2020-01-30 09:21:32 -07:00
|
|
|
use solana_cli::{
|
|
|
|
cli::{process_command, request_and_confirm_airdrop, CliCommand, CliConfig},
|
2020-02-03 19:22:36 -07:00
|
|
|
offline::{parse_sign_only_reply_string, BlockhashQuery},
|
2020-01-30 09:21:32 -07:00
|
|
|
};
|
2019-12-09 23:11:04 -08:00
|
|
|
use solana_client::rpc_client::RpcClient;
|
2019-12-16 14:05:17 -07:00
|
|
|
use solana_faucet::faucet::run_local_faucet;
|
2019-12-09 23:11:04 -08:00
|
|
|
use solana_sdk::{
|
2020-01-22 17:54:06 -08:00
|
|
|
account_utils::StateMut,
|
2020-01-30 09:21:32 -07:00
|
|
|
fee_calculator::FeeCalculator,
|
2019-12-27 14:35:49 -06:00
|
|
|
nonce_state::NonceState,
|
2019-12-09 23:11:04 -08:00
|
|
|
pubkey::Pubkey,
|
2020-02-20 14:28:55 -07:00
|
|
|
signature::{keypair_from_seed, read_keypair_file, write_keypair, Keypair, Signer},
|
2020-01-09 15:22:48 -08:00
|
|
|
system_instruction::create_address_with_seed,
|
2019-12-09 23:11:04 -08:00
|
|
|
};
|
2020-01-15 14:32:06 -07:00
|
|
|
use solana_stake_program::stake_state::{Lockup, StakeAuthorize, StakeState};
|
2019-12-09 23:11:04 -08:00
|
|
|
use std::fs::remove_dir_all;
|
|
|
|
use std::sync::mpsc::channel;
|
|
|
|
|
|
|
|
#[cfg(test)]
|
2020-02-10 18:59:05 -07:00
|
|
|
use solana_core::validator::{
|
|
|
|
new_validator_for_tests, new_validator_for_tests_ex, new_validator_for_tests_with_vote_pubkey,
|
|
|
|
};
|
2019-12-09 23:11:04 -08:00
|
|
|
use std::thread::sleep;
|
|
|
|
use std::time::Duration;
|
|
|
|
|
|
|
|
use tempfile::NamedTempFile;
|
|
|
|
|
|
|
|
fn make_tmp_file() -> (String, NamedTempFile) {
|
|
|
|
let tmp_file = NamedTempFile::new().unwrap();
|
|
|
|
(String::from(tmp_file.path().to_str().unwrap()), tmp_file)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn check_balance(expected_balance: u64, client: &RpcClient, pubkey: &Pubkey) {
|
|
|
|
(0..5).for_each(|tries| {
|
|
|
|
let balance = client.retry_get_balance(pubkey, 1).unwrap().unwrap();
|
|
|
|
if balance == expected_balance {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if tries == 4 {
|
|
|
|
assert_eq!(balance, expected_balance);
|
|
|
|
}
|
|
|
|
sleep(Duration::from_millis(500));
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2020-02-10 18:59:05 -07:00
|
|
|
#[test]
|
|
|
|
fn test_stake_delegation_force() {
|
|
|
|
let (server, leader_data, alice, ledger_path) = new_validator_for_tests();
|
|
|
|
let (sender, receiver) = channel();
|
|
|
|
run_local_faucet(alice, sender, None);
|
|
|
|
let faucet_addr = receiver.recv().unwrap();
|
|
|
|
|
|
|
|
let rpc_client = RpcClient::new_socket(leader_data.rpc);
|
|
|
|
|
|
|
|
let mut config = CliConfig::default();
|
|
|
|
config.json_rpc_url = format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(&rpc_client, &faucet_addr, &config.keypair.pubkey(), 100_000)
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
// Create vote account
|
|
|
|
let vote_keypair = Keypair::new();
|
|
|
|
let (vote_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&vote_keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
config.command = CliCommand::CreateVoteAccount {
|
|
|
|
vote_account: read_keypair_file(&vote_keypair_file).unwrap().into(),
|
|
|
|
seed: None,
|
|
|
|
node_pubkey: config.keypair.pubkey(),
|
|
|
|
authorized_voter: None,
|
|
|
|
authorized_withdrawer: None,
|
|
|
|
commission: 0,
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
|
|
|
|
// Create stake account
|
|
|
|
let stake_keypair = Keypair::new();
|
|
|
|
let (stake_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&stake_keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
config.command = CliCommand::CreateStakeAccount {
|
|
|
|
stake_account: read_keypair_file(&stake_keypair_file).unwrap().into(),
|
|
|
|
seed: None,
|
|
|
|
staker: None,
|
|
|
|
withdrawer: None,
|
|
|
|
lockup: Lockup::default(),
|
|
|
|
lamports: 50_000,
|
2020-02-12 23:00:28 -07:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::All,
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
from: None,
|
2020-02-10 18:59:05 -07:00
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
|
|
|
|
// Delegate stake fails (vote account had never voted)
|
|
|
|
config.command = CliCommand::DelegateStake {
|
|
|
|
stake_account_pubkey: stake_keypair.pubkey(),
|
|
|
|
vote_account_pubkey: vote_keypair.pubkey(),
|
|
|
|
stake_authority: None,
|
|
|
|
force: false,
|
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::default(),
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap_err();
|
|
|
|
|
|
|
|
// But if we force it, it works anyway!
|
|
|
|
config.command = CliCommand::DelegateStake {
|
|
|
|
stake_account_pubkey: stake_keypair.pubkey(),
|
|
|
|
vote_account_pubkey: vote_keypair.pubkey(),
|
|
|
|
stake_authority: None,
|
|
|
|
force: true,
|
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::default(),
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
|
|
|
|
server.close().unwrap();
|
|
|
|
remove_dir_all(ledger_path).unwrap();
|
|
|
|
}
|
|
|
|
|
2020-01-09 15:22:48 -08:00
|
|
|
#[test]
|
|
|
|
fn test_seed_stake_delegation_and_deactivation() {
|
|
|
|
solana_logger::setup();
|
|
|
|
|
2020-02-10 18:59:05 -07:00
|
|
|
let (server, leader_data, alice, ledger_path, vote_pubkey) =
|
|
|
|
new_validator_for_tests_with_vote_pubkey();
|
2020-01-09 15:22:48 -08:00
|
|
|
let (sender, receiver) = channel();
|
|
|
|
run_local_faucet(alice, sender, None);
|
|
|
|
let faucet_addr = receiver.recv().unwrap();
|
|
|
|
|
|
|
|
let rpc_client = RpcClient::new_socket(leader_data.rpc);
|
|
|
|
|
|
|
|
let mut config_validator = CliConfig::default();
|
|
|
|
config_validator.json_rpc_url =
|
|
|
|
format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
|
|
|
|
let (validator_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&config_validator.keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
|
|
|
|
let mut config_stake = CliConfig::default();
|
|
|
|
config_stake.json_rpc_url =
|
|
|
|
format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(
|
|
|
|
&rpc_client,
|
|
|
|
&faucet_addr,
|
|
|
|
&config_validator.keypair.pubkey(),
|
|
|
|
100_000,
|
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
check_balance(100_000, &rpc_client, &config_validator.keypair.pubkey());
|
|
|
|
|
|
|
|
let stake_address = create_address_with_seed(
|
|
|
|
&config_validator.keypair.pubkey(),
|
|
|
|
"hi there",
|
|
|
|
&solana_stake_program::id(),
|
|
|
|
)
|
|
|
|
.expect("bad seed");
|
|
|
|
|
|
|
|
// Create stake account with a seed, uses the validator config as the base,
|
|
|
|
// which is nice ;)
|
|
|
|
config_validator.command = CliCommand::CreateStakeAccount {
|
|
|
|
stake_account: read_keypair_file(&validator_keypair_file).unwrap().into(),
|
|
|
|
seed: Some("hi there".to_string()),
|
|
|
|
staker: None,
|
|
|
|
withdrawer: None,
|
|
|
|
lockup: Lockup::default(),
|
|
|
|
lamports: 50_000,
|
2020-02-12 23:00:28 -07:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::All,
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
from: None,
|
2020-01-09 15:22:48 -08:00
|
|
|
};
|
|
|
|
process_command(&config_validator).unwrap();
|
|
|
|
|
|
|
|
// Delegate stake
|
|
|
|
config_validator.command = CliCommand::DelegateStake {
|
|
|
|
stake_account_pubkey: stake_address,
|
2020-02-10 18:59:05 -07:00
|
|
|
vote_account_pubkey: vote_pubkey,
|
2020-01-15 14:32:06 -07:00
|
|
|
stake_authority: None,
|
2020-02-10 18:59:05 -07:00
|
|
|
force: false,
|
2020-01-09 15:22:48 -08:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::default(),
|
2020-01-09 15:22:48 -08:00
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
2020-02-07 09:14:27 -07:00
|
|
|
fee_payer: None,
|
2020-01-09 15:22:48 -08:00
|
|
|
};
|
|
|
|
process_command(&config_validator).unwrap();
|
|
|
|
|
|
|
|
// Deactivate stake
|
|
|
|
config_validator.command = CliCommand::DeactivateStake {
|
|
|
|
stake_account_pubkey: stake_address,
|
2020-01-15 14:32:06 -07:00
|
|
|
stake_authority: None,
|
2020-01-09 15:22:48 -08:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::default(),
|
2020-01-09 15:22:48 -08:00
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
2020-02-07 09:14:27 -07:00
|
|
|
fee_payer: None,
|
2020-01-09 15:22:48 -08:00
|
|
|
};
|
|
|
|
process_command(&config_validator).unwrap();
|
|
|
|
|
|
|
|
server.close().unwrap();
|
|
|
|
remove_dir_all(ledger_path).unwrap();
|
|
|
|
}
|
|
|
|
|
2019-12-09 23:11:04 -08:00
|
|
|
#[test]
|
|
|
|
fn test_stake_delegation_and_deactivation() {
|
|
|
|
solana_logger::setup();
|
|
|
|
|
2020-02-10 18:59:05 -07:00
|
|
|
let (server, leader_data, alice, ledger_path, vote_pubkey) =
|
|
|
|
new_validator_for_tests_with_vote_pubkey();
|
2019-12-09 23:11:04 -08:00
|
|
|
let (sender, receiver) = channel();
|
2019-12-16 14:05:17 -07:00
|
|
|
run_local_faucet(alice, sender, None);
|
|
|
|
let faucet_addr = receiver.recv().unwrap();
|
2019-12-09 23:11:04 -08:00
|
|
|
|
|
|
|
let rpc_client = RpcClient::new_socket(leader_data.rpc);
|
|
|
|
|
|
|
|
let mut config_validator = CliConfig::default();
|
|
|
|
config_validator.json_rpc_url =
|
|
|
|
format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
|
|
|
|
let mut config_stake = CliConfig::default();
|
|
|
|
config_stake.json_rpc_url =
|
|
|
|
format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
let (stake_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&config_stake.keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(
|
|
|
|
&rpc_client,
|
2019-12-16 14:05:17 -07:00
|
|
|
&faucet_addr,
|
2019-12-09 23:11:04 -08:00
|
|
|
&config_validator.keypair.pubkey(),
|
|
|
|
100_000,
|
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
check_balance(100_000, &rpc_client, &config_validator.keypair.pubkey());
|
|
|
|
|
|
|
|
// Create stake account
|
|
|
|
config_validator.command = CliCommand::CreateStakeAccount {
|
|
|
|
stake_account: read_keypair_file(&stake_keypair_file).unwrap().into(),
|
2020-01-09 15:22:48 -08:00
|
|
|
seed: None,
|
2019-12-09 23:11:04 -08:00
|
|
|
staker: None,
|
|
|
|
withdrawer: None,
|
2019-12-19 14:37:47 -08:00
|
|
|
lockup: Lockup::default(),
|
2019-12-09 23:11:04 -08:00
|
|
|
lamports: 50_000,
|
2020-02-12 23:00:28 -07:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::All,
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
from: None,
|
2019-12-09 23:11:04 -08:00
|
|
|
};
|
|
|
|
process_command(&config_validator).unwrap();
|
|
|
|
|
|
|
|
// Delegate stake
|
|
|
|
config_validator.command = CliCommand::DelegateStake {
|
|
|
|
stake_account_pubkey: config_stake.keypair.pubkey(),
|
2020-02-10 18:59:05 -07:00
|
|
|
vote_account_pubkey: vote_pubkey,
|
2020-01-15 14:32:06 -07:00
|
|
|
stake_authority: None,
|
2020-02-10 18:59:05 -07:00
|
|
|
force: false,
|
2019-12-09 23:11:04 -08:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::default(),
|
2019-12-27 14:35:49 -06:00
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
2020-02-07 09:14:27 -07:00
|
|
|
fee_payer: None,
|
2019-12-09 23:11:04 -08:00
|
|
|
};
|
|
|
|
process_command(&config_validator).unwrap();
|
|
|
|
|
|
|
|
// Deactivate stake
|
|
|
|
config_validator.command = CliCommand::DeactivateStake {
|
|
|
|
stake_account_pubkey: config_stake.keypair.pubkey(),
|
2020-01-15 14:32:06 -07:00
|
|
|
stake_authority: None,
|
2019-12-09 23:11:04 -08:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::default(),
|
2019-12-27 14:35:49 -06:00
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
2020-02-07 09:14:27 -07:00
|
|
|
fee_payer: None,
|
2019-12-09 23:11:04 -08:00
|
|
|
};
|
|
|
|
process_command(&config_validator).unwrap();
|
|
|
|
|
|
|
|
server.close().unwrap();
|
|
|
|
remove_dir_all(ledger_path).unwrap();
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
2020-01-09 15:22:48 -08:00
|
|
|
fn test_offline_stake_delegation_and_deactivation() {
|
2019-12-09 23:11:04 -08:00
|
|
|
solana_logger::setup();
|
|
|
|
|
2020-02-10 18:59:05 -07:00
|
|
|
let (server, leader_data, alice, ledger_path, vote_pubkey) =
|
|
|
|
new_validator_for_tests_with_vote_pubkey();
|
2019-12-09 23:11:04 -08:00
|
|
|
let (sender, receiver) = channel();
|
2019-12-16 14:05:17 -07:00
|
|
|
run_local_faucet(alice, sender, None);
|
|
|
|
let faucet_addr = receiver.recv().unwrap();
|
2019-12-09 23:11:04 -08:00
|
|
|
|
|
|
|
let rpc_client = RpcClient::new_socket(leader_data.rpc);
|
|
|
|
|
|
|
|
let mut config_validator = CliConfig::default();
|
|
|
|
config_validator.json_rpc_url =
|
|
|
|
format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
|
|
|
|
let mut config_payer = CliConfig::default();
|
|
|
|
config_payer.json_rpc_url =
|
|
|
|
format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
|
|
|
|
let mut config_stake = CliConfig::default();
|
|
|
|
config_stake.json_rpc_url =
|
|
|
|
format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
let (stake_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&config_stake.keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
|
2020-02-10 18:59:05 -07:00
|
|
|
let mut config_offline = CliConfig::default();
|
|
|
|
config_offline.json_rpc_url = String::default();
|
|
|
|
config_offline.command = CliCommand::ClusterVersion;
|
|
|
|
// Verfiy that we cannot reach the cluster
|
|
|
|
process_command(&config_offline).unwrap_err();
|
|
|
|
|
2019-12-09 23:11:04 -08:00
|
|
|
request_and_confirm_airdrop(
|
|
|
|
&rpc_client,
|
2019-12-16 14:05:17 -07:00
|
|
|
&faucet_addr,
|
2019-12-09 23:11:04 -08:00
|
|
|
&config_validator.keypair.pubkey(),
|
|
|
|
100_000,
|
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
check_balance(100_000, &rpc_client, &config_validator.keypair.pubkey());
|
|
|
|
|
2020-02-10 18:59:05 -07:00
|
|
|
request_and_confirm_airdrop(
|
|
|
|
&rpc_client,
|
|
|
|
&faucet_addr,
|
|
|
|
&config_offline.keypair.pubkey(),
|
|
|
|
100_000,
|
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
check_balance(100_000, &rpc_client, &config_offline.keypair.pubkey());
|
2019-12-09 23:11:04 -08:00
|
|
|
|
|
|
|
// Create stake account
|
|
|
|
config_validator.command = CliCommand::CreateStakeAccount {
|
|
|
|
stake_account: read_keypair_file(&stake_keypair_file).unwrap().into(),
|
2020-01-09 15:22:48 -08:00
|
|
|
seed: None,
|
2020-02-10 18:59:05 -07:00
|
|
|
staker: Some(config_offline.keypair.pubkey().into()),
|
2019-12-09 23:11:04 -08:00
|
|
|
withdrawer: None,
|
2019-12-19 14:37:47 -08:00
|
|
|
lockup: Lockup::default(),
|
2019-12-09 23:11:04 -08:00
|
|
|
lamports: 50_000,
|
2020-02-12 23:00:28 -07:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::All,
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
from: None,
|
2019-12-09 23:11:04 -08:00
|
|
|
};
|
|
|
|
process_command(&config_validator).unwrap();
|
|
|
|
|
|
|
|
// Delegate stake offline
|
2020-01-28 18:02:20 -07:00
|
|
|
let (blockhash, _) = rpc_client.get_recent_blockhash().unwrap();
|
2020-02-10 18:59:05 -07:00
|
|
|
config_offline.command = CliCommand::DelegateStake {
|
2019-12-09 23:11:04 -08:00
|
|
|
stake_account_pubkey: config_stake.keypair.pubkey(),
|
2020-02-10 18:59:05 -07:00
|
|
|
vote_account_pubkey: vote_pubkey,
|
2020-01-15 14:32:06 -07:00
|
|
|
stake_authority: None,
|
2020-02-10 18:59:05 -07:00
|
|
|
force: false,
|
2019-12-09 23:11:04 -08:00
|
|
|
sign_only: true,
|
|
|
|
signers: None,
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::None(blockhash, FeeCalculator::default()),
|
2019-12-27 14:35:49 -06:00
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
2020-02-07 09:14:27 -07:00
|
|
|
fee_payer: None,
|
2019-12-09 23:11:04 -08:00
|
|
|
};
|
2020-02-10 18:59:05 -07:00
|
|
|
let sig_response = process_command(&config_offline).unwrap();
|
2020-01-17 10:30:56 -07:00
|
|
|
let (blockhash, signers) = parse_sign_only_reply_string(&sig_response);
|
2019-12-09 23:11:04 -08:00
|
|
|
config_payer.command = CliCommand::DelegateStake {
|
|
|
|
stake_account_pubkey: config_stake.keypair.pubkey(),
|
2020-02-10 18:59:05 -07:00
|
|
|
vote_account_pubkey: vote_pubkey,
|
|
|
|
stake_authority: Some(config_offline.keypair.pubkey().into()),
|
|
|
|
force: false,
|
2019-12-09 23:11:04 -08:00
|
|
|
sign_only: false,
|
|
|
|
signers: Some(signers),
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::None(blockhash, FeeCalculator::default()),
|
2019-12-27 14:35:49 -06:00
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
2020-02-10 18:59:05 -07:00
|
|
|
fee_payer: Some(config_offline.keypair.pubkey().into()),
|
2019-12-09 23:11:04 -08:00
|
|
|
};
|
|
|
|
process_command(&config_payer).unwrap();
|
|
|
|
|
|
|
|
// Deactivate stake offline
|
2020-01-28 18:02:20 -07:00
|
|
|
let (blockhash, _) = rpc_client.get_recent_blockhash().unwrap();
|
2020-02-10 18:59:05 -07:00
|
|
|
config_offline.command = CliCommand::DeactivateStake {
|
2019-12-09 23:11:04 -08:00
|
|
|
stake_account_pubkey: config_stake.keypair.pubkey(),
|
2020-01-15 14:32:06 -07:00
|
|
|
stake_authority: None,
|
2019-12-09 23:11:04 -08:00
|
|
|
sign_only: true,
|
|
|
|
signers: None,
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::None(blockhash, FeeCalculator::default()),
|
2019-12-27 14:35:49 -06:00
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
2020-02-07 09:14:27 -07:00
|
|
|
fee_payer: None,
|
2019-12-09 23:11:04 -08:00
|
|
|
};
|
2020-02-10 18:59:05 -07:00
|
|
|
let sig_response = process_command(&config_offline).unwrap();
|
2020-01-17 10:30:56 -07:00
|
|
|
let (blockhash, signers) = parse_sign_only_reply_string(&sig_response);
|
2019-12-09 23:11:04 -08:00
|
|
|
config_payer.command = CliCommand::DeactivateStake {
|
|
|
|
stake_account_pubkey: config_stake.keypair.pubkey(),
|
2020-02-10 18:59:05 -07:00
|
|
|
stake_authority: Some(config_offline.keypair.pubkey().into()),
|
2019-12-09 23:11:04 -08:00
|
|
|
sign_only: false,
|
|
|
|
signers: Some(signers),
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::FeeCalculator(blockhash),
|
2019-12-27 14:35:49 -06:00
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
2020-02-10 18:59:05 -07:00
|
|
|
fee_payer: Some(config_offline.keypair.pubkey().into()),
|
2019-12-09 23:11:04 -08:00
|
|
|
};
|
|
|
|
process_command(&config_payer).unwrap();
|
|
|
|
|
|
|
|
server.close().unwrap();
|
|
|
|
remove_dir_all(ledger_path).unwrap();
|
|
|
|
}
|
2019-12-27 14:35:49 -06:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_nonced_stake_delegation_and_deactivation() {
|
|
|
|
solana_logger::setup();
|
|
|
|
|
2020-02-10 18:59:05 -07:00
|
|
|
let (server, leader_data, alice, ledger_path, vote_pubkey) =
|
|
|
|
new_validator_for_tests_with_vote_pubkey();
|
2019-12-27 14:35:49 -06:00
|
|
|
let (sender, receiver) = channel();
|
|
|
|
run_local_faucet(alice, sender, None);
|
|
|
|
let faucet_addr = receiver.recv().unwrap();
|
|
|
|
|
|
|
|
let rpc_client = RpcClient::new_socket(leader_data.rpc);
|
|
|
|
|
|
|
|
let mut config = CliConfig::default();
|
|
|
|
config.json_rpc_url = format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
|
|
|
|
let minimum_nonce_balance = rpc_client
|
|
|
|
.get_minimum_balance_for_rent_exemption(NonceState::size())
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(&rpc_client, &faucet_addr, &config.keypair.pubkey(), 100_000)
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
// Create stake account
|
|
|
|
let stake_keypair = Keypair::new();
|
|
|
|
let (stake_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&stake_keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
config.command = CliCommand::CreateStakeAccount {
|
|
|
|
stake_account: read_keypair_file(&stake_keypair_file).unwrap().into(),
|
2020-01-09 15:22:48 -08:00
|
|
|
seed: None,
|
2019-12-27 14:35:49 -06:00
|
|
|
staker: None,
|
|
|
|
withdrawer: None,
|
|
|
|
lockup: Lockup::default(),
|
|
|
|
lamports: 50_000,
|
2020-02-12 23:00:28 -07:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::All,
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
from: None,
|
2019-12-27 14:35:49 -06:00
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
|
|
|
|
// Create nonce account
|
|
|
|
let nonce_account = Keypair::new();
|
|
|
|
let (nonce_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&nonce_account, tmp_file.as_file_mut()).unwrap();
|
|
|
|
config.command = CliCommand::CreateNonceAccount {
|
|
|
|
nonce_account: read_keypair_file(&nonce_keypair_file).unwrap().into(),
|
2020-01-09 15:22:48 -08:00
|
|
|
seed: None,
|
2020-01-02 20:05:08 -05:00
|
|
|
nonce_authority: Some(config.keypair.pubkey()),
|
2019-12-27 14:35:49 -06:00
|
|
|
lamports: minimum_nonce_balance,
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
|
|
|
|
// Fetch nonce hash
|
|
|
|
let account = rpc_client.get_account(&nonce_account.pubkey()).unwrap();
|
|
|
|
let nonce_state: NonceState = account.state().unwrap();
|
|
|
|
let nonce_hash = match nonce_state {
|
|
|
|
NonceState::Initialized(_meta, hash) => hash,
|
|
|
|
_ => panic!("Nonce is not initialized"),
|
|
|
|
};
|
|
|
|
|
|
|
|
// Delegate stake
|
|
|
|
config.command = CliCommand::DelegateStake {
|
|
|
|
stake_account_pubkey: stake_keypair.pubkey(),
|
2020-02-10 18:59:05 -07:00
|
|
|
vote_account_pubkey: vote_pubkey,
|
2020-01-15 14:32:06 -07:00
|
|
|
stake_authority: None,
|
2020-02-10 18:59:05 -07:00
|
|
|
force: false,
|
2019-12-27 14:35:49 -06:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::None(nonce_hash, FeeCalculator::default()),
|
2019-12-27 14:35:49 -06:00
|
|
|
nonce_account: Some(nonce_account.pubkey()),
|
|
|
|
nonce_authority: None,
|
2020-02-07 09:14:27 -07:00
|
|
|
fee_payer: None,
|
2019-12-27 14:35:49 -06:00
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
|
|
|
|
// Fetch nonce hash
|
|
|
|
let account = rpc_client.get_account(&nonce_account.pubkey()).unwrap();
|
|
|
|
let nonce_state: NonceState = account.state().unwrap();
|
|
|
|
let nonce_hash = match nonce_state {
|
|
|
|
NonceState::Initialized(_meta, hash) => hash,
|
|
|
|
_ => panic!("Nonce is not initialized"),
|
|
|
|
};
|
|
|
|
|
|
|
|
// Deactivate stake
|
|
|
|
let config_keypair = Keypair::from_bytes(&config.keypair.to_bytes()).unwrap();
|
|
|
|
config.command = CliCommand::DeactivateStake {
|
|
|
|
stake_account_pubkey: stake_keypair.pubkey(),
|
2020-01-15 14:32:06 -07:00
|
|
|
stake_authority: None,
|
2019-12-27 14:35:49 -06:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::FeeCalculator(nonce_hash),
|
2019-12-27 14:35:49 -06:00
|
|
|
nonce_account: Some(nonce_account.pubkey()),
|
|
|
|
nonce_authority: Some(config_keypair.into()),
|
2020-02-07 09:14:27 -07:00
|
|
|
fee_payer: None,
|
2019-12-27 14:35:49 -06:00
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
|
|
|
|
server.close().unwrap();
|
|
|
|
remove_dir_all(ledger_path).unwrap();
|
|
|
|
}
|
2020-01-15 14:32:06 -07:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_stake_authorize() {
|
|
|
|
solana_logger::setup();
|
|
|
|
|
|
|
|
let (server, leader_data, alice, ledger_path) = new_validator_for_tests();
|
|
|
|
let (sender, receiver) = channel();
|
|
|
|
run_local_faucet(alice, sender, None);
|
|
|
|
let faucet_addr = receiver.recv().unwrap();
|
|
|
|
|
|
|
|
let rpc_client = RpcClient::new_socket(leader_data.rpc);
|
|
|
|
|
|
|
|
let mut config = CliConfig::default();
|
|
|
|
config.json_rpc_url = format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(&rpc_client, &faucet_addr, &config.keypair.pubkey(), 100_000)
|
|
|
|
.unwrap();
|
|
|
|
|
2020-02-10 18:59:05 -07:00
|
|
|
let mut config_offline = CliConfig::default();
|
|
|
|
config_offline.json_rpc_url = String::default();
|
|
|
|
config_offline.command = CliCommand::ClusterVersion;
|
|
|
|
// Verfiy that we cannot reach the cluster
|
|
|
|
process_command(&config_offline).unwrap_err();
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(
|
|
|
|
&rpc_client,
|
|
|
|
&faucet_addr,
|
|
|
|
&config_offline.keypair.pubkey(),
|
|
|
|
100_000,
|
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
|
2020-01-15 14:32:06 -07:00
|
|
|
// Create stake account, identity is authority
|
|
|
|
let stake_keypair = Keypair::new();
|
|
|
|
let stake_account_pubkey = stake_keypair.pubkey();
|
|
|
|
let (stake_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&stake_keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
config.command = CliCommand::CreateStakeAccount {
|
|
|
|
stake_account: read_keypair_file(&stake_keypair_file).unwrap().into(),
|
|
|
|
seed: None,
|
|
|
|
staker: None,
|
|
|
|
withdrawer: None,
|
|
|
|
lockup: Lockup::default(),
|
|
|
|
lamports: 50_000,
|
2020-02-12 23:00:28 -07:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::All,
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
from: None,
|
2020-01-15 14:32:06 -07:00
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
|
|
|
|
// Assign new online stake authority
|
|
|
|
let online_authority = Keypair::new();
|
|
|
|
let online_authority_pubkey = online_authority.pubkey();
|
|
|
|
let (online_authority_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&online_authority, tmp_file.as_file_mut()).unwrap();
|
|
|
|
config.command = CliCommand::StakeAuthorize {
|
|
|
|
stake_account_pubkey,
|
|
|
|
new_authorized_pubkey: online_authority_pubkey,
|
|
|
|
stake_authorize: StakeAuthorize::Staker,
|
|
|
|
authority: None,
|
2020-01-17 10:30:56 -07:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::default(),
|
2020-01-17 10:30:56 -07:00
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
2020-02-07 09:14:27 -07:00
|
|
|
fee_payer: None,
|
2020-01-15 14:32:06 -07:00
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
let stake_account = rpc_client.get_account(&stake_account_pubkey).unwrap();
|
|
|
|
let stake_state: StakeState = stake_account.state().unwrap();
|
|
|
|
let current_authority = match stake_state {
|
|
|
|
StakeState::Initialized(meta) => meta.authorized.staker,
|
|
|
|
_ => panic!("Unexpected stake state!"),
|
|
|
|
};
|
|
|
|
assert_eq!(current_authority, online_authority_pubkey);
|
|
|
|
|
|
|
|
// Assign new offline stake authority
|
2020-02-10 18:59:05 -07:00
|
|
|
let offline_authority_pubkey = config_offline.keypair.pubkey();
|
2020-01-17 10:30:56 -07:00
|
|
|
let (offline_authority_file, mut tmp_file) = make_tmp_file();
|
2020-02-10 18:59:05 -07:00
|
|
|
write_keypair(&config_offline.keypair, tmp_file.as_file_mut()).unwrap();
|
2020-01-15 14:32:06 -07:00
|
|
|
config.command = CliCommand::StakeAuthorize {
|
|
|
|
stake_account_pubkey,
|
|
|
|
new_authorized_pubkey: offline_authority_pubkey,
|
|
|
|
stake_authorize: StakeAuthorize::Staker,
|
|
|
|
authority: Some(read_keypair_file(&online_authority_file).unwrap().into()),
|
2020-01-17 10:30:56 -07:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::default(),
|
2020-01-17 10:30:56 -07:00
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
2020-02-07 09:14:27 -07:00
|
|
|
fee_payer: None,
|
2020-01-15 14:32:06 -07:00
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
let stake_account = rpc_client.get_account(&stake_account_pubkey).unwrap();
|
|
|
|
let stake_state: StakeState = stake_account.state().unwrap();
|
|
|
|
let current_authority = match stake_state {
|
|
|
|
StakeState::Initialized(meta) => meta.authorized.staker,
|
|
|
|
_ => panic!("Unexpected stake state!"),
|
|
|
|
};
|
|
|
|
assert_eq!(current_authority, offline_authority_pubkey);
|
|
|
|
|
2020-01-17 10:30:56 -07:00
|
|
|
// Offline assignment of new nonced stake authority
|
|
|
|
let nonced_authority = Keypair::new();
|
|
|
|
let nonced_authority_pubkey = nonced_authority.pubkey();
|
|
|
|
let (nonced_authority_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&nonced_authority, tmp_file.as_file_mut()).unwrap();
|
2020-01-28 18:02:20 -07:00
|
|
|
let (blockhash, _) = rpc_client.get_recent_blockhash().unwrap();
|
2020-02-10 18:59:05 -07:00
|
|
|
config_offline.command = CliCommand::StakeAuthorize {
|
2020-01-17 10:30:56 -07:00
|
|
|
stake_account_pubkey,
|
|
|
|
new_authorized_pubkey: nonced_authority_pubkey,
|
|
|
|
stake_authorize: StakeAuthorize::Staker,
|
|
|
|
authority: Some(read_keypair_file(&offline_authority_file).unwrap().into()),
|
|
|
|
sign_only: true,
|
|
|
|
signers: None,
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::None(blockhash, FeeCalculator::default()),
|
2020-01-17 10:30:56 -07:00
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
2020-02-07 09:14:27 -07:00
|
|
|
fee_payer: None,
|
2020-01-17 10:30:56 -07:00
|
|
|
};
|
2020-02-10 18:59:05 -07:00
|
|
|
let sign_reply = process_command(&config_offline).unwrap();
|
2020-01-17 10:30:56 -07:00
|
|
|
let (blockhash, signers) = parse_sign_only_reply_string(&sign_reply);
|
|
|
|
config.command = CliCommand::StakeAuthorize {
|
|
|
|
stake_account_pubkey,
|
|
|
|
new_authorized_pubkey: nonced_authority_pubkey,
|
|
|
|
stake_authorize: StakeAuthorize::Staker,
|
2020-01-22 10:10:22 -07:00
|
|
|
authority: Some(offline_authority_pubkey.into()),
|
2020-01-17 10:30:56 -07:00
|
|
|
sign_only: false,
|
|
|
|
signers: Some(signers),
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::FeeCalculator(blockhash),
|
2020-01-17 10:30:56 -07:00
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
2020-02-10 18:59:05 -07:00
|
|
|
fee_payer: Some(offline_authority_pubkey.into()),
|
2020-01-17 10:30:56 -07:00
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
let stake_account = rpc_client.get_account(&stake_account_pubkey).unwrap();
|
|
|
|
let stake_state: StakeState = stake_account.state().unwrap();
|
|
|
|
let current_authority = match stake_state {
|
|
|
|
StakeState::Initialized(meta) => meta.authorized.staker,
|
|
|
|
_ => panic!("Unexpected stake state!"),
|
|
|
|
};
|
|
|
|
assert_eq!(current_authority, nonced_authority_pubkey);
|
|
|
|
|
|
|
|
// Create nonce account
|
|
|
|
let minimum_nonce_balance = rpc_client
|
|
|
|
.get_minimum_balance_for_rent_exemption(NonceState::size())
|
|
|
|
.unwrap();
|
|
|
|
let nonce_account = Keypair::new();
|
|
|
|
let (nonce_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&nonce_account, tmp_file.as_file_mut()).unwrap();
|
|
|
|
config.command = CliCommand::CreateNonceAccount {
|
|
|
|
nonce_account: read_keypair_file(&nonce_keypair_file).unwrap().into(),
|
|
|
|
seed: None,
|
2020-02-10 18:59:05 -07:00
|
|
|
nonce_authority: Some(config_offline.keypair.pubkey()),
|
2020-01-17 10:30:56 -07:00
|
|
|
lamports: minimum_nonce_balance,
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
|
|
|
|
// Fetch nonce hash
|
|
|
|
let account = rpc_client.get_account(&nonce_account.pubkey()).unwrap();
|
|
|
|
let nonce_state: NonceState = account.state().unwrap();
|
|
|
|
let nonce_hash = match nonce_state {
|
|
|
|
NonceState::Initialized(_meta, hash) => hash,
|
|
|
|
_ => panic!("Nonce is not initialized"),
|
|
|
|
};
|
|
|
|
|
2020-01-22 10:10:22 -07:00
|
|
|
// Nonced assignment of new online stake authority
|
2020-01-17 10:30:56 -07:00
|
|
|
let online_authority = Keypair::new();
|
|
|
|
let online_authority_pubkey = online_authority.pubkey();
|
|
|
|
let (_online_authority_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&online_authority, tmp_file.as_file_mut()).unwrap();
|
2020-02-10 18:59:05 -07:00
|
|
|
config_offline.command = CliCommand::StakeAuthorize {
|
2020-01-17 10:30:56 -07:00
|
|
|
stake_account_pubkey,
|
|
|
|
new_authorized_pubkey: online_authority_pubkey,
|
|
|
|
stake_authorize: StakeAuthorize::Staker,
|
|
|
|
authority: Some(read_keypair_file(&nonced_authority_file).unwrap().into()),
|
|
|
|
sign_only: true,
|
|
|
|
signers: None,
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::None(nonce_hash, FeeCalculator::default()),
|
2020-01-17 10:30:56 -07:00
|
|
|
nonce_account: Some(nonce_account.pubkey()),
|
|
|
|
nonce_authority: None,
|
2020-02-07 09:14:27 -07:00
|
|
|
fee_payer: None,
|
2020-01-17 10:30:56 -07:00
|
|
|
};
|
2020-02-10 18:59:05 -07:00
|
|
|
let sign_reply = process_command(&config_offline).unwrap();
|
2020-01-17 10:30:56 -07:00
|
|
|
let (blockhash, signers) = parse_sign_only_reply_string(&sign_reply);
|
|
|
|
assert_eq!(blockhash, nonce_hash);
|
|
|
|
config.command = CliCommand::StakeAuthorize {
|
|
|
|
stake_account_pubkey,
|
|
|
|
new_authorized_pubkey: online_authority_pubkey,
|
|
|
|
stake_authorize: StakeAuthorize::Staker,
|
2020-01-22 10:10:22 -07:00
|
|
|
authority: Some(nonced_authority_pubkey.into()),
|
2020-01-17 10:30:56 -07:00
|
|
|
sign_only: false,
|
|
|
|
signers: Some(signers),
|
2020-01-30 09:21:32 -07:00
|
|
|
blockhash_query: BlockhashQuery::FeeCalculator(blockhash),
|
2020-01-17 10:30:56 -07:00
|
|
|
nonce_account: Some(nonce_account.pubkey()),
|
2020-02-10 18:59:05 -07:00
|
|
|
nonce_authority: Some(offline_authority_pubkey.into()),
|
|
|
|
fee_payer: Some(offline_authority_pubkey.into()),
|
2020-01-17 10:30:56 -07:00
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
let stake_account = rpc_client.get_account(&stake_account_pubkey).unwrap();
|
|
|
|
let stake_state: StakeState = stake_account.state().unwrap();
|
|
|
|
let current_authority = match stake_state {
|
|
|
|
StakeState::Initialized(meta) => meta.authorized.staker,
|
|
|
|
_ => panic!("Unexpected stake state!"),
|
|
|
|
};
|
|
|
|
assert_eq!(current_authority, online_authority_pubkey);
|
|
|
|
let account = rpc_client.get_account(&nonce_account.pubkey()).unwrap();
|
|
|
|
let nonce_state: NonceState = account.state().unwrap();
|
|
|
|
let new_nonce_hash = match nonce_state {
|
|
|
|
NonceState::Initialized(_meta, hash) => hash,
|
|
|
|
_ => panic!("Nonce is not initialized"),
|
|
|
|
};
|
|
|
|
assert_ne!(nonce_hash, new_nonce_hash);
|
2020-02-07 09:14:27 -07:00
|
|
|
|
|
|
|
server.close().unwrap();
|
|
|
|
remove_dir_all(ledger_path).unwrap();
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_stake_authorize_with_fee_payer() {
|
|
|
|
solana_logger::setup();
|
|
|
|
const SIG_FEE: u64 = 42;
|
|
|
|
|
2020-02-10 18:59:05 -07:00
|
|
|
let (server, leader_data, alice, ledger_path, _voter) =
|
|
|
|
new_validator_for_tests_ex(SIG_FEE, 42_000);
|
2020-02-07 09:14:27 -07:00
|
|
|
let (sender, receiver) = channel();
|
|
|
|
run_local_faucet(alice, sender, None);
|
|
|
|
let faucet_addr = receiver.recv().unwrap();
|
|
|
|
|
|
|
|
let rpc_client = RpcClient::new_socket(leader_data.rpc);
|
|
|
|
|
|
|
|
let mut config = CliConfig::default();
|
|
|
|
config.json_rpc_url = format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
|
|
|
|
let mut config_payer = CliConfig::default();
|
|
|
|
config_payer.json_rpc_url =
|
|
|
|
format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
let payer_pubkey = config_payer.keypair.pubkey();
|
|
|
|
let (payer_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&config_payer.keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
|
|
|
|
let mut config_offline = CliConfig::default();
|
|
|
|
let offline_pubkey = config_offline.keypair.pubkey();
|
|
|
|
let (_offline_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&config_offline.keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
// Verify we're offline
|
|
|
|
config_offline.command = CliCommand::ClusterVersion;
|
|
|
|
process_command(&config_offline).unwrap_err();
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(&rpc_client, &faucet_addr, &config.keypair.pubkey(), 100_000)
|
|
|
|
.unwrap();
|
|
|
|
check_balance(100_000, &rpc_client, &config.keypair.pubkey());
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(&rpc_client, &faucet_addr, &payer_pubkey, 100_000).unwrap();
|
|
|
|
check_balance(100_000, &rpc_client, &payer_pubkey);
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(&rpc_client, &faucet_addr, &offline_pubkey, 100_000).unwrap();
|
|
|
|
check_balance(100_000, &rpc_client, &offline_pubkey);
|
|
|
|
|
|
|
|
// Create stake account, identity is authority
|
|
|
|
let stake_keypair = Keypair::new();
|
|
|
|
let stake_account_pubkey = stake_keypair.pubkey();
|
|
|
|
let (stake_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&stake_keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
config.command = CliCommand::CreateStakeAccount {
|
|
|
|
stake_account: read_keypair_file(&stake_keypair_file).unwrap().into(),
|
|
|
|
seed: None,
|
|
|
|
staker: None,
|
|
|
|
withdrawer: None,
|
|
|
|
lockup: Lockup::default(),
|
|
|
|
lamports: 50_000,
|
2020-02-12 23:00:28 -07:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::All,
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
from: None,
|
2020-02-07 09:14:27 -07:00
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
// `config` balance should be 50,000 - 1 stake account sig - 1 fee sig
|
|
|
|
check_balance(
|
|
|
|
50_000 - SIG_FEE - SIG_FEE,
|
|
|
|
&rpc_client,
|
|
|
|
&config.keypair.pubkey(),
|
|
|
|
);
|
|
|
|
|
|
|
|
// Assign authority with separate fee payer
|
|
|
|
config.command = CliCommand::StakeAuthorize {
|
|
|
|
stake_account_pubkey,
|
|
|
|
new_authorized_pubkey: offline_pubkey,
|
|
|
|
stake_authorize: StakeAuthorize::Staker,
|
|
|
|
authority: None,
|
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::All,
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: Some(read_keypair_file(&payer_keypair_file).unwrap().into()),
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
// `config` balance has not changed, despite submitting the TX
|
|
|
|
check_balance(
|
|
|
|
50_000 - SIG_FEE - SIG_FEE,
|
|
|
|
&rpc_client,
|
|
|
|
&config.keypair.pubkey(),
|
|
|
|
);
|
|
|
|
// `config_payer` however has paid `config`'s authority sig
|
|
|
|
// and `config_payer`'s fee sig
|
|
|
|
check_balance(
|
|
|
|
100_000 - SIG_FEE - SIG_FEE,
|
|
|
|
&rpc_client,
|
|
|
|
&config_payer.keypair.pubkey(),
|
|
|
|
);
|
|
|
|
|
|
|
|
// Assign authority with offline fee payer
|
|
|
|
let (blockhash, _) = rpc_client.get_recent_blockhash().unwrap();
|
|
|
|
config_offline.command = CliCommand::StakeAuthorize {
|
|
|
|
stake_account_pubkey,
|
|
|
|
new_authorized_pubkey: payer_pubkey,
|
|
|
|
stake_authorize: StakeAuthorize::Staker,
|
|
|
|
authority: None,
|
|
|
|
sign_only: true,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::None(blockhash, FeeCalculator::default()),
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
};
|
|
|
|
let sign_reply = process_command(&config_offline).unwrap();
|
|
|
|
let (blockhash, signers) = parse_sign_only_reply_string(&sign_reply);
|
|
|
|
config.command = CliCommand::StakeAuthorize {
|
|
|
|
stake_account_pubkey,
|
|
|
|
new_authorized_pubkey: payer_pubkey,
|
|
|
|
stake_authorize: StakeAuthorize::Staker,
|
|
|
|
authority: Some(offline_pubkey.into()),
|
|
|
|
sign_only: false,
|
|
|
|
signers: Some(signers),
|
|
|
|
blockhash_query: BlockhashQuery::FeeCalculator(blockhash),
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: Some(offline_pubkey.into()),
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
// `config`'s balance again has not changed
|
|
|
|
check_balance(
|
|
|
|
50_000 - SIG_FEE - SIG_FEE,
|
|
|
|
&rpc_client,
|
|
|
|
&config.keypair.pubkey(),
|
|
|
|
);
|
|
|
|
// `config_offline` however has paid 1 sig due to being both authority
|
|
|
|
// and fee payer
|
|
|
|
check_balance(
|
|
|
|
100_000 - SIG_FEE,
|
|
|
|
&rpc_client,
|
|
|
|
&config_offline.keypair.pubkey(),
|
|
|
|
);
|
|
|
|
|
2020-01-15 14:32:06 -07:00
|
|
|
server.close().unwrap();
|
|
|
|
remove_dir_all(ledger_path).unwrap();
|
|
|
|
}
|
2020-02-11 00:23:54 -07:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_stake_split() {
|
|
|
|
solana_logger::setup();
|
|
|
|
|
|
|
|
let (server, leader_data, alice, ledger_path, _voter) = new_validator_for_tests_ex(1, 42_000);
|
|
|
|
let (sender, receiver) = channel();
|
|
|
|
run_local_faucet(alice, sender, None);
|
|
|
|
let faucet_addr = receiver.recv().unwrap();
|
|
|
|
|
|
|
|
let rpc_client = RpcClient::new_socket(leader_data.rpc);
|
|
|
|
|
|
|
|
let mut config = CliConfig::default();
|
|
|
|
config.json_rpc_url = format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
|
|
|
|
let mut config_offline = CliConfig::default();
|
2020-02-12 16:36:29 -07:00
|
|
|
config_offline.json_rpc_url = String::default();
|
2020-02-11 00:23:54 -07:00
|
|
|
let offline_pubkey = config_offline.keypair.pubkey();
|
|
|
|
let (_offline_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&config_offline.keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
// Verify we're offline
|
|
|
|
config_offline.command = CliCommand::ClusterVersion;
|
|
|
|
process_command(&config_offline).unwrap_err();
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(&rpc_client, &faucet_addr, &config.keypair.pubkey(), 500_000)
|
|
|
|
.unwrap();
|
|
|
|
check_balance(500_000, &rpc_client, &config.keypair.pubkey());
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(&rpc_client, &faucet_addr, &offline_pubkey, 100_000).unwrap();
|
|
|
|
check_balance(100_000, &rpc_client, &offline_pubkey);
|
|
|
|
|
|
|
|
// Create stake account, identity is authority
|
|
|
|
let minimum_stake_balance = rpc_client
|
|
|
|
.get_minimum_balance_for_rent_exemption(std::mem::size_of::<StakeState>())
|
|
|
|
.unwrap();
|
|
|
|
let stake_keypair = keypair_from_seed(&[0u8; 32]).unwrap();
|
|
|
|
let stake_account_pubkey = stake_keypair.pubkey();
|
|
|
|
let (stake_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&stake_keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
config.command = CliCommand::CreateStakeAccount {
|
|
|
|
stake_account: read_keypair_file(&stake_keypair_file).unwrap().into(),
|
|
|
|
seed: None,
|
|
|
|
staker: Some(offline_pubkey),
|
|
|
|
withdrawer: Some(offline_pubkey),
|
|
|
|
lockup: Lockup::default(),
|
|
|
|
lamports: 10 * minimum_stake_balance,
|
2020-02-12 23:00:28 -07:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::All,
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
from: None,
|
2020-02-11 00:23:54 -07:00
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
check_balance(
|
|
|
|
10 * minimum_stake_balance,
|
|
|
|
&rpc_client,
|
|
|
|
&stake_account_pubkey,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Create nonce account
|
|
|
|
let minimum_nonce_balance = rpc_client
|
|
|
|
.get_minimum_balance_for_rent_exemption(NonceState::size())
|
|
|
|
.unwrap();
|
|
|
|
let nonce_account = keypair_from_seed(&[1u8; 32]).unwrap();
|
|
|
|
let nonce_account_pubkey = nonce_account.pubkey();
|
|
|
|
let (nonce_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&nonce_account, tmp_file.as_file_mut()).unwrap();
|
|
|
|
config.command = CliCommand::CreateNonceAccount {
|
|
|
|
nonce_account: read_keypair_file(&nonce_keypair_file).unwrap().into(),
|
|
|
|
seed: None,
|
|
|
|
nonce_authority: Some(offline_pubkey),
|
|
|
|
lamports: minimum_nonce_balance,
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
check_balance(minimum_nonce_balance, &rpc_client, &nonce_account_pubkey);
|
|
|
|
|
|
|
|
// Fetch nonce hash
|
|
|
|
let account = rpc_client.get_account(&nonce_account_pubkey).unwrap();
|
|
|
|
let nonce_state: NonceState = account.state().unwrap();
|
|
|
|
let nonce_hash = match nonce_state {
|
|
|
|
NonceState::Initialized(_meta, hash) => hash,
|
|
|
|
_ => panic!("Nonce is not initialized"),
|
|
|
|
};
|
|
|
|
|
|
|
|
// Nonced offline split
|
|
|
|
let split_account = keypair_from_seed(&[2u8; 32]).unwrap();
|
|
|
|
let (split_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&split_account, tmp_file.as_file_mut()).unwrap();
|
|
|
|
check_balance(0, &rpc_client, &split_account.pubkey());
|
|
|
|
config_offline.command = CliCommand::SplitStake {
|
|
|
|
stake_account_pubkey: stake_account_pubkey,
|
|
|
|
stake_authority: None,
|
|
|
|
sign_only: true,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::None(nonce_hash, FeeCalculator::default()),
|
2020-02-12 16:36:29 -07:00
|
|
|
nonce_account: Some(nonce_account_pubkey),
|
2020-02-11 00:23:54 -07:00
|
|
|
nonce_authority: None,
|
|
|
|
split_stake_account: read_keypair_file(&split_keypair_file).unwrap().into(),
|
|
|
|
seed: None,
|
|
|
|
lamports: 2 * minimum_stake_balance,
|
|
|
|
fee_payer: None,
|
|
|
|
};
|
|
|
|
let sig_response = process_command(&config_offline).unwrap();
|
|
|
|
let (blockhash, signers) = parse_sign_only_reply_string(&sig_response);
|
|
|
|
config.command = CliCommand::SplitStake {
|
|
|
|
stake_account_pubkey: stake_account_pubkey,
|
|
|
|
stake_authority: Some(offline_pubkey.into()),
|
|
|
|
sign_only: false,
|
|
|
|
signers: Some(signers),
|
|
|
|
blockhash_query: BlockhashQuery::FeeCalculator(blockhash),
|
2020-02-12 16:36:29 -07:00
|
|
|
nonce_account: Some(nonce_account_pubkey),
|
2020-02-11 00:23:54 -07:00
|
|
|
nonce_authority: Some(offline_pubkey.into()),
|
|
|
|
split_stake_account: read_keypair_file(&split_keypair_file).unwrap().into(),
|
|
|
|
seed: None,
|
|
|
|
lamports: 2 * minimum_stake_balance,
|
|
|
|
fee_payer: Some(offline_pubkey.into()),
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
check_balance(
|
|
|
|
8 * minimum_stake_balance,
|
|
|
|
&rpc_client,
|
|
|
|
&stake_account_pubkey,
|
|
|
|
);
|
|
|
|
check_balance(
|
|
|
|
2 * minimum_stake_balance,
|
|
|
|
&rpc_client,
|
|
|
|
&split_account.pubkey(),
|
|
|
|
);
|
|
|
|
|
|
|
|
server.close().unwrap();
|
|
|
|
remove_dir_all(ledger_path).unwrap();
|
|
|
|
}
|
2020-02-12 16:36:29 -07:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_stake_set_lockup() {
|
|
|
|
solana_logger::setup();
|
|
|
|
|
|
|
|
let (server, leader_data, alice, ledger_path, _voter) = new_validator_for_tests_ex(1, 42_000);
|
|
|
|
let (sender, receiver) = channel();
|
|
|
|
run_local_faucet(alice, sender, None);
|
|
|
|
let faucet_addr = receiver.recv().unwrap();
|
|
|
|
|
|
|
|
let rpc_client = RpcClient::new_socket(leader_data.rpc);
|
|
|
|
|
|
|
|
let mut config = CliConfig::default();
|
|
|
|
config.json_rpc_url = format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
|
|
|
|
let mut config_offline = CliConfig::default();
|
|
|
|
config_offline.json_rpc_url = String::default();
|
|
|
|
let offline_pubkey = config_offline.keypair.pubkey();
|
|
|
|
let (_offline_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&config_offline.keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
// Verify we're offline
|
|
|
|
config_offline.command = CliCommand::ClusterVersion;
|
|
|
|
process_command(&config_offline).unwrap_err();
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(&rpc_client, &faucet_addr, &config.keypair.pubkey(), 500_000)
|
|
|
|
.unwrap();
|
|
|
|
check_balance(500_000, &rpc_client, &config.keypair.pubkey());
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(&rpc_client, &faucet_addr, &offline_pubkey, 100_000).unwrap();
|
|
|
|
check_balance(100_000, &rpc_client, &offline_pubkey);
|
|
|
|
|
|
|
|
// Create stake account, identity is authority
|
|
|
|
let minimum_stake_balance = rpc_client
|
|
|
|
.get_minimum_balance_for_rent_exemption(std::mem::size_of::<StakeState>())
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
let stake_keypair = keypair_from_seed(&[0u8; 32]).unwrap();
|
|
|
|
let stake_account_pubkey = stake_keypair.pubkey();
|
|
|
|
let (stake_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&stake_keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
|
|
|
|
let mut lockup = Lockup::default();
|
|
|
|
lockup.custodian = config.keypair.pubkey();
|
|
|
|
|
|
|
|
config.command = CliCommand::CreateStakeAccount {
|
|
|
|
stake_account: read_keypair_file(&stake_keypair_file).unwrap().into(),
|
|
|
|
seed: None,
|
|
|
|
staker: Some(offline_pubkey),
|
|
|
|
withdrawer: Some(offline_pubkey),
|
|
|
|
lockup,
|
|
|
|
lamports: 10 * minimum_stake_balance,
|
2020-02-12 23:00:28 -07:00
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::All,
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
from: None,
|
2020-02-12 16:36:29 -07:00
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
check_balance(
|
|
|
|
10 * minimum_stake_balance,
|
|
|
|
&rpc_client,
|
|
|
|
&stake_account_pubkey,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Online set lockup
|
|
|
|
let mut lockup = Lockup {
|
|
|
|
unix_timestamp: 1581534570,
|
|
|
|
epoch: 200,
|
|
|
|
custodian: Pubkey::default(),
|
|
|
|
};
|
|
|
|
config.command = CliCommand::StakeSetLockup {
|
|
|
|
stake_account_pubkey,
|
|
|
|
lockup,
|
|
|
|
custodian: None,
|
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::default(),
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
let stake_account = rpc_client.get_account(&stake_account_pubkey).unwrap();
|
|
|
|
let stake_state: StakeState = stake_account.state().unwrap();
|
|
|
|
let current_lockup = match stake_state {
|
|
|
|
StakeState::Initialized(meta) => meta.lockup,
|
|
|
|
_ => panic!("Unexpected stake state!"),
|
|
|
|
};
|
|
|
|
lockup.custodian = config.keypair.pubkey(); // Default new_custodian is config.keypair
|
|
|
|
assert_eq!(current_lockup, lockup);
|
|
|
|
|
|
|
|
// Set custodian to another pubkey
|
|
|
|
let online_custodian = Keypair::new();
|
|
|
|
let online_custodian_pubkey = online_custodian.pubkey();
|
|
|
|
let (online_custodian_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&online_custodian, tmp_file.as_file_mut()).unwrap();
|
|
|
|
|
|
|
|
let lockup = Lockup {
|
|
|
|
unix_timestamp: 1581534571,
|
|
|
|
epoch: 201,
|
|
|
|
custodian: online_custodian_pubkey,
|
|
|
|
};
|
|
|
|
config.command = CliCommand::StakeSetLockup {
|
|
|
|
stake_account_pubkey,
|
|
|
|
lockup,
|
|
|
|
custodian: None,
|
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::default(),
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
|
|
|
|
let mut lockup = Lockup {
|
|
|
|
unix_timestamp: 1581534572,
|
|
|
|
epoch: 202,
|
|
|
|
custodian: Pubkey::default(),
|
|
|
|
};
|
|
|
|
config.command = CliCommand::StakeSetLockup {
|
|
|
|
stake_account_pubkey,
|
|
|
|
lockup,
|
|
|
|
custodian: Some(read_keypair_file(&online_custodian_file).unwrap().into()),
|
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::default(),
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
let stake_account = rpc_client.get_account(&stake_account_pubkey).unwrap();
|
|
|
|
let stake_state: StakeState = stake_account.state().unwrap();
|
|
|
|
let current_lockup = match stake_state {
|
|
|
|
StakeState::Initialized(meta) => meta.lockup,
|
|
|
|
_ => panic!("Unexpected stake state!"),
|
|
|
|
};
|
|
|
|
lockup.custodian = online_custodian_pubkey; // Default new_custodian is designated custodian
|
|
|
|
assert_eq!(current_lockup, lockup);
|
|
|
|
|
|
|
|
// Set custodian to offline pubkey
|
|
|
|
let lockup = Lockup {
|
|
|
|
unix_timestamp: 1581534573,
|
|
|
|
epoch: 203,
|
|
|
|
custodian: offline_pubkey,
|
|
|
|
};
|
|
|
|
config.command = CliCommand::StakeSetLockup {
|
|
|
|
stake_account_pubkey,
|
|
|
|
lockup,
|
|
|
|
custodian: Some(online_custodian.into()),
|
|
|
|
sign_only: false,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::default(),
|
|
|
|
nonce_account: None,
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
|
|
|
|
// Create nonce account
|
|
|
|
let minimum_nonce_balance = rpc_client
|
|
|
|
.get_minimum_balance_for_rent_exemption(NonceState::size())
|
|
|
|
.unwrap();
|
|
|
|
let nonce_account = keypair_from_seed(&[1u8; 32]).unwrap();
|
|
|
|
let nonce_account_pubkey = nonce_account.pubkey();
|
|
|
|
let (nonce_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&nonce_account, tmp_file.as_file_mut()).unwrap();
|
|
|
|
config.command = CliCommand::CreateNonceAccount {
|
|
|
|
nonce_account: read_keypair_file(&nonce_keypair_file).unwrap().into(),
|
|
|
|
seed: None,
|
|
|
|
nonce_authority: Some(offline_pubkey),
|
|
|
|
lamports: minimum_nonce_balance,
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
check_balance(minimum_nonce_balance, &rpc_client, &nonce_account_pubkey);
|
|
|
|
|
|
|
|
// Fetch nonce hash
|
|
|
|
let account = rpc_client.get_account(&nonce_account_pubkey).unwrap();
|
|
|
|
let nonce_state: NonceState = account.state().unwrap();
|
|
|
|
let nonce_hash = match nonce_state {
|
|
|
|
NonceState::Initialized(_meta, hash) => hash,
|
|
|
|
_ => panic!("Nonce is not initialized"),
|
|
|
|
};
|
|
|
|
|
|
|
|
// Nonced offline set lockup
|
|
|
|
let lockup = Lockup {
|
|
|
|
unix_timestamp: 1581534576,
|
|
|
|
epoch: 222,
|
|
|
|
custodian: offline_pubkey,
|
|
|
|
};
|
|
|
|
config_offline.command = CliCommand::StakeSetLockup {
|
|
|
|
stake_account_pubkey,
|
|
|
|
lockup,
|
|
|
|
custodian: None,
|
|
|
|
sign_only: true,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::None(nonce_hash, FeeCalculator::default()),
|
|
|
|
nonce_account: Some(nonce_account_pubkey),
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
};
|
|
|
|
let sig_response = process_command(&config_offline).unwrap();
|
|
|
|
let (blockhash, signers) = parse_sign_only_reply_string(&sig_response);
|
|
|
|
config.command = CliCommand::StakeSetLockup {
|
|
|
|
stake_account_pubkey,
|
|
|
|
lockup,
|
|
|
|
custodian: Some(offline_pubkey.into()),
|
|
|
|
sign_only: false,
|
|
|
|
signers: Some(signers),
|
|
|
|
blockhash_query: BlockhashQuery::FeeCalculator(blockhash),
|
|
|
|
nonce_account: Some(nonce_account_pubkey),
|
|
|
|
nonce_authority: Some(offline_pubkey.into()),
|
|
|
|
fee_payer: Some(offline_pubkey.into()),
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
let stake_account = rpc_client.get_account(&stake_account_pubkey).unwrap();
|
|
|
|
let stake_state: StakeState = stake_account.state().unwrap();
|
|
|
|
let current_lockup = match stake_state {
|
|
|
|
StakeState::Initialized(meta) => meta.lockup,
|
|
|
|
_ => panic!("Unexpected stake state!"),
|
|
|
|
};
|
|
|
|
assert_eq!(current_lockup, lockup);
|
|
|
|
|
|
|
|
server.close().unwrap();
|
|
|
|
remove_dir_all(ledger_path).unwrap();
|
|
|
|
}
|
2020-02-12 23:00:28 -07:00
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_offline_nonced_create_stake_account_and_withdraw() {
|
|
|
|
solana_logger::setup();
|
|
|
|
|
|
|
|
let (server, leader_data, alice, ledger_path) = new_validator_for_tests();
|
|
|
|
let (sender, receiver) = channel();
|
|
|
|
run_local_faucet(alice, sender, None);
|
|
|
|
let faucet_addr = receiver.recv().unwrap();
|
|
|
|
|
|
|
|
let rpc_client = RpcClient::new_socket(leader_data.rpc);
|
|
|
|
|
|
|
|
let mut config = CliConfig::default();
|
|
|
|
config.keypair = keypair_from_seed(&[1u8; 32]).unwrap();
|
|
|
|
config.json_rpc_url = format!("http://{}:{}", leader_data.rpc.ip(), leader_data.rpc.port());
|
|
|
|
|
|
|
|
let mut config_offline = CliConfig::default();
|
|
|
|
config_offline.keypair = keypair_from_seed(&[2u8; 32]).unwrap();
|
|
|
|
let offline_pubkey = config_offline.keypair.pubkey();
|
|
|
|
let (offline_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&config_offline.keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
config_offline.json_rpc_url = String::default();
|
|
|
|
config_offline.command = CliCommand::ClusterVersion;
|
|
|
|
// Verfiy that we cannot reach the cluster
|
|
|
|
process_command(&config_offline).unwrap_err();
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(&rpc_client, &faucet_addr, &config.keypair.pubkey(), 200_000)
|
|
|
|
.unwrap();
|
|
|
|
check_balance(200_000, &rpc_client, &config.keypair.pubkey());
|
|
|
|
|
|
|
|
request_and_confirm_airdrop(
|
|
|
|
&rpc_client,
|
|
|
|
&faucet_addr,
|
|
|
|
&config_offline.keypair.pubkey(),
|
|
|
|
100_000,
|
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
check_balance(100_000, &rpc_client, &config_offline.keypair.pubkey());
|
|
|
|
|
|
|
|
// Create nonce account
|
|
|
|
let minimum_nonce_balance = rpc_client
|
|
|
|
.get_minimum_balance_for_rent_exemption(NonceState::size())
|
|
|
|
.unwrap();
|
|
|
|
let nonce_account = keypair_from_seed(&[3u8; 32]).unwrap();
|
|
|
|
let nonce_pubkey = nonce_account.pubkey();
|
|
|
|
let (nonce_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&nonce_account, tmp_file.as_file_mut()).unwrap();
|
|
|
|
config.command = CliCommand::CreateNonceAccount {
|
|
|
|
nonce_account: read_keypair_file(&nonce_keypair_file).unwrap().into(),
|
|
|
|
seed: None,
|
|
|
|
nonce_authority: Some(offline_pubkey),
|
|
|
|
lamports: minimum_nonce_balance,
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
|
|
|
|
// Fetch nonce hash
|
|
|
|
let account = rpc_client.get_account(&nonce_account.pubkey()).unwrap();
|
|
|
|
let nonce_state: NonceState = account.state().unwrap();
|
|
|
|
let nonce_hash = match nonce_state {
|
|
|
|
NonceState::Initialized(_meta, hash) => hash,
|
|
|
|
_ => panic!("Nonce is not initialized"),
|
|
|
|
};
|
|
|
|
|
|
|
|
// Create stake account offline
|
|
|
|
let stake_keypair = keypair_from_seed(&[4u8; 32]).unwrap();
|
|
|
|
let stake_pubkey = stake_keypair.pubkey();
|
|
|
|
let (stake_keypair_file, mut tmp_file) = make_tmp_file();
|
|
|
|
write_keypair(&stake_keypair, tmp_file.as_file_mut()).unwrap();
|
|
|
|
config_offline.command = CliCommand::CreateStakeAccount {
|
|
|
|
stake_account: read_keypair_file(&stake_keypair_file).unwrap().into(),
|
|
|
|
seed: None,
|
|
|
|
staker: None,
|
|
|
|
withdrawer: None,
|
|
|
|
lockup: Lockup::default(),
|
|
|
|
lamports: 50_000,
|
|
|
|
sign_only: true,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::None(nonce_hash, FeeCalculator::default()),
|
|
|
|
nonce_account: Some(nonce_pubkey),
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
from: None,
|
|
|
|
};
|
|
|
|
let sig_response = process_command(&config_offline).unwrap();
|
|
|
|
let (blockhash, signers) = parse_sign_only_reply_string(&sig_response);
|
|
|
|
config.command = CliCommand::CreateStakeAccount {
|
|
|
|
stake_account: stake_pubkey.into(),
|
|
|
|
seed: None,
|
|
|
|
staker: Some(offline_pubkey.into()),
|
|
|
|
withdrawer: None,
|
|
|
|
lockup: Lockup::default(),
|
|
|
|
lamports: 50_000,
|
|
|
|
sign_only: false,
|
|
|
|
signers: Some(signers),
|
|
|
|
blockhash_query: BlockhashQuery::FeeCalculator(blockhash),
|
|
|
|
nonce_account: Some(nonce_pubkey),
|
|
|
|
nonce_authority: Some(offline_pubkey.into()),
|
|
|
|
fee_payer: Some(offline_pubkey.into()),
|
|
|
|
from: Some(offline_pubkey.into()),
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
check_balance(50_000, &rpc_client, &stake_pubkey);
|
|
|
|
|
|
|
|
// Fetch nonce hash
|
|
|
|
let account = rpc_client.get_account(&nonce_account.pubkey()).unwrap();
|
|
|
|
let nonce_state: NonceState = account.state().unwrap();
|
|
|
|
let nonce_hash = match nonce_state {
|
|
|
|
NonceState::Initialized(_meta, hash) => hash,
|
|
|
|
_ => panic!("Nonce is not initialized"),
|
|
|
|
};
|
|
|
|
|
|
|
|
// Offline, nonced stake-withdraw
|
|
|
|
let recipient = keypair_from_seed(&[5u8; 32]).unwrap();
|
|
|
|
let recipient_pubkey = recipient.pubkey();
|
|
|
|
config_offline.command = CliCommand::WithdrawStake {
|
|
|
|
stake_account_pubkey: stake_pubkey,
|
|
|
|
destination_account_pubkey: recipient_pubkey,
|
|
|
|
lamports: 42,
|
|
|
|
withdraw_authority: None,
|
|
|
|
sign_only: true,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::None(nonce_hash, FeeCalculator::default()),
|
|
|
|
nonce_account: Some(nonce_pubkey),
|
|
|
|
nonce_authority: None,
|
|
|
|
fee_payer: None,
|
|
|
|
};
|
|
|
|
let sig_response = process_command(&config_offline).unwrap();
|
|
|
|
let (blockhash, signers) = parse_sign_only_reply_string(&sig_response);
|
|
|
|
config.command = CliCommand::WithdrawStake {
|
|
|
|
stake_account_pubkey: stake_pubkey,
|
|
|
|
destination_account_pubkey: recipient_pubkey,
|
|
|
|
lamports: 42,
|
|
|
|
withdraw_authority: Some(offline_pubkey.into()),
|
|
|
|
sign_only: false,
|
|
|
|
signers: Some(signers),
|
|
|
|
blockhash_query: BlockhashQuery::FeeCalculator(blockhash),
|
|
|
|
nonce_account: Some(nonce_pubkey),
|
|
|
|
nonce_authority: Some(offline_pubkey.into()),
|
|
|
|
fee_payer: Some(offline_pubkey.into()),
|
|
|
|
};
|
|
|
|
process_command(&config).unwrap();
|
|
|
|
check_balance(42, &rpc_client, &recipient_pubkey);
|
|
|
|
|
|
|
|
// Test that offline derived addresses fail
|
|
|
|
config_offline.command = CliCommand::CreateStakeAccount {
|
|
|
|
stake_account: read_keypair_file(&stake_keypair_file).unwrap().into(),
|
|
|
|
seed: Some("fail".to_string()),
|
|
|
|
staker: None,
|
|
|
|
withdrawer: None,
|
|
|
|
lockup: Lockup::default(),
|
|
|
|
lamports: 50_000,
|
|
|
|
sign_only: true,
|
|
|
|
signers: None,
|
|
|
|
blockhash_query: BlockhashQuery::None(nonce_hash, FeeCalculator::default()),
|
|
|
|
nonce_account: Some(nonce_pubkey),
|
|
|
|
nonce_authority: Some(read_keypair_file(&offline_keypair_file).unwrap().into()),
|
|
|
|
fee_payer: Some(read_keypair_file(&offline_keypair_file).unwrap().into()),
|
|
|
|
from: Some(read_keypair_file(&offline_keypair_file).unwrap().into()),
|
|
|
|
};
|
|
|
|
process_command(&config_offline).unwrap_err();
|
|
|
|
|
|
|
|
server.close().unwrap();
|
|
|
|
remove_dir_all(ledger_path).unwrap();
|
|
|
|
}
|