2020-04-28 14:33:56 -07:00
|
|
|
//! @brief Example Rust-based BPF program that issues a cross-program-invocation
|
|
|
|
|
|
|
|
#![allow(unreachable_code)]
|
|
|
|
|
|
|
|
extern crate solana_sdk;
|
|
|
|
|
2020-05-08 12:24:36 -07:00
|
|
|
use solana_bpf_rust_invoked::instruction::*;
|
2020-04-28 14:33:56 -07:00
|
|
|
use solana_sdk::{
|
|
|
|
account_info::AccountInfo,
|
|
|
|
entrypoint,
|
2020-08-17 13:38:42 -07:00
|
|
|
entrypoint::{ProgramResult, MAX_PERMITTED_DATA_INCREASE},
|
2020-04-28 14:33:56 -07:00
|
|
|
info,
|
2020-08-10 10:24:11 -07:00
|
|
|
program::{invoke, invoke_signed},
|
2020-04-28 14:33:56 -07:00
|
|
|
program_error::ProgramError,
|
2020-08-17 09:49:40 -07:00
|
|
|
pubkey::{Pubkey, PubkeyError},
|
2020-05-20 09:24:57 -07:00
|
|
|
system_instruction,
|
2020-04-28 14:33:56 -07:00
|
|
|
};
|
|
|
|
|
2020-05-26 01:02:31 -07:00
|
|
|
const TEST_SUCCESS: u8 = 1;
|
|
|
|
const TEST_PRIVILEGE_ESCALATION_SIGNER: u8 = 2;
|
|
|
|
const TEST_PRIVILEGE_ESCALATION_WRITABLE: u8 = 3;
|
2020-10-02 13:55:22 -07:00
|
|
|
const TEST_PPROGRAM_NOT_EXECUTABLE: u8 = 4;
|
2020-05-26 01:02:31 -07:00
|
|
|
|
2020-04-28 14:33:56 -07:00
|
|
|
// const MINT_INDEX: usize = 0;
|
|
|
|
const ARGUMENT_INDEX: usize = 1;
|
|
|
|
const INVOKED_PROGRAM_INDEX: usize = 2;
|
|
|
|
const INVOKED_ARGUMENT_INDEX: usize = 3;
|
|
|
|
const INVOKED_PROGRAM_DUP_INDEX: usize = 4;
|
|
|
|
// const ARGUMENT_DUP_INDEX: usize = 5;
|
2020-05-08 12:24:36 -07:00
|
|
|
const DERIVED_KEY1_INDEX: usize = 6;
|
2020-04-28 14:33:56 -07:00
|
|
|
const DERIVED_KEY2_INDEX: usize = 7;
|
2020-05-08 12:24:36 -07:00
|
|
|
const DERIVED_KEY3_INDEX: usize = 8;
|
2020-05-20 09:24:57 -07:00
|
|
|
// const SYSTEM_PROGRAM_INDEX: usize = 9;
|
|
|
|
const FROM_INDEX: usize = 10;
|
2020-04-28 14:33:56 -07:00
|
|
|
|
|
|
|
entrypoint!(process_instruction);
|
|
|
|
fn process_instruction(
|
2020-08-05 16:35:54 -07:00
|
|
|
program_id: &Pubkey,
|
2020-04-28 14:33:56 -07:00
|
|
|
accounts: &[AccountInfo],
|
2020-05-26 01:02:31 -07:00
|
|
|
instruction_data: &[u8],
|
2020-04-28 14:33:56 -07:00
|
|
|
) -> ProgramResult {
|
|
|
|
info!("invoke Rust program");
|
|
|
|
|
2020-10-13 18:31:48 +00:00
|
|
|
let bump_seed1 = instruction_data[1];
|
|
|
|
let bump_seed2 = instruction_data[2];
|
|
|
|
let bump_seed3 = instruction_data[3];
|
2020-08-05 16:35:54 -07:00
|
|
|
|
2020-05-26 01:02:31 -07:00
|
|
|
match instruction_data[0] {
|
|
|
|
TEST_SUCCESS => {
|
2020-08-17 13:38:42 -07:00
|
|
|
info!("Call system program create account");
|
2020-05-26 01:02:31 -07:00
|
|
|
{
|
2020-08-17 13:38:42 -07:00
|
|
|
let from_lamports = accounts[FROM_INDEX].lamports();
|
|
|
|
let to_lamports = accounts[DERIVED_KEY1_INDEX].lamports();
|
|
|
|
assert_eq!(accounts[DERIVED_KEY1_INDEX].data_len(), 0);
|
|
|
|
assert!(solana_sdk::system_program::check_id(
|
|
|
|
accounts[DERIVED_KEY1_INDEX].owner
|
|
|
|
));
|
|
|
|
|
|
|
|
let instruction = system_instruction::create_account(
|
|
|
|
accounts[FROM_INDEX].key,
|
|
|
|
accounts[DERIVED_KEY1_INDEX].key,
|
|
|
|
42,
|
|
|
|
MAX_PERMITTED_DATA_INCREASE as u64,
|
|
|
|
program_id,
|
|
|
|
);
|
2020-10-13 18:31:48 +00:00
|
|
|
invoke_signed(
|
|
|
|
&instruction,
|
|
|
|
accounts,
|
|
|
|
&[&[b"You pass butter", &[bump_seed1]]],
|
|
|
|
)?;
|
2020-08-17 13:38:42 -07:00
|
|
|
|
|
|
|
assert_eq!(accounts[FROM_INDEX].lamports(), from_lamports - 42);
|
|
|
|
assert_eq!(accounts[DERIVED_KEY1_INDEX].lamports(), to_lamports + 42);
|
|
|
|
assert_eq!(program_id, accounts[DERIVED_KEY1_INDEX].owner);
|
|
|
|
assert_eq!(
|
|
|
|
accounts[DERIVED_KEY1_INDEX].data_len(),
|
|
|
|
MAX_PERMITTED_DATA_INCREASE
|
|
|
|
);
|
|
|
|
let mut data = accounts[DERIVED_KEY1_INDEX].try_borrow_mut_data()?;
|
|
|
|
assert_eq!(data[MAX_PERMITTED_DATA_INCREASE - 1], 0);
|
|
|
|
data[MAX_PERMITTED_DATA_INCREASE - 1] = 0x0f;
|
|
|
|
assert_eq!(data[MAX_PERMITTED_DATA_INCREASE - 1], 0x0f);
|
|
|
|
for i in 0..20 {
|
|
|
|
data[i] = i as u8;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
info!("Call system program transfer");
|
|
|
|
{
|
|
|
|
let from_lamports = accounts[FROM_INDEX].lamports();
|
|
|
|
let to_lamports = accounts[DERIVED_KEY1_INDEX].lamports();
|
2020-05-26 01:02:31 -07:00
|
|
|
let instruction = system_instruction::transfer(
|
|
|
|
accounts[FROM_INDEX].key,
|
2020-08-17 13:38:42 -07:00
|
|
|
accounts[DERIVED_KEY1_INDEX].key,
|
2020-05-26 01:02:31 -07:00
|
|
|
1,
|
|
|
|
);
|
|
|
|
invoke(&instruction, accounts)?;
|
2020-08-17 13:38:42 -07:00
|
|
|
assert_eq!(accounts[FROM_INDEX].lamports(), from_lamports - 1);
|
|
|
|
assert_eq!(accounts[DERIVED_KEY1_INDEX].lamports(), to_lamports + 1);
|
2020-04-28 14:33:56 -07:00
|
|
|
}
|
|
|
|
|
2020-05-26 01:02:31 -07:00
|
|
|
info!("Test data translation");
|
|
|
|
{
|
|
|
|
{
|
|
|
|
let mut data = accounts[ARGUMENT_INDEX].try_borrow_mut_data()?;
|
|
|
|
for i in 0..100 {
|
|
|
|
data[i as usize] = i;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let instruction = create_instruction(
|
|
|
|
*accounts[INVOKED_PROGRAM_INDEX].key,
|
|
|
|
&[
|
|
|
|
(accounts[ARGUMENT_INDEX].key, true, true),
|
|
|
|
(accounts[INVOKED_ARGUMENT_INDEX].key, true, true),
|
|
|
|
(accounts[INVOKED_PROGRAM_INDEX].key, false, false),
|
|
|
|
(accounts[INVOKED_PROGRAM_DUP_INDEX].key, false, false),
|
|
|
|
],
|
|
|
|
vec![TEST_VERIFY_TRANSLATIONS, 1, 2, 3, 4, 5],
|
|
|
|
);
|
|
|
|
invoke(&instruction, accounts)?;
|
|
|
|
}
|
2020-04-28 14:33:56 -07:00
|
|
|
|
2020-10-02 17:45:39 -07:00
|
|
|
info!("Test no instruction data");
|
|
|
|
{
|
|
|
|
let instruction = create_instruction(
|
|
|
|
*accounts[INVOKED_PROGRAM_INDEX].key,
|
|
|
|
&[(accounts[ARGUMENT_INDEX].key, true, true)],
|
|
|
|
vec![],
|
|
|
|
);
|
|
|
|
invoke(&instruction, accounts)?;
|
|
|
|
}
|
|
|
|
|
2020-05-26 01:02:31 -07:00
|
|
|
info!("Test return error");
|
|
|
|
{
|
|
|
|
let instruction = create_instruction(
|
|
|
|
*accounts[INVOKED_PROGRAM_INDEX].key,
|
|
|
|
&[(accounts[ARGUMENT_INDEX].key, true, true)],
|
|
|
|
vec![TEST_RETURN_ERROR],
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
invoke(&instruction, accounts),
|
|
|
|
Err(ProgramError::Custom(42))
|
|
|
|
);
|
|
|
|
}
|
2020-04-28 14:33:56 -07:00
|
|
|
|
2020-08-05 16:35:54 -07:00
|
|
|
info!("Test create_program_address");
|
|
|
|
{
|
2020-08-17 09:49:40 -07:00
|
|
|
assert_eq!(
|
2020-10-13 18:31:48 +00:00
|
|
|
&Pubkey::create_program_address(
|
|
|
|
&[b"You pass butter", &[bump_seed1]],
|
|
|
|
program_id
|
|
|
|
)?,
|
2020-08-17 09:49:40 -07:00
|
|
|
accounts[DERIVED_KEY1_INDEX].key
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
Pubkey::create_program_address(&[b"You pass butter"], &Pubkey::default())
|
|
|
|
.unwrap_err(),
|
|
|
|
PubkeyError::InvalidSeeds
|
|
|
|
);
|
2020-08-05 16:35:54 -07:00
|
|
|
}
|
|
|
|
|
2020-05-26 01:02:31 -07:00
|
|
|
info!("Test derived signers");
|
|
|
|
{
|
|
|
|
assert!(!accounts[DERIVED_KEY1_INDEX].is_signer);
|
|
|
|
assert!(!accounts[DERIVED_KEY2_INDEX].is_signer);
|
|
|
|
assert!(!accounts[DERIVED_KEY3_INDEX].is_signer);
|
|
|
|
|
|
|
|
let invoked_instruction = create_instruction(
|
|
|
|
*accounts[INVOKED_PROGRAM_INDEX].key,
|
|
|
|
&[
|
|
|
|
(accounts[INVOKED_PROGRAM_INDEX].key, false, false),
|
|
|
|
(accounts[DERIVED_KEY1_INDEX].key, true, true),
|
|
|
|
(accounts[DERIVED_KEY2_INDEX].key, true, false),
|
|
|
|
(accounts[DERIVED_KEY3_INDEX].key, false, false),
|
|
|
|
],
|
2020-10-13 18:31:48 +00:00
|
|
|
vec![TEST_DERIVED_SIGNERS, bump_seed2, bump_seed3],
|
2020-05-26 01:02:31 -07:00
|
|
|
);
|
|
|
|
invoke_signed(
|
|
|
|
&invoked_instruction,
|
|
|
|
accounts,
|
2020-10-13 18:31:48 +00:00
|
|
|
&[&[b"You pass butter", &[bump_seed1]]],
|
2020-05-26 01:02:31 -07:00
|
|
|
)?;
|
|
|
|
}
|
2020-04-28 14:33:56 -07:00
|
|
|
|
2020-05-26 01:02:31 -07:00
|
|
|
info!("Test readonly with writable account");
|
|
|
|
{
|
|
|
|
let invoked_instruction = create_instruction(
|
|
|
|
*accounts[INVOKED_PROGRAM_INDEX].key,
|
|
|
|
&[(accounts[ARGUMENT_INDEX].key, false, true)],
|
|
|
|
vec![TEST_VERIFY_WRITER],
|
|
|
|
);
|
|
|
|
invoke(&invoked_instruction, accounts)?;
|
|
|
|
}
|
2020-04-28 14:33:56 -07:00
|
|
|
|
2020-05-26 01:02:31 -07:00
|
|
|
info!("Test nested invoke");
|
|
|
|
{
|
|
|
|
assert!(accounts[ARGUMENT_INDEX].is_signer);
|
|
|
|
|
|
|
|
**accounts[ARGUMENT_INDEX].lamports.borrow_mut() -= 5;
|
|
|
|
**accounts[INVOKED_ARGUMENT_INDEX].lamports.borrow_mut() += 5;
|
|
|
|
|
|
|
|
info!("First invoke");
|
|
|
|
let instruction = create_instruction(
|
|
|
|
*accounts[INVOKED_PROGRAM_INDEX].key,
|
|
|
|
&[
|
|
|
|
(accounts[ARGUMENT_INDEX].key, true, true),
|
|
|
|
(accounts[INVOKED_ARGUMENT_INDEX].key, true, true),
|
2020-10-09 18:49:44 +00:00
|
|
|
(accounts[INVOKED_PROGRAM_DUP_INDEX].key, false, false),
|
|
|
|
(accounts[INVOKED_PROGRAM_DUP_INDEX].key, false, false),
|
2020-05-26 01:02:31 -07:00
|
|
|
],
|
|
|
|
vec![TEST_NESTED_INVOKE],
|
|
|
|
);
|
|
|
|
invoke(&instruction, accounts)?;
|
|
|
|
info!("2nd invoke from first program");
|
|
|
|
invoke(&instruction, accounts)?;
|
|
|
|
|
2020-10-09 18:49:44 +00:00
|
|
|
assert_eq!(accounts[ARGUMENT_INDEX].lamports(), 42 - 5 + 1 + 1 + 1 + 1);
|
|
|
|
assert_eq!(
|
|
|
|
accounts[INVOKED_ARGUMENT_INDEX].lamports(),
|
|
|
|
10 + 5 - 1 - 1 - 1 - 1
|
|
|
|
);
|
2020-05-26 01:02:31 -07:00
|
|
|
}
|
2020-04-28 14:33:56 -07:00
|
|
|
|
2020-05-26 01:02:31 -07:00
|
|
|
info!("Verify data values are retained and updated");
|
|
|
|
{
|
|
|
|
let data = accounts[ARGUMENT_INDEX].try_borrow_data()?;
|
|
|
|
for i in 0..100 {
|
|
|
|
assert_eq!(data[i as usize], i);
|
|
|
|
}
|
|
|
|
let data = accounts[INVOKED_ARGUMENT_INDEX].try_borrow_data()?;
|
|
|
|
for i in 0..10 {
|
|
|
|
assert_eq!(data[i as usize], i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
TEST_PRIVILEGE_ESCALATION_SIGNER => {
|
|
|
|
info!("Test privilege escalation signer");
|
|
|
|
let mut invoked_instruction = create_instruction(
|
|
|
|
*accounts[INVOKED_PROGRAM_INDEX].key,
|
|
|
|
&[(accounts[DERIVED_KEY3_INDEX].key, false, false)],
|
|
|
|
vec![TEST_VERIFY_PRIVILEGE_ESCALATION],
|
|
|
|
);
|
|
|
|
invoke(&invoked_instruction, accounts)?;
|
|
|
|
|
2020-09-24 22:36:22 +08:00
|
|
|
// Signer privilege escalation will always fail the whole transaction
|
2020-05-26 01:02:31 -07:00
|
|
|
invoked_instruction.accounts[0].is_signer = true;
|
2020-10-02 13:55:22 -07:00
|
|
|
invoke(&invoked_instruction, accounts)?;
|
2020-04-28 14:33:56 -07:00
|
|
|
}
|
2020-05-26 01:02:31 -07:00
|
|
|
TEST_PRIVILEGE_ESCALATION_WRITABLE => {
|
|
|
|
info!("Test privilege escalation writable");
|
|
|
|
let mut invoked_instruction = create_instruction(
|
|
|
|
*accounts[INVOKED_PROGRAM_INDEX].key,
|
|
|
|
&[(accounts[DERIVED_KEY3_INDEX].key, false, false)],
|
|
|
|
vec![TEST_VERIFY_PRIVILEGE_ESCALATION],
|
|
|
|
);
|
|
|
|
invoke(&invoked_instruction, accounts)?;
|
|
|
|
|
2020-09-24 22:36:22 +08:00
|
|
|
// Writable privilege escalation will always fail the whole transaction
|
2020-05-26 01:02:31 -07:00
|
|
|
invoked_instruction.accounts[0].is_writable = true;
|
2020-10-02 13:55:22 -07:00
|
|
|
|
|
|
|
invoke(&invoked_instruction, accounts)?;
|
|
|
|
}
|
|
|
|
TEST_PPROGRAM_NOT_EXECUTABLE => {
|
|
|
|
info!("Test program not executable");
|
|
|
|
let instruction = create_instruction(
|
|
|
|
*accounts[ARGUMENT_INDEX].key,
|
|
|
|
&[(accounts[ARGUMENT_INDEX].key, true, true)],
|
|
|
|
vec![TEST_RETURN_ERROR],
|
2020-05-26 01:02:31 -07:00
|
|
|
);
|
2020-10-02 13:55:22 -07:00
|
|
|
invoke(&instruction, accounts)?;
|
2020-04-28 14:33:56 -07:00
|
|
|
}
|
2020-05-26 01:02:31 -07:00
|
|
|
_ => panic!(),
|
2020-04-28 14:33:56 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
2020-04-28 19:41:08 -07:00
|
|
|
|
2020-08-24 19:28:36 +02:00
|
|
|
#[cfg(test)]
|
|
|
|
mod test {
|
|
|
|
use super::*;
|
|
|
|
// Pull in syscall stubs when building for non-BPF targets
|
|
|
|
solana_sdk::program_stubs!();
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn create_program_address_is_defined() {
|
|
|
|
assert_eq!(
|
|
|
|
Pubkey::create_program_address(&[b"You pass butter"], &Pubkey::default()).unwrap_err(),
|
|
|
|
PubkeyError::InvalidSeeds
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|