897 lines
32 KiB
Rust
897 lines
32 KiB
Rust
//! The solana-program-test provides a BanksClient-based test framework BPF programs
|
|
#![allow(clippy::integer_arithmetic)]
|
|
|
|
use {
|
|
async_trait::async_trait,
|
|
chrono_humanize::{Accuracy, HumanTime, Tense},
|
|
log::*,
|
|
solana_banks_client::start_client,
|
|
solana_banks_server::banks_server::start_local_server,
|
|
solana_program::{
|
|
account_info::AccountInfo, entrypoint::ProgramResult, fee_calculator::FeeCalculator,
|
|
hash::Hash, instruction::Instruction, instruction::InstructionError, message::Message,
|
|
native_token::sol_to_lamports, program_error::ProgramError, program_stubs, pubkey::Pubkey,
|
|
rent::Rent,
|
|
},
|
|
solana_runtime::{
|
|
bank::{Bank, Builtin, ExecuteTimings},
|
|
bank_forks::BankForks,
|
|
commitment::BlockCommitmentCache,
|
|
genesis_utils::{create_genesis_config_with_leader, GenesisConfigInfo},
|
|
},
|
|
solana_sdk::{
|
|
account::Account,
|
|
clock::Slot,
|
|
genesis_config::GenesisConfig,
|
|
keyed_account::KeyedAccount,
|
|
process_instruction::{
|
|
stable_log, BpfComputeBudget, InvokeContext, ProcessInstructionWithContext,
|
|
},
|
|
signature::{Keypair, Signer},
|
|
},
|
|
solana_vote_program::vote_state::{VoteState, VoteStateVersions},
|
|
std::{
|
|
cell::RefCell,
|
|
collections::HashMap,
|
|
convert::TryFrom,
|
|
fs::File,
|
|
io::{self, Read},
|
|
mem::transmute,
|
|
path::{Path, PathBuf},
|
|
rc::Rc,
|
|
sync::{
|
|
atomic::{AtomicBool, Ordering},
|
|
Arc, RwLock,
|
|
},
|
|
time::{Duration, Instant},
|
|
},
|
|
thiserror::Error,
|
|
tokio::task::JoinHandle,
|
|
};
|
|
|
|
// Export types so test clients can limit their solana crate dependencies
|
|
pub use solana_banks_client::BanksClient;
|
|
pub mod programs;
|
|
|
|
#[macro_use]
|
|
extern crate solana_bpf_loader_program;
|
|
|
|
pub fn to_instruction_error(error: ProgramError) -> InstructionError {
|
|
match error {
|
|
ProgramError::Custom(err) => InstructionError::Custom(err),
|
|
ProgramError::InvalidArgument => InstructionError::InvalidArgument,
|
|
ProgramError::InvalidInstructionData => InstructionError::InvalidInstructionData,
|
|
ProgramError::InvalidAccountData => InstructionError::InvalidAccountData,
|
|
ProgramError::AccountDataTooSmall => InstructionError::AccountDataTooSmall,
|
|
ProgramError::InsufficientFunds => InstructionError::InsufficientFunds,
|
|
ProgramError::IncorrectProgramId => InstructionError::IncorrectProgramId,
|
|
ProgramError::MissingRequiredSignature => InstructionError::MissingRequiredSignature,
|
|
ProgramError::AccountAlreadyInitialized => InstructionError::AccountAlreadyInitialized,
|
|
ProgramError::UninitializedAccount => InstructionError::UninitializedAccount,
|
|
ProgramError::NotEnoughAccountKeys => InstructionError::NotEnoughAccountKeys,
|
|
ProgramError::AccountBorrowFailed => InstructionError::AccountBorrowFailed,
|
|
ProgramError::MaxSeedLengthExceeded => InstructionError::MaxSeedLengthExceeded,
|
|
ProgramError::InvalidSeeds => InstructionError::InvalidSeeds,
|
|
ProgramError::BorshIoError(err) => InstructionError::BorshIoError(err),
|
|
ProgramError::AccountNotRentExempt => InstructionError::AccountNotRentExempt,
|
|
}
|
|
}
|
|
|
|
/// Errors from the program test environment
|
|
#[derive(Error, Debug, PartialEq)]
|
|
pub enum ProgramTestError {
|
|
/// The chosen warp slot is not in the future, so warp is not performed
|
|
#[error("Warp slot not in the future")]
|
|
InvalidWarpSlot,
|
|
}
|
|
|
|
thread_local! {
|
|
static INVOKE_CONTEXT: RefCell<Option<(usize, usize)>> = RefCell::new(None);
|
|
}
|
|
fn set_invoke_context(new: &mut dyn InvokeContext) {
|
|
INVOKE_CONTEXT.with(|invoke_context| unsafe {
|
|
invoke_context.replace(Some(transmute::<_, (usize, usize)>(new)))
|
|
});
|
|
}
|
|
fn get_invoke_context<'a>() -> &'a mut dyn InvokeContext {
|
|
let fat = INVOKE_CONTEXT.with(|invoke_context| match *invoke_context.borrow() {
|
|
Some(val) => val,
|
|
None => panic!("Invoke context not set!"),
|
|
});
|
|
unsafe { transmute::<(usize, usize), &mut dyn InvokeContext>(fat) }
|
|
}
|
|
|
|
pub fn builtin_process_instruction(
|
|
process_instruction: solana_program::entrypoint::ProcessInstruction,
|
|
program_id: &Pubkey,
|
|
keyed_accounts: &[KeyedAccount],
|
|
input: &[u8],
|
|
invoke_context: &mut dyn InvokeContext,
|
|
) -> Result<(), InstructionError> {
|
|
set_invoke_context(invoke_context);
|
|
|
|
// Copy all the accounts into a HashMap to ensure there are no duplicates
|
|
let mut accounts: HashMap<Pubkey, Account> = keyed_accounts
|
|
.iter()
|
|
.map(|ka| (*ka.unsigned_key(), ka.account.borrow().clone()))
|
|
.collect();
|
|
|
|
// Create shared references to each account's lamports/data/owner
|
|
let account_refs: HashMap<_, _> = accounts
|
|
.iter_mut()
|
|
.map(|(key, account)| {
|
|
(
|
|
*key,
|
|
(
|
|
Rc::new(RefCell::new(&mut account.lamports)),
|
|
Rc::new(RefCell::new(&mut account.data[..])),
|
|
&account.owner,
|
|
),
|
|
)
|
|
})
|
|
.collect();
|
|
|
|
// Create AccountInfos
|
|
let account_infos: Vec<AccountInfo> = keyed_accounts
|
|
.iter()
|
|
.map(|keyed_account| {
|
|
let key = keyed_account.unsigned_key();
|
|
let (lamports, data, owner) = &account_refs[key];
|
|
AccountInfo {
|
|
key,
|
|
is_signer: keyed_account.signer_key().is_some(),
|
|
is_writable: keyed_account.is_writable(),
|
|
lamports: lamports.clone(),
|
|
data: data.clone(),
|
|
owner,
|
|
executable: keyed_account.executable().unwrap(),
|
|
rent_epoch: keyed_account.rent_epoch().unwrap(),
|
|
}
|
|
})
|
|
.collect();
|
|
|
|
// Execute the program
|
|
let result =
|
|
process_instruction(program_id, &account_infos, input).map_err(to_instruction_error);
|
|
|
|
if result.is_ok() {
|
|
// Commit AccountInfo changes back into KeyedAccounts
|
|
for keyed_account in keyed_accounts {
|
|
let mut account = keyed_account.account.borrow_mut();
|
|
let key = keyed_account.unsigned_key();
|
|
let (lamports, data, _owner) = &account_refs[key];
|
|
account.lamports = **lamports.borrow();
|
|
account.data = data.borrow().to_vec();
|
|
}
|
|
}
|
|
|
|
result
|
|
}
|
|
|
|
/// Converts a `solana-program`-style entrypoint into the runtime's entrypoint style, for
|
|
/// use with `ProgramTest::add_program`
|
|
#[macro_export]
|
|
macro_rules! processor {
|
|
($process_instruction:expr) => {
|
|
Some(
|
|
|program_id: &Pubkey,
|
|
keyed_accounts: &[solana_sdk::keyed_account::KeyedAccount],
|
|
input: &[u8],
|
|
invoke_context: &mut dyn solana_sdk::process_instruction::InvokeContext| {
|
|
$crate::builtin_process_instruction(
|
|
$process_instruction,
|
|
program_id,
|
|
keyed_accounts,
|
|
input,
|
|
invoke_context,
|
|
)
|
|
},
|
|
)
|
|
};
|
|
}
|
|
|
|
struct SyscallStubs {}
|
|
impl program_stubs::SyscallStubs for SyscallStubs {
|
|
fn sol_log(&self, message: &str) {
|
|
let invoke_context = get_invoke_context();
|
|
let logger = invoke_context.get_logger();
|
|
let logger = logger.borrow_mut();
|
|
if logger.log_enabled() {
|
|
logger.log(&format!("Program log: {}", message));
|
|
}
|
|
}
|
|
|
|
fn sol_invoke_signed(
|
|
&self,
|
|
instruction: &Instruction,
|
|
account_infos: &[AccountInfo],
|
|
signers_seeds: &[&[&[u8]]],
|
|
) -> ProgramResult {
|
|
//
|
|
// TODO: Merge the business logic below with the BPF invoke path in
|
|
// programs/bpf_loader/src/syscalls.rs
|
|
//
|
|
|
|
let invoke_context = get_invoke_context();
|
|
let logger = invoke_context.get_logger();
|
|
|
|
let caller = *invoke_context.get_caller().expect("get_caller");
|
|
if instruction.accounts.len() + 1 != account_infos.len() {
|
|
panic!(
|
|
"Instruction accounts mismatch. Instruction contains {} accounts, with {}
|
|
AccountInfos provided",
|
|
instruction.accounts.len(),
|
|
account_infos.len()
|
|
);
|
|
}
|
|
let message = Message::new(&[instruction.clone()], None);
|
|
let program_id_index = message.instructions[0].program_id_index as usize;
|
|
let program_id = message.account_keys[program_id_index];
|
|
let program_account_info = &account_infos[program_id_index];
|
|
// TODO don't have the caller's keyed_accounts so can't validate writer or signer escalation or deescalation yet
|
|
let caller_privileges = message
|
|
.account_keys
|
|
.iter()
|
|
.enumerate()
|
|
.map(|(i, _)| message.is_writable(i))
|
|
.collect::<Vec<bool>>();
|
|
|
|
stable_log::program_invoke(&logger, &program_id, invoke_context.invoke_depth());
|
|
|
|
fn ai_to_a(ai: &AccountInfo) -> Account {
|
|
Account {
|
|
lamports: ai.lamports(),
|
|
data: ai.try_borrow_data().unwrap().to_vec(),
|
|
owner: *ai.owner,
|
|
executable: ai.executable,
|
|
rent_epoch: ai.rent_epoch,
|
|
}
|
|
}
|
|
let executables = vec![(program_id, RefCell::new(ai_to_a(program_account_info)))];
|
|
|
|
// Convert AccountInfos into Accounts
|
|
let mut accounts = vec![];
|
|
for key in &message.account_keys {
|
|
for account_info in account_infos {
|
|
if account_info.unsigned_key() == key {
|
|
accounts.push(Rc::new(RefCell::new(ai_to_a(account_info))));
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
assert_eq!(
|
|
accounts.len(),
|
|
message.account_keys.len(),
|
|
"Missing or not enough accounts passed to invoke"
|
|
);
|
|
|
|
// Check Signers
|
|
for account_info in account_infos {
|
|
for instruction_account in &instruction.accounts {
|
|
if *account_info.unsigned_key() == instruction_account.pubkey
|
|
&& instruction_account.is_signer
|
|
&& !account_info.is_signer
|
|
{
|
|
let mut program_signer = false;
|
|
for seeds in signers_seeds.iter() {
|
|
let signer = Pubkey::create_program_address(&seeds, &caller).unwrap();
|
|
if instruction_account.pubkey == signer {
|
|
program_signer = true;
|
|
break;
|
|
}
|
|
}
|
|
if !program_signer {
|
|
panic!("Missing signer for {}", instruction_account.pubkey);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
invoke_context.record_instruction(&instruction);
|
|
|
|
solana_runtime::message_processor::MessageProcessor::process_cross_program_instruction(
|
|
&message,
|
|
&executables,
|
|
&accounts,
|
|
&caller_privileges,
|
|
invoke_context,
|
|
)
|
|
.map_err(|err| ProgramError::try_from(err).unwrap_or_else(|err| panic!("{}", err)))?;
|
|
|
|
// Copy writeable account modifications back into the caller's AccountInfos
|
|
for (i, instruction_account) in instruction.accounts.iter().enumerate() {
|
|
if !instruction_account.is_writable {
|
|
continue;
|
|
}
|
|
|
|
for account_info in account_infos {
|
|
if *account_info.unsigned_key() == instruction_account.pubkey {
|
|
let account = &accounts[i];
|
|
**account_info.try_borrow_mut_lamports().unwrap() = account.borrow().lamports;
|
|
|
|
let mut data = account_info.try_borrow_mut_data()?;
|
|
let new_data = &account.borrow().data;
|
|
if *account_info.owner != account.borrow().owner {
|
|
// TODO Figure out a better way to allow the System Program to set the account owner
|
|
#[allow(clippy::transmute_ptr_to_ptr)]
|
|
#[allow(mutable_transmutes)]
|
|
let account_info_mut =
|
|
unsafe { transmute::<&Pubkey, &mut Pubkey>(account_info.owner) };
|
|
*account_info_mut = account.borrow().owner;
|
|
}
|
|
if data.len() != new_data.len() {
|
|
// TODO: Figure out how to allow the System Program to resize the account data
|
|
panic!(
|
|
"Account data resizing not supported yet: {} -> {}. \
|
|
Consider making this test conditional on `#[cfg(feature = \"test-bpf\")]`",
|
|
data.len(),
|
|
new_data.len()
|
|
);
|
|
}
|
|
data.clone_from_slice(new_data);
|
|
}
|
|
}
|
|
}
|
|
|
|
stable_log::program_success(&logger, &program_id);
|
|
Ok(())
|
|
}
|
|
}
|
|
|
|
pub fn find_file(filename: &str) -> Option<PathBuf> {
|
|
let mut search_path = vec![];
|
|
if let Ok(bpf_out_dir) = std::env::var("BPF_OUT_DIR") {
|
|
search_path.push(PathBuf::from(bpf_out_dir));
|
|
}
|
|
search_path.push(PathBuf::from("tests/fixtures"));
|
|
if let Ok(dir) = std::env::current_dir() {
|
|
search_path.push(dir);
|
|
}
|
|
trace!("search path: {:?}", search_path);
|
|
|
|
for path in search_path {
|
|
let candidate = path.join(&filename);
|
|
if candidate.exists() {
|
|
return Some(candidate);
|
|
}
|
|
}
|
|
None
|
|
}
|
|
|
|
pub fn read_file<P: AsRef<Path>>(path: P) -> Vec<u8> {
|
|
let path = path.as_ref();
|
|
let mut file = File::open(path)
|
|
.unwrap_or_else(|err| panic!("Failed to open \"{}\": {}", path.display(), err));
|
|
|
|
let mut file_data = Vec::new();
|
|
file.read_to_end(&mut file_data)
|
|
.unwrap_or_else(|err| panic!("Failed to read \"{}\": {}", path.display(), err));
|
|
file_data
|
|
}
|
|
|
|
fn setup_fee_calculator(bank: Bank) -> Bank {
|
|
// Realistic fee_calculator part 1: Fake a single signature by calling
|
|
// `bank.commit_transactions()` so that the fee calculator in the child bank will be
|
|
// initialized with a non-zero fee.
|
|
assert_eq!(bank.signature_count(), 0);
|
|
bank.commit_transactions(
|
|
&[],
|
|
None,
|
|
&mut [],
|
|
&[],
|
|
0,
|
|
1,
|
|
&mut ExecuteTimings::default(),
|
|
);
|
|
assert_eq!(bank.signature_count(), 1);
|
|
|
|
// Advance beyond slot 0 for a slightly more realistic test environment
|
|
let bank = Arc::new(bank);
|
|
let bank = Bank::new_from_parent(&bank, bank.collector_id(), bank.slot() + 1);
|
|
debug!("Bank slot: {}", bank.slot());
|
|
|
|
// Realistic fee_calculator part 2: Tick until a new blockhash is produced to pick up the
|
|
// non-zero fee calculator
|
|
let last_blockhash = bank.last_blockhash();
|
|
while last_blockhash == bank.last_blockhash() {
|
|
bank.register_tick(&Hash::new_unique());
|
|
}
|
|
let last_blockhash = bank.last_blockhash();
|
|
// Make sure the new last_blockhash now requires a fee
|
|
assert_ne!(
|
|
bank.get_fee_calculator(&last_blockhash)
|
|
.expect("fee_calculator")
|
|
.lamports_per_signature,
|
|
0
|
|
);
|
|
|
|
bank
|
|
}
|
|
|
|
pub struct ProgramTest {
|
|
accounts: Vec<(Pubkey, Account)>,
|
|
builtins: Vec<Builtin>,
|
|
bpf_compute_max_units: Option<u64>,
|
|
prefer_bpf: bool,
|
|
}
|
|
|
|
impl Default for ProgramTest {
|
|
/// Initialize a new ProgramTest
|
|
///
|
|
/// If the `BPF_OUT_DIR` environment variable is defined, BPF programs will be preferred over
|
|
/// over a native instruction processor. The `ProgramTest::prefer_bpf()` method may be
|
|
/// used to override this preference at runtime. `cargo test-bpf` will set `BPF_OUT_DIR`
|
|
/// automatically.
|
|
///
|
|
/// BPF program shared objects and account data files are searched for in
|
|
/// * the value of the `BPF_OUT_DIR` environment variable
|
|
/// * the `tests/fixtures` sub-directory
|
|
/// * the current working directory
|
|
///
|
|
fn default() -> Self {
|
|
solana_logger::setup_with_default(
|
|
"solana_bpf_loader=debug,\
|
|
solana_rbpf::vm=debug,\
|
|
solana_runtime::message_processor=debug,\
|
|
solana_runtime::system_instruction_processor=trace,\
|
|
solana_program_test=info",
|
|
);
|
|
let prefer_bpf = std::env::var("BPF_OUT_DIR").is_ok();
|
|
|
|
Self {
|
|
accounts: vec![],
|
|
builtins: vec![],
|
|
bpf_compute_max_units: None,
|
|
prefer_bpf,
|
|
}
|
|
}
|
|
}
|
|
|
|
impl ProgramTest {
|
|
pub fn new(
|
|
program_name: &str,
|
|
program_id: Pubkey,
|
|
process_instruction: Option<ProcessInstructionWithContext>,
|
|
) -> Self {
|
|
let mut me = Self::default();
|
|
me.add_program(program_name, program_id, process_instruction);
|
|
me
|
|
}
|
|
|
|
/// Override default BPF program selection
|
|
pub fn prefer_bpf(&mut self, prefer_bpf: bool) {
|
|
self.prefer_bpf = prefer_bpf;
|
|
}
|
|
|
|
/// Override the BPF compute budget
|
|
pub fn set_bpf_compute_max_units(&mut self, bpf_compute_max_units: u64) {
|
|
self.bpf_compute_max_units = Some(bpf_compute_max_units);
|
|
}
|
|
|
|
/// Add an account to the test environment
|
|
pub fn add_account(&mut self, address: Pubkey, account: Account) {
|
|
self.accounts.push((address, account));
|
|
}
|
|
|
|
/// Add an account to the test environment with the account data in the provided `filename`
|
|
pub fn add_account_with_file_data(
|
|
&mut self,
|
|
address: Pubkey,
|
|
lamports: u64,
|
|
owner: Pubkey,
|
|
filename: &str,
|
|
) {
|
|
self.add_account(
|
|
address,
|
|
Account {
|
|
lamports,
|
|
data: read_file(find_file(filename).unwrap_or_else(|| {
|
|
panic!("Unable to locate {}", filename);
|
|
})),
|
|
owner,
|
|
executable: false,
|
|
rent_epoch: 0,
|
|
},
|
|
);
|
|
}
|
|
|
|
/// Add an account to the test environment with the account data in the provided as a base 64
|
|
/// string
|
|
pub fn add_account_with_base64_data(
|
|
&mut self,
|
|
address: Pubkey,
|
|
lamports: u64,
|
|
owner: Pubkey,
|
|
data_base64: &str,
|
|
) {
|
|
self.add_account(
|
|
address,
|
|
Account {
|
|
lamports,
|
|
data: base64::decode(data_base64)
|
|
.unwrap_or_else(|err| panic!("Failed to base64 decode: {}", err)),
|
|
owner,
|
|
executable: false,
|
|
rent_epoch: 0,
|
|
},
|
|
);
|
|
}
|
|
|
|
/// Add a BPF program to the test environment.
|
|
///
|
|
/// `program_name` will also used to locate the BPF shared object in the current or fixtures
|
|
/// directory.
|
|
///
|
|
/// If `process_instruction` is provided, the natively built-program may be used instead of the
|
|
/// BPF shared object depending on the `bpf` environment variable.
|
|
pub fn add_program(
|
|
&mut self,
|
|
program_name: &str,
|
|
program_id: Pubkey,
|
|
process_instruction: Option<ProcessInstructionWithContext>,
|
|
) {
|
|
let loader = solana_program::bpf_loader::id();
|
|
let program_file = find_file(&format!("{}.so", program_name));
|
|
|
|
if process_instruction.is_none() && program_file.is_none() {
|
|
panic!("Unable to add program {} ({})", program_name, program_id);
|
|
}
|
|
|
|
if (program_file.is_some() && self.prefer_bpf) || process_instruction.is_none() {
|
|
let program_file = program_file.unwrap_or_else(|| {
|
|
panic!(
|
|
"Program file data not available for {} ({})",
|
|
program_name, program_id
|
|
);
|
|
});
|
|
let data = read_file(&program_file);
|
|
info!(
|
|
"\"{}\" BPF program from {}{}",
|
|
program_name,
|
|
program_file.display(),
|
|
std::fs::metadata(&program_file)
|
|
.map(|metadata| {
|
|
metadata
|
|
.modified()
|
|
.map(|time| {
|
|
format!(
|
|
", modified {}",
|
|
HumanTime::from(time)
|
|
.to_text_en(Accuracy::Precise, Tense::Past)
|
|
)
|
|
})
|
|
.ok()
|
|
})
|
|
.ok()
|
|
.flatten()
|
|
.unwrap_or_else(|| "".to_string())
|
|
);
|
|
|
|
self.add_account(
|
|
program_id,
|
|
Account {
|
|
lamports: Rent::default().minimum_balance(data.len()).min(1),
|
|
data,
|
|
owner: loader,
|
|
executable: true,
|
|
rent_epoch: 0,
|
|
},
|
|
);
|
|
} else {
|
|
info!("\"{}\" program loaded as native code", program_name);
|
|
self.builtins.push(Builtin::new(
|
|
program_name,
|
|
program_id,
|
|
process_instruction.unwrap_or_else(|| {
|
|
panic!(
|
|
"Program processor not available for {} ({})",
|
|
program_name, program_id
|
|
);
|
|
}),
|
|
));
|
|
}
|
|
}
|
|
|
|
fn setup_bank(
|
|
&self,
|
|
) -> (
|
|
Arc<RwLock<BankForks>>,
|
|
Arc<RwLock<BlockCommitmentCache>>,
|
|
Hash,
|
|
GenesisConfigInfo,
|
|
) {
|
|
{
|
|
use std::sync::Once;
|
|
static ONCE: Once = Once::new();
|
|
|
|
ONCE.call_once(|| {
|
|
program_stubs::set_syscall_stubs(Box::new(SyscallStubs {}));
|
|
});
|
|
}
|
|
|
|
let rent = Rent::default();
|
|
let bootstrap_validator_pubkey = Pubkey::new_unique();
|
|
let bootstrap_validator_lamports = rent.minimum_balance(VoteState::size_of());
|
|
|
|
let mut gci = create_genesis_config_with_leader(
|
|
sol_to_lamports(1_000_000.0),
|
|
&bootstrap_validator_pubkey,
|
|
bootstrap_validator_lamports,
|
|
);
|
|
let genesis_config = &mut gci.genesis_config;
|
|
genesis_config.rent = rent;
|
|
genesis_config.fee_rate_governor =
|
|
solana_program::fee_calculator::FeeRateGovernor::default();
|
|
debug!("Payer address: {}", gci.mint_keypair.pubkey());
|
|
debug!("Genesis config: {}", genesis_config);
|
|
|
|
let mut bank = Bank::new(&genesis_config);
|
|
|
|
for loader in &[
|
|
solana_bpf_loader_deprecated_program!(),
|
|
solana_bpf_loader_program!(),
|
|
] {
|
|
bank.add_builtin(&loader.0, loader.1, loader.2);
|
|
}
|
|
|
|
// Add commonly-used SPL programs as a convenience to the user
|
|
for (program_id, account) in programs::spl_programs(&Rent::default()).iter() {
|
|
bank.store_account(program_id, &account);
|
|
}
|
|
|
|
// User-supplied additional builtins
|
|
for builtin in self.builtins.iter() {
|
|
bank.add_builtin(
|
|
&builtin.name,
|
|
builtin.id,
|
|
builtin.process_instruction_with_context,
|
|
);
|
|
}
|
|
|
|
for (address, account) in self.accounts.iter() {
|
|
if bank.get_account(&address).is_some() {
|
|
info!("Overriding account at {}", address);
|
|
}
|
|
bank.store_account(&address, &account);
|
|
}
|
|
bank.set_capitalization();
|
|
if let Some(max_units) = self.bpf_compute_max_units {
|
|
bank.set_bpf_compute_budget(Some(BpfComputeBudget {
|
|
max_units,
|
|
..BpfComputeBudget::default()
|
|
}));
|
|
}
|
|
let bank = setup_fee_calculator(bank);
|
|
let slot = bank.slot();
|
|
let last_blockhash = bank.last_blockhash();
|
|
let bank_forks = Arc::new(RwLock::new(BankForks::new(bank)));
|
|
let block_commitment_cache = Arc::new(RwLock::new(
|
|
BlockCommitmentCache::new_for_tests_with_slots(slot, slot),
|
|
));
|
|
|
|
(bank_forks, block_commitment_cache, last_blockhash, gci)
|
|
}
|
|
|
|
pub async fn start(self) -> (BanksClient, Keypair, Hash) {
|
|
let (bank_forks, block_commitment_cache, last_blockhash, gci) = self.setup_bank();
|
|
let transport =
|
|
start_local_server(bank_forks.clone(), block_commitment_cache.clone()).await;
|
|
let banks_client = start_client(transport)
|
|
.await
|
|
.unwrap_or_else(|err| panic!("Failed to start banks client: {}", err));
|
|
|
|
// Run a simulated PohService to provide the client with new blockhashes. New blockhashes
|
|
// are required when sending multiple otherwise identical transactions in series from a
|
|
// test
|
|
let target_tick_duration = gci.genesis_config.poh_config.target_tick_duration;
|
|
tokio::spawn(async move {
|
|
loop {
|
|
bank_forks
|
|
.read()
|
|
.unwrap()
|
|
.working_bank()
|
|
.register_tick(&Hash::new_unique());
|
|
tokio::time::sleep(target_tick_duration).await;
|
|
}
|
|
});
|
|
|
|
(banks_client, gci.mint_keypair, last_blockhash)
|
|
}
|
|
|
|
/// Start the test client
|
|
///
|
|
/// Returns a `BanksClient` interface into the test environment as well as a payer `Keypair`
|
|
/// with SOL for sending transactions
|
|
pub async fn start_with_context(self) -> ProgramTestContext {
|
|
let (bank_forks, block_commitment_cache, last_blockhash, gci) = self.setup_bank();
|
|
let transport =
|
|
start_local_server(bank_forks.clone(), block_commitment_cache.clone()).await;
|
|
let banks_client = start_client(transport)
|
|
.await
|
|
.unwrap_or_else(|err| panic!("Failed to start banks client: {}", err));
|
|
|
|
ProgramTestContext::new(
|
|
bank_forks,
|
|
block_commitment_cache,
|
|
banks_client,
|
|
last_blockhash,
|
|
gci,
|
|
)
|
|
}
|
|
}
|
|
|
|
#[async_trait]
|
|
pub trait ProgramTestBanksClientExt {
|
|
async fn get_new_blockhash(&mut self, blockhash: &Hash) -> io::Result<(Hash, FeeCalculator)>;
|
|
}
|
|
|
|
#[async_trait]
|
|
impl ProgramTestBanksClientExt for BanksClient {
|
|
/// Get a new blockhash, similar in spirit to RpcClient::get_new_blockhash()
|
|
///
|
|
/// This probably should eventually be moved into BanksClient proper in some form
|
|
async fn get_new_blockhash(&mut self, blockhash: &Hash) -> io::Result<(Hash, FeeCalculator)> {
|
|
let mut num_retries = 0;
|
|
let start = Instant::now();
|
|
while start.elapsed().as_secs() < 5 {
|
|
if let Ok((fee_calculator, new_blockhash, _slot)) = self.get_fees().await {
|
|
if new_blockhash != *blockhash {
|
|
return Ok((new_blockhash, fee_calculator));
|
|
}
|
|
}
|
|
debug!("Got same blockhash ({:?}), will retry...", blockhash);
|
|
|
|
tokio::time::sleep(Duration::from_millis(200)).await;
|
|
num_retries += 1;
|
|
}
|
|
|
|
Err(io::Error::new(
|
|
io::ErrorKind::Other,
|
|
format!(
|
|
"Unable to get new blockhash after {}ms (retried {} times), stuck at {}",
|
|
start.elapsed().as_millis(),
|
|
num_retries,
|
|
blockhash
|
|
),
|
|
))
|
|
}
|
|
}
|
|
|
|
struct DroppableTask<T>(Arc<AtomicBool>, JoinHandle<T>);
|
|
|
|
impl<T> Drop for DroppableTask<T> {
|
|
fn drop(&mut self) {
|
|
self.0.store(true, Ordering::Relaxed);
|
|
}
|
|
}
|
|
|
|
pub struct ProgramTestContext {
|
|
pub banks_client: BanksClient,
|
|
pub last_blockhash: Hash,
|
|
pub payer: Keypair,
|
|
genesis_config: GenesisConfig,
|
|
bank_forks: Arc<RwLock<BankForks>>,
|
|
block_commitment_cache: Arc<RwLock<BlockCommitmentCache>>,
|
|
_bank_task: DroppableTask<()>,
|
|
}
|
|
|
|
impl ProgramTestContext {
|
|
fn new(
|
|
bank_forks: Arc<RwLock<BankForks>>,
|
|
block_commitment_cache: Arc<RwLock<BlockCommitmentCache>>,
|
|
banks_client: BanksClient,
|
|
last_blockhash: Hash,
|
|
genesis_config_info: GenesisConfigInfo,
|
|
) -> Self {
|
|
// Run a simulated PohService to provide the client with new blockhashes. New blockhashes
|
|
// are required when sending multiple otherwise identical transactions in series from a
|
|
// test
|
|
let running_bank_forks = bank_forks.clone();
|
|
let target_tick_duration = genesis_config_info
|
|
.genesis_config
|
|
.poh_config
|
|
.target_tick_duration;
|
|
let exit = Arc::new(AtomicBool::new(false));
|
|
let bank_task = DroppableTask(
|
|
exit.clone(),
|
|
tokio::spawn(async move {
|
|
loop {
|
|
if exit.load(Ordering::Relaxed) {
|
|
break;
|
|
}
|
|
running_bank_forks
|
|
.read()
|
|
.unwrap()
|
|
.working_bank()
|
|
.register_tick(&Hash::new_unique());
|
|
tokio::time::sleep(target_tick_duration).await;
|
|
}
|
|
}),
|
|
);
|
|
|
|
Self {
|
|
banks_client,
|
|
last_blockhash,
|
|
payer: genesis_config_info.mint_keypair,
|
|
genesis_config: genesis_config_info.genesis_config,
|
|
bank_forks,
|
|
block_commitment_cache,
|
|
_bank_task: bank_task,
|
|
}
|
|
}
|
|
|
|
pub fn genesis_config(&self) -> &GenesisConfig {
|
|
&self.genesis_config
|
|
}
|
|
|
|
/// Manually increment vote credits for the current epoch in the specified vote account to simulate validator voting activity
|
|
pub fn increment_vote_account_credits(
|
|
&mut self,
|
|
vote_account_address: &Pubkey,
|
|
number_of_credits: u64,
|
|
) {
|
|
let bank_forks = self.bank_forks.read().unwrap();
|
|
let bank = bank_forks.working_bank();
|
|
|
|
// generate some vote activity for rewards
|
|
let mut vote_account = bank.get_account(vote_account_address).unwrap();
|
|
let mut vote_state = VoteState::from(&vote_account).unwrap();
|
|
|
|
let epoch = bank.epoch();
|
|
for _ in 0..number_of_credits {
|
|
vote_state.increment_credits(epoch);
|
|
}
|
|
let versioned = VoteStateVersions::new_current(vote_state);
|
|
VoteState::to(&versioned, &mut vote_account).unwrap();
|
|
bank.store_account(vote_account_address, &vote_account);
|
|
}
|
|
|
|
/// Force the working bank ahead to a new slot
|
|
pub fn warp_to_slot(&mut self, warp_slot: Slot) -> Result<(), ProgramTestError> {
|
|
let mut bank_forks = self.bank_forks.write().unwrap();
|
|
let bank = bank_forks.working_bank();
|
|
|
|
// Force ticks until a new blockhash, otherwise retried transactions will have
|
|
// the same signature
|
|
let last_blockhash = bank.last_blockhash();
|
|
while last_blockhash == bank.last_blockhash() {
|
|
bank.register_tick(&Hash::new_unique());
|
|
}
|
|
|
|
// warp ahead to one slot *before* the desired slot because the warped
|
|
// bank is frozen
|
|
let working_slot = bank.slot();
|
|
if warp_slot <= working_slot {
|
|
return Err(ProgramTestError::InvalidWarpSlot);
|
|
}
|
|
|
|
let pre_warp_slot = warp_slot - 1;
|
|
let warp_bank = bank_forks.insert(Bank::warp_from_parent(
|
|
&bank,
|
|
&Pubkey::default(),
|
|
pre_warp_slot,
|
|
));
|
|
bank_forks.set_root(
|
|
pre_warp_slot,
|
|
&solana_runtime::accounts_background_service::AbsRequestSender::default(),
|
|
Some(warp_slot),
|
|
);
|
|
|
|
// warp bank is frozen, so go forward one slot from it
|
|
bank_forks.insert(Bank::new_from_parent(
|
|
&warp_bank,
|
|
&Pubkey::default(),
|
|
warp_slot,
|
|
));
|
|
|
|
// Update block commitment cache, otherwise banks server will poll at
|
|
// the wrong slot
|
|
let mut w_block_commitment_cache = self.block_commitment_cache.write().unwrap();
|
|
w_block_commitment_cache.set_all_slots(pre_warp_slot, warp_slot);
|
|
|
|
let bank = bank_forks.working_bank();
|
|
self.last_blockhash = bank.last_blockhash();
|
|
Ok(())
|
|
}
|
|
}
|