1435 lines
48 KiB
Rust
1435 lines
48 KiB
Rust
use log::*;
|
|
use solana_sdk::{
|
|
account::{get_signers, Account, KeyedAccount},
|
|
account_utils::StateMut,
|
|
instruction::InstructionError,
|
|
nonce_state::{NonceAccount, NonceState},
|
|
program_utils::{limited_deserialize, next_keyed_account},
|
|
pubkey::Pubkey,
|
|
system_instruction::{
|
|
create_address_with_seed, SystemError, SystemInstruction, MAX_PERMITTED_DATA_LENGTH,
|
|
},
|
|
system_program,
|
|
sysvar::{self, recent_blockhashes::RecentBlockhashes, rent::Rent, Sysvar},
|
|
};
|
|
use std::collections::HashSet;
|
|
|
|
// represents an address that may or may not have been generated
|
|
// from a seed
|
|
#[derive(PartialEq, Default, Debug)]
|
|
struct Address {
|
|
address: Pubkey,
|
|
base: Option<Pubkey>,
|
|
}
|
|
|
|
impl Address {
|
|
fn is_signer(&self, signers: &HashSet<Pubkey>) -> bool {
|
|
if let Some(base) = self.base {
|
|
signers.contains(&base)
|
|
} else {
|
|
signers.contains(&self.address)
|
|
}
|
|
}
|
|
fn create(
|
|
address: &Pubkey,
|
|
with_seed: Option<(&Pubkey, &str, &Pubkey)>,
|
|
) -> Result<Self, InstructionError> {
|
|
let base = if let Some((base, seed, program_id)) = with_seed {
|
|
// re-derive the address, must match the supplied address
|
|
if *address != create_address_with_seed(base, seed, program_id)? {
|
|
return Err(SystemError::AddressWithSeedMismatch.into());
|
|
}
|
|
Some(*base)
|
|
} else {
|
|
None
|
|
};
|
|
|
|
Ok(Self {
|
|
address: *address,
|
|
base,
|
|
})
|
|
}
|
|
}
|
|
|
|
fn allocate(
|
|
account: &mut Account,
|
|
address: &Address,
|
|
space: u64,
|
|
signers: &HashSet<Pubkey>,
|
|
) -> Result<(), InstructionError> {
|
|
if !address.is_signer(signers) {
|
|
debug!("Allocate: must carry signature of `to`");
|
|
return Err(InstructionError::MissingRequiredSignature);
|
|
}
|
|
|
|
// if it looks like the `to` account is already in use, bail
|
|
// (note that the id check is also enforced by message_processor)
|
|
if !account.data.is_empty() || !system_program::check_id(&account.owner) {
|
|
debug!(
|
|
"Allocate: invalid argument; account {:?} already in use",
|
|
address
|
|
);
|
|
return Err(SystemError::AccountAlreadyInUse.into());
|
|
}
|
|
|
|
if space > MAX_PERMITTED_DATA_LENGTH {
|
|
debug!(
|
|
"Allocate: requested space: {} is more than maximum allowed",
|
|
space
|
|
);
|
|
return Err(SystemError::InvalidAccountDataLength.into());
|
|
}
|
|
|
|
account.data = vec![0; space as usize];
|
|
|
|
Ok(())
|
|
}
|
|
|
|
fn assign(
|
|
account: &mut Account,
|
|
address: &Address,
|
|
program_id: &Pubkey,
|
|
signers: &HashSet<Pubkey>,
|
|
) -> Result<(), InstructionError> {
|
|
// no work to do, just return
|
|
if account.owner == *program_id {
|
|
return Ok(());
|
|
}
|
|
|
|
if !address.is_signer(&signers) {
|
|
debug!("Assign: account must sign");
|
|
return Err(InstructionError::MissingRequiredSignature);
|
|
}
|
|
|
|
// guard against sysvars being made
|
|
if sysvar::check_id(&program_id) {
|
|
debug!("Assign: program id {} invalid", program_id);
|
|
return Err(SystemError::InvalidProgramId.into());
|
|
}
|
|
|
|
account.owner = *program_id;
|
|
Ok(())
|
|
}
|
|
|
|
fn allocate_and_assign(
|
|
to: &mut Account,
|
|
to_address: &Address,
|
|
space: u64,
|
|
program_id: &Pubkey,
|
|
signers: &HashSet<Pubkey>,
|
|
) -> Result<(), InstructionError> {
|
|
allocate(to, to_address, space, signers)?;
|
|
assign(to, to_address, program_id, signers)
|
|
}
|
|
|
|
fn create_account(
|
|
from: &KeyedAccount,
|
|
to: &mut Account,
|
|
to_address: &Address,
|
|
lamports: u64,
|
|
space: u64,
|
|
program_id: &Pubkey,
|
|
signers: &HashSet<Pubkey>,
|
|
) -> Result<(), InstructionError> {
|
|
allocate_and_assign(to, to_address, space, program_id, signers)?;
|
|
transfer(from, to, lamports)
|
|
}
|
|
|
|
fn transfer(from: &KeyedAccount, to: &mut Account, lamports: u64) -> Result<(), InstructionError> {
|
|
if lamports == 0 {
|
|
return Ok(());
|
|
}
|
|
|
|
if from.signer_key().is_none() {
|
|
debug!("Transfer: from must sign");
|
|
return Err(InstructionError::MissingRequiredSignature);
|
|
}
|
|
|
|
if !from.data_is_empty()? {
|
|
debug!("Transfer: `from` must not carry data");
|
|
return Err(InstructionError::InvalidArgument);
|
|
}
|
|
if lamports > from.lamports()? {
|
|
debug!(
|
|
"Transfer: insufficient lamports ({}, need {})",
|
|
from.lamports()?,
|
|
lamports
|
|
);
|
|
return Err(SystemError::ResultWithNegativeLamports.into());
|
|
}
|
|
|
|
from.try_account_ref_mut()?.lamports -= lamports;
|
|
to.lamports += lamports;
|
|
Ok(())
|
|
}
|
|
|
|
pub fn process_instruction(
|
|
_program_id: &Pubkey,
|
|
keyed_accounts: &[KeyedAccount],
|
|
instruction_data: &[u8],
|
|
) -> Result<(), InstructionError> {
|
|
let instruction = limited_deserialize(instruction_data)?;
|
|
|
|
trace!("process_instruction: {:?}", instruction);
|
|
trace!("keyed_accounts: {:?}", keyed_accounts);
|
|
|
|
let signers = get_signers(keyed_accounts);
|
|
let keyed_accounts_iter = &mut keyed_accounts.iter();
|
|
|
|
match instruction {
|
|
SystemInstruction::CreateAccount {
|
|
lamports,
|
|
space,
|
|
program_id,
|
|
} => {
|
|
let from = next_keyed_account(keyed_accounts_iter)?;
|
|
let to = next_keyed_account(keyed_accounts_iter)?;
|
|
let mut to_account = to.try_account_ref_mut()?;
|
|
let to_address = Address::create(to.unsigned_key(), None)?;
|
|
create_account(
|
|
from,
|
|
&mut to_account,
|
|
&to_address,
|
|
lamports,
|
|
space,
|
|
&program_id,
|
|
&signers,
|
|
)
|
|
}
|
|
SystemInstruction::CreateAccountWithSeed {
|
|
base,
|
|
seed,
|
|
lamports,
|
|
space,
|
|
program_id,
|
|
} => {
|
|
let from = next_keyed_account(keyed_accounts_iter)?;
|
|
let to = next_keyed_account(keyed_accounts_iter)?;
|
|
let mut to_account = to.try_account_ref_mut()?;
|
|
let to_address =
|
|
Address::create(&to.unsigned_key(), Some((&base, &seed, &program_id)))?;
|
|
create_account(
|
|
from,
|
|
&mut to_account,
|
|
&to_address,
|
|
lamports,
|
|
space,
|
|
&program_id,
|
|
&signers,
|
|
)
|
|
}
|
|
SystemInstruction::Assign { program_id } => {
|
|
let keyed_account = next_keyed_account(keyed_accounts_iter)?;
|
|
let mut account = keyed_account.try_account_ref_mut()?;
|
|
let address = Address::create(keyed_account.unsigned_key(), None)?;
|
|
assign(&mut account, &address, &program_id, &signers)
|
|
}
|
|
SystemInstruction::Transfer { lamports } => {
|
|
let from = next_keyed_account(keyed_accounts_iter)?;
|
|
let mut to_account = next_keyed_account(keyed_accounts_iter)?.try_account_ref_mut()?;
|
|
transfer(from, &mut to_account, lamports)
|
|
}
|
|
SystemInstruction::AdvanceNonceAccount => {
|
|
let me = &mut next_keyed_account(keyed_accounts_iter)?;
|
|
me.advance_nonce_account(
|
|
&RecentBlockhashes::from_keyed_account(next_keyed_account(keyed_accounts_iter)?)?,
|
|
&signers,
|
|
)
|
|
}
|
|
SystemInstruction::WithdrawNonceAccount(lamports) => {
|
|
let me = &mut next_keyed_account(keyed_accounts_iter)?;
|
|
let to = &mut next_keyed_account(keyed_accounts_iter)?;
|
|
me.withdraw_nonce_account(
|
|
lamports,
|
|
to,
|
|
&RecentBlockhashes::from_keyed_account(next_keyed_account(keyed_accounts_iter)?)?,
|
|
&Rent::from_keyed_account(next_keyed_account(keyed_accounts_iter)?)?,
|
|
&signers,
|
|
)
|
|
}
|
|
SystemInstruction::InitializeNonceAccount(authorized) => {
|
|
let me = &mut next_keyed_account(keyed_accounts_iter)?;
|
|
me.initialize_nonce_account(
|
|
&authorized,
|
|
&RecentBlockhashes::from_keyed_account(next_keyed_account(keyed_accounts_iter)?)?,
|
|
&Rent::from_keyed_account(next_keyed_account(keyed_accounts_iter)?)?,
|
|
)
|
|
}
|
|
SystemInstruction::AuthorizeNonceAccount(nonce_authority) => {
|
|
let me = &mut next_keyed_account(keyed_accounts_iter)?;
|
|
me.authorize_nonce_account(&nonce_authority, &signers)
|
|
}
|
|
SystemInstruction::Allocate { space } => {
|
|
let keyed_account = next_keyed_account(keyed_accounts_iter)?;
|
|
let mut account = keyed_account.try_account_ref_mut()?;
|
|
let address = Address::create(keyed_account.unsigned_key(), None)?;
|
|
allocate(&mut account, &address, space, &signers)
|
|
}
|
|
SystemInstruction::AllocateWithSeed {
|
|
base,
|
|
seed,
|
|
space,
|
|
program_id,
|
|
} => {
|
|
let keyed_account = next_keyed_account(keyed_accounts_iter)?;
|
|
let mut account = keyed_account.try_account_ref_mut()?;
|
|
let address = Address::create(
|
|
keyed_account.unsigned_key(),
|
|
Some((&base, &seed, &program_id)),
|
|
)?;
|
|
allocate_and_assign(&mut account, &address, space, &program_id, &signers)
|
|
}
|
|
SystemInstruction::AssignWithSeed {
|
|
base,
|
|
seed,
|
|
program_id,
|
|
} => {
|
|
let keyed_account = next_keyed_account(keyed_accounts_iter)?;
|
|
let mut account = keyed_account.try_account_ref_mut()?;
|
|
let address = Address::create(
|
|
keyed_account.unsigned_key(),
|
|
Some((&base, &seed, &program_id)),
|
|
)?;
|
|
|
|
assign(&mut account, &address, &program_id, &signers)
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Copy, Clone, Debug, Eq, PartialEq)]
|
|
pub enum SystemAccountKind {
|
|
System,
|
|
Nonce,
|
|
}
|
|
|
|
pub fn get_system_account_kind(account: &Account) -> Option<SystemAccountKind> {
|
|
if system_program::check_id(&account.owner) {
|
|
if account.data.is_empty() {
|
|
Some(SystemAccountKind::System)
|
|
} else if let Ok(NonceState::Initialized(_, _)) = account.state() {
|
|
Some(SystemAccountKind::Nonce)
|
|
} else {
|
|
None
|
|
}
|
|
} else {
|
|
None
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
use crate::{bank::Bank, bank_client::BankClient};
|
|
use bincode::serialize;
|
|
use solana_sdk::{
|
|
account::Account,
|
|
client::SyncClient,
|
|
genesis_config::create_genesis_config,
|
|
hash::{hash, Hash},
|
|
instruction::{AccountMeta, Instruction, InstructionError},
|
|
message::Message,
|
|
nonce_state,
|
|
signature::{Keypair, Signer},
|
|
system_instruction, system_program, sysvar,
|
|
transaction::TransactionError,
|
|
};
|
|
use std::cell::RefCell;
|
|
|
|
impl From<Pubkey> for Address {
|
|
fn from(address: Pubkey) -> Self {
|
|
Self {
|
|
address,
|
|
base: None,
|
|
}
|
|
}
|
|
}
|
|
|
|
fn create_default_account() -> RefCell<Account> {
|
|
RefCell::new(Account::default())
|
|
}
|
|
fn create_default_recent_blockhashes_account() -> RefCell<Account> {
|
|
RefCell::new(sysvar::recent_blockhashes::create_account_with_data(
|
|
1,
|
|
vec![(0u64, &Hash::default()); 32].into_iter(),
|
|
))
|
|
}
|
|
fn create_default_rent_account() -> RefCell<Account> {
|
|
RefCell::new(sysvar::recent_blockhashes::create_account_with_data(
|
|
1,
|
|
vec![(0u64, &Hash::default()); 32].into_iter(),
|
|
))
|
|
}
|
|
|
|
#[test]
|
|
fn test_create_account() {
|
|
let new_program_owner = Pubkey::new(&[9; 32]);
|
|
let from = Pubkey::new_rand();
|
|
let to = Pubkey::new_rand();
|
|
let from_account = Account::new_ref(100, 0, &system_program::id());
|
|
let to_account = Account::new_ref(0, 0, &Pubkey::default());
|
|
|
|
assert_eq!(
|
|
process_instruction(
|
|
&Pubkey::default(),
|
|
&[
|
|
KeyedAccount::new(&from, true, &from_account),
|
|
KeyedAccount::new(&to, true, &to_account)
|
|
],
|
|
&bincode::serialize(&SystemInstruction::CreateAccount {
|
|
lamports: 50,
|
|
space: 2,
|
|
program_id: new_program_owner
|
|
})
|
|
.unwrap()
|
|
),
|
|
Ok(())
|
|
);
|
|
assert_eq!(from_account.borrow().lamports, 50);
|
|
assert_eq!(to_account.borrow().lamports, 50);
|
|
assert_eq!(to_account.borrow().owner, new_program_owner);
|
|
assert_eq!(to_account.borrow().data, [0, 0]);
|
|
}
|
|
|
|
#[test]
|
|
fn test_create_account_with_seed() {
|
|
let new_program_owner = Pubkey::new(&[9; 32]);
|
|
let from = Pubkey::new_rand();
|
|
let seed = "shiny pepper";
|
|
let to = create_address_with_seed(&from, seed, &new_program_owner).unwrap();
|
|
|
|
let from_account = Account::new_ref(100, 0, &system_program::id());
|
|
let to_account = Account::new_ref(0, 0, &Pubkey::default());
|
|
|
|
assert_eq!(
|
|
process_instruction(
|
|
&Pubkey::default(),
|
|
&[
|
|
KeyedAccount::new(&from, true, &from_account),
|
|
KeyedAccount::new(&to, false, &to_account)
|
|
],
|
|
&bincode::serialize(&SystemInstruction::CreateAccountWithSeed {
|
|
base: from,
|
|
seed: seed.to_string(),
|
|
lamports: 50,
|
|
space: 2,
|
|
program_id: new_program_owner
|
|
})
|
|
.unwrap()
|
|
),
|
|
Ok(())
|
|
);
|
|
assert_eq!(from_account.borrow().lamports, 50);
|
|
assert_eq!(to_account.borrow().lamports, 50);
|
|
assert_eq!(to_account.borrow().owner, new_program_owner);
|
|
assert_eq!(to_account.borrow().data, [0, 0]);
|
|
}
|
|
|
|
#[test]
|
|
fn test_address_create_with_seed_mismatch() {
|
|
let from = Pubkey::new_rand();
|
|
let seed = "dull boy";
|
|
let to = Pubkey::new_rand();
|
|
let program_id = Pubkey::new_rand();
|
|
|
|
assert_eq!(
|
|
Address::create(&to, Some((&from, seed, &program_id))),
|
|
Err(SystemError::AddressWithSeedMismatch.into())
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_create_account_with_seed_missing_sig() {
|
|
let new_program_owner = Pubkey::new(&[9; 32]);
|
|
let from = Pubkey::new_rand();
|
|
let seed = "dull boy";
|
|
let to = create_address_with_seed(&from, seed, &new_program_owner).unwrap();
|
|
|
|
let from_account = Account::new_ref(100, 0, &system_program::id());
|
|
let mut to_account = Account::new(0, 0, &Pubkey::default());
|
|
let to_address = Address::create(&to, Some((&from, seed, &new_program_owner))).unwrap();
|
|
|
|
assert_eq!(
|
|
create_account(
|
|
&KeyedAccount::new(&from, false, &from_account),
|
|
&mut to_account,
|
|
&to_address,
|
|
50,
|
|
2,
|
|
&new_program_owner,
|
|
&HashSet::new(),
|
|
),
|
|
Err(InstructionError::MissingRequiredSignature)
|
|
);
|
|
assert_eq!(from_account.borrow().lamports, 100);
|
|
assert_eq!(to_account, Account::default());
|
|
}
|
|
|
|
#[test]
|
|
fn test_create_with_zero_lamports() {
|
|
// create account with zero lamports tranferred
|
|
let new_program_owner = Pubkey::new(&[9; 32]);
|
|
let from = Pubkey::new_rand();
|
|
let from_account = Account::new_ref(100, 1, &Pubkey::new_rand()); // not from system account
|
|
|
|
let to = Pubkey::new_rand();
|
|
let mut to_account = Account::new(0, 0, &Pubkey::default());
|
|
|
|
assert_eq!(
|
|
create_account(
|
|
&KeyedAccount::new(&from, false, &from_account), // no signer
|
|
&mut to_account,
|
|
&to.into(),
|
|
0,
|
|
2,
|
|
&new_program_owner,
|
|
&[to].iter().cloned().collect::<HashSet<_>>(),
|
|
),
|
|
Ok(())
|
|
);
|
|
|
|
let from_lamports = from_account.borrow().lamports;
|
|
let to_lamports = to_account.lamports;
|
|
let to_owner = to_account.owner;
|
|
let to_data = to_account.data.clone();
|
|
assert_eq!(from_lamports, 100);
|
|
assert_eq!(to_lamports, 0);
|
|
assert_eq!(to_owner, new_program_owner);
|
|
assert_eq!(to_data, [0, 0]);
|
|
}
|
|
|
|
#[test]
|
|
fn test_create_negative_lamports() {
|
|
// Attempt to create account with more lamports than remaining in from_account
|
|
let new_program_owner = Pubkey::new(&[9; 32]);
|
|
let from = Pubkey::new_rand();
|
|
let from_account = Account::new_ref(100, 0, &system_program::id());
|
|
|
|
let to = Pubkey::new_rand();
|
|
let mut to_account = Account::new(0, 0, &Pubkey::default());
|
|
|
|
let result = create_account(
|
|
&KeyedAccount::new(&from, true, &from_account),
|
|
&mut to_account,
|
|
&to.into(),
|
|
150,
|
|
2,
|
|
&new_program_owner,
|
|
&[from, to].iter().cloned().collect::<HashSet<_>>(),
|
|
);
|
|
assert_eq!(result, Err(SystemError::ResultWithNegativeLamports.into()));
|
|
}
|
|
|
|
#[test]
|
|
fn test_request_more_than_allowed_data_length() {
|
|
let from_account = Account::new_ref(100, 0, &system_program::id());
|
|
let from = Pubkey::new_rand();
|
|
let mut to_account = Account::default();
|
|
let to = Pubkey::new_rand();
|
|
|
|
let signers = &[from, to].iter().cloned().collect::<HashSet<_>>();
|
|
let address = &to.into();
|
|
|
|
// Trying to request more data length than permitted will result in failure
|
|
let result = create_account(
|
|
&KeyedAccount::new(&from, true, &from_account),
|
|
&mut to_account,
|
|
&address,
|
|
50,
|
|
MAX_PERMITTED_DATA_LENGTH + 1,
|
|
&system_program::id(),
|
|
&signers,
|
|
);
|
|
assert!(result.is_err());
|
|
assert_eq!(
|
|
result.err().unwrap(),
|
|
SystemError::InvalidAccountDataLength.into()
|
|
);
|
|
|
|
// Trying to request equal or less data length than permitted will be successful
|
|
let result = create_account(
|
|
&KeyedAccount::new(&from, true, &from_account),
|
|
&mut to_account,
|
|
&address,
|
|
50,
|
|
MAX_PERMITTED_DATA_LENGTH,
|
|
&system_program::id(),
|
|
&signers,
|
|
);
|
|
assert!(result.is_ok());
|
|
assert_eq!(to_account.lamports, 50);
|
|
assert_eq!(to_account.data.len() as u64, MAX_PERMITTED_DATA_LENGTH);
|
|
}
|
|
|
|
#[test]
|
|
fn test_create_already_in_use() {
|
|
// Attempt to create system account in account already owned by another program
|
|
let new_program_owner = Pubkey::new(&[9; 32]);
|
|
let from = Pubkey::new_rand();
|
|
let from_account = Account::new_ref(100, 0, &system_program::id());
|
|
|
|
let original_program_owner = Pubkey::new(&[5; 32]);
|
|
let owned_key = Pubkey::new_rand();
|
|
let mut owned_account = Account::new(0, 0, &original_program_owner);
|
|
let unchanged_account = owned_account.clone();
|
|
|
|
let signers = &[from, owned_key].iter().cloned().collect::<HashSet<_>>();
|
|
let owned_address = owned_key.into();
|
|
|
|
let result = create_account(
|
|
&KeyedAccount::new(&from, true, &from_account),
|
|
&mut owned_account,
|
|
&owned_address,
|
|
50,
|
|
2,
|
|
&new_program_owner,
|
|
&signers,
|
|
);
|
|
assert_eq!(result, Err(SystemError::AccountAlreadyInUse.into()));
|
|
|
|
let from_lamports = from_account.borrow().lamports;
|
|
assert_eq!(from_lamports, 100);
|
|
assert_eq!(owned_account, unchanged_account);
|
|
|
|
// Attempt to create system account in account that already has data
|
|
let mut owned_account = Account::new(0, 1, &Pubkey::default());
|
|
let unchanged_account = owned_account.clone();
|
|
let result = create_account(
|
|
&KeyedAccount::new(&from, true, &from_account),
|
|
&mut owned_account,
|
|
&owned_address,
|
|
50,
|
|
2,
|
|
&new_program_owner,
|
|
&signers,
|
|
);
|
|
assert_eq!(result, Err(SystemError::AccountAlreadyInUse.into()));
|
|
let from_lamports = from_account.borrow().lamports;
|
|
assert_eq!(from_lamports, 100);
|
|
assert_eq!(owned_account, unchanged_account);
|
|
|
|
// Verify that create_account works even if `to` has a non-zero balance
|
|
let mut owned_account = Account::new(1, 0, &Pubkey::default());
|
|
let result = create_account(
|
|
&KeyedAccount::new(&from, true, &from_account),
|
|
&mut owned_account,
|
|
&owned_address,
|
|
50,
|
|
2,
|
|
&new_program_owner,
|
|
&signers,
|
|
);
|
|
assert_eq!(result, Ok(()));
|
|
assert_eq!(from_account.borrow().lamports, from_lamports - 50);
|
|
assert_eq!(owned_account.lamports, 1 + 50);
|
|
}
|
|
|
|
#[test]
|
|
fn test_create_unsigned() {
|
|
// Attempt to create an account without signing the transfer
|
|
let new_program_owner = Pubkey::new(&[9; 32]);
|
|
let from = Pubkey::new_rand();
|
|
let from_account = Account::new_ref(100, 0, &system_program::id());
|
|
|
|
let owned_key = Pubkey::new_rand();
|
|
let mut owned_account = Account::new(0, 0, &Pubkey::default());
|
|
|
|
let owned_address = owned_key.into();
|
|
|
|
// Haven't signed from account
|
|
let result = create_account(
|
|
&KeyedAccount::new(&from, false, &from_account),
|
|
&mut owned_account,
|
|
&owned_address,
|
|
50,
|
|
2,
|
|
&new_program_owner,
|
|
&[owned_key].iter().cloned().collect::<HashSet<_>>(),
|
|
);
|
|
assert_eq!(result, Err(InstructionError::MissingRequiredSignature));
|
|
|
|
// Haven't signed to account
|
|
let mut owned_account = Account::new(0, 0, &Pubkey::default());
|
|
let result = create_account(
|
|
&KeyedAccount::new(&from, true, &from_account),
|
|
&mut owned_account,
|
|
&owned_address,
|
|
50,
|
|
2,
|
|
&new_program_owner,
|
|
&[from].iter().cloned().collect::<HashSet<_>>(),
|
|
);
|
|
assert_eq!(result, Err(InstructionError::MissingRequiredSignature));
|
|
|
|
// support creation/assignment with zero lamports (ephemeral account)
|
|
let mut owned_account = Account::new(0, 0, &Pubkey::default());
|
|
let result = create_account(
|
|
&KeyedAccount::new(&from, false, &from_account),
|
|
&mut owned_account,
|
|
&owned_address,
|
|
0,
|
|
2,
|
|
&new_program_owner,
|
|
&[owned_key].iter().cloned().collect::<HashSet<_>>(),
|
|
);
|
|
assert_eq!(result, Ok(()));
|
|
}
|
|
|
|
#[test]
|
|
fn test_create_sysvar_invalid_id() {
|
|
// Attempt to create system account in account already owned by another program
|
|
let from = Pubkey::new_rand();
|
|
let from_account = Account::new_ref(100, 0, &system_program::id());
|
|
|
|
let to = Pubkey::new_rand();
|
|
let mut to_account = Account::default();
|
|
|
|
let signers = [from, to].iter().cloned().collect::<HashSet<_>>();
|
|
let to_address = to.into();
|
|
|
|
// fail to create a sysvar::id() owned account
|
|
let result = create_account(
|
|
&KeyedAccount::new(&from, true, &from_account),
|
|
&mut to_account,
|
|
&to_address,
|
|
50,
|
|
2,
|
|
&sysvar::id(),
|
|
&signers,
|
|
);
|
|
|
|
assert_eq!(result, Err(SystemError::InvalidProgramId.into()));
|
|
}
|
|
|
|
#[test]
|
|
fn test_create_data_populated() {
|
|
// Attempt to create system account in account with populated data
|
|
let new_program_owner = Pubkey::new(&[9; 32]);
|
|
let from = Pubkey::new_rand();
|
|
let from_account = Account::new_ref(100, 0, &system_program::id());
|
|
|
|
let populated_key = Pubkey::new_rand();
|
|
let mut populated_account = Account {
|
|
data: vec![0, 1, 2, 3],
|
|
..Account::default()
|
|
};
|
|
|
|
let signers = [from, populated_key]
|
|
.iter()
|
|
.cloned()
|
|
.collect::<HashSet<_>>();
|
|
let populated_address = populated_key.into();
|
|
|
|
let result = create_account(
|
|
&KeyedAccount::new(&from, true, &from_account),
|
|
&mut populated_account,
|
|
&populated_address,
|
|
50,
|
|
2,
|
|
&new_program_owner,
|
|
&signers,
|
|
);
|
|
assert_eq!(result, Err(SystemError::AccountAlreadyInUse.into()));
|
|
}
|
|
|
|
#[test]
|
|
fn test_create_from_account_is_nonce_fail() {
|
|
let nonce = Pubkey::new_rand();
|
|
let nonce_account = Account::new_ref_data(
|
|
42,
|
|
&nonce_state::NonceState::Initialized(
|
|
nonce_state::Meta::new(&Pubkey::default()),
|
|
Hash::default(),
|
|
),
|
|
&system_program::id(),
|
|
)
|
|
.unwrap();
|
|
let from = KeyedAccount::new(&nonce, true, &nonce_account);
|
|
let new = Pubkey::new_rand();
|
|
|
|
let mut new_account = Account::default();
|
|
|
|
let signers = [nonce, new].iter().cloned().collect::<HashSet<_>>();
|
|
let new_address = new.into();
|
|
|
|
assert_eq!(
|
|
create_account(
|
|
&from,
|
|
&mut new_account,
|
|
&new_address,
|
|
42,
|
|
0,
|
|
&Pubkey::new_rand(),
|
|
&signers
|
|
),
|
|
Err(InstructionError::InvalidArgument),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_assign() {
|
|
let new_program_owner = Pubkey::new(&[9; 32]);
|
|
|
|
let pubkey = Pubkey::new_rand();
|
|
let mut account = Account::new(100, 0, &system_program::id());
|
|
|
|
assert_eq!(
|
|
assign(
|
|
&mut account,
|
|
&pubkey.into(),
|
|
&new_program_owner,
|
|
&HashSet::new()
|
|
),
|
|
Err(InstructionError::MissingRequiredSignature)
|
|
);
|
|
// no change, no signature needed
|
|
assert_eq!(
|
|
assign(
|
|
&mut account,
|
|
&pubkey.into(),
|
|
&system_program::id(),
|
|
&HashSet::new()
|
|
),
|
|
Ok(())
|
|
);
|
|
|
|
let account = RefCell::new(account);
|
|
assert_eq!(
|
|
process_instruction(
|
|
&Pubkey::default(),
|
|
&[KeyedAccount::new(&pubkey, true, &account)],
|
|
&bincode::serialize(&SystemInstruction::Assign {
|
|
program_id: new_program_owner
|
|
})
|
|
.unwrap()
|
|
),
|
|
Ok(())
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_assign_to_sysvar() {
|
|
let new_program_owner = sysvar::id();
|
|
|
|
let from = Pubkey::new_rand();
|
|
let mut from_account = Account::new(100, 0, &system_program::id());
|
|
|
|
assert_eq!(
|
|
assign(
|
|
&mut from_account,
|
|
&from.into(),
|
|
&new_program_owner,
|
|
&[from].iter().cloned().collect::<HashSet<_>>(),
|
|
),
|
|
Err(SystemError::InvalidProgramId.into())
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_bogus_instruction() {
|
|
// Attempt to assign with no accounts
|
|
let instruction = SystemInstruction::Assign {
|
|
program_id: Pubkey::new_rand(),
|
|
};
|
|
let data = serialize(&instruction).unwrap();
|
|
let result = process_instruction(&system_program::id(), &[], &data);
|
|
assert_eq!(result, Err(InstructionError::NotEnoughAccountKeys));
|
|
|
|
let from = Pubkey::new_rand();
|
|
let from_account = Account::new_ref(100, 0, &system_program::id());
|
|
// Attempt to transfer with no destination
|
|
let instruction = SystemInstruction::Transfer { lamports: 0 };
|
|
let data = serialize(&instruction).unwrap();
|
|
let result = process_instruction(
|
|
&system_program::id(),
|
|
&[KeyedAccount::new(&from, true, &from_account)],
|
|
&data,
|
|
);
|
|
assert_eq!(result, Err(InstructionError::NotEnoughAccountKeys));
|
|
}
|
|
|
|
#[test]
|
|
fn test_transfer_lamports() {
|
|
let from = Pubkey::new_rand();
|
|
let from_account = Account::new_ref(100, 0, &Pubkey::new(&[2; 32])); // account owner should not matter
|
|
let mut to_account = Account::new(1, 0, &Pubkey::new(&[3; 32])); // account owner should not matter
|
|
let from_keyed_account = KeyedAccount::new(&from, true, &from_account);
|
|
transfer(&from_keyed_account, &mut to_account, 50).unwrap();
|
|
let from_lamports = from_keyed_account.account.borrow().lamports;
|
|
let to_lamports = to_account.lamports;
|
|
assert_eq!(from_lamports, 50);
|
|
assert_eq!(to_lamports, 51);
|
|
|
|
// Attempt to move more lamports than remaining in from_account
|
|
let from_keyed_account = KeyedAccount::new(&from, true, &from_account);
|
|
let result = transfer(&from_keyed_account, &mut to_account, 100);
|
|
assert_eq!(result, Err(SystemError::ResultWithNegativeLamports.into()));
|
|
assert_eq!(from_keyed_account.account.borrow().lamports, 50);
|
|
assert_eq!(to_account.lamports, 51);
|
|
|
|
// test unsigned transfer of zero
|
|
let from_keyed_account = KeyedAccount::new(&from, false, &from_account);
|
|
assert!(transfer(&from_keyed_account, &mut to_account, 0,).is_ok(),);
|
|
assert_eq!(from_keyed_account.account.borrow().lamports, 50);
|
|
assert_eq!(to_account.lamports, 51);
|
|
}
|
|
|
|
#[test]
|
|
fn test_transfer_lamports_from_nonce_account_fail() {
|
|
let from = Pubkey::new_rand();
|
|
let from_account = Account::new_ref_data(
|
|
100,
|
|
&nonce_state::NonceState::Initialized(nonce_state::Meta::new(&from), Hash::default()),
|
|
&system_program::id(),
|
|
)
|
|
.unwrap();
|
|
assert_eq!(
|
|
get_system_account_kind(&from_account.borrow()),
|
|
Some(SystemAccountKind::Nonce)
|
|
);
|
|
|
|
let mut to_account = Account::new(1, 0, &Pubkey::new(&[3; 32])); // account owner should not matter
|
|
assert_eq!(
|
|
transfer(
|
|
&KeyedAccount::new(&from, true, &from_account),
|
|
&mut to_account,
|
|
50,
|
|
),
|
|
Err(InstructionError::InvalidArgument),
|
|
)
|
|
}
|
|
|
|
#[test]
|
|
fn test_allocate() {
|
|
let (genesis_config, mint_keypair) = create_genesis_config(100);
|
|
let bank = Bank::new(&genesis_config);
|
|
let bank_client = BankClient::new(bank);
|
|
|
|
let alice_keypair = Keypair::new();
|
|
let alice_pubkey = alice_keypair.pubkey();
|
|
let seed = "seed";
|
|
let program_id = Pubkey::new_rand();
|
|
let alice_with_seed = create_address_with_seed(&alice_pubkey, seed, &program_id).unwrap();
|
|
|
|
bank_client
|
|
.transfer(50, &mint_keypair, &alice_pubkey)
|
|
.unwrap();
|
|
|
|
let allocate_with_seed = Message::new_with_payer(
|
|
vec![system_instruction::allocate_with_seed(
|
|
&alice_with_seed,
|
|
&alice_pubkey,
|
|
seed,
|
|
2,
|
|
&program_id,
|
|
)],
|
|
Some(&alice_pubkey),
|
|
);
|
|
|
|
assert!(bank_client
|
|
.send_message(&[&alice_keypair], allocate_with_seed)
|
|
.is_ok());
|
|
|
|
let allocate = system_instruction::allocate(&alice_pubkey, 2);
|
|
|
|
assert!(bank_client
|
|
.send_instruction(&alice_keypair, allocate)
|
|
.is_ok());
|
|
}
|
|
|
|
#[test]
|
|
fn test_assign_with_seed() {
|
|
let (genesis_config, mint_keypair) = create_genesis_config(100);
|
|
let bank = Bank::new(&genesis_config);
|
|
let bank_client = BankClient::new(bank);
|
|
|
|
let alice_keypair = Keypair::new();
|
|
let alice_pubkey = alice_keypair.pubkey();
|
|
let seed = "seed";
|
|
let program_id = Pubkey::new_rand();
|
|
let alice_with_seed = create_address_with_seed(&alice_pubkey, seed, &program_id).unwrap();
|
|
|
|
bank_client
|
|
.transfer(50, &mint_keypair, &alice_pubkey)
|
|
.unwrap();
|
|
|
|
let assign_with_seed = Message::new_with_payer(
|
|
vec![system_instruction::assign_with_seed(
|
|
&alice_with_seed,
|
|
&alice_pubkey,
|
|
seed,
|
|
&program_id,
|
|
)],
|
|
Some(&alice_pubkey),
|
|
);
|
|
|
|
assert!(bank_client
|
|
.send_message(&[&alice_keypair], assign_with_seed)
|
|
.is_ok());
|
|
}
|
|
|
|
#[test]
|
|
fn test_system_unsigned_transaction() {
|
|
let (genesis_config, alice_keypair) = create_genesis_config(100);
|
|
let alice_pubkey = alice_keypair.pubkey();
|
|
let mallory_keypair = Keypair::new();
|
|
let mallory_pubkey = mallory_keypair.pubkey();
|
|
|
|
// Fund to account to bypass AccountNotFound error
|
|
let bank = Bank::new(&genesis_config);
|
|
let bank_client = BankClient::new(bank);
|
|
bank_client
|
|
.transfer(50, &alice_keypair, &mallory_pubkey)
|
|
.unwrap();
|
|
|
|
// Erroneously sign transaction with recipient account key
|
|
// No signature case is tested by bank `test_zero_signatures()`
|
|
let account_metas = vec![
|
|
AccountMeta::new(alice_pubkey, false),
|
|
AccountMeta::new(mallory_pubkey, true),
|
|
];
|
|
let malicious_instruction = Instruction::new(
|
|
system_program::id(),
|
|
&SystemInstruction::Transfer { lamports: 10 },
|
|
account_metas,
|
|
);
|
|
assert_eq!(
|
|
bank_client
|
|
.send_instruction(&mallory_keypair, malicious_instruction)
|
|
.unwrap_err()
|
|
.unwrap(),
|
|
TransactionError::InstructionError(0, InstructionError::MissingRequiredSignature)
|
|
);
|
|
assert_eq!(bank_client.get_balance(&alice_pubkey).unwrap(), 50);
|
|
assert_eq!(bank_client.get_balance(&mallory_pubkey).unwrap(), 50);
|
|
}
|
|
|
|
fn process_nonce_instruction(instruction: &Instruction) -> Result<(), InstructionError> {
|
|
let accounts: Vec<_> = instruction
|
|
.accounts
|
|
.iter()
|
|
.map(|meta| {
|
|
RefCell::new(if sysvar::recent_blockhashes::check_id(&meta.pubkey) {
|
|
sysvar::recent_blockhashes::create_account_with_data(
|
|
1,
|
|
vec![(0u64, &Hash::default()); 32].into_iter(),
|
|
)
|
|
} else if sysvar::rent::check_id(&meta.pubkey) {
|
|
sysvar::rent::create_account(1, &Rent::free())
|
|
} else {
|
|
Account::default()
|
|
})
|
|
})
|
|
.collect();
|
|
|
|
{
|
|
let keyed_accounts: Vec<_> = instruction
|
|
.accounts
|
|
.iter()
|
|
.zip(accounts.iter())
|
|
.map(|(meta, account)| KeyedAccount::new(&meta.pubkey, meta.is_signer, account))
|
|
.collect();
|
|
super::process_instruction(&Pubkey::default(), &keyed_accounts, &instruction.data)
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_nonce_ix_no_acc_data_fail() {
|
|
assert_eq!(
|
|
process_nonce_instruction(&system_instruction::advance_nonce_account(
|
|
&Pubkey::default(),
|
|
&Pubkey::default()
|
|
)),
|
|
Err(InstructionError::InvalidAccountData),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_nonce_ix_no_keyed_accs_fail() {
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[],
|
|
&serialize(&SystemInstruction::AdvanceNonceAccount).unwrap()
|
|
),
|
|
Err(InstructionError::NotEnoughAccountKeys),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_nonce_ix_only_nonce_acc_fail() {
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[KeyedAccount::new(
|
|
&Pubkey::default(),
|
|
true,
|
|
&create_default_account(),
|
|
),],
|
|
&serialize(&SystemInstruction::AdvanceNonceAccount).unwrap(),
|
|
),
|
|
Err(InstructionError::NotEnoughAccountKeys),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_nonce_ix_bad_recent_blockhash_state_fail() {
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[
|
|
KeyedAccount::new(&Pubkey::default(), true, &create_default_account()),
|
|
KeyedAccount::new(
|
|
&sysvar::recent_blockhashes::id(),
|
|
false,
|
|
&create_default_account(),
|
|
),
|
|
],
|
|
&serialize(&SystemInstruction::AdvanceNonceAccount).unwrap(),
|
|
),
|
|
Err(InstructionError::InvalidArgument),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_nonce_ix_ok() {
|
|
let nonce_acc = nonce_state::create_account(1_000_000);
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[
|
|
KeyedAccount::new(&Pubkey::default(), true, &nonce_acc),
|
|
KeyedAccount::new(
|
|
&sysvar::recent_blockhashes::id(),
|
|
false,
|
|
&create_default_recent_blockhashes_account(),
|
|
),
|
|
KeyedAccount::new(&sysvar::rent::id(), false, &create_default_rent_account()),
|
|
],
|
|
&serialize(&SystemInstruction::InitializeNonceAccount(Pubkey::default())).unwrap(),
|
|
)
|
|
.unwrap();
|
|
let new_recent_blockhashes_account =
|
|
RefCell::new(sysvar::recent_blockhashes::create_account_with_data(
|
|
1,
|
|
vec![(0u64, &hash(&serialize(&0).unwrap())); 32].into_iter(),
|
|
));
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[
|
|
KeyedAccount::new(&Pubkey::default(), true, &nonce_acc,),
|
|
KeyedAccount::new(
|
|
&sysvar::recent_blockhashes::id(),
|
|
false,
|
|
&new_recent_blockhashes_account,
|
|
),
|
|
],
|
|
&serialize(&SystemInstruction::AdvanceNonceAccount).unwrap(),
|
|
),
|
|
Ok(()),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_withdraw_ix_no_acc_data_fail() {
|
|
assert_eq!(
|
|
process_nonce_instruction(&system_instruction::withdraw_nonce_account(
|
|
&Pubkey::default(),
|
|
&Pubkey::default(),
|
|
&Pubkey::default(),
|
|
1,
|
|
)),
|
|
Err(InstructionError::InvalidAccountData),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_withdraw_ix_no_keyed_accs_fail() {
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[],
|
|
&serialize(&SystemInstruction::WithdrawNonceAccount(42)).unwrap(),
|
|
),
|
|
Err(InstructionError::NotEnoughAccountKeys),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_withdraw_ix_only_nonce_acc_fail() {
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[KeyedAccount::new(
|
|
&Pubkey::default(),
|
|
true,
|
|
&create_default_account()
|
|
),],
|
|
&serialize(&SystemInstruction::WithdrawNonceAccount(42)).unwrap(),
|
|
),
|
|
Err(InstructionError::NotEnoughAccountKeys),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_withdraw_ix_bad_recent_blockhash_state_fail() {
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[
|
|
KeyedAccount::new(&Pubkey::default(), true, &create_default_account()),
|
|
KeyedAccount::new(&Pubkey::default(), false, &create_default_account()),
|
|
KeyedAccount::new(
|
|
&sysvar::recent_blockhashes::id(),
|
|
false,
|
|
&create_default_account()
|
|
),
|
|
],
|
|
&serialize(&SystemInstruction::WithdrawNonceAccount(42)).unwrap(),
|
|
),
|
|
Err(InstructionError::InvalidArgument),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_withdraw_ix_bad_rent_state_fail() {
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[
|
|
KeyedAccount::new(
|
|
&Pubkey::default(),
|
|
true,
|
|
&nonce_state::create_account(1_000_000),
|
|
),
|
|
KeyedAccount::new(&Pubkey::default(), true, &create_default_account()),
|
|
KeyedAccount::new(
|
|
&sysvar::recent_blockhashes::id(),
|
|
false,
|
|
&create_default_recent_blockhashes_account(),
|
|
),
|
|
KeyedAccount::new(&sysvar::rent::id(), false, &create_default_account()),
|
|
],
|
|
&serialize(&SystemInstruction::WithdrawNonceAccount(42)).unwrap(),
|
|
),
|
|
Err(InstructionError::InvalidArgument),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_withdraw_ix_ok() {
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[
|
|
KeyedAccount::new(
|
|
&Pubkey::default(),
|
|
true,
|
|
&nonce_state::create_account(1_000_000),
|
|
),
|
|
KeyedAccount::new(&Pubkey::default(), true, &create_default_account()),
|
|
KeyedAccount::new(
|
|
&sysvar::recent_blockhashes::id(),
|
|
false,
|
|
&create_default_recent_blockhashes_account(),
|
|
),
|
|
KeyedAccount::new(&sysvar::rent::id(), false, &create_default_rent_account()),
|
|
],
|
|
&serialize(&SystemInstruction::WithdrawNonceAccount(42)).unwrap(),
|
|
),
|
|
Ok(()),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_initialize_ix_no_keyed_accs_fail() {
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[],
|
|
&serialize(&SystemInstruction::InitializeNonceAccount(Pubkey::default())).unwrap(),
|
|
),
|
|
Err(InstructionError::NotEnoughAccountKeys),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_initialize_ix_only_nonce_acc_fail() {
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[KeyedAccount::new(
|
|
&Pubkey::default(),
|
|
true,
|
|
&nonce_state::create_account(1_000_000),
|
|
),],
|
|
&serialize(&SystemInstruction::InitializeNonceAccount(Pubkey::default())).unwrap(),
|
|
),
|
|
Err(InstructionError::NotEnoughAccountKeys),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_initialize_bad_recent_blockhash_state_fail() {
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[
|
|
KeyedAccount::new(
|
|
&Pubkey::default(),
|
|
true,
|
|
&nonce_state::create_account(1_000_000),
|
|
),
|
|
KeyedAccount::new(
|
|
&sysvar::recent_blockhashes::id(),
|
|
false,
|
|
&create_default_account()
|
|
),
|
|
],
|
|
&serialize(&SystemInstruction::InitializeNonceAccount(Pubkey::default())).unwrap(),
|
|
),
|
|
Err(InstructionError::InvalidArgument),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_initialize_ix_bad_rent_state_fail() {
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[
|
|
KeyedAccount::new(
|
|
&Pubkey::default(),
|
|
true,
|
|
&nonce_state::create_account(1_000_000),
|
|
),
|
|
KeyedAccount::new(
|
|
&sysvar::recent_blockhashes::id(),
|
|
false,
|
|
&create_default_recent_blockhashes_account(),
|
|
),
|
|
KeyedAccount::new(&sysvar::rent::id(), false, &create_default_account()),
|
|
],
|
|
&serialize(&SystemInstruction::InitializeNonceAccount(Pubkey::default())).unwrap(),
|
|
),
|
|
Err(InstructionError::InvalidArgument),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_initialize_ix_ok() {
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[
|
|
KeyedAccount::new(
|
|
&Pubkey::default(),
|
|
true,
|
|
&nonce_state::create_account(1_000_000),
|
|
),
|
|
KeyedAccount::new(
|
|
&sysvar::recent_blockhashes::id(),
|
|
false,
|
|
&create_default_recent_blockhashes_account(),
|
|
),
|
|
KeyedAccount::new(&sysvar::rent::id(), false, &create_default_rent_account()),
|
|
],
|
|
&serialize(&SystemInstruction::InitializeNonceAccount(Pubkey::default())).unwrap(),
|
|
),
|
|
Ok(()),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_authorize_ix_ok() {
|
|
let nonce_acc = nonce_state::create_account(1_000_000);
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[
|
|
KeyedAccount::new(&Pubkey::default(), true, &nonce_acc),
|
|
KeyedAccount::new(
|
|
&sysvar::recent_blockhashes::id(),
|
|
false,
|
|
&create_default_recent_blockhashes_account(),
|
|
),
|
|
KeyedAccount::new(&sysvar::rent::id(), false, &create_default_rent_account()),
|
|
],
|
|
&serialize(&SystemInstruction::InitializeNonceAccount(Pubkey::default())).unwrap(),
|
|
)
|
|
.unwrap();
|
|
assert_eq!(
|
|
super::process_instruction(
|
|
&Pubkey::default(),
|
|
&[KeyedAccount::new(&Pubkey::default(), true, &nonce_acc,),],
|
|
&serialize(&SystemInstruction::AuthorizeNonceAccount(Pubkey::default(),)).unwrap(),
|
|
),
|
|
Ok(()),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_process_authorize_bad_account_data_fail() {
|
|
assert_eq!(
|
|
process_nonce_instruction(&system_instruction::authorize_nonce_account(
|
|
&Pubkey::default(),
|
|
&Pubkey::default(),
|
|
&Pubkey::default(),
|
|
)),
|
|
Err(InstructionError::InvalidAccountData),
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_get_system_account_kind_system_ok() {
|
|
let system_account = Account::default();
|
|
assert_eq!(
|
|
get_system_account_kind(&system_account),
|
|
Some(SystemAccountKind::System)
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_get_system_account_kind_nonce_ok() {
|
|
let nonce_account = Account::new_data(
|
|
42,
|
|
&nonce_state::NonceState::Initialized(
|
|
nonce_state::Meta::new(&Pubkey::default()),
|
|
Hash::default(),
|
|
),
|
|
&system_program::id(),
|
|
)
|
|
.unwrap();
|
|
assert_eq!(
|
|
get_system_account_kind(&nonce_account),
|
|
Some(SystemAccountKind::Nonce)
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_get_system_account_kind_uninitialized_nonce_account_fail() {
|
|
assert_eq!(
|
|
get_system_account_kind(&nonce_state::create_account(42).borrow()),
|
|
None
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_get_system_account_kind_system_owner_nonzero_nonnonce_data_fail() {
|
|
let other_data_account = Account::new_data(42, b"other", &Pubkey::default()).unwrap();
|
|
assert_eq!(get_system_account_kind(&other_data_account), None);
|
|
}
|
|
|
|
#[test]
|
|
fn test_get_system_account_kind_nonsystem_owner_with_nonce_state_data_fail() {
|
|
let nonce_account = Account::new_data(
|
|
42,
|
|
&nonce_state::NonceState::Initialized(
|
|
nonce_state::Meta::new(&Pubkey::default()),
|
|
Hash::default(),
|
|
),
|
|
&Pubkey::new_rand(),
|
|
)
|
|
.unwrap();
|
|
assert_eq!(get_system_account_kind(&nonce_account), None);
|
|
}
|
|
}
|