program.rs 121 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266
  1. #![allow(clippy::arithmetic_side_effects)]
  2. // REMOVE once https://github.com/rust-lang/rust-clippy/issues/11153 is fixed
  3. #![allow(clippy::items_after_test_module)]
  4. use {
  5. agave_feature_set::enable_alt_bn128_syscall,
  6. assert_matches::assert_matches,
  7. serde_json::Value,
  8. solana_account::{state_traits::StateMut, ReadableAccount},
  9. solana_borsh::v1::try_from_slice_unchecked,
  10. solana_cli::{
  11. cli::{process_command, CliCommand, CliConfig},
  12. program::{ProgramCliCommand, CLOSE_PROGRAM_WARNING},
  13. program_v4::{AdditionalCliConfig, ProgramV4CliCommand},
  14. test_utils::wait_n_slots,
  15. },
  16. solana_cli_output::{parse_sign_only_reply_string, OutputFormat},
  17. solana_client::rpc_config::RpcSendTransactionConfig,
  18. solana_commitment_config::CommitmentConfig,
  19. solana_compute_budget_interface::ComputeBudgetInstruction,
  20. solana_faucet::faucet::run_local_faucet_with_unique_port_for_tests,
  21. solana_fee_calculator::FeeRateGovernor,
  22. solana_keypair::Keypair,
  23. solana_loader_v3_interface::state::UpgradeableLoaderState,
  24. solana_net_utils::SocketAddrSpace,
  25. solana_pubkey::Pubkey,
  26. solana_rent::Rent,
  27. solana_rpc::rpc::JsonRpcConfig,
  28. solana_rpc_client::rpc_client::{GetConfirmedSignaturesForAddress2Config, RpcClient},
  29. solana_rpc_client_api::config::RpcTransactionConfig,
  30. solana_rpc_client_nonce_utils::blockhash_query::BlockhashQuery,
  31. solana_sdk_ids::{bpf_loader_upgradeable, compute_budget, loader_v4},
  32. solana_signature::Signature,
  33. solana_signer::{null_signer::NullSigner, Signer},
  34. solana_system_interface::program as system_program,
  35. solana_test_validator::TestValidatorGenesis,
  36. solana_transaction::Transaction,
  37. solana_transaction_status::UiTransactionEncoding,
  38. std::{
  39. env,
  40. fs::File,
  41. io::{Read, Seek, SeekFrom},
  42. path::{Path, PathBuf},
  43. str::FromStr,
  44. sync::Arc,
  45. },
  46. test_case::test_case,
  47. };
  48. fn test_validator_genesis(mint_keypair: Keypair) -> TestValidatorGenesis {
  49. let mut genesis = TestValidatorGenesis::default();
  50. genesis
  51. .fee_rate_governor(FeeRateGovernor::new(0, 0))
  52. .rent(Rent {
  53. lamports_per_byte_year: 1,
  54. exemption_threshold: 1.0,
  55. ..Rent::default()
  56. })
  57. .faucet_addr(Some(run_local_faucet_with_unique_port_for_tests(
  58. mint_keypair,
  59. )));
  60. genesis
  61. }
  62. fn setup_rpc_client(config: &mut CliConfig) -> Arc<RpcClient> {
  63. let rpc_client = Arc::new(RpcClient::new_with_timeouts_and_commitment(
  64. config.json_rpc_url.to_string(),
  65. config.rpc_timeout,
  66. config.commitment,
  67. config.confirm_transaction_initial_timeout,
  68. ));
  69. config.rpc_client = Some(rpc_client.clone());
  70. rpc_client
  71. }
  72. #[track_caller]
  73. fn expect_command_failure(config: &CliConfig, should_fail_because: &str, error_expected: &str) {
  74. let error_actual = process_command(config).expect_err(should_fail_because);
  75. let error_actual = error_actual.to_string();
  76. assert!(
  77. error_expected == error_actual,
  78. "Command failed as expected, but with an unexpected error. Expected: {error_expected}, \
  79. Actual: {error_actual}",
  80. );
  81. }
  82. #[track_caller]
  83. fn expect_account_absent(rpc_client: &RpcClient, pubkey: Pubkey, absent_because: &str) {
  84. let error_actual = rpc_client.get_account(&pubkey).expect_err(absent_because);
  85. let error_actual = error_actual.to_string();
  86. assert!(
  87. format!("AccountNotFound: pubkey={pubkey}") == error_actual,
  88. "Failed to retrieve an account details. Expected account to be absent, but got a \
  89. different error: {error_actual}",
  90. );
  91. }
  92. #[test]
  93. fn test_cli_program_deploy_non_upgradeable() {
  94. agave_logger::setup();
  95. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  96. noop_path.push("tests");
  97. noop_path.push("fixtures");
  98. noop_path.push("noop");
  99. noop_path.set_extension("so");
  100. let mint_keypair = Keypair::new();
  101. let mint_pubkey = mint_keypair.pubkey();
  102. let test_validator = test_validator_genesis(mint_keypair)
  103. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  104. .expect("validator start failed");
  105. let mut config = CliConfig::recent_for_tests();
  106. config.json_rpc_url = test_validator.rpc_url();
  107. let rpc_client = setup_rpc_client(&mut config);
  108. let mut file = File::open(noop_path.to_str().unwrap()).unwrap();
  109. let mut program_data = Vec::new();
  110. file.read_to_end(&mut program_data).unwrap();
  111. let minimum_balance_for_programdata = rpc_client
  112. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  113. program_data.len(),
  114. ))
  115. .unwrap();
  116. let minimum_balance_for_program = rpc_client
  117. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_program())
  118. .unwrap();
  119. let keypair = Keypair::new();
  120. config.signers = vec![&keypair];
  121. config.command = CliCommand::Airdrop {
  122. pubkey: None,
  123. lamports: 4 * minimum_balance_for_programdata, // min balance for rent exemption for three programs + leftover for tx processing
  124. };
  125. process_command(&config).unwrap();
  126. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  127. program_location: Some(noop_path.to_str().unwrap().to_string()),
  128. fee_payer_signer_index: 0,
  129. program_signer_index: None,
  130. program_pubkey: None,
  131. buffer_signer_index: None,
  132. buffer_pubkey: None,
  133. upgrade_authority_signer_index: 0,
  134. is_final: true,
  135. max_len: None,
  136. skip_fee_check: false,
  137. compute_unit_price: None,
  138. max_sign_attempts: 5,
  139. auto_extend: true,
  140. use_rpc: false,
  141. skip_feature_verification: true,
  142. });
  143. config.output_format = OutputFormat::JsonCompact;
  144. let response = process_command(&config);
  145. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  146. let program_id_str = json
  147. .as_object()
  148. .unwrap()
  149. .get("programId")
  150. .unwrap()
  151. .as_str()
  152. .unwrap();
  153. let program_id = Pubkey::from_str(program_id_str).unwrap();
  154. let account0 = rpc_client.get_account(&program_id).unwrap();
  155. assert_eq!(account0.lamports, minimum_balance_for_program);
  156. assert_eq!(account0.owner, bpf_loader_upgradeable::id());
  157. assert!(account0.executable);
  158. let (programdata_pubkey, _) =
  159. Pubkey::find_program_address(&[program_id.as_ref()], &bpf_loader_upgradeable::id());
  160. let programdata_account = rpc_client.get_account(&programdata_pubkey).unwrap();
  161. assert_eq!(
  162. programdata_account.lamports,
  163. minimum_balance_for_programdata
  164. );
  165. assert_eq!(programdata_account.owner, bpf_loader_upgradeable::id());
  166. assert!(!programdata_account.executable);
  167. assert_eq!(
  168. programdata_account.data[UpgradeableLoaderState::size_of_programdata_metadata()..],
  169. program_data[..]
  170. );
  171. // Test custom address
  172. let custom_address_keypair = Keypair::new();
  173. config.signers = vec![&keypair, &custom_address_keypair];
  174. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  175. program_location: Some(noop_path.to_str().unwrap().to_string()),
  176. fee_payer_signer_index: 0,
  177. program_signer_index: Some(1),
  178. program_pubkey: None,
  179. buffer_signer_index: None,
  180. buffer_pubkey: None,
  181. upgrade_authority_signer_index: 0,
  182. is_final: true,
  183. max_len: None,
  184. skip_fee_check: false,
  185. compute_unit_price: None,
  186. max_sign_attempts: 5,
  187. auto_extend: true,
  188. use_rpc: false,
  189. skip_feature_verification: true,
  190. });
  191. process_command(&config).unwrap();
  192. let account1 = rpc_client
  193. .get_account(&custom_address_keypair.pubkey())
  194. .unwrap();
  195. assert_eq!(account1.lamports, minimum_balance_for_program);
  196. assert_eq!(account1.owner, bpf_loader_upgradeable::id());
  197. assert!(account1.executable);
  198. let (programdata_pubkey, _) = Pubkey::find_program_address(
  199. &[custom_address_keypair.pubkey().as_ref()],
  200. &bpf_loader_upgradeable::id(),
  201. );
  202. let programdata_account = rpc_client.get_account(&programdata_pubkey).unwrap();
  203. assert_eq!(
  204. programdata_account.lamports,
  205. minimum_balance_for_programdata
  206. );
  207. assert_eq!(programdata_account.owner, bpf_loader_upgradeable::id());
  208. assert!(!programdata_account.executable);
  209. assert_eq!(
  210. programdata_account.data[UpgradeableLoaderState::size_of_programdata_metadata()..],
  211. program_data[..]
  212. );
  213. expect_command_failure(
  214. &config,
  215. "Program can not be deployed at the same address twice",
  216. &format!(
  217. "Program {} is no longer upgradeable",
  218. custom_address_keypair.pubkey()
  219. ),
  220. );
  221. // Attempt to deploy to account with excess balance
  222. let custom_address_keypair = Keypair::new();
  223. config.signers = vec![&custom_address_keypair];
  224. config.command = CliCommand::Airdrop {
  225. pubkey: None,
  226. // Anything over minimum_balance_for_programdata should trigger an error.
  227. lamports: 2 * minimum_balance_for_programdata,
  228. };
  229. process_command(&config).unwrap();
  230. config.signers = vec![&keypair, &custom_address_keypair];
  231. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  232. program_location: Some(noop_path.to_str().unwrap().to_string()),
  233. fee_payer_signer_index: 0,
  234. program_signer_index: Some(1),
  235. program_pubkey: None,
  236. buffer_signer_index: None,
  237. buffer_pubkey: None,
  238. upgrade_authority_signer_index: 0,
  239. is_final: true,
  240. max_len: None,
  241. skip_fee_check: false,
  242. compute_unit_price: None,
  243. max_sign_attempts: 5,
  244. auto_extend: true,
  245. use_rpc: false,
  246. skip_feature_verification: true,
  247. });
  248. expect_command_failure(
  249. &config,
  250. "The CLI blocks deployments into accounts that hold more than the necessary amount of SOL",
  251. &format!(
  252. "Account {} is not an upgradeable program or already in use",
  253. custom_address_keypair.pubkey()
  254. ),
  255. );
  256. // Use forcing parameter to deploy to account with excess balance
  257. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  258. program_location: Some(noop_path.to_str().unwrap().to_string()),
  259. fee_payer_signer_index: 0,
  260. program_signer_index: Some(1),
  261. program_pubkey: None,
  262. buffer_signer_index: None,
  263. buffer_pubkey: None,
  264. upgrade_authority_signer_index: 0,
  265. is_final: true,
  266. max_len: None,
  267. skip_fee_check: false,
  268. compute_unit_price: None,
  269. max_sign_attempts: 5,
  270. auto_extend: true,
  271. use_rpc: false,
  272. skip_feature_verification: true,
  273. });
  274. expect_command_failure(
  275. &config,
  276. "The program is non-upgradable, so even if we skip the CLI account balance check, the \
  277. upgrade still fails",
  278. &format!(
  279. "Account {} is not an upgradeable program or already in use",
  280. custom_address_keypair.pubkey()
  281. ),
  282. );
  283. }
  284. #[test]
  285. fn test_cli_program_deploy_no_authority() {
  286. agave_logger::setup();
  287. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  288. noop_path.push("tests");
  289. noop_path.push("fixtures");
  290. noop_path.push("noop");
  291. noop_path.set_extension("so");
  292. let mint_keypair = Keypair::new();
  293. let mint_pubkey = mint_keypair.pubkey();
  294. let test_validator = test_validator_genesis(mint_keypair)
  295. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  296. .expect("validator start failed");
  297. let mut config = CliConfig::recent_for_tests();
  298. config.json_rpc_url = test_validator.rpc_url();
  299. let rpc_client = setup_rpc_client(&mut config);
  300. let mut file = File::open(noop_path.to_str().unwrap()).unwrap();
  301. let mut program_data = Vec::new();
  302. file.read_to_end(&mut program_data).unwrap();
  303. let max_len = program_data.len();
  304. let minimum_balance_for_programdata = rpc_client
  305. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  306. max_len,
  307. ))
  308. .unwrap();
  309. let minimum_balance_for_program = rpc_client
  310. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_program())
  311. .unwrap();
  312. let upgrade_authority = Keypair::new();
  313. let keypair = Keypair::new();
  314. config.command = CliCommand::Airdrop {
  315. pubkey: None,
  316. lamports: 100 * minimum_balance_for_programdata + minimum_balance_for_program,
  317. };
  318. config.signers = vec![&keypair];
  319. process_command(&config).unwrap();
  320. // Deploy a program
  321. config.signers = vec![&keypair, &upgrade_authority];
  322. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  323. program_location: Some(noop_path.to_str().unwrap().to_string()),
  324. fee_payer_signer_index: 0,
  325. program_signer_index: None,
  326. program_pubkey: None,
  327. buffer_signer_index: None,
  328. buffer_pubkey: None,
  329. upgrade_authority_signer_index: 1,
  330. is_final: true,
  331. max_len: None,
  332. skip_fee_check: false,
  333. compute_unit_price: None,
  334. max_sign_attempts: 5,
  335. auto_extend: true,
  336. use_rpc: false,
  337. skip_feature_verification: true,
  338. });
  339. config.output_format = OutputFormat::JsonCompact;
  340. let response = process_command(&config);
  341. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  342. let program_id_str = json
  343. .as_object()
  344. .unwrap()
  345. .get("programId")
  346. .unwrap()
  347. .as_str()
  348. .unwrap();
  349. let program_id = Pubkey::from_str(program_id_str).unwrap();
  350. // Attempt to upgrade the program
  351. config.signers = vec![&keypair, &upgrade_authority];
  352. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  353. program_location: Some(noop_path.to_str().unwrap().to_string()),
  354. fee_payer_signer_index: 0,
  355. program_signer_index: None,
  356. program_pubkey: Some(program_id),
  357. buffer_signer_index: None,
  358. buffer_pubkey: None,
  359. upgrade_authority_signer_index: 1,
  360. is_final: false,
  361. max_len: None,
  362. skip_fee_check: false,
  363. compute_unit_price: None,
  364. max_sign_attempts: 5,
  365. auto_extend: true,
  366. use_rpc: false,
  367. skip_feature_verification: true,
  368. });
  369. expect_command_failure(
  370. &config,
  371. "Can not upgrade a program if it was deployed without the authority signature",
  372. &format!("Program {program_id} is no longer upgradeable"),
  373. );
  374. }
  375. #[test_case(true, true; "Feature enabled, skip preflight")]
  376. #[test_case(true, false; "Feature enabled, don't skip preflight")]
  377. #[test_case(false, true; "Feature disabled, skip preflight")]
  378. #[test_case(false, false; "Feature disabled, don't skip preflight")]
  379. fn test_cli_program_deploy_feature(enable_feature: bool, skip_preflight: bool) {
  380. agave_logger::setup();
  381. let mut program_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  382. program_path.push("tests");
  383. program_path.push("fixtures");
  384. program_path.push("alt_bn128");
  385. program_path.set_extension("so");
  386. let mint_keypair = Keypair::new();
  387. let mint_pubkey = mint_keypair.pubkey();
  388. let mut test_validator_builder = test_validator_genesis(mint_keypair);
  389. // Deactivate the enable alt bn128 syscall and try to submit a program with that syscall
  390. if !enable_feature {
  391. test_validator_builder.deactivate_features(&[enable_alt_bn128_syscall::id()]);
  392. }
  393. let test_validator = test_validator_builder
  394. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  395. .expect("validator start failed");
  396. let mut config = CliConfig::recent_for_tests();
  397. config.json_rpc_url = test_validator.rpc_url();
  398. let rpc_client = setup_rpc_client(&mut config);
  399. let mut file = File::open(program_path.to_str().unwrap()).unwrap();
  400. let mut program_data = Vec::new();
  401. file.read_to_end(&mut program_data).unwrap();
  402. let max_len = program_data.len();
  403. let minimum_balance_for_programdata = rpc_client
  404. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  405. max_len,
  406. ))
  407. .unwrap();
  408. let minimum_balance_for_program = rpc_client
  409. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_program())
  410. .unwrap();
  411. let upgrade_authority = Keypair::new();
  412. let keypair = Keypair::new();
  413. config.command = CliCommand::Airdrop {
  414. pubkey: None,
  415. lamports: 100 * minimum_balance_for_programdata + minimum_balance_for_program,
  416. };
  417. config.signers = vec![&keypair];
  418. config.send_transaction_config.skip_preflight = skip_preflight;
  419. process_command(&config).unwrap();
  420. config.signers = vec![&keypair, &upgrade_authority];
  421. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  422. program_location: Some(program_path.to_str().unwrap().to_string()),
  423. fee_payer_signer_index: 0,
  424. program_signer_index: None,
  425. program_pubkey: None,
  426. buffer_signer_index: None,
  427. buffer_pubkey: None,
  428. upgrade_authority_signer_index: 1,
  429. is_final: true,
  430. max_len: None,
  431. skip_fee_check: false,
  432. compute_unit_price: None,
  433. max_sign_attempts: 5,
  434. auto_extend: true,
  435. use_rpc: false,
  436. skip_feature_verification: false,
  437. });
  438. config.output_format = OutputFormat::JsonCompact;
  439. if enable_feature {
  440. let res = process_command(&config);
  441. assert!(res.is_ok());
  442. } else {
  443. expect_command_failure(
  444. &config,
  445. "Program contains a syscall from a deactivated feature",
  446. "ELF error: ELF error: Unresolved symbol (sol_alt_bn128_group_op) at instruction #49 \
  447. (ELF file offset 0x188)",
  448. );
  449. // If we bypass the verification, there should be no error
  450. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  451. program_location: Some(program_path.to_str().unwrap().to_string()),
  452. fee_payer_signer_index: 0,
  453. program_signer_index: None,
  454. program_pubkey: None,
  455. buffer_signer_index: None,
  456. buffer_pubkey: None,
  457. upgrade_authority_signer_index: 1,
  458. is_final: true,
  459. max_len: None,
  460. skip_fee_check: false,
  461. compute_unit_price: None,
  462. max_sign_attempts: 5,
  463. auto_extend: true,
  464. use_rpc: false,
  465. skip_feature_verification: true,
  466. });
  467. // When we skip verification, we fail at a later stage
  468. let response = process_command(&config);
  469. if skip_preflight {
  470. assert!(response
  471. .err()
  472. .unwrap()
  473. .to_string()
  474. .contains("Deploying program failed"));
  475. } else {
  476. assert!(response
  477. .err()
  478. .unwrap()
  479. .to_string()
  480. .contains("Deploying program failed: RPC response error -32002:"));
  481. }
  482. }
  483. }
  484. #[test_case(true; "Feature enabled")]
  485. #[test_case(false; "Feature disabled")]
  486. fn test_cli_program_upgrade_with_feature(enable_feature: bool) {
  487. agave_logger::setup();
  488. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  489. noop_path.push("tests");
  490. noop_path.push("fixtures");
  491. noop_path.push("noop");
  492. noop_path.set_extension("so");
  493. let mut syscall_program_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  494. syscall_program_path.push("tests");
  495. syscall_program_path.push("fixtures");
  496. syscall_program_path.push("alt_bn128");
  497. syscall_program_path.set_extension("so");
  498. let mint_keypair = Keypair::new();
  499. let mint_pubkey = mint_keypair.pubkey();
  500. let mut test_validator_builder = test_validator_genesis(mint_keypair);
  501. // Deactivate the enable alt bn128 syscall and try to submit a program with that syscall
  502. if !enable_feature {
  503. test_validator_builder.deactivate_features(&[enable_alt_bn128_syscall::id()]);
  504. }
  505. let test_validator = test_validator_builder
  506. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  507. .expect("validator start failed");
  508. let mut config = CliConfig::recent_for_tests();
  509. config.json_rpc_url = test_validator.rpc_url();
  510. let rpc_client = setup_rpc_client(&mut config);
  511. let blockhash = rpc_client.get_latest_blockhash().unwrap();
  512. let mut file = File::open(syscall_program_path.to_str().unwrap()).unwrap();
  513. let mut large_program_data = Vec::new();
  514. file.read_to_end(&mut large_program_data).unwrap();
  515. let max_program_data_len = large_program_data.len();
  516. let minimum_balance_for_large_buffer = rpc_client
  517. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  518. max_program_data_len,
  519. ))
  520. .unwrap();
  521. config.send_transaction_config.skip_preflight = false;
  522. let online_signer = Keypair::new();
  523. let offline_signer = Keypair::new();
  524. let buffer_signer = Keypair::new();
  525. // Typically, keypair for program signer should be different from online signer or
  526. // offline signer keypairs.
  527. let program_signer = Keypair::new();
  528. config.command = CliCommand::Airdrop {
  529. pubkey: None,
  530. lamports: 100 * minimum_balance_for_large_buffer, // gotta be enough for this test
  531. };
  532. config.signers = vec![&online_signer];
  533. process_command(&config).unwrap();
  534. config.command = CliCommand::Airdrop {
  535. pubkey: None,
  536. lamports: 100 * minimum_balance_for_large_buffer, // gotta be enough for this test
  537. };
  538. config.signers = vec![&offline_signer];
  539. process_command(&config).unwrap();
  540. // Deploy upgradeable program with authority set to offline signer
  541. config.signers = vec![&online_signer, &offline_signer, &program_signer];
  542. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  543. program_location: Some(noop_path.to_str().unwrap().to_string()),
  544. fee_payer_signer_index: 0,
  545. program_signer_index: Some(2),
  546. program_pubkey: Some(program_signer.pubkey()),
  547. buffer_signer_index: None,
  548. buffer_pubkey: None,
  549. upgrade_authority_signer_index: 1, // must be offline signer for security reasons
  550. is_final: false,
  551. max_len: Some(max_program_data_len), // allows for larger program size with future upgrades
  552. skip_fee_check: false,
  553. compute_unit_price: None,
  554. max_sign_attempts: 5,
  555. auto_extend: true,
  556. use_rpc: false,
  557. skip_feature_verification: false,
  558. });
  559. config.output_format = OutputFormat::JsonCompact;
  560. process_command(&config).unwrap();
  561. // Prepare buffer to upgrade deployed program to a larger program
  562. create_buffer_with_offline_authority(
  563. &rpc_client,
  564. &syscall_program_path,
  565. &mut config,
  566. &online_signer,
  567. &offline_signer,
  568. &buffer_signer,
  569. );
  570. config.signers = vec![&offline_signer];
  571. config.command = CliCommand::Program(ProgramCliCommand::Upgrade {
  572. fee_payer_signer_index: 0,
  573. program_pubkey: program_signer.pubkey(),
  574. buffer_pubkey: buffer_signer.pubkey(),
  575. upgrade_authority_signer_index: 0,
  576. sign_only: true,
  577. dump_transaction_message: false,
  578. blockhash_query: BlockhashQuery::new(Some(blockhash), true, None),
  579. skip_feature_verification: false,
  580. });
  581. config.output_format = OutputFormat::JsonCompact;
  582. let sig_response = process_command(&config).unwrap();
  583. let sign_only = parse_sign_only_reply_string(&sig_response);
  584. let offline_pre_signer = sign_only.presigner_of(&offline_signer.pubkey()).unwrap();
  585. // Attempt to deploy from buffer using signature over correct message (should succeed)
  586. config.signers = vec![&offline_pre_signer, &program_signer];
  587. config.command = CliCommand::Program(ProgramCliCommand::Upgrade {
  588. fee_payer_signer_index: 0,
  589. program_pubkey: program_signer.pubkey(),
  590. buffer_pubkey: buffer_signer.pubkey(),
  591. upgrade_authority_signer_index: 0,
  592. sign_only: false,
  593. dump_transaction_message: false,
  594. blockhash_query: BlockhashQuery::new(Some(blockhash), true, None),
  595. skip_feature_verification: false,
  596. });
  597. config.output_format = OutputFormat::JsonCompact;
  598. if enable_feature {
  599. let res = process_command(&config);
  600. assert!(res.is_ok());
  601. } else {
  602. expect_command_failure(
  603. &config,
  604. "Program contains a syscall to a disabled feature",
  605. format!(
  606. "Buffer account {} has invalid program data: \"ELF error: ELF error: Unresolved \
  607. symbol (sol_alt_bn128_group_op) at instruction #49 (ELF file offset 0x188)\"",
  608. buffer_signer.pubkey()
  609. )
  610. .as_str(),
  611. );
  612. // If we skip verification, the failure should be at a later stage
  613. config.command = CliCommand::Program(ProgramCliCommand::Upgrade {
  614. fee_payer_signer_index: 0,
  615. program_pubkey: program_signer.pubkey(),
  616. buffer_pubkey: buffer_signer.pubkey(),
  617. upgrade_authority_signer_index: 0,
  618. sign_only: false,
  619. dump_transaction_message: false,
  620. blockhash_query: BlockhashQuery::new(Some(blockhash), true, None),
  621. skip_feature_verification: true,
  622. });
  623. config.output_format = OutputFormat::JsonCompact;
  624. let response = process_command(&config);
  625. assert!(response
  626. .err()
  627. .unwrap()
  628. .to_string()
  629. .contains("Upgrading program failed: RPC response error -32002"));
  630. }
  631. }
  632. #[test]
  633. fn test_cli_program_deploy_with_authority() {
  634. agave_logger::setup();
  635. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  636. noop_path.push("tests");
  637. noop_path.push("fixtures");
  638. noop_path.push("noop");
  639. noop_path.set_extension("so");
  640. let mint_keypair = Keypair::new();
  641. let mint_pubkey = mint_keypair.pubkey();
  642. let test_validator = test_validator_genesis(mint_keypair)
  643. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  644. .expect("validator start failed");
  645. let mut config = CliConfig::recent_for_tests();
  646. config.json_rpc_url = test_validator.rpc_url();
  647. let rpc_client = setup_rpc_client(&mut config);
  648. let mut file = File::open(noop_path.to_str().unwrap()).unwrap();
  649. let mut program_data = Vec::new();
  650. file.read_to_end(&mut program_data).unwrap();
  651. let max_len = program_data.len();
  652. let minimum_balance_for_programdata = rpc_client
  653. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  654. max_len,
  655. ))
  656. .unwrap();
  657. let minimum_balance_for_program = rpc_client
  658. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_program())
  659. .unwrap();
  660. let upgrade_authority = Keypair::new();
  661. let keypair = Keypair::new();
  662. config.signers = vec![&keypair];
  663. config.command = CliCommand::Airdrop {
  664. pubkey: None,
  665. lamports: 100 * minimum_balance_for_programdata + minimum_balance_for_program,
  666. };
  667. process_command(&config).unwrap();
  668. // Deploy the upgradeable program with specified program_id
  669. let program_keypair = Keypair::new();
  670. config.signers = vec![&keypair, &upgrade_authority, &program_keypair];
  671. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  672. program_location: Some(noop_path.to_str().unwrap().to_string()),
  673. fee_payer_signer_index: 0,
  674. program_signer_index: Some(2),
  675. program_pubkey: Some(program_keypair.pubkey()),
  676. buffer_signer_index: None,
  677. buffer_pubkey: None,
  678. upgrade_authority_signer_index: 1,
  679. is_final: false,
  680. max_len: Some(max_len),
  681. skip_fee_check: false,
  682. compute_unit_price: None,
  683. max_sign_attempts: 5,
  684. auto_extend: true,
  685. use_rpc: false,
  686. skip_feature_verification: true,
  687. });
  688. config.output_format = OutputFormat::JsonCompact;
  689. let response = process_command(&config);
  690. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  691. let program_pubkey_str = json
  692. .as_object()
  693. .unwrap()
  694. .get("programId")
  695. .unwrap()
  696. .as_str()
  697. .unwrap();
  698. assert_eq!(
  699. program_keypair.pubkey(),
  700. Pubkey::from_str(program_pubkey_str).unwrap()
  701. );
  702. let program_account = rpc_client.get_account(&program_keypair.pubkey()).unwrap();
  703. assert_eq!(program_account.lamports, minimum_balance_for_program);
  704. assert_eq!(program_account.owner, bpf_loader_upgradeable::id());
  705. assert!(program_account.executable);
  706. let (programdata_pubkey, _) = Pubkey::find_program_address(
  707. &[program_keypair.pubkey().as_ref()],
  708. &bpf_loader_upgradeable::id(),
  709. );
  710. let programdata_account = rpc_client.get_account(&programdata_pubkey).unwrap();
  711. assert_eq!(
  712. programdata_account.lamports,
  713. minimum_balance_for_programdata
  714. );
  715. assert_eq!(programdata_account.owner, bpf_loader_upgradeable::id());
  716. assert!(!programdata_account.executable);
  717. assert_eq!(
  718. programdata_account.data[UpgradeableLoaderState::size_of_programdata_metadata()..],
  719. program_data[..]
  720. );
  721. // Deploy the upgradeable program
  722. config.signers = vec![&keypair, &upgrade_authority];
  723. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  724. program_location: Some(noop_path.to_str().unwrap().to_string()),
  725. fee_payer_signer_index: 0,
  726. program_signer_index: None,
  727. program_pubkey: None,
  728. buffer_signer_index: None,
  729. buffer_pubkey: None,
  730. upgrade_authority_signer_index: 1,
  731. is_final: false,
  732. max_len: Some(max_len),
  733. skip_fee_check: false,
  734. compute_unit_price: None,
  735. max_sign_attempts: 5,
  736. auto_extend: true,
  737. use_rpc: false,
  738. skip_feature_verification: true,
  739. });
  740. let response = process_command(&config);
  741. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  742. let program_pubkey_str = json
  743. .as_object()
  744. .unwrap()
  745. .get("programId")
  746. .unwrap()
  747. .as_str()
  748. .unwrap();
  749. let program_pubkey = Pubkey::from_str(program_pubkey_str).unwrap();
  750. let program_account = rpc_client.get_account(&program_pubkey).unwrap();
  751. assert_eq!(program_account.lamports, minimum_balance_for_program);
  752. assert_eq!(program_account.owner, bpf_loader_upgradeable::id());
  753. assert!(program_account.executable);
  754. let (programdata_pubkey, _) =
  755. Pubkey::find_program_address(&[program_pubkey.as_ref()], &bpf_loader_upgradeable::id());
  756. let programdata_account = rpc_client.get_account(&programdata_pubkey).unwrap();
  757. assert_eq!(
  758. programdata_account.lamports,
  759. minimum_balance_for_programdata
  760. );
  761. assert_eq!(programdata_account.owner, bpf_loader_upgradeable::id());
  762. assert!(!programdata_account.executable);
  763. assert_eq!(
  764. programdata_account.data[UpgradeableLoaderState::size_of_programdata_metadata()..],
  765. program_data[..]
  766. );
  767. // Upgrade the program
  768. config.signers = vec![&keypair, &upgrade_authority];
  769. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  770. program_location: Some(noop_path.to_str().unwrap().to_string()),
  771. fee_payer_signer_index: 0,
  772. program_signer_index: None,
  773. program_pubkey: Some(program_pubkey),
  774. buffer_signer_index: None,
  775. buffer_pubkey: None,
  776. upgrade_authority_signer_index: 1,
  777. is_final: false,
  778. max_len: Some(max_len),
  779. skip_fee_check: false,
  780. compute_unit_price: None,
  781. max_sign_attempts: 5,
  782. auto_extend: true,
  783. use_rpc: false,
  784. skip_feature_verification: true,
  785. });
  786. process_command(&config).unwrap();
  787. let program_account = rpc_client.get_account(&program_pubkey).unwrap();
  788. assert_eq!(program_account.lamports, minimum_balance_for_program);
  789. assert_eq!(program_account.owner, bpf_loader_upgradeable::id());
  790. assert!(program_account.executable);
  791. let (programdata_pubkey, _) =
  792. Pubkey::find_program_address(&[program_pubkey.as_ref()], &bpf_loader_upgradeable::id());
  793. let programdata_account = rpc_client.get_account(&programdata_pubkey).unwrap();
  794. assert_eq!(
  795. programdata_account.lamports,
  796. minimum_balance_for_programdata
  797. );
  798. assert_eq!(programdata_account.owner, bpf_loader_upgradeable::id());
  799. assert!(program_account.executable);
  800. assert_eq!(
  801. programdata_account.data[UpgradeableLoaderState::size_of_programdata_metadata()..],
  802. program_data[..]
  803. );
  804. let blockhash = rpc_client.get_latest_blockhash().unwrap();
  805. // Set a new authority sign offline first
  806. let new_upgrade_authority = Keypair::new();
  807. config.signers = vec![&keypair, &upgrade_authority, &new_upgrade_authority];
  808. config.command = CliCommand::Program(ProgramCliCommand::SetUpgradeAuthorityChecked {
  809. program_pubkey,
  810. upgrade_authority_index: 1,
  811. new_upgrade_authority_index: 2,
  812. sign_only: true,
  813. dump_transaction_message: false,
  814. blockhash_query: BlockhashQuery::new(Some(blockhash), true, None),
  815. });
  816. let sig_response = process_command(&config).unwrap();
  817. let sign_only = parse_sign_only_reply_string(&sig_response);
  818. let offline_pre_signer = sign_only
  819. .presigner_of(&new_upgrade_authority.pubkey())
  820. .unwrap();
  821. config.signers = vec![&keypair, &upgrade_authority, &offline_pre_signer];
  822. config.command = CliCommand::Program(ProgramCliCommand::SetUpgradeAuthorityChecked {
  823. program_pubkey,
  824. upgrade_authority_index: 1,
  825. new_upgrade_authority_index: 2,
  826. sign_only: false,
  827. dump_transaction_message: false,
  828. blockhash_query: BlockhashQuery::new(Some(blockhash), false, None),
  829. });
  830. let response = process_command(&config);
  831. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  832. let new_upgrade_authority_str = json
  833. .as_object()
  834. .unwrap()
  835. .get("authority")
  836. .unwrap()
  837. .as_str()
  838. .unwrap();
  839. assert_eq!(
  840. Pubkey::from_str(new_upgrade_authority_str).unwrap(),
  841. new_upgrade_authority.pubkey()
  842. );
  843. // Upgrade with new authority
  844. config.signers = vec![&keypair, &new_upgrade_authority];
  845. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  846. program_location: Some(noop_path.to_str().unwrap().to_string()),
  847. fee_payer_signer_index: 0,
  848. program_signer_index: None,
  849. program_pubkey: Some(program_pubkey),
  850. buffer_signer_index: None,
  851. buffer_pubkey: None,
  852. upgrade_authority_signer_index: 1,
  853. is_final: false,
  854. max_len: None,
  855. skip_fee_check: false,
  856. compute_unit_price: None,
  857. max_sign_attempts: 5,
  858. auto_extend: true,
  859. use_rpc: false,
  860. skip_feature_verification: true,
  861. });
  862. process_command(&config).unwrap();
  863. let program_account = rpc_client.get_account(&program_pubkey).unwrap();
  864. assert_eq!(program_account.lamports, minimum_balance_for_program);
  865. assert_eq!(program_account.owner, bpf_loader_upgradeable::id());
  866. assert!(program_account.executable);
  867. let (programdata_pubkey, _) =
  868. Pubkey::find_program_address(&[program_pubkey.as_ref()], &bpf_loader_upgradeable::id());
  869. let programdata_account = rpc_client.get_account(&programdata_pubkey).unwrap();
  870. assert_eq!(
  871. programdata_account.lamports,
  872. minimum_balance_for_programdata
  873. );
  874. assert_eq!(programdata_account.owner, bpf_loader_upgradeable::id());
  875. assert!(program_account.executable);
  876. assert_eq!(
  877. programdata_account.data[UpgradeableLoaderState::size_of_programdata_metadata()..],
  878. program_data[..]
  879. );
  880. // Get upgrade authority
  881. config.signers = vec![&keypair];
  882. config.command = CliCommand::Program(ProgramCliCommand::Show {
  883. account_pubkey: Some(program_pubkey),
  884. authority_pubkey: keypair.pubkey(),
  885. get_programs: false,
  886. get_buffers: false,
  887. all: false,
  888. use_lamports_unit: false,
  889. });
  890. let response = process_command(&config);
  891. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  892. let authority_pubkey_str = json
  893. .as_object()
  894. .unwrap()
  895. .get("authority")
  896. .unwrap()
  897. .as_str()
  898. .unwrap();
  899. assert_eq!(
  900. new_upgrade_authority.pubkey(),
  901. Pubkey::from_str(authority_pubkey_str).unwrap()
  902. );
  903. // Set no authority
  904. config.signers = vec![&keypair, &new_upgrade_authority];
  905. config.command = CliCommand::Program(ProgramCliCommand::SetUpgradeAuthority {
  906. program_pubkey,
  907. upgrade_authority_index: Some(1),
  908. new_upgrade_authority: None,
  909. sign_only: false,
  910. dump_transaction_message: false,
  911. blockhash_query: BlockhashQuery::default(),
  912. });
  913. let response = process_command(&config);
  914. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  915. let new_upgrade_authority_str = json
  916. .as_object()
  917. .unwrap()
  918. .get("authority")
  919. .unwrap()
  920. .as_str()
  921. .unwrap();
  922. assert_eq!(new_upgrade_authority_str, "none");
  923. // Upgrade with no authority
  924. config.signers = vec![&keypair, &new_upgrade_authority];
  925. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  926. program_location: Some(noop_path.to_str().unwrap().to_string()),
  927. fee_payer_signer_index: 0,
  928. program_signer_index: None,
  929. program_pubkey: Some(program_pubkey),
  930. buffer_signer_index: None,
  931. buffer_pubkey: None,
  932. upgrade_authority_signer_index: 1,
  933. is_final: false,
  934. max_len: None,
  935. skip_fee_check: false,
  936. compute_unit_price: None,
  937. max_sign_attempts: 5,
  938. auto_extend: true,
  939. use_rpc: false,
  940. skip_feature_verification: true,
  941. });
  942. expect_command_failure(
  943. &config,
  944. "Upgrade without an authority is not allowed",
  945. &format!("Program {program_pubkey} is no longer upgradeable"),
  946. );
  947. // deploy with finality
  948. config.signers = vec![&keypair, &new_upgrade_authority];
  949. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  950. program_location: Some(noop_path.to_str().unwrap().to_string()),
  951. fee_payer_signer_index: 0,
  952. program_signer_index: None,
  953. program_pubkey: None,
  954. buffer_signer_index: None,
  955. buffer_pubkey: None,
  956. upgrade_authority_signer_index: 1,
  957. is_final: true,
  958. max_len: None,
  959. skip_fee_check: false,
  960. compute_unit_price: None,
  961. max_sign_attempts: 5,
  962. auto_extend: true,
  963. use_rpc: false,
  964. skip_feature_verification: true,
  965. });
  966. let response = process_command(&config);
  967. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  968. let program_pubkey_str = json
  969. .as_object()
  970. .unwrap()
  971. .get("programId")
  972. .unwrap()
  973. .as_str()
  974. .unwrap();
  975. let program_pubkey = Pubkey::from_str(program_pubkey_str).unwrap();
  976. let (programdata_pubkey, _) =
  977. Pubkey::find_program_address(&[program_pubkey.as_ref()], &bpf_loader_upgradeable::id());
  978. let programdata_account = rpc_client.get_account(&programdata_pubkey).unwrap();
  979. if let UpgradeableLoaderState::ProgramData {
  980. slot: _,
  981. upgrade_authority_address,
  982. } = programdata_account.state().unwrap()
  983. {
  984. assert_eq!(upgrade_authority_address, None);
  985. } else {
  986. panic!("not a ProgramData account");
  987. }
  988. // Get buffer authority
  989. config.signers = vec![&keypair];
  990. config.command = CliCommand::Program(ProgramCliCommand::Show {
  991. account_pubkey: Some(program_pubkey),
  992. authority_pubkey: keypair.pubkey(),
  993. get_programs: false,
  994. get_buffers: false,
  995. all: false,
  996. use_lamports_unit: false,
  997. });
  998. let response = process_command(&config);
  999. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  1000. let authority_pubkey_str = json
  1001. .as_object()
  1002. .unwrap()
  1003. .get("authority")
  1004. .unwrap()
  1005. .as_str()
  1006. .unwrap();
  1007. assert_eq!("none", authority_pubkey_str);
  1008. }
  1009. #[test_case(true; "Skip preflight")]
  1010. #[test_case(false; "Dont skip preflight")]
  1011. fn test_cli_program_upgrade_auto_extend(skip_preflight: bool) {
  1012. agave_logger::setup();
  1013. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  1014. noop_path.push("tests");
  1015. noop_path.push("fixtures");
  1016. noop_path.push("noop");
  1017. noop_path.set_extension("so");
  1018. let mut noop_large_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  1019. noop_large_path.push("tests");
  1020. noop_large_path.push("fixtures");
  1021. noop_large_path.push("noop_large");
  1022. noop_large_path.set_extension("so");
  1023. let mint_keypair = Keypair::new();
  1024. let mint_pubkey = mint_keypair.pubkey();
  1025. let test_validator = test_validator_genesis(mint_keypair)
  1026. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  1027. .expect("validator start failed");
  1028. let mut config = CliConfig::recent_for_tests();
  1029. config.json_rpc_url = test_validator.rpc_url();
  1030. let rpc_client = setup_rpc_client(&mut config);
  1031. let mut file = File::open(noop_path.to_str().unwrap()).unwrap();
  1032. let mut program_data = Vec::new();
  1033. file.read_to_end(&mut program_data).unwrap();
  1034. let mut file = File::open(noop_large_path.to_str().unwrap()).unwrap();
  1035. let mut program_data_large = Vec::new();
  1036. file.read_to_end(&mut program_data_large).unwrap();
  1037. // Use the larger program to calculate rent.
  1038. let max_len = program_data_large.len();
  1039. let minimum_balance_for_programdata = rpc_client
  1040. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  1041. max_len,
  1042. ))
  1043. .unwrap();
  1044. let minimum_balance_for_program = rpc_client
  1045. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_program())
  1046. .unwrap();
  1047. let upgrade_authority = Keypair::new();
  1048. let keypair = Keypair::new();
  1049. config.signers = vec![&keypair];
  1050. config.command = CliCommand::Airdrop {
  1051. pubkey: None,
  1052. lamports: 100 * minimum_balance_for_programdata + minimum_balance_for_program,
  1053. };
  1054. process_command(&config).unwrap();
  1055. // Deploy the first, smaller program.
  1056. let program_keypair = Keypair::new();
  1057. config.signers = vec![&keypair, &upgrade_authority, &program_keypair];
  1058. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  1059. program_location: Some(noop_path.to_str().unwrap().to_string()),
  1060. fee_payer_signer_index: 0,
  1061. program_signer_index: Some(2),
  1062. program_pubkey: Some(program_keypair.pubkey()),
  1063. buffer_signer_index: None,
  1064. buffer_pubkey: None,
  1065. upgrade_authority_signer_index: 1,
  1066. is_final: false,
  1067. max_len: None,
  1068. skip_fee_check: false,
  1069. compute_unit_price: None,
  1070. max_sign_attempts: 5,
  1071. auto_extend: true,
  1072. use_rpc: false,
  1073. skip_feature_verification: true,
  1074. });
  1075. config.output_format = OutputFormat::JsonCompact;
  1076. config.send_transaction_config.skip_preflight = skip_preflight;
  1077. process_command(&config).unwrap();
  1078. // Attempt to upgrade the program with a larger program, but with the
  1079. // --no-auto-extend flag.
  1080. config.signers = vec![&keypair, &upgrade_authority];
  1081. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  1082. program_location: Some(noop_large_path.to_str().unwrap().to_string()),
  1083. fee_payer_signer_index: 0,
  1084. program_signer_index: None,
  1085. program_pubkey: Some(program_keypair.pubkey()),
  1086. buffer_signer_index: None,
  1087. buffer_pubkey: None,
  1088. upgrade_authority_signer_index: 1,
  1089. is_final: true,
  1090. max_len: None,
  1091. skip_fee_check: false,
  1092. compute_unit_price: None,
  1093. max_sign_attempts: 5,
  1094. auto_extend: false, // --no-auto-extend flag is present
  1095. use_rpc: false,
  1096. skip_feature_verification: true,
  1097. });
  1098. if skip_preflight {
  1099. expect_command_failure(
  1100. &config,
  1101. "Cannot upgrade a program when ELF does not fit into the allocated data account",
  1102. "Deploying program failed: Error processing Instruction 0: account data too small for \
  1103. instruction",
  1104. );
  1105. } else {
  1106. #[rustfmt::skip]
  1107. let expected_error =
  1108. "Deploying program failed: \
  1109. RPC response error -32002: \
  1110. Transaction simulation failed: \
  1111. Error processing Instruction 0: \
  1112. account data too small for instruction; 3 log messages:\n \
  1113. Program BPFLoaderUpgradeab1e11111111111111111111111 invoke [1]\n \
  1114. ProgramData account not large enough\n \
  1115. Program BPFLoaderUpgradeab1e11111111111111111111111 failed: account data too small \
  1116. for instruction\n";
  1117. expect_command_failure(
  1118. &config,
  1119. "Can not upgrade a program when ELF does not fit into the allocated data account",
  1120. expected_error,
  1121. );
  1122. }
  1123. // Attempt to upgrade the program with a larger program, this time without
  1124. // the --no-auto-extend flag. This should automatically extend the program data.
  1125. config.signers = vec![&keypair, &upgrade_authority];
  1126. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  1127. program_location: Some(noop_large_path.to_str().unwrap().to_string()),
  1128. fee_payer_signer_index: 0,
  1129. program_signer_index: None,
  1130. program_pubkey: Some(program_keypair.pubkey()),
  1131. buffer_signer_index: None,
  1132. buffer_pubkey: None,
  1133. upgrade_authority_signer_index: 1,
  1134. is_final: true,
  1135. max_len: None,
  1136. skip_fee_check: false,
  1137. compute_unit_price: None,
  1138. max_sign_attempts: 5,
  1139. auto_extend: true, // --no-auto-extend flag is absent
  1140. use_rpc: false,
  1141. skip_feature_verification: true,
  1142. });
  1143. let response = process_command(&config);
  1144. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  1145. let program_pubkey_str = json
  1146. .as_object()
  1147. .unwrap()
  1148. .get("programId")
  1149. .unwrap()
  1150. .as_str()
  1151. .unwrap();
  1152. let program_pubkey = Pubkey::from_str(program_pubkey_str).unwrap();
  1153. let (programdata_pubkey, _) =
  1154. Pubkey::find_program_address(&[program_pubkey.as_ref()], &bpf_loader_upgradeable::id());
  1155. let programdata_account = rpc_client.get_account(&programdata_pubkey).unwrap();
  1156. if let UpgradeableLoaderState::ProgramData {
  1157. slot: _,
  1158. upgrade_authority_address,
  1159. } = programdata_account.state().unwrap()
  1160. {
  1161. assert_eq!(upgrade_authority_address, None);
  1162. } else {
  1163. panic!("not a ProgramData account");
  1164. }
  1165. assert_eq!(
  1166. programdata_account.data().len(),
  1167. UpgradeableLoaderState::size_of_programdata(program_data_large.len()),
  1168. );
  1169. }
  1170. #[test]
  1171. fn test_cli_program_close_program() {
  1172. agave_logger::setup();
  1173. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  1174. noop_path.push("tests");
  1175. noop_path.push("fixtures");
  1176. noop_path.push("noop");
  1177. noop_path.set_extension("so");
  1178. let mint_keypair = Keypair::new();
  1179. let mint_pubkey = mint_keypair.pubkey();
  1180. let test_validator = test_validator_genesis(mint_keypair)
  1181. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  1182. .expect("validator start failed");
  1183. let mut config = CliConfig::recent_for_tests();
  1184. config.json_rpc_url = test_validator.rpc_url();
  1185. let rpc_client = setup_rpc_client(&mut config);
  1186. let mut file = File::open(noop_path.to_str().unwrap()).unwrap();
  1187. let mut program_data = Vec::new();
  1188. file.read_to_end(&mut program_data).unwrap();
  1189. let max_len = program_data.len();
  1190. let minimum_balance_for_programdata = rpc_client
  1191. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  1192. max_len,
  1193. ))
  1194. .unwrap();
  1195. let minimum_balance_for_program = rpc_client
  1196. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_program())
  1197. .unwrap();
  1198. let upgrade_authority = Keypair::new();
  1199. let keypair = Keypair::new();
  1200. config.signers = vec![&keypair];
  1201. config.command = CliCommand::Airdrop {
  1202. pubkey: None,
  1203. lamports: 100 * minimum_balance_for_programdata + minimum_balance_for_program,
  1204. };
  1205. process_command(&config).unwrap();
  1206. // Deploy the upgradeable program
  1207. let program_keypair = Keypair::new();
  1208. config.signers = vec![&keypair, &upgrade_authority, &program_keypair];
  1209. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  1210. program_location: Some(noop_path.to_str().unwrap().to_string()),
  1211. fee_payer_signer_index: 0,
  1212. program_signer_index: Some(2),
  1213. program_pubkey: Some(program_keypair.pubkey()),
  1214. buffer_signer_index: None,
  1215. buffer_pubkey: None,
  1216. upgrade_authority_signer_index: 1,
  1217. is_final: false,
  1218. max_len: Some(max_len),
  1219. skip_fee_check: false,
  1220. compute_unit_price: None,
  1221. max_sign_attempts: 5,
  1222. auto_extend: true,
  1223. use_rpc: false,
  1224. skip_feature_verification: true,
  1225. });
  1226. config.output_format = OutputFormat::JsonCompact;
  1227. process_command(&config).unwrap();
  1228. let (programdata_pubkey, _) = Pubkey::find_program_address(
  1229. &[program_keypair.pubkey().as_ref()],
  1230. &bpf_loader_upgradeable::id(),
  1231. );
  1232. // Wait one slot to avoid "Program was deployed in this block already" error
  1233. wait_n_slots(&rpc_client, 1);
  1234. // Close program
  1235. let close_account = rpc_client.get_account(&programdata_pubkey).unwrap();
  1236. let programdata_lamports = close_account.lamports;
  1237. let recipient_pubkey = Pubkey::new_unique();
  1238. config.signers = vec![&keypair, &upgrade_authority];
  1239. // Close without --bypass-warning flag
  1240. config.command = CliCommand::Program(ProgramCliCommand::Close {
  1241. account_pubkey: Some(program_keypair.pubkey()),
  1242. recipient_pubkey,
  1243. authority_index: 1,
  1244. use_lamports_unit: false,
  1245. bypass_warning: false,
  1246. });
  1247. expect_command_failure(
  1248. &config,
  1249. "CLI requires the --bypass-warning flag in order to close a program",
  1250. CLOSE_PROGRAM_WARNING,
  1251. );
  1252. // Close with --bypass-warning flag
  1253. config.command = CliCommand::Program(ProgramCliCommand::Close {
  1254. account_pubkey: Some(program_keypair.pubkey()),
  1255. recipient_pubkey,
  1256. authority_index: 1,
  1257. use_lamports_unit: false,
  1258. bypass_warning: true,
  1259. });
  1260. process_command(&config).unwrap();
  1261. expect_account_absent(
  1262. &rpc_client,
  1263. programdata_pubkey,
  1264. "Program data account is deleted when the program is closed",
  1265. );
  1266. let recipient_account = rpc_client.get_account(&recipient_pubkey).unwrap();
  1267. assert_eq!(programdata_lamports, recipient_account.lamports);
  1268. }
  1269. #[test]
  1270. fn test_cli_program_extend_program() {
  1271. agave_logger::setup();
  1272. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  1273. noop_path.push("tests");
  1274. noop_path.push("fixtures");
  1275. noop_path.push("noop");
  1276. noop_path.set_extension("so");
  1277. let mut noop_large_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  1278. noop_large_path.push("tests");
  1279. noop_large_path.push("fixtures");
  1280. noop_large_path.push("noop_large");
  1281. noop_large_path.set_extension("so");
  1282. let mint_keypair = Keypair::new();
  1283. let mint_pubkey = mint_keypair.pubkey();
  1284. let test_validator = test_validator_genesis(mint_keypair)
  1285. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  1286. .expect("validator start failed");
  1287. let mut config = CliConfig::recent_for_tests();
  1288. config.json_rpc_url = test_validator.rpc_url();
  1289. let rpc_client = setup_rpc_client(&mut config);
  1290. let mut file = File::open(noop_path.to_str().unwrap()).unwrap();
  1291. let mut program_data = Vec::new();
  1292. file.read_to_end(&mut program_data).unwrap();
  1293. let max_len = program_data.len();
  1294. let minimum_balance_for_programdata = rpc_client
  1295. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  1296. max_len,
  1297. ))
  1298. .unwrap();
  1299. let minimum_balance_for_program = rpc_client
  1300. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_program())
  1301. .unwrap();
  1302. let upgrade_authority = Keypair::new();
  1303. let keypair = Keypair::new();
  1304. config.signers = vec![&keypair];
  1305. config.command = CliCommand::Airdrop {
  1306. pubkey: None,
  1307. lamports: 100 * minimum_balance_for_programdata + minimum_balance_for_program,
  1308. };
  1309. config.send_transaction_config = RpcSendTransactionConfig {
  1310. skip_preflight: false,
  1311. preflight_commitment: Some(CommitmentConfig::processed().commitment),
  1312. ..RpcSendTransactionConfig::default()
  1313. };
  1314. process_command(&config).unwrap();
  1315. // Deploy an upgradeable program
  1316. let program_keypair = Keypair::new();
  1317. config.signers = vec![&keypair, &upgrade_authority, &program_keypair];
  1318. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  1319. program_location: Some(noop_path.to_str().unwrap().to_string()),
  1320. fee_payer_signer_index: 0,
  1321. program_signer_index: Some(2),
  1322. program_pubkey: Some(program_keypair.pubkey()),
  1323. buffer_signer_index: None,
  1324. buffer_pubkey: None,
  1325. upgrade_authority_signer_index: 1,
  1326. is_final: false,
  1327. max_len: None, // Use None to check that it defaults to the max length
  1328. skip_fee_check: false,
  1329. compute_unit_price: None,
  1330. max_sign_attempts: 5,
  1331. auto_extend: false,
  1332. use_rpc: false,
  1333. skip_feature_verification: true,
  1334. });
  1335. config.output_format = OutputFormat::JsonCompact;
  1336. process_command(&config).unwrap();
  1337. let (programdata_pubkey, _) = Pubkey::find_program_address(
  1338. &[program_keypair.pubkey().as_ref()],
  1339. &bpf_loader_upgradeable::id(),
  1340. );
  1341. let programdata_account = rpc_client.get_account(&programdata_pubkey).unwrap();
  1342. let expected_len = UpgradeableLoaderState::size_of_programdata(max_len);
  1343. assert_eq!(expected_len, programdata_account.data.len());
  1344. // Wait one slot to avoid "Program was deployed in this block already" error
  1345. wait_n_slots(&rpc_client, 1);
  1346. // Extend program for larger program, minus 1 required byte
  1347. let mut file = File::open(noop_large_path.to_str().unwrap()).unwrap();
  1348. let mut new_program_data = Vec::new();
  1349. file.read_to_end(&mut new_program_data).unwrap();
  1350. let new_max_len = new_program_data.len();
  1351. let additional_bytes = (new_max_len - max_len) as u32;
  1352. config.signers = vec![&keypair, &upgrade_authority];
  1353. config.command = CliCommand::Program(ProgramCliCommand::ExtendProgramChecked {
  1354. program_pubkey: program_keypair.pubkey(),
  1355. authority_signer_index: 1,
  1356. additional_bytes: additional_bytes - 1,
  1357. });
  1358. process_command(&config).unwrap();
  1359. let programdata_account = rpc_client.get_account(&programdata_pubkey).unwrap();
  1360. let expected_len = UpgradeableLoaderState::size_of_programdata(new_max_len - 1);
  1361. assert_eq!(expected_len, programdata_account.data.len());
  1362. // Larger program deploy fails because missing 1 byte
  1363. config.signers = vec![&keypair, &upgrade_authority];
  1364. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  1365. program_location: Some(noop_large_path.to_str().unwrap().to_string()),
  1366. fee_payer_signer_index: 0,
  1367. program_signer_index: None,
  1368. program_pubkey: Some(program_keypair.pubkey()),
  1369. buffer_signer_index: None,
  1370. buffer_pubkey: None,
  1371. upgrade_authority_signer_index: 1,
  1372. is_final: false,
  1373. max_len: None,
  1374. skip_fee_check: false,
  1375. compute_unit_price: None,
  1376. max_sign_attempts: 5,
  1377. auto_extend: false,
  1378. use_rpc: false,
  1379. skip_feature_verification: true,
  1380. });
  1381. #[rustfmt::skip]
  1382. let expected_error =
  1383. "Deploying program failed: \
  1384. RPC response error -32002: \
  1385. Transaction simulation failed: \
  1386. Error processing Instruction 0: \
  1387. account data too small for instruction; 3 log messages:\n \
  1388. Program BPFLoaderUpgradeab1e11111111111111111111111 invoke [1]\n \
  1389. ProgramData account not large enough\n \
  1390. Program BPFLoaderUpgradeab1e11111111111111111111111 failed: account data too small for \
  1391. instruction\n";
  1392. expect_command_failure(
  1393. &config,
  1394. "Program upgrade must fail, as the buffer is 1 byte too short",
  1395. expected_error,
  1396. );
  1397. // Wait one slot to avoid "Program was deployed in this block already" error
  1398. wait_n_slots(&rpc_client, 1);
  1399. // Extend 1 last byte
  1400. config.signers = vec![&keypair, &upgrade_authority];
  1401. config.command = CliCommand::Program(ProgramCliCommand::ExtendProgramChecked {
  1402. program_pubkey: program_keypair.pubkey(),
  1403. authority_signer_index: 1,
  1404. additional_bytes: 1,
  1405. });
  1406. process_command(&config).unwrap();
  1407. let programdata_account = rpc_client.get_account(&programdata_pubkey).unwrap();
  1408. let expected_len = UpgradeableLoaderState::size_of_programdata(new_max_len);
  1409. assert_eq!(expected_len, programdata_account.data.len());
  1410. // Larger program deploy finally succeeds
  1411. config.signers = vec![&keypair, &upgrade_authority];
  1412. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  1413. program_location: Some(noop_large_path.to_str().unwrap().to_string()),
  1414. fee_payer_signer_index: 0,
  1415. program_signer_index: None,
  1416. program_pubkey: Some(program_keypair.pubkey()),
  1417. buffer_signer_index: None,
  1418. buffer_pubkey: None,
  1419. upgrade_authority_signer_index: 1,
  1420. is_final: false,
  1421. max_len: None,
  1422. skip_fee_check: false,
  1423. compute_unit_price: None,
  1424. max_sign_attempts: 5,
  1425. auto_extend: false,
  1426. use_rpc: false,
  1427. skip_feature_verification: true,
  1428. });
  1429. process_command(&config).unwrap();
  1430. }
  1431. #[test]
  1432. fn test_cli_program_migrate_program() {
  1433. agave_logger::setup();
  1434. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  1435. noop_path.push("tests");
  1436. noop_path.push("fixtures");
  1437. noop_path.push("noop");
  1438. noop_path.set_extension("so");
  1439. let mint_keypair = Keypair::new();
  1440. let mint_pubkey = mint_keypair.pubkey();
  1441. let test_validator = test_validator_genesis(mint_keypair)
  1442. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  1443. .expect("validator start failed");
  1444. let mut config = CliConfig::recent_for_tests();
  1445. config.json_rpc_url = test_validator.rpc_url();
  1446. let rpc_client = setup_rpc_client(&mut config);
  1447. let mut file = File::open(noop_path.to_str().unwrap()).unwrap();
  1448. let mut program_data = Vec::new();
  1449. file.read_to_end(&mut program_data).unwrap();
  1450. let max_len = program_data.len();
  1451. let minimum_balance_for_programdata = rpc_client
  1452. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  1453. max_len,
  1454. ))
  1455. .unwrap();
  1456. let minimum_balance_for_program = rpc_client
  1457. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_program())
  1458. .unwrap();
  1459. let upgrade_authority = Keypair::new();
  1460. let keypair = Keypair::new();
  1461. config.signers = vec![&keypair];
  1462. config.command = CliCommand::Airdrop {
  1463. pubkey: None,
  1464. lamports: 100 * minimum_balance_for_programdata + minimum_balance_for_program,
  1465. };
  1466. process_command(&config).unwrap();
  1467. // Deploy the upgradeable program
  1468. let program_keypair = Keypair::new();
  1469. config.signers = vec![&keypair, &upgrade_authority, &program_keypair];
  1470. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  1471. program_location: Some(noop_path.to_str().unwrap().to_string()),
  1472. fee_payer_signer_index: 0,
  1473. program_signer_index: Some(2),
  1474. program_pubkey: Some(program_keypair.pubkey()),
  1475. buffer_signer_index: None,
  1476. buffer_pubkey: None,
  1477. upgrade_authority_signer_index: 1,
  1478. is_final: false,
  1479. max_len: Some(max_len),
  1480. skip_fee_check: false,
  1481. compute_unit_price: None,
  1482. max_sign_attempts: 5,
  1483. auto_extend: true,
  1484. use_rpc: false,
  1485. skip_feature_verification: true,
  1486. });
  1487. config.output_format = OutputFormat::JsonCompact;
  1488. process_command(&config).unwrap();
  1489. // Wait one slot to avoid "Program was deployed in this block already" error
  1490. wait_n_slots(&rpc_client, 1);
  1491. // Migrate program
  1492. config.signers = vec![&keypair, &upgrade_authority];
  1493. config.command = CliCommand::Program(ProgramCliCommand::MigrateProgram {
  1494. program_pubkey: program_keypair.pubkey(),
  1495. authority_signer_index: 1,
  1496. compute_unit_price: Some(1),
  1497. });
  1498. process_command(&config).unwrap();
  1499. }
  1500. #[test]
  1501. fn test_cli_program_write_buffer() {
  1502. agave_logger::setup();
  1503. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  1504. noop_path.push("tests");
  1505. noop_path.push("fixtures");
  1506. noop_path.push("noop");
  1507. noop_path.set_extension("so");
  1508. let mut noop_large_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  1509. noop_large_path.push("tests");
  1510. noop_large_path.push("fixtures");
  1511. noop_large_path.push("noop_large");
  1512. noop_large_path.set_extension("so");
  1513. let mint_keypair = Keypair::new();
  1514. let mint_pubkey = mint_keypair.pubkey();
  1515. let test_validator = test_validator_genesis(mint_keypair)
  1516. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  1517. .expect("validator start failed");
  1518. let mut config = CliConfig::recent_for_tests();
  1519. config.json_rpc_url = test_validator.rpc_url();
  1520. let rpc_client = setup_rpc_client(&mut config);
  1521. let mut file = File::open(noop_path.to_str().unwrap()).unwrap();
  1522. let mut program_data = Vec::new();
  1523. file.read_to_end(&mut program_data).unwrap();
  1524. let max_len = program_data.len();
  1525. let minimum_balance_for_buffer = rpc_client
  1526. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  1527. max_len,
  1528. ))
  1529. .unwrap();
  1530. let minimum_balance_for_buffer_default = rpc_client
  1531. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  1532. max_len,
  1533. ))
  1534. .unwrap();
  1535. let keypair = Keypair::new();
  1536. config.signers = vec![&keypair];
  1537. config.command = CliCommand::Airdrop {
  1538. pubkey: None,
  1539. lamports: 100 * minimum_balance_for_buffer,
  1540. };
  1541. process_command(&config).unwrap();
  1542. // Write a buffer with default params
  1543. config.signers = vec![&keypair];
  1544. config.command = CliCommand::Program(ProgramCliCommand::WriteBuffer {
  1545. program_location: noop_path.to_str().unwrap().to_string(),
  1546. fee_payer_signer_index: 0,
  1547. buffer_signer_index: None,
  1548. buffer_pubkey: None,
  1549. buffer_authority_signer_index: 0,
  1550. max_len: None,
  1551. skip_fee_check: false,
  1552. compute_unit_price: None,
  1553. max_sign_attempts: 5,
  1554. use_rpc: false,
  1555. skip_feature_verification: true,
  1556. });
  1557. config.output_format = OutputFormat::JsonCompact;
  1558. let response = process_command(&config);
  1559. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  1560. let buffer_pubkey_str = json
  1561. .as_object()
  1562. .unwrap()
  1563. .get("buffer")
  1564. .unwrap()
  1565. .as_str()
  1566. .unwrap();
  1567. let new_buffer_pubkey = Pubkey::from_str(buffer_pubkey_str).unwrap();
  1568. let buffer_account = rpc_client.get_account(&new_buffer_pubkey).unwrap();
  1569. assert_eq!(buffer_account.lamports, minimum_balance_for_buffer_default);
  1570. assert_eq!(buffer_account.owner, bpf_loader_upgradeable::id());
  1571. if let UpgradeableLoaderState::Buffer { authority_address } = buffer_account.state().unwrap() {
  1572. assert_eq!(authority_address, Some(keypair.pubkey()));
  1573. } else {
  1574. panic!("not a buffer account");
  1575. }
  1576. assert_eq!(
  1577. buffer_account.data[UpgradeableLoaderState::size_of_buffer_metadata()..],
  1578. program_data[..]
  1579. );
  1580. // Specify buffer keypair and max_len
  1581. let buffer_keypair = Keypair::new();
  1582. config.signers = vec![&keypair, &buffer_keypair];
  1583. config.command = CliCommand::Program(ProgramCliCommand::WriteBuffer {
  1584. program_location: noop_path.to_str().unwrap().to_string(),
  1585. fee_payer_signer_index: 0,
  1586. buffer_signer_index: Some(1),
  1587. buffer_pubkey: Some(buffer_keypair.pubkey()),
  1588. buffer_authority_signer_index: 0,
  1589. max_len: Some(max_len),
  1590. skip_fee_check: false,
  1591. compute_unit_price: None,
  1592. max_sign_attempts: 5,
  1593. use_rpc: false,
  1594. skip_feature_verification: true,
  1595. });
  1596. let response = process_command(&config);
  1597. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  1598. let buffer_pubkey_str = json
  1599. .as_object()
  1600. .unwrap()
  1601. .get("buffer")
  1602. .unwrap()
  1603. .as_str()
  1604. .unwrap();
  1605. assert_eq!(
  1606. buffer_keypair.pubkey(),
  1607. Pubkey::from_str(buffer_pubkey_str).unwrap()
  1608. );
  1609. let buffer_account = rpc_client.get_account(&buffer_keypair.pubkey()).unwrap();
  1610. assert_eq!(buffer_account.lamports, minimum_balance_for_buffer);
  1611. assert_eq!(buffer_account.owner, bpf_loader_upgradeable::id());
  1612. if let UpgradeableLoaderState::Buffer { authority_address } = buffer_account.state().unwrap() {
  1613. assert_eq!(authority_address, Some(keypair.pubkey()));
  1614. } else {
  1615. panic!("not a buffer account");
  1616. }
  1617. assert_eq!(
  1618. buffer_account.data[UpgradeableLoaderState::size_of_buffer_metadata()..],
  1619. program_data[..]
  1620. );
  1621. // Get buffer authority
  1622. config.signers = vec![];
  1623. config.command = CliCommand::Program(ProgramCliCommand::Show {
  1624. account_pubkey: Some(buffer_keypair.pubkey()),
  1625. authority_pubkey: keypair.pubkey(),
  1626. get_programs: false,
  1627. get_buffers: false,
  1628. all: false,
  1629. use_lamports_unit: false,
  1630. });
  1631. let response = process_command(&config);
  1632. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  1633. let authority_pubkey_str = json
  1634. .as_object()
  1635. .unwrap()
  1636. .get("authority")
  1637. .unwrap()
  1638. .as_str()
  1639. .unwrap();
  1640. assert_eq!(
  1641. keypair.pubkey(),
  1642. Pubkey::from_str(authority_pubkey_str).unwrap()
  1643. );
  1644. // Specify buffer authority
  1645. let buffer_keypair = Keypair::new();
  1646. let authority_keypair = Keypair::new();
  1647. config.signers = vec![&keypair, &buffer_keypair, &authority_keypair];
  1648. config.command = CliCommand::Program(ProgramCliCommand::WriteBuffer {
  1649. program_location: noop_path.to_str().unwrap().to_string(),
  1650. fee_payer_signer_index: 0,
  1651. buffer_signer_index: Some(1),
  1652. buffer_pubkey: Some(buffer_keypair.pubkey()),
  1653. buffer_authority_signer_index: 2,
  1654. max_len: None,
  1655. skip_fee_check: false,
  1656. compute_unit_price: None,
  1657. max_sign_attempts: 5,
  1658. use_rpc: false,
  1659. skip_feature_verification: true,
  1660. });
  1661. let response = process_command(&config);
  1662. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  1663. let buffer_pubkey_str = json
  1664. .as_object()
  1665. .unwrap()
  1666. .get("buffer")
  1667. .unwrap()
  1668. .as_str()
  1669. .unwrap();
  1670. assert_eq!(
  1671. buffer_keypair.pubkey(),
  1672. Pubkey::from_str(buffer_pubkey_str).unwrap()
  1673. );
  1674. let buffer_account = rpc_client.get_account(&buffer_keypair.pubkey()).unwrap();
  1675. assert_eq!(buffer_account.lamports, minimum_balance_for_buffer_default);
  1676. assert_eq!(buffer_account.owner, bpf_loader_upgradeable::id());
  1677. if let UpgradeableLoaderState::Buffer { authority_address } = buffer_account.state().unwrap() {
  1678. assert_eq!(authority_address, Some(authority_keypair.pubkey()));
  1679. } else {
  1680. panic!("not a buffer account");
  1681. }
  1682. assert_eq!(
  1683. buffer_account.data[UpgradeableLoaderState::size_of_buffer_metadata()..],
  1684. program_data[..]
  1685. );
  1686. // Specify authority only
  1687. let buffer_keypair = Keypair::new();
  1688. let authority_keypair = Keypair::new();
  1689. config.signers = vec![&keypair, &buffer_keypair, &authority_keypair];
  1690. config.command = CliCommand::Program(ProgramCliCommand::WriteBuffer {
  1691. program_location: noop_path.to_str().unwrap().to_string(),
  1692. fee_payer_signer_index: 0,
  1693. buffer_signer_index: None,
  1694. buffer_pubkey: None,
  1695. buffer_authority_signer_index: 2,
  1696. max_len: None,
  1697. skip_fee_check: false,
  1698. compute_unit_price: None,
  1699. max_sign_attempts: 5,
  1700. use_rpc: false,
  1701. skip_feature_verification: true,
  1702. });
  1703. let response = process_command(&config);
  1704. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  1705. let buffer_pubkey_str = json
  1706. .as_object()
  1707. .unwrap()
  1708. .get("buffer")
  1709. .unwrap()
  1710. .as_str()
  1711. .unwrap();
  1712. let buffer_pubkey = Pubkey::from_str(buffer_pubkey_str).unwrap();
  1713. let buffer_account = rpc_client.get_account(&buffer_pubkey).unwrap();
  1714. assert_eq!(buffer_account.lamports, minimum_balance_for_buffer_default);
  1715. assert_eq!(buffer_account.owner, bpf_loader_upgradeable::id());
  1716. if let UpgradeableLoaderState::Buffer { authority_address } = buffer_account.state().unwrap() {
  1717. assert_eq!(authority_address, Some(authority_keypair.pubkey()));
  1718. } else {
  1719. panic!("not a buffer account");
  1720. }
  1721. assert_eq!(
  1722. buffer_account.data[UpgradeableLoaderState::size_of_buffer_metadata()..],
  1723. program_data[..]
  1724. );
  1725. // Get buffer authority
  1726. config.signers = vec![];
  1727. config.command = CliCommand::Program(ProgramCliCommand::Show {
  1728. account_pubkey: Some(buffer_pubkey),
  1729. authority_pubkey: keypair.pubkey(),
  1730. get_programs: false,
  1731. get_buffers: false,
  1732. all: false,
  1733. use_lamports_unit: false,
  1734. });
  1735. let response = process_command(&config);
  1736. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  1737. let authority_pubkey_str = json
  1738. .as_object()
  1739. .unwrap()
  1740. .get("authority")
  1741. .unwrap()
  1742. .as_str()
  1743. .unwrap();
  1744. assert_eq!(
  1745. authority_keypair.pubkey(),
  1746. Pubkey::from_str(authority_pubkey_str).unwrap()
  1747. );
  1748. // Close buffer
  1749. let close_account = rpc_client.get_account(&buffer_pubkey).unwrap();
  1750. assert_eq!(minimum_balance_for_buffer, close_account.lamports);
  1751. let recipient_pubkey = Pubkey::new_unique();
  1752. config.signers = vec![&keypair, &authority_keypair];
  1753. config.command = CliCommand::Program(ProgramCliCommand::Close {
  1754. account_pubkey: Some(buffer_pubkey),
  1755. recipient_pubkey,
  1756. authority_index: 1,
  1757. use_lamports_unit: false,
  1758. bypass_warning: false,
  1759. });
  1760. process_command(&config).unwrap();
  1761. expect_account_absent(
  1762. &rpc_client,
  1763. buffer_pubkey,
  1764. "Buffer account is deleted when the buffer is closed",
  1765. );
  1766. let recipient_account = rpc_client.get_account(&recipient_pubkey).unwrap();
  1767. assert_eq!(minimum_balance_for_buffer, recipient_account.lamports);
  1768. // Write a buffer with default params
  1769. config.signers = vec![&keypair];
  1770. config.command = CliCommand::Program(ProgramCliCommand::WriteBuffer {
  1771. program_location: noop_path.to_str().unwrap().to_string(),
  1772. fee_payer_signer_index: 0,
  1773. buffer_signer_index: None,
  1774. buffer_pubkey: None,
  1775. buffer_authority_signer_index: 0,
  1776. max_len: None,
  1777. skip_fee_check: false,
  1778. compute_unit_price: None,
  1779. max_sign_attempts: 5,
  1780. use_rpc: false,
  1781. skip_feature_verification: true,
  1782. });
  1783. config.output_format = OutputFormat::JsonCompact;
  1784. let response = process_command(&config);
  1785. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  1786. let buffer_pubkey_str = json
  1787. .as_object()
  1788. .unwrap()
  1789. .get("buffer")
  1790. .unwrap()
  1791. .as_str()
  1792. .unwrap();
  1793. let new_buffer_pubkey = Pubkey::from_str(buffer_pubkey_str).unwrap();
  1794. // Close buffers and deposit default keypair
  1795. let pre_lamports = rpc_client.get_account(&keypair.pubkey()).unwrap().lamports;
  1796. config.signers = vec![&keypair];
  1797. config.command = CliCommand::Program(ProgramCliCommand::Close {
  1798. account_pubkey: Some(new_buffer_pubkey),
  1799. recipient_pubkey: keypair.pubkey(),
  1800. authority_index: 0,
  1801. use_lamports_unit: false,
  1802. bypass_warning: false,
  1803. });
  1804. process_command(&config).unwrap();
  1805. expect_account_absent(
  1806. &rpc_client,
  1807. new_buffer_pubkey,
  1808. "Buffer account is deleted when the buffer is closed",
  1809. );
  1810. let recipient_account = rpc_client.get_account(&keypair.pubkey()).unwrap();
  1811. assert_eq!(
  1812. pre_lamports + minimum_balance_for_buffer,
  1813. recipient_account.lamports
  1814. );
  1815. // write small buffer then attempt to deploy larger program
  1816. let buffer_keypair = Keypair::new();
  1817. config.signers = vec![&keypair, &buffer_keypair];
  1818. config.command = CliCommand::Program(ProgramCliCommand::WriteBuffer {
  1819. program_location: noop_path.to_str().unwrap().to_string(),
  1820. fee_payer_signer_index: 0,
  1821. buffer_signer_index: Some(1),
  1822. buffer_pubkey: Some(buffer_keypair.pubkey()),
  1823. buffer_authority_signer_index: 0,
  1824. max_len: None, //Some(max_len),
  1825. skip_fee_check: false,
  1826. compute_unit_price: None,
  1827. max_sign_attempts: 5,
  1828. use_rpc: false,
  1829. skip_feature_verification: true,
  1830. });
  1831. process_command(&config).unwrap();
  1832. config.signers = vec![&keypair, &buffer_keypair];
  1833. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  1834. program_location: Some(noop_large_path.to_str().unwrap().to_string()),
  1835. fee_payer_signer_index: 0,
  1836. program_signer_index: None,
  1837. program_pubkey: None,
  1838. buffer_signer_index: Some(1),
  1839. buffer_pubkey: Some(buffer_keypair.pubkey()),
  1840. upgrade_authority_signer_index: 0,
  1841. is_final: true,
  1842. max_len: None,
  1843. skip_fee_check: false,
  1844. compute_unit_price: None,
  1845. max_sign_attempts: 5,
  1846. auto_extend: true,
  1847. use_rpc: false,
  1848. skip_feature_verification: true,
  1849. });
  1850. config.output_format = OutputFormat::JsonCompact;
  1851. let buffer_account_len = {
  1852. let mut file = File::open(noop_path.to_str().unwrap()).unwrap();
  1853. let program_data_len = file.seek(SeekFrom::End(0)).unwrap() as usize;
  1854. UpgradeableLoaderState::size_of_buffer_metadata() + program_data_len
  1855. };
  1856. let min_buffer_account_len = {
  1857. let mut file = File::open(noop_large_path.to_str().unwrap()).unwrap();
  1858. let large_program_data_len = file.seek(SeekFrom::End(0)).unwrap() as usize;
  1859. UpgradeableLoaderState::size_of_buffer_metadata() + large_program_data_len
  1860. };
  1861. expect_command_failure(
  1862. &config,
  1863. "It should not be possible to deploy a program into an account that is too small",
  1864. &format!(
  1865. "Buffer account data size ({buffer_account_len}) is smaller than the minimum size \
  1866. ({min_buffer_account_len})"
  1867. ),
  1868. );
  1869. }
  1870. #[test_case(true; "Feature enabled")]
  1871. #[test_case(false; "Feature disabled")]
  1872. fn test_cli_program_write_buffer_feature(enable_feature: bool) {
  1873. agave_logger::setup();
  1874. let mut program_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  1875. program_path.push("tests");
  1876. program_path.push("fixtures");
  1877. program_path.push("alt_bn128");
  1878. program_path.set_extension("so");
  1879. let mint_keypair = Keypair::new();
  1880. let mint_pubkey = mint_keypair.pubkey();
  1881. let mut test_validator_builder = test_validator_genesis(mint_keypair);
  1882. // Deactivate the enable alt bn128 syscall and try to submit a program with that syscall
  1883. if !enable_feature {
  1884. test_validator_builder.deactivate_features(&[enable_alt_bn128_syscall::id()]);
  1885. }
  1886. let test_validator = test_validator_builder
  1887. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  1888. .expect("validator start failed");
  1889. let mut config = CliConfig::recent_for_tests();
  1890. config.json_rpc_url = test_validator.rpc_url();
  1891. let rpc_client = setup_rpc_client(&mut config);
  1892. let mut file = File::open(program_path.to_str().unwrap()).unwrap();
  1893. let mut program_data = Vec::new();
  1894. file.read_to_end(&mut program_data).unwrap();
  1895. let max_len = program_data.len();
  1896. let minimum_balance_for_buffer = rpc_client
  1897. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  1898. max_len,
  1899. ))
  1900. .unwrap();
  1901. let keypair = Keypair::new();
  1902. config.signers = vec![&keypair];
  1903. config.command = CliCommand::Airdrop {
  1904. pubkey: None,
  1905. lamports: 100 * minimum_balance_for_buffer,
  1906. };
  1907. process_command(&config).unwrap();
  1908. // Write a buffer with default params
  1909. config.signers = vec![&keypair];
  1910. config.command = CliCommand::Program(ProgramCliCommand::WriteBuffer {
  1911. program_location: program_path.to_str().unwrap().to_string(),
  1912. fee_payer_signer_index: 0,
  1913. buffer_signer_index: None,
  1914. buffer_pubkey: None,
  1915. buffer_authority_signer_index: 0,
  1916. max_len: None,
  1917. skip_fee_check: false,
  1918. compute_unit_price: None,
  1919. max_sign_attempts: 5,
  1920. use_rpc: false,
  1921. skip_feature_verification: false,
  1922. });
  1923. config.output_format = OutputFormat::JsonCompact;
  1924. if enable_feature {
  1925. let response = process_command(&config);
  1926. assert!(response.is_ok());
  1927. } else {
  1928. expect_command_failure(
  1929. &config,
  1930. "Program contains a syscall from a deactivated feature",
  1931. "ELF error: ELF error: Unresolved symbol (sol_alt_bn128_group_op) at instruction #49 \
  1932. (ELF file offset 0x188)",
  1933. );
  1934. // If we bypass the verification, there should be no error
  1935. config.command = CliCommand::Program(ProgramCliCommand::WriteBuffer {
  1936. program_location: program_path.to_str().unwrap().to_string(),
  1937. fee_payer_signer_index: 0,
  1938. buffer_signer_index: None,
  1939. buffer_pubkey: None,
  1940. buffer_authority_signer_index: 0,
  1941. max_len: None,
  1942. skip_fee_check: false,
  1943. compute_unit_price: None,
  1944. max_sign_attempts: 5,
  1945. use_rpc: false,
  1946. skip_feature_verification: true,
  1947. });
  1948. // When we skip verification, we won't fail
  1949. let response = process_command(&config);
  1950. assert!(response.is_ok());
  1951. }
  1952. }
  1953. #[test]
  1954. fn test_cli_program_set_buffer_authority() {
  1955. agave_logger::setup();
  1956. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  1957. noop_path.push("tests");
  1958. noop_path.push("fixtures");
  1959. noop_path.push("noop");
  1960. noop_path.set_extension("so");
  1961. let mint_keypair = Keypair::new();
  1962. let mint_pubkey = mint_keypair.pubkey();
  1963. let test_validator = test_validator_genesis(mint_keypair)
  1964. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  1965. .expect("validator start failed");
  1966. let mut config = CliConfig::recent_for_tests();
  1967. config.json_rpc_url = test_validator.rpc_url();
  1968. let rpc_client = setup_rpc_client(&mut config);
  1969. let mut file = File::open(noop_path.to_str().unwrap()).unwrap();
  1970. let mut program_data = Vec::new();
  1971. file.read_to_end(&mut program_data).unwrap();
  1972. let max_len = program_data.len();
  1973. let minimum_balance_for_buffer = rpc_client
  1974. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  1975. max_len,
  1976. ))
  1977. .unwrap();
  1978. let keypair = Keypair::new();
  1979. config.signers = vec![&keypair];
  1980. config.command = CliCommand::Airdrop {
  1981. pubkey: None,
  1982. lamports: 100 * minimum_balance_for_buffer,
  1983. };
  1984. process_command(&config).unwrap();
  1985. // Write a buffer
  1986. let buffer_keypair = Keypair::new();
  1987. config.signers = vec![&keypair, &buffer_keypair];
  1988. config.command = CliCommand::Program(ProgramCliCommand::WriteBuffer {
  1989. program_location: noop_path.to_str().unwrap().to_string(),
  1990. fee_payer_signer_index: 0,
  1991. buffer_signer_index: Some(1),
  1992. buffer_pubkey: Some(buffer_keypair.pubkey()),
  1993. buffer_authority_signer_index: 0,
  1994. max_len: None,
  1995. skip_fee_check: false,
  1996. compute_unit_price: None,
  1997. max_sign_attempts: 5,
  1998. use_rpc: false,
  1999. skip_feature_verification: true,
  2000. });
  2001. process_command(&config).unwrap();
  2002. let buffer_account = rpc_client.get_account(&buffer_keypair.pubkey()).unwrap();
  2003. if let UpgradeableLoaderState::Buffer { authority_address } = buffer_account.state().unwrap() {
  2004. assert_eq!(authority_address, Some(keypair.pubkey()));
  2005. } else {
  2006. panic!("not a buffer account");
  2007. }
  2008. // Set new buffer authority
  2009. let new_buffer_authority = Keypair::new();
  2010. config.signers = vec![&keypair, &buffer_keypair];
  2011. config.command = CliCommand::Program(ProgramCliCommand::SetBufferAuthority {
  2012. buffer_pubkey: buffer_keypair.pubkey(),
  2013. buffer_authority_index: Some(0),
  2014. new_buffer_authority: new_buffer_authority.pubkey(),
  2015. });
  2016. config.output_format = OutputFormat::JsonCompact;
  2017. let response = process_command(&config);
  2018. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  2019. let new_buffer_authority_str = json
  2020. .as_object()
  2021. .unwrap()
  2022. .get("authority")
  2023. .unwrap()
  2024. .as_str()
  2025. .unwrap();
  2026. assert_eq!(
  2027. Pubkey::from_str(new_buffer_authority_str).unwrap(),
  2028. new_buffer_authority.pubkey()
  2029. );
  2030. let buffer_account = rpc_client.get_account(&buffer_keypair.pubkey()).unwrap();
  2031. if let UpgradeableLoaderState::Buffer { authority_address } = buffer_account.state().unwrap() {
  2032. assert_eq!(authority_address, Some(new_buffer_authority.pubkey()));
  2033. } else {
  2034. panic!("not a buffer account");
  2035. }
  2036. // Attempt to deploy program from buffer using previous authority (should fail)
  2037. config.signers = vec![&keypair, &buffer_keypair];
  2038. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  2039. program_location: Some(noop_path.to_str().unwrap().to_string()),
  2040. fee_payer_signer_index: 0,
  2041. program_signer_index: None,
  2042. program_pubkey: None,
  2043. buffer_signer_index: None,
  2044. buffer_pubkey: Some(buffer_keypair.pubkey()),
  2045. upgrade_authority_signer_index: 0,
  2046. is_final: false,
  2047. max_len: None,
  2048. skip_fee_check: false,
  2049. compute_unit_price: None,
  2050. max_sign_attempts: 5,
  2051. auto_extend: true,
  2052. use_rpc: false,
  2053. skip_feature_verification: true,
  2054. });
  2055. config.output_format = OutputFormat::JsonCompact;
  2056. expect_command_failure(
  2057. &config,
  2058. "Deployment with an old authority should fail",
  2059. &format!(
  2060. "Buffer's authority Some({}) does not match authority provided {}",
  2061. new_buffer_authority.pubkey(),
  2062. keypair.pubkey(),
  2063. ),
  2064. );
  2065. // Set buffer authority to the buffer identity (it's a common way for program devs to do so)
  2066. config.signers = vec![&keypair, &new_buffer_authority];
  2067. config.command = CliCommand::Program(ProgramCliCommand::SetBufferAuthority {
  2068. buffer_pubkey: buffer_keypair.pubkey(),
  2069. buffer_authority_index: Some(1),
  2070. new_buffer_authority: buffer_keypair.pubkey(),
  2071. });
  2072. let response = process_command(&config);
  2073. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  2074. let buffer_authority_str = json
  2075. .as_object()
  2076. .unwrap()
  2077. .get("authority")
  2078. .unwrap()
  2079. .as_str()
  2080. .unwrap();
  2081. assert_eq!(
  2082. Pubkey::from_str(buffer_authority_str).unwrap(),
  2083. buffer_keypair.pubkey()
  2084. );
  2085. let buffer_account = rpc_client.get_account(&buffer_keypair.pubkey()).unwrap();
  2086. if let UpgradeableLoaderState::Buffer { authority_address } = buffer_account.state().unwrap() {
  2087. assert_eq!(authority_address, Some(buffer_keypair.pubkey()));
  2088. } else {
  2089. panic!("not a buffer account");
  2090. }
  2091. // Deploy from buffer using proper(new) buffer authority
  2092. config.signers = vec![&keypair, &buffer_keypair];
  2093. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  2094. program_location: Some(noop_path.to_str().unwrap().to_string()),
  2095. fee_payer_signer_index: 0,
  2096. program_signer_index: None,
  2097. program_pubkey: None,
  2098. buffer_signer_index: None,
  2099. buffer_pubkey: Some(buffer_keypair.pubkey()),
  2100. upgrade_authority_signer_index: 1,
  2101. is_final: false,
  2102. max_len: None,
  2103. skip_fee_check: false,
  2104. compute_unit_price: None,
  2105. max_sign_attempts: 5,
  2106. auto_extend: true,
  2107. use_rpc: false,
  2108. skip_feature_verification: true,
  2109. });
  2110. config.output_format = OutputFormat::JsonCompact;
  2111. process_command(&config).unwrap();
  2112. }
  2113. #[test]
  2114. fn test_cli_program_mismatch_buffer_authority() {
  2115. agave_logger::setup();
  2116. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  2117. noop_path.push("tests");
  2118. noop_path.push("fixtures");
  2119. noop_path.push("noop");
  2120. noop_path.set_extension("so");
  2121. let mint_keypair = Keypair::new();
  2122. let mint_pubkey = mint_keypair.pubkey();
  2123. let test_validator = test_validator_genesis(mint_keypair)
  2124. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  2125. .expect("validator start failed");
  2126. let mut config = CliConfig::recent_for_tests();
  2127. config.json_rpc_url = test_validator.rpc_url();
  2128. let rpc_client = setup_rpc_client(&mut config);
  2129. let mut file = File::open(noop_path.to_str().unwrap()).unwrap();
  2130. let mut program_data = Vec::new();
  2131. file.read_to_end(&mut program_data).unwrap();
  2132. let max_len = program_data.len();
  2133. let minimum_balance_for_buffer = rpc_client
  2134. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  2135. max_len,
  2136. ))
  2137. .unwrap();
  2138. let keypair = Keypair::new();
  2139. config.signers = vec![&keypair];
  2140. config.command = CliCommand::Airdrop {
  2141. pubkey: None,
  2142. lamports: 100 * minimum_balance_for_buffer,
  2143. };
  2144. process_command(&config).unwrap();
  2145. // Write a buffer
  2146. let buffer_authority = Keypair::new();
  2147. let buffer_keypair = Keypair::new();
  2148. config.signers = vec![&keypair, &buffer_keypair, &buffer_authority];
  2149. config.command = CliCommand::Program(ProgramCliCommand::WriteBuffer {
  2150. program_location: noop_path.to_str().unwrap().to_string(),
  2151. fee_payer_signer_index: 0,
  2152. buffer_signer_index: Some(1),
  2153. buffer_pubkey: Some(buffer_keypair.pubkey()),
  2154. buffer_authority_signer_index: 2,
  2155. max_len: None,
  2156. skip_fee_check: false,
  2157. compute_unit_price: None,
  2158. max_sign_attempts: 5,
  2159. use_rpc: false,
  2160. skip_feature_verification: true,
  2161. });
  2162. process_command(&config).unwrap();
  2163. let buffer_account = rpc_client.get_account(&buffer_keypair.pubkey()).unwrap();
  2164. if let UpgradeableLoaderState::Buffer { authority_address } = buffer_account.state().unwrap() {
  2165. assert_eq!(authority_address, Some(buffer_authority.pubkey()));
  2166. } else {
  2167. panic!("not a buffer account");
  2168. }
  2169. // Attempt to deploy with mismatched authority
  2170. let upgrade_authority = Keypair::new();
  2171. config.signers = vec![&keypair, &upgrade_authority];
  2172. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  2173. program_location: Some(noop_path.to_str().unwrap().to_string()),
  2174. fee_payer_signer_index: 0,
  2175. program_signer_index: None,
  2176. program_pubkey: None,
  2177. buffer_signer_index: None,
  2178. buffer_pubkey: Some(buffer_keypair.pubkey()),
  2179. upgrade_authority_signer_index: 1,
  2180. is_final: true,
  2181. max_len: None,
  2182. skip_fee_check: false,
  2183. compute_unit_price: None,
  2184. max_sign_attempts: 5,
  2185. auto_extend: true,
  2186. use_rpc: false,
  2187. skip_feature_verification: true,
  2188. });
  2189. expect_command_failure(
  2190. &config,
  2191. "Deployment with an invalid authority should fail",
  2192. &format!(
  2193. "Buffer's authority Some({}) does not match authority provided {}",
  2194. buffer_authority.pubkey(),
  2195. upgrade_authority.pubkey(),
  2196. ),
  2197. );
  2198. // Attempt to deploy matched authority
  2199. config.signers = vec![&keypair, &buffer_authority];
  2200. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  2201. program_location: Some(noop_path.to_str().unwrap().to_string()),
  2202. fee_payer_signer_index: 0,
  2203. program_signer_index: None,
  2204. program_pubkey: None,
  2205. buffer_signer_index: None,
  2206. buffer_pubkey: Some(buffer_keypair.pubkey()),
  2207. upgrade_authority_signer_index: 1,
  2208. is_final: true,
  2209. max_len: None,
  2210. skip_fee_check: false,
  2211. compute_unit_price: None,
  2212. max_sign_attempts: 5,
  2213. auto_extend: true,
  2214. use_rpc: false,
  2215. skip_feature_verification: true,
  2216. });
  2217. process_command(&config).unwrap();
  2218. }
  2219. // Assume fee payer will be either online signer or offline signer (could be completely
  2220. // separate signer too, but that option is unlikely to be chosen often, so don't bother
  2221. // testing for it), we want to test for most common choices.
  2222. #[test_case(true; "offline signer will be fee payer")]
  2223. #[test_case(false; "online signer will be fee payer")]
  2224. fn test_cli_program_deploy_with_offline_signing(use_offline_signer_as_fee_payer: bool) {
  2225. agave_logger::setup();
  2226. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  2227. noop_path.push("tests");
  2228. noop_path.push("fixtures");
  2229. noop_path.push("noop");
  2230. noop_path.set_extension("so");
  2231. let mut noop_large_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  2232. noop_large_path.push("tests");
  2233. noop_large_path.push("fixtures");
  2234. noop_large_path.push("noop_large");
  2235. noop_large_path.set_extension("so");
  2236. let mint_keypair = Keypair::new();
  2237. let mint_pubkey = mint_keypair.pubkey();
  2238. let test_validator = test_validator_genesis(mint_keypair)
  2239. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  2240. .expect("validator start failed");
  2241. let mut config = CliConfig::recent_for_tests();
  2242. config.json_rpc_url = test_validator.rpc_url();
  2243. let rpc_client = setup_rpc_client(&mut config);
  2244. let blockhash = rpc_client.get_latest_blockhash().unwrap();
  2245. let mut file = File::open(noop_large_path.to_str().unwrap()).unwrap();
  2246. let mut large_program_data = Vec::new();
  2247. file.read_to_end(&mut large_program_data).unwrap();
  2248. let max_program_data_len = large_program_data.len();
  2249. let minimum_balance_for_large_buffer = rpc_client
  2250. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  2251. max_program_data_len,
  2252. ))
  2253. .unwrap();
  2254. let online_signer = Keypair::new();
  2255. let online_signer_identity = NullSigner::new(&online_signer.pubkey());
  2256. let offline_signer = Keypair::new();
  2257. let buffer_signer = Keypair::new();
  2258. // Typically, keypair for program signer should be different from online signer or
  2259. // offline signer keypairs.
  2260. let program_signer = Keypair::new();
  2261. config.command = CliCommand::Airdrop {
  2262. pubkey: None,
  2263. lamports: 100 * minimum_balance_for_large_buffer, // gotta be enough for this test
  2264. };
  2265. config.signers = vec![&online_signer];
  2266. process_command(&config).unwrap();
  2267. config.command = CliCommand::Airdrop {
  2268. pubkey: None,
  2269. lamports: 100 * minimum_balance_for_large_buffer, // gotta be enough for this test
  2270. };
  2271. config.signers = vec![&offline_signer];
  2272. process_command(&config).unwrap();
  2273. // Deploy upgradeable program with authority set to offline signer
  2274. config.signers = vec![&online_signer, &offline_signer, &program_signer];
  2275. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  2276. program_location: Some(noop_path.to_str().unwrap().to_string()),
  2277. fee_payer_signer_index: 0,
  2278. program_signer_index: Some(2),
  2279. program_pubkey: Some(program_signer.pubkey()),
  2280. buffer_signer_index: None,
  2281. buffer_pubkey: None,
  2282. upgrade_authority_signer_index: 1, // must be offline signer for security reasons
  2283. is_final: false,
  2284. max_len: Some(max_program_data_len), // allows for larger program size with future upgrades
  2285. skip_fee_check: false,
  2286. compute_unit_price: None,
  2287. max_sign_attempts: 5,
  2288. auto_extend: true,
  2289. use_rpc: false,
  2290. skip_feature_verification: true,
  2291. });
  2292. config.output_format = OutputFormat::JsonCompact;
  2293. process_command(&config).unwrap();
  2294. // Prepare buffer to upgrade deployed program to a larger program
  2295. create_buffer_with_offline_authority(
  2296. &rpc_client,
  2297. &noop_large_path,
  2298. &mut config,
  2299. &online_signer,
  2300. &offline_signer,
  2301. &buffer_signer,
  2302. );
  2303. // Offline sign-only with signature over "wrong" message (with different buffer)
  2304. config.signers = vec![&offline_signer];
  2305. let fee_payer_signer_index = if use_offline_signer_as_fee_payer {
  2306. 0 // offline signer
  2307. } else {
  2308. config.signers.push(&online_signer_identity); // can't (and won't) provide signature in --sign-only mode
  2309. 1 // online signer
  2310. };
  2311. config.command = CliCommand::Program(ProgramCliCommand::Upgrade {
  2312. fee_payer_signer_index,
  2313. program_pubkey: program_signer.pubkey(),
  2314. buffer_pubkey: program_signer.pubkey(), // will ensure offline signature applies to wrong(different) message
  2315. upgrade_authority_signer_index: 0,
  2316. sign_only: true,
  2317. dump_transaction_message: false,
  2318. blockhash_query: BlockhashQuery::new(Some(blockhash), true, None),
  2319. skip_feature_verification: true,
  2320. });
  2321. config.output_format = OutputFormat::JsonCompact;
  2322. let sig_response = process_command(&config).unwrap();
  2323. let sign_only = parse_sign_only_reply_string(&sig_response);
  2324. let offline_pre_signer = sign_only.presigner_of(&offline_signer.pubkey()).unwrap();
  2325. // Attempt to deploy from buffer using signature over wrong(different) message (should fail)
  2326. config.signers = vec![&offline_pre_signer, &program_signer];
  2327. let fee_payer_signer_index = if use_offline_signer_as_fee_payer {
  2328. 0 // offline signer
  2329. } else {
  2330. config.signers.push(&online_signer); // can provide signature when not in --sign-only mode
  2331. 2 // online signer
  2332. };
  2333. config.command = CliCommand::Program(ProgramCliCommand::Upgrade {
  2334. fee_payer_signer_index,
  2335. program_pubkey: program_signer.pubkey(),
  2336. buffer_pubkey: buffer_signer.pubkey(),
  2337. upgrade_authority_signer_index: 0,
  2338. sign_only: false,
  2339. dump_transaction_message: false,
  2340. blockhash_query: BlockhashQuery::new(Some(blockhash), true, None),
  2341. skip_feature_verification: true,
  2342. });
  2343. config.output_format = OutputFormat::JsonCompact;
  2344. expect_command_failure(
  2345. &config,
  2346. "Signature becomes invalid if the buffer is modified",
  2347. "presigner error",
  2348. );
  2349. // Offline sign-only with online signer as fee payer (correct signature for program upgrade)
  2350. config.signers = vec![&offline_signer];
  2351. let fee_payer_signer_index = if use_offline_signer_as_fee_payer {
  2352. 0 // offline signer
  2353. } else {
  2354. config.signers.push(&online_signer_identity); // can't (and won't) provide signature in --sign-only mode
  2355. 1 // online signer
  2356. };
  2357. config.command = CliCommand::Program(ProgramCliCommand::Upgrade {
  2358. fee_payer_signer_index,
  2359. program_pubkey: program_signer.pubkey(),
  2360. buffer_pubkey: buffer_signer.pubkey(),
  2361. upgrade_authority_signer_index: 0,
  2362. sign_only: true,
  2363. dump_transaction_message: false,
  2364. blockhash_query: BlockhashQuery::new(Some(blockhash), true, None),
  2365. skip_feature_verification: true,
  2366. });
  2367. config.output_format = OutputFormat::JsonCompact;
  2368. let sig_response = process_command(&config).unwrap();
  2369. let sign_only = parse_sign_only_reply_string(&sig_response);
  2370. let offline_pre_signer = sign_only.presigner_of(&offline_signer.pubkey()).unwrap();
  2371. // Attempt to deploy from buffer using signature over correct message (should succeed)
  2372. config.signers = vec![&offline_pre_signer, &program_signer];
  2373. let fee_payer_signer_index = if use_offline_signer_as_fee_payer {
  2374. 0 // offline signer
  2375. } else {
  2376. config.signers.push(&online_signer); // can provide signature when not in --sign-only mode
  2377. 2 // online signer
  2378. };
  2379. config.command = CliCommand::Program(ProgramCliCommand::Upgrade {
  2380. fee_payer_signer_index,
  2381. program_pubkey: program_signer.pubkey(),
  2382. buffer_pubkey: buffer_signer.pubkey(),
  2383. upgrade_authority_signer_index: 0,
  2384. sign_only: false,
  2385. dump_transaction_message: false,
  2386. blockhash_query: BlockhashQuery::new(Some(blockhash), true, None),
  2387. skip_feature_verification: true,
  2388. });
  2389. config.output_format = OutputFormat::JsonCompact;
  2390. process_command(&config).unwrap();
  2391. let (programdata_pubkey, _) = Pubkey::find_program_address(
  2392. &[program_signer.pubkey().as_ref()],
  2393. &bpf_loader_upgradeable::id(),
  2394. );
  2395. let programdata_account = rpc_client.get_account(&programdata_pubkey).unwrap();
  2396. assert_eq!(
  2397. programdata_account.lamports,
  2398. minimum_balance_for_large_buffer
  2399. );
  2400. assert_eq!(programdata_account.owner, bpf_loader_upgradeable::id());
  2401. assert!(!programdata_account.executable);
  2402. assert_eq!(
  2403. programdata_account.data[UpgradeableLoaderState::size_of_programdata_metadata()..],
  2404. large_program_data[..]
  2405. );
  2406. }
  2407. #[test]
  2408. fn test_cli_program_show() {
  2409. agave_logger::setup();
  2410. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  2411. noop_path.push("tests");
  2412. noop_path.push("fixtures");
  2413. noop_path.push("noop");
  2414. noop_path.set_extension("so");
  2415. let mint_keypair = Keypair::new();
  2416. let mint_pubkey = mint_keypair.pubkey();
  2417. let test_validator = test_validator_genesis(mint_keypair)
  2418. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  2419. .expect("validator start failed");
  2420. let mut config = CliConfig::recent_for_tests();
  2421. config.json_rpc_url = test_validator.rpc_url();
  2422. let rpc_client = setup_rpc_client(&mut config);
  2423. let mut file = File::open(noop_path.to_str().unwrap()).unwrap();
  2424. let mut program_data = Vec::new();
  2425. file.read_to_end(&mut program_data).unwrap();
  2426. let max_len = program_data.len();
  2427. let minimum_balance_for_buffer = rpc_client
  2428. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  2429. max_len,
  2430. ))
  2431. .unwrap();
  2432. let keypair = Keypair::new();
  2433. config.output_format = OutputFormat::Json;
  2434. // Airdrop
  2435. config.signers = vec![&keypair];
  2436. config.command = CliCommand::Airdrop {
  2437. pubkey: None,
  2438. lamports: 100 * minimum_balance_for_buffer,
  2439. };
  2440. process_command(&config).unwrap();
  2441. // Write a buffer
  2442. let buffer_keypair = Keypair::new();
  2443. let authority_keypair = Keypair::new();
  2444. config.signers = vec![&keypair, &buffer_keypair, &authority_keypair];
  2445. config.command = CliCommand::Program(ProgramCliCommand::WriteBuffer {
  2446. program_location: noop_path.to_str().unwrap().to_string(),
  2447. fee_payer_signer_index: 0,
  2448. buffer_signer_index: Some(1),
  2449. buffer_pubkey: Some(buffer_keypair.pubkey()),
  2450. buffer_authority_signer_index: 2,
  2451. max_len: None,
  2452. skip_fee_check: false,
  2453. compute_unit_price: None,
  2454. max_sign_attempts: 5,
  2455. use_rpc: false,
  2456. skip_feature_verification: true,
  2457. });
  2458. process_command(&config).unwrap();
  2459. // Verify show
  2460. config.signers = vec![&keypair];
  2461. config.command = CliCommand::Program(ProgramCliCommand::Show {
  2462. account_pubkey: Some(buffer_keypair.pubkey()),
  2463. authority_pubkey: keypair.pubkey(),
  2464. get_programs: false,
  2465. get_buffers: false,
  2466. all: false,
  2467. use_lamports_unit: false,
  2468. });
  2469. let response = process_command(&config);
  2470. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  2471. let address_str = json
  2472. .as_object()
  2473. .unwrap()
  2474. .get("address")
  2475. .unwrap()
  2476. .as_str()
  2477. .unwrap();
  2478. assert_eq!(
  2479. buffer_keypair.pubkey(),
  2480. Pubkey::from_str(address_str).unwrap()
  2481. );
  2482. let authority_str = json
  2483. .as_object()
  2484. .unwrap()
  2485. .get("authority")
  2486. .unwrap()
  2487. .as_str()
  2488. .unwrap();
  2489. assert_eq!(
  2490. authority_keypair.pubkey(),
  2491. Pubkey::from_str(authority_str).unwrap()
  2492. );
  2493. let data_len = json
  2494. .as_object()
  2495. .unwrap()
  2496. .get("dataLen")
  2497. .unwrap()
  2498. .as_u64()
  2499. .unwrap();
  2500. assert_eq!(max_len, data_len as usize);
  2501. // Deploy
  2502. let program_keypair = Keypair::new();
  2503. config.signers = vec![&keypair, &authority_keypair, &program_keypair];
  2504. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  2505. program_location: Some(noop_path.to_str().unwrap().to_string()),
  2506. fee_payer_signer_index: 0,
  2507. program_signer_index: Some(2),
  2508. program_pubkey: Some(program_keypair.pubkey()),
  2509. buffer_signer_index: None,
  2510. buffer_pubkey: None,
  2511. upgrade_authority_signer_index: 1,
  2512. is_final: false,
  2513. max_len: Some(max_len),
  2514. skip_fee_check: false,
  2515. compute_unit_price: None,
  2516. max_sign_attempts: 5,
  2517. auto_extend: true,
  2518. use_rpc: false,
  2519. skip_feature_verification: true,
  2520. });
  2521. config.output_format = OutputFormat::JsonCompact;
  2522. let min_slot = rpc_client.get_slot().unwrap();
  2523. process_command(&config).unwrap();
  2524. let max_slot = rpc_client.get_slot().unwrap();
  2525. // Verify show
  2526. config.signers = vec![&keypair];
  2527. config.command = CliCommand::Program(ProgramCliCommand::Show {
  2528. account_pubkey: Some(program_keypair.pubkey()),
  2529. authority_pubkey: keypair.pubkey(),
  2530. get_programs: false,
  2531. get_buffers: false,
  2532. all: false,
  2533. use_lamports_unit: false,
  2534. });
  2535. let response = process_command(&config);
  2536. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  2537. let address_str = json
  2538. .as_object()
  2539. .unwrap()
  2540. .get("programId")
  2541. .unwrap()
  2542. .as_str()
  2543. .unwrap();
  2544. assert_eq!(
  2545. program_keypair.pubkey(),
  2546. Pubkey::from_str(address_str).unwrap()
  2547. );
  2548. let programdata_address_str = json
  2549. .as_object()
  2550. .unwrap()
  2551. .get("programdataAddress")
  2552. .unwrap()
  2553. .as_str()
  2554. .unwrap();
  2555. let (programdata_pubkey, _) = Pubkey::find_program_address(
  2556. &[program_keypair.pubkey().as_ref()],
  2557. &bpf_loader_upgradeable::id(),
  2558. );
  2559. assert_eq!(
  2560. programdata_pubkey,
  2561. Pubkey::from_str(programdata_address_str).unwrap()
  2562. );
  2563. let authority_str = json
  2564. .as_object()
  2565. .unwrap()
  2566. .get("authority")
  2567. .unwrap()
  2568. .as_str()
  2569. .unwrap();
  2570. assert_eq!(
  2571. authority_keypair.pubkey(),
  2572. Pubkey::from_str(authority_str).unwrap()
  2573. );
  2574. let deployed_slot = json
  2575. .as_object()
  2576. .unwrap()
  2577. .get("lastDeploySlot")
  2578. .unwrap()
  2579. .as_u64()
  2580. .unwrap();
  2581. assert!(deployed_slot >= min_slot);
  2582. assert!(deployed_slot <= max_slot);
  2583. let data_len = json
  2584. .as_object()
  2585. .unwrap()
  2586. .get("dataLen")
  2587. .unwrap()
  2588. .as_u64()
  2589. .unwrap();
  2590. assert_eq!(max_len, data_len as usize);
  2591. }
  2592. #[test]
  2593. fn test_cli_program_dump() {
  2594. agave_logger::setup();
  2595. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  2596. noop_path.push("tests");
  2597. noop_path.push("fixtures");
  2598. noop_path.push("noop");
  2599. noop_path.set_extension("so");
  2600. let mint_keypair = Keypair::new();
  2601. let mint_pubkey = mint_keypair.pubkey();
  2602. let test_validator = test_validator_genesis(mint_keypair)
  2603. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  2604. .expect("validator start failed");
  2605. let mut config = CliConfig::recent_for_tests();
  2606. config.json_rpc_url = test_validator.rpc_url();
  2607. let rpc_client = setup_rpc_client(&mut config);
  2608. let mut file = File::open(noop_path.to_str().unwrap()).unwrap();
  2609. let mut program_data = Vec::new();
  2610. file.read_to_end(&mut program_data).unwrap();
  2611. let max_len = program_data.len();
  2612. let minimum_balance_for_buffer = rpc_client
  2613. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  2614. max_len,
  2615. ))
  2616. .unwrap();
  2617. let keypair = Keypair::new();
  2618. config.output_format = OutputFormat::Json;
  2619. // Airdrop
  2620. config.signers = vec![&keypair];
  2621. config.command = CliCommand::Airdrop {
  2622. pubkey: None,
  2623. lamports: 100 * minimum_balance_for_buffer,
  2624. };
  2625. process_command(&config).unwrap();
  2626. // Write a buffer
  2627. let buffer_keypair = Keypair::new();
  2628. let authority_keypair = Keypair::new();
  2629. config.signers = vec![&keypair, &buffer_keypair, &authority_keypair];
  2630. config.command = CliCommand::Program(ProgramCliCommand::WriteBuffer {
  2631. program_location: noop_path.to_str().unwrap().to_string(),
  2632. fee_payer_signer_index: 0,
  2633. buffer_signer_index: Some(1),
  2634. buffer_pubkey: Some(buffer_keypair.pubkey()),
  2635. buffer_authority_signer_index: 2,
  2636. max_len: None,
  2637. skip_fee_check: false,
  2638. compute_unit_price: None,
  2639. max_sign_attempts: 5,
  2640. use_rpc: false,
  2641. skip_feature_verification: true,
  2642. });
  2643. process_command(&config).unwrap();
  2644. // Verify dump
  2645. let mut out_file = {
  2646. let current_exe = env::current_exe().unwrap();
  2647. PathBuf::from(current_exe.parent().unwrap().parent().unwrap())
  2648. };
  2649. out_file.set_file_name("out.txt");
  2650. config.signers = vec![&keypair];
  2651. config.command = CliCommand::Program(ProgramCliCommand::Dump {
  2652. account_pubkey: Some(buffer_keypair.pubkey()),
  2653. output_location: out_file.clone().into_os_string().into_string().unwrap(),
  2654. });
  2655. process_command(&config).unwrap();
  2656. let mut file = File::open(out_file).unwrap();
  2657. let mut out_data = Vec::new();
  2658. file.read_to_end(&mut out_data).unwrap();
  2659. assert_eq!(program_data.len(), out_data.len());
  2660. for i in 0..program_data.len() {
  2661. assert_eq!(program_data[i], out_data[i]);
  2662. }
  2663. }
  2664. fn create_buffer_with_offline_authority<'a>(
  2665. rpc_client: &RpcClient,
  2666. program_path: &Path,
  2667. config: &mut CliConfig<'a>,
  2668. online_signer: &'a Keypair,
  2669. offline_signer: &'a Keypair,
  2670. buffer_signer: &'a Keypair,
  2671. ) {
  2672. // Write a buffer
  2673. config.signers = vec![online_signer, buffer_signer];
  2674. config.command = CliCommand::Program(ProgramCliCommand::WriteBuffer {
  2675. program_location: program_path.to_str().unwrap().to_string(),
  2676. fee_payer_signer_index: 0,
  2677. buffer_signer_index: Some(1),
  2678. buffer_pubkey: Some(buffer_signer.pubkey()),
  2679. buffer_authority_signer_index: 0,
  2680. max_len: None,
  2681. skip_fee_check: false,
  2682. compute_unit_price: None,
  2683. max_sign_attempts: 5,
  2684. use_rpc: false,
  2685. skip_feature_verification: true,
  2686. });
  2687. process_command(config).unwrap();
  2688. let buffer_account = rpc_client.get_account(&buffer_signer.pubkey()).unwrap();
  2689. if let UpgradeableLoaderState::Buffer { authority_address } = buffer_account.state().unwrap() {
  2690. assert_eq!(authority_address, Some(online_signer.pubkey()));
  2691. } else {
  2692. panic!("not a buffer account");
  2693. }
  2694. // Set buffer authority to offline signer
  2695. config.signers = vec![online_signer];
  2696. config.command = CliCommand::Program(ProgramCliCommand::SetBufferAuthority {
  2697. buffer_pubkey: buffer_signer.pubkey(),
  2698. buffer_authority_index: Some(0),
  2699. new_buffer_authority: offline_signer.pubkey(),
  2700. });
  2701. config.output_format = OutputFormat::JsonCompact;
  2702. process_command(config).unwrap();
  2703. let buffer_account = rpc_client.get_account(&buffer_signer.pubkey()).unwrap();
  2704. if let UpgradeableLoaderState::Buffer { authority_address } = buffer_account.state().unwrap() {
  2705. assert_eq!(authority_address, Some(offline_signer.pubkey()));
  2706. } else {
  2707. panic!("not a buffer account");
  2708. }
  2709. }
  2710. #[allow(clippy::assertions_on_constants)]
  2711. #[test_case(None, false; "default")]
  2712. #[test_case(Some(10), false; "with_compute_unit_price")]
  2713. #[test_case(None, true; "use_rpc")]
  2714. fn test_cli_program_deploy_with_args(compute_unit_price: Option<u64>, use_rpc: bool) {
  2715. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  2716. noop_path.push("tests");
  2717. noop_path.push("fixtures");
  2718. noop_path.push("noop");
  2719. noop_path.set_extension("so");
  2720. let mint_keypair = Keypair::new();
  2721. let mint_pubkey = mint_keypair.pubkey();
  2722. let faucet_addr = run_local_faucet_with_unique_port_for_tests(mint_keypair);
  2723. let test_validator = TestValidatorGenesis::default()
  2724. .fee_rate_governor(FeeRateGovernor::new(0, 0))
  2725. .rent(Rent {
  2726. lamports_per_byte_year: 1,
  2727. exemption_threshold: 1.0,
  2728. ..Rent::default()
  2729. })
  2730. .rpc_config(JsonRpcConfig {
  2731. enable_rpc_transaction_history: true,
  2732. faucet_addr: Some(faucet_addr),
  2733. ..JsonRpcConfig::default_for_test()
  2734. })
  2735. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  2736. .expect("validator start failed");
  2737. let mut config = CliConfig::recent_for_tests();
  2738. config.json_rpc_url = test_validator.rpc_url();
  2739. let rpc_client = setup_rpc_client(&mut config);
  2740. let mut file = File::open(noop_path.to_str().unwrap()).unwrap();
  2741. let mut program_data = Vec::new();
  2742. file.read_to_end(&mut program_data).unwrap();
  2743. let max_len = program_data.len();
  2744. let minimum_balance_for_programdata = rpc_client
  2745. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_programdata(
  2746. max_len,
  2747. ))
  2748. .unwrap();
  2749. let minimum_balance_for_program = rpc_client
  2750. .get_minimum_balance_for_rent_exemption(UpgradeableLoaderState::size_of_program())
  2751. .unwrap();
  2752. let upgrade_authority = Keypair::new();
  2753. let keypair = Keypair::new();
  2754. config.signers = vec![&keypair];
  2755. config.command = CliCommand::Airdrop {
  2756. pubkey: None,
  2757. lamports: 100 * minimum_balance_for_programdata + minimum_balance_for_program,
  2758. };
  2759. process_command(&config).unwrap();
  2760. // Deploy the upgradeable program with specified program_id
  2761. let program_keypair = Keypair::new();
  2762. config.signers = vec![&keypair, &upgrade_authority, &program_keypair];
  2763. config.command = CliCommand::Program(ProgramCliCommand::Deploy {
  2764. program_location: Some(noop_path.to_str().unwrap().to_string()),
  2765. fee_payer_signer_index: 0,
  2766. program_signer_index: Some(2),
  2767. program_pubkey: Some(program_keypair.pubkey()),
  2768. buffer_signer_index: None,
  2769. buffer_pubkey: None,
  2770. upgrade_authority_signer_index: 1,
  2771. is_final: false,
  2772. max_len: Some(max_len),
  2773. skip_fee_check: false,
  2774. compute_unit_price,
  2775. max_sign_attempts: 5,
  2776. auto_extend: true,
  2777. use_rpc,
  2778. skip_feature_verification: true,
  2779. });
  2780. config.output_format = OutputFormat::JsonCompact;
  2781. let response = process_command(&config);
  2782. let json: Value = serde_json::from_str(&response.unwrap()).unwrap();
  2783. let program_pubkey_str = json
  2784. .as_object()
  2785. .unwrap()
  2786. .get("programId")
  2787. .unwrap()
  2788. .as_str()
  2789. .unwrap();
  2790. assert_eq!(
  2791. program_keypair.pubkey(),
  2792. Pubkey::from_str(program_pubkey_str).unwrap()
  2793. );
  2794. let program_account = rpc_client.get_account(&program_keypair.pubkey()).unwrap();
  2795. assert_eq!(program_account.lamports, minimum_balance_for_program);
  2796. assert_eq!(program_account.owner, bpf_loader_upgradeable::id());
  2797. assert!(program_account.executable);
  2798. let signature_statuses = rpc_client
  2799. .get_signatures_for_address_with_config(
  2800. &keypair.pubkey(),
  2801. GetConfirmedSignaturesForAddress2Config {
  2802. commitment: Some(CommitmentConfig::confirmed()),
  2803. ..GetConfirmedSignaturesForAddress2Config::default()
  2804. },
  2805. )
  2806. .unwrap();
  2807. let signatures: Vec<_> = signature_statuses
  2808. .into_iter()
  2809. .rev()
  2810. .map(|status| Signature::from_str(&status.signature).unwrap())
  2811. .collect();
  2812. fn fetch_and_decode_transaction(rpc_client: &RpcClient, signature: &Signature) -> Transaction {
  2813. rpc_client
  2814. .get_transaction_with_config(
  2815. signature,
  2816. RpcTransactionConfig {
  2817. encoding: Some(UiTransactionEncoding::Base64),
  2818. commitment: Some(CommitmentConfig::confirmed()),
  2819. ..RpcTransactionConfig::default()
  2820. },
  2821. )
  2822. .unwrap()
  2823. .transaction
  2824. .transaction
  2825. .decode()
  2826. .unwrap()
  2827. .into_legacy_transaction()
  2828. .unwrap()
  2829. }
  2830. assert!(signatures.len() >= 4);
  2831. let initial_tx = fetch_and_decode_transaction(&rpc_client, &signatures[1]);
  2832. let write_tx = fetch_and_decode_transaction(&rpc_client, &signatures[2]);
  2833. let final_tx = fetch_and_decode_transaction(&rpc_client, signatures.last().unwrap());
  2834. if let Some(compute_unit_price) = compute_unit_price {
  2835. for tx in [&initial_tx, &write_tx, &final_tx] {
  2836. let ix_len = tx.message.instructions.len();
  2837. for i in [1, 2] {
  2838. assert_eq!(
  2839. tx.message.instructions[ix_len - i].program_id(&tx.message.account_keys),
  2840. &compute_budget::id()
  2841. );
  2842. }
  2843. assert_matches!(
  2844. try_from_slice_unchecked(&tx.message.instructions[ix_len - 2].data),
  2845. Ok(ComputeBudgetInstruction::SetComputeUnitPrice(price)) if price == compute_unit_price
  2846. );
  2847. }
  2848. assert_matches!(
  2849. try_from_slice_unchecked(&initial_tx.message.instructions.last().unwrap().data),
  2850. Ok(ComputeBudgetInstruction::SetComputeUnitLimit(2820))
  2851. );
  2852. assert_matches!(
  2853. try_from_slice_unchecked(&write_tx.message.instructions.last().unwrap().data),
  2854. Ok(ComputeBudgetInstruction::SetComputeUnitLimit(2670))
  2855. );
  2856. assert_matches!(
  2857. try_from_slice_unchecked(&final_tx.message.instructions.last().unwrap().data),
  2858. Ok(ComputeBudgetInstruction::SetComputeUnitLimit(2970))
  2859. );
  2860. } else {
  2861. assert_eq!(
  2862. initial_tx.message.instructions[0].program_id(&initial_tx.message.account_keys),
  2863. &system_program::id()
  2864. );
  2865. assert_eq!(
  2866. write_tx.message.instructions[0].program_id(&write_tx.message.account_keys),
  2867. &bpf_loader_upgradeable::id()
  2868. );
  2869. assert_eq!(
  2870. final_tx.message.instructions[0].program_id(&final_tx.message.account_keys),
  2871. &system_program::id()
  2872. );
  2873. }
  2874. }
  2875. #[test]
  2876. fn test_cli_program_v4() {
  2877. let mut noop_path = PathBuf::from(env!("CARGO_MANIFEST_DIR"));
  2878. noop_path.push("tests");
  2879. noop_path.push("fixtures");
  2880. noop_path.push("noop");
  2881. noop_path.set_extension("so");
  2882. let mint_keypair = Keypair::new();
  2883. let mint_pubkey = mint_keypair.pubkey();
  2884. let test_validator = test_validator_genesis(mint_keypair)
  2885. .start_with_mint_address(mint_pubkey, SocketAddrSpace::Unspecified)
  2886. .expect("validator start failed");
  2887. let mut config = CliConfig::recent_for_tests();
  2888. config.json_rpc_url = test_validator.rpc_url();
  2889. let rpc_client = setup_rpc_client(&mut config);
  2890. let payer_keypair = Keypair::new();
  2891. let upgrade_authority = Keypair::new();
  2892. let program_keypair = Keypair::new();
  2893. let buffer_keypair = Keypair::new();
  2894. config.signers = vec![
  2895. &payer_keypair,
  2896. &upgrade_authority,
  2897. &program_keypair,
  2898. &buffer_keypair,
  2899. ];
  2900. config.command = CliCommand::Airdrop {
  2901. pubkey: None,
  2902. lamports: 10000000,
  2903. };
  2904. process_command(&config).unwrap();
  2905. config.command = CliCommand::Airdrop {
  2906. pubkey: Some(program_keypair.pubkey()),
  2907. lamports: 1000,
  2908. };
  2909. process_command(&config).unwrap();
  2910. // Initial deployment
  2911. config.output_format = OutputFormat::JsonCompact;
  2912. config.command = CliCommand::ProgramV4(ProgramV4CliCommand::Deploy {
  2913. additional_cli_config: AdditionalCliConfig::default(),
  2914. program_address: program_keypair.pubkey(),
  2915. buffer_address: None,
  2916. upload_signer_index: Some(2),
  2917. authority_signer_index: 1,
  2918. path_to_elf: Some(noop_path.to_str().unwrap().to_string()),
  2919. upload_range: None..None,
  2920. });
  2921. assert!(process_command(&config).is_ok());
  2922. let program_account = rpc_client.get_account(&program_keypair.pubkey()).unwrap();
  2923. assert_eq!(program_account.owner, loader_v4::id());
  2924. assert!(program_account.executable);
  2925. // Single-step redeployment without buffer
  2926. config.command = CliCommand::ProgramV4(ProgramV4CliCommand::Deploy {
  2927. additional_cli_config: AdditionalCliConfig::default(),
  2928. program_address: program_keypair.pubkey(),
  2929. buffer_address: None,
  2930. upload_signer_index: None,
  2931. authority_signer_index: 1,
  2932. path_to_elf: Some(noop_path.to_str().unwrap().to_string()),
  2933. upload_range: None..None,
  2934. });
  2935. assert!(process_command(&config).is_ok());
  2936. let program_account = rpc_client.get_account(&program_keypair.pubkey()).unwrap();
  2937. assert_eq!(program_account.owner, loader_v4::id());
  2938. assert!(program_account.executable);
  2939. // Single-step redeployment with buffer
  2940. config.command = CliCommand::ProgramV4(ProgramV4CliCommand::Deploy {
  2941. additional_cli_config: AdditionalCliConfig::default(),
  2942. program_address: program_keypair.pubkey(),
  2943. buffer_address: Some(buffer_keypair.pubkey()),
  2944. upload_signer_index: Some(3),
  2945. authority_signer_index: 1,
  2946. path_to_elf: Some(noop_path.to_str().unwrap().to_string()),
  2947. upload_range: None..None,
  2948. });
  2949. assert!(process_command(&config).is_ok());
  2950. let program_account = rpc_client.get_account(&program_keypair.pubkey()).unwrap();
  2951. assert_eq!(program_account.owner, loader_v4::id());
  2952. assert!(program_account.executable);
  2953. let _error = rpc_client
  2954. .get_account(&buffer_keypair.pubkey())
  2955. .unwrap_err();
  2956. // Two-step redeployment with buffer
  2957. config.command = CliCommand::ProgramV4(ProgramV4CliCommand::Deploy {
  2958. additional_cli_config: AdditionalCliConfig::default(),
  2959. program_address: buffer_keypair.pubkey(),
  2960. buffer_address: Some(buffer_keypair.pubkey()),
  2961. upload_signer_index: Some(3),
  2962. authority_signer_index: 1,
  2963. path_to_elf: Some(noop_path.to_str().unwrap().to_string()),
  2964. upload_range: None..None,
  2965. });
  2966. assert!(process_command(&config).is_ok());
  2967. let buffer_account = rpc_client.get_account(&buffer_keypair.pubkey()).unwrap();
  2968. assert_eq!(buffer_account.owner, loader_v4::id());
  2969. assert!(buffer_account.executable);
  2970. config.command = CliCommand::ProgramV4(ProgramV4CliCommand::Deploy {
  2971. additional_cli_config: AdditionalCliConfig::default(),
  2972. program_address: program_keypair.pubkey(),
  2973. buffer_address: Some(buffer_keypair.pubkey()),
  2974. upload_signer_index: None,
  2975. authority_signer_index: 1,
  2976. path_to_elf: Some(noop_path.to_str().unwrap().to_string()),
  2977. upload_range: None..None,
  2978. });
  2979. assert!(process_command(&config).is_ok());
  2980. let program_account = rpc_client.get_account(&program_keypair.pubkey()).unwrap();
  2981. assert_eq!(program_account.owner, loader_v4::id());
  2982. assert!(program_account.executable);
  2983. let _error = rpc_client
  2984. .get_account(&buffer_keypair.pubkey())
  2985. .unwrap_err();
  2986. // Transfer authority over program
  2987. config.command = CliCommand::ProgramV4(ProgramV4CliCommand::TransferAuthority {
  2988. additional_cli_config: AdditionalCliConfig::default(),
  2989. program_address: program_keypair.pubkey(),
  2990. authority_signer_index: 1,
  2991. new_authority_signer_index: 2,
  2992. });
  2993. assert!(process_command(&config).is_ok());
  2994. let program_account = rpc_client.get_account(&program_keypair.pubkey()).unwrap();
  2995. assert_eq!(program_account.owner, loader_v4::id());
  2996. assert!(program_account.executable);
  2997. // Close program
  2998. config.command = CliCommand::ProgramV4(ProgramV4CliCommand::Retract {
  2999. additional_cli_config: AdditionalCliConfig::default(),
  3000. program_address: program_keypair.pubkey(),
  3001. authority_signer_index: 2,
  3002. close_program_entirely: true,
  3003. });
  3004. assert!(process_command(&config).is_ok());
  3005. let _error = rpc_client
  3006. .get_account(&program_keypair.pubkey())
  3007. .unwrap_err();
  3008. // Deployment at the closed address
  3009. config.command = CliCommand::ProgramV4(ProgramV4CliCommand::Deploy {
  3010. additional_cli_config: AdditionalCliConfig::default(),
  3011. program_address: program_keypair.pubkey(),
  3012. buffer_address: None,
  3013. upload_signer_index: Some(2),
  3014. authority_signer_index: 1,
  3015. path_to_elf: Some(noop_path.to_str().unwrap().to_string()),
  3016. upload_range: None..None,
  3017. });
  3018. assert!(process_command(&config).is_ok());
  3019. let program_account = rpc_client.get_account(&program_keypair.pubkey()).unwrap();
  3020. assert_eq!(program_account.owner, loader_v4::id());
  3021. assert!(program_account.executable);
  3022. // Finalize program
  3023. config.command = CliCommand::ProgramV4(ProgramV4CliCommand::Finalize {
  3024. additional_cli_config: AdditionalCliConfig::default(),
  3025. program_address: program_keypair.pubkey(),
  3026. authority_signer_index: 1,
  3027. next_version_signer_index: 2,
  3028. });
  3029. assert!(process_command(&config).is_ok());
  3030. let program_account = rpc_client.get_account(&program_keypair.pubkey()).unwrap();
  3031. assert_eq!(program_account.owner, loader_v4::id());
  3032. assert!(program_account.executable);
  3033. }