccountsByDelegate", "params":["{}", {{"mint": "{}"}}] }}"#, delegate, mint, ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let accounts: Vec = serde_json::from_value(result["result"]["value"].clone()).unwrap(); assert_eq!(accounts.len(), 2); // Test non-existent Mint/program id let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getTokenAccountsByDelegate", "params":["{}", {{"programId": "{}"}}] }}"#, delegate, solana_sdk::pubkey::new_rand(), ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert!(result.get("error").is_some()); let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getTokenAccountsByDelegate", "params":["{}", {{"mint": "{}"}}] }}"#, delegate, solana_sdk::pubkey::new_rand(), ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert!(result.get("error").is_some()); // Test non-existent Delegate let req = format!( r#"{{ "jsonrpc":"2.0", "id":1, "method":"getTokenAccountsByDelegate", "params":["{}", {{"programId": "{}"}}] }}"#, solana_sdk::pubkey::new_rand(), spl_token_id_v2_0(), ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let accounts: Vec = serde_json::from_value(result["result"]["value"].clone()).unwrap(); assert!(accounts.is_empty()); // Add new_mint, and another token account on new_mint with different balance let mut mint_data = vec![0; Mint::get_packed_len()]; let mint_state = Mint { mint_authority: COption::Some(owner), supply: 500, decimals: 2, is_initialized: true, freeze_authority: COption::Some(owner), }; Mint::pack(mint_state, &mut mint_data).unwrap(); let mint_account = Account { lamports: 111, data: mint_data.to_vec(), owner: spl_token_id_v2_0(), ..Account::default() }; bank.store_account( &Pubkey::from_str(&new_mint.to_string()).unwrap(), &mint_account, ); let mut account_data = vec![0; TokenAccount::get_packed_len()]; let token_account = TokenAccount { mint: new_mint, owner, delegate: COption::Some(delegate), amount: 10, state: TokenAccountState::Initialized, is_native: COption::None, delegated_amount: 30, close_authority: COption::Some(owner), }; TokenAccount::pack(token_account, &mut account_data).unwrap(); let token_account = Account { lamports: 111, data: account_data.to_vec(), owner: spl_token_id_v2_0(), ..Account::default() }; let token_with_smaller_balance = solana_sdk::pubkey::new_rand(); bank.store_account(&token_with_smaller_balance, &token_account); // Test largest token accounts let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getTokenLargestAccounts","params":["{}"]}}"#, new_mint, ); let res = io.handle_request_sync(&req, meta); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); let largest_accounts: Vec = serde_json::from_value(result["result"]["value"].clone()).unwrap(); assert_eq!( largest_accounts, vec![ RpcTokenAccountBalance { address: token_with_different_mint_pubkey.to_string(), amount: UiTokenAmount { ui_amount: 0.42, decimals: 2, amount: "42".to_string(), } }, RpcTokenAccountBalance { address: token_with_smaller_balance.to_string(), amount: UiTokenAmount { ui_amount: 0.1, decimals: 2, amount: "10".to_string(), } } ] ); } #[test] fn test_token_parsing() { let RpcHandler { io, meta, bank, .. } = start_rpc_handler_with_tx(&solana_sdk::pubkey::new_rand()); let mut account_data = vec![0; TokenAccount::get_packed_len()]; let mint = SplTokenPubkey::new(&[2; 32]); let owner = SplTokenPubkey::new(&[3; 32]); let delegate = SplTokenPubkey::new(&[4; 32]); let token_account = TokenAccount { mint, owner, delegate: COption::Some(delegate), amount: 420, state: TokenAccountState::Initialized, is_native: COption::Some(10), delegated_amount: 30, close_authority: COption::Some(owner), }; TokenAccount::pack(token_account, &mut account_data).unwrap(); let token_account = Account { lamports: 111, data: account_data.to_vec(), owner: spl_token_id_v2_0(), ..Account::default() }; let token_account_pubkey = solana_sdk::pubkey::new_rand(); bank.store_account(&token_account_pubkey, &token_account); // Add the mint let mut mint_data = vec![0; Mint::get_packed_len()]; let mint_state = Mint { mint_authority: COption::Some(owner), supply: 500, decimals: 2, is_initialized: true, freeze_authority: COption::Some(owner), }; Mint::pack(mint_state, &mut mint_data).unwrap(); let mint_account = Account { lamports: 111, data: mint_data.to_vec(), owner: spl_token_id_v2_0(), ..Account::default() }; bank.store_account(&Pubkey::from_str(&mint.to_string()).unwrap(), &mint_account); let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getAccountInfo","params":["{}", {{"encoding": "jsonParsed"}}]}}"#, token_account_pubkey, ); let res = io.handle_request_sync(&req, meta.clone()); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!( result["result"]["value"]["data"], json!({ "program": "spl-token", "space": TokenAccount::get_packed_len(), "parsed": { "type": "account", "info": { "mint": mint.to_string(), "owner": owner.to_string(), "tokenAmount": { "uiAmount": 4.2, "decimals": 2, "amount": "420", }, "delegate": delegate.to_string(), "state": "initialized", "isNative": true, "rentExemptReserve": { "uiAmount": 0.1, "decimals": 2, "amount": "10", }, "delegatedAmount": { "uiAmount": 0.3, "decimals": 2, "amount": "30", }, "closeAuthority": owner.to_string(), } } }) ); // Test Mint let req = format!( r#"{{"jsonrpc":"2.0","id":1,"method":"getAccountInfo","params":["{}", {{"encoding": "jsonParsed"}}]}}"#, mint, ); let res = io.handle_request_sync(&req, meta); let result: Value = serde_json::from_str(&res.expect("actual response")) .expect("actual response deserialization"); assert_eq!( result["result"]["value"]["data"], json!({ "program": "spl-token", "space": Mint::get_packed_len(), "parsed": { "type": "mint", "info": { "mintAuthority": owner.to_string(), "decimals": 2, "supply": "500".to_string(), "isInitialized": true, "freezeAuthority": owner.to_string(), } } }) ); } #[test] fn test_rpc_single_gossip() { let exit = Arc::new(AtomicBool::new(false)); let validator_exit = create_validator_exit(&exit); let ledger_path = get_tmp_ledger_path!(); let blockstore = Arc::new(Blockstore::open(&ledger_path).unwrap()); let block_commitment_cache = Arc::new(RwLock::new(BlockCommitmentCache::default())); let cluster_info = Arc::new(ClusterInfo::default()); let GenesisConfigInfo { genesis_config, .. } = create_genesis_config(100); let bank = Bank::new(&genesis_config); let bank_forks = Arc::new(RwLock::new(BankForks::new(bank))); let bank0 = bank_forks.read().unwrap().get(0).unwrap().clone(); let bank1 = Bank::new_from_parent(&bank0, &Pubkey::default(), 1); bank_forks.write().unwrap().insert(bank1); let bank1 = bank_forks.read().unwrap().get(1).unwrap().clone(); let bank2 = Bank::new_from_parent(&bank1, &Pubkey::default(), 2); bank_forks.write().unwrap().insert(bank2); let bank2 = bank_forks.read().unwrap().get(2).unwrap().clone(); let bank3 = Bank::new_from_parent(&bank2, &Pubkey::default(), 3); bank_forks.write().unwrap().insert(bank3); let optimistically_confirmed_bank = OptimisticallyConfirmedBank::locked_from_bank_forks_root(&bank_forks); let mut pending_optimistically_confirmed_banks = HashSet::new(); let subscriptions = Arc::new(RpcSubscriptions::new( &exit, bank_forks.clone(), block_commitment_cache.clone(), optimistically_confirmed_bank.clone(), )); let (meta, _receiver) = JsonRpcRequestProcessor::new( JsonRpcConfig::default(), bank_forks.clone(), block_commitment_cache, blockstore, validator_exit, RpcHealth::stub(), cluster_info, Hash::default(), &runtime::Runtime::new().unwrap(), None, optimistically_confirmed_bank.clone(), ); let mut io = MetaIoHandler::default(); io.extend_with(RpcSolImpl.to_delegate()); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getSlot","params":[{"commitment":"singleGossip"}]}"#; let res = io.handle_request_sync(req, meta.clone()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let slot: Slot = serde_json::from_value(json["result"].clone()).unwrap(); assert_eq!(slot, 0); OptimisticallyConfirmedBankTracker::process_notification( BankNotification::OptimisticallyConfirmed(2), &bank_forks, &optimistically_confirmed_bank, &subscriptions, &mut pending_optimistically_confirmed_banks, ); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getSlot","params":[{"commitment": "singleGossip"}]}"#; let res = io.handle_request_sync(&req, meta.clone()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let slot: Slot = serde_json::from_value(json["result"].clone()).unwrap(); assert_eq!(slot, 2); // Test rollback does not appear to happen, even if slots are notified out of order OptimisticallyConfirmedBankTracker::process_notification( BankNotification::OptimisticallyConfirmed(1), &bank_forks, &optimistically_confirmed_bank, &subscriptions, &mut pending_optimistically_confirmed_banks, ); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getSlot","params":[{"commitment": "singleGossip"}]}"#; let res = io.handle_request_sync(&req, meta.clone()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let slot: Slot = serde_json::from_value(json["result"].clone()).unwrap(); assert_eq!(slot, 2); // Test bank will only be cached when frozen OptimisticallyConfirmedBankTracker::process_notification( BankNotification::OptimisticallyConfirmed(3), &bank_forks, &optimistically_confirmed_bank, &subscriptions, &mut pending_optimistically_confirmed_banks, ); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getSlot","params":[{"commitment": "singleGossip"}]}"#; let res = io.handle_request_sync(&req, meta.clone()); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let slot: Slot = serde_json::from_value(json["result"].clone()).unwrap(); assert_eq!(slot, 2); // Test freezing an optimistically confirmed bank will update cache let bank3 = bank_forks.read().unwrap().get(3).unwrap().clone(); OptimisticallyConfirmedBankTracker::process_notification( BankNotification::Frozen(bank3), &bank_forks, &optimistically_confirmed_bank, &subscriptions, &mut pending_optimistically_confirmed_banks, ); let req = r#"{"jsonrpc":"2.0","id":1,"method":"getSlot","params":[{"commitment": "singleGossip"}]}"#; let res = io.handle_request_sync(&req, meta); let json: Value = serde_json::from_str(&res.unwrap()).unwrap(); let slot: Slot = serde_json::from_value(json["result"].clone()).unwrap(); assert_eq!(slot, 3); } #[test] fn test_worst_case_encoded_tx_goldens() { let ff_tx = vec![0xffu8; PACKET_DATA_SIZE]; let tx58 = bs58::encode(&ff_tx).into_string(); assert_eq!(tx58.len(), WORST_CASE_BASE58_TX); let tx64 = base64::encode(&ff_tx); assert_eq!(tx64.len(), WORST_CASE_BASE64_TX); } #[test] fn test_deserialize_transacion_too_large_payloads_fail() { // +2 because +1 still fits in base64 encoded worst-case let too_big = PACKET_DATA_SIZE + 2; let tx_ser = vec![0xffu8; too_big]; let tx58 = bs58::encode(&tx_ser).into_string(); let tx58_len = tx58.len(); let expect58 = Error::invalid_params(format!( "encoded transaction too large: {} bytes (max: encoded/raw {}/{})", tx58_len, WORST_CASE_BASE58_TX, PACKET_DATA_SIZE, )); assert_eq!( deserialize_transaction(tx58, UiTransactionEncoding::Base58).unwrap_err(), expect58 ); let tx64 = base64::encode(&tx_ser); let tx64_len = tx64.len(); let expect64 = Error::invalid_params(format!( "encoded transaction too large: {} bytes (max: encoded/raw {}/{})", tx64_len, WORST_CASE_BASE64_TX, PACKET_DATA_SIZE, )); assert_eq!( deserialize_transaction(tx64, UiTransactionEncoding::Base64).unwrap_err(), expect64 ); let too_big = PACKET_DATA_SIZE + 1; let tx_ser = vec![0x00u8; too_big]; let tx58 = bs58::encode(&tx_ser).into_string(); let expect = Error::invalid_params(format!( "transaction too large: {} bytes (max: {} bytes)", too_big, PACKET_DATA_SIZE )); assert_eq!( deserialize_transaction(tx58, UiTransactionEncoding::Base58).unwrap_err(), expect ); let tx64 = base64::encode(&tx_ser); assert_eq!( deserialize_transaction(tx64, UiTransactionEncoding::Base64).unwrap_err(), expect ); } }