1275 lines
48 KiB
Rust
1275 lines
48 KiB
Rust
use crate::{
|
|
checks::{check_account_for_fee_with_commitment, check_unique_pubkeys},
|
|
cli::{
|
|
log_instruction_custom_error, CliCommand, CliCommandInfo, CliConfig, CliError,
|
|
ProcessResult,
|
|
},
|
|
memo::WithMemo,
|
|
spend_utils::{resolve_spend_tx_and_check_account_balance, SpendAmount},
|
|
};
|
|
use clap::{value_t_or_exit, App, Arg, ArgMatches, SubCommand};
|
|
use solana_clap_utils::{
|
|
input_parsers::*,
|
|
input_validators::*,
|
|
keypair::{DefaultSigner, SignerIndex},
|
|
memo::{memo_arg, MEMO_ARG},
|
|
};
|
|
use solana_cli_output::{CliEpochVotingHistory, CliLockout, CliVoteAccount};
|
|
use solana_client::rpc_client::RpcClient;
|
|
use solana_remote_wallet::remote_wallet::RemoteWalletManager;
|
|
use solana_sdk::{
|
|
account::Account, commitment_config::CommitmentConfig, message::Message,
|
|
native_token::lamports_to_sol, pubkey::Pubkey, system_instruction::SystemError,
|
|
transaction::Transaction,
|
|
};
|
|
use solana_vote_program::{
|
|
vote_instruction::{self, withdraw, VoteError},
|
|
vote_state::{VoteAuthorize, VoteInit, VoteState},
|
|
};
|
|
use std::sync::Arc;
|
|
|
|
pub trait VoteSubCommands {
|
|
fn vote_subcommands(self) -> Self;
|
|
}
|
|
|
|
impl VoteSubCommands for App<'_, '_> {
|
|
fn vote_subcommands(self) -> Self {
|
|
self.subcommand(
|
|
SubCommand::with_name("create-vote-account")
|
|
.about("Create a vote account")
|
|
.arg(
|
|
Arg::with_name("vote_account")
|
|
.index(1)
|
|
.value_name("ACCOUNT_KEYPAIR")
|
|
.takes_value(true)
|
|
.required(true)
|
|
.validator(is_valid_signer)
|
|
.help("Vote account keypair to create"),
|
|
)
|
|
.arg(
|
|
Arg::with_name("identity_account")
|
|
.index(2)
|
|
.value_name("IDENTITY_KEYPAIR")
|
|
.takes_value(true)
|
|
.required(true)
|
|
.validator(is_valid_signer)
|
|
.help("Keypair of validator that will vote with this account"),
|
|
)
|
|
.arg(
|
|
Arg::with_name("commission")
|
|
.long("commission")
|
|
.value_name("PERCENTAGE")
|
|
.takes_value(true)
|
|
.default_value("100")
|
|
.help("The commission taken on reward redemption (0-100)"),
|
|
)
|
|
.arg(
|
|
pubkey!(Arg::with_name("authorized_voter")
|
|
.long("authorized-voter")
|
|
.value_name("VOTER_PUBKEY"),
|
|
"Public key of the authorized voter [default: validator identity pubkey]. "),
|
|
)
|
|
.arg(
|
|
pubkey!(Arg::with_name("authorized_withdrawer")
|
|
.long("authorized-withdrawer")
|
|
.value_name("WITHDRAWER_PUBKEY"),
|
|
"Public key of the authorized withdrawer [default: validator identity pubkey]. "),
|
|
)
|
|
.arg(
|
|
Arg::with_name("seed")
|
|
.long("seed")
|
|
.value_name("STRING")
|
|
.takes_value(true)
|
|
.help("Seed for address generation; if specified, the resulting account will be at a derived address of the VOTE ACCOUNT pubkey")
|
|
)
|
|
.arg(memo_arg())
|
|
)
|
|
.subcommand(
|
|
SubCommand::with_name("vote-authorize-voter")
|
|
.about("Authorize a new vote signing keypair for the given vote account")
|
|
.arg(
|
|
pubkey!(Arg::with_name("vote_account_pubkey")
|
|
.index(1)
|
|
.value_name("VOTE_ACCOUNT_ADDRESS")
|
|
.required(true),
|
|
"Vote account in which to set the authorized voter. "),
|
|
)
|
|
.arg(
|
|
Arg::with_name("authorized")
|
|
.index(2)
|
|
.value_name("AUTHORIZED_KEYPAIR")
|
|
.required(true)
|
|
.validator(is_valid_signer)
|
|
.help("Current authorized vote signer."),
|
|
)
|
|
.arg(
|
|
pubkey!(Arg::with_name("new_authorized_pubkey")
|
|
.index(3)
|
|
.value_name("NEW_AUTHORIZED_PUBKEY")
|
|
.required(true),
|
|
"New authorized vote signer. "),
|
|
)
|
|
.arg(memo_arg())
|
|
)
|
|
.subcommand(
|
|
SubCommand::with_name("vote-authorize-withdrawer")
|
|
.about("Authorize a new withdraw signing keypair for the given vote account")
|
|
.arg(
|
|
pubkey!(Arg::with_name("vote_account_pubkey")
|
|
.index(1)
|
|
.value_name("VOTE_ACCOUNT_ADDRESS")
|
|
.required(true),
|
|
"Vote account in which to set the authorized withdrawer. "),
|
|
)
|
|
.arg(
|
|
Arg::with_name("authorized")
|
|
.index(2)
|
|
.value_name("AUTHORIZED_KEYPAIR")
|
|
.required(true)
|
|
.validator(is_valid_signer)
|
|
.help("Current authorized withdrawer."),
|
|
)
|
|
.arg(
|
|
pubkey!(Arg::with_name("new_authorized_pubkey")
|
|
.index(3)
|
|
.value_name("AUTHORIZED_PUBKEY")
|
|
.required(true),
|
|
"New authorized withdrawer. "),
|
|
)
|
|
.arg(memo_arg())
|
|
)
|
|
.subcommand(
|
|
SubCommand::with_name("vote-authorize-voter-checked")
|
|
.about("Authorize a new vote signing keypair for the given vote account, \
|
|
checking the new authority as a signer")
|
|
.arg(
|
|
pubkey!(Arg::with_name("vote_account_pubkey")
|
|
.index(1)
|
|
.value_name("VOTE_ACCOUNT_ADDRESS")
|
|
.required(true),
|
|
"Vote account in which to set the authorized voter. "),
|
|
)
|
|
.arg(
|
|
Arg::with_name("authorized")
|
|
.index(2)
|
|
.value_name("AUTHORIZED_KEYPAIR")
|
|
.required(true)
|
|
.validator(is_valid_signer)
|
|
.help("Current authorized vote signer."),
|
|
)
|
|
.arg(
|
|
Arg::with_name("new_authorized")
|
|
.index(3)
|
|
.value_name("NEW_AUTHORIZED_KEYPAIR")
|
|
.required(true)
|
|
.validator(is_valid_signer)
|
|
.help("New authorized vote signer."),
|
|
)
|
|
.arg(memo_arg())
|
|
)
|
|
.subcommand(
|
|
SubCommand::with_name("vote-authorize-withdrawer-checked")
|
|
.about("Authorize a new withdraw signing keypair for the given vote account, \
|
|
checking the new authority as a signer")
|
|
.arg(
|
|
pubkey!(Arg::with_name("vote_account_pubkey")
|
|
.index(1)
|
|
.value_name("VOTE_ACCOUNT_ADDRESS")
|
|
.required(true),
|
|
"Vote account in which to set the authorized withdrawer. "),
|
|
)
|
|
.arg(
|
|
Arg::with_name("authorized")
|
|
.index(2)
|
|
.value_name("AUTHORIZED_KEYPAIR")
|
|
.required(true)
|
|
.validator(is_valid_signer)
|
|
.help("Current authorized withdrawer."),
|
|
)
|
|
.arg(
|
|
Arg::with_name("new_authorized")
|
|
.index(3)
|
|
.value_name("NEW_AUTHORIZED_KEYPAIR")
|
|
.required(true)
|
|
.validator(is_valid_signer)
|
|
.help("New authorized withdrawer."),
|
|
)
|
|
.arg(memo_arg())
|
|
)
|
|
.subcommand(
|
|
SubCommand::with_name("vote-update-validator")
|
|
.about("Update the vote account's validator identity")
|
|
.arg(
|
|
pubkey!(Arg::with_name("vote_account_pubkey")
|
|
.index(1)
|
|
.value_name("VOTE_ACCOUNT_ADDRESS")
|
|
.required(true),
|
|
"Vote account to update. "),
|
|
)
|
|
.arg(
|
|
Arg::with_name("new_identity_account")
|
|
.index(2)
|
|
.value_name("IDENTITY_KEYPAIR")
|
|
.takes_value(true)
|
|
.required(true)
|
|
.validator(is_valid_signer)
|
|
.help("Keypair of new validator that will vote with this account"),
|
|
)
|
|
.arg(
|
|
Arg::with_name("authorized_withdrawer")
|
|
.index(3)
|
|
.value_name("AUTHORIZED_KEYPAIR")
|
|
.takes_value(true)
|
|
.required(true)
|
|
.validator(is_valid_signer)
|
|
.help("Authorized withdrawer keypair"),
|
|
)
|
|
.arg(memo_arg())
|
|
)
|
|
.subcommand(
|
|
SubCommand::with_name("vote-update-commission")
|
|
.about("Update the vote account's commission")
|
|
.arg(
|
|
pubkey!(Arg::with_name("vote_account_pubkey")
|
|
.index(1)
|
|
.value_name("VOTE_ACCOUNT_ADDRESS")
|
|
.required(true),
|
|
"Vote account to update. "),
|
|
)
|
|
.arg(
|
|
Arg::with_name("commission")
|
|
.index(2)
|
|
.value_name("PERCENTAGE")
|
|
.takes_value(true)
|
|
.required(true)
|
|
.validator(is_valid_percentage)
|
|
.help("The new commission")
|
|
)
|
|
.arg(
|
|
Arg::with_name("authorized_withdrawer")
|
|
.index(3)
|
|
.value_name("AUTHORIZED_KEYPAIR")
|
|
.takes_value(true)
|
|
.required(true)
|
|
.validator(is_valid_signer)
|
|
.help("Authorized withdrawer keypair"),
|
|
)
|
|
.arg(memo_arg())
|
|
)
|
|
.subcommand(
|
|
SubCommand::with_name("vote-account")
|
|
.about("Show the contents of a vote account")
|
|
.alias("show-vote-account")
|
|
.arg(
|
|
pubkey!(Arg::with_name("vote_account_pubkey")
|
|
.index(1)
|
|
.value_name("VOTE_ACCOUNT_ADDRESS")
|
|
.required(true),
|
|
"Vote account pubkey. "),
|
|
)
|
|
.arg(
|
|
Arg::with_name("lamports")
|
|
.long("lamports")
|
|
.takes_value(false)
|
|
.help("Display balance in lamports instead of SOL"),
|
|
)
|
|
.arg(
|
|
Arg::with_name("with_rewards")
|
|
.long("with-rewards")
|
|
.takes_value(false)
|
|
.help("Display inflation rewards"),
|
|
)
|
|
.arg(
|
|
Arg::with_name("num_rewards_epochs")
|
|
.long("num-rewards-epochs")
|
|
.takes_value(true)
|
|
.value_name("NUM")
|
|
.validator(|s| is_within_range(s, 1, 10))
|
|
.default_value_if("with_rewards", None, "1")
|
|
.requires("with_rewards")
|
|
.help("Display rewards for NUM recent epochs, max 10 [default: latest epoch only]"),
|
|
),
|
|
)
|
|
.subcommand(
|
|
SubCommand::with_name("withdraw-from-vote-account")
|
|
.about("Withdraw lamports from a vote account into a specified account")
|
|
.arg(
|
|
pubkey!(Arg::with_name("vote_account_pubkey")
|
|
.index(1)
|
|
.value_name("VOTE_ACCOUNT_ADDRESS")
|
|
.required(true),
|
|
"Vote account from which to withdraw. "),
|
|
)
|
|
.arg(
|
|
pubkey!(Arg::with_name("destination_account_pubkey")
|
|
.index(2)
|
|
.value_name("RECIPIENT_ADDRESS")
|
|
.required(true),
|
|
"The recipient of withdrawn SOL. "),
|
|
)
|
|
.arg(
|
|
Arg::with_name("amount")
|
|
.index(3)
|
|
.value_name("AMOUNT")
|
|
.takes_value(true)
|
|
.required(true)
|
|
.validator(is_amount_or_all)
|
|
.help("The amount to withdraw, in SOL; accepts keyword ALL"),
|
|
)
|
|
.arg(
|
|
Arg::with_name("authorized_withdrawer")
|
|
.long("authorized-withdrawer")
|
|
.value_name("AUTHORIZED_KEYPAIR")
|
|
.takes_value(true)
|
|
.validator(is_valid_signer)
|
|
.help("Authorized withdrawer [default: cli config keypair]"),
|
|
)
|
|
.arg(memo_arg())
|
|
)
|
|
}
|
|
}
|
|
|
|
pub fn parse_create_vote_account(
|
|
matches: &ArgMatches<'_>,
|
|
default_signer: &DefaultSigner,
|
|
wallet_manager: &mut Option<Arc<RemoteWalletManager>>,
|
|
) -> Result<CliCommandInfo, CliError> {
|
|
let (vote_account, vote_account_pubkey) = signer_of(matches, "vote_account", wallet_manager)?;
|
|
let seed = matches.value_of("seed").map(|s| s.to_string());
|
|
let (identity_account, identity_pubkey) =
|
|
signer_of(matches, "identity_account", wallet_manager)?;
|
|
let commission = value_t_or_exit!(matches, "commission", u8);
|
|
let authorized_voter = pubkey_of_signer(matches, "authorized_voter", wallet_manager)?;
|
|
let authorized_withdrawer = pubkey_of_signer(matches, "authorized_withdrawer", wallet_manager)?;
|
|
let memo = matches.value_of(MEMO_ARG.name).map(String::from);
|
|
|
|
let payer_provided = None;
|
|
let signer_info = default_signer.generate_unique_signers(
|
|
vec![payer_provided, vote_account, identity_account],
|
|
matches,
|
|
wallet_manager,
|
|
)?;
|
|
|
|
Ok(CliCommandInfo {
|
|
command: CliCommand::CreateVoteAccount {
|
|
vote_account: signer_info.index_of(vote_account_pubkey).unwrap(),
|
|
seed,
|
|
identity_account: signer_info.index_of(identity_pubkey).unwrap(),
|
|
authorized_voter,
|
|
authorized_withdrawer,
|
|
commission,
|
|
memo,
|
|
},
|
|
signers: signer_info.signers,
|
|
})
|
|
}
|
|
|
|
pub fn parse_vote_authorize(
|
|
matches: &ArgMatches<'_>,
|
|
default_signer: &DefaultSigner,
|
|
wallet_manager: &mut Option<Arc<RemoteWalletManager>>,
|
|
vote_authorize: VoteAuthorize,
|
|
checked: bool,
|
|
) -> Result<CliCommandInfo, CliError> {
|
|
let vote_account_pubkey =
|
|
pubkey_of_signer(matches, "vote_account_pubkey", wallet_manager)?.unwrap();
|
|
let (authorized, authorized_pubkey) = signer_of(matches, "authorized", wallet_manager)?;
|
|
|
|
let payer_provided = None;
|
|
let mut signers = vec![payer_provided, authorized];
|
|
|
|
let new_authorized_pubkey = if checked {
|
|
let (new_authorized_signer, new_authorized_pubkey) =
|
|
signer_of(matches, "new_authorized", wallet_manager)?;
|
|
signers.push(new_authorized_signer);
|
|
new_authorized_pubkey.unwrap()
|
|
} else {
|
|
pubkey_of_signer(matches, "new_authorized_pubkey", wallet_manager)?.unwrap()
|
|
};
|
|
|
|
let signer_info = default_signer.generate_unique_signers(signers, matches, wallet_manager)?;
|
|
let memo = matches.value_of(MEMO_ARG.name).map(String::from);
|
|
|
|
Ok(CliCommandInfo {
|
|
command: CliCommand::VoteAuthorize {
|
|
vote_account_pubkey,
|
|
new_authorized_pubkey,
|
|
vote_authorize,
|
|
memo,
|
|
authorized: signer_info.index_of(authorized_pubkey).unwrap(),
|
|
new_authorized: if checked {
|
|
signer_info.index_of(Some(new_authorized_pubkey))
|
|
} else {
|
|
None
|
|
},
|
|
},
|
|
signers: signer_info.signers,
|
|
})
|
|
}
|
|
|
|
pub fn parse_vote_update_validator(
|
|
matches: &ArgMatches<'_>,
|
|
default_signer: &DefaultSigner,
|
|
wallet_manager: &mut Option<Arc<RemoteWalletManager>>,
|
|
) -> Result<CliCommandInfo, CliError> {
|
|
let vote_account_pubkey =
|
|
pubkey_of_signer(matches, "vote_account_pubkey", wallet_manager)?.unwrap();
|
|
let (new_identity_account, new_identity_pubkey) =
|
|
signer_of(matches, "new_identity_account", wallet_manager)?;
|
|
let (authorized_withdrawer, authorized_withdrawer_pubkey) =
|
|
signer_of(matches, "authorized_withdrawer", wallet_manager)?;
|
|
|
|
let payer_provided = None;
|
|
let signer_info = default_signer.generate_unique_signers(
|
|
vec![payer_provided, authorized_withdrawer, new_identity_account],
|
|
matches,
|
|
wallet_manager,
|
|
)?;
|
|
let memo = matches.value_of(MEMO_ARG.name).map(String::from);
|
|
|
|
Ok(CliCommandInfo {
|
|
command: CliCommand::VoteUpdateValidator {
|
|
vote_account_pubkey,
|
|
new_identity_account: signer_info.index_of(new_identity_pubkey).unwrap(),
|
|
withdraw_authority: signer_info.index_of(authorized_withdrawer_pubkey).unwrap(),
|
|
memo,
|
|
},
|
|
signers: signer_info.signers,
|
|
})
|
|
}
|
|
|
|
pub fn parse_vote_update_commission(
|
|
matches: &ArgMatches<'_>,
|
|
default_signer: &DefaultSigner,
|
|
wallet_manager: &mut Option<Arc<RemoteWalletManager>>,
|
|
) -> Result<CliCommandInfo, CliError> {
|
|
let vote_account_pubkey =
|
|
pubkey_of_signer(matches, "vote_account_pubkey", wallet_manager)?.unwrap();
|
|
let (authorized_withdrawer, authorized_withdrawer_pubkey) =
|
|
signer_of(matches, "authorized_withdrawer", wallet_manager)?;
|
|
let commission = value_t_or_exit!(matches, "commission", u8);
|
|
|
|
let payer_provided = None;
|
|
let signer_info = default_signer.generate_unique_signers(
|
|
vec![payer_provided, authorized_withdrawer],
|
|
matches,
|
|
wallet_manager,
|
|
)?;
|
|
let memo = matches.value_of(MEMO_ARG.name).map(String::from);
|
|
|
|
Ok(CliCommandInfo {
|
|
command: CliCommand::VoteUpdateCommission {
|
|
vote_account_pubkey,
|
|
commission,
|
|
withdraw_authority: signer_info.index_of(authorized_withdrawer_pubkey).unwrap(),
|
|
memo,
|
|
},
|
|
signers: signer_info.signers,
|
|
})
|
|
}
|
|
|
|
pub fn parse_vote_get_account_command(
|
|
matches: &ArgMatches<'_>,
|
|
wallet_manager: &mut Option<Arc<RemoteWalletManager>>,
|
|
) -> Result<CliCommandInfo, CliError> {
|
|
let vote_account_pubkey =
|
|
pubkey_of_signer(matches, "vote_account_pubkey", wallet_manager)?.unwrap();
|
|
let use_lamports_unit = matches.is_present("lamports");
|
|
let with_rewards = if matches.is_present("with_rewards") {
|
|
Some(value_of(matches, "num_rewards_epochs").unwrap())
|
|
} else {
|
|
None
|
|
};
|
|
Ok(CliCommandInfo {
|
|
command: CliCommand::ShowVoteAccount {
|
|
pubkey: vote_account_pubkey,
|
|
use_lamports_unit,
|
|
with_rewards,
|
|
},
|
|
signers: vec![],
|
|
})
|
|
}
|
|
|
|
pub fn parse_withdraw_from_vote_account(
|
|
matches: &ArgMatches<'_>,
|
|
default_signer: &DefaultSigner,
|
|
wallet_manager: &mut Option<Arc<RemoteWalletManager>>,
|
|
) -> Result<CliCommandInfo, CliError> {
|
|
let vote_account_pubkey =
|
|
pubkey_of_signer(matches, "vote_account_pubkey", wallet_manager)?.unwrap();
|
|
let destination_account_pubkey =
|
|
pubkey_of_signer(matches, "destination_account_pubkey", wallet_manager)?.unwrap();
|
|
let withdraw_amount = SpendAmount::new_from_matches(matches, "amount");
|
|
|
|
let (withdraw_authority, withdraw_authority_pubkey) =
|
|
signer_of(matches, "authorized_withdrawer", wallet_manager)?;
|
|
|
|
let payer_provided = None;
|
|
let signer_info = default_signer.generate_unique_signers(
|
|
vec![payer_provided, withdraw_authority],
|
|
matches,
|
|
wallet_manager,
|
|
)?;
|
|
let memo = matches.value_of(MEMO_ARG.name).map(String::from);
|
|
|
|
Ok(CliCommandInfo {
|
|
command: CliCommand::WithdrawFromVoteAccount {
|
|
vote_account_pubkey,
|
|
destination_account_pubkey,
|
|
withdraw_authority: signer_info.index_of(withdraw_authority_pubkey).unwrap(),
|
|
withdraw_amount,
|
|
memo,
|
|
},
|
|
signers: signer_info.signers,
|
|
})
|
|
}
|
|
|
|
pub fn process_create_vote_account(
|
|
rpc_client: &RpcClient,
|
|
config: &CliConfig,
|
|
vote_account: SignerIndex,
|
|
seed: &Option<String>,
|
|
identity_account: SignerIndex,
|
|
authorized_voter: &Option<Pubkey>,
|
|
authorized_withdrawer: &Option<Pubkey>,
|
|
commission: u8,
|
|
memo: Option<&String>,
|
|
) -> ProcessResult {
|
|
let vote_account = config.signers[vote_account];
|
|
let vote_account_pubkey = vote_account.pubkey();
|
|
let vote_account_address = if let Some(seed) = seed {
|
|
Pubkey::create_with_seed(&vote_account_pubkey, seed, &solana_vote_program::id())?
|
|
} else {
|
|
vote_account_pubkey
|
|
};
|
|
check_unique_pubkeys(
|
|
(&config.signers[0].pubkey(), "cli keypair".to_string()),
|
|
(&vote_account_address, "vote_account".to_string()),
|
|
)?;
|
|
|
|
let identity_account = config.signers[identity_account];
|
|
let identity_pubkey = identity_account.pubkey();
|
|
check_unique_pubkeys(
|
|
(&vote_account_address, "vote_account".to_string()),
|
|
(&identity_pubkey, "identity_pubkey".to_string()),
|
|
)?;
|
|
|
|
let required_balance = rpc_client
|
|
.get_minimum_balance_for_rent_exemption(VoteState::size_of())?
|
|
.max(1);
|
|
let amount = SpendAmount::Some(required_balance);
|
|
|
|
let build_message = |lamports| {
|
|
let vote_init = VoteInit {
|
|
node_pubkey: identity_pubkey,
|
|
authorized_voter: authorized_voter.unwrap_or(identity_pubkey),
|
|
authorized_withdrawer: authorized_withdrawer.unwrap_or(identity_pubkey),
|
|
commission,
|
|
};
|
|
|
|
let ixs = if let Some(seed) = seed {
|
|
vote_instruction::create_account_with_seed(
|
|
&config.signers[0].pubkey(), // from
|
|
&vote_account_address, // to
|
|
&vote_account_pubkey, // base
|
|
seed, // seed
|
|
&vote_init,
|
|
lamports,
|
|
)
|
|
.with_memo(memo)
|
|
} else {
|
|
vote_instruction::create_account(
|
|
&config.signers[0].pubkey(),
|
|
&vote_account_pubkey,
|
|
&vote_init,
|
|
lamports,
|
|
)
|
|
.with_memo(memo)
|
|
};
|
|
Message::new(&ixs, Some(&config.signers[0].pubkey()))
|
|
};
|
|
|
|
if let Ok(response) =
|
|
rpc_client.get_account_with_commitment(&vote_account_address, config.commitment)
|
|
{
|
|
if let Some(vote_account) = response.value {
|
|
let err_msg = if vote_account.owner == solana_vote_program::id() {
|
|
format!("Vote account {} already exists", vote_account_address)
|
|
} else {
|
|
format!(
|
|
"Account {} already exists and is not a vote account",
|
|
vote_account_address
|
|
)
|
|
};
|
|
return Err(CliError::BadParameter(err_msg).into());
|
|
}
|
|
}
|
|
|
|
let latest_blockhash = rpc_client.get_latest_blockhash()?;
|
|
|
|
let (message, _) = resolve_spend_tx_and_check_account_balance(
|
|
rpc_client,
|
|
false,
|
|
amount,
|
|
&latest_blockhash,
|
|
&config.signers[0].pubkey(),
|
|
build_message,
|
|
config.commitment,
|
|
)?;
|
|
let mut tx = Transaction::new_unsigned(message);
|
|
tx.try_sign(&config.signers, latest_blockhash)?;
|
|
let result = rpc_client.send_and_confirm_transaction_with_spinner(&tx);
|
|
log_instruction_custom_error::<SystemError>(result, config)
|
|
}
|
|
|
|
pub fn process_vote_authorize(
|
|
rpc_client: &RpcClient,
|
|
config: &CliConfig,
|
|
vote_account_pubkey: &Pubkey,
|
|
new_authorized_pubkey: &Pubkey,
|
|
vote_authorize: VoteAuthorize,
|
|
authorized: SignerIndex,
|
|
new_authorized: Option<SignerIndex>,
|
|
memo: Option<&String>,
|
|
) -> ProcessResult {
|
|
let authorized = config.signers[authorized];
|
|
let new_authorized_signer = new_authorized.map(|index| config.signers[index]);
|
|
|
|
check_unique_pubkeys(
|
|
(&authorized.pubkey(), "authorized_account".to_string()),
|
|
(new_authorized_pubkey, "new_authorized_pubkey".to_string()),
|
|
)?;
|
|
let latest_blockhash = rpc_client.get_latest_blockhash()?;
|
|
let vote_ix = if new_authorized_signer.is_some() {
|
|
vote_instruction::authorize_checked(
|
|
vote_account_pubkey, // vote account to update
|
|
&authorized.pubkey(), // current authorized
|
|
new_authorized_pubkey, // new vote signer/withdrawer
|
|
vote_authorize, // vote or withdraw
|
|
)
|
|
} else {
|
|
vote_instruction::authorize(
|
|
vote_account_pubkey, // vote account to update
|
|
&authorized.pubkey(), // current authorized
|
|
new_authorized_pubkey, // new vote signer/withdrawer
|
|
vote_authorize, // vote or withdraw
|
|
)
|
|
};
|
|
let ixs = vec![vote_ix].with_memo(memo);
|
|
|
|
let message = Message::new(&ixs, Some(&config.signers[0].pubkey()));
|
|
let mut tx = Transaction::new_unsigned(message);
|
|
tx.try_sign(&config.signers, latest_blockhash)?;
|
|
check_account_for_fee_with_commitment(
|
|
rpc_client,
|
|
&config.signers[0].pubkey(),
|
|
&latest_blockhash,
|
|
&tx.message,
|
|
config.commitment,
|
|
)?;
|
|
let result = rpc_client.send_and_confirm_transaction_with_spinner(&tx);
|
|
log_instruction_custom_error::<VoteError>(result, config)
|
|
}
|
|
|
|
pub fn process_vote_update_validator(
|
|
rpc_client: &RpcClient,
|
|
config: &CliConfig,
|
|
vote_account_pubkey: &Pubkey,
|
|
new_identity_account: SignerIndex,
|
|
withdraw_authority: SignerIndex,
|
|
memo: Option<&String>,
|
|
) -> ProcessResult {
|
|
let authorized_withdrawer = config.signers[withdraw_authority];
|
|
let new_identity_account = config.signers[new_identity_account];
|
|
let new_identity_pubkey = new_identity_account.pubkey();
|
|
check_unique_pubkeys(
|
|
(vote_account_pubkey, "vote_account_pubkey".to_string()),
|
|
(&new_identity_pubkey, "new_identity_account".to_string()),
|
|
)?;
|
|
let latest_blockhash = rpc_client.get_latest_blockhash()?;
|
|
let ixs = vec![vote_instruction::update_validator_identity(
|
|
vote_account_pubkey,
|
|
&authorized_withdrawer.pubkey(),
|
|
&new_identity_pubkey,
|
|
)]
|
|
.with_memo(memo);
|
|
|
|
let message = Message::new(&ixs, Some(&config.signers[0].pubkey()));
|
|
let mut tx = Transaction::new_unsigned(message);
|
|
tx.try_sign(&config.signers, latest_blockhash)?;
|
|
check_account_for_fee_with_commitment(
|
|
rpc_client,
|
|
&config.signers[0].pubkey(),
|
|
&latest_blockhash,
|
|
&tx.message,
|
|
config.commitment,
|
|
)?;
|
|
let result = rpc_client.send_and_confirm_transaction_with_spinner(&tx);
|
|
log_instruction_custom_error::<VoteError>(result, config)
|
|
}
|
|
|
|
pub fn process_vote_update_commission(
|
|
rpc_client: &RpcClient,
|
|
config: &CliConfig,
|
|
vote_account_pubkey: &Pubkey,
|
|
commission: u8,
|
|
withdraw_authority: SignerIndex,
|
|
memo: Option<&String>,
|
|
) -> ProcessResult {
|
|
let authorized_withdrawer = config.signers[withdraw_authority];
|
|
let latest_blockhash = rpc_client.get_latest_blockhash()?;
|
|
let ixs = vec![vote_instruction::update_commission(
|
|
vote_account_pubkey,
|
|
&authorized_withdrawer.pubkey(),
|
|
commission,
|
|
)]
|
|
.with_memo(memo);
|
|
|
|
let message = Message::new(&ixs, Some(&config.signers[0].pubkey()));
|
|
let mut tx = Transaction::new_unsigned(message);
|
|
tx.try_sign(&config.signers, latest_blockhash)?;
|
|
check_account_for_fee_with_commitment(
|
|
rpc_client,
|
|
&config.signers[0].pubkey(),
|
|
&latest_blockhash,
|
|
&tx.message,
|
|
config.commitment,
|
|
)?;
|
|
let result = rpc_client.send_and_confirm_transaction_with_spinner(&tx);
|
|
log_instruction_custom_error::<VoteError>(result, config)
|
|
}
|
|
|
|
fn get_vote_account(
|
|
rpc_client: &RpcClient,
|
|
vote_account_pubkey: &Pubkey,
|
|
commitment_config: CommitmentConfig,
|
|
) -> Result<(Account, VoteState), Box<dyn std::error::Error>> {
|
|
let vote_account = rpc_client
|
|
.get_account_with_commitment(vote_account_pubkey, commitment_config)?
|
|
.value
|
|
.ok_or_else(|| {
|
|
CliError::RpcRequestError(format!("{:?} account does not exist", vote_account_pubkey))
|
|
})?;
|
|
|
|
if vote_account.owner != solana_vote_program::id() {
|
|
return Err(CliError::RpcRequestError(format!(
|
|
"{:?} is not a vote account",
|
|
vote_account_pubkey
|
|
))
|
|
.into());
|
|
}
|
|
let vote_state = VoteState::deserialize(&vote_account.data).map_err(|_| {
|
|
CliError::RpcRequestError(
|
|
"Account data could not be deserialized to vote state".to_string(),
|
|
)
|
|
})?;
|
|
|
|
Ok((vote_account, vote_state))
|
|
}
|
|
|
|
pub fn process_show_vote_account(
|
|
rpc_client: &RpcClient,
|
|
config: &CliConfig,
|
|
vote_account_address: &Pubkey,
|
|
use_lamports_unit: bool,
|
|
with_rewards: Option<usize>,
|
|
) -> ProcessResult {
|
|
let (vote_account, vote_state) =
|
|
get_vote_account(rpc_client, vote_account_address, config.commitment)?;
|
|
|
|
let epoch_schedule = rpc_client.get_epoch_schedule()?;
|
|
|
|
let mut votes: Vec<CliLockout> = vec![];
|
|
let mut epoch_voting_history: Vec<CliEpochVotingHistory> = vec![];
|
|
if !vote_state.votes.is_empty() {
|
|
for vote in &vote_state.votes {
|
|
votes.push(vote.into());
|
|
}
|
|
for (epoch, credits, prev_credits) in vote_state.epoch_credits().iter().copied() {
|
|
let credits_earned = credits - prev_credits;
|
|
let slots_in_epoch = epoch_schedule.get_slots_in_epoch(epoch);
|
|
epoch_voting_history.push(CliEpochVotingHistory {
|
|
epoch,
|
|
slots_in_epoch,
|
|
credits_earned,
|
|
credits,
|
|
prev_credits,
|
|
});
|
|
}
|
|
}
|
|
|
|
let epoch_rewards =
|
|
with_rewards.and_then(|num_epochs| {
|
|
match crate::stake::fetch_epoch_rewards(rpc_client, vote_account_address, num_epochs) {
|
|
Ok(rewards) => Some(rewards),
|
|
Err(error) => {
|
|
eprintln!("Failed to fetch epoch rewards: {:?}", error);
|
|
None
|
|
}
|
|
}
|
|
});
|
|
|
|
let vote_account_data = CliVoteAccount {
|
|
account_balance: vote_account.lamports,
|
|
validator_identity: vote_state.node_pubkey.to_string(),
|
|
authorized_voters: vote_state.authorized_voters().into(),
|
|
authorized_withdrawer: vote_state.authorized_withdrawer.to_string(),
|
|
credits: vote_state.credits(),
|
|
commission: vote_state.commission,
|
|
root_slot: vote_state.root_slot,
|
|
recent_timestamp: vote_state.last_timestamp.clone(),
|
|
votes,
|
|
epoch_voting_history,
|
|
use_lamports_unit,
|
|
epoch_rewards,
|
|
};
|
|
|
|
Ok(config.output_format.formatted_string(&vote_account_data))
|
|
}
|
|
|
|
pub fn process_withdraw_from_vote_account(
|
|
rpc_client: &RpcClient,
|
|
config: &CliConfig,
|
|
vote_account_pubkey: &Pubkey,
|
|
withdraw_authority: SignerIndex,
|
|
withdraw_amount: SpendAmount,
|
|
destination_account_pubkey: &Pubkey,
|
|
memo: Option<&String>,
|
|
) -> ProcessResult {
|
|
let latest_blockhash = rpc_client.get_latest_blockhash()?;
|
|
let withdraw_authority = config.signers[withdraw_authority];
|
|
|
|
let current_balance = rpc_client.get_balance(vote_account_pubkey)?;
|
|
let minimum_balance = rpc_client.get_minimum_balance_for_rent_exemption(VoteState::size_of())?;
|
|
|
|
let lamports = match withdraw_amount {
|
|
SpendAmount::All => current_balance.saturating_sub(minimum_balance),
|
|
SpendAmount::Some(withdraw_amount) => {
|
|
if current_balance.saturating_sub(withdraw_amount) < minimum_balance {
|
|
return Err(CliError::BadParameter(format!(
|
|
"Withdraw amount too large. The vote account balance must be at least {} SOL to remain rent exempt", lamports_to_sol(minimum_balance)
|
|
))
|
|
.into());
|
|
}
|
|
withdraw_amount
|
|
}
|
|
};
|
|
|
|
let ixs = vec![withdraw(
|
|
vote_account_pubkey,
|
|
&withdraw_authority.pubkey(),
|
|
lamports,
|
|
destination_account_pubkey,
|
|
)]
|
|
.with_memo(memo);
|
|
|
|
let message = Message::new(&ixs, Some(&config.signers[0].pubkey()));
|
|
let mut transaction = Transaction::new_unsigned(message);
|
|
transaction.try_sign(&config.signers, latest_blockhash)?;
|
|
check_account_for_fee_with_commitment(
|
|
rpc_client,
|
|
&config.signers[0].pubkey(),
|
|
&latest_blockhash,
|
|
&transaction.message,
|
|
config.commitment,
|
|
)?;
|
|
let result = rpc_client.send_and_confirm_transaction_with_spinner(&transaction);
|
|
log_instruction_custom_error::<VoteError>(result, config)
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
use crate::{clap_app::get_clap_app, cli::parse_command};
|
|
use solana_sdk::signature::{read_keypair_file, write_keypair, Keypair, Signer};
|
|
use tempfile::NamedTempFile;
|
|
|
|
fn make_tmp_file() -> (String, NamedTempFile) {
|
|
let tmp_file = NamedTempFile::new().unwrap();
|
|
(String::from(tmp_file.path().to_str().unwrap()), tmp_file)
|
|
}
|
|
|
|
#[test]
|
|
fn test_parse_command() {
|
|
let test_commands = get_clap_app("test", "desc", "version");
|
|
let keypair = Keypair::new();
|
|
let pubkey = keypair.pubkey();
|
|
let pubkey_string = pubkey.to_string();
|
|
let keypair2 = Keypair::new();
|
|
let pubkey2 = keypair2.pubkey();
|
|
let pubkey2_string = pubkey2.to_string();
|
|
|
|
let default_keypair = Keypair::new();
|
|
let (default_keypair_file, mut tmp_file) = make_tmp_file();
|
|
write_keypair(&default_keypair, tmp_file.as_file_mut()).unwrap();
|
|
let default_signer = DefaultSigner::new("", &default_keypair_file);
|
|
|
|
let test_authorize_voter = test_commands.clone().get_matches_from(vec![
|
|
"test",
|
|
"vote-authorize-voter",
|
|
&pubkey_string,
|
|
&default_keypair_file,
|
|
&pubkey2_string,
|
|
]);
|
|
assert_eq!(
|
|
parse_command(&test_authorize_voter, &default_signer, &mut None).unwrap(),
|
|
CliCommandInfo {
|
|
command: CliCommand::VoteAuthorize {
|
|
vote_account_pubkey: pubkey,
|
|
new_authorized_pubkey: pubkey2,
|
|
vote_authorize: VoteAuthorize::Voter,
|
|
memo: None,
|
|
authorized: 0,
|
|
new_authorized: None,
|
|
},
|
|
signers: vec![read_keypair_file(&default_keypair_file).unwrap().into()],
|
|
}
|
|
);
|
|
|
|
let authorized_keypair = Keypair::new();
|
|
let (authorized_keypair_file, mut tmp_file) = make_tmp_file();
|
|
write_keypair(&authorized_keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
let test_authorize_voter = test_commands.clone().get_matches_from(vec![
|
|
"test",
|
|
"vote-authorize-voter",
|
|
&pubkey_string,
|
|
&authorized_keypair_file,
|
|
&pubkey2_string,
|
|
]);
|
|
assert_eq!(
|
|
parse_command(&test_authorize_voter, &default_signer, &mut None).unwrap(),
|
|
CliCommandInfo {
|
|
command: CliCommand::VoteAuthorize {
|
|
vote_account_pubkey: pubkey,
|
|
new_authorized_pubkey: pubkey2,
|
|
vote_authorize: VoteAuthorize::Voter,
|
|
memo: None,
|
|
authorized: 1,
|
|
new_authorized: None,
|
|
},
|
|
signers: vec![
|
|
read_keypair_file(&default_keypair_file).unwrap().into(),
|
|
read_keypair_file(&authorized_keypair_file).unwrap().into(),
|
|
],
|
|
}
|
|
);
|
|
|
|
let (voter_keypair_file, mut tmp_file) = make_tmp_file();
|
|
let voter_keypair = Keypair::new();
|
|
write_keypair(&voter_keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
let test_authorize_voter = test_commands.clone().get_matches_from(vec![
|
|
"test",
|
|
"vote-authorize-voter-checked",
|
|
&pubkey_string,
|
|
&default_keypair_file,
|
|
&voter_keypair_file,
|
|
]);
|
|
assert_eq!(
|
|
parse_command(&test_authorize_voter, &default_signer, &mut None).unwrap(),
|
|
CliCommandInfo {
|
|
command: CliCommand::VoteAuthorize {
|
|
vote_account_pubkey: pubkey,
|
|
new_authorized_pubkey: voter_keypair.pubkey(),
|
|
vote_authorize: VoteAuthorize::Voter,
|
|
memo: None,
|
|
authorized: 0,
|
|
new_authorized: Some(1),
|
|
},
|
|
signers: vec![
|
|
read_keypair_file(&default_keypair_file).unwrap().into(),
|
|
read_keypair_file(&voter_keypair_file).unwrap().into()
|
|
],
|
|
}
|
|
);
|
|
|
|
let test_authorize_voter = test_commands.clone().get_matches_from(vec![
|
|
"test",
|
|
"vote-authorize-voter-checked",
|
|
&pubkey_string,
|
|
&authorized_keypair_file,
|
|
&voter_keypair_file,
|
|
]);
|
|
assert_eq!(
|
|
parse_command(&test_authorize_voter, &default_signer, &mut None).unwrap(),
|
|
CliCommandInfo {
|
|
command: CliCommand::VoteAuthorize {
|
|
vote_account_pubkey: pubkey,
|
|
new_authorized_pubkey: voter_keypair.pubkey(),
|
|
vote_authorize: VoteAuthorize::Voter,
|
|
memo: None,
|
|
authorized: 1,
|
|
new_authorized: Some(2),
|
|
},
|
|
signers: vec![
|
|
read_keypair_file(&default_keypair_file).unwrap().into(),
|
|
read_keypair_file(&authorized_keypair_file).unwrap().into(),
|
|
read_keypair_file(&voter_keypair_file).unwrap().into(),
|
|
],
|
|
}
|
|
);
|
|
|
|
let test_authorize_voter = test_commands.clone().get_matches_from(vec![
|
|
"test",
|
|
"vote-authorize-voter-checked",
|
|
&pubkey_string,
|
|
&authorized_keypair_file,
|
|
&pubkey2_string,
|
|
]);
|
|
assert!(parse_command(&test_authorize_voter, &default_signer, &mut None).is_err());
|
|
|
|
let (keypair_file, mut tmp_file) = make_tmp_file();
|
|
let keypair = Keypair::new();
|
|
write_keypair(&keypair, tmp_file.as_file_mut()).unwrap();
|
|
// Test CreateVoteAccount SubCommand
|
|
let (identity_keypair_file, mut tmp_file) = make_tmp_file();
|
|
let identity_keypair = Keypair::new();
|
|
write_keypair(&identity_keypair, tmp_file.as_file_mut()).unwrap();
|
|
let test_create_vote_account = test_commands.clone().get_matches_from(vec![
|
|
"test",
|
|
"create-vote-account",
|
|
&keypair_file,
|
|
&identity_keypair_file,
|
|
"--commission",
|
|
"10",
|
|
]);
|
|
assert_eq!(
|
|
parse_command(&test_create_vote_account, &default_signer, &mut None).unwrap(),
|
|
CliCommandInfo {
|
|
command: CliCommand::CreateVoteAccount {
|
|
vote_account: 1,
|
|
seed: None,
|
|
identity_account: 2,
|
|
authorized_voter: None,
|
|
authorized_withdrawer: None,
|
|
commission: 10,
|
|
memo: None,
|
|
},
|
|
signers: vec![
|
|
read_keypair_file(&default_keypair_file).unwrap().into(),
|
|
Box::new(keypair),
|
|
read_keypair_file(&identity_keypair_file).unwrap().into(),
|
|
],
|
|
}
|
|
);
|
|
|
|
let (keypair_file, mut tmp_file) = make_tmp_file();
|
|
let keypair = Keypair::new();
|
|
write_keypair(&keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
let test_create_vote_account2 = test_commands.clone().get_matches_from(vec![
|
|
"test",
|
|
"create-vote-account",
|
|
&keypair_file,
|
|
&identity_keypair_file,
|
|
]);
|
|
assert_eq!(
|
|
parse_command(&test_create_vote_account2, &default_signer, &mut None).unwrap(),
|
|
CliCommandInfo {
|
|
command: CliCommand::CreateVoteAccount {
|
|
vote_account: 1,
|
|
seed: None,
|
|
identity_account: 2,
|
|
authorized_voter: None,
|
|
authorized_withdrawer: None,
|
|
commission: 100,
|
|
memo: None,
|
|
},
|
|
signers: vec![
|
|
read_keypair_file(&default_keypair_file).unwrap().into(),
|
|
Box::new(keypair),
|
|
read_keypair_file(&identity_keypair_file).unwrap().into(),
|
|
],
|
|
}
|
|
);
|
|
|
|
// test init with an authed voter
|
|
let authed = solana_sdk::pubkey::new_rand();
|
|
let (keypair_file, mut tmp_file) = make_tmp_file();
|
|
let keypair = Keypair::new();
|
|
write_keypair(&keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
let test_create_vote_account3 = test_commands.clone().get_matches_from(vec![
|
|
"test",
|
|
"create-vote-account",
|
|
&keypair_file,
|
|
&identity_keypair_file,
|
|
"--authorized-voter",
|
|
&authed.to_string(),
|
|
]);
|
|
assert_eq!(
|
|
parse_command(&test_create_vote_account3, &default_signer, &mut None).unwrap(),
|
|
CliCommandInfo {
|
|
command: CliCommand::CreateVoteAccount {
|
|
vote_account: 1,
|
|
seed: None,
|
|
identity_account: 2,
|
|
authorized_voter: Some(authed),
|
|
authorized_withdrawer: None,
|
|
commission: 100,
|
|
memo: None,
|
|
},
|
|
signers: vec![
|
|
read_keypair_file(&default_keypair_file).unwrap().into(),
|
|
Box::new(keypair),
|
|
read_keypair_file(&identity_keypair_file).unwrap().into(),
|
|
],
|
|
}
|
|
);
|
|
|
|
let (keypair_file, mut tmp_file) = make_tmp_file();
|
|
let keypair = Keypair::new();
|
|
write_keypair(&keypair, tmp_file.as_file_mut()).unwrap();
|
|
// test init with an authed withdrawer
|
|
let test_create_vote_account4 = test_commands.clone().get_matches_from(vec![
|
|
"test",
|
|
"create-vote-account",
|
|
&keypair_file,
|
|
&identity_keypair_file,
|
|
"--authorized-withdrawer",
|
|
&authed.to_string(),
|
|
]);
|
|
assert_eq!(
|
|
parse_command(&test_create_vote_account4, &default_signer, &mut None).unwrap(),
|
|
CliCommandInfo {
|
|
command: CliCommand::CreateVoteAccount {
|
|
vote_account: 1,
|
|
seed: None,
|
|
identity_account: 2,
|
|
authorized_voter: None,
|
|
authorized_withdrawer: Some(authed),
|
|
commission: 100,
|
|
memo: None,
|
|
},
|
|
signers: vec![
|
|
read_keypair_file(&default_keypair_file).unwrap().into(),
|
|
Box::new(keypair),
|
|
read_keypair_file(&identity_keypair_file).unwrap().into(),
|
|
],
|
|
}
|
|
);
|
|
|
|
let test_update_validator = test_commands.clone().get_matches_from(vec![
|
|
"test",
|
|
"vote-update-validator",
|
|
&pubkey_string,
|
|
&identity_keypair_file,
|
|
&keypair_file,
|
|
]);
|
|
assert_eq!(
|
|
parse_command(&test_update_validator, &default_signer, &mut None).unwrap(),
|
|
CliCommandInfo {
|
|
command: CliCommand::VoteUpdateValidator {
|
|
vote_account_pubkey: pubkey,
|
|
new_identity_account: 2,
|
|
withdraw_authority: 1,
|
|
memo: None,
|
|
},
|
|
signers: vec![
|
|
read_keypair_file(&default_keypair_file).unwrap().into(),
|
|
Box::new(read_keypair_file(&keypair_file).unwrap()),
|
|
read_keypair_file(&identity_keypair_file).unwrap().into(),
|
|
],
|
|
}
|
|
);
|
|
|
|
let test_update_commission = test_commands.clone().get_matches_from(vec![
|
|
"test",
|
|
"vote-update-commission",
|
|
&pubkey_string,
|
|
"42",
|
|
&keypair_file,
|
|
]);
|
|
assert_eq!(
|
|
parse_command(&test_update_commission, &default_signer, &mut None).unwrap(),
|
|
CliCommandInfo {
|
|
command: CliCommand::VoteUpdateCommission {
|
|
vote_account_pubkey: pubkey,
|
|
commission: 42,
|
|
withdraw_authority: 1,
|
|
memo: None,
|
|
},
|
|
signers: vec![
|
|
read_keypair_file(&default_keypair_file).unwrap().into(),
|
|
Box::new(read_keypair_file(&keypair_file).unwrap()),
|
|
],
|
|
}
|
|
);
|
|
|
|
// Test WithdrawFromVoteAccount subcommand
|
|
let test_withdraw_from_vote_account = test_commands.clone().get_matches_from(vec![
|
|
"test",
|
|
"withdraw-from-vote-account",
|
|
&keypair_file,
|
|
&pubkey_string,
|
|
"42",
|
|
]);
|
|
assert_eq!(
|
|
parse_command(&test_withdraw_from_vote_account, &default_signer, &mut None).unwrap(),
|
|
CliCommandInfo {
|
|
command: CliCommand::WithdrawFromVoteAccount {
|
|
vote_account_pubkey: read_keypair_file(&keypair_file).unwrap().pubkey(),
|
|
destination_account_pubkey: pubkey,
|
|
withdraw_authority: 0,
|
|
withdraw_amount: SpendAmount::Some(42_000_000_000),
|
|
memo: None,
|
|
},
|
|
signers: vec![read_keypair_file(&default_keypair_file).unwrap().into()],
|
|
}
|
|
);
|
|
|
|
// Test WithdrawFromVoteAccount subcommand
|
|
let test_withdraw_from_vote_account = test_commands.clone().get_matches_from(vec![
|
|
"test",
|
|
"withdraw-from-vote-account",
|
|
&keypair_file,
|
|
&pubkey_string,
|
|
"ALL",
|
|
]);
|
|
assert_eq!(
|
|
parse_command(&test_withdraw_from_vote_account, &default_signer, &mut None).unwrap(),
|
|
CliCommandInfo {
|
|
command: CliCommand::WithdrawFromVoteAccount {
|
|
vote_account_pubkey: read_keypair_file(&keypair_file).unwrap().pubkey(),
|
|
destination_account_pubkey: pubkey,
|
|
withdraw_authority: 0,
|
|
withdraw_amount: SpendAmount::All,
|
|
memo: None,
|
|
},
|
|
signers: vec![read_keypair_file(&default_keypair_file).unwrap().into()],
|
|
}
|
|
);
|
|
|
|
// Test WithdrawFromVoteAccount subcommand with authority
|
|
let withdraw_authority = Keypair::new();
|
|
let (withdraw_authority_file, mut tmp_file) = make_tmp_file();
|
|
write_keypair(&withdraw_authority, tmp_file.as_file_mut()).unwrap();
|
|
let test_withdraw_from_vote_account = test_commands.clone().get_matches_from(vec![
|
|
"test",
|
|
"withdraw-from-vote-account",
|
|
&keypair_file,
|
|
&pubkey_string,
|
|
"42",
|
|
"--authorized-withdrawer",
|
|
&withdraw_authority_file,
|
|
]);
|
|
assert_eq!(
|
|
parse_command(&test_withdraw_from_vote_account, &default_signer, &mut None).unwrap(),
|
|
CliCommandInfo {
|
|
command: CliCommand::WithdrawFromVoteAccount {
|
|
vote_account_pubkey: read_keypair_file(&keypair_file).unwrap().pubkey(),
|
|
destination_account_pubkey: pubkey,
|
|
withdraw_authority: 1,
|
|
withdraw_amount: SpendAmount::Some(42_000_000_000),
|
|
memo: None,
|
|
},
|
|
signers: vec![
|
|
read_keypair_file(&default_keypair_file).unwrap().into(),
|
|
read_keypair_file(&withdraw_authority_file).unwrap().into()
|
|
],
|
|
}
|
|
);
|
|
}
|
|
}
|