Cherry-pick vote and stake authority changes (#6127)
* add authorized parameters to vote api (#6072) * add authorized parameters to vote api * code review * add authorities to stake init (#6104) * add authorities to stake init * fixups * code review
This commit is contained in:
@@ -1,6 +1,6 @@
|
||||
use crate::{
|
||||
config, id,
|
||||
stake_state::{StakeAccount, StakeState},
|
||||
stake_state::{Authorized, Lockup, StakeAccount, StakeAuthorize, StakeState},
|
||||
};
|
||||
use bincode::deserialize;
|
||||
use log::*;
|
||||
@@ -8,7 +8,6 @@ use num_derive::{FromPrimitive, ToPrimitive};
|
||||
use serde_derive::{Deserialize, Serialize};
|
||||
use solana_sdk::{
|
||||
account::KeyedAccount,
|
||||
clock::Slot,
|
||||
instruction::{AccountMeta, Instruction, InstructionError},
|
||||
instruction_processor_utils::DecodeError,
|
||||
pubkey::Pubkey,
|
||||
@@ -36,30 +35,33 @@ impl std::fmt::Display for StakeError {
|
||||
}
|
||||
impl std::error::Error for StakeError {}
|
||||
|
||||
#[derive(Serialize, Deserialize, Debug, PartialEq, Eq, Clone)]
|
||||
#[derive(Serialize, Deserialize, Debug, PartialEq, Clone)]
|
||||
pub enum StakeInstruction {
|
||||
/// `Lockup` a stake until the specified slot
|
||||
/// `Initialize` a stake with Lockup and Authorized information
|
||||
///
|
||||
/// Expects 1 Account:
|
||||
/// 0 - Uninitialized StakeAccount to be lockup'd
|
||||
/// 0 - Uninitialized StakeAccount
|
||||
///
|
||||
/// The Slot parameter denotes slot height at which this stake
|
||||
/// will allow withdrawal from the stake account.
|
||||
/// The Pubkey parameter denotes a "custodian" account, the only
|
||||
/// account to which this stake will honor a withdrawal *before*
|
||||
// lockup expires.
|
||||
/// Authorized carries pubkeys that must sign staker transactions
|
||||
/// and withdrawer transactions.
|
||||
/// Lockup carries information about withdrawal restrictions
|
||||
///
|
||||
Lockup((Slot, Pubkey)),
|
||||
Initialize(Authorized, Lockup),
|
||||
|
||||
/// Authorize a system account to manage stake
|
||||
/// Authorize a key to manage stake or withdrawal
|
||||
/// requires Authorized::staker or Authorized::withdrawer
|
||||
/// signature, depending on which key's being updated
|
||||
///
|
||||
/// Expects 1 Account:
|
||||
/// 0 - Locked-up or delegated StakeAccount to be updated with authorized staker
|
||||
Authorize(Pubkey),
|
||||
/// 0 - StakeAccount to be updated with the Pubkey for
|
||||
/// authorization
|
||||
Authorize(Pubkey, StakeAuthorize),
|
||||
|
||||
/// `Delegate` a stake to a particular vote account
|
||||
/// requires Authorized::staker signature
|
||||
///
|
||||
/// Expects 4 Accounts:
|
||||
/// 0 - Lockup'd StakeAccount to be delegated <= transaction must have this signature
|
||||
/// 0 - Initialized StakeAccount to be delegated
|
||||
/// 1 - VoteAccount to which this Stake will be delegated
|
||||
/// 2 - Clock sysvar Account that carries clock bank epoch
|
||||
/// 3 - Config Account that carries stake config
|
||||
@@ -71,9 +73,10 @@ pub enum StakeInstruction {
|
||||
DelegateStake,
|
||||
|
||||
/// Redeem credits in the stake account
|
||||
/// requires Authorized::staker signature
|
||||
///
|
||||
/// Expects 5 Accounts:
|
||||
/// 0 - Delegate StakeAccount to be updated with rewards
|
||||
/// 0 - StakeAccount to be updated with rewards
|
||||
/// 1 - VoteAccount to which the Stake is delegated,
|
||||
/// 2 - RewardsPool Stake Account from which to redeem credits
|
||||
/// 3 - Rewards sysvar Account that carries points values
|
||||
@@ -81,21 +84,23 @@ pub enum StakeInstruction {
|
||||
RedeemVoteCredits,
|
||||
|
||||
/// Withdraw unstaked lamports from the stake account
|
||||
/// requires Authorized::withdrawer signature
|
||||
///
|
||||
/// Expects 4 Accounts:
|
||||
/// 0 - Delegate StakeAccount <= transaction must have this signature
|
||||
/// 0 - StakeAccount from which to withdraw
|
||||
/// 1 - System account to which the lamports will be transferred,
|
||||
/// 2 - Syscall Account that carries epoch
|
||||
/// 3 - StakeHistory sysvar that carries stake warmup/cooldown history
|
||||
///
|
||||
/// The u64 is the portion of the Stake account balance to be withdrawn,
|
||||
/// must be <= StakeAccount.lamports - staked lamports
|
||||
/// must be <= StakeAccount.lamports - staked lamports.
|
||||
Withdraw(u64),
|
||||
|
||||
/// Deactivates the stake in the account
|
||||
/// requires Authorized::staker signature
|
||||
///
|
||||
/// Expects 3 Accounts:
|
||||
/// 0 - Delegate StakeAccount <= transaction must have this signature
|
||||
/// 0 - Delegate StakeAccount
|
||||
/// 1 - VoteAccount to which the Stake is delegated
|
||||
/// 2 - Syscall Account that carries epoch
|
||||
///
|
||||
@@ -106,8 +111,8 @@ pub fn create_stake_account_with_lockup(
|
||||
from_pubkey: &Pubkey,
|
||||
stake_pubkey: &Pubkey,
|
||||
lamports: u64,
|
||||
lockup: Slot,
|
||||
custodian: &Pubkey,
|
||||
authorized: &Authorized,
|
||||
lockup: &Lockup,
|
||||
) -> Vec<Instruction> {
|
||||
vec![
|
||||
system_instruction::create_account(
|
||||
@@ -119,7 +124,7 @@ pub fn create_stake_account_with_lockup(
|
||||
),
|
||||
Instruction::new(
|
||||
id(),
|
||||
&StakeInstruction::Lockup((lockup, *custodian)),
|
||||
&StakeInstruction::Initialize(*authorized, *lockup),
|
||||
vec![AccountMeta::new(*stake_pubkey, false)],
|
||||
),
|
||||
]
|
||||
@@ -129,8 +134,15 @@ pub fn create_stake_account(
|
||||
from_pubkey: &Pubkey,
|
||||
stake_pubkey: &Pubkey,
|
||||
lamports: u64,
|
||||
authorized: &Authorized,
|
||||
) -> Vec<Instruction> {
|
||||
create_stake_account_with_lockup(from_pubkey, stake_pubkey, lamports, 0, &Pubkey::default())
|
||||
create_stake_account_with_lockup(
|
||||
from_pubkey,
|
||||
stake_pubkey,
|
||||
lamports,
|
||||
authorized,
|
||||
&Lockup::default(),
|
||||
)
|
||||
}
|
||||
|
||||
pub fn create_stake_account_and_delegate_stake(
|
||||
@@ -138,21 +150,23 @@ pub fn create_stake_account_and_delegate_stake(
|
||||
stake_pubkey: &Pubkey,
|
||||
vote_pubkey: &Pubkey,
|
||||
lamports: u64,
|
||||
authorized: &Authorized,
|
||||
) -> Vec<Instruction> {
|
||||
let mut instructions = create_stake_account(from_pubkey, stake_pubkey, lamports);
|
||||
let mut instructions = create_stake_account(from_pubkey, stake_pubkey, lamports, authorized);
|
||||
instructions.push(delegate_stake(stake_pubkey, vote_pubkey));
|
||||
instructions
|
||||
}
|
||||
|
||||
fn metas_for_authorized_staker(
|
||||
stake_pubkey: &Pubkey,
|
||||
authorized_pubkey: &Pubkey, // currently authorized
|
||||
// for instructions that whose authorized signer may differ from the account's pubkey
|
||||
fn metas_for_authorized_signer(
|
||||
account_pubkey: &Pubkey,
|
||||
authorized_signer: &Pubkey, // currently authorized
|
||||
other_params: &[AccountMeta],
|
||||
) -> Vec<AccountMeta> {
|
||||
let is_own_signer = authorized_pubkey == stake_pubkey;
|
||||
let is_own_signer = authorized_signer == account_pubkey;
|
||||
|
||||
// stake account
|
||||
let mut account_metas = vec![AccountMeta::new(*stake_pubkey, is_own_signer)];
|
||||
// vote account
|
||||
let mut account_metas = vec![AccountMeta::new(*account_pubkey, is_own_signer)];
|
||||
|
||||
for meta in other_params {
|
||||
account_metas.push(meta.clone());
|
||||
@@ -160,7 +174,7 @@ fn metas_for_authorized_staker(
|
||||
|
||||
// append signer at the end
|
||||
if !is_own_signer {
|
||||
account_metas.push(AccountMeta::new_credit_only(*authorized_pubkey, true)) // signer
|
||||
account_metas.push(AccountMeta::new_credit_only(*authorized_signer, true)) // signer
|
||||
}
|
||||
|
||||
account_metas
|
||||
@@ -170,12 +184,13 @@ pub fn authorize(
|
||||
stake_pubkey: &Pubkey,
|
||||
authorized_pubkey: &Pubkey,
|
||||
new_authorized_pubkey: &Pubkey,
|
||||
stake_authorize: StakeAuthorize,
|
||||
) -> Instruction {
|
||||
let account_metas = metas_for_authorized_staker(stake_pubkey, authorized_pubkey, &[]);
|
||||
let account_metas = metas_for_authorized_signer(stake_pubkey, authorized_pubkey, &[]);
|
||||
|
||||
Instruction::new(
|
||||
id(),
|
||||
&StakeInstruction::Authorize(*new_authorized_pubkey),
|
||||
&StakeInstruction::Authorize(*new_authorized_pubkey, stake_authorize),
|
||||
account_metas,
|
||||
)
|
||||
}
|
||||
@@ -239,8 +254,10 @@ pub fn process_instruction(
|
||||
|
||||
// TODO: data-driven unpack and dispatch of KeyedAccounts
|
||||
match deserialize(data).map_err(|_| InstructionError::InvalidInstructionData)? {
|
||||
StakeInstruction::Lockup((lockup, custodian)) => me.lockup(lockup, &custodian),
|
||||
StakeInstruction::Authorize(authorized_pubkey) => me.authorize(&authorized_pubkey, &rest),
|
||||
StakeInstruction::Initialize(authorized, lockup) => me.initialize(&authorized, &lockup),
|
||||
StakeInstruction::Authorize(authorized_pubkey, stake_authorize) => {
|
||||
me.authorize(&authorized_pubkey, stake_authorize, &rest)
|
||||
}
|
||||
StakeInstruction::DelegateStake => {
|
||||
if rest.len() < 3 {
|
||||
Err(InstructionError::InvalidInstructionData)?;
|
||||
@@ -366,7 +383,11 @@ mod tests {
|
||||
super::process_instruction(
|
||||
&Pubkey::default(),
|
||||
&mut [],
|
||||
&serialize(&StakeInstruction::Lockup((0, Pubkey::default()))).unwrap(),
|
||||
&serialize(&StakeInstruction::Initialize(
|
||||
Authorized::default(),
|
||||
Lockup::default()
|
||||
))
|
||||
.unwrap(),
|
||||
),
|
||||
Err(InstructionError::InvalidInstructionData),
|
||||
);
|
||||
|
@@ -18,12 +18,12 @@ use solana_sdk::{
|
||||
};
|
||||
use solana_vote_api::vote_state::VoteState;
|
||||
|
||||
#[derive(Debug, Serialize, Deserialize, PartialEq, Clone)]
|
||||
#[derive(Debug, Serialize, Deserialize, PartialEq, Clone, Copy)]
|
||||
#[allow(clippy::large_enum_variant)]
|
||||
pub enum StakeState {
|
||||
Uninitialized,
|
||||
Lockup(Lockup),
|
||||
Stake(Stake),
|
||||
Initialized(Authorized, Lockup),
|
||||
Stake(Authorized, Lockup, Stake),
|
||||
RewardsPool,
|
||||
}
|
||||
|
||||
@@ -43,26 +43,48 @@ impl StakeState {
|
||||
Self::from(account).and_then(|state: Self| state.stake())
|
||||
}
|
||||
|
||||
pub fn authorized_from(account: &Account) -> Option<Authorized> {
|
||||
Self::from(account).and_then(|state: Self| state.authorized())
|
||||
}
|
||||
|
||||
pub fn stake(&self) -> Option<Stake> {
|
||||
match self {
|
||||
StakeState::Stake(stake) => Some(stake.clone()),
|
||||
StakeState::Stake(_authorized, _lockup, stake) => Some(*stake),
|
||||
_ => None,
|
||||
}
|
||||
}
|
||||
pub fn authorized(&self) -> Option<Authorized> {
|
||||
match self {
|
||||
StakeState::Stake(authorized, _lockup, _stake) => Some(*authorized),
|
||||
_ => None,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Default, Debug, Serialize, Deserialize, PartialEq, Clone, Copy)]
|
||||
pub struct Lockup {
|
||||
/// slot height at which this stake will allow withdrawal, unless to the custodian
|
||||
pub slot: Slot,
|
||||
/// custodian account, the only account to which this stake will honor a
|
||||
/// withdrawal *before* lockup expires
|
||||
pub custodian: Pubkey,
|
||||
/// alternate signer that is enabled to act on the Stake account
|
||||
pub authority: Pubkey,
|
||||
#[derive(Debug, Serialize, Deserialize, PartialEq, Clone, Copy)]
|
||||
pub enum StakeAuthorize {
|
||||
Staker,
|
||||
Withdrawer,
|
||||
}
|
||||
|
||||
#[derive(Debug, Serialize, Deserialize, PartialEq, Clone)]
|
||||
#[derive(Default, Debug, Serialize, Deserialize, PartialEq, Clone, Copy)]
|
||||
pub struct Lockup {
|
||||
/// slot height at which this stake will allow withdrawal, unless
|
||||
/// to the custodian
|
||||
pub slot: Slot,
|
||||
/// custodian account, the only account to which this stake will honor a
|
||||
/// withdrawal before lockup expires. After lockup expires, custodian
|
||||
/// is irrelevant
|
||||
pub custodian: Pubkey,
|
||||
}
|
||||
|
||||
#[derive(Default, Debug, Serialize, Deserialize, PartialEq, Clone, Copy)]
|
||||
pub struct Authorized {
|
||||
pub staker: Pubkey,
|
||||
pub withdrawer: Pubkey,
|
||||
}
|
||||
|
||||
#[derive(Debug, Serialize, Deserialize, PartialEq, Clone, Copy)]
|
||||
pub struct Stake {
|
||||
/// most recently delegated vote account pubkey
|
||||
pub voter_pubkey: Pubkey,
|
||||
@@ -78,8 +100,6 @@ pub struct Stake {
|
||||
pub deactivation_epoch: Epoch,
|
||||
/// stake config (warmup, etc.)
|
||||
pub config: Config,
|
||||
/// the Lockup information, see above
|
||||
pub lockup: Lockup,
|
||||
/// history of prior delegates and the epoch ranges for which
|
||||
/// they were set, circular buffer
|
||||
pub prior_delegates: [(Pubkey, Epoch, Epoch); MAX_PRIOR_DELEGATES],
|
||||
@@ -92,7 +112,6 @@ const MAX_PRIOR_DELEGATES: usize = 32; // this is how many epochs a stake is exp
|
||||
impl Default for Stake {
|
||||
fn default() -> Self {
|
||||
Self {
|
||||
lockup: Lockup::default(),
|
||||
voter_pubkey: Pubkey::default(),
|
||||
voter_pubkey_epoch: 0,
|
||||
credits_observed: 0,
|
||||
@@ -106,20 +125,54 @@ impl Default for Stake {
|
||||
}
|
||||
}
|
||||
|
||||
impl Authorized {
|
||||
pub fn auto(authorized: &Pubkey) -> Self {
|
||||
Self {
|
||||
staker: *authorized,
|
||||
withdrawer: *authorized,
|
||||
}
|
||||
}
|
||||
pub fn check(
|
||||
&self,
|
||||
stake_signer: Option<&Pubkey>,
|
||||
other_signers: &[KeyedAccount],
|
||||
stake_authorize: StakeAuthorize,
|
||||
) -> Result<(), InstructionError> {
|
||||
let authorized = match stake_authorize {
|
||||
StakeAuthorize::Staker => Some(&self.staker),
|
||||
StakeAuthorize::Withdrawer => Some(&self.withdrawer),
|
||||
};
|
||||
if stake_signer != authorized
|
||||
&& other_signers
|
||||
.iter()
|
||||
.all(|account| account.signer_key() != authorized)
|
||||
{
|
||||
Err(InstructionError::MissingRequiredSignature)
|
||||
} else {
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
pub fn authorize(
|
||||
&mut self,
|
||||
stake_signer: Option<&Pubkey>,
|
||||
other_signers: &[KeyedAccount],
|
||||
new_authorized: &Pubkey,
|
||||
stake_authorize: StakeAuthorize,
|
||||
) -> Result<(), InstructionError> {
|
||||
self.check(stake_signer, other_signers, stake_authorize)?;
|
||||
match stake_authorize {
|
||||
StakeAuthorize::Staker => self.staker = *new_authorized,
|
||||
StakeAuthorize::Withdrawer => self.withdrawer = *new_authorized,
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
impl Stake {
|
||||
fn is_bootstrap(&self) -> bool {
|
||||
self.activation_epoch == std::u64::MAX
|
||||
}
|
||||
|
||||
fn check_authorized(
|
||||
&self,
|
||||
stake_pubkey_signer: Option<&Pubkey>,
|
||||
other_signers: &[KeyedAccount],
|
||||
) -> Result<(), InstructionError> {
|
||||
self.lockup
|
||||
.check_authorized(stake_pubkey_signer, other_signers)
|
||||
}
|
||||
|
||||
pub fn stake(&self, epoch: Epoch, history: Option<&StakeHistory>) -> u64 {
|
||||
self.stake_activating_and_deactivating(epoch, history).0
|
||||
}
|
||||
@@ -310,7 +363,6 @@ impl Stake {
|
||||
vote_state,
|
||||
std::u64::MAX,
|
||||
&Config::default(),
|
||||
&Lockup::default(),
|
||||
)
|
||||
}
|
||||
|
||||
@@ -340,7 +392,6 @@ impl Stake {
|
||||
vote_state: &VoteState,
|
||||
activation_epoch: Epoch,
|
||||
config: &Config,
|
||||
lockup: &Lockup,
|
||||
) -> Self {
|
||||
Self {
|
||||
stake,
|
||||
@@ -349,7 +400,6 @@ impl Stake {
|
||||
voter_pubkey_epoch: activation_epoch,
|
||||
credits_observed: vote_state.credits(),
|
||||
config: *config,
|
||||
lockup: *lockup,
|
||||
..Stake::default()
|
||||
}
|
||||
}
|
||||
@@ -359,29 +409,16 @@ impl Stake {
|
||||
}
|
||||
}
|
||||
|
||||
impl Lockup {
|
||||
fn check_authorized(
|
||||
&self,
|
||||
stake_pubkey_signer: Option<&Pubkey>,
|
||||
other_signers: &[KeyedAccount],
|
||||
) -> Result<(), InstructionError> {
|
||||
let authorized = Some(&self.authority);
|
||||
if stake_pubkey_signer != authorized
|
||||
&& other_signers
|
||||
.iter()
|
||||
.all(|account| account.signer_key() != authorized)
|
||||
{
|
||||
return Err(InstructionError::MissingRequiredSignature);
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
}
|
||||
|
||||
pub trait StakeAccount {
|
||||
fn lockup(&mut self, slot: Slot, custodian: &Pubkey) -> Result<(), InstructionError>;
|
||||
fn initialize(
|
||||
&mut self,
|
||||
authorized: &Authorized,
|
||||
lockup: &Lockup,
|
||||
) -> Result<(), InstructionError>;
|
||||
fn authorize(
|
||||
&mut self,
|
||||
authorized_pubkey: &Pubkey,
|
||||
authority: &Pubkey,
|
||||
stake_authorize: StakeAuthorize,
|
||||
other_signers: &[KeyedAccount],
|
||||
) -> Result<(), InstructionError>;
|
||||
fn delegate_stake(
|
||||
@@ -415,13 +452,13 @@ pub trait StakeAccount {
|
||||
}
|
||||
|
||||
impl<'a> StakeAccount for KeyedAccount<'a> {
|
||||
fn lockup(&mut self, slot: Slot, custodian: &Pubkey) -> Result<(), InstructionError> {
|
||||
fn initialize(
|
||||
&mut self,
|
||||
authorized: &Authorized,
|
||||
lockup: &Lockup,
|
||||
) -> Result<(), InstructionError> {
|
||||
if let StakeState::Uninitialized = self.state()? {
|
||||
self.set_state(&StakeState::Lockup(Lockup {
|
||||
slot,
|
||||
custodian: *custodian,
|
||||
authority: *self.unsigned_key(),
|
||||
}))
|
||||
self.set_state(&StakeState::Initialized(*authorized, *lockup))
|
||||
} else {
|
||||
Err(InstructionError::InvalidAccountData)
|
||||
}
|
||||
@@ -432,17 +469,17 @@ impl<'a> StakeAccount for KeyedAccount<'a> {
|
||||
fn authorize(
|
||||
&mut self,
|
||||
authority: &Pubkey,
|
||||
stake_authorize: StakeAuthorize,
|
||||
other_signers: &[KeyedAccount],
|
||||
) -> Result<(), InstructionError> {
|
||||
let stake_state = self.state()?;
|
||||
if let StakeState::Stake(mut stake) = stake_state {
|
||||
stake.check_authorized(self.signer_key(), other_signers)?;
|
||||
stake.lockup.authority = *authority;
|
||||
self.set_state(&StakeState::Stake(stake))
|
||||
} else if let StakeState::Lockup(mut lockup) = stake_state {
|
||||
lockup.check_authorized(self.signer_key(), other_signers)?;
|
||||
lockup.authority = *authority;
|
||||
self.set_state(&StakeState::Lockup(lockup))
|
||||
|
||||
if let StakeState::Stake(mut authorized, lockup, stake) = stake_state {
|
||||
authorized.authorize(self.signer_key(), other_signers, authority, stake_authorize)?;
|
||||
self.set_state(&StakeState::Stake(authorized, lockup, stake))
|
||||
} else if let StakeState::Initialized(mut authorized, lockup) = stake_state {
|
||||
authorized.authorize(self.signer_key(), other_signers, authority, stake_authorize)?;
|
||||
self.set_state(&StakeState::Initialized(authorized, lockup))
|
||||
} else {
|
||||
Err(InstructionError::InvalidAccountData)
|
||||
}
|
||||
@@ -454,26 +491,25 @@ impl<'a> StakeAccount for KeyedAccount<'a> {
|
||||
config: &Config,
|
||||
other_signers: &[KeyedAccount],
|
||||
) -> Result<(), InstructionError> {
|
||||
if let StakeState::Lockup(lockup) = self.state()? {
|
||||
lockup.check_authorized(self.signer_key(), other_signers)?;
|
||||
if let StakeState::Initialized(authorized, lockup) = self.state()? {
|
||||
authorized.check(self.signer_key(), other_signers, StakeAuthorize::Staker)?;
|
||||
let stake = Stake::new(
|
||||
self.account.lamports,
|
||||
vote_account.unsigned_key(),
|
||||
&vote_account.state()?,
|
||||
clock.epoch,
|
||||
config,
|
||||
&lockup,
|
||||
);
|
||||
|
||||
self.set_state(&StakeState::Stake(stake))
|
||||
} else if let StakeState::Stake(mut stake) = self.state()? {
|
||||
stake.check_authorized(self.signer_key(), other_signers)?;
|
||||
self.set_state(&StakeState::Stake(authorized, lockup, stake))
|
||||
} else if let StakeState::Stake(authorized, lockup, mut stake) = self.state()? {
|
||||
authorized.check(self.signer_key(), other_signers, StakeAuthorize::Staker)?;
|
||||
stake.redelegate(
|
||||
vote_account.unsigned_key(),
|
||||
&vote_account.state()?,
|
||||
clock.epoch,
|
||||
)?;
|
||||
self.set_state(&StakeState::Stake(stake))
|
||||
self.set_state(&StakeState::Stake(authorized, lockup, stake))
|
||||
} else {
|
||||
Err(InstructionError::InvalidAccountData)
|
||||
}
|
||||
@@ -484,11 +520,11 @@ impl<'a> StakeAccount for KeyedAccount<'a> {
|
||||
clock: &sysvar::clock::Clock,
|
||||
other_signers: &[KeyedAccount],
|
||||
) -> Result<(), InstructionError> {
|
||||
if let StakeState::Stake(mut stake) = self.state()? {
|
||||
stake.check_authorized(self.signer_key(), other_signers)?;
|
||||
if let StakeState::Stake(authorized, lockup, mut stake) = self.state()? {
|
||||
authorized.check(self.signer_key(), other_signers, StakeAuthorize::Staker)?;
|
||||
stake.deactivate(clock.epoch);
|
||||
|
||||
self.set_state(&StakeState::Stake(stake))
|
||||
self.set_state(&StakeState::Stake(authorized, lockup, stake))
|
||||
} else {
|
||||
Err(InstructionError::InvalidAccountData)
|
||||
}
|
||||
@@ -500,7 +536,7 @@ impl<'a> StakeAccount for KeyedAccount<'a> {
|
||||
rewards: &sysvar::rewards::Rewards,
|
||||
stake_history: &sysvar::stake_history::StakeHistory,
|
||||
) -> Result<(), InstructionError> {
|
||||
if let (StakeState::Stake(mut stake), StakeState::RewardsPool) =
|
||||
if let (StakeState::Stake(authorized, lockup, mut stake), StakeState::RewardsPool) =
|
||||
(self.state()?, rewards_account.state()?)
|
||||
{
|
||||
let vote_state: VoteState = vote_account.state()?;
|
||||
@@ -528,7 +564,7 @@ impl<'a> StakeAccount for KeyedAccount<'a> {
|
||||
|
||||
stake.credits_observed = credits_observed;
|
||||
|
||||
self.set_state(&StakeState::Stake(stake))
|
||||
self.set_state(&StakeState::Stake(authorized, lockup, stake))
|
||||
} else {
|
||||
// not worth collecting
|
||||
Err(StakeError::NoCreditsToRedeem.into())
|
||||
@@ -546,8 +582,8 @@ impl<'a> StakeAccount for KeyedAccount<'a> {
|
||||
other_signers: &[KeyedAccount],
|
||||
) -> Result<(), InstructionError> {
|
||||
let lockup = match self.state()? {
|
||||
StakeState::Stake(stake) => {
|
||||
stake.check_authorized(self.signer_key(), other_signers)?;
|
||||
StakeState::Stake(authorized, lockup, stake) => {
|
||||
authorized.check(self.signer_key(), other_signers, StakeAuthorize::Withdrawer)?;
|
||||
// if we have a deactivation epoch and we're in cooldown
|
||||
let staked = if clock.epoch >= stake.deactivation_epoch {
|
||||
stake.stake(clock.epoch, Some(stake_history))
|
||||
@@ -561,10 +597,10 @@ impl<'a> StakeAccount for KeyedAccount<'a> {
|
||||
if lamports > self.account.lamports.saturating_sub(staked) {
|
||||
return Err(InstructionError::InsufficientFunds);
|
||||
}
|
||||
stake.lockup
|
||||
lockup
|
||||
}
|
||||
StakeState::Lockup(lockup) => {
|
||||
lockup.check_authorized(self.signer_key(), other_signers)?;
|
||||
StakeState::Initialized(authorized, lockup) => {
|
||||
authorized.check(self.signer_key(), other_signers, StakeAuthorize::Withdrawer)?;
|
||||
lockup
|
||||
}
|
||||
StakeState::Uninitialized => {
|
||||
@@ -615,17 +651,25 @@ where
|
||||
}
|
||||
|
||||
// utility function, used by Bank, tests, genesis
|
||||
pub fn create_account(voter_pubkey: &Pubkey, vote_account: &Account, lamports: u64) -> Account {
|
||||
pub fn create_account(
|
||||
authorized: &Pubkey,
|
||||
voter_pubkey: &Pubkey,
|
||||
vote_account: &Account,
|
||||
lamports: u64,
|
||||
) -> Account {
|
||||
let mut stake_account = Account::new(lamports, std::mem::size_of::<StakeState>(), &id());
|
||||
|
||||
let vote_state = VoteState::from(vote_account).expect("vote_state");
|
||||
|
||||
stake_account
|
||||
.set_state(&StakeState::Stake(Stake::new_bootstrap(
|
||||
lamports,
|
||||
voter_pubkey,
|
||||
&vote_state,
|
||||
)))
|
||||
.set_state(&StakeState::Stake(
|
||||
Authorized {
|
||||
staker: *authorized,
|
||||
withdrawer: *authorized,
|
||||
},
|
||||
Lockup::default(),
|
||||
Stake::new_bootstrap(lamports, voter_pubkey, &vote_state),
|
||||
))
|
||||
.expect("set_state");
|
||||
|
||||
stake_account
|
||||
@@ -691,10 +735,13 @@ mod tests {
|
||||
let stake_lamports = 42;
|
||||
let mut stake_account = Account::new_data_with_space(
|
||||
stake_lamports,
|
||||
&StakeState::Lockup(Lockup {
|
||||
authority: stake_pubkey,
|
||||
..Lockup::default()
|
||||
}),
|
||||
&StakeState::Initialized(
|
||||
Authorized {
|
||||
staker: stake_pubkey,
|
||||
withdrawer: stake_pubkey,
|
||||
},
|
||||
Lockup::default(),
|
||||
),
|
||||
std::mem::size_of::<StakeState>(),
|
||||
&id(),
|
||||
)
|
||||
@@ -707,10 +754,13 @@ mod tests {
|
||||
let stake_state: StakeState = stake_keyed_account.state().unwrap();
|
||||
assert_eq!(
|
||||
stake_state,
|
||||
StakeState::Lockup(Lockup {
|
||||
authority: stake_pubkey,
|
||||
..Lockup::default()
|
||||
})
|
||||
StakeState::Initialized(
|
||||
Authorized {
|
||||
staker: stake_pubkey,
|
||||
withdrawer: stake_pubkey,
|
||||
},
|
||||
Lockup::default(),
|
||||
)
|
||||
);
|
||||
}
|
||||
|
||||
@@ -741,10 +791,6 @@ mod tests {
|
||||
stake: stake_lamports,
|
||||
activation_epoch: clock.epoch,
|
||||
deactivation_epoch: std::u64::MAX,
|
||||
lockup: Lockup {
|
||||
authority: stake_pubkey,
|
||||
..Lockup::default()
|
||||
},
|
||||
..Stake::default()
|
||||
}
|
||||
);
|
||||
@@ -1062,21 +1108,32 @@ mod tests {
|
||||
// unsigned keyed account
|
||||
let mut stake_keyed_account = KeyedAccount::new(&stake_pubkey, false, &mut stake_account);
|
||||
let custodian = Pubkey::new_rand();
|
||||
assert_eq!(stake_keyed_account.lockup(1, &custodian), Ok(()));
|
||||
assert_eq!(
|
||||
stake_keyed_account.initialize(
|
||||
&Authorized {
|
||||
staker: stake_pubkey,
|
||||
withdrawer: stake_pubkey
|
||||
},
|
||||
&Lockup { slot: 1, custodian }
|
||||
),
|
||||
Ok(())
|
||||
);
|
||||
|
||||
// first time works, as is uninit
|
||||
assert_eq!(
|
||||
StakeState::from(&stake_keyed_account.account).unwrap(),
|
||||
StakeState::Lockup(Lockup {
|
||||
slot: 1,
|
||||
authority: stake_pubkey,
|
||||
custodian
|
||||
})
|
||||
StakeState::Initialized(
|
||||
Authorized {
|
||||
staker: stake_pubkey,
|
||||
withdrawer: stake_pubkey
|
||||
},
|
||||
Lockup { slot: 1, custodian }
|
||||
)
|
||||
);
|
||||
|
||||
// 2nd time fails, can't move it from anything other than uninit->lockup
|
||||
assert_eq!(
|
||||
stake_keyed_account.lockup(1, &Pubkey::default()),
|
||||
stake_keyed_account.initialize(&Authorized::default(), &Lockup::default()),
|
||||
Err(InstructionError::InvalidAccountData)
|
||||
);
|
||||
}
|
||||
@@ -1087,10 +1144,7 @@ mod tests {
|
||||
let stake_lamports = 42;
|
||||
let mut stake_account = Account::new_data_with_space(
|
||||
stake_lamports,
|
||||
&StakeState::Lockup(Lockup {
|
||||
authority: stake_pubkey,
|
||||
..Lockup::default()
|
||||
}),
|
||||
&StakeState::Initialized(Authorized::auto(&stake_pubkey), Lockup::default()),
|
||||
std::mem::size_of::<StakeState>(),
|
||||
&id(),
|
||||
)
|
||||
@@ -1195,7 +1249,12 @@ mod tests {
|
||||
// lockup
|
||||
let mut stake_keyed_account = KeyedAccount::new(&stake_pubkey, true, &mut stake_account);
|
||||
let custodian = Pubkey::new_rand();
|
||||
stake_keyed_account.lockup(0, &custodian).unwrap();
|
||||
stake_keyed_account
|
||||
.initialize(
|
||||
&Authorized::auto(&stake_pubkey),
|
||||
&Lockup { slot: 0, custodian },
|
||||
)
|
||||
.unwrap();
|
||||
|
||||
// signed keyed account and locked up, more than available should fail
|
||||
let mut stake_keyed_account = KeyedAccount::new(&stake_pubkey, true, &mut stake_account);
|
||||
@@ -1297,10 +1356,7 @@ mod tests {
|
||||
let stake_lamports = 42;
|
||||
let mut stake_account = Account::new_data_with_space(
|
||||
total_lamports,
|
||||
&StakeState::Lockup(Lockup {
|
||||
authority: stake_pubkey,
|
||||
..Lockup::default()
|
||||
}),
|
||||
&StakeState::Initialized(Authorized::auto(&stake_pubkey), Lockup::default()),
|
||||
std::mem::size_of::<StakeState>(),
|
||||
&id(),
|
||||
)
|
||||
@@ -1381,17 +1437,16 @@ mod tests {
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_withdraw_lockout() {
|
||||
fn test_withdraw_lockup() {
|
||||
let stake_pubkey = Pubkey::new_rand();
|
||||
let custodian = Pubkey::new_rand();
|
||||
let total_lamports = 100;
|
||||
let mut stake_account = Account::new_data_with_space(
|
||||
total_lamports,
|
||||
&StakeState::Lockup(Lockup {
|
||||
slot: 1,
|
||||
authority: stake_pubkey,
|
||||
custodian,
|
||||
}),
|
||||
&StakeState::Initialized(
|
||||
Authorized::auto(&stake_pubkey),
|
||||
Lockup { slot: 1, custodian },
|
||||
),
|
||||
std::mem::size_of::<StakeState>(),
|
||||
&id(),
|
||||
)
|
||||
@@ -1542,10 +1597,7 @@ mod tests {
|
||||
let stake_lamports = 100;
|
||||
let mut stake_account = Account::new_data_with_space(
|
||||
stake_lamports,
|
||||
&StakeState::Lockup(Lockup {
|
||||
authority: stake_pubkey,
|
||||
..Lockup::default()
|
||||
}),
|
||||
&StakeState::Initialized(Authorized::auto(&stake_pubkey), Lockup::default()),
|
||||
std::mem::size_of::<StakeState>(),
|
||||
&id(),
|
||||
)
|
||||
@@ -1673,10 +1725,7 @@ mod tests {
|
||||
let stake_lamports = 42;
|
||||
let mut stake_account = Account::new_data_with_space(
|
||||
stake_lamports,
|
||||
&StakeState::Lockup(Lockup {
|
||||
authority: stake_pubkey,
|
||||
..Lockup::default()
|
||||
}),
|
||||
&StakeState::Initialized(Authorized::auto(&stake_pubkey), Lockup::default()),
|
||||
std::mem::size_of::<StakeState>(),
|
||||
&id(),
|
||||
)
|
||||
@@ -1690,16 +1739,27 @@ mod tests {
|
||||
let mut stake_keyed_account = KeyedAccount::new(&stake_pubkey, true, &mut stake_account);
|
||||
|
||||
let stake_pubkey0 = Pubkey::new_rand();
|
||||
assert_eq!(stake_keyed_account.authorize(&stake_pubkey0, &[]), Ok(()));
|
||||
if let StakeState::Lockup(lockup) = StakeState::from(&stake_keyed_account.account).unwrap()
|
||||
assert_eq!(
|
||||
stake_keyed_account.authorize(&stake_pubkey0, StakeAuthorize::Staker, &[]),
|
||||
Ok(())
|
||||
);
|
||||
assert_eq!(
|
||||
stake_keyed_account.authorize(&stake_pubkey0, StakeAuthorize::Withdrawer, &[]),
|
||||
Ok(())
|
||||
);
|
||||
if let StakeState::Initialized(authorized, _lockup) =
|
||||
StakeState::from(&stake_keyed_account.account).unwrap()
|
||||
{
|
||||
assert_eq!(lockup.authority, stake_pubkey0);
|
||||
assert_eq!(authorized.staker, stake_pubkey0);
|
||||
assert_eq!(authorized.withdrawer, stake_pubkey0);
|
||||
} else {
|
||||
assert!(false);
|
||||
}
|
||||
|
||||
// A second authorization signed by the stake_keyed_account should fail
|
||||
let stake_pubkey1 = Pubkey::new_rand();
|
||||
assert_eq!(
|
||||
stake_keyed_account.authorize(&stake_pubkey1, &[]),
|
||||
stake_keyed_account.authorize(&stake_pubkey1, StakeAuthorize::Staker, &[]),
|
||||
Err(InstructionError::MissingRequiredSignature)
|
||||
);
|
||||
|
||||
@@ -1709,18 +1769,38 @@ mod tests {
|
||||
// Test a second authorization by the newly authorized pubkey
|
||||
let stake_pubkey2 = Pubkey::new_rand();
|
||||
assert_eq!(
|
||||
stake_keyed_account.authorize(&stake_pubkey2, &[staker_keyed_account0]),
|
||||
stake_keyed_account.authorize(
|
||||
&stake_pubkey2,
|
||||
StakeAuthorize::Staker,
|
||||
&[staker_keyed_account0]
|
||||
),
|
||||
Ok(())
|
||||
);
|
||||
if let StakeState::Lockup(lockup) = StakeState::from(&stake_keyed_account.account).unwrap()
|
||||
if let StakeState::Initialized(authorized, _lockup) =
|
||||
StakeState::from(&stake_keyed_account.account).unwrap()
|
||||
{
|
||||
assert_eq!(lockup.authority, stake_pubkey2);
|
||||
assert_eq!(authorized.staker, stake_pubkey2);
|
||||
}
|
||||
|
||||
let staker_keyed_account0 = KeyedAccount::new(&stake_pubkey0, true, &mut staker_account0);
|
||||
assert_eq!(
|
||||
stake_keyed_account.authorize(
|
||||
&stake_pubkey2,
|
||||
StakeAuthorize::Withdrawer,
|
||||
&[staker_keyed_account0]
|
||||
),
|
||||
Ok(())
|
||||
);
|
||||
if let StakeState::Initialized(authorized, _lockup) =
|
||||
StakeState::from(&stake_keyed_account.account).unwrap()
|
||||
{
|
||||
assert_eq!(authorized.staker, stake_pubkey2);
|
||||
}
|
||||
|
||||
let mut staker_account2 = Account::new(1, 0, &system_program::id());
|
||||
let staker_keyed_account2 = KeyedAccount::new(&stake_pubkey2, true, &mut staker_account2);
|
||||
|
||||
// Test an action by the currently authorized pubkey
|
||||
// Test an action by the currently authorized withdrawer
|
||||
assert_eq!(
|
||||
stake_keyed_account.withdraw(
|
||||
stake_lamports,
|
||||
@@ -1739,10 +1819,7 @@ mod tests {
|
||||
let stake_lamports = 42;
|
||||
let mut stake_account = Account::new_data_with_space(
|
||||
stake_lamports,
|
||||
&StakeState::Lockup(Lockup {
|
||||
authority: stake_pubkey,
|
||||
..Lockup::default()
|
||||
}),
|
||||
&StakeState::Initialized(Authorized::auto(&stake_pubkey), Lockup::default()),
|
||||
std::mem::size_of::<StakeState>(),
|
||||
&id(),
|
||||
)
|
||||
@@ -1762,11 +1839,11 @@ mod tests {
|
||||
|
||||
let new_staker_pubkey = Pubkey::new_rand();
|
||||
assert_eq!(
|
||||
stake_keyed_account.authorize(&new_staker_pubkey, &[]),
|
||||
stake_keyed_account.authorize(&new_staker_pubkey, StakeAuthorize::Staker, &[]),
|
||||
Ok(())
|
||||
);
|
||||
let stake = StakeState::stake_from(&stake_keyed_account.account).unwrap();
|
||||
assert_eq!(stake.lockup.authority, new_staker_pubkey);
|
||||
let authorized = StakeState::authorized_from(&stake_keyed_account.account).unwrap();
|
||||
assert_eq!(authorized.staker, new_staker_pubkey);
|
||||
|
||||
let other_pubkey = Pubkey::new_rand();
|
||||
let mut other_account = Account::new(1, 0, &system_program::id());
|
||||
|
@@ -1,20 +1,27 @@
|
||||
use assert_matches::assert_matches;
|
||||
use solana_runtime::bank::Bank;
|
||||
use solana_runtime::bank_client::BankClient;
|
||||
use solana_runtime::genesis_utils::{create_genesis_block_with_leader, GenesisBlockInfo};
|
||||
use solana_sdk::account_utils::State;
|
||||
use solana_sdk::client::SyncClient;
|
||||
use solana_sdk::message::Message;
|
||||
use solana_sdk::pubkey::Pubkey;
|
||||
use solana_sdk::signature::{Keypair, KeypairUtil};
|
||||
use solana_sdk::sysvar;
|
||||
use solana_sdk::sysvar::rewards::Rewards;
|
||||
use solana_stake_api::id;
|
||||
use solana_stake_api::stake_instruction;
|
||||
use solana_stake_api::stake_instruction::process_instruction;
|
||||
use solana_stake_api::stake_state::StakeState;
|
||||
use solana_vote_api::vote_instruction;
|
||||
use solana_vote_api::vote_state::{Vote, VoteState};
|
||||
use solana_runtime::{
|
||||
bank::Bank,
|
||||
bank_client::BankClient,
|
||||
genesis_utils::{create_genesis_block_with_leader, GenesisBlockInfo},
|
||||
};
|
||||
use solana_sdk::{
|
||||
account_utils::State,
|
||||
client::SyncClient,
|
||||
message::Message,
|
||||
pubkey::Pubkey,
|
||||
signature::{Keypair, KeypairUtil},
|
||||
sysvar,
|
||||
sysvar::rewards::Rewards,
|
||||
};
|
||||
use solana_stake_api::{
|
||||
id,
|
||||
stake_instruction::{self, process_instruction},
|
||||
stake_state::{self, StakeState},
|
||||
};
|
||||
use solana_vote_api::{
|
||||
vote_instruction,
|
||||
vote_state::{Vote, VoteInit, VoteState},
|
||||
};
|
||||
use std::sync::Arc;
|
||||
|
||||
fn fill_epoch_with_votes(
|
||||
@@ -76,20 +83,26 @@ fn test_stake_account_delegate() {
|
||||
let message = Message::new(vote_instruction::create_account(
|
||||
&mint_pubkey,
|
||||
&vote_pubkey,
|
||||
&node_pubkey,
|
||||
std::u8::MAX / 2,
|
||||
&VoteInit {
|
||||
node_pubkey,
|
||||
authorized_voter: vote_pubkey,
|
||||
authorized_withdrawer: vote_pubkey,
|
||||
commission: std::u8::MAX / 2,
|
||||
},
|
||||
10,
|
||||
));
|
||||
bank_client
|
||||
.send_message(&[&mint_keypair], message)
|
||||
.expect("failed to create vote account");
|
||||
|
||||
let authorized = stake_state::Authorized::auto(&staker_pubkey);
|
||||
// Create stake account and delegate to vote account
|
||||
let message = Message::new(stake_instruction::create_stake_account_and_delegate_stake(
|
||||
&mint_pubkey,
|
||||
&staker_pubkey,
|
||||
&vote_pubkey,
|
||||
20000,
|
||||
&authorized,
|
||||
));
|
||||
bank_client
|
||||
.send_message(&[&mint_keypair, &staker_keypair], message)
|
||||
@@ -98,7 +111,7 @@ fn test_stake_account_delegate() {
|
||||
// Test that correct lamports are staked
|
||||
let account = bank.get_account(&staker_pubkey).expect("account not found");
|
||||
let stake_state = account.state().expect("couldn't unpack account data");
|
||||
if let StakeState::Stake(stake) = stake_state {
|
||||
if let StakeState::Stake(_authorized, _lockup, stake) = stake_state {
|
||||
assert_eq!(stake.stake, 20000);
|
||||
} else {
|
||||
assert!(false, "wrong account type found")
|
||||
@@ -120,7 +133,7 @@ fn test_stake_account_delegate() {
|
||||
// Test that lamports are still staked
|
||||
let account = bank.get_account(&staker_pubkey).expect("account not found");
|
||||
let stake_state = account.state().expect("couldn't unpack account data");
|
||||
if let StakeState::Stake(stake) = stake_state {
|
||||
if let StakeState::Stake(_authorized, _lockup, stake) = stake_state {
|
||||
assert_eq!(stake.stake, 20000);
|
||||
} else {
|
||||
assert!(false, "wrong account type found")
|
||||
@@ -164,7 +177,7 @@ fn test_stake_account_delegate() {
|
||||
let rewards;
|
||||
let account = bank.get_account(&staker_pubkey).expect("account not found");
|
||||
let stake_state = account.state().expect("couldn't unpack account data");
|
||||
if let StakeState::Stake(stake) = stake_state {
|
||||
if let StakeState::Stake(_authorized, _lockup, stake) = stake_state {
|
||||
assert!(account.lamports > 20000);
|
||||
assert_eq!(stake.stake, 20000);
|
||||
rewards = account.lamports - 20000;
|
||||
@@ -247,7 +260,7 @@ fn test_stake_account_delegate() {
|
||||
// Test that balance and stake is updated correctly (we have withdrawn all lamports except rewards)
|
||||
let account = bank.get_account(&staker_pubkey).expect("account not found");
|
||||
let stake_state = account.state().expect("couldn't unpack account data");
|
||||
if let StakeState::Stake(_stake) = stake_state {
|
||||
if let StakeState::Stake(_, _, _stake) = stake_state {
|
||||
assert_eq!(account.lamports, rewards);
|
||||
} else {
|
||||
assert!(false, "wrong account type found")
|
||||
|
@@ -3,7 +3,7 @@
|
||||
|
||||
use crate::{
|
||||
id,
|
||||
vote_state::{self, Vote, VoteState},
|
||||
vote_state::{self, Vote, VoteAuthorize, VoteInit, VoteState},
|
||||
};
|
||||
use bincode::deserialize;
|
||||
use log::*;
|
||||
@@ -51,11 +51,11 @@ impl std::error::Error for VoteError {}
|
||||
#[derive(Serialize, Deserialize, Debug, PartialEq, Eq, Clone)]
|
||||
pub enum VoteInstruction {
|
||||
/// Initialize the VoteState for this `vote account`
|
||||
/// takes a node_pubkey and commission
|
||||
InitializeAccount(Pubkey, u8),
|
||||
InitializeAccount(VoteInit),
|
||||
|
||||
/// Authorize a voter to send signed votes.
|
||||
AuthorizeVoter(Pubkey),
|
||||
/// Authorize a voter to send signed votes or a withdrawer
|
||||
/// to withdraw
|
||||
Authorize(Pubkey, VoteAuthorize),
|
||||
|
||||
/// A Vote instruction with recent votes
|
||||
Vote(Vote),
|
||||
@@ -64,44 +64,38 @@ pub enum VoteInstruction {
|
||||
Withdraw(u64),
|
||||
}
|
||||
|
||||
fn initialize_account(vote_pubkey: &Pubkey, node_pubkey: &Pubkey, commission: u8) -> Instruction {
|
||||
fn initialize_account(vote_pubkey: &Pubkey, vote_init: &VoteInit) -> Instruction {
|
||||
let account_metas = vec![AccountMeta::new(*vote_pubkey, false)];
|
||||
Instruction::new(
|
||||
id(),
|
||||
&VoteInstruction::InitializeAccount(*node_pubkey, commission),
|
||||
&VoteInstruction::InitializeAccount(*vote_init),
|
||||
account_metas,
|
||||
)
|
||||
}
|
||||
|
||||
pub fn minimum_balance() -> u64 {
|
||||
let rent_calculator = solana_sdk::rent_calculator::RentCalculator::default();
|
||||
|
||||
rent_calculator.minimum_balance(VoteState::size_of())
|
||||
}
|
||||
|
||||
pub fn create_account(
|
||||
from_pubkey: &Pubkey,
|
||||
vote_pubkey: &Pubkey,
|
||||
node_pubkey: &Pubkey,
|
||||
commission: u8,
|
||||
vote_init: &VoteInit,
|
||||
lamports: u64,
|
||||
) -> Vec<Instruction> {
|
||||
let space = VoteState::size_of() as u64;
|
||||
let create_ix =
|
||||
system_instruction::create_account(from_pubkey, vote_pubkey, lamports, space, &id());
|
||||
let init_ix = initialize_account(vote_pubkey, node_pubkey, commission);
|
||||
let init_ix = initialize_account(vote_pubkey, vote_init);
|
||||
vec![create_ix, init_ix]
|
||||
}
|
||||
|
||||
// for instructions that whose authorized signer may differ from the account's pubkey
|
||||
fn metas_for_authorized_signer(
|
||||
vote_pubkey: &Pubkey,
|
||||
authorized_voter_pubkey: &Pubkey, // currently authorized
|
||||
account_pubkey: &Pubkey,
|
||||
authorized_signer: &Pubkey, // currently authorized
|
||||
other_params: &[AccountMeta],
|
||||
) -> Vec<AccountMeta> {
|
||||
let is_own_signer = authorized_voter_pubkey == vote_pubkey;
|
||||
let is_own_signer = authorized_signer == account_pubkey;
|
||||
|
||||
// vote account
|
||||
let mut account_metas = vec![AccountMeta::new(*vote_pubkey, is_own_signer)];
|
||||
let mut account_metas = vec![AccountMeta::new(*account_pubkey, is_own_signer)];
|
||||
|
||||
for meta in other_params {
|
||||
account_metas.push(meta.clone());
|
||||
@@ -109,22 +103,23 @@ fn metas_for_authorized_signer(
|
||||
|
||||
// append signer at the end
|
||||
if !is_own_signer {
|
||||
account_metas.push(AccountMeta::new_credit_only(*authorized_voter_pubkey, true)) // signer
|
||||
account_metas.push(AccountMeta::new_credit_only(*authorized_signer, true)) // signer
|
||||
}
|
||||
|
||||
account_metas
|
||||
}
|
||||
|
||||
pub fn authorize_voter(
|
||||
pub fn authorize(
|
||||
vote_pubkey: &Pubkey,
|
||||
authorized_voter_pubkey: &Pubkey, // currently authorized
|
||||
new_authorized_voter_pubkey: &Pubkey,
|
||||
authorized_pubkey: &Pubkey, // currently authorized
|
||||
new_authorized_pubkey: &Pubkey,
|
||||
vote_authorize: VoteAuthorize,
|
||||
) -> Instruction {
|
||||
let account_metas = metas_for_authorized_signer(vote_pubkey, authorized_voter_pubkey, &[]);
|
||||
let account_metas = metas_for_authorized_signer(vote_pubkey, authorized_pubkey, &[]);
|
||||
|
||||
Instruction::new(
|
||||
id(),
|
||||
&VoteInstruction::AuthorizeVoter(*new_authorized_voter_pubkey),
|
||||
&VoteInstruction::Authorize(*new_authorized_pubkey, vote_authorize),
|
||||
account_metas,
|
||||
)
|
||||
}
|
||||
@@ -144,11 +139,17 @@ pub fn vote(vote_pubkey: &Pubkey, authorized_voter_pubkey: &Pubkey, vote: Vote)
|
||||
Instruction::new(id(), &VoteInstruction::Vote(vote), account_metas)
|
||||
}
|
||||
|
||||
pub fn withdraw(vote_pubkey: &Pubkey, lamports: u64, to_pubkey: &Pubkey) -> Instruction {
|
||||
let account_metas = vec![
|
||||
AccountMeta::new(*vote_pubkey, true),
|
||||
AccountMeta::new_credit_only(*to_pubkey, false),
|
||||
];
|
||||
pub fn withdraw(
|
||||
vote_pubkey: &Pubkey,
|
||||
withdrawer_pubkey: &Pubkey,
|
||||
lamports: u64,
|
||||
to_pubkey: &Pubkey,
|
||||
) -> Instruction {
|
||||
let account_metas = metas_for_authorized_signer(
|
||||
vote_pubkey,
|
||||
withdrawer_pubkey,
|
||||
&[AccountMeta::new_credit_only(*to_pubkey, false)],
|
||||
);
|
||||
|
||||
Instruction::new(id(), &VoteInstruction::Withdraw(lamports), account_metas)
|
||||
}
|
||||
@@ -173,11 +174,11 @@ pub fn process_instruction(
|
||||
|
||||
// TODO: data-driven unpack and dispatch of KeyedAccounts
|
||||
match deserialize(data).map_err(|_| InstructionError::InvalidInstructionData)? {
|
||||
VoteInstruction::InitializeAccount(node_pubkey, commission) => {
|
||||
vote_state::initialize_account(me, &node_pubkey, commission)
|
||||
VoteInstruction::InitializeAccount(vote_init) => {
|
||||
vote_state::initialize_account(me, &vote_init)
|
||||
}
|
||||
VoteInstruction::AuthorizeVoter(voter_pubkey) => {
|
||||
vote_state::authorize_voter(me, rest, &voter_pubkey)
|
||||
VoteInstruction::Authorize(voter_pubkey, vote_authorize) => {
|
||||
vote_state::authorize(me, rest, &voter_pubkey, vote_authorize)
|
||||
}
|
||||
VoteInstruction::Vote(vote) => {
|
||||
datapoint_info!("vote-native", ("count", 1, i64));
|
||||
@@ -198,7 +199,10 @@ pub fn process_instruction(
|
||||
if rest.is_empty() {
|
||||
Err(InstructionError::InvalidInstructionData)?;
|
||||
}
|
||||
vote_state::withdraw(me, lamports, &mut rest[0])
|
||||
let (to, rest) = rest.split_at_mut(1);
|
||||
let to = &mut to[0];
|
||||
|
||||
vote_state::withdraw(me, rest, lamports, to)
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -251,8 +255,7 @@ mod tests {
|
||||
let instructions = create_account(
|
||||
&Pubkey::default(),
|
||||
&Pubkey::default(),
|
||||
&Pubkey::default(),
|
||||
0,
|
||||
&VoteInit::default(),
|
||||
100,
|
||||
);
|
||||
assert_eq!(
|
||||
@@ -268,10 +271,20 @@ mod tests {
|
||||
Err(InstructionError::InvalidAccountData),
|
||||
);
|
||||
assert_eq!(
|
||||
process_instruction(&authorize_voter(
|
||||
process_instruction(&authorize(
|
||||
&Pubkey::default(),
|
||||
&Pubkey::default(),
|
||||
&Pubkey::default(),
|
||||
VoteAuthorize::Voter,
|
||||
)),
|
||||
Err(InstructionError::InvalidAccountData),
|
||||
);
|
||||
assert_eq!(
|
||||
process_instruction(&withdraw(
|
||||
&Pubkey::default(),
|
||||
&Pubkey::default(),
|
||||
0,
|
||||
&Pubkey::default()
|
||||
)),
|
||||
Err(InstructionError::InvalidAccountData),
|
||||
);
|
||||
@@ -285,4 +298,44 @@ mod tests {
|
||||
assert!(minimum_balance as f64 / 2f64.powf(34.0) < 0.02)
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_metas_for_authorized_signer() {
|
||||
let account_pubkey = Pubkey::new_rand();
|
||||
let authorized_signer = Pubkey::new_rand();
|
||||
|
||||
assert_eq!(
|
||||
metas_for_authorized_signer(&account_pubkey, &authorized_signer, &[]).len(),
|
||||
2
|
||||
);
|
||||
assert_eq!(
|
||||
metas_for_authorized_signer(&account_pubkey, &account_pubkey, &[]).len(),
|
||||
1
|
||||
);
|
||||
}
|
||||
#[test]
|
||||
fn test_custom_error_decode() {
|
||||
use num_traits::FromPrimitive;
|
||||
fn pretty_err<T>(err: InstructionError) -> String
|
||||
where
|
||||
T: 'static + std::error::Error + DecodeError<T> + FromPrimitive,
|
||||
{
|
||||
if let InstructionError::CustomError(code) = err {
|
||||
let specific_error: T = T::decode_custom_error_to_enum(code).unwrap();
|
||||
format!(
|
||||
"{:?}: {}::{:?} - {}",
|
||||
err,
|
||||
T::type_of(),
|
||||
specific_error,
|
||||
specific_error,
|
||||
)
|
||||
} else {
|
||||
"".to_string()
|
||||
}
|
||||
}
|
||||
assert_eq!(
|
||||
"CustomError(0): VoteError::VoteTooOld - vote already recorded or not in slot hashes history",
|
||||
pretty_err::<VoteError>(VoteError::VoteTooOld.into())
|
||||
)
|
||||
}
|
||||
|
||||
}
|
||||
|
@@ -67,14 +67,33 @@ impl Lockout {
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Default, Serialize, Deserialize, Debug, PartialEq, Eq, Clone, Copy)]
|
||||
pub struct VoteInit {
|
||||
pub node_pubkey: Pubkey,
|
||||
pub authorized_voter: Pubkey,
|
||||
pub authorized_withdrawer: Pubkey,
|
||||
pub commission: u8,
|
||||
}
|
||||
|
||||
#[derive(Serialize, Deserialize, Debug, PartialEq, Eq, Clone, Copy)]
|
||||
pub enum VoteAuthorize {
|
||||
Voter,
|
||||
Withdrawer,
|
||||
}
|
||||
|
||||
#[derive(Debug, Default, Serialize, Deserialize, PartialEq, Eq, Clone)]
|
||||
pub struct VoteState {
|
||||
pub votes: VecDeque<Lockout>,
|
||||
/// the node that votes in this account
|
||||
pub node_pubkey: Pubkey,
|
||||
pub authorized_voter_pubkey: Pubkey,
|
||||
/// the signer for vote transactions
|
||||
pub authorized_voter: Pubkey,
|
||||
/// the signer for withdrawals
|
||||
pub authorized_withdrawer: Pubkey,
|
||||
/// fraction of std::u8::MAX that represents what part of a rewards
|
||||
/// payout should be given to this VoteAccount
|
||||
pub commission: u8,
|
||||
|
||||
pub votes: VecDeque<Lockout>,
|
||||
pub root_slot: Option<u64>,
|
||||
|
||||
/// clock epoch
|
||||
@@ -91,11 +110,12 @@ pub struct VoteState {
|
||||
}
|
||||
|
||||
impl VoteState {
|
||||
pub fn new(vote_pubkey: &Pubkey, node_pubkey: &Pubkey, commission: u8) -> Self {
|
||||
pub fn new(vote_init: &VoteInit) -> Self {
|
||||
Self {
|
||||
node_pubkey: *node_pubkey,
|
||||
authorized_voter_pubkey: *vote_pubkey,
|
||||
commission,
|
||||
node_pubkey: vote_init.node_pubkey,
|
||||
authorized_voter: vote_init.authorized_voter,
|
||||
authorized_withdrawer: vote_init.authorized_withdrawer,
|
||||
commission: vote_init.commission,
|
||||
..VoteState::default()
|
||||
}
|
||||
}
|
||||
@@ -313,39 +333,69 @@ impl VoteState {
|
||||
}
|
||||
}
|
||||
|
||||
/// Authorize the given pubkey to sign votes. This may be called multiple times,
|
||||
/// Authorize the given pubkey to withdraw or sign votes. This may be called multiple times,
|
||||
/// but will implicitly withdraw authorization from the previously authorized
|
||||
/// voter. The default voter is the owner of the vote account's pubkey.
|
||||
pub fn authorize_voter(
|
||||
/// key
|
||||
pub fn authorize(
|
||||
vote_account: &mut KeyedAccount,
|
||||
other_signers: &[KeyedAccount],
|
||||
authorized_voter_pubkey: &Pubkey,
|
||||
authorized: &Pubkey,
|
||||
vote_authorize: VoteAuthorize,
|
||||
) -> Result<(), InstructionError> {
|
||||
let mut vote_state: VoteState = vote_account.state()?;
|
||||
|
||||
// clock authorized signer must say "yay"
|
||||
let authorized = Some(&vote_state.authorized_voter_pubkey);
|
||||
if vote_account.signer_key() != authorized
|
||||
// current authorized signer must say "yay"
|
||||
match vote_authorize {
|
||||
VoteAuthorize::Voter => {
|
||||
verify_authorized_signer(&vote_state.authorized_voter, vote_account, other_signers)?;
|
||||
vote_state.authorized_voter = *authorized;
|
||||
}
|
||||
VoteAuthorize::Withdrawer => {
|
||||
verify_authorized_signer(
|
||||
&vote_state.authorized_withdrawer,
|
||||
vote_account,
|
||||
other_signers,
|
||||
)?;
|
||||
vote_state.authorized_withdrawer = *authorized;
|
||||
}
|
||||
}
|
||||
|
||||
vote_account.set_state(&vote_state)
|
||||
}
|
||||
|
||||
fn verify_authorized_signer(
|
||||
authorized: &Pubkey,
|
||||
account: &KeyedAccount,
|
||||
other_signers: &[KeyedAccount],
|
||||
) -> Result<(), InstructionError> {
|
||||
let authorized = Some(authorized);
|
||||
|
||||
// find a signer that matches authorized
|
||||
if account.signer_key() != authorized
|
||||
&& other_signers
|
||||
.iter()
|
||||
.all(|account| account.signer_key() != authorized)
|
||||
{
|
||||
return Err(InstructionError::MissingRequiredSignature);
|
||||
}
|
||||
|
||||
vote_state.authorized_voter_pubkey = *authorized_voter_pubkey;
|
||||
vote_account.set_state(&vote_state)
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Withdraw funds from the vote account
|
||||
pub fn withdraw(
|
||||
vote_account: &mut KeyedAccount,
|
||||
other_signers: &[KeyedAccount],
|
||||
lamports: u64,
|
||||
to_account: &mut KeyedAccount,
|
||||
) -> Result<(), InstructionError> {
|
||||
if vote_account.signer_key().is_none() {
|
||||
return Err(InstructionError::MissingRequiredSignature);
|
||||
}
|
||||
let vote_state: VoteState = vote_account.state()?;
|
||||
|
||||
verify_authorized_signer(
|
||||
&vote_state.authorized_withdrawer,
|
||||
vote_account,
|
||||
other_signers,
|
||||
)?;
|
||||
|
||||
if vote_account.account.lamports < lamports {
|
||||
return Err(InstructionError::InsufficientFunds);
|
||||
}
|
||||
@@ -359,19 +409,14 @@ pub fn withdraw(
|
||||
/// that the transaction must be signed by the staker's keys
|
||||
pub fn initialize_account(
|
||||
vote_account: &mut KeyedAccount,
|
||||
node_pubkey: &Pubkey,
|
||||
commission: u8,
|
||||
vote_init: &VoteInit,
|
||||
) -> Result<(), InstructionError> {
|
||||
let vote_state: VoteState = vote_account.state()?;
|
||||
|
||||
if vote_state.authorized_voter_pubkey != Pubkey::default() {
|
||||
if vote_state.authorized_voter != Pubkey::default() {
|
||||
return Err(InstructionError::AccountAlreadyInitialized);
|
||||
}
|
||||
vote_account.set_state(&VoteState::new(
|
||||
vote_account.unsigned_key(),
|
||||
node_pubkey,
|
||||
commission,
|
||||
))
|
||||
vote_account.set_state(&VoteState::new(vote_init))
|
||||
}
|
||||
|
||||
pub fn process_vote(
|
||||
@@ -383,19 +428,11 @@ pub fn process_vote(
|
||||
) -> Result<(), InstructionError> {
|
||||
let mut vote_state: VoteState = vote_account.state()?;
|
||||
|
||||
if vote_state.authorized_voter_pubkey == Pubkey::default() {
|
||||
if vote_state.authorized_voter == Pubkey::default() {
|
||||
return Err(InstructionError::UninitializedAccount);
|
||||
}
|
||||
|
||||
let authorized = Some(&vote_state.authorized_voter_pubkey);
|
||||
// find a signer that matches the authorized_voter_pubkey
|
||||
if vote_account.signer_key() != authorized
|
||||
&& other_signers
|
||||
.iter()
|
||||
.all(|account| account.signer_key() != authorized)
|
||||
{
|
||||
return Err(InstructionError::MissingRequiredSignature);
|
||||
}
|
||||
verify_authorized_signer(&vote_state.authorized_voter, vote_account, other_signers)?;
|
||||
|
||||
vote_state.process_vote(vote, slot_hashes, clock.epoch)?;
|
||||
vote_account.set_state(&vote_state)
|
||||
@@ -410,9 +447,14 @@ pub fn create_account(
|
||||
) -> Account {
|
||||
let mut vote_account = Account::new(lamports, VoteState::size_of(), &id());
|
||||
|
||||
VoteState::new(vote_pubkey, node_pubkey, commission)
|
||||
.to(&mut vote_account)
|
||||
.unwrap();
|
||||
VoteState::new(&VoteInit {
|
||||
node_pubkey: *node_pubkey,
|
||||
authorized_voter: *vote_pubkey,
|
||||
authorized_withdrawer: *vote_pubkey,
|
||||
commission,
|
||||
})
|
||||
.to(&mut vote_account)
|
||||
.unwrap();
|
||||
|
||||
vote_account
|
||||
}
|
||||
@@ -427,6 +469,17 @@ mod tests {
|
||||
|
||||
const MAX_RECENT_VOTES: usize = 16;
|
||||
|
||||
impl VoteState {
|
||||
pub fn new_for_test(auth_pubkey: &Pubkey) -> Self {
|
||||
Self::new(&VoteInit {
|
||||
node_pubkey: Pubkey::new_rand(),
|
||||
authorized_voter: *auth_pubkey,
|
||||
authorized_withdrawer: *auth_pubkey,
|
||||
commission: 0,
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_initialize_vote_account() {
|
||||
let vote_account_pubkey = Pubkey::new_rand();
|
||||
@@ -436,11 +489,27 @@ mod tests {
|
||||
|
||||
//init should pass
|
||||
let mut vote_account = KeyedAccount::new(&vote_account_pubkey, false, &mut vote_account);
|
||||
let res = initialize_account(&mut vote_account, &node_pubkey, 0);
|
||||
let res = initialize_account(
|
||||
&mut vote_account,
|
||||
&VoteInit {
|
||||
node_pubkey,
|
||||
authorized_voter: vote_account_pubkey,
|
||||
authorized_withdrawer: vote_account_pubkey,
|
||||
commission: 0,
|
||||
},
|
||||
);
|
||||
assert_eq!(res, Ok(()));
|
||||
|
||||
// reinit should fail
|
||||
let res = initialize_account(&mut vote_account, &node_pubkey, 0);
|
||||
let res = initialize_account(
|
||||
&mut vote_account,
|
||||
&VoteInit {
|
||||
node_pubkey,
|
||||
authorized_voter: vote_account_pubkey,
|
||||
authorized_withdrawer: vote_account_pubkey,
|
||||
commission: 0,
|
||||
},
|
||||
);
|
||||
assert_eq!(res, Err(InstructionError::AccountAlreadyInitialized));
|
||||
}
|
||||
|
||||
@@ -504,7 +573,7 @@ mod tests {
|
||||
let (vote_pubkey, vote_account) = create_test_account();
|
||||
|
||||
let vote_state: VoteState = vote_account.state().unwrap();
|
||||
assert_eq!(vote_state.authorized_voter_pubkey, vote_pubkey);
|
||||
assert_eq!(vote_state.authorized_voter, vote_pubkey);
|
||||
assert!(vote_state.votes.is_empty());
|
||||
}
|
||||
|
||||
@@ -582,21 +651,23 @@ mod tests {
|
||||
|
||||
// another voter
|
||||
let authorized_voter_pubkey = Pubkey::new_rand();
|
||||
let res = authorize_voter(
|
||||
let res = authorize(
|
||||
&mut KeyedAccount::new(&vote_pubkey, false, &mut vote_account),
|
||||
&[],
|
||||
&authorized_voter_pubkey,
|
||||
VoteAuthorize::Voter,
|
||||
);
|
||||
assert_eq!(res, Err(InstructionError::MissingRequiredSignature));
|
||||
|
||||
let res = authorize_voter(
|
||||
let res = authorize(
|
||||
&mut KeyedAccount::new(&vote_pubkey, true, &mut vote_account),
|
||||
&[],
|
||||
&authorized_voter_pubkey,
|
||||
VoteAuthorize::Voter,
|
||||
);
|
||||
assert_eq!(res, Ok(()));
|
||||
// verify authorized_voter_pubkey can authorize authorized_voter_pubkey ;)
|
||||
let res = authorize_voter(
|
||||
let res = authorize(
|
||||
&mut KeyedAccount::new(&vote_pubkey, false, &mut vote_account),
|
||||
&[KeyedAccount::new(
|
||||
&authorized_voter_pubkey,
|
||||
@@ -604,6 +675,31 @@ mod tests {
|
||||
&mut Account::default(),
|
||||
)],
|
||||
&authorized_voter_pubkey,
|
||||
VoteAuthorize::Voter,
|
||||
);
|
||||
assert_eq!(res, Ok(()));
|
||||
|
||||
// authorize another withdrawer
|
||||
// another voter
|
||||
let authorized_withdrawer_pubkey = Pubkey::new_rand();
|
||||
let res = authorize(
|
||||
&mut KeyedAccount::new(&vote_pubkey, true, &mut vote_account),
|
||||
&[],
|
||||
&authorized_withdrawer_pubkey,
|
||||
VoteAuthorize::Withdrawer,
|
||||
);
|
||||
assert_eq!(res, Ok(()));
|
||||
|
||||
// verify authorized_withdrawer can authorize authorized_withdrawer ;)
|
||||
let res = authorize(
|
||||
&mut KeyedAccount::new(&vote_pubkey, false, &mut vote_account),
|
||||
&[KeyedAccount::new(
|
||||
&authorized_withdrawer_pubkey,
|
||||
true,
|
||||
&mut Account::default(),
|
||||
)],
|
||||
&authorized_withdrawer_pubkey,
|
||||
VoteAuthorize::Withdrawer,
|
||||
);
|
||||
assert_eq!(res, Ok(()));
|
||||
|
||||
@@ -678,7 +774,7 @@ mod tests {
|
||||
#[test]
|
||||
fn test_vote_double_lockout_after_expiration() {
|
||||
let voter_pubkey = Pubkey::new_rand();
|
||||
let mut vote_state = VoteState::new(&voter_pubkey, &Pubkey::new_rand(), 0);
|
||||
let mut vote_state = VoteState::new_for_test(&voter_pubkey);
|
||||
|
||||
for i in 0..3 {
|
||||
vote_state.process_slot_vote_unchecked(i as u64);
|
||||
@@ -706,7 +802,7 @@ mod tests {
|
||||
#[test]
|
||||
fn test_expire_multiple_votes() {
|
||||
let voter_pubkey = Pubkey::new_rand();
|
||||
let mut vote_state = VoteState::new(&voter_pubkey, &Pubkey::new_rand(), 0);
|
||||
let mut vote_state = VoteState::new_for_test(&voter_pubkey);
|
||||
|
||||
for i in 0..3 {
|
||||
vote_state.process_slot_vote_unchecked(i as u64);
|
||||
@@ -737,7 +833,7 @@ mod tests {
|
||||
#[test]
|
||||
fn test_vote_credits() {
|
||||
let voter_pubkey = Pubkey::new_rand();
|
||||
let mut vote_state = VoteState::new(&voter_pubkey, &Pubkey::new_rand(), 0);
|
||||
let mut vote_state = VoteState::new_for_test(&voter_pubkey);
|
||||
|
||||
for i in 0..MAX_LOCKOUT_HISTORY {
|
||||
vote_state.process_slot_vote_unchecked(i as u64);
|
||||
@@ -756,7 +852,7 @@ mod tests {
|
||||
#[test]
|
||||
fn test_duplicate_vote() {
|
||||
let voter_pubkey = Pubkey::new_rand();
|
||||
let mut vote_state = VoteState::new(&voter_pubkey, &Pubkey::new_rand(), 0);
|
||||
let mut vote_state = VoteState::new_for_test(&voter_pubkey);
|
||||
vote_state.process_slot_vote_unchecked(0);
|
||||
vote_state.process_slot_vote_unchecked(1);
|
||||
vote_state.process_slot_vote_unchecked(0);
|
||||
@@ -768,7 +864,7 @@ mod tests {
|
||||
#[test]
|
||||
fn test_nth_recent_vote() {
|
||||
let voter_pubkey = Pubkey::new_rand();
|
||||
let mut vote_state = VoteState::new(&voter_pubkey, &Pubkey::new_rand(), 0);
|
||||
let mut vote_state = VoteState::new_for_test(&voter_pubkey);
|
||||
for i in 0..MAX_LOCKOUT_HISTORY {
|
||||
vote_state.process_slot_vote_unchecked(i as u64);
|
||||
}
|
||||
@@ -799,9 +895,9 @@ mod tests {
|
||||
#[test]
|
||||
fn test_process_missed_votes() {
|
||||
let account_a = Pubkey::new_rand();
|
||||
let mut vote_state_a = VoteState::new(&account_a, &Pubkey::new_rand(), 0);
|
||||
let mut vote_state_a = VoteState::new_for_test(&account_a);
|
||||
let account_b = Pubkey::new_rand();
|
||||
let mut vote_state_b = VoteState::new(&account_b, &Pubkey::new_rand(), 0);
|
||||
let mut vote_state_b = VoteState::new_for_test(&account_b);
|
||||
|
||||
// process some votes on account a
|
||||
(0..5)
|
||||
@@ -821,7 +917,7 @@ mod tests {
|
||||
|
||||
#[test]
|
||||
fn test_process_vote_skips_old_vote() {
|
||||
let mut vote_state = VoteState::new(&Pubkey::default(), &Pubkey::default(), 0);
|
||||
let mut vote_state = VoteState::default();
|
||||
|
||||
let vote = Vote::new(vec![0], Hash::default());
|
||||
let slot_hashes: Vec<_> = vec![(0, vote.hash)];
|
||||
@@ -836,7 +932,7 @@ mod tests {
|
||||
|
||||
#[test]
|
||||
fn test_check_slots_are_valid_vote_empty_slot_hashes() {
|
||||
let vote_state = VoteState::new(&Pubkey::default(), &Pubkey::default(), 0);
|
||||
let vote_state = VoteState::default();
|
||||
|
||||
let vote = Vote::new(vec![0], Hash::default());
|
||||
assert_eq!(
|
||||
@@ -847,7 +943,7 @@ mod tests {
|
||||
|
||||
#[test]
|
||||
fn test_check_slots_are_valid_new_vote() {
|
||||
let vote_state = VoteState::new(&Pubkey::default(), &Pubkey::default(), 0);
|
||||
let vote_state = VoteState::default();
|
||||
|
||||
let vote = Vote::new(vec![0], Hash::default());
|
||||
let slot_hashes: Vec<_> = vec![(*vote.slots.last().unwrap(), vote.hash)];
|
||||
@@ -859,7 +955,7 @@ mod tests {
|
||||
|
||||
#[test]
|
||||
fn test_check_slots_are_valid_bad_hash() {
|
||||
let vote_state = VoteState::new(&Pubkey::default(), &Pubkey::default(), 0);
|
||||
let vote_state = VoteState::default();
|
||||
|
||||
let vote = Vote::new(vec![0], Hash::default());
|
||||
let slot_hashes: Vec<_> = vec![(*vote.slots.last().unwrap(), hash(vote.hash.as_ref()))];
|
||||
@@ -871,7 +967,7 @@ mod tests {
|
||||
|
||||
#[test]
|
||||
fn test_check_slots_are_valid_bad_slot() {
|
||||
let vote_state = VoteState::new(&Pubkey::default(), &Pubkey::default(), 0);
|
||||
let vote_state = VoteState::default();
|
||||
|
||||
let vote = Vote::new(vec![1], Hash::default());
|
||||
let slot_hashes: Vec<_> = vec![(0, vote.hash)];
|
||||
@@ -883,7 +979,7 @@ mod tests {
|
||||
|
||||
#[test]
|
||||
fn test_check_slots_are_valid_duplicate_vote() {
|
||||
let mut vote_state = VoteState::new(&Pubkey::default(), &Pubkey::default(), 0);
|
||||
let mut vote_state = VoteState::default();
|
||||
|
||||
let vote = Vote::new(vec![0], Hash::default());
|
||||
let slot_hashes: Vec<_> = vec![(*vote.slots.last().unwrap(), vote.hash)];
|
||||
@@ -896,7 +992,7 @@ mod tests {
|
||||
|
||||
#[test]
|
||||
fn test_check_slots_are_valid_next_vote() {
|
||||
let mut vote_state = VoteState::new(&Pubkey::default(), &Pubkey::default(), 0);
|
||||
let mut vote_state = VoteState::default();
|
||||
|
||||
let vote = Vote::new(vec![0], Hash::default());
|
||||
let slot_hashes: Vec<_> = vec![(*vote.slots.last().unwrap(), vote.hash)];
|
||||
@@ -912,7 +1008,7 @@ mod tests {
|
||||
|
||||
#[test]
|
||||
fn test_check_slots_are_valid_next_vote_only() {
|
||||
let mut vote_state = VoteState::new(&Pubkey::default(), &Pubkey::default(), 0);
|
||||
let mut vote_state = VoteState::default();
|
||||
|
||||
let vote = Vote::new(vec![0], Hash::default());
|
||||
let slot_hashes: Vec<_> = vec![(*vote.slots.last().unwrap(), vote.hash)];
|
||||
@@ -925,17 +1021,28 @@ mod tests {
|
||||
Ok(())
|
||||
);
|
||||
}
|
||||
#[test]
|
||||
fn test_process_vote_empty_slots() {
|
||||
let mut vote_state = VoteState::default();
|
||||
|
||||
let vote = Vote::new(vec![], Hash::default());
|
||||
assert_eq!(
|
||||
vote_state.process_vote(&vote, &[], 0),
|
||||
Err(VoteError::EmptySlots)
|
||||
);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_vote_state_commission_split() {
|
||||
let vote_state = VoteState::new(&Pubkey::default(), &Pubkey::default(), 0);
|
||||
let vote_state = VoteState::default();
|
||||
|
||||
assert_eq!(vote_state.commission_split(1.0), (0.0, 1.0, false));
|
||||
|
||||
let vote_state = VoteState::new(&Pubkey::default(), &Pubkey::default(), std::u8::MAX);
|
||||
let mut vote_state = VoteState::default();
|
||||
vote_state.commission = std::u8::MAX;
|
||||
assert_eq!(vote_state.commission_split(1.0), (1.0, 0.0, false));
|
||||
|
||||
let vote_state = VoteState::new(&Pubkey::default(), &Pubkey::default(), std::u8::MAX / 2);
|
||||
vote_state.commission = std::u8::MAX / 2;
|
||||
let (voter_portion, staker_portion, was_split) = vote_state.commission_split(10.0);
|
||||
|
||||
assert_eq!(
|
||||
@@ -948,9 +1055,10 @@ mod tests {
|
||||
fn test_vote_state_withdraw() {
|
||||
let (vote_pubkey, mut vote_account) = create_test_account();
|
||||
|
||||
// unsigned
|
||||
// unsigned request
|
||||
let res = withdraw(
|
||||
&mut KeyedAccount::new(&vote_pubkey, false, &mut vote_account),
|
||||
&[],
|
||||
0,
|
||||
&mut KeyedAccount::new(&Pubkey::new_rand(), false, &mut Account::default()),
|
||||
);
|
||||
@@ -959,6 +1067,7 @@ mod tests {
|
||||
// insufficient funds
|
||||
let res = withdraw(
|
||||
&mut KeyedAccount::new(&vote_pubkey, true, &mut vote_account),
|
||||
&[],
|
||||
101,
|
||||
&mut KeyedAccount::new(&Pubkey::new_rand(), false, &mut Account::default()),
|
||||
);
|
||||
@@ -969,6 +1078,25 @@ mod tests {
|
||||
let lamports = vote_account.lamports;
|
||||
let res = withdraw(
|
||||
&mut KeyedAccount::new(&vote_pubkey, true, &mut vote_account),
|
||||
&[],
|
||||
lamports,
|
||||
&mut KeyedAccount::new(&Pubkey::new_rand(), false, &mut to_account),
|
||||
);
|
||||
assert_eq!(res, Ok(()));
|
||||
assert_eq!(vote_account.lamports, 0);
|
||||
assert_eq!(to_account.lamports, lamports);
|
||||
|
||||
// reset balance, verify that authorized_withdrawer works
|
||||
vote_account.lamports = lamports;
|
||||
to_account.lamports = 0;
|
||||
let mut authorized_withdrawer_account = Account::new(0, 0, &vote_pubkey);
|
||||
let res = withdraw(
|
||||
&mut KeyedAccount::new(&vote_pubkey, false, &mut vote_account),
|
||||
&[KeyedAccount::new(
|
||||
&vote_pubkey,
|
||||
true,
|
||||
&mut authorized_withdrawer_account,
|
||||
)],
|
||||
lamports,
|
||||
&mut KeyedAccount::new(&Pubkey::new_rand(), false, &mut to_account),
|
||||
);
|
||||
|
Reference in New Issue
Block a user